diff --git a/hyperledger_fabric/README.md b/hyperledger_fabric/README.md index de29acd3..90bef74b 100644 --- a/hyperledger_fabric/README.md +++ b/hyperledger_fabric/README.md @@ -17,6 +17,7 @@ Fabric Release | Description [Fabric v2.2.0](v2.0.0/) | stable fabric 2.2.0 release. [Fabric v2.1.0](v2.0.0/) | stable fabric 2.1.0 release. [Fabric v2.0.0](v2.0.0/) | stable fabric 2.0.0 release. +[Fabric v1.4.8](v1.4.8/) | stable fabric 1.4.8 LTS release. [Fabric v1.4.7](v1.4.7/) | stable fabric 1.4.7 LTS release. [Fabric v1.4.6](v1.4.6/) | stable fabric 1.4.6 LTS release. [Fabric v1.4.5](v1.4.5/) | stable fabric 1.4.5 LTS release. diff --git a/hyperledger_fabric/v1.4.8/.env b/hyperledger_fabric/v1.4.8/.env new file mode 100644 index 00000000..3e3d8b01 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/.env @@ -0,0 +1,4 @@ +# for docker-compose usage +FABRIC_IMG_TAG=1.4.8 +EXT_IMG_TAG=0.4.21 +NETWORK=hlf_net diff --git a/hyperledger_fabric/v1.4.8/2orgs-4peers-solo.yaml b/hyperledger_fabric/v1.4.8/2orgs-4peers-solo.yaml new file mode 100644 index 00000000..f3fec66a --- /dev/null +++ b/hyperledger_fabric/v1.4.8/2orgs-4peers-solo.yaml @@ -0,0 +1,95 @@ +--- +version: '2.0' +services: + orderer.example.com: # orderer in solo mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer.example.com + hostname: orderer.example.com + expose: + - '7050' + volumes: + - ./solo/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls:/var/hyperledger/orderer/tls + peer0.org1.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com # will generated automatically + hostname: peer0.org1.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 + peer1.org1.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer1.org1.example.com # will generated automatically + hostname: peer1.org1.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 + peer0.org2.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer0.org2.example.com # will generated automatically + hostname: peer0.org2.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 + peer1.org2.example.com: # peer node + extends: + file: base.yaml + service: peer-base + container_name: peer1.org2.example.com # will generated automatically + hostname: peer1.org2.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + - CORE_PEER_TLS_ENABLED=true + volumes: + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./solo/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + expose: + - 7051 + - 7052 + - 7053 diff --git a/hyperledger_fabric/v1.4.8/Makefile b/hyperledger_fabric/v1.4.8/Makefile new file mode 100644 index 00000000..0cc6475a --- /dev/null +++ b/hyperledger_fabric/v1.4.8/Makefile @@ -0,0 +1,313 @@ +# Makefile to bootup the network, and do testing with channel, chaincode +# Run `make test` will pass all testing cases, and delete the network +# Run `make ready` will create a network, pass testing cases, and stand there for manual test, e.g., make test_channel_list + + +# support advanced bash grammar +SHELL:=/bin/bash + +# mode of the network: solo, kafka, raft +HLF_MODE ?= raft + +# mode of db: golevel, couchdb +DB_MODE ?= golevel + +# mode of dev +DEV_MODE ?= non-dev + +NETWORK_INIT_WAIT ?= 2 # time to wait the fabric network finish initialization + +COMPOSE_FILE ?= "docker-compose-2orgs-4peers-raft.yaml" + +LOG_PATH ?= solo/logs + +ifeq ($(HLF_MODE),kafka) + NETWORK_INIT_WAIT=30 +else ifeq ($(HLF_MODE),raft) + NETWORK_INIT_WAIT=5 +endif + +COMPOSE_FILE="docker-compose-2orgs-4peers-$(HLF_MODE).yaml" + +LOG_PATH=$(HLF_MODE)/logs + +ifeq ($(DB_MODE),couchdb) + COMPOSE_FILE="docker-compose-2orgs-4peers-couchdb.yaml" +endif + +ifeq ($(DEV_MODE),dev) + COMPOSE_FILE="docker-compose-2orgs-4peers-dev.yaml" +endif + +all: test + +test: + @echo "Run test with $(COMPOSE_FILE)" + @echo "Please make sure u have setup Docker and pulled images by 'make setup download'." + make ready # Run all testing till ready + + make stop clean + +ready: # create/join channel, install/instantiate cc + make stop + + # make clean_config_channel # Remove existing channel artifacts + make gen_config_crypto # Will ignore if local config path exists + make gen_config_channel # Will ignore if local config path exists + + make start + + sleep ${NETWORK_INIT_WAIT} + + make channel_test + + make update_anchors + + make cc_test # test_cc_install test_cc_instantiate test_cc_invoke_query + + make test_lscc # test lscc operations + make test_qscc # test qscc operations + make test_cscc # test cscc operations + + make test_fetch_blocks # fetch block files + + make test_config_update + make test_channel_update + + make test_fetch_blocks # fetch block files again + make test_configtxlator + + make test_channel_list + make test_channel_getinfo + make test_discover + + make logs_save + + @echo "Now the fabric network is ready to play" + @echo "* run 'make cli' to enter into the fabric-cli container." + @echo "* run 'make stop' when done." + +# channel related operations +channel_test: test_channel_create test_channel_join test_channel_list test_channel_getinfo + +# chaincode related operations +cc_test: test_cc_install test_cc_instantiate test_cc_invoke_query + +restart: stop start + +start: # bootup the fabric network + @echo "Start a fabric network with ${COMPOSE_FILE}..." + @make clean + @echo "Make sure the local hlf_net docker bridge exists" + docker network ls|grep hlf_net > /dev/null || docker network create hlf_net + @docker-compose -f ${COMPOSE_FILE} up -d # Start a fabric network + +stop: # stop the fabric network + @echo "Stop the fabric network with ${COMPOSE_FILE}..." + @docker-compose -f ${COMPOSE_FILE} down >& /tmp/docker-compose.log + +chaincode_dev: restart chaincode_init test_cc_peer0 stop + +################## Channel testing operations ################ + +test_channel_list: # List the channel that peer joined + @echo "List the joined channels" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_list.sh" + +test_channel_getinfo: # Get info of a channel + @echo "Get info of the app channel" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_getinfo.sh" + +test_channel_create: # Init the channel + @echo "Create channel on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_create.sh" + +test_channel_join: # Init the channel + @echo "Join channel" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_join.sh" + +update_anchors: # Update the anchor peer + @echo "Update anchors on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_update_anchors.sh" + +test_channel_update: # send the channel update transaction + @echo "Test channel update with adding new org" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_channel_update.sh" + +################## Configtxlator testing operations ################ +test_configtxlator: # Test change config using configtxlator + @echo "Testing decoding and encoding with configtxlator" + bash scripts/test_configtxlator.sh ${HLF_MODE} + @echo "Flattening the json files of all blocks" + python3 scripts/json_flatter.py ${HLF_MODE}/channel-artifacts/ + +test_config_update: # Test change config to add new org + bash scripts/test_config_update.sh ${HLF_MODE} + +################## Chaincode testing operations ################ +test_cc: # test chaincode, deprecated + if [ "$(HLF_MODE)" = "dev" ]; then \ + make test_cc_peer0; \ + else \ + make test_cc_invoke_query; \ + fi + +test_cc_install: # Install the chaincode + @echo "Install chaincode to all peers" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_install.sh" + +test_cc_approve: # Approve the chaincode definition + @echo "Approve the chaincode by all orgs" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_approve.sh" + +test_cc_queryapprove: # Query the approval status of chaincode + @echo "Query the chaincode approval status by all orgs" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_queryapprove.sh" + +test_cc_commit: # Commit the chaincode definition + @echo "Commit the chaincode by any org" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_commit.sh" + +test_cc_querycommit: # Query the commit status of the chaincode definition + @echo "Query the commit status of chaincode" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_querycommit.sh" + +test_cc_instantiate: # Instantiate the chaincode + @echo "Instantiate chaincode on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_instantiate.sh" + +test_cc_upgrade: # Upgrade the chaincode + @echo "Upgrade chaincode on the fabric network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_upgrade.sh" + +test_cc_list: # List the chaincode + @echo "List chaincode information (installed and instantited)" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_list.sh" + +test_cc_invoke_query: # test user chaincode on all peers + @echo "Invoke and query cc example02 on all peers" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cc_invoke_query.sh" + +test_cscc: # test cscc queries + @echo "Test CSCC query" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_cscc.sh" + +test_qscc: # test qscc queries + @echo "Test QSCC query" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_qscc.sh" + +test_lscc: # test lscc quries + @echo "Test LSCC query" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_lscc.sh" + +# FIXME: docker doesn't support wildcard in cp right now +test_fetch_blocks: # test fetching channel blocks fetch + @echo "Test fetching block files" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_fetch_blocks.sh" + +test_eventsclient: # test get event notification in a loop + @echo "Test fetching event notification" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/start_eventsclient.sh" + +test_sidedb: # test sideDB/private data feature + @echo "Test sideDB" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_sideDB.sh" + +test_discover: # test discover + @echo "Test discover" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_discover.sh" + +temp: # test temp instructions, used for experiment + @echo "Test experimental instructions" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/test_temp.sh" + +################## Env setup related, no need to see usually ################ + +setup: # setup the environment + bash scripts/env_setup.sh # Installing Docker and Docker-Compose + +check: # Check shell scripts grammar + @echo "Check shell scripts grammar" + [ `which shellcheck` ] && shellcheck scripts/*.sh + +clean: # clean up containers and chaincode images + @echo "Clean all HLF containers and chaincode images" + @-docker ps -a | awk '{ print $$1,$$2 }' | grep "hyperledger/fabric" | awk '{ print $$1 }' | xargs -r -I {} docker rm -f {} + @-docker ps -a | awk '$$2 ~ /dev-peer/ { print $$1 }' | xargs -r -I {} docker rm -f {} + @-docker images | awk '$$1 ~ /dev-peer/ { print $$3 }' | xargs -r -I {} docker rmi -f {} + echo "May clean the config: HLF_MODE=${HLF_MODE} make clean_config_channel" + +# Clean deeply by removing all generated files: container, artifacts, credentials +purge: clean + HLF_MODE=solo make clean_config_channel + HLF_MODE=kafka make clean_config_channel + HLF_MODE=raft make clean_config_channel + make clean_config_crypto + +env_clean: # clean up Docker environment + @echo "Clean all images and containers" + bash scripts/env_clean.sh + +cli: # enter the cli container + docker exec -it fabric-cli bash + +orderer: orderer0 + +orderer0: # enter the orderer0 container + docker exec -it orderer0.example.com bash + +orderer1: # enter the orderer0 container + docker exec -it orderer1.example.com bash + +peer: peer0 + +peer0: # enter the peer container + docker exec -it peer0.org1.example.com bash + +peer1: # enter the peer container + docker exec -it peer1.org1.example.com bash + +ps: # show existing docker images + docker ps -a + +logs: # show logs + docker-compose -f ${COMPOSE_FILE} logs -f --tail 200 + +logs_check: logs_save logs_view + +logs_save: # save logs + @echo "All tests done, saving logs locally" + [ -d $(LOG_PATH) ] || mkdir -p $(LOG_PATH) + docker logs peer0.org1.example.com >& $(LOG_PATH)/dev_peer0.log + docker logs orderer0.example.com >& $(LOG_PATH)/dev_orderer.log + docker-compose -f ${COMPOSE_FILE} logs >& $(LOG_PATH)/dev_all.log + +logs_view: # view logs + less $(LOG_PATH)/dev_peer.log + +elk: # insert logs into elk + # curl -XDELETE http://localhost:9200/logstash-\* + nc localhost 5000 < $(LOG_PATH)/dev_all.log + +gen_config_crypto: # generate crypto config + bash scripts/gen_config_crypto.sh + +gen_config_channel: # generate channel artifacts + bash scripts/gen_config_channel.sh ${HLF_MODE} + +clean_config_channel: # clean channel related artifacts + rm -rf ${HLF_MODE}/channel-artifacts/* + +clean_config_crypto: # clean config artifacts + echo "Warning: Cleaning credentials will affect artifacts in solo/kafka/raft mode" + rm -rf crypto-config/* + rm -rf org3/crypto-config/* + +download: # download required images + @echo "Download Docker images" + bash scripts/download_images.sh + +################## chaincode dev mode ################ +chaincode_init: # start chaincode in dev mode and do install/instantiate + @echo "Install and instantiate cc example02 on the fabric dev network" + @docker exec -it fabric-cli bash -c "cd /tmp; bash scripts/init_chaincode_dev.sh" diff --git a/hyperledger_fabric/v1.4.8/base-event.yaml b/hyperledger_fabric/v1.4.8/base-event.yaml new file mode 100644 index 00000000..ff1de801 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/base-event.yaml @@ -0,0 +1,78 @@ +# All elements in this file should depend on the base-solo.yaml +# Provided solo-base fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: # ca node for org1 + extends: + file: base-solo.yaml + service: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_TLS_ENABLED=false + + ca.org2.example.com: # ca node for org1 + extends: + file: base-solo.yaml + service: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_TLS_ENABLED=false + + orderer.example.com: # orderer node for example org + extends: + file: base-solo.yaml + service: orderer.example.com + environment: + - ORDERER_GENERAL_TLS_ENABLED=false + + cli: # client node + extends: + file: base-solo.yaml + service: cli + environment: + #- GOPATH=/opt/gopath + - CORE_PEER_TLS_ENABLED=false # to enable TLS, change to false + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + environment: + - CORE_PEER_TLS_ENABLED=false + + event-listener: + extends: + file: base-solo.yaml + service: event-listener diff --git a/hyperledger_fabric/v1.4.8/base-kafka.yaml b/hyperledger_fabric/v1.4.8/base-kafka.yaml new file mode 100644 index 00000000..a9ca9b11 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/base-kafka.yaml @@ -0,0 +1,276 @@ +# All elements in this file should depend on the base.yaml +# Provided a Kafka enabled fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer0.example.com +# orderer1.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# 3 zookeeper nodes +# 4 kafka nodes +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org1.example.com + hostname: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org1 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk + ports: + - "7054:7054" + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk -b admin:adminpw -d' + + ca.org2.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org2.example.com + hostname: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org2 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk + ports: + - "8054:7054" + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk -b admin:adminpw -d' + + orderer0.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer0.example.com + hostname: orderer0.example.com + ports: + - "7050:7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls + - ./kafka/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + orderer1.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer1.example.com + hostname: orderer1.example.com + ports: + - "8050:7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/:/var/hyperledger/orderer/tls + - ./kafka/channel-artifacts/orderer1.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + cli: + extends: + file: base.yaml + service: cli-base + container_name: fabric-cli + hostname: fabric-cli + tty: true + environment: + - CORE_PEER_ID=fabric-cli + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # default to operate on peer0.org1 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt + - CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp + volumes: + - ./scripts:/tmp/scripts + - ./crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./crypto-config:/etc/hyperledger/fabric/crypto-config + - ./kafka/channel-artifacts:/tmp/channel-artifacts + - ./kafka/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./examples:/opt/gopath/src/examples + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 7051:7051 + - 7052:7052 + - 7053:7053 + + peer1.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org1.example.com + hostname: peer1.org1.example.com + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 8051:7051 + - 8052:7052 + - 8053:7053 + + peer0.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org2.example.com + hostname: peer0.org2.example.com + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 9051:7051 + - 9052:7052 + - 9053:7053 + + peer1.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org2.example.com + hostname: peer1.org2.example.com + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer1.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 10051:7051 + - 10052:7052 + - 10053:7053 + + +# ZooKeeper services, at least 3 nodes + zookeeper0: + extends: + file: base.yaml + service: zookeeper-base + container_name: zookeeper0 + hostname: zookeeper0 + environment: + - ZOO_MY_ID=1 + - ZOO_SERVERS=server.1=zookeeper0:2888:3888 server.2=zookeeper1:2888:3888 server.3=zookeeper2:2888:3888 + + zookeeper1: + extends: + file: base.yaml + service: zookeeper-base + container_name: zookeeper1 + hostname: zookeeper1 + environment: + - ZOO_MY_ID=2 + - ZOO_SERVERS=server.1=zookeeper0:2888:3888 server.2=zookeeper1:2888:3888 server.3=zookeeper2:2888:3888 + + zookeeper2: + extends: + file: base.yaml + service: zookeeper-base + container_name: zookeeper2 + hostname: zookeeper2 + environment: + - ZOO_MY_ID=3 + - ZOO_SERVERS=server.1=zookeeper0:2888:3888 server.2=zookeeper1:2888:3888 server.3=zookeeper2:2888:3888 + +# Kafka services, at least 4 node to tolerant work with 1 node failure + kafka0: + extends: + file: base.yaml + service: kafka-base + container_name: kafka0 + hostname: kafka0 + environment: + - KAFKA_BROKER_ID=0 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 + + kafka1: + extends: + file: base.yaml + service: kafka-base + container_name: kafka1 + hostname: kafka1 + environment: + - KAFKA_BROKER_ID=1 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 + + kafka2: + extends: + file: base.yaml + service: kafka-base + container_name: kafka2 + hostname: kafka2 + environment: + - KAFKA_BROKER_ID=2 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 + + kafka3: + extends: + file: base.yaml + service: kafka-base + container_name: kafka3 + hostname: kafka3 + environment: + - KAFKA_BROKER_ID=3 + - KAFKA_DEFAULT_REPLICATION_FACTOR=3 + - KAFKA_MIN_INSYNC_REPLICAS=2 + - KAFKA_ZOOKEEPER_CONNECT=zookeeper0:2181,zookeeper1:2181,zookeeper2:2181 diff --git a/hyperledger_fabric/v1.4.8/base-raft.yaml b/hyperledger_fabric/v1.4.8/base-raft.yaml new file mode 100644 index 00000000..a9154f4a --- /dev/null +++ b/hyperledger_fabric/v1.4.8/base-raft.yaml @@ -0,0 +1,207 @@ +# All elements in this file should depend on the base.yaml +# Provided a Kafka enabled fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer0.example.com +# orderer1.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# 3 zookeeper nodes +# 4 raft nodes +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org1.example.com + hostname: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org1 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk + ports: + - "7054:7054" + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk -b admin:adminpw -d' + + ca.org2.example.com: + extends: + file: base.yaml + service: ca-base + container_name: ca.org2.example.com + hostname: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org2 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk + ports: + - "8054:7054" + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk -b admin:adminpw -d' + + orderer0.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer0.example.com + hostname: orderer0.example.com + ports: + - "7050:7050" + environment: + - FABRIC_LOGGING_SPEC=DEBUG + - ORDERER_GENERAL_CLUSTER_CLIENTPRIVATEKEY=/var/hyperledger/orderer/tls/server.key + - ORDERER_GENERAL_CLUSTER_CLIENTCERTIFICATE=/var/hyperledger/orderer/tls/server.crt + - ORDERER_GENERAL_CLUSTER_ROOTCAS=[/var/hyperledger/orderer/tls/ca.crt] + # below 4 must be defined/undefined together, for using separate network for raft + - ORDERER_GENERAL_CLUSTER_LISTENADDRESS=0.0.0.0 + - ORDERER_GENERAL_CLUSTER_LISTENPORT=7055 # this must be the same with channel config + - ORDERER_GENERAL_CLUSTER_SERVERCERTIFICATE=/var/hyperledger/orderer/tls/server.crt + - ORDERER_GENERAL_CLUSTER_SERVERPRIVATEKEY=/var/hyperledger/orderer/tls/server.key + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls + - ./raft/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + orderer1.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer1.example.com + hostname: orderer1.example.com + ports: + - "8050:7050" + environment: + - ORDERER_GENERAL_CLUSTER_SENDBUFFERSIZE=10 + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/:/var/hyperledger/orderer/tls + - ./raft/channel-artifacts/orderer1.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + + orderer2.example.com: # There can be multiple orderers + extends: + file: base.yaml + service: orderer-base + container_name: orderer2.example.com + hostname: orderer2.example.com + ports: + - "9050:7050" + environment: + - ORDERER_GENERAL_CLUSTER_SENDBUFFERSIZE=10 + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/:/var/hyperledger/orderer/tls + - ./raft/channel-artifacts/orderer2.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + command: orderer start + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + - FABRIC_LOGGING_SPEC=DEBUG + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 7051:7051 + + peer1.org1.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org1.example.com + hostname: peer1.org1.example.com + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 8051:7051 + + peer0.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer0.org2.example.com + hostname: peer0.org2.example.com + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 9051:7051 + + peer1.org2.example.com: + extends: + file: base.yaml + service: peer-base + container_name: peer1.org2.example.com + hostname: peer1.org2.example.com + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer1.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - 10051:7051 + + cli: + extends: + file: base.yaml + service: cli-base + container_name: fabric-cli + hostname: fabric-cli + tty: true + environment: + - CORE_PEER_ID=fabric-cli + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # default to operate on peer0.org1 + - CORE_PEER_LOCALMSPID=Org1MSP + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt + - CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp + volumes: + - ./scripts:/tmp/scripts + - ./crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./crypto-config:/etc/hyperledger/fabric/crypto-config + - ./raft/channel-artifacts:/tmp/channel-artifacts + - ./raft/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./examples:/go/src/examples + #- $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric diff --git a/hyperledger_fabric/v1.4.8/base-solo.yaml b/hyperledger_fabric/v1.4.8/base-solo.yaml new file mode 100644 index 00000000..749b42d1 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/base-solo.yaml @@ -0,0 +1,190 @@ +# All elements in this file should depend on the base.yaml +# Provided solo-base fabric network with: + +# ca.org1.example.com +# ca.org2.example.com +# orderer.example.com +# peer0.org1.example.com +# peer1.org1.example.com +# peer0.org2.example.com +# peer1.org2.example.com +# cli + +version: '2' # v3 does not support 'extends' yet + +services: + ca.org1.example.com: # ca node for org1 + extends: + file: base.yaml + service: ca-base + container_name: ca.org1.example.com + hostname: ca.org1.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org1 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk + ports: + - "7054:7054" + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org1.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/c843d3f021118963ce5d340e95286e8869bb7bd051454cd4166aa2887a2ad451_sk -b admin:adminpw -d' + + ca.org2.example.com: # ca node for org2 + extends: + file: base.yaml + service: ca-base + container_name: ca.org2.example.com + hostname: ca.org2.example.com + environment: + - FABRIC_CA_SERVER_CA_NAME=ca-org2 + - FABRIC_CA_SERVER_TLS_CERTFILE=/etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem + - FABRIC_CA_SERVER_TLS_KEYFILE=/etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk + ports: + - "8054:7054" + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/ca/:/etc/hyperledger/fabric-ca-server-config + command: sh -c 'fabric-ca-server start --ca.certfile /etc/hyperledger/fabric-ca-server-config/ca.org2.example.com-cert.pem --ca.keyfile /etc/hyperledger/fabric-ca-server-config/1ee551a8753171c0377366e96a1d7ec01afddb868c9483cc501b6f8ac7ae752f_sk -b admin:adminpw -d' + + orderer0.example.com: # orderer in solo mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer0.example.com + hostname: orderer0.example.com + ports: + - "7050:7050" + - "8443:8443" + volumes: + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp:/var/hyperledger/orderer/msp + - ./crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/:/var/hyperledger/orderer/tls + - ./solo/channel-artifacts/orderer0.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + +## following are peer nodes ## + + peer0.org1.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "7051:7051" + - "7052:7052" + - "7053:7053" + - "9443:9443" + + peer1.org1.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer1.org1.example.com + hostname: peer1.org1.example.com + environment: + - CORE_PEER_ID=peer1.org1.example.com + - CORE_PEER_ADDRESS=peer1.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org1.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "8051:7051" + - "8052:7052" + - "8053:7053" + + peer0.org2.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer0.org2.example.com + hostname: peer0.org2.example.com + environment: + - CORE_PEER_ID=peer0.org2.example.com + - CORE_PEER_ADDRESS=peer0.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org2.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "9051:7051" + - "9052:7052" + - "9053:7053" + + peer1.org2.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer1.org2.example.com + hostname: peer1.org2.example.com + environment: + - CORE_PEER_ID=peer1.org2.example.com + - CORE_PEER_ADDRESS=peer1.org2.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer1.org2.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer1.org2.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org2.example.com:7051 + - CORE_PEER_LOCALMSPID=Org2MSP + volumes: + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "10051:7051" + - "10052:7052" + - "10053:7053" + + peer0.org3.example.com: + extends: + file: peer.yaml + service: peer-solo + container_name: peer0.org3.example.com + hostname: peer0.org3.example.com + environment: + - CORE_PEER_ID=peer0.org3.example.com + - CORE_PEER_ADDRESS=peer0.org3.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org3.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org3.example.com:7051 + - CORE_PEER_GOSSIP_BOOTSTRAP=peer0.org3.example.com:7051 + - CORE_PEER_LOCALMSPID=Org3MSP + volumes: + - ./crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls:/etc/hyperledger/fabric/tls + ports: + - "11051:7051" + - "11052:7052" + - "11053:7053" + + cli: # client node + extends: + file: base.yaml + service: cli-base + container_name: fabric-cli + hostname: fabric-cli + volumes: + - ./scripts:/tmp/scripts + - ./crypto-config.yaml:/etc/hyperledger/fabric/crypto-config.yaml + - ./crypto-config:/etc/hyperledger/fabric/crypto-config + - ./solo/configtx.yaml:/etc/hyperledger/fabric/configtx.yaml + - ./solo/channel-artifacts:/tmp/channel-artifacts + - ./examples:/opt/gopath/src/examples + + prometheus: # prometheus will pull metrics from fabric + extends: + file: base.yaml + service: prometheus + container_name: prometheus + hostname: prometheus + ports: + - "9090:9090" diff --git a/hyperledger_fabric/v1.4.8/base.yaml b/hyperledger_fabric/v1.4.8/base.yaml new file mode 100644 index 00000000..fe06fbfc --- /dev/null +++ b/hyperledger_fabric/v1.4.8/base.yaml @@ -0,0 +1,165 @@ +# Contains the base template for all Hyperledger Fabric services +# Never directly use services in this template, but inherent +# All services are abstract without any names, config or port mapping +# https://github.com/yeasy/docker-compose-files +# +# * ca-base: base for fabric-ca +# * orderer-base: base for fabric-orderer +# * peer-base: base for fabric-peer +# * cli-base: base for fabric peer client +# * event-listener-base: base for fabric eventhub listener +# * kafka-base: base for kafka +# * zookeeper-base: base for fabric-zookeeper +# * couchdb-base: base for couchdb +# * explorer-base: base for Hyperledger blockchain-explorer +# * mysql-base: base for MySQL + +version: '2' # compose v3 still doesn't support `extends`, shame! + +services: + ca-base: + image: yeasy/hyperledger-fabric-ca:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + environment: + - FABRIC_CA_HOME=/etc/hyperledger/fabric-ca-server + - FABRIC_CA_SERVER_TLS_ENABLED=true # change to false to disable TLS + + orderer-base: + image: yeasy/hyperledger-fabric-orderer:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + # Default config can be found at https://github.com/hyperledger/fabric/blob/master/orderer/common/localconfig/config.go + environment: + - FABRIC_LOGGING_SPEC=INFO # default: INFO + - FABRIC_LOGGING_FORMAT="%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}" + - ORDERER_GENERAL_LISTENADDRESS=0.0.0.0 # default: 127.0.0.1 + - ORDERER_GENERAL_LISTENPORT=7050 + - ORDERER_GENERAL_GENESISMETHOD=file # default: provisional + - ORDERER_GENERAL_GENESISFILE=/var/hyperledger/orderer/orderer.genesis.block + - ORDERER_GENERAL_LOCALMSPID=OrdererMSP # default: DEFAULT + - ORDERER_GENERAL_LOCALMSPDIR=/var/hyperledger/orderer/msp + - ORDERER_GENERAL_LEDGERTYPE=file + #- ORDERER_GENERAL_LEDGERTYPE=json # default: file + - ORDERER_OPERATIONS_LISTENADDRESS=0.0.0.0:8443 # operation RESTful API + - ORDERER_METRICS_PROVIDER=prometheus # prometheus will pull metrics from orderer via /metrics RESTful API + #- ORDERER_RAMLEDGER_HISTORY_SIZE=100 #only useful when use ram ledger + # enabled TLS + - ORDERER_GENERAL_TLS_ENABLED=true # default: false + - ORDERER_GENERAL_TLS_PRIVATEKEY=/var/hyperledger/orderer/tls/server.key + - ORDERER_GENERAL_TLS_CERTIFICATE=/var/hyperledger/orderer/tls/server.crt + - ORDERER_GENERAL_TLS_ROOTCAS=[/var/hyperledger/orderer/tls/ca.crt] + # Only required by raft mode + - ORDERER_GENERAL_CLUSTER_CLIENTPRIVATEKEY=/var/hyperledger/orderer/tls/server.key + - ORDERER_GENERAL_CLUSTER_CLIENTCERTIFICATE=/var/hyperledger/orderer/tls/server.crt + - ORDERER_GENERAL_CLUSTER_ROOTCAS=[/var/hyperledger/orderer/tls/ca.crt] + #volumes: + #- $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + expose: + - "7050" # gRPC + - "8443" # Operation REST + #command: bash -c 'bash /tmp/orderer_build.sh; orderer start' # use this if to debug orderer + command: orderer start + + peer-base: # abstract base for fabric-peer, will be used in peer.yaml + image: yeasy/hyperledger-fabric-peer:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + environment: + - FABRIC_LOGGING_SPEC=INFO + - FABRIC_LOGGING_FORMAT="%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message}" + - CORE_PEER_ADDRESSAUTODETECT=false + - CORE_VM_DOCKER_HOSTCONFIG_NETWORKMODE=${NETWORK} # uncomment this to use specific network + - CORE_PEER_GOSSIP_USELEADERELECTION=true + - CORE_PEER_GOSSIP_ORGLEADER=false # whether this node is the org leader, default to false + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=0.0.0.0:7051 # change to external addr for peers in other orgs + - CORE_OPERATIONS_LISTENADDRESS=0.0.0.0:9443 # operation RESTful API + - CORE_METRICS_PROVIDER=prometheus # prometheus will pull metrics from fabric via /metrics RESTful API + - CORE_PEER_PROFILE_ENABLED=false + - CORE_PEER_TLS_ENABLED=true + - CORE_PEER_TLS_CERT_FILE=/etc/hyperledger/fabric/tls/server.crt + - CORE_PEER_TLS_KEY_FILE=/etc/hyperledger/fabric/tls/server.key + - CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/tls/ca.crt + - CORE_CHIANCODE_BUILDER=hyperledger/fabric-ccenv:${FABRIC_IMG_TAG} + - CORE_CHIANCODE_NODE_RUNTIME=hyperledger/fabric-nodeenv:${FABRIC_IMG_TAG} + - FABRIC_LOGGING_SPEC=DEBUG + - FABRIC_LOGGING_FORMAT=%{color}[%{id:03x} %{time:01-02 15:04:05.00 MST}] [%{longpkg}] %{callpath} -> %{level:.4s}%{color:reset} %{message} + volumes: + #- $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + # docker.sock is mapped as the default CORE_VM_ENDPOINT + - /var/run/docker.sock:/var/run/docker.sock + expose: + - "7051" # gRPC + - "9443" # Operation REST + #command: bash -c 'bash /tmp/peer_build.sh; peer node start' + command: peer node start + + cli-base: + image: yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + environment: + - FABRIC_LOGGING_SPEC=DEBUG + - FABRIC_LOGGING_FORMAT=%{color}[%{id:03x} %{time:01-02 15:04:05.00 MST}] [%{module}] %{shortfunc} -> %{level:.4s}%{color:reset} %{message} + - CORE_PEER_TLS_ENABLED=true # to enable TLS, change to true + - ORDERER_CA=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem + working_dir: /opt/gopath/src/github.com/hyperledger/fabric/peer + command: bash -c 'cd /tmp; source scripts/func.sh; while true; do sleep 20170504; done' + + prometheus: # prometheus will pull metrics from fabric + image: prom/prometheus:v2.6.0 + restart: always + network_mode: ${NETWORK} + tty: true + volumes: + - ./prometheus.yml:/etc/prometheus/prometheus.yml + + zookeeper-base: + image: hyperledger/fabric-zookeeper:${EXT_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + expose: + - '2181' + - '2888' + - '3888' + + kafka-base: + # official repo doesn't have 1.1.0-alpha tag, however, kafka changes version recently + #image: yeasy/hyperledger-fabric-kafka:0.10.2.0 + image: hyperledger/fabric-kafka:${EXT_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + environment: + - KAFKA_MESSAGE_MAX_BYTES=1048576 # 1 * 1024 * 1024 B + - KAFKA_REPLICA_FETCH_MAX_BYTES=1048576 # 1 * 1024 * 1024 B + - KAFKA_UNCLEAN_LEADER_ELECTION_ENABLE=false + - KAFKA_LOG_RETENTION_MS=-1 + expose: + - '9092' + + couchdb-base: + image: hyperledger/fabric-couchdb:${EXT_IMG_TAG} + restart: always + network_mode: ${NETWORK} + tty: true + + explorer-base: + image: yeasy/blockchain-explorer:0.1.0-preview # Till we have official image + expose: + - "8080" # HTTP port + command: bash -c 'sleep 10; node main.js' + + mysql-base: # mysql service + image: mysql:8.0 + restart: always + network_mode: ${NETWORK} + expose: + - "3306" + +networks: + default: + external: + name: ${NETWORK} \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.8/crypto-config.yaml b/hyperledger_fabric/v1.4.8/crypto-config.yaml new file mode 100644 index 00000000..44c6f47e --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config.yaml @@ -0,0 +1,113 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +# --------------------------------------------------------------------------- +# "OrdererOrgs" - Definition of organizations managing orderer nodes +# --------------------------------------------------------------------------- +OrdererOrgs: + # --------------------------------------------------------------------------- + # Orderer + # --------------------------------------------------------------------------- + - Name: Orderer + Domain: example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco +# Template: +# Count: 2 + # --------------------------------------------------------------------------- + # "Specs" - See OrdererOrgs below for complete description + # --------------------------------------------------------------------------- + Specs: + - Hostname: orderer0 + - Hostname: orderer1 + - Hostname: orderer2 + - Hostname: orderer3 +# --------------------------------------------------------------------------- +# "PeerOrgs" - Definition of organizations managing peer nodes +# --------------------------------------------------------------------------- +PeerOrgs: + # --------------------------------------------------------------------------- + # Org1 + # --------------------------------------------------------------------------- + - Name: Org1 + Domain: org1.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + # --------------------------------------------------------------------------- + # "Specs" + # --------------------------------------------------------------------------- + # Uncomment this section to enable the explicit definition of hosts in your + # configuration. Most users will want to use Template, below + # + # Specs is an array of Spec entries. Each Spec entry consists of two fields: + # - Hostname: (Required) The desired hostname, sans the domain. + # - CommonName: (Optional) Specifies the template or explicit override for + # the CN. By default, this is the template: + # + # "{{.Hostname}}.{{.Domain}}" + # + # which obtains its values from the Spec.Hostname and + # Org.Domain, respectively. + # --------------------------------------------------------------------------- + # Specs: + # - Hostname: foo # implicitly "foo.org1.example.com" + # CommonName: foo27.org5.example.com # overrides Hostname-based FQDN set above + # - Hostname: bar + # - Hostname: baz + # --------------------------------------------------------------------------- + # "Template" + # --------------------------------------------------------------------------- + # Allows for the definition of 1 or more hosts that are created sequentially + # from a template. By default, this looks like "peer%d" from 0 to Count-1. + # You may override the number of nodes (Count), the starting index (Start) + # or the template used to construct the name (Hostname). + # + # Note: Template and Specs are not mutually exclusive. You may define both + # sections and the aggregate nodes will be created for you. Take care with + # name collisions + # --------------------------------------------------------------------------- + Template: + Count: 2 + # Start: 5 + # Hostname: {{.Prefix}}{{.Index}} # default + # --------------------------------------------------------------------------- + # "Users" + # --------------------------------------------------------------------------- + # Count: The number of user accounts _in addition_ to Admin + # --------------------------------------------------------------------------- + Users: + Count: 1 + # --------------------------------------------------------------------------- + # Org2: See "Org1" for full specification + # --------------------------------------------------------------------------- + - Name: Org2 + Domain: org2.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + Template: + Count: 2 + Users: + Count: 1 + + - Name: Org3 + Domain: org3.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + Template: + Count: 2 + Users: + Count: 1 diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/ca/6e5131483c77f0d2788d772a579353a54f32a0b3076f8bd38c2719c939dbc6b0_sk b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/ca/6e5131483c77f0d2788d772a579353a54f32a0b3076f8bd38c2719c939dbc6b0_sk new file mode 100644 index 00000000..c30174ea --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/ca/6e5131483c77f0d2788d772a579353a54f32a0b3076f8bd38c2719c939dbc6b0_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgqBG8Hwh5mYu43r5j +GeY8shFS4tWliS2C6Eo1DqKodwmhRANCAATS6dielFhgzyrdDwU8IRpzPgyLE50P +N3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JA +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/ca/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/msp/config.yaml new file mode 100644 index 00000000..8846e9d4 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/config.yaml new file mode 100644 index 00000000..8846e9d4 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd_sk b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd_sk new file mode 100644 index 00000000..6a7655f7 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/keystore/b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgg7VsR5c+YXJaAIbQ +/RyVK3s/RIu+tgC4e7bvyQvlo/uhRANCAAS7PZnfjljPssg33bRu492D7dj5nwKm +Bir/2loPey1VLIr8DNhHxAc5wGNYrTkPbGhT2v+m+RObE3SfITlnRgem +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem new file mode 100644 index 00000000..c985b158 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/signcerts/orderer0.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt new file mode 100644 index 00000000..f4d873e8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key new file mode 100644 index 00000000..833ebc4c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgwlr7b9VCz3Gb7Cn1 +jeYmgZv+hxsqNmaNTnIqWdkRpXWhRANCAASMcu7M7of/gjW2lbwRnr+ZxJNz67fq +1S5udVxiSqEDuwrdKRDEq36ZBDoxn3AuhnsOxZVPscbm5ze5Smoc7oro +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/config.yaml new file mode 100644 index 00000000..8846e9d4 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/20709b8a283eec8422a1b5d11fc032743a1b4933c38f29ee5aac11a5c80cabf1_sk b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/20709b8a283eec8422a1b5d11fc032743a1b4933c38f29ee5aac11a5c80cabf1_sk new file mode 100644 index 00000000..e09d04c2 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/keystore/20709b8a283eec8422a1b5d11fc032743a1b4933c38f29ee5aac11a5c80cabf1_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg55SPn8cI2tmrOxU6 +a/fs6bQBeJdhWlGgodxpVlEcpXuhRANCAASyro+MTim5CYT5TsjvTzOMJf87xHZv +ixu9uo2HCm3Nh7DacEo6lNM0xEdiVCs2T4kjmOxwLSnKhKN6v7vWLxSc +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem new file mode 100644 index 00000000..f78ccae3 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/signcerts/orderer1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICHzCCAcWgAwIBAgIQMouXBTDQE4goJmTJFNR/ODAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUu +Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEsq6PjE4puQmE+U7I708zjCX/ +O8R2b4sbvbqNhwptzYew2nBKOpTTNMRHYlQrNk+JI5jscC0pyoSjer+71i8UnKNN +MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDSAAwRQIh +AM05c3uO0EAJuGf/PIR6W/1NTFUGDlgzY/xh17ZiAxjFAiBqizpEHO+vDu/prkbt +zT4JIZZIt8ZQKDz2PbySBfC+rA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt new file mode 100644 index 00000000..c95f8576 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key new file mode 100644 index 00000000..2b5b9d11 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg42GOYalmMEBy3LWI +qRxiDkoV89hxS06FFKR7oVdO3qShRANCAARXyAMSPDpxTP0kx2zoBfLJChu8+NhC +l3RQPiVC0IfsdrIrjHfWnQGuhW7rE5tmSFXHUPtAVTzA+yLMNxhe4Fgh +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/config.yaml new file mode 100644 index 00000000..8846e9d4 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/4a5fea275330b61dfd1bd65523daace5b83ee40179732687214471e2a240a9d5_sk b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/4a5fea275330b61dfd1bd65523daace5b83ee40179732687214471e2a240a9d5_sk new file mode 100644 index 00000000..1e3ec4bd --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/keystore/4a5fea275330b61dfd1bd65523daace5b83ee40179732687214471e2a240a9d5_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgkdlWCmGUbNdEPcds +b6wf/bksls0ITnrRGIE2pPhg+WuhRANCAARPwHu+83+vF0ypYYr7Kq+Pa+PNyiHQ +805N+jBOMrOCDGcY2ObntNpt7yZISncnv0g35nQFSOVFft497Vj0ydA/ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem new file mode 100644 index 00000000..a3b8b8bb --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/signcerts/orderer2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICHjCCAcWgAwIBAgIQUak2hDd8j2SLaQNMbXpZRDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUu +Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET8B7vvN/rxdMqWGK+yqvj2vj +zcoh0PNOTfowTjKzggxnGNjm57Tabe8mSEp3J79IN+Z0BUjlRX7ePe1Y9MnQP6NN +MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +MQtqMO2tIswbOnZ/EyE1ZgEdzPAma23Urf8qNS+mD/ACICsZIm7LFxHSrXc9AD5h +WFUnXFrrWMedpv6WCUtVYuZy +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt new file mode 100644 index 00000000..b393548e --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key new file mode 100644 index 00000000..9ea6314c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgeFRhsNgcc5n6aEOs +g3eKHRSeKW8uRkFASkrmXJKNStuhRANCAARi0GkifFEfO18xLpBbADxN0HA1H+iK +RYSPepstZ5Bf9xF/RKbAFEV4yLg82lazX52epBcd4o6dSJGuHF7UErbO +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/config.yaml new file mode 100644 index 00000000..8846e9d4 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/keystore/ccdedb0e5c4302a81895291b565766bf1eee82aabc91001919d56a96aae677b9_sk b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/keystore/ccdedb0e5c4302a81895291b565766bf1eee82aabc91001919d56a96aae677b9_sk new file mode 100644 index 00000000..6e058b71 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/keystore/ccdedb0e5c4302a81895291b565766bf1eee82aabc91001919d56a96aae677b9_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLWIybO6Te+EtYH7e +UBASAyCtVYoHY3gXQtkWsh89FvyhRANCAASDdIB7HKOhJS4ic24F3Fwba39VyDRL +pTb7Kr5WWDsQLnmvoRt9tuUZDBknjg6l+LoE61amUkr7ssqLoo3sD0Lx +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/signcerts/orderer3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/signcerts/orderer3.example.com-cert.pem new file mode 100644 index 00000000..f0ec8d30 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/signcerts/orderer3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICHjCCAcWgAwIBAgIQNB5/cbq9Av+/iGkL70qNmDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIzLmV4YW1wbGUu +Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEg3SAexyjoSUuInNuBdxcG2t/ +Vcg0S6U2+yq+Vlg7EC55r6EbfbblGQwZJ44Opfi6BOtWplJK+7LKi6KN7A9C8aNN +MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +X6lK+YFJKWFOkm8REkQkAOft/GJHZF6TV4mnrR+FBvcCICrmpowTeNkx9SRIDJGV +16xdzWz/i3/8zsaxYRlAcllY +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/ca.crt new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/server.crt new file mode 100644 index 00000000..ff31671f --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAPsAy4zBIdPWDaz42uM3PhkwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMy5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABP+BC8hFOA4Z6YXKOsW5DV1vkrL5lMy9jR5IaXBTKIsA +OkgmXBAxigvOMCDWbRffLmUGoVplSGEyjDex0TvHEACjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIzLmV4YW1wbGUuY29tgghvcmRlcmVyMzAKBggq +hkjOPQQDAgNIADBFAiEA3qYzyv4Zuap2StCsi7bNUhDhe2Wkl17xQdsbskhq8fYC +IGCLCNwtHpGJu1PKeVQ05dXP7tVyG+6X99Kol5yR5b50 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/server.key b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/server.key new file mode 100644 index 00000000..df7ddf2b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/orderers/orderer3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQggEkbssbogR9aGUd6 +i7ArkBFke4DVDCTjwjEQkZV3tEShRANCAAT/gQvIRTgOGemFyjrFuQ1db5Ky+ZTM +vY0eSGlwUyiLADpIJlwQMYoLzjAg1m0X3y5lBqFaZUhhMow3sdE7xxAA +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/tlsca/cecf6f37ac52c5ba651be9ffd0ef0c12304d59d0c5fbb6a1b7443eee07e2ba9c_sk b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/tlsca/cecf6f37ac52c5ba651be9ffd0ef0c12304d59d0c5fbb6a1b7443eee07e2ba9c_sk new file mode 100644 index 00000000..d66eecd5 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/tlsca/cecf6f37ac52c5ba651be9ffd0ef0c12304d59d0c5fbb6a1b7443eee07e2ba9c_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgSz7TzhWtfJWnPJbC +jqKcjNIeerJFi8hz8KK/FAmaG5uhRANCAAR19yWUX7oV+QhBRs1OJMZe9zjmxaaD +W/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYYa8Mq +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem new file mode 100644 index 00000000..16dddd49 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/cacerts/ca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/config.yaml new file mode 100644 index 00000000..8846e9d4 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/3737d58f369c0e04fedd3d1cd3be2b79e354f108b21eeb2d0eda27f4235466a0_sk b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/3737d58f369c0e04fedd3d1cd3be2b79e354f108b21eeb2d0eda27f4235466a0_sk new file mode 100644 index 00000000..7c191aa4 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/keystore/3737d58f369c0e04fedd3d1cd3be2b79e354f108b21eeb2d0eda27f4235466a0_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgwl9zte7tkAXaH4X0 +0HRu250f0JeUz9xSE/huhZXjKoWhRANCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7t +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem new file mode 100644 index 00000000..7526ce41 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/signcerts/Admin@example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P ++8n2/IwosEtn+wHpdsRI +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp/tlscacerts/tlsca.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt new file mode 100644 index 00000000..9d755b50 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh +bXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O +JMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY +a8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG +AQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv +DBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK +pEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5 +vfjKyhxyYA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt new file mode 100644 index 00000000..a669485f --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICLDCCAdKgAwIBAgIQcwGtMNlpDs3BPLJbDh516zAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowVjELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xGjAYBgNVBAMMEUFkbWluQGV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYI +KoZIzj0DAQcDQgAE38zsx5udq3fPJ+3gtilspQaZbEmfXLAdrMM+1GUfdx8weOUW +e6LqbJrzw3S6N3DGdPm8z9qaDeBt2ESXTMjYFKNsMGowDgYDVR0PAQH/BAQDAgWg +MB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMCsG +A1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqcMAoGCCqG +SM49BAMCA0gAMEUCIQD6UvUxCjTE1BobKWfCWiV/CcXsNOgIgNkHrI5G4tVJ1AIg +eITXCKnE7XAGZe74ewkqIiIcVHLZo0Ve3vI886odvsM= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key new file mode 100644 index 00000000..0a1ea59b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgiWglBLqGYifGdUuN +tmP78YzHJzo18qgSyBL041wq4AuhRANCAATfzOzHm52rd88n7eC2KWylBplsSZ9c +sB2swz7UZR93HzB45RZ7oupsmvPDdLo3cMZ0+bzP2poN4G3YRJdMyNgU +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/ca/9dba21ae1f2a770d765d2bfe0c319439b63c9c26c11fe6bb94ea920e85c0d337_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/ca/9dba21ae1f2a770d765d2bfe0c319439b63c9c26c11fe6bb94ea920e85c0d337_sk new file mode 100644 index 00000000..8e3064ee --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/ca/9dba21ae1f2a770d765d2bfe0c319439b63c9c26c11fe6bb94ea920e85c0d337_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgpl436lDqjqEwe7qt +SbJ1vZWwdTAmzNGp8MO8gE7vT6WhRANCAARYN0FEkqJU8FyOzhlwvN9C8vzq4KNJ +NJUSGoGdlXLepZfi6qFjlwFMqiLei0B+yh3qfTCQN6TZ/MFowLyc/6/6 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..a34df8b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/ca/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..a34df8b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..a34df8b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce_sk new file mode 100644 index 00000000..ffdc4dc9 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/keystore/935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgm0D+OkYABIIuG7N4 +QkU2o+Sdg+AzA8y6GScUHhwl1jihRANCAARpIC9sgC5Ie27g8k4ggc+MU0WzQQgI +Fp54ifC8GKqFWG2jQX2092SI4bJIthBfXZ8rp1A5cFHP31V0MtT8+Ve3 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem new file mode 100644 index 00000000..c16590c7 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/signcerts/peer0.org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt new file mode 100644 index 00000000..9cedb1fe --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAOC5poegWgqD1BvaIJ6XrAQwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjAub3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEuXtrj4F6eKCsBVjasRnFiTRRG2 +OLg0UtJx1cX1I9HnNw4KWX4enKPwouNutf4KaxfCAxmuRgzZI5BKU5x3oDKjgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAILUaI4TuhG01CBbpQw8nGkgvjkcP +B2TeZbyays5dKX0AMCgGA1UdEQQhMB+CFnBlZXIwLm9yZzEuZXhhbXBsZS5jb22C +BXBlZXIwMAoGCCqGSM49BAMCA0gAMEUCIQDfhE88/mTlFPyB8j8NK9t1xMFt3g1t +LCf2QOjePfTsiAIgZnpUMmPjtg78sNnPNYJeGbGr883CwwRn7N5ao2opLeQ= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key new file mode 100644 index 00000000..1691eafa --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgxsEAmr439JoRs7Xc +7OIKgYSbo+bFM1zPrW1V/JZGgKShRANCAARLl7a4+BenigrAVY2rEZxYk0URtji4 +NFLScdXF9SPR5zcOCll+Hpyj8KLjbrX+CmsXwgMZrkYM2SOQSlOcd6Ay +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..a34df8b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/f60e49f889339e1ff723455da36e39ede0b62889da84952e9f2b957f856f54c5_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/f60e49f889339e1ff723455da36e39ede0b62889da84952e9f2b957f856f54c5_sk new file mode 100644 index 00000000..6345f590 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/keystore/f60e49f889339e1ff723455da36e39ede0b62889da84952e9f2b957f856f54c5_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgS3ZKSdWVpwrlMiAB +GNMv02TwWh3ebDVP7cmS+sFTVDihRANCAAQAM18H+Xw4mrVjYCudNH4mtoBoLXn5 +NAM7euZw/7mnOMf4w8QyaKc/Tmj/JDbTya7CqTF1Nl2W8dmSYgjjiF75 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem new file mode 100644 index 00000000..44dc5271 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/signcerts/peer1.org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt new file mode 100644 index 00000000..9795c4ff --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg6gAwIBAgIRAMzR1ry+c/2vJ+AlkNZ1Hm8wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABEMRsEolFihr73o8uuekTzvdqc0U +zkDA67j6oQL6kj8BaGTyGsbnrZM/N5gHtmFLNS/KXsB33sgtwDLR8c8MXk2jgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAILUaI4TuhG01CBbpQw8nGkgvjkcP +B2TeZbyays5dKX0AMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzEuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0cAMEQCIDwQEU7PPSpMh1nAseqDbETJvWc8cBHD +DSjdi3eGcCfxAiB/xoTRgxPVYoDWmTdfMb7LmiFKEUKORiTdFdB/Vw+NuA== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key new file mode 100644 index 00000000..157c5c44 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgy3PX7MfHycwgXba7 +WYukETpSmbp7nGDWKneN6QQUI96hRANCAARDEbBKJRYoa+96PLrnpE873anNFM5A +wOu4+qEC+pI/AWhk8hrG562TPzeYB7ZhSzUvyl7Ad97ILcAy0fHPDF5N +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/tlsca/b51a2384ee846d350816e9430f271a482f8e470f0764de65bc9acace5d297d00_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/tlsca/b51a2384ee846d350816e9430f271a482f8e470f0764de65bc9acace5d297d00_sk new file mode 100644 index 00000000..18dbc0a3 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/tlsca/b51a2384ee846d350816e9430f271a482f8e470f0764de65bc9acace5d297d00_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgkDRcAA6YkwHf8mtg +3heHEEaMNklyl7Oc3uphAxUKoTGhRANCAARLYbic3FBmxtFeUtGOsq91ly/xCh8/ +ee3vTw05WmOvgwob7H+s/AtTD9tToaF805rXPgkP/ZTcJxtpcEZiyY4Y +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..a34df8b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/4b1079fb9672163c6dc64ff482e4966db26811f4c72afebe074380e3e50c13ab_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/4b1079fb9672163c6dc64ff482e4966db26811f4c72afebe074380e3e50c13ab_sk new file mode 100644 index 00000000..6f48f879 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore/4b1079fb9672163c6dc64ff482e4966db26811f4c72afebe074380e3e50c13ab_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg5akjxEuWvHG6aITD +u+t7ju1Bpw4KY+OO7LiIBHh3VwyhRANCAAQdWZbur272mq4WmfyMoK/VtdqU87eW +ghFXPrVsAvQxc/OenVISSYhjmPzAoP8ur4B3uEK4Xq/njMSNSFH4epQo +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem new file mode 100644 index 00000000..3e04c481 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts/Admin@org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.crt new file mode 100644 index 00000000..d2232ee1 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeKgAwIBAgIRAPrbDSSjkh7EyYEcPe/b0dAwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMS5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABCFrSYyQZaPtM/UVKYEkvqSzHdbK +UIX3Izosv4Rg7VDcQJMpTPkIduB1FAyE94HpFjxfk/DI6VervaHu2R0Rqb2jbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCC1GiOE7oRtNQgW6UMPJxpIL45HDwdk +3mW8msrOXSl9ADAKBggqhkjOPQQDAgNHADBEAiBv/os8LFWwYsnOhyCD7rywVqLv +9OL4kcV7A96Il9tPrAIgIEChTI9Q5d6AJYaLW7M+PYtJU3e9OKSYGgIXIVib45c= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.key b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.key new file mode 100644 index 00000000..c28fc5d1 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgR5e9u+BSn8n7W2OG +TYq8vbXNSkE/k9oYUNcjuWNVZ0ihRANCAAQha0mMkGWj7TP1FSmBJL6ksx3WylCF +9yM6LL+EYO1Q3ECTKUz5CHbgdRQMhPeB6RY8X5PwyOlXq72h7tkdEam9 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem new file mode 100644 index 00000000..a34df8b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/cacerts/ca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/config.yaml new file mode 100644 index 00000000..13af53a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org1.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/70d7bc4178d22b7da69bd40fcf5d4dc264b6d951b157fdc4392e620bbef82888_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/70d7bc4178d22b7da69bd40fcf5d4dc264b6d951b157fdc4392e620bbef82888_sk new file mode 100644 index 00000000..9708b14c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/keystore/70d7bc4178d22b7da69bd40fcf5d4dc264b6d951b157fdc4392e620bbef82888_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgVXcZ4NAEWy62iBMw +8ECM4jK3k4Vi8evUvDgWmKgsA1mhRANCAASjjlOlw3aD74R2e3vsiPeDRteGfGo7 +4Lz6FfxbfXGpjdoo/vG8ov5/YxrRbVECTlZdEUeLPobeh5+R53alJQE8 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem new file mode 100644 index 00000000..ec8da49b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/signcerts/User1@org1.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdCgAwIBAgIQCk2AHIw5PFgn0G8QvDZN6TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ8wDQYDVQQLEwZjbGllbnQxHzAdBgNVBAMMFlVzZXIxQG9y +ZzEuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAASjjlOlw3aD +74R2e3vsiPeDRteGfGo74Lz6FfxbfXGpjdoo/vG8ov5/YxrRbVECTlZdEUeLPobe +h5+R53alJQE8o00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCCduiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjO +PQQDAgNIADBFAiEAgYeVEacqESp4PiS3JT5zFzn5Bjlsa1iVCghtbBcK4TUCIBMe +Frc355l4WLYAP1PDOVIyaDCuWVEjiAHJYc7Hptkb +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp/tlscacerts/tlsca.org1.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt new file mode 100644 index 00000000..1300ff74 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP +21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E +AwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk +6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt new file mode 100644 index 00000000..da90925b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOjCCAeGgAwIBAgIQaUnVYwmRmHoHYo5/x+pKwTAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZVc2VyMUBvcmcxLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEvsHIKgtVnnido7xhsy4SWFihxNPK +5wINUlX9+u6EgKB20fOolTkJNcwfwtMYx5J6ckhJblaMMKcb/4LQhgNbdqNsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAILUaI4TuhG01CBbpQw8nGkgvjkcPB2Te +Zbyays5dKX0AMAoGCCqGSM49BAMCA0cAMEQCIC4YrdIwmCDEYoxUwVt9Pwl2mbXX +v1wQzfYpIhw6XXnqAiAX7NDLq1bru/qdH2qjfprPDsK5ZFhy0A1TF4XoyrbRzQ== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key new file mode 100644 index 00000000..f193bd00 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgWHXvGiFp0wG8+MQj +5fssH8o5G46+0BdS5imUzq/hc5mhRANCAAS+wcgqC1WeeJ2jvGGzLhJYWKHE08rn +Ag1SVf367oSAoHbR86iVOQk1zB/C0xjHknpySEluVowwpxv/gtCGA1t2 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/ca/29f693477d72a92668a58eeb3debef5780b3e50a94b48382400019b0a9d1553d_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/ca/29f693477d72a92668a58eeb3debef5780b3e50a94b48382400019b0a9d1553d_sk new file mode 100644 index 00000000..f458a2e6 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/ca/29f693477d72a92668a58eeb3debef5780b3e50a94b48382400019b0a9d1553d_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgsN2FAVzvfC70M0m4 +wHJYcImLI/5h5N7yzAkN7Lq7fQChRANCAASzOavl2GiHVuVLPw5P7oC0vaQvdUoD +vLSCiGujtCPxAHqVBrewEgOAKRqSqmL0GjSA6MxB+Z+PHNr+KroL2o28 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..a2660181 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/ca/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..a2660181 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..a2660181 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/28f79c620d7586f05d007154c765dd38e4d53039406e11850b5c19b59fa1c336_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/28f79c620d7586f05d007154c765dd38e4d53039406e11850b5c19b59fa1c336_sk new file mode 100644 index 00000000..840a1058 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/keystore/28f79c620d7586f05d007154c765dd38e4d53039406e11850b5c19b59fa1c336_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg4NCDjNODS5nSNONy +5E/YpMtSLBBKrx0EddttAxcMFS+hRANCAARXx8ir3hfKkOOiGdz12mvdb3qkqGnG +1cOBD48aP7/hYldtpXla1T21/5kVYROFQjdxM6tZqfgTkEj5+5jFfidt +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem new file mode 100644 index 00000000..dcebf264 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/signcerts/peer0.org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt new file mode 100644 index 00000000..6424baa0 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZjCCAg2gAwIBAgIQM8Vg1bLDpyxAd6BIOqYohzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDExZwZWVyMC5vcmcyLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAENY9m240hcekeVHNB+CQHuVztqXBt +p3yJM91bGFnopaIgGo9Cel9Tq6s2WNXldArb35RrbtVauf1qP9Nv9c2gV6OBlzCB +lDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgNK0vHlCcN7f1NCfM4EnijyxaTWFp +wjKueZOmXuOtVfIwKAYDVR0RBCEwH4IWcGVlcjAub3JnMi5leGFtcGxlLmNvbYIF +cGVlcjAwCgYIKoZIzj0EAwIDRwAwRAIgd0GROzWACQdQSNqG/pIHC2eycm/KgDvj +sxCxe2VU3h4CIHQQBFlg1sXUwyqIw3i8tQPKBN+sTcMiuOcCi1VarXbt +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key new file mode 100644 index 00000000..c2bccb2b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgtUWon1YB6QpLXR2z +XBIVoDp/r2x14gyQw99hUC7jgp+hRANCAAQ1j2bbjSFx6R5Uc0H4JAe5XO2pcG2n +fIkz3VsYWeiloiAaj0J6X1OrqzZY1eV0CtvflGtu1Vq5/Wo/02/1zaBX +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..a2660181 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/972a79ece4b45a6a4d5df83e4493942dee21fe90ff261ea9489c62d0170338ea_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/972a79ece4b45a6a4d5df83e4493942dee21fe90ff261ea9489c62d0170338ea_sk new file mode 100644 index 00000000..3e9960ce --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/keystore/972a79ece4b45a6a4d5df83e4493942dee21fe90ff261ea9489c62d0170338ea_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg1/n4dcnvNycd2+vy +ANhb6QG9EdA+f5puR+M8c1Amd3OhRANCAARp2NN0WH/l3sCfzTEMOuGvmCZKzD/t +GIOsNJMeaAarsdk3FhjlFSYZ+j69Ij7LsxRsiCqCtmJqM/bP7ju0lP6F +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem new file mode 100644 index 00000000..4f5dc5a6 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/signcerts/peer1.org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt new file mode 100644 index 00000000..8d1105c1 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg6gAwIBAgIRAIjb8IdfJz1e5H52KVzOpVQwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMi5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABOD0uahM0Ax+pirE9CeaG6yANVjt +LCV6SDSbNkw//hX8o1EWwPSZCE79YRRNEGN+bQ1nR6TEMAkVL0VicT4NUeqjgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIDStLx5QnDe39TQnzOBJ4o8sWk1h +acIyrnmTpl7jrVXyMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzIuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0cAMEQCIAJMMT6R0t2EKylcnKe9O40ZOgjipmBj +CIzPUP7MMd9mAiBWDMzScRQ77PjugAqXg6rvCxqKhNUqxd3r45khtE4EBg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key new file mode 100644 index 00000000..bafcfd1e --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQghgLrYgTaqSf3Ih6I +FJoVLGpsqaxaU6b+tDgBnnAEk6KhRANCAATg9LmoTNAMfqYqxPQnmhusgDVY7Swl +ekg0mzZMP/4V/KNRFsD0mQhO/WEUTRBjfm0NZ0ekxDAJFS9FYnE+DVHq +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/tlsca/34ad2f1e509c37b7f53427cce049e28f2c5a4d6169c232ae7993a65ee3ad55f2_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/tlsca/34ad2f1e509c37b7f53427cce049e28f2c5a4d6169c232ae7993a65ee3ad55f2_sk new file mode 100644 index 00000000..fdfa0e06 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/tlsca/34ad2f1e509c37b7f53427cce049e28f2c5a4d6169c232ae7993a65ee3ad55f2_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgthZDJnqPCOsQg4KG +dhx43GwuER7lKHu14yJ8vu33FIOhRANCAAQsKCE1EV0joZez7XCfunpXKhcy1D5j +529UDkguyteOWUqlnY48C6KkcnwOqpelW7uARvknStetMuafR/qKZNIA +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/tlsca/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..a2660181 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/d2d46e71c0afd7b5573c427b73b2e15f43edd6a944845929f19a82df09c57b22_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/d2d46e71c0afd7b5573c427b73b2e15f43edd6a944845929f19a82df09c57b22_sk new file mode 100644 index 00000000..8fc6e018 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore/d2d46e71c0afd7b5573c427b73b2e15f43edd6a944845929f19a82df09c57b22_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgETCyE8tH/4+tFzqM +YNYMpYluwFFttidE7Ryx1VHDxzahRANCAAQWt9+MdW1ruN7ScmOfWSBnWnu2vV5h +rDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuREyIHuT5XoWWeF +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem new file mode 100644 index 00000000..f7f34fee --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts/Admin@org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.crt new file mode 100644 index 00000000..8cbded46 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeKgAwIBAgIRALNK6TSEn8rEQXsqcPz+DG0wCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWQWRtaW5Ab3JnMi5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGBB9Slwt7N5Ww9jRe2UIxP7lMwq +Vla6hz0MVKtA0Ojgk/c/rTypjtKOqqfd4908bbiNB9vUeT+Qu+XQu9h5E0GjbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCA0rS8eUJw3t/U0J8zgSeKPLFpNYWnC +Mq55k6Ze461V8jAKBggqhkjOPQQDAgNIADBFAiEAizmCbZffW8z2c0vtPlcQikTy +A4Ush951ya6GZ4FS8hECIHxGFjleS8Xb1Nd5LQJT9jUMNKbrIefKajpvTY9uySBE +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.key b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.key new file mode 100644 index 00000000..c78724a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgraF5AKtD/k4mHbnK +QnUKlgIqLvmp2eB0I90cfcjc48ehRANCAARgQfUpcLezeVsPY0XtlCMT+5TMKlZW +uoc9DFSrQNDo4JP3P608qY7Sjqqn3ePdPG24jQfb1Hk/kLvl0LvYeRNB +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem new file mode 100644 index 00000000..a2660181 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/cacerts/ca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/config.yaml new file mode 100644 index 00000000..6bcd3669 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org2.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/118b7f56c6a01e6061470fd7a7ac1ba6de5d0e90f0ffe69d0ef05bd434737a4e_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/118b7f56c6a01e6061470fd7a7ac1ba6de5d0e90f0ffe69d0ef05bd434737a4e_sk new file mode 100644 index 00000000..55e08e27 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/keystore/118b7f56c6a01e6061470fd7a7ac1ba6de5d0e90f0ffe69d0ef05bd434737a4e_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgvVw7t+gUM+o+26i6 +rF6eb6RM5J/qBacbThGKQw+weCyhRANCAAQ0kd7LKlXrHRpBbENUyb/15Z3cdPll +aSdHXmnFzJOmK6+9OiR5TW5CE1banrUGbZ1ulDsO9AxcDZ9fDJ2WkGHl +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem new file mode 100644 index 00000000..f5285063 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/signcerts/User1@org2.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKzCCAdGgAwIBAgIRAODOluu3YjbZu72m/PLLiaowCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZVc2VyMUBv +cmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAENJHeyypV +6x0aQWxDVMm/9eWd3HT5ZWknR15pxcyTpiuvvTokeU1uQhNW2p61Bm2dbpQ7DvQM +XA2fXwydlpBh5aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZI +zj0EAwIDSAAwRQIhAOSd1zxQIxaQwnPzqHuOPPBiUwi5yhAx4DuKvmKDCnJOAiAM +erTwrKFaE4uoJFKIjeG77DqG8SIhaq/C65Jbp0t5Qg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/msp/tlscacerts/tlsca.org2.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt new file mode 100644 index 00000000..297bffb8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVzCCAf6gAwIBAgIRAJRbPhEc9z1CpMBnspFT70UwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0G +A1UEAxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49 +AwEHA0IABCwoITURXSOhl7PtcJ+6elcqFzLUPmPnb1QOSC7K145ZSqWdjjwLoqRy +fA6ql6Vbu4BG+SdK160y5p9H+opk0gCjbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV +HSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV +HQ4EIgQgNK0vHlCcN7f1NCfM4EnijyxaTWFpwjKueZOmXuOtVfIwCgYIKoZIzj0E +AwIDRwAwRAIgM/u19ajzhu6k133uJKT/qCKE79/kArf+5YPGulP+5J8CIAFsM2M4 +SSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7 +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt new file mode 100644 index 00000000..dfafedee --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeGgAwIBAgIQQ6fSQbyG5UApGiz4kNwY7jAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZVc2VyMUBvcmcyLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEJkd+OQUuDymCGvc9fnUGdY09IdmL +q/Ep/AsS0cD3jB/3jReHkzr0TWya0z4K0EzSi0jnCHCtWEYw1CJdsiA7kKNsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIDStLx5QnDe39TQnzOBJ4o8sWk1hacIy +rnmTpl7jrVXyMAoGCCqGSM49BAMCA0gAMEUCIQCKTue/ffx647l0pBHOMFBvER/e +nMjtmoCBmhZAcS0jjAIgEu1ujbYZVr51A80uvt2P2bjNnKf+S99jiNxId8hO7jc= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key new file mode 100644 index 00000000..a7828eb1 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org2.example.com/users/User1@org2.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgmZf8ohzyrlzEUO9H +3i/Yfn7ys9+N+M2CHbcLHiMMruShRANCAAQmR345BS4PKYIa9z1+dQZ1jT0h2Yur +8Sn8CxLRwPeMH/eNF4eTOvRNbJrTPgrQTNKLSOcIcK1YRjDUIl2yIDuQ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/ca/6b5fc322f234db6778434984596b2f38bae3af47824e51705ecd6aa6b4e2d345_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/ca/6b5fc322f234db6778434984596b2f38bae3af47824e51705ecd6aa6b4e2d345_sk new file mode 100644 index 00000000..475f2461 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/ca/6b5fc322f234db6778434984596b2f38bae3af47824e51705ecd6aa6b4e2d345_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgZ6kmxJp0ZEgRfZiZ +3vL7cUTXnxHBGPvzQr5Y0ZUELNehRANCAAR8pL1w0Dlv2Qvhn6/unNhWijsdnM87 +zmYd+sAobhDNKE9bD41AYDiCTwb7AnLICNVZlmnP8+gMa1CZDgCaSf2i +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/ca/b1c36f50cfc6ab1c09246b1abf228f8637851a141cbccdb96eb3e6d67ff82148_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/ca/b1c36f50cfc6ab1c09246b1abf228f8637851a141cbccdb96eb3e6d67ff82148_sk new file mode 100644 index 00000000..4b460799 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/ca/b1c36f50cfc6ab1c09246b1abf228f8637851a141cbccdb96eb3e6d67ff82148_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgqwmpPvUDiOL62Bmo +68+QDgqipuolZa/AMhVHhF717WqhRANCAAT4r/XB7lS5FTk66IZfURkPoIodoke9 +uabulh9dUTC4MYHDm6zDghLeZN4nlnu1ZevH1J3VubwqRM9GzKZiesg/ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/81d3b30d8ca07a5aa0f54a1cb922a88687cf02e056993fe860743e06af07e1e6_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/81d3b30d8ca07a5aa0f54a1cb922a88687cf02e056993fe860743e06af07e1e6_sk new file mode 100644 index 00000000..d38d371b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/81d3b30d8ca07a5aa0f54a1cb922a88687cf02e056993fe860743e06af07e1e6_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgQNOTmFbR71Dz/EFw +yBsMZNIKTqvhSZy6YjfVbcT0tAyhRANCAAQNKM2jWjFOSihaRIZk2I51o8He51id +UdYh0ExMOdtHvdfTRwg5AJg7VkTJQDmodMY8iedj3FXDlxACDK+Gmw8b +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/da272f68731466460126eeb71c7a18262f0517a1ba47eded036168451851492c_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/da272f68731466460126eeb71c7a18262f0517a1ba47eded036168451851492c_sk new file mode 100644 index 00000000..ecee703f --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/da272f68731466460126eeb71c7a18262f0517a1ba47eded036168451851492c_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQghkNqow5JLXSbeDeQ +lRCmzcGLSZQZBKrx7v9FVx25OYehRANCAATCOSYS446QZsFg6pDXm4To3Bkuagh+ +4Ct1GdF0emcYBdHfzy1azLA5Vg91j2cMSlAfJkOZkBq85j18+MrkOOIY +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem new file mode 100644 index 00000000..1d62087b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQVxW0tEMqJsClUdnHjmIurTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcz +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDSjNo1oxTkoo +WkSGZNiOdaPB3udYnVHWIdBMTDnbR73X00cIOQCYO1ZEyUA5qHTGPInnY9xVw5cQ +AgyvhpsPG6NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga1/DIvI022d4Q0mEWWsvOLrjr0eCTlFwXs1qprTi00UwCgYIKoZIzj0E +AwIDSAAwRQIhANy2ytrmVtCxzJumHStEymgmVSrV6wxICjqjtMuBeodvAiBMxA3I +kmS+4fl2DUDy5Ynedi1EFfLFUprMPJ2+iO6vgg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt new file mode 100644 index 00000000..abbb6442 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg2gAwIBAgIQRjQ96YrYiKq//VIfxWI4IzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDExZwZWVyMC5vcmczLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEK71x/g2MV0OhHE8L/Y7fOUdNnsSm +fgpUXLV28l4K6TXSz901v0Ef+34psiHPUGFNPWfQ2dojKFAsqHfJai+94KOBlzCB +lDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAggiM01mEhKAN5vQrQ6R+YxvWpPZtu +b648WpBR8eLqiqIwKAYDVR0RBCEwH4IWcGVlcjAub3JnMy5leGFtcGxlLmNvbYIF +cGVlcjAwCgYIKoZIzj0EAwIDSAAwRQIhAMIy5szhbPp+6ajmWY1M1gQlxTV5G+Lo +RLHrKvva3CEzAiBPhHWpgKQe0IGIl1wPT4O7mV15ghvjC5mpi6+qzscKGg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key new file mode 100644 index 00000000..a3d5fc23 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgs1OoP184IQ3sgFeP +9D19HuUnGz7YpKoXXjiedg9zzFGhRANCAAQrvXH+DYxXQ6EcTwv9jt85R02exKZ+ +ClRctXbyXgrpNdLP3TW/QR/7fimyIc9QYU09Z9DZ2iMoUCyod8lqL73g +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/2e8a7771e442df1512748c0abc3b20d09892064855490b628e7f96d1d5f1033a_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/2e8a7771e442df1512748c0abc3b20d09892064855490b628e7f96d1d5f1033a_sk new file mode 100644 index 00000000..a15ec962 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/2e8a7771e442df1512748c0abc3b20d09892064855490b628e7f96d1d5f1033a_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgn+L3iS4Rth+xOcGF +iNvPbf85PQeniZBZOtcJqOWbdbuhRANCAARLWcEhH+7KxzFeK3ZhgaFG7kprhkT6 +1djvz8ahXo2pmGgqJRUT8ApRsON/qYqbKBKiSd3IbOSKAMwgkGGpwDCa +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/80c105da6e7098c7f9bc886285191f8101508c6351261547e9c61a8db296edc3_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/80c105da6e7098c7f9bc886285191f8101508c6351261547e9c61a8db296edc3_sk new file mode 100644 index 00000000..91c7dc3e --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/80c105da6e7098c7f9bc886285191f8101508c6351261547e9c61a8db296edc3_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgY+uANW502vvq6Y/K +eZGnY+87wDnXbWJD6ItGV8hPDR6hRANCAAT1EFG8e7J1gnOrJb6PR9RhdkKudvCz +DIC7a/MBH2ZYuK2XiSmfm77KXnhWbU5fjF7thyFhrTeIFvfNxTE94LI2 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem new file mode 100644 index 00000000..00af6e41 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQaj+S0lJTmPOrotSRR+exSDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcz +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE9RBRvHuydYJz +qyW+j0fUYXZCrnbwswyAu2vzAR9mWLitl4kpn5u+yl54Vm1OX4xe7YchYa03iBb3 +zcUxPeCyNqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga1/DIvI022d4Q0mEWWsvOLrjr0eCTlFwXs1qprTi00UwCgYIKoZIzj0E +AwIDSAAwRQIhANbK656AQowBlOr4pK8hF+iSe6LbqXxfzTnlE5jLJAroAiBLfMGC +j4fXFvV5YgxspWg1nX8fF6XGu/oPGkHFX+81dg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt new file mode 100644 index 00000000..4b62807d --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAMo5kQAauTlIkdgMVD8xqUYwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAQhwl+kSqDroCPbYWTHUeO1huet +dkU46BdEqzOCB7AtNnqZbF614Vrr5yS1SyWsOtEmDQInCnDmbzSxD1kPLAKjgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIIIjNNZhISgDeb0K0OkfmMb1qT2b +bm+uPFqQUfHi6oqiMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzMuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0gAMEUCIQDP4pTybfCsQGeIX+D3m2OPtYyr8hEs +JJUEjF0avVQzJwIgag3DyYWNRmXxlsQEFyyJrgSXl8n2FfIRTt+nGLXATRM= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key new file mode 100644 index 00000000..6e849742 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLeRIXFMa/9duYkO6 +3XD6KFu/lYumYJ7dfH72RzKdfJ6hRANCAAQEIcJfpEqg66Aj22Fkx1HjtYbnrXZF +OOgXRKszggewLTZ6mWxeteFa6+cktUslrDrRJg0CJwpw5m80sQ9ZDywC +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/tlsca/326bd326d27f419b8ce1ac81d2f4466a6a4d322c4cc4a4d2da4ad76ce2517523_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/tlsca/326bd326d27f419b8ce1ac81d2f4466a6a4d322c4cc4a4d2da4ad76ce2517523_sk new file mode 100644 index 00000000..82f970b4 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/tlsca/326bd326d27f419b8ce1ac81d2f4466a6a4d322c4cc4a4d2da4ad76ce2517523_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgbNzuM3DxKH1Jw5pl +ahYpbNN82fwfPrFqCCxBjiu9v9ihRANCAAS55b42HQCpBeT7llOqOyz49wBKo56g +BForbLK4UoXUjSxKI3SUxYr+o/s92jwQA663ybpOv53Sqt/wuzHTULuE +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/tlsca/822334d66121280379bd0ad0e91f98c6f5a93d9b6e6fae3c5a9051f1e2ea8aa2_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/tlsca/822334d66121280379bd0ad0e91f98c6f5a93d9b6e6fae3c5a9051f1e2ea8aa2_sk new file mode 100644 index 00000000..0d9d2078 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/tlsca/822334d66121280379bd0ad0e91f98c6f5a93d9b6e6fae3c5a9051f1e2ea8aa2_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgw+PlBWl2jW5yoRdf +XBuqvBNd0XhkfEc9AZ59syEvV8KhRANCAARD6FpxBsxLsHL7dimnHG1VglEbQiv2 +d3HVQ7FitUJccCZDmFfg/Jo9LYhLicSQnmET9X6zBDOK4+qRTW1MWFPP +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/b4e610136a76ada0902c618769ca5210581eb8d467d213d4a5ff789883e9692e_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/b4e610136a76ada0902c618769ca5210581eb8d467d213d4a5ff789883e9692e_sk new file mode 100644 index 00000000..3cd6c459 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/b4e610136a76ada0902c618769ca5210581eb8d467d213d4a5ff789883e9692e_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgahPS7k+5zVcEpjQp +U9KYQ9sClfTQqUxIdubrfMxtc3ChRANCAARU4sXSddFmhQH5cXws0Ai14L2qdcFv +n19aIHxWdWP6NycnIAvl4EefmwcTGzPd/DYK9VWKZxMBFjOBBtSG1jqx +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/e0aa4119358c426aa9da26bda56137fc45ac1d42a602580f1e5e9e2a89db19c0_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/e0aa4119358c426aa9da26bda56137fc45ac1d42a602580f1e5e9e2a89db19c0_sk new file mode 100644 index 00000000..d59485ac --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/e0aa4119358c426aa9da26bda56137fc45ac1d42a602580f1e5e9e2a89db19c0_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgMCD31/c0/DmpD/D1 +LoHBu20f5+aFyase6HOw5qDvzeWhRANCAAQsX1cU5gSsKVUSIvE9OcILF0kS9c1A +aXxGXXm2TWQ3Xy9lEgrP4lwqx4jrI6chSWCiek8G+Vt3Wmr4KBFFkjDU +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..dbd3fdb0 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQChkJXZ77cw2XYcZw7N/ZfDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +My5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFTixdJ10WaF +AflxfCzQCLXgvap1wW+fX1ogfFZ1Y/o3JycgC+XgR5+bBxMbM938Ngr1VYpnEwEW +M4EG1IbWOrGjTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIGtfwyLyNNtneENJhFlrLzi6469Hgk5RcF7Naqa04tNFMAoGCCqGSM49 +BAMCA0gAMEUCIQC4QfvvZmFTTu3tGnYIYMl1gamWueuf6AW9SKkSclQxjgIgWQDu +29pl8iPDqsl42ykAQygJo25MUjJiLpBJV7RYBt8= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt new file mode 100644 index 00000000..4dfcf853 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeGgAwIBAgIQKa5eObvsHxvupA2rahA3RDAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZBZG1pbkBvcmczLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE5q3We3H2vVxe2291bquQfuMAcOBa +wWZjuVutHC9P50CLCdiud28dL+Bl9lX4+TxUAkVWtEx5+2K66+A9/YVMN6NsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIIIjNNZhISgDeb0K0OkfmMb1qT2bbm+u +PFqQUfHi6oqiMAoGCCqGSM49BAMCA0gAMEUCIQCgBPbErcsPfvWS656tesHBcvL8 +2+uPQ6KIAPQ8xgMurAIgegRhEztZz346n80Of44KuE9eJHCxgHSko8BB4PTYDQI= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key new file mode 100644 index 00000000..8bfc64af --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgkW6Iy52FIAxDhuVU +zRLLrd3pru3ULE0jmc9mSIly6SWhRANCAATmrdZ7cfa9XF7bb3Vuq5B+4wBw4FrB +ZmO5W60cL0/nQIsJ2K53bx0v4GX2Vfj5PFQCRVa0THn7Yrrr4D39hUw3 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/48e9839615e25d95e1753ce6326415ac18eb18e45a87e71ba8931e44c570fe35_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/48e9839615e25d95e1753ce6326415ac18eb18e45a87e71ba8931e44c570fe35_sk new file mode 100644 index 00000000..e05d7e38 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/48e9839615e25d95e1753ce6326415ac18eb18e45a87e71ba8931e44c570fe35_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgGpXiTLDYWSb3WFVD ++C7qcLIU+7W//zM/2D7bq842BUWhRANCAARSleBGqLKUcT93WNRQ89ghyJ5Yex5y +jh4NyVtpvJ4avCWwvnDvPo5U4nOv7QS8acoxa8Y8dZlkkXZC16Qr/lXZ +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/b67ff379e2c3611ef20f8f8a0182572dfbe7cfcf66fd673f1f18e3ab3e900695_sk b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/b67ff379e2c3611ef20f8f8a0182572dfbe7cfcf66fd673f1f18e3ab3e900695_sk new file mode 100644 index 00000000..f755e5cd --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/b67ff379e2c3611ef20f8f8a0182572dfbe7cfcf66fd673f1f18e3ab3e900695_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLVaOOXh5IqTIxkCm +IiGOENZlC32XHQqwFyyILNFZBqmhRANCAATMnNMCRrNVbWNS56rA5T9FfDlAAeep +xbDQNHQGtqCE67gwnqlTzUZ02g85xzt4HxBzdb8oN8KUnoO5E3BmVyIe +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem new file mode 100644 index 00000000..a2c2d846 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdGgAwIBAgIRALJ8p65zSztDjce0vxKEVp8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZVc2VyMUBv +cmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEzJzTAkaz +VW1jUueqwOU/RXw5QAHnqcWw0DR0BraghOu4MJ6pU81GdNoPOcc7eB8Qc3W/KDfC +lJ6DuRNwZlciHqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga1/DIvI022d4Q0mEWWsvOLrjr0eCTlFwXs1qprTi00UwCgYIKoZI +zj0EAwIDRwAwRAIgRYa/+oW0gyH4HpFXt2/TdKIL6kMx+koYkGvv9A+5Bn8CIH/X +ey0ZDFaRc33uctv2In4dD9HqvsKI0AKdpfZiRA7l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt new file mode 100644 index 00000000..4dc7c89e --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeKgAwIBAgIRAMviHBBgGLER1MPyrbPcZtQwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWVXNlcjFAb3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLdIYyUvUqO3F2tl5jjOrv0J7IbF +nMtcQuZYKVu9/OpfM0R5WbD3pMuremuj59I8o692CtGvYDL7Klt0F0apNgujbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCCCIzTWYSEoA3m9CtDpH5jG9ak9m25v +rjxakFHx4uqKojAKBggqhkjOPQQDAgNIADBFAiEAsOK+kRpL7Jbw9aDTgDPlsmLu +Elt0xGn9Aj26W0XgbeECIGG654v86gvmny3ttNnpAcSLZt+YfBY6kH0GjNPZAaLM +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key new file mode 100644 index 00000000..6299df14 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgwgmBcva6NSpRyxLm +pBGUdkxZ+2NeYpJ6Xm+FCBblDvihRANCAAS3SGMlL1KjtxdrZeY4zq79CeyGxZzL +XELmWClbvfzqXzNEeVmw96TLq3pro+fSPKOvdgrRr2Ay+ypbdBdGqTYL +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-couchdb.yaml b/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-couchdb.yaml new file mode 100644 index 00000000..18291a49 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-couchdb.yaml @@ -0,0 +1,107 @@ +# github.com/yeasy/docker-compose-files +# fabric network with couchdb as the peer state db. +# including: +# orderer.example.com: orderer node +# peer0.org1.example.com: peer0 node +# peer1.org1.example.com: peer1 node +# peer0.org2.example.com: peer2 node +# peer1.org2.example.com: peer3 node +# couchdb0: couchdb node +# couchdb1: couchdb node +# couchdb2: couchdb node +# couchdb3: couchdb node +# cli: cli node + +version: '2' + +services: + orderer.example.com: + extends: + file: base-solo.yaml + service: orderer.example.com + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb0:5984 + depends_on: + - couchdb0 + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb1:5984 + depends_on: + - couchdb1 + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb2:5984 + depends_on: + - couchdb2 + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + environment: + - CORE_LEDGER_STATE_STATEDATABASE=CouchDB + - CORE_LEDGER_STATE_COUCHDBCONFIG_COUCHDBADDRESS=couchdb3:5984 + depends_on: + - couchdb3 + + couchdb0: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb0 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "5984:5984" # this is the restful API addr, can also access fauxton web ui thru http://localhost:5984/_utils/ + + couchdb1: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb1 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "6984:5984" + + couchdb2: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb2 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "7984:5984" + + couchdb3: + extends: + file: base.yaml + service: couchdb-base + container_name: couchdb3 + # Comment/Uncomment the port mapping if you want to hide/expose the CouchDB service, + # for example map it to utilize Fauxton User Interface in dev environments. + ports: + - "8984:5984" + + cli: + extends: + file: base-solo.yaml + service: cli + diff --git a/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-dev.yaml b/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-dev.yaml new file mode 100644 index 00000000..28add973 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-dev.yaml @@ -0,0 +1,93 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.4 in dev mode, including +# It will map the $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric on peer0 +# * 2 ca (not in use now) +# * 3 orderers +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-raft.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-raft.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-raft.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer0.example.com + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + command: /go/src/github.com/hyperledger/fabric/orderer/orderer start + + orderer1.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer1.example.com + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + command: /go/src/github.com/hyperledger/fabric/orderer/orderer start + + orderer2.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer2.example.com + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + command: /go/src/github.com/hyperledger/fabric/orderer/orderer start + + peer0.org1.example.com: + extends: + file: base-raft.yaml + service: peer0.org1.example.com + volumes: + - $GOPATH/src/github.com/hyperledger/fabric:/go/src/github.com/hyperledger/fabric + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + command: /go/src/github.com/hyperledger/fabric/peer/peer node start + + peer1.org1.example.com: + extends: + file: base-raft.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + + peer0.org2.example.com: + extends: + file: base-raft.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + + peer1.org2.example.com: + extends: + file: base-raft.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-event.yaml b/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-event.yaml new file mode 100644 index 00000000..5c4efd0d --- /dev/null +++ b/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-event.yaml @@ -0,0 +1,59 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 1 ca +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: + + orderer.example.com: # There can be multiple orderers + extends: + file: base-event.yaml + service: orderer.example.com + + peer0.org1.example.com: + extends: + file: base-event.yaml + service: peer0.org1.example.com + depends_on: + - orderer.example.com + + peer1.org1.example.com: + extends: + file: base-event.yaml + service: peer1.org1.example.com + depends_on: + - orderer.example.com + + peer0.org2.example.com: + extends: + file: base-event.yaml + service: peer0.org2.example.com + depends_on: + - orderer.example.com + + peer1.org2.example.com: + extends: + file: base-event.yaml + service: peer1.org2.example.com + depends_on: + - orderer.example.com + + cli: + extends: + file: base-event.yaml + service: cli + + event-listener: + extends: + file: base-event.yaml + service: event-listener + depends_on: + - orderer.example.com + - peer0.org1.example.com + - peer1.org1.example.com + - peer0.org2.example.com + - peer1.org2.example.com diff --git a/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-kafka.yaml b/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-kafka.yaml new file mode 100644 index 00000000..1a1aac67 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-kafka.yaml @@ -0,0 +1,134 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-kafka.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-kafka.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-kafka.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-kafka.yaml + service: orderer0.example.com + depends_on: + - kafka0 + - kafka1 + - kafka2 + - kafka3 + + orderer1.example.com: # There can be multiple orderers + extends: + file: base-kafka.yaml + service: orderer1.example.com + depends_on: + - kafka0 + - kafka1 + - kafka2 + - kafka3 + + peer0.org1.example.com: + extends: + file: base-kafka.yaml + service: peer0.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer1.org1.example.com: + extends: + file: base-kafka.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer0.org2.example.com: + extends: + file: base-kafka.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + + peer1.org2.example.com: + extends: + file: base-kafka.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + +# ZooKeeper services, at least 3 nodes + zookeeper0: + extends: + file: base-kafka.yaml + service: zookeeper0 + + zookeeper1: + extends: + file: base-kafka.yaml + service: zookeeper1 + + zookeeper2: + extends: + file: base-kafka.yaml + service: zookeeper2 + +# Kafka services, at least 4 node to tolerant work with 1 node failure + kafka0: + extends: + file: base-kafka.yaml + service: kafka0 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka1: + extends: + file: base-kafka.yaml + service: kafka1 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka2: + extends: + file: base-kafka.yaml + service: kafka2 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + + kafka3: + extends: + file: base-kafka.yaml + service: kafka3 + depends_on: + - zookeeper0 + - zookeeper1 + - zookeeper2 + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-raft.yaml b/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-raft.yaml new file mode 100644 index 00000000..281b4f1b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-raft.yaml @@ -0,0 +1,80 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.4 MVE, including +# * 2 ca (not in use now) +# * 3 orderers +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-raft.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-raft.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-raft.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer0.example.com + + orderer1.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer1.example.com + + orderer2.example.com: # There can be multiple orderers + extends: + file: base-raft.yaml + service: orderer2.example.com + + peer0.org1.example.com: + extends: + file: base-raft.yaml + service: peer0.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + + peer1.org1.example.com: + extends: + file: base-raft.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + + peer0.org2.example.com: + extends: + file: base-raft.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + + peer1.org2.example.com: + extends: + file: base-raft.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + - orderer1.example.com + - orderer2.example.com + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-solo-be.yaml b/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-solo-be.yaml new file mode 100644 index 00000000..5e5b2461 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-solo-be.yaml @@ -0,0 +1,82 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing +# * blockchain-explorer + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-solo.yaml + service: cli + + orderer.example.com: # There can be multiple orderers + extends: + file: base-solo.yaml + service: orderer.example.com + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + + explorer: + extends: + file: base.yaml + service: explorer-base + container_name: explorer + hostname: explorer + depends_on: + - mysql + volumes: + - ./explorer-artifacts/config.json:/blockchain-explorer/config.json + - ./crypto-config:/blockchain-explorer/first-network/crypto-config + ports: + - "8080:8080" # HTTP port + + mysql: # mysql service + extends: + file: base.yaml + service: mysql-base + container_name: mysql + hostname: mysql + environment: + - MYSQL_ROOT_PASSWORD=root + - MYSQL_DATABASE=fabricexplorer + volumes: + - ./explorer-artifacts/fabricexplorer.sql:/docker-entrypoint-initdb.d/fabricexplorer.sql + #command: bash -c 'mysqld; sleep 1; mysql -uroot -proot < /tmp/fabricexplorer.sql; while true; do sleep 20171117; done' + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-solo.yaml b/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-solo.yaml new file mode 100644 index 00000000..082fb4c1 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/docker-compose-2orgs-4peers-solo.yaml @@ -0,0 +1,73 @@ +# https://github.com/yeasy/docker-compose-files/tree/master/hyperledger +# This compose file will start a Hyperledger Fabric 1.0 MVE, including +# * 2 ca (not in use now) +# * 1 orderer +# * 4 peers in 2 orgs +# * cli for testing + +version: '2.0' + +services: +# ca.org1.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org1.example.com + +# ca.org2.example.com: +# extends: +# file: base-solo.yaml +# service: ca.org2.example.com + + cli: + extends: + file: base-solo.yaml + service: cli + + orderer0.example.com: # There can be multiple orderers + extends: + file: base-solo.yaml + service: orderer0.example.com + + peer0.org1.example.com: + extends: + file: base-solo.yaml + service: peer0.org1.example.com + depends_on: + - orderer0.example.com + + peer1.org1.example.com: + extends: + file: base-solo.yaml + service: peer1.org1.example.com + depends_on: + - orderer0.example.com + + peer0.org2.example.com: + extends: + file: base-solo.yaml + service: peer0.org2.example.com + depends_on: + - orderer0.example.com + + peer1.org2.example.com: + extends: + file: base-solo.yaml + service: peer1.org2.example.com + depends_on: + - orderer0.example.com + + prometheus: + extends: + file: base-solo.yaml + service: prometheus + depends_on: + - orderer0.example.com + - peer0.org1.example.com + - peer1.org1.example.com + - peer0.org2.example.com + - peer1.org2.example.com + +#networks: +# default: +# external: +# name: hyperledger_fabric diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/cc02_mockTest/README.md b/hyperledger_fabric/v1.4.8/examples/chaincode/go/cc02_mockTest/README.md new file mode 100644 index 00000000..22338f1d --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/cc02_mockTest/README.md @@ -0,0 +1,23 @@ +# Debug Chaincode with MockShim +Baohua Yang, 2019-01-17 + +The package will demonstrate how to debug the chaincode with the MockShim lib. + +This way is more efficient and quick to debug locally without any fabric network setup. + +## Usage + +Unzip the package and enter the package path, then run + +```bash +# Regular testing should return OK +$ go test . + +# Debug with more logs output +$ go test -v . +``` + +## Files + +* chaincode_example02.go: example02 chaincode from HLF repo; +* cc_test.go: test code to verify the example02 chaincode logic. diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/cc02_mockTest/cc_test.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/cc02_mockTest/cc_test.go new file mode 100644 index 00000000..6fb11c2c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/cc02_mockTest/cc_test.go @@ -0,0 +1,58 @@ +package main + +import ( + "strconv" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +// TestMockShim test the chaincode with MockShim +func TestMockShim(t *testing.T) { + var Aval int + var err error + + // Instantiate mockStub using the sample example02 chaincode + stub := shim.NewMockStub("mockStub", new(SimpleChaincode)) + if stub == nil { + t.Fatalf("MockStub creation failed") + } + + // Init with tx_uuid, args + result := stub.MockInit("000001", [][]byte{[]byte("init"), []byte("a"), []byte("100"), []byte("b"), []byte("200")}) + if result.Status != shim.OK { + t.Fatalf("Error to Init the chaincode: %+v", result) + } + + // Query the existing result + result = stub.MockInvoke("000002", [][]byte{[]byte("query"), []byte("a")}) + if result.Status != shim.OK { + t.Fatalf("Error to Invoke.query the chaincode: %+v", result) + } + Aval, err = strconv.Atoi(string(result.Payload)) + if err != nil { + t.Errorf("Expecting integer value for query result") + } + if Aval != 100 { + t.Errorf("Value is not equal to expected from query result") + } + + // Invoke to transfer + result = stub.MockInvoke("000003", [][]byte{[]byte("invoke"), []byte("a"), []byte("b"), []byte("10")}) + if result.Status != shim.OK { + t.Fatalf("Error to Invoke.invoke the chaincode: %+v", result) + } + + // Query the existing result + result = stub.MockInvoke("000004", [][]byte{[]byte("query"), []byte("a")}) + if result.Status != shim.OK { + t.Fatalf("Error to Invoke.query the chaincode: %+v", result) + } + Aval, err = strconv.Atoi(string(result.Payload)) + if err != nil { + t.Errorf("Expecting integer value for query result") + } + if Aval != 90 { + t.Errorf("Value is not equal to expected from query result") + } +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/cc02_mockTest/chaincode_example02.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/cc02_mockTest/chaincode_example02.go new file mode 100644 index 00000000..945084b1 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/cc02_mockTest/chaincode_example02.go @@ -0,0 +1,200 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +//WARNING - this chaincode's ID is hard-coded in chaincode_example04 to illustrate one way of +//calling chaincode from a chaincode. If this example is modified, chaincode_example04.go has +//to be modified as well with the new ID of chaincode_example02. +//chaincode_example05 show's how chaincode ID can be passed in as a parameter instead of +//hard-coding. + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Init") + _, args := stub.GetFunctionAndParameters() + var A, B string // Entities + var Aval, Bval int // Asset holdings + var err error + + if len(args) != 4 { + fmt.Printf("args = %+v\n", args) + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Invoke") + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + // Make payment of X units from A to B + return t.invoke(stub, args) + } else if function == "delete" { + // Deletes an entity from its state + return t.delete(stub, args) + } else if function == "query" { + // the old "Query" is now implemtned in invoke + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"delete\" \"query\"") +} + +// Transaction makes payment of X units from A to B +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A, B string // Entities + var Aval, Bval int // Asset holdings + var X int // Transaction value + var err error + + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + A = args[0] + B = args[1] + + // Get the state from the ledger + // TODO: will be nice to have a GetAllState call to ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + return shim.Error("Failed to get state") + } + if Avalbytes == nil { + return shim.Error("Entity not found") + } + Aval, _ = strconv.Atoi(string(Avalbytes)) + + Bvalbytes, err := stub.GetState(B) + if err != nil { + return shim.Error("Failed to get state") + } + if Bvalbytes == nil { + return shim.Error("Entity not found") + } + Bval, _ = strconv.Atoi(string(Bvalbytes)) + + // Perform the execution + X, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Invalid transaction amount, expecting a integer value") + } + Aval = Aval - X + Bval = Bval + X + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state back to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Deletes an entity from state +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + A := args[0] + + // Delete the key from the state in ledger + err := stub.DelState(A) + if err != nil { + return shim.Error("Failed to delete state") + } + + return shim.Success(nil) +} + +// query callback representing the query of a chaincode +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A string // Entities + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the person to query") + } + + A = args[0] + + // Get the state from the ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + jsonResp := "{\"Error\":\"Failed to get state for " + A + "\"}" + return shim.Error(jsonResp) + } + + if Avalbytes == nil { + jsonResp := "{\"Error\":\"Nil amount for " + A + "\"}" + return shim.Error(jsonResp) + } + + jsonResp := "{\"Name\":\"" + A + "\",\"Amount\":\"" + string(Avalbytes) + "\"}" + fmt.Printf("Query Response:%s\n", jsonResp) + return shim.Success(Avalbytes) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example01/chaincode_example01.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example01/chaincode_example01.go new file mode 100644 index 00000000..302f2d98 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example01/chaincode_example01.go @@ -0,0 +1,104 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +var A, B string +var Aval, Bval, X int + +// Init callback representing the invocation of a chaincode +// This chaincode will manage two accounts A and B and will transfer X units from A to B upon invoke +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + /************ + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval)) + if err != nil { + return nil, err + } + + stub.PutState(B, []byte(strconv.Itoa(Bval)) + err = stub.PutState(B, []byte(strconv.Itoa(Bval)) + if err != nil { + return nil, err + } + ************/ + return shim.Success(nil) +} + +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + // Transaction makes payment of X units from A to B + X, err := strconv.Atoi(args[0]) + if err != nil { + fmt.Printf("Error convert %s to integer: %s", args[0], err) + return shim.Error(fmt.Sprintf("Error convert %s to integer: %s", args[0], err)) + } + Aval = Aval - X + Bval = Bval + X + ts, err2 := stub.GetTxTimestamp() + if err2 != nil { + fmt.Printf("Error getting transaction timestamp: %s", err2) + return shim.Error(fmt.Sprintf("Error getting transaction timestamp: %s", err2)) + } + fmt.Printf("Transaction Time: %v,Aval = %d, Bval = %d\n", ts, Aval, Bval) + return shim.Success(nil) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\"") +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example02/chaincode_example02.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example02/chaincode_example02.go new file mode 100644 index 00000000..eb6f430b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example02/chaincode_example02.go @@ -0,0 +1,193 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Init") + _, args := stub.GetFunctionAndParameters() + var A, B string // Entities + var Aval, Bval int // Asset holdings + var err error + + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + fmt.Println("ex02 Invoke") + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + // Make payment of X units from A to B + return t.invoke(stub, args) + } else if function == "delete" { + // Deletes an entity from its state + return t.delete(stub, args) + } else if function == "query" { + // the old "Query" is now implemtned in invoke + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"delete\" \"query\"") +} + +// Transaction makes payment of X units from A to B +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A, B string // Entities + var Aval, Bval int // Asset holdings + var X int // Transaction value + var err error + + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + A = args[0] + B = args[1] + + // Get the state from the ledger + // TODO: will be nice to have a GetAllState call to ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + return shim.Error("Failed to get state") + } + if Avalbytes == nil { + return shim.Error("Entity not found") + } + Aval, _ = strconv.Atoi(string(Avalbytes)) + + Bvalbytes, err := stub.GetState(B) + if err != nil { + return shim.Error("Failed to get state") + } + if Bvalbytes == nil { + return shim.Error("Entity not found") + } + Bval, _ = strconv.Atoi(string(Bvalbytes)) + + // Perform the execution + X, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Invalid transaction amount, expecting a integer value") + } + Aval = Aval - X + Bval = Bval + X + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state back to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Deletes an entity from state +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + A := args[0] + + // Delete the key from the state in ledger + err := stub.DelState(A) + if err != nil { + return shim.Error("Failed to delete state") + } + + return shim.Success(nil) +} + +// query callback representing the query of a chaincode +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A string // Entities + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the person to query") + } + + A = args[0] + + // Get the state from the ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + jsonResp := "{\"Error\":\"Failed to get state for " + A + "\"}" + return shim.Error(jsonResp) + } + + if Avalbytes == nil { + jsonResp := "{\"Error\":\"Nil amount for " + A + "\"}" + return shim.Error(jsonResp) + } + + jsonResp := "{\"Name\":\"" + A + "\",\"Amount\":\"" + string(Avalbytes) + "\"}" + fmt.Printf("Query Response:%s\n", jsonResp) + return shim.Success(Avalbytes) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go new file mode 100644 index 00000000..c6c8ed7f --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example02/chaincode_example02_test.go @@ -0,0 +1,112 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkQuery(t *testing.T, stub *shim.MockStub, name string, value string) { + res := stub.MockInvoke("1", [][]byte{[]byte("query"), []byte(name)}) + if res.Status != shim.OK { + fmt.Println("Query", name, "failed", string(res.Message)) + t.FailNow() + } + if res.Payload == nil { + fmt.Println("Query", name, "failed to get value") + t.FailNow() + } + if string(res.Payload) != value { + fmt.Println("Query value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample02_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("123"), []byte("B"), []byte("234")}) + + checkState(t, stub, "A", "123") + checkState(t, stub, "B", "234") +} + +func TestExample02_Query(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=345 B=456 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("345"), []byte("B"), []byte("456")}) + + // Query A + checkQuery(t, stub, "A", "345") + + // Query B + checkQuery(t, stub, "B", "456") +} + +func TestExample02_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=567 B=678 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("567"), []byte("B"), []byte("678")}) + + // Invoke A->B for 123 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("A"), []byte("B"), []byte("123")}) + checkQuery(t, stub, "A", "444") + checkQuery(t, stub, "B", "801") + + // Invoke B->A for 234 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("B"), []byte("A"), []byte("234")}) + checkQuery(t, stub, "A", "678") + checkQuery(t, stub, "B", "567") + checkQuery(t, stub, "A", "678") + checkQuery(t, stub, "B", "567") +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example03/chaincode_example03.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example03/chaincode_example03.go new file mode 100644 index 00000000..d667a822 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example03/chaincode_example03.go @@ -0,0 +1,100 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +// This program is an erroneous chaincode program that attempts to put state in query context - query should return error +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init takes a string and int. These are stored as a key/value pair in the state +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var A string // Entity + var Aval int // Asset holding + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d\n", Aval) + + // Write the state to the ledger - this put is legal within Run + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke is a no-op +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "query" { + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"query\"") +} + +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var A string // Entity + var Aval int // Asset holding + var err error + + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d\n", Aval) + + // Write the state to the ledger - this put is illegal within Run + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + jsonResp := "{\"Error\":\"Cannot put state within chaincode query\"}" + return shim.Error(jsonResp) + } + + return shim.Success(nil) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go new file mode 100644 index 00000000..812650e0 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example03/chaincode_example03_test.go @@ -0,0 +1,72 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +func checkInit(t *testing.T, scc *SimpleChaincode, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", res.Message) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, scc *SimpleChaincode, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Query failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample03_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex03", scc) + + // Init A=123 B=234 + checkInit(t, scc, stub, [][]byte{[]byte("init"), []byte("A"), []byte("123")}) + + checkState(t, stub, "A", "123") +} + +func TestExample03_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex03", scc) + + // Init A=345 B=456 + checkInit(t, scc, stub, [][]byte{[]byte("init"), []byte("A"), []byte("345")}) + + // Invoke "query" + checkInvoke(t, scc, stub, [][]byte{[]byte("query"), []byte("A"), []byte("345")}) +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example04/chaincode_example04.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example04/chaincode_example04.go new file mode 100644 index 00000000..b874ad73 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example04/chaincode_example04.go @@ -0,0 +1,174 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode is a test for chaincode invoking another chaincode - invokes chaincode_example02 + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func toChaincodeArgs(args ...string) [][]byte { + bargs := make([][]byte, len(args)) + for i, arg := range args { + bargs[i] = []byte(arg) + } + return bargs +} + +// Init takes two arguments, a string and int. These are stored in the key/value pair in the state +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var event string // Indicates whether event has happened. Initially 0 + var eventVal int // State of event + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // Initialize the chaincode + event = args[0] + eventVal, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for event status") + } + fmt.Printf("eventVal = %d\n", eventVal) + + err = stub.PutState(event, []byte(strconv.Itoa(eventVal))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke invokes another chaincode - chaincode_example02, upon receipt of an event and changes event state +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var event string // Event entity + var eventVal int // State of event + var err error + + if len(args) != 3 && len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 3 or 4") + } + + chainCodeToCall := args[0] + event = args[1] + eventVal, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Expected integer value for event state change") + } + channelID := "" + if len(args) == 4 { + channelID = args[3] + } + + if eventVal != 1 { + fmt.Printf("Unexpected event. Doing nothing\n") + return shim.Success(nil) + } + + f := "invoke" + invokeArgs := toChaincodeArgs(f, "a", "b", "10") + response := stub.InvokeChaincode(chainCodeToCall, invokeArgs, channelID) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to invoke chaincode. Got error: %s", string(response.Payload)) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + fmt.Printf("Invoke chaincode successful. Got response %s", string(response.Payload)) + + // Write the event state back to the ledger + err = stub.PutState(event, []byte(strconv.Itoa(eventVal))) + if err != nil { + return shim.Error(err.Error()) + } + + return response +} + +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var event string // Event entity + var err error + + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting entity to query") + } + + event = args[0] + var jsonResp string + + // Get the state from the ledger + eventValbytes, err := stub.GetState(event) + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + event + "\"}" + return shim.Error(jsonResp) + } + + if eventValbytes == nil { + jsonResp = "{\"Error\":\"Nil value for " + event + "\"}" + return shim.Error(jsonResp) + } + + if len(args) > 3 { + chainCodeToCall := args[1] + queryKey := args[2] + channel := args[3] + f := "query" + invokeArgs := toChaincodeArgs(f, queryKey) + response := stub.InvokeChaincode(chainCodeToCall, invokeArgs, channel) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to invoke chaincode. Got error: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + jsonResp = string(response.Payload) + } else { + jsonResp = "{\"Name\":\"" + event + "\",\"Amount\":\"" + string(eventValbytes) + "\"}" + } + fmt.Printf("Query Response: %s\n", jsonResp) + + return shim.Success([]byte(jsonResp)) +} + +// Invoke is called by fabric to execute a transaction +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } else if function == "query" { + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"query\"") +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go new file mode 100644 index 00000000..9d252e2d --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example04/chaincode_example04_test.go @@ -0,0 +1,119 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" + ex02 "github.com/hyperledger/fabric/examples/chaincode/go/chaincode_example02" +) + +// this is the response to any successful Invoke() on chaincode_example04 +var eventResponse = "{\"Name\":\"Event\",\"Amount\":\"1\"}" + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkQuery(t *testing.T, stub *shim.MockStub, name string, value string) { + res := stub.MockInvoke("1", [][]byte{[]byte("query"), []byte(name)}) + if res.Status != shim.OK { + fmt.Println("Query", name, "failed", string(res.Message)) + t.FailNow() + } + if res.Payload == nil { + fmt.Println("Query", name, "failed to get value") + t.FailNow() + } + if string(res.Payload) != value { + fmt.Println("Query value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample04_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex04", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("Event"), []byte("123")}) + + checkState(t, stub, "Event", "123") +} + +func TestExample04_Query(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex04", scc) + + // Init A=345 B=456 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("Event"), []byte("1")}) + + // Query A + checkQuery(t, stub, "Event", eventResponse) +} + +func TestExample04_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex04", scc) + + chaincodeToInvoke := "ex02" + + ccEx2 := new(ex02.SimpleChaincode) + stubEx2 := shim.NewMockStub(chaincodeToInvoke, ccEx2) + checkInit(t, stubEx2, [][]byte{[]byte("init"), []byte("a"), []byte("111"), []byte("b"), []byte("222")}) + stub.MockPeerChaincode(chaincodeToInvoke, stubEx2) + + // Init A=567 B=678 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("Event"), []byte("1")}) + + // Invoke A->B for 10 via Example04's chaincode + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeToInvoke), []byte("Event"), []byte("1")}) + checkQuery(t, stub, "Event", eventResponse) + checkQuery(t, stubEx2, "a", "101") + checkQuery(t, stubEx2, "b", "232") + + // Invoke A->B for 10 via Example04's chaincode + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeToInvoke), []byte("Event"), []byte("1")}) + checkQuery(t, stub, "Event", eventResponse) + checkQuery(t, stubEx2, "a", "91") + checkQuery(t, stubEx2, "b", "242") +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example05/chaincode_example05.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example05/chaincode_example05.go new file mode 100644 index 00000000..35ef5074 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example05/chaincode_example05.go @@ -0,0 +1,215 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode is a test for chaincode querying another chaincode - invokes chaincode_example02 and computes the sum of a and b and stores it as state + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +func toChaincodeArgs(args ...string) [][]byte { + bargs := make([][]byte, len(args)) + for i, arg := range args { + bargs[i] = []byte(arg) + } + return bargs +} + +// Init takes two arguments, a string and int. The string will be a key with +// the int as a value. +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + var sum string // Sum of asset holdings across accounts. Initially 0 + var sumVal int // Sum of holdings + var err error + _, args := stub.GetFunctionAndParameters() + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // Initialize the chaincode + sum = args[0] + sumVal, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for sum") + } + fmt.Printf("sumVal = %d\n", sumVal) + + // Write the state to the ledger + err = stub.PutState(sum, []byte(strconv.Itoa(sumVal))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke queries another chaincode and updates its own state +func (t *SimpleChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var sum, channelName string // Sum entity + var Aval, Bval, sumVal int // value of sum entity - to be computed + var err error + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting atleast 2") + } + + chaincodeName := args[0] // Expecting name of the chaincode you would like to call, this name would be given during chaincode install time + sum = args[1] + + if len(args) > 2 { + channelName = args[2] + } else { + channelName = "" + } + + // Query chaincode_example02 + f := "query" + queryArgs := toChaincodeArgs(f, "a") + + // if chaincode being invoked is on the same channel, + // then channel defaults to the current channel and args[2] can be "". + // If the chaincode being called is on a different channel, + // then you must specify the channel name in args[2] + + response := stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Aval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + queryArgs = toChaincodeArgs(f, "b") + response = stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Bval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + // Compute sum + sumVal = Aval + Bval + + // Write sumVal back to the ledger + err = stub.PutState(sum, []byte(strconv.Itoa(sumVal))) + if err != nil { + return shim.Error(err.Error()) + } + + fmt.Printf("Invoke chaincode successful. Got sum %d\n", sumVal) + return shim.Success([]byte(strconv.Itoa(sumVal))) +} + +func (t *SimpleChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var sum, channelName string // Sum entity + var Aval, Bval, sumVal int // value of sum entity - to be computed + var err error + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting atleast 2") + } + + chaincodeName := args[0] // Expecting name of the chaincode you would like to call, this name would be given during chaincode install time + sum = args[1] + + if len(args) > 2 { + channelName = args[2] + } else { + channelName = "" + } + + // Query chaincode_example02 + f := "query" + queryArgs := toChaincodeArgs(f, "a") + + // if chaincode being invoked is on the same channel, + // then channel defaults to the current channel and args[2] can be "". + // If the chaincode being called is on a different channel, + // then you must specify the channel name in args[2] + response := stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Aval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + queryArgs = toChaincodeArgs(f, "b") + response = stub.InvokeChaincode(chaincodeName, queryArgs, channelName) + if response.Status != shim.OK { + errStr := fmt.Sprintf("Failed to query chaincode. Got error: %s", response.Payload) + fmt.Printf(errStr) + return shim.Error(errStr) + } + Bval, err = strconv.Atoi(string(response.Payload)) + if err != nil { + errStr := fmt.Sprintf("Error retrieving state from ledger for queried chaincode: %s", err.Error()) + fmt.Printf(errStr) + return shim.Error(errStr) + } + + // Compute sum + sumVal = Aval + Bval + + fmt.Printf("Query chaincode successful. Got sum %d\n", sumVal) + jsonResp := "{\"Name\":\"" + sum + "\",\"Value\":\"" + strconv.Itoa(sumVal) + "\"}" + fmt.Printf("Query Response:%s\n", jsonResp) + return shim.Success([]byte(strconv.Itoa(sumVal))) +} + +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } else if function == "query" { + return t.query(stub, args) + } + + return shim.Success([]byte("Invalid invoke function name. Expecting \"invoke\" \"query\"")) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go new file mode 100644 index 00000000..1f6d3047 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/chaincode_example05/chaincode_example05_test.go @@ -0,0 +1,128 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" + ex02 "github.com/hyperledger/fabric/examples/chaincode/go/chaincode_example02" +) + +var chaincodeName = "ex02" + +// chaincode_example05 looks like it wanted to return a JSON response to Query() +// it doesn't actually do this though, it just returns the sum value +func jsonResponse(name string, value string) string { + return fmt.Sprintf("jsonResponse = \"{\"Name\":\"%v\",\"Value\":\"%v\"}", name, value) +} + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, expect string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != expect { + fmt.Println("State value", name, "was not", expect, "as expected") + t.FailNow() + } +} + +func checkQuery(t *testing.T, stub *shim.MockStub, args [][]byte, expect string) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Query", args, "failed", string(res.Message)) + t.FailNow() + } + if res.Payload == nil { + fmt.Println("Query", args, "failed to get result") + t.FailNow() + } + if string(res.Payload) != expect { + fmt.Println("Query result ", string(res.Payload), "was not", expect, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } +} + +func TestExample05_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex05", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("sumStoreName"), []byte("432")}) + + checkState(t, stub, "sumStoreName", "432") +} + +func TestExample05_Query(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex05", scc) + + ccEx2 := new(ex02.SimpleChaincode) + stubEx2 := shim.NewMockStub(chaincodeName, ccEx2) + checkInit(t, stubEx2, [][]byte{[]byte("init"), []byte("a"), []byte("111"), []byte("b"), []byte("222")}) + stub.MockPeerChaincode(chaincodeName, stubEx2) + + checkInit(t, stub, [][]byte{[]byte("init"), []byte("sumStoreName"), []byte("0")}) + + // a + b = 111 + 222 = 333 + checkQuery(t, stub, [][]byte{[]byte("query"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}, "333") // example05 doesn't return JSON? +} + +func TestExample05_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex05", scc) + + ccEx2 := new(ex02.SimpleChaincode) + stubEx2 := shim.NewMockStub(chaincodeName, ccEx2) + checkInit(t, stubEx2, [][]byte{[]byte("init"), []byte("a"), []byte("222"), []byte("b"), []byte("333")}) + stub.MockPeerChaincode(chaincodeName, stubEx2) + + checkInit(t, stub, [][]byte{[]byte("init"), []byte("sumStoreName"), []byte("0")}) + + // a + b = 222 + 333 = 555 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}) + checkQuery(t, stub, [][]byte{[]byte("query"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}, "555") // example05 doesn't return JSON? + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("a")}, "222") + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("b")}, "333") + + // update A-=10 and B+=10 + checkInvoke(t, stubEx2, [][]byte{[]byte("invoke"), []byte("a"), []byte("b"), []byte("10")}) + + // a + b = 212 + 343 = 555 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}) + checkQuery(t, stub, [][]byte{[]byte("query"), []byte(chaincodeName), []byte("sumStoreName"), []byte("")}, "555") // example05 doesn't return JSON? + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("a")}, "212") + checkQuery(t, stubEx2, [][]byte{[]byte("query"), []byte("b")}, "343") +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/enccc_example/README.md b/hyperledger_fabric/v1.4.8/examples/chaincode/go/enccc_example/README.md new file mode 100644 index 00000000..eca40073 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/enccc_example/README.md @@ -0,0 +1,80 @@ +# Using EncCC + +To test `EncCC` you need to first generate an AES 256 bit key as a base64 +encoded string so that it can be passed as JSON to the peer chaincode +invoke's transient parameter. + +Note: Before getting started you must use govendor to add external dependencies. Please issue the following commands inside the "enccc_example" folder: +``` +govendor init +govendor add +external +``` + +Let's generate the encryption and decryption keys. The example will simulate a shared key so the key is used for both encryption and decryption. +``` +ENCKEY=`openssl rand 32 -base64` && DECKEY=$ENCKEY +``` + +At this point, you can invoke the chaincode to encrypt key-value pairs as +follows: + +Note: the following assumes the env is initialized and peer has joined channel "my-ch". +``` +peer chaincode invoke -n enccc -C my-ch -c '{"Args":["ENCRYPT","key1","value1"]}' --transient "{\"ENCKEY\":\"$ENCKEY\"}" +``` + +This call will encrypt using a random IV. This may be undesirable for +instance if the chaincode invocation needs to be endorsed by multiple +peers since it would cause the endorsement of conflicting read/write sets. +It is possible to encrypt deterministically by specifying the IV, as +follows: at first the IV must be created + +``` +IV=`openssl rand 16 -base64` +``` + +Then, the IV may be specified in the transient field + +``` +peer chaincode invoke -n enccc -C my-ch -c '{"Args":["ENCRYPT","key2","value2"]}' --transient "{\"ENCKEY\":\"$ENCKEY\",\"IV\":\"$IV\"}" +``` + +Two such invocations will produce equal KVS writes, which can be endorsed by multiple nodes. + +The value can be retrieved back as follows + +``` +peer chaincode query -n enccc -C my-ch -c '{"Args":["DECRYPT","key1"]}' --transient "{\"DECKEY\":\"$DECKEY\"}" +``` +``` +peer chaincode query -n enccc -C my-ch -c '{"Args":["DECRYPT","key2"]}' --transient "{\"DECKEY\":\"$DECKEY\"}" +``` +Note that in this case we use a chaincode query operation; while the use of the +transient field guarantees that the content will not be written to the ledger, +the chaincode decrypts the message and puts it in the proposal response. An +invocation would persist the result in the ledger for all channel readers to +see whereas a query can be discarded and so the result remains confidential. + +To test signing and verifying, you also need to generate an ECDSA key for the appopriate +curve, as follows. + +``` +On Intel: +SIGKEY=`openssl ecparam -name prime256v1 -genkey | tail -n5 | base64 -w0` && VERKEY=$SIGKEY + +On Mac: +SIGKEY=`openssl ecparam -name prime256v1 -genkey | tail -n5 | base64` && VERKEY=$SIGKEY +``` + +At this point, you can invoke the chaincode to sign and then encrypt key-value +pairs as follows + +``` +peer chaincode invoke -n enccc -C my-ch -c '{"Args":["ENCRYPTSIGN","key3","value3"]}' --transient "{\"ENCKEY\":\"$ENCKEY\",\"SIGKEY\":\"$SIGKEY\"}" +``` + +And similarly to retrieve them using a query + +``` +peer chaincode query -n enccc -C my-ch -c '{"Args":["DECRYPTVERIFY","key3"]}' --transient "{\"DECKEY\":\"$DECKEY\",\"VERKEY\":\"$VERKEY\"}" +``` diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/enccc_example/enccc_example.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/enccc_example/enccc_example.go new file mode 100644 index 00000000..284695d3 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/enccc_example/enccc_example.go @@ -0,0 +1,223 @@ +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "fmt" + + "github.com/hyperledger/fabric/bccsp" + "github.com/hyperledger/fabric/bccsp/factory" + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/core/chaincode/shim/ext/entities" + pb "github.com/hyperledger/fabric/protos/peer" +) + +const DECKEY = "DECKEY" +const VERKEY = "VERKEY" +const ENCKEY = "ENCKEY" +const SIGKEY = "SIGKEY" +const IV = "IV" + +// EncCC example simple Chaincode implementation of a chaincode that uses encryption/signatures +type EncCC struct { + bccspInst bccsp.BCCSP +} + +// Init does nothing for this cc +func (t *EncCC) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Encrypter exposes how to write state to the ledger after having +// encrypted it with an AES 256 bit key that has been provided to the chaincode through the +// transient field +func (t *EncCC) Encrypter(stub shim.ChaincodeStubInterface, args []string, encKey, IV []byte) pb.Response { + // create the encrypter entity - we give it an ID, the bccsp instance, the key and (optionally) the IV + ent, err := entities.NewAES256EncrypterEntity("ID", t.bccspInst, encKey, IV) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + if len(args) != 2 { + return shim.Error("Expected 2 parameters to function Encrypter") + } + + key := args[0] + cleartextValue := []byte(args[1]) + + // here, we encrypt cleartextValue and assign it to key + err = encryptAndPutState(stub, ent, key, cleartextValue) + if err != nil { + return shim.Error(fmt.Sprintf("encryptAndPutState failed, err %+v", err)) + } + return shim.Success(nil) +} + +// Decrypter exposes how to read from the ledger and decrypt using an AES 256 +// bit key that has been provided to the chaincode through the transient field. +func (t *EncCC) Decrypter(stub shim.ChaincodeStubInterface, args []string, decKey, IV []byte) pb.Response { + // create the encrypter entity - we give it an ID, the bccsp instance, the key and (optionally) the IV + ent, err := entities.NewAES256EncrypterEntity("ID", t.bccspInst, decKey, IV) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + if len(args) != 1 { + return shim.Error("Expected 1 parameters to function Decrypter") + } + + key := args[0] + + // here we decrypt the state associated to key + cleartextValue, err := getStateAndDecrypt(stub, ent, key) + if err != nil { + return shim.Error(fmt.Sprintf("getStateAndDecrypt failed, err %+v", err)) + } + + // here we return the decrypted value as a result + return shim.Success(cleartextValue) +} + +// EncrypterSigner exposes how to write state to the ledger after having received keys for +// encrypting (AES 256 bit key) and signing (X9.62/SECG curve over a 256 bit prime field) that has been provided to the chaincode through the +// transient field +func (t *EncCC) EncrypterSigner(stub shim.ChaincodeStubInterface, args []string, encKey, sigKey []byte) pb.Response { + // create the encrypter/signer entity - we give it an ID, the bccsp instance and the keys + ent, err := entities.NewAES256EncrypterECDSASignerEntity("ID", t.bccspInst, encKey, sigKey) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + if len(args) != 2 { + return shim.Error("Expected 2 parameters to function EncrypterSigner") + } + + key := args[0] + cleartextValue := []byte(args[1]) + + // here, we sign cleartextValue, encrypt it and assign it to key + err = signEncryptAndPutState(stub, ent, key, cleartextValue) + if err != nil { + return shim.Error(fmt.Sprintf("signEncryptAndPutState failed, err %+v", err)) + } + + return shim.Success(nil) +} + +// DecrypterVerify exposes how to get state to the ledger after having received keys for +// decrypting (AES 256 bit key) and verifying (X9.62/SECG curve over a 256 bit prime field) that has been provided to the chaincode through the +// transient field +func (t *EncCC) DecrypterVerify(stub shim.ChaincodeStubInterface, args []string, decKey, verKey []byte) pb.Response { + // create the decrypter/verify entity - we give it an ID, the bccsp instance and the keys + ent, err := entities.NewAES256EncrypterECDSASignerEntity("ID", t.bccspInst, decKey, verKey) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256DecrypterEntity failed, err %s", err)) + } + + if len(args) != 1 { + return shim.Error("Expected 1 parameters to function DecrypterVerify") + } + key := args[0] + + // here we decrypt the state associated to key and verify it + cleartextValue, err := getStateDecryptAndVerify(stub, ent, key) + if err != nil { + return shim.Error(fmt.Sprintf("getStateDecryptAndVerify failed, err %+v", err)) + } + + // here we return the decrypted and verified value as a result + return shim.Success(cleartextValue) +} + +// RangeDecrypter shows how range queries may be satisfied by using the decrypter +// entity directly to decrypt previously encrypted key-value pairs +func (t *EncCC) RangeDecrypter(stub shim.ChaincodeStubInterface, decKey []byte) pb.Response { + // create the encrypter entity - we give it an ID, the bccsp instance and the key + ent, err := entities.NewAES256EncrypterEntity("ID", t.bccspInst, decKey, nil) + if err != nil { + return shim.Error(fmt.Sprintf("entities.NewAES256EncrypterEntity failed, err %s", err)) + } + + bytes, err := getStateByRangeAndDecrypt(stub, ent, "", "") + if err != nil { + return shim.Error(fmt.Sprintf("getStateByRangeAndDecrypt failed, err %+v", err)) + } + + return shim.Success(bytes) +} + +// Invoke for this chaincode exposes functions to ENCRYPT, DECRYPT transactional +// data. It also supports an example to ENCRYPT and SIGN and DECRYPT and +// VERIFY. The Initialization Vector (IV) can be passed in as a parm to +// ensure peers have deterministic data. +func (t *EncCC) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + // get arguments and transient + f, args := stub.GetFunctionAndParameters() + tMap, err := stub.GetTransient() + if err != nil { + return shim.Error(fmt.Sprintf("Could not retrieve transient, err %s", err)) + } + + switch f { + case "ENCRYPT": + // make sure there's a key in transient - the assumption is that + // it's associated to the string "ENCKEY" + if _, in := tMap[ENCKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient encryption key %s", ENCKEY)) + } + + return t.Encrypter(stub, args[0:], tMap[ENCKEY], tMap[IV]) + case "DECRYPT": + + // make sure there's a key in transient - the assumption is that + // it's associated to the string "DECKEY" + if _, in := tMap[DECKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient decryption key %s", DECKEY)) + } + + return t.Decrypter(stub, args[0:], tMap[DECKEY], tMap[IV]) + case "ENCRYPTSIGN": + // make sure keys are there in the transient map - the assumption is that they + // are associated to the string "ENCKEY" and "SIGKEY" + if _, in := tMap[ENCKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", ENCKEY)) + } else if _, in := tMap[SIGKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", SIGKEY)) + } + + return t.EncrypterSigner(stub, args[0:], tMap[ENCKEY], tMap[SIGKEY]) + case "DECRYPTVERIFY": + // make sure keys are there in the transient map - the assumption is that they + // are associated to the string "DECKEY" and "VERKEY" + if _, in := tMap[DECKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", DECKEY)) + } else if _, in := tMap[VERKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", VERKEY)) + } + + return t.DecrypterVerify(stub, args[0:], tMap[DECKEY], tMap[VERKEY]) + case "RANGEQUERY": + // make sure there's a key in transient - the assumption is that + // it's associated to the string "ENCKEY" + if _, in := tMap[DECKEY]; !in { + return shim.Error(fmt.Sprintf("Expected transient key %s", DECKEY)) + } + + return t.RangeDecrypter(stub, tMap[DECKEY]) + default: + return shim.Error(fmt.Sprintf("Unsupported function %s", f)) + } +} + +func main() { + factory.InitFactories(nil) + + err := shim.Start(&EncCC{factory.GetDefault()}) + if err != nil { + fmt.Printf("Error starting EncCC chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/enccc_example/enccc_test.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/enccc_example/enccc_test.go new file mode 100644 index 00000000..7daf2813 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/enccc_example/enccc_test.go @@ -0,0 +1,234 @@ +package main + +import ( + "bytes" + "encoding/json" + "testing" + + "github.com/hyperledger/fabric/bccsp/factory" + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/stretchr/testify/assert" +) + +const ( + AESKEY1 = "01234567890123456789012345678901" + AESKEY2 = "01234567890123456789012345678902" + ECDSAKEY1 = `-----BEGIN EC PRIVATE KEY----- +MHcCAQEEIH4Uv66F9kZMdOQxwNegkGm8c3AB3nGPOtxNKi6wb/ZooAoGCCqGSM49 +AwEHoUQDQgAEEPE+VLOh+e4NpwIjI/b/fKYHi4weU7r9OTEYPiAJiJBQY6TZnvF5 +oRMvwO4MCYxFtpIRO4UxIgcZBj4NCBxKqQ== +-----END EC PRIVATE KEY-----` + ECDSAKEY2 = `-----BEGIN EC PRIVATE KEY----- +MHcCAQEEIE8Seyc9TXx+yQfnGPuzjkuEfMbkq203IYdfyvMd0r3OoAoGCCqGSM49 +AwEHoUQDQgAE4dcGMMroH2LagI/s5i/Bx4t4ggGDoJPNVkKBDBlIaMYjJFYD1obk +JOWqAZxKKsBxBC5Ssu+fS26VPfdNWxDsFQ== +-----END EC PRIVATE KEY-----` + IV1 = "0123456789012345" +) + +func TestInit(t *testing.T) { + factory.InitFactories(nil) + + scc := new(EncCC) + stub := shim.NewMockStub("enccc", scc) + stub.MockTransactionStart("a") + res := scc.Init(stub) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) +} + +// unfortunately we can't tese this cc though invoke since the +// mock shim doesn't support transient. We test failure scenarios +// and the tests below focus on the functionality by invoking +// functions as opposed to cc +func TestInvoke(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + res := stub.MockInvoke("tx", [][]byte{[]byte("barf")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) + res = stub.MockInvoke("tx", [][]byte{[]byte("ENC")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) + res = stub.MockInvoke("tx", [][]byte{[]byte("SIG")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) + res = stub.MockInvoke("tx", [][]byte{[]byte("RANGE")}) + assert.NotEqual(t, res.Status, int32(shim.OK)) +} + +func TestEnc(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + // success + stub.MockTransactionStart("a") + res := scc.Encrypter(stub, []string{"key", "value"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // fail - bad key + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key", "value"}, []byte("badkey"), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - not enough args + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // success + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{"key"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + assert.True(t, bytes.Equal(res.Payload, []byte("value"))) + + // fail - not enough args + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad kvs key + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{"badkey"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad key + stub.MockTransactionStart("a") + res = scc.Decrypter(stub, []string{"key"}, []byte(AESKEY2), nil) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) +} + +func TestSig(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + // success + stub.MockTransactionStart("a") + res := scc.EncrypterSigner(stub, []string{"key", "value"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // fail - bad key + stub.MockTransactionStart("a") + res = scc.EncrypterSigner(stub, []string{"key", "value"}, []byte(AESKEY1), []byte("barf")) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad args + stub.MockTransactionStart("a") + res = scc.EncrypterSigner(stub, []string{"key"}, []byte(AESKEY1), []byte("barf")) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad signing key + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{"key"}, []byte(AESKEY1), []byte(ECDSAKEY2)) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad args + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // fail - bad kvs key + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{"badkey"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // success + stub.MockTransactionStart("a") + res = scc.EncrypterSigner(stub, []string{"key", "value"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // success + stub.MockTransactionStart("a") + res = scc.DecrypterVerify(stub, []string{"key"}, []byte(AESKEY1), []byte(ECDSAKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + assert.True(t, bytes.Equal(res.Payload, []byte("value"))) +} + +func TestEncCC_RangeDecrypter(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + stub.MockTransactionStart("a") + res := scc.Encrypter(stub, []string{"key1", "value1"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key2", "value2"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key3", "value3"}, []byte(AESKEY1), nil) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + // failed range query + res = scc.RangeDecrypter(stub, nil) + assert.NotEqual(t, res.Status, int32(shim.OK)) + + // success range query + stub.MockTransactionStart("a") + res = scc.RangeDecrypter(stub, []byte(AESKEY1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + keys := []keyValuePair{} + err := json.Unmarshal(res.Payload, &keys) + assert.NoError(t, err) + assert.Equal(t, keys[0].Key, "key1") + assert.Equal(t, string(keys[0].Value), "value1") + assert.Equal(t, keys[1].Key, "key2") + assert.Equal(t, string(keys[1].Value), "value2") + assert.Equal(t, keys[2].Key, "key3") + assert.Equal(t, string(keys[2].Value), "value3") + + _, err = getStateByRangeAndDecrypt(stub, nil, string([]byte{0}), string([]byte{0})) + assert.Error(t, err) +} + +func TestDeterministicEncryption(t *testing.T) { + factory.InitFactories(nil) + + scc := &EncCC{factory.GetDefault()} + stub := shim.NewMockStub("enccc", scc) + + stub.MockTransactionStart("a") + res := scc.Encrypter(stub, []string{"key1", "value1"}, []byte(AESKEY1), []byte(IV1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + c1, err := stub.GetState("key1") + assert.NoError(t, err) + assert.NotNil(t, c1) + + stub.MockTransactionStart("a") + res = scc.Encrypter(stub, []string{"key1", "value1"}, []byte(AESKEY1), []byte(IV1)) + stub.MockTransactionEnd("a") + assert.Equal(t, res.Status, int32(shim.OK)) + + c2, err := stub.GetState("key1") + assert.NoError(t, err) + assert.NotNil(t, c1) + assert.True(t, bytes.Equal(c1, c2)) +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/enccc_example/utils.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/enccc_example/utils.go new file mode 100644 index 00000000..9af6e6fa --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/enccc_example/utils.go @@ -0,0 +1,147 @@ +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "encoding/json" + + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/core/chaincode/shim/ext/entities" + "github.com/pkg/errors" +) + +// the functions below show some best practices on how +// to use entities to perform cryptographic operations +// over the ledger state + +// getStateAndDecrypt retrieves the value associated to key, +// decrypts it with the supplied entity and returns the result +// of the decryption +func getStateAndDecrypt(stub shim.ChaincodeStubInterface, ent entities.Encrypter, key string) ([]byte, error) { + // at first we retrieve the ciphertext from the ledger + ciphertext, err := stub.GetState(key) + if err != nil { + return nil, err + } + + // GetState will return a nil slice if the key does not exist. + // Note that the chaincode logic may want to distinguish between + // nil slice (key doesn't exist in state db) and empty slice + // (key found in state db but value is empty). We do not + // distinguish the case here + if len(ciphertext) == 0 { + return nil, errors.New("no ciphertext to decrypt") + } + + return ent.Decrypt(ciphertext) +} + +// encryptAndPutState encrypts the supplied value using the +// supplied entity and puts it to the ledger associated to +// the supplied KVS key +func encryptAndPutState(stub shim.ChaincodeStubInterface, ent entities.Encrypter, key string, value []byte) error { + // at first we use the supplied entity to encrypt the value + ciphertext, err := ent.Encrypt(value) + if err != nil { + return err + } + + return stub.PutState(key, ciphertext) +} + +// getStateDecryptAndVerify retrieves the value associated to key, +// decrypts it with the supplied entity, verifies the signature +// over it and returns the result of the decryption in case of +// success +func getStateDecryptAndVerify(stub shim.ChaincodeStubInterface, ent entities.EncrypterSignerEntity, key string) ([]byte, error) { + // here we retrieve and decrypt the state associated to key + val, err := getStateAndDecrypt(stub, ent, key) + if err != nil { + return nil, err + } + + // we unmarshal a SignedMessage from the decrypted state + msg := &entities.SignedMessage{} + err = msg.FromBytes(val) + if err != nil { + return nil, err + } + + // we verify the signature + ok, err := msg.Verify(ent) + if err != nil { + return nil, err + } else if !ok { + return nil, errors.New("invalid signature") + } + + return msg.Payload, nil +} + +// signEncryptAndPutState signs the supplied value, encrypts +// the supplied value together with its signature using the +// supplied entity and puts it to the ledger associated to +// the supplied KVS key +func signEncryptAndPutState(stub shim.ChaincodeStubInterface, ent entities.EncrypterSignerEntity, key string, value []byte) error { + // here we create a SignedMessage, set its payload + // to value and the ID of the entity and + // sign it with the entity + msg := &entities.SignedMessage{Payload: value, ID: []byte(ent.ID())} + err := msg.Sign(ent) + if err != nil { + return err + } + + // here we serialize the SignedMessage + b, err := msg.ToBytes() + if err != nil { + return err + } + + // here we encrypt the serialized version associated to args[0] + return encryptAndPutState(stub, ent, key, b) +} + +type keyValuePair struct { + Key string `json:"key"` + Value string `json:"value"` +} + +// getStateByRangeAndDecrypt retrieves a range of KVS pairs from the +// ledger and decrypts each value with the supplied entity; it returns +// a json-marshalled slice of keyValuePair +func getStateByRangeAndDecrypt(stub shim.ChaincodeStubInterface, ent entities.Encrypter, startKey, endKey string) ([]byte, error) { + // we call get state by range to go through the entire range + iterator, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return nil, err + } + defer iterator.Close() + + // we decrypt each entry - the assumption is that they have all been encrypted with the same key + keyvalueset := []keyValuePair{} + for iterator.HasNext() { + el, err := iterator.Next() + if err != nil { + return nil, err + } + + v, err := ent.Decrypt(el.Value) + if err != nil { + return nil, err + } + + keyvalueset = append(keyvalueset, keyValuePair{el.Key, string(v)}) + } + + bytes, err := json.Marshal(keyvalueset) + if err != nil { + return nil, err + } + + return bytes, nil +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/eventsender/eventsender.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/eventsender/eventsender.go new file mode 100644 index 00000000..45606252 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/eventsender/eventsender.go @@ -0,0 +1,92 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// EventSender example simple Chaincode implementation +type EventSender struct { +} + +// Init function +func (t *EventSender) Init(stub shim.ChaincodeStubInterface) pb.Response { + err := stub.PutState("noevents", []byte("0")) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// Invoke function +func (t *EventSender) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + b, err := stub.GetState("noevents") + if err != nil { + return shim.Error("Failed to get state") + } + noevts, _ := strconv.Atoi(string(b)) + + tosend := "Event " + string(b) + for _, s := range args { + tosend = tosend + "," + s + } + + err = stub.PutState("noevents", []byte(strconv.Itoa(noevts+1))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.SetEvent("evtsender", []byte(tosend)) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(nil) +} + +// Query function +func (t *EventSender) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + b, err := stub.GetState("noevents") + if err != nil { + return shim.Error("Failed to get state") + } + jsonResp := "{\"NoEvents\":\"" + string(b) + "\"}" + return shim.Success([]byte(jsonResp)) +} + +func (t *EventSender) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "invoke" { + return t.invoke(stub, args) + } else if function == "query" { + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"invoke\" \"query\"") +} + +func main() { + err := shim.Start(new(EventSender)) + if err != nil { + fmt.Printf("Error starting EventSender chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go new file mode 100644 index 00000000..78d4ec61 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue.go @@ -0,0 +1,133 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strconv" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init method of chaincode +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + _, args := stub.GetFunctionAndParameters() + var A, B string // Entities + var Aval, Bval int // Asset holdings + var err error + + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // Initialize the chaincode + A = args[0] + Aval, err = strconv.Atoi(args[1]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + B = args[2] + Bval, err = strconv.Atoi(args[3]) + if err != nil { + return shim.Error("Expecting integer value for asset holding") + } + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success([]byte("OK")) +} + +// Invoke transaction makes payment of X units from A to B +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + _, args := stub.GetFunctionAndParameters() + + var A, B string // Entities + var Aval, Bval int // Asset holdings + var X int // Transaction value + var err error + + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + A = args[0] + B = args[1] + + // Get the state from the ledger + // TODO: will be nice to have a GetAllState call to ledger + Avalbytes, err := stub.GetState(A) + if err != nil { + return shim.Error("Failed to get state") + } + if Avalbytes == nil { + return shim.Error("Entity not found") + } + Aval, _ = strconv.Atoi(string(Avalbytes)) + + Bvalbytes, err := stub.GetState(B) + if err != nil { + return shim.Error("Failed to get state") + } + if Bvalbytes == nil { + return shim.Error("Entity not found") + } + Bval, _ = strconv.Atoi(string(Bvalbytes)) + + // Perform the execution + X, err = strconv.Atoi(args[2]) + if err != nil { + return shim.Error("Invalid transaction amount, expecting a integer value") + } + Aval = Aval - X + Bval = Bval + X + fmt.Printf("Aval = %d, Bval = %d\n", Aval, Bval) + + // Write the state back to the ledger + err = stub.PutState(A, []byte(strconv.Itoa(Aval))) + if err != nil { + return shim.Error(err.Error()) + } + + err = stub.PutState(B, []byte(strconv.Itoa(Bval))) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success([]byte(fmt.Sprintf("{%d,%d}", Aval, Bval))) +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go new file mode 100644 index 00000000..1d9d1e1f --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/invokereturnsvalue/invokereturnsvalue_test.go @@ -0,0 +1,97 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ +package main + +import ( + "fmt" + "testing" + + "github.com/hyperledger/fabric/core/chaincode/shim" +) + +func checkInit(t *testing.T, stub *shim.MockStub, args [][]byte, retval []byte) { + res := stub.MockInit("1", args) + if res.Status != shim.OK { + fmt.Println("Init failed", string(res.Message)) + t.FailNow() + } + if retval != nil { + if res.Payload == nil { + fmt.Printf("Init returned nil, expected %s", string(retval)) + t.FailNow() + } + if string(res.Payload) != string(retval) { + fmt.Printf("Init returned %s, expected %s", string(res.Payload), string(retval)) + t.FailNow() + } + } +} + +func checkState(t *testing.T, stub *shim.MockStub, name string, value string) { + bytes := stub.State[name] + if bytes == nil { + fmt.Println("State", name, "failed to get value") + t.FailNow() + } + if string(bytes) != value { + fmt.Println("State value", name, "was not", value, "as expected") + t.FailNow() + } +} + +func checkInvoke(t *testing.T, stub *shim.MockStub, args [][]byte, retval []byte) { + res := stub.MockInvoke("1", args) + if res.Status != shim.OK { + fmt.Println("Invoke", args, "failed", string(res.Message)) + t.FailNow() + } + + if retval != nil { + if res.Payload == nil { + fmt.Printf("Invoke returned nil, expected %s", string(retval)) + t.FailNow() + } + if string(res.Payload) != string(retval) { + fmt.Printf("Invoke returned %s, expected %s", string(res.Payload), string(retval)) + t.FailNow() + } + } +} + +func Test_Init(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=123 B=234 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("123"), []byte("B"), []byte("234")}, []byte("OK")) + + checkState(t, stub, "A", "123") + checkState(t, stub, "B", "234") +} + +func Test_Invoke(t *testing.T) { + scc := new(SimpleChaincode) + stub := shim.NewMockStub("ex02", scc) + + // Init A=567 B=678 + checkInit(t, stub, [][]byte{[]byte("init"), []byte("A"), []byte("567"), []byte("B"), []byte("678")}, []byte("OK")) + + // Invoke A->B for 123 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("A"), []byte("B"), []byte("123")}, []byte("{444,801}")) + + // Invoke B->A for 234 + checkInvoke(t, stub, [][]byte{[]byte("invoke"), []byte("B"), []byte("A"), []byte("234")}, []byte("{567,678}")) +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/map/map.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/map/map.go new file mode 100644 index 00000000..b45b8471 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/map/map.go @@ -0,0 +1,200 @@ +// +build !experimental + +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "encoding/json" + "fmt" + "strconv" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode implements a simple map that is stored in the state. +// The following operations are available. + +// Invoke operations +// put - requires two arguments, a key and value +// remove - requires a key +// get - requires one argument, a key, and returns a value +// keys - requires no arguments, returns all keys + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init is a no-op +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke has two functions +// put - takes two arguments, a key and value, and stores them in the state +// remove - takes one argument, a key, and removes if from the state +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + switch function { + + case "put": + if len(args) < 2 { + return shim.Error("put operation must include two arguments: [key, value]") + } + key := args[0] + value := args[1] + + if err := stub.PutState(key, []byte(value)); err != nil { + fmt.Printf("Error putting state %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state: %s", err)) + } + + indexName := "compositeKeyTest" + compositeKeyTestIndex, err := stub.CreateCompositeKey(indexName, []string{key}) + if err != nil { + return shim.Error(err.Error()) + } + + valueByte := []byte{0x00} + if err := stub.PutState(compositeKeyTestIndex, valueByte); err != nil { + fmt.Printf("Error putting state with compositeKey %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state with compositeKey: %s", err)) + } + + return shim.Success(nil) + + case "remove": + if len(args) < 1 { + return shim.Error("remove operation must include one argument: [key]") + } + key := args[0] + + err := stub.DelState(key) + if err != nil { + return shim.Error(fmt.Sprintf("remove operation failed. Error updating state: %s", err)) + } + return shim.Success(nil) + + case "get": + if len(args) < 1 { + return shim.Error("get operation must include one argument, a key") + } + key := args[0] + value, err := stub.GetState(key) + if err != nil { + return shim.Error(fmt.Sprintf("get operation failed. Error accessing state: %s", err)) + } + jsonVal, err := json.Marshal(string(value)) + return shim.Success(jsonVal) + + case "keys": + if len(args) < 2 { + return shim.Error("put operation must include two arguments, a key and value") + } + startKey := args[0] + endKey := args[1] + + //sleep needed to test peer's timeout behavior when using iterators + stime := 0 + if len(args) > 2 { + stime, _ = strconv.Atoi(args[2]) + } + + keysIter, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + //if sleeptime is specied, take a nap + if stime > 0 { + time.Sleep(time.Duration(stime) * time.Millisecond) + } + + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + for key, value := range keys { + fmt.Printf("key %d contains %s\n", key, value) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "query": + query := args[0] + keysIter, err := stub.GetQueryResult(query) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "history": + key := args[0] + keysIter, err := stub.GetHistoryForKey(key) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.TxId) + } + + for key, txID := range keys { + fmt.Printf("key %d contains %s\n", key, txID) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + default: + return shim.Success([]byte("Unsupported operation")) + } +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/map/map_experimental.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/map/map_experimental.go new file mode 100644 index 00000000..16c9780f --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/map/map_experimental.go @@ -0,0 +1,311 @@ +// +build experimental + +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +package main + +import ( + "encoding/json" + "fmt" + "strconv" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// This chaincode implements a simple map that is stored in the state. +// The following operations are available. + +// Invoke operations +// put - requires two arguments, a key and value +// remove - requires a key +// get - requires one argument, a key, and returns a value +// keys - requires no arguments, returns all keys + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init is a no-op +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke has two functions +// put - takes two arguments, a key and value, and stores them in the state +// remove - takes one argument, a key, and removes if from the state +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + switch function { + + case "putPrivate": + if len(args) < 3 { + return shim.Error("put operation on private data must include three arguments: [collection, key, value]") + } + collection := args[0] + key := args[1] + value := args[2] + + if err := stub.PutPrivateData(collection, key, []byte(value)); err != nil { + fmt.Printf("Error putting private data%s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state: %s", err)) + } + + return shim.Success(nil) + + case "removePrivate": + if len(args) < 2 { + return shim.Error("remove operation on private data must include two arguments: [collection, key]") + } + collection := args[0] + key := args[1] + + err := stub.DelPrivateData(collection, key) + if err != nil { + return shim.Error(fmt.Sprintf("remove operation on private data failed. Error updating state: %s", err)) + } + return shim.Success(nil) + + case "getPrivate": + if len(args) < 2 { + return shim.Error("get operation on private data must include two arguments: [collection, key]") + } + collection := args[0] + key := args[1] + value, err := stub.GetPrivateData(collection, key) + if err != nil { + return shim.Error(fmt.Sprintf("get operation on private data failed. Error accessing state: %s", err)) + } + jsonVal, err := json.Marshal(string(value)) + return shim.Success(jsonVal) + + case "keysPrivate": + if len(args) < 3 { + return shim.Error("range query operation on private data must include three arguments, a collection, key and value") + } + collection := args[0] + startKey := args[1] + endKey := args[2] + + //sleep needed to test peer's timeout behavior when using iterators + stime := 0 + if len(args) > 3 { + stime, _ = strconv.Atoi(args[3]) + } + + keysIter, err := stub.GetPrivateDataByRange(collection, startKey, endKey) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed on private data. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + //if sleeptime is specied, take a nap + if stime > 0 { + time.Sleep(time.Duration(stime) * time.Millisecond) + } + + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("keys operation on private data failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + for key, value := range keys { + fmt.Printf("key %d contains %s\n", key, value) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation on private data failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + case "queryPrivate": + collection := args[0] + query := args[1] + keysIter, err := stub.GetPrivateDataQueryResult(collection, query) + if err != nil { + return shim.Error(fmt.Sprintf("query operation on private data failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation on private data failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation on private data failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + case "put": + if len(args) < 2 { + return shim.Error("put operation must include two arguments: [key, value]") + } + key := args[0] + value := args[1] + + if err := stub.PutState(key, []byte(value)); err != nil { + fmt.Printf("Error putting state %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state: %s", err)) + } + + indexName := "compositeKeyTest" + compositeKeyTestIndex, err := stub.CreateCompositeKey(indexName, []string{key}) + if err != nil { + return shim.Error(err.Error()) + } + + valueByte := []byte{0x00} + if err := stub.PutState(compositeKeyTestIndex, valueByte); err != nil { + fmt.Printf("Error putting state with compositeKey %s", err) + return shim.Error(fmt.Sprintf("put operation failed. Error updating state with compositeKey: %s", err)) + } + + return shim.Success(nil) + + case "remove": + if len(args) < 1 { + return shim.Error("remove operation must include one argument: [key]") + } + key := args[0] + + err := stub.DelState(key) + if err != nil { + return shim.Error(fmt.Sprintf("remove operation failed. Error updating state: %s", err)) + } + return shim.Success(nil) + + case "get": + if len(args) < 1 { + return shim.Error("get operation must include one argument, a key") + } + key := args[0] + value, err := stub.GetState(key) + if err != nil { + return shim.Error(fmt.Sprintf("get operation failed. Error accessing state: %s", err)) + } + jsonVal, err := json.Marshal(string(value)) + return shim.Success(jsonVal) + + case "keys": + if len(args) < 2 { + return shim.Error("put operation must include two arguments, a key and value") + } + startKey := args[0] + endKey := args[1] + + //sleep needed to test peer's timeout behavior when using iterators + stime := 0 + if len(args) > 2 { + stime, _ = strconv.Atoi(args[2]) + } + + keysIter, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + //if sleeptime is specied, take a nap + if stime > 0 { + time.Sleep(time.Duration(stime) * time.Millisecond) + } + + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + for key, value := range keys { + fmt.Printf("key %d contains %s\n", key, value) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("keys operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "query": + query := args[0] + keysIter, err := stub.GetQueryResult(query) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.Key) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + case "history": + key := args[0] + keysIter, err := stub.GetHistoryForKey(key) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + defer keysIter.Close() + + var keys []string + for keysIter.HasNext() { + response, iterErr := keysIter.Next() + if iterErr != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error accessing state: %s", err)) + } + keys = append(keys, response.TxId) + } + + for key, txID := range keys { + fmt.Printf("key %d contains %s\n", key, txID) + } + + jsonKeys, err := json.Marshal(keys) + if err != nil { + return shim.Error(fmt.Sprintf("query operation failed. Error marshaling JSON: %s", err)) + } + + return shim.Success(jsonKeys) + + default: + return shim.Success([]byte("Unsupported operation")) + } +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/marbles02/marbles_chaincode.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/marbles02/marbles_chaincode.go new file mode 100644 index 00000000..4ea4654a --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/marbles02/marbles_chaincode.go @@ -0,0 +1,627 @@ +/* +Licensed to the Apache Software Foundation (ASF) under one +or more contributor license agreements. See the NOTICE file +distributed with this work for additional information +regarding copyright ownership. The ASF licenses this file +to you under the Apache License, Version 2.0 (the +"License"); you may not use this file except in compliance +with the License. You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, +software distributed under the License is distributed on an +"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY +KIND, either express or implied. See the License for the +specific language governing permissions and limitations +under the License. +*/ + +// ====CHAINCODE EXECUTION SAMPLES (CLI) ================== + +// ==== Invoke marbles ==== +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["initMarble","marble1","blue","35","tom"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["initMarble","marble2","red","50","tom"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["initMarble","marble3","blue","70","tom"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["transferMarble","marble2","jerry"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["transferMarblesBasedOnColor","blue","jerry"]}' +// peer chaincode invoke -C myc1 -n marbles -c '{"Args":["delete","marble1"]}' + +// ==== Query marbles ==== +// peer chaincode query -C myc1 -n marbles -c '{"Args":["readMarble","marble1"]}' +// peer chaincode query -C myc1 -n marbles -c '{"Args":["getMarblesByRange","marble1","marble3"]}' +// peer chaincode query -C myc1 -n marbles -c '{"Args":["getHistoryForMarble","marble1"]}' + +// Rich Query (Only supported if CouchDB is used as state database): +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarblesByOwner","tom"]}' +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarbles","{\"selector\":{\"owner\":\"tom\"}}"]}' + +//The following examples demonstrate creating indexes on CouchDB +//Example hostname:port configurations +// +//Docker or vagrant environments: +// http://couchdb:5984/ +// +//Inside couchdb docker container +// http://127.0.0.1:5984/ + +// Index for chaincodeid, docType, owner. +// Note that docType and owner fields must be prefixed with the "data" wrapper +// chaincodeid must be added for all queries +// +// Definition for use with Fauxton interface +// {"index":{"fields":["chaincodeid","data.docType","data.owner"]},"ddoc":"indexOwnerDoc", "name":"indexOwner","type":"json"} +// +// example curl definition for use with command line +// curl -i -X POST -H "Content-Type: application/json" -d "{\"index\":{\"fields\":[\"chaincodeid\",\"data.docType\",\"data.owner\"]},\"name\":\"indexOwner\",\"ddoc\":\"indexOwnerDoc\",\"type\":\"json\"}" http://hostname:port/myc1/_index +// + +// Index for chaincodeid, docType, owner, size (descending order). +// Note that docType, owner and size fields must be prefixed with the "data" wrapper +// chaincodeid must be added for all queries +// +// Definition for use with Fauxton interface +// {"index":{"fields":[{"data.size":"desc"},{"chaincodeid":"desc"},{"data.docType":"desc"},{"data.owner":"desc"}]},"ddoc":"indexSizeSortDoc", "name":"indexSizeSortDesc","type":"json"} +// +// example curl definition for use with command line +// curl -i -X POST -H "Content-Type: application/json" -d "{\"index\":{\"fields\":[{\"data.size\":\"desc\"},{\"chaincodeid\":\"desc\"},{\"data.docType\":\"desc\"},{\"data.owner\":\"desc\"}]},\"ddoc\":\"indexSizeSortDoc\", \"name\":\"indexSizeSortDesc\",\"type\":\"json\"}" http://hostname:port/myc1/_index + +// Rich Query with index design doc and index name specified (Only supported if CouchDB is used as state database): +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":\"marble\",\"owner\":\"tom\"}, \"use_index\":[\"_design/indexOwnerDoc\", \"indexOwner\"]}"]}' + +// Rich Query with index design doc specified only (Only supported if CouchDB is used as state database): +// peer chaincode query -C myc1 -n marbles -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":{\"$eq\":\"marble\"},\"owner\":{\"$eq\":\"tom\"},\"size\":{\"$gt\":0}},\"fields\":[\"docType\",\"owner\",\"size\"],\"sort\":[{\"size\":\"desc\"}],\"use_index\":\"_design/indexSizeSortDoc\"}"]}' + +package main + +import ( + "bytes" + "encoding/json" + "fmt" + "strconv" + "strings" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +type marble struct { + ObjectType string `json:"docType"` //docType is used to distinguish the various types of objects in state database + Name string `json:"name"` //the fieldtags are needed to keep case from bouncing around + Color string `json:"color"` + Size int `json:"size"` + Owner string `json:"owner"` +} + +// =================================================================================== +// Main +// =================================================================================== +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} + +// Init initializes chaincode +// =========================== +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke - Our entry point for Invocations +// ======================================== +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + fmt.Println("invoke is running " + function) + + // Handle different functions + if function == "initMarble" { //create a new marble + return t.initMarble(stub, args) + } else if function == "transferMarble" { //change owner of a specific marble + return t.transferMarble(stub, args) + } else if function == "transferMarblesBasedOnColor" { //transfer all marbles of a certain color + return t.transferMarblesBasedOnColor(stub, args) + } else if function == "delete" { //delete a marble + return t.delete(stub, args) + } else if function == "readMarble" { //read a marble + return t.readMarble(stub, args) + } else if function == "queryMarblesByOwner" { //find marbles for owner X using rich query + return t.queryMarblesByOwner(stub, args) + } else if function == "queryMarbles" { //find marbles based on an ad hoc rich query + return t.queryMarbles(stub, args) + } else if function == "getHistoryForMarble" { //get history of values for a marble + return t.getHistoryForMarble(stub, args) + } else if function == "getMarblesByRange" { //get marbles based on range query + return t.getMarblesByRange(stub, args) + } + + fmt.Println("invoke did not find func: " + function) //error + return shim.Error("Received unknown function invocation") +} + +// ============================================================ +// initMarble - create a new marble, store into chaincode state +// ============================================================ +func (t *SimpleChaincode) initMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var err error + + // 0 1 2 3 + // "asdf", "blue", "35", "bob" + if len(args) != 4 { + return shim.Error("Incorrect number of arguments. Expecting 4") + } + + // ==== Input sanitation ==== + fmt.Println("- start init marble") + if len(args[0]) <= 0 { + return shim.Error("1st argument must be a non-empty string") + } + if len(args[1]) <= 0 { + return shim.Error("2nd argument must be a non-empty string") + } + if len(args[2]) <= 0 { + return shim.Error("3rd argument must be a non-empty string") + } + if len(args[3]) <= 0 { + return shim.Error("4th argument must be a non-empty string") + } + marbleName := args[0] + color := strings.ToLower(args[1]) + owner := strings.ToLower(args[3]) + size, err := strconv.Atoi(args[2]) + if err != nil { + return shim.Error("3rd argument must be a numeric string") + } + + // ==== Check if marble already exists ==== + marbleAsBytes, err := stub.GetState(marbleName) + if err != nil { + return shim.Error("Failed to get marble: " + err.Error()) + } else if marbleAsBytes != nil { + fmt.Println("This marble already exists: " + marbleName) + return shim.Error("This marble already exists: " + marbleName) + } + + // ==== Create marble object and marshal to JSON ==== + objectType := "marble" + marble := &marble{objectType, marbleName, color, size, owner} + marbleJSONasBytes, err := json.Marshal(marble) + if err != nil { + return shim.Error(err.Error()) + } + //Alternatively, build the marble json string manually if you don't want to use struct marshalling + //marbleJSONasString := `{"docType":"Marble", "name": "` + marbleName + `", "color": "` + color + `", "size": ` + strconv.Itoa(size) + `, "owner": "` + owner + `"}` + //marbleJSONasBytes := []byte(str) + + // === Save marble to state === + err = stub.PutState(marbleName, marbleJSONasBytes) + if err != nil { + return shim.Error(err.Error()) + } + + // ==== Index the marble to enable color-based range queries, e.g. return all blue marbles ==== + // An 'index' is a normal key/value entry in state. + // The key is a composite key, with the elements that you want to range query on listed first. + // In our case, the composite key is based on indexName~color~name. + // This will enable very efficient state range queries based on composite keys matching indexName~color~* + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marble.Color, marble.Name}) + if err != nil { + return shim.Error(err.Error()) + } + // Save index entry to state. Only the key name is needed, no need to store a duplicate copy of the marble. + // Note - passing a 'nil' value will effectively delete the key from state, therefore we pass null character as value + value := []byte{0x00} + stub.PutState(colorNameIndexKey, value) + + // ==== Marble saved and indexed. Return success ==== + fmt.Println("- end init marble") + return shim.Success(nil) +} + +// =============================================== +// readMarble - read a marble from chaincode state +// =============================================== +func (t *SimpleChaincode) readMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var name, jsonResp string + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the marble to query") + } + + name = args[0] + valAsbytes, err := stub.GetState(name) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + name + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + name + "\"}" + return shim.Error(jsonResp) + } + + return shim.Success(valAsbytes) +} + +// ================================================== +// delete - remove a marble key/value pair from state +// ================================================== +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var jsonResp string + var marbleJSON marble + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + marbleName := args[0] + + // to maintain the color~name index, we need to read the marble first and get its color + valAsbytes, err := stub.GetState(marbleName) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + marbleName + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = json.Unmarshal([]byte(valAsbytes), &marbleJSON) + if err != nil { + jsonResp = "{\"Error\":\"Failed to decode JSON of: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = stub.DelState(marbleName) //remove the marble from chaincode state + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + + // maintain the index + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marbleJSON.Color, marbleJSON.Name}) + if err != nil { + return shim.Error(err.Error()) + } + + // Delete index entry to state. + err = stub.DelState(colorNameIndexKey) + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + return shim.Success(nil) +} + +// =========================================================== +// transfer a marble by setting a new owner name on the marble +// =========================================================== +func (t *SimpleChaincode) transferMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "name", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + marbleName := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarble ", marbleName, newOwner) + + marbleAsBytes, err := stub.GetState(marbleName) + if err != nil { + return shim.Error("Failed to get marble:" + err.Error()) + } else if marbleAsBytes == nil { + return shim.Error("Marble does not exist") + } + + marbleToTransfer := marble{} + err = json.Unmarshal(marbleAsBytes, &marbleToTransfer) //unmarshal it aka JSON.parse() + if err != nil { + return shim.Error(err.Error()) + } + marbleToTransfer.Owner = newOwner //change the owner + + marbleJSONasBytes, _ := json.Marshal(marbleToTransfer) + err = stub.PutState(marbleName, marbleJSONasBytes) //rewrite the marble + if err != nil { + return shim.Error(err.Error()) + } + + fmt.Println("- end transferMarble (success)") + return shim.Success(nil) +} + +// =========================================================================================== +// getMarblesByRange performs a range query based on the start and end keys provided. + +// Read-only function results are not typically submitted to ordering. If the read-only +// results are submitted to ordering, or if the query is used in an update transaction +// and submitted to ordering, then the committing peers will re-execute to guarantee that +// result sets are stable between endorsement time and commit time. The transaction is +// invalidated by the committing peers if the result set has changed between endorsement +// time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) getMarblesByRange(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + startKey := args[0] + endKey := args[1] + + resultsIterator, err := stub.GetStateByRange(startKey, endKey) + if err != nil { + return shim.Error(err.Error()) + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryResults + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getMarblesByRange queryResult:\n%s\n", buffer.String()) + + return shim.Success(buffer.Bytes()) +} + +// ==== Example: GetStateByPartialCompositeKey/RangeQuery ========================================= +// transferMarblesBasedOnColor will transfer marbles of a given color to a certain new owner. +// Uses a GetStateByPartialCompositeKey (range query) against color~name 'index'. +// Committing peers will re-execute range queries to guarantee that result sets are stable +// between endorsement time and commit time. The transaction is invalidated by the +// committing peers if the result set has changed between endorsement time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) transferMarblesBasedOnColor(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "color", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + color := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarblesBasedOnColor ", color, newOwner) + + // Query the color~name index by color + // This will execute a key range query on all keys starting with 'color' + coloredMarbleResultsIterator, err := stub.GetStateByPartialCompositeKey("color~name", []string{color}) + if err != nil { + return shim.Error(err.Error()) + } + defer coloredMarbleResultsIterator.Close() + + // Iterate through result set and for each marble found, transfer to newOwner + var i int + for i = 0; coloredMarbleResultsIterator.HasNext(); i++ { + // Note that we don't get the value (2nd return variable), we'll just get the marble name from the composite key + responseRange, err := coloredMarbleResultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + + // get the color and name from color~name composite key + objectType, compositeKeyParts, err := stub.SplitCompositeKey(responseRange.Key) + if err != nil { + return shim.Error(err.Error()) + } + returnedColor := compositeKeyParts[0] + returnedMarbleName := compositeKeyParts[1] + fmt.Printf("- found a marble from index:%s color:%s name:%s\n", objectType, returnedColor, returnedMarbleName) + + // Now call the transfer function for the found marble. + // Re-use the same function that is used to transfer individual marbles + response := t.transferMarble(stub, []string{returnedMarbleName, newOwner}) + // if the transfer failed break out of loop and return error + if response.Status != shim.OK { + return shim.Error("Transfer failed: " + response.Message) + } + } + + responsePayload := fmt.Sprintf("Transferred %d %s marbles to %s", i, color, newOwner) + fmt.Println("- end transferMarblesBasedOnColor: " + responsePayload) + return shim.Success([]byte(responsePayload)) +} + +// =======Rich queries ========================================================================= +// Two examples of rich queries are provided below (parameterized query and ad hoc query). +// Rich queries pass a query string to the state database. +// Rich queries are only supported by state database implementations +// that support rich query (e.g. CouchDB). +// The query string is in the syntax of the underlying state database. +// With rich queries there is no guarantee that the result set hasn't changed between +// endorsement time and commit time, aka 'phantom reads'. +// Therefore, rich queries should not be used in update transactions, unless the +// application handles the possibility of result set changes between endorsement and commit time. +// Rich queries can be used for point-in-time queries against a peer. +// ============================================================================================ + +// ===== Example: Parameterized rich query ================================================= +// queryMarblesByOwner queries for marbles based on a passed in owner. +// This is an example of a parameterized query where the query logic is baked into the chaincode, +// and accepting a single query parameter (owner). +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarblesByOwner(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "bob" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + owner := strings.ToLower(args[0]) + + queryString := fmt.Sprintf("{\"selector\":{\"docType\":\"marble\",\"owner\":\"%s\"}}", owner) + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ===== Example: Ad hoc rich query ======================================================== +// queryMarbles uses a query string to perform a query for marbles. +// Query string matching state database syntax is passed in and executed as is. +// Supports ad hoc queries that can be defined at runtime by the client. +// If this is not desired, follow the queryMarblesForOwner example for parameterized queries. +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarbles(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "queryString" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + queryString := args[0] + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ========================================================================================= +// getQueryResultForQueryString executes the passed in query string. +// Result set is built and returned as a byte array containing the JSON results. +// ========================================================================================= +func getQueryResultForQueryString(stub shim.ChaincodeStubInterface, queryString string) ([]byte, error) { + + fmt.Printf("- getQueryResultForQueryString queryString:\n%s\n", queryString) + + resultsIterator, err := stub.GetQueryResult(queryString) + if err != nil { + return nil, err + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryRecords + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return nil, err + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getQueryResultForQueryString queryResult:\n%s\n", buffer.String()) + + return buffer.Bytes(), nil +} + +func (t *SimpleChaincode) getHistoryForMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + marbleName := args[0] + + fmt.Printf("- start getHistoryForMarble: %s\n", marbleName) + + resultsIterator, err := stub.GetHistoryForKey(marbleName) + if err != nil { + return shim.Error(err.Error()) + } + defer resultsIterator.Close() + + // buffer is a JSON array containing historic values for the marble + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + response, err := resultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"TxId\":") + buffer.WriteString("\"") + buffer.WriteString(response.TxId) + buffer.WriteString("\"") + + buffer.WriteString(", \"Value\":") + // if it was a delete operation on given key, then we need to set the + //corresponding value null. Else, we will write the response.Value + //as-is (as the Value itself a JSON marble) + if response.IsDelete { + buffer.WriteString("null") + } else { + buffer.WriteString(string(response.Value)) + } + + buffer.WriteString(", \"Timestamp\":") + buffer.WriteString("\"") + buffer.WriteString(time.Unix(response.Timestamp.Seconds, int64(response.Timestamp.Nanos)).String()) + buffer.WriteString("\"") + + buffer.WriteString(", \"IsDelete\":") + buffer.WriteString("\"") + buffer.WriteString(strconv.FormatBool(response.IsDelete)) + buffer.WriteString("\"") + + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getHistoryForMarble returning:\n%s\n", buffer.String()) + + return shim.Success(buffer.Bytes()) +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/marbles02_private/collections_config.json b/hyperledger_fabric/v1.4.8/examples/chaincode/go/marbles02_private/collections_config.json new file mode 100644 index 00000000..e26017bd --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/marbles02_private/collections_config.json @@ -0,0 +1,18 @@ +[ + { + "name": "collectionMarbles", + "policy": "OR('Org1MSP.member', 'Org2MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":99999, + "memberOnlyRead": true +}, + { + "name": "collectionMarblePrivateDetails", + "policy": "OR('Org1MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":3, + "memberOnlyRead": true + } +] diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/marbles02_private/collections_config_new.json b/hyperledger_fabric/v1.4.8/examples/chaincode/go/marbles02_private/collections_config_new.json new file mode 100644 index 00000000..33ddd71a --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/marbles02_private/collections_config_new.json @@ -0,0 +1,16 @@ +[ + { + "name": "collectionMarbles", + "policy": "OR('Org1MSP.member', 'Org2MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":99999 +}, + { + "name": "collectionMarblePrivateDetails", + "policy": "OR('Org1MSP.member', 'Org2MSP.member')", + "requiredPeerCount": 0, + "maxPeerCount": 3, + "blockToLive":99999 + } +] diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json b/hyperledger_fabric/v1.4.8/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json new file mode 100644 index 00000000..305f0904 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/marbles02_private/go/META-INF/statedb/couchdb/collections/collectionMarbles/indexes/indexOwner.json @@ -0,0 +1 @@ +{"index":{"fields":["docType","owner"]},"ddoc":"indexOwnerDoc", "name":"indexOwner","type":"json"} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go new file mode 100644 index 00000000..385687c0 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/marbles02_private/go/marbles_chaincode_private.go @@ -0,0 +1,634 @@ +/* +Copyright IBM Corp. All Rights Reserved. + +SPDX-License-Identifier: Apache-2.0 +*/ + +// ====CHAINCODE EXECUTION SAMPLES (CLI) ================== + +// ==== Invoke marbles ==== +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["initMarble","marble1","blue","35","tom","99"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["initMarble","marble2","red","50","tom","102"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["initMarble","marble3","blue","70","tom","103"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["transferMarble","marble2","jerry"]}' +// peer chaincode invoke -C mychannel -n marblesp -c '{"Args":["delete","marble1"]}' + +// ==== Query marbles ==== +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["readMarble","marble1"]}' +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["readMarblePrivateDetails","marble1"]}' +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["getMarblesByRange","marble1","marble3"]}' + +// Rich Query (Only supported if CouchDB is used as state database): +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarblesByOwner","tom"]}' +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarbles","{\"selector\":{\"owner\":\"tom\"}}"]}' + +// INDEXES TO SUPPORT COUCHDB RICH QUERIES +// +// Indexes in CouchDB are required in order to make JSON queries efficient and are required for +// any JSON query with a sort. As of Hyperledger Fabric 1.1, indexes may be packaged alongside +// chaincode in a META-INF/statedb/couchdb/indexes directory. Or for indexes on private data +// collections, in a META-INF/statedb/couchdb/collections//indexes directory. +// Each index must be defined in its own text file with extension *.json with the index +// definition formatted in JSON following the CouchDB index JSON syntax as documented at: +// http://docs.couchdb.org/en/2.1.1/api/database/find.html#db-index +// +// This marbles02_private example chaincode demonstrates a packaged index which you +// can find in META-INF/statedb/couchdb/collection/collectionMarbles/indexes/indexOwner.json. +// For deployment of chaincode to production environments, it is recommended +// to define any indexes alongside chaincode so that the chaincode and supporting indexes +// are deployed automatically as a unit, once the chaincode has been installed on a peer and +// instantiated on a channel. See Hyperledger Fabric documentation for more details. +// +// If you have access to the your peer's CouchDB state database in a development environment, +// you may want to iteratively test various indexes in support of your chaincode queries. You +// can use the CouchDB Fauxton interface or a command line curl utility to create and update +// indexes. Then once you finalize an index, include the index definition alongside your +// chaincode in the META-INF/statedb/couchdb/indexes directory or +// META-INF/statedb/couchdb/collections//indexes directory, for packaging +// and deployment to managed environments. +// +// In the examples below you can find index definitions that support marbles02_private +// chaincode queries, along with the syntax that you can use in development environments +// to create the indexes in the CouchDB Fauxton interface. +// + +//Example hostname:port configurations to access CouchDB. +// +//To access CouchDB docker container from within another docker container or from vagrant environments: +// http://couchdb:5984/ +// +//Inside couchdb docker container +// http://127.0.0.1:5984/ + +// Index for docType, owner. +// Note that docType and owner fields must be prefixed with the "data" wrapper +// +// Index definition for use with Fauxton interface +// {"index":{"fields":["data.docType","data.owner"]},"ddoc":"indexOwnerDoc", "name":"indexOwner","type":"json"} + +// Index for docType, owner, size (descending order). +// Note that docType, owner and size fields must be prefixed with the "data" wrapper +// +// Index definition for use with Fauxton interface +// {"index":{"fields":[{"data.size":"desc"},{"data.docType":"desc"},{"data.owner":"desc"}]},"ddoc":"indexSizeSortDoc", "name":"indexSizeSortDesc","type":"json"} + +// Rich Query with index design doc and index name specified (Only supported if CouchDB is used as state database): +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":\"marble\",\"owner\":\"tom\"}, \"use_index\":[\"_design/indexOwnerDoc\", \"indexOwner\"]}"]}' + +// Rich Query with index design doc specified only (Only supported if CouchDB is used as state database): +// peer chaincode query -C mychannel -n marblesp -c '{"Args":["queryMarbles","{\"selector\":{\"docType\":{\"$eq\":\"marble\"},\"owner\":{\"$eq\":\"tom\"},\"size\":{\"$gt\":0}},\"fields\":[\"docType\",\"owner\",\"size\"],\"sort\":[{\"size\":\"desc\"}],\"use_index\":\"_design/indexSizeSortDoc\"}"]}' + +package main + +import ( + "bytes" + "encoding/json" + "fmt" + "strconv" + "strings" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +type marble struct { + ObjectType string `json:"docType"` //docType is used to distinguish the various types of objects in state database + Name string `json:"name"` //the fieldtags are needed to keep case from bouncing around + Color string `json:"color"` + Size int `json:"size"` + Owner string `json:"owner"` +} + +type marblePrivateDetails struct { + ObjectType string `json:"docType"` //docType is used to distinguish the various types of objects in state database + Name string `json:"name"` //the fieldtags are needed to keep case from bouncing around + Price int `json:"price"` +} + +// =================================================================================== +// Main +// =================================================================================== +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting Simple chaincode: %s", err) + } +} + +// Init initializes chaincode +// =========================== +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return shim.Success(nil) +} + +// Invoke - Our entry point for Invocations +// ======================================== +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + fmt.Println("invoke is running " + function) + + // Handle different functions + switch function { + case "initMarble": + //create a new marble + return t.initMarble(stub, args) + case "readMarble": + //read a marble + return t.readMarble(stub, args) + case "readMarblePrivateDetails": + //read a marble private details + return t.readMarblePrivateDetails(stub, args) + case "transferMarble": + //change owner of a specific marble + return t.transferMarble(stub, args) + case "transferMarblesBasedOnColor": + //transfer all marbles of a certain color + return t.transferMarblesBasedOnColor(stub, args) + case "delete": + //delete a marble + return t.delete(stub, args) + case "queryMarblesByOwner": + //find marbles for owner X using rich query + return t.queryMarblesByOwner(stub, args) + case "queryMarbles": + //find marbles based on an ad hoc rich query + return t.queryMarbles(stub, args) + case "getMarblesByRange": + //get marbles based on range query + return t.getMarblesByRange(stub, args) + default: + //error + fmt.Println("invoke did not find func: " + function) + return shim.Error("Received unknown function invocation") + } +} + +// ============================================================ +// initMarble - create a new marble, store into chaincode state +// ============================================================ +func (t *SimpleChaincode) initMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var err error + + // 0-name 1-color 2-size 3-owner 4-price + // "asdf", "blue", "35", "bob", "99" + if len(args) != 5 { + return shim.Error("Incorrect number of arguments. Expecting 5") + } + + // ==== Input sanitation ==== + fmt.Println("- start init marble") + if len(args[0]) == 0 { + return shim.Error("1st argument must be a non-empty string") + } + if len(args[1]) == 0 { + return shim.Error("2nd argument must be a non-empty string") + } + if len(args[2]) == 0 { + return shim.Error("3rd argument must be a non-empty string") + } + if len(args[3]) == 0 { + return shim.Error("4th argument must be a non-empty string") + } + if len(args[4]) == 0 { + return shim.Error("5th argument must be a non-empty string") + } + marbleName := args[0] + color := strings.ToLower(args[1]) + owner := strings.ToLower(args[3]) + size, err := strconv.Atoi(args[2]) + if err != nil { + return shim.Error("3rd argument must be a numeric string") + } + price, err := strconv.Atoi(args[4]) + if err != nil { + return shim.Error("5th argument must be a numeric string") + } + + // ==== Check if marble already exists ==== + marbleAsBytes, err := stub.GetPrivateData("collectionMarbles", marbleName) + if err != nil { + return shim.Error("Failed to get marble: " + err.Error()) + } else if marbleAsBytes != nil { + fmt.Println("This marble already exists: " + marbleName) + return shim.Error("This marble already exists: " + marbleName) + } + + // ==== Create marble object and marshal to JSON ==== + objectType := "marble" + marble := &marble{objectType, marbleName, color, size, owner} + marbleJSONasBytes, err := json.Marshal(marble) + if err != nil { + return shim.Error(err.Error()) + } + //Alternatively, build the marble json string manually if you don't want to use struct marshalling + //marbleJSONasString := `{"docType":"Marble", "name": "` + marbleName + `", "color": "` + color + `", "size": ` + strconv.Itoa(size) + `, "owner": "` + owner + `"}` + //marbleJSONasBytes := []byte(str) + + // === Save marble to state === + err = stub.PutPrivateData("collectionMarbles", marbleName, marbleJSONasBytes) + if err != nil { + return shim.Error(err.Error()) + } + + // ==== Save marble private details ==== + objectType = "marblePrivateDetails" + marblePrivateDetails := &marblePrivateDetails{objectType, marbleName, price} + marblePrivateDetailsBytes, err := json.Marshal(marblePrivateDetails) + if err != nil { + return shim.Error(err.Error()) + } + err = stub.PutPrivateData("collectionMarblePrivateDetails", marbleName, marblePrivateDetailsBytes) + if err != nil { + return shim.Error(err.Error()) + } + + // ==== Index the marble to enable color-based range queries, e.g. return all blue marbles ==== + // An 'index' is a normal key/value entry in state. + // The key is a composite key, with the elements that you want to range query on listed first. + // In our case, the composite key is based on indexName~color~name. + // This will enable very efficient state range queries based on composite keys matching indexName~color~* + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marble.Color, marble.Name}) + if err != nil { + return shim.Error(err.Error()) + } + // Save index entry to state. Only the key name is needed, no need to store a duplicate copy of the marble. + // Note - passing a 'nil' value will effectively delete the key from state, therefore we pass null character as value + value := []byte{0x00} + stub.PutPrivateData("collectionMarbles", colorNameIndexKey, value) + + // ==== Marble saved and indexed. Return success ==== + fmt.Println("- end init marble") + return shim.Success(nil) +} + +// =============================================== +// readMarble - read a marble from chaincode state +// =============================================== +func (t *SimpleChaincode) readMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var name, jsonResp string + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the marble to query") + } + + name = args[0] + valAsbytes, err := stub.GetPrivateData("collectionMarbles", name) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + name + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + name + "\"}" + return shim.Error(jsonResp) + } + + return shim.Success(valAsbytes) +} + +// =============================================== +// readMarblereadMarblePrivateDetails - read a marble private details from chaincode state +// =============================================== +func (t *SimpleChaincode) readMarblePrivateDetails(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var name, jsonResp string + var err error + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting name of the marble to query") + } + + name = args[0] + valAsbytes, err := stub.GetPrivateData("collectionMarblePrivateDetails", name) //get the marble private details from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get private details for " + name + ": " + err.Error() + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble private details does not exist: " + name + "\"}" + return shim.Error(jsonResp) + } + + return shim.Success(valAsbytes) +} + +// ================================================== +// delete - remove a marble key/value pair from state +// ================================================== +func (t *SimpleChaincode) delete(stub shim.ChaincodeStubInterface, args []string) pb.Response { + var jsonResp string + var marbleJSON marble + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + marbleName := args[0] + + // to maintain the color~name index, we need to read the marble first and get its color + valAsbytes, err := stub.GetPrivateData("collectionMarbles", marbleName) //get the marble from chaincode state + if err != nil { + jsonResp = "{\"Error\":\"Failed to get state for " + marbleName + "\"}" + return shim.Error(jsonResp) + } else if valAsbytes == nil { + jsonResp = "{\"Error\":\"Marble does not exist: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = json.Unmarshal([]byte(valAsbytes), &marbleJSON) + if err != nil { + jsonResp = "{\"Error\":\"Failed to decode JSON of: " + marbleName + "\"}" + return shim.Error(jsonResp) + } + + err = stub.DelPrivateData("collectionMarbles", marbleName) //remove the marble from chaincode state + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + + // maintain the index + indexName := "color~name" + colorNameIndexKey, err := stub.CreateCompositeKey(indexName, []string{marbleJSON.Color, marbleJSON.Name}) + if err != nil { + return shim.Error(err.Error()) + } + + // Delete index entry to state. + err = stub.DelPrivateData("collectionMarbles", colorNameIndexKey) + if err != nil { + return shim.Error("Failed to delete state:" + err.Error()) + } + + // Delete private details of marble + err = stub.DelPrivateData("collectionMarblePrivateDetails", marbleName) + if err != nil { + return shim.Error(err.Error()) + } + + return shim.Success(nil) +} + +// =========================================================== +// transfer a marble by setting a new owner name on the marble +// =========================================================== +func (t *SimpleChaincode) transferMarble(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "name", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + marbleName := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarble ", marbleName, newOwner) + + marbleAsBytes, err := stub.GetPrivateData("collectionMarbles", marbleName) + if err != nil { + return shim.Error("Failed to get marble:" + err.Error()) + } else if marbleAsBytes == nil { + return shim.Error("Marble does not exist") + } + + marbleToTransfer := marble{} + err = json.Unmarshal(marbleAsBytes, &marbleToTransfer) //unmarshal it aka JSON.parse() + if err != nil { + return shim.Error(err.Error()) + } + marbleToTransfer.Owner = newOwner //change the owner + + marbleJSONasBytes, _ := json.Marshal(marbleToTransfer) + err = stub.PutPrivateData("collectionMarbles", marbleName, marbleJSONasBytes) //rewrite the marble + if err != nil { + return shim.Error(err.Error()) + } + + fmt.Println("- end transferMarble (success)") + return shim.Success(nil) +} + +// =========================================================================================== +// getMarblesByRange performs a range query based on the start and end keys provided. + +// Read-only function results are not typically submitted to ordering. If the read-only +// results are submitted to ordering, or if the query is used in an update transaction +// and submitted to ordering, then the committing peers will re-execute to guarantee that +// result sets are stable between endorsement time and commit time. The transaction is +// invalidated by the committing peers if the result set has changed between endorsement +// time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) getMarblesByRange(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + startKey := args[0] + endKey := args[1] + + resultsIterator, err := stub.GetPrivateDataByRange("collectionMarbles", startKey, endKey) + if err != nil { + return shim.Error(err.Error()) + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryResults + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getMarblesByRange queryResult:\n%s\n", buffer.String()) + + return shim.Success(buffer.Bytes()) +} + +// ==== Example: GetStateByPartialCompositeKey/RangeQuery ========================================= +// transferMarblesBasedOnColor will transfer marbles of a given color to a certain new owner. +// Uses a GetStateByPartialCompositeKey (range query) against color~name 'index'. +// Committing peers will re-execute range queries to guarantee that result sets are stable +// between endorsement time and commit time. The transaction is invalidated by the +// committing peers if the result set has changed between endorsement time and commit time. +// Therefore, range queries are a safe option for performing update transactions based on query results. +// =========================================================================================== +func (t *SimpleChaincode) transferMarblesBasedOnColor(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 1 + // "color", "bob" + if len(args) < 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + color := args[0] + newOwner := strings.ToLower(args[1]) + fmt.Println("- start transferMarblesBasedOnColor ", color, newOwner) + + // Query the color~name index by color + // This will execute a key range query on all keys starting with 'color' + coloredMarbleResultsIterator, err := stub.GetPrivateDataByPartialCompositeKey("collectionMarbles", "color~name", []string{color}) + if err != nil { + return shim.Error(err.Error()) + } + defer coloredMarbleResultsIterator.Close() + + // Iterate through result set and for each marble found, transfer to newOwner + var i int + for i = 0; coloredMarbleResultsIterator.HasNext(); i++ { + // Note that we don't get the value (2nd return variable), we'll just get the marble name from the composite key + responseRange, err := coloredMarbleResultsIterator.Next() + if err != nil { + return shim.Error(err.Error()) + } + + // get the color and name from color~name composite key + objectType, compositeKeyParts, err := stub.SplitCompositeKey(responseRange.Key) + if err != nil { + return shim.Error(err.Error()) + } + returnedColor := compositeKeyParts[0] + returnedMarbleName := compositeKeyParts[1] + fmt.Printf("- found a marble from index:%s color:%s name:%s\n", objectType, returnedColor, returnedMarbleName) + + // Now call the transfer function for the found marble. + // Re-use the same function that is used to transfer individual marbles + response := t.transferMarble(stub, []string{returnedMarbleName, newOwner}) + // if the transfer failed break out of loop and return error + if response.Status != shim.OK { + return shim.Error("Transfer failed: " + response.Message) + } + } + + responsePayload := fmt.Sprintf("Transferred %d %s marbles to %s", i, color, newOwner) + fmt.Println("- end transferMarblesBasedOnColor: " + responsePayload) + return shim.Success([]byte(responsePayload)) +} + +// =======Rich queries ========================================================================= +// Two examples of rich queries are provided below (parameterized query and ad hoc query). +// Rich queries pass a query string to the state database. +// Rich queries are only supported by state database implementations +// that support rich query (e.g. CouchDB). +// The query string is in the syntax of the underlying state database. +// With rich queries there is no guarantee that the result set hasn't changed between +// endorsement time and commit time, aka 'phantom reads'. +// Therefore, rich queries should not be used in update transactions, unless the +// application handles the possibility of result set changes between endorsement and commit time. +// Rich queries can be used for point-in-time queries against a peer. +// ============================================================================================ + +// ===== Example: Parameterized rich query ================================================= +// queryMarblesByOwner queries for marbles based on a passed in owner. +// This is an example of a parameterized query where the query logic is baked into the chaincode, +// and accepting a single query parameter (owner). +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarblesByOwner(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "bob" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + owner := strings.ToLower(args[0]) + + queryString := fmt.Sprintf("{\"selector\":{\"docType\":\"marble\",\"owner\":\"%s\"}}", owner) + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ===== Example: Ad hoc rich query ======================================================== +// queryMarbles uses a query string to perform a query for marbles. +// Query string matching state database syntax is passed in and executed as is. +// Supports ad hoc queries that can be defined at runtime by the client. +// If this is not desired, follow the queryMarblesForOwner example for parameterized queries. +// Only available on state databases that support rich query (e.g. CouchDB) +// ========================================================================================= +func (t *SimpleChaincode) queryMarbles(stub shim.ChaincodeStubInterface, args []string) pb.Response { + + // 0 + // "queryString" + if len(args) < 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + queryString := args[0] + + queryResults, err := getQueryResultForQueryString(stub, queryString) + if err != nil { + return shim.Error(err.Error()) + } + return shim.Success(queryResults) +} + +// ========================================================================================= +// getQueryResultForQueryString executes the passed in query string. +// Result set is built and returned as a byte array containing the JSON results. +// ========================================================================================= +func getQueryResultForQueryString(stub shim.ChaincodeStubInterface, queryString string) ([]byte, error) { + + fmt.Printf("- getQueryResultForQueryString queryString:\n%s\n", queryString) + + resultsIterator, err := stub.GetPrivateDataQueryResult("collectionMarbles", queryString) + if err != nil { + return nil, err + } + defer resultsIterator.Close() + + // buffer is a JSON array containing QueryRecords + var buffer bytes.Buffer + buffer.WriteString("[") + + bArrayMemberAlreadyWritten := false + for resultsIterator.HasNext() { + queryResponse, err := resultsIterator.Next() + if err != nil { + return nil, err + } + // Add a comma before array members, suppress it for the first array member + if bArrayMemberAlreadyWritten == true { + buffer.WriteString(",") + } + buffer.WriteString("{\"Key\":") + buffer.WriteString("\"") + buffer.WriteString(queryResponse.Key) + buffer.WriteString("\"") + + buffer.WriteString(", \"Record\":") + // Record is a JSON object, so we write as-is + buffer.WriteString(string(queryResponse.Value)) + buffer.WriteString("}") + bArrayMemberAlreadyWritten = true + } + buffer.WriteString("]") + + fmt.Printf("- getQueryResultForQueryString queryResult:\n%s\n", buffer.String()) + + return buffer.Bytes(), nil +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/passthru/passthru.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/passthru/passthru.go new file mode 100644 index 00000000..49d978bf --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/passthru/passthru.go @@ -0,0 +1,72 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + "strings" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// PassthruChaincode passes thru invoke and query to another chaincode where +// called ChaincodeID = function +// called chaincode's function = args[0] +// called chaincode's args = args[1:] +type PassthruChaincode struct { +} + +func toChaincodeArgs(args ...string) [][]byte { + bargs := make([][]byte, len(args)) + for i, arg := range args { + bargs[i] = []byte(arg) + } + return bargs +} + +//Init func will return error if function has string "error" anywhere +func (p *PassthruChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + function, _ := stub.GetFunctionAndParameters() + if strings.Index(function, "error") >= 0 { + return shim.Error(function) + } + return shim.Success([]byte(function)) +} + +//helper +func (p *PassthruChaincode) iq(stub shim.ChaincodeStubInterface, function string, args []string) pb.Response { + if function == "" { + return shim.Error("Chaincode ID not provided") + } + chaincodeID := function + + return stub.InvokeChaincode(chaincodeID, toChaincodeArgs(args...), "") +} + +// Invoke passes through the invoke call +func (p *PassthruChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + return p.iq(stub, function, args) +} + +func main() { + err := shim.Start(new(PassthruChaincode)) + if err != nil { + fmt.Printf("Error starting Passthru chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/sleeper/sleeper.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/sleeper/sleeper.go new file mode 100644 index 00000000..088b598c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/sleeper/sleeper.go @@ -0,0 +1,124 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +// Sleeper chaincode sleeps and works with one state variable +// Init - 1 param, a sleep time in millisecs +// Invoke - 4 or 3 params, "put" or "get", value to set and sleep time in millisecs +// +// Sleeper can be used to test the "chaincode.executetimeout" property + +import ( + "fmt" + "strconv" + "time" + + "github.com/hyperledger/fabric/core/chaincode/shim" + pb "github.com/hyperledger/fabric/protos/peer" +) + +// SleeperChaincode example simple Chaincode implementation +type SleeperChaincode struct { +} + +func (t *SleeperChaincode) sleep(sleepTime string) { + st, _ := strconv.Atoi(sleepTime) + if st >= 0 { + time.Sleep(time.Duration(st) * time.Millisecond) + } +} + +// Init initializes chaincode...all it does is sleep a bi +func (t *SleeperChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + args := stub.GetStringArgs() + + if len(args) != 1 { + return shim.Error("Incorrect number of arguments. Expecting 1") + } + + sleepTime := args[0] + + t.sleep(sleepTime) + + return shim.Success(nil) +} + +// Invoke sets key/value and sleeps a bit +func (t *SleeperChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + if function == "put" { + if len(args) != 3 { + return shim.Error("Incorrect number of arguments. Expecting 3") + } + + // Make payment of X units from A to B + return t.invoke(stub, args) + } else if function == "get" { + if len(args) != 2 { + return shim.Error("Incorrect number of arguments. Expecting 2") + } + + // the old "Query" is now implemtned in invoke + return t.query(stub, args) + } + + return shim.Error("Invalid invoke function name. Expecting \"put\" or \"get\"") +} + +// Transaction makes payment of X units from A to B +func (t *SleeperChaincode) invoke(stub shim.ChaincodeStubInterface, args []string) pb.Response { + // set state + key := args[0] + val := args[1] + + err := stub.PutState(key, []byte(val)) + if err != nil { + return shim.Error(err.Error()) + } + + sleepTime := args[2] + + //sleep for a bit + t.sleep(sleepTime) + + return shim.Success([]byte("OK")) +} + +// query callback representing the query of a chaincode +func (t *SleeperChaincode) query(stub shim.ChaincodeStubInterface, args []string) pb.Response { + key := args[0] + + // Get the state from the ledger + val, err := stub.GetState(key) + if err != nil { + return shim.Error(err.Error()) + } + + sleepTime := args[1] + + //sleep for a bit + t.sleep(sleepTime) + + return shim.Success(val) +} + +func main() { + err := shim.Start(new(SleeperChaincode)) + if err != nil { + fmt.Printf("Error starting Sleeper chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/Dockerfile b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/Dockerfile new file mode 100644 index 00000000..e3aa5d5f --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/Dockerfile @@ -0,0 +1,40 @@ +# FIXME: someone from the UTXO team will need to verify or rework this +# Copyright London Stock Exchange Group All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# +FROM ubuntu:latest + +RUN apt-get update && apt-get install pkg-config autoconf libtool -y +RUN cd /tmp && git clone https://github.com/bitcoin/secp256k1.git && cd secp256k1/ +WORKDIR /tmp/secp256k1 +RUN ./autogen.sh +RUN ./configure --enable-module-recovery +RUN make +RUN ./tests +RUN make install + +WORKDIR /tmp +RUN apt-get install libtool libboost1.55-all-dev -y +RUN git clone https://github.com/libbitcoin/libbitcoin-consensus.git +WORKDIR /tmp/libbitcoin-consensus +RUN ./autogen.sh +RUN ./configure +RUN make +RUN make install + +# Now SWIG +WORKDIR /tmp +# Need pcre lib for building +RUN apt-get install libpcre3-dev -y +RUN wget http://prdownloads.sourceforge.net/swig/swig-3.0.8.tar.gz && tar xvf swig-3.0.8.tar.gz +WORKDIR /tmp/swig-3.0.8 +RUN ./autogen.sh +RUN ./configure +RUN make +RUN make install + +# Now add this for SWIG execution requirement to get missing stubs-32.h header file +RUN apt-get install g++-multilib -y + +ENV CGO_LDFLAGS="-L/usr/local/lib/ -lbitcoin-consensus -lstdc++" diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/README.md b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/README.md new file mode 100644 index 00000000..6b7f42c1 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/README.md @@ -0,0 +1,79 @@ +### UTXO Chaincode + +The UTXO example chaincode contains a single invocation function named `execute`. This function accepts BASE64 encoded transactions from the Bitcoin network. This chaincode will parse the transactions and pass the transaction components to the Bitcoin libconsensus C library for script verification. + +The purpose of this chaincode is to + +1. Demonstrate how the world state can be used to store and process unspent transaction outputs (UTXO). + +2. Demonstrate how to include and use a C library from within a chaincode. + +A client for exercising this chaincode is avilable at https://github.com/srderson/hyperledger-fabric-utxo-client-java. + + +The following are instructions for building and deploying the UTXO chaincode in Hypereledger Fabric. All commands should be run with vagrant. + +First, build the Docker image for the UTXO chaincode. + +``` +cd $GOPATH/src/github.com/hyperledger/fabric/examples/chaincode/go/utxo/ +docker build -t utxo:0.1.0 . +``` + +Next, modify the `core.yaml` file in the Hyperledger Fabric project to point to the local Docker image that was built in the previous step. In the core.yaml file find `chaincode.golang.Dockerfile` and change it from from `hyperledger/fabric-baseimage` to `utxo:0.1.0` + +Start the peer using the following commands +``` +peer node start +``` + +In a second window, deploy the example UTXO chaincode +``` +CORE_PEER_ADDRESS=localhost:7051 peer chaincode deploy -p github.com/hyperledger/fabric/examples/chaincode/go/utxo -c '{"Function":"init", "Args": []}' +``` +Wait about 30 seconds for the chaincode to be deployed. Output from the window where the peer is running will indicate that this is successful. + +Next, find the `image ID` for the deployed chaincode. Run +``` +docker images +``` +and look for the image ID of the most recently deployed chaincode. The image ID will likely be similar to +``` + dev-jdoe-cbe6be7ed67931b9be2ce31dd833e523702378bef91b29917005f0eaa316b57e268e19696093d48b91076f1134cbf4b06afd78e6afd947133f43cb51bf40b0a4 + ``` + Make a note of this as we'll be using it later. + +Stop the running peer. + +Build a peer docker image by running the following test. This will allow for easy testing of the chaincode by giving us the ability to reset the database to a clean state. +``` +go test github.com/hyperledger/fabric/core/container -run=BuildImage_Peer +``` + +Using the Docker image that we just built, start a peer within a container in `chaincodedev` mode. +``` +docker run -it -p 7051:7051 -p 7053:7053 hyperledger/fabric-peer peer node start --peer-chaincodedev +``` + + +In another window, start UTXO chaincode in a container. The refers to the UTXO image ID noted in a prior step. +``` +docker run -it /bin/bash +``` + +Build the UTXO chaincode. +``` +cd $GOPATH/src/github.com/hyperledger/fabric/examples/chaincode/go/utxo/ +go build +CORE_PEER_ADDRESS=172.17.0.2:7051 CORE_CHAINCODE_ID_NAME=utxo ./utxo +``` + +In another window, deploy the chaincode +``` +peer chaincode deploy -n utxo -c '{"Function":"init", "Args": []}' +``` + +The chaincode is now deployed and ready to accept transactions. + +Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License. +s diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/chaincode.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/chaincode.go new file mode 100644 index 00000000..ca1a2878 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/chaincode.go @@ -0,0 +1,104 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "encoding/base64" + "errors" + "fmt" + + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/util" +) + +// The UTXO example chaincode contains a single invocation function named execute. This function accepts BASE64 +// encoded transactions from the Bitcoin network. This chaincode will parse the transactions and pass the transaction +// components to the Bitcoin libconsensus C library for script verification. A table of UTXOs is maintained to ensure +// each transaction is valid. +// Documentation can be found at +// https://github.com/hyperledger/fabric/blob/master/examples/chaincode/go/utxo/README.md + +// SimpleChaincode example simple Chaincode implementation +type SimpleChaincode struct { +} + +// Init does nothing in the UTXO chaincode +func (t *SimpleChaincode) Init(stub shim.ChaincodeStubInterface) pb.Response { + return nil, nil +} + +// Invoke callback representing the invocation of a chaincode +func (t *SimpleChaincode) Invoke(stub shim.ChaincodeStubInterface) pb.Response { + function, args := stub.GetFunctionAndParameters() + switch function { + + case "execute": + + if len(args) < 1 { + return nil, errors.New("execute operation must include single argument, the base64 encoded form of a bitcoin transaction") + } + txDataBase64 := args[0] + txData, err := base64.StdEncoding.DecodeString(txDataBase64) + if err != nil { + return nil, fmt.Errorf("Error decoding TX as base64: %s", err) + } + + utxo := util.MakeUTXO(MakeChaincodeStore(stub)) + execResult, err := utxo.Execute(txData) + if err != nil { + return nil, fmt.Errorf("Error executing TX: %s", err) + } + + fmt.Printf("\nExecResult: Coinbase: %t, SumInputs %d, SumOutputs %d\n\n", execResult.IsCoinbase, execResult.SumPriorOutputs, execResult.SumCurrentOutputs) + + if execResult.IsCoinbase == false { + if execResult.SumCurrentOutputs > execResult.SumPriorOutputs { + return nil, fmt.Errorf("sumOfCurrentOutputs > sumOfPriorOutputs: sumOfCurrentOutputs = %d, sumOfPriorOutputs = %d", execResult.SumCurrentOutputs, execResult.SumPriorOutputs) + } + } + + return nil, nil + + case "getTran": + + if len(args) < 1 { + return nil, errors.New("queryBTC operation must include single argument, the TX hash hex") + } + + utxo := util.MakeUTXO(MakeChaincodeStore(stub)) + tx, err := utxo.Query(args[0]) + if err != nil { + return nil, fmt.Errorf("Error querying for transaction: %s", err) + } + if tx == nil { + var data []byte + return data, nil + } + return tx, nil + + default: + return nil, errors.New("Unsupported operation") + } + +} + +func main() { + err := shim.Start(new(SimpleChaincode)) + if err != nil { + fmt.Printf("Error starting chaincode: %s", err) + } +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/consensus/consensus.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/consensus/consensus.go new file mode 100644 index 00000000..74b5b20c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/consensus/consensus.go @@ -0,0 +1,482 @@ +/* ---------------------------------------------------------------------------- + * This file was automatically generated by SWIG (http://www.swig.org). + * Version 3.0.8 + * + * This file is not intended to be easily readable and contains a number of + * coding conventions designed to improve portability and efficiency. Do not make + * changes to this file unless you know what you are doing--modify the SWIG + * interface file instead. + * ----------------------------------------------------------------------------- */ + +// source: consensus.swg + +package consensus + +/* +#define intgo swig_intgo +typedef void *swig_voidp; + +#include + + +typedef int intgo; +typedef unsigned int uintgo; + + + +typedef struct { char *p; intgo n; } _gostring_; +typedef struct { void* array; intgo len; intgo cap; } _goslice_; + + +typedef long long swig_type_1; +typedef long long swig_type_2; +extern void _wrap_Swig_free_consensus_0731991c73947514(uintptr_t arg1); +extern swig_intgo _wrap_verify_result_eval_false_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_eval_true_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_script_size_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_push_size_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_op_count_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_stack_size_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_count_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_pubkey_count_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_verify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_equalverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_checkmultisigverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_checksigverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_numequalverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_bad_opcode_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_disabled_opcode_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_invalid_stack_operation_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_invalid_altstack_operation_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_unbalanced_conditional_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_hashtype_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_der_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_minimaldata_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_pushonly_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_high_s_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_sig_nulldummy_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_pubkeytype_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_cleanstack_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_discourage_upgradable_nops_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_op_return_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_unknown_error_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_tx_invalid_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_tx_size_invalid_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_tx_input_invalid_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_negative_locktime_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_result_unsatisfied_locktime_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_none_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_p2sh_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_strictenc_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_dersig_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_low_s_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_nulldummy_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_sigpushonly_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_minimaldata_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_discourage_upgradable_nops_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_cleanstack_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_flags_checklocktimeverify_consensus_0731991c73947514(void); +extern swig_intgo _wrap_verify_script_consensus_0731991c73947514(swig_voidp arg1, swig_type_1 arg2, swig_voidp arg3, swig_type_2 arg4, swig_intgo arg5, swig_intgo arg6); +#undef intgo +*/ +import "C" + +import "unsafe" +import _ "runtime/cgo" +import "sync" + +type _ unsafe.Pointer + +var Swig_escape_always_false bool +var Swig_escape_val interface{} + +type _swig_fnptr *byte +type _swig_memberptr *byte + +type _ sync.Mutex + +func Swig_free(arg1 uintptr) { + _swig_i_0 := arg1 + C._wrap_Swig_free_consensus_0731991c73947514(C.uintptr_t(_swig_i_0)) +} + +const LIBBITCOIN_CONSENSUS_VERSION string = "2.0.0" +const LIBBITCOIN_CONSENSUS_MAJOR_VERSION int = 2 +const LIBBITCOIN_CONSENSUS_MINOR_VERSION int = 0 +const LIBBITCOIN_CONSENSUS_PATCH_VERSION int = 0 + +type LibbitcoinConsensusVerify_result_type int + +func _swig_getverify_result_eval_false() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_eval_false_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_eval_false LibbitcoinConsensusVerify_result_type = _swig_getverify_result_eval_false() + +func _swig_getverify_result_eval_true() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_eval_true_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_eval_true LibbitcoinConsensusVerify_result_type = _swig_getverify_result_eval_true() + +func _swig_getverify_result_script_size() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_script_size_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_script_size LibbitcoinConsensusVerify_result_type = _swig_getverify_result_script_size() + +func _swig_getverify_result_push_size() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_push_size_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_push_size LibbitcoinConsensusVerify_result_type = _swig_getverify_result_push_size() + +func _swig_getverify_result_op_count() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_op_count_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_op_count LibbitcoinConsensusVerify_result_type = _swig_getverify_result_op_count() + +func _swig_getverify_result_stack_size() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_stack_size_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_stack_size LibbitcoinConsensusVerify_result_type = _swig_getverify_result_stack_size() + +func _swig_getverify_result_sig_count() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_count_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_count LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_count() + +func _swig_getverify_result_pubkey_count() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_pubkey_count_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_pubkey_count LibbitcoinConsensusVerify_result_type = _swig_getverify_result_pubkey_count() + +func _swig_getverify_result_verify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_verify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_verify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_verify() + +func _swig_getverify_result_equalverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_equalverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_equalverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_equalverify() + +func _swig_getverify_result_checkmultisigverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_checkmultisigverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_checkmultisigverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_checkmultisigverify() + +func _swig_getverify_result_checksigverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_checksigverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_checksigverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_checksigverify() + +func _swig_getverify_result_numequalverify() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_numequalverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_numequalverify LibbitcoinConsensusVerify_result_type = _swig_getverify_result_numequalverify() + +func _swig_getverify_result_bad_opcode() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_bad_opcode_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_bad_opcode LibbitcoinConsensusVerify_result_type = _swig_getverify_result_bad_opcode() + +func _swig_getverify_result_disabled_opcode() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_disabled_opcode_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_disabled_opcode LibbitcoinConsensusVerify_result_type = _swig_getverify_result_disabled_opcode() + +func _swig_getverify_result_invalid_stack_operation() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_invalid_stack_operation_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_invalid_stack_operation LibbitcoinConsensusVerify_result_type = _swig_getverify_result_invalid_stack_operation() + +func _swig_getverify_result_invalid_altstack_operation() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_invalid_altstack_operation_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_invalid_altstack_operation LibbitcoinConsensusVerify_result_type = _swig_getverify_result_invalid_altstack_operation() + +func _swig_getverify_result_unbalanced_conditional() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_unbalanced_conditional_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_unbalanced_conditional LibbitcoinConsensusVerify_result_type = _swig_getverify_result_unbalanced_conditional() + +func _swig_getverify_result_sig_hashtype() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_hashtype_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_hashtype LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_hashtype() + +func _swig_getverify_result_sig_der() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_der_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_der LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_der() + +func _swig_getverify_result_minimaldata() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_minimaldata_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_minimaldata LibbitcoinConsensusVerify_result_type = _swig_getverify_result_minimaldata() + +func _swig_getverify_result_sig_pushonly() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_pushonly_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_pushonly LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_pushonly() + +func _swig_getverify_result_sig_high_s() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_high_s_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_high_s LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_high_s() + +func _swig_getverify_result_sig_nulldummy() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_sig_nulldummy_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_sig_nulldummy LibbitcoinConsensusVerify_result_type = _swig_getverify_result_sig_nulldummy() + +func _swig_getverify_result_pubkeytype() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_pubkeytype_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_pubkeytype LibbitcoinConsensusVerify_result_type = _swig_getverify_result_pubkeytype() + +func _swig_getverify_result_cleanstack() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_cleanstack_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_cleanstack LibbitcoinConsensusVerify_result_type = _swig_getverify_result_cleanstack() + +func _swig_getverify_result_discourage_upgradable_nops() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_discourage_upgradable_nops_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_discourage_upgradable_nops LibbitcoinConsensusVerify_result_type = _swig_getverify_result_discourage_upgradable_nops() + +func _swig_getverify_result_op_return() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_op_return_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_op_return LibbitcoinConsensusVerify_result_type = _swig_getverify_result_op_return() + +func _swig_getverify_result_unknown_error() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_unknown_error_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_unknown_error LibbitcoinConsensusVerify_result_type = _swig_getverify_result_unknown_error() + +func _swig_getverify_result_tx_invalid() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_tx_invalid_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_tx_invalid LibbitcoinConsensusVerify_result_type = _swig_getverify_result_tx_invalid() + +func _swig_getverify_result_tx_size_invalid() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_tx_size_invalid_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_tx_size_invalid LibbitcoinConsensusVerify_result_type = _swig_getverify_result_tx_size_invalid() + +func _swig_getverify_result_tx_input_invalid() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_tx_input_invalid_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_tx_input_invalid LibbitcoinConsensusVerify_result_type = _swig_getverify_result_tx_input_invalid() + +func _swig_getverify_result_negative_locktime() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_negative_locktime_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_negative_locktime LibbitcoinConsensusVerify_result_type = _swig_getverify_result_negative_locktime() + +func _swig_getverify_result_unsatisfied_locktime() (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_result_unsatisfied_locktime_consensus_0731991c73947514()) + return swig_r +} + +var Verify_result_unsatisfied_locktime LibbitcoinConsensusVerify_result_type = _swig_getverify_result_unsatisfied_locktime() + +type LibbitcoinConsensusVerify_flags_type int + +func _swig_getverify_flags_none() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_none_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_none LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_none() + +func _swig_getverify_flags_p2sh() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_p2sh_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_p2sh LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_p2sh() + +func _swig_getverify_flags_strictenc() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_strictenc_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_strictenc LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_strictenc() + +func _swig_getverify_flags_dersig() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_dersig_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_dersig LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_dersig() + +func _swig_getverify_flags_low_s() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_low_s_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_low_s LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_low_s() + +func _swig_getverify_flags_nulldummy() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_nulldummy_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_nulldummy LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_nulldummy() + +func _swig_getverify_flags_sigpushonly() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_sigpushonly_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_sigpushonly LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_sigpushonly() + +func _swig_getverify_flags_minimaldata() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_minimaldata_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_minimaldata LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_minimaldata() + +func _swig_getverify_flags_discourage_upgradable_nops() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_discourage_upgradable_nops_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_discourage_upgradable_nops LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_discourage_upgradable_nops() + +func _swig_getverify_flags_cleanstack() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_cleanstack_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_cleanstack LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_cleanstack() + +func _swig_getverify_flags_checklocktimeverify() (_swig_ret LibbitcoinConsensusVerify_flags_type) { + var swig_r LibbitcoinConsensusVerify_flags_type + swig_r = (LibbitcoinConsensusVerify_flags_type)(C._wrap_verify_flags_checklocktimeverify_consensus_0731991c73947514()) + return swig_r +} + +var Verify_flags_checklocktimeverify LibbitcoinConsensusVerify_flags_type = _swig_getverify_flags_checklocktimeverify() + +func Verify_script(arg1 *byte, arg2 int64, arg3 *byte, arg4 int64, arg5 uint, arg6 uint) (_swig_ret LibbitcoinConsensusVerify_result_type) { + var swig_r LibbitcoinConsensusVerify_result_type + _swig_i_0 := arg1 + _swig_i_1 := arg2 + _swig_i_2 := arg3 + _swig_i_3 := arg4 + _swig_i_4 := arg5 + _swig_i_5 := arg6 + swig_r = (LibbitcoinConsensusVerify_result_type)(C._wrap_verify_script_consensus_0731991c73947514(C.swig_voidp(_swig_i_0), C.swig_type_1(_swig_i_1), C.swig_voidp(_swig_i_2), C.swig_type_2(_swig_i_3), C.swig_intgo(_swig_i_4), C.swig_intgo(_swig_i_5))) + return swig_r +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx new file mode 100644 index 00000000..a2259cd0 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/consensus/consensus_wrap.cxx @@ -0,0 +1,812 @@ +/* ---------------------------------------------------------------------------- + * This file was automatically generated by SWIG (http://www.swig.org). + * Version 3.0.8 + * + * This file is not intended to be easily readable and contains a number of + * coding conventions designed to improve portability and efficiency. Do not make + * changes to this file unless you know what you are doing--modify the SWIG + * interface file instead. + * ----------------------------------------------------------------------------- */ + +// source: consensus.swg + +#define SWIGMODULE consensus + +#ifdef __cplusplus +/* SwigValueWrapper is described in swig.swg */ +template class SwigValueWrapper { + struct SwigMovePointer { + T *ptr; + SwigMovePointer(T *p) : ptr(p) { } + ~SwigMovePointer() { delete ptr; } + SwigMovePointer& operator=(SwigMovePointer& rhs) { T* oldptr = ptr; ptr = 0; delete oldptr; ptr = rhs.ptr; rhs.ptr = 0; return *this; } + } pointer; + SwigValueWrapper& operator=(const SwigValueWrapper& rhs); + SwigValueWrapper(const SwigValueWrapper& rhs); +public: + SwigValueWrapper() : pointer(0) { } + SwigValueWrapper& operator=(const T& t) { SwigMovePointer tmp(new T(t)); pointer = tmp; return *this; } + operator T&() const { return *pointer.ptr; } + T *operator&() { return pointer.ptr; } +}; + +template T SwigValueInit() { + return T(); +} +#endif + +/* ----------------------------------------------------------------------------- + * This section contains generic SWIG labels for method/variable + * declarations/attributes, and other compiler dependent labels. + * ----------------------------------------------------------------------------- */ + +/* template workaround for compilers that cannot correctly implement the C++ standard */ +#ifndef SWIGTEMPLATEDISAMBIGUATOR +# if defined(__SUNPRO_CC) && (__SUNPRO_CC <= 0x560) +# define SWIGTEMPLATEDISAMBIGUATOR template +# elif defined(__HP_aCC) +/* Needed even with `aCC -AA' when `aCC -V' reports HP ANSI C++ B3910B A.03.55 */ +/* If we find a maximum version that requires this, the test would be __HP_aCC <= 35500 for A.03.55 */ +# define SWIGTEMPLATEDISAMBIGUATOR template +# else +# define SWIGTEMPLATEDISAMBIGUATOR +# endif +#endif + +/* inline attribute */ +#ifndef SWIGINLINE +# if defined(__cplusplus) || (defined(__GNUC__) && !defined(__STRICT_ANSI__)) +# define SWIGINLINE inline +# else +# define SWIGINLINE +# endif +#endif + +/* attribute recognised by some compilers to avoid 'unused' warnings */ +#ifndef SWIGUNUSED +# if defined(__GNUC__) +# if !(defined(__cplusplus)) || (__GNUC__ > 3 || (__GNUC__ == 3 && __GNUC_MINOR__ >= 4)) +# define SWIGUNUSED __attribute__ ((__unused__)) +# else +# define SWIGUNUSED +# endif +# elif defined(__ICC) +# define SWIGUNUSED __attribute__ ((__unused__)) +# else +# define SWIGUNUSED +# endif +#endif + +#ifndef SWIG_MSC_UNSUPPRESS_4505 +# if defined(_MSC_VER) +# pragma warning(disable : 4505) /* unreferenced local function has been removed */ +# endif +#endif + +#ifndef SWIGUNUSEDPARM +# ifdef __cplusplus +# define SWIGUNUSEDPARM(p) +# else +# define SWIGUNUSEDPARM(p) p SWIGUNUSED +# endif +#endif + +/* internal SWIG method */ +#ifndef SWIGINTERN +# define SWIGINTERN static SWIGUNUSED +#endif + +/* internal inline SWIG method */ +#ifndef SWIGINTERNINLINE +# define SWIGINTERNINLINE SWIGINTERN SWIGINLINE +#endif + +/* exporting methods */ +#if (__GNUC__ >= 4) || (__GNUC__ == 3 && __GNUC_MINOR__ >= 4) +# ifndef GCC_HASCLASSVISIBILITY +# define GCC_HASCLASSVISIBILITY +# endif +#endif + +#ifndef SWIGEXPORT +# if defined(_WIN32) || defined(__WIN32__) || defined(__CYGWIN__) +# if defined(STATIC_LINKED) +# define SWIGEXPORT +# else +# define SWIGEXPORT __declspec(dllexport) +# endif +# else +# if defined(__GNUC__) && defined(GCC_HASCLASSVISIBILITY) +# define SWIGEXPORT __attribute__ ((visibility("default"))) +# else +# define SWIGEXPORT +# endif +# endif +#endif + +/* calling conventions for Windows */ +#ifndef SWIGSTDCALL +# if defined(_WIN32) || defined(__WIN32__) || defined(__CYGWIN__) +# define SWIGSTDCALL __stdcall +# else +# define SWIGSTDCALL +# endif +#endif + +/* Deal with Microsoft's attempt at deprecating C standard runtime functions */ +#if !defined(SWIG_NO_CRT_SECURE_NO_DEPRECATE) && defined(_MSC_VER) && !defined(_CRT_SECURE_NO_DEPRECATE) +# define _CRT_SECURE_NO_DEPRECATE +#endif + +/* Deal with Microsoft's attempt at deprecating methods in the standard C++ library */ +#if !defined(SWIG_NO_SCL_SECURE_NO_DEPRECATE) && defined(_MSC_VER) && !defined(_SCL_SECURE_NO_DEPRECATE) +# define _SCL_SECURE_NO_DEPRECATE +#endif + +/* Deal with Apple's deprecated 'AssertMacros.h' from Carbon-framework */ +#if defined(__APPLE__) && !defined(__ASSERT_MACROS_DEFINE_VERSIONS_WITHOUT_UNDERSCORES) +# define __ASSERT_MACROS_DEFINE_VERSIONS_WITHOUT_UNDERSCORES 0 +#endif + +/* Intel's compiler complains if a variable which was never initialised is + * cast to void, which is a common idiom which we use to indicate that we + * are aware a variable isn't used. So we just silence that warning. + * See: https://github.com/swig/swig/issues/192 for more discussion. + */ +#ifdef __INTEL_COMPILER +# pragma warning disable 592 +#endif + + +#include +#include +#include +#include +#include + + + +typedef int intgo; +typedef unsigned int uintgo; + + + +typedef struct { char *p; intgo n; } _gostring_; +typedef struct { void* array; intgo len; intgo cap; } _goslice_; + + + + +#define swiggo_size_assert_eq(x, y, name) typedef char name[(x-y)*(x-y)*-2+1]; +#define swiggo_size_assert(t, n) swiggo_size_assert_eq(sizeof(t), n, swiggo_sizeof_##t##_is_not_##n) + +swiggo_size_assert(char, 1) +swiggo_size_assert(short, 2) +swiggo_size_assert(int, 4) +typedef long long swiggo_long_long; +swiggo_size_assert(swiggo_long_long, 8) +swiggo_size_assert(float, 4) +swiggo_size_assert(double, 8) + +#ifdef __cplusplus +extern "C" { +#endif +extern void crosscall2(void (*fn)(void *, int), void *, int); +extern char* _cgo_topofstack(void) __attribute__ ((weak)); +extern void _cgo_allocate(void *, int); +extern void _cgo_panic(void *, int); +#ifdef __cplusplus +} +#endif + +static char *_swig_topofstack() { + if (_cgo_topofstack) { + return _cgo_topofstack(); + } else { + return 0; + } +} + +static void _swig_gopanic(const char *p) { + struct { + const char *p; + } a; + a.p = p; + crosscall2(_cgo_panic, &a, (int) sizeof a); +} + + + + +#define SWIG_contract_assert(expr, msg) \ + if (!(expr)) { _swig_gopanic(msg); } else + + +static void Swig_free(void* p) { + free(p); +} + + +#include + +#ifdef __cplusplus +extern "C" { +#endif + +void _wrap_Swig_free_consensus_0731991c73947514(void *_swig_go_0) { + void *arg1 = (void *) 0 ; + + arg1 = *(void **)&_swig_go_0; + + Swig_free(arg1); + +} + + +intgo _wrap_verify_result_eval_false_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_eval_false; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_eval_true_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_eval_true; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_script_size_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_script_size; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_push_size_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_push_size; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_op_count_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_op_count; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_stack_size_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_stack_size; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_count_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_count; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_pubkey_count_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_pubkey_count; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_verify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_verify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_equalverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_equalverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_checkmultisigverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_checkmultisigverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_checksigverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_checksigverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_numequalverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_numequalverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_bad_opcode_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_bad_opcode; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_disabled_opcode_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_disabled_opcode; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_invalid_stack_operation_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_invalid_stack_operation; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_invalid_altstack_operation_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_invalid_altstack_operation; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_unbalanced_conditional_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_unbalanced_conditional; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_hashtype_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_hashtype; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_der_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_der; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_minimaldata_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_minimaldata; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_pushonly_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_pushonly; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_high_s_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_high_s; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_sig_nulldummy_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_sig_nulldummy; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_pubkeytype_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_pubkeytype; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_cleanstack_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_cleanstack; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_discourage_upgradable_nops_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_discourage_upgradable_nops; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_op_return_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_op_return; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_unknown_error_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_unknown_error; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_tx_invalid_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_tx_invalid; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_tx_size_invalid_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_tx_size_invalid; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_tx_input_invalid_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_tx_input_invalid; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_negative_locktime_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_negative_locktime; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_result_unsatisfied_locktime_consensus_0731991c73947514() { + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_result_unsatisfied_locktime; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_none_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_none; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_p2sh_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_p2sh; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_strictenc_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_strictenc; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_dersig_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_dersig; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_low_s_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_low_s; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_nulldummy_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_nulldummy; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_sigpushonly_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_sigpushonly; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_minimaldata_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_minimaldata; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_discourage_upgradable_nops_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_discourage_upgradable_nops; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_cleanstack_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_cleanstack; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_flags_checklocktimeverify_consensus_0731991c73947514() { + libbitcoin::consensus::verify_flags_type result; + intgo _swig_go_result; + + + result = libbitcoin::consensus::verify_flags_checklocktimeverify; + + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +intgo _wrap_verify_script_consensus_0731991c73947514(char *_swig_go_0, long long _swig_go_1, char *_swig_go_2, long long _swig_go_3, intgo _swig_go_4, intgo _swig_go_5) { + unsigned char *arg1 = (unsigned char *) 0 ; + size_t arg2 ; + unsigned char *arg3 = (unsigned char *) 0 ; + size_t arg4 ; + unsigned int arg5 ; + unsigned int arg6 ; + libbitcoin::consensus::verify_result_type result; + intgo _swig_go_result; + + arg1 = *(unsigned char **)&_swig_go_0; + arg2 = (size_t)_swig_go_1; + arg3 = *(unsigned char **)&_swig_go_2; + arg4 = (size_t)_swig_go_3; + arg5 = (unsigned int)_swig_go_4; + arg6 = (unsigned int)_swig_go_5; + + result = (libbitcoin::consensus::verify_result_type)libbitcoin::consensus::verify_script((unsigned char const *)arg1,arg2,(unsigned char const *)arg3,arg4,arg5,arg6); + _swig_go_result = (intgo)result; + return _swig_go_result; +} + + +#ifdef __cplusplus +} +#endif + diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/store.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/store.go new file mode 100644 index 00000000..cc107411 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/store.go @@ -0,0 +1,91 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package main + +import ( + "fmt" + + "github.com/golang/protobuf/proto" + "github.com/hyperledger/fabric/core/chaincode/shim" + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/util" +) + +// Store struct uses a chaincode stub for state access +type Store struct { + stub shim.ChaincodeStubInterface +} + +// MakeChaincodeStore returns a store for storing keys in the state +func MakeChaincodeStore(stub shim.ChaincodeStubInterface) util.Store { + store := &Store{} + store.stub = stub + return store +} + +func keyToString(key *util.Key) string { + return key.TxHashAsHex + ":" + string(key.TxIndex) +} + +// GetState returns the transaction for a given key +func (s *Store) GetState(key util.Key) (*util.TX_TXOUT, bool, error) { + keyToFetch := keyToString(&key) + data, err := s.stub.GetState(keyToFetch) + if err != nil { + return nil, false, fmt.Errorf("Error getting state from stub: %s", err) + } + if data == nil { + return nil, false, nil + } + // Value found, unmarshal + var value = &util.TX_TXOUT{} + err = proto.Unmarshal(data, value) + if err != nil { + return nil, false, fmt.Errorf("Error unmarshalling value: %s", err) + } + return value, true, nil +} + +// DelState deletes the transaction for the given key +func (s *Store) DelState(key util.Key) error { + return s.stub.DelState(keyToString(&key)) +} + +// PutState stores the given transaction and key +func (s *Store) PutState(key util.Key, value *util.TX_TXOUT) error { + data, err := proto.Marshal(value) + if err != nil { + return fmt.Errorf("Error marshalling value to bytes: %s", err) + } + return s.stub.PutState(keyToString(&key), data) +} + +// GetTran returns a transaction for the given hash +func (s *Store) GetTran(key string) ([]byte, bool, error) { + data, err := s.stub.GetState(key) + if err != nil { + return nil, false, fmt.Errorf("Error getting state from stub: %s", err) + } + if data == nil { + return nil, false, nil + } + return data, true, nil +} + +// PutTran adds a transaction to the state with the hash as a key +func (s *Store) PutTran(key string, value []byte) error { + return s.stub.PutState(key, value) +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt new file mode 100644 index 00000000..36fb2e3a --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/First_500_transactions_base64_encoded_on_testnet3.txt @@ -0,0 +1,908 @@ +Block: 0 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////9NBP//AB0BBEVUaGUgVGltZXMgMDMvSmFuLzIwMDkgQ2hhbmNlbGxvciBvbiBicmluayBvZiBzZWNvbmQgYmFpbG91dCBmb3IgYmFua3P/////AQDyBSoBAAAAQ0EEZ4r9sP5VSCcZZ/GmcTC3EFzWqCjgOQmmeWLg6h9h3rZJ9rw/TO84xPNVBOUewRLeXDhN97oLjVeKTHAra/EdX6wAAAAA +Block: 1 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCDnSU0BfwYvUDJTSC//////AQDyBSoBAAAAIyECGury+GOKEpoxVvvn5e9jUiawuv1JX/A6/iyEPX46S1GsAAAAAA== +Block: 2 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDLnSU0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDin9u8cjKDFiKpT+oYBKAd8nmwR5oMPTX7k52Ola3cY+sAAAAAA== +Block: 3 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIbnSU0BUQYvUDJTSC//////AQDyBSoBAAAAIyED9tn/TBKVlEXKVUnIEWg7+ciOY3siLdLgMRFUxMhc9COsAAAAAA== +Block: 4 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKrnSU0BHQYvUDJTSC//////AQDyBSoBAAAAIyECH3LeHP8Xd6lYTzGtxFgEGBTDvDnGYkGsTUMTbXEGrr6sAAAAAA== +Block: 5 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBjoSU0BagYvUDJTSC//////AQDyBSoBAAAAIyEDc+pzmn503u60Qxptd99BlywYXm6D4cMA65ExCWM5g+esAAAAAA== +Block: 6 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDHoSU0BFgYvUDJTSC//////AQDyBSoBAAAAIyEDoO+Q7VYFbhJuvloUwRLwuciQyU/ytKvp5xSIo6qUABasAAAAAA== +Block: 7 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIHoSU0BUAYvUDJTSC//////AQDyBSoBAAAAIyEChbxHksK4djxvfgi4VoytTM664Bd6zgo+7E8+TQRHFE+sAAAAAA== +Block: 8 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKDoSU0BGQYvUDJTSC//////AQDyBSoBAAAAIyECMETlaS4M62G/iAGKu5m89dAGPi8IKk5Fh5oWQHKNtbysAAAAAA== +Block: 9 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP3oSU0BWwYvUDJTSC//////AQDyBSoBAAAAIyEDnBGEA/SSj8H0oPqm/ML/5R5FShONBOGCB2tmehT/dUasAAAAAA== +Block: 10 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDXpSU0BNgYvUDJTSC//////AQDyBSoBAAAAIyEDjIZh3LP/iadr3RHpVxLAn7AZWAajLl8O1zmwZHVne/+sAAAAAA== +Block: 11 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH3pSU0BRwYvUDJTSC//////AQDyBSoBAAAAIyEDH96UU8YWwE7gP4Cf+gSH7sk0QMqxrQbuaga2oYw4kpasAAAAAA== +Block: 12 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBELqSU0CwgAGL1AyU0gv/////wEA8gUqAQAAACMhAgIKNC4+LiDFAAd8tDBKMVXae1qYWOoTaazXtuyzwyUErAAAAAA= +Block: 13 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJnqSU0BUgYvUDJTSC//////AQDyBSoBAAAAIyECKjNeYBvHflQBDnsV9ZeC1vcEhbC64+uF3yW6QeOtfIesAAAAAA== +Block: 14 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKHqSU0BBQYvUDJTSC//////AQDyBSoBAAAAIyEDrIfcVRiUMUkBOa7g5pC4wNQedwKRq5DOjaHqqOE732isAAAAAA== +Block: 15 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBK3qSU0BCQYvUDJTSC//////AQDyBSoBAAAAIyECpAwbcwsLplZwrckU2YVwjav4xSSwMl1E7id30QVVbKGsAAAAAA== +Block: 16 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMPqSU0BEgYvUDJTSC//////AQDyBSoBAAAAIyECwfrFEBgeQHRGx3JzWrx2WrgZdbsMPKmxYXSY6SnIhW+sAAAAAA== +Block: 17 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFHrSU0CiQAGL1AyU0gv/////wEA8gUqAQAAACMhAu9x/ERPDFCLH+Zz9EkGacdLHUNJBNJlrjHPj8qij36nrAAAAAA= +Block: 18 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH3rSU0BKQYvUDJTSC//////AQDyBSoBAAAAIyEDsbskjzdWg95PsEVNPlF9UYlBUaDX7pRlaPutz07igl2sAAAAAA== +Block: 19 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLDrSU0BLwYvUDJTSC//////AQDyBSoBAAAAIyECAela3YC/7QecmoXpwcVBHvmq9Igg7/pPrp6+po6gOeasAAAAAA== +Block: 20 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLPrSU0BAwYvUDJTSC//////AQDyBSoBAAAAIyECOCTb7SV0yI7jdXiNlWnfDqCyTM/Socpx6ix0Q2fec1usAAAAAA== +Block: 21 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBnsSU0BYwYvUDJTSC//////AQDyBSoBAAAAIyEDOxvsrCrf3LzfkqF6sW2hdDI0STQcvDDKFaguehlJhjSsAAAAAA== +Block: 22 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBbtSU0C+gAGL1AyU0gv/////wEA8gUqAQAAACMhA7eHkgWUy0f7/M7pFb765ArC4rKVIkRg7uB1rQraTAxUrAAAAAA= +Block: 23 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBE3tSU0BNgYvUDJTSC//////AQDyBSoBAAAAIyECKifvqihaTQSfERtUPc1YLGxxuyHyCyKniRx3yXX7O8OsAAAAAA== +Block: 24 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGnuSU0CFwEGL1AyU0gv/////wEA8gUqAQAAACMhA8BULZnHhUkkwRuChgNlmiruT0O6R8lNAKmIjwuhr7/zrAAAAAA= +Block: 25 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBP/wSU0CjQIGL1AyU0gv/////wEA8gUqAQAAACMhAxGkBMZd+Vjgbo7VWoLTzgo/gcV4AiFLSVS9x890lFRirAAAAAA= +Block: 26 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDrxSU0BMwYvUDJTSC//////AQDyBSoBAAAAIyECffJ5kZ4Q7JLmSbsjk86Kh21LCmDi2MuN4ESioZnesPKsAAAAAA== +Block: 27 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFnxSU0BGQYvUDJTSC//////AQDyBSoBAAAAIyECcJP3Vfc3TUatwc3raJDpEf2EI3rQ30yLph5MO/sy012sAAAAAA== +Block: 28 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBF7xSU0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDhOZsm1BYwtjpDfh7mAKxflVlaFthoun6idSM7fGafSOsAAAAAA== +Block: 29 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNrxSU0BdwYvUDJTSC//////AQDyBSoBAAAAIyECWXKM/kRtVcixvUPEg9y21vCzgqdLCEQG4Ig8mZMlzKisAAAAAA== +Block: 30 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIHySU0CowAGL1AyU0gv/////wEA8gUqAQAAACMhAs/LJ+fERSyRleiLOeSxjUX14Ecz5yzVWDF3lx/L0wJTrAAAAAA= +Block: 31 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKrySU0BJwYvUDJTSC//////AQDyBSoBAAAAIyECPU5mVU5PatRnuw8wIibdoUzITkeZQhk67Kpv5ezUjTSsAAAAAA== +Block: 32 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBL/ySU0BEwYvUDJTSC//////AQDyBSoBAAAAIyECtvPaaw1EP0rmDVLOibHEztobgYLCWYhVSXZJArIwpHusAAAAAA== +Block: 33 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM7ySU0BCQYvUDJTSC//////AQDyBSoBAAAAIyEDzFQB490ZDRQ1WMOuhSC4sZ651G9sh2DJ+ZcuWuIflWCsAAAAAA== +Block: 34 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNPySU0BAQYvUDJTSC//////AQDyBSoBAAAAIyECSylQW41EXWOZ31CvExD6+aXabV0TrFSinEwMY9+pj86sAAAAAA== +Block: 35 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBTzSU0BPgYvUDJTSC//////AQDyBSoBAAAAIyECE8p6oDbtxI7jSmW2lNfLn6oxtoLi88KLdQB7BfBeBlusAAAAAA== +Block: 36 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBG3zSU0BVgYvUDJTSC//////AQDyBSoBAAAAIyEChAl8To2kjVb58pc1oWzLfRImNg9q8srVh4VHczZYV12sAAAAAA== +Block: 37 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH3zSU0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDE5yzxxZ4WFoduT16wym78lpcAw+rP70r2eMnHZ94ScqsAAAAAA== +Block: 38 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBN/0SU0CXwEGL1AyU0gv/////wEA8gUqAQAAACMhAhPWoDG6689omfxxvV8+TJgHb8Id0gkb2k3i0rkvZ/oorAAAAAA= +Block: 39 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA71SU0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDQIng3kzxC1cm+G0Bnth9Sa7KOHFuCm3z4xLyYCJ7O4+sAAAAAA== +Block: 40 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJD1SU0BfgYvUDJTSC//////AQDyBSoBAAAAIyECoY1wflhE9PVB9dwhSknejApBY/eIE0CvIKObEuf6B+asAAAAAA== +Block: 41 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNL2SU0CPwEGL1AyU0gv/////wEA8gUqAQAAACMhAmcdzpOspNYs6o/TN5CzDiqhx9K96neEhROlO47zm49arAAAAAA= +Block: 42 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOP2SU0BDQYvUDJTSC//////AQDyBSoBAAAAIyEDfO7OWX00d7xOLX5GiwhH9WSnZqMSzmnOLg1oZ86i4cGsAAAAAA== +Block: 43 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBE/3SU0BawYvUDJTSC//////AQDyBSoBAAAAIyEDOsp3p/iuhz87/hjiQaW5MLFTEAMjdHBG9toI78bR6CWsAAAAAA== +Block: 44 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI/3SU0BPQYvUDJTSC//////AQDyBSoBAAAAIyEDWGIJZypV1ghaNLShPzAtGfr2hY41jb8JAJ8hk9v2NwusAAAAAA== +Block: 45 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBC34SU0CmgAGL1AyU0gv/////wEA8gUqAQAAACMhAp+9ICcmETU29ZlGo4RRY25HXEhmg91nRnSBASYH18B7rAAAAAA= +Block: 46 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFD6SU0CHQIGL1AyU0gv/////wEA8gUqAQAAACMhA4XwdH0k+Heveh7uQ3phvM9SVCbtT1l9Eq0Y3fPYsjtQrAAAAAA= +Block: 47 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGb6SU0BEgYvUDJTSC//////AQDyBSoBAAAAIyEDZhcjinxBQXVgFLA+iAGp1VZsalDx+gptnX5pzTFgLomsAAAAAA== +Block: 48 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHv6SU0BEQYvUDJTSC//////AQDyBSoBAAAAIyEC1/pOUjVLwQLKHrbmzekcK3mM5m27Pw2DfceQQWGPIAesAAAAAA== +Block: 49 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKD7SU0CIgEGL1AyU0gv/////wEA8gUqAQAAACMhAiDrQHypfIhJFYRfd0eD5sw0sUdED2ddyxZjTYRiTU0OrAAAAAA= +Block: 50 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNn7SU0BNgYvUDJTSC//////AQDyBSoBAAAAIyECzrgonxvoWIwfydrc0JwZfPFzpoqE7TRNHP6fDLJXYR6sAAAAAA== +Block: 51 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFz8SU0BfQYvUDJTSC//////AQDyBSoBAAAAIyEDr0DSfmYfDJs++dvPnylmZNXo6w+uI1FSJ9pE0/LgxQisAAAAAA== +Block: 52 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGX8SU0BBgYvUDJTSC//////AQDyBSoBAAAAIyECR0ME6erPMG6zEPONKd2e4PkWuxQbS3McimdcBviLh5SsAAAAAA== +Block: 53 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBX9SU0CrgAGL1AyU0gv/////wEA8gUqAQAAACMhA/EIOKqd9tFpqUFm5q8D3f0UmaPOpXYHzC+BdKh9Q11lrAAAAAA= +Block: 54 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDX9SU0BGgYvUDJTSC//////AQDyBSoBAAAAIyEClk2EdET+f2E7Kt/Ayfl+I9X7zZ6Mz8jkqR2flAMszmusAAAAAA== +Block: 55 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPn9SU0CwQAGL1AyU0gv/////wEA8gUqAQAAACMhA8v9vShdzgiq3fYDiu7o2fmp0vTpVdo8k7kTuWLDU+xtrAAAAAA= +Block: 56 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP39SU0BAQYvUDJTSC//////AQDyBSoBAAAAIyECmp028rYoYhYHasQ1vK47uroaK1B6WLIP1WHqfo4iAzisAAAAAA== +Block: 57 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEr+SU0BSQYvUDJTSC//////AQDyBSoBAAAAIyECej6GuUWYaRu62yUOCQje4vi8K9C+VTDELG/6lMPSPbqsAAAAAA== +Block: 58 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBF/+SU0BEQYvUDJTSC//////AQDyBSoBAAAAIyECcEE7ucUapHJFm85zreQ3upb18xlIoRNc+wdnsfzPUVSsAAAAAA== +Block: 59 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKP+SU0BQgYvUDJTSC//////AQDyBSoBAAAAIyECyPrrEQItHPOXtZlEQ9qQrCdLxzTF327jDNhBP+e9kHmsAAAAAA== +Block: 60 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLP+SU0BDgYvUDJTSC//////AQDyBSoBAAAAIyECyEpYC2LXJzJqHz8198VHG19CD1+n/kSCnxc2e6ZpBfqsAAAAAA== +Block: 61 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCX/SU0BbwYvUDJTSC//////AQDyBSoBAAAAIyEC5QZU5g1XN84Sap0NGdZwTrxu4t3M+0A+VJ1mYM0LMcSsAAAAAA== +Block: 62 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH7/SU0BVwYvUDJTSC//////AQDyBSoBAAAAIyEDydEjy+7iKghK4PUM8ZyOqRFwsROlC5uw/gNCN2Q9UdqsAAAAAA== +Block: 63 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNL/SU0BTQYvUDJTSC//////AQDyBSoBAAAAIyED1WiZB9m6NTr+d+ME7Wj2XpWGXSnNkIsP72cPYxEHU42sAAAAAA== +Block: 64 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBD0ASk0BZgYvUDJTSC//////AQDyBSoBAAAAIyECzGG9c2zi1DiTrg9QPSeB2rX+VIf/oONq+eJVPLX0qgasAAAAAA== +Block: 65 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJQASk0BUgYvUDJTSC//////AQDyBSoBAAAAIyEDeVzpequjyO8ZQQeEmHHhsoYTJsewby6iJGgc6KSWwpqsAAAAAA== +Block: 66 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKMASk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECAiEO+Qdmz5FpUwry8Ro1MOTfWXk5J1THOTFvnXFi6VysAAAAAA== +Block: 67 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKgASk0BAgYvUDJTSC//////AQDyBSoBAAAAIyECirk7Gw8pjP7Ir8lsWfcMStVKPfkms+Go/OqOJmr0lXGsAAAAAA== +Block: 68 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOIASk0BNwYvUDJTSC//////AQDyBSoBAAAAIyECh5wT3uZUInQ/YidZdpAh8mLwMJ7VCQxJR6ieVMBNRrGsAAAAAA== +Block: 69 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBMBSk0BLgYvUDJTSC//////AQDyBSoBAAAAIyEDA66EL4cQecB7lIS2SvJhOKdVbBqDvMz2sUpg3XCrwK6sAAAAAA== +Block: 70 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBC4BSk0BFgYvUDJTSC//////AQDyBSoBAAAAIyEDk1oBxCVyg2vY53MZolz9+ZSWC+MZx9p3j3k8OFAHJ9GsAAAAAA== +Block: 71 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGYBSk0BNQYvUDJTSC//////AQDyBSoBAAAAIyECDmH2JO8GPQAM7t9hooYcj5sUinvZ78qBuw4Dd4n0K5usAAAAAA== +Block: 72 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKUBSk0BOgYvUDJTSC//////AQDyBSoBAAAAIyECFF5f5/Z+jml3cQzeXcJRDdK8UipNynl5WxeDmlSjq1SsAAAAAA== +Block: 73 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPwBSk0BUQYvUDJTSC//////AQDyBSoBAAAAIyECnhA+aRuRezF2e8WEGG/s7V8nc8EtaztPL+0EpbfjPZqsAAAAAA== +Block: 74 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM0CSk0CzQAGL1AyU0gv/////wEA8gUqAQAAACMhA8IkXPeRF5hovk2URYw48sE8qBZN2/hVmGHDTqfIOUPqrAAAAAA= +Block: 75 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCEESk0CTwEGL1AyU0gv/////wEA8gUqAQAAACMhAyF77cSm6Fcc1+7SixaXLAjqbcACJueGouOB/8fL9KdbrAAAAAA= +Block: 76 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNgESk0CsQAGL1AyU0gv/////wEA8gUqAQAAACMhA4Q4ZrFzL7O+rRNPn1GlFZSj1QPbpIB2mB+Nl8BtW3JgrAAAAAA= +Block: 77 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEEFSk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEDBWUMsPAGRZhzGK/mJPCnGUdp9Uv+IEvklL2r1UTpj8CsAAAAAA== +Block: 78 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLgFSk0BdQYvUDJTSC//////AQDyBSoBAAAAIyEDeN6b8cqvdr+sNsSTYFnPf1UdCFbmKi0gWv1FKVHr7mqsAAAAAA== +Block: 79 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNcFSk0BHQYvUDJTSC//////AQDyBSoBAAAAIyECxtpvDSQjzrxLIXUx1r9SY34QVRzE+AzhV/lFnFMV2aisAAAAAA== +Block: 80 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBP8GSk0CIQEGL1AyU0gv/////wEA8gUqAQAAACMhA4fXPIkMjM8Fw51yXPpY0LpoBqIRi49vNM2NvDZZRrNCrAAAAAA= +Block: 81 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBoHSk0BFwYvUDJTSC//////AQDyBSoBAAAAIyEDPiCVXPu1XICM1gydMr47Nc0ePwNmnm7hUBXmqskaY0SsAAAAAA== +Block: 82 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI4HSk0BcwYvUDJTSC//////AQDyBSoBAAAAIyED4YYspc2ccGWimDbH1cofSdDAkepk8ackLroibbzSpIusAAAAAA== +Block: 83 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJ8HSk0BDwYvUDJTSC//////AQDyBSoBAAAAIyECTp/aW1UTcPN28O7w1Go7jamne+51lR8QCiSC57OzxWWsAAAAAA== +Block: 84 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLwHSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyEDLD0fFf178690BLd3hIBRMWutBwHaeksqee/yOiAdxNmsAAAAAA== +Block: 85 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPkISk0COgEGL1AyU0gv/////wEA8gUqAQAAACMhA8ku4jTOrGgCQdXBhEmQwa8CIcIYVrgKek4mIuFlxOr8rAAAAAA= +Block: 86 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBH4JSk0CgwAGL1AyU0gv/////wEA8gUqAQAAACMhArdNqbvb9LnevbFlhSY+uK9qvP7Ue7psxbAcg4rlJ3eWrAAAAAA= +Block: 87 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPUKSk0CcgEGL1AyU0gv/////wEA8gUqAQAAACMhA6S52CxTnl/IQyoeBkQYmzBZckrsJoGYVwOEOiZERacPrAAAAAA= +Block: 88 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDcLSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyEC/xp5RA5PGqknb6ogNmXbB87Wz3BDHcexnVgIQRSCbeysAAAAAA== +Block: 89 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDsLSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyECERJMGxQyGb/271PHI4bhd1jU9F3RNHBSRzEgBKCY0BmsAAAAAA== +Block: 90 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBEgMSk0CCQEGL1AyU0gv/////wEA8gUqAQAAACMhAknGp243wvzVZofd5rdbvfcvze6rb+gVYanEGskNnR9IrAAAAAA= +Block: 91 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIkMSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyECC6nvDf8UAxjJV0TJgszNp0/vSx6s/xp3jS9KNQPNECqsAAAAAA== +Block: 92 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLMMSk0BJgYvUDJTSC//////AQDyBSoBAAAAIyEDX/Pb/4LxrP8BUqJ5toAAX7zLYkAnR6CSS73Mza4uJ/SsAAAAAA== +Block: 93 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAYNSk0BTQYvUDJTSC//////AQDyBSoBAAAAIyED238//BrNaXpFgoJQqhDfbG03KklVowE63vIF/LhRwzWsAAAAAA== +Block: 94 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDgOSk0CKQEGL1AyU0gv/////wEA8gUqAQAAACMhA3Lt3dFjLO00uwOF5Qi0rbMWM5i4w1Px/zIKRDhJNU8ArAAAAAA= +Block: 95 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBD0OSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEDuKDxIuMDhmTrMmCxNE6VDkEzSChCj8yFp/VZ9ydLsASsAAAAAA== +Block: 96 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEEOSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDaMPL9oFu1z1Q8EjbqHa/qAZLxBTLLyVrKxEi3Yok30SsAAAAAA== +Block: 97 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFsOSk0BFQYvUDJTSC//////AQDyBSoBAAAAIyECA23/zJ/0yI3V3PGTelRLpNJwSDDjSmV4vwATu0APHSusAAAAAA== +Block: 98 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGIOSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyECseBU+/S+VjT6CZMxNhF7s7MdCesDGFzR3+7ebDcDIJGsAAAAAA== +Block: 99 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHQOSk0BDQYvUDJTSC//////AQDyBSoBAAAAIyEDYJIpTSiKIZSZb4WuYs6egFJKl/UljgFQHNA+aU+wlzSsAAAAAA== +Block: 100 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOEOSk0BaQYvUDJTSC//////AQDyBSoBAAAAIyECp0EHEWS0CwHErSiRPEqioQFcxbBk8MgCJyVS8Xrgh1CsAAAAAA== +Block: 101 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBN8PSk0C/AAGL1AyU0gv/////wEA8gUqAQAAACMhAuDXugKxeyPjCOvbF3DocZCvUcibYhIRvwm6c4WnnLOErAAAAAA= +Block: 102 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOgPSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECjWrD9Yi8FDFKE0YTDEAIqat0AqqfwVq+Fc2LFSEwSbKsAAAAAA== +Block: 103 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO4PSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDYorAJhhfbpTZx4n/5cuSwMREKksSS49oEfoujNLXrtqsAAAAAA== +Block: 104 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBAQSk0BHgYvUDJTSC//////AQDyBSoBAAAAIyEC3XXrVkgaG+NMvqLawe0bJMcD/ULrIQ+8MBEt9Tc+zBGsAAAAAA== +Block: 105 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFMQSk0BPgYvUDJTSC//////AQDyBSoBAAAAIyEDKziPAFRNIxoclk2zUULokJ6weapTPItw8jlHqKMAKomsAAAAAA== +Block: 106 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJIQSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyECnap6EmSxNxBja9sb9WKBjEOc+IaVL11ZEfuhicQETSKsAAAAAA== +Block: 107 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPoQSk0BYQYvUDJTSC//////AQDyBSoBAAAAIyEDQbRZLdFqTyYVWs1rOWpWBLenSg+e/GvSst+fkWElJtysAAAAAA== +Block: 108 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM8RSk0C0gAGL1AyU0gv/////wEA8gUqAQAAACMhAlCVtoPrkh4/BjYdI2SNmZQslxj2Ai6F4L9nsNGOSQ94rAAAAAA= +Block: 109 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHsSSk0CqQAGL1AyU0gv/////wEA8gUqAQAAACMhAkVeiQoVVJnM3cKkTS2KpE6VtNM7Hv5m81yM0OLoeE35rAAAAAA= +Block: 110 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJ4SSk0BIQYvUDJTSC//////AQDyBSoBAAAAIyED/MYoWE+Nakd/ASdja62uaaDg8YBaBlPId6zNo9QvOeCsAAAAAA== +Block: 111 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAETSk0BXgYvUDJTSC//////AQDyBSoBAAAAIyEDulAFvCPjIXYYydMeS9Hy9GgxGV1FMXPhjeXT4TAsWwisAAAAAA== +Block: 112 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMETSk0CugAGL1AyU0gv/////wEA8gUqAQAAACMhApYlJaLMQwsCUvCvE2GitF+TAmd3RtY1/OlpcSRgBxWhrAAAAAA= +Block: 113 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAUUSk0BQQYvUDJTSC//////AQDyBSoBAAAAIyEDKEdW/gN0khwyVjZKfx9nJcvH4qOOczj8zqJLykLlCwesAAAAAA== +Block: 114 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBoUSk0BEwYvUDJTSC//////AQDyBSoBAAAAIyEDL/EK5v6tK6oGqFFqe8//IV0PA4SAAQSL9oBlHCE7+I2sAAAAAA== +Block: 115 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDAUSk0BEgYvUDJTSC//////AQDyBSoBAAAAIyEDrFOsSWu4ejinHQ0ZyCsYeFn2lmOi0IZCNlCN7jEiEVOsAAAAAA== +Block: 116 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFIUSk0BHwYvUDJTSC//////AQDyBSoBAAAAIyECj0sipvPHM6oX2Suk6PK+LqKb1d4d/p1V/1QzP9w28zasAAAAAA== +Block: 117 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDsVSk0C5wAGL1AyU0gv/////wEA8gUqAQAAACMhAmeMh63HQmd8cON/IfxgbUeQ7dFT1K21wLz9pxQS4Ry8rAAAAAA= +Block: 118 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHEVSk0BMQYvUDJTSC//////AQDyBSoBAAAAIyECN/Qd2eah2UkEmQg2RIfkcLW0ioNNergQqVMdEfek6resAAAAAA== +Block: 119 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBI4WSk0CGwEGL1AyU0gv/////wEA8gUqAQAAACMhAzMl14BRqQarAAF+6UfE6MZ9xSjCdSfs1kvgxHmb655FrAAAAAA= +Block: 120 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIsXSk0C9wAGL1AyU0gv/////wEA8gUqAQAAACMhAl/2wZV0zb65Vo0vpQlAoAGfK6mW/XdHHHGupdwMOK4vrAAAAAA= +Block: 121 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAMYSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyEDFeUkW4kgurJkKtZppFFONYbuCUqngDiX/Pt9+H0NJHSsAAAAAA== +Block: 122 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBAYSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyECjMDQibQYuqWWAFTuz6dY6kNMSlqIosrrvIdLsUQmfRusAAAAAA== +Block: 123 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBoYSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyEDxmWiC8T1BP8SGur/FIWgXfxYYcHKeL4npwGuFq67ACKsAAAAAA== +Block: 124 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBEgZSk0CKwEGL1AyU0gv/////wEA8gUqAQAAACMhAwHf2sC7W2d2IH994GJVVX7tRHe32CbuCtrzo2MLuMYVrAAAAAA= +Block: 125 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFUZSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyED0hDa6WdJtpZ6p98G6m2UjqiixKyIuJ0MFPajGmjssBmsAAAAAA== +Block: 126 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKEZSk0BSwYvUDJTSC//////AQDyBSoBAAAAIyEC6Tum2NedfqmBS8N+FQE+NDwZ9KFXXPVWJyzmRk8JCCqsAAAAAA== +Block: 127 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO8ZSk0BSgYvUDJTSC//////AQDyBSoBAAAAIyEC7KD44OHRMoAgeSAAC7x0Oj84FPEZi1Xg4SBSggQS4t2sAAAAAA== +Block: 128 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCEaSk0BLQYvUDJTSC//////AQDyBSoBAAAAIyED03efe2zTPZ5E5IEp9ISyf0FMMZEaBTOW03/yCvR2GM+sAAAAAA== +Block: 129 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBE4aSk0BKgYvUDJTSC//////AQDyBSoBAAAAIyECwalSu7EuBcSrjEG2inHKaIpIuFyoK1DRQJVYLf+HSjWsAAAAAA== +Block: 130 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGwaSk0BGgYvUDJTSC//////AQDyBSoBAAAAIyEDnJcLkSa7HVF9W8TBdvX3Vc0B5uy2lxV8HzLiYl89CSSsAAAAAA== +Block: 131 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKcbSk0CNgEGL1AyU0gv/////wEA8gUqAQAAACMhAgwI2E8OE8zFqqaK+g+tivMz9gGHpo+bHjh6ezyFdarBrAAAAAA= +Block: 132 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMUbSk0BGgYvUDJTSC//////AQDyBSoBAAAAIyED3vQjnrHezODS7A3yL6p+uEqBalS+A3ZcnJv1TGYlmdusAAAAAA== +Block: 133 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAAcSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyECPgylKGKmLvlCsYsvfc6etncxnBfkOzyCsUc+2f/5/D+sAAAAAA== +Block: 134 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDkcSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyEDmAG3xKRdjqz1TlXMHkjy8VCwBa7Z0BXDgSFyRhbSsiCsAAAAAA== +Block: 135 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNQcSk0ClwAGL1AyU0gv/////wEA8gUqAQAAACMhAql6KbWWtQ3glHcRUGYj3ZoP5FNTn8LrGsWCelXHorCDrAAAAAA= +Block: 136 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOYcSk0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDI8XxVM4wiDQ8N0moqKA3aYzTf30OHKpT/oNa8gWnr2qsAAAAAA== +Block: 137 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMwdSk0C4QAGL1AyU0gv/////wEA8gUqAQAAACMhAo49WfWmzQi7F5tzwpGkvJ6e8RKR7OYSVJSeKT9IiGhtrAAAAAA= +Block: 138 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNodSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECi017LAVObSf/5Rwfix/FhWBC2jNRTlZ4KfrnUnvfmTOsAAAAAA== +Block: 139 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO8dSk0BFAYvUDJTSC//////AQDyBSoBAAAAIyECW2XIUIXSxutXOlHs48KS0x7TKI/XXyPp59+kvgAFu6isAAAAAA== +Block: 140 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPcdSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDpl1cLBpqfSzONTnwQsdqHOFjhHH0fdVVFDXhrKHzcz2sAAAAAA== +Block: 141 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIkeSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhAo639YmdK+SsumPwiPgosjcIPN4bguWzANGhJONA6npKrAAAAAA= +Block: 142 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP4eSk0BcwYvUDJTSC//////AQDyBSoBAAAAIyEDh1Y6ou0Q7r88w3LyFO4Ou+VAckXDrbCqK+ieFH3jksCsAAAAAA== +Block: 143 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAcfSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECgYYEfoORKB4/4+fBR2LN2pELTRbhJSpFEos+/kwqOWmsAAAAAA== +Block: 144 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJofSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhAlR7Ij1Y612nx2kHSPcKO6sVCct1ePqskDI5nwtrzjHWrAAAAAA= +Block: 145 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDsgSk0CngAGL1AyU0gv/////wEA8gUqAQAAACMhA//fMrrnSOufu49dboDO10CHqbQrMLK8IVpadlmbklNIrAAAAAA= +Block: 146 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH0gSk0BPQYvUDJTSC//////AQDyBSoBAAAAIyEC5OG3sNSMSlP9KpYGnUWZdDg5VNohjMPMsH5fW6AxYNesAAAAAA== +Block: 147 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOggSk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEDeEPHfTsL4Bfb3ccC4idXbDyNqcTkrZKEZVvj17uvpRSsAAAAAA== +Block: 148 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAAhSk0BGAYvUDJTSC//////AQDyBSoBAAAAIyED57ygEjbUgyC3aieMvHbX1pcm4LCUC3IOfdl+PP4fbGWsAAAAAA== +Block: 149 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBC4hSk0BKwYvUDJTSC//////AQDyBSoBAAAAIyED+FCDPTLkqxp0MVfJluKh57I19Dn9Iih7Woi6Tb8afRWsAAAAAA== +Block: 150 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJIiSk0CXgEGL1AyU0gv/////wEA8gUqAQAAACMhA+mAqc9h4nD0t45VfLx2UUUA0/p4kqxabd2ZmYuq6gbkrAAAAAA= +Block: 151 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLQjSk0CHwEGL1AyU0gv/////wEA8gUqAQAAACMhAmPucb2v4yUFUs+fsMFzQHJ1j/9ce58LGgRe6RRh/euHrAAAAAA= +Block: 152 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBB0kSk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEC9xVG/Fl+Y+KnLa3u61DAymQHmlpTDLAd2TlxbUHp1ICsAAAAAA== +Block: 153 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIckSk0BZwYvUDJTSC//////AQDyBSoBAAAAIyECTRtIq6UP01DI9p7iiDVWNa/jito7eNknrlptxob8CMmsAAAAAA== +Block: 154 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMUkSk0BOQYvUDJTSC//////AQDyBSoBAAAAIyEDRUuy+NWMnk9ILuZ8DsapFVsOEDCC2KhTZXhMPg/0pLGsAAAAAA== +Block: 155 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCglSk0BXQYvUDJTSC//////AQDyBSoBAAAAIyECpWAAkqzDwjMqnXaDKK1kwh8APDmky4ymzsjsiQwAPIysAAAAAA== +Block: 156 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBOklSk0CvwAGL1AyU0gv/////wEA8gUqAQAAACMhAyNBmkFIDhmpISxIaAl8BYhRlGkBGV02hWlvr5HUQ8SNrAAAAAA= +Block: 157 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPMlSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyECVUwl8GtKXoE/NvfIsnO79lk3xtuTS0whn0U9xaWNfZ2sAAAAAA== +Block: 158 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIEmSk0CiwAGL1AyU0gv/////wEA8gUqAQAAACMhA2eaRhiZvGK0In2a/nKOXB769+5t51fHwe27IRDD8RDWrAAAAAA= +Block: 159 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJUmSk0BEgYvUDJTSC//////AQDyBSoBAAAAIyECSnRxC9g7iWyJOp5+YM/FZgmbcbPsmVh5aSkjv/1Fr+KsAAAAAA== +Block: 160 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBL8mSk0BJwYvUDJTSC//////AQDyBSoBAAAAIyEC5D7rknn6lh1+hyHQtrGTqi5eDm7RQ3kZ9nTgfZeqQO2sAAAAAA== +Block: 161 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIAnSk0CvgAGL1AyU0gv/////wEA8gUqAQAAACMhAky0lADzyWXLORNQEhDBS4Y+ALXvKIBDqAc++PzHoWMfrAAAAAA= +Block: 162 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPwnSk0BeQYvUDJTSC//////AQDyBSoBAAAAIyEDZl+fHnBeazj0LWAi5pTzm/sexX+/HOAWCH1HgkKwPJGsAAAAAA== +Block: 163 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMkoSk0CygAGL1AyU0gv/////wEA8gUqAQAAACMhA8WnNOO3JQUBUrPDxen13ndh2yW+n3MxlW+XRd2iTLcCrAAAAAA= +Block: 164 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOooSk0BHQYvUDJTSC//////AQDyBSoBAAAAIyEC/lxWWAay2wT4o39Tr2Ns7nwO+lyMF5SZq8rI1U1X/FKsAAAAAA== +Block: 165 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHspSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhAk3t/tXOCj9LycCuXAWJ0v8jtOUZvOEgiA/jVcpaDVusrAAAAAA= +Block: 166 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBIqSk0CkwAGL1AyU0gv/////wEA8gUqAQAAACMhA9xfxtKVRJeu2iyjBtle7aNf4PX9iJp49sOdNZngbhberAAAAAA= +Block: 167 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBUqSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDzt1mHK9GZEgenCDf5gVQ9pkqBW2ynXSIx+R/u1p4+7+sAAAAAA== +Block: 168 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBB8qSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECcmG4uffmlftTc8/q0HovvNkqByGT9iSYD1JLoD3T2KGsAAAAAA== +Block: 169 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCQqSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECKJDBT07ersXWrdbd1y6AZ2YDmQQ6+Vp4g6NLUMTJ+qysAAAAAA== +Block: 170 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGgqSk0BQgYvUDJTSC//////AQDyBSoBAAAAIyECZWWUoDCWh1c1W9w74ve+UH981Eo1UM5e/1v5cAU6fOSsAAAAAA== +Block: 171 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIYqSk0BGQYvUDJTSC//////AQDyBSoBAAAAIyEDF2fHjUsx87d2NosEP+141eCTd+K3U51XYtvUrlrtDN6sAAAAAA== +Block: 172 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBK4qSk0BJwYvUDJTSC//////AQDyBSoBAAAAIyEDFRrbmh92qUy24UA0dOBXZkjabZdjzX09/eehBoXur4WsAAAAAA== +Block: 173 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDQsSk0CgwEGL1AyU0gv/////wEA8gUqAQAAACMhA9V0fQUO8S9LLUYyAF/C1pjsS4Nj04HBCWOIMBeJQpIfrAAAAAA= +Block: 174 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJIsSk0BWgYvUDJTSC//////AQDyBSoBAAAAIyEDUY2+hN3z/qi3FLQeVdbXeo2qvk+n2HI7YnmL++mj2JqsAAAAAA== +Block: 175 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA0tSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyED2ajBIKQoSY0sQtN9UXzjxN9RdlATZuFxZtE/VNb8TRGsAAAAAA== +Block: 176 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCktSk0BGgYvUDJTSC//////AQDyBSoBAAAAIyED0zYlPDsSgALLnDg8eSTEv1O+XSZip7udyNxu6mct6dysAAAAAA== +Block: 177 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBD4tSk0BEwYvUDJTSC//////AQDyBSoBAAAAIyECnmCVvaEzV5T+87o5aRJ7V+zCO1cDMiN8RQrpstQoIC2sAAAAAA== +Block: 178 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEEtSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECw1GLuJsZoO7CcGxZqIj0Fde9iM46b2hCOkkPzYbPpVCsAAAAAA== +Block: 179 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNQtSk0CjwAGL1AyU0gv/////wEA8gUqAQAAACMhA9FiMoAzSvLf//IuTOJ7iIr42iWVGqjSPJgOwD/I11G1rAAAAAA= +Block: 180 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBIkuSk0CsQAGL1AyU0gv/////wEA8gUqAQAAACMhAgzoxgCUp6u2tfbFsyVyNtQa1/eOlPEKsP22ypizmbPArAAAAAA= +Block: 181 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNcuSk0BSQYvUDJTSC//////AQDyBSoBAAAAIyED/KDiunzajPWWBt5052FD09r91nJKgwvJUXu9j+zK8qCsAAAAAA== +Block: 182 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOQuSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyECAbjIKatNox8k1l5eferyl5W0rT74d1W4ZMHOlBmCypWsAAAAAA== +Block: 183 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDYvSk0BTQYvUDJTSC//////AQDyBSoBAAAAIyECDCHJxkNMLSKT4njHLAKf6Fie9Y6EIKdO1Sh7OpFaHB2sAAAAAA== +Block: 184 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNgvSk0CngAGL1AyU0gv/////wEA8gUqAQAAACMhAkuwZCiL1dTp6Gkdi29dKmRdOduF1BfZOSTmEeGVX6b0rAAAAAA= +Block: 185 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPkvSk0BHwYvUDJTSC//////AQDyBSoBAAAAIyECxpIXgk3R2CVVVDs9VbcrPR9+ENIS/+EmgydRuJb02CisAAAAAA== +Block: 186 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJgwSk0CmQAGL1AyU0gv/////wEA8gUqAQAAACMhAtL4lYkIp7ccSXLAtdvkK4ItTk1+TGDCEzuV5nEyBVErrAAAAAA= +Block: 187 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOwwSk0BUgYvUDJTSC//////AQDyBSoBAAAAIyECPCzw98DWpVH8vkz5wB/gBPPv/PSW9hpJuvuBmUzqyyKsAAAAAA== +Block: 188 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPsxSk0CCwEGL1AyU0gv/////wEA8gUqAQAAACMhAvngQPVLq7NX+R44ubEpXFXPa54gDs75/TuqqNVfIISqrAAAAAA= +Block: 189 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCQySk0BJQYvUDJTSC//////AQDyBSoBAAAAIyECcV6R030jneqDLxRg6R42gRXYymzCOn2pZnlautnjtpmsAAAAAA== +Block: 190 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEIySk0BGgYvUDJTSC//////AQDyBSoBAAAAIyECOsJ4ba9fVJTKq/sBzn8ZyEMY40Xde7mq8IqgxzJsiP2sAAAAAA== +Block: 191 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHwySk0BNgYvUDJTSC//////AQDyBSoBAAAAIyEDYaxjeSGC4vmLLnZSBiOQoVs/N8OQhh1VjbsmvSJWDeOsAAAAAA== +Block: 192 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKcySk0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDE6nEK2vcgUcSPaAGG1lcRoVpH9pMgMELnLyWp8PSEtSsAAAAAA== +Block: 193 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPkySk0BTwYvUDJTSC//////AQDyBSoBAAAAIyECgiabwnuNypax6R76wnwP+WoSo5URuQfZJNXGzMJMDHCsAAAAAA== +Block: 194 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDozSk0BPAYvUDJTSC//////AQDyBSoBAAAAIyECRpq1+j+DYgxIgFHEm9UXzHN17P9kTVK05kSzXTwJbgusAAAAAA== +Block: 195 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPUzSk0CtQAGL1AyU0gv/////wEA8gUqAQAAACMhA255L0d5BkzSHLyHyk1k2g8YQ+rO+KUmbt2wRBdI4IAXrAAAAAA= +Block: 196 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBE0Sk0BGQYvUDJTSC//////AQDyBSoBAAAAIyECAIZcl1++mP3bwjoeLm+zNyIQs+IvDkC1PCV4PTBlmtGsAAAAAA== +Block: 197 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHI0Sk0BXQYvUDJTSC//////AQDyBSoBAAAAIyECjLR7uNNby9GgkoGEDLZJ9E+5jbEpdYjmn+DIaqV7EICsAAAAAA== +Block: 198 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIc0Sk0BEgYvUDJTSC//////AQDyBSoBAAAAIyED2qBTZEmx5B7uBDjoBvifJC47pnN69ttFkXMLKYbIV/2sAAAAAA== +Block: 199 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN40Sk0BVwYvUDJTSC//////AQDyBSoBAAAAIyEDqq5d+o3hT8+n8SFTXNxKed5P2hHyzqF5aueZsBs8q/isAAAAAA== +Block: 200 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFw1Sk0BegYvUDJTSC//////AQDyBSoBAAAAIyECfYhreF3fEPCFznCYEHUP49yTjI2+QNlrB/Gnq5CcsF+sAAAAAA== +Block: 201 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIE1Sk0BIQYvUDJTSC//////AQDyBSoBAAAAIyED/MnOAprXSvn+yszmi8x3XMbvywAKC4zCs6rK1IULxLCsAAAAAA== +Block: 202 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIQ1Sk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEDGLR8jsPYWgkNOT25W2J35cPx1tEynq0CqOcvIzc+/JesAAAAAA== +Block: 203 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKg1Sk0BIQYvUDJTSC//////AQDyBSoBAAAAIyEDpTE0hjwmpiIpprcrlfdySjeIXsPXiHcRsbc1nuzsNeCsAAAAAA== +Block: 204 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM81Sk0BJQYvUDJTSC//////AQDyBSoBAAAAIyECFv8YWuZ34zrgQrQJtZm7l1uU/+VAiK+MPKNp6LwyK/CsAAAAAA== +Block: 205 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNw1Sk0BCQYvUDJTSC//////AQDyBSoBAAAAIyEDqIiMpDLtIWiJdsenyU/cG+8Dkb1K6fFgIw0+xtrJpH+sAAAAAA== +Block: 206 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDg2Sk0BWwYvUDJTSC//////AQDyBSoBAAAAIyEDkkPygwnlTXCiX1sKhnXsLegIt0Ljcr9xpFA1SAchL5usAAAAAA== +Block: 207 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEY2Sk0BCQYvUDJTSC//////AQDyBSoBAAAAIyEC0cirEKovJKnAWPMlnZASXhXiq5hBtVY9NmHia/SDip6sAAAAAA== +Block: 208 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIs2Sk0BQQYvUDJTSC//////AQDyBSoBAAAAIyEDR3mrcSLWZyPk+AEZeqDYbMU369AyilWs62jasGgH/FisAAAAAA== +Block: 209 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPc2Sk0BZgYvUDJTSC//////AQDyBSoBAAAAIyECI1tcjpvtgMvY13MdVfn9cI0Q66cYW5MEW2YTmMF0DGqsAAAAAA== +Block: 210 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKU3Sk0CqwAGL1AyU0gv/////wEA8gUqAQAAACMhA4UT2yCaEBXO8+K1tsUXtXvcF/gUyER4o6Mp88+7U7o4rAAAAAA= +Block: 211 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM43Sk0BJwYvUDJTSC//////AQDyBSoBAAAAIyEDQztds6F7JDGdYV3FwkUj1r7QuyPBfdtwItfxQpwDjPSsAAAAAA== +Block: 212 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNc3Sk0BBgYvUDJTSC//////AQDyBSoBAAAAIyEDkO6NUxYzgjwm87IpiOTuAOggdX4N8eq3yLWExeVjzxWsAAAAAA== +Block: 213 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEM4Sk0BaQYvUDJTSC//////AQDyBSoBAAAAIyECVggb+D65XJ0dUkYoiY6b8dQ2WrI/1Slbqnx1ksHEndSsAAAAAA== +Block: 214 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKo4Sk0BYwYvUDJTSC//////AQDyBSoBAAAAIyECBIkqmiTU8fNIMESRp4yM/BAhwbuwjyf3JgY3lYArr06sAAAAAA== +Block: 215 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBI85Sk0C4gAGL1AyU0gv/////wEA8gUqAQAAACMhAkuKR3KQysRLoewC6BecSqjM+t3ka1XFiNlBB86Te8ARrAAAAAA= +Block: 216 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKE6Sk0CDQEGL1AyU0gv/////wEA8gUqAQAAACMhA7jPtN3qUeGA6atc5I6F+797GlFI9rOt/oDjZhAEJ/x6rAAAAAA= +Block: 217 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCE7Sk0BfwYvUDJTSC//////AQDyBSoBAAAAIyECGcFv4b+90LIVuMhMZrmZrBL2HElwCE/ZeIwp2lSkbFOsAAAAAA== +Block: 218 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDI7Sk0BDwYvUDJTSC//////AQDyBSoBAAAAIyECVMM/t4acgW2wl3m7rNrmW2Bcb6o9eysiGc5ZkimmKk2sAAAAAA== +Block: 219 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEU7Sk0BDwYvUDJTSC//////AQDyBSoBAAAAIyED9fuhtvoIzHBSYAYPUi18+TxpIuT3xLBEo5jugxaqzJKsAAAAAA== +Block: 220 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJg7Sk0BTQYvUDJTSC//////AQDyBSoBAAAAIyEChBswuJJl+LxHr3C8ZIa0nhEHu9dF7CBr9KIg9nc3UWesAAAAAA== +Block: 221 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN07Sk0BQwYvUDJTSC//////AQDyBSoBAAAAIyECTfrdKVALUbJ2oTu3TOt89rmu14vx8AzqVBauraYZGgWsAAAAAA== +Block: 222 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDM8Sk0BUQYvUDJTSC//////AQDyBSoBAAAAIyEDEV1Fnz7h+T1mFnKt5rmQfzQyPHUQ1+2t4ggDkaMcc9GsAAAAAA== +Block: 223 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIE8Sk0BSgYvUDJTSC//////AQDyBSoBAAAAIyEC2sGJQbO4JHenGo2TZQQJcET2SFD2GiXBolI5/CuAU7ysAAAAAA== +Block: 224 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIk8Sk0BBQYvUDJTSC//////AQDyBSoBAAAAIyECAvjkjnxZZ5iWH+/mxnKPN4D4g5CowExSUXPQpoi3S42sAAAAAA== +Block: 225 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM88Sk0BQgYvUDJTSC//////AQDyBSoBAAAAIyEDEuJepCVFIAzYpkz71pIQRcbXJntufmttiYSx4Je26desAAAAAA== +Block: 226 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNo8Sk0BDAYvUDJTSC//////AQDyBSoBAAAAIyECLZc94YDLPFptsR2czEZhaZ+pcdPoLYYVJB751wF34FesAAAAAA== +Block: 227 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOI8Sk0BBgYvUDJTSC//////AQDyBSoBAAAAIyECfG5yGKhAyG0ZcdqyJU/qSksw97f/IiRxi+V5VaeyOn6sAAAAAA== +Block: 228 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBC89Sk0BSgYvUDJTSC//////AQDyBSoBAAAAIyEDLtOWt889VoeQivkM0OD5gPvu4EZjsearjW+6aAktEIusAAAAAA== +Block: 229 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDM9Sk0BAgYvUDJTSC//////AQDyBSoBAAAAIyECANaEjBFFTE1JizLMEMoGfQVkfiSwJHqradz50PWbYwqsAAAAAA== +Block: 230 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGo+Sk0CMwEGL1AyU0gv/////wEA8gUqAQAAACMhAiRR64mo80zoSkOCKV95wLrA3gRJbNMCE9T0oxAIvcjYrAAAAAA= +Block: 231 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMQ+Sk0BVwYvUDJTSC//////AQDyBSoBAAAAIyEDcn8cAvoY/POn5kd0YqL63Ub6xgexr8TqR0Tls7wu60msAAAAAA== +Block: 232 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPA+Sk0BKQYvUDJTSC//////AQDyBSoBAAAAIyECjWiw8RmTXPx4gsMqorvySezHazpv92KB9eZ9PHj04BqsAAAAAA== +Block: 233 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA4/Sk0BGgYvUDJTSC//////AQDyBSoBAAAAIyECNdE1/RytMjMSHbHimpZmjabjB+8EYqZniTebq7N+ghKsAAAAAA== +Block: 234 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFE/Sk0BQgYvUDJTSC//////AQDyBSoBAAAAIyEDmekRYSKx5XfTCkyZVAdiP6Q4DTHxwNivraFaO97GvEKsAAAAAA== +Block: 235 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNY/Sk0CggAGL1AyU0gv/////wEA8gUqAQAAACMhAkHJPaTCsoHXiY2be2mOKtscOGlv2qpYRa79Jz7Vp3UnrAAAAAA= +Block: 236 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEBASk0BZQYvUDJTSC//////AQDyBSoBAAAAIyEDeDF4XubIYSUDpx4+aosCmjB7gkUp08Nr6gs7QBx18N2sAAAAAA== +Block: 237 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJZASk0BUwYvUDJTSC//////AQDyBSoBAAAAIyEDq6NpbCSWZNlsn+fgnTEBAHEYnACZXZVzAmrrV+4Y4UKsAAAAAA== +Block: 238 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBChBSk0CjQAGL1AyU0gv/////wEA8gUqAQAAACMhAtyS1H1w3anahuWIOZyrKS1kex0IvtxmonHeXFfUWmEDrAAAAAA= +Block: 239 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM9BSk0CoQAGL1AyU0gv/////wEA8gUqAQAAACMhAlNuTA+BQrHA0LOtsgkwKzhzIuzDbyjyHdMgEQOc+ANSrAAAAAA= +Block: 240 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOBBSk0BCgYvUDJTSC//////AQDyBSoBAAAAIyEDdrS5vHRcn6Akg58B/WI11I9TDq5rwQxpB87c95kCDOusAAAAAA== +Block: 241 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO1BSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyEC+sHBligYx4TtS+cWEZhv2wbBlXfUEPREeqnI5wWYNgmsAAAAAA== +Block: 242 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPFCSk0C/gAGL1AyU0gv/////wEA8gUqAQAAACMhAz5/DxQyf8ROkF4Pg2gD8MYJED0F/URrV0awvF4FMRKNrAAAAAA= +Block: 243 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJ1DSk0CqgAGL1AyU0gv/////wEA8gUqAQAAACMhAvEL6Z0o6OqWZOUYN/3jknjg73MN6uEfYrO8U0szpYcOrAAAAAA= +Block: 244 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMVDSk0BJgYvUDJTSC//////AQDyBSoBAAAAIyEDgzMUayirzRYw3yrhUGTSSwIKEH7UVviFj4UC72FDRlesAAAAAA== +Block: 245 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBClESk0BYwYvUDJTSC//////AQDyBSoBAAAAIyEDsknmetlzUMelgrf+MTCgNbpc6IsOyW0170PjRJT2dFusAAAAAA== +Block: 246 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLJESk0ChQAGL1AyU0gv/////wEA8gUqAQAAACMhAuNLBd7+swlxHxCEeLiXEOYRW/gFQdlgwnIg1JmHbbFKrAAAAAA= +Block: 247 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAZFSk0BUQYvUDJTSC//////AQDyBSoBAAAAIyED8NnbkMpwQSlCl2bnp7p9Ah38qaf/idUQWm5qElWt89OsAAAAAA== +Block: 248 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNxFSk0C1AAGL1AyU0gv/////wEA8gUqAQAAACMhAt7m1hSRY4iYKgdUxenze6Z4eKAe2wA3KD8ldqOw8IohrAAAAAA= +Block: 249 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPtFSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyECoxw6WUVf3l0sGw5/qht59qsliYPKImFMIBrzITNSvbOsAAAAAA== +Block: 250 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBB5GSk0BHQYvUDJTSC//////AQDyBSoBAAAAIyEDa/5HErDUCl+ilct1eVsU1FR8A3nFJHHBJX3myJtQuSusAAAAAA== +Block: 251 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJtGSk0BewYvUDJTSC//////AQDyBSoBAAAAIyEDOfeN78x5nXPqNHxfujrEVkRbFrgKArtNuKQz4umMDMKsAAAAAA== +Block: 252 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO5GSk0BTwYvUDJTSC//////AQDyBSoBAAAAIyECgARqRE+dW6czGMxEd4Qp62s/tOtSOf2yfqTXLQigx/isAAAAAA== +Block: 253 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCFHSk0BLQYvUDJTSC//////AQDyBSoBAAAAIyECGlK3+ujjmC3/bNJUwmrULEeC9wxE6uUTymGByu0Nop2sAAAAAA== +Block: 254 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHJHSk0BTQYvUDJTSC//////AQDyBSoBAAAAIyEDr1fLoRViqetDWdhvOnfoTg/YbqmCjZK6n5vUAjOHw1OsAAAAAA== +Block: 255 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKJISk0CKgEGL1AyU0gv/////wEA8gUqAQAAACMhAiF850NCmPpCLZg6E1c2vK8Y12mh0SRqj5UHoiwegTE0rAAAAAA= +Block: 256 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN9ISk0BOwYvUDJTSC//////AQDyBSoBAAAAIyEDVsPykwKGvHLHzZXEaKdvUxqXECAP9vU1aEunYXrtTQCsAAAAAA== +Block: 257 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFhJSk0BdQYvUDJTSC//////AQDyBSoBAAAAIyEDa7ISIXjuDKz+uNL5/TL3KYXhTFXj2qfjr02EURWSut2sAAAAAA== +Block: 258 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDFKSk0C1gAGL1AyU0gv/////wEA8gUqAQAAACMhA/VtPpHLdmU8spftyBYtXH857a+QxbZ/5G3YSxObE+lhrAAAAAA= +Block: 259 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDdKSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEChiMwbDSEP/9mZGdOsFD4JM/8Vhhu8zcqulQnDwtEhQKsAAAAAA== +Block: 260 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEhKSk0BDQYvUDJTSC//////AQDyBSoBAAAAIyECKsh+x8WJnVho7hFgccsYTtUwz0slkPW7SKfrY3QC0FysAAAAAA== +Block: 261 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEtKSk0BAgYvUDJTSC//////AQDyBSoBAAAAIyEDTn70G2FwjOklF1WM+0/h6OHxm6gEkcgB1gXdJ+wxo0CsAAAAAA== +Block: 262 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHxKSk0BLQYvUDJTSC//////AQDyBSoBAAAAIyEDypCWFxqTkpoIgRo1OgVBTuxOMkz4n0IODvsmMFEG2kSsAAAAAA== +Block: 263 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAJLSk0CgwAGL1AyU0gv/////wEA8gUqAQAAACMhA7Zo5osQ9NKd6UJNOmEqvjmveXdSUeIUkQHv7qSlQ6HVrAAAAAA= +Block: 264 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDZLSk0BMgYvUDJTSC//////AQDyBSoBAAAAIyEDfIBMO0DZ7ILWnWPjgPsbCXd2iCFmDhdnCL9+17M2bcusAAAAAA== +Block: 265 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKRLSk0BagYvUDJTSC//////AQDyBSoBAAAAIyECAMcAWmPnFWdAjyLXES99MTnr6TbIp9rkinzUOV0b04esAAAAAA== +Block: 266 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJ9NSk0C+AEGL1AyU0gv/////wEA8gUqAQAAACMhAtK3cpic/viQVF/p4GRN7ZuuFbmka41cnYUgfhae21zLrAAAAAA= +Block: 267 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOZNSk0BRAYvUDJTSC//////AQDyBSoBAAAAIyECHZsSLy6OzVh6BTL+lnMJdJUFg/y+lNn1gQdFlQIu5iCsAAAAAA== +Block: 268 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPZNSk0BDAYvUDJTSC//////AQDyBSoBAAAAIyECR26G1B7pkR0TbXpUbz0JJ3gA+J4ijsBy72VgfDV/xyysAAAAAA== +Block: 269 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBVOSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyECuBY3aJnhxeMerlYihgEGBGF9vCfoypFS7Z1Xjm9P6I6sAAAAAA== +Block: 270 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPdOSk0C3gAGL1AyU0gv/////wEA8gUqAQAAACMhApd8Sk/3u6WL5vWSHaDvg3UUaZ604WHJfqODwT7TyA+QrAAAAAA= +Block: 271 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDNPSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyEDnBENVP9DDw7ClCIT+HHnwbXsUqh9MJ0TupDZ8rDdBoOsAAAAAA== +Block: 272 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBERQSk0CDQEGL1AyU0gv/////wEA8gUqAQAAACMhA7GPp0LHwkqy4FBy0SgDqXYhTiWEsCWs7GNqKgM1iYRPrAAAAAA= +Block: 273 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFdQSk0BEwYvUDJTSC//////AQDyBSoBAAAAIyECt+vOKLtL9wKpEUjVVVWrSsQ99sgx/YqV+8/CkUiY9HqsAAAAAA== +Block: 274 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIlQSk0BLwYvUDJTSC//////AQDyBSoBAAAAIyECs2+OzzEBWMfTShnFaTJnjEVCXava4psybbPWVrovnDqsAAAAAA== +Block: 275 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI1QSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyECTZvPfgwKuXVlOrX5UJ54Mpxb4uVzFgSN7HYolgaJbMWsAAAAAA== +Block: 276 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKZQSk0BFwYvUDJTSC//////AQDyBSoBAAAAIyEDU498ZAACzeVS1BhC1r6RWvBYcBlbiq9lLkteirNrzQisAAAAAA== +Block: 277 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHJRSk0CxwAGL1AyU0gv/////wEA8gUqAQAAACMhA/RFf4WMmTOKzPGcvMS3CZmOYRCCC+fZzAFrhrULAvuPrAAAAAA= +Block: 278 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAtSSk0ClwAGL1AyU0gv/////wEA8gUqAQAAACMhAn4j+GKryGb9RE6dVgrP62b6Nq6hK3rEjZ+ZmLvWwOsNrAAAAAA= +Block: 279 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKBSSk0CkwAGL1AyU0gv/////wEA8gUqAQAAACMhAu76Jj0FzhyaSUZQlcV3LuFbz1pOz1IfyvdlM4Oos8yHrAAAAAA= +Block: 280 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFlTSk0CtQAGL1AyU0gv/////wEA8gUqAQAAACMhAs1FOotXlgkLRDgWQU/yi/aE0U8U/zQpR6PbM6pu0q4hrAAAAAA= +Block: 281 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLBUSk0CUQEGL1AyU0gv/////wEA8gUqAQAAACMhAkdpln3V9AtTGVHXI7VTPBdGiI9Rnb/wO28AHp//mHFnrAAAAAA= +Block: 282 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM5USk0BGQYvUDJTSC//////AQDyBSoBAAAAIyEDRMzrgAFXp9wnzwC8uCQqwgnar1WobSiC9WzGZNzfXVasAAAAAA== +Block: 283 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBG9VSk0CngAGL1AyU0gv/////wEA8gUqAQAAACMhA3j5R+g938N7rDkoun/hCAMimKYCp+86cJn/7z13BjXWrAAAAAA= +Block: 284 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBFpWSk0C5gAGL1AyU0gv/////wEA8gUqAQAAACMhAgjV9Yp7qlyyUjp5/dIb2fmwXBp7gClhYOOpnlKCdQHSrAAAAAA= +Block: 285 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBLlWSk0BXQYvUDJTSC//////AQDyBSoBAAAAIyECcSk5hCxpm5aMlEGVoaA9RywmsnNHrssmAsRGksFNnT2sAAAAAA== +Block: 286 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMRWSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyECv7BfnETqQMg9qkxrz2QfCbDysKg25BOhNICvsMqjw1ysAAAAAA== +Block: 287 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP5WSk0BNwYvUDJTSC//////AQDyBSoBAAAAIyED4HbHp25RfjeF4/IL8+qUbozO7SV8OKJ4XkJ2OZmx+9usAAAAAA== +Block: 288 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGRYSk0CYgEGL1AyU0gv/////wEA8gUqAQAAACMhAtEEIYRvVcin+cG9/gPyEcuYrmfYMyuHqS3SzgnHr5ddrAAAAAA= +Block: 289 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN5YSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyEC05rigcMpbb2gI6UjOmpb/88BwcYraM/jY2DxyM3FJmesAAAAAA== +Block: 290 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPxYSk0BGQYvUDJTSC//////AQDyBSoBAAAAIyECYiGYIUzxQ9c4YeyROSxocG03qkh20EfIbzSHcErfvZ2sAAAAAA== +Block: 291 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA9ZSk0BEQYvUDJTSC//////AQDyBSoBAAAAIyECjyOgf/1GIcunyn0Cfe3RSX+sTQvyqAi7qJY2IPQ3bgqsAAAAAA== +Block: 292 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHRZSk0BYgYvUDJTSC//////AQDyBSoBAAAAIyEC0V1OVIMreuaIkQHBRjxouu1+JiPFsRewlyid9DhqlC2sAAAAAA== +Block: 293 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBPhaSk0CfgEGL1AyU0gv/////wEA8gUqAQAAACMhAxu9yrpjkeru+WGSNSNnYZsFVyczB75DrMuFS0O1yfCjrAAAAAA= +Block: 294 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM1bSk0C0gAGL1AyU0gv/////wEA8gUqAQAAACMhA0YYJPx+9uCN8vVD4mM5yy4P1OuyBMGfQWXC3hHWShEprAAAAAA= +Block: 295 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM9cSk0C/wAGL1AyU0gv/////wEA8gUqAQAAACMhAsPL3L0C3ePoQz3QeR49kSGk172zGa8GOtvgXF3j8AsLrAAAAAA= +Block: 296 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEhdSk0BdgYvUDJTSC//////AQDyBSoBAAAAIyECGX/6hW/UpcmWJHDxEiKvpWKpxfMAM0UaWGEZX90iA96sAAAAAA== +Block: 297 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHddSk0BLgYvUDJTSC//////AQDyBSoBAAAAIyEDDkC6bD0vBFNhdHlq71Fra3jvriynTUE+Tf8VCLYcE4ysAAAAAA== +Block: 298 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMBdSk0BRgYvUDJTSC//////AQDyBSoBAAAAIyECV+oP9slNLFb1OX8bo+r1BWGUuIA1T7cz+9WfbiDfyQCsAAAAAA== +Block: 299 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMtdSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECT/h+SGj1AvaJDPeLhBajxkANRuZel1P/8lBAXGHmxB2sAAAAAA== +Block: 300 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCNeSk0BVwYvUDJTSC//////AQDyBSoBAAAAIyECUDdwpPmbGWv7WSTQzccC+ZGKRZMQMw9ueAQebmL/Fm6sAAAAAA== +Block: 301 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDVeSk0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDShd/ShSrI5j25YHL6AdMyynwXwPLE7RA3zih+25NfPSsAAAAAA== +Block: 302 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKteSk0BcwYvUDJTSC//////AQDyBSoBAAAAIyEDm5d0lWNxKRpg4haXTbnqyGGh4TkM6vqhwN5cKO9uET2sAAAAAA== +Block: 303 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJ5gSk0C7gEGL1AyU0gv/////wEA8gUqAQAAACMhAxNe3FaWa8OEIOs7vES7Q1oobsGXPC+ZdrkgxtAxIxCGrAAAAAA= +Block: 304 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBI5hSk0C7wAGL1AyU0gv/////wEA8gUqAQAAACMhAiND40HQsVyLEQ9MBsuL2VRt2j781ePe+RlnqwIjCn3HrAAAAAA= +Block: 305 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNlhSk0BRQYvUDJTSC//////AQDyBSoBAAAAIyECskvdq1owUIMtUU0/wCJxztKXIn+SEb9h0o9tmH8Dbk2sAAAAAA== +Block: 306 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBpiSk0BPQYvUDJTSC//////AQDyBSoBAAAAIyECiHXTU2Qrp89KYrw5yarUE55ZxOgJK5p4QOC7f3Li5jWsAAAAAA== +Block: 307 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHNjSk0CVgEGL1AyU0gv/////wEA8gUqAQAAACMhA+bmB9+1FT/JHTSR0DXe9L5qTZMUGMkeCyAqvAh9x33GrAAAAAA= +Block: 308 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMZjSk0BTgYvUDJTSC//////AQDyBSoBAAAAIyED04A+WhT5nJIlRChBs3K3PqoDj3GKt6Xs2ib+bI0EQlasAAAAAA== +Block: 309 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDZlSk0CawEGL1AyU0gv/////wEA8gUqAQAAACMhA9sulRR4GAhwIIoWySbA7Dv8JiHu3R25D1UuAZgUdmnBrAAAAAA= +Block: 310 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDtlSk0BAwYvUDJTSC//////AQDyBSoBAAAAIyECRAZ0utIh6PixGzYmncAGio8s9Er18UDGf8YOrr9qkC+sAAAAAA== +Block: 311 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMBlSk0CgwAGL1AyU0gv/////wEA8gUqAQAAACMhAp2lvs7yS4KPZo+Rzl3O5r2U8zxJqx9BAe4RNWejmdmRrAAAAAA= +Block: 312 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBChoSk0CYwIGL1AyU0gv/////wEA8gUqAQAAACMhApggy0FpE/aiEX61RBVgGj/jLyb+aEJkkApHWkP8SjlNrAAAAAA= +Block: 313 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDBoSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyEC1RZXAXheb0vne7pyxo0wJ+6gdMp8KrGy1ogtsA90N5GsAAAAAA== +Block: 314 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDloSk0BBwYvUDJTSC//////AQDyBSoBAAAAIyEDu6E6EXgrPYWgrmSNq2HKl3o8Huo6YETBMtmnEkv4jh+sAAAAAA== +Block: 315 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKJoSk0BZwYvUDJTSC//////AQDyBSoBAAAAIyECn0ZcxFfxFSVd1QxxYiQy+4Xr4WgsyIV+bOGMSNJoxLOsAAAAAA== +Block: 316 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBK1oSk0BCQYvUDJTSC//////AQDyBSoBAAAAIyECDR8TNLIw3DOojCFg18iSDPPyHd5Hr0dY4xZU/AbTpCusAAAAAA== +Block: 317 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBD1pSk0CiQAGL1AyU0gv/////wEA8gUqAQAAACMhAx/cpRd4jHhU40CZ3Tt09V6NV6fRnY6oops5AaK9hFkHrAAAAAA= +Block: 318 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBExpSk0BDgYvUDJTSC//////AQDyBSoBAAAAIyEDWz3ypJACXosV1QLe/I8ajC08ezpMgRdpPO4RCyt0oP+sAAAAAA== +Block: 319 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMRpSk0BdwYvUDJTSC//////AQDyBSoBAAAAIyEDEQInMLJ9QQ6q+X9sFucLwJ22KlvRzbpgCcd0bRFvMdasAAAAAA== +Block: 320 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPJpSk0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDzDSFi5e6rt2VKVQUkHqaUJtMy4mH3KJzocE3/EqmW9msAAAAAA== +Block: 321 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLVqSk0CwQAGL1AyU0gv/////wEA8gUqAQAAACMhA1wQCXL/jFctyA6qFalYq5kGTXxrnlXw5kCN7BHt1N67rAAAAAA= +Block: 322 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPdqSk0BPQYvUDJTSC//////AQDyBSoBAAAAIyECYcgeGzWMxdkmN3wHj3FqGdiqCZ/s1gvDeaiJl6GW/m+sAAAAAA== +Block: 323 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBANsSk0CCwEGL1AyU0gv/////wEA8gUqAQAAACMhArOwhWKN7fNEsylQYOs9FrELB8SbVvlhYfyWK1AIUYPyrAAAAAA= +Block: 324 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA1sSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyED6SIqWnTyJt0LeaMotEXe1vnDoifwcnOYzQ3GYPtKBbSsAAAAAA== +Block: 325 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBZsSk0BBQYvUDJTSC//////AQDyBSoBAAAAIyECW7o6ef/zh8wZx+wqvW+PGW49b2dGgXC3Olhnx8pUaWusAAAAAA== +Block: 326 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHdsSk0BXgYvUDJTSC//////AQDyBSoBAAAAIyEC54WZrmPKmTwjRDgZxaPojONpKtkTfLE1MDfDfNR7So+sAAAAAA== +Block: 327 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI5sSk0BFQYvUDJTSC//////AQDyBSoBAAAAIyEDjSNUWZW6G78p6QlDKas3EGrj5TtxwcWmCpdLrLQ78CSsAAAAAA== +Block: 328 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJ9sSk0BEQYvUDJTSC//////AQDyBSoBAAAAIyEDzm4l+afXBIHj0t8M3TF9aBPC0y2yb2ShJrweti1oJ8GsAAAAAA== +Block: 329 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCxtSk0CiQAGL1AyU0gv/////wEA8gUqAQAAACMhAq+s961cy+5zZRwWiP64GdvmGWaCNG57f8agT/pQs78OrAAAAAA= +Block: 330 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJNtSk0BYQYvUDJTSC//////AQDyBSoBAAAAIyECeYMamvcTAjuxTSHsVdyGrWsBE+DREQ5pcDlZFwbdJOSsAAAAAA== +Block: 331 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM1tSk0BNQYvUDJTSC//////AQDyBSoBAAAAIyEDd/5YWLMVLlnl0XfU8rV5PwVj48yLh1H0H+xLZX1pTESsAAAAAA== +Block: 332 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOltSk0BGwYvUDJTSC//////AQDyBSoBAAAAIyEDE9MeitjuD8RJO44P/dQhK8nRfb4w+WbPJQBn3TuQbyesAAAAAA== +Block: 333 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBG5uSk0ChAAGL1AyU0gv/////wEA8gUqAQAAACMhA7TFGsk9cOJsjGgjkZUqCZ1InChkARUKbSqHyGXzb8WHrAAAAAA= +Block: 334 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAlvSk0ClwAGL1AyU0gv/////wEA8gUqAQAAACMhAgkQvHJqWPZWjZhL3O8FWochVbyoXZvKo8mRAAlsubADrAAAAAA= +Block: 335 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGtvSk0BXQYvUDJTSC//////AQDyBSoBAAAAIyEDToi/gEVC+9ATssGR+xe8TrEGe7xT087HDfTpEaFQ4JOsAAAAAA== +Block: 336 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBL9vSk0BTgYvUDJTSC//////AQDyBSoBAAAAIyEDpcbNO3Den8ygi53GyDQNLhsM0AFsemnf+q5+f1SZ3TGsAAAAAA== +Block: 337 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMRvSk0BAQYvUDJTSC//////AQDyBSoBAAAAIyEDjTbrEyBGn55+QMdhMTW0ALOjMiBxJVdTv7O8vjz0PbKsAAAAAA== +Block: 338 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNxvSk0BFgYvUDJTSC//////AQDyBSoBAAAAIyECv++suofydbTR2BshSi4TFSv9weOt3ziWGZSuXgyzsEesAAAAAA== +Block: 339 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLZwSk0C1gAGL1AyU0gv/////wEA8gUqAQAAACMhA7QLYU686ntrf/wH45PCQjghwcPS0KP7GuUWIrqCcE+lrAAAAAA= +Block: 340 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBMFwSk0BCwYvUDJTSC//////AQDyBSoBAAAAIyEDqkfWcPmElLwGnloEQGeiJaKbvS1ttNJcSJsrwc4t9FisAAAAAA== +Block: 341 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBEJxSk0BfAYvUDJTSC//////AQDyBSoBAAAAIyECnfOs+lLcdqrdzKNb7tGW6n++dVtSQ/Uz6mTcWZwsHhGsAAAAAA== +Block: 342 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBM1ySk0ChwEGL1AyU0gv/////wEA8gUqAQAAACMhAj0hDV0TQPXA4+ZuWecJc39kBtnueq0mwtFSnezLLUv+rAAAAAA= +Block: 343 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBH5zSk0CrgAGL1AyU0gv/////wEA8gUqAQAAACMhAtgsz0IPBasVvf73ZzDk/OUgRonWeLSaOTCswNvd48zdrAAAAAA= +Block: 344 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAB0Sk0BfQYvUDJTSC//////AQDyBSoBAAAAIyECcEHP7r1zbYuawJrt6no2y8N8tnUk9Mib+I/26ZgMoAmsAAAAAA== +Block: 345 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBR0Sk0BEgYvUDJTSC//////AQDyBSoBAAAAIyECAfxLln08efJ1y0XyGJRaEiNLIUELSr/LQk2DOL63wDCsAAAAAA== +Block: 346 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDl0Sk0BIQYvUDJTSC//////AQDyBSoBAAAAIyEDViUFv+39ptdQjCVo0V3s5b1sna+2UM37QPdSQEGR+KKsAAAAAA== +Block: 347 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNx0Sk0CnwAGL1AyU0gv/////wEA8gUqAQAAACMhA7W6nNXsPLrQGlqXYLjbrH4QA7Yew5XzfwgmmJ3++u0wrAAAAAA= +Block: 348 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBOJ0Sk0BAgYvUDJTSC//////AQDyBSoBAAAAIyEDjWYOqswb4F95Qu4QnQD73TpcFfXYuTI5UHMx8qONuY+sAAAAAA== +Block: 349 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKJ1Sk0CuwAGL1AyU0gv/////wEA8gUqAQAAACMhAvUBO2CyHCfprywohcYCrObMWDjWh4iGylfRt42/1Ke2rAAAAAA= +Block: 350 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNB1Sk0BKgYvUDJTSC//////AQDyBSoBAAAAIyEDY8Id8oMz8KkrFlWs2zYsO5n/HftyDzj3GKHxJ9V9CiisAAAAAA== +Block: 351 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPt1Sk0BJwYvUDJTSC//////AQDyBSoBAAAAIyECpw3MG+iKsTO2dOw/kPpg2bYgLtbrx+NRY3tAjb+cTVasAAAAAA== +Block: 352 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP91Sk0BAwYvUDJTSC//////AQDyBSoBAAAAIyEDJcoHYbHrsuX1EfRdUswfmhHkLNFPDIkdzadoUN7QPEqsAAAAAA== +Block: 353 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBH12Sk0BewYvUDJTSC//////AQDyBSoBAAAAIyEDHumdK3hqs7CZEyXy3oSJJGpqP9twD20FEbHYDPX0zUOsAAAAAA== +Block: 354 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJp2Sk0BGwYvUDJTSC//////AQDyBSoBAAAAIyEDHqOre8xHkf6rEaOlIqsM4UBRkFatZaXfGW/BGLvg9CusAAAAAA== +Block: 355 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCp3Sk0CjQAGL1AyU0gv/////wEA8gUqAQAAACMhAoKaYUbtTnM73y3uxNDqKy2EjGcfb32Ucwh9Md77ea1crAAAAAA= +Block: 356 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBF93Sk0BMQYvUDJTSC//////AQDyBSoBAAAAIyEDBIr7jOb7aJ0a/iUHTn7M+cx5guxmfURqOuKR91Hfm5OsAAAAAA== +Block: 357 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBAR4Sk0CoQAGL1AyU0gv/////wEA8gUqAQAAACMhAtnHD4P5OuLMEOMkwaIhv/0BZgFPVfwHf+doYzMyMdTbrAAAAAA= +Block: 358 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBLl4Sk0CtAAGL1AyU0gv/////wEA8gUqAQAAACMhA0dcBAU1zrAGZtQrALMpjf60ui9Aio1qm+lL9lzAHraVrAAAAAA= +Block: 359 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDR5Sk0BdwYvUDJTSC//////AQDyBSoBAAAAIyECu2AGwvBdGHsRUnGxV3tYL18ftxBRiUhHSPiZ31qmXcWsAAAAAA== +Block: 360 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDh5Sk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECdJAbBaGTd0AVUcdVxiIt31Liw14t1rADGJpqXUlSbvysAAAAAA== +Block: 361 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBGh7Sk0CKwIGL1AyU0gv/////wEA8gUqAQAAACMhA9D5EgGSNwefKx9VG7GdxvuZGSqjQoPzZM2jAI23Yo1YrAAAAAA= +Block: 362 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBBN8Sk0CpQAGL1AyU0gv/////wEA8gUqAQAAACMhAxGnoExVuiond8iy2n41H7oZmGcEX6VQWZz+3O0c9cXprAAAAAA= +Block: 363 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKV8Sk0CjQAGL1AyU0gv/////wEA8gUqAQAAACMhAky76WsHdHTJbAkvnuv71R2saHBNel6F+sWbfPnJ+TyKrAAAAAA= +Block: 364 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBKh8Sk0BAQYvUDJTSC//////AQDyBSoBAAAAIyECwZ+K9C9cBS1I97OKfXeQJ5tvV2pyVJBYOT928W8+IKesAAAAAA== +Block: 365 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNF8Sk0BJQYvUDJTSC//////AQDyBSoBAAAAIyEDPW+87EPmSI5uMg5P8lfuj1SXRMdSzCHcu3EnOKEaTh2sAAAAAA== +Block: 366 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBN98Sk0BCgYvUDJTSC//////AQDyBSoBAAAAIyECmpEQKEnlGICR+RkxXGObpraJYmDOMJRTixqGZnZYADmsAAAAAA== +Block: 367 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPx8Sk0BGwYvUDJTSC//////AQDyBSoBAAAAIyECLTqckuVJ7uIQT0VfNhCToauL6WpF8Ou/lrtUqn/k1+KsAAAAAA== +Block: 368 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBJt9Sk0CmgAGL1AyU0gv/////wEA8gUqAQAAACMhAxyoEW56li5Lxiceziox0uHpnsRqAMLMJFxCOLte8oCBrAAAAAA= +Block: 369 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNR9Sk0BNQYvUDJTSC//////AQDyBSoBAAAAIyECsCKD2KHnlrbyu6WUGTT4JIEZZvQMv9PmvEbRwSoD4DCsAAAAAA== +Block: 370 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMp+Sk0C8gAGL1AyU0gv/////wEA8gUqAQAAACMhAoIdJ/fOa8RZvWU7iU/aGUaiOrQCMgKT5ZMJb2Vjk6SbrAAAAAA= +Block: 371 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNJ+Sk0BAgYvUDJTSC//////AQDyBSoBAAAAIyEDMXygp4z7PzMk9L7OEaGTetj4XOyHhWB29UHISJMqUIKsAAAAAA== +Block: 372 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBP9+Sk0BKQYvUDJTSC//////AQDyBSoBAAAAIyEDVX1IbruQG/FSHMZBck9prAvpQODDfxT75baRcm5iw2KsAAAAAA== +Block: 373 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBB/Sk0BDgYvUDJTSC//////AQDyBSoBAAAAIyED7q6wlz4R1zS4FOXOMyh4RLvVCAQ8AldHstZlA6PlZe+sAAAAAA== +Block: 374 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBN5/Sk0CywAGL1AyU0gv/////wEA8gUqAQAAACMhAu5RJpSItwynYmPLEtbLfLzyCaG8cyfnEx8VTm4LOk+brAAAAAA= +Block: 375 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBO9/Sk0BDQYvUDJTSC//////AQDyBSoBAAAAIyEDH/sHLBmnyAmHAmSlPZLUclfVIzBOl1ZgxCXL6yX14MesAAAAAA== +Block: 376 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBG6ASk0BeQYvUDJTSC//////AQDyBSoBAAAAIyEC5GhzlVJNLsDjLR/rP04KbenNO/6fkglYm+N1Wuo4LwisAAAAAA== +Block: 377 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBDaBSk0CxwAGL1AyU0gv/////wEA8gUqAQAAACMhA/kTeZISeowcv6IKrLBhWHjeB2wqtRN4gvvHh8CmHR+trAAAAAA= +Block: 378 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBCuCSk0C7wAGL1AyU0gv/////wEA8gUqAQAAACMhA9/eKmncdXdW9oiyDggTgYtgoZarW7FmkalS/WmZTHnprAAAAAA= +Block: 379 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBMqCSk0CmQAGL1AyU0gv/////wEA8gUqAQAAACMhA+zqQs/smSu3+uNnC6Wfr3epSEQDCasZgNQ221DSkdYvrAAAAAA= +Block: 380 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNKCSk0BBgYvUDJTSC//////AQDyBSoBAAAAIyEDlg7ykxqE16PC4P4V7m7mW+KY7t61w2tV1aq/4EyVrdSsAAAAAA== +Block: 381 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBGqDSk0BfgYvUDJTSC//////AQDyBSoBAAAAIyED2sP7jeQJZfQvtK+zuqB9MwS8KqKM/CXxK1LxUjaBRR2sAAAAAA== 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 +Block: 382 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJSDSk0BIgYvUDJTSC//////AQDyBSoBAAAAIyECyQc/AvZwyrHTCiSHE7OVE3hiXYaMb6HcDqixfIzW5AusAAAAAA== +Block: 383 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBNiDSk0BPwYvUDJTSC//////AQDyBSoBAAAAIyEC76d0dqCFNEIwEJdooWxlngL6mw6wnOzB3G/MzEq8qAmsAAAAAA== +AQAAAAJDTSsPKYh0w/bYRnwH3qaIOmUN4A1IKYzW+0joMi4QWAAAAABIRzBEAiAr8Xh4YIOG+y576Bs5z26mLrlAc/tSCVdA3AoYdZ6eOAIgPmpvra1X7KfblGuLSMBoyHx6m68HXlsomUEWwrMSa6oB/////+c5F21itYhWavpH9fu8DsAao/BYwDbKDujzzRPkIj4BAAAAAElIMEUCIQCiUWkgI7wj6Ls2yBHmgQoCSA/shxmxAnBLCnlimmuvmwIgJpQT7kHtd56+dMGlQKwc0knzs823gDNzP1cirD63EToB/////wJAT8PtAAAAABl2qRSyIFpNvB1YfF0Hdpl3lisXPqtQdoiswJRIZgEAAAAXqRRB+2UE+LyyggZZYYT9QKXtQrzlPYcAAAAA +AQAAAAJsfZDmPcVCGCJ1ODFlyl7mkUVv029WqDmwSocC6x5ifgAAAABsSTBGAiEAl0A6zPd6BxFwZo+o+MJIyjIeDRBNW3IC3DXAoWh67MACIQC4o5tDaAYqIV7qU/+lm3dRIIEiYwZ3SNPge1XCDegKWQEhApcd1yLs7nu8PNvIxqc2XbdBErbsQTarPVdzS9gNeEHf/////6ru+FspdiLs8xHcXSlmn9TjhjRUxv7qNh7OT1R7pS5qAAAAAEhHMEQCIGQTIa3I+y5klSwSm2zDINek016Q8pokSLGPrELPIZXDAiAeLkfySMQvKc2L0/DtY9eXCYud5hIc57VEkDZfxXNcjgH/////AoBAtigBAAAAGXapFLyfR0jI5kmy0HcomI7spk3zCtfjiKzAyq0qAQAAABepFCkLujKkkxV4mgMLtAsAR/j7kP9mhwAAAAA= +Block: 384 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBHGESk0CjgAGL1AyU0gv/////wEA8gUqAQAAACMhAjEGa4bqDL3auhqvd6WOXyPzubyhsKYufOFrPP0fx2yXrAAAAAA= +AQAAAAKONDBXPP3i8+Huzorv5mHdhBvLZl01gyQVurT3UmeFIgAAAABJSDBFAiEAnMqPscSjSYLE6aWf0VhWQEwCCF+SYEPPxmZJJKW5420CIFgR+Fs5XENJIWS4szhn10UhHYx//c0bKI5W9029rtFbAf/////jq/WYGhvWRX7Azcq3bMKhdtwNfhb203ga68aE8TzE/QAAAABIRzBEAiA4e7zumeNw6iEV6sz9jEjrOAZTMDtmxpRuCQP7C7xvhgIgKy7wSFGdRVJUE/ZLcnodhf8s99katGBzCCJLTDDVhGgB/////wJA8fI6AAAAABl2qRQiA8pZ7fZpaXV+bMkjixs29Nw1uIiswPIYGQIAAAAXqRSeshmA3J1BPY6sJzFJOLnakg7lPocAAAAA +AQAAAAJzosVNU2wZ8NCRVu+60Yym+WsenzvISQNClY8k7Y/DLQAAAABJSDBFAiBMhuLgS149dvF38s3XyBcLJctyfM8cmxTOkmK2vGfp0QIhAPp2suH3JfxZ+04h48HWZ40QgcHt04ESfQJjzRuypfBTAf/////oBzpcCoD5jhX8Auz9GV1ioEUEKyc8ZVyLNg9mYOjnIgAAAABrSDBFAiAtloB14eFcqB/nJUQNxjV+AgMBlyXDygW3fL04vMVdBwIhAMZAhqcGKbMHV4U1XYtcVXdyvsnG/JZiNfkwUw0ympNkASECOZ3dTkuqwZZe/E2IJlbySGa+FM9bz2QiIzTx/dWSBIH/////AoDi5XUAAAAAGXapFHzHj+QlGySumyOjmeIWCHnxiDNiiKzAXuOhAQAAABepFONxeCWCpK3bVBNixVVl0s31b2SYhwAAAAA= +AQAAAAKjDj8UKb8qjtFMpuyfM5a4WTuLtqweTTW9Q18FBYCU6gAAAABIRzBEAiATvXKkQqFB1YzKA4QXAM1WETClMNONxQymJ4EMqf6DbQIgZpBxlR1C+pCwJjN1I+H/PKQvojKsHUp3ZpLoXXBjjJYB/////yQ1aPL/a/kDhqTXV20jzZIqgpx9mK0SUdeNnlGk32HyAAAAAGpHMEQCIGom075AfeA/vSILSItlgz4/T7VRZM1a69VJr4UGADTVAiAjOn1iq3gqJGfXl+IHbwQ/lgzkqx9gfCkiuxRlhPyrZQEhAsukzpMrON2dpTZox4fT/D0ks37RFtlrQsWIWFqGWf1W/////wLACT51AAAAABl2qRS0Qdm9GwTXUvkfFNxk7Xx7eu4TT4iswCh+3QEAAAAXqRQJ9wuJYWnDeYHStUs3HfDYGhNqLIcAAAAA +Block: 385 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBCOJSk0BYQYvUDJTSC//////AaB4ByoBAAAAIyEDumW4wKCi0CnkzevDkYheRm5ly9+odjj4tkYNDSvo1aKsAAAAAA== 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 +Block: 386 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDKJSk0BCgYvUDJTSC//////AQDyBSoBAAAAIyEDeTdOC2CP5ahK99R/fs1AWCY1BuzhE4oiDZ/tLY00/x+sAAAAAA== +Block: 387 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBHyKSk0BLwYvUDJTSC//////AfA7CCoBAAAAIyEC9BAiK0EeqqMVSmZ6mkClvJ3+6BG153J0iJPKHv1EUl6sAAAAAA== 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 +AQAAAAGUV+Zp3Gs0TACQ0Q6yKgN3AiiY1GB/vfHjzvKjI8E/qQAAAACyAEcwRAIgRA1nOGon1nduECuCzi1YPiPVH4rDu5R0m9EMA85xQQ4CIEG0bF1GsU73KvnZb7gU+olAd9U0pN4SFTY+5o+41PUBAUxnUUEExL7l5tu1wWUUN8tDhsFRXHd2xkU1B3IExvJPBaN9BKMrx4vrIZO1OxBMmVTESwzhaLx479Xx4cfbnWwhswFlmSECfxDDHLKtfgOIz1GHkk8SlAgrpdTGl7vKf9g6avYdt9VSrv////8CUMMAAAAAAAAZdqkUYWeuruxZg2siRHuK8sXmH7Txt7CIrACj3FwFAAAAF6kUnrIZgNydQT2OrCcxSTi52pIO5T6HAAAAAA== +Block: 388 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBKGLSk0CHQEGL1AyU0gv/////wEA8gUqAQAAACMhAwX9IJKSmlcapcG4YDQm05VDWbbhumnE3UuFJurVG6j/rAAAAAA= +AQAAAAFsfZDmPcVCGCJ1ODFlyl7mkUVv029WqDmwSocC6x5ifgEAAABrSDBFAiEA2eqQkvC+WlQ3MHYZM3373Scyzz8j+Zd/tDW0pbS/RmgCIAw33THNfTjV9LmgDHUekFk1b+8O1OiPUqdbTnx0PzRNASECyiqBCrFySbYDOgON5WOYOIG0BpJwGD88CrqUVlPkQhb/////AsDOGB8WAAAAGXapFCOVLLskny8m3VZ8LoNF14XGNUN+iKwA8gUqAQAAABl2qRQyBAF4xc+ByyAKuZrxEx8Yd0W1FYisAAAAAA== +AQAAAAEkNWjy/2v5A4ak11dtI82SKoKcfZitElHXjZ5RpN9h8gEAAABwAEgwRQIhAOmPoLEPUZJMoLIdyy8enTg7ZSzi9RkWyu7x5H0T/2ekAiAmy5/zI82unted3YKaDMG0nJN0wmKT9U2RnLbcX48K4gElUSECyiqBCrFySbYDOgON5WOYOIG0BpJwGD88CrqUVlPkQhZRrv////8CwNinAAAAAAAZdqkUSy0ZmkDUiL5v5TBaHUX0kFOvS/6IrADyBSoBAAAAGXapFGsgRBRqRDjm5b+8ZfFHr+tk0U+7iKwAAAAA +Block: 389 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBAuMSk0BZQYvUDJTSC//////AVC1BioBAAAAIyEDJGxAijhRNKm/X0EFXtwmUwawz0PM+8WvaeoSnQegJsmsAAAAAA== +AQAAAAJSJqjPEi4VVb4BqQCCGW1UhFTnPFG0i0G7IE7FOPIZ9QEAAACMSTBGAiEAuW4v0gFbs/4iwjxxLDrEqGNtSnjffWabq9ZOq6MUwjYCIQD0AtfjOS0XcM4r4Mgj6rASK7g+4L1l9d5Uof61PkUu7QFBBMS+5ebbtcFlFDfLQ4bBUVx3dsZFNQdyBMbyTwWjfQSjK8eL6yGTtTsQTJlUxEsM4Wi8eO/V8eHH251sIbMBZZn/////cRmMYXCfjZiDFfRfo/kWCnDwUlX72tDY+6yriJwASNcAAAAAa0gwRQIhAJLpb0GF/Bu3S02cJYIZ3F/8ca+0PnPsDni92RuvvjhuAiAZ/Fs9lgIAW2H13HXnvU3eHBmgcAwKeVhQNSgBTTkBkQEhAidOrgHTkbvsMtS2DiTV0k+cwjyo2mcIz2wGI4G/pxAG/////wEA8gUqAQAAABl2qRTb+JUJF2qXXkHQTMCvJM/I3kOUqYisAAAAAA== +Block: 390 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFmMSk0BSgYvUDJTSC//////AVC1BioBAAAAIyEDfDnB8DlD9eTbYyQ10IiEdqtdt+iuGlZQ79UD9qNfIXusAAAAAA== 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 +Block: 391 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBI+MSk0BMQYvUDJTSC//////AQDyBSoBAAAAIyEC9TSrbZ8/QJobDAd6MZORdK4GdzdThyfnkyXDILNNmn6sAAAAAA== +Block: 392 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBFKPSk0BOgYvUDJTSC//////AVC1BioBAAAAIyEDvoTLWezyb45BZ7zEyR3Us3sUS0mYCzmelEbXIY64AUesAAAAAA== +AQAAAAHOQV6rnLo1SuBCwirJ8Gwaadel26ZxNvq++T2C83TdPgAAAABJSDBFAiB3NTA++3Fv5asTpCQePVx2VWuL5ToC8wKbhih4iuS8igIhAMZyNEufv2E8KRo+dfJfmzBLeevpe9ryVLihAw4NKiLiAf////8BAPIFKgEAAAAXqRQpC7oypJMVeJoDC7QLAEf4+5D/ZocAAAAA +AQAAAAGDKMjO0oyVqz+XgfONl6reqgfFgmf9roJ6x8plzhnwKQAAAABrSDBFAiB7cPcRvrTWTdVObIsT4VYcgwJdynx08WdNHm99d1PgwgIhAPJAUfw4vVIT147Ze6bYJCz+d6m+GcuIT81RaeHrRQKJASECZmcCPB/PiNe87QJpmXx7gTbPIOmu3oP/WVFORzQPHvT/////AYAaBgAAAAAAGXapFNv4lQkXapdeQdBMwK8kz8jeQ5SpiKwAAAAA +Block: 393 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBIGPSk0BKwYvUDJTSC//////AQDyBSoBAAAAIyEDNpb7mdoBVlmuNermDC62XfiJkUfwG8ur8R0qSulSX4WsAAAAAA== +Block: 394 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBM6PSk0BSwYvUDJTSC//////AVC1BioBAAAAIyEDn+iPQp+cSxRdE0IKHAFZmt2djOluPWsZhmm1BjnavT6sAAAAAA== +AQAAAAHkoS/eVsA+6hrLXrG1fTWrHablXVROghLEfOJ3QWsbPgAAAABKSTBGAiEA7es8koOmJhXkaSVtgxuox0Ggavk/t3eKgZp0LwcMRpwCIQDrYPJhNBhf4pz+OvDnT7vMhX+UrcxmFmDdjF2VPlotbwH/////AQDyBSoBAAAAF6kUQftlBPi8soIGWWGE/UCl7UK85T2HAAAAAA== +AQAAAAEARQQA2oX+EPd8W3TQYEMAO8TVxDpZyEeAEdKBR1IaXgAAAAAmJVEhAsoqgQqxckm2AzoDjeVjmDiBtAaScBg/PAq6lFZT5EIWUa7/////AbAuBSoBAAAAGXapFNv4lQkXapdeQdBMwK8kz8jeQ5SpiKwAAAAA +Block: 395 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPmPSk0BJQYvUDJTSC//////AQDyBSoBAAAAIyEDOcEdldIyfNcAZe0ChYQJazMtYhbi9QeycTlbwnTERmisAAAAAA== +Block: 396 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBA6TSk0BRwYvUDJTSC//////AQDyBSoBAAAAIyEDtvkQ28+OY54ki+oXYvWa0fw11k8vxB/B4cMH7V58twOsAAAAAA== +Block: 397 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBPyTSk0BIgYvUDJTSC//////AQDyBSoBAAAAIyECx9UHjpCRe3FVOjaiFqNnSgnF3v2HBWMDbbwmwU43LEOsAAAAAA== +Block: 398 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBDiUSk0BYQYvUDJTSC//////AQDyBSoBAAAAIyED6NynJo7IyuATbKSg3y1fpVP8O+mZS7AI0jEGsnyk6TusAAAAAA== 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 +Block: 399 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBOSUSk0CoQAGL1AyU0gv/////wGADAwqAQAAACMhAwWATENJI4LZrxPmcvXDkIP4oILvDlNtpSIe3aTmbHs5rAAAAAA= +AQAAAAEYemFomu6WB6jgRLcc5wLhLo93JCrQbCIQVqLmKvjenwEAAABvAEcwRAIgMUBB7UkPFcKRwpQ2ppmrQEqAddlVGHWCxYOxDT2CndsCICAzb1oew8QRUfeL0wN/tUn1kcW4SC1a9+QYVf182CmeASVRIQLKKoEKsXJJtgM6A43lY5g4gbQGknAYPzwKupRWU+RCFlGu/////wIO5f8pAQAAABl2qRTA+jRUjiO4R3d2gGNIjjYeVHXAqYisokkFAAAAAAAXqRQJ7WFyUzBf0zSSt0PAnVOJAqAYi4cAAAAA +AQAAAAHXS2aZtfwFQBnJTbR6pJBfBqBzDafhLxQWNarOn5uOAwAAAABrSDBFAiAmSZcfqh28snMwDar+myEZCC+zxsGVHLTItnIHif9PVQIhAJulOSfmABxEbf26o8qF8Z+7nXW1hnPL0VHZkYZ7/oFpASED8L+R4mecWZoxcSk/4Umczfiqw9HRCo/BnVT6SSMU+1j/////AsTH9SkBAAAAGXapFGu5nw1ZHDUK4KHbZH4c0eVS6PM7iKz6WQkAAAAAABepFPJoJEifN04t5t3fXmCyZg8lSSHxhwAAAAA= +AQAAAAE2eVAxYywjiTegFBCqu0uBMkHUkuU/F391vqZwfy45SAAAAABqRzBEAiBAQK7Jahx3MIM1iN7ho/onuCnBKBNsgPskeWTDPxkh0wIgPdW3JCIfUO7D4GC3eC8jzbjP+OapMXWvbOlRbgBlxaIBIQNhca5PrHXijaGCrWaMJQg137sA2OwIlnGdCSnTg+4Y4v////8C7DvnKQEAAAAZdqkUY5ELymWFNoy3/g8x9bcPUUBUV4yIrIjIDQAAAAAAF6kUIsNpkEhO6uAL8Qo6dJeAC9DfNMSHAAAAAA== +AQAAAAEpb+k5AA/ztHSWTCHX+6iMYNeKmq6uENXr9V9cgvMOCwAAAABsSTBGAiEAxuEhqXApzED8r6FAL+y4hhHRk/LdnQqIWwzNjVYfD1gCIQCtPqibkMWAlF+AI6/Ae+qnyXwU7Kpe46Ome+hTcq8T2wEhAohuoz5IYQsp5skgDFRa3Txgdvxjsy8AGqml8D3+1sjj/////wI9Pd8pAQAAABl2qRSd1DexqbPGJvIj81jtpvKkjYuEWIisXzsHAAAAAAAXqRSZXr9dnjcFYRO/VrWJO0SvKktBj4cAAAAA +AQAAAAEy8Ytk2HmGug8/K66bkj2s0/qcy0B3UytaQ5hWTXgujwAAAABsSTBGAiEAtAA5AEJBF1I+u36MCpxXhzSgl/cM/CnNyQDaUAgsfR8CIQCcmP1p+dzb+ESjvy5pyRyWTqsswtJpmNweUhREvD5jTgEhAm/CSCKg7nlegfy0qICHE6KBO2nBIpwxZ1zvGQam6a5F/////wKjcdopAQAAABl2qRRsaEfTwgmX1Pcbsc8IBcOR4kIlnoisSggEAAAAAAAXqRQiw2mQSE7q4AvxCjp0l4AL0N80xIcAAAAA +AQAAAAHeeGceSSZdHU94KZpwntO+yJ9zd0chWXc4TzwOjZNcOwAAAABrSDBFAiEArPj3U43jIhq0aIJFnwARQOl1HTsw71RqncGpl9r1Vg0CIFZ8Wi6teik0a2I8faD2hJEotPlqgefMeW3/KK71owaZASEDnsThhAFyNC7+eYnVNPtgJ78wpnn4FDwAXH3g946IHRv/////Aluq0CkBAAAAGXapFD7J68nMuNbVW8QCYXwGGntwYZX/iKz4AwkAAAAAABepFI1tVcAzzinCd63Lbz8rkcJZN98XhwAAAAA= +AQAAAAFV882a/8lBiW3mSCozGzkl+cFPa4lS1DitnbAk/E+rTwAAAABrSDBFAiAOw09Uj3EPXaEORyENJR8IeGpm5IX5EbPoCoAfz5chHwIhAO5dXG8PSpmsBHMbBJMzA5Xhwu1gF7CAcryk5pCx4K1ZASEDMeou/3Yr6k5eErytbqBuB1NYLuW4DUTIXjR/S2BUUw//////AqaYxSkBAAAAGXapFMj12lDzBNDLmZ4R9WxYoY2hk33UiKxlTgoAAAAAABepFFlef/PKlBdc7dX4CnFsae6Bm++RhwAAAAA= +AQAAAAGftEel6MpHDpkuXZ1kKvi0Qal2B5jJxitUqDjzhhUAPQAAAABsSTBGAiEA+Gdv809SSSXZObCPMpaRd0bp3OulpBhbRa/D1yemHFECIQDv8AsavmQD+cWDbsD8Ak87oaAfuW4ZhCrp2MoDbTPDqwEhA4IY7wETnSynucnsTT6WH2wZSD986SVrb2VB+GHX1Qq1/////wLQEbgpAQAAABl2qRQ7GOxj//1/b8r1mCuCwFQT/+2hkIishsMMAAAAAAAXqRQJ7WFyUzBf0zSSt0PAnVOJAqAYi4cAAAAA +Block: 400 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBJmUSk0BOwYvUDJTSC//////AVDqEioBAAAAIyECuljqw+MP5l7/ICahRg6XtR3ohrGbc9po0hvur6RV+qesAAAAAA== +AQAAAAGcfq70oM6PdtBY9b+7K38netvpx2AvqDza56yZPhCWQgAAAABrSDBFAiEAjBMT9ZLueGLNFJuj5EsJYZCayziuIoM5yPD2//Pm09ICIEKJ+zbg99nYh4GfmDlYc76TC1WeLmFkG58M15MALiRlASECNct66ILT7FNAH1qtZYLwykxjfJfBMTrCa9PlVTlfuBr/////Atr5rikBAAAAGXapFG+iHhu9dY/X9mng+0Asp0l6YfnOiKymVAgAAAAAABepFMfU8xfvUh6lQcQoxV8SEybHjG2GhwAAAAA= +AQAAAAHQOZAeD1/nNmb8oygfZWOEsUuQtX6I0Ixz+hzDURPmYQAAAABrSDBFAiEA3Qen8yK3lbNGHRALn5IscTtkPM740+7S4r+ikCCnTqcCIGvKaoZXIwiwe3iVRy9Y4qWHgwG1Iww3veA3GwrcQvRoASEDyyKDUpm0oeYLNH/nnSkuTtlD9tHYUEhEceqt5T3ScA3/////ArZjpCkBAAAAGXapFCuZ8YeeD68fBVMn/A0aRFqNH69LiKzU0gkAAAAAABepFF/AQhLH+xED2Z3X/0VHl6KB75L1hwAAAAA= +AQAAAAELnODRd4hSSTO5GK4pzShPQXrH0a1XJx5XUrKCf0UBCAAAAABrSDBFAiEAkRzk11GS3EvvD4Ih0ztnci9cjKLP4zLqkk2rY5ge7aECIFzdFZxNHd/ToHuMpXxYfjPTQhs01DgokCqp5KmpEgf0ASEDgTRcHa28ElD6UnpC+NcnDO9ok1b4M6VR3zjFQ5h2W2T/////AgdllikBAAAAGXapFJL49zjdmO0UNyzogBeB08zpzXyniKxfOw0AAAAAABepFF/AQhLH+xED2Z3X/0VHl6KB75L1hwAAAAA= +AQAAAAGkw++cvZppjEmKxeUD5E7gqmEqUScTyuHKmscuPaf98gAAAABqRzBEAiAvzEy3HoQsJzC/e5W4025fOvEPKJaOjkI5iZemcvamRwIgMqVPVJ6/6KpwUSyBTE1cg6zm2APqzHnHV/PVs4kpYjoBIQOuUy9q/aNabiGg9HinqxGBPJ27U3cmYk+a9qcwns98z/////8CfR6MKQEAAAAZdqkUUeRU0WUEduMMeZU1vyOKUQdHjaWIrDqDCQAAAAAAF6kUWV5/88qUF1zt1fgKcWxp7oGb75GHAAAAAA== +AQAAAAHQ9ln9ETnhrKSniE9X8yPRv8iYFNeSaGBgPSB5ctX+BgAAAABrSDBFAiEAsOYhpsBDwGcsTeM27u/qi0cc2N0hm45TnLa/Hko69QMCIA/Vkrb9XXM4j0Z1+0mY4ntN/4NXl/oPOc+maMIQO3mQASECsax3f09p7xIZiOeBQ1wb64cf1sDIQaL1hRg0Ecstp1X/////ApVbfikBAAAAGXapFPcNK8fchLSf+Oram/GDf+P5NjSpiKyY/wwAAAAAABepFLr6YCXcLg8Y1LnyWmHQQwv2PbdBhwAAAAA= +AQAAAAFRc6cKU4PiyjqZRm+01NY7paVzDo0H+tlo6gsAeVs1yQAAAABrSDBFAiEA/MKednI+FqzD4jckhO/pcgHdOl0Il7EBC4Z5QRe7yFkCIHKm4WsLq8+GeqzcPA82U/VK2IZi60bdXqN4vb416xQ2ASEDGEXNI4MeBT9pNPyKiEBHxmvjDllZRrq29hh4UZOc0Tr/////AjfzeykBAAAAGXapFI2VnT9110MsOiIcl/VIxdtIbHFSiKwOpQEAAAAAABepFCeRXi//MqXnTFLLhNQjZsCI5hfGhwAAAAA= +AQAAAAHtaNLFyEkppn2lcYYwS2TyZp8KkNf+Mf0cUguMKcxFGQAAAABqRzBEAiAtWpVoE336x72BDn0Pmf1DyA/NVvn3nRDJBvo6FiFPFQIgQvXKZLKvgWaiu476kXuysm4v7/UsLnASYnnrzFuOUqQBIQP1abkWxRKczCsuIPfotroExZsuj+H3tVJ7FVCP8CJFPP////8C4YhqKQEAAAAZdqkUf3jmoh/3b/gU4YMLrPuheE+Kog2IrAanEAAAAAAAF6kUQnOMWbvZz5TgNv4PQL7vy6ImiSSHAAAAAA== +AQAAAAHJGYgT4exYOPKuth9MI18d+dWl9P6+EqxE1+/QujdxCwAAAABsSTBGAiEA4XVwfY06cae3KVF77J3dn2g9tPfBEJmPWXfT3ldoElICIQDSbvRzUx7zOgIKtvZDSz8Ov4Vg8CQqRdxtb0OLVejGDgEhAuRh4v4SZ800jBdcIeofvWvSjj2bjFWWv4Wh3HZJfPaX/////wIjq2cpAQAAABl2qRRpp65WuzA68Wv6Rsp9f4As9u2QB4isbhoCAAAAAAAXqRRl9vcVF8n9SFQXBJwt7VJ1U8LRB4cAAAAA +AQAAAAGY1WU2y/ekWi2sEl9os1oQG3jyQqdadeS204sJbXC3ZgAAAABrSDBFAiBOvslv8VEiq9GILx9657JZnQUXRlEpwuYWwIiKBwj1JwIhAIzQE7tBvnd77tP2onvaF5lwcL/XCoLE06+fi7BMCYRpASEDikwXTYhSnor4sOKV9ZgNW8LEeC2WneE2G69bHPJEfHP/////AuIpXykBAAAAGXapFNi3UymimO3HSFDwaWuZLbcxZsV3iKzxvQcAAAAAABepFBxkS5vaRBEfdQmIEg4010oAtZJDhwAAAAA= +AQAAAAFnDdares3SL46wrMe2PT91htYiDS4ZE00pCK4A0dJ/QQAAAABqRzBEAiAagjtYLwL7+RFp/KrbWO1e3fNcgISPe6j231KnK99r7AIgbL0HaEykDmrxAqiTk3W1/htsxgvONrHrilCYp2WlhaoBIQPhXU1lKOL0bLfS27sr2tzBjKVdHyWmb6fdbiDmijrI3P////8C1lhWKQEAAAAZdqkUUchR9w/Z71UaiLraS6TI5A8sCgeIrLwNCAAAAAAAF6kUZfb3FRfJ/UhUFwScLe1SdVPC0QeHAAAAAA== +AQAAAAH08hXNlnj+6ovipjHshRvX5gpKNj3KpqnYGOvDM7ij2QAAAABqRzBEAiB/WHI0d/ce/9B0p+Sd19/KIFtdxYZ/+BY6SCpiPj5TpAIgI1gy4CL/x4qhwEVR0VwVI64rJQxnx8uPYhQeg8GOJcABIQPOgyOGDxR+gmzq1/Y/+cUaAznWp0p9b3e5gLHGer84yP////8C6DJKKQEAAAAZdqkUju5+a/ucoOqYvYbfCY6nirZ+KdmIrJ5iCwAAAAAAF6kUH6zk0Dqu1PtsA0Qes6cTeTI41iqHAAAAAA== +AQAAAAG6Rr7l1r92/eo1ELbA4/NmjqlNVb5U16VIcQ7TZwOGBQAAAABrSDBFAiEA5WcWj5pgI8NDrbCkeVTiVq7XZzzoccY1bfRMfxbvmsQCIHzoMAsInHgSTVxW5SeJyym/WXY4iaJ6G+XsLS8KuwuRASECwkdEydb52gO6nEXY+cuzvo6Z829eLvU8H+oySlPMFpr/////AjagQSkBAAAAGXapFBU8md/cdUTiRCzEH0kyLMGyfVwYiKxizwcAAAAAABepFGX29xUXyf1IVBcEnC3tUnVTwtEHhwAAAAA= +AQAAAAG3F5DG7Fk7qzG3N9sgnoY1au9o97KOr0mnSywZyBnKQwAAAABrSDBFAiBJssnJ6HVeO+CxnYWy6GDzFfomQ11dR5gaDG7WoEHwBwIhANRYH2KoV8n6fiJ6bDlMX1c35XT/k5As060b6gpbkjt0ASECHNIO+mzSD59nSUAj2mlsEOzJkn8xCTpeadZmTx4FB5r/////AnufMCkBAAAAGXapFJEEBLlBh/oH1DjnLX8/7rsNSFpTiKxrPRAAAAAAABepFLr6YCXcLg8Y1LnyWmHQQwv2PbdBhwAAAAA= +AQAAAAHaRwxA4IAWKTtYKWLDcxvt6XXxHbnjAnxFCtuEuctX8gAAAABsSTBGAiEA2dc5JmZ/U8DzuzUzku6IQoyC/CDWuI+6dTvnUQx7bI8CIQDxNfj2GP/6uik80SY1lUTX1segvr+coJjBdTDkpNM4DwEhA8dElXtq+rd0FN5F42aEsDStwmCrzeBscC0w1Gb3zQLe/////wK3DCkpAQAAABl2qRR12H9QK30a2EP6ExftmVYZQr5PGoisdM8GAAAAAAAXqRQiw2mQSE7q4AvxCjp0l4AL0N80xIcAAAAA +AQAAAAEXKkTLcK5XS0TVyvr0Rviw4ErMjXr50O8ziTmtkskDsgAAAABsSTBGAiEAlqAWquKcSJN0oBpA3XgZ03SD48Jtq1qCiEudXClxuugCIQDfRsjX6oaNtAV1LeB4NCIbwiYAz6VI86/DviOULlh4JgEhAqW5roZJs44TS6FQCu9g51+xEfMPAS0YIPtZMj6EuZMZ/////wJFoRkpAQAAABl2qRSLcxDV73BYAAyMREolfTDZCbSyioisIqgOAAAAAAAXqRRfVwNJkfSX+zpuZwEfD1GA3sNtX4cAAAAA +AQAAAAEgi+PXNhDF5VeXNRyi33n9UUF4RSqqduI09+u23uKrIAAAAABrSDBFAiB6Ld60n2Yb5Lg54cCI/n0tof2m8Fo9oMwspIeqnBy3NQIhANR4oFie+uPD7wKIu441/pJBZZZpszzLaPMmo/Jl/0JMASED1o76SnVAOVNyXloiI3MFSKeRImww8PX3aMmqG2Qm1pb/////AvrsDikBAAAAGXapFGHkwIyrQu/svBETQKYlOO7v06HoiKz78AkAAAAAABepFGubNVoXj1KNBqCWh+Ro1lIByAJ8hwAAAAA= +AQAAAAFQU/65RIk62BuKpgs8eoFHJLo7hrDcuFeBdKOGZq1qQwAAAABrSDBFAiEA6TD97o9r9XXabUEVHzQ4Uhr4axp/Cv9I16Gr4NOWz0kCIBg96Xwi4M1otXvcm0TYAF1Hv2bukXI/f4LotFsNAJP5ASECod3bwFWudJfD3wvXMeukuFoCvoq6cYFceAANQeQhYE//////ArS2BCkBAAAAGXapFDv6JaXIzhUNtVbaXng5e4UD5FYViKz2cgkAAAAAABepFMyt81VtJ7ZAhsaDUHnth8pOVXy9hwAAAAA= +Block: 401 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBOKWSk0C2wEGL1AyU0gv/////wEgyBkqAQAAACMhAgscTMCFCnGAcQwe8kNEfLUeof18ljKXo1DC9Ht8+dY4rAAAAAA= +AQAAAAGTJtTE5/dTJ1HqrXwreHh/TnkOeaQ42w2evKKZAz6/8QAAAABrSDBFAiA/GIFTy1xkYt8ltNiVQQpiwv0j7RKfDI7ezezdELdWzQIhAKwEpQf2CXL1ldstpoPQVsY/8eW/YGyW89K2w/iH3GC1ASECIgHGOQGMZC/7iol3hwqeVE6R8HbsIQ8qGpQl4/L8PYb/////AhJv9CgBAAAAGXapFH+5bygr2Q4XxV8Nyqx0pVMnlmE0iKxShA8AAAAAABepFEJzjFm72c+U4Db+D0C+78uiJokkhwAAAAA= +AQAAAAGJ1IKldna3d0dFgtrclCS7uUM8Tt0q9OhvQ8yypF8EVQAAAABqRzBEAiBezsnGMeOQzMGL3mDwu4nwyd+cGWDBNWVu/YtkiuazaAIgFzvMFR41VNNpZletWGMRXVbdEjGPGDZSXnz23mROzEkBIQKfhCS60oMt6Wu6LmWMv0MaBNmi2k5Ugbf9fUafzTMzVv////8CjFPwKAEAAAAZdqkUWUvi0usosMNFBm205pkXPYbb2/SIrDZYAwAAAAAAF6kUCe1hclMwX9M0krdDwJ1TiQKgGIuHAAAAAA== +AQAAAAF/mIN+rhZZn6BSRjYjv/KyOif4rC1wSuNhl3uCkkJLEwAAAABqRzBEAiB9Dw4+M/bYz5i6R/53Xt244sQriCkzu1whY5ruI1fcegIgJrj3pTpFWAiQqrRu/HtSNGc39W89K9os3TA7JiDbaYMBIQP4y72Cs8xB87srV1Viy8hG0+KX35joN+TCiGB0Sq+WCP////8CTW7mKAEAAAAZdqkUjgC0d6wIam1kPrvrolO5pWj+Gp+IrO8hCQAAAAAAF6kUlw71MO1BgueZKT/FFDpadG470sqHAAAAAA== +AQAAAAEP1RpR4bObJFZIz9DoHL/4ZKzNGkIjhEn4ipC0+2VMwgAAAABrSDBFAiEAzHfntHhj4iVC8ZXl9LH6dQBacBZP9Nbhc+1xtFh/f2gCIH/8SPOukRlnlnQbq22rwvRjwhbQQ3NNr+T4NubLDGbHASED87Eq43fK2iuBoVsRFFtLOcrDBA7ilM3GDNjEDVTJKlb/////Ag9V4igBAAAAGXapFGmut4FbSRE57fi9f8HR+hsJVjsyiKzuVQMAAAAAABepFA7/Q7VGS+OSC6vcarEp4A2kB1DAhwAAAAA= +AQAAAAHDXmSWOe5A/eUxl8NCBULxcahqcXRvM2cexcCe7ZzJUgAAAABrSDBFAiEA+QLvjkkjf+ubuwWMOJYUdogkIeEpz7BXOqQ2FcIEuBYCIFiclw8gNcQ9vxzRpP19Eviy1i4JNPHrvKJi3BWlDP0EASED4tOhpaLIFAoq4ctAzFCx0UXlgAFg0Fele8fc8TQdpxH/////Av9O0igBAAAAGXapFOVDdRXtuHm9+MMX9frMtuDINOeRiKzAQg8AAAAAABepFLr6YCXcLg8Y1LnyWmHQQwv2PbdBhwAAAAA= +AQAAAAFGTD/8D8FVQmPZYxJhXH/1kcIPXy5NMw7YviC3GT6LVQAAAABsSTBGAiEAqDcLnkqjYZqskUC6nFpufgwXcx5RUaZdX39bKMh81DMCIQCCXn8D8142+EigZxDMw4QcJmSSxIm3FmMuFdONZSCsngEhA90IuwbWyK62SMyxYr1Wf7AiPZ2LJgfaBHJviXpLps/z/////wKgUMMoAQAAABl2qRSy3EZvcFQPF3jgURbCWYQ/kL7hOIisDzsOAAAAAAAZdqkUXH3PqYaN2NL1U7wKytbXj94dkJSIrAAAAAA= +AQAAAAG4gtvL/qOTk+IDKA1HVOEI5IpzPql8sArrC4cWBgdg+AAAAABsSTBGAiEAxgwfEqR/Rqs9CXY+Hkpa7Tbx+08m5bZ6P09y18aKc40CIQDYGoz59r1jDSNK19D8Zs/cVaTbUZYMKYL9yqBmDbTmGgEhA5b+7DYRCeVkWfXnyaAdVDh0Mi/LaHps2ZnKrNRIX1Ab/////wLrKbQoAQAAABl2qRT9zdFmsCWAcHvEWfAeejVy/xQ1pYisZWMOAAAAAAAXqRTyaCRInzdOLebd315gsmYPJUkh8YcAAAAA +AQAAAAGfxFdnaRSnQ2NBpaO8zNWP8/Pby9rI1jyPzy4zz0Y4sgAAAABrSDBFAiAbFpE4mxt/vTh0VtBMPlXKk+Rf/nlavLN7YaZmOXf4+QIhAMY/WLkqBaLkiA4n9DR2bX8d8JiZLXIZ6XhoG+OKc+9AASECWT7bxKI7nasipehR0z1UtikU2B+497gdwCkkHlbkZEf/////Ar7LqygBAAAAGXapFFQXZw+4JOGkAWrf+wk2S/H1SD/OiKzdmgcAAAAAABepFFlef/PKlBdc7dX4CnFsae6Bm++RhwAAAAA= +AQAAAAHn5q/zccyRGGwqR6DV+n0/6qL2YyGrzYHbLPGmh1anlAAAAABrSDBFAiAhef2bZJPNLpu/9S3ZWhSbsbk3W0cL2UVjfFlGf1eygAIhAIPc/zBEu1WY3dNsqosDlthSV8VQJGzR8iTi0CIdsjW/ASECjvN28YrMrFvhPbo5TLofW+IOpT2VkKNR4yQaQ0Kd0fD/////AlZUmigBAAAAGXapFPQFp1NEjb77LpVOna0vL9LrH95oiKwYtBAAAAAAABl2qRTZmzwk6WWaXu05POwdMx4zlM9M24isAAAAAA== +AQAAAAGlaRcxw9Ku6PJyXQ1dEBR/FutpFbd7n294pO6D3TsvPgAAAABqRzBEAiBxhrQjuCka0mfMjtJXwHodf1hk5UBKvOy14no9uOptQAIgWD0r6gAmWLgDZ/W0e/WnvBTgbWZVXegE59biUXzSfnEBIQJFENnIXlPrbNrtF6L4ts0MjmzqIYjAsh2LpVvmPguJ4v////8CRC2XKAEAAAAZdqkUBXtvvQwdvLVHBQP+VRiDY+pOjmCIrMJjAgAAAAAAF6kUWV5/88qUF1zt1fgKcWxp7oGb75GHAAAAAA== +AQAAAAFUW75Zjilj3nodFhAL1tsxNSjxbGCtQ9epU26DfZiCUgAAAABrSDBFAiEA8VzDISstpgv1RYQHnejltkv+TgJ03ko2PBLNKNnoltUCIA41pAu22gVt8h9ozZoNGpXL+ZGRI/l/d2v+RdIduZtBASEDG+npsopxUiDqjOJoyCZW/nz3iD9ruenXzUx+mK9rzOH/////AqY4hygBAAAAGXapFPbViWEB2X3wlIs10paFveMtTzl+iKxOMQ8AAAAAABl2qRTmqXsdldMegPwkwXYIDNZZVBjcmYisAAAAAA== +AQAAAAE/W2wpYtexaKQsNdsaWFC7WHOZQD15zOYdUReiYbRbNgAAAABrSDBFAiAToPf0JxGUv30ffu4iQ8fL84QsQta4WCd2RTnTyloFCAIhALtGvkoKqovpEdl/h2WcxMX5g0eq1+uVYgATAAnyZNOYASEDVI7biIh3dBiq9e+gdJ+8B70jXWeJyllwwjMHC7OFzNf/////AkL/gygBAAAAGXapFLoQQGF2DPOYzN5R3x07P0Dnh68UiKwUdgIAAAAAABepFMkl4CwFYNpdnNJjSBNHsCW48Zb0hwAAAAA= +AQAAAAGrz79785zaqrRR0yzC0yBLVWs6otxepIcjruM1KZc0HgAAAABsSTBGAiEArEdY27UgSizfux1Yf+t1TRV8ek88e4Cj3U/ijEWi5n4CIQCj42Ra636dKFK0Y8aQo3eaZ32KF2VUjmmZQMpwwFpl4gEhA7nSyWzM1YNFpZjhhfyYiKWa2yVYuGneOJ3UJn3jZgzX/////wICdnMoAQAAABl2qRSXclVUaZimDNFYusW2c3DW0Ne4G4is8MUPAAAAAAAXqRSNbVXAM84pwnety28/K5HCWTffF4cAAAAA +AQAAAAErq7eZWHeZDIJyzXI5A4JB714AHyQZ/Qi8qJT6QnpFMAAAAABrSDBFAiEAlHQli29XzMjZfdREYP0vjml7jY2mo3c9oyRtAZl9kF4CIEf+N8wv+sEIwhnXZsJPOjagHMmBGxypZ4k9l9A5TZe+ASEDQLE8Jd/4UjKqqv0g9hZbuTRhJhRMSQn/gahLtLjPqS7/////AlfSZigBAAAAGXapFPKz81RBpqWqEK9UKJjwHahRwsmriKxb4AsAAAAAABepFJcO9TDtQYLnmSk/xRQ6WnRuO9LKhwAAAAA= +AQAAAAHwmH1TOE2TfzN6Xq6R4aa+9RxD1z0ghRS4mnlij9Z0gwAAAABrSDBFAiBQWE7vjNlGIHLwVl2DniPjBPIAtgIKMJz35rRMAZZ0wAIhAOEWNXdXyDQOwDs4SkWtUp+SZ8nS9tXdfcH/1X35vEBEASED7BKqjiJ6sghAeZTbZ2Fpg+5ADJnG2glzn6vSssIPLy3/////AlJFXygBAAAAGXapFEyu8h4Nc3KndrO6ubUWoEB5560PiKy1yQYAAAAAABepFAntYXJTMF/TNJK3Q8CdU4kCoBiLhwAAAAA= +AQAAAAEa1T/ZH3XDtEeeMdANUXmxg5GcrMuqqJUSp3EbXrk2PwAAAABrSDBFAiEAukPaPaFF7CKUWBdFNp5zw6pHRFgA94Ad/HwCigLhtC0CIEJROvwND0msoDGDijfTBClxr0nMog2/SVCpRe/yQzyrASECVJ17spsT4d98Vh3DloDt6Nw/jHHksdqA0bZmxbNUyoX/////AhH9VSgBAAAAGXapFENuCOpnDWQzYCC474lS0176MPmniKzxhAgAAAAAABl2qRTtsd+vbgs5RJ2oESdThu3y61S6uoisAAAAAA== +AQAAAAHyM+TbkiDOY7jmt0tapKJkhZDETfZA5x8ivvRo0jqnTwAAAABrSDBFAiBLYjokv1G7Ohf7J+USrxUb3NsrL28IWl69fKO6hC3oBAIhAMTy6Z6qj93+mChGi3lKlWfwNcEML6e4Xi3EUc9CHH2sASECzCpep5pXoAVFYXVWeeGxTBNiyfZWIwyxJUbSVUGpuTL/////AjtzUSgBAAAAGXapFL+hMkmc6698V2Q/uXWXWEAEpRiOiKyGxgMAAAAAABl2qRQzgKdS0zFLgFQqchp9ztklovX79IisAAAAAA== +AQAAAAH15hDOJs4bn6PEC8Nca4fKWa/IiTwEkLEMg7NMgxiYNgAAAABrSDBFAiBjZgJLyjYpymdvSkDZRw31LTKgB3+f5XKtRfXPaR/r4AIhAOFp/gJONgcUv63ifyzFTw5oewTtJpGEw26gwD3/LaTpASED8oB96uKoGrUjFFYId3Nls7y3FyOXvyCD6jGlHtCTgyX/////At3yQCgBAAAAGXapFFn3M4+xxsPG1k8fA+DmzdNLhKxliKwOvQ8AAAAAABepFNnybMqBf6EW3HbhvnoXBn64Q2JQhwAAAAA= +AQAAAAEYk0RR4CUgBmde6mM1deR3ZT2lpQVogpEoQacNkBctnwAAAABrSDBFAiBwj9F8Ex3P1QJ23aLa502SAS1660Y/AeoKl/DFcUl/UwIhAJztXyRQH32OFzqtcbCGgYDQCv6NXkCq57mSEjmBc2cDASEDf7XfIfyf/qYjwpdpYWOvSqNx+Xopvg2H0A8HsZoghj3/////AiCJNigBAAAAGXapFFhu+lUBHmsth8DP6TvJ5RbGKi6viKxtpgkAAAAAABepFCT7x3zcYnAq3nTc+YnBXl0/kkC8hwAAAAA= +AQAAAAEbYxv8LHT7RjGhYBnxrOuv9BsWhvCOaEXYHly09OH9rwAAAABrSDBFAiEA9lV3GlJFQgu2+MBXPN3a+6QtIfZPT9V+1+250KqrGnkCIDyzrzuuERO1nVpVKtY9ka60ai5bjGE9oFv47zhQ8qYBASED7vY+CJBaLpw/77gtjE3Y09GP6q0o4dXjBSGS2KUdRL7/////AnbKKigBAAAAGXapFArTPlMcAcIFm2Xexpsd0DYcJ2m5iKxa+woAAAAAABepFKi7OrhcVjEEypDEBRoUZTLWt/FDhwAAAAA= +AQAAAAETKA9uizysSplRc9fkHifDk0YSgZEvO1iiXcNNu98f6AAAAABrSDBFAiBvcxELmknpGz2Apf7kKFkDjPNMd4+8WMreeOzHk0W20wIhAKnQ/3R5dyhvNUg8h9PRnxtIdFyLSTGdACKgIf5i8IqCASEDuhtTipecE8/6s7Yxn8vIRmm4zDVv3+3gGnSlJjrLEVn/////AihFIigBAAAAGXapFMJ+lMWIeBzC11Ol8ZGRa3RzIRUIiKz+wQcAAAAAABl2qRQzgKdS0zFLgFQqchp9ztklovX79IisAAAAAA== +AQAAAAFs2gsV/WLsKH9YK8V1oK47erMlUAtv1tOIYDoylKlEwAAAAABrSDBFAiBRkDhmiTx+zwMMpOM+tzIVuPCk5O/Ae2wjOy3t89xJbQIhAKItaPbdlX+lrOQPG8A7ObktERMQqinJbT6J2qT17OQ4ASECbFXDl6iDaHlkke8mdvUVudni08tsdx5ouZec8YAlBsP/////AvGLGCgBAAAAGXapFBdXIWQLJ6I7hBwVICKcw9TAUtNYiKzn9QgAAAAAABl2qRTtsd+vbgs5RJ2oESdThu3y61S6uoisAAAAAA== +AQAAAAGd89YKaJVulFS2Gfcm33z45mj3Rre7vDvsCjIAjgJazAAAAABsSTBGAiEAwpwcOO9K2le4Lvz5j8zMYgvrcEC1PW7WtZVjoeAkJasCIQDIkqYCsC3/8pjrw3Blr3AmGmMW1ACLFNol0ADxSRBgxwEhA87KU1b9lLElRBYRF9OtqEcwO1yHmheBWkMjBPT6SP+L/////wIWkAcoAQAAABl2qRTONQIRxEtW9SsyAtIZ7wtOVhezg4isizgQAAAAAAAXqRSouzq4XFYxBMqQxAUaFGUy1rfxQ4cAAAAA +AQAAAAEeBHbpQ11WeGJQjOijIRCT21tlAPNO3yWcPFy4EXx1WAAAAABsSTBGAiEAvkNLJfsodcnty9x8gzPsrpe4FGFLimiTEVqFaspGHpUCIQDeG6hkRa/rV/g/pzGqztG8+hnHlFxYDsW9eHGzBBq1HQEhAwmBHH6c+fovMbL2FNC3A0veM6lzZ3te04LGT1AuUn35/////wJ6agAoAQAAABl2qRT2dVCcapkZ79FoDef7okIm73iB+oisTGIGAAAAAAAXqRQbLY7XmfWfDni4bLjwiwbu9VHC2ocAAAAA +AQAAAAH//s43h7fBBbYVQNi8HUajlFyzCPMrN9EkawYkiCLgZQAAAABrSDBFAiBjxGhLge66PdoA447w9DVJP3rcvMwrrs+9QCTXHKAN3gIhAI1TX/wNyXQvf4fh2w5xKgbqq7Xlvlh4Pik6dwKGEu6tASEDScdRyT9LxSKCWfvpc+jF299FNQ6FuJAHqy6JAsrknPD/////AqeM7ycBAAAAGXapFH2YJpHXnnGKaWdBqlC6jLOohJISiKyDGhAAAAAAABl2qRRrIEQUakQ45uW/vGXxR6/rZNFPu4isAAAAAA== +AQAAAAFh4eXWCRWng3e+5m/qYC/Fa/lj6kkCZ8Obga0CzdpIIAAAAABrSDBFAiEAyZuIJa6TO/fvT1fpQRHpqHxnmLu4HjXF9XZweS7qf+8CIBd4OAipJo0D+EAgsupNlDiJuxymik6ZJd381YysjgUgASECybGhGFtgZlzUxui7d+hMVDTkpnRQPB1SqpTgHefVzOf/////AoV73ycBAAAAGXapFN9LaQDiBlmxSiW4So6GiffhxuGsiKzSTQ8AAAAAABepFKi7OrhcVjEEypDEBRoUZTLWt/FDhwAAAAA= +Block: 402 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNCXSk0CBgEGL1AyU0gv/////wGADAwqAQAAACMhA3+M++h1JdbP1HAHYfJr7Q0RXt7Hq1UJ2G9lPUjcwRetrAAAAAA= +AQAAAAHL5wTCw8rYtFAW1UQV1vHxnyqJlzkHYhwWs0QD4TAObQAAAABqRzBEAiAbP1foWNsXMXm/dECgbg2iQmBCWflA/s4BIK4Nb5fKwAIgNJSlqOAvdXeui4gpPFKlmq/mL+QXYcXabNFtTJzOSWwBIQIUCw64u7ylPDjedBubTz4TlupWqa9k24dLiayq69W0I/////8CNbjPJwEAAAAZdqkUF2tBCrx7zsCVg5uTP0rAIyFARhGIrAAADwAAAAAAF6kUzK3zVW0ntkCGxoNQee2Hyk5VfL2HAAAAAA== +AQAAAAHdrnAJUQWUukcwzjlw5uDxwlIYLRI+pYLmpvJwML7yGgAAAABsSTBGAiEAyS6FQmRV0xJwLBSyg6QlVZCeQ4oKzOfmeBy7RQVwHWwCIQDxt5Xa8kGBmQCILbdkOsgX8omXEaQfMtfesdjD2Ez/PgEhAq/B4eqLNXMhUm4Dw51c6qQmCHnFJson5BwyXsEOhPHs/////wKGjsgnAQAAABl2qRRF575Jki2SG5weA/lQkyv2nzUBCIisX2YGAAAAAAAZdqkUyKWPTVXb8sHXngtGrDnKDcvjBD+IrAAAAAA= +AQAAAAGr3bTX/YRb1upzkcurYDSuGO5T2rE3po7YyEhb+xzzuQAAAABsSTBGAiEA5Ami2xM09VfI9AcIykIzH2IR8uVMR3lxKNLMjl6KmAUCIQCSEXQ6yC0DSJeTg80QSdL35I8GKqY/I5c026+LtEN/iwEhAtrYe07Zs062b7HKEvv5lvZ1BwpGf7Yl+L69XIPZgs2M/////wJ4GcYnAQAAABl2qRQDwpqKGS5nt+EZ4UWwrI6twZjQAYisvrEBAAAAAAAXqRTMrfNVbSe2QIbGg1B57YfKTlV8vYcAAAAA +AQAAAAGdQ/v3jJ3ViQOXFA2r/rmagZV3G9/ZxWFhelg1tJJevwAAAABrSDBFAiEA/f/kp37kWGEnqM/5o4Y+mbSEpBJh9mwoJpLrQDRJtEUCIE2g04/iAG9xe5OWkmHGXIqmeuVQZCRsx3X5WDAPK/JxASEDHCAjg0rY2O8TQTzB2QAUDtHn9+kk8tNaWQhkuIMR08X/////AiaWtCcBAAAAGXapFGZYMpX8bCN3BwWV+g7Ch1H/P/S2iKwCwBAAAAAAABl2qRTZmzwk6WWaXu05POwdMx4zlM9M24isAAAAAA== +AQAAAAGWTB+jyYBMXNyiyyvzdFTt7VXyZjRh3xlll1QiLF/wZwAAAABqRzBEAiAkTyx5nyhXEcC1DINjyUwRoDsMKfXd+vTm6n2SHAgTXQIgSeO68BfxAh+Q5FwqXpJdCvOb7VPobMS1IKwY6O8oeE0BIQJKJ/zvbvfzDuXmlLdAUTyDO41K/EEfncCsJXSIcwVxof////8C27OvJwEAAAAZdqkU2CAIs5dATq8UbFcyZ6kWyVG0LueIrPseBAAAAAAAGXapFGsgRBRqRDjm5b+8ZfFHr+tk0U+7iKwAAAAA +AQAAAAGcLMGup2NLfZBgX26g4ZMcEtLkcX+vBhVZQmPjvl6OvwAAAABsSTBGAiEAzAuK2giXg/RlrqYRM8spZWT0xCWin5Sf1pnRXUPjV5oCIQC0+A/btj49aQV1zhv4BZ4+8xySpX1jf0d9FpOPrAS+0wEhAgz0NmeyL5FWp1KH7SYmX+suMfU43lfvKShy8YfJEQNl/////wKk+acnAQAAABl2qRTUeMO5lgM0XhKsk3Ko6tMShLT5b4is5/YGAAAAAAAXqRSouzq4XFYxBMqQxAUaFGUy1rfxQ4cAAAAA +AQAAAAHzo2RLFswQmZ5rlpP6o79E+NHuNXeClenkXgS1W5Fm4QAAAABrSDBFAiEAl7UjSZa56bmA47b5XmKGHoDmiJDPcY81Qley8PdSKKwCIA4pQu8tB0ZHutPM5rRWN/rXPL1wP/6NGm7+bvOqZiZQASEDR9DfFJp6EJSkO88cvm5JgzIjf2H5GPPYWVPcj+z4X9z/////AhADmycBAAAAGXapFB64z7qhyLLt/NNe9hYRrlZUWD/SiKxEMwwAAAAAABepFKi7OrhcVjEEypDEBRoUZTLWt/FDhwAAAAA= +AQAAAAFjDa8Em2WFSA+Grs2Ng4nOZP8Q6JJiN7F81VybPhAFigAAAABrSDBFAiEA7EEASmaWCJR3odqA1v3Eckw2ZCveeT/Gx8fiv8J4DUMCIBbvGO5FDsJmQgdwKIlwt407jjMtTns5PKB8B8WxqrxFASEDImQJn+V3lneDFXyhTvjTPQj0jFaSjgbpcCrrYlnLa2D/////Ao7nlycBAAAAGXapFINGWvWHLyZT2B0Tn0WEcR9X8IMmiKwyWAIAAAAAABl2qRR+q9Qqp86HQGQfNbbuAtmb9lwSL4isAAAAAA== +Block: 403 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBNeYSk0CigAGL1AyU0gv/////wEA8gUqAQAAACMhAvSAIBforWw9d5r61WUFwLbKiqG7Tp+aErawLUcCCw9BrAAAAAA= +Block: 404 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8PBEuZSk0C5wAGL1AyU0gv/////wGQwgkqAQAAACMhA2M90osFInstoaaOr1OuVZ68aSxOd4R1qmtfVh38juDPrAAAAAA= +AQAAAAHUz5ov//pM08kXm1o2SBNfLeyYmaP9/7v6utrFI8jiZQAAAABqRzBEAiAvPMxWNCWyfhfCGKBsu9BBnfGhj/Z4TOZCOh53+ypBMAIgKQTG1IJA/WaHUP4uWOi6nsRW42jVmqH539sowoy5eTMBIQMtlAKfQyMs9rD7Od6KLeXjL83x0LAqYCg9Jl0P6nO9Y/////8CnoyJJwEAAAAZdqkUhcLH3x399PH5vfZsvUgypPnj1YWIrKCXDQAAAAAAGXapFJI6pCiACahG/QRJoZ57kFlM9aW5iKwAAAAA +AQAAAAETJi/Em9crkuHXMYc4av2HOPRwgR0bl+5K21jgh+/dbgAAAABrSDBFAiEAs5Bs1KcJLYpbPRJXfCLDiPfAoy5Z9mXt+mN3Wh0VK9wCIHEtTY79qYP865OodCc7J9qQde7OPZi+TRLAK+KzVyNPASEDcl0mtwg9OItg6p4NEsMl1rPtf1dkb4dBturQdRnx9rr/////AvIyfCcBAAAAGXapFPjNQHXq/0oRUc1H5trANhjd1Hd+iKxclgwAAAAAABl2qRQYXsXAUBKpQ4ooqiBjAJcVOQe4uYisAAAAAA== +AQAAAAHNH3Yh//0+QlQ4KMVm0wi4AB+4LI7tE+KFvtp9KEWiEwAAAABsSTBGAiEAi09l6CH4tlTGfpJpsLIJoES+MglJXJ0scV3lvYuiDvcCIQDcYqnWS71lO40xjwaDeGlQU1Tfpt4NVo1cKNwDgAC3tAEhAmay0ZebRYarD30nSlO4rKAX/8h63499dbdXXyKNIFM//////wI3YngnAQAAABl2qRSugUfjKIsvTmPoR1eYaPGrIsGx+Yisaw0DAAAAAAAXqRTMrfNVbSe2QIbGg1B57YfKTlV8vYcAAAAA +AQAAAAFBe12aREF9QTLAfeZARnqRBNgvc8cHVdGU8IfO40uWsQAAAABqRzBEAiB/xOllg6Pqly0rhU3mKT65GThAvBQIhaOBLK+tQr6+NAIgE5cposZIj9e+jGhBxrFoEX/+muYz8NJMwyRg5wPjvSYBIQPdNRiHz07EbettCy4OQRw/v9mo3o8AAG0kDOCT7lO0Zv////8Cz0xzJwEAAAAZdqkU6HnXJoHyQItNzFADHpdOkG6L+8+IrBhSBAAAAAAAF6kUr7+3TumUx9RfZphzi8QibQZSZveHAAAAAA== +AQAAAAGIjBCCsjgls53v4HcZvaWIlbJAn1W6eTiqefPP9NTwDgAAAABqRzBEAiB4evy04bEzyTTB1l1MfmvnFET5FSmUO4uVvOuvAvB3YwIgd8cCiHMcB/kGWp4xpUnZtRL+LLRZVUWQvTpMsZ5JilwBIQNsVirqETKlqd8w7wMTdW3YrscT6ZELH6ts7jJNTei5U/////8CAiltJwEAAAAZdqkUqOjsIat4A4FqxXwrWQ7Ilm42vaiIrH1gBQAAAAAAF6kUZfb3FRfJ/UhUFwScLe1SdVPC0QeHAAAAAA== +Block: 405 +AQAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP////8OBBOZSk0BJQYvUDJTSC//////AWCgECoBAAAAIyECkBtqJQm5YwuQc2mtkL4R8wNRLVEvJXO9n25nMQ2cQE6sAAAAAA== +AQAAAAFhldXXUfA8qI5grl07VtrzyM9xBWyH3uHkoD64c273igAAAABrSDBFAiAb0vXSFTGgFvlF8WQIgZIbQwqcGVEU/jgyoUikD9iqmQIhAL6LNwvzkG4uWva0f5GKzDJAFyF+FKxidhvRsGhATS3IASEDovMc0ddyWkwSZcDgsmBX2TfVoYDAoMi2F70I78P5Udb/////AgO8aCcBAAAAGXapFKMK+dh2UxMCPe11K/lyd50ZPd3iiKyvqQMAAAAAABepFGX29xUXyf1IVBcEnC3tUnVTwtEHhwAAAAA= +AQAAAAGyOCbJrPrzGpy1nA+0q8Hg6ExxBOSnyQiawMFfrnorwwAAAABrSDBFAiEAxI67mKvZMvUI8UhPSvIXnU2bEP9rK1ykZjwJcNO5TF8CIDysrUX3UpJOgwOs1RKkztAthskd9dZ8sTgvnLE0wtOEASEC+KGUbAvD6InsFfYQ3XwLsV9euPWPMCHMlapNGQXnqFn/////AuJzWicBAAAAGXapFLnytHG3TwFFBgTckCyiEAsG3PrwiKzRhA0AAAAAABepFAntYXJTMF/TNJK3Q8CdU4kCoBiLhwAAAAA= +AQAAAAFYU2PU5kuBwcJLBK9XZl96b8st7aYHna/KsujD1e0pBwAAAABrSDBFAiEAjJ2iivel8Maa+jswt0hFdfD+ZUY53zYpT/JFj9I/WQcCIGUoAvaldJHyYFbmLLib9/JvxXmOv6VT7S/zYor4PHUwASECJL4GCi64cZgHLaT/lYmH68Onwk0k9djagcMNzKclZO3/////At3rUCcBAAAAGXapFEqPZHTUFSN4WjmzcB1jd5hhAJPEiKy1xAgAAAAAABl2qRQYXsXAUBKpQ4ooqiBjAJcVOQe4uYisAAAAAA== +AQAAAAEY42X4Ld8uymyn2Rvu/rFBy788uDnkSe0sqwT8PKKymwAAAABrSDBFAiBJ0Vt7RIXCL5sVqG5gm98Bn+RhnVMO4BkMg7+lX/ImlQIhAMEwvj/oiw99qHIqQDn/njRhuLTV6rNt9V6CZTFPn9K6ASEC+gUNEFUuJI+vPj1tPnvZ6lByNdRNV5ydk9EkzV8j71H/////AraxTCcBAAAAGXapFGGEsDebzf4aHma6j5QO0oD6N4jgiKzXdgMAAAAAABl2qRTBI26HmhE8AhJQ3EBHkwW2Lw/25IisAAAAAA== +AQAAAAH/aHqY3wtK2wUG3Elmz+rU/91y+MIOl9dhMHt9hpRTqAAAAABrSDBFAiEAhYkDXYns6LMztX4EFhwiTgrIN8Rdla9nBNLNPj/zV6UCIGO+cYlT4Ma9fTSIT6/fUTUYW3rh/0U66Wue5RHKxNRvASECr2l8hpB7XeO8Ya1SZmCWDNuwzrzOWkPqc/V9P1/c50b/////ArfTQCcBAAAAGXapFByorEBlr6G5gpZ8KMckZB3gA3WniKyvGgsAAAAAABepFK+/t07plMfUX2aYc4vEIm0GUmb3hwAAAAA= +AQAAAAFpH0edqd1pTTin6zPek35NZ/DoLBQB5mcxz5dxVrot1wAAAABrSDBFAiA3zCqnTclkg6NC86G/2CQs2IoMSFdFnZ6u9Yfc+QErGQIhANJqEYChnRdmm8rg4ky4j9d7zp2EzcHu20ifafty/rkmASECD1N6YNQe8g6mG94PF3sGUePQyru32DoF5u6fwRQoHTX/////AgtmPScBAAAAGXapFO4jdIus1KvVWDRApglfvHkIp7jDiKxcqgIAAAAAABepFK+/t07plMfUX2aYc4vEIm0GUmb3hwAAAAA= +AQAAAAEA74iO28JmRYEuR2G6spASybE7T54xqM++fiijlBEAKgAAAABrSDBFAiBA8F+NIrtFjahWEgrSOCzG4ZJD4dSvjHCM4MARNvCTsgIhAJ6nD0PPINdMkLbM1mjw2yIhvpB5t7UF+sUwkZvvAUSoASED6ZFni2vECCgvpbz5A3rN07mAecanEANZwU0Yq3Sw6R7/////Arx+NycBAAAAGXapFMmMKeBgpqVTSivQVOGTDT5mGz8UiKz/IwUAAAAAABepFPJoJEifN04t5t3fXmCyZg8lSSHxhwAAAAA= +AQAAAAGqre8N2pavcDOCNDKK7bo534zFo0XqsJMcsHx7h7+6dgAAAABrSDBFAiEAjdK1aPBwZeNmPJlcozS8dd3/P8eNPDfzPhcaonFS4/MCIFMgbL7umAsxk/rAk8VDdePbJZKQnDSrkyKho+zhDv5nASEDV3CpenYFdHUzjoMG8pDWcj+PIQ5Tw5p8eAuD3Ywavkz/////AibaKicBAAAAGXapFJ6RXMzJ41l2SNk/4pIEZvdwWzHxiKxG4QsAAAAAABepFMyt81VtJ7ZAhsaDUHnth8pOVXy9hwAAAAA= +AQAAAAGvPOv89gbEZQBrOl7H9y0o7fd6iqWcBJbL8uNOkNhHUQAAAABqRzBEAiBvq4hcoCmU0IaY7boYg8BimonJPzXtECaidXT2WQFqjwIgKkE80nHXsfIFbpFiBVLJFWhA+G6cuM+IQu7ubM+yrTABIQOOzp0qDbIH3L0JBSxKPtvW+B8nZ/rwXKIT+gAgvHzdUv////8C2qUZJwEAAAAZdqkU5RQJh5ecQHkg29azYbgQ+4gQt+OIrPxwEAAAAAAAGXapFDqj7ClcYp+kQzbctKO946eVAoNIiKwAAAAA +AQAAAAGVV22mSgPrcOFgajkgI3/tORHA5ix2lr0V9iCli4Y3hQAAAABsSTBGAiEA8GhExGDxaLXRehAXFJUY/EiObEhVmdKGOKebbiLcTQMCIQDRspQnjFd70dYSi+i2RDohcEzkmqWzEhajS8L4vEDJJAEhAmMHJwCToZWoQgKuc6fCsUrZ7z7C8Vp7A5TUZCfgoh8I/////wJ3/xYnAQAAABl2qRQa822KO9zdQUE6d/j1ODUsL2SRWIisE+MBAAAAAAAZdqkUC0MirAFxkDCnELYLCjOXwHTPnt+IrAAAAAA= +AQAAAAHMsXnTs46zU+YiNiNHtoZaZaQ/xqAaffNMIkH8Hngv5wAAAABsSTBGAiEAtSUn/YrIbUk5CsVyfF9ubs2cC06PYa4N4CjAzPSdo7wCIQC4Oc6fOnjSaAW4/zdJ+sXXHSZHTk0FYl5y2gDSut7+QwEhApqKcAtp9We40KHb+VbXyYLQH6tOvjVZkxof44CGU5YK/////wICLgsnAQAAABl2qRS+7VGnGMMgnqTQ/p1IujJzP0roRIisJQ4LAAAAAAAZdqkU7bHfr24LOUSdqBEnU4bt8utUurqIrAAAAAA= +AQAAAAF752CCpayw4GVGHNONFMyYwKKnmLbswm65+2v+h7UEyAAAAABqRzBEAiBwFzcBFCEBsO+1vMA/gn30WTWN1Gxok7cPtaIi/qsuXAIgde/sbLMwCO3YuMSQS7s7hVelN5FdnbnMor70zA7I3UwBIQOMykXrEU8XLaLD53bGdzelui3cD6gzqCp9Nt5mjSd/Kf////8C8Lf5JgEAAAAZdqkUwoL3jmIARIqGEwLqjHDba9Qm6l6IrMKyEAAAAAAAGXapFOapex2V0x6A/CTBdggM1llUGNyZiKwAAAAA +AQAAAAELkd36RITtsW01m4W4vSwMr0Me3EAYy0CEnvAO9bOthwAAAABqRzBEAiA1LZrTV9j41wTaABvOhUZgz6Kx0eeHs/U8cT4TUtNazgIgGYcLkEA6mkg1WcZ61cQtg2b02SZ0MtBf54tVpKA10uUBIQPN5RghsnVku8Spq0S4mn0Xf+6RbRBS1YLl2MwXuKvg5P////8CYXPpJgEAAAAZdqkU27jKWhJ4hRvi8pId3LEa+wLsU/eIrD+BDwAAAAAAF6kUqLs6uFxWMQTKkMQFGhRlMta38UOHAAAAAA== +AQAAAAEZ5Oce0Ev1SPzT6/xb4SvzWWRiMlL92NsKZhT5L2PkRgAAAABsSTBGAiEApMCzbaxQOhzHvLEcJd1I5c35bFYnzj3RkxOEqXFj26gCIQCoX1b/vBgiBUJmmgrUe3Vmpc0o0UEETSV7vLHwCkKvUgEhA6945mYaZYvjdMNrBidI1NSLbvaSMkzdJLW+7OhKFjhP/////wJtYuUmAQAAABl2qRQApNRHhMQXlIN8aWITZ3aHbwtxqYispE0DAAAAAAAXqRSvv7dO6ZTH1F9mmHOLxCJtBlJm94cAAAAA \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt new file mode 100644 index 00000000..3850b45e --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/Hashes_for_first_500_transactions_on_testnet3.txt @@ -0,0 +1,908 @@ +Block: 0 +Transacion 0: A4E5E1B4AA8BF9A32315A8883CB18CF716F86776E3C27CA72B21B7A7DFDE3AB3 +Block: 1 +Transacion 0: 0F13F5CF8307D907DA65742E028453D83D47F5C33E7824328CA0C729AF0B8CAB +Block: 2 +Transacion 0: 0222E29BF085595596621C21BBA50AFDA45BBA3C01E7126A59A0CEB3E253142E +Block: 3 +Transacion 0: 174261297DDA0C89C010E867A40579F4951E56B78AA8B15130EAA235CFA5AB14 +Block: 4 +Transacion 0: D2F156E779F027C4C46D099414258AB32D79DC018EE69D03AD2ADD6775D679C4 +Block: 5 +Transacion 0: 8610BC1457372250463CEC3CD43DA980972EE47AA5C71AABA6B3C8111C6C6C3B +Block: 6 +Transacion 0: 8E541CF5D114C509F18BBA0D04816D6BBABCE03F3A58B5B742DC9A6896207E1D +Block: 7 +Transacion 0: DA362EAC5D49076F8B3800BCF91C84DA1CD14A083928BE397C9144EC95F17D1C +Block: 8 +Transacion 0: 6796EC299FF3A9DF15FFEA42E34070B64E5E80C86F5910AA6BEDE9EDC5334120 +Block: 9 +Transacion 0: 25AEB9B769B7906FA26CFEC93E56CED4FC80AAABD601ED6FD843D51627447916 +Block: 10 +Transacion 0: 45461B3C2F15060F81F3DA864A6038D8D2A10CEA0E950970E2EC9423C6622CE2 +Block: 11 +Transacion 0: 5EE1217BDAF7E1AB3716DA73AF2E048DEA39CEFAF09C1D62A3F85BDFA594BF92 +Block: 12 +Transacion 0: 1831BACF2664CE54943CE4B34683608DB0E8E23A26CC810F8C5757554435D8E7 +Block: 13 +Transacion 0: B69E8C913E734AF35B8327569232EAE99927D9055BEDBA6B8ECA0F3E53EB3FAE +Block: 14 +Transacion 0: FD0025868F865136D4050245D0CE6BF6EC90F7529B49B23FB88DB8AF3443C44D +Block: 15 +Transacion 0: 9E4D7F149C78A036E538B1D03AE8C8D734C25FC2C842AA56A7910E932C85FE0A +Block: 16 +Transacion 0: 0D58283D17F1570D586C8178F40B0D94EA905DCE59CEF6A5DB82F9B44517C245 +Block: 17 +Transacion 0: 71920001780EECEB8A1DD41E56D3C55F69829D47B61CEA567F671FBCFA7FBEDA +Block: 18 +Transacion 0: FC357DCC8DA390A9FCCB13E91EC0E1B3013E4DB26A575B96DF6D6BC98B2DBDE4 +Block: 19 +Transacion 0: 374A89A8FD64B25604FC5A09790814472B89FC4A937FC3A170C2C2F6DBEB757C +Block: 20 +Transacion 0: 4DF5D97A639197E9D9B70DC32C097E8057AEC4AB5DB6B8FF1A1553BFBBD39FAE +Block: 21 +Transacion 0: 17A43D53A865866049E18BF7144FC2A9896AB17AC368370C6B7569A190EAD705 +Block: 22 +Transacion 0: D22CC7D8B4895F2EDE00C9CF61A44C99F0810EC3D4B5177E089F8C7B2B5C1F15 +Block: 23 +Transacion 0: F36ACF2E619EC1D99C6A6217869E8DFB4BEA75EA0C2D560944C2EF6C8E326328 +Block: 24 +Transacion 0: 9FED83E8D0CBA6F70DA131CCA8A7072DA5032DCBE98E792858C47A5A452E9EEF +Block: 25 +Transacion 0: F43C1FC65D59123D5E042E7E2AF1AB855683B347F0529D7AA24488C84F984F09 +Block: 26 +Transacion 0: 2A19795218960268DEF8E2C4D882027ED2A31CDEFF6584BCF66B61089C355D6B +Block: 27 +Transacion 0: 02371302C953F1C670BB9A40ABAEDC9F6095882B51859EEA03999F324DD43F2F +Block: 28 +Transacion 0: F3DAD74E05BD02BF367339E434B3D170233D661DCF8F9F5CB198E8883AEB5C6E +Block: 29 +Transacion 0: 3DBCC2BF111806EDD2AF70D8C999399395F796A88B93F0F31469335A1798E62E +Block: 30 +Transacion 0: A2D96809C737AA708BF5F195662F25E2D21D0FC2D95317A77E8E8ACAF8D6BFC4 +Block: 31 +Transacion 0: B16C8BCA53554A697CF4C3BB66A80BA195647EF11810283D5E9AAD453783B822 +Block: 32 +Transacion 0: 8939616292F1BF479806F15D6E07E26B50F06A73020EE334929E28956B3D04E5 +Block: 33 +Transacion 0: C196190DE8616BF4E140104CA8437B0B693E9AB9B7770B748112116A4CA10B5E +Block: 34 +Transacion 0: F4AA9D561AA29BE53CF4E220E2DF856E45B5F565495565FA795C7C29E1CAC19A +Block: 35 +Transacion 0: 5D503E8FC5B7ECF3C0222D9F1281814F1A3A0A613122833D2050A07F8219F19E +Block: 36 +Transacion 0: E65228ABB7A5968CB8D820718E33D34932CA4B6B8451DE66569547CF55DBAC96 +Block: 37 +Transacion 0: 57379ADBBC73CA97E43ADCB4022DA01F02EAF8F14C17493A1CCE9784AF2904F2 +Block: 38 +Transacion 0: 70195C1C86B83B8BE6B9C59297BF20A1B91E0CA561152BBA72366B36CBDF3ECE +Block: 39 +Transacion 0: E6169C8D9A63269D482903A22C8153374537F6597F4FAF9436F26D3412ABC234 +Block: 40 +Transacion 0: 56815D13D9AA1FF1A596BD66A2D2B04A88B356BBB8521FB5A823FCA752BB3A11 +Block: 41 +Transacion 0: 4C959D16CC06A721FACDA6A802E0481FDAE802122C47F51EE22013DD09AC64EB +Block: 42 +Transacion 0: A9E267F4B01648CE18FF63C5A117889D71DD0580EDDA12F65CB1DDC709435279 +Block: 43 +Transacion 0: 6323464AD31CC13367992E482999DACA95F9229AC152B1648699675AA1F11A78 +Block: 44 +Transacion 0: E1E929712E75314C38EF659CB11ABB8DF7C4EF3E83C190236E94229BAF73189A +Block: 45 +Transacion 0: C3369FDA7A0C7FA6AC29A63239DDB3B6172487AB9DB8B4214C2D3D891175125D +Block: 46 +Transacion 0: E880D69D5CBFD81FBA371A352C353B372B768D602510D1942D0F97958F05C4D2 +Block: 47 +Transacion 0: CD491CE8CD04CDAC46011ADE0EB98D6769111E35FC28251BAA6B35A4C6980B7B +Block: 48 +Transacion 0: 4B188DFB56D2D2A93FFCCAD074CE30C573A74F89BF156416ABA374BA6901E1C1 +Block: 49 +Transacion 0: 782CA94DD3DAF11B870CF1949F2A0E5FE2B4F6EB13617CCB413CF80AD93086F6 +Block: 50 +Transacion 0: 42C2FAC11C4F42A172391E5E70CCD95C272F36D9AFCAE0FCDBAD3AB935122D09 +Block: 51 +Transacion 0: 764FC1684F34CAE7004F49DDB6D52B9E99AA467EA735778290C64EBA233F71D0 +Block: 52 +Transacion 0: 73A4FA7498AE0294544540944B51AF0861AB49FD925EAFC0441384899A13CB7F +Block: 53 +Transacion 0: 8253DF0375A4A60B066C1BB8116ADB52E053D7BF63729DAD48EADDF29046F8F3 +Block: 54 +Transacion 0: EBF19047FB8CE2031DC0032639494C929749114DB29F4AA179FEA5452808FAF6 +Block: 55 +Transacion 0: 27FE886C65EE305D083A9530E0279958D85439EDBCE8E888CCD2E704F837D90A +Block: 56 +Transacion 0: 85312A3737DDFE943B0FFEF9A7D638A04781C968880EA63CD76C6B4375EAB744 +Block: 57 +Transacion 0: 2E2A48C47DF96F22D71BC451973C5FDD9F2AA3CAFA70B88BDA463A946742555B +Block: 58 +Transacion 0: 750AEEBD659E338668035B0EE706A0E540D5E0A8EC6030575BED6ECD524DFE5D +Block: 59 +Transacion 0: 77109E090BF6B6C5AF69876DB8DDDC30AC2EF21B65587F50EACCFDA9B2D41CE5 +Block: 60 +Transacion 0: 2E8E9E02EF089A5F847FD4511A2B36DE7C824641119FBF08DA6E9D7A072A3583 +Block: 61 +Transacion 0: 7F64EE18122B5CE6ADF968E2297FD1D3F5BD58964018D8D3EAE6149C2C7E397D +Block: 62 +Transacion 0: B6E7B6D0E4D21A650F5B5300327B63C21DF5213C8AC376ECDAF428578854DFC3 +Block: 63 +Transacion 0: 72AE85BAEC608215D46636BD4024989D8FCF76067FC416E5C3D1B519F58802AC +Block: 64 +Transacion 0: E469C10131523AC7CDD85870D87D0D302BB2794349759FF70C96A3667DBB4DAD +Block: 65 +Transacion 0: 793780DFDBAD331F77D5ADE2935AFD53EB760B80C606A0C7AF6564DEE6F39DA7 +Block: 66 +Transacion 0: 1CE9C6F3F200A2EFABE5644DCBF0DC2E70853537610A27AC9982C8422CE110D2 +Block: 67 +Transacion 0: EEF95E45637283470BDCACEB0E072B6653278CEA847BD9D46C535D0D2FB01AE8 +Block: 68 +Transacion 0: 42CC2E40E3ECA94551B6924C1C08C4C10D50EC9C79410F8C25065840D1C9B9D5 +Block: 69 +Transacion 0: 21F032E8663935EC5E621C874216AA93FC0F54ED14BD7C7224452E846FE339AB +Block: 70 +Transacion 0: 381D5FD0F83F0BABE7073E2605D7E31E60B5D94513F9320EF595BB97F6A4E79A +Block: 71 +Transacion 0: 11845976ACC2AD8E319F3ED6269EA60727C35423177389BE28DCC83B5748DAB2 +Block: 72 +Transacion 0: B5B337F698A9F4CBC31747616B17B61BA79C8CEE5FF3F28F82DBA2098C25E844 +Block: 73 +Transacion 0: B9F945589F1A2EEE2EA3AF7557D395F59C516F541D42EC4C66C3E35E98705578 +Block: 74 +Transacion 0: 6B2DFA54A31F104C4156AE706290E0B0E824E1FBD840F15A3C7EBB4855C2879C +Block: 75 +Transacion 0: 41C1793B12E76424EB296D61BB88128EE51CCE046C7D51A42A136B08D4B0F88B +Block: 76 +Transacion 0: 8ADCB38D0A4F4B5F59A9D52D3997771E607FA98EDB434F1E07F8737A1DEEFEA2 +Block: 77 +Transacion 0: C933E3D8FF83C1572E442B5084AA1B9487246F3373574D848BB6F2ACBCAB27B5 +Block: 78 +Transacion 0: F2FD55491D4D47650EB4061908525D02C5C0B15570D0BBA65387B75DB9DBFDC0 +Block: 79 +Transacion 0: A53BE0523C9E8C5E30F7CE58BB550AFEABE45209773318A922E997A1693D2A03 +Block: 80 +Transacion 0: 79AB45C7B83B56ABAA1385698CC7B40086621C71B43382AAF8E2E4802BF37B53 +Block: 81 +Transacion 0: 1DE8145EDC1A55C11121C4879C7DF75A0E604BC7A73E2F2417A4028F7C5D0F6F +Block: 82 +Transacion 0: 22C793F05837F6613DF3992FAC656E9D3D52A92526FA3CFCCA8F9F31C043756D +Block: 83 +Transacion 0: 864C4D0E50425D23128C84B739454B8FCD9BE09F5312D78D547C496DE51A4980 +Block: 84 +Transacion 0: BB756A5FF9F3D0FEC49872DCA7D3EBDF26691D5B752856E80FC30B46022FB9FD +Block: 85 +Transacion 0: 0723C7FB8998BD250C8924F52199CDBB59D370C0FB157EECA1203DEB69833377 +Block: 86 +Transacion 0: FFF9F5E1DCC63AB8813C971890CD7E5DC18EE0D135921DBA4F149D469A89C3E5 +Block: 87 +Transacion 0: 4929B967E61B21C313A6067D70CA568672599E87CA7959844CC415D064D917CA +Block: 88 +Transacion 0: BED49855568974D074D6622FBB032A2A57F835C16D942DA543BFAF47E2B821AC +Block: 89 +Transacion 0: 5EA4267AEF9246E30A721EA9C7077C6664B7491F8A6F613C5CB2C323EA5EBEAB +Block: 90 +Transacion 0: 20C5F74B054FC5C921E778D60136E3B9F8AA258B3D5ECDAE28EE68AD15B2B1A4 +Block: 91 +Transacion 0: 39BDFB42528C6BBD24F6F8B6821A70F0B1689310B5BB7F96F413B42DF591B4E5 +Block: 92 +Transacion 0: C7DDABEAC231AFDD3FA7860FBD86E032094B3ADB545BDD96EAEE0ECC0DA31A52 +Block: 93 +Transacion 0: 1CA2A5AC3EFE7D880F88CFAFD662E74D68181AEAD4F274B7AF060C0520476BEB +Block: 94 +Transacion 0: 462F13E5224DE320453FADC2F713BB02CEE41306C13A536AE5E06428F3380B5D +Block: 95 +Transacion 0: BBD413A6AC23D5915F4631137266B8DE22860A905AB9982E577B21E53B614DF4 +Block: 96 +Transacion 0: 9443F91C59B440AF8D136CEE76E5CC3DE5D654BA4BA801F131ADD3A79FB68F61 +Block: 97 +Transacion 0: 0CC41453670377733FDA84FE5E5D90BE8C381E0D84223B2ACEFCA6084A849223 +Block: 98 +Transacion 0: 6DCC0DA064CE086B24F46978169C4C0334C7587260C5D0F76EF380FF04183241 +Block: 99 +Transacion 0: B5A09B3E75769B73FC5557E4CD840B6F39BC64187122282C578707A634DC09D0 +Block: 100 +Transacion 0: 274AF90F85926F3CA180A9C9473194C81B1809FF8C9302E8762AC71C95332A89 +Block: 101 +Transacion 0: 1D24FF86321874A2D276316822CC09A63B37097F56A7D37431E3D420A315F90E +Block: 102 +Transacion 0: 6FEE3ADDF456635330445A533EA7148771B0AB818B174A426D691E694D3D5B55 +Block: 103 +Transacion 0: 95D84FF92436C233ACA0BF8357DD8A3219DA6BACFC1EC56D60A7B7FA8029FA94 +Block: 104 +Transacion 0: 769467A22E021C7050557699CDCEB96B5AA4B788E14B9B1623A333360BD05B81 +Block: 105 +Transacion 0: 5BF2FC3095ABD4EA10EFECD4FB99704F9593F67F55EF3CFA44741A058B6456F8 +Block: 106 +Transacion 0: 4107D20DB19E32342C40AF84C8B0738FF1245008A7CF3395B71F41122B94E8A7 +Block: 107 +Transacion 0: B9845C6516211C96AB876A27700C30294947E14F5BBEED573E0D42EBFBA3B9B8 +Block: 108 +Transacion 0: 82F63509F597F986634B6185C242D8ECD6D34E2145F57DEAE3E2606C3574B5EB +Block: 109 +Transacion 0: 6EE27EAACAA4DEF6C905360A881A830C2FF3A8311C83BCAD467B44A014E14CB8 +Block: 110 +Transacion 0: 8F5CD5C2A31B270EAA3F2AB70DEC42362949D26AA350C4F6C8C52F6EDA19E28E +Block: 111 +Transacion 0: E3DD473F28D39FEBAF63176ABD5A7D96A1C60F9CA22C240EA453ABC9BAE514EC +Block: 112 +Transacion 0: 4600AE9F51506E4F515F5FE34975A5368C6669942D1B381D3FE14141272B33FF +Block: 113 +Transacion 0: 55C4C9F33F9B01148A29F909FE97E92185787F5B4BD7A7D888A8617B00C77719 +Block: 114 +Transacion 0: 810CD8B85D8152783330E9722BA547D58B6A928C77E22A6631C17078F2AD078A +Block: 115 +Transacion 0: F08DA27F8BC70DBC5A1DCE77D509A44DD0751FA2AB3EF3973AD3424DC863D45D +Block: 116 +Transacion 0: D2438452865CB38913FE6725085FF91D153C8FCE908F88766F8BD579D4F0DEEE +Block: 117 +Transacion 0: FDA9353057B3F0871A690DABF5826BC3C353D0407A6C89DB7455D6496592717D +Block: 118 +Transacion 0: B4518A34A3D058AD7A9A07842B9CFA718CF9A2C13458DF883F30B74D69210758 +Block: 119 +Transacion 0: B99BCC672614F4E61E78834B9FB955CA2AD7E7D17584465C8D604D91D5651C7B +Block: 120 +Transacion 0: 9700FF159A785C679924EC104DF962CFC18A229B725B2C1E84A8005A3629A690 +Block: 121 +Transacion 0: 1985DEF8BDCC65373924FE62694B041113B198DDB9732AC3BD674201D7D37E5B +Block: 122 +Transacion 0: 6B417A4E70C86DDE0CC3CC7833349DA8E71D4087081CDD36CF87A2C676804B83 +Block: 123 +Transacion 0: 9F558EBCCE91D5B1E59AE27DEA61235FAE1155B1CF7D3AF0DED0B6508C5734C1 +Block: 124 +Transacion 0: 4B27CA6FE3FADAC37657E04307DB40C59C0065F332A955AFFDB11F20F5896624 +Block: 125 +Transacion 0: A9F3AC66CD6D2E0E314B36045CF0D40808C2AF3E078B997B97DA25304325605C +Block: 126 +Transacion 0: 17588504EFF9F3706D3ECC205BF7486F5B48CD831228FB2759A78C618BC4592D +Block: 127 +Transacion 0: 32456269E0F40C03DC0A5A20A429CE3DBF4D69C2E0EDA2A09240375DCA2417B1 +Block: 128 +Transacion 0: 52BE53C2ACE54B98C9FCAE139E2214D6FFB9AB7E47B96DB9C23F66BB14029496 +Block: 129 +Transacion 0: 30A5899E2FC047CCFB11098C5447BECE0837A9DE522509EF73124ECB0052D5F0 +Block: 130 +Transacion 0: 5ADD490797C2A96DDF1A014D1BC9F9B2B270BE692D9335A0E0E10C1BF2A0CA8C +Block: 131 +Transacion 0: B7F959E0BAA981D1FBA7FEAD3D11C95ACF8C96C679153EE8C22754D4226B7251 +Block: 132 +Transacion 0: FF862E8F129AA42D1972281B3F9690AD2D1AA073840BCC87EB30631A78FD7B96 +Block: 133 +Transacion 0: A643E43EBB13BA2BFF89AD6996C3F0DCFD135384E992C0439B79775E49DAAD58 +Block: 134 +Transacion 0: 26DE07B5373DEAABF450F9ED0DADECCD0091E48EF1174675D0A379E845203600 +Block: 135 +Transacion 0: 7DD993C21FE2B29B85F4C71E7EF53EBD7591143E65828A5C99203F3D235661FF +Block: 136 +Transacion 0: DAAC50396C315BB389AAAA3D0BF7398D589519BAA6C6225184B6D87746EFFB7C +Block: 137 +Transacion 0: F1FF402E25DF797B4AAC64F3FF0263D4E9814A7B9190AEBC09599E6F150C8ADB +Block: 138 +Transacion 0: D2A49B49F0E0D2FDFA3A5DC8A12AD55E93B172104FFD454C6E672FEBE480AAC4 +Block: 139 +Transacion 0: 182497B07A3AFB497AD8B0ED1E675476A134E828801F9C3BBCB2FF5D745CE559 +Block: 140 +Transacion 0: 410A7CE37AA854449C6DF6A0D358FA15722F95FBE0FBBF1EB33486EA6CBB545C +Block: 141 +Transacion 0: B974F15E4BD428D4347F78E3317103BBEB186DA4F3A6077E98C42E40D8453653 +Block: 142 +Transacion 0: CC687462C47BC20D806651C62A464A1D1466C2989941FFA95BEE16FA9473A0F1 +Block: 143 +Transacion 0: 274DCF34CA75A6B4F2F1531E3B012A8DA301213AF6CD8731CE326764592033FC +Block: 144 +Transacion 0: 225876257F4BAB51423853D566BCB148DD166EFEA8ECEE1E3F2EDFC3750343E8 +Block: 145 +Transacion 0: 704E6A2D1F74223161491ABBF6FD90C69E81E68A96E110F40E14F69FCC09E622 +Block: 146 +Transacion 0: D54D07B9630AC02A00CA412E4CF349DB09E9378A92556E28558532837F86DBA0 +Block: 147 +Transacion 0: 95312925CD6AFAAA7F6583B02C3654652878C93992BE93F11015025FD6625E87 +Block: 148 +Transacion 0: F65FDFDE5D6BABC425105B36248BEE7D0C4082BD326C488135CA6AD833F16B2D +Block: 149 +Transacion 0: B142EC4CEC5091FD20A84F1439F461C1F3BD6CBB6F113DF33FE9B0860FC30B1F +Block: 150 +Transacion 0: C50C6A5AA28A141998510D930F40A523A1BF6AF9428142BA2544D2A0F9E66987 +Block: 151 +Transacion 0: 8501E2238E84BF6DC89284D00ED056A3886AED70C7648D6F3C478892F0B2D434 +Block: 152 +Transacion 0: 10040CB5759E5A8280DC82B0BFE7A00DB0C8838C0E220C24E5825237815101B5 +Block: 153 +Transacion 0: DE79DB20034CCFE9356ECA2D088A37BD65930A78FF8547EF086A470CA8986EF1 +Block: 154 +Transacion 0: CC4CCC27B0A3F659F4B6E25E13B86B1BF9B40B76CC7E176D6C7D4692754BC71B +Block: 155 +Transacion 0: D23CF8DE42F8592430948CB3F9E1B69F6AC81DABFE65190D0F91C635D45C2A37 +Block: 156 +Transacion 0: 4AF5A9429D64EFADB1C6E275B19A14CA9051F5D4A6953753689EFC3120C58DF6 +Block: 157 +Transacion 0: B97AF236B791CCCAE09A7FB91B00088096DB3D254646E7CEB9F286CA4AF76569 +Block: 158 +Transacion 0: 1B24142042F0976925620B518F8DD4F6E9A6FB566070F15407DDE707A728A5CE +Block: 159 +Transacion 0: 081275A54425179975884E95FC8C180898F999A7588F2E8C0C5D864DAFD2803E +Block: 160 +Transacion 0: A9124A08448259A61650202556D2B59B56002CD250F15FA089BEBBEF6CEC1AEC +Block: 161 +Transacion 0: C77230FD6B2B7CD4703C5FA4F7B146480DD7D7F703BF2EEF5107EDEBB6902F96 +Block: 162 +Transacion 0: ECC90E655EC6FFE481925BF7DC580CD1897DED8086B2C92E8C223A1A3C15B82B +Block: 163 +Transacion 0: F4F1F722AF674BAABDF6F9039029056E71D4A16E1F9C0D67CF26E4EBE50E1416 +Block: 164 +Transacion 0: CF0D80464703DAC273D32425212096528400C3D0607237605C22AEF50E20B2E4 +Block: 165 +Transacion 0: 2BED756E9291332DA0CC14CA5EEAA6A86DE4F98B483EB1806E8548E7108A89F5 +Block: 166 +Transacion 0: 1380A067B7AF4AF7C6193A4B03C2397C8D8BF11CFD686473B012BEC5909BFC5D +Block: 167 +Transacion 0: 65A1C9B523CBAF222290FF857AA9E0FFBCFF830E7CD8AE046AA284A751E11F57 +Block: 168 +Transacion 0: 34D14A443C5B63788468855A5E74DAFF6EB08B50A7FD1BBA6D8657AA23BB3054 +Block: 169 +Transacion 0: FA95FAA636E0896DD940F57A818305AD3054497B5582AAD4CE821F7DA7D5AE13 +Block: 170 +Transacion 0: 98BE93DF4054D67C601A6627BCDE85C2CDEA7DB1A6A4E2832AC4266BF8592EEB +Block: 171 +Transacion 0: 1E50E1C396BEE2AC32A307206C864D39EE9EC198EE133AC010AF002E34EC0EA1 +Block: 172 +Transacion 0: 5BA5B3BEB03EA33C268EB90D54C37555046348A430B69080D1FBAA9A40879264 +Block: 173 +Transacion 0: 776BAB8BF26A81F3A1387B50152EB2A75542B074F98027FAD943AB5E1D45851D +Block: 174 +Transacion 0: 4840EE9C31A591F83FF72F3F6B503FD4BE863B451C8E6AD0898C1EA9CABB6457 +Block: 175 +Transacion 0: 2F8DB71AD63FFD8D5BC13CE4E9E7B375C6BDBB27340C041278F33E784EE4BAD8 +Block: 176 +Transacion 0: 974F39F6A3DDC1831508C61E5911554B21601E1828697A975A7CB47760737516 +Block: 177 +Transacion 0: 7BB7EF28041E793A0C403E416431BA92CCC5DBD63F28BA5E689DD818EECEBB4B +Block: 178 +Transacion 0: E15FB5A869FB5ACA8AD56C68458CEDB4BF9C724E1B31BD65727E0652ABA18CD7 +Block: 179 +Transacion 0: 3291B6FDDDE92D944AD9A840561781E92A89F6D0FD542A113CBC367A2C442CA5 +Block: 180 +Transacion 0: 2EB377CDC77C8DFF306E0A34311BE354DAE5B9961F22A353D3CDF3DAF24E6E06 +Block: 181 +Transacion 0: BE5D1FA61FE999FEE18004D11ABA8A4D50DE218BE962385009FE4122D2F7632A +Block: 182 +Transacion 0: 9AC3185E4388F10F1ABD1BD0805A0533A66521F98301B09EF13F5C894DE1F4CF +Block: 183 +Transacion 0: 7DF85C829FE00738F2DC6BBF81C1835A33651D5F6AB862DA14EF502671666522 +Block: 184 +Transacion 0: 0A920E24FDB994B503FC591C8C78E698E2D93552D09716CF15B5F9C33F94DC19 +Block: 185 +Transacion 0: 53FE31BCA00D52655EA33035218EB9F4E16AD2F2A1BB63ADEEA64D09AFCEE5CF +Block: 186 +Transacion 0: 4013E6BE12D943854C7AA15FCBA3F5979BA2C2024EC2484808A509F27B17D474 +Block: 187 +Transacion 0: 75DB616F062ED403F6F326C69BC51DB6D70C6196D770475107182FA20EE34CCB +Block: 188 +Transacion 0: F44515939990A0DC688902918CC2A267EE2A544465A80ECA0C15BE23798BC1AC +Block: 189 +Transacion 0: 00038DB28BDAD97D66F49D2ECB410DEAD3C93BD4C25DD685865EFB98A92BF4C2 +Block: 190 +Transacion 0: 1E25E57201E1F145446D5B1984E2A1E6F30D785974E22F60F6FEB28232B19E86 +Block: 191 +Transacion 0: 8513A31BA0E68D6F694E67B9062A7E9F4AE5A828684D89BD32357B7B01B9D23A +Block: 192 +Transacion 0: 84478A66084ABB4935D771A69BE6D6466EF8716325EAFE3AB7311AA56FD4EBFE +Block: 193 +Transacion 0: 3D9DF8495896FADD682451329A4558743743E6BB638D47D773D5DC8D37B7CCE0 +Block: 194 +Transacion 0: B25A526C33669B7E184112E42681A27E7BA4E6ADFAAD8F07568308EF17960C33 +Block: 195 +Transacion 0: 72E9408813BCE244D1B6DA2B04F295129CE5A2D11B0143F4F9C26AB430637848 +Block: 196 +Transacion 0: 046F44EFE24A07E4DD99AE2ECF3E1ADD608C4252D0250FAF0106307140E1E557 +Block: 197 +Transacion 0: DDE670E27B0E29CACA83621C3D6412C881D807875940CF6197E5156A650A39E9 +Block: 198 +Transacion 0: 05E31685EE3F88D6F6DBD9731CBF0E4A471D64E98A149575A68E2C024DF20B96 +Block: 199 +Transacion 0: F7603D45451CE00405E3304B776E359DA698FE741CE054896F33EF6F5B8BF0FC +Block: 200 +Transacion 0: 547104DB4D373CC3A29D12D341318778EDD268281DFA38363244BBA44C214D88 +Block: 201 +Transacion 0: DF4CC31F486CBEA1873D6F61E7D0CD671A2CC67BACDC0CE7546DB1A1895FBA3E +Block: 202 +Transacion 0: B32F74E782D6748C99977B415F130798ED9546FD94A423719C6E8DDDBD0DDB41 +Block: 203 +Transacion 0: 335E2EAC0B5ACCFEFF0AAD66F5B8FDBD78902612B864538CF4FAFE5F64A7AD7E +Block: 204 +Transacion 0: E7E9EC57FEBB95FD3BE82454AF9174346336D62B355806A6ED1C2C13F7A686FD +Block: 205 +Transacion 0: EA0F17D9ADC6C33B9C30D98BB6C3A19AD79A32828B92B1F927E9EC88514731C9 +Block: 206 +Transacion 0: 646E19BB59854C33324257C02137DD229968837178B8F8BE7C784D180ECD5898 +Block: 207 +Transacion 0: 5F38A6A30CFBC62554127E6CE228FC63AAAACFDCA30B736AD4718FA75455DE96 +Block: 208 +Transacion 0: 26C32873E5596D430ED220A8A56FA7E379002CB526183EE7A7DD352D4331FBE5 +Block: 209 +Transacion 0: 2EEB010E97A954ACB04CF95567229A5AC8157F5979E32AA864A1B20BBDC818F3 +Block: 210 +Transacion 0: EC42B7CE0A6A9B2997975941A07444A6730A484EF154EE479BD4A9550ED4A433 +Block: 211 +Transacion 0: BFE7DAA72079393E28C925A3ADFFC3D6AED7CC12798C331527D1F269FA63092D +Block: 212 +Transacion 0: 92BF17129D0C1347508907DD878F2BBC976E0934EA9C8FC3B91972CA46465F4A +Block: 213 +Transacion 0: 5ED0C457ACC8B1E615B51BD74543E8FFA861DE7A959D3C33A21CFED0CED063A8 +Block: 214 +Transacion 0: 29B1E8AD9C4BFB47F97643BE82945CB59C5EF685559504844DDD46A1DCC37BE2 +Block: 215 +Transacion 0: 243260DA2118368CFD808A484B7959012F833A869AEA72141F86FDA89DE4F58F +Block: 216 +Transacion 0: 722B3FAEAFE96569BE678A69C05905E227B746F043D430A13A5C99B19AEF622D +Block: 217 +Transacion 0: B0283F61968394BA35B7F9601FFAC6F1B8A177E16179A0BEC4AF62F47ADC88F3 +Block: 218 +Transacion 0: 7178A912E54E192CF1DB3E2EBD090F735E171E673208A8E3AC533C71110FD7B5 +Block: 219 +Transacion 0: 24FB2B2C07ED381C3EBC1F32C374E609C6E568A4A29D8C04842F0F0DC0242997 +Block: 220 +Transacion 0: AE49085050F534DB53D4E1CA6BB8B3958B6933F9CE6AC41DE8A2FB9241F3E03A +Block: 221 +Transacion 0: 0338BC898080D83A808870F3A59C253C0AB25A249337B63CE26DF34D641B11C3 +Block: 222 +Transacion 0: 93D392D2650FEDD9D2CD4CD67AF8792526BDF7509AD9C4104F766EFCAEB3C71B +Block: 223 +Transacion 0: BF2A8B59866740CD1BD0C1A399FDB1B5801AAA84EB632B9FE70B5A89C54DF42E +Block: 224 +Transacion 0: 4C365AE469930A4CE2C2B52BB6CB0CC25328A3C424F8A948C34F07B4B40F23C8 +Block: 225 +Transacion 0: C5DAF96771C7646ACEEEC484892CD4E8D9778FB9EC7C8579941C298DBD060F95 +Block: 226 +Transacion 0: 17F898824DE670FDDAC71EE77474FE3235F638968995840020CD834AE06C046F +Block: 227 +Transacion 0: 67C3B1FE96340ED2C96069BE1E3829E26275C584D9FE709A9B98AFDA73C3CA95 +Block: 228 +Transacion 0: FD784B0505E776DF56731C579985984CF739864F1B349FBE031827506353E52E +Block: 229 +Transacion 0: 2124DD113F28088226FF292FD05D9AE665C9FD9D0A45028A47F7388BF1FEA351 +Block: 230 +Transacion 0: AB3D904C6C32198304D1ABEE9A3EDEF06DD3173DE598069F18964443B8693812 +Block: 231 +Transacion 0: 2B2F2AF6E7FCD81AB3AF6D453ADDA38E7CAECF2A4AF76D7330CB4B0F8A1E8F7F +Block: 232 +Transacion 0: B5EE6BF7B6A0B0B70CFEE686E58CD51B97F95595F4B4BF0131A4A904A2C9B46E +Block: 233 +Transacion 0: E3B1B614772EC74C2128E445D55E6AD1BA53D75B1BE5BCA1AEE30C65EDF21A4E +Block: 234 +Transacion 0: 35DC0CBE986E28ACC5532DE06D6F067403CAF57CA129B7985FB0DF8C88A53AF0 +Block: 235 +Transacion 0: 0FC94817E1476C418BAF9E387A37CB7BA744FF999977401482D86FB87D99CE3B +Block: 236 +Transacion 0: 550377252E9922FBAAB445B1393944288094831059B54D7148F6DF463C8B52C1 +Block: 237 +Transacion 0: A6E25AB745F4ECE163AEEF6C4543683E4DF96692D5CD113FCE226792B58FEEAA +Block: 238 +Transacion 0: B59FEB8D4DBFF34EE30262E81875DE29ED1B85643D577BA8A222B6368A381DAC +Block: 239 +Transacion 0: CC16AB9F1835608FADF8D91E5020F3EDD0CD9462D9A86CA7F6C3881B94A2D95D +Block: 240 +Transacion 0: 760DB09C3A33EB03DCAC07BC773D0DCB980529751D1C20799C667B42A3B0992A +Block: 241 +Transacion 0: 10E3224E31DC3F8EE0AC630C850F3AA10CE0CBBF5F74AFA665885B26D671937E +Block: 242 +Transacion 0: BF15760DEA728B80335BEC2797EC77FFC1A01F2B4E8C2812217E5DD2CEC2F5AF +Block: 243 +Transacion 0: E146943CD1D6EFD812B1D7059A9455277E71F39CB1A5643A3A81A853E3D58F17 +Block: 244 +Transacion 0: A47E3DE47480ED9CDFBF0158FE838286A5F7D789E6724867E029F9E8A033A046 +Block: 245 +Transacion 0: 64290A6A8911A348C1820C333039F770052AC4981B0199B46AAD556A270F60C8 +Block: 246 +Transacion 0: 11C47D4554BCFA439E844A2137E6F09E62DE50AA741EF9FA90BF187AF1EA3903 +Block: 247 +Transacion 0: C2C27A64DD86B0F2B02E626AF8CF2F945F9805C43B590E0108C0D69CA6290E2F +Block: 248 +Transacion 0: E04FB7918E070C886A4044B7B56BF7EB35F2743685088C58511A3DBDF4DE503C +Block: 249 +Transacion 0: CCB64DA9DB3AC1752806F2C9EF207B55E77D110B9A9320C1BCA749C596CFE804 +Block: 250 +Transacion 0: F09D91F3D8AAEFD8F100E54C5955A0EB05ADBD2C502B9141E595F77ED04D35CF +Block: 251 +Transacion 0: C6F00826031E4E572D3BF8C5E4E89262C0F34B3F2451D1D8B15D49EBE6E156C3 +Block: 252 +Transacion 0: 238AA765770816A8BDE3A8B039E42AA470613CF7E5A915F7C314962EB02E0B29 +Block: 253 +Transacion 0: 15AE5DD71A77AAD7B14B9D62AE93A2C416D5158DC1DC12ABAFB2CBC737ECEECE +Block: 254 +Transacion 0: 904A5F0927AA6AA53DEAB0E4743BF9F8176AC0B5BD99BCEFAA13B876AE3EC218 +Block: 255 +Transacion 0: 3A0E1E9B7A22020A156DAA08F1B1248DA8A64D76344EE5B97E10763AC2612691 +Block: 256 +Transacion 0: 7B64E63E637AC7F9128B792FCC9ACF026AF45A21892C6E21731DEBDCD68187AB +Block: 257 +Transacion 0: 708CDF710539593B56B92626DB7ED741782E1AD739718DDE0F39C6651F097105 +Block: 258 +Transacion 0: 5AE06A6FF0F242FA09997DFC47761E948943F50DE170BB951F4A9B3F8B01A8F5 +Block: 259 +Transacion 0: 952A69E8A179A49B4DA6C55ACDC5CF022678D9813385E7D14BFADEB917C59847 +Block: 260 +Transacion 0: 8358B279FF43030387BA5D95BCDB85A4900E1BD6BFB8AE53390DB20EDD88B6C4 +Block: 261 +Transacion 0: 3A29DF8EB46B59C66AF3F2299994F9163CDE3E759B676D2B2B93AD2E7D47AD41 +Block: 262 +Transacion 0: 36927167905873357B104C399B47C243774CC70283AE55B54BD5C2B443D4FC67 +Block: 263 +Transacion 0: 2A4957FBF6A80F74D6F344A094114EE338E5A5C576A85D5A3278DB4F554A8CD2 +Block: 264 +Transacion 0: EE8167476C693DB55DE1500619C39EC674318193E9B2327C1B8D7A36598FE070 +Block: 265 +Transacion 0: EAA56C2DAC02C8E12A663273D16561C9421209CD5264F84078E764A22BE94FA4 +Block: 266 +Transacion 0: F4DBE6D395C7E93CF0E527C3D6C5FB14F1CAB10088B2FE0B782C4CB04329D437 +Block: 267 +Transacion 0: 3FAD31404D8404988697F3C3221E26C3E5CE81FB4523F368AC5F29F358758257 +Block: 268 +Transacion 0: 0A4FE4E326D3E9FE15FDE6732B39DFB5A1AC26691A6515EDF71F866AB394CD62 +Block: 269 +Transacion 0: 68F723467C0D39CD822314E57CD56554C3C93C19C135536B4A50C3E9E738A35E +Block: 270 +Transacion 0: 975E17E211AFAB0674B881B4FB820360C3A31A2A2CC77B60DBC27C2F531C3080 +Block: 271 +Transacion 0: 418F2343797ACB0990B77634CFF89B8004736186731DA21B69C1170BBD4291DA +Block: 272 +Transacion 0: E8AE5D397F893664281E375F02B9D4ACF7ACB9CF3BB9D86862A064881C8B0155 +Block: 273 +Transacion 0: 87A7327727E0B63577808F62DED3FB460253A34A0AE03176E7CDD965E37F4D45 +Block: 274 +Transacion 0: DF4A6FC4671F456EF277B6719EE69E16244F81ECE8F20DEC7A8AA13A5EB5A6A6 +Block: 275 +Transacion 0: C8E3DF1808DCB932EDD2903EF5DAF5B228A294373F075A4C0FE1A7AF76737081 +Block: 276 +Transacion 0: BCB248F3CA047C720068837652DBD2F6FD18928D328269713F41972E7090A51E +Block: 277 +Transacion 0: 3B224AC24234E0C9699ECBE3C00EF8FA0830BACDA03D039E88FC498C1E88CD6F +Block: 278 +Transacion 0: 884967FF0184272F9CA36C15FE924B6C4F08D061E1F28A951F88CC839E2BC118 +Block: 279 +Transacion 0: 7D6294D1EDD1E8D094BDA5E171C8629932E3B5C7A47AF7F5DDAAC3922F89FFB0 +Block: 280 +Transacion 0: 07927F55432755A5424FBAA5772907614EE972A65BC2EBA6A2DC80D1A7005B77 +Block: 281 +Transacion 0: A286B5736560D59ECF4478C802303B897387BB2EC900AC3038C573CF5D503405 +Block: 282 +Transacion 0: 7F5CA571B6BC1D00A863777A6029F426FA98E4A450E9AF3D959C4F493D9C9761 +Block: 283 +Transacion 0: B760A4BD2C34A782B9B7165B4C404853FAF145B21C73E7E6738DA21E29D6BD52 +Block: 284 +Transacion 0: E3E040D88DA72F2B805D1A73CB86E132BBD2BBA436437AB5B0D24DE3487B0619 +Block: 285 +Transacion 0: E291A329072C2310F6DCA22D6F96F6A98F8E700B98992524094B7E4943A91851 +Block: 286 +Transacion 0: 4DF437A5C7CEB7150BCBA89AE850226E322E591F5FD304B8A958767B4344EF6C +Block: 287 +Transacion 0: 9009265BBE017E7739030E7D75292A37E77017137AE671DCC7385606098F6D21 +Block: 288 +Transacion 0: CBBF961139F9F8B1330A9B2FCA606B9BC12AE77ECF9C1B4CFB6FE33F5754BA54 +Block: 289 +Transacion 0: 880A09AB0ED3D5C360A48DCEF4982A6C92FABD0738C9ADD39ECE4530D04FE272 +Block: 290 +Transacion 0: 6FD4837D07212F04C08278CD4BFB7DF567D1F3DD871ED9FF20E39913BFDB57F1 +Block: 291 +Transacion 0: 1C3CD06143D410F638D51A29CFB3CBB7C74F2C27285B83270B2D45EAC36422A7 +Block: 292 +Transacion 0: ED567767572E73D8C36543265DC07ADDA68D9D77030EDCCEC80F6D1DB2E89937 +Block: 293 +Transacion 0: A0807C71A404637606295AA2C34E64360B0C3FDC3AF5B6BCEADBD1D6B896D840 +Block: 294 +Transacion 0: 6F0284045D2E8CEDB02B8361A907A88676FEB700DE502F10148EC08C1C5F48FE +Block: 295 +Transacion 0: FB9928BC2D57A6E23B3F134BA687B3D7E33B94B111D2C148DA88D4BF0EB7B02D +Block: 296 +Transacion 0: 2B544C2144C96E18865BDC2587608994B3040870C3203EEC4764BB05D901F57F +Block: 297 +Transacion 0: 5349C232586129C7199A903B2AF1BE9D952BD5AD46E5E22315329452876B1DFC +Block: 298 +Transacion 0: 5237D9837A59972316691BA82D8B865F301CCE5FEC64640FBF82A78CBFD2C421 +Block: 299 +Transacion 0: EE408DEF96C7F38E05378E9069B597343499C04694CFD51A64680FC0C158F69C +Block: 300 +Transacion 0: FED86F29C1533394C0EF76A659C00A830C369D816221C40BEE701A8E87CBEE57 +Block: 301 +Transacion 0: 8E27628916CCDCAAD5D7379057C6D79C40AC21250E51A06E79E18751A970C937 +Block: 302 +Transacion 0: 2AF236410966662C0C5257F46DA184C3830272F6D5551966C75C262B2B645B6A +Block: 303 +Transacion 0: 34578F62E43649464CCE0E9AA54763376DC8D7511336C03290F36350121C99AB +Block: 304 +Transacion 0: 70DADADF7728CD087A77EB7E3AB9B8E72A12C0D135AD63BAF78572AA0F00D6FD +Block: 305 +Transacion 0: 40610F7D6525C7EADFE147D8BB4C13239BAE3EAE77B8191AF083020FCC65E016 +Block: 306 +Transacion 0: 73363375BAB4F662B4FD2FBDCE2BEC3A5E0B9DFE83DDBE7D7FAE14C95099FFAF +Block: 307 +Transacion 0: 90E5BE62397951A3BD95AD76AF33B4DC3E7A19B3494E8CE0A18AC54AA485A0EB +Block: 308 +Transacion 0: 18D2236DB947FCC7FA2D81158C747BE4D473143D55394FEE3E32391051FC095C +Block: 309 +Transacion 0: F4D9F729573ABF344386410355B456CF9B8587E4812810A9747C1C04E1731F7A +Block: 310 +Transacion 0: 98D9C4D7A64D0689B5EEF36BE54E98F5497339DAB2D8E3C44A3CA3DB47AC4940 +Block: 311 +Transacion 0: 6639E7E42AE559FCF44A940EDDCEE8E63C39932FC637576F9E3C5D238AE18006 +Block: 312 +Transacion 0: 515EA5F03C185AA49F3E728FC522700028AF4B05CE1F0CD826F39CC07D2B1DF6 +Block: 313 +Transacion 0: F38E4AD932FCEE2878C9FEF03AEAA968FC7CB938FF10EEA71EA5EE458788CC4A +Block: 314 +Transacion 0: BC39041B0E204EAAF5E609C48C634B6B68EAF6B8009AA902D8584F9A0C77185E +Block: 315 +Transacion 0: B2EFF3AC5056EE12E2B5A96AF746F5973818AAB93FCF4738B3F391F27C66B159 +Block: 316 +Transacion 0: 18993059912EC40D6E99D0DA4EEAB6B6C68B9F959B31DC0C2D4D2D30498A62E2 +Block: 317 +Transacion 0: B100A150AEF9B61591B6CA2CFD8692925204627EE2F661B37D151E08885A446A +Block: 318 +Transacion 0: DD3925C652A893370AC0D0D3B5DEC42AF6391A3AAFF91996EE48E71E58DB290F +Block: 319 +Transacion 0: 835FFAFF59E532597D29F974049EC861AB865AD8991DD054EDCFBB4DA5C945BB +Block: 320 +Transacion 0: C026E8D8047E96DA914FB6EBE3BF7ECFBCFAA19D8A1DD6732C2D4B8787C315BC +Block: 321 +Transacion 0: 30F086EEFFEF66AB6314B07C9617FC740DB852B92C2A9D79AE2115038D0E3A16 +Block: 322 +Transacion 0: 6CFDF75F7A699B9856521D5982DA57E5668D02E94AA614F9669763A784C8FDBC +Block: 323 +Transacion 0: 817ED60CCE3E03EA3BA82C06EFCFA7441861E7BD3EE016852596BAFF29EA61FC +Block: 324 +Transacion 0: 6C2B940931F1F4807BA24CB13ACA6B13F26100E84D5C4BA55CBFB679895CEE71 +Block: 325 +Transacion 0: 2B3F28B6368049E01917F44EEAF8EF96844B9D0CC72475C86323BFA4AF8DEF0A +Block: 326 +Transacion 0: 21512B092BDE6528C9840184F1D78E665C78BD1C765C829803B0A482A5D46161 +Block: 327 +Transacion 0: 8B8C325B6B2C154F774CF1DDB46EA98494963793D38EC3E416980CD89D33FB24 +Block: 328 +Transacion 0: 06DE54975CC13CB84CB43B229496ED9D1F004BEE7C2B52601C8031591D60E3B7 +Block: 329 +Transacion 0: 0569C1508BF9FB344A65935BD8AF967F7C72B2DE7D1ED6A3BC9AF082517B3EBE +Block: 330 +Transacion 0: 39AEF4674D4C0B262F46D7737A9A19A9CDB6E567F8585BA57C30489C3DFA0641 +Block: 331 +Transacion 0: 8720B1B397FF28606E4EA4317F9D5E7B01EF8C89617A37516215D8FC443D31AC +Block: 332 +Transacion 0: 5629FA1E2E63C145471455E7FA87A47165572007EA1324B5CF7147C91B143F41 +Block: 333 +Transacion 0: 70B0FE7E9F9A287348DFA35A534BAD004A064403E9B8029DB18B705B7D5CB82A +Block: 334 +Transacion 0: 7CCFECBAE66AF4EAFAF3306F1CDE711ABE277E216DF252A3D74F10B79C76926A +Block: 335 +Transacion 0: 3F9AE2B0505EAD2BD2B701C419DF519538AFF99CC036A174AE2B6C569CA2CABC +Block: 336 +Transacion 0: C098334CCD1B4BB48FC6B460A3F6FF3E1184AB9776181E55A80097E0B690FF3B +Block: 337 +Transacion 0: CB090B2BD2CDB73C3ED8A828AA20FFC3EAFFE72B53A345363E15C0DF188E4447 +Block: 338 +Transacion 0: 3DDEC50405754518AD33CA09D9B35D4AC00439AA88D8A5B5D57D72765135F787 +Block: 339 +Transacion 0: 0D46267788252FCC1C88FEA3C59AC443DC8A058127121AB83A4FA078B94850DF +Block: 340 +Transacion 0: F0AA1AF92FD3E1287043D7B3B9CCD1798454776D87D1985BEEB24F2F6EBFA80E +Block: 341 +Transacion 0: AADC016A5DC27002B6B7D5BC70ADE49F46A3E83A86D48C1BA0F68D003383E6E1 +Block: 342 +Transacion 0: 32BA3D2E00F08F8A89461B76261DDFB73388AA230C1271D5215CF163DBB40F1C +Block: 343 +Transacion 0: BCC5E3AE406243C4DF00290D31DDBE4827575C0B6F929C2C5DB775BF69A84255 +Block: 344 +Transacion 0: 6743246DCA88E466A693633F39A4D68C95404506ECEB214C40855310C2C05C53 +Block: 345 +Transacion 0: F38136E53DA65AB5367A0EC73B6A495A5050D49133B1DDC5C6D90F409710F62C +Block: 346 +Transacion 0: D71CBADDDBD255A7321C73FA552BEA8AD8969A2D3DBCBBA2652DC9BF604BF089 +Block: 347 +Transacion 0: 3D756DF956E48B9A6E376B17C8C6A3A98D85B3CD47903AF1F3FFBFE52648A139 +Block: 348 +Transacion 0: ABB7EE4AAEDE4D65C06245655ACA8F4035284A6947D686AF6D2314351346FD9D +Block: 349 +Transacion 0: E771ADC73320CD15D1374E3B406ACBA471A17894927BC034F8004C2E9EF94C29 +Block: 350 +Transacion 0: B791A0CA3698AF9FD0F9D0D67AFFE631C3A5D3BBC6F65085C00C96E7843BBC93 +Block: 351 +Transacion 0: 39AC112A53A81BD270242242CF853DB983F793268C817AE29383B90D5315721A +Block: 352 +Transacion 0: 4EA1F74C4877C69D3133945CDD07285D34431E0E0697C123BCAB0F4779BBE9AB +Block: 353 +Transacion 0: 10A40D28A379C75B8A5AB4DF9CAA72EC94768CF31DC5F4F97220856827D51E0C +Block: 354 +Transacion 0: 18FF334A67C25F9312F923895F7100BF7D64FA4BC8D84944FBBB4BB7AD2640E3 +Block: 355 +Transacion 0: 3B938EFA4F754E3E457DFD664FDF088EDEBF787220FAB267C44433E0CFE47713 +Block: 356 +Transacion 0: F09ED1E006F39C4B9D49E3CEC362EE052438DFEE57B60D3BB8B31DD1194D3B6B +Block: 357 +Transacion 0: 5EF8635853C98DB3FB1BFBCFB08E1617BC24CBE442CE0AF56AF8F21AA99A2F53 +Block: 358 +Transacion 0: DFC03A58B170B6244A97C2207188601D2C93FFE61483CDF6B95B3D34C4A8EC5A +Block: 359 +Transacion 0: 78FF80396E51F5688468B6F2CE72BFEF36E5B474AEF07772059FE3A1008DE4DD +Block: 360 +Transacion 0: DE2386BEFCE7D2934F53FEEB632A291EB329069816E708784269F382F880D3FB +Block: 361 +Transacion 0: B8F38E7AA14AFF384CEF118EAFE364AEAE6DB1BE7BD57D016C11EB2BA2FA588E +Block: 362 +Transacion 0: 85A87B92A8A4393F2602BA45179FA9296C0C72FE3036AA9AFDD83B1D5330D7E1 +Block: 363 +Transacion 0: 5C10C7F312B6E5D80363D168430CEA4118FAEB3CD5663BFC155ACF006452CA31 +Block: 364 +Transacion 0: C5E412DDE2BE6FC6C4F150EA2F8C92BDE8FE662ADCFADDEFE1264274EF16D326 +Block: 365 +Transacion 0: D778D6BF6A6EBBA3A4C33838214587F24BED311CB2BF3A1E12AAC926065446C7 +Block: 366 +Transacion 0: 438E41EDAD640494590741B6105EDF9E3DA85730A4D89B8FE0C4E541BF7BBD43 +Block: 367 +Transacion 0: 9FFAA000736EB73EFEAC89AA4F2FCD9358EEA8616A271E8F9F4D7E3E79C35DC7 +Block: 368 +Transacion 0: 178FE851AA72D32A9DA1D93D1F77A699BFB0BEF3742A86264E66411E13730B88 +Block: 369 +Transacion 0: F938C68D867385EE6A891E7E2A4F29FE4A6E69344D5B7DDC3D98E5B0E27D3C0B +Block: 370 +Transacion 0: 7769CDA03EA71EA44847C758A4BC073C8F37A3161A06A83B84FDCEF13B2702E5 +Block: 371 +Transacion 0: B77B35FE0F7C5888EF6846E3DBFAFA65AB7C22F6D5BC66BE90945690CE8B8C50 +Block: 372 +Transacion 0: 55D0DB951F6797C7ED0169E7D9D05C3C88816554D3F8C9202A9FE7A9FFC8AA40 +Block: 373 +Transacion 0: BDC4623D731C77710B3A6590E50279E35504BC1C16B2E1F39C22E5E14820BC72 +Block: 374 +Transacion 0: 5C6E48FC0AB0AAB94A3C133799C40E61A05DB1D1731B71DC69D01EC7EDAED98E +Block: 375 +Transacion 0: D50BD0A86C0AB145BE4F8681AB6827C81041CE05843E311416FF0EE01DE3A4C3 +Block: 376 +Transacion 0: 8B011A55762D2C6B44B934FE325F13855540BA6C7AB340DB803BB4158578C8D4 +Block: 377 +Transacion 0: 27C8C2A828A410A45073E44D08CBFCD761C5F34F4B41EC0D82EFD2D60B183DEA +Block: 378 +Transacion 0: D11603AB55FC62A9BFBB41DFEE89C54D4DE3A6A1DC2C62A4624E95F55C3D86C8 +Block: 379 +Transacion 0: BB6EF035598980E62580AF72361758E315249470CF9E439C013857EE93B129B7 +Block: 380 +Transacion 0: 699EA87979D27AFC031F13272C76B9B316320C9A105C9002748C4FD12DFEE4D7 +Block: 381 +Transacion 0: 8E8518921E64EE0BAAA7DB3C95F0C89502CCF54FD2FA502CB3924DEAB515CF22 +Transacion 1: E726E1BE2078A40B938A65F63DF654196EE5AC561383572281245CD36E09D7C6 +Block: 382 +Transacion 0: D62508A97EB750BA19C9BF50C27A4998F2262BE5D76802C09158905C4BAF9699 +Block: 383 +Transacion 0: 2898FBBE9E8F2E7EADCC82B2FB00F43FE5A6CB4B4492680EFFE435E8B9AEDCEA +Transacion 1: 227E8E0666F063B8C556C372B240540A26D591DFCE20CF51E89F08A0C5A3708E +Transacion 2: 2F16FD4A15E9D87D1521DA89D7C928A229DC32D6757D4A68309FB6FF2F865342 +Block: 384 +Transacion 0: AC520F75AD7B0AF214965F51167958484D8B0C3E21A0B7B257F481EC95C76DB2 +Transacion 1: 34DC823C5B563492E82E463E0CE12FDD189872B60D1CFCB6686209817C01EC82 +Transacion 2: AB4001EB2CE2BCA9B526093813B18170ABD28D6EE86116432F67C4EEA73EB15A +Transacion 3: 3C3255FE1993305732405C297ED7297DCB2D1CBCD41DC7A3728F665FEA100EA7 +Block: 385 +Transacion 0: 04E527C66B6925E81CB850A3B81AD55D3050E4DDD392C2979CFCCBF6B9CC0E81 +Transacion 1: 4AD4043B1AA4ACF391CC4F2744FEA407DE200DF0D548C0835736869E7ACC421B +Block: 386 +Transacion 0: 32B636C9DF02C715EE9159BFC45BFC608B6D06305720BAADD2FD13047BF4EB7E +Block: 387 +Transacion 0: FB83034C0C5DA5874753F2C0FE2F926AAC593AF06748F90FA0A79BF2EA4E9EC0 +Transacion 1: 9AF31C323A2FEC3E1FDBF7064D8982207730A22BE01D0900C443B6CD966E7549 +Transacion 2: 7D8400C988BACABF8D0DADBF55250F07A0619F3AF54F513889D8F90716C89117 +Block: 388 +Transacion 0: D4FBA46266A7D8B70FFA3351A1B2FEA755A3CE47064262A69229A52845E99F07 +Transacion 1: 317DFA8CCBBC2CF0649313792C51C0542D20755BE0A5B200A7BD28BCC6218C2B +Transacion 2: 5F912F835CE402BB14B84B15C37E454845D69128009A10EB5551E221FC8A6225 +Block: 389 +Transacion 0: 5E70FCA75E3E1F0F50878A30097A7F6119DD223C7B3CD8EB699826A555662B0E +Transacion 1: B3E5EC565F885DFB33CCE989EF57993129FB79DB775C83AD260EF01FB2947058 +Block: 390 +Transacion 0: 19F1401F10E728631AF6294CE0C5758A06A60F7CD445A55810145EF0F97D735A +Transacion 1: 920F91EC56AC7CA728EADF76285C70AAEDAA79D83F1879F3BA59C82DEC8C8238 +Block: 391 +Transacion 0: C331B8CE4CAADD98E5038EB84BFA0DAFEBDDCF409917259A12F877B2204F4022 +Block: 392 +Transacion 0: 1916C6C9E984615DB98F97D4BF71B1058E81717B4CD186931186B4E285EBDCA2 +Transacion 1: E5A12574182D1108748C95A34C5D4CB30034060D47B5C77F01EF58AD00405400 +Transacion 2: 86A78DCA2B352AB665FC7E84040CD6A2D160BF8766E7F2C57462A24E7B7C22A0 +Block: 393 +Transacion 0: D7F0AE58D2C8407B8F40426A60801AD0429BEC3A038B9ECD25458DDCFECEDA09 +Block: 394 +Transacion 0: 3673D57B4E344E199CB9FC64EC9424D25007F8386B35539C53ED0E0A8655BEFF +Transacion 1: 20082DF2A8AA12B0E98C050976CE5C32FB9706D93887CC6591867548C84FC24E +Transacion 2: 3B1CD9874B59B39674714AD789258FAEC1DCC49FA354ABE2340A9FD7C7BD6255 +Block: 395 +Transacion 0: 3BE24FBE826513125DD8A21EB33EAEC8A0B5A41F74C3FFB10E33930D53004337 +Block: 396 +Transacion 0: 38D507C7E9C2DCE2F2090B1C2BCB97BDF16942EBE355284102697AA0CA6AA190 +Block: 397 +Transacion 0: 2B714EABF8CC8A4DE641032FE78FB6650D6A8A5161AE7A3FA384D65A77212BCE +Block: 398 +Transacion 0: 5590BA3AF5F8F283307E90941BC59ECA29B66D1C865F415F058C57511218F097 +Transacion 1: F9ED8FA26E2A650122C60DA24277F8E21E207EC17B440E8A7069EEA98616A781 +Block: 399 +Transacion 0: 31F20390249989D70E2945981B0A8A97386BCD187F80AAB6D1549A30564F0997 +Transacion 1: 30E8B9F9ECAA536141F21E7AD0370A60F5094AA74BD49C910450CF5B9966B47D +Transacion 2: 8493E2F7076AEB57F771F35E294D142318B4BBAA01410A739832C23613059763 +Transacion 3: B0E03F28C5F55FBE5D01EAEAA9A87D06C88ABF7D12C469474B3FF000939EF692 +Transacion 4: F8E287D4658934A5B2357704BCC9AF3DCAD329B9EAB2F3F0AB68978D46B81F23 +Transacion 5: B3C539D8E0C3F483779512747737F98CEB3DE907A99287F4D1D56294E17687ED +Transacion 6: F4BAF4CF420BD9DA834D2598B6F41C9F5293B133A2846ED698149CFFA9DC3F55 +Transacion 7: D30051683F838A45B26C9C8970679A144B8FA246D9D5E299E074AC8E5A744BF9 +Transacion 8: 246901E399CA7EADC38AF2067C9EBDA772F7B2BBFB5F850D67F8EC0A4FEAE7C9 +Block: 400 +Transacion 0: AB736A9180F675EE3B9751FC9B83AA726C49998DA7E09227CD3D8B486DD50B6C +Transacion 1: 166E31153CC1AF37C80D88E75B09B41B483656F1823ACF66637EF5F0E109930D +Transacion 2: 801054F7282B2575E17275DA1D7CA714F482DC92EA819B33942588771D0EC9B0 +Transacion 3: 2FDF7AD3E27CA9AC1EAC317215A216AA0EE44E305E5CA894C896A9DBC9FE3C4A +Transacion 4: 60EF5D279702D3060686297D41898CFB1D323F75F4887A4ACA1E9311DF956F0D +Transacion 5: 9C53B59700B0AE869DAF70D8E0375A5AB36D4D4BF66499A3AC2E3835A07A3715 +Transacion 6: 9154CC92C8B025C1DF13EF7D09A0F9662F46B40368175AD76A92948C5C2D86DE +Transacion 7: B01773AB0DFE7D44CA21EBEF4F5A5D9FD1F532C4F16BEA2F8385CE1E3188919C +Transacion 8: 667B07D690B83D6B4E57A57A242F87B101A53B86F521CAD2A54A7FBC63565D89 +Transacion 9: 14F72D1D00EA8092D43191E2D0226D6857F3D36B7CCA0BE8F22DDCA7BA6DD076 +Transacion 10: 9D3A8B333CBE818D9A6AACD363A4A06E7DB158CE136A2EB8AEEF8769DC512F4F +Transacion 11: 506830763DE017845A7D45EB55D49AE8663F3E0C6B0153AEDF67FB6D5EEB64AB +Transacion 12: 34AC918C91C2B47A94FAE82B7F86FEA65368E902BD737B13BAB395CE6C09717B +Transacion 13: 2F75BC9B48BDA054C7203E9BD11F579EDEB1373C269285B39261080E04C074AD +Transacion 14: 2B309C29DA939833FE0D9FA7D8CCA40E0B8F644FAFAC5D44B475EA07BC44A271 +Transacion 15: 02BA2EED6BBE7F432E67AAA254871415DF97FD2AC15379755E5C01637D3EB802 +Transacion 16: 34A6DA66683A4718758BCD0B68B3AB427418A7C3B06AA8B18DA398449BEF3505 +Transacion 17: 1FFBE330992ACBE9D0BD834A97E097E4F78787B2C7DAAE1572357F7E4C4D6239 +Block: 401 +Transacion 0: CC3E7A487087173B934A76752009F90F6689C56994A2EB186B08A9973586A788 +Transacion 1: 5540F54A2BCC34F68E4FA2DDE4C3349BBB4249CDAD285474777B67675A284D98 +Transacion 2: 31B4242928B779163EA407D2CA8F72A32B2FFB326364250AF99561EAE73889F7 +Transacion 3: 2CC456BF4B09A88F94483224A1DCCA468FFBC18E0DFC846542B93B1E15A15DF0 +Transacion 4: 259CC9DEE90C5CE17633F64717A68A171F2450243C79135EDF04EE936946E53C +Transacion 5: 55B8E3917B02EB8DE033D4E2F5F02C195FF7C51621369D3624551CF0CFF3C464 +Transacion 6: 8F0670606178B0BEA00BC79AE337A84E801E4574D082302E39393AEFBCBD288B +Transacion 7: 2B8364FC33E2FCF8C36D8CADBCBD3F3FF85DCCCB3A5A1436347A419676754CF9 +Transacion 8: 497A65786A1FC2BD18DCBA12366F2AAEF3D7AF5D0A74A2C68119CC173FFA6E7E +Transacion 9: E3F2B3DD38EE4A87F6F9B77B5196BE61F74101D5D0D5272F8EEA2D3C1371965A +Transacion 10: 252889D738E6359A7D34DA06C61F825313BD6DB00161D1A7ED3692E895EBB545 +Transacion 11: 63B54B162A7115D16ECC97D304993785BB0585A1BD53C24A861B7D2692C6B5F3 +Transacion 12: E1437992533EEA32784AE5CD2AA3B655B4023D2CC23D154BAAADC93FB7FBFCBA +Transacion 13: 0354A724AF498ACB80DF9142F100E5FE1428309327DC2728C0997785997BBAB2 +Transacion 14: 38476DF82697A98B415802D37D34C15FEB6A1E19EAE5A733F739D48335D7890F +Transacion 15: F3639BE5B1177A21598AAABCCAC919381B9715D00D13E9744B3C57F19DF35DA1 +Transacion 16: F47AA32D864FEB22F17E046FD44C0958462A4AA5B47B6E8B36EC0229BD4E332F +Transacion 17: 63898138C43B38C01B0940C3988CFA95AC78B6C53CB04C3AF9B1EC62EC016E5F +Transacion 18: F9D27109D07A1482192886505A5AD356774E575336AEE5766002520E15443981 +Transacion 19: FADF1E4F4BC5E18D5486E80F6861B14FFABECA1F91061A1364BF47C2CFB136B1 +Transacion 20: 8EF1FDBBD43CD52A85B3F219182164393C72E14E7D371599A4CAC3B8E6F08231 +Transacion 21: 0C449A4923A306883D6DF6B005523BA7B3EA0A575CB285F782CE26DF51B0ADC6 +Transacion 22: CCA520E80023A0CEB3CBBB7B647F866E8FC7FD627F916B4549E65986A06D3FD9 +Transacion 23: 8557C7118BC5C3C952FDE43F0056B5BD3901123A8EC805268765D5349E6740E1 +Transacion 24: 560E22884260B6421D73B23F803BC5493A64D1CB8D04516B501C7B7873ECEFFF +Transacion 25: 0284ADDC20DA18B93C762094AE369FB65CF206AEF66EEB77387A51906D5E1E16 +Transacion 26: D6E0031E30443B61C12670937998A2F91F1F6D51445D61054B8DAC3C2C407EBC +Block: 402 +Transacion 0: 57F707DB2C7C4429E5C97AE81C32E923426A2908A3FEBE51FC9B4F4114C735D7 +Transacion 1: A12FEB03072F6A6E285AE321D281252C1F0E6E0793EC0374AB4950159007EADD +Transacion 2: 9B3FC1BFB5848C8DE86A731BAD35EE81EA4306BABC1937AE6DB548DF7D4BDDBA +Transacion 3: FBE5294B5385A716165C9DFDB1775918A99BEFBAD0417930985DD9C87FBF34D9 +Transacion 4: 760FF5C22245795691FD1643662F55DEDE45473FB2BC2ACDC5C4089C3AF1C469 +Transacion 5: FBE8E5EB3E3624955160FAF7174E2D21C1391E0AE6F50609D7B4367AEA1CC2C9 +Transacion 6: 1E6619B55B40E54E9E59287753EE1D8F44FB3AAF3969B6E99901CC61B4463A3F +Transacion 7: A85001E3B9C55DC71B7326298E01FF46EC9838D8DCEA68F0845856B940FAD036 +Transacion 8: 562E8C325CADABAFBBFFDF3A9989CED2F5318463A5B9719C3DC4AFFFF2A9FC4D +Block: 403 +Transacion 0: 6140D0FDFA767DAB82B9EEE930305EF058B9AB4FEEC0C8B78D3884387E37BE5C +Block: 404 +Transacion 0: E01622E1F3B2E1E99140A5738BE1759FB8653F68B9B0F94F6769A4A69BAD1317 +Transacion 1: E6DDFE780E85BDA4EE79B1D118074F8378DFA68378137D1E29B27DB94CF26231 +Transacion 2: 312A5482D7ADEB582E31DEE8C28BF1008B803D665C82834524E3DFFF1267F1DC +Transacion 3: 1B69B43EEC780F491D55707C37F28D4019A764046ED70C2314D71444A9D5B714 +Transacion 4: E00F4D4FFC3F97AA8397AB55F9042B59885ADB91770EFED93B52832B2801C888 +Transacion 5: A87FE6378BE30A4E1EED78C65017FC8C3FAD65B3D5EA06E88AC30F157D5D5916 +Block: 405 +Transacion 0: A7B74FA49643B6503E5D5ABA47A0984A996C47E0BFFF2307911F0B847446AB67 +Transacion 1: 3CB2A7EAF51C0CA9809C7A4E4017C48E0E1CBA4BF0C95BC9A13FAFCA9C62832B +Transacion 2: 7092DE5D3C8E2BACFAD9706ADED2BCF6A7F56675FA40B42C1C18B46E4D363585 +Transacion 3: B92B2AC3CF40BAC2DE944E938BC3FBBC141BEFEEB19D7AC6ACE2FDD28F563E81 +Transacion 4: 8A354968D7B703167D79E02C8F27DDFF4DAEFC6694CD6050BDA4B0FD89A786FF +Transacion 5: 7DD2AB651779FC13766E1041C28E0F76D4E739ED33BE7A83D496DD9AD974F196 +Transacion 6: A20011493A82E7EBFC8A13E9F4B31B9C21092BAB1674E21854662CBDE888FE00 +Transacion 7: 67ABFB78B7C70BC1390BAE543A5CC8FD93ABDEA82343283307FA69ADD0FEDAAA +Transacion 8: 15748D09E43E2FBC6940C95AA8A77FDE82D27F7CE5A3B600564C606FCFBEC3FA +Transacion 9: 587368B85A026F51DB6967C26E0C1193DEF7320293A6061E07BE30A46AD67559 +Transacion 10: 7EF287E1CF1422C43FD7A10A6CF34A56A5686B743263226E353BE83B3D971BCC +Transacion 11: 8C405B78EFB6BF9BE62CCE6B897A2A0C89CC41D83DC164560E0BCA5A28067EB7 +Transacion 12: 78DA3B5FE00FE94804BC8104CDE134FAC0C2DB8B58B953D61BDE4844AFDD19B0 +Transacion 13: 644E36F29F4166A0BD8DDF25232646953FB21EB5CFBE3DCF845FB40DE17E4E91 +Transacion 14: DC6F7949E46EC006FDF46C84F81499C427E567EC4BE05EF5E720CB5EC540C895 \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/dah.pb.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/dah.pb.go new file mode 100644 index 00000000..0db9ed1b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/dah.pb.go @@ -0,0 +1,197 @@ +// Code generated by protoc-gen-go. DO NOT EDIT. +// source: dah.proto + +/* +Package util is a generated protocol buffer package. + +It is generated from these files: + dah.proto + +It has these top-level messages: + TX +*/ +package util + +import proto "github.com/golang/protobuf/proto" +import fmt "fmt" +import math "math" + +// Reference imports to suppress errors if they are not otherwise used. +var _ = proto.Marshal +var _ = fmt.Errorf +var _ = math.Inf + +// This is a compile-time assertion to ensure that this generated file +// is compatible with the proto package it is being compiled against. +// A compilation error at this line likely means your copy of the +// proto package needs to be updated. +const _ = proto.ProtoPackageIsVersion2 // please upgrade the proto package + +type TX struct { + Version uint32 `protobuf:"varint,1,opt,name=version" json:"version,omitempty"` + LockTime uint32 `protobuf:"varint,2,opt,name=lockTime" json:"lockTime,omitempty"` + Txin []*TX_TXIN `protobuf:"bytes,3,rep,name=txin" json:"txin,omitempty"` + Txout []*TX_TXOUT `protobuf:"bytes,4,rep,name=txout" json:"txout,omitempty"` + Blocks [][]byte `protobuf:"bytes,5,rep,name=blocks,proto3" json:"blocks,omitempty"` + Fee uint64 `protobuf:"varint,6,opt,name=fee" json:"fee,omitempty"` +} + +func (m *TX) Reset() { *m = TX{} } +func (m *TX) String() string { return proto.CompactTextString(m) } +func (*TX) ProtoMessage() {} +func (*TX) Descriptor() ([]byte, []int) { return fileDescriptor0, []int{0} } + +func (m *TX) GetVersion() uint32 { + if m != nil { + return m.Version + } + return 0 +} + +func (m *TX) GetLockTime() uint32 { + if m != nil { + return m.LockTime + } + return 0 +} + +func (m *TX) GetTxin() []*TX_TXIN { + if m != nil { + return m.Txin + } + return nil +} + +func (m *TX) GetTxout() []*TX_TXOUT { + if m != nil { + return m.Txout + } + return nil +} + +func (m *TX) GetBlocks() [][]byte { + if m != nil { + return m.Blocks + } + return nil +} + +func (m *TX) GetFee() uint64 { + if m != nil { + return m.Fee + } + return 0 +} + +type TX_TXIN struct { + Ix uint32 `protobuf:"varint,1,opt,name=ix" json:"ix,omitempty"` + SourceHash []byte `protobuf:"bytes,2,opt,name=sourceHash,proto3" json:"sourceHash,omitempty"` + Script []byte `protobuf:"bytes,3,opt,name=script,proto3" json:"script,omitempty"` + Sequence uint32 `protobuf:"varint,4,opt,name=sequence" json:"sequence,omitempty"` +} + +func (m *TX_TXIN) Reset() { *m = TX_TXIN{} } +func (m *TX_TXIN) String() string { return proto.CompactTextString(m) } +func (*TX_TXIN) ProtoMessage() {} +func (*TX_TXIN) Descriptor() ([]byte, []int) { return fileDescriptor0, []int{0, 0} } + +func (m *TX_TXIN) GetIx() uint32 { + if m != nil { + return m.Ix + } + return 0 +} + +func (m *TX_TXIN) GetSourceHash() []byte { + if m != nil { + return m.SourceHash + } + return nil +} + +func (m *TX_TXIN) GetScript() []byte { + if m != nil { + return m.Script + } + return nil +} + +func (m *TX_TXIN) GetSequence() uint32 { + if m != nil { + return m.Sequence + } + return 0 +} + +type TX_TXOUT struct { + Value uint64 `protobuf:"varint,1,opt,name=value" json:"value,omitempty"` + Script []byte `protobuf:"bytes,2,opt,name=script,proto3" json:"script,omitempty"` + Color []byte `protobuf:"bytes,3,opt,name=color,proto3" json:"color,omitempty"` + Quantity uint64 `protobuf:"varint,4,opt,name=quantity" json:"quantity,omitempty"` +} + +func (m *TX_TXOUT) Reset() { *m = TX_TXOUT{} } +func (m *TX_TXOUT) String() string { return proto.CompactTextString(m) } +func (*TX_TXOUT) ProtoMessage() {} +func (*TX_TXOUT) Descriptor() ([]byte, []int) { return fileDescriptor0, []int{0, 1} } + +func (m *TX_TXOUT) GetValue() uint64 { + if m != nil { + return m.Value + } + return 0 +} + +func (m *TX_TXOUT) GetScript() []byte { + if m != nil { + return m.Script + } + return nil +} + +func (m *TX_TXOUT) GetColor() []byte { + if m != nil { + return m.Color + } + return nil +} + +func (m *TX_TXOUT) GetQuantity() uint64 { + if m != nil { + return m.Quantity + } + return 0 +} + +func init() { + proto.RegisterType((*TX)(nil), "util.TX") + proto.RegisterType((*TX_TXIN)(nil), "util.TX.TXIN") + proto.RegisterType((*TX_TXOUT)(nil), "util.TX.TXOUT") +} + +func init() { proto.RegisterFile("dah.proto", fileDescriptor0) } + +var fileDescriptor0 = []byte{ + // 329 bytes of a gzipped FileDescriptorProto + 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x54, 0x91, 0xc1, 0x4b, 0xc3, 0x30, + 0x18, 0xc5, 0x59, 0x9b, 0x4e, 0x8d, 0xdb, 0x90, 0x30, 0x24, 0xec, 0x20, 0x55, 0x3c, 0xf4, 0xd4, + 0x82, 0x9e, 0x45, 0xf0, 0xa4, 0x17, 0x85, 0x50, 0x61, 0x78, 0x6b, 0xb3, 0x6f, 0x6d, 0xb4, 0x6b, + 0xba, 0x34, 0x19, 0xdd, 0xd5, 0xbf, 0x5c, 0x92, 0x76, 0x63, 0x5e, 0x42, 0x7e, 0x79, 0x1f, 0xef, + 0xbd, 0x8f, 0xe0, 0x8b, 0x55, 0x56, 0xc6, 0x8d, 0x92, 0x5a, 0x12, 0x64, 0xb4, 0xa8, 0xee, 0x7e, + 0x7d, 0xec, 0xa5, 0x4b, 0x42, 0xf1, 0xd9, 0x0e, 0x54, 0x2b, 0x64, 0x4d, 0x47, 0xe1, 0x28, 0x9a, + 0xb2, 0x03, 0x92, 0x05, 0x3e, 0xaf, 0x24, 0xff, 0x49, 0xc5, 0x06, 0xa8, 0xe7, 0xa4, 0x23, 0x93, + 0x5b, 0x8c, 0x74, 0x27, 0x6a, 0xea, 0x87, 0x7e, 0x74, 0xf9, 0x30, 0x8d, 0xad, 0x63, 0x9c, 0x2e, + 0xe3, 0x74, 0xf9, 0xf6, 0xce, 0x9c, 0x44, 0xee, 0x71, 0xa0, 0x3b, 0x69, 0x34, 0x45, 0x6e, 0x66, + 0x76, 0x32, 0xf3, 0xf1, 0x99, 0xb2, 0x5e, 0x24, 0xd7, 0x78, 0x9c, 0x5b, 0xd7, 0x96, 0x06, 0xa1, + 0x1f, 0x4d, 0xd8, 0x40, 0xe4, 0x0a, 0xfb, 0x6b, 0x00, 0x3a, 0x0e, 0x47, 0x11, 0x62, 0xf6, 0xba, + 0xf8, 0xc6, 0xc8, 0xba, 0x93, 0x19, 0xf6, 0x44, 0x37, 0x74, 0xf5, 0x44, 0x47, 0x6e, 0x30, 0x6e, + 0xa5, 0x51, 0x1c, 0x5e, 0xb3, 0xb6, 0x74, 0x45, 0x27, 0xec, 0xe4, 0xc5, 0x26, 0xb4, 0x5c, 0x89, + 0x46, 0x53, 0xdf, 0x69, 0x03, 0xd9, 0xf5, 0x5a, 0xd8, 0x1a, 0xa8, 0x39, 0x50, 0xd4, 0xaf, 0x77, + 0xe0, 0x45, 0x81, 0x03, 0xd7, 0x92, 0xcc, 0x71, 0xb0, 0xcb, 0x2a, 0x03, 0x2e, 0x0f, 0xb1, 0x1e, + 0x4e, 0x2c, 0xbd, 0x7f, 0x96, 0x73, 0x1c, 0x70, 0x59, 0x49, 0x35, 0x24, 0xf5, 0x60, 0x83, 0xb6, + 0x26, 0xab, 0xb5, 0xd0, 0x7b, 0x17, 0x84, 0xd8, 0x91, 0x5f, 0x9e, 0xbf, 0x9e, 0x0a, 0xa1, 0x4b, + 0x93, 0xc7, 0x5c, 0x6e, 0x92, 0x72, 0xdf, 0x80, 0xaa, 0x60, 0x55, 0x80, 0x4a, 0xd6, 0x59, 0xae, + 0x04, 0x4f, 0xa0, 0xcb, 0x36, 0x4d, 0x05, 0x6d, 0xc2, 0xcb, 0x4c, 0xd4, 0x5c, 0xae, 0x20, 0x29, + 0x64, 0x62, 0x74, 0x67, 0x0f, 0x51, 0xe5, 0x63, 0xf7, 0xa5, 0x8f, 0x7f, 0x01, 0x00, 0x00, 0xff, + 0xff, 0xbb, 0x8b, 0x8c, 0x33, 0xdf, 0x01, 0x00, 0x00, +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/dah.proto b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/dah.proto new file mode 100644 index 00000000..a87236e8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/dah.proto @@ -0,0 +1,43 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +syntax = "proto3"; + +option go_package = "github.com/hyperledger/fabric/examples/chaincode/go/utxo/util" ; + +package util; + +message TX { + uint32 version = 1; + uint32 lockTime = 2; + message TXIN { + uint32 ix = 1; + bytes sourceHash = 2; + bytes script = 3; + uint32 sequence = 4; + } + repeated TXIN txin = 3; + + message TXOUT { + uint64 value = 1; + bytes script = 2; + bytes color = 3; + uint64 quantity = 4; + } + repeated TXOUT txout = 4; + repeated bytes blocks = 5; + uint64 fee = 6; +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/store.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/store.go new file mode 100644 index 00000000..a4142fab --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/store.go @@ -0,0 +1,72 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +// Store interface describes the storage used by this chaincode. The interface +// was created so either the state database store can be used or a in memory +// store can be used for unit testing. +type Store interface { + GetState(Key) (*TX_TXOUT, bool, error) + PutState(Key, *TX_TXOUT) error + DelState(Key) error + GetTran(string) ([]byte, bool, error) + PutTran(string, []byte) error +} + +// InMemoryStore used for unit testing +type InMemoryStore struct { + Map map[Key]*TX_TXOUT + TranMap map[string][]byte +} + +// MakeInMemoryStore creates a new in memory store +func MakeInMemoryStore() Store { + ims := &InMemoryStore{} + ims.Map = make(map[Key]*TX_TXOUT) + ims.TranMap = make(map[string][]byte) + return ims +} + +// GetState returns the transaction for the given key +func (ims *InMemoryStore) GetState(key Key) (*TX_TXOUT, bool, error) { + value, ok := ims.Map[key] + return value, ok, nil +} + +// DelState deletes the given key and corresponding transactions +func (ims *InMemoryStore) DelState(key Key) error { + delete(ims.Map, key) + return nil +} + +// PutState saves the key and transaction in memory +func (ims *InMemoryStore) PutState(key Key, value *TX_TXOUT) error { + ims.Map[key] = value + return nil +} + +// GetTran returns the transaction for the given hash +func (ims *InMemoryStore) GetTran(key string) ([]byte, bool, error) { + value, ok := ims.TranMap[key] + return value, ok, nil +} + +// PutTran saves the hash and transaction in memory +func (ims *InMemoryStore) PutTran(key string, value []byte) error { + ims.TranMap[key] = value + return nil +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/util.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/util.go new file mode 100644 index 00000000..d9094c37 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/util.go @@ -0,0 +1,104 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +import ( + "bytes" + "encoding/binary" +) + +func decodeInt32(input []byte) (int32, []byte, error) { + var myint32 int32 + buf1 := bytes.NewBuffer(input[0:4]) + binary.Read(buf1, binary.LittleEndian, &myint32) + return myint32, input, nil +} + +// ReadVarInt reads an int that is formatted in the Bitcoin style +// variable int format +func ReadVarInt(buffer *bytes.Buffer) uint64 { + var finalResult uint64 + + var variableLenInt uint8 + binary.Read(buffer, binary.LittleEndian, &variableLenInt) + if variableLenInt < 253 { + finalResult = uint64(variableLenInt) + } else if variableLenInt == 253 { + var result uint16 + binary.Read(buffer, binary.LittleEndian, &result) + finalResult = uint64(result) + } else if variableLenInt == 254 { + var result uint32 + binary.Read(buffer, binary.LittleEndian, &result) + finalResult = uint64(result) + } else if variableLenInt == 255 { + var result uint64 + binary.Read(buffer, binary.LittleEndian, &result) + finalResult = result + } + + return finalResult +} + +// ParseUTXOBytes parses a bitcoin style transaction +func ParseUTXOBytes(txAsUTXOBytes []byte) *TX { + buffer := bytes.NewBuffer(txAsUTXOBytes) + var version int32 + binary.Read(buffer, binary.LittleEndian, &version) + + inputCount := ReadVarInt(buffer) + + newTX := &TX{} + + for i := 0; i < int(inputCount); i++ { + newTXIN := &TX_TXIN{} + + newTXIN.SourceHash = buffer.Next(32) + + binary.Read(buffer, binary.LittleEndian, &newTXIN.Ix) + + // Parse the script length and script bytes + scriptLength := ReadVarInt(buffer) + newTXIN.Script = buffer.Next(int(scriptLength)) + + // Appears to not be used currently + binary.Read(buffer, binary.LittleEndian, &newTXIN.Sequence) + + newTX.Txin = append(newTX.Txin, newTXIN) + + } + + // Now the outputs + outputCount := ReadVarInt(buffer) + + for i := 0; i < int(outputCount); i++ { + newTXOUT := &TX_TXOUT{} + + binary.Read(buffer, binary.LittleEndian, &newTXOUT.Value) + + // Parse the script length and script bytes + scriptLength := ReadVarInt(buffer) + newTXOUT.Script = buffer.Next(int(scriptLength)) + + newTX.Txout = append(newTX.Txout, newTXOUT) + + } + + binary.Read(buffer, binary.LittleEndian, &newTX.LockTime) + + return newTX +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/utxo.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/utxo.go new file mode 100644 index 00000000..06e95601 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/utxo.go @@ -0,0 +1,144 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +import ( + "crypto/sha256" + "encoding/hex" + "fmt" + "math" + + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/consensus" +) + +// UTXO includes the storage for the chaincode API or an in memory +// store for testing +type UTXO struct { + Store Store +} + +// MakeUTXO constructs a new UTXO with the given store +func MakeUTXO(store Store) *UTXO { + utxo := &UTXO{} + utxo.Store = store + return utxo +} + +// Key represents the key for a transaction in storage. It has both a +// hash and index +type Key struct { + TxHashAsHex string + TxIndex uint32 +} + +// GetTransactionHash returns the Bitcoin hash (double sha256) of +// the given transaction +func (u *UTXO) GetTransactionHash(txData []byte) [32]byte { + firstHash := sha256.Sum256(txData) + txHash := sha256.Sum256(firstHash[:]) + return txHash +} + +// IsCoinbase returns true if this is a coinbase transaction, false otherwise +func (u *UTXO) IsCoinbase(index uint32) bool { + return index == math.MaxUint32 +} + +var mandatoryFlags = consensus.Verify_flags_p2sh + +var standardFlags = mandatoryFlags | + consensus.Verify_flags_dersig | + consensus.Verify_flags_strictenc | + consensus.Verify_flags_minimaldata | + consensus.Verify_flags_nulldummy | + consensus.Verify_flags_discourage_upgradable_nops | + consensus.Verify_flags_cleanstack | + consensus.Verify_flags_checklocktimeverify | + consensus.Verify_flags_low_s + +// ExecResult is the result of processing a transaction +type ExecResult struct { + SumCurrentOutputs uint64 + SumPriorOutputs uint64 + IsCoinbase bool +} + +// Execute processes the given transaction and outputs a result +func (u *UTXO) Execute(txData []byte) (*ExecResult, error) { + newTX := ParseUTXOBytes(txData) + txHash := u.GetTransactionHash(txData) + execResult := &ExecResult{} + // Loop through outputs first + for index, output := range newTX.Txout { + currKey := &Key{TxHashAsHex: hex.EncodeToString(txHash[:]), TxIndex: uint32(index)} + _, ok, err := u.Store.GetState(*currKey) + if err != nil { + return nil, fmt.Errorf("Error getting state from store: %s", err) + } + if ok == true { + // COLLISION + return nil, fmt.Errorf("COLLISION detected for key = %v, with output script length = %d", currKey, len(output.Script)) + } + // Store the output in utxo + u.Store.PutState(*currKey, &TX_TXOUT{Script: output.Script, Value: output.Value}) + execResult.SumCurrentOutputs += output.Value + } + // Now loop over inputs, + for index, input := range newTX.Txin { + prevTxHash := input.SourceHash + prevOutputIx := input.Ix + if u.IsCoinbase(prevOutputIx) { + execResult.IsCoinbase = true + //fmt.Println("COINBASE!!") + } else { + //fmt.Println("NOT COINBASE!!") + // NOT coinbase, need to verify + keyToPrevOutput := &Key{TxHashAsHex: hex.EncodeToString(prevTxHash), TxIndex: prevOutputIx} + value, ok, err := u.Store.GetState(*keyToPrevOutput) + if err != nil { + return nil, fmt.Errorf("Error getting state from store: %s", err) + } + if !ok { + // Previous output not fouund, + return nil, fmt.Errorf("Could not find previous transaction output with key = %v", keyToPrevOutput) + } + // Call Verify_script + txInputIndex := uint(index) + result := consensus.Verify_script(&txData[0], int64(len(txData)), &value.Script[0], int64(len(value.Script)), txInputIndex, uint(standardFlags)) + if result != consensus.Verify_result_eval_true { + result = consensus.Verify_script(&txData[0], int64(len(txData)), &value.Script[0], int64(len(value.Script)), txInputIndex, uint(mandatoryFlags)) + if result != consensus.Verify_result_eval_true { + return nil, fmt.Errorf("Unexpected result from verify_script, expected %d, got %d, perhaps it is %d", consensus.Verify_result_eval_true, result, consensus.Verify_result_invalid_stack_operation) + } + } + // Verified, now remove prior outputs + u.Store.DelState(*keyToPrevOutput) + execResult.SumPriorOutputs += value.Value + } + + hex := hex.EncodeToString(txHash[:]) + fmt.Printf("PUT TRAN %s", hex) + u.Store.PutTran(hex, txData) + } + return execResult, nil +} + +// Query search the storage for a given transaction hash +func (u *UTXO) Query(txHashHex string) pb.Response { + tx, _, err := u.Store.GetTran(txHashHex) + return tx, err +} diff --git a/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/utxo_test.go b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/utxo_test.go new file mode 100644 index 00000000..ec979c3d --- /dev/null +++ b/hyperledger_fabric/v1.4.8/examples/chaincode/go/utxo/util/utxo_test.go @@ -0,0 +1,206 @@ +/* +Copyright IBM Corp. 2016 All Rights Reserved. + +Licensed under the Apache License, Version 2.0 (the "License"); +you may not use this file except in compliance with the License. +You may obtain a copy of the License at + + http://www.apache.org/licenses/LICENSE-2.0 + +Unless required by applicable law or agreed to in writing, software +distributed under the License is distributed on an "AS IS" BASIS, +WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +See the License for the specific language governing permissions and +limitations under the License. +*/ + +package util + +import ( + "encoding/base64" + "encoding/hex" + "fmt" + "io/ioutil" + "strings" + "sync" + "testing" + + "github.com/golang/protobuf/proto" + "github.com/hyperledger/fabric/examples/chaincode/go/utxo/consensus" +) + +// func TestMain(m *testing.M) { +// // viper.Set("ledger.blockchain.deploy-system-chaincode", "false") +// +// os.Exit(m.Run()) +// } + +const txFileHashes = "./Hashes_for_first_500_transactions_on_testnet3.txt" +const txFile = "./First_500_transactions_base64_encoded_on_testnet3.txt" + +const consensusScriptVerifyTx = "01000000017d01943c40b7f3d8a00a2d62fa1d560bf739a2368c180615b0a7937c0e883e7c000000006b4830450221008f66d188c664a8088893ea4ddd9689024ea5593877753ecc1e9051ed58c15168022037109f0d06e6068b7447966f751de8474641ad2b15ec37f4a9d159b02af68174012103e208f5403383c77d5832a268c9f71480f6e7bfbdfa44904becacfad66163ea31ffffffff01c8af0000000000001976a91458b7a60f11a904feef35a639b6048de8dd4d9f1c88ac00000000" +const consensusScriptVerifyPreviousOutputScript = "76a914c564c740c6900b93afc9f1bdaef0a9d466adf6ee88ac" + +type block struct { + transactions []string +} + +func makeBlock() *block { + //return &block{transactions: make([]string, 0)} + return &block{} +} + +func (b *block) addTxAsBase64String(txAsString string) error { + b.transactions = append(b.transactions, txAsString) + return nil +} + +//getTransactionsAsUTXOBytes returns a readonly channel of the transactions within this block as UTXO []byte +func (b *block) getTransactionsAsUTXOBytes() <-chan []byte { + resChannel := make(chan []byte) + go func() { + defer close(resChannel) + for _, txAsText := range b.transactions { + data, err := base64.StdEncoding.DecodeString(txAsText) + if err != nil { + panic(fmt.Errorf("Could not decode transaction (%s) into bytes use base64 decoding: %s\n", txAsText, err)) + } + resChannel <- data + } + }() + return resChannel +} + +var blocksFromFile []*block +var once sync.Once + +// getBlocks returns the blocks parsed from txFile, but only parses once. +func getBlocks() ([]*block, error) { + var err error + once.Do(func() { + contents, err := ioutil.ReadFile(txFile) + if err != nil { + return + } + lines := strings.Split(string(contents), string('\n')) + var currBlock *block + for _, line := range lines { + if strings.HasPrefix(line, "Block") { + currBlock = makeBlock() + blocksFromFile = append(blocksFromFile, currBlock) + } else { + // Trim out the 'Transacion XX:' part + //currBlock.addTxAsBase64String(strings.Split(line, ": ")[1]) + currBlock.addTxAsBase64String(line) + } + } + }) + + return blocksFromFile, err +} + +func TestVerifyScript_InvalidTranscation(t *testing.T) { + arg1 := []byte("arg1") + arg2 := int64(4) + arg3 := []byte("arg2") + arg4 := int64(4) + arg5 := uint(100) + arg6 := uint(1) + //func Verify_script(arg1 *byte, arg2 int64, arg3 *byte, arg4 int64, arg5 uint, arg6 uint) (_swig_ret LibbitcoinConsensusVerify_result_type) + result := consensus.Verify_script(&arg1[0], arg2, &arg3[0], arg4, arg5, arg6) + t.Log(result) + t.Log(consensus.Verify_result_tx_invalid) + if result != consensus.Verify_result_tx_invalid { + t.Fatalf("Should have failed to verify transaction") + } +} + +func TestParse_GetBlocksFromFile(t *testing.T) { + blocks, err := getBlocks() + if err != nil { + t.Fatalf("Error getting blocks from tx file: %s", err) + } + for index, b := range blocks { + t.Logf("block %d has len transactions = %d", index, len(b.transactions)) + } + t.Logf("Number of blocks = %d from file %s", len(blocks), txFile) +} + +//TestBlocks_GetTransactionsAsUTXOBytes will range over blocks and then transactions in UTXO bytes form. +func TestBlocks_GetTransactionsAsUTXOBytes(t *testing.T) { + blocks, err := getBlocks() + if err != nil { + t.Fatalf("Error getting blocks from tx file: %s", err) + } + // Loop through the blocks and then range over their transactions in UTXO bytes form. + for index, b := range blocks { + t.Logf("block %d has len transactions = %d", index, len(b.transactions)) + for txAsUTXOBytes := range b.getTransactionsAsUTXOBytes() { + //t.Logf("Tx as bytes = %v", txAsUTXOBytes) + _ = len(txAsUTXOBytes) + } + } +} + +func TestParse_UTXOTransactionBytes(t *testing.T) { + blocks, err := getBlocks() + if err != nil { + t.Fatalf("Error getting blocks from tx file: %s", err) + } + utxo := MakeUTXO(MakeInMemoryStore()) + // Loop through the blocks and then range over their transactions in UTXO bytes form. + for index, b := range blocks { + t.Logf("block %d has len transactions = %d", index, len(b.transactions)) + for txAsUTXOBytes := range b.getTransactionsAsUTXOBytes() { + + newTX := ParseUTXOBytes(txAsUTXOBytes) + t.Logf("Block = %d, txInputCount = %d, outputCount=%d", index, len(newTX.Txin), len(newTX.Txout)) + + // Now store the HEX of txHASH + execResult, err := utxo.Execute(txAsUTXOBytes) + if err != nil { + t.Fatalf("Error executing TX: %s", err) + } + if execResult.IsCoinbase == false { + if execResult.SumCurrentOutputs > execResult.SumPriorOutputs { + t.Fatalf("sumOfCurrentOutputs > sumOfPriorOutputs: sumOfCurrentOutputs = %d, sumOfPriorOutputs = %d", execResult.SumCurrentOutputs, execResult.SumPriorOutputs) + } + } + + txHash := utxo.GetTransactionHash(txAsUTXOBytes) + retrievedTx := utxo.Query(hex.EncodeToString(txHash)) + if !proto.Equal(newTX, retrievedTx) { + t.Fatal("Expected TX to be equal. ") + } + } + } + +} + +func TestParse_LibbitconTX(t *testing.T) { + txData, err := hex.DecodeString(consensusScriptVerifyTx) + if err != nil { + t.Fatalf("Error decoding HEX tx from libbitcoin: %s", err) + return + } + + prevTxScript, err := hex.DecodeString(consensusScriptVerifyPreviousOutputScript) + if err != nil { + t.Fatalf("Error decoding HEX tx from libbitcoin: %s", err) + return + } + + t.Logf("TX data from libbitcoin: %v", txData) + + tx := ParseUTXOBytes(txData) + + // Call Verify_script + txInputIndex := uint(0) + result := consensus.Verify_script(&txData[0], int64(len(txData)), &prevTxScript[0], int64(len(prevTxScript)), txInputIndex, uint(consensus.Verify_flags_p2sh)) + if result != consensus.Verify_result_eval_true { + t.Fatalf("Unexpected result from verify_script, expected %d, got %d", consensus.Verify_result_eval_true, result) + } + t.Log(result) + t.Log(consensus.Verify_result_eval_true) + t.Logf("TX from %v", tx) +} diff --git a/hyperledger_fabric/v1.4.8/explorer-artifacts/config.json b/hyperledger_fabric/v1.4.8/explorer-artifacts/config.json new file mode 100644 index 00000000..1fe07a38 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/explorer-artifacts/config.json @@ -0,0 +1,57 @@ +{ + "network-config": { + "org1": { + "name": "peerOrg1", + "mspid": "Org1MSP", + "peer1": { + "requests": "grpcs://peer0.org1.example.com:7051", + "events": "grpcs://peer0.org1.example.com:7053", + "server-hostname": "peer0.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt" + }, + "peer2": { + "requests": "grpcs://peer1.org1.example.com:7051", + "events": "grpcs://peer1.org1.example.com:7053", + "server-hostname": "peer1.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts" + } + }, + "org2": { + "name": "peerOrg2", + "mspid": "Org2MSP", + "peer1": { + "requests": "grpcs://peer0.org2.example.com:7051", + "events": "grpcs://peer0.org2.example.com:7053", + "server-hostname": "peer0.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt" + }, + "peer2": { + "requests": "grpcs://peer1.org2.example.com:7051", + "events": "grpcs://peer1.org2.example.com:7053", + "server-hostname": "peer1.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts" + } + } + }, + "host":"explorer", + "port":"8080", + "channel": "businesschannel", + "GOPATH":"/opt/gopath", + "keyValueStore":"/tmp/fabric-client-kvs", + "eventWaitTime":"30000", + "mysql":{ + "host":"mysql", + "port":"3306", + "database":"fabricexplorer", + "username":"root", + "passwd":"root" + } +} diff --git a/hyperledger_fabric/v1.4.8/explorer-artifacts/fabricexplorer.sql b/hyperledger_fabric/v1.4.8/explorer-artifacts/fabricexplorer.sql new file mode 100644 index 00000000..557abb4c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/explorer-artifacts/fabricexplorer.sql @@ -0,0 +1,115 @@ +/* + Navicat MySQL Data Transfer + + Source Server : 172.16.10.162 + Source Server Type : MySQL + Source Server Version : 50635 + Source Host : 172.16.10.162 + Source Database : fabricexplorer + + Target Server Type : MySQL + Target Server Version : 50635 + File Encoding : utf-8 + + Date: 07/07/2017 10:14:31 AM +*/ + +DROP DATABASE IF EXISTS `fabricexplorer`; + +CREATE DATABASE fabricexplorer; + +use fabricexplorer; +SET NAMES utf8; +SET FOREIGN_KEY_CHECKS = 0; + +-- ---------------------------- +-- Table structure for `blocks` +-- ---------------------------- +DROP TABLE IF EXISTS `blocks`; +CREATE TABLE `blocks` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `blocknum` int(11) DEFAULT NULL, + `datahash` varchar(256) DEFAULT NULL, + `prehash` varchar(256) DEFAULT NULL, + `channelname` varchar(128) DEFAULT NULL, + `txcount` int(11) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=6 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='blocks'; + +-- ---------------------------- +-- Table structure for `chaincodes` +-- ---------------------------- +DROP TABLE IF EXISTS `chaincodes`; +CREATE TABLE `chaincodes` ( + `id` int(11) NOT NULL AUTO_INCREMENT, + `name` varchar(255) DEFAULT NULL, + `version` varchar(255) DEFAULT NULL, + `path` varchar(255) DEFAULT NULL, + `channelname` varchar(255) DEFAULT NULL, + `txcount` int(11) DEFAULT '0', + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=10 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT; + +-- ---------------------------- +-- Table structure for `channel` +-- ---------------------------- +DROP TABLE IF EXISTS `channel`; +CREATE TABLE `channel` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `name` varchar(64) DEFAULT NULL, + `blocks` int(11) DEFAULT NULL, + `trans` int(11) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=3 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='channel'; + +-- ---------------------------- +-- Table structure for `peer` +-- ---------------------------- +DROP TABLE IF EXISTS `peer`; +CREATE TABLE `peer` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `org` int(11) DEFAULT NULL, + `name` varchar(64) DEFAULT NULL, + `mspid` varchar(64) DEFAULT NULL, + `requests` varchar(64) DEFAULT NULL, + `events` varchar(64) DEFAULT NULL, + `server_hostname` varchar(64) DEFAULT NULL, + `createdt` datetime DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='peer'; + +-- ---------------------------- +-- Table structure for `peer_ref_channel` +-- ---------------------------- +DROP TABLE IF EXISTS `peer_ref_channel`; +CREATE TABLE `peer_ref_channel` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `peerid` int(11) DEFAULT NULL, + `channelid` int(11) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT=''; + +-- ---------------------------- +-- Table structure for `transaction` +-- ---------------------------- +DROP TABLE IF EXISTS `transaction`; +CREATE TABLE `transaction` ( + `id` int(11) NOT NULL AUTO_INCREMENT COMMENT 'id', + `channelname` varchar(64) DEFAULT NULL, + `blockid` int(11) DEFAULT NULL, + `txhash` varchar(256) DEFAULT NULL, + `createdt` datetime DEFAULT NULL, + `chaincodename` varchar(255) DEFAULT NULL, + PRIMARY KEY (`id`) +) ENGINE=InnoDB AUTO_INCREMENT=6 DEFAULT CHARSET=utf8 ROW_FORMAT=COMPACT COMMENT='transtaion'; + +-- ---------------------------- +-- Table structure for `write_lock` +-- ---------------------------- +DROP TABLE IF EXISTS `write_lock`; +CREATE TABLE `write_lock` ( + `write_lock` int(1) NOT NULL AUTO_INCREMENT, + PRIMARY KEY (`write_lock`) +) ENGINE=InnoDB AUTO_INCREMENT=2 DEFAULT CHARSET=utf8 COLLATE=utf8_bin; + +SET FOREIGN_KEY_CHECKS = 1; diff --git a/hyperledger_fabric/v1.4.8/kafka/README.md b/hyperledger_fabric/v1.4.8/kafka/README.md new file mode 100644 index 00000000..1222cf5a --- /dev/null +++ b/hyperledger_fabric/v1.4.8/kafka/README.md @@ -0,0 +1,8 @@ +## Start a network base on kafka + +### Quick testing + +```bash +$ HLF_MODE=kafka make +``` +When the fabric-network fully started, it takes about 30~60s to finish all the test. diff --git a/hyperledger_fabric/v1.4.8/kafka/configtx.yaml b/hyperledger_fabric/v1.4.8/kafka/configtx.yaml new file mode 100644 index 00000000..87870f6a --- /dev/null +++ b/hyperledger_fabric/v1.4.8/kafka/configtx.yaml @@ -0,0 +1,764 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# ORGANIZATIONS +# +# This section defines the organizational identities that can be referenced +# in the configuration profiles. +# +################################################################################ +Organizations: + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &SampleOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: SampleOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: SampleOrg + + # MSPDir is the filesystem path which contains the MSP configuration. + MSPDir: msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &SampleOrgPolicies + Readers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.client')" + Admins: + Type: Signature + Rule: "OR('SampleOrg.admin')" + Endorsement: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: 127.0.0.1 + Port: 7051 + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &OrdererOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: OrdererOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: OrdererMSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/ordererOrganizations/example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: + Readers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + Admins: + Type: Signature + Rule: "OR('OrdererMSP.admin')" + + - &Org1 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org1MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org1MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org1.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org1Policies + Readers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.peer', 'Org1MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org1MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org1MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org1.example.com + Port: 7051 + + - &Org2 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org2MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org2MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org2.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org2Policies + Readers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org2MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org2MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org2.example.com + Port: 7051 + +################################################################################ +# +# CAPABILITIES +# +# This section defines the capabilities of fabric network. This is a new +# concept as of v1.1.0 and should not be utilized in mixed networks with +# v1.0.x peers and orderers. Capabilities define features which must be +# present in a fabric binary for that binary to safely participate in the +# fabric network. For instance, if a new MSP type is added, newer binaries +# might recognize and validate the signatures from this type, while older +# binaries without this support would be unable to validate those +# transactions. This could lead to different versions of the fabric binaries +# having different world states. Instead, defining a capability for a channel +# informs those binaries without this capability that they must cease +# processing transactions until they have been upgraded. For v1.0.x if any +# capabilities are defined (including a map with all capabilities turned off) +# then the v1.0.x peer will deliberately crash. +# +################################################################################ +Capabilities: + # Channel capabilities apply to both the orderers and the peers and must be + # supported by both. + # Set the value of the capability to true to require it. + Channel: &ChannelCapabilities + # V1.3 for Channel is a catchall flag for behavior which has been + # determined to be desired for all orderers and peers running at the v1.3.x + # level, but which would be incompatible with orderers and peers from + # prior releases. + # Prior to enabling V1.3 channel capabilities, ensure that all + # orderers and peers on a channel are at v1.3.0 or later. + V2_0: true + V1_3: false + + # Orderer capabilities apply only to the orderers, and may be safely + # used with prior release peers. + # Set the value of the capability to true to require it. + Orderer: &OrdererCapabilities + # V1.1 for Orderer is a catchall flag for behavior which has been + # determined to be desired for all orderers running at the v1.1.x + # level, but which would be incompatible with orderers from prior releases. + # Prior to enabling V1.1 orderer capabilities, ensure that all + # orderers on a channel are at v1.1.0 or later. + V2_0: true + V1_1: false + + # Application capabilities apply only to the peer network, and may be safely + # used with prior release orderers. + # Set the value of the capability to true to require it. + Application: &ApplicationCapabilities + # V1.3 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.3. + V2_0: true + V1_3: false + # V1.2 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.2 (note, this need not be set if + # later version capabilities are set) + V1_2: false + # V1.1 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.1 (note, this need not be set if + # later version capabilities are set). + V1_1: false + +################################################################################ +# +# APPLICATION +# +# This section defines the values to encode into a config transaction or +# genesis block for application-related parameters. +# +################################################################################ +Application: &ApplicationDefaults + ACLs: &ACLsDefault + # This section provides defaults for policies for various resources + # in the system. These "resources" could be functions on system chaincodes + # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources + # (e.g.,who can receive Block events). This section does NOT specify the resource's + # definition or API, but just the ACL policy for it. + # + # User's can override these defaults with their own policy mapping by defining the + # mapping under ACLs in their channel definition + + #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# + + # ACL policy for lscc's "getid" function + lscc/ChaincodeExists: /Channel/Application/Readers + + # ACL policy for lscc's "getdepspec" function + lscc/GetDeploymentSpec: /Channel/Application/Readers + + # ACL policy for lscc's "getccdata" function + lscc/GetChaincodeData: /Channel/Application/Readers + + # ACL Policy for lscc's "getchaincodes" function + lscc/GetInstantiatedChaincodes: /Channel/Application/Readers + + #---Query System Chaincode (qscc) function to policy mapping for access control---# + + # ACL policy for qscc's "GetChainInfo" function + qscc/GetChainInfo: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByNumber" function + qscc/GetBlockByNumber: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByHash" function + qscc/GetBlockByHash: /Channel/Application/Readers + + # ACL policy for qscc's "GetTransactionByID" function + qscc/GetTransactionByID: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByTxID" function + qscc/GetBlockByTxID: /Channel/Application/Readers + + #---Configuration System Chaincode (cscc) function to policy mapping for access control---# + + # ACL policy for cscc's "GetConfigBlock" function + cscc/GetConfigBlock: /Channel/Application/Readers + + # ACL policy for cscc's "GetConfigTree" function + cscc/GetConfigTree: /Channel/Application/Readers + + # ACL policy for cscc's "SimulateConfigTreeUpdate" function + cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers + + #---Miscellanesous peer function to policy mapping for access control---# + + # ACL policy for invoking chaincodes on peer + peer/Propose: /Channel/Application/Writers + + # ACL policy for chaincode to chaincode invocation + peer/ChaincodeToChaincode: /Channel/Application/Readers + + #---Events resource to policy mapping for access control###---# + + # ACL policy for sending block events + event/Block: /Channel/Application/Readers + + # ACL policy for sending filtered block events + event/FilteredBlock: /Channel/Application/Readers + + # Organizations lists the orgs participating on the application side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Application policies, their canonical path is + # /Channel/Application/ + Policies: &ApplicationDefaultPolicies + LifecycleEndorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Endorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + # Capabilities describes the application level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ApplicationCapabilities + +################################################################################ +# +# ORDERER +# +# This section defines the values to encode into a config transaction or +# genesis block for orderer related parameters. +# +################################################################################ +Orderer: &OrdererDefaults + + # Orderer Type: The orderer implementation to start. + # Available types are "solo" and "kafka". + OrdererType: kafka + + # Addresses here is a nonexhaustive list of orderers the peers and clients can + # connect to. Adding/removing nodes from this list has no impact on their + # participation in ordering. + # NOTE: In the solo case, this should be a one-item list. + Addresses: + - orderer0.example.com:7050 + - orderer1.example.com:7050 + + # Batch Timeout: The amount of time to wait before creating a batch. + BatchTimeout: 2s + + # Batch Size: Controls the number of messages batched into a block. + # The orderer views messages opaquely, but typically, messages may + # be considered to be Fabric transactions. The 'batch' is the group + # of messages in the 'data' field of the block. Blocks will be a few kb + # larger than the batch size, when signatures, hashes, and other metadata + # is applied. + BatchSize: + + # Max Message Count: The maximum number of messages to permit in a + # batch. No block will contain more than this number of messages. + MaxMessageCount: 10 + + # Absolute Max Bytes: The absolute maximum number of bytes allowed for + # the serialized messages in a batch. The maximum block size is this value + # plus the size of the associated metadata (usually a few KB depending + # upon the size of the signing identities). Any transaction larger than + # this value will be rejected by ordering. If the "kafka" OrdererType is + # selected, set 'message.max.bytes' and 'replica.fetch.max.bytes' on + # the Kafka brokers to a value that is larger than this one. + AbsoluteMaxBytes: 10 MB + + # Preferred Max Bytes: The preferred maximum number of bytes allowed + # for the serialized messages in a batch. Roughly, this field may be considered + # the best effort maximum size of a batch. A batch will fill with messages + # until this size is reached (or the max message count, or batch timeout is + # exceeded). If adding a new message to the batch would cause the batch to + # exceed the preferred max bytes, then the current batch is closed and written + # to a block, and a new batch containing the new message is created. If a + # message larger than the preferred max bytes is received, then its batch + # will contain only that message. Because messages may be larger than + # preferred max bytes (up to AbsoluteMaxBytes), some batches may exceed + # the preferred max bytes, but will always contain exactly one transaction. + PreferredMaxBytes: 512 KB + + # Max Channels is the maximum number of channels to allow on the ordering + # network. When set to 0, this implies no maximum number of channels. + MaxChannels: 0 + + Kafka: + # Brokers: A list of Kafka brokers to which the orderer connects. Edit + # this list to identify the brokers of the ordering service. + # NOTE: Use IP:port notation. + Brokers: + - kafka0:9092 + - kafka1:9092 + - kafka2:9092 + - kafka3:9092 + # EtcdRaft defines configuration which must be set when the "etcdraft" + # orderertype is chosen. + + EtcdRaft: + # The set of Raft replicas for this network. For the etcd/raft-based + # implementation, we expect every replica to also be an OSN. Therefore, + # a subset of the host:port items enumerated in this list should be + # replicated under the Orderer.Addresses key above. + Consenters: + - Host: orderer0.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + - Host: orderer1.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + - Host: orderer2.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + + # Options to be specified for all the etcd/raft nodes. The values here + # are the defaults for all new channels and can be modified on a + # per-channel basis via configuration updates. + Options: + # TickInterval is the time interval between two Node.Tick invocations. + TickInterval: 500ms + + # ElectionTick is the number of Node.Tick invocations that must pass + # between elections. That is, if a follower does not receive any + # message from the leader of current term before ElectionTick has + # elapsed, it will become candidate and start an election. + # ElectionTick must be greater than HeartbeatTick. + ElectionTick: 10 + + # HeartbeatTick is the number of Node.Tick invocations that must + # pass between heartbeats. That is, a leader sends heartbeat + # messages to maintain its leadership every HeartbeatTick ticks. + HeartbeatTick: 1 + + # MaxInflightBlocks limits the max number of in-flight append messages + # during optimistic replication phase. + MaxInflightBlocks: 5 + + # SnapshotIntervalSize defines number of bytes per which a snapshot is taken + SnapshotIntervalSize: 20 MB + + # Organizations lists the orgs participating on the orderer side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Orderer policies, their canonical path is + # /Channel/Orderer/ + Policies: + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + # BlockValidation specifies what signatures must be included in the block + # from the orderer for the peer to validate it. + BlockValidation: + Type: ImplicitMeta + Rule: "ANY Writers" + + # Capabilities describes the orderer level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *OrdererCapabilities + +################################################################################ +# +# CHANNEL +# +# This section defines the values to encode into a config transaction or +# genesis block for channel related parameters. +# +################################################################################ +Channel: &ChannelDefaults + # Policies defines the set of policies at this level of the config tree + # For Channel policies, their canonical path is + # /Channel/ + Policies: + # Who may invoke the 'Deliver' API + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + # Who may invoke the 'Broadcast' API + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + # By default, who may modify elements at this config level + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + + # Capabilities describes the channel level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ChannelCapabilities + +################################################################################ +# +# PROFILES +# +# Different configuration profiles may be encoded here to be specified as +# parameters to the configtxgen tool. The profiles which specify consortiums +# are to be used for generating the orderer genesis block. With the correct +# consortium members defined in the orderer genesis block, channel creation +# requests may be generated with only the org member names and a consortium +# name. +# +################################################################################ +Profiles: + + # SampleSingleMSPSolo defines a configuration which uses the Solo orderer, + # and contains a single MSP definition (the MSP sampleconfig). + # The Consortium SampleConsortium has only a single member, SampleOrg. + SampleSingleMSPSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleSingleMSPKafka defines a configuration that differs from the + # SampleSingleMSPSolo one only in that it uses the Kafka-based orderer. + SampleSingleMSPKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleInsecureSolo defines a configuration which uses the Solo orderer, + # contains no MSP definitions, and allows all transactions and channel + # creation requests for the consortium SampleConsortium. + SampleInsecureSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleInsecureKafka defines a configuration that differs from the + # SampleInsecureSolo one only in that it uses the Kafka-based orderer. + SampleInsecureKafka: + <<: *ChannelDefaults + Orderer: + OrdererType: kafka + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleDevModeSolo defines a configuration which uses the Solo orderer, + # contains the sample MSP as both orderer and consortium member, and + # requires only basic membership for admin privileges. It also defines + # an Application on the ordering system channel, which should usually + # be avoided. + SampleDevModeSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleDevModeKafka defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the Kafka-based orderer. + SampleDevModeKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleSingleMSPChannel defines a channel with only the sample org as a + # member. It is designed to be used in conjunction with SampleSingleMSPSolo + # and SampleSingleMSPKafka orderer profiles. Note, for channel creation + # profiles, only the 'Application' section and consortium # name are + # considered. + SampleSingleMSPChannel: + <<: *ChannelDefaults + Consortium: SampleConsortium + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + + # SampleDevModeEtcdRaft defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the etcd/raft-based orderer. + SampleDevModeEtcdRaft: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: etcdraft + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + TwoOrgsOrdererGenesis: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *OrdererOrg + Capabilities: + <<: *OrdererCapabilities + Consortiums: + SampleConsortium: + Organizations: + - *Org1 + - *Org2 + TwoOrgsChannel: + Consortium: SampleConsortium + <<: *ChannelDefaults + Application: + <<: *ApplicationDefaults + Organizations: + - *Org1 + - *Org2 + Capabilities: + <<: *ApplicationCapabilities diff --git a/hyperledger_fabric/v1.4.8/network_config.json b/hyperledger_fabric/v1.4.8/network_config.json new file mode 100644 index 00000000..96769bb4 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/network_config.json @@ -0,0 +1,65 @@ +{ + "ordererOrg": { + "name": "OrdererOrg", + "mspid": "Org1MSP", + "type": "ordererOrg", + "peer0": { + "requests": "grpcs://peer0.org1.example.com:7051", + "events": "grpcs://peer0.org1.example.com:7053", + "server-hostname": "peer0.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt" + }, + "peer1": { + "requests": "grpcs://peer1.org1.example.com:7051", + "events": "grpcs://peer1.org1.example.com:7053", + "server-hostname": "peer1.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts" + } + }, + "org1": { + "name": "peerOrg1", + "mspid": "Org1MSP", + "type": "ordererOrg", + "peer0": { + "requests": "grpcs://peer0.org1.example.com:7051", + "events": "grpcs://peer0.org1.example.com:7053", + "server-hostname": "peer0.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt" + }, + "peer1": { + "requests": "grpcs://peer1.org1.example.com:7051", + "events": "grpcs://peer1.org1.example.com:7053", + "server-hostname": "peer1.org1.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp/signcerts" + } + }, + "org2": { + "name": "peerOrg2", + "mspid": "Org2MSP", + "type": "peerOrg", + "peer0": { + "requests": "grpcs://peer0.org2.example.com:7051", + "events": "grpcs://peer0.org2.example.com:7053", + "server-hostname": "peer0.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt" + }, + "peer1": { + "requests": "grpcs://peer1.org2.example.com:7051", + "events": "grpcs://peer1.org2.example.com:7053", + "server-hostname": "peer1.org2.example.com", + "tls_cacerts": "/first-network/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt" + }, + "admin": { + "key": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/keystore", + "cert": "/first-network/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp/signcerts" + } + } +} \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.8/orderer.yaml b/hyperledger_fabric/v1.4.8/orderer.yaml new file mode 100644 index 00000000..5d65476c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/orderer.yaml @@ -0,0 +1,36 @@ +# All elements in this file should depend on the base.yaml +# Provided fabric orderer node in solo and kafka modes + +version: '2' # v3 does not support 'extends' yet + +services: + orderer-solo: # orderer in solo mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer.example.com + hostname: orderer.example.com + expose: + - "7050" + volumes: + - ./solo/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./solo/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls/:/var/hyperledger/orderer/tls + + orderer-kafka: # orderer in kafka mode + extends: + file: base.yaml + service: orderer-base + container_name: orderer.example.com + hostname: orderer.example.com + expose: + - "7050" + environment: + # Kafka related configurations + - ORDERER_KAFKA_RETRY_SHORTINTERVAL=1s + - ORDERER_KAFKA_RETRY_SHORTTOTAL=30s + - ORDERER_KAFKA_VERBOSE=true + volumes: + - ./kafka/channel-artifacts/orderer.genesis.block:/var/hyperledger/orderer/orderer.genesis.block + - ./kafka/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/msp:/var/hyperledger/orderer/msp + - ./kafka/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tls/:/var/hyperledger/orderer/tls diff --git a/hyperledger_fabric/v1.4.8/org3/configtx.yaml b/hyperledger_fabric/v1.4.8/org3/configtx.yaml new file mode 100644 index 00000000..fd92173e --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/configtx.yaml @@ -0,0 +1,54 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# Section: Organizations +# +# - This section defines the different organizational identities which will +# be referenced later in the configuration. +# +################################################################################ +Organizations: + - &Org3 + # DefaultOrg defines the organization which is used in the sampleconfig + # of the fabric.git development environment + Name: Org3MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID to load the MSP definition as + ID: Org3MSP + + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org3.example.com/msp + + Policies: + Readers: + Type: Signature + Rule: "OR('Org3MSP.admin', 'Org3MSP.peer', 'Org3MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org3MSP.admin', 'Org3MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org3MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org3MSP.member')" + + AnchorPeers: + # AnchorPeers defines the location of peers which can be used + # for cross org gossip communication. Note, this value is only + # encoded in the genesis block in the Application section context + - Host: peer0.org3.example.com + Port: 7051 diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config.yaml b/hyperledger_fabric/v1.4.8/org3/crypto-config.yaml new file mode 100644 index 00000000..02409282 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config.yaml @@ -0,0 +1,23 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +# --------------------------------------------------------------------------- +# "PeerOrgs" - Definition of organizations managing peer nodes +# --------------------------------------------------------------------------- +PeerOrgs: + # --------------------------------------------------------------------------- + # Org3 + # --------------------------------------------------------------------------- + - Name: Org3 + Domain: org3.example.com + EnableNodeOUs: true + CA: + Country: US + Province: California + Locality: San Francisco + Template: + Count: 2 + Users: + Count: 1 diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/ca/6b5fc322f234db6778434984596b2f38bae3af47824e51705ecd6aa6b4e2d345_sk b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/ca/6b5fc322f234db6778434984596b2f38bae3af47824e51705ecd6aa6b4e2d345_sk new file mode 100644 index 00000000..475f2461 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/ca/6b5fc322f234db6778434984596b2f38bae3af47824e51705ecd6aa6b4e2d345_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgZ6kmxJp0ZEgRfZiZ +3vL7cUTXnxHBGPvzQr5Y0ZUELNehRANCAAR8pL1w0Dlv2Qvhn6/unNhWijsdnM87 +zmYd+sAobhDNKE9bD41AYDiCTwb7AnLICNVZlmnP8+gMa1CZDgCaSf2i +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/ca/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/81d3b30d8ca07a5aa0f54a1cb922a88687cf02e056993fe860743e06af07e1e6_sk b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/81d3b30d8ca07a5aa0f54a1cb922a88687cf02e056993fe860743e06af07e1e6_sk new file mode 100644 index 00000000..d38d371b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/keystore/81d3b30d8ca07a5aa0f54a1cb922a88687cf02e056993fe860743e06af07e1e6_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgQNOTmFbR71Dz/EFw +yBsMZNIKTqvhSZy6YjfVbcT0tAyhRANCAAQNKM2jWjFOSihaRIZk2I51o8He51id +UdYh0ExMOdtHvdfTRwg5AJg7VkTJQDmodMY8iedj3FXDlxACDK+Gmw8b +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem new file mode 100644 index 00000000..1d62087b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/signcerts/peer0.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQVxW0tEMqJsClUdnHjmIurTAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMC5vcmcz +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEDSjNo1oxTkoo +WkSGZNiOdaPB3udYnVHWIdBMTDnbR73X00cIOQCYO1ZEyUA5qHTGPInnY9xVw5cQ +AgyvhpsPG6NNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga1/DIvI022d4Q0mEWWsvOLrjr0eCTlFwXs1qprTi00UwCgYIKoZIzj0E +AwIDSAAwRQIhANy2ytrmVtCxzJumHStEymgmVSrV6wxICjqjtMuBeodvAiBMxA3I +kmS+4fl2DUDy5Ynedi1EFfLFUprMPJ2+iO6vgg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt new file mode 100644 index 00000000..abbb6442 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICZzCCAg2gAwIBAgIQRjQ96YrYiKq//VIfxWI4IzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDExZwZWVyMC5vcmczLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEK71x/g2MV0OhHE8L/Y7fOUdNnsSm +fgpUXLV28l4K6TXSz901v0Ef+34psiHPUGFNPWfQ2dojKFAsqHfJai+94KOBlzCB +lDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC +MAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAggiM01mEhKAN5vQrQ6R+YxvWpPZtu +b648WpBR8eLqiqIwKAYDVR0RBCEwH4IWcGVlcjAub3JnMy5leGFtcGxlLmNvbYIF +cGVlcjAwCgYIKoZIzj0EAwIDSAAwRQIhAMIy5szhbPp+6ajmWY1M1gQlxTV5G+Lo +RLHrKvva3CEzAiBPhHWpgKQe0IGIl1wPT4O7mV15ghvjC5mpi6+qzscKGg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key new file mode 100644 index 00000000..a3d5fc23 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer0.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgs1OoP184IQ3sgFeP +9D19HuUnGz7YpKoXXjiedg9zzFGhRANCAAQrvXH+DYxXQ6EcTwv9jt85R02exKZ+ +ClRctXbyXgrpNdLP3TW/QR/7fimyIc9QYU09Z9DZ2iMoUCyod8lqL73g +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/80c105da6e7098c7f9bc886285191f8101508c6351261547e9c61a8db296edc3_sk b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/80c105da6e7098c7f9bc886285191f8101508c6351261547e9c61a8db296edc3_sk new file mode 100644 index 00000000..91c7dc3e --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/keystore/80c105da6e7098c7f9bc886285191f8101508c6351261547e9c61a8db296edc3_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgY+uANW502vvq6Y/K +eZGnY+87wDnXbWJD6ItGV8hPDR6hRANCAAT1EFG8e7J1gnOrJb6PR9RhdkKudvCz +DIC7a/MBH2ZYuK2XiSmfm77KXnhWbU5fjF7thyFhrTeIFvfNxTE94LI2 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem new file mode 100644 index 00000000..00af6e41 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/signcerts/peer1.org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQaj+S0lJTmPOrotSRR+exSDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcz +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE9RBRvHuydYJz +qyW+j0fUYXZCrnbwswyAu2vzAR9mWLitl4kpn5u+yl54Vm1OX4xe7YchYa03iBb3 +zcUxPeCyNqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAga1/DIvI022d4Q0mEWWsvOLrjr0eCTlFwXs1qprTi00UwCgYIKoZIzj0E +AwIDSAAwRQIhANbK656AQowBlOr4pK8hF+iSe6LbqXxfzTnlE5jLJAroAiBLfMGC +j4fXFvV5YgxspWg1nX8fF6XGu/oPGkHFX+81dg== +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt new file mode 100644 index 00000000..4b62807d --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICaDCCAg6gAwIBAgIRAMo5kQAauTlIkdgMVD8xqUYwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAxMWcGVlcjEub3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABAQhwl+kSqDroCPbYWTHUeO1huet +dkU46BdEqzOCB7AtNnqZbF614Vrr5yS1SyWsOtEmDQInCnDmbzSxD1kPLAKjgZcw +gZQwDgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcD +AjAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIIIjNNZhISgDeb0K0OkfmMb1qT2b +bm+uPFqQUfHi6oqiMCgGA1UdEQQhMB+CFnBlZXIxLm9yZzMuZXhhbXBsZS5jb22C +BXBlZXIxMAoGCCqGSM49BAMCA0gAMEUCIQDP4pTybfCsQGeIX+D3m2OPtYyr8hEs +JJUEjF0avVQzJwIgag3DyYWNRmXxlsQEFyyJrgSXl8n2FfIRTt+nGLXATRM= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key new file mode 100644 index 00000000..6e849742 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/peers/peer1.org3.example.com/tls/server.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLeRIXFMa/9duYkO6 +3XD6KFu/lYumYJ7dfH72RzKdfJ6hRANCAAQEIcJfpEqg66Aj22Fkx1HjtYbnrXZF +OOgXRKszggewLTZ6mWxeteFa6+cktUslrDrRJg0CJwpw5m80sQ9ZDywC +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/822334d66121280379bd0ad0e91f98c6f5a93d9b6e6fae3c5a9051f1e2ea8aa2_sk b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/822334d66121280379bd0ad0e91f98c6f5a93d9b6e6fae3c5a9051f1e2ea8aa2_sk new file mode 100644 index 00000000..0d9d2078 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/822334d66121280379bd0ad0e91f98c6f5a93d9b6e6fae3c5a9051f1e2ea8aa2_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgw+PlBWl2jW5yoRdf +XBuqvBNd0XhkfEc9AZ59syEvV8KhRANCAARD6FpxBsxLsHL7dimnHG1VglEbQiv2 +d3HVQ7FitUJccCZDmFfg/Jo9LYhLicSQnmET9X6zBDOK4+qRTW1MWFPP +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/tlsca/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/b4e610136a76ada0902c618769ca5210581eb8d467d213d4a5ff789883e9692e_sk b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/b4e610136a76ada0902c618769ca5210581eb8d467d213d4a5ff789883e9692e_sk new file mode 100644 index 00000000..3cd6c459 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/keystore/b4e610136a76ada0902c618769ca5210581eb8d467d213d4a5ff789883e9692e_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgahPS7k+5zVcEpjQp +U9KYQ9sClfTQqUxIdubrfMxtc3ChRANCAARU4sXSddFmhQH5cXws0Ai14L2qdcFv +n19aIHxWdWP6NycnIAvl4EefmwcTGzPd/DYK9VWKZxMBFjOBBtSG1jqx +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem new file mode 100644 index 00000000..dbd3fdb0 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/signcerts/Admin@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQChkJXZ77cw2XYcZw7N/ZfDAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +My5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFTixdJ10WaF +AflxfCzQCLXgvap1wW+fX1ogfFZ1Y/o3JycgC+XgR5+bBxMbM938Ngr1VYpnEwEW +M4EG1IbWOrGjTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIGtfwyLyNNtneENJhFlrLzi6469Hgk5RcF7Naqa04tNFMAoGCCqGSM49 +BAMCA0gAMEUCIQC4QfvvZmFTTu3tGnYIYMl1gamWueuf6AW9SKkSclQxjgIgWQDu +29pl8iPDqsl42ykAQygJo25MUjJiLpBJV7RYBt8= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt new file mode 100644 index 00000000..4dfcf853 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICOzCCAeGgAwIBAgIQKa5eObvsHxvupA2rahA3RDAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMFsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMR8wHQYDVQQDDBZBZG1pbkBvcmczLmV4YW1wbGUuY29t +MFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE5q3We3H2vVxe2291bquQfuMAcOBa +wWZjuVutHC9P50CLCdiud28dL+Bl9lX4+TxUAkVWtEx5+2K66+A9/YVMN6NsMGow +DgYDVR0PAQH/BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAM +BgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIIIjNNZhISgDeb0K0OkfmMb1qT2bbm+u +PFqQUfHi6oqiMAoGCCqGSM49BAMCA0gAMEUCIQCgBPbErcsPfvWS656tesHBcvL8 +2+uPQ6KIAPQ8xgMurAIgegRhEztZz346n80Of44KuE9eJHCxgHSko8BB4PTYDQI= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key new file mode 100644 index 00000000..8bfc64af --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/Admin@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgkW6Iy52FIAxDhuVU +zRLLrd3pru3ULE0jmc9mSIly6SWhRANCAATmrdZ7cfa9XF7bb3Vuq5B+4wBw4FrB +ZmO5W60cL0/nQIsJ2K53bx0v4GX2Vfj5PFQCRVa0THn7Yrrr4D39hUw3 +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem new file mode 100644 index 00000000..1e539715 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/cacerts/ca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml new file mode 100644 index 00000000..c3272f9c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/config.yaml @@ -0,0 +1,14 @@ +NodeOUs: + Enable: true + ClientOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: client + PeerOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: peer + AdminOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: admin + OrdererOUIdentifier: + Certificate: cacerts/ca.org3.example.com-cert.pem + OrganizationalUnitIdentifier: orderer diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/b67ff379e2c3611ef20f8f8a0182572dfbe7cfcf66fd673f1f18e3ab3e900695_sk b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/b67ff379e2c3611ef20f8f8a0182572dfbe7cfcf66fd673f1f18e3ab3e900695_sk new file mode 100644 index 00000000..f755e5cd --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/keystore/b67ff379e2c3611ef20f8f8a0182572dfbe7cfcf66fd673f1f18e3ab3e900695_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLVaOOXh5IqTIxkCm +IiGOENZlC32XHQqwFyyILNFZBqmhRANCAATMnNMCRrNVbWNS56rA5T9FfDlAAeep +xbDQNHQGtqCE67gwnqlTzUZ02g85xzt4HxBzdb8oN8KUnoO5E3BmVyIe +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem new file mode 100644 index 00000000..a2c2d846 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/signcerts/User1@org3.example.com-cert.pem @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICKjCCAdGgAwIBAgIRALJ8p65zSztDjce0vxKEVp8wCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzMuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBsMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEPMA0GA1UECxMGY2xpZW50MR8wHQYDVQQDDBZVc2VyMUBv +cmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEzJzTAkaz +VW1jUueqwOU/RXw5QAHnqcWw0DR0BraghOu4MJ6pU81GdNoPOcc7eB8Qc3W/KDfC +lJ6DuRNwZlciHqNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYD +VR0jBCQwIoAga1/DIvI022d4Q0mEWWsvOLrjr0eCTlFwXs1qprTi00UwCgYIKoZI +zj0EAwIDRwAwRAIgRYa/+oW0gyH4HpFXt2/TdKIL6kMx+koYkGvv9A+5Bn8CIH/X +ey0ZDFaRc33uctv2In4dD9HqvsKI0AKdpfZiRA7l +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/msp/tlscacerts/tlsca.org3.example.com-cert.pem @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt new file mode 100644 index 00000000..5ca08a33 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/ca.crt @@ -0,0 +1,15 @@ +-----BEGIN CERTIFICATE----- +MIICVjCCAf2gAwIBAgIQfPD3K8VlmHtkMWMPvUfgGzAKBggqhkjOPQQDAjB2MQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEfMB0GA1UEAxMWdGxz +Y2Eub3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0 +MDBaMHYxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH +Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMR8wHQYD +VQQDExZ0bHNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0D +AQcDQgAEQ+hacQbMS7By+3YppxxtVYJRG0Ir9ndx1UOxYrVCXHAmQ5hX4PyaPS2I +S4nEkJ5hE/V+swQziuPqkU1tTFhTz6NtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1Ud +JQQWMBQGCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1Ud +DgQiBCCCIzTWYSEoA3m9CtDpH5jG9ak9m25vrjxakFHx4uqKojAKBggqhkjOPQQD +AgNHADBEAiAL3ChV6fVono7mlc+5wxiInuWRue94i9NXp3oyRNYtOQIgMgJtYvwe +TLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q= +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt new file mode 100644 index 00000000..4dc7c89e --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.crt @@ -0,0 +1,14 @@ +-----BEGIN CERTIFICATE----- +MIICPDCCAeKgAwIBAgIRAMviHBBgGLER1MPyrbPcZtQwCgYIKoZIzj0EAwIwdjEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzMuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs +c2NhLm9yZzMuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy +NDAwWjBbMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE +BxMNU2FuIEZyYW5jaXNjbzEfMB0GA1UEAwwWVXNlcjFAb3JnMy5leGFtcGxlLmNv +bTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLdIYyUvUqO3F2tl5jjOrv0J7IbF +nMtcQuZYKVu9/OpfM0R5WbD3pMuremuj59I8o692CtGvYDL7Klt0F0apNgujbDBq +MA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIw +DAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCCCIzTWYSEoA3m9CtDpH5jG9ak9m25v +rjxakFHx4uqKojAKBggqhkjOPQQDAgNIADBFAiEAsOK+kRpL7Jbw9aDTgDPlsmLu +Elt0xGn9Aj26W0XgbeECIGG654v86gvmny3ttNnpAcSLZt+YfBY6kH0GjNPZAaLM +-----END CERTIFICATE----- diff --git a/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key new file mode 100644 index 00000000..6299df14 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/org3/crypto-config/peerOrganizations/org3.example.com/users/User1@org3.example.com/tls/client.key @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgwgmBcva6NSpRyxLm +pBGUdkxZ+2NeYpJ6Xm+FCBblDvihRANCAAS3SGMlL1KjtxdrZeY4zq79CeyGxZzL +XELmWClbvfzqXzNEeVmw96TLq3pro+fSPKOvdgrRr2Ay+ypbdBdGqTYL +-----END PRIVATE KEY----- diff --git a/hyperledger_fabric/v1.4.8/peer.yaml b/hyperledger_fabric/v1.4.8/peer.yaml new file mode 100644 index 00000000..5c6c3dbe --- /dev/null +++ b/hyperledger_fabric/v1.4.8/peer.yaml @@ -0,0 +1,37 @@ +# All elements in this file should depend on the base.yaml +# Provided fabric peer node + +version: '2.0' + +services: + peer-solo: # example peer node in solo mode + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com # will generated automatically + hostname: peer0.org1.example.com # will generated automatically + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # grpc + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 # chaincode + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 # gossip + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls + + peer-kafka: # example peer node in kafka mode + extends: + file: base.yaml + service: peer-base + container_name: peer0.org1.example.com + hostname: peer0.org1.example.com + environment: + - CORE_PEER_ID=peer0.org1.example.com + - CORE_PEER_ADDRESS=peer0.org1.example.com:7051 + - CORE_PEER_CHAINCODELISTENADDRESS=peer0.org1.example.com:7052 + - CORE_PEER_GOSSIP_EXTERNALENDPOINT=peer0.org1.example.com:7051 + - CORE_PEER_LOCALMSPID=Org1MSP + volumes: + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/msp:/etc/hyperledger/fabric/msp + - ./crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls:/etc/hyperledger/fabric/tls diff --git a/hyperledger_fabric/v1.4.8/prometheus.yml b/hyperledger_fabric/v1.4.8/prometheus.yml new file mode 100644 index 00000000..2efaca40 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/prometheus.yml @@ -0,0 +1,45 @@ +# my global config +global: + scrape_interval: 15s # Set the scrape interval to every 15 seconds. Default is every 1 minute. + evaluation_interval: 15s # Evaluate rules every 15 seconds. The default is every 1 minute. + # scrape_timeout is set to the global default (10s). + +# Alertmanager configuration +alerting: + alertmanagers: + - static_configs: + - targets: + # - alertmanager:9093 + +# Load rules once and periodically evaluate them according to the global 'evaluation_interval'. +rule_files: + # - "first_rules.yml" + # - "second_rules.yml" + +# A scrape configuration containing exactly one endpoint to scrape: +# Here it's Prometheus itself. +scrape_configs: + # The job name is added as a label `job=` to any timeseries scraped from this config. + #- job_name: 'prometheus' + + # metrics_path defaults to '/metrics' + # scheme defaults to 'http'. + + #static_configs: + #- targets: ['localhost:9090'] + + - job_name: 'orderer0' + static_configs: + - targets: ['orderer0.example.com:8443'] + - job_name: 'peer0_org1' + static_configs: + - targets: ['peer0.org1.example.com:9443'] + - job_name: 'peer1_org1' + static_configs: + - targets: ['peer1.org1.example.com:9443'] + - job_name: 'peer0_org2' + static_configs: + - targets: ['peer0.org2.example.com:9443'] + - job_name: 'peer1_org2' + static_configs: + - targets: ['peer1.org2.example.com:9443'] diff --git a/hyperledger_fabric/v1.4.8/raft/README.md b/hyperledger_fabric/v1.4.8/raft/README.md new file mode 100644 index 00000000..ff229433 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/README.md @@ -0,0 +1,8 @@ +## Start a network base on raft + +### Quick testing + +```bash +$ HLF_MODE=raft make +``` +When the fabric-network fully started, it takes about 30~60s to finish all the test. diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/Org1MSP.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/Org1MSP.json new file mode 100644 index 00000000..99e540df --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/Org1MSP.json @@ -0,0 +1,170 @@ +{ + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/Org1MSPanchors.tx b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/Org1MSPanchors.tx new file mode 100644 index 00000000..599d1898 Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/Org1MSPanchors.tx differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/Org2MSP.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/Org2MSP.json new file mode 100644 index 00000000..03df0409 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/Org2MSP.json @@ -0,0 +1,170 @@ +{ + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQUpSYlBoRWM5ejFDcE1CbnNwRlQ3MFV3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpJdVpYaGhiWEJzWlM1amIyMHdIaGNOTWpBd01qSXhNVGd5TkRBd1doY05NekF3TWpFNE1UZ3kKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTWk1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCQ3dvSVRVUlhTT2hsN1B0Y0orNmVsY3FGekxVUG1QbmIxUU9TQzdLMTQ1WlNxV2RqandMb3FSeQpmQTZxbDZWYnU0QkcrU2RLMTYweTVwOUgrb3BrMGdDamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWdOSzB2SGxDY043ZjFOQ2ZNNEVuaWp5eGFUV0Zwd2pLdWVaT21YdU90VmZJd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdNL3UxOWFqemh1NmsxMzN1SktUL3FDS0U3OS9rQXJmKzVZUEd1bFArNUo4Q0lBRnNNMk00ClNTaXBrUjQ5WmhiRW9WcnQvdm1kamk2UWtEWXUzU1l6MlJrNwotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/Org2MSPanchors.tx b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/Org2MSPanchors.tx new file mode 100644 index 00000000..6e5a13ae Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/Org2MSPanchors.tx differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/Org3MSP.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/Org3MSP.json new file mode 100644 index 00000000..a2cf989d --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/Org3MSP.json @@ -0,0 +1,170 @@ +{ + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRTjByWUtHUUhpTVlDR3cyZkVvWGoxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKZktTOWNOQTViOWtMNFordjdwellWb283SFp6UE84NW1IZnJBS0c0UXpTaFBXdytOUUdBNGdrOEcrd0p5eUFqVgpXWlpwei9Qb0RHdFFtUTRBbWtuOW9xTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQnIKWDhNaThqVGJaM2hEU1lSWmF5ODR1dU92UjRKT1VYQmV6V3FtdE9MVFJUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBdkE2WHhJMlpkS2RhNnZxUVBJbENuV2dhRCs0MW91YnpITHBHU3RFem4zZ0NJRlVnaTJCVG4xVWpNd1VyCkNuOU1INm9lQ1kyTDFCcFpwZDNXU2w4OFVtUmsKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRTjByWUtHUUhpTVlDR3cyZkVvWGoxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKZktTOWNOQTViOWtMNFordjdwellWb283SFp6UE84NW1IZnJBS0c0UXpTaFBXdytOUUdBNGdrOEcrd0p5eUFqVgpXWlpwei9Qb0RHdFFtUTRBbWtuOW9xTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQnIKWDhNaThqVGJaM2hEU1lSWmF5ODR1dU92UjRKT1VYQmV6V3FtdE9MVFJUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBdkE2WHhJMlpkS2RhNnZxUVBJbENuV2dhRCs0MW91YnpITHBHU3RFem4zZ0NJRlVnaTJCVG4xVWpNd1VyCkNuOU1INm9lQ1kyTDFCcFpwZDNXU2w4OFVtUmsKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRTjByWUtHUUhpTVlDR3cyZkVvWGoxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKZktTOWNOQTViOWtMNFordjdwellWb283SFp6UE84NW1IZnJBS0c0UXpTaFBXdytOUUdBNGdrOEcrd0p5eUFqVgpXWlpwei9Qb0RHdFFtUTRBbWtuOW9xTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQnIKWDhNaThqVGJaM2hEU1lSWmF5ODR1dU92UjRKT1VYQmV6V3FtdE9MVFJUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBdkE2WHhJMlpkS2RhNnZxUVBJbENuV2dhRCs0MW91YnpITHBHU3RFem4zZ0NJRlVnaTJCVG4xVWpNd1VyCkNuOU1INm9lQ1kyTDFCcFpwZDNXU2w4OFVtUmsKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel.tx b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel.tx new file mode 100644 index 00000000..07d01717 Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel.tx differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel.tx.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel.tx.json new file mode 100644 index 00000000..01a37527 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel.tx.json @@ -0,0 +1,230 @@ +{ + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:21Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": null + } + }, + "signature": null +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_0.block b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_0.block new file mode 100644 index 00000000..4e0bed7d Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_0.block differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_0.block.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_0.block.json new file mode 100644 index 00000000..04184ffc --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_0.block.json @@ -0,0 +1,1121 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRekNDQWVxZ0F3SUJBZ0lSQUxyaEJQM1RjYzVrWWV3d3ZGMjNBVTR3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUd3eEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SUXdFZ1lEVlFRS0V3dGxlR0Z0Y0d4bExtTnZiVEVhTUJnR0ExVUVBeE1SZEd4elkyRXVaWGhoCmJYQnNaUzVqYjIwd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFSMTl5V1VYN29WK1FoQlJzMU8KSk1aZTl6am14YWFEVy9YZHVpRGNTY2RsN1BVcjRMVXNmcmVqdytmbStXS1pNTzd1Tjk3dFBqQSt0VHdMQ1BZWQphOE1xbzIwd2F6QU9CZ05WSFE4QkFmOEVCQU1DQWFZd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3SUdDQ3NHCkFRVUZCd01CTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3S1FZRFZSME9CQ0lFSU03UGJ6ZXNVc1c2WlJ2cC85RHYKREJJd1RWblF4ZnUyb2JkRVB1NEg0cnFjTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUh0bis2NlFGSXIxVHd0SwpwRXdUZ2kwTVYwa0tPd0VJUVdWU3l4TW45aS9mQWlCUWw0YWYzZVh1ZWV4eUZMcTJGemxLT0ExVXBXNTJsRmo1CnZmakt5aHh5WUE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "1" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIHl5tw0dJCuXzcqHcfLXFvUD/YNoWPmeREidc4zMwn0yAiA8JSXS7hawx4tUpC70tH0hD7nbu64YJMo6CeziRbjoqA==", + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWMrZ0F3SUJBZ0lRV0t0MkQrN1N4bkl1TDQyTm9UNFBhekFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUdzeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE0d0RBWURWUVFMRXdWaFpHMXBiakVmTUIwR0ExVUVBd3dXUVdSdGFXNUFiM0puCk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQjFabHU2dmJ2YWEKcmhhWi9JeWdyOVcxMnBUenQ1YUNFVmMrdFd3QzlERno4NTZkVWhKSmlHT1kvTUNnL3k2dmdIZTRRcmhlcitlTQp4STFJVWZoNmxDaWpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkCkl3UWtNQ0tBSUoyNklhNGZLbmNOZGwwci9nd3hsRG0yUEp3bXdSL211NVRxa2c2RndOTTNNQW9HQ0NxR1NNNDkKQkFNQ0EwZ0FNRVVDSVFDS3ZxWWNJaWl0R1J5dldJTng5WDc2ZUJWb2d5cWdxTHpxN2pJVlNpcWt5UUlnZEptRwpHQnVFeE5aZmNjRUtIKzJmaU5GamViQlVIczVPbmRvcDVMb29xcDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org1MSP" + }, + "nonce": "EslhB3qiUNOWOqIIbqyBqXsqUK5xUGtj" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:34Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "otcA7DSe1cWFapZY0OSA5ufJRvLb6A5g" + } + } + }, + "signature": "MEUCIQDByj4s/Dk6ICU5EIJd7CZZSAiequ79EX46StktsMWGXgIgKqtEK1ej4Eg/V5UqCO5e0QfFniKa0jn3ZMGBzLPg9CY=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:35Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "sCr7l2QO4XG1CD/iNIK/i3ZrxG8usO9n" + } + } + }, + "signature": "MEQCIBKPQ0+EhbuhOL8o4Z9UG1mxqsZ9++XA5Qb01J1TRpUsAiBmgxWfd/5LLFAVy8yhNb1aGUr9okTcH2Aecy8in+JlAw==" + } + ] + }, + "header": { + "data_hash": "Lj3Zlz72/IE4JoP0JrWT1HWDNXuOtfZfzTIElCMyYgY=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_0.block.json-flat.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_0.block.json-flat.json new file mode 100644 index 00000000..b79e509b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_0.block.json-flat.json @@ -0,0 +1,406 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICQzCCAeqgAwIBAgIRALrhBP3Tcc5kYewwvF23AU4wCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGwxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEaMBgGA1UEAxMRdGxzY2EuZXhh\nbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR19yWUX7oV+QhBRs1O\nJMZe9zjmxaaDW/XduiDcScdl7PUr4LUsfrejw+fm+WKZMO7uN97tPjA+tTwLCPYY\na8Mqo20wazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsG\nAQUFBwMBMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIM7PbzesUsW6ZRvp/9Dv\nDBIwTVnQxfu2obdEPu4H4rqcMAoGCCqGSM49BAMCA0cAMEQCIHtn+66QFIr1TwtK\npEwTgi0MV0kKOwEIQWVSyxMn9i/fAiBQl4af3eXueexyFLq2FzlKOA1UpW52lFj5\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK\n3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG\nSM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=1 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.values.Consortium.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.values.Consortium.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.values.Consortium.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.values.Consortium.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.values.Consortium.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEQCIHl5tw0dJCuXzcqHcfLXFvUD/YNoWPmeREidc4zMwn0yAiA8JSXS7hawx4tUpC70tH0hD7nbu64YJMo6CeziRbjoqA== +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=EslhB3qiUNOWOqIIbqyBqXsqUK5xUGtj +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2020-02-21T19:54:34Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=otcA7DSe1cWFapZY0OSA5ufJRvLb6A5g +.data.data[0].payload.data.last_update.signature=MEUCIQDByj4s/Dk6ICU5EIJd7CZZSAiequ79EX46StktsMWGXgIgKqtEK1ej4Eg/V5UqCO5e0QfFniKa0jn3ZMGBzLPg9CY= +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:54:35Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=sCr7l2QO4XG1CD/iNIK/i3ZrxG8usO9n +.data.data[0].signature=MEQCIBKPQ0+EhbuhOL8o4Z9UG1mxqsZ9++XA5Qb01J1TRpUsAiBmgxWfd/5LLFAVy8yhNb1aGUr9okTcH2Aecy8in+JlAw== +.header.data_hash=Lj3Zlz72/IE4JoP0JrWT1HWDNXuOtfZfzTIElCMyYgY= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_1.block b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_1.block new file mode 100644 index 00000000..11918342 Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_1.block differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_1.block.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_1.block.json new file mode 100644 index 00000000..850c04a2 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_1.block.json @@ -0,0 +1,1001 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNWekNDQWY2Z0F3SUJBZ0lSQU82cUgyaDdWYmovc2hQZGJFTFlLRDB3Q2dZSUtvWkl6ajBFQXdJd2RqRUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIekFkQmdOVkJBTVRGblJzCmMyTmhMbTl5WnpFdVpYaGhiWEJzWlM1amIyMHdIaGNOTWpBd01qSXhNVGd5TkRBd1doY05NekF3TWpFNE1UZ3kKTkRBd1dqQjJNUXN3Q1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRQpCeE1OVTJGdUlFWnlZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWZNQjBHCkExVUVBeE1XZEd4elkyRXViM0puTVM1bGVHRnRjR3hsTG1OdmJUQlpNQk1HQnlxR1NNNDlBZ0VHQ0NxR1NNNDkKQXdFSEEwSUFCRXRodUp6Y1VHYkcwVjVTMFk2eXIzV1hML0VLSHo5NTdlOVBEVGxhWTYrRENodnNmNno4QzFNUAoyMU9ob1h6VG10YytDUS85bE53bkcybHdSbUxKamhpamJUQnJNQTRHQTFVZER3RUIvd1FFQXdJQnBqQWRCZ05WCkhTVUVGakFVQmdnckJnRUZCUWNEQWdZSUt3WUJCUVVIQXdFd0R3WURWUjBUQVFIL0JBVXdBd0VCL3pBcEJnTlYKSFE0RUlnUWd0Um9qaE82RWJUVUlGdWxERHljYVNDK09SdzhIWk41bHZKckt6bDBwZlFBd0NnWUlLb1pJemowRQpBd0lEUndBd1JBSWdjdlRWZ3hVQjB1WVdKWVg0ZGxQQW5sc0lXcnFnYmRqSm5JcFZ1aTlkbVhjQ0lEM1c0ZlJrCjZvcjB3MjNOS0dHSTUvc1pwdlB6Njd1WVhmOWNlK0JQMFM0agotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRekNDQWVxZ0F3SUJBZ0lSQUxyaEJQM1RjYzVrWWV3d3ZGMjNBVTR3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUd3eEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SUXdFZ1lEVlFRS0V3dGxlR0Z0Y0d4bExtTnZiVEVhTUJnR0ExVUVBeE1SZEd4elkyRXVaWGhoCmJYQnNaUzVqYjIwd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFSMTl5V1VYN29WK1FoQlJzMU8KSk1aZTl6am14YWFEVy9YZHVpRGNTY2RsN1BVcjRMVXNmcmVqdytmbStXS1pNTzd1Tjk3dFBqQSt0VHdMQ1BZWQphOE1xbzIwd2F6QU9CZ05WSFE4QkFmOEVCQU1DQWFZd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3SUdDQ3NHCkFRVUZCd01CTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3S1FZRFZSME9CQ0lFSU03UGJ6ZXNVc1c2WlJ2cC85RHYKREJJd1RWblF4ZnUyb2JkRVB1NEg0cnFjTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUh0bis2NlFGSXIxVHd0SwpwRXdUZ2kwTVYwa0tPd0VJUVdWU3l4TW45aS9mQWlCUWw0YWYzZVh1ZWV4eUZMcTJGemxLT0ExVXBXNTJsRmo1CnZmakt5aHh5WUE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRUy9LN2NrWDNYYmZyRGhmelFrVlF0VEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFWXRCcElueFJIenRmTVM2UVd3QThUZEJ3TlIvb2lrV0VqM3FiTFdlUVgvY1IKZjBTbXdCUkZlTWk0UE5wV3MxK2RucVFYSGVLT25VaVJyaHhlMUJLMnpxT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pJdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXlNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSUZQWkxOWVNDTlo1cEpwMDZxRThNZVUyOEI4dGlsc3ZJdVB1c2ZRVmRLOFhBaUFUCkplZ0ZYTitpQlpUeXBoeGk0R2lsY0d4WUExQ1hlSlhGS2hhdEZFS2NlZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "2" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIHoS+dMNZfsHeQXDyWW6AwePndUd5uhsGYXV5o2UiQ7qAiARcixijEHG7JqylXIHg2j5evFC/KSy+jBZwBvJV0IJFw==", + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWMrZ0F3SUJBZ0lRV0t0MkQrN1N4bkl1TDQyTm9UNFBhekFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUdzeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE0d0RBWURWUVFMRXdWaFpHMXBiakVmTUIwR0ExVUVBd3dXUVdSdGFXNUFiM0puCk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQjFabHU2dmJ2YWEKcmhhWi9JeWdyOVcxMnBUenQ1YUNFVmMrdFd3QzlERno4NTZkVWhKSmlHT1kvTUNnL3k2dmdIZTRRcmhlcitlTQp4STFJVWZoNmxDaWpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkCkl3UWtNQ0tBSUoyNklhNGZLbmNOZGwwci9nd3hsRG0yUEp3bXdSL211NVRxa2c2RndOTTNNQW9HQ0NxR1NNNDkKQkFNQ0EwZ0FNRVVDSVFDS3ZxWWNJaWl0R1J5dldJTng5WDc2ZUJWb2d5cWdxTHpxN2pJVlNpcWt5UUlnZEptRwpHQnVFeE5aZmNjRUtIKzJmaU5GamViQlVIczVPbmRvcDVMb29xcDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org1MSP" + }, + "nonce": "4YzKXQD8Zif9/EOELvQ6JlO+pGu0MxvN" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:41Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "hDJ/scu755b54jyq6CIdzZ35KKMCObej" + } + } + }, + "signature": "MEUCIQCY20Q1VueWMSj23Lmsffs5nZQ2Ntr8Ii9kL5t9lTvDlgIgRzSdp9wT05cGGTOEOcr8qwl2jNnuhb8GnxU0PPoBeNY=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:41Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "p68iU66vG/phSoOh3ydEWjaoBE/cBjSf" + } + } + }, + "signature": "MEUCIQC3SYyd73sQEj/0coVOsJ/6WKhodpIFq0gV95TG4Q+aGAIgH8NgJuPhpJ3+lmqbfpocj4SLvVZPONAzZE0YrR5rKlo=" + } + ] + }, + "header": { + "data_hash": "1RVrIrTIp9UmIyTX8FX/B7EJ+j3jBV/utW15mYybAtI=", + "number": "1", + "previous_hash": "16QXh+kEHyDH0ve9sEhyyL0BfBlF4lRoiIhQF8adhA4=" + }, + "metadata": { + "metadata": [ + "ChEKAggBEgsKCQoDAQIDEAQYBRKWBwrKBgqtBgoKT3JkZXJlck1TUBKeBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDSHpDQ0FjYWdBd0lCQWdJUkFNbjdxbGdGc201RmdmMW5Dd3prTm1Nd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUdzeEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SQXdEZ1lEVlFRTEV3ZHZjbVJsY21WeU1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bApMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkxzOW1kK09XTSt5eURmZHRHN2ozWVB0CjJQbWZBcVlHS3YvYVdnOTdMVlVzaXZ3TTJFZkVCem5BWTFpdE9ROXNhRlBhLzZiNUU1c1RkSjhoT1dkR0I2YWoKVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUc1UgpNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3pCMitMMDR3bkdjazUyOGF3TUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDCklBTDM5ZG1KM2ZqT2NUYlJwMmhhVkVGWVpUZGt1aGw5Mi8wbzlGdnd6SDVKQWlCWVJNcjBiV0QwMHRoUDBnaU4KV0ozbFNCUS9CVVpueHRxVUtaYjVmMDgyQVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYw3KdN1sbAR6CcXPJYquSGOlxqHlu2t0OEkcwRQIhAIab/MHoKZajjXq7p2k0tWxm75qX8IQif1VtenglxQhLAiAZKJ7ixTsQNVXojurfO85aHv0mwRztfiUocQBArFjpMw==", + "CgIIAQ==", + "", + "CgkKAwECAxAEGAU=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_1.block.json-flat.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_1.block.json-flat.json new file mode 100644 index 00000000..a5e95e4b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_1.block.json-flat.json @@ -0,0 +1,371 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK\n3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG\nSM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK\n3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG\nSM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=2 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEQCIHoS+dMNZfsHeQXDyWW6AwePndUd5uhsGYXV5o2UiQ7qAiARcixijEHG7JqylXIHg2j5evFC/KSy+jBZwBvJV0IJFw== +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=4YzKXQD8Zif9/EOELvQ6JlO+pGu0MxvN +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2020-02-21T19:54:41Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=hDJ/scu755b54jyq6CIdzZ35KKMCObej +.data.data[0].payload.data.last_update.signature=MEUCIQCY20Q1VueWMSj23Lmsffs5nZQ2Ntr8Ii9kL5t9lTvDlgIgRzSdp9wT05cGGTOEOcr8qwl2jNnuhb8GnxU0PPoBeNY= +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:54:41Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=p68iU66vG/phSoOh3ydEWjaoBE/cBjSf +.data.data[0].signature=MEUCIQC3SYyd73sQEj/0coVOsJ/6WKhodpIFq0gV95TG4Q+aGAIgH8NgJuPhpJ3+lmqbfpocj4SLvVZPONAzZE0YrR5rKlo= +.header.data_hash=1RVrIrTIp9UmIyTX8FX/B7EJ+j3jBV/utW15mYybAtI= +.header.number=1 +.header.previous_hash=16QXh+kEHyDH0ve9sEhyyL0BfBlF4lRoiIhQF8adhA4= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAQ== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAU= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_2.block b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_2.block new file mode 100644 index 00000000..e60c81aa Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_2.block differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_2.block.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_2.block.json new file mode 100644 index 00000000..6be3462b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_2.block.json @@ -0,0 +1,984 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQU8yMjJkUVdYWVU4L243bXptTWhVVnd3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkZmSUF4SThPbkZNL1NUSGJPZ0Y4c2tLRzd6NDJFS1hkRkErSlVMUWgreDIKc2l1TWQ5YWRBYTZGYnVzVG0yWklWY2RRKzBCVlBNRDdJc3czR0Y3Z1dDR2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU03UGJ6ZXNVc1c2WlJ2cC85RHZEQkl3VFZuUXhmdTJvYmRFUHU0SDRycWMKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNVEFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQWhlSUg2NVBtcUtSTzc2L25pbE1Tall2OUx6c2VtNGZpUW12a2EyZm9FcXNDCklHNzh3OEJlWkdBR0hwZDhIVG42VllCTWgzNzk2KzBkWHdSWlNENVp5cEE3Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIFd0TScDHZR5gpHAZ/4nj5FVPftWrjn/vLp9G8PctCcjAiBeUIIlMXTTkBY/1J7Fm0U+Ce2VmN+Rkh6fZoMOsbeyMA==", + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWRDZ0F3SUJBZ0lSQUtQelI2OUd5Ry9DWFZ4VWFHclZKbGN3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NakF3TWpJeE1UZ3lOREF3V2hjTk16QXdNakU0TVRneU5EQXcKV2pCck1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFT01Bd0dBMVVFQ3hNRllXUnRhVzR4SHpBZEJnTlZCQU1NRmtGa2JXbHVRRzl5Clp6SXVaWGhoYlhCc1pTNWpiMjB3V1RBVEJnY3Foa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVFXdDkrTWRXMXIKdU43U2NtT2ZXU0JuV251MnZWNWhyREs0c3Z3c2xpWnYxV0dIdWNkaEdEKzdXY1Z0NU1YVi9BL1lOSWh1bnVSRQp5SUh1VDVYb1dXZUZvMDB3U3pBT0JnTlZIUThCQWY4RUJBTUNCNEF3REFZRFZSMFRBUUgvQkFJd0FEQXJCZ05WCkhTTUVKREFpZ0NBcDlwTkhmWEtwSm1pbGp1czk2KzlYZ0xQbENwUzBnNEpBQUJtd3FkRlZQVEFLQmdncWhrak8KUFFRREFnTkhBREJFQWlCRHI1N0VPYyttWTlCeFhKaHBDM1lERUNwbHNvQm9jZmxjMSsyNG1qMy9qQUlnViswZwpEUEg1RmlNbzY3V2RPOVBCSm1mQ1lTYVBzKzI1dDJJQnZQczN4MHM9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org2MSP" + }, + "nonce": "NSLfx0kXpEXCkwTcglRmEdw3YooXlVBC" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:43Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "kFOVz5FZvogl20t72ocyORBGQHni3kix" + } + } + }, + "signature": "MEQCIA/ZMwBgmIUsfySGLeG5s3zs3VxtU7iFu0Y0NbawoyQxAiA48be7S+tq9MuQ8gBkLbwdPbrjLvJUuhwtqwnF2MMKkA==" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:43Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNIekNDQWNhZ0F3SUJBZ0lSQU1uN3FsZ0ZzbTVGZ2YxbkN3emtObU13Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR3N4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJBd0RnWURWUVFMRXdkdmNtUmxjbVZ5TVIwd0d3WURWUVFERXhSdmNtUmxjbVZ5TUM1bGVHRnRjR3hsCkxtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCTHM5bWQrT1dNK3l5RGZkdEc3ajNZUHQKMlBtZkFxWUdLdi9hV2c5N0xWVXNpdndNMkVmRUJ6bkFZMWl0T1E5c2FGUGEvNmI1RTVzVGRKOGhPV2RHQjZhagpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkSXdRa01DS0FJRzVSCk1VZzhkL0RTZUkxM0tsZVRVNlZQTXFDekIyK0wwNHduR2NrNTI4YXdNQW9HQ0NxR1NNNDlCQU1DQTBjQU1FUUMKSUFMMzlkbUozZmpPY1RiUnAyaGFWRUZZWlRka3VobDkyLzBvOUZ2d3pINUpBaUJZUk1yMGJXRDAwdGhQMGdpTgpXSjNsU0JRL0JVWm54dHFVS1piNWYwODJBUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "OrdererMSP" + }, + "nonce": "Y4eV4sj3eEvWQ0TMEmw9kdPjjBo/47ZZ" + } + } + }, + "signature": "MEQCIGGAhvExkc4F1i3/yTUl7znzC8C5aTcwxU8dFW4F5g2+AiBzNyRImqR2jEery9j9xGTyi1HE9PEKRQn/OKfYPQ+gTg==" + } + ] + }, + "header": { + "data_hash": "bET6ka3hA5S2xsC90CTeOtDTgQyLrPgpL9Ic3owVpnw=", + "number": "2", + "previous_hash": "SKTPAZyDi4Jo6dyTDhz7SvK5a/6v9s4gz4quJNXTrXI=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAY=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_2.block.json-flat.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_2.block.json-flat.json new file mode 100644 index 00000000..92cf061e --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_2.block.json-flat.json @@ -0,0 +1,366 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=3 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEQCIFd0TScDHZR5gpHAZ/4nj5FVPftWrjn/vLp9G8PctCcjAiBeUIIlMXTTkBY/1J7Fm0U+Ce2VmN+Rkh6fZoMOsbeyMA== +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=NSLfx0kXpEXCkwTcglRmEdw3YooXlVBC +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2020-02-21T19:54:43Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=kFOVz5FZvogl20t72ocyORBGQHni3kix +.data.data[0].payload.data.last_update.signature=MEQCIA/ZMwBgmIUsfySGLeG5s3zs3VxtU7iFu0Y0NbawoyQxAiA48be7S+tq9MuQ8gBkLbwdPbrjLvJUuhwtqwnF2MMKkA== +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:54:43Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=Y4eV4sj3eEvWQ0TMEmw9kdPjjBo/47ZZ +.data.data[0].signature=MEQCIGGAhvExkc4F1i3/yTUl7znzC8C5aTcwxU8dFW4F5g2+AiBzNyRImqR2jEery9j9xGTyi1HE9PEKRQn/OKfYPQ+gTg== +.header.data_hash=bET6ka3hA5S2xsC90CTeOtDTgQyLrPgpL9Ic3owVpnw= +.header.number=2 +.header.previous_hash=SKTPAZyDi4Jo6dyTDhz7SvK5a/6v9s4gz4quJNXTrXI= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAY= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_3.block b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_3.block new file mode 100644 index 00000000..ad151722 Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_3.block differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_3.block.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_3.block.json new file mode 100644 index 00000000..fc1fd392 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_3.block.json @@ -0,0 +1,156 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "fCmnWaBFVYSFeddJCpvYFBMH03w+EJ5i" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEQCIECSKbodxLfFev0eyP/wi5ZBBzDyMrTvsQuYBnPIe/e/AiBoSHBcZpU6Ye29nOJgItC2c2yCaxYZ19UTlRb9oyLzeg==" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "lscc", + "path": "", + "version": "1.4.5" + }, + "events": null, + "response": { + "message": "", + "payload": "CgVleHAwMhIDMS4wGgRlc2NjIgR2c2NjKigSDBIKCAESAggAEgIIARoLEgkKB09yZzFNU1AaCxIJCgdPcmcyTVNQMkQKIKHVcu1JbD6syM0Qw+LruCE2WdL5x12oXEl44rzaqt03EiCspBd4qNsaveuBzl13p5mBgwZmADW4S4f0OnOZOAYsHjogCMpnXDmouuJjGEelIfyS4Slp/hIr1KnfCnB88QWehzBCLBIMEgoIARICCAASAggBGg0SCwoHT3JnMU1TUBABGg0SCwoHT3JnMk1TUBAB", + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "MTAw" + }, + { + "is_delete": false, + "key": "b", + "value": "MjAw" + } + ] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "lscc", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "exp02", + "version": null + } + ], + "writes": [ + { + "is_delete": false, + "key": "exp02", + "value": "CgVleHAwMhIDMS4wGgRlc2NjIgR2c2NjKigSDBIKCAESAggAEgIIARoLEgkKB09yZzFNU1AaCxIJCgdPcmcyTVNQMkQKIKHVcu1JbD6syM0Qw+LruCE2WdL5x12oXEl44rzaqt03EiCspBd4qNsaveuBzl13p5mBgwZmADW4S4f0OnOZOAYsHjogCMpnXDmouuJjGEelIfyS4Slp/hIr1KnfCnB88QWehzBCLBIMEgoIARICCAASAggBGg0SCwoHT3JnMU1TUBABGg0SCwoHT3JnMk1TUBAB" + } + ] + } + } + ] + }, + "token_expectation": null + }, + "proposal_hash": "omDe2QkOwbhZ5YH7b9/CkVp00bpR78Rj39viq7yT+nw=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "lscc", + "path": "", + "version": "" + }, + "input": { + "args": [ + "ZGVwbG95", + "YnVzaW5lc3NjaGFubmVs", + "CigIARIMEgVleHAwMhoDMS4wGhYKBGluaXQKAWEKAzEwMAoBYgoDMjAw", + "EgwSCggBEgIIABICCAEaCxIJCgdPcmcxTVNQGgsSCQoHT3JnMk1TUA==", + "ZXNjYw==", + "dnNjYw==" + ], + "decorations": {} + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgYSBGxzY2M=", + "timestamp": "2020-02-21T19:54:51.036078300Z", + "tls_cert_hash": null, + "tx_id": "55ea70e7984ea62b9facd7e1d4bb2256437645c5bcc91f8c3f2f65aae30fd12e", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWMrZ0F3SUJBZ0lRV0t0MkQrN1N4bkl1TDQyTm9UNFBhekFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUdzeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE0d0RBWURWUVFMRXdWaFpHMXBiakVmTUIwR0ExVUVBd3dXUVdSdGFXNUFiM0puCk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQjFabHU2dmJ2YWEKcmhhWi9JeWdyOVcxMnBUenQ1YUNFVmMrdFd3QzlERno4NTZkVWhKSmlHT1kvTUNnL3k2dmdIZTRRcmhlcitlTQp4STFJVWZoNmxDaWpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkCkl3UWtNQ0tBSUoyNklhNGZLbmNOZGwwci9nd3hsRG0yUEp3bXdSL211NVRxa2c2RndOTTNNQW9HQ0NxR1NNNDkKQkFNQ0EwZ0FNRVVDSVFDS3ZxWWNJaWl0R1J5dldJTng5WDc2ZUJWb2d5cWdxTHpxN2pJVlNpcWt5UUlnZEptRwpHQnVFeE5aZmNjRUtIKzJmaU5GamViQlVIczVPbmRvcDVMb29xcDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org1MSP" + }, + "nonce": "fCmnWaBFVYSFeddJCpvYFBMH03w+EJ5i" + } + } + }, + "signature": "MEQCIBJD0ahs3c2cXLCLjtQlIt+ihye1g7/xqcPzQsThtPHMAiAqmpXU8Bgbusbmk+tN2h2xVKMFCmSllJqlxox/VxmUIA==" + } + ] + }, + "header": { + "data_hash": "UKkbyKmOFCfH8AupKVsi+0hDL2lZhHnHJ8b36qgnq/Q=", + "number": "3", + "previous_hash": "HlKvqixuKb1OMbQbHhTSZqpwvAZATxvur2mujpVmUfI=" + }, + "metadata": { + "metadata": [ + "ChEKAggCEgsKCQoDAQIDEAQYBxKVBwrKBgqtBgoKT3JkZXJlck1TUBKeBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDSHpDQ0FjYWdBd0lCQWdJUkFNbjdxbGdGc201RmdmMW5Dd3prTm1Nd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUdzeEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SQXdEZ1lEVlFRTEV3ZHZjbVJsY21WeU1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bApMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkxzOW1kK09XTSt5eURmZHRHN2ozWVB0CjJQbWZBcVlHS3YvYVdnOTdMVlVzaXZ3TTJFZkVCem5BWTFpdE9ROXNhRlBhLzZiNUU1c1RkSjhoT1dkR0I2YWoKVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUc1UgpNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3pCMitMMDR3bkdjazUyOGF3TUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDCklBTDM5ZG1KM2ZqT2NUYlJwMmhhVkVGWVpUZGt1aGw5Mi8wbzlGdnd6SDVKQWlCWVJNcjBiV0QwMHRoUDBnaU4KV0ozbFNCUS9CVVpueHRxVUtaYjVmMDgyQVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYWTbs4WS1LkIQtDZsDVRZ/1kITThFOQ5gEkYwRAIgd2fxHqJVidtWuFDD+8EXZ1L6apsjPYQfvb8gf1/0t1oCIA0gAzokNMmenDfJFf2UDXhwxBbAuyeeRA9l8veh5gpE", + "CgIIAg==", + "", + "CgkKAwECAxAEGAc=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_3.block.json-flat.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_3.block.json-flat.json new file mode 100644 index 00000000..ae9caa49 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_3.block.json-flat.json @@ -0,0 +1,59 @@ +.data.data[0].payload.data.actions[0].header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.actions[0].header.creator.mspid=Org1MSP +.data.data[0].payload.data.actions[0].header.nonce=fCmnWaBFVYSFeddJCpvYFBMH03w+EJ5i +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].endorser=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 +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].signature=MEQCIECSKbodxLfFev0eyP/wi5ZBBzDyMrTvsQuYBnPIe/e/AiBoSHBcZpU6Ye29nOJgItC2c2yCaxYZ19UTlRb9oyLzeg== +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.name=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.version=1.4.5 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.events=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.message= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.payload=CgVleHAwMhIDMS4wGgRlc2NjIgR2c2NjKigSDBIKCAESAggAEgIIARoLEgkKB09yZzFNU1AaCxIJCgdPcmcyTVNQMkQKIKHVcu1JbD6syM0Qw+LruCE2WdL5x12oXEl44rzaqt03EiCspBd4qNsaveuBzl13p5mBgwZmADW4S4f0OnOZOAYsHjogCMpnXDmouuJjGEelIfyS4Slp/hIr1KnfCnB88QWehzBCLBIMEgoIARICCAASAggBGg0SCwoHT3JnMU1TUBABGg0SCwoHT3JnMk1TUBAB +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.status=200 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.data_model=KV +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].namespace=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].value=b64(b'100') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].value=b64(b'200') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].namespace=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.writes[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.writes[0].value=b64(b'\n\x05exp02\x12\x031.0\x1a\x04escc"\x04vscc*(\x12\x0c\x12\n\x08\x01\x12\x02\x08\x00\x12\x02\x08\x01\x1a\x0b\x12\t\n\x07Org1MSP\x1a\x0b\x12\t\n\x07Org2MSP2D\n \xa1\xd5r\xedIl>\xac\xc8\xcd\x10\xc3\xe2\xeb\xb8!6Y\xd2\xf9\xc7]\xa8\\Ix\xe2\xbc\xda\xaa\xdd7\x12 \xac\xa4\x17x\xa8\xdb\x1a\xbd\xeb\x81\xce]w\xa7\x99\x81\x83\x06f\x005\xb8K\x87\xf4:s\x998\x06,\x1e: \x08\xcag\\9\xa8\xba\xe2c\x18G\xa5!\xfc\x92\xe1)i\xfe\x12+\xd4\xa9\xdf\np|\xf1\x05\x9e\x870B,\x12\x0c\x12\n\x08\x01\x12\x02\x08\x00\x12\x02\x08\x01\x1a\r\x12\x0b\n\x07Org1MSP\x10\x01\x1a\r\x12\x0b\n\x07Org2MSP\x10\x01') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.token_expectation=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.proposal_hash=omDe2QkOwbhZ5YH7b9/CkVp00bpR78Rj39viq7yT+nw= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.name=lscc +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.version= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[0]=b64(b'deploy') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[1]=b64(b'businesschannel') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[2]=b64(b'\n(\x08\x01\x12\x0c\x12\x05exp02\x1a\x031.0\x1a\x16\n\x04init\n\x01a\n\x03100\n\x01b\n\x03200') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[3]=b64(b'\x12\x0c\x12\n\x08\x01\x12\x02\x08\x00\x12\x02\x08\x01\x1a\x0b\x12\t\n\x07Org1MSP\x1a\x0b\x12\t\n\x07Org2MSP') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[4]=b64(b'escc') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[5]=b64(b'vscc') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.timeout=0 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.type=GOLANG +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=EgYSBGxzY2M= +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:54:51.036078300Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=55ea70e7984ea62b9facd7e1d4bb2256437645c5bcc91f8c3f2f65aae30fd12e +.data.data[0].payload.header.channel_header.type=3 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.header.signature_header.nonce=fCmnWaBFVYSFeddJCpvYFBMH03w+EJ5i +.data.data[0].signature=MEQCIBJD0ahs3c2cXLCLjtQlIt+ihye1g7/xqcPzQsThtPHMAiAqmpXU8Bgbusbmk+tN2h2xVKMFCmSllJqlxox/VxmUIA== +.header.data_hash=UKkbyKmOFCfH8AupKVsi+0hDL2lZhHnHJ8b36qgnq/Q= +.header.number=3 +.header.previous_hash=HlKvqixuKb1OMbQbHhTSZqpwvAZATxvur2mujpVmUfI= +.metadata.metadata[0]=ChEKAggCEgsKCQoDAQIDEAQYBxKVBwrKBgqtBgoKT3JkZXJlck1TUBKeBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDSHpDQ0FjYWdBd0lCQWdJUkFNbjdxbGdGc201RmdmMW5Dd3prTm1Nd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUdzeEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SQXdEZ1lEVlFRTEV3ZHZjbVJsY21WeU1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bApMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkxzOW1kK09XTSt5eURmZHRHN2ozWVB0CjJQbWZBcVlHS3YvYVdnOTdMVlVzaXZ3TTJFZkVCem5BWTFpdE9ROXNhRlBhLzZiNUU1c1RkSjhoT1dkR0I2YWoKVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUc1UgpNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3pCMitMMDR3bkdjazUyOGF3TUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDCklBTDM5ZG1KM2ZqT2NUYlJwMmhhVkVGWVpUZGt1aGw5Mi8wbzlGdnd6SDVKQWlCWVJNcjBiV0QwMHRoUDBnaU4KV0ozbFNCUS9CVVpueHRxVUtaYjVmMDgyQVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYWTbs4WS1LkIQtDZsDVRZ/1kITThFOQ5gEkYwRAIgd2fxHqJVidtWuFDD+8EXZ1L6apsjPYQfvb8gf1/0t1oCIA0gAzokNMmenDfJFf2UDXhwxBbAuyeeRA9l8veh5gpE +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAc= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_4.block b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_4.block new file mode 100644 index 00000000..1dc751f5 Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_4.block differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_4.block.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_4.block.json new file mode 100644 index 00000000..cbf338b6 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_4.block.json @@ -0,0 +1,166 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "sEH3/OY5D7Do7Lai3Zy5mzNhzZFgiIZS" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "CgdPcmcxTVNQEqoGLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLRENDQWMrZ0F3SUJBZ0lSQUxqUExIVlNyeEJsOTNYVEFqQ0RhWUF3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpFdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekV1WlhoaGJYQnNaUzVqYjIwd0hoY05NakF3TWpJeE1UZ3lOREF3V2hjTk16QXdNakU0TVRneU5EQXcKV2pCcU1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFTk1Bc0dBMVVFQ3hNRWNHVmxjakVmTUIwR0ExVUVBeE1XY0dWbGNqQXViM0puCk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCR2tnTDJ5QUxraDcKYnVEeVRpQ0J6NHhUUmJOQkNBZ1dubmlKOEx3WXFvVlliYU5CZmJUM1pJamhza2kyRUY5ZG55dW5VRGx3VWMvZgpWWFF5MVB6NVY3ZWpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkCkl3UWtNQ0tBSUoyNklhNGZLbmNOZGwwci9nd3hsRG0yUEp3bXdSL211NVRxa2c2RndOTTNNQW9HQ0NxR1NNNDkKQkFNQ0EwY0FNRVFDSUNzQlJUZExpaWZFVkFVdXVlcTRkUXI3YlExK1h4RnBlV1ZIMzFFY1RuK2tBaUJWYndEeApQZ21LTVNYdjh2MS9sSHV4VjRXUE1jNWZWMG5VUzVZc0lqUzZsQT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "signature": "MEUCIQDBJsrQO7ZCpFPQ7UO2E7B0JxAq9DHpPyXKHf7Y0QFvEQIgdluAbiiCcWbZSjUdKNM2+wyUUU7w1Zp78QJvet8zta8=" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "1.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "a", + "version": { + "block_num": "3", + "tx_num": "0" + } + }, + { + "key": "b", + "version": { + "block_num": "3", + "tx_num": "0" + } + } + ], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "OTA=" + }, + { + "is_delete": false, + "key": "b", + "value": "MjEw" + } + ] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "lscc", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "exp02", + "version": { + "block_num": "3", + "tx_num": "0" + } + } + ], + "writes": [] + } + } + ] + }, + "token_expectation": null + }, + "proposal_hash": "KDMsROdkTX2U/OOZQHXem8ATULcWO48vukK5kPMon0U=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "" + }, + "input": { + "args": [ + "aW52b2tl", + "YQ==", + "Yg==", + "MTA=" + ], + "decorations": {} + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgcSBWV4cDAy", + "timestamp": "2020-02-21T19:55:40.211279700Z", + "tls_cert_hash": null, + "tx_id": "e6d22edfea14507f6a97ddb4641ada91413c27a5e9e58318997568a0c330fdfd", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "sEH3/OY5D7Do7Lai3Zy5mzNhzZFgiIZS" + } + } + }, + "signature": "MEQCIFmzHBPnu9zw32wsKxTF264TId4leIxVeJsFLDoe4KKlAiBUtLsjbHfsfhbbw3i5ZvHsXVxXXejVchizE4MJNP0ctQ==" + } + ] + }, + "header": { + "data_hash": "wTbS5mO9fnLsKhQQY54CKjl9bfG5bH5BgE+IbojScf8=", + "number": "4", + "previous_hash": "356c/ZpZsdIIaGq+b3iNtv7BusLcCom0S375wnzpFQA=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAg=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_4.block.json-flat.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_4.block.json-flat.json new file mode 100644 index 00000000..f5497500 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_4.block.json-flat.json @@ -0,0 +1,61 @@ +.data.data[0].payload.data.actions[0].header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.actions[0].header.creator.mspid=Org1MSP +.data.data[0].payload.data.actions[0].header.nonce=sEH3/OY5D7Do7Lai3Zy5mzNhzZFgiIZS +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].endorser=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 +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].signature=MEUCIQDBJsrQO7ZCpFPQ7UO2E7B0JxAq9DHpPyXKHf7Y0QFvEQIgdluAbiiCcWbZSjUdKNM2+wyUUU7w1Zp78QJvet8zta8= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.version=1.0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.events=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.message= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.payload=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.status=200 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.data_model=KV +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].namespace=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].value=b64(b'90') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].value=b64(b'210') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].namespace=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.token_expectation=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.proposal_hash=KDMsROdkTX2U/OOZQHXem8ATULcWO48vukK5kPMon0U= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.version= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[0]=b64(b'invoke') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[1]=b64(b'a') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[2]=b64(b'b') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[3]=b64(b'10') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.timeout=0 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.type=GOLANG +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=EgcSBWV4cDAy +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:55:40.211279700Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=e6d22edfea14507f6a97ddb4641ada91413c27a5e9e58318997568a0c330fdfd +.data.data[0].payload.header.channel_header.type=3 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.header.signature_header.nonce=sEH3/OY5D7Do7Lai3Zy5mzNhzZFgiIZS +.data.data[0].signature=MEQCIFmzHBPnu9zw32wsKxTF264TId4leIxVeJsFLDoe4KKlAiBUtLsjbHfsfhbbw3i5ZvHsXVxXXejVchizE4MJNP0ctQ== +.header.data_hash=wTbS5mO9fnLsKhQQY54CKjl9bfG5bH5BgE+IbojScf8= +.header.number=4 +.header.previous_hash=356c/ZpZsdIIaGq+b3iNtv7BusLcCom0S375wnzpFQA= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAg= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_5.block b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_5.block new file mode 100644 index 00000000..f2b6fa07 Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_5.block differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_5.block.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_5.block.json new file mode 100644 index 00000000..65f16ac4 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_5.block.json @@ -0,0 +1,166 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "actions": [ + { + "header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "ZDK+MyT08B9DY1X6D0aunDcgyQjASpwq" + }, + "payload": { + "action": { + "endorsements": [ + { + "endorser": "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", + "signature": "MEUCIQDFljVJSAxn9HZtoC0cyAjsGivai4h1HB2vXkMiVcjEngIgXRa+WGcmRGG06z4G3BomYTtUsPkupu2ieW2A7rfVqoE=" + } + ], + "proposal_response_payload": { + "extension": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "1.0" + }, + "events": null, + "response": { + "message": "", + "payload": null, + "status": 200 + }, + "results": { + "data_model": "KV", + "ns_rwset": [ + { + "collection_hashed_rwset": [], + "namespace": "exp02", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "a", + "version": { + "block_num": "4", + "tx_num": "0" + } + }, + { + "key": "b", + "version": { + "block_num": "4", + "tx_num": "0" + } + } + ], + "writes": [ + { + "is_delete": false, + "key": "a", + "value": "ODA=" + }, + { + "is_delete": false, + "key": "b", + "value": "MjIw" + } + ] + } + }, + { + "collection_hashed_rwset": [], + "namespace": "lscc", + "rwset": { + "metadata_writes": [], + "range_queries_info": [], + "reads": [ + { + "key": "exp02", + "version": { + "block_num": "3", + "tx_num": "0" + } + } + ], + "writes": [] + } + } + ] + }, + "token_expectation": null + }, + "proposal_hash": "irgHG8NgyfJ/r5MKgoVH30phS1aAbSztLVS/ES0h8sc=" + } + }, + "chaincode_proposal_payload": { + "TransientMap": {}, + "input": { + "chaincode_spec": { + "chaincode_id": { + "name": "exp02", + "path": "", + "version": "" + }, + "input": { + "args": [ + "aW52b2tl", + "YQ==", + "Yg==", + "MTA=" + ], + "decorations": {} + }, + "timeout": 0, + "type": "GOLANG" + } + } + } + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": "EgcSBWV4cDAy", + "timestamp": "2020-02-21T19:55:42.815066800Z", + "tls_cert_hash": null, + "tx_id": "12ba5b11582bbcae5b36efb5d34d5be9f12b512c0bfef84eae60c0e7307702ba", + "type": 3, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWRDZ0F3SUJBZ0lSQUtQelI2OUd5Ry9DWFZ4VWFHclZKbGN3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NakF3TWpJeE1UZ3lOREF3V2hjTk16QXdNakU0TVRneU5EQXcKV2pCck1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFT01Bd0dBMVVFQ3hNRllXUnRhVzR4SHpBZEJnTlZCQU1NRmtGa2JXbHVRRzl5Clp6SXVaWGhoYlhCc1pTNWpiMjB3V1RBVEJnY3Foa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVFXdDkrTWRXMXIKdU43U2NtT2ZXU0JuV251MnZWNWhyREs0c3Z3c2xpWnYxV0dIdWNkaEdEKzdXY1Z0NU1YVi9BL1lOSWh1bnVSRQp5SUh1VDVYb1dXZUZvMDB3U3pBT0JnTlZIUThCQWY4RUJBTUNCNEF3REFZRFZSMFRBUUgvQkFJd0FEQXJCZ05WCkhTTUVKREFpZ0NBcDlwTkhmWEtwSm1pbGp1czk2KzlYZ0xQbENwUzBnNEpBQUJtd3FkRlZQVEFLQmdncWhrak8KUFFRREFnTkhBREJFQWlCRHI1N0VPYyttWTlCeFhKaHBDM1lERUNwbHNvQm9jZmxjMSsyNG1qMy9qQUlnViswZwpEUEg1RmlNbzY3V2RPOVBCSm1mQ1lTYVBzKzI1dDJJQnZQczN4MHM9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org2MSP" + }, + "nonce": "ZDK+MyT08B9DY1X6D0aunDcgyQjASpwq" + } + } + }, + "signature": "MEUCIQCHaYVfKhYaEYGm6sRwKkwuPLXIibdoLReIwmFPsKPBWQIgaGanhJcOdMiMmdc66VG/pFV0fEdVQOnje/RfO/NGWXQ=" + } + ] + }, + "header": { + "data_hash": "ok8lRWu9kOt3pn21vI75l9dORRvZmxmNP6KuCQ/WIjk=", + "number": "5", + "previous_hash": "XzqZlVjPlE5sRc5Q4WHQXAA3CldQmLCxbH4qgj4DZdE=" + }, + "metadata": { + "metadata": [ + "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", + "CgIIAg==", + "", + "CgkKAwECAxAEGAk=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_5.block.json-flat.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_5.block.json-flat.json new file mode 100644 index 00000000..d8b573eb --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_5.block.json-flat.json @@ -0,0 +1,61 @@ +.data.data[0].payload.data.actions[0].header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.actions[0].header.creator.mspid=Org2MSP +.data.data[0].payload.data.actions[0].header.nonce=ZDK+MyT08B9DY1X6D0aunDcgyQjASpwq +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].endorser=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 +.data.data[0].payload.data.actions[0].payload.action.endorsements[0].signature=MEUCIQDFljVJSAxn9HZtoC0cyAjsGivai4h1HB2vXkMiVcjEngIgXRa+WGcmRGG06z4G3BomYTtUsPkupu2ieW2A7rfVqoE= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.chaincode_id.version=1.0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.events=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.message= +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.payload=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.response.status=200 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.data_model=KV +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].namespace=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.block_num=4 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.block_num=4 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.reads[1].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].key=a +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[0].value=b64(b'80') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].is_delete=False +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].key=b +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[0].rwset.writes[1].value=b64(b'220') +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].namespace=lscc +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].key=exp02 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.block_num=3 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.results.ns_rwset[1].rwset.reads[0].version.tx_num=0 +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.extension.token_expectation=None +.data.data[0].payload.data.actions[0].payload.action.proposal_response_payload.proposal_hash=irgHG8NgyfJ/r5MKgoVH30phS1aAbSztLVS/ES0h8sc= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.name=exp02 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.path= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.chaincode_id.version= +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[0]=b64(b'invoke') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[1]=b64(b'a') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[2]=b64(b'b') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.input.args[3]=b64(b'10') +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.timeout=0 +.data.data[0].payload.data.actions[0].payload.chaincode_proposal_payload.input.chaincode_spec.type=GOLANG +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=EgcSBWV4cDAy +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:55:42.815066800Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=12ba5b11582bbcae5b36efb5d34d5be9f12b512c0bfef84eae60c0e7307702ba +.data.data[0].payload.header.channel_header.type=3 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y\nZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r\nuN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE\nyIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV\nHSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO\nPQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=Org2MSP +.data.data[0].payload.header.signature_header.nonce=ZDK+MyT08B9DY1X6D0aunDcgyQjASpwq +.data.data[0].signature=MEUCIQCHaYVfKhYaEYGm6sRwKkwuPLXIibdoLReIwmFPsKPBWQIgaGanhJcOdMiMmdc66VG/pFV0fEdVQOnje/RfO/NGWXQ= +.header.data_hash=ok8lRWu9kOt3pn21vI75l9dORRvZmxmNP6KuCQ/WIjk= +.header.number=5 +.header.previous_hash=XzqZlVjPlE5sRc5Q4WHQXAA3CldQmLCxbH4qgj4DZdE= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAk= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_6.block b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_6.block new file mode 100644 index 00000000..41a434a9 Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_6.block differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_6.block.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_6.block.json new file mode 100644 index 00000000..f1fa8bbf --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_6.block.json @@ -0,0 +1,1376 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "2" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQU8yMjJkUVdYWVU4L243bXptTWhVVnd3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkZmSUF4SThPbkZNL1NUSGJPZ0Y4c2tLRzd6NDJFS1hkRkErSlVMUWgreDIKc2l1TWQ5YWRBYTZGYnVzVG0yWklWY2RRKzBCVlBNRDdJc3czR0Y3Z1dDR2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU03UGJ6ZXNVc1c2WlJ2cC85RHZEQkl3VFZuUXhmdTJvYmRFUHU0SDRycWMKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNVEFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQWhlSUg2NVBtcUtSTzc2L25pbE1Tall2OUx6c2VtNGZpUW12a2EyZm9FcXNDCklHNzh3OEJlWkdBR0hwZDhIVG42VllCTWgzNzk2KzBkWHdSWlNENVp5cEE3Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "4" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRTjByWUtHUUhpTVlDR3cyZkVvWGoxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKZktTOWNOQTViOWtMNFordjdwellWb283SFp6UE84NW1IZnJBS0c0UXpTaFBXdytOUUdBNGdrOEcrd0p5eUFqVgpXWlpwei9Qb0RHdFFtUTRBbWtuOW9xTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQnIKWDhNaThqVGJaM2hEU1lSWmF5ODR1dU92UjRKT1VYQmV6V3FtdE9MVFJUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBdkE2WHhJMlpkS2RhNnZxUVBJbENuV2dhRCs0MW91YnpITHBHU3RFem4zZ0NJRlVnaTJCVG4xVWpNd1VyCkNuOU1INm9lQ1kyTDFCcFpwZDNXU2w4OFVtUmsKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRTjByWUtHUUhpTVlDR3cyZkVvWGoxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKZktTOWNOQTViOWtMNFordjdwellWb283SFp6UE84NW1IZnJBS0c0UXpTaFBXdytOUUdBNGdrOEcrd0p5eUFqVgpXWlpwei9Qb0RHdFFtUTRBbWtuOW9xTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQnIKWDhNaThqVGJaM2hEU1lSWmF5ODR1dU92UjRKT1VYQmV6V3FtdE9MVFJUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBdkE2WHhJMlpkS2RhNnZxUVBJbENuV2dhRCs0MW91YnpITHBHU3RFem4zZ0NJRlVnaTJCVG4xVWpNd1VyCkNuOU1INm9lQ1kyTDFCcFpwZDNXU2w4OFVtUmsKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "2" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIGjzBYJQlWYMRiKJuqODIS9WVcqXiQHjBtJYeelF+V47AiADwNFHRXQudKzFBmmJKg1ZrTkMJ0YIb2i6hvjxfdT85Q==", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "n8Cz9hIfaKMEY9y+lJ1jZ3cX812PCLHx" + } + }, + { + "signature": "MEUCIQCpHs72hK8etu5NaVzMXtM9vcLxoGUaXvdNUpwx1VbnbQIgE15Ii0RASKrbKzKDWJUJOvKekd1ciMoXqusFpu0qjgY=", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org2MSP" + }, + "nonce": "HGSN5ZleGzrZNK7YR5s+WjaNbg8k06k/" + } + }, + { + "signature": "MEQCICUpzly1F0xOHS8d/cP8cGaTOkJURSKfH6CdUsVpOBDsAiAG1f+8sFMhmUsymUNnS5fzuKujQrfTgz0es8+KKSlhuQ==", + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWMrZ0F3SUJBZ0lRV0t0MkQrN1N4bkl1TDQyTm9UNFBhekFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUdzeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVE0d0RBWURWUVFMRXdWaFpHMXBiakVmTUIwR0ExVUVBd3dXUVdSdGFXNUFiM0puCk1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCQjFabHU2dmJ2YWEKcmhhWi9JeWdyOVcxMnBUenQ1YUNFVmMrdFd3QzlERno4NTZkVWhKSmlHT1kvTUNnL3k2dmdIZTRRcmhlcitlTQp4STFJVWZoNmxDaWpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkCkl3UWtNQ0tBSUoyNklhNGZLbmNOZGwwci9nd3hsRG0yUEp3bXdSL211NVRxa2c2RndOTTNNQW9HQ0NxR1NNNDkKQkFNQ0EwZ0FNRVVDSVFDS3ZxWWNJaWl0R1J5dldJTng5WDc2ZUJWb2d5cWdxTHpxN2pJVlNpcWt5UUlnZEptRwpHQnVFeE5aZmNjRUtIKzJmaU5GamViQlVIczVPbmRvcDVMb29xcDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org1MSP" + }, + "nonce": "6Z8ZYIPPc04ubORCPtpQy2lbCDLTM83S" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:56:00Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "v6E9H1twGNPiLZhUXbI8zQbtkCgFncbI" + } + } + }, + "signature": "MEQCIE7S+4B4d2zlZEa41yDpHMToGNs1xgDsldbIFQsnQ5/6AiATvKEgkGRdOqVVSd1SeVhcY7S3TRy1RsiAhkBul3Iaqg==" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:56:00Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "nMuaqhEAmiEQ+Hx1yJ7iJObwc/MN7bJE" + } + } + }, + "signature": "MEQCIEkTd6C2j8KpxITqXsgeNyU0WdcmDXYiVF5F+McGkVzeAiA41/Go8tnTQdxAlnO9kyiGjfKgF+Qatl+rRSdUUF8psQ==" + } + ] + }, + "header": { + "data_hash": "cICNR8uwKgWaW7H3txwefCS5v9I4nWvelzqQev8AQjA=", + "number": "6", + "previous_hash": "SMBuZQTwskzzKa/KY6Omc90UzBQs8ShixafTC7U40bY=" + }, + "metadata": { + "metadata": [ + "ChEKAggGEgsKCQoDAQIDEAQYChKWBwrKBgqtBgoKT3JkZXJlck1TUBKeBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDSHpDQ0FjYWdBd0lCQWdJUkFNbjdxbGdGc201RmdmMW5Dd3prTm1Nd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUdzeEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SQXdEZ1lEVlFRTEV3ZHZjbVJsY21WeU1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bApMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkxzOW1kK09XTSt5eURmZHRHN2ozWVB0CjJQbWZBcVlHS3YvYVdnOTdMVlVzaXZ3TTJFZkVCem5BWTFpdE9ROXNhRlBhLzZiNUU1c1RkSjhoT1dkR0I2YWoKVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUc1UgpNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3pCMitMMDR3bkdjazUyOGF3TUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDCklBTDM5ZG1KM2ZqT2NUYlJwMmhhVkVGWVpUZGt1aGw5Mi8wbzlGdnd6SDVKQWlCWVJNcjBiV0QwMHRoUDBnaU4KV0ozbFNCUS9CVVpueHRxVUtaYjVmMDgyQVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYHYyYM/uW1Px0jGKVGIQ++yZjB3qsD3l0EkcwRQIhAICwFvxjwqc9T5oEKWqYsqCnKH36tBxMwt7TAi/qkIbaAiBYQTIv4xLttZry7fx0JOQ5AXJO4LRVteGO7EK0nSrcdw==", + "CgIIBg==", + "", + "CgkKAwECAxAEGAo=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_6.block.json-flat.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_6.block.json-flat.json new file mode 100644 index 00000000..bd0ee4c4 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_6.block.json-flat.json @@ -0,0 +1,504 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nfKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV\nWZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr\nX8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF\nAiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.name=Org3MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nfKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV\nWZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr\nX8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF\nAiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nTLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org3MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=4 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Endorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Endorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.LifecycleEndorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.LifecycleEndorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.ACLs.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.ACLs.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.Capabilities.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.Capabilities.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nfKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV\nWZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr\nX8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF\nAiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.name=Org3MSP +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nCn9MH6oeCY2L1BpZpd3WSl88UmRk\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nTLconm/HZr3jYLCFcLZJc/qQvQ2vjvhwE1Q=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.value.type=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org3MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=2 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEQCIGjzBYJQlWYMRiKJuqODIS9WVcqXiQHjBtJYeelF+V47AiADwNFHRXQudKzFBmmJKg1ZrTkMJ0YIb2i6hvjxfdT85Q== +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=n8Cz9hIfaKMEY9y+lJ1jZ3cX812PCLHx +.data.data[0].payload.data.last_update.payload.data.signatures[1].signature=MEUCIQCpHs72hK8etu5NaVzMXtM9vcLxoGUaXvdNUpwx1VbnbQIgE15Ii0RASKrbKzKDWJUJOvKekd1ciMoXqusFpu0qjgY= +.data.data[0].payload.data.last_update.payload.data.signatures[1].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[1].signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.data.signatures[1].signature_header.nonce=HGSN5ZleGzrZNK7YR5s+WjaNbg8k06k/ +.data.data[0].payload.data.last_update.payload.data.signatures[2].signature=MEQCICUpzly1F0xOHS8d/cP8cGaTOkJURSKfH6CdUsVpOBDsAiAG1f+8sFMhmUsymUNnS5fzuKujQrfTgz0es8+KKSlhuQ== +.data.data[0].payload.data.last_update.payload.data.signatures[2].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[2].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.data.signatures[2].signature_header.nonce=6Z8ZYIPPc04ubORCPtpQy2lbCDLTM83S +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2020-02-21T19:56:00Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=v6E9H1twGNPiLZhUXbI8zQbtkCgFncbI +.data.data[0].payload.data.last_update.signature=MEQCIE7S+4B4d2zlZEa41yDpHMToGNs1xgDsldbIFQsnQ5/6AiATvKEgkGRdOqVVSd1SeVhcY7S3TRy1RsiAhkBul3Iaqg== +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:56:00Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=nMuaqhEAmiEQ+Hx1yJ7iJObwc/MN7bJE +.data.data[0].signature=MEQCIEkTd6C2j8KpxITqXsgeNyU0WdcmDXYiVF5F+McGkVzeAiA41/Go8tnTQdxAlnO9kyiGjfKgF+Qatl+rRSdUUF8psQ== +.header.data_hash=cICNR8uwKgWaW7H3txwefCS5v9I4nWvelzqQev8AQjA= +.header.number=6 +.header.previous_hash=SMBuZQTwskzzKa/KY6Omc90UzBQs8ShixafTC7U40bY= +.metadata.metadata[0]=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 +.metadata.metadata[1]=CgIIBg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAo= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_config.block b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_config.block new file mode 100644 index 00000000..41a434a9 Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_config.block differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_config.block.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_config.block.json new file mode 100644 index 00000000..59d0ec99 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_config.block.json @@ -0,0 +1,984 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQU8yMjJkUVdYWVU4L243bXptTWhVVnd3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkZmSUF4SThPbkZNL1NUSGJPZ0Y4c2tLRzd6NDJFS1hkRkErSlVMUWgreDIKc2l1TWQ5YWRBYTZGYnVzVG0yWklWY2RRKzBCVlBNRDdJc3czR0Y3Z1dDR2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU03UGJ6ZXNVc1c2WlJ2cC85RHZEQkl3VFZuUXhmdTJvYmRFUHU0SDRycWMKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNVEFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQWhlSUg2NVBtcUtSTzc2L25pbE1Tall2OUx6c2VtNGZpUW12a2EyZm9FcXNDCklHNzh3OEJlWkdBR0hwZDhIVG42VllCTWgzNzk2KzBkWHdSWlNENVp5cEE3Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIHUn9G/dWy0SuYJgGoiQZ4hQtpc35pNtjiDKn0Df0a5+AiArd4p+qly9+vV2a709SW5zGhJ/MGw0V8AGxFYMK/q0xA==", + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWRDZ0F3SUJBZ0lSQUtQelI2OUd5Ry9DWFZ4VWFHclZKbGN3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NakF3TWpJeE1UZ3lOREF3V2hjTk16QXdNakU0TVRneU5EQXcKV2pCck1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFT01Bd0dBMVVFQ3hNRllXUnRhVzR4SHpBZEJnTlZCQU1NRmtGa2JXbHVRRzl5Clp6SXVaWGhoYlhCc1pTNWpiMjB3V1RBVEJnY3Foa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVFXdDkrTWRXMXIKdU43U2NtT2ZXU0JuV251MnZWNWhyREs0c3Z3c2xpWnYxV0dIdWNkaEdEKzdXY1Z0NU1YVi9BL1lOSWh1bnVSRQp5SUh1VDVYb1dXZUZvMDB3U3pBT0JnTlZIUThCQWY4RUJBTUNCNEF3REFZRFZSMFRBUUgvQkFJd0FEQXJCZ05WCkhTTUVKREFpZ0NBcDlwTkhmWEtwSm1pbGp1czk2KzlYZ0xQbENwUzBnNEpBQUJtd3FkRlZQVEFLQmdncWhrak8KUFFRREFnTkhBREJFQWlCRHI1N0VPYyttWTlCeFhKaHBDM1lERUNwbHNvQm9jZmxjMSsyNG1qMy9qQUlnViswZwpEUEg1RmlNbzY3V2RPOVBCSm1mQ1lTYVBzKzI1dDJJQnZQczN4MHM9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org2MSP" + }, + "nonce": "8yNqnXb2/UtOdJawZlmp+X4Hg2p6NE10" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-08-31T20:51:02Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNLVENDQWRDZ0F3SUJBZ0lSQUtQelI2OUd5Ry9DWFZ4VWFHclZKbGN3Q2dZSUtvWkl6ajBFQXdJd2N6RUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhHVEFYQmdOVkJBb1RFRzl5WnpJdVpYaGhiWEJzWlM1amIyMHhIREFhQmdOVkJBTVRFMk5oCkxtOXlaekl1WlhoaGJYQnNaUzVqYjIwd0hoY05NakF3TWpJeE1UZ3lOREF3V2hjTk16QXdNakU0TVRneU5EQXcKV2pCck1Rc3dDUVlEVlFRR0V3SlZVekVUTUJFR0ExVUVDQk1LUTJGc2FXWnZjbTVwWVRFV01CUUdBMVVFQnhNTgpVMkZ1SUVaeVlXNWphWE5qYnpFT01Bd0dBMVVFQ3hNRllXUnRhVzR4SHpBZEJnTlZCQU1NRmtGa2JXbHVRRzl5Clp6SXVaWGhoYlhCc1pTNWpiMjB3V1RBVEJnY3Foa2pPUFFJQkJnZ3Foa2pPUFFNQkJ3TkNBQVFXdDkrTWRXMXIKdU43U2NtT2ZXU0JuV251MnZWNWhyREs0c3Z3c2xpWnYxV0dIdWNkaEdEKzdXY1Z0NU1YVi9BL1lOSWh1bnVSRQp5SUh1VDVYb1dXZUZvMDB3U3pBT0JnTlZIUThCQWY4RUJBTUNCNEF3REFZRFZSMFRBUUgvQkFJd0FEQXJCZ05WCkhTTUVKREFpZ0NBcDlwTkhmWEtwSm1pbGp1czk2KzlYZ0xQbENwUzBnNEpBQUJtd3FkRlZQVEFLQmdncWhrak8KUFFRREFnTkhBREJFQWlCRHI1N0VPYyttWTlCeFhKaHBDM1lERUNwbHNvQm9jZmxjMSsyNG1qMy9qQUlnViswZwpEUEg1RmlNbzY3V2RPOVBCSm1mQ1lTYVBzKzI1dDJJQnZQczN4MHM9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "Org2MSP" + }, + "nonce": "Y7z3E3MnOemjIEqVbNYpMaaFU2mDSNMJ" + } + } + }, + "signature": "MEUCIQCVQ6ZHzUxQzG6jSsARZeGaoiqfRrZ40BKUwekNWU7z4wIgEcSrLrwx1cA/YFU/iB9th3YUPySGzlHa2LJEuDEWZNU=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-08-31T20:51:03Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNIekNDQWNhZ0F3SUJBZ0lSQU1uN3FsZ0ZzbTVGZ2YxbkN3emtObU13Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR3N4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJBd0RnWURWUVFMRXdkdmNtUmxjbVZ5TVIwd0d3WURWUVFERXhSdmNtUmxjbVZ5TUM1bGVHRnRjR3hsCkxtTnZiVEJaTUJNR0J5cUdTTTQ5QWdFR0NDcUdTTTQ5QXdFSEEwSUFCTHM5bWQrT1dNK3l5RGZkdEc3ajNZUHQKMlBtZkFxWUdLdi9hV2c5N0xWVXNpdndNMkVmRUJ6bkFZMWl0T1E5c2FGUGEvNmI1RTVzVGRKOGhPV2RHQjZhagpUVEJMTUE0R0ExVWREd0VCL3dRRUF3SUhnREFNQmdOVkhSTUJBZjhFQWpBQU1Dc0dBMVVkSXdRa01DS0FJRzVSCk1VZzhkL0RTZUkxM0tsZVRVNlZQTXFDekIyK0wwNHduR2NrNTI4YXdNQW9HQ0NxR1NNNDlCQU1DQTBjQU1FUUMKSUFMMzlkbUozZmpPY1RiUnAyaGFWRUZZWlRka3VobDkyLzBvOUZ2d3pINUpBaUJZUk1yMGJXRDAwdGhQMGdpTgpXSjNsU0JRL0JVWm54dHFVS1piNWYwODJBUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "mspid": "OrdererMSP" + }, + "nonce": "Ps4EHaezVCEVnqSYDO1rokVzVAP/LYSL" + } + } + }, + "signature": "MEUCIQDmjdlchEtHCRMGtkWJ2AABZtNnQZtruKxOXiK4E/lI3QIgBVTxfP/RyrN2hxW/GuexKLqhbgTScYpkEPSeHiZV17Y=" + } + ] + }, + "header": { + "data_hash": "t+RkwHrANlm18w/k8KSz+AqjcyeUN1Cyx1Qbj8XkOAQ=", + "number": "2", + "previous_hash": "4yLv2xq1ik7KKXKhgtVz0mwwKSUSMC3FyfxTAIhiJQ0=" + }, + "metadata": { + "metadata": [ + "ChEKAggCEgsKCQoDAQIDEAQYBhKWBwrKBgqtBgoKT3JkZXJlck1TUBKeBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDSHpDQ0FjYWdBd0lCQWdJUkFNbjdxbGdGc201RmdmMW5Dd3prTm1Nd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUdzeEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SQXdEZ1lEVlFRTEV3ZHZjbVJsY21WeU1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bApMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkxzOW1kK09XTSt5eURmZHRHN2ozWVB0CjJQbWZBcVlHS3YvYVdnOTdMVlVzaXZ3TTJFZkVCem5BWTFpdE9ROXNhRlBhLzZiNUU1c1RkSjhoT1dkR0I2YWoKVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUc1UgpNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3pCMitMMDR3bkdjazUyOGF3TUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDCklBTDM5ZG1KM2ZqT2NUYlJwMmhhVkVGWVpUZGt1aGw5Mi8wbzlGdnd6SDVKQWlCWVJNcjBiV0QwMHRoUDBnaU4KV0ozbFNCUS9CVVpueHRxVUtaYjVmMDgyQVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYv1nHlxx3URiYOnPzfvnp/KNhKsjf+MFzEkcwRQIhAL2Cv198o9zQyOkhCVEC0aUFuJkK6elxQ+zRo5YDAwUtAiAjJ3az5WwgYyzwyICeaysBj0AYX253xNFVs6c1MFFB+Q==", + "CgIIAg==", + "", + "CgkKAwECAxAEGAY=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_config.block.json-flat.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_config.block.json-flat.json new file mode 100644 index 00000000..797aedcf --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/businesschannel_config.block.json-flat.json @@ -0,0 +1,366 @@ +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org1.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK\n3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG\nSM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=3 +.data.data[0].payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.policy=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].host=peer0.org2.example.com +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.value.anchor_peers[0].port=7051 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.AnchorPeers.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.value=None +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature=MEQCIHUn9G/dWy0SuYJgGoiQZ4hQtpc35pNtjiDKn0Df0a5+AiArd4p+qly9+vV2a709SW5zGhJ/MGw0V8AGxFYMK/q0xA== +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.data.signatures[0].signature_header.nonce=8yNqnXb2/UtOdJawZlmp+X4Hg2p6NE10 +.data.data[0].payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.last_update.payload.header.channel_header.timestamp=2020-08-31T20:51:02Z +.data.data[0].payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----\nMIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y\nZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r\nuN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE\nyIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV\nHSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO\nPQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.last_update.payload.header.signature_header.creator.mspid=Org2MSP +.data.data[0].payload.data.last_update.payload.header.signature_header.nonce=Y7z3E3MnOemjIEqVbNYpMaaFU2mDSNMJ +.data.data[0].payload.data.last_update.signature=MEUCIQCVQ6ZHzUxQzG6jSsARZeGaoiqfRrZ40BKUwekNWU7z4wIgEcSrLrwx1cA/YFU/iB9th3YUPySGzlHa2LJEuDEWZNU= +.data.data[0].payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-08-31T20:51:03Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=Ps4EHaezVCEVnqSYDO1rokVzVAP/LYSL +.data.data[0].signature=MEUCIQDmjdlchEtHCRMGtkWJ2AABZtNnQZtruKxOXiK4E/lI3QIgBVTxfP/RyrN2hxW/GuexKLqhbgTScYpkEPSeHiZV17Y= +.header.data_hash=t+RkwHrANlm18w/k8KSz+AqjcyeUN1Cyx1Qbj8XkOAQ= +.header.number=2 +.header.previous_hash=4yLv2xq1ik7KKXKhgtVz0mwwKSUSMC3FyfxTAIhiJQ0= +.metadata.metadata[0]=ChEKAggCEgsKCQoDAQIDEAQYBhKWBwrKBgqtBgoKT3JkZXJlck1TUBKeBi0tLS0tQkVHSU4gQ0VSVElGSUNBVEUtLS0tLQpNSUlDSHpDQ0FjYWdBd0lCQWdJUkFNbjdxbGdGc201RmdmMW5Dd3prTm1Nd0NnWUlLb1pJemowRUF3SXdhVEVMCk1Ba0dBMVVFQmhNQ1ZWTXhFekFSQmdOVkJBZ1RDa05oYkdsbWIzSnVhV0V4RmpBVUJnTlZCQWNURFZOaGJpQkcKY21GdVkybHpZMjh4RkRBU0JnTlZCQW9UQzJWNFlXMXdiR1V1WTI5dE1SY3dGUVlEVlFRREV3NWpZUzVsZUdGdApjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUdzeEN6QUpCZ05WCkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaGJtTnAKYzJOdk1SQXdEZ1lEVlFRTEV3ZHZjbVJsY21WeU1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1DNWxlR0Z0Y0d4bApMbU52YlRCWk1CTUdCeXFHU000OUFnRUdDQ3FHU000OUF3RUhBMElBQkxzOW1kK09XTSt5eURmZHRHN2ozWVB0CjJQbWZBcVlHS3YvYVdnOTdMVlVzaXZ3TTJFZkVCem5BWTFpdE9ROXNhRlBhLzZiNUU1c1RkSjhoT1dkR0I2YWoKVFRCTE1BNEdBMVVkRHdFQi93UUVBd0lIZ0RBTUJnTlZIUk1CQWY4RUFqQUFNQ3NHQTFVZEl3UWtNQ0tBSUc1UgpNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3pCMitMMDR3bkdjazUyOGF3TUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDCklBTDM5ZG1KM2ZqT2NUYlJwMmhhVkVGWVpUZGt1aGw5Mi8wbzlGdnd6SDVKQWlCWVJNcjBiV0QwMHRoUDBnaU4KV0ozbFNCUS9CVVpueHRxVUtaYjVmMDgyQVE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tChIYv1nHlxx3URiYOnPzfvnp/KNhKsjf+MFzEkcwRQIhAL2Cv198o9zQyOkhCVEC0aUFuJkK6elxQ+zRo5YDAwUtAiAjJ3az5WwgYyzwyICeaysBj0AYX253xNFVs6c1MFFB+Q== +.metadata.metadata[1]=CgIIAg== +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAY= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/config_delta.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/config_delta.json new file mode 100644 index 00000000..853818c6 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/config_delta.json @@ -0,0 +1,308 @@ +{ + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRTjByWUtHUUhpTVlDR3cyZkVvWGoxVEFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTXk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NeTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3pMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jekxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKZktTOWNOQTViOWtMNFordjdwellWb283SFp6UE84NW1IZnJBS0c0UXpTaFBXdytOUUdBNGdrOEcrd0p5eUFqVgpXWlpwei9Qb0RHdFFtUTRBbWtuOW9xTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQnIKWDhNaThqVGJaM2hEU1lSWmF5ODR1dU92UjRKT1VYQmV6V3FtdE9MVFJUQUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBdkE2WHhJMlpkS2RhNnZxUVBJbENuV2dhRCs0MW91YnpITHBHU3RFem4zZ0NJRlVnaTJCVG4xVWpNd1VyCkNuOU1INm9lQ1kyTDFCcFpwZDNXU2w4OFVtUmsKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "2" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/config_delta.pb b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/config_delta.pb new file mode 100644 index 00000000..0df87c20 Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/config_delta.pb differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/config_delta_env.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/config_delta_env.json new file mode 100644 index 00000000..6cc35977 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/config_delta_env.json @@ -0,0 +1,320 @@ +{ + "payload": { + "header": { + "channel_header": { + "channel_id": "businesschannel", + "type": 2 + } + }, + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + } + }, + "mod_policy": "", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Endorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Readers": { + "mod_policy": "", + "policy": null, + "version": "0" + }, + "Writers": { + "mod_policy": "", + "policy": null, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "", + "value": null, + "version": "0" + }, + "Capabilities": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "2" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + } + } + } +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/config_delta_env.pb b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/config_delta_env.pb new file mode 100644 index 00000000..0322c53e Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/config_delta_env.pb differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block new file mode 100644 index 00000000..5c13fca9 Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block.json new file mode 100644 index 00000000..83517d28 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block.json-flat.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block.json-flat.json new file mode 100644 index 00000000..ff01211b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block.json-flat.json @@ -0,0 +1,280 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T18:29:19Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq +.data.data[0].signature=None +.header.data_hash=1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block_updated.block b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block_updated.block new file mode 100644 index 00000000..30ea50df Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block_updated.block differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block_updated.block.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block_updated.block.json new file mode 100644 index 00000000..fd693197 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block_updated.block.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 100, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQU8yMjJkUVdYWVU4L243bXptTWhVVnd3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkZmSUF4SThPbkZNL1NUSGJPZ0Y4c2tLRzd6NDJFS1hkRkErSlVMUWgreDIKc2l1TWQ5YWRBYTZGYnVzVG0yWklWY2RRKzBCVlBNRDdJc3czR0Y3Z1dDR2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU03UGJ6ZXNVc1c2WlJ2cC85RHZEQkl3VFZuUXhmdTJvYmRFUHU0SDRycWMKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNVEFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQWhlSUg2NVBtcUtSTzc2L25pbE1Tall2OUx6c2VtNGZpUW12a2EyZm9FcXNDCklHNzh3OEJlWkdBR0hwZDhIVG42VllCTWgzNzk2KzBkWHdSWlNENVp5cEE3Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block_updated.block.json-flat.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block_updated.block.json-flat.json new file mode 100644 index 00000000..959f6799 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block_updated.block.json-flat.json @@ -0,0 +1,280 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs\nc2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy\nNDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE\nBxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G\nA1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49\nAwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP\n21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV\nHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV\nHQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E\nAwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=100 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK\n3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG\nSM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T18:29:19Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq +.data.data[0].signature=None +.header.data_hash=1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block_updated.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block_updated.json new file mode 100644 index 00000000..093b45f4 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer0.genesis.block_updated.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 100, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer1.genesis.block b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer1.genesis.block new file mode 100644 index 00000000..5c13fca9 Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer1.genesis.block differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer1.genesis.block.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer1.genesis.block.json new file mode 100644 index 00000000..83517d28 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer1.genesis.block.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer1.genesis.block.json-flat.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer1.genesis.block.json-flat.json new file mode 100644 index 00000000..ff01211b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer1.genesis.block.json-flat.json @@ -0,0 +1,280 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T18:29:19Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq +.data.data[0].signature=None +.header.data_hash=1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer2.genesis.block b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer2.genesis.block new file mode 100644 index 00000000..5c13fca9 Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer2.genesis.block differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer2.genesis.block.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer2.genesis.block.json new file mode 100644 index 00000000..83517d28 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer2.genesis.block.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer2.genesis.block.json-flat.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer2.genesis.block.json-flat.json new file mode 100644 index 00000000..ff01211b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/orderer2.genesis.block.json-flat.json @@ -0,0 +1,280 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T18:29:19Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq +.data.data[0].signature=None +.header.data_hash=1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/original_config.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/original_config.json new file mode 100644 index 00000000..fae25ef9 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/original_config.json @@ -0,0 +1,794 @@ +{ + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRekNDQWVxZ0F3SUJBZ0lSQUxyaEJQM1RjYzVrWWV3d3ZGMjNBVTR3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUd3eEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SUXdFZ1lEVlFRS0V3dGxlR0Z0Y0d4bExtTnZiVEVhTUJnR0ExVUVBeE1SZEd4elkyRXVaWGhoCmJYQnNaUzVqYjIwd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFSMTl5V1VYN29WK1FoQlJzMU8KSk1aZTl6am14YWFEVy9YZHVpRGNTY2RsN1BVcjRMVXNmcmVqdytmbStXS1pNTzd1Tjk3dFBqQSt0VHdMQ1BZWQphOE1xbzIwd2F6QU9CZ05WSFE4QkFmOEVCQU1DQWFZd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3SUdDQ3NHCkFRVUZCd01CTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3S1FZRFZSME9CQ0lFSU03UGJ6ZXNVc1c2WlJ2cC85RHYKREJJd1RWblF4ZnUyb2JkRVB1NEg0cnFjTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUh0bis2NlFGSXIxVHd0SwpwRXdUZ2kwTVYwa0tPd0VJUVdWU3l4TW45aS9mQWlCUWw0YWYzZVh1ZWV4eUZMcTJGemxLT0ExVXBXNTJsRmo1CnZmakt5aHh5WUE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRUy9LN2NrWDNYYmZyRGhmelFrVlF0VEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFWXRCcElueFJIenRmTVM2UVd3QThUZEJ3TlIvb2lrV0VqM3FiTFdlUVgvY1IKZjBTbXdCUkZlTWk0UE5wV3MxK2RucVFYSGVLT25VaVJyaHhlMUJLMnpxT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pJdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXlNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSUZQWkxOWVNDTlo1cEpwMDZxRThNZVUyOEI4dGlsc3ZJdVB1c2ZRVmRLOFhBaUFUCkplZ0ZYTitpQlpUeXBoeGk0R2lsY0d4WUExQ1hlSlhGS2hhdEZFS2NlZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/original_config.pb b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/original_config.pb new file mode 100644 index 00000000..1f73191b Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/original_config.pb differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_0.block b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_0.block new file mode 100644 index 00000000..5c13fca9 Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_0.block differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_0.block.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_0.block.json new file mode 100644 index 00000000..83517d28 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_0.block.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRekNDQWVxZ0F3SUJBZ0lSQUxyaEJQM1RjYzVrWWV3d3ZGMjNBVTR3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUd3eEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SUXdFZ1lEVlFRS0V3dGxlR0Z0Y0d4bExtTnZiVEVhTUJnR0ExVUVBeE1SZEd4elkyRXVaWGhoCmJYQnNaUzVqYjIwd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFSMTl5V1VYN29WK1FoQlJzMU8KSk1aZTl6am14YWFEVy9YZHVpRGNTY2RsN1BVcjRMVXNmcmVqdytmbStXS1pNTzd1Tjk3dFBqQSt0VHdMQ1BZWQphOE1xbzIwd2F6QU9CZ05WSFE4QkFmOEVCQU1DQWFZd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3SUdDQ3NHCkFRVUZCd01CTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3S1FZRFZSME9CQ0lFSU03UGJ6ZXNVc1c2WlJ2cC85RHYKREJJd1RWblF4ZnUyb2JkRVB1NEg0cnFjTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUh0bis2NlFGSXIxVHd0SwpwRXdUZ2kwTVYwa0tPd0VJUVdWU3l4TW45aS9mQWlCUWw0YWYzZVh1ZWV4eUZMcTJGemxLT0ExVXBXNTJsRmo1CnZmakt5aHh5WUE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRUy9LN2NrWDNYYmZyRGhmelFrVlF0VEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFWXRCcElueFJIenRmTVM2UVd3QThUZEJ3TlIvb2lrV0VqM3FiTFdlUVgvY1IKZjBTbXdCUkZlTWk0UE5wV3MxK2RucVFYSGVLT25VaVJyaHhlMUJLMnpxT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pJdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXlNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSUZQWkxOWVNDTlo1cEpwMDZxRThNZVUyOEI4dGlsc3ZJdVB1c2ZRVmRLOFhBaUFUCkplZ0ZYTitpQlpUeXBoeGk0R2lsY0d4WUExQ1hlSlhGS2hhdEZFS2NlZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_0.block.json-flat.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_0.block.json-flat.json new file mode 100644 index 00000000..ff01211b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_0.block.json-flat.json @@ -0,0 +1,280 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICVzCCAf6gAwIBAgIRAO6qH2h7Vbj/shPdbELYKD0wCgYIKoZIzj0EAwIwdjEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHzAdBgNVBAMTFnRs\nc2NhLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgy\nNDAwWjB2MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE\nBxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEfMB0G\nA1UEAxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49\nAwEHA0IABEthuJzcUGbG0V5S0Y6yr3WXL/EKHz957e9PDTlaY6+DChvsf6z8C1MP\n21OhoXzTmtc+CQ/9lNwnG2lwRmLJjhijbTBrMA4GA1UdDwEB/wQEAwIBpjAdBgNV\nHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDwYDVR0TAQH/BAUwAwEB/zApBgNV\nHQ4EIgQgtRojhO6EbTUIFulDDycaSC+ORw8HZN5lvJrKzl0pfQAwCgYIKoZIzj0E\nAwIDRwAwRAIgcvTVgxUB0uYWJYX4dlPAnlsIWrqgbdjJnIpVui9dmXcCID3W4fRk\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK\n3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG\nSM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l\neGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ\nBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh\nbmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49\nAgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2\nsiuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/\nBAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E\nAjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc\nMCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq\nhkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR\nf0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG\nSM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T18:29:19Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq +.data.data[0].signature=None +.header.data_hash=1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_1.block b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_1.block new file mode 100644 index 00000000..fedeca33 Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_1.block differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_1.block.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_1.block.json new file mode 100644 index 00000000..a827afaf --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_1.block.json @@ -0,0 +1,1145 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVRENDQWZlZ0F3SUJBZ0lRVGtlMGpSbHlqeFhxd3hvUVIvUzdRakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTWk1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NaTVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3lMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKc3ptcjVkaG9oMWJsU3o4T1QrNkF0TDJrTDNWS0E3eTBnb2hybzdRajhRQjZsUWEzc0JJRGdDa2FrcXBpOUJvMApnT2pNUWZtZmp4emEvaXE2QzlxTnZLTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQXAKOXBOSGZYS3BKbWlsanVzOTYrOVhnTFBsQ3BTMGc0SkFBQm13cWRGVlBUQUtCZ2dxaGtqT1BRUURBZ05IQURCRQpBaUExU05YSDN6aE5tSEJTQmp1VTBFaGhKK0dQN3VNVUtNak5LcTNxdWFqMGpBSWdDcEJHdG80TWVEZjBEWXBhCkMvU3M5TFIralRoa2wxcUh6VlFZWHVqY3psVT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYRENDQWdLZ0F3SUJBZ0lRWHdyWjY4T2daaVRuL1YycTRFVlN2ekFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJd0xtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFakhMdXpPNkgvNEkxdHBXOEVaNi9tY1NUYyt1MzZ0VXViblZjWWtxaEE3c0sKM1NrUXhLdCttUVE2TVo5d0xvWjdEc1dWVDdIRzV1YzN1VXBxSE82SzZLT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pBdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXdNQW9HQ0NxRwpTTTQ5QkFNQ0EwZ0FNRVVDSVFDUldsSmNrR1lpUmtkU1VwdzFmak4ybU5wUDF0TS9KSWtMTTR0cVRVZCtDZ0lnClVNeXBJZXdmRGZEOXNUaE12UEt3YlVjOW9TWnZ5WE44bzdNWjJJVUw2dDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQU8yMjJkUVdYWVU4L243bXptTWhVVnd3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkZmSUF4SThPbkZNL1NUSGJPZ0Y4c2tLRzd6NDJFS1hkRkErSlVMUWgreDIKc2l1TWQ5YWRBYTZGYnVzVG0yWklWY2RRKzBCVlBNRDdJc3czR0Y3Z1dDR2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU03UGJ6ZXNVc1c2WlJ2cC85RHZEQkl3VFZuUXhmdTJvYmRFUHU0SDRycWMKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNVEFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQWhlSUg2NVBtcUtSTzc2L25pbE1Tall2OUx6c2VtNGZpUW12a2EyZm9FcXNDCklHNzh3OEJlWkdBR0hwZDhIVG42VllCTWgzNzk2KzBkWHdSWlNENVp5cEE3Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNXekNDQWdLZ0F3SUJBZ0lRUy9LN2NrWDNYYmZyRGhmelFrVlF0VEFLQmdncWhrak9QUVFEQWpCc01Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVVNQklHQTFVRUNoTUxaWGhoYlhCc1pTNWpiMjB4R2pBWUJnTlZCQU1URVhSc2MyTmhMbVY0CllXMXdiR1V1WTI5dE1CNFhEVEl3TURJeU1URTRNalF3TUZvWERUTXdNREl4T0RFNE1qUXdNRm93V1RFTE1Ba0cKQTFVRUJoTUNWVk14RXpBUkJnTlZCQWdUQ2tOaGJHbG1iM0p1YVdFeEZqQVVCZ05WQkFjVERWTmhiaUJHY21GdQpZMmx6WTI4eEhUQWJCZ05WQkFNVEZHOXlaR1Z5WlhJeUxtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDCkFRWUlLb1pJemowREFRY0RRZ0FFWXRCcElueFJIenRmTVM2UVd3QThUZEJ3TlIvb2lrV0VqM3FiTFdlUVgvY1IKZjBTbXdCUkZlTWk0UE5wV3MxK2RucVFYSGVLT25VaVJyaHhlMUJLMnpxT0JtRENCbFRBT0JnTlZIUThCQWY4RQpCQU1DQmFBd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUdDQ3NHQVFVRkJ3TUNNQXdHQTFVZEV3RUIvd1FDCk1BQXdLd1lEVlIwakJDUXdJb0FnenM5dk42eFN4YnBsRytuLzBPOE1FakJOV2RERis3YWh0MFErN2dmaXVwd3cKS1FZRFZSMFJCQ0l3SUlJVWIzSmtaWEpsY2pJdVpYaGhiWEJzWlM1amIyMkNDRzl5WkdWeVpYSXlNQW9HQ0NxRwpTTTQ5QkFNQ0EwY0FNRVFDSUZQWkxOWVNDTlo1cEpwMDZxRThNZVUyOEI4dGlsc3ZJdVB1c2ZRVmRLOFhBaUFUCkplZ0ZYTitpQlpUeXBoeGk0R2lsY0d4WUExQ1hlSlhGS2hhdEZFS2NlZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "1" + }, + "last_update": { + "payload": { + "data": { + "config_update": { + "channel_id": "businesschannel", + "isolated_data": {}, + "read_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": null, + "version": "0" + } + }, + "version": "0" + }, + "write_set": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "", + "policies": {}, + "values": {}, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + } + }, + "mod_policy": "", + "policies": {}, + "values": { + "Consortium": { + "mod_policy": "", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "signatures": [ + { + "signature": "MEQCIHl5tw0dJCuXzcqHcfLXFvUD/YNoWPmeREidc4zMwn0yAiA8JSXS7hawx4tUpC70tH0hD7nbu64YJMo6CeziRbjoqA==", + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "EslhB3qiUNOWOqIIbqyBqXsqUK5xUGtj" + } + } + ] + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:34Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 2, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "Org1MSP" + }, + "nonce": "otcA7DSe1cWFapZY0OSA5ufJRvLb6A5g" + } + } + }, + "signature": "MEUCIQDByj4s/Dk6ICU5EIJd7CZZSAiequ79EX46StktsMWGXgIgKqtEK1ej4Eg/V5UqCO5e0QfFniKa0jn3ZMGBzLPg9CY=" + } + }, + "header": { + "channel_header": { + "channel_id": "businesschannel", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:35Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 1, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "sCr7l2QO4XG1CD/iNIK/i3ZrxG8usO9n" + } + } + }, + "signature": "MEQCIBKPQ0+EhbuhOL8o4Z9UG1mxqsZ9++XA5Qb01J1TRpUsAiBmgxWfd/5LLFAVy8yhNb1aGUr9okTcH2Aecy8in+JlAw==" + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T19:54:35Z", + "tls_cert_hash": null, + "tx_id": "", + "type": 4, + "version": 0 + }, + "signature_header": { + "creator": { + "id_bytes": "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", + "mspid": "OrdererMSP" + }, + "nonce": "PpSPZ2iBOPdeeEzW+8In8aKYLxbAHrdh" + } + } + }, + "signature": "MEQCIFsRSBwhvLb5xfhW6ZAhKueu2QpwxZd+diRd498aXSihAiBDoyM4GOeIaH8uITkw1Us7t52zyY5qWz0WLDjHoKuH1g==" + } + ] + }, + "header": { + "data_hash": "7Hp5W25DEq6DyXo0UO2gl1ZS0MIfDgpwBu2tH/oK68k=", + "number": "1", + "previous_hash": "SFWt72zbImlxzW8cga/Dqp5NciJuDm8Pp8nGZPEEIjY=" + }, + "metadata": { + "metadata": [ + "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", + "", + "", + "CgkKAwECAxAEGAU=", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_1.block.json-flat.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_1.block.json-flat.json new file mode 100644 index 00000000..254f270e --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_1.block.json-flat.json @@ -0,0 +1,418 @@ +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nszmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0\ngOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp\n9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE\nAiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Application.version=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.Consortium.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.payload.data.config.channel_group.values.Consortium.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.payload.data.config.channel_group.version=0 +.data.data[0].payload.data.payload.data.config.sequence=1 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.channel_id=businesschannel +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.groups.Application.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.values.Consortium.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.values.Consortium.value=None +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.values.Consortium.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.read_set.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org1MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.groups.Org2MSP.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Admins.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Endorsement.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.rule=MAJORITY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.policy.value.sub_policy=Endorsement +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.LifecycleEndorsement.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Readers.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.type=3 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.policies.Writers.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/CommitChaincodeDefinition.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryChaincodeDefinition.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls._lifecycle/QueryNamespaceDefinitions.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/GetConfigTree.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.cscc/SimulateConfigTreeUpdate.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/Block.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.event/FilteredBlock.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/ChaincodeExists.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetChaincodeData.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetDeploymentSpec.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.lscc/GetInstantiatedChaincodes.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/ChaincodeToChaincode.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.peer/Propose.policy_ref=/Channel/Application/Writers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByHash.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByNumber.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetBlockByTxID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetChainInfo.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.value.acls.qscc/GetTransactionByID.policy_ref=/Channel/Application/Readers +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.ACLs.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.values.Capabilities.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.groups.Application.version=1 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.values.Consortium.mod_policy= +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.values.Consortium.value.name=SampleConsortium +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.values.Consortium.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.config_update.write_set.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature=MEQCIHl5tw0dJCuXzcqHcfLXFvUD/YNoWPmeREidc4zMwn0yAiA8JSXS7hawx4tUpC70tH0hD7nbu64YJMo6CeziRbjoqA== +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.payload.data.last_update.payload.data.signatures[0].signature_header.nonce=EslhB3qiUNOWOqIIbqyBqXsqUK5xUGtj +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.extension=None +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.timestamp=2020-02-21T19:54:34Z +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.tx_id= +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.type=2 +.data.data[0].payload.data.payload.data.last_update.payload.header.channel_header.version=0 +.data.data[0].payload.data.payload.data.last_update.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.data.last_update.payload.header.signature_header.creator.mspid=Org1MSP +.data.data[0].payload.data.payload.data.last_update.payload.header.signature_header.nonce=otcA7DSe1cWFapZY0OSA5ufJRvLb6A5g +.data.data[0].payload.data.payload.data.last_update.signature=MEUCIQDByj4s/Dk6ICU5EIJd7CZZSAiequ79EX46StktsMWGXgIgKqtEK1ej4Eg/V5UqCO5e0QfFniKa0jn3ZMGBzLPg9CY= +.data.data[0].payload.data.payload.header.channel_header.channel_id=businesschannel +.data.data[0].payload.data.payload.header.channel_header.epoch=0 +.data.data[0].payload.data.payload.header.channel_header.extension=None +.data.data[0].payload.data.payload.header.channel_header.timestamp=2020-02-21T19:54:35Z +.data.data[0].payload.data.payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.data.payload.header.channel_header.tx_id= +.data.data[0].payload.data.payload.header.channel_header.type=1 +.data.data[0].payload.data.payload.header.channel_header.version=0 +.data.data[0].payload.data.payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.data.payload.header.signature_header.nonce=sCr7l2QO4XG1CD/iNIK/i3ZrxG8usO9n +.data.data[0].payload.data.signature=MEQCIBKPQ0+EhbuhOL8o4Z9UG1mxqsZ9++XA5Qb01J1TRpUsAiBmgxWfd/5LLFAVy8yhNb1aGUr9okTcH2Aecy8in+JlAw== +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T19:54:35Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id= +.data.data[0].payload.header.channel_header.type=4 +.data.data[0].payload.header.channel_header.version=0 +.data.data[0].payload.header.signature_header.creator.id_bytes=b64(b'-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.header.signature_header.creator.mspid=OrdererMSP +.data.data[0].payload.header.signature_header.nonce=PpSPZ2iBOPdeeEzW+8In8aKYLxbAHrdh +.data.data[0].signature=MEQCIFsRSBwhvLb5xfhW6ZAhKueu2QpwxZd+diRd498aXSihAiBDoyM4GOeIaH8uITkw1Us7t52zyY5qWz0WLDjHoKuH1g== +.header.data_hash=7Hp5W25DEq6DyXo0UO2gl1ZS0MIfDgpwBu2tH/oK68k= +.header.number=1 +.header.previous_hash=SFWt72zbImlxzW8cga/Dqp5NciJuDm8Pp8nGZPEEIjY= +.metadata.metadata[0]=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 +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]=CgkKAwECAxAEGAU= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_config.block b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_config.block new file mode 100644 index 00000000..5c13fca9 Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_config.block differ diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_config.block.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_config.block.json new file mode 100644 index 00000000..83517d28 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_config.block.json @@ -0,0 +1,772 @@ +{ + "data": { + "data": [ + { + "payload": { + "data": { + "config": { + "channel_group": { + "groups": { + "Consortiums": { + "groups": { + "SampleConsortium": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": {}, + "values": { + "ChannelCreationPolicy": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Admins" + } + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "/Channel/Orderer/Admins", + "policies": { + "Admins": { + "mod_policy": "/Channel/Orderer/Admins", + "policy": { + "type": 1, + "value": { + "identities": [], + "rule": { + "n_out_of": { + "n": 0, + "rules": [] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": {}, + "version": "0" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNRekNDQWVxZ0F3SUJBZ0lSQUxyaEJQM1RjYzVrWWV3d3ZGMjNBVTR3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUd3eEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SUXdFZ1lEVlFRS0V3dGxlR0Z0Y0d4bExtTnZiVEVhTUJnR0ExVUVBeE1SZEd4elkyRXVaWGhoCmJYQnNaUzVqYjIwd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DQUFSMTl5V1VYN29WK1FoQlJzMU8KSk1aZTl6am14YWFEVy9YZHVpRGNTY2RsN1BVcjRMVXNmcmVqdytmbStXS1pNTzd1Tjk3dFBqQSt0VHdMQ1BZWQphOE1xbzIwd2F6QU9CZ05WSFE4QkFmOEVCQU1DQWFZd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3SUdDQ3NHCkFRVUZCd01CTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3S1FZRFZSME9CQ0lFSU03UGJ6ZXNVc1c2WlJ2cC85RHYKREJJd1RWblF4ZnUyb2JkRVB1NEg0cnFjTUFvR0NDcUdTTTQ5QkFNQ0EwY0FNRVFDSUh0bis2NlFGSXIxVHd0SwpwRXdUZ2kwTVYwa0tPd0VJUVdWU3l4TW45aS9mQWlCUWw0YWYzZVh1ZWV4eUZMcTJGemxLT0ExVXBXNTJsRmo1CnZmakt5aHh5WUE9PQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNYVENDQWdPZ0F3SUJBZ0lSQU8yMjJkUVdYWVU4L243bXptTWhVVnd3Q2dZSUtvWkl6ajBFQXdJd2JERUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJvd0dBWURWUVFERXhGMGJITmpZUzVsCmVHRnRjR3hsTG1OdmJUQWVGdzB5TURBeU1qRXhPREkwTURCYUZ3MHpNREF5TVRneE9ESTBNREJhTUZreEN6QUoKQmdOVkJBWVRBbFZUTVJNd0VRWURWUVFJRXdwRFlXeHBabTl5Ym1saE1SWXdGQVlEVlFRSEV3MVRZVzRnUm5KaApibU5wYzJOdk1SMHdHd1lEVlFRREV4UnZjbVJsY21WeU1TNWxlR0Z0Y0d4bExtTnZiVEJaTUJNR0J5cUdTTTQ5CkFnRUdDQ3FHU000OUF3RUhBMElBQkZmSUF4SThPbkZNL1NUSGJPZ0Y4c2tLRzd6NDJFS1hkRkErSlVMUWgreDIKc2l1TWQ5YWRBYTZGYnVzVG0yWklWY2RRKzBCVlBNRDdJc3czR0Y3Z1dDR2pnWmd3Z1pVd0RnWURWUjBQQVFILwpCQVFEQWdXZ01CMEdBMVVkSlFRV01CUUdDQ3NHQVFVRkJ3TUJCZ2dyQmdFRkJRY0RBakFNQmdOVkhSTUJBZjhFCkFqQUFNQ3NHQTFVZEl3UWtNQ0tBSU03UGJ6ZXNVc1c2WlJ2cC85RHZEQkl3VFZuUXhmdTJvYmRFUHU0SDRycWMKTUNrR0ExVWRFUVFpTUNDQ0ZHOXlaR1Z5WlhJeExtVjRZVzF3YkdVdVkyOXRnZ2h2Y21SbGNtVnlNVEFLQmdncQpoa2pPUFFRREFnTklBREJGQWlFQWhlSUg2NVBtcUtSTzc2L25pbE1Tall2OUx6c2VtNGZpUW12a2EyZm9FcXNDCklHNzh3OEJlWkdBR0hwZDhIVG42VllCTWgzNzk2KzBkWHdSWlNENVp5cEE3Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "0" + }, + "last_update": null + }, + "header": { + "channel_header": { + "channel_id": "testchainid", + "epoch": "0", + "extension": null, + "timestamp": "2020-02-21T18:29:19Z", + "tls_cert_hash": null, + "tx_id": "0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92", + "type": 1, + "version": 1 + }, + "signature_header": { + "creator": null, + "nonce": "pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq" + } + } + }, + "signature": null + } + ] + }, + "header": { + "data_hash": "1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE=", + "number": "0", + "previous_hash": null + }, + "metadata": { + "metadata": [ + "", + "", + "", + "", + "" + ] + } +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_config.block.json-flat.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_config.block.json-flat.json new file mode 100644 index 00000000..ff01211b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/testchainid_config.block.json-flat.json @@ -0,0 +1,280 @@ +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD\nExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nWDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod\n6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG\nCCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd\nuiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF\nAiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.name=Org1MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n7Kfo8/fWjMqJeM6BBjBoqbvfvJsf\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\n6or0w23NKGGI5/sZpvPz67uYXf9ce+BP0S4j\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org1MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Endorsement.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.msp_identifier=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.name=Org2MSP +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nC/Ss9LR+jThkl1qHzVQYXujczlU=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nSSipkR49ZhbEoVrt/vmdji6QkDYu3SYz2Rk7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.groups.Org2MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.type=3 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.value.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.values.ChannelCreationPolicy.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.groups.SampleConsortium.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.rule.n_out_of.n=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Consortiums.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal.role=ADMIN +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.type=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.msp_identifier=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal.role=MEMBER +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.identities[0].principal_classification=ROLE +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.n=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.rule.n_out_of.rules[0].signed_by=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.policy.value.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.identity_identifier_hash_function=SHA256 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.crypto_config.signature_hash_family=SHA2 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.admin_ou_identifier.organizational_unit_identifier=admin +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.client_ou_identifier.organizational_unit_identifier=client +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.enable=True +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.orderer_ou_identifier.organizational_unit_identifier=orderer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.certificate=b64(b'-----BEGIN CERTIFICATE-----\nMIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j\nb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL\nE50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w\nazAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB\nMA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz\nB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl\nK+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.fabric_node_ous.peer_ou_identifier.organizational_unit_identifier=peer +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.name=OrdererMSP +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nnw==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.signing_identity=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.config.tls_root_certs[0]=b64(b'-----BEGIN CERTIFICATE-----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\nvfjKyhxyYA==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.value.type=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.values.MSP.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.groups.OrdererOrg.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.BlockValidation.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.groups.Orderer.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.absolute_max_bytes=10485760 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count=500 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.preferred_max_bytes=2097152 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.value.timeout=2s +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchTimeout.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.value=None +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ChannelRestrictions.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----\nMIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4\nYW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG\nA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu\nY2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C\nAQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK\n3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E\nBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC\nMAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww\nKQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG\nSM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].host=orderer0.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].port=7055 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[0].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nUMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0=\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].host=orderer1.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[1].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nIG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].client_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].host=orderer2.example.com +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].port=7050 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.consenters[2].server_tls_cert=b64(b'-----BEGIN CERTIFICATE-----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\nJegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg==\n-----END CERTIFICATE-----\n') +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.election_tick=10 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.heartbeat_tick=1 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.max_inflight_blocks=5 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.snapshot_interval_size=20971520 +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.metadata.options.tick_interval=500ms +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.state=STATE_NORMAL +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.value.type=etcdraft +.data.data[0].payload.data.config.channel_group.groups.Orderer.values.ConsensusType.version=0 +.data.data[0].payload.data.config.channel_group.groups.Orderer.version=0 +.data.data[0].payload.data.config.channel_group.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.rule=MAJORITY +.data.data[0].payload.data.config.channel_group.policies.Admins.policy.value.sub_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Admins.version=0 +.data.data[0].payload.data.config.channel_group.policies.Readers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Readers.policy.value.sub_policy=Readers +.data.data[0].payload.data.config.channel_group.policies.Readers.version=0 +.data.data[0].payload.data.config.channel_group.policies.Writers.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.type=3 +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.rule=ANY +.data.data[0].payload.data.config.channel_group.policies.Writers.policy.value.sub_policy=Writers +.data.data[0].payload.data.config.channel_group.policies.Writers.version=0 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.value.width=4294967295 +.data.data[0].payload.data.config.channel_group.values.BlockDataHashingStructure.version=0 +.data.data[0].payload.data.config.channel_group.values.Capabilities.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.Capabilities.version=0 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.mod_policy=Admins +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.value.name=SHA256 +.data.data[0].payload.data.config.channel_group.values.HashingAlgorithm.version=0 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.mod_policy=/Channel/Orderer/Admins +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[0]=orderer0.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[1]=orderer1.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.value.addresses[2]=orderer2.example.com:7050 +.data.data[0].payload.data.config.channel_group.values.OrdererAddresses.version=0 +.data.data[0].payload.data.config.channel_group.version=0 +.data.data[0].payload.data.config.sequence=0 +.data.data[0].payload.data.last_update=None +.data.data[0].payload.header.channel_header.channel_id=testchainid +.data.data[0].payload.header.channel_header.epoch=0 +.data.data[0].payload.header.channel_header.extension=None +.data.data[0].payload.header.channel_header.timestamp=2020-02-21T18:29:19Z +.data.data[0].payload.header.channel_header.tls_cert_hash=None +.data.data[0].payload.header.channel_header.tx_id=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 +.data.data[0].payload.header.channel_header.type=1 +.data.data[0].payload.header.channel_header.version=1 +.data.data[0].payload.header.signature_header.creator=None +.data.data[0].payload.header.signature_header.nonce=pyQLnSv4aLIcTSab2SN6XZk2tYWLfteq +.data.data[0].signature=None +.header.data_hash=1UovcT3Q1dsWOsIM9vkF4nY/iRXoEoj1gI/i3GY2IEE= +.header.number=0 +.header.previous_hash=None +.metadata.metadata[0]= +.metadata.metadata[1]= +.metadata.metadata[2]= +.metadata.metadata[3]= +.metadata.metadata[4]= diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/updated_config.json b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/updated_config.json new file mode 100644 index 00000000..885fa650 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/updated_config.json @@ -0,0 +1,964 @@ +{ + "channel_group": { + "groups": { + "Application": { + "groups": { + "Org1MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org1MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org1.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org1MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNVVENDQWZlZ0F3SUJBZ0lRSDBpWTZaWCtXVlQ4MldHeGlBQTRZakFLQmdncWhrak9QUVFEQWpCek1Rc3cKQ1FZRFZRUUdFd0pWVXpFVE1CRUdBMVVFQ0JNS1EyRnNhV1p2Y201cFlURVdNQlFHQTFVRUJ4TU5VMkZ1SUVaeQpZVzVqYVhOamJ6RVpNQmNHQTFVRUNoTVFiM0puTVM1bGVHRnRjR3hsTG1OdmJURWNNQm9HQTFVRUF4TVRZMkV1CmIzSm5NUzVsZUdGdGNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmEKTUhNeEN6QUpCZ05WQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVApZVzRnUm5KaGJtTnBjMk52TVJrd0Z3WURWUVFLRXhCdmNtY3hMbVY0WVcxd2JHVXVZMjl0TVJ3d0dnWURWUVFECkV4TmpZUzV2Y21jeExtVjRZVzF3YkdVdVkyOXRNRmt3RXdZSEtvWkl6ajBDQVFZSUtvWkl6ajBEQVFjRFFnQUUKV0RkQlJKS2lWUEJjanM0WmNMemZRdkw4NnVDalNUU1ZFaHFCblpWeTNxV1g0dXFoWTVjQlRLb2kzb3RBZnNvZAo2bjB3a0RlazJmekJhTUM4blArditxTnRNR3N3RGdZRFZSMFBBUUgvQkFRREFnR21NQjBHQTFVZEpRUVdNQlFHCkNDc0dBUVVGQndNQ0JnZ3JCZ0VGQlFjREFUQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01Da0dBMVVkRGdRaUJDQ2QKdWlHdUh5cDNEWFpkSy80TU1aUTV0anljSnNFZjVydVU2cElPaGNEVE56QUtCZ2dxaGtqT1BRUURBZ05JQURCRgpBaUVBai9GOVhhbzdtZW44Tm9ucGgxNmJmVmY5Zzlka1NYNTc2ZXFVSnpLRXFtWUNJQ2FtemVQd0wwR3IvQ0tLCjdLZm84L2ZXak1xSmVNNkJCakJvcWJ2ZnZKc2YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org2MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org2MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "AnchorPeers": { + "mod_policy": "Admins", + "value": { + "anchor_peers": [ + { + "host": "peer0.org2.example.com", + "port": 7051 + } + ] + }, + "version": "0" + }, + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org2MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "1" + }, + "Org3MSP": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "Org3MSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "Org3MSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Endorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "LifecycleEndorsement": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Endorsement" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "ACLs": { + "mod_policy": "Admins", + "value": { + "acls": { + "_lifecycle/CommitChaincodeDefinition": { + "policy_ref": "/Channel/Application/Writers" + }, + "_lifecycle/QueryChaincodeDefinition": { + "policy_ref": "/Channel/Application/Readers" + }, + "_lifecycle/QueryNamespaceDefinitions": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/GetConfigTree": { + "policy_ref": "/Channel/Application/Readers" + }, + "cscc/SimulateConfigTreeUpdate": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/Block": { + "policy_ref": "/Channel/Application/Readers" + }, + "event/FilteredBlock": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/ChaincodeExists": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetChaincodeData": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetDeploymentSpec": { + "policy_ref": "/Channel/Application/Readers" + }, + "lscc/GetInstantiatedChaincodes": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/ChaincodeToChaincode": { + "policy_ref": "/Channel/Application/Readers" + }, + "peer/Propose": { + "policy_ref": "/Channel/Application/Writers" + }, + "qscc/GetBlockByHash": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByNumber": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetBlockByTxID": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetChainInfo": { + "policy_ref": "/Channel/Application/Readers" + }, + "qscc/GetTransactionByID": { + "policy_ref": "/Channel/Application/Readers" + } + } + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + } + }, + "version": "1" + }, + "Orderer": { + "groups": { + "OrdererOrg": { + "groups": {}, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "ADMIN" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 1, + "value": { + "identities": [ + { + "principal": { + "msp_identifier": "OrdererMSP", + "role": "MEMBER" + }, + "principal_classification": "ROLE" + } + ], + "rule": { + "n_out_of": { + "n": 1, + "rules": [ + { + "signed_by": 0 + } + ] + } + }, + "version": 0 + } + }, + "version": "0" + } + }, + "values": { + "MSP": { + "mod_policy": "Admins", + "value": { + "config": { + "admins": [], + "crypto_config": { + "identity_identifier_hash_function": "SHA256", + "signature_hash_family": "SHA2" + }, + "fabric_node_ous": { + "admin_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "admin" + }, + "client_ou_identifier": { + "certificate": "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", + "organizational_unit_identifier": "client" + }, + "enable": true, + "orderer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "orderer" + }, + "peer_ou_identifier": { + "certificate": "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNQVENDQWVTZ0F3SUJBZ0lSQU9QQmoybjVqZ1V4TFpGNHZWQUh3WDB3Q2dZSUtvWkl6ajBFQXdJd2FURUwKTUFrR0ExVUVCaE1DVlZNeEV6QVJCZ05WQkFnVENrTmhiR2xtYjNKdWFXRXhGakFVQmdOVkJBY1REVk5oYmlCRwpjbUZ1WTJselkyOHhGREFTQmdOVkJBb1RDMlY0WVcxd2JHVXVZMjl0TVJjd0ZRWURWUVFERXc1allTNWxlR0Z0CmNHeGxMbU52YlRBZUZ3MHlNREF5TWpFeE9ESTBNREJhRncwek1EQXlNVGd4T0RJME1EQmFNR2t4Q3pBSkJnTlYKQkFZVEFsVlRNUk13RVFZRFZRUUlFd3BEWVd4cFptOXlibWxoTVJZd0ZBWURWUVFIRXcxVFlXNGdSbkpoYm1OcApjMk52TVJRd0VnWURWUVFLRXd0bGVHRnRjR3hsTG1OdmJURVhNQlVHQTFVRUF4TU9ZMkV1WlhoaGJYQnNaUzVqCmIyMHdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CQndOQ0FBVFM2ZGllbEZoZ3p5cmREd1U4SVJwelBneUwKRTUwUE4zbmZubDg0Q0JrUEZVSGRVOURSaDh4T2Uyc3dDMGx0SnVyL2Z4cU56dy94d3U3VExWVkVBOEpBbzIwdwphekFPQmdOVkhROEJBZjhFQkFNQ0FhWXdIUVlEVlIwbEJCWXdGQVlJS3dZQkJRVUhBd0lHQ0NzR0FRVUZCd01CCk1BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0tRWURWUjBPQkNJRUlHNVJNVWc4ZC9EU2VJMTNLbGVUVTZWUE1xQ3oKQjIrTDA0d25HY2s1Mjhhd01Bb0dDQ3FHU000OUJBTUNBMGNBTUVRQ0lBZWM2TXVVblJjM2xLRXo4UU44bmpzbApLKzVhU01SSlczVC85T2ZSYTFUSUFpQmRnVWtVaEZZbTNoQnR1VFc0UXB6ODliclJYRUpnVmZEbXpobXlhcUVBCm53PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=", + "organizational_unit_identifier": "peer" + } + }, + "intermediate_certs": [], + "name": "OrdererMSP", + "organizational_unit_identifiers": [], + "revocation_list": [], + "root_certs": [ + "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" + ], + "signing_identity": null, + "tls_intermediate_certs": [], + "tls_root_certs": [ + "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" + ] + }, + "type": 0 + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "BlockValidation": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BatchSize": { + "mod_policy": "Admins", + "value": { + "absolute_max_bytes": 10485760, + "max_message_count": 500, + "preferred_max_bytes": 2097152 + }, + "version": "0" + }, + "BatchTimeout": { + "mod_policy": "Admins", + "value": { + "timeout": "2s" + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_2": {} + } + }, + "version": "0" + }, + "ChannelRestrictions": { + "mod_policy": "Admins", + "value": null, + "version": "0" + }, + "ConsensusType": { + "mod_policy": "Admins", + "value": { + "metadata": { + "consenters": [ + { + "client_tls_cert": "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", + "host": "orderer0.example.com", + "port": 7055, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer1.example.com", + "port": 7050, + "server_tls_cert": "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" + }, + { + "client_tls_cert": "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", + "host": "orderer2.example.com", + "port": 7050, + "server_tls_cert": "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" + } + ], + "options": { + "election_tick": 10, + "heartbeat_tick": 1, + "max_inflight_blocks": 5, + "snapshot_interval_size": 20971520, + "tick_interval": "500ms" + } + }, + "state": "STATE_NORMAL", + "type": "etcdraft" + }, + "version": "0" + } + }, + "version": "0" + } + }, + "mod_policy": "Admins", + "policies": { + "Admins": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "MAJORITY", + "sub_policy": "Admins" + } + }, + "version": "0" + }, + "Readers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Readers" + } + }, + "version": "0" + }, + "Writers": { + "mod_policy": "Admins", + "policy": { + "type": 3, + "value": { + "rule": "ANY", + "sub_policy": "Writers" + } + }, + "version": "0" + } + }, + "values": { + "BlockDataHashingStructure": { + "mod_policy": "Admins", + "value": { + "width": 4294967295 + }, + "version": "0" + }, + "Capabilities": { + "mod_policy": "Admins", + "value": { + "capabilities": { + "V1_4_3": {} + } + }, + "version": "0" + }, + "Consortium": { + "mod_policy": "Admins", + "value": { + "name": "SampleConsortium" + }, + "version": "0" + }, + "HashingAlgorithm": { + "mod_policy": "Admins", + "value": { + "name": "SHA256" + }, + "version": "0" + }, + "OrdererAddresses": { + "mod_policy": "/Channel/Orderer/Admins", + "value": { + "addresses": [ + "orderer0.example.com:7050", + "orderer1.example.com:7050", + "orderer2.example.com:7050" + ] + }, + "version": "0" + } + }, + "version": "0" + }, + "sequence": "3" +} diff --git a/hyperledger_fabric/v1.4.8/raft/channel-artifacts/updated_config.pb b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/updated_config.pb new file mode 100644 index 00000000..b935c70d Binary files /dev/null and b/hyperledger_fabric/v1.4.8/raft/channel-artifacts/updated_config.pb differ diff --git a/hyperledger_fabric/v1.4.8/raft/configtx.yaml b/hyperledger_fabric/v1.4.8/raft/configtx.yaml new file mode 100644 index 00000000..f2f5279a --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/configtx.yaml @@ -0,0 +1,795 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# ORGANIZATIONS +# +# This section defines the organizational identities that can be referenced +# in the configuration profiles. +# +################################################################################ +Organizations: + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &SampleOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: SampleOrg + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: SampleOrg + + # MSPDir is the filesystem path which contains the MSP configuration. + MSPDir: msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &SampleOrgPolicies + Readers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.client')" + Admins: + Type: Signature + Rule: "OR('SampleOrg.admin')" + Endorsement: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: 127.0.0.1 + Port: 7051 + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &OrdererOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: OrdererOrg + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: OrdererMSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/ordererOrganizations/example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: + Readers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + Admins: + Type: Signature + Rule: "OR('OrdererMSP.admin')" + + - &Org1 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org1MSP + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org1MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org1.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org1Policies + Readers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.peer', 'Org1MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org1MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org1MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org1.example.com + Port: 7051 + + - &Org2 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org2MSP + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org2MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org2.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org2Policies + Readers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org2MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org2MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org2.example.com + Port: 7051 + + - &Org3 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org3MSP + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org3MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org3.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org3Policies + Readers: + Type: Signature + Rule: "OR('Org3MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org3MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org3MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org3MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org3.example.com + Port: 7051 +################################################################################ +# +# CAPABILITIES +# +# This section defines the capabilities of fabric network. This is a new +# concept as of v1.1.0 and should not be utilized in mixed networks with +# v1.0.x peers and orderers. Capabilities define features which must be +# present in a fabric binary for that binary to safely participate in the +# fabric network. For instance, if a new MSP type is added, newer binaries +# might recognize and validate the signatures from this type, while older +# binaries without this support would be unable to validate those +# transactions. This could lead to different versions of the fabric binaries +# having different world states. Instead, defining a capability for a channel +# informs those binaries without this capability that they must cease +# processing transactions until they have been upgraded. For v1.0.x if any +# capabilities are defined (including a map with all capabilities turned off) +# then the v1.0.x peer will deliberately crash. +# +################################################################################ +Capabilities: + # Channel capabilities apply to both the orderers and the peers and must be + # supported by both. + # Set the value of the capability to true to require it. + Channel: &ChannelCapabilities + # V1.3 for Channel is a catchall flag for behavior which has been + # determined to be desired for all orderers and peers running at the v1.3.x + # level, but which would be incompatible with orderers and peers from + # prior releases. + # Prior to enabling V1.3 channel capabilities, ensure that all + # orderers and peers on a channel are at v1.3.0 or later. + V1_4_3: true + V1_4_2: false + V1_3: false + V1_1: false + + # Orderer capabilities apply only to the orderers, and may be safely + # used with prior release peers. + # Set the value of the capability to true to require it. + Orderer: &OrdererCapabilities + # V1.1 for Orderer is a catchall flag for behavior which has been + # determined to be desired for all orderers running at the v1.1.x + # level, but which would be incompatible with orderers from prior releases. + # Prior to enabling V1.1 orderer capabilities, ensure that all + # orderers on a channel are at v1.1.0 or later. + V1_4_2: true + V1_1: false + + # Application capabilities apply only to the peer network, and may be safely + # used with prior release orderers. + # Set the value of the capability to true to require it. + Application: &ApplicationCapabilities + # V2.0 for Application enables the new non-backwards compatible + # features and fixes of fabric v2.0. + V1_4_2: true + # V1.3 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.3. + V1_3: false + # V1.2 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.2 (note, this need not be set if + # later version capabilities are set) + V1_2: false + # V1.1 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.1 (note, this need not be set if + # later version capabilities are set). + V1_1: false + +################################################################################ +# +# APPLICATION +# +# This section defines the values to encode into a config transaction or +# genesis block for application-related parameters. +# +################################################################################ +Application: &ApplicationDefaults + ACLs: &ACLsDefault + # This section provides defaults for policies for various resources + # in the system. These "resources" could be functions on system chaincodes + # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources + # (e.g.,who can receive Block events). This section does NOT specify the resource's + # definition or API, but just the ACL policy for it. + # + # User's can override these defaults with their own policy mapping by defining the + # mapping under ACLs in their channel definition + + #---New Lifecycle System Chaincode (_lifecycle) function to policy mapping for access control--# + + # ACL policy for _lifecycle's "CommitChaincodeDefinition" function + _lifecycle/CommitChaincodeDefinition: /Channel/Application/Writers + + # ACL policy for _lifecycle's "QueryChaincodeDefinition" function + _lifecycle/QueryChaincodeDefinition: /Channel/Application/Readers + + # ACL policy for _lifecycle's "QueryNamespaceDefinitions" function + _lifecycle/QueryNamespaceDefinitions: /Channel/Application/Readers + + #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# + + # ACL policy for lscc's "getid" function + lscc/ChaincodeExists: /Channel/Application/Readers + + # ACL policy for lscc's "getdepspec" function + lscc/GetDeploymentSpec: /Channel/Application/Readers + + # ACL policy for lscc's "getccdata" function + lscc/GetChaincodeData: /Channel/Application/Readers + + # ACL Policy for lscc's "getchaincodes" function + lscc/GetInstantiatedChaincodes: /Channel/Application/Readers + + #---Query System Chaincode (qscc) function to policy mapping for access control---# + + # ACL policy for qscc's "GetChainInfo" function + qscc/GetChainInfo: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByNumber" function + qscc/GetBlockByNumber: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByHash" function + qscc/GetBlockByHash: /Channel/Application/Readers + + # ACL policy for qscc's "GetTransactionByID" function + qscc/GetTransactionByID: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByTxID" function + qscc/GetBlockByTxID: /Channel/Application/Readers + + #---Configuration System Chaincode (cscc) function to policy mapping for access control---# + + # ACL policy for cscc's "GetConfigBlock" function + cscc/GetConfigBlock: /Channel/Application/Readers + + # ACL policy for cscc's "GetConfigTree" function + cscc/GetConfigTree: /Channel/Application/Readers + + # ACL policy for cscc's "SimulateConfigTreeUpdate" function + cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers + + #---Miscellanesous peer function to policy mapping for access control---# + + # ACL policy for invoking chaincodes on peer + peer/Propose: /Channel/Application/Writers + + # ACL policy for chaincode to chaincode invocation + peer/ChaincodeToChaincode: /Channel/Application/Readers + + #---Events resource to policy mapping for access control###---# + + # ACL policy for sending block events + event/Block: /Channel/Application/Readers + + # ACL policy for sending filtered block events + event/FilteredBlock: /Channel/Application/Readers + + # Organizations lists the orgs participating on the application side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Application policies, their canonical path is + # /Channel/Application/ + Policies: &ApplicationDefaultPolicies + LifecycleEndorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Endorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + # Capabilities describes the application level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ApplicationCapabilities + +################################################################################ +# +# ORDERER +# +# This section defines the values to encode into a config transaction or +# genesis block for orderer related parameters. +# +################################################################################ +Orderer: &OrdererDefaults + + # Orderer Type: The orderer implementation to start. + # Available types are "solo" and "kafka". + OrdererType: etcdraft + + # Addresses here is a nonexhaustive list of orderers the peers and clients can + # connect to. Adding/removing nodes from this list has no impact on their + # participation in ordering. + # NOTE: In the solo case, this should be a one-item list. + Addresses: + - orderer0.example.com:7050 + - orderer1.example.com:7050 + - orderer2.example.com:7050 + + # Batch Timeout: The amount of time to wait before creating a batch. + BatchTimeout: 2s + + # Batch Size: Controls the number of messages batched into a block. + # The orderer views messages opaquely, but typically, messages may + # be considered to be Fabric transactions. The 'batch' is the group + # of messages in the 'data' field of the block. Blocks will be a few kb + # larger than the batch size, when signatures, hashes, and other metadata + # is applied. + BatchSize: + + # Max Message Count: The maximum number of messages to permit in a + # batch. No block will contain more than this number of messages. + MaxMessageCount: 500 + + # Absolute Max Bytes: The absolute maximum number of bytes allowed for + # the serialized messages in a batch. The maximum block size is this value + # plus the size of the associated metadata (usually a few KB depending + # upon the size of the signing identities). Any transaction larger than + # this value will be rejected by ordering. If the "kafka" OrdererType is + # selected, set 'message.max.bytes' and 'replica.fetch.max.bytes' on + # the Kafka brokers to a value that is larger than this one. + AbsoluteMaxBytes: 10 MB + + # Preferred Max Bytes: The preferred maximum number of bytes allowed + # for the serialized messages in a batch. Roughly, this field may be considered + # the best effort maximum size of a batch. A batch will fill with messages + # until this size is reached (or the max message count, or batch timeout is + # exceeded). If adding a new message to the batch would cause the batch to + # exceed the preferred max bytes, then the current batch is closed and written + # to a block, and a new batch containing the new message is created. If a + # message larger than the preferred max bytes is received, then its batch + # will contain only that message. Because messages may be larger than + # preferred max bytes (up to AbsoluteMaxBytes), some batches may exceed + # the preferred max bytes, but will always contain exactly one transaction. + PreferredMaxBytes: 2 MB + + # Max Channels is the maximum number of channels to allow on the ordering + # network. When set to 0, this implies no maximum number of channels. + MaxChannels: 0 + + Kafka: + # Brokers: A list of Kafka brokers to which the orderer connects. Edit + # this list to identify the brokers of the ordering service. + # NOTE: Use IP:port notation. + Brokers: + - kafka0:9092 + - kafka1:9092 + - kafka2:9092 + - kafka3:9092 + # EtcdRaft defines configuration which must be set when the "etcdraft" + # orderertype is chosen. + EtcdRaft: + # The set of Raft replicas for this network. For the etcd/raft-based + # implementation, we expect every replica to also be an OSN. Therefore, + # a subset of the host:port items enumerated in this list should be + # replicated under the Orderer.Addresses key above. + Consenters: + - Host: orderer0.example.com + Port: 7055 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/server.crt + - Host: orderer1.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer1.example.com/tls/server.crt + - Host: orderer2.example.com + Port: 7050 + ClientTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + ServerTLSCert: crypto-config/ordererOrganizations/example.com/orderers/orderer2.example.com/tls/server.crt + + # Options to be specified for all the etcd/raft nodes. The values here + # are the defaults for all new channels and can be modified on a + # per-channel basis via configuration updates. + Options: + # TickInterval is the time interval between two Node.Tick invocations. + TickInterval: 500ms + + # ElectionTick is the number of Node.Tick invocations that must pass + # between elections. That is, if a follower does not receive any + # message from the leader of current term before ElectionTick has + # elapsed, it will become candidate and start an election. + # ElectionTick must be greater than HeartbeatTick. + ElectionTick: 10 + + # HeartbeatTick is the number of Node.Tick invocations that must + # pass between heartbeats. That is, a leader sends heartbeat + # messages to maintain its leadership every HeartbeatTick ticks. + HeartbeatTick: 1 + + # MaxInflightBlocks limits the max number of in-flight append messages + # during optimistic replication phase. + MaxInflightBlocks: 5 + + # SnapshotIntervalSize defines number of bytes per which a snapshot is taken + SnapshotIntervalSize: 20 MB + + # Organizations lists the orgs participating on the orderer side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Orderer policies, their canonical path is + # /Channel/Orderer/ + Policies: + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + # BlockValidation specifies what signatures must be included in the block + # from the orderer for the peer to validate it. + BlockValidation: + Type: ImplicitMeta + Rule: "ANY Writers" + + # Capabilities describes the orderer level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *OrdererCapabilities + +################################################################################ +# +# CHANNEL +# +# This section defines the values to encode into a config transaction or +# genesis block for channel related parameters. +# +################################################################################ +Channel: &ChannelDefaults + # Policies defines the set of policies at this level of the config tree + # For Channel policies, their canonical path is + # /Channel/ + Policies: + # Who may invoke the 'Deliver' API + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + # Who may invoke the 'Broadcast' API + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + # By default, who may modify elements at this config level + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + + # Capabilities describes the channel level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ChannelCapabilities + +################################################################################ +# +# PROFILES +# +# Different configuration profiles may be encoded here to be specified as +# parameters to the configtxgen tool. The profiles which specify consortiums +# are to be used for generating the orderer genesis block. With the correct +# consortium members defined in the orderer genesis block, channel creation +# requests may be generated with only the org member names and a consortium +# name. +# +################################################################################ +Profiles: + + # SampleSingleMSPSolo defines a configuration which uses the Solo orderer, + # and contains a single MSP definition (the MSP sampleconfig). + # The Consortium SampleConsortium has only a single member, SampleOrg. + SampleSingleMSPSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleSingleMSPKafka defines a configuration that differs from the + # SampleSingleMSPSolo one only in that it uses the Kafka-based orderer. + SampleSingleMSPKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleInsecureSolo defines a configuration which uses the Solo orderer, + # contains no MSP definitions, and allows all transactions and channel + # creation requests for the consortium SampleConsortium. + SampleInsecureSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleInsecureKafka defines a configuration that differs from the + # SampleInsecureSolo one only in that it uses the Kafka-based orderer. + SampleInsecureKafka: + <<: *ChannelDefaults + Orderer: + OrdererType: kafka + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleDevModeSolo defines a configuration which uses the Solo orderer, + # contains the sample MSP as both orderer and consortium member, and + # requires only basic membership for admin privileges. It also defines + # an Application on the ordering system channel, which should usually + # be avoided. + SampleDevModeSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleDevModeKafka defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the Kafka-based orderer. + SampleDevModeKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleSingleMSPChannel defines a channel with only the sample org as a + # member. It is designed to be used in conjunction with SampleSingleMSPSolo + # and SampleSingleMSPKafka orderer profiles. Note, for channel creation + # profiles, only the 'Application' section and consortium # name are + # considered. + SampleSingleMSPChannel: + <<: *ChannelDefaults + Consortium: SampleConsortium + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + + # SampleDevModeEtcdRaft defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the etcd/raft-based orderer. + SampleDevModeEtcdRaft: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: etcdraft + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + TwoOrgsOrdererGenesis: + <<: *ChannelDefaults + Capabilities: + <<: *ChannelCapabilities + Orderer: + <<: *OrdererDefaults + Organizations: + - *OrdererOrg + Capabilities: + <<: *OrdererCapabilities + Consortiums: + SampleConsortium: + Organizations: + - *Org1 + - *Org2 + TwoOrgsChannel: + Consortium: SampleConsortium + <<: *ChannelDefaults + Capabilities: + <<: *ChannelCapabilities + Application: + <<: *ApplicationDefaults + Organizations: + - *Org1 + - *Org2 + Capabilities: + <<: *ApplicationCapabilities diff --git a/hyperledger_fabric/v1.4.8/raft/logs/dev_all.log b/hyperledger_fabric/v1.4.8/raft/logs/dev_all.log new file mode 100644 index 00000000..cdc4f41c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/logs/dev_all.log @@ -0,0 +1,100835 @@ +Attaching to peer1.org1.example.com, peer0.org1.example.com, peer1.org2.example.com, peer0.org2.example.com, fabric-cli, orderer2.example.com, orderer0.example.com, orderer1.example.com +peer0.org1.example.com | [001 08-31 20:50:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +peer0.org1.example.com | [002 08-31 20:50:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org1.example.com | [003 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +peer0.org1.example.com | [004 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +peer0.org1.example.com | [005 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer1.example.com | 2020-08-31 20:50:42.779 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer1.example.com | "2020-08-31 20:50:43.028 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer1.example.com | General.LedgerType = "file" +orderer1.example.com | General.ListenAddress = "0.0.0.0" +orderer1.example.com | General.ListenPort = 7050 +orderer1.example.com | General.TLS.Enabled = true +orderer1.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer1.example.com | General.TLS.ClientAuthRequired = false +orderer1.example.com | General.TLS.ClientRootCAs = [] +orderer1.example.com | General.Cluster.ListenAddress = "" +orderer1.example.com | General.Cluster.ListenPort = 0 +orderer1.example.com | General.Cluster.ServerCertificate = "" +orderer1.example.com | General.Cluster.ServerPrivateKey = "" +orderer1.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer1.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer1.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer1.example.com | General.Cluster.DialTimeout = 5s +orderer1.example.com | General.Cluster.RPCTimeout = 7s +orderer1.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer1.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer1.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer1.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer1.example.com | General.Cluster.SendBufferSize = 10 +orderer1.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer1.example.com | General.Cluster.TLSHandshakeTimeShift = 0s +orderer1.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer1.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer1.example.com | General.Keepalive.ServerTimeout = 20s +orderer1.example.com | General.ConnectionTimeout = 0s +orderer1.example.com | General.GenesisMethod = "file" +orderer1.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer1.example.com | General.SystemChannel = "test-system-channel-name" +orderer1.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer1.example.com | General.Profile.Enabled = false +orderer1.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer1.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer1.example.com | General.LocalMSPID = "OrdererMSP" +orderer1.example.com | General.BCCSP.ProviderName = "SW" +orderer1.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer1.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer1.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer1.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer1.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer1.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer1.example.com | General.BCCSP.PluginOpts = +orderer1.example.com | General.Authentication.TimeWindow = 15m0s +orderer1.example.com | General.Authentication.NoExpirationChecks = false +orderer1.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer1.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer1.example.com | RAMLedger.HistorySize = 1000 +orderer1.example.com | Kafka.Retry.ShortInterval = 5s +orderer1.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer1.example.com | Kafka.Retry.LongInterval = 5m0s +orderer1.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer1.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer1.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer1.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer1.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer1.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer1.example.com | Kafka.Verbose = false +orderer1.example.com | Kafka.Version = 0.10.2.0 +orderer1.example.com | Kafka.TLS.Enabled = false +orderer1.example.com | Kafka.TLS.PrivateKey = "" +orderer1.example.com | Kafka.TLS.Certificate = "" +orderer1.example.com | Kafka.TLS.RootCAs = [] +orderer1.example.com | Kafka.TLS.ClientAuthRequired = false +orderer1.example.com | Kafka.TLS.ClientRootCAs = [] +orderer1.example.com | Kafka.SASLPlain.Enabled = false +orderer1.example.com | Kafka.SASLPlain.User = "" +orderer1.example.com | Kafka.SASLPlain.Password = "" +orderer1.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer1.example.com | Debug.BroadcastTraceDir = "" +orderer1.example.com | Debug.DeliverTraceDir = "" +orderer1.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer1.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer1.example.com | Operations.TLS.Enabled = false +orderer1.example.com | Operations.TLS.PrivateKey = "" +orderer1.example.com | Operations.TLS.Certificate = "" +orderer1.example.com | Operations.TLS.RootCAs = [] +orderer1.example.com | Operations.TLS.ClientAuthRequired = false +orderer1.example.com | Operations.TLS.ClientRootCAs = [] +orderer1.example.com | Metrics.Provider = "prometheus" +orderer1.example.com | Metrics.Statsd.Network = "udp" +peer0.org1.example.com | [006 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +orderer1.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer1.example.com | Metrics.Statsd.WriteInterval = 30s +orderer1.example.com | Metrics.Statsd.Prefix = """ +orderer1.example.com | "2020-08-31 20:50:43.122 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing channels" +orderer1.example.com | "2020-08-31 20:50:43.179 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" +orderer1.example.com | "2020-08-31 20:50:43.227 UTC [orderer.common.server] Start -> INFO 005 Setting up cluster for orderer type etcdraft" +orderer1.example.com | "2020-08-31 20:50:43.269 UTC [orderer.common.server] reuseListener -> INFO 006 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer1.example.com | "2020-08-31 20:50:43.280 UTC [fsblkstorage] newBlockfileMgr -> INFO 007 Getting block information from block storage" +orderer1.example.com | "2020-08-31 20:50:43.337 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 008 EvictionSuspicion not set, defaulting to 10m0s" +orderer1.example.com | "2020-08-31 20:50:43.338 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 009 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=2 +orderer1.example.com | "2020-08-31 20:50:43.377 UTC [orderer.commmon.multichannel] Initialize -> INFO 00a Starting system channel 'testchainid' with genesis block hash 4855adef6cdb226971cd6f1c81afc3aa9e4d72226e0e6f0fa7c9c664f1042236 and orderer type etcdraft" +orderer2.example.com | 2020-08-31 20:50:42.930 UTC [localconfig] completeInitialization -> INFO 001 Kafka.Version unset, setting to 0.10.2.0 +orderer2.example.com | "2020-08-31 20:50:43.092 UTC [orderer.common.server] prettyPrintStruct -> INFO 002 Orderer config values: +orderer2.example.com | General.LedgerType = "file" +orderer2.example.com | General.ListenAddress = "0.0.0.0" +orderer2.example.com | General.ListenPort = 7050 +orderer2.example.com | General.TLS.Enabled = true +orderer2.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer2.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer2.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer2.example.com | General.TLS.ClientAuthRequired = false +orderer2.example.com | General.TLS.ClientRootCAs = [] +orderer2.example.com | General.Cluster.ListenAddress = "" +orderer2.example.com | General.Cluster.ListenPort = 0 +orderer2.example.com | General.Cluster.ServerCertificate = "" +orderer2.example.com | General.Cluster.ServerPrivateKey = "" +orderer2.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer2.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer2.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer2.example.com | General.Cluster.DialTimeout = 5s +orderer2.example.com | General.Cluster.RPCTimeout = 7s +orderer2.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer2.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer2.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer2.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer2.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer2.example.com | General.Cluster.SendBufferSize = 10 +orderer2.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer2.example.com | General.Cluster.TLSHandshakeTimeShift = 0s +orderer2.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer2.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer2.example.com | General.Keepalive.ServerTimeout = 20s +orderer2.example.com | General.ConnectionTimeout = 0s +orderer2.example.com | General.GenesisMethod = "file" +orderer2.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer2.example.com | General.SystemChannel = "test-system-channel-name" +orderer2.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer2.example.com | General.Profile.Enabled = false +orderer2.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer2.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer2.example.com | General.LocalMSPID = "OrdererMSP" +orderer2.example.com | General.BCCSP.ProviderName = "SW" +orderer2.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer2.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer2.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer2.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer2.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer2.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer2.example.com | General.BCCSP.PluginOpts = +orderer2.example.com | General.Authentication.TimeWindow = 15m0s +orderer2.example.com | General.Authentication.NoExpirationChecks = false +orderer2.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer2.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer2.example.com | RAMLedger.HistorySize = 1000 +orderer2.example.com | Kafka.Retry.ShortInterval = 5s +orderer2.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer2.example.com | Kafka.Retry.LongInterval = 5m0s +orderer2.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer2.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer2.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer2.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer2.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer2.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer2.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer2.example.com | Kafka.Verbose = false +orderer2.example.com | Kafka.Version = 0.10.2.0 +orderer2.example.com | Kafka.TLS.Enabled = false +orderer2.example.com | Kafka.TLS.PrivateKey = "" +orderer2.example.com | Kafka.TLS.Certificate = "" +orderer2.example.com | Kafka.TLS.RootCAs = [] +orderer2.example.com | Kafka.TLS.ClientAuthRequired = false +orderer2.example.com | Kafka.TLS.ClientRootCAs = [] +orderer2.example.com | Kafka.SASLPlain.Enabled = false +orderer2.example.com | Kafka.SASLPlain.User = "" +orderer0.example.com | 2020-08-31 20:50:43.080 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for general +orderer0.example.com | 2020-08-31 20:50:43.081 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +orderer0.example.com | 2020-08-31 20:50:43.081 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for general.LedgerType setting to string file +orderer0.example.com | 2020-08-31 20:50:43.081 UTC [viperutil] unmarshalJSON -> DEBU 004 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +orderer0.example.com | 2020-08-31 20:50:43.081 UTC [viperutil] getKeysRecursively -> DEBU 005 Found real value for general.GenesisMethod setting to string file +orderer0.example.com | 2020-08-31 20:50:43.082 UTC [viperutil] unmarshalJSON -> DEBU 006 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.082 UTC [viperutil] getKeysRecursively -> DEBU 007 Found real value for general.GenesisProfile setting to string SampleInsecureSolo +orderer0.example.com | 2020-08-31 20:50:43.082 UTC [viperutil] unmarshalJSON -> DEBU 008 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +orderer0.example.com | 2020-08-31 20:50:43.082 UTC [viperutil] getKeysRecursively -> DEBU 009 Found real value for general.ListenPort setting to string 7050 +orderer0.example.com | 2020-08-31 20:50:43.082 UTC [viperutil] unmarshalJSON -> DEBU 00a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.082 UTC [viperutil] getKeysRecursively -> DEBU 00b Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block +orderer0.example.com | 2020-08-31 20:50:43.083 UTC [viperutil] getKeysRecursively -> DEBU 00c Found map[string]interface{} value for general.TLS +orderer0.example.com | 2020-08-31 20:50:43.084 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.084 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for general.TLS.ClientRootCAs setting to +orderer0.example.com | 2020-08-31 20:50:43.084 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string +orderer0.example.com | 2020-08-31 20:50:43.085 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for general.TLS.Enabled setting to string true +orderer0.example.com | 2020-08-31 20:50:43.086 UTC [viperutil] unmarshalJSON -> DEBU 011 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.086 UTC [viperutil] getKeysRecursively -> DEBU 012 Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2020-08-31 20:50:43.086 UTC [viperutil] unmarshalJSON -> DEBU 013 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.086 UTC [viperutil] getKeysRecursively -> DEBU 014 Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2020-08-31 20:50:43.086 UTC [viperutil] unmarshalJSON -> DEBU 015 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.086 UTC [viperutil] getKeysRecursively -> DEBU 016 Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | 2020-08-31 20:50:43.086 UTC [viperutil] unmarshalJSON -> DEBU 017 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-08-31 20:50:43.086 UTC [viperutil] getKeysRecursively -> DEBU 018 Found real value for general.TLS.ClientAuthRequired setting to bool false +orderer0.example.com | 2020-08-31 20:50:43.086 UTC [viperutil] unmarshalJSON -> DEBU 019 Unmarshal JSON: value is not a string: +orderer2.example.com | Kafka.SASLPlain.Password = "" +orderer2.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer2.example.com | Debug.BroadcastTraceDir = "" +orderer2.example.com | Debug.DeliverTraceDir = "" +orderer2.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer2.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer2.example.com | Operations.TLS.Enabled = false +orderer2.example.com | Operations.TLS.PrivateKey = "" +orderer2.example.com | Operations.TLS.Certificate = "" +orderer2.example.com | Operations.TLS.RootCAs = [] +orderer2.example.com | Operations.TLS.ClientAuthRequired = false +orderer2.example.com | Operations.TLS.ClientRootCAs = [] +orderer2.example.com | Metrics.Provider = "prometheus" +orderer2.example.com | Metrics.Statsd.Network = "udp" +orderer2.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer2.example.com | Metrics.Statsd.WriteInterval = 30s +orderer2.example.com | Metrics.Statsd.Prefix = """ +orderer2.example.com | "2020-08-31 20:50:43.194 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 003 Bootstrapping because no existing channels" +orderer2.example.com | "2020-08-31 20:50:43.236 UTC [orderer.common.server] initializeServerConfig -> INFO 004 Starting orderer with TLS enabled" +orderer2.example.com | "2020-08-31 20:50:43.271 UTC [orderer.common.server] Start -> INFO 005 Setting up cluster for orderer type etcdraft" +orderer2.example.com | "2020-08-31 20:50:43.309 UTC [orderer.common.server] reuseListener -> INFO 006 Cluster listener is not configured, defaulting to use the general listener on port 7050" +orderer2.example.com | "2020-08-31 20:50:43.325 UTC [fsblkstorage] newBlockfileMgr -> INFO 007 Getting block information from block storage" +orderer2.example.com | "2020-08-31 20:50:43.362 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 008 EvictionSuspicion not set, defaulting to 10m0s" +orderer2.example.com | "2020-08-31 20:50:43.373 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 009 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=3 +orderer2.example.com | "2020-08-31 20:50:43.388 UTC [orderer.commmon.multichannel] Initialize -> INFO 00a Starting system channel 'testchainid' with genesis block hash 4855adef6cdb226971cd6f1c81afc3aa9e4d72226e0e6f0fa7c9c664f1042236 and orderer type etcdraft" +orderer2.example.com | "2020-08-31 20:50:43.388 UTC [orderer.consensus.etcdraft] Start -> INFO 00b Starting Raft node" channel=testchainid node=3 +orderer2.example.com | "2020-08-31 20:50:43.388 UTC [orderer.common.cluster] Configure -> INFO 00c Entering, channel: testchainid, nodes: [ID: 1, +orderer2.example.com | Endpoint: orderer0.example.com:7055, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +orderer2.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer2.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +orderer2.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer2.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ID: 2, +orderer2.example.com | Endpoint: orderer1.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer2.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer2.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer2.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer2.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ]" +orderer2.example.com | "2020-08-31 20:50:43.388 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Allocating a new stub for node 1 with endpoint of orderer0.example.com:7055 for channel testchainid" +orderer2.example.com | "2020-08-31 20:50:43.388 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7055 due to TLS certificate change" +orderer2.example.com | "2020-08-31 20:50:43.389 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +peer0.org1.example.com | [007 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +orderer2.example.com | "2020-08-31 20:50:43.389 UTC [orderer.common.cluster] updateStubInMapping -> INFO 010 Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +peer0.org1.example.com | [008 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +orderer1.example.com | "2020-08-31 20:50:43.377 UTC [orderer.consensus.etcdraft] Start -> INFO 00b Starting Raft node" channel=testchainid node=2 +orderer2.example.com | "2020-08-31 20:50:43.396 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 1 exists in both old and new membership for channel testchainid , skipping its deactivation" +peer0.org1.example.com | [009 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +orderer2.example.com | "2020-08-31 20:50:43.396 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 012 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +peer0.org1.example.com | [00a 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +orderer1.example.com | "2020-08-31 20:50:43.377 UTC [orderer.common.cluster] Configure -> INFO 00c Entering, channel: testchainid, nodes: [ID: 1, +orderer2.example.com | "2020-08-31 20:50:43.399 UTC [orderer.common.cluster] Configure -> INFO 013 Exiting" +peer0.org1.example.com | [00b 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +orderer2.example.com | "2020-08-31 20:50:43.399 UTC [orderer.consensus.etcdraft] start -> INFO 014 Starting raft node as part of a new channel" channel=testchainid node=3 +orderer1.example.com | Endpoint: orderer0.example.com:7055, +peer0.org1.example.com | [00c 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +orderer2.example.com | "2020-08-31 20:50:43.399 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 015 3 became follower at term 0" channel=testchainid node=3 +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +peer0.org1.example.com | [00d 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +orderer2.example.com | "2020-08-31 20:50:43.399 UTC [orderer.consensus.etcdraft] newRaft -> INFO 016 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=3 +orderer1.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +peer0.org1.example.com | [00e 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +peer0.org1.example.com | [00f 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +orderer2.example.com | "2020-08-31 20:50:43.402 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 017 3 became follower at term 1" channel=testchainid node=3 +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [010 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +orderer2.example.com | "2020-08-31 20:50:43.402 UTC [orderer.common.server] Start -> INFO 018 Starting orderer: +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +peer0.org1.example.com | [011 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +peer0.org1.example.com | [012 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +peer0.org1.example.com | [013 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +peer0.org1.example.com | [014 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +orderer2.example.com | Version: 1.4.8 +orderer1.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +peer0.org1.example.com | [015 08-31 20:50:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +orderer2.example.com | Commit SHA: development build +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +peer0.org1.example.com | [016 08-31 20:50:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +orderer2.example.com | Go version: go1.13.15 +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +peer0.org1.example.com | [017 08-31 20:50:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +orderer2.example.com | OS/Arch: linux/amd64" +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +peer0.org1.example.com | [018 08-31 20:50:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +orderer2.example.com | "2020-08-31 20:50:43.403 UTC [orderer.common.server] Start -> INFO 019 Beginning to serve requests" +orderer1.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +peer0.org1.example.com | [019 08-31 20:50:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +orderer2.example.com | "2020-08-31 20:50:43.407 UTC [orderer.consensus.etcdraft] run -> INFO 01a This node is picked to start campaign" channel=testchainid node=3 +orderer1.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +peer0.org1.example.com | [01a 08-31 20:50:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +orderer2.example.com | "2020-08-31 20:50:43.411 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [01b 08-31 20:50:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore] +orderer2.example.com | "2020-08-31 20:50:43.411 UTC [orderer.consensus.etcdraft] apply -> INFO 01c Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer2.example.com | "2020-08-31 20:50:43.411 UTC [orderer.consensus.etcdraft] apply -> INFO 01d Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=3 +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +peer0.org1.example.com | [01c 08-31 20:50:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +orderer2.example.com | "2020-08-31 20:50:44.408 UTC [orderer.consensus.etcdraft] Step -> INFO 01e 3 is starting a new election at term 1" channel=testchainid node=3 +orderer1.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +peer0.org1.example.com | [01d 08-31 20:50:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +orderer2.example.com | "2020-08-31 20:50:44.408 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 01f 3 became pre-candidate at term 1" channel=testchainid node=3 +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | "2020-08-31 20:50:44.408 UTC [orderer.consensus.etcdraft] poll -> INFO 020 3 received MsgPreVoteResp from 3 at term 1" channel=testchainid node=3 +peer0.org1.example.com | [01e 08-31 20:50:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | "2020-08-31 20:50:44.408 UTC [orderer.consensus.etcdraft] campaign -> INFO 021 3 [logterm: 1, index: 3] sent MsgPreVote request to 1 at term 1" channel=testchainid node=3 +peer0.org1.example.com | [01f 08-31 20:50:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer2.example.com | "2020-08-31 20:50:44.408 UTC [orderer.consensus.etcdraft] campaign -> INFO 022 3 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=testchainid node=3 +peer0.org1.example.com | [020 08-31 20:50:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | "2020-08-31 20:50:44.408 UTC [orderer.consensus.etcdraft] logSendFailure -> ERRO 023 Failed to send StepRequest to 1, because: connection to 1(orderer0.example.com:7055) is in state CONNECTING" channel=testchainid node=3 +peer0.org1.example.com | [021 08-31 20:50:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +orderer2.example.com | "2020-08-31 20:50:44.414 UTC [orderer.consensus.etcdraft] poll -> INFO 024 3 received MsgPreVoteResp from 2 at term 1" channel=testchainid node=3 +orderer2.example.com | "2020-08-31 20:50:44.414 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 025 3 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=testchainid node=3 +orderer2.example.com | "2020-08-31 20:50:44.414 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 026 3 became candidate at term 2" channel=testchainid node=3 +orderer2.example.com | "2020-08-31 20:50:44.414 UTC [orderer.consensus.etcdraft] poll -> INFO 027 3 received MsgVoteResp from 3 at term 2" channel=testchainid node=3 +peer0.org1.example.com | [022 08-31 20:50:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +orderer2.example.com | "2020-08-31 20:50:44.414 UTC [orderer.consensus.etcdraft] campaign -> INFO 028 3 [logterm: 1, index: 3] sent MsgVote request to 1 at term 2" channel=testchainid node=3 +peer0.org1.example.com | [023 08-31 20:50:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +orderer1.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | "2020-08-31 20:50:44.414 UTC [orderer.consensus.etcdraft] campaign -> INFO 029 3 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=testchainid node=3 +peer0.org1.example.com | [024 08-31 20:50:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | "2020-08-31 20:50:44.425 UTC [orderer.consensus.etcdraft] poll -> INFO 02a 3 received MsgVoteResp from 2 at term 2" channel=testchainid node=3 +peer0.org1.example.com | [025 08-31 20:50:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem +peer0.org1.example.com | [026 08-31 20:50:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +peer0.org1.example.com | [027 08-31 20:50:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +peer0.org1.example.com | [028 08-31 20:50:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +peer0.org1.example.com | [029 08-31 20:50:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +peer0.org1.example.com | [02a 08-31 20:50:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +peer0.org1.example.com | [02b 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [02c 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer1.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ID: 3, +orderer1.example.com | Endpoint: orderer2.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer1.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer1.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer1.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer1.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ]" +orderer1.example.com | "2020-08-31 20:50:43.377 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00d Allocating a new stub for node 1 with endpoint of orderer0.example.com:7055 for channel testchainid" +orderer1.example.com | "2020-08-31 20:50:43.377 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00e Deactivating node 1 in channel testchainid with endpoint of orderer0.example.com:7055 due to TLS certificate change" +orderer1.example.com | "2020-08-31 20:50:43.378 UTC [orderer.common.cluster] updateStubInMapping -> INFO 00f Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +orderer1.example.com | "2020-08-31 20:50:43.378 UTC [orderer.common.cluster] updateStubInMapping -> INFO 010 Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer1.example.com | "2020-08-31 20:50:43.378 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 011 1 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer1.example.com | "2020-08-31 20:50:43.378 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 012 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer1.example.com | "2020-08-31 20:50:43.378 UTC [orderer.common.cluster] Configure -> INFO 013 Exiting" +orderer1.example.com | "2020-08-31 20:50:43.378 UTC [orderer.consensus.etcdraft] start -> INFO 014 Starting raft node as part of a new channel" channel=testchainid node=2 +orderer1.example.com | "2020-08-31 20:50:43.378 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 015 2 became follower at term 0" channel=testchainid node=2 +orderer1.example.com | "2020-08-31 20:50:43.378 UTC [orderer.consensus.etcdraft] newRaft -> INFO 016 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=2 +orderer1.example.com | "2020-08-31 20:50:43.379 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 017 2 became follower at term 1" channel=testchainid node=2 +orderer1.example.com | "2020-08-31 20:50:43.379 UTC [orderer.common.server] Start -> INFO 018 Starting orderer: +orderer1.example.com | Version: 1.4.8 +orderer1.example.com | Commit SHA: development build +orderer1.example.com | Go version: go1.13.15 +orderer1.example.com | OS/Arch: linux/amd64" +orderer1.example.com | "2020-08-31 20:50:43.379 UTC [orderer.common.server] Start -> INFO 019 Beginning to serve requests" +orderer1.example.com | "2020-08-31 20:50:43.411 UTC [orderer.consensus.etcdraft] apply -> INFO 01a Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2020-08-31 20:50:43.411 UTC [orderer.consensus.etcdraft] apply -> INFO 01b Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2020-08-31 20:50:43.411 UTC [orderer.consensus.etcdraft] apply -> INFO 01c Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=2 +orderer1.example.com | "2020-08-31 20:50:44.412 UTC [orderer.consensus.etcdraft] Step -> INFO 01d 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 3 [logterm: 1, index: 3] at term 1" channel=testchainid node=2 +orderer1.example.com | "2020-08-31 20:50:44.417 UTC [orderer.consensus.etcdraft] Step -> INFO 01e 2 [term: 1] received a MsgVote message with higher term from 3 [term: 2]" channel=testchainid node=2 +orderer1.example.com | "2020-08-31 20:50:44.417 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 01f 2 became follower at term 2" channel=testchainid node=2 +orderer1.example.com | "2020-08-31 20:50:44.418 UTC [orderer.consensus.etcdraft] Step -> INFO 020 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 3 [logterm: 1, index: 3] at term 2" channel=testchainid node=2 +orderer1.example.com | "2020-08-31 20:50:44.428 UTC [orderer.consensus.etcdraft] run -> INFO 021 raft.node: 2 elected leader 3 at term 2" channel=testchainid node=2 +orderer1.example.com | "2020-08-31 20:50:44.436 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 022 Raft leader changed: 0 -> 3" channel=testchainid node=2 +orderer1.example.com | "2020-08-31 20:50:56.090 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 023 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=2 +orderer1.example.com | "2020-08-31 20:50:56.097 UTC [fsblkstorage] newBlockfileMgr -> INFO 024 Getting block information from block storage" +orderer1.example.com | "2020-08-31 20:50:56.128 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 025 EvictionSuspicion not set, defaulting to 10m0s" +orderer1.example.com | "2020-08-31 20:50:56.129 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 026 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:50:56.146 UTC [orderer.commmon.multichannel] newChain -> INFO 027 Created and starting new chain businesschannel" +orderer1.example.com | "2020-08-31 20:50:56.146 UTC [orderer.consensus.etcdraft] Start -> INFO 028 Starting Raft node" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:50:56.152 UTC [orderer.common.cluster] Configure -> INFO 029 Entering, channel: businesschannel, nodes: [ID: 3, +orderer1.example.com | Endpoint: orderer2.example.com:7050, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer1.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | "2020-08-31 20:50:44.425 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 02b 3 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=testchainid node=3 +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer1.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer1.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer1.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer1.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ID: 1, +orderer1.example.com | Endpoint: orderer0.example.com:7055, +orderer1.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +orderer1.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer1.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer1.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer1.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer1.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer1.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer1.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +orderer1.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer1.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer1.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer1.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer1.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer1.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer1.example.com | -----END CERTIFICATE----- +orderer1.example.com | ]" +orderer1.example.com | "2020-08-31 20:50:56.153 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02a Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +orderer1.example.com | "2020-08-31 20:50:56.156 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02b Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2020-08-31 20:50:44.425 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 02c 3 became leader at term 2" channel=testchainid node=3 +orderer2.example.com | "2020-08-31 20:50:44.425 UTC [orderer.consensus.etcdraft] run -> INFO 02d raft.node: 3 elected leader 3 at term 2" channel=testchainid node=3 +orderer2.example.com | "2020-08-31 20:50:44.427 UTC [orderer.consensus.etcdraft] run -> INFO 02e Leader 3 is present, quit campaign" channel=testchainid node=3 +orderer2.example.com | "2020-08-31 20:50:44.427 UTC [orderer.consensus.etcdraft] send -> INFO 02f Successfully sent StepRequest to 1 after failed attempt(s)" channel=testchainid node=3 +orderer2.example.com | "2020-08-31 20:50:44.427 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 030 Raft leader changed: 0 -> 3" channel=testchainid node=3 +orderer2.example.com | "2020-08-31 20:50:44.436 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 031 Start accepting requests as Raft leader at block [0]" channel=testchainid node=3 +orderer2.example.com | "2020-08-31 20:50:56.077 UTC [orderer.consensus.etcdraft] propose -> INFO 032 Created block [1], there are 0 blocks in flight" channel=testchainid node=3 +orderer2.example.com | "2020-08-31 20:50:56.078 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 033 Received config transaction, pause accepting transaction till it is committed" channel=testchainid node=3 +orderer2.example.com | "2020-08-31 20:50:56.084 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 034 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=3 +orderer2.example.com | "2020-08-31 20:50:56.090 UTC [fsblkstorage] newBlockfileMgr -> INFO 035 Getting block information from block storage" +orderer2.example.com | "2020-08-31 20:50:56.103 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 036 EvictionSuspicion not set, defaulting to 10m0s" +orderer2.example.com | "2020-08-31 20:50:56.103 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 037 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:50:56.121 UTC [orderer.commmon.multichannel] newChain -> INFO 038 Created and starting new chain businesschannel" +orderer2.example.com | "2020-08-31 20:50:56.123 UTC [orderer.consensus.etcdraft] Start -> INFO 039 Starting Raft node" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:50:56.123 UTC [orderer.common.cluster] Configure -> INFO 03a Entering, channel: businesschannel, nodes: [ID: 1, +orderer2.example.com | Endpoint: orderer0.example.com:7055, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +orderer2.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer2.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXDCCAgKgAwIBAgIQXwrZ68OgZiTn/V2q4EVSvzAKBggqhkjOPQQDAjBsMQsw +orderer2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer2.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer2.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer2.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIwLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer2.example.com | AQYIKoZIzj0DAQcDQgAEjHLuzO6H/4I1tpW8EZ6/mcSTc+u36tUubnVcYkqhA7sK +orderer2.example.com | 3SkQxKt+mQQ6MZ9wLoZ7DsWVT7HG5uc3uUpqHO6K6KOBmDCBlTAOBgNVHQ8BAf8E +orderer2.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer2.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer2.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjAuZXhhbXBsZS5jb22CCG9yZGVyZXIwMAoGCCqG +orderer2.example.com | SM49BAMCA0gAMEUCIQCRWlJckGYiRkdSUpw1fjN2mNpP1tM/JIkLM4tqTUd+CgIg +orderer2.example.com | UMypIewfDfD9sThMvPKwbUc9oSZvyXN8o7MZ2IUL6t0= +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ID: 2, +orderer2.example.com | Endpoint: orderer1.example.com:7050, +orderer2.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer1.example.com | "2020-08-31 20:50:56.156 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02c Allocating a new stub for node 1 with endpoint of orderer0.example.com:7055 for channel businesschannel" +orderer1.example.com | "2020-08-31 20:50:56.156 UTC [orderer.common.cluster] updateStubInMapping -> INFO 02d Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7055 due to TLS certificate change" +orderer1.example.com | "2020-08-31 20:50:56.157 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02e 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer1.example.com | "2020-08-31 20:50:56.157 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 02f 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer1.example.com | "2020-08-31 20:50:56.157 UTC [orderer.common.cluster] Configure -> INFO 030 Exiting" +orderer1.example.com | "2020-08-31 20:50:56.157 UTC [orderer.consensus.etcdraft] start -> INFO 031 Starting raft node as part of a new channel" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:50:56.157 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 032 2 became follower at term 0" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:50:56.157 UTC [orderer.consensus.etcdraft] newRaft -> INFO 033 newRaft 2 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:50:56.157 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 034 2 became follower at term 1" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:50:56.159 UTC [orderer.consensus.etcdraft] apply -> INFO 035 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:50:56.159 UTC [orderer.consensus.etcdraft] apply -> INFO 036 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:50:56.161 UTC [orderer.consensus.etcdraft] apply -> INFO 037 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:50:57.212 UTC [orderer.consensus.etcdraft] Step -> INFO 038 2 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:50:57.219 UTC [orderer.consensus.etcdraft] Step -> INFO 039 2 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:50:57.219 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 03a 2 became follower at term 2" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:50:57.219 UTC [orderer.consensus.etcdraft] Step -> INFO 03b 2 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:50:57.231 UTC [orderer.consensus.etcdraft] run -> INFO 03c raft.node: 2 elected leader 1 at term 2" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:50:57.232 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 03d Raft leader changed: 0 -> 1" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:51:00.845 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03e Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:51:03.098 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 03f Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:51:09.282 UTC [comm.grpc.server] 1 -> INFO 040 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.6:34486 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="context finished before block retrieved: context canceled" grpc.code=Unknown grpc.call_duration=5.0137994s +orderer1.example.com | "2020-08-31 20:51:59.566 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 041 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:52:02.410 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 042 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:52:04.988 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 043 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:52:19.336 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 044 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=2 +orderer1.example.com | "2020-08-31 20:52:19.337 UTC [cauthdsl] deduplicate -> WARN 045 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +orderer1.example.com | "2020-08-31 20:52:19.338 UTC [cauthdsl] deduplicate -> WARN 046 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +orderer2.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer2.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer2.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer2.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer2.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer2.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer2.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer2.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer2.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer2.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer2.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer2.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer2.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer2.example.com | -----END CERTIFICATE----- +orderer2.example.com | ]" +orderer2.example.com | "2020-08-31 20:50:56.125 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03b Allocating a new stub for node 1 with endpoint of orderer0.example.com:7055 for channel businesschannel" +orderer2.example.com | "2020-08-31 20:50:56.125 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03c Deactivating node 1 in channel businesschannel with endpoint of orderer0.example.com:7055 due to TLS certificate change" +orderer2.example.com | "2020-08-31 20:50:56.126 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03d Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +orderer2.example.com | "2020-08-31 20:50:56.126 UTC [orderer.common.cluster] updateStubInMapping -> INFO 03e Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer2.example.com | "2020-08-31 20:50:56.127 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 03f 1 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer2.example.com | "2020-08-31 20:50:56.127 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 040 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer2.example.com | "2020-08-31 20:50:56.127 UTC [orderer.common.cluster] Configure -> INFO 041 Exiting" +orderer2.example.com | "2020-08-31 20:50:56.128 UTC [orderer.consensus.etcdraft] start -> INFO 042 Starting raft node as part of a new channel" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:50:56.129 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 043 3 became follower at term 0" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:50:56.133 UTC [orderer.consensus.etcdraft] newRaft -> INFO 044 newRaft 3 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:50:56.133 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 045 3 became follower at term 1" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:50:56.140 UTC [orderer.consensus.etcdraft] apply -> INFO 046 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:50:56.141 UTC [orderer.consensus.etcdraft] apply -> INFO 047 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:50:56.143 UTC [orderer.consensus.etcdraft] apply -> INFO 048 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:50:57.206 UTC [orderer.consensus.etcdraft] Step -> INFO 049 3 [logterm: 1, index: 3, vote: 0] cast MsgPreVote for 1 [logterm: 1, index: 3] at term 1" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:50:57.224 UTC [orderer.consensus.etcdraft] Step -> INFO 04a 3 [term: 1] received a MsgVote message with higher term from 1 [term: 2]" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:50:57.224 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 04b 3 became follower at term 2" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:50:57.224 UTC [orderer.consensus.etcdraft] Step -> INFO 04c 3 [logterm: 1, index: 3, vote: 0] cast MsgVote for 1 [logterm: 1, index: 3] at term 2" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:50:57.228 UTC [orderer.consensus.etcdraft] run -> INFO 04d raft.node: 3 elected leader 1 at term 2" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:50:57.229 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 04e Raft leader changed: 0 -> 1" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:51:00.843 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 04f Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:51:03.109 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 050 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:51:59.568 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 051 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:52:02.410 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 052 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:52:04.991 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 053 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:52:19.336 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 054 Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=3 +orderer2.example.com | "2020-08-31 20:52:19.367 UTC [cauthdsl] deduplicate -> WARN 055 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +orderer2.example.com | "2020-08-31 20:52:19.367 UTC [cauthdsl] deduplicate -> WARN 056 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +peer1.org1.example.com | [001 08-31 20:50:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +peer1.org1.example.com | [002 08-31 20:50:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer1.org1.example.com | [003 08-31 20:50:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +peer1.org1.example.com | [004 08-31 20:50:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +peer1.org1.example.com | [005 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer1.org1.example.com | [006 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +peer1.org1.example.com | [007 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +peer1.org1.example.com | [008 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +peer1.org1.example.com | [009 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +peer1.org1.example.com | [00a 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +peer1.org1.example.com | [00b 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +peer1.org1.example.com | [00c 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +peer1.org1.example.com | [00d 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [00e 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +peer1.org1.example.com | [00f 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [010 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +peer1.org1.example.com | [011 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [012 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +peer1.org1.example.com | [013 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [014 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +peer1.org1.example.com | [015 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [016 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +peer1.org1.example.com | [017 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +peer1.org1.example.com | [018 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [019 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +peer1.org1.example.com | [01a 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +peer1.org1.example.com | [01b 08-31 20:50:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore] +peer1.org1.example.com | [01c 08-31 20:50:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +peer1.org1.example.com | [01d 08-31 20:50:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +peer1.org1.example.com | [01e 08-31 20:50:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer1.org1.example.com-cert.pem +peer1.org1.example.com | [01f 08-31 20:50:44.79 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +peer1.org1.example.com | [020 08-31 20:50:44.79 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem +peer1.org1.example.com | [021 08-31 20:50:44.80 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +peer1.org1.example.com | [022 08-31 20:50:44.80 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +peer1.org1.example.com | [023 08-31 20:50:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +peer1.org1.example.com | [024 08-31 20:50:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +peer1.org1.example.com | [025 08-31 20:50:44.81 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem +peer1.org1.example.com | [026 08-31 20:50:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +peer1.org1.example.com | [027 08-31 20:50:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +peer1.org1.example.com | [028 08-31 20:50:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +peer1.org1.example.com | [029 08-31 20:50:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +peer1.org1.example.com | [02a 08-31 20:50:44.82 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +peer1.org1.example.com | [02b 08-31 20:50:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [02c 08-31 20:50:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [02d 08-31 20:50:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +peer1.org1.example.com | [02e 08-31 20:50:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [02f 08-31 20:50:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [030 08-31 20:50:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer1.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer1.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer1.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer1.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [031 08-31 20:50:44.87 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [f60e49f889339e1ff723455da36e39ede0b62889da84952e9f2b957f856f54c5] at [/etc/hyperledger/fabric/msp/keystore/f60e49f889339e1ff723455da36e39ede0b62889da84952e9f2b957f856f54c5_sk]... +peer1.org1.example.com | [032 08-31 20:50:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer1.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer1.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer1.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer1.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [033 08-31 20:50:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2030-02-18 18:24:00 +0000 UTC +peer1.org1.example.com | [034 08-31 20:50:44.88 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +peer1.org1.example.com | Version: 1.4.8 +peer1.org1.example.com | Commit SHA: development build +peer1.org1.example.com | Go version: go1.13.15 +peer1.org1.example.com | OS/Arch: linux/amd64 +peer1.org1.example.com | Chaincode: +peer1.org1.example.com | Base Image Version: 0.4.21 +peer1.org1.example.com | Base Docker Namespace: hyperledger +peer1.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer1.org1.example.com | Docker Namespace: hyperledger +peer1.org1.example.com | [035 08-31 20:50:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [036 08-31 20:50:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer1.org1.example.com | [037 08-31 20:50:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer1.org1.example.com | [038 08-31 20:50:44.89 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +peer1.org1.example.com | [039 08-31 20:50:44.89 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +peer1.org1.example.com | [03a 08-31 20:50:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +peer1.org1.example.com | [03b 08-31 20:50:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +peer1.org1.example.com | [03c 08-31 20:50:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +peer1.org1.example.com | [03d 08-31 20:50:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +peer1.org1.example.com | [03e 08-31 20:50:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +peer1.org1.example.com | [03f 08-31 20:50:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +peer1.org1.example.com | [040 08-31 20:50:44.92 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +peer1.org1.example.com | [041 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +peer1.org1.example.com | [042 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +peer1.org1.example.com | [043 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +peer1.org1.example.com | [044 08-31 20:50:45.00 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +peer1.org1.example.com | [045 08-31 20:50:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +peer1.org1.example.com | [046 08-31 20:50:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +peer1.org1.example.com | [047 08-31 20:50:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +peer1.org1.example.com | [048 08-31 20:50:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +peer1.org1.example.com | [049 08-31 20:50:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +peer1.org1.example.com | [04a 08-31 20:50:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +peer1.org1.example.com | [04b 08-31 20:50:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +peer1.org1.example.com | [04c 08-31 20:50:45.08 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +peer1.org1.example.com | [04d 08-31 20:50:45.08 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +peer1.org1.example.com | [04e 08-31 20:50:45.08 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +peer1.org1.example.com | [04f 08-31 20:50:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +peer1.org1.example.com | [050 08-31 20:50:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +peer1.org1.example.com | [051 08-31 20:50:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +peer1.org1.example.com | [052 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +peer1.org1.example.com | [053 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +peer1.org1.example.com | [054 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +peer1.org1.example.com | [055 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +peer1.org1.example.com | [056 08-31 20:50:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +peer1.org1.example.com | [057 08-31 20:50:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +peer1.org1.example.com | [058 08-31 20:50:45.17 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer1.org1.example.com | [059 08-31 20:50:45.17 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.8:7051 +peer1.org1.example.com | [05a 08-31 20:50:45.17 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org1.example.com:7051 +peer1.org1.example.com | [05b 08-31 20:50:45.17 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.8:7051 +peer1.org1.example.com | [05c 08-31 20:50:45.17 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org1.example.com:7051 +peer1.org1.example.com | [05d 08-31 20:50:45.19 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer1.org1.example.com | [05e 08-31 20:50:45.21 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer1.org1.example.com +peer1.org1.example.com | [05f 08-31 20:50:45.22 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer1.org1.example.com:7052 +peer1.org1.example.com | [060 08-31 20:50:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.8 +peer1.org1.example.com | [061 08-31 20:50:45.24 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer1.org1.example.com | [062 08-31 20:50:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.8 +peer1.org1.example.com | [063 08-31 20:50:45.24 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer1.org1.example.com | [064 08-31 20:50:45.24 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.8 +peer1.org1.example.com | [065 08-31 20:50:45.24 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer1.org1.example.com | [066 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +peer1.org1.example.com | [067 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +peer1.org1.example.com | [068 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [069 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +peer1.org1.example.com | [06a 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer1.org1.example.com | [06b 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer1.org1.example.com | [06c 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +peer1.org1.example.com | [06d 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +peer1.org1.example.com | [06e 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +peer1.org1.example.com | [06f 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +peer1.org1.example.com | [070 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer1.org1.example.com | [071 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +peer1.org1.example.com | [072 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [073 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +peer1.org1.example.com | [074 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +peer1.org1.example.com | [075 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +peer1.org1.example.com | [076 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org1.example.com | [077 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +peer1.org1.example.com | [078 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer1.org1.example.com | [079 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +peer1.org1.example.com | [07a 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +peer1.org1.example.com | [07b 08-31 20:50:45.27 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer1.org1.example.com:7051 and bootstrap set [peer0.org1.example.com:7051] +peer1.org1.example.com | [07c 08-31 20:50:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [07d 08-31 20:50:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +orderer0.example.com | 2020-08-31 20:50:43.086 UTC [viperutil] getKeysRecursively -> DEBU 01a Found real value for general.SystemChannel setting to +orderer0.example.com | 2020-08-31 20:50:43.086 UTC [viperutil] unmarshalJSON -> DEBU 01b Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.087 UTC [viperutil] getKeysRecursively -> DEBU 01c Found real value for general.ListenAddress setting to string 0.0.0.0 +orderer0.example.com | 2020-08-31 20:50:43.087 UTC [viperutil] getKeysRecursively -> DEBU 01d Found map[string]interface{} value for general.Cluster +orderer0.example.com | 2020-08-31 20:50:43.087 UTC [viperutil] unmarshalJSON -> DEBU 01e Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.087 UTC [viperutil] getKeysRecursively -> DEBU 01f Found real value for general.Cluster.ListenAddress setting to string 0.0.0.0 +orderer0.example.com | 2020-08-31 20:50:43.087 UTC [viperutil] unmarshalJSON -> DEBU 020 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.087 UTC [viperutil] getKeysRecursively -> DEBU 021 Found real value for general.Cluster.ServerPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2020-08-31 20:50:43.088 UTC [viperutil] unmarshalJSON -> DEBU 022 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.088 UTC [viperutil] getKeysRecursively -> DEBU 023 Found real value for general.Cluster.DialTimeout setting to +orderer0.example.com | 2020-08-31 20:50:43.089 UTC [viperutil] unmarshalJSON -> DEBU 024 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.089 UTC [viperutil] getKeysRecursively -> DEBU 025 Found real value for general.Cluster.ReplicationMaxRetries setting to +orderer0.example.com | 2020-08-31 20:50:43.090 UTC [viperutil] unmarshalJSON -> DEBU 026 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.090 UTC [viperutil] getKeysRecursively -> DEBU 027 Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +orderer0.example.com | 2020-08-31 20:50:43.090 UTC [viperutil] unmarshalJSON -> DEBU 028 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.090 UTC [viperutil] getKeysRecursively -> DEBU 029 Found real value for general.Cluster.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | 2020-08-31 20:50:43.091 UTC [viperutil] unmarshalJSON -> DEBU 02a Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.091 UTC [viperutil] getKeysRecursively -> DEBU 02b Found real value for general.Cluster.RPCTimeout setting to +orderer0.example.com | 2020-08-31 20:50:43.092 UTC [viperutil] unmarshalJSON -> DEBU 02c Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.092 UTC [viperutil] getKeysRecursively -> DEBU 02d Found real value for general.Cluster.ReplicationRetryTimeout setting to +orderer0.example.com | 2020-08-31 20:50:43.092 UTC [viperutil] unmarshalJSON -> DEBU 02e Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.093 UTC [viperutil] getKeysRecursively -> DEBU 02f Found real value for general.Cluster.ReplicationBackgroundRefreshInterval setting to +orderer0.example.com | 2020-08-31 20:50:43.093 UTC [viperutil] unmarshalJSON -> DEBU 030 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.093 UTC [viperutil] getKeysRecursively -> DEBU 031 Found real value for general.Cluster.ServerCertificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2020-08-31 20:50:43.093 UTC [viperutil] unmarshalJSON -> DEBU 032 Unmarshal JSON: value is not a string: 10 +orderer0.example.com | 2020-08-31 20:50:43.094 UTC [viperutil] getKeysRecursively -> DEBU 033 Found real value for general.Cluster.SendBufferSize setting to int 10 +orderer0.example.com | 2020-08-31 20:50:43.095 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.095 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt +orderer0.example.com | 2020-08-31 20:50:43.095 UTC [viperutil] unmarshalJSON -> DEBU 036 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.095 UTC [viperutil] getKeysRecursively -> DEBU 037 Found real value for general.Cluster.ReplicationBufferSize setting to +orderer0.example.com | 2020-08-31 20:50:43.095 UTC [viperutil] unmarshalJSON -> DEBU 038 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +orderer0.example.com | 2020-08-31 20:50:43.095 UTC [viperutil] getKeysRecursively -> DEBU 039 Found real value for general.Cluster.ListenPort setting to string 7055 +orderer0.example.com | 2020-08-31 20:50:43.095 UTC [viperutil] unmarshalJSON -> DEBU 03a Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.095 UTC [viperutil] getKeysRecursively -> DEBU 03b Found real value for general.Cluster.ReplicationPullTimeout setting to +orderer0.example.com | 2020-08-31 20:50:43.096 UTC [viperutil] unmarshalJSON -> DEBU 03c Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.096 UTC [viperutil] getKeysRecursively -> DEBU 03d Found real value for general.Cluster.CertExpirationWarningThreshold setting to +orderer0.example.com | 2020-08-31 20:50:43.096 UTC [viperutil] unmarshalJSON -> DEBU 03e Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.096 UTC [viperutil] getKeysRecursively -> DEBU 03f Found real value for general.Cluster.TLSHandshakeTimeShift setting to +orderer0.example.com | 2020-08-31 20:50:43.097 UTC [viperutil] getKeysRecursively -> DEBU 040 Found map[string]interface{} value for general.Authentication +orderer0.example.com | 2020-08-31 20:50:43.099 UTC [viperutil] unmarshalJSON -> DEBU 041 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.099 UTC [viperutil] getKeysRecursively -> DEBU 042 Found real value for general.Authentication.TimeWindow setting to string 15m +orderer0.example.com | 2020-08-31 20:50:43.099 UTC [viperutil] unmarshalJSON -> DEBU 043 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.099 UTC [viperutil] getKeysRecursively -> DEBU 044 Found real value for general.Authentication.NoExpirationChecks setting to +orderer0.example.com | 2020-08-31 20:50:43.099 UTC [viperutil] getKeysRecursively -> DEBU 045 Found map[string]interface{} value for general.Profile +orderer0.example.com | 2020-08-31 20:50:43.100 UTC [viperutil] unmarshalJSON -> DEBU 046 Unmarshal JSON: value is not a string: false +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer1.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer1.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer1.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer1.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [07e 08-31 20:50:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [07f 08-31 20:50:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [080 08-31 20:50:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [081 08-31 20:50:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +orderer0.example.com | 2020-08-31 20:50:43.100 UTC [viperutil] getKeysRecursively -> DEBU 047 Found real value for general.Profile.Enabled setting to bool false +orderer0.example.com | 2020-08-31 20:50:43.100 UTC [viperutil] unmarshalJSON -> DEBU 048 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.100 UTC [viperutil] getKeysRecursively -> DEBU 049 Found real value for general.Profile.Address setting to string 0.0.0.0:6060 +orderer0.example.com | 2020-08-31 20:50:43.100 UTC [viperutil] unmarshalJSON -> DEBU 04a Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.100 UTC [viperutil] getKeysRecursively -> DEBU 04b Found real value for general.LocalMSPID setting to string OrdererMSP +orderer0.example.com | 2020-08-31 20:50:43.101 UTC [viperutil] unmarshalJSON -> DEBU 04c Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.101 UTC [viperutil] getKeysRecursively -> DEBU 04d Found real value for general.ConnectionTimeout setting to +orderer0.example.com | 2020-08-31 20:50:43.101 UTC [viperutil] getKeysRecursively -> DEBU 04e Found map[string]interface{} value for general.BCCSP +orderer0.example.com | 2020-08-31 20:50:43.101 UTC [viperutil] unmarshalJSON -> DEBU 04f Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.102 UTC [viperutil] getKeysRecursively -> DEBU 050 Found real value for general.BCCSP.Default setting to string SW +peer0.org2.example.com | [001 08-31 20:50:45.08 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +peer0.org2.example.com | [002 08-31 20:50:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +peer0.org2.example.com | [003 08-31 20:50:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [004 08-31 20:50:45.09 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +peer0.org2.example.com | [005 08-31 20:50:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [006 08-31 20:50:45.10 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +peer0.org2.example.com | [007 08-31 20:50:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [008 08-31 20:50:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +peer0.org2.example.com | [009 08-31 20:50:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [00a 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +peer0.org2.example.com | [00b 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [00c 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +peer0.org2.example.com | [00d 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +peer0.org2.example.com | [00e 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [00f 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +peer0.org2.example.com | [010 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org2.example.com | [011 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +peer0.org2.example.com | [012 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +peer0.org2.example.com | [013 08-31 20:50:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org2.example.com | [014 08-31 20:50:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +peer0.org2.example.com | [015 08-31 20:50:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +peer0.org2.example.com | [016 08-31 20:50:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +peer0.org2.example.com | [017 08-31 20:50:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +peer0.org2.example.com | [018 08-31 20:50:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +peer0.org2.example.com | [019 08-31 20:50:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +peer0.org2.example.com | [01a 08-31 20:50:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +peer0.org2.example.com | [01b 08-31 20:50:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore] +peer0.org2.example.com | [01c 08-31 20:50:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +peer0.org2.example.com | [01d 08-31 20:50:45.16 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +peer0.org2.example.com | [01e 08-31 20:50:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org2.example.com-cert.pem +peer0.org2.example.com | [01f 08-31 20:50:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +peer0.org2.example.com | [020 08-31 20:50:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org2.example.com-cert.pem +peer0.org2.example.com | [021 08-31 20:50:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +peer0.org2.example.com | [022 08-31 20:50:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +peer0.org2.example.com | [023 08-31 20:50:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +peer0.org2.example.com | [024 08-31 20:50:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +peer0.org2.example.com | [025 08-31 20:50:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org2.example.com-cert.pem +peer0.org2.example.com | [026 08-31 20:50:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +peer0.org2.example.com | [027 08-31 20:50:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +peer0.org2.example.com | [028 08-31 20:50:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +peer0.org2.example.com | [029 08-31 20:50:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +peer0.org2.example.com | [02a 08-31 20:50:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +peer0.org2.example.com | [02b 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [02c 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [02d 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +peer0.org2.example.com | [02e 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org2.example.com | [02f 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | 2020-08-31 20:50:43.102 UTC [viperutil] getKeysRecursively -> DEBU 051 Found map[string]interface{} value for general.BCCSP.SW +orderer0.example.com | 2020-08-31 20:50:43.102 UTC [viperutil] getKeysRecursively -> DEBU 052 Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore +orderer0.example.com | 2020-08-31 20:50:43.102 UTC [viperutil] unmarshalJSON -> DEBU 053 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.102 UTC [viperutil] getKeysRecursively -> DEBU 054 Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to +orderer0.example.com | 2020-08-31 20:50:43.102 UTC [viperutil] unmarshalJSON -> DEBU 055 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.102 UTC [viperutil] getKeysRecursively -> DEBU 056 Found real value for general.BCCSP.SW.Hash setting to string SHA2 +orderer0.example.com | 2020-08-31 20:50:43.103 UTC [viperutil] unmarshalJSON -> DEBU 057 Unmarshal JSON: value is not a string: 256 +orderer0.example.com | 2020-08-31 20:50:43.103 UTC [viperutil] getKeysRecursively -> DEBU 058 Found real value for general.BCCSP.SW.Security setting to int 256 +orderer0.example.com | 2020-08-31 20:50:43.103 UTC [viperutil] getKeysRecursively -> DEBU 059 Found map[string]interface{} value for general.BCCSP.PKCS11 +orderer0.example.com | 2020-08-31 20:50:43.103 UTC [viperutil] unmarshalJSON -> DEBU 05a Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.104 UTC [viperutil] getKeysRecursively -> DEBU 05b Found real value for general.BCCSP.PKCS11.Library setting to +orderer0.example.com | 2020-08-31 20:50:43.105 UTC [viperutil] unmarshalJSON -> DEBU 05c Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.105 UTC [viperutil] getKeysRecursively -> DEBU 05d Found real value for general.BCCSP.PKCS11.Label setting to +orderer0.example.com | 2020-08-31 20:50:43.105 UTC [viperutil] unmarshalJSON -> DEBU 05e Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.107 UTC [viperutil] getKeysRecursively -> DEBU 05f Found real value for general.BCCSP.PKCS11.Pin setting to +orderer0.example.com | 2020-08-31 20:50:43.108 UTC [viperutil] unmarshalJSON -> DEBU 060 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.108 UTC [viperutil] getKeysRecursively -> DEBU 061 Found real value for general.BCCSP.PKCS11.Hash setting to +orderer0.example.com | 2020-08-31 20:50:43.108 UTC [viperutil] unmarshalJSON -> DEBU 062 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.108 UTC [viperutil] getKeysRecursively -> DEBU 063 Found real value for general.BCCSP.PKCS11.Security setting to +orderer0.example.com | 2020-08-31 20:50:43.109 UTC [viperutil] getKeysRecursively -> DEBU 064 Found map[string]interface{} value for general.BCCSP.PKCS11.FileKeyStore +orderer0.example.com | 2020-08-31 20:50:43.109 UTC [viperutil] unmarshalJSON -> DEBU 065 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.109 UTC [viperutil] getKeysRecursively -> DEBU 066 Found real value for general.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +orderer0.example.com | 2020-08-31 20:50:43.109 UTC [viperutil] unmarshalJSON -> DEBU 067 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.109 UTC [viperutil] getKeysRecursively -> DEBU 068 Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp +orderer0.example.com | 2020-08-31 20:50:43.109 UTC [viperutil] getKeysRecursively -> DEBU 069 Found map[string]interface{} value for general.Keepalive +orderer0.example.com | 2020-08-31 20:50:43.111 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.111 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for general.Keepalive.ServerInterval setting to string 7200s +orderer0.example.com | 2020-08-31 20:50:43.111 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.111 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for general.Keepalive.ServerTimeout setting to string 20s +orderer0.example.com | 2020-08-31 20:50:43.112 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.113 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for general.Keepalive.ServerMinInterval setting to string 60s +orderer0.example.com | 2020-08-31 20:50:43.113 UTC [viperutil] getKeysRecursively -> DEBU 070 Found map[interface{}]interface{} value for fileledger +orderer0.example.com | 2020-08-31 20:50:43.113 UTC [viperutil] unmarshalJSON -> DEBU 071 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.113 UTC [viperutil] getKeysRecursively -> DEBU 072 Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer +orderer0.example.com | 2020-08-31 20:50:43.113 UTC [viperutil] unmarshalJSON -> DEBU 073 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.113 UTC [viperutil] getKeysRecursively -> DEBU 074 Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger +orderer0.example.com | 2020-08-31 20:50:43.113 UTC [viperutil] getKeysRecursively -> DEBU 075 Found map[interface{}]interface{} value for ramledger +orderer0.example.com | 2020-08-31 20:50:43.113 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value is not a string: 1000 +orderer0.example.com | 2020-08-31 20:50:43.113 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for ramledger.HistorySize setting to int 1000 +orderer0.example.com | 2020-08-31 20:50:43.113 UTC [viperutil] getKeysRecursively -> DEBU 078 Found map[interface{}]interface{} value for kafka +orderer0.example.com | 2020-08-31 20:50:43.113 UTC [viperutil] getKeysRecursively -> DEBU 079 Found map[string]interface{} value for kafka.Retry +orderer0.example.com | 2020-08-31 20:50:43.114 UTC [viperutil] unmarshalJSON -> DEBU 07a Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 07b Found real value for kafka.Retry.ShortInterval setting to string 5s +orderer0.example.com | 2020-08-31 20:50:43.114 UTC [viperutil] unmarshalJSON -> DEBU 07c Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 07d Found real value for kafka.Retry.ShortTotal setting to string 10m +orderer0.example.com | 2020-08-31 20:50:43.114 UTC [viperutil] unmarshalJSON -> DEBU 07e Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 07f Found real value for kafka.Retry.LongInterval setting to string 5m +orderer0.example.com | 2020-08-31 20:50:43.114 UTC [viperutil] unmarshalJSON -> DEBU 080 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 081 Found real value for kafka.Retry.LongTotal setting to string 12h +orderer0.example.com | 2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 082 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts +orderer0.example.com | 2020-08-31 20:50:43.114 UTC [viperutil] unmarshalJSON -> DEBU 083 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +peer1.org1.example.com | [082 08-31 20:50:45.31 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b, Metadata: +peer1.org1.example.com | [083 08-31 20:50:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [084 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01DB060A201FF20917D2308491...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [085 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 494B7A1CF7727D9869353DB5DFD3651B92B933B238D66E7CDE50993B20AC8ACA +peer1.org1.example.com | [086 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Added � �0��U�n�����##~J�9���o�R=�, total items: 1 +peer1.org1.example.com | [087 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer1.org1.example.com:7051 started +peer1.org1.example.com | [088 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +peer1.org1.example.com | [089 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [08a 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [08b 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6F5E52306F081233E2CB83A3C1AA6EECD4C1BC9288C323111092EC5946E2716C +peer1.org1.example.com | [08c 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [08d 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [08e 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [08f 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [090 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [091 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.8,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org1.example.com | [092 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.8 +peer1.org1.example.com | [094 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org1.example.com:7052 +peer1.org1.example.com | [095 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org1.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.8 +peer1.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org1.example.com | [093 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [096 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.8) lock +peer1.org1.example.com | [098 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.8) lock +peer1.org1.example.com | [097 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [099 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [09a 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.8 +peer1.org1.example.com | [09b 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.8) +peer1.org1.example.com | [09c 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.8) lock +peer1.org1.example.com | [09d 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.8) lock +peer1.org1.example.com | [09e 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.8) +peer1.org1.example.com | [09f 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.8 +peer1.org1.example.com | [0a0 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.8 +peer1.org1.example.com | [0a1 08-31 20:50:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org1.example.com | [0a2 08-31 20:50:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org1.example.com | [0a3 08-31 20:50:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.8 +peer1.org1.example.com | [0a4 08-31 20:50:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.8" , sending back REGISTERED +peer1.org1.example.com | [0a5 08-31 20:50:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.8" +peer1.org1.example.com | [0a6 08-31 20:50:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.8" +peer1.org1.example.com | [0a7 08-31 20:50:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.8" +peer1.org1.example.com | [0a8 08-31 20:50:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org1.example.com | [0a9 08-31 20:50:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [0aa 08-31 20:50:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU [08793459] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [0ab 08-31 20:50:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU [08793459] notifying Txid:08793459-3d2a-4651-9adb-ecfec0b5dde6, channelID: +peer1.org1.example.com | [0ac 08-31 20:50:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [0ad 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer1.org1.example.com | [0ae 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.8,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org1.example.com | [0af 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.8 +peer1.org1.example.com | [0b0 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org1.example.com:7052 +peer1.org1.example.com | [0b1 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org1.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.8 +peer1.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org1.example.com | [0b2 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.8) lock +peer1.org1.example.com | [0b3 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.8) lock +peer1.org1.example.com | [0b4 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.8 +peer1.org1.example.com | [0b5 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.8) +peer1.org1.example.com | [0b6 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.8) lock +peer1.org1.example.com | [0b7 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.8) lock +peer1.org1.example.com | [0b8 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.8) +peer1.org1.example.com | [0b9 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.8 +peer1.org1.example.com | [0ba 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.8 +peer1.org1.example.com | [0bb 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org1.example.com | [0bc 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org1.example.com | [0bd 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.8 +peer1.org1.example.com | [0be 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.8" , sending back REGISTERED +peer1.org1.example.com | [0bf 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.8" +peer1.org1.example.com | [0c0 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.8" +peer1.org1.example.com | [0c1 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.8" +peer1.org1.example.com | [0c2 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org1.example.com | [0c3 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [0c4 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer1.org1.example.com | [0c5 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU [e188634c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [0c6 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU [e188634c] notifying Txid:e188634c-1103-4ac2-a79e-ed7df8323af5, channelID: +peer1.org1.example.com | [0c7 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [0c8 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer1.org1.example.com | [0c9 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [0ca 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025ebee0, CONNECTING +peer1.org1.example.com | [0cb 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.8,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org1.example.com | [0cc 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.8 +peer1.org1.example.com | [0cd 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org1.example.com:7052 +peer1.org1.example.com | [0ce 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org1.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.8 +peer1.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +orderer0.example.com | 2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 084 Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s +orderer0.example.com | 2020-08-31 20:50:43.114 UTC [viperutil] unmarshalJSON -> DEBU 085 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 086 Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s +orderer0.example.com | 2020-08-31 20:50:43.114 UTC [viperutil] unmarshalJSON -> DEBU 087 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 088 Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s +orderer0.example.com | 2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 089 Found map[string]interface{} value for kafka.Retry.Metadata +orderer0.example.com | 2020-08-31 20:50:43.114 UTC [viperutil] unmarshalJSON -> DEBU 08a Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 08b Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms +orderer0.example.com | 2020-08-31 20:50:43.115 UTC [viperutil] unmarshalJSON -> DEBU 08c Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2020-08-31 20:50:43.115 UTC [viperutil] getKeysRecursively -> DEBU 08d Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 +orderer0.example.com | 2020-08-31 20:50:43.115 UTC [viperutil] getKeysRecursively -> DEBU 08e Found map[string]interface{} value for kafka.Retry.Producer +orderer0.example.com | 2020-08-31 20:50:43.115 UTC [viperutil] unmarshalJSON -> DEBU 08f Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2020-08-31 20:50:43.115 UTC [viperutil] getKeysRecursively -> DEBU 090 Found real value for kafka.Retry.Producer.RetryMax setting to int 3 +orderer0.example.com | 2020-08-31 20:50:43.115 UTC [viperutil] unmarshalJSON -> DEBU 091 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.115 UTC [viperutil] getKeysRecursively -> DEBU 092 Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms +orderer0.example.com | 2020-08-31 20:50:43.115 UTC [viperutil] getKeysRecursively -> DEBU 093 Found map[string]interface{} value for kafka.Retry.Consumer +orderer0.example.com | 2020-08-31 20:50:43.115 UTC [viperutil] unmarshalJSON -> DEBU 094 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.115 UTC [viperutil] getKeysRecursively -> DEBU 095 Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s +orderer0.example.com | 2020-08-31 20:50:43.115 UTC [viperutil] getKeysRecursively -> DEBU 096 Found map[string]interface{} value for kafka.Topic +orderer0.example.com | 2020-08-31 20:50:43.115 UTC [viperutil] unmarshalJSON -> DEBU 097 Unmarshal JSON: value is not a string: 3 +orderer0.example.com | 2020-08-31 20:50:43.115 UTC [viperutil] getKeysRecursively -> DEBU 098 Found real value for kafka.Topic.ReplicationFactor setting to int 3 +orderer0.example.com | 2020-08-31 20:50:43.115 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-08-31 20:50:43.115 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for kafka.Verbose setting to bool false +orderer0.example.com | 2020-08-31 20:50:43.116 UTC [viperutil] getKeysRecursively -> DEBU 09b Found map[string]interface{} value for kafka.TLS +orderer0.example.com | 2020-08-31 20:50:43.116 UTC [viperutil] unmarshalJSON -> DEBU 09c Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.116 UTC [viperutil] getKeysRecursively -> DEBU 09d Found real value for kafka.TLS.ClientAuthRequired setting to +orderer0.example.com | 2020-08-31 20:50:43.116 UTC [viperutil] unmarshalJSON -> DEBU 09e Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.116 UTC [viperutil] getKeysRecursively -> DEBU 09f Found real value for kafka.TLS.ClientRootCAs setting to +orderer0.example.com | 2020-08-31 20:50:43.116 UTC [viperutil] unmarshalJSON -> DEBU 0a0 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-08-31 20:50:43.116 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found real value for kafka.TLS.Enabled setting to bool false +orderer0.example.com | 2020-08-31 20:50:43.116 UTC [viperutil] unmarshalJSON -> DEBU 0a2 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.117 UTC [viperutil] getKeysRecursively -> DEBU 0a3 Found real value for kafka.TLS.PrivateKey setting to +orderer0.example.com | 2020-08-31 20:50:43.117 UTC [viperutil] unmarshalJSON -> DEBU 0a4 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.117 UTC [viperutil] getKeysRecursively -> DEBU 0a5 Found real value for kafka.TLS.Certificate setting to +orderer0.example.com | 2020-08-31 20:50:43.117 UTC [viperutil] unmarshalJSON -> DEBU 0a6 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.117 UTC [viperutil] getKeysRecursively -> DEBU 0a7 Found real value for kafka.TLS.RootCAs setting to +orderer0.example.com | 2020-08-31 20:50:43.117 UTC [viperutil] getKeysRecursively -> DEBU 0a8 Found map[string]interface{} value for kafka.SASLPlain +orderer0.example.com | 2020-08-31 20:50:43.117 UTC [viperutil] unmarshalJSON -> DEBU 0a9 Unmarshal JSON: value is not a string: +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [030 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer0.org2.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer0.org2.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer0.org2.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [031 08-31 20:50:45.25 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [28f79c620d7586f05d007154c765dd38e4d53039406e11850b5c19b59fa1c336] at [/etc/hyperledger/fabric/msp/keystore/28f79c620d7586f05d007154c765dd38e4d53039406e11850b5c19b59fa1c336_sk]... +peer0.org2.example.com | [032 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer0.org2.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer0.org2.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer0.org2.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [033 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2030-02-18 18:24:00 +0000 UTC +peer0.org2.example.com | [034 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +peer0.org2.example.com | Version: 1.4.8 +peer0.org2.example.com | Commit SHA: development build +peer0.org2.example.com | Go version: go1.13.15 +peer0.org2.example.com | OS/Arch: linux/amd64 +peer0.org2.example.com | Chaincode: +peer0.org2.example.com | Base Image Version: 0.4.21 +peer0.org2.example.com | Base Docker Namespace: hyperledger +peer0.org2.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org2.example.com | Docker Namespace: hyperledger +peer0.org2.example.com | [035 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [036 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer0.org2.example.com | [037 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer0.org2.example.com | [038 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +peer0.org2.example.com | [039 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +peer0.org2.example.com | [03a 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +peer0.org2.example.com | [03b 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +peer0.org2.example.com | [03c 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +peer1.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org1.example.com | [0cf 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.8) lock +peer1.org1.example.com | [0d0 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU grpc: addrConn.createTransport failed to connect to {peer0.org1.example.com:7051 0 }. Err :connection error: desc = "transport: Error while dialing dial tcp 172.18.0.7:7051: connect: connection refused". Reconnecting... +peer1.org1.example.com | [0d1 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.8) lock +peer1.org1.example.com | [0d2 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.8 +peer1.org1.example.com | [0d3 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025ebee0, TRANSIENT_FAILURE +peer1.org1.example.com | [0d4 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.8) +peer1.org1.example.com | [0d5 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.8) lock +peer1.org1.example.com | [0d6 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.8) lock +peer1.org1.example.com | [0d7 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.8) +peer1.org1.example.com | [0d8 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.8 +peer1.org1.example.com | [0d9 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.8 +peer1.org1.example.com | [0da 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org1.example.com | [0db 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org1.example.com | [0dc 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.8 +orderer0.example.com | 2020-08-31 20:50:43.117 UTC [viperutil] getKeysRecursively -> DEBU 0aa Found real value for kafka.SASLPlain.User setting to +orderer0.example.com | 2020-08-31 20:50:43.118 UTC [viperutil] unmarshalJSON -> DEBU 0ab Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.118 UTC [viperutil] getKeysRecursively -> DEBU 0ac Found real value for kafka.SASLPlain.Password setting to +orderer0.example.com | 2020-08-31 20:50:43.118 UTC [viperutil] unmarshalJSON -> DEBU 0ad Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-08-31 20:50:43.118 UTC [viperutil] getKeysRecursively -> DEBU 0ae Found real value for kafka.SASLPlain.Enabled setting to bool false +orderer0.example.com | 2020-08-31 20:50:43.118 UTC [viperutil] unmarshalJSON -> DEBU 0af Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.118 UTC [viperutil] getKeysRecursively -> DEBU 0b0 Found real value for kafka.Version setting to +orderer0.example.com | 2020-08-31 20:50:43.118 UTC [viperutil] getKeysRecursively -> DEBU 0b1 Found map[interface{}]interface{} value for debug +orderer0.example.com | 2020-08-31 20:50:43.119 UTC [viperutil] unmarshalJSON -> DEBU 0b2 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.119 UTC [viperutil] getKeysRecursively -> DEBU 0b3 Found real value for debug.BroadcastTraceDir setting to +orderer0.example.com | 2020-08-31 20:50:43.119 UTC [viperutil] unmarshalJSON -> DEBU 0b4 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.119 UTC [viperutil] getKeysRecursively -> DEBU 0b5 Found real value for debug.DeliverTraceDir setting to +orderer0.example.com | 2020-08-31 20:50:43.119 UTC [viperutil] getKeysRecursively -> DEBU 0b6 Found map[interface{}]interface{} value for operations +orderer0.example.com | 2020-08-31 20:50:43.119 UTC [viperutil] getKeysRecursively -> DEBU 0b7 Found map[string]interface{} value for operations.TLS +orderer0.example.com | 2020-08-31 20:50:43.119 UTC [viperutil] unmarshalJSON -> DEBU 0b8 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.119 UTC [viperutil] getKeysRecursively -> DEBU 0b9 Found real value for operations.TLS.Certificate setting to +orderer0.example.com | 2020-08-31 20:50:43.119 UTC [viperutil] unmarshalJSON -> DEBU 0ba Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.119 UTC [viperutil] getKeysRecursively -> DEBU 0bb Found real value for operations.TLS.PrivateKey setting to +orderer0.example.com | 2020-08-31 20:50:43.119 UTC [viperutil] unmarshalJSON -> DEBU 0bc Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0bd Found real value for operations.TLS.ClientAuthRequired setting to bool false +orderer0.example.com | 2020-08-31 20:50:43.120 UTC [viperutil] unmarshalJSON -> DEBU 0be Unmarshal JSON: value is not a string: [] +orderer0.example.com | 2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0bf Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] +orderer0.example.com | 2020-08-31 20:50:43.120 UTC [viperutil] unmarshalJSON -> DEBU 0c0 Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0c1 Found real value for operations.TLS.RootCAs setting to +orderer0.example.com | 2020-08-31 20:50:43.120 UTC [viperutil] unmarshalJSON -> DEBU 0c2 Unmarshal JSON: value is not a string: false +orderer0.example.com | 2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0c3 Found real value for operations.TLS.Enabled setting to bool false +orderer0.example.com | 2020-08-31 20:50:43.120 UTC [viperutil] unmarshalJSON -> DEBU 0c4 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0c5 Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 +orderer0.example.com | 2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0c6 Found map[interface{}]interface{} value for metrics +orderer0.example.com | 2020-08-31 20:50:43.120 UTC [viperutil] unmarshalJSON -> DEBU 0c7 Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0c8 Found real value for metrics.Provider setting to string prometheus +orderer0.example.com | 2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0c9 Found map[string]interface{} value for metrics.Statsd +orderer0.example.com | 2020-08-31 20:50:43.120 UTC [viperutil] unmarshalJSON -> DEBU 0ca Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0cb Found real value for metrics.Statsd.WriteInterval setting to string 30s +orderer0.example.com | 2020-08-31 20:50:43.120 UTC [viperutil] unmarshalJSON -> DEBU 0cc Unmarshal JSON: value is not a string: +orderer0.example.com | 2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0cd Found real value for metrics.Statsd.Prefix setting to +orderer0.example.com | 2020-08-31 20:50:43.120 UTC [viperutil] unmarshalJSON -> DEBU 0ce Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.121 UTC [viperutil] getKeysRecursively -> DEBU 0cf Found real value for metrics.Statsd.Network setting to string udp +orderer0.example.com | 2020-08-31 20:50:43.121 UTC [viperutil] unmarshalJSON -> DEBU 0d0 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +orderer0.example.com | 2020-08-31 20:50:43.121 UTC [viperutil] getKeysRecursively -> DEBU 0d1 Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 +orderer0.example.com | 2020-08-31 20:50:43.121 UTC [viperutil] getKeysRecursively -> DEBU 0d2 Found map[interface{}]interface{} value for consensus +orderer0.example.com | 2020-08-31 20:50:43.121 UTC [viperutil] unmarshalJSON -> DEBU 0d3 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.121 UTC [viperutil] getKeysRecursively -> DEBU 0d4 Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal +orderer0.example.com | 2020-08-31 20:50:43.121 UTC [viperutil] unmarshalJSON -> DEBU 0d5 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +orderer0.example.com | 2020-08-31 20:50:43.121 UTC [viperutil] getKeysRecursively -> DEBU 0d6 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot +orderer0.example.com | 2020-08-31 20:50:43.121 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0d7 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[NoExpirationChecks: TimeWindow:15m] BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[CertExpirationWarningThreshold: ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key DialTimeout: ListenAddress:0.0.0.0 ListenPort:7055 RPCTimeout: ReplicationBackgroundRefreshInterval: ReplicationBufferSize: ReplicationMaxRetries: ReplicationPullTimeout: ReplicationRetryTimeout: RootCAs:[/var/hyperledger/orderer/tls/ca.crt] SendBufferSize:10 ServerCertificate:/var/hyperledger/orderer/tls/server.crt ServerPrivateKey:/var/hyperledger/orderer/tls/server.key TLSHandshakeTimeShift:] ConnectionTimeout: GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] SystemChannel: TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: ClientAuthRequired: ClientRootCAs: Enabled:false PrivateKey: RootCAs:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey: RootCAs:]] ramledger:map[HistorySize:1000]] +orderer0.example.com | 2020-08-31 20:50:43.122 UTC [localconfig] completeInitialization -> INFO 0d8 Kafka.Version unset, setting to 0.10.2.0 +orderer0.example.com | "2020-08-31 20:50:43.144 UTC [bccsp_sw] openKeyStore -> DEBU 0d9 KeyStore opened at [/var/hyperledger/orderer/msp/keystore]" +orderer0.example.com | "2020-08-31 20:50:43.144 UTC [bccsp] initBCCSP -> DEBU 0da Initialize BCCSP [SW]" +orderer0.example.com | "2020-08-31 20:50:43.144 UTC [msp] getPemMaterialFromDir -> DEBU 0db Reading directory /var/hyperledger/orderer/msp/signcerts" +orderer0.example.com | "2020-08-31 20:50:43.154 UTC [msp] getPemMaterialFromDir -> DEBU 0dc Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" +orderer0.example.com | "2020-08-31 20:50:43.164 UTC [msp] getPemMaterialFromDir -> DEBU 0dd Reading directory /var/hyperledger/orderer/msp/cacerts" +orderer0.example.com | "2020-08-31 20:50:43.190 UTC [msp] getPemMaterialFromDir -> DEBU 0de Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" +peer0.org2.example.com | [03d 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +peer0.org2.example.com | [03e 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +peer0.org2.example.com | [03f 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +peer0.org2.example.com | [040 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +peer0.org2.example.com | [041 08-31 20:50:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +peer0.org2.example.com | [042 08-31 20:50:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +peer0.org2.example.com | [043 08-31 20:50:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +peer0.org2.example.com | [044 08-31 20:50:45.30 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +peer0.org2.example.com | [045 08-31 20:50:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +peer0.org2.example.com | [046 08-31 20:50:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +peer0.org2.example.com | [047 08-31 20:50:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +peer0.org2.example.com | [048 08-31 20:50:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +peer0.org2.example.com | [049 08-31 20:50:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +peer0.org2.example.com | [04a 08-31 20:50:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +peer0.org2.example.com | [04b 08-31 20:50:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +peer0.org2.example.com | [04c 08-31 20:50:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +peer0.org2.example.com | [04d 08-31 20:50:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +peer0.org2.example.com | [04e 08-31 20:50:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +peer0.org2.example.com | [04f 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +peer0.org2.example.com | [050 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +peer0.org2.example.com | [051 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +peer0.org2.example.com | [052 08-31 20:50:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +peer0.org2.example.com | [053 08-31 20:50:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +peer0.org2.example.com | [054 08-31 20:50:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +peer0.org2.example.com | [055 08-31 20:50:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +peer1.org1.example.com | [0dd 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.8" , sending back REGISTERED +peer1.org1.example.com | [0de 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.8" +peer1.org1.example.com | [0df 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.8" +peer1.org1.example.com | [0e0 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.8" +peer1.org1.example.com | [0e1 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org1.example.com | [0e2 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [0e3 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer1.org1.example.com | [0e4 08-31 20:50:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU [68e115ac] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [0e5 08-31 20:50:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU [68e115ac] notifying Txid:68e115ac-c57c-42a3-9ac3-dcf62f93ed6b, channelID: +peer1.org1.example.com | [0e6 08-31 20:50:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [0e7 08-31 20:50:45.36 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org1.example.com | [0e8 08-31 20:50:45.36 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer1.org1.example.com | [0e9 08-31 20:50:45.36 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer1.org1.example.com | [0ea 08-31 20:50:45.36 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer1.org1.example.com | [0eb 08-31 20:50:45.36 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer1.org1.example.com | [0ec 08-31 20:50:45.36 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer1.org1.example.com | [0ed 08-31 20:50:45.36 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051] +peer1.org1.example.com | [0ee 08-31 20:50:45.37 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer1.org1.example.com" ], network ID=[dev], address=[peer1.org1.example.com:7051] +peer1.org1.example.com | [0ef 08-31 20:50:45.37 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +peer1.org1.example.com | [0f0 08-31 20:50:45.37 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +peer1.org1.example.com | [0f1 08-31 20:50:45.37 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +peer1.org1.example.com | [0f2 08-31 20:50:45.37 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +peer1.org1.example.com | [0f3 08-31 20:50:46.36 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025ebee0, CONNECTING +peer1.org1.example.com | [0f4 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025ebee0, READY +peer1.org1.example.com | [0f5 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [0f6 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [0f7 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [0f8 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer1.org1.example.com | [0f9 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org1.example.com | [0fa 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [0fb 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [0fc 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [0fd 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [0fe 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [0ff 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 36 f3 9f 04 a1 52 15 88 07 52 78 |0D. 46....R...Rx| +peer1.org1.example.com | 00000010 37 58 6d 5a 39 1f 17 78 c2 de 43 fe 9a 63 58 16 |7XmZ9..x..C..cX.| +peer1.org1.example.com | 00000020 99 4d 34 0d 02 20 2d af 00 09 20 45 bc 54 f4 bc |.M4.. -... E.T..| +peer1.org1.example.com | 00000030 3f 93 17 82 d6 78 23 a6 f0 70 2e db ee 18 41 f6 |?....x#..p....A.| +peer1.org1.example.com | 00000040 14 56 67 93 7b f5 |.Vg.{.| +peer1.org1.example.com | [100 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org1.example.com | [101 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [102 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [103 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 956F553DDBB58C9F86E4DEE58C6525A96CE96863829F0F289E2C8F2B0AB71CC1 +peer1.org1.example.com | [105 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [106 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [104 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [107 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [108 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:5199577545387710782 tag:EMPTY mem_req: > > , Envelope: 1109 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [109 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:5199577545387710782 tag:EMPTY mem_req: > > , Envelope: 1109 bytes, Signature: 0 bytes +peer1.org1.example.com | [10a 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [10b 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [10c 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [10d 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [10e 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [10f 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00275b450, CONNECTING +peer1.org1.example.com | [110 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00275b450, READY +peer1.org1.example.com | [111 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [112 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [113 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [114 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer0.org1.example.com | [02d 08-31 20:50:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +peer0.org1.example.com | [02e 08-31 20:50:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [02f 08-31 20:50:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | "2020-08-31 20:50:43.196 UTC [msp] getPemMaterialFromDir -> DEBU 0df Reading directory /var/hyperledger/orderer/msp/admincerts" +orderer0.example.com | "2020-08-31 20:50:43.203 UTC [msp] getPemMaterialFromDir -> DEBU 0e0 Reading directory /var/hyperledger/orderer/msp/intermediatecerts" +orderer0.example.com | "2020-08-31 20:50:43.204 UTC [msp] getMspConfig -> DEBU 0e1 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" +orderer0.example.com | "2020-08-31 20:50:43.205 UTC [msp] getPemMaterialFromDir -> DEBU 0e2 Reading directory /var/hyperledger/orderer/msp/tlscacerts" +orderer0.example.com | "2020-08-31 20:50:43.218 UTC [msp] getPemMaterialFromDir -> DEBU 0e3 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" +orderer0.example.com | "2020-08-31 20:50:43.227 UTC [msp] getPemMaterialFromDir -> DEBU 0e4 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" +orderer0.example.com | "2020-08-31 20:50:43.229 UTC [msp] getMspConfig -> DEBU 0e5 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" +orderer0.example.com | "2020-08-31 20:50:43.229 UTC [msp] getPemMaterialFromDir -> DEBU 0e6 Reading directory /var/hyperledger/orderer/msp/crls" +orderer0.example.com | "2020-08-31 20:50:43.234 UTC [msp] getMspConfig -> DEBU 0e7 crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" +orderer0.example.com | "2020-08-31 20:50:43.250 UTC [msp] getMspConfig -> DEBU 0e8 Loading NodeOUs" +orderer0.example.com | "2020-08-31 20:50:43.283 UTC [msp] newBccspMsp -> DEBU 0e9 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:43.283 UTC [msp] New -> DEBU 0ea Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:50:43.283 UTC [msp] loadLocaMSP -> DEBU 0eb Created new local MSP" +orderer0.example.com | "2020-08-31 20:50:43.284 UTC [msp] Setup -> DEBU 0ec Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-08-31 20:50:43.284 UTC [msp.identity] newIdentity -> DEBU 0ed Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:43.284 UTC [msp.identity] newIdentity -> DEBU 0ee Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [115 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org1.example.com | [116 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [117 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 c7 07 13 21 af 89 dc 0a 95 e8 |0E.!.....!......| +peer1.org1.example.com | 00000010 c1 28 5f f0 64 43 6d a7 fd 67 ce 5e ab 98 3d 4c |.(_.dCm..g.^..=L| +peer1.org1.example.com | 00000020 99 37 f3 df 26 02 20 4e 9b c7 a8 fa 42 3d dc 98 |.7..&. N....B=..| +peer1.org1.example.com | 00000030 42 68 d3 9b cc 66 0a e9 32 53 98 00 b8 c3 bc d7 |Bh...f..2S......| +peer1.org1.example.com | 00000040 1d 89 e0 13 d2 4f de |.....O.| +peer1.org1.example.com | [118 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org1.example.com | [119 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11a 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [11b 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11c 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 5199577545387710782, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2202 bytes, Signature: 0 bytes +peer1.org1.example.com | [11d 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 5199577545387710782, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2202 bytes, Signature: 0 bytes +peer1.org1.example.com | [11e 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11f 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 5199577545387710782, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2202 bytes, Signature: 0 bytes +peer1.org1.example.com | [120 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 6f 55 3d db b5 8c 9f 86 e4 de e5 8c 65 25 a9 |.oU=.........e%.| +peer1.org1.example.com | 00000010 6c e9 68 63 82 9f 0f 28 9e 2c 8f 2b 0a b7 1c c1 |l.hc...(.,.+....| +peer1.org1.example.com | [121 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 94 3a 88 b3 6b d2 8a 1e 7b f3 |0E.!...:..k...{.| +peer1.org1.example.com | 00000010 5c a5 e8 1c ef 6c a0 37 38 cb fc ae fe 7f 27 9e |\....l.78.....'.| +peer1.org1.example.com | 00000020 3d ce 4c 9c fd 02 20 13 62 ac 79 98 61 41 82 00 |=.L... .b.y.aA..| +peer1.org1.example.com | 00000030 b5 c6 1f c4 29 e2 ac b2 cf dd 8a 98 2c ac 50 c1 |....).......,.P.| +peer1.org1.example.com | 00000040 fc 65 09 14 07 e8 fb |.e.....| +peer1.org1.example.com | [122 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [123 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef ec 3a 9f f2 9a 9a 17 c0 0b 35 |0E.!...:.......5| +peer1.org1.example.com | 00000010 3b 13 d3 4a 99 97 88 79 64 26 12 dd 74 c8 56 b7 |;..J...yd&..t.V.| +peer1.org1.example.com | 00000020 3a 0f 63 3c 9e 02 20 2a 21 a9 05 29 3d 56 88 e5 |:.c<.. *!..)=V..| +peer1.org1.example.com | 00000030 b1 9b 21 67 4a ba e6 c5 cd 26 13 47 0e 27 86 e9 |..!gJ....&.G.'..| +peer1.org1.example.com | 00000040 e9 2f ca 77 34 52 01 |./.w4R.| +peer1.org1.example.com | [124 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [125 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [126 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [127 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 09 1b 16 d6 21 61 43 25 c4 2e 73 53 d9 c1 4e 26 |....!aC%..sS..N&| +peer1.org1.example.com | 00000010 7d f2 19 20 f1 5e 58 fb 00 84 8c 61 52 8c a7 f6 |}.. .^X....aR...| +peer1.org1.example.com | [128 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 03 00 2d 06 74 36 41 46 fe 23 9a b5 |0D. ..-.t6AF.#..| +peer1.org1.example.com | 00000010 69 c9 2f 0c f0 5c 47 4d d5 cc 5d c0 dc 32 07 27 |i./..\GM..]..2.'| +peer1.org1.example.com | 00000020 e7 5b 2c 7e 02 20 17 2a ca d9 e0 c3 76 c4 45 ba |.[,~. .*....v.E.| +peer1.org1.example.com | 00000030 09 2e 7b ad fc e4 1d c5 81 a0 51 f1 51 fd 89 9f |..{.......Q.Q...| +peer1.org1.example.com | 00000040 1e 9f d1 b9 06 0d |......| +peer1.org1.example.com | [129 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +orderer0.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +orderer0.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +orderer0.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +orderer0.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +orderer0.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +orderer0.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +orderer0.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:43.306 UTC [bccsp_sw] loadPrivateKey -> DEBU 0ef Loading private key [b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd] at [/var/hyperledger/orderer/msp/keystore/b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd_sk]..." +orderer0.example.com | "2020-08-31 20:50:43.316 UTC [msp.identity] newIdentity -> DEBU 0f0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +orderer0.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +orderer0.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +orderer0.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +orderer0.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +orderer0.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +orderer0.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:43.317 UTC [msp] setupSigningIdentity -> DEBU 0f1 Signing identity expires at 2030-02-18 18:24:00 +0000 UTC" +orderer0.example.com | "2020-08-31 20:50:43.319 UTC [orderer.common.server] prettyPrintStruct -> INFO 0f2 Orderer config values: +orderer0.example.com | General.LedgerType = "file" +orderer0.example.com | General.ListenAddress = "0.0.0.0" +orderer0.example.com | General.ListenPort = 7050 +orderer0.example.com | General.TLS.Enabled = true +orderer0.example.com | General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | General.TLS.ClientAuthRequired = false +orderer0.example.com | General.TLS.ClientRootCAs = [] +orderer0.example.com | General.Cluster.ListenAddress = "0.0.0.0" +orderer0.example.com | General.Cluster.ListenPort = 7055 +orderer0.example.com | General.Cluster.ServerCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.Cluster.ServerPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" +orderer0.example.com | General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" +orderer0.example.com | General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] +orderer0.example.com | General.Cluster.DialTimeout = 5s +orderer0.example.com | General.Cluster.RPCTimeout = 7s +orderer0.example.com | General.Cluster.ReplicationBufferSize = 20971520 +orderer0.example.com | General.Cluster.ReplicationPullTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationRetryTimeout = 5s +orderer0.example.com | General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s +orderer0.example.com | General.Cluster.ReplicationMaxRetries = 12 +orderer0.example.com | General.Cluster.SendBufferSize = 10 +orderer0.example.com | General.Cluster.CertExpirationWarningThreshold = 168h0m0s +orderer0.example.com | General.Cluster.TLSHandshakeTimeShift = 0s +orderer0.example.com | General.Keepalive.ServerMinInterval = 1m0s +orderer0.example.com | General.Keepalive.ServerInterval = 2h0m0s +orderer0.example.com | General.Keepalive.ServerTimeout = 20s +orderer0.example.com | General.ConnectionTimeout = 0s +orderer0.example.com | General.GenesisMethod = "file" +orderer0.example.com | General.GenesisProfile = "SampleInsecureSolo" +orderer0.example.com | General.SystemChannel = "test-system-channel-name" +orderer0.example.com | General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" +orderer0.example.com | General.Profile.Enabled = false +orderer0.example.com | General.Profile.Address = "0.0.0.0:6060" +orderer0.example.com | General.LocalMSPDir = "/var/hyperledger/orderer/msp" +orderer0.example.com | General.LocalMSPID = "OrdererMSP" +orderer0.example.com | General.BCCSP.ProviderName = "SW" +orderer0.example.com | General.BCCSP.SwOpts.SecLevel = 256 +orderer0.example.com | General.BCCSP.SwOpts.HashFamily = "SHA2" +orderer0.example.com | General.BCCSP.SwOpts.Ephemeral = false +orderer0.example.com | General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" +orderer0.example.com | General.BCCSP.SwOpts.DummyKeystore = +orderer0.example.com | General.BCCSP.SwOpts.InmemKeystore = +orderer0.example.com | General.BCCSP.PluginOpts = +orderer0.example.com | General.Authentication.TimeWindow = 15m0s +orderer0.example.com | General.Authentication.NoExpirationChecks = false +orderer0.example.com | FileLedger.Location = "/var/hyperledger/production/orderer" +orderer0.example.com | FileLedger.Prefix = "hyperledger-fabric-ordererledger" +orderer0.example.com | RAMLedger.HistorySize = 1000 +orderer0.example.com | Kafka.Retry.ShortInterval = 5s +orderer0.example.com | Kafka.Retry.ShortTotal = 10m0s +orderer0.example.com | Kafka.Retry.LongInterval = 5m0s +orderer0.example.com | Kafka.Retry.LongTotal = 12h0m0s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.DialTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s +orderer0.example.com | Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s +orderer0.example.com | Kafka.Retry.Metadata.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Metadata.RetryBackoff = 250ms +orderer0.example.com | Kafka.Retry.Producer.RetryMax = 3 +orderer0.example.com | Kafka.Retry.Producer.RetryBackoff = 100ms +orderer0.example.com | Kafka.Retry.Consumer.RetryBackoff = 2s +orderer0.example.com | Kafka.Verbose = false +orderer0.example.com | Kafka.Version = 0.10.2.0 +orderer0.example.com | Kafka.TLS.Enabled = false +orderer0.example.com | Kafka.TLS.PrivateKey = "" +orderer0.example.com | Kafka.TLS.Certificate = "" +orderer0.example.com | Kafka.TLS.RootCAs = [] +orderer0.example.com | Kafka.TLS.ClientAuthRequired = false +orderer0.example.com | Kafka.TLS.ClientRootCAs = [] +orderer0.example.com | Kafka.SASLPlain.Enabled = false +orderer0.example.com | Kafka.SASLPlain.User = "" +orderer0.example.com | Kafka.SASLPlain.Password = "" +orderer0.example.com | Kafka.Topic.ReplicationFactor = 3 +orderer0.example.com | Debug.BroadcastTraceDir = "" +orderer0.example.com | Debug.DeliverTraceDir = "" +orderer0.example.com | Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] +orderer0.example.com | Operations.ListenAddress = "0.0.0.0:8443" +orderer0.example.com | Operations.TLS.Enabled = false +orderer0.example.com | Operations.TLS.PrivateKey = "" +orderer0.example.com | Operations.TLS.Certificate = "" +orderer0.example.com | Operations.TLS.RootCAs = [] +orderer0.example.com | Operations.TLS.ClientAuthRequired = false +orderer0.example.com | Operations.TLS.ClientRootCAs = [] +orderer0.example.com | Metrics.Provider = "prometheus" +orderer0.example.com | Metrics.Statsd.Network = "udp" +orderer0.example.com | Metrics.Statsd.Address = "127.0.0.1:8125" +orderer0.example.com | Metrics.Statsd.WriteInterval = 30s +orderer0.example.com | Metrics.Statsd.Prefix = """ +orderer0.example.com | "2020-08-31 20:50:43.330 UTC [common.channelconfig] NewStandardValues -> DEBU 0f3 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-08-31 20:50:43.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f4 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-08-31 20:50:43.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f5 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-08-31 20:50:43.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f6 Processing field: OrdererAddresses" +orderer0.example.com | "2020-08-31 20:50:43.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f7 Processing field: Consortium" +orderer0.example.com | "2020-08-31 20:50:43.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f8 Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:50:43.330 UTC [common.channelconfig] NewStandardValues -> DEBU 0f9 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2020-08-31 20:50:43.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fa Processing field: ChannelCreationPolicy" +orderer0.example.com | "2020-08-31 20:50:43.330 UTC [common.channelconfig] NewStandardValues -> DEBU 0fb Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:50:43.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fc Processing field: MSP" +orderer0.example.com | "2020-08-31 20:50:43.331 UTC [common.channelconfig] validateMSP -> DEBU 0fd Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-08-31 20:50:43.331 UTC [msp] newBccspMsp -> DEBU 0fe Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:43.331 UTC [msp] New -> DEBU 0ff Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:50:43.331 UTC [msp] Setup -> DEBU 100 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-08-31 20:50:43.331 UTC [msp.identity] newIdentity -> DEBU 101 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:43.331 UTC [common.channelconfig] NewStandardValues -> DEBU 102 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:50:43.331 UTC [common.channelconfig] initializeProtosStruct -> DEBU 103 Processing field: MSP" +orderer0.example.com | "2020-08-31 20:50:43.331 UTC [common.channelconfig] validateMSP -> DEBU 104 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-08-31 20:50:43.331 UTC [msp] newBccspMsp -> DEBU 105 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:43.331 UTC [msp] New -> DEBU 106 Creating Cache-MSP instance" +peer0.org2.example.com | [056 08-31 20:50:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +peer0.org2.example.com | [057 08-31 20:50:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +peer0.org2.example.com | [058 08-31 20:50:45.37 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer0.org2.example.com | [059 08-31 20:50:45.37 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.6:7051 +peer0.org2.example.com | [05a 08-31 20:50:45.37 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org2.example.com:7051 +peer0.org2.example.com | [05b 08-31 20:50:45.37 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.6:7051 +peer0.org2.example.com | [05c 08-31 20:50:45.37 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org2.example.com:7051 +peer0.org2.example.com | [05d 08-31 20:50:45.39 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer0.org2.example.com | [05e 08-31 20:50:45.41 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org2.example.com +peer0.org2.example.com | [05f 08-31 20:50:45.41 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org2.example.com:7052 +peer0.org2.example.com | [060 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.8 +peer0.org2.example.com | [061 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer0.org2.example.com | [062 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.8 +peer0.org2.example.com | [063 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer0.org2.example.com | [064 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.8 +peer0.org2.example.com | [065 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer0.org2.example.com | [066 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +peer0.org2.example.com | [067 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +peer0.org2.example.com | [068 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [069 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +peer0.org2.example.com | [06a 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +peer0.org2.example.com | [06b 08-31 20:50:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +peer0.org2.example.com | [06c 08-31 20:50:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer0.org2.example.com | [06d 08-31 20:50:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +peer0.org2.example.com | [06e 08-31 20:50:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [06f 08-31 20:50:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +peer0.org2.example.com | [070 08-31 20:50:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer0.org2.example.com | [071 08-31 20:50:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer0.org2.example.com | [072 08-31 20:50:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +peer0.org2.example.com | [073 08-31 20:50:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +peer0.org2.example.com | [074 08-31 20:50:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +peer0.org2.example.com | [075 08-31 20:50:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +peer0.org2.example.com | [076 08-31 20:50:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer0.org2.example.com | [077 08-31 20:50:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +peer0.org2.example.com | [078 08-31 20:50:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [079 08-31 20:50:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +peer0.org2.example.com | [07a 08-31 20:50:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +peer0.org2.example.com | [07b 08-31 20:50:45.46 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org2.example.com:7051 and bootstrap set [peer0.org2.example.com:7051] +peer0.org2.example.com | [07c 08-31 20:50:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [07d 08-31 20:50:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer0.org2.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer0.org2.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer0.org2.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [07e 08-31 20:50:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [07f 08-31 20:50:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [080 08-31 20:50:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [081 08-31 20:50:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [030 08-31 20:50:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [031 08-31 20:50:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce] at [/etc/hyperledger/fabric/msp/keystore/935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce_sk]... +peer0.org1.example.com | [032 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [033 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2030-02-18 18:24:00 +0000 UTC +peer0.org1.example.com | [034 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +peer0.org1.example.com | Version: 1.4.8 +peer0.org1.example.com | Commit SHA: development build +peer0.org1.example.com | Go version: go1.13.15 +peer0.org1.example.com | OS/Arch: linux/amd64 +peer0.org1.example.com | Chaincode: +peer0.org1.example.com | Base Image Version: 0.4.21 +peer0.org1.example.com | Base Docker Namespace: hyperledger +peer0.org1.example.com | Base Docker Label: org.hyperledger.fabric +peer0.org1.example.com | Docker Namespace: hyperledger +peer0.org1.example.com | [035 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [036 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer0.org1.example.com | [037 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer0.org1.example.com | [038 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +peer0.org1.example.com | [039 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +peer0.org1.example.com | [03a 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +peer0.org1.example.com | [03b 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +peer0.org1.example.com | [03c 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +peer0.org1.example.com | [03d 08-31 20:50:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +peer0.org1.example.com | [03e 08-31 20:50:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +peer0.org1.example.com | [03f 08-31 20:50:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +peer0.org1.example.com | [040 08-31 20:50:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +peer0.org1.example.com | [041 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +peer0.org1.example.com | [042 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +peer0.org1.example.com | [043 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +peer0.org1.example.com | [044 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +peer0.org1.example.com | [045 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +peer0.org1.example.com | [046 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +peer1.org1.example.com | [12a 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 07 bb 89 4e 79 31 97 b1 fa 57 |0E.!.....Ny1...W| +peer1.org1.example.com | 00000010 d3 df 1c ad 9a b5 61 1f 8e 32 f7 76 43 97 b7 16 |......a..2.vC...| +peer1.org1.example.com | 00000020 1b 61 ca f8 af 02 20 0c 3d 51 17 2d 9b d7 23 c1 |.a.... .=Q.-..#.| +peer1.org1.example.com | 00000030 59 a0 45 95 28 2a 27 87 c6 ec 61 f5 34 a8 b6 d8 |Y.E.(*'...a.4...| +peer1.org1.example.com | 00000040 e0 41 da 7f 2b f7 50 |.A..+.P| +peer1.org1.example.com | [12b 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [12c 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]} +peer1.org1.example.com | [12d 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [12e 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12f 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [130 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [131 08-31 20:50:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [132 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [133 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [134 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [135 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [136 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [137 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B3C621FAF4EC970268BD3D0EC964E26811C9932F349E94A4028B6FA170EA3E40 +peer1.org1.example.com | [138 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [139 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [13a 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [13b 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [13c 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes +peer1.org1.example.com | [13d 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13e 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [13f 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [140 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [141 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [142 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer1.org1.example.com | [143 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer1.org1.example.com | [144 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [145 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer1.org1.example.com | [146 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b3 c6 21 fa f4 ec 97 02 68 bd 3d 0e c9 64 e2 68 |..!.....h.=..d.h| +peer1.org1.example.com | 00000010 11 c9 93 2f 34 9e 94 a4 02 8b 6f a1 70 ea 3e 40 |.../4.....o.p.>@| +peer1.org1.example.com | [147 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b ba e6 c6 6c 38 df 8d fc 45 1a |0E.!.....l8...E.| +peer1.org1.example.com | 00000010 48 0d ee b0 a9 aa 25 f9 43 29 9a 50 73 34 c8 39 |H.....%.C).Ps4.9| +peer1.org1.example.com | 00000020 ba 4c e8 19 dc 02 20 22 f0 5e a5 c9 36 f9 d9 c7 |.L.... ".^..6...| +peer1.org1.example.com | 00000030 64 d8 e3 72 cf aa 22 ae f2 fb 1d 92 59 72 77 17 |d..r..".....Yrw.| +peer1.org1.example.com | 00000040 15 0d 8a 71 4f 42 66 |...qOBf| +peer1.org1.example.com | [148 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [149 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 01 e4 0f f6 f0 1c 01 15 7a 3d 82 3b |0D. ........z=.;| +peer1.org1.example.com | 00000010 c2 1f 2f 75 3c 06 58 b0 6b d6 c5 de f7 aa 07 32 |../u<.X.k......2| +peer1.org1.example.com | 00000020 42 cc 24 b3 02 20 4f 00 ef bc ee 4d 40 f0 8f 74 |B.$.. O....M@..t| +peer1.org1.example.com | 00000030 2a 0b 28 75 69 9e ee 50 b4 a6 de d7 fd df 4e da |*.(ui..P......N.| +peer1.org1.example.com | 00000040 ce e0 5c 7b 18 40 |..\{.@| +peer1.org1.example.com | [14a 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [14b 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [14c 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14d 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4c cd 27 bc f4 47 1b 5c 13 e1 3d 60 f4 42 8c dc |L.'..G.\..=`.B..| +orderer0.example.com | "2020-08-31 20:50:43.331 UTC [msp] Setup -> DEBU 107 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-08-31 20:50:43.333 UTC [msp.identity] newIdentity -> DEBU 108 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:43.334 UTC [common.channelconfig] NewStandardValues -> DEBU 109 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-08-31 20:50:43.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10a Processing field: ConsensusType" +orderer0.example.com | "2020-08-31 20:50:43.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10b Processing field: BatchSize" +orderer0.example.com | "2020-08-31 20:50:43.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10c Processing field: BatchTimeout" +orderer0.example.com | "2020-08-31 20:50:43.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10d Processing field: KafkaBrokers" +orderer0.example.com | "2020-08-31 20:50:43.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10e Processing field: ChannelRestrictions" +orderer0.example.com | "2020-08-31 20:50:43.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10f Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:50:43.334 UTC [common.channelconfig] NewStandardValues -> DEBU 110 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-08-31 20:50:43.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU 111 Processing field: Endpoints" +orderer0.example.com | "2020-08-31 20:50:43.334 UTC [common.channelconfig] NewStandardValues -> DEBU 112 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:50:43.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU 113 Processing field: MSP" +orderer0.example.com | "2020-08-31 20:50:43.334 UTC [common.channelconfig] validateMSP -> DEBU 114 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:43.334 UTC [msp] newBccspMsp -> DEBU 115 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:43.334 UTC [msp] New -> DEBU 116 Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:50:43.334 UTC [msp] Setup -> DEBU 117 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-08-31 20:50:43.334 UTC [msp.identity] newIdentity -> DEBU 118 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:43.335 UTC [msp] Setup -> DEBU 119 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-08-31 20:50:43.335 UTC [msp] Setup -> DEBU 11a MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 11b Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 11c Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 11d Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 11e Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 11f Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 120 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 121 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 122 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +peer0.org1.example.com | [047 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +peer0.org1.example.com | [048 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +peer0.org1.example.com | [049 08-31 20:50:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +peer0.org1.example.com | [04a 08-31 20:50:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +peer0.org1.example.com | [04b 08-31 20:50:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +peer0.org1.example.com | [04c 08-31 20:50:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +peer0.org1.example.com | [04d 08-31 20:50:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +peer1.org1.example.com | 00000010 dd af cc fd 9f d7 df 88 9d 95 12 17 7d c5 b9 98 |............}...| +peer0.org1.example.com | [04e 08-31 20:50:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +peer0.org1.example.com | [04f 08-31 20:50:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +peer0.org1.example.com | [050 08-31 20:50:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +peer0.org1.example.com | [051 08-31 20:50:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +peer0.org1.example.com | [052 08-31 20:50:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +peer0.org1.example.com | [053 08-31 20:50:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +peer0.org1.example.com | [054 08-31 20:50:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +peer0.org1.example.com | [055 08-31 20:50:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +peer0.org1.example.com | [056 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +peer0.org1.example.com | [057 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +peer0.org1.example.com | [058 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer0.org1.example.com | [059 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.7:7051 +peer0.org1.example.com | [05a 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +peer0.org1.example.com | [05b 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.7:7051 +peer0.org1.example.com | [05c 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +peer0.org1.example.com | [05d 08-31 20:50:45.46 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer0.org1.example.com | [05e 08-31 20:50:45.47 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com +peer0.org1.example.com | [05f 08-31 20:50:45.47 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org1.example.com:7052 +peer0.org1.example.com | [060 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.8 +peer0.org1.example.com | [061 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer0.org1.example.com | [062 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.8 +peer0.org1.example.com | [063 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer0.org1.example.com | [064 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.8 +peer0.org1.example.com | [065 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer0.org1.example.com | [066 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +peer0.org1.example.com | [067 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +peer0.org1.example.com | [068 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [069 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +peer0.org1.example.com | [06a 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer0.org1.example.com | [06b 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer0.org1.example.com | [06c 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +peer0.org1.example.com | [06d 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +peer0.org1.example.com | [06e 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +peer0.org1.example.com | [06f 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +peer0.org1.example.com | [070 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer0.org1.example.com | [071 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +peer0.org1.example.com | [072 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [073 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +peer0.org1.example.com | [074 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +peer0.org1.example.com | [075 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +peer0.org1.example.com | [076 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer0.org1.example.com | [077 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +peer0.org1.example.com | [078 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [079 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +peer0.org1.example.com | [07a 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +peer0.org1.example.com | [07b 08-31 20:50:45.52 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051] +peer0.org1.example.com | [07c 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [07d 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | [082 08-31 20:50:45.47 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28, Metadata: +peer1.org1.example.com | [14e 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a 08 a3 cb ea 42 cc a1 37 0c f9 f8 |0D. :....B..7...| +peer1.org1.example.com | 00000010 5d a5 86 31 9f 5e 74 f8 e2 97 82 1f 24 89 0d 9f |]..1.^t.....$...| +peer1.org1.example.com | 00000020 44 2b 8a 00 02 20 04 02 2e 0d b3 71 03 df 25 b6 |D+... .....q..%.| +peer1.org1.example.com | 00000030 fc a2 a3 20 36 c2 09 46 16 a1 b1 5f 1f 6b 5e 10 |... 6..F..._.k^.| +peer1.org1.example.com | 00000040 8a 3e ba 4f e5 80 |.>.O..| +peer1.org1.example.com | [14f 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [150 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 a8 3e 47 30 8d 3d 75 58 03 10 |0E.!...>G0.=uX..| +peer1.org1.example.com | 00000010 ff cb ef 3b ff e3 38 f2 99 bc 39 3d 70 59 89 b6 |...;..8...9=pY..| +peer1.org1.example.com | 00000020 c3 f1 1e a4 b2 02 20 01 d0 e5 0d 08 2e 28 bd 93 |...... ......(..| +peer1.org1.example.com | 00000030 6a 38 cc 3e 33 ec a5 a3 09 d6 12 4f 1a fb 6b 40 |j8.>3......O..k@| +peer1.org1.example.com | 00000040 04 8e af 52 43 58 da |...RCX.| +peer1.org1.example.com | [151 08-31 20:50:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [152 08-31 20:50:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [153 08-31 20:50:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [154 08-31 20:50:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [155 08-31 20:50:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [156 08-31 20:50:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [157 08-31 20:50:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [158 08-31 20:50:49.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [159 08-31 20:50:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 123 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 124 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 125 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 126 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 127 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 128 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:43.345 UTC [policies] NewManagerImpl -> DEBU 129 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:43.345 UTC [policies] NewManagerImpl -> DEBU 12a Proposed new policy Admins for Channel/Consortiums" +orderer0.example.com | "2020-08-31 20:50:43.345 UTC [policies] GetPolicy -> DEBU 12b Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2020-08-31 20:50:43.345 UTC [policies] NewManagerImpl -> DEBU 12c Proposed new policy Writers for Channel" +orderer0.example.com | "2020-08-31 20:50:43.345 UTC [policies] NewManagerImpl -> DEBU 12d Proposed new policy Admins for Channel" +orderer0.example.com | "2020-08-31 20:50:43.345 UTC [policies] GetPolicy -> DEBU 12e Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +orderer0.example.com | "2020-08-31 20:50:43.346 UTC [policies] NewManagerImpl -> DEBU 12f Proposed new policy Readers for Channel" +orderer0.example.com | "2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 13a Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 13b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 13c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 13d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +orderer0.example.com | "2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 13e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 13f Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +orderer0.example.com | "2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 140 Adding to config map: [Policy] /Channel/Consortiums/Admins" +orderer0.example.com | "2020-08-31 20:50:43.347 UTC [common.configtx] addToMap -> DEBU 141 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:43.347 UTC [common.configtx] addToMap -> DEBU 142 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:43.347 UTC [common.configtx] addToMap -> DEBU 143 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-08-31 20:50:43.347 UTC [common.configtx] addToMap -> DEBU 144 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:50:43.347 UTC [common.configtx] addToMap -> DEBU 145 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-08-31 20:50:43.347 UTC [common.configtx] addToMap -> DEBU 146 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-08-31 20:50:43.347 UTC [common.configtx] addToMap -> DEBU 147 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 148 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 149 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 14a Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 14b Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 14c Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 14d Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 14e Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 14f Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 150 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 151 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 152 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 153 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 154 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 155 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 156 Adding to config map: [Policy] /Channel/Readers" +peer1.org1.example.com | [15a 08-31 20:50:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [15b 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [15c 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [15d 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15e 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1097 bytes, Signature: 0 bytes +peer1.org1.example.com | [15f 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1097 bytes, Signature: 0 bytes +peer1.org1.example.com | [160 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [161 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1097 bytes, Signature: 0 bytes +peer1.org1.example.com | [162 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 8d 7b 17 f4 fe c7 71 7b 79 9a a3 78 34 aa e8 |..{....q{y..x4..| +peer1.org1.example.com | 00000010 8d fa e4 ac ba 13 cb f2 31 4c 50 11 dd 62 bd 7c |........1LP..b.|| +peer1.org1.example.com | [163 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 2e 39 a2 80 83 f7 26 77 41 b0 76 |0D. ..9....&wA.v| +peer1.org1.example.com | 00000010 da 71 dd d0 4a a5 f1 ec ba 7d dc 1e 26 c9 2f 4e |.q..J....}..&./N| +peer1.org1.example.com | 00000020 0b ff 82 9a 02 20 04 66 5d b9 f2 df b2 3c 5a 08 |..... .f].... DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [165 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d e5 99 40 7b f1 4f 56 cb 47 6f eb |0D. M..@{.OV.Go.| +peer1.org1.example.com | 00000010 ac a6 63 08 c3 b0 2c c7 b4 94 4e e1 5e 99 29 69 |..c...,...N.^.)i| +peer1.org1.example.com | 00000020 b8 5c 95 3d 02 20 1c e7 ab ea 8d 6f 72 cc 0a 05 |.\.=. .....or...| +peer1.org1.example.com | 00000030 94 dd 96 55 86 42 29 15 3c a1 ae 6e 2a 7a e8 4f |...U.B).<..n*z.O| +peer1.org1.example.com | 00000040 4c 16 91 5b 1b 28 |L..[.(| +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org2.example.com | [083 08-31 20:50:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [084 08-31 20:50:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01DB060A20A583F8EF0329C5FD...455254494649434154452D2D2D2D2D0A +peer0.org2.example.com | [085 08-31 20:50:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F325F6221CD3E4FD286DF6B04B3535B6B757789167E7FE5ACF4C444E25371023 +peer0.org2.example.com | [086 08-31 20:50:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Added ����)�����H�5���K��q���2���(, total items: 1 +peer0.org2.example.com | [087 08-31 20:50:45.47 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org2.example.com:7051 started +peer0.org2.example.com | [088 08-31 20:50:45.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +peer0.org2.example.com | [089 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [08a 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org2.example.com | [08b 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BC2D0A6189B3950543A6E27D56B37CA3D97793169559A882D781FB7392F21BF0 +peer0.org2.example.com | [08c 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [08d 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [08e 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [08f 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping connecting to myself +peer0.org2.example.com | [090 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.8,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org2.example.com | [091 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.8 +peer0.org2.example.com | [092 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org2.example.com:7052 +peer0.org2.example.com | [093 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org2.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.8 +peer0.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org2.example.com | [094 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.8) lock +peer0.org2.example.com | [095 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.8) lock +peer0.org2.example.com | [096 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.8 +peer0.org2.example.com | [098 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.8 +peer0.org2.example.com | [099 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.8 +peer0.org2.example.com | [09a 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org2.example.com | [09b 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org2.example.com | [09c 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.8 +peer0.org2.example.com | [09d 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.8" , sending back REGISTERED +peer0.org2.example.com | [09e 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.8" +peer0.org2.example.com | [09f 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.8" +peer0.org2.example.com | [0a0 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.8" +peer0.org2.example.com | [0a1 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org2.example.com | [0a2 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [0a3 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU [ffcf8813] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [0a4 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU [ffcf8813] notifying Txid:ffcf8813-3628-4fc7-a896-a9f52b4e47e8, channelID: +peer0.org2.example.com | [0a5 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [0a6 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org2.example.com | [0a7 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.8,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org2.example.com | [0a8 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.8 +peer0.org2.example.com | [0a9 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org2.example.com:7052 +peer0.org2.example.com | [0aa 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org2.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.8 +peer0.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org2.example.com | [097 08-31 20:50:45.48 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.8) +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [orderer.common.server] createLedgerFactory -> DEBU 157 Ledger dir: /var/hyperledger/production/orderer" +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [kvledger.util] CreateDirIfMissing -> DEBU 158 CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [kvledger.util] logDirStatus -> DEBU 159 Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" +orderer0.example.com | "2020-08-31 20:50:43.348 UTC [kvledger.util] logDirStatus -> DEBU 15a After creating dir - [/var/hyperledger/production/orderer/index/] exists" +orderer0.example.com | "2020-08-31 20:50:43.417 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 15b Bootstrapping because no existing channels" +orderer0.example.com | "2020-08-31 20:50:43.417 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 15c Selected bootstrap block, because system channel last config block is nil" +orderer0.example.com | "2020-08-31 20:50:43.433 UTC [orderer.common.server] initializeServerConfig -> INFO 15d Starting orderer with TLS enabled" +orderer0.example.com | "2020-08-31 20:50:43.434 UTC [common.channelconfig] NewStandardValues -> DEBU 15e Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-08-31 20:50:43.434 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15f Processing field: HashingAlgorithm" +orderer0.example.com | "2020-08-31 20:50:43.434 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-08-31 20:50:43.434 UTC [common.channelconfig] initializeProtosStruct -> DEBU 161 Processing field: OrdererAddresses" +orderer0.example.com | "2020-08-31 20:50:43.434 UTC [common.channelconfig] initializeProtosStruct -> DEBU 162 Processing field: Consortium" +orderer0.example.com | "2020-08-31 20:50:43.434 UTC [common.channelconfig] initializeProtosStruct -> DEBU 163 Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:50:43.434 UTC [common.channelconfig] NewStandardValues -> DEBU 164 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2020-08-31 20:50:43.434 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2020-08-31 20:50:43.434 UTC [common.channelconfig] NewStandardValues -> DEBU 166 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:50:43.434 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167 Processing field: MSP" +orderer0.example.com | "2020-08-31 20:50:43.434 UTC [common.channelconfig] validateMSP -> DEBU 168 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-08-31 20:50:43.434 UTC [msp] newBccspMsp -> DEBU 169 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:43.434 UTC [msp] New -> DEBU 16a Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:50:43.434 UTC [msp] Setup -> DEBU 16b Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-08-31 20:50:43.434 UTC [msp.identity] newIdentity -> DEBU 16c Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:43.435 UTC [common.channelconfig] NewStandardValues -> DEBU 16d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:50:43.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16e Processing field: MSP" +orderer0.example.com | "2020-08-31 20:50:43.435 UTC [common.channelconfig] validateMSP -> DEBU 16f Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-08-31 20:50:43.435 UTC [msp] newBccspMsp -> DEBU 170 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:43.435 UTC [msp] New -> DEBU 171 Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:50:43.435 UTC [msp] Setup -> DEBU 172 Setting up MSP instance Org2MSP" +peer0.org2.example.com | [0ab 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.8) lock +peer0.org2.example.com | [0ac 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.8) lock +peer0.org2.example.com | [0ad 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.8) lock +peer0.org2.example.com | [0ae 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.8 +peer0.org2.example.com | [0af 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.8) +peer0.org2.example.com | [0b0 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.8) lock +peer0.org2.example.com | [0b1 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.8) lock +peer0.org2.example.com | [0b2 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.8) +peer0.org2.example.com | [0b3 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.8 +peer0.org2.example.com | [0b4 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.8 +peer0.org2.example.com | [0b5 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org2.example.com | [0b6 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org2.example.com | [0b7 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.8 +peer0.org2.example.com | [0b8 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.8" , sending back REGISTERED +peer0.org2.example.com | [0b9 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.8" +peer0.org2.example.com | [0ba 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.8" +peer0.org2.example.com | [0bb 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.8" +peer0.org2.example.com | [0bc 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org2.example.com | [0bd 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [0be 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org2.example.com | [0bf 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU [a7530fe0] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [0c0 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU [a7530fe0] notifying Txid:a7530fe0-9f6c-4b0a-9a66-79218bbd6000, channelID: +peer0.org2.example.com | [0c1 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [0c2 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org2.example.com | [0c3 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.8,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org2.example.com | [0c4 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.8 +peer0.org2.example.com | [0c5 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org2.example.com:7052 +peer0.org2.example.com | [0c6 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org2.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.8 +peer0.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org2.example.com | [0c7 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.8) lock +peer0.org2.example.com | [0c8 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.8) lock +peer0.org2.example.com | [0c9 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.8 +peer0.org2.example.com | [0ca 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.8) +peer0.org2.example.com | [0cb 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.8) lock +peer0.org2.example.com | [0cc 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.8) lock +peer0.org2.example.com | [0cd 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.8) +peer0.org2.example.com | [0ce 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.8 +peer0.org2.example.com | [0cf 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.8 +peer0.org2.example.com | [0d0 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org2.example.com | [0d1 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org2.example.com | [0d2 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.8 +peer0.org2.example.com | [0d3 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.8" , sending back REGISTERED +peer0.org2.example.com | [0d4 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.8" +peer0.org2.example.com | [0d5 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.8" +peer0.org2.example.com | [0d6 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.8" +peer0.org2.example.com | [0d7 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org2.example.com | [0d8 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [0d9 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org2.example.com | [0da 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU [bf9cc8bb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [001 08-31 20:50:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +peer0.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org1.example.com | [166 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:50:43.435 UTC [msp.identity] newIdentity -> DEBU 173 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [0db 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU [bf9cc8bb] notifying Txid:bf9cc8bb-8fc3-46fa-978f-bb6c75e53cd0, channelID: +peer1.org2.example.com | [002 08-31 20:50:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | [167 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [003 08-31 20:50:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +peer1.org1.example.com | [168 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer0.org2.example.com | [0dc 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.8) lock +peer0.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org2.example.com | [004 08-31 20:50:44.64 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +peer1.org1.example.com | [169 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [16a 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [16b 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [005 08-31 20:50:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +peer0.org2.example.com | [0dd 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [16c 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [07e 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [006 08-31 20:50:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +peer0.org2.example.com | [0de 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.8) +peer0.org2.example.com | [0df 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org2.example.com | [0e0 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer0.org1.example.com | [07f 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [007 08-31 20:50:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +peer0.org2.example.com | [0e1 08-31 20:50:45.49 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer0.org1.example.com | [080 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [16d 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [008 08-31 20:50:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +peer0.org2.example.com | [0e2 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer0.org1.example.com | [081 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [082 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: +peer0.org1.example.com | [083 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [009 08-31 20:50:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +peer0.org2.example.com | [0e3 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer0.org1.example.com | [084 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01DB060A209901CDE7C48A747A...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [00a 08-31 20:50:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +peer1.org2.example.com | [00b 08-31 20:50:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +peer1.org2.example.com | [00c 08-31 20:50:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +peer1.org2.example.com | [00d 08-31 20:50:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org1.example.com | [085 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EF186C4BF240BED45F0BBCF7135C6BDC1830908603084DC2B567543C23E28B78 +peer1.org2.example.com | [00e 08-31 20:50:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +peer0.org2.example.com | [0e4 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [16e 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org1.example.com | [086 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Added ���Ċtz0�P�zP˹�{� ��w��kqu-<, total items: 1 +peer1.org2.example.com | [00f 08-31 20:50:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [0e5 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051] +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | [16f 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [087 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org1.example.com:7051 started +peer1.org2.example.com | [010 08-31 20:50:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +peer0.org2.example.com | [0e6 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org2.example.com" ], network ID=[dev], address=[peer0.org2.example.com:7051] +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [170 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [088 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.8,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org2.example.com | [011 08-31 20:50:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [0e7 08-31 20:50:45.52 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +peer0.org2.example.com | [0e8 08-31 20:50:45.52 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +peer0.org2.example.com | [0e9 08-31 20:50:45.52 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +peer0.org2.example.com | [0ea 08-31 20:50:45.52 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +peer0.org1.example.com | [08a 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.8 +peer1.org2.example.com | [012 08-31 20:50:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +peer0.org2.example.com | [0eb 08-31 20:50:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [089 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +peer1.org2.example.com | [013 08-31 20:50:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | [171 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 54DDB5EA3E3C674D6F6DD46521B34EF4F9D9ABAEFD72675018724889031B5DB1 +peer0.org2.example.com | [0ec 08-31 20:50:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [08b 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +peer1.org2.example.com | [014 08-31 20:50:44.65 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | [172 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [0ed 08-31 20:50:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2B1BA9AD3A44FAC52EE60885513415284249DA72BEB4C7DA30885BC4659176C6 +peer0.org1.example.com | [08c 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org2.example.com | [015 08-31 20:50:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org1.example.com | [173 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [0ee 08-31 20:50:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org2.example.com | [016 08-31 20:50:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | [174 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org2.example.com | [0ef 08-31 20:50:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org2.example.com | [017 08-31 20:50:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org1.example.com | [175 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [0f0 08-31 20:50:49.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org2.example.com | [018 08-31 20:50:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.8 +peer1.org2.example.com | [019 08-31 20:50:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org2.example.com | [0f1 08-31 20:50:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [01a 08-31 20:50:44.66 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +peer1.org1.example.com | [176 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:50:43.435 UTC [common.channelconfig] NewStandardValues -> DEBU 174 Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org2.example.com | [0f2 08-31 20:50:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [01b 08-31 20:50:44.67 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore] +peer1.org1.example.com | [177 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:50:43.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175 Processing field: ConsensusType" +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org1.example.com | [08d 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [01c 08-31 20:50:44.67 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +peer1.org2.example.com | [01d 08-31 20:50:44.67 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +peer0.org1.example.com | [08e 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.8) lock +peer1.org1.example.com | [178 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\242\3055\310@\372\326\242\201\035\013poR\335\010\025r\332?\222<\250\243'\\jh\253\002 P~\024\245QiZW\322%\014\230\370)\033\001C\r\334\263i\210\211\3732\224\303y`\0256*" > > +peer1.org2.example.com | [01e 08-31 20:50:44.68 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer1.org2.example.com-cert.pem +peer0.org2.example.com | [0f3 08-31 20:50:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DEE9C6B1AE09DD36878E68187B07E49FD91B2641D422C46FBC5C11417071BDEC +peer0.org1.example.com | [08f 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.8) lock +orderer0.example.com | "2020-08-31 20:50:43.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 176 Processing field: BatchSize" +peer1.org1.example.com | [179 08-31 20:50:50.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [01f 08-31 20:50:44.70 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +peer0.org2.example.com | [0f4 08-31 20:50:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [090 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +orderer0.example.com | "2020-08-31 20:50:43.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 177 Processing field: BatchTimeout" +peer1.org1.example.com | [17a 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [020 08-31 20:50:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org2.example.com-cert.pem +peer0.org2.example.com | [0f5 08-31 20:50:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [091 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.8 +orderer0.example.com | "2020-08-31 20:50:43.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 178 Processing field: KafkaBrokers" +peer1.org1.example.com | [17b 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 24D4832DE6B824A2DAC6A53C75F074495B22662E9E96D5407271BC7407EA22BA +peer1.org2.example.com | [021 08-31 20:50:44.74 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +peer1.org2.example.com | [022 08-31 20:50:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +peer0.org1.example.com | [092 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3116A93E1916F1DF9DF6078911A78BD7A0E8CB94CE3ABD03C2FC7EE9E78E1D80 +orderer0.example.com | "2020-08-31 20:50:43.436 UTC [common.channelconfig] initializeProtosStruct -> DEBU 179 Processing field: ChannelRestrictions" +peer1.org1.example.com | [17c 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [023 08-31 20:50:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +peer0.org1.example.com | [093 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.8) +peer0.org1.example.com | [094 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.8) lock +peer0.org2.example.com | [0f6 08-31 20:50:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [0f7 08-31 20:50:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [0f8 08-31 20:50:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [024 08-31 20:50:44.75 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +peer0.org1.example.com | [095 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.8) lock +peer0.org2.example.com | [0f9 08-31 20:50:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [025 08-31 20:50:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org2.example.com-cert.pem +peer0.org1.example.com | [096 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.8) +orderer0.example.com | "2020-08-31 20:50:43.436 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17a Processing field: Capabilities" +peer1.org1.example.com | [17d 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [0fa 08-31 20:50:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 19A691E029606CB7B5CE3AD0B2A75417E106F4A3F1194D35DEBB90636021C8FD +peer1.org2.example.com | [026 08-31 20:50:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +peer0.org1.example.com | [097 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping connecting to myself +orderer0.example.com | "2020-08-31 20:50:43.436 UTC [common.channelconfig] NewStandardValues -> DEBU 17b Initializing protos for *channelconfig.OrdererOrgProtos" +peer1.org1.example.com | [17e 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org2.example.com | [0fb 08-31 20:50:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [027 08-31 20:50:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +peer0.org1.example.com | [098 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.8 +orderer0.example.com | "2020-08-31 20:50:43.436 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17c Processing field: Endpoints" +peer1.org1.example.com | [17f 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to peer0.org1.example.com:7051 +peer0.org2.example.com | [0fc 08-31 20:50:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [028 08-31 20:50:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +peer0.org1.example.com | [099 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.8 +orderer0.example.com | "2020-08-31 20:50:43.436 UTC [common.channelconfig] NewStandardValues -> DEBU 17d Initializing protos for *channelconfig.OrganizationProtos" +peer1.org1.example.com | [180 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [0fd 08-31 20:50:53.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [029 08-31 20:50:44.76 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +peer0.org1.example.com | [09a 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:50:43.436 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17e Processing field: MSP" +peer1.org1.example.com | [181 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [0fe 08-31 20:50:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [02a 08-31 20:50:44.77 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +peer0.org1.example.com | [09b 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-08-31 20:50:43.436 UTC [common.channelconfig] validateMSP -> DEBU 17f Setting up MSP for org OrdererOrg" +peer1.org1.example.com | [182 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [0ff 08-31 20:50:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161006 +peer1.org2.example.com | [02b 08-31 20:50:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [09c 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +orderer0.example.com | "2020-08-31 20:50:43.436 UTC [msp] newBccspMsp -> DEBU 180 Creating BCCSP-based MSP instance" +peer1.org1.example.com | [183 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [100 08-31 20:50:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5B864342C99DCA07CC8E0A05DA51BED3FCBEF86E9A9E5ED281C711C4600D6A05 +peer1.org2.example.com | [02c 08-31 20:50:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [09d 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +orderer0.example.com | "2020-08-31 20:50:43.436 UTC [msp] New -> DEBU 181 Creating Cache-MSP instance" +peer1.org1.example.com | [184 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17154949362218454254, Envelope: 961 bytes, Signature: 0 bytes +peer0.org2.example.com | [101 08-31 20:50:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [02d 08-31 20:50:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +peer0.org1.example.com | [09e 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +orderer0.example.com | "2020-08-31 20:50:43.436 UTC [msp] Setup -> DEBU 182 Setting up MSP instance OrdererMSP" +peer1.org1.example.com | [185 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17154949362218454254, Envelope: 961 bytes, Signature: 0 bytes +peer0.org2.example.com | [102 08-31 20:50:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [02e 08-31 20:50:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org1.example.com | [09f 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.8 +orderer0.example.com | "2020-08-31 20:50:43.436 UTC [msp.identity] newIdentity -> DEBU 183 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [186 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 18 6c 4b f2 40 be d4 5f 0b bc f7 13 5c 6b dc |..lK.@.._....\k.| +peer1.org1.example.com | 00000010 18 30 90 86 03 08 4d c2 b5 67 54 3c 23 e2 8b 78 |.0....M..gT<#..x| +peer1.org2.example.com | [02f 08-31 20:50:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [0a0 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.8" , sending back REGISTERED +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | [187 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 50 84 c1 c5 4f ae 54 1a 24 62 d0 |0D. .P...O.T.$b.| +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [103 08-31 20:50:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | [0a1 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.8" +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | 00000010 dd 76 19 0e 1d 96 47 73 10 71 94 9f ca 1a 82 a3 |.v....Gs.q......| +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [104 08-31 20:50:55.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [0a2 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.8" +peer0.org1.example.com | [0a3 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.8" +peer0.org1.example.com | [0a4 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org1.example.com | [0a5 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | [105 08-31 20:50:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [0a6 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU [d790770a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | 00000020 7a fe c6 3a 02 20 3f 51 55 0f c5 02 2c e1 2c b2 |z..:. ?QU...,.,.| +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | [106 08-31 20:50:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161007 +peer0.org1.example.com | [0a7 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU [d790770a] notifying Txid:d790770a-e297-441a-b320-80157d3e39af, channelID: +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | 00000030 d5 16 f3 3b 2d 2d 3f 24 20 e3 18 7d e2 ba a0 8d |...;--?$ ..}....| +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org2.example.com | [107 08-31 20:50:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6DC5C33CE10BE6AF689D3D847B2099EC0A6FE7EE3272133934F9597D666AA502 +peer0.org1.example.com | [0a8 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | 00000040 99 e1 9f 68 56 56 |...hVV| +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | [108 08-31 20:50:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [0a9 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer1.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org1.example.com | [188 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17154949362218454254, Envelope: 961 bytes, Signature: 0 bytes +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | [109 08-31 20:50:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | [0aa 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.8,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org2.example.com | [10a 08-31 20:50:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [10b 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37810 +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org1.example.com | [0ab 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.8 +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org2.example.com | [10c 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0025b6e10 +peer1.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | [0ac 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +peer1.org1.example.com | [189 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 76 106 80 76 72 86 83 114 120 66 108 57 51 88 84 65 106 67 68 97 89 65 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 71 107 103 76 50 121 65 76 107 104 55 10 98 117 68 121 84 105 67 66 122 52 120 84 82 98 78 66 67 65 103 87 110 110 105 74 56 76 119 89 113 111 86 89 98 97 78 66 102 98 84 51 90 73 106 104 115 107 105 50 69 70 57 100 110 121 117 110 85 68 108 119 85 99 47 102 10 86 88 81 121 49 80 122 53 86 55 101 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 74 50 54 73 97 52 102 75 110 99 78 100 108 48 114 47 103 119 120 108 68 109 50 80 74 119 109 119 82 47 109 117 53 84 113 107 103 54 70 119 78 77 51 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 67 115 66 82 84 100 76 105 105 102 69 86 65 85 117 117 101 113 52 100 81 114 55 98 81 49 43 88 120 70 112 101 87 86 72 51 49 69 99 84 110 43 107 65 105 66 86 98 119 68 120 10 80 103 109 75 77 83 88 118 56 118 49 47 108 72 117 120 86 52 87 80 77 99 53 102 86 48 110 85 83 53 89 115 73 106 83 54 108 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org2.example.com | [10d 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org1.example.com | [0ad 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org1.example.com | [18a 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Added ���Ċtz0�P�zP˹�{� ��w��kqu-< to the in memory item map, total items: 2 +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org2.example.com | [10e 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org1.example.com | [18b 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org2.example.com | [10f 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [18c 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org2.example.com | [110 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org2.example.com | [030 08-31 20:50:44.78 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [18d 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | nw== +peer0.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.8 +peer1.org2.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [18e 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [18f 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:50:43.436 UTC [msp] Setup -> DEBU 184 Setting up the MSP manager (3 msps)" +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [190 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:50:43.436 UTC [msp] Setup -> DEBU 185 MSP manager setup complete, setup 3 msps" +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | [191 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:50:43.436 UTC [policies] NewManagerImpl -> DEBU 186 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [192 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:50:43.436 UTC [policies] NewManagerImpl -> DEBU 187 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org1.example.com | [0ae 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.8) lock +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer1.org1.example.com | [193 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +orderer0.example.com | "2020-08-31 20:50:43.436 UTC [policies] NewManagerImpl -> DEBU 188 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +peer0.org1.example.com | [0af 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.8) lock +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer1.org1.example.com | [194 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:50:43.436 UTC [policies] NewManagerImpl -> DEBU 189 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +peer0.org1.example.com | [0b0 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.8 +peer1.org2.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org1.example.com | [195 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 18a Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +peer0.org1.example.com | [0b1 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.8) +peer1.org2.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 18b Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +peer0.org1.example.com | [0b2 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.8) lock +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 18c Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +peer1.org2.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org1.example.com | [0b3 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.8) lock +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 18d Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +peer1.org1.example.com | [196 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org1.example.com | [0b4 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.8) +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 18e Proposed new policy Admins for Channel/Consortiums" +peer1.org1.example.com | [197 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 34 c5 fd 22 b6 42 f5 f3 6d 64 03 a7 3b 77 0b 86 |4..".B..md..;w..| +peer1.org2.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org1.example.com | [0b5 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.8 +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 18f Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer1.org1.example.com | 00000010 80 71 df e4 a1 09 2a 5e 1d 41 22 03 2c a9 88 23 |.q....*^.A".,..#| +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [0b6 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.8 +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 190 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer1.org1.example.com | [198 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 b4 b9 0f b7 22 4f 4d 2e e5 48 |0E.!......"OM..H| +peer1.org2.example.com | [031 08-31 20:50:44.79 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [972a79ece4b45a6a4d5df83e4493942dee21fe90ff261ea9489c62d0170338ea] at [/etc/hyperledger/fabric/msp/keystore/972a79ece4b45a6a4d5df83e4493942dee21fe90ff261ea9489c62d0170338ea_sk]... +peer0.org2.example.com | [111 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org1.example.com | [0b7 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 191 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer1.org1.example.com | 00000010 de 2b bf 2a eb e8 62 21 64 23 6e f5 9e e1 02 c8 |.+.*..b!d#n.....| +peer1.org2.example.com | [032 08-31 20:50:44.79 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [112 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [0b8 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 192 Proposed new policy Readers for Channel/Orderer" +peer1.org1.example.com | 00000020 5b da 55 ce e8 02 20 38 50 7a 17 2c 68 02 8b ab |[.U... 8Pz.,h...| +peer1.org2.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | [113 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [0b9 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.8 +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 193 Proposed new policy Writers for Channel/Orderer" +peer1.org1.example.com | 00000030 71 81 ba b4 e3 d1 0a df 3e e7 67 67 71 c9 9f de |q.......>.ggq...| +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [114 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [0ba 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.8" , sending back REGISTERED +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 194 Proposed new policy Admins for Channel/Orderer" +peer1.org1.example.com | 00000040 f4 1f 8d 12 67 7c 1d |....g|.| +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [115 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 dd 3a 5e 0e 18 b8 cd ae 84 ba 63 78 32 cf 71 |..:^.......cx2.q| +peer0.org1.example.com | [0bb 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.8" +peer0.org1.example.com | [0bc 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.8" +peer0.org1.example.com | [0bd 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.8" +peer0.org1.example.com | [0be 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [0bf 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 195 Proposed new policy BlockValidation for Channel/Orderer" +peer1.org1.example.com | [199 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | [0c0 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org2.example.com | 00000010 5e db f4 c7 ad da b4 98 44 38 eb a6 44 bd d7 77 |^.......D8..D..w| +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org2.example.com | [116 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 25 e1 1a 44 f0 4a 41 96 5d 51 |0E.!..%..D.JA.]Q| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [0c1 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU [dd3add6c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org2.example.com | 00000010 33 5c a1 88 5e 9b 52 ba de 8e f6 ad 0b 6a 52 28 |3\..^.R......jR(| +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [policies] GetPolicy -> DEBU 196 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +peer1.org1.example.com | [19a 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b a4 e4 b6 f7 71 f3 20 e6 15 d2 |0E.!......q. ...| +peer0.org1.example.com | [0c2 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU [dd3add6c] notifying Txid:dd3add6c-459a-4cf7-9627-1cfb5abf9145, channelID: +peer1.org2.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | 00000020 32 34 94 5e 30 02 20 66 1c 3b 73 b7 f3 59 db c4 |24.^0. f.;s..Y..| +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 197 Proposed new policy Writers for Channel" +peer1.org1.example.com | 00000010 08 a6 6e a7 2e f5 57 e6 3a 01 80 d5 e0 15 ae 86 |..n...W.:.......| +peer0.org1.example.com | [0c3 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org2.example.com | 00000030 dc 5f 48 1d 7a 9c 78 ef 76 6a 13 7f 1a 3e 3b 5f |._H.z.x.vj...>;_| +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 198 Proposed new policy Admins for Channel" +peer1.org1.example.com | 00000020 46 31 b6 ed 47 02 20 36 80 62 c6 05 92 46 fc 89 |F1..G. 6.b...F..| +peer0.org1.example.com | [0c4 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer1.org2.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org2.example.com | 00000040 2d 9d b3 12 46 c0 13 |-...F..| +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [policies] GetPolicy -> DEBU 199 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +peer1.org1.example.com | 00000030 8c 0e d4 3c ee e0 4c 58 c6 b0 49 0d ac a1 cd b6 |...<..LX..I.....| +peer0.org1.example.com | [0c5 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.8,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org2.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org2.example.com | [117 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 19a Proposed new policy Readers for Channel" +peer0.org1.example.com | [0c6 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.8 +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [118 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000111260, header 0xc0025b7720 +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 19b Adding to config map: [Group] /Channel" +peer1.org1.example.com | 00000040 3b ae 92 c8 73 c7 0e |;...s..| +peer0.org1.example.com | [0c7 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +peer1.org2.example.com | [033 08-31 20:50:44.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2030-02-18 18:24:00 +0000 UTC +peer0.org2.example.com | [119 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 19c Adding to config map: [Group] /Channel/Consortiums" +peer1.org1.example.com | [19b 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [0c8 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org2.example.com | [034 08-31 20:50:44.79 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: +peer0.org2.example.com | [11a 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU [][4201a36e] processing txid: 4201a36e822495432c272cc8fbeff0830652fd2f2e0acaacb796f42ba88255bb +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 19d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +peer1.org1.example.com | [19c 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org2.example.com | Version: 1.4.8 +peer0.org2.example.com | [11b 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU [][4201a36e] Entry chaincode: name:"cscc" +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 19e Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +peer1.org1.example.com | [19d 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org2.example.com | Commit SHA: development build +peer0.org2.example.com | [11c 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> INFO [][4201a36e] Entry chaincode: name:"cscc" +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 19f Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +peer1.org1.example.com | [19e 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org2.example.com | Go version: go1.13.15 +peer0.org2.example.com | [11d 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.8 +peer1.org2.example.com | OS/Arch: linux/amd64 +peer1.org1.example.com | [19f 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [11e 08-31 20:50:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org2.example.com | Chaincode: +peer1.org1.example.com | [1a0 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11f 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org2.example.com | Base Image Version: 0.4.21 +peer0.org2.example.com | [120 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org2.example.com | Base Docker Namespace: hyperledger +peer0.org2.example.com | [121 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [122 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [123 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org2.example.com | Base Docker Label: org.hyperledger.fabric +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a4 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +peer0.org2.example.com | [124 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [0c9 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.8) lock +peer1.org2.example.com | Docker Namespace: hyperledger +peer1.org2.example.com | [035 08-31 20:50:44.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1a1 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [0ca 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.8) lock +peer1.org2.example.com | [036 08-31 20:50:44.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer1.org2.example.com | [037 08-31 20:50:44.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer1.org2.example.com | [038 08-31 20:50:44.79 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +peer0.org1.example.com | [0cb 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.8 +peer1.org2.example.com | [039 08-31 20:50:44.79 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +peer1.org1.example.com | [1a2 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [125 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d4 dd 3a 5e 0e 18 b8 cd ae 84 ba 63 78 32 cf 71 |..:^.......cx2.q| +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a5 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +peer0.org1.example.com | [0cc 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.8) +peer1.org2.example.com | [03a 08-31 20:50:44.79 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +peer1.org1.example.com | [1a3 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 5e db f4 c7 ad da b4 98 44 38 eb a6 44 bd d7 77 |^.......D8..D..w| +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +peer0.org1.example.com | [0cd 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.8) lock +peer1.org2.example.com | [03b 08-31 20:50:44.79 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +peer1.org1.example.com | [1a4 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [126 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 25 e1 1a 44 f0 4a 41 96 5d 51 |0E.!..%..D.JA.]Q| +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +peer0.org1.example.com | [0ce 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.8) lock +peer1.org2.example.com | [03c 08-31 20:50:44.80 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +peer1.org1.example.com | [1a5 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000010 33 5c a1 88 5e 9b 52 ba de 8e f6 ad 0b 6a 52 28 |3\..^.R......jR(| +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +peer0.org1.example.com | [0cf 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.8) +peer1.org2.example.com | [03d 08-31 20:50:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +peer1.org1.example.com | [1a6 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a7 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a8 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [0d0 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.8 +peer1.org2.example.com | [03e 08-31 20:50:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +peer1.org1.example.com | [1a9 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer0.org1.example.com | [0d1 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.8 +peer0.org2.example.com | 00000020 32 34 94 5e 30 02 20 66 1c 3b 73 b7 f3 59 db c4 |24.^0. f.;s..Y..| +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +peer1.org2.example.com | [03f 08-31 20:50:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +peer1.org2.example.com | [040 08-31 20:50:44.84 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +peer1.org2.example.com | [041 08-31 20:50:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +peer0.org1.example.com | [0d2 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org1.example.com | [0d3 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org1.example.com | [0d4 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.8 +peer1.org2.example.com | [042 08-31 20:50:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +peer0.org1.example.com | [0d5 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.8" , sending back REGISTERED +peer1.org2.example.com | [043 08-31 20:50:44.85 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +peer1.org2.example.com | [044 08-31 20:50:44.86 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +peer1.org2.example.com | [045 08-31 20:50:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +peer0.org1.example.com | [0d6 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.8" +peer1.org2.example.com | [046 08-31 20:50:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +peer0.org1.example.com | [0d7 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.8" +peer0.org2.example.com | 00000030 dc 5f 48 1d 7a 9c 78 ef 76 6a 13 7f 1a 3e 3b 5f |._H.z.x.vj...>;_| +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +peer1.org1.example.com | [1aa 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org2.example.com | [047 08-31 20:50:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +peer0.org2.example.com | 00000040 2d 9d b3 12 46 c0 13 |-...F..| +peer0.org1.example.com | [0d8 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.8" +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Policy] /Channel/Consortiums/Admins" +peer1.org1.example.com | [1ab 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [048 08-31 20:50:44.86 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +peer0.org2.example.com | [127 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer0.org1.example.com | [0d9 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer0.org2.example.com | [128 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +peer0.org2.example.com | [129 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +peer1.org2.example.com | [049 08-31 20:50:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +peer0.org1.example.com | [0da 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [12a 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +orderer0.example.com | "2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Group] /Channel/Orderer" +peer1.org2.example.com | [04a 08-31 20:50:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | [0db 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org2.example.com | [12b 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +peer1.org2.example.com | [04b 08-31 20:50:44.88 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer1.org1.example.com | [1ac 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [0dc 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU [9c94cd6b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [0dd 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU [9c94cd6b] notifying Txid:9c94cd6b-f32c-454f-b3c3-eaa279cea14e, channelID: +peer1.org2.example.com | [04c 08-31 20:50:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [1ad 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [0de 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [04d 08-31 20:50:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +peer0.org2.example.com | [12c 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer0.org2.example.com | [12d 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +peer0.org2.example.com | [12e 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +peer0.org2.example.com | [12f 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +peer0.org1.example.com | [0df 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org2.example.com | [04e 08-31 20:50:44.89 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +peer0.org2.example.com | [130 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +peer0.org1.example.com | [0e0 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer1.org2.example.com | [04f 08-31 20:50:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +peer1.org1.example.com | [1ae 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 13D2BBD79F63E70802C8B5266F2108AAE371F2C1AC729ABA0023A923FC4BD31C +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org2.example.com | [131 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +peer0.org1.example.com | [0e1 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer1.org2.example.com | [050 08-31 20:50:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +peer1.org1.example.com | [1af 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org2.example.com | [132 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc00263f920)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +peer0.org1.example.com | [0e2 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer1.org2.example.com | [051 08-31 20:50:44.90 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +peer1.org1.example.com | [1b0 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b2 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org2.example.com | [133 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +peer0.org1.example.com | [0e3 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer1.org2.example.com | [052 08-31 20:50:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +peer1.org1.example.com | [1b1 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b3 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org2.example.com | [134 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +peer0.org1.example.com | [0e4 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer1.org2.example.com | [053 08-31 20:50:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +peer1.org2.example.com | [054 08-31 20:50:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +peer1.org2.example.com | [055 08-31 20:50:44.93 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +peer0.org2.example.com | [135 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +peer0.org1.example.com | [0e5 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +peer1.org2.example.com | [056 08-31 20:50:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +peer0.org2.example.com | [136 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b4 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer1.org1.example.com | [1b2 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [0e6 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +peer1.org2.example.com | [057 08-31 20:50:44.94 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +peer0.org2.example.com | [137 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b5 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer1.org1.example.com | [1b3 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes +peer0.org1.example.com | [0e7 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +peer1.org2.example.com | [058 08-31 20:50:44.94 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +peer0.org2.example.com | [138 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b6 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer1.org1.example.com | [1b4 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [0e8 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +peer1.org2.example.com | [059 08-31 20:50:44.94 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.5:7051 +peer0.org2.example.com | [139 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b7 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer1.org1.example.com | [1b5 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2192 bytes, Signature: 0 bytes +peer0.org1.example.com | [0e9 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +peer1.org2.example.com | [05a 08-31 20:50:44.94 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org2.example.com:7051 +peer0.org2.example.com | [13a 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b8 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer1.org1.example.com | [1b6 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2192 bytes, Signature: 0 bytes +peer0.org1.example.com | [0ea 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +peer1.org2.example.com | [05b 08-31 20:50:44.94 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.5:7051 +peer0.org2.example.com | [13b 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b9 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer1.org1.example.com | [1b7 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [0eb 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:50:48.373Z grpc.peer_address=172.18.0.8:53918 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=150.9µs +peer1.org2.example.com | [05c 08-31 20:50:44.94 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer1.org2.example.com:7051 +peer0.org2.example.com | [13c 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1ba Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer1.org1.example.com | [1b8 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2192 bytes, Signature: 0 bytes +peer0.org1.example.com | [0ec 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [05d 08-31 20:50:44.95 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +peer0.org2.example.com | [13d 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1bb Adding to config map: [Value] /Channel/OrdererAddresses" +peer1.org1.example.com | [1b9 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 d2 bb d7 9f 63 e7 08 02 c8 b5 26 6f 21 08 aa |.....c.....&o!..| +peer0.org1.example.com | [0ed 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer1.org2.example.com | [05e 08-31 20:50:44.96 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer1.org2.example.com +peer0.org2.example.com | [13e 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +peer0.org2.example.com | [13f 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +peer0.org1.example.com | [0ee 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer1.org2.example.com | [05f 08-31 20:50:44.96 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer1.org2.example.com:7052 +peer1.org1.example.com | 00000010 e3 71 f2 c1 ac 72 9a ba 00 23 a9 23 fc 4b d3 1c |.q...r...#.#.K..| +peer1.org1.example.com | [1ba 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 97 33 95 87 65 34 46 21 d7 69 |0E.!...3..e4F!.i| +peer1.org2.example.com | [060 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.8 +peer1.org2.example.com | [061 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +peer0.org1.example.com | [0ef 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.8:53918 +peer1.org1.example.com | 00000010 11 19 1f f4 fb e8 93 17 bd cd eb 02 d4 0d 2c 1b |..............,.| +peer1.org2.example.com | [062 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.8 +peer0.org1.example.com | [0f0 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:53918 +peer1.org2.example.com | [063 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +peer0.org2.example.com | [140 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +peer1.org1.example.com | 00000020 9a 50 4c b9 ea 02 20 33 d3 bb f9 c1 4e 63 8c 0e |.PL... 3....Nc..| +peer1.org1.example.com | 00000030 4f 6c 17 ea 15 ef 80 c1 62 dc 95 f2 b7 0a bb 66 |Ol......b......f| +peer1.org1.example.com | 00000040 77 a6 76 ee 90 57 de |w.v..W.| +peer1.org1.example.com | [1bb 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [1bc 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 52 1b c3 5e 3a 2a f7 45 cf 25 7b |0D. xR..^:*.E.%{| +peer1.org2.example.com | [064 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.8 +peer0.org1.example.com | [0f1 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [0f2 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [0f3 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [0f4 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [0f5 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org1.example.com | [0f6 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 01 cc d1 2a 7d e5 33 5a 6a 28 55 |0D. J...*}.3Zj(U| +peer1.org2.example.com | [065 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +peer1.org2.example.com | [066 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +peer1.org2.example.com | [067 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +peer1.org2.example.com | [068 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000010 0a 40 4e f1 e1 9b 66 e7 99 ce 80 c8 d8 2e 3f c1 |.@N...f.......?.| +peer1.org2.example.com | [069 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +peer0.org2.example.com | [141 08-31 20:50:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [06a 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer0.org2.example.com | [142 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +peer0.org1.example.com | 00000010 2c fb c0 ef 18 86 a9 ad ed 9b ab 64 d0 4e 1a 19 |,..........d.N..| +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1bc Adding to config map: [Value] /Channel/Capabilities" +peer1.org2.example.com | [06b 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +peer1.org1.example.com | 00000020 43 14 b9 4e 02 20 65 f5 f1 cd c4 d9 09 50 45 35 |C..N. e......PE5| +peer0.org2.example.com | [143 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +peer0.org1.example.com | 00000020 8b d5 81 14 02 20 7d 07 86 01 ca 2a d6 78 89 7b |..... }....*.x.{| +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1bd Adding to config map: [Value] /Channel/HashingAlgorithm" +peer1.org2.example.com | [06c 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +peer1.org1.example.com | 00000030 d6 fb c5 7c b1 df 1e 3f 55 fb 06 a6 3b ce 07 cc |...|...?U...;...| +peer0.org2.example.com | [144 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +peer0.org1.example.com | 00000030 87 b5 6b 35 81 e5 c0 2e 75 7b 80 e3 34 5e 7c 35 |..k5....u{..4^|5| +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1be Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer1.org2.example.com | [06d 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +peer1.org1.example.com | 00000040 26 32 cf 0b 87 b3 |&2....| +peer0.org2.example.com | [145 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +peer0.org1.example.com | 00000040 b8 8e 8e d5 bb e8 |......| +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1bf Adding to config map: [Policy] /Channel/Writers" +peer1.org2.example.com | [06e 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +peer1.org1.example.com | [1bd 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [146 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [0f7 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:53918 +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1c0 Adding to config map: [Policy] /Channel/Admins" +peer1.org2.example.com | [06f 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +peer1.org1.example.com | [1be 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [147 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [0f8 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:53918 +orderer0.example.com | "2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1c1 Adding to config map: [Policy] /Channel/Readers" +peer1.org2.example.com | [070 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer1.org1.example.com | [1bf 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [148 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [0f9 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +orderer0.example.com | "2020-08-31 20:50:43.439 UTC [common.channelconfig] NewStandardValues -> DEBU 1c2 Initializing protos for *channelconfig.ChannelProtos" +peer1.org2.example.com | [071 08-31 20:50:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +peer1.org1.example.com | [1c0 08-31 20:50:53.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [149 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +peer0.org1.example.com | [0fa 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:53918 disconnected +peer0.org1.example.com | [0fb 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:50:56.375Z grpc.peer_address=172.18.0.8:53918 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=7.1104ms +peer0.org1.example.com | [0fc 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [0fd 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org2.example.com | [072 08-31 20:50:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer1.org2.example.com | [073 08-31 20:50:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +peer1.org2.example.com | [074 08-31 20:50:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +peer1.org2.example.com | [075 08-31 20:50:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +peer1.org2.example.com | [076 08-31 20:50:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +peer0.org2.example.com | [14a 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [0fe 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:50:48.391Z grpc.peer_address=172.18.0.8:53920 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=154.1µs +peer1.org2.example.com | [077 08-31 20:50:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +peer0.org2.example.com | [14b 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +orderer0.example.com | "2020-08-31 20:50:43.439 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c3 Processing field: HashingAlgorithm" +peer1.org1.example.com | [1c1 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [0ff 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [078 08-31 20:50:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +peer0.org2.example.com | [14c 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +orderer0.example.com | "2020-08-31 20:50:43.439 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c4 Processing field: BlockDataHashingStructure" +peer1.org1.example.com | [1c2 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [100 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer1.org2.example.com | [079 08-31 20:50:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +peer0.org2.example.com | [14d 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +orderer0.example.com | "2020-08-31 20:50:43.439 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c5 Processing field: OrdererAddresses" +peer1.org1.example.com | [1c3 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [101 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer1.org2.example.com | [07a 08-31 20:50:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +peer0.org2.example.com | [14e 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +orderer0.example.com | "2020-08-31 20:50:43.439 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c6 Processing field: Consortium" +peer1.org1.example.com | [1c4 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [102 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:53920 +peer0.org1.example.com | [103 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:53920 +peer1.org2.example.com | [07b 08-31 20:50:44.99 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer1.org2.example.com:7051 and bootstrap set [peer1.org2.example.com:7051] +peer1.org2.example.com | [07c 08-31 20:50:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [07d 08-31 20:50:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer1.org2.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer1.org2.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer1.org2.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer1.org2.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [07e 08-31 20:50:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [07f 08-31 20:50:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [080 08-31 20:50:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [14f 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org2.example.com | [150 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | [104 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +orderer0.example.com | "2020-08-31 20:50:43.439 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c7 Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:50:43.439 UTC [common.channelconfig] NewStandardValues -> DEBU 1c8 Initializing protos for *channelconfig.ConsortiumProtos" +orderer0.example.com | "2020-08-31 20:50:43.439 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c9 Processing field: ChannelCreationPolicy" +orderer0.example.com | "2020-08-31 20:50:43.439 UTC [common.channelconfig] NewStandardValues -> DEBU 1ca Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:50:43.439 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cb Processing field: MSP" +peer1.org2.example.com | [081 08-31 20:50:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +orderer0.example.com | "2020-08-31 20:50:43.439 UTC [common.channelconfig] validateMSP -> DEBU 1cc Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-08-31 20:50:43.439 UTC [msp] newBccspMsp -> DEBU 1cd Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:43.439 UTC [msp] New -> DEBU 1ce Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:50:43.439 UTC [msp] Setup -> DEBU 1cf Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-08-31 20:50:43.439 UTC [msp.identity] newIdentity -> DEBU 1d0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [082 08-31 20:50:45.01 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer1.org2.example.com:7051, InternalEndpoint: peer1.org2.example.com:7051, PKI-ID: 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482, Metadata: +peer1.org2.example.com | [083 08-31 20:50:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [084 08-31 20:50:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01D7060A204EE140FBD31CE482...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer1.org2.example.com | [085 08-31 20:50:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D5EA79637F04881983BECB2D7729DA6771A358871CBA8BBE44C8A4394738CB9B +peer0.org2.example.com | [151 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org1.example.com | [105 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 bf 56 09 8c 84 17 91 6a 28 9c 8f |0D. 1.V.....j(..| +peer1.org1.example.com | [1c5 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [086 08-31 20:50:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Added N�@�����9�\F���`�y(כ���Jt�, total items: 1 +peer0.org2.example.com | [152 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | 00000010 bb fc 74 67 dd 44 e2 44 d5 a9 66 82 36 5a 4c f9 |..tg.D.D..f.6ZL.| +peer1.org1.example.com | [1c6 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\250\265D\233'wD\366\255\346\356\224\270\213\306\036\2759\374\005\024\002 \037\202\366=\247u\021\336F\273\241\205\246o\036\237\304\023\320p\310:\221\241\220\006\271\271r\224\377\221" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes +peer1.org2.example.com | [087 08-31 20:50:45.01 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer1.org2.example.com:7051 started +peer0.org2.example.com | [153 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org1.example.com | 00000020 a0 4e ac b7 02 20 55 52 d2 32 3c a0 df d5 3c ff |.N... UR.2<...<.| +peer1.org2.example.com | [088 08-31 20:50:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +peer1.org1.example.com | [1c7 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\250\265D\233'wD\366\255\346\356\224\270\213\306\036\2759\374\005\024\002 \037\202\366=\247u\021\336F\273\241\205\246o\036\237\304\023\320p\310:\221\241\220\006\271\271r\224\377\221" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes +peer0.org2.example.com | [154 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | 00000030 30 ea 15 b3 f8 69 60 8c 37 99 50 8d ef ce 38 1f |0....i`.7.P...8.| +peer1.org1.example.com | [1c8 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [155 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002795840)} +peer0.org1.example.com | 00000040 24 f1 4e 33 4d 55 |$.N3MU| +peer1.org2.example.com | [089 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1c9 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\250\265D\233'wD\366\255\346\356\224\270\213\306\036\2759\374\005\024\002 \037\202\366=\247u\021\336F\273\241\205\246o\036\237\304\023\320p\310:\221\241\220\006\271\271r\224\377\221" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes +peer0.org1.example.com | [106 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:53920 +peer0.org2.example.com | [156 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [08a 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [1ca 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 49 82 6f 40 b1 a8 62 d7 ad 88 42 dc bf eb 1d |6I.o@..b...B....| +peer0.org1.example.com | [107 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:53920 +peer0.org2.example.com | [157 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [08b 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1017D7C49CE3989A9F336759FC88B4B570987D0D8D8D059BE4D09A759C52335F +peer1.org2.example.com | [08c 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [08d 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [08e 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [08f 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping connecting to myself +peer1.org2.example.com | [090 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.8,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org1.example.com | [108 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:5199577545387710782 tag:EMPTY mem_req: > > , Envelope: 1109 bytes, Signature: 0 bytes +peer0.org1.example.com | [109 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [091 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.8 +peer0.org2.example.com | [158 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | 00000010 ae 7f ff 92 41 83 18 2a af cb cf 5c f5 6c 37 7e |....A..*...\.l7~| +peer0.org1.example.com | [10a 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:5199577545387710782 tag:EMPTY mem_req: > > , Envelope: 1109 bytes, Signature: 0 bytes +peer0.org1.example.com | [10b 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 6f 55 3d db b5 8c 9f 86 e4 de e5 8c 65 25 a9 |.oU=.........e%.| +peer0.org1.example.com | 00000010 6c e9 68 63 82 9f 0f 28 9e 2c 8f 2b 0a b7 1c c1 |l.hc...(.,.+....| +peer1.org2.example.com | [092 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org2.example.com:7052 +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | [10c 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 94 3a 88 b3 6b d2 8a 1e 7b f3 |0E.!...:..k...{.| +peer0.org1.example.com | 00000010 5c a5 e8 1c ef 6c a0 37 38 cb fc ae fe 7f 27 9e |\....l.78.....'.| +peer1.org2.example.com | [093 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org1.example.com | [1cb 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 69 37 4b 52 9c 1a 15 de ea 3e |0E.!..i7KR.....>| +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org2.example.com | [159 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org2.example.com | CORE_CHAINCODE_ID_NAME=lscc:1.4.8 +peer1.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org2.example.com | [094 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.8) lock +peer1.org2.example.com | [095 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.8) lock +peer1.org2.example.com | [096 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.8 +peer1.org2.example.com | [097 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.8) +peer1.org2.example.com | [098 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.8) lock +peer1.org2.example.com | [099 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.8) lock +peer1.org2.example.com | [09a 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.8) +peer1.org2.example.com | [09b 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.8 +peer1.org2.example.com | [09c 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.8 +peer1.org2.example.com | [09d 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org2.example.com | [09e 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org2.example.com | [09f 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.8 +peer1.org2.example.com | [0a0 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.8" , sending back REGISTERED +peer1.org2.example.com | [0a1 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.8" +peer0.org1.example.com | 00000020 3d ce 4c 9c fd 02 20 13 62 ac 79 98 61 41 82 00 |=.L... .b.y.aA..| +peer1.org2.example.com | [0a2 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.8" +peer1.org2.example.com | [0a3 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.8" +peer1.org2.example.com | [0a4 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org2.example.com | [0a5 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [0a6 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU [86f00bb5] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [0a7 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU [86f00bb5] notifying Txid:86f00bb5-4daf-4d58-81ed-c20b234d6e35, channelID: +peer1.org2.example.com | [0a8 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [0a9 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer1.org2.example.com | [0aa 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.8,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer1.org2.example.com | [0ab 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.8 +peer1.org2.example.com | [0ac 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org2.example.com:7052 +peer1.org2.example.com | [0ad 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer1.org2.example.com | CORE_CHAINCODE_ID_NAME=cscc:1.4.8 +peer1.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer1.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer1.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer1.org2.example.com | [0ae 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.8) lock +peer1.org2.example.com | [0af 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.8) lock +peer1.org2.example.com | [0b0 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.8 +peer0.org1.example.com | 00000030 b5 c6 1f c4 29 e2 ac b2 cf dd 8a 98 2c ac 50 c1 |....).......,.P.| +peer1.org2.example.com | [0b1 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.8) +peer0.org1.example.com | 00000040 fc 65 09 14 07 e8 fb |.e.....| +peer0.org2.example.com | [15a 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | 00000010 a8 b5 44 9b 27 77 44 f6 ad e6 ee 94 b8 8b c6 1e |..D.'wD.........| +peer1.org2.example.com | [0b2 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.8 +peer0.org1.example.com | [10d 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [15b 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org1.example.com | 00000020 bd 39 fc 05 14 02 20 1f 82 f6 3d a7 75 11 de 46 |.9.... ...=.u..F| +peer1.org2.example.com | [0b3 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.8 +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [15c 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | 00000030 bb a1 85 a6 6f 1e 9f c4 13 d0 70 c8 3a 91 a1 90 |....o.....p.:...| +peer1.org1.example.com | 00000040 06 b9 b9 72 94 ff 91 |...r...| +peer1.org2.example.com | [0b4 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org2.example.com | [15d 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0x9a, 0x52, 0x4c, 0x2b, 0x43, 0x65, 0xfd, 0x57, 0x33, 0x8e, 0x73, 0xf4, 0x8a, 0x80, 0xa7, 0x23, 0x93, 0x2, 0xb5, 0x41, 0x2, 0x4d, 0xf3, 0x50, 0xe8, 0x90, 0xb1, 0xd5, 0x7a, 0xc7, 0x1e, 0x2e} txOffsets= +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | [1cc 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org2.example.com | [0b5 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org2.example.com | txId=fd92ece786eb33a140499e967ed74e3a3bbcb8e88456d50f7454e373b6da94d6 locPointer=offset=39, bytesLength=28430 +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | [1cd 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 79 23 65 79 93 cf 14 f9 81 a4 |0E.!..y#ey......| +peer1.org2.example.com | [0b6 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.8 +peer0.org1.example.com | [10e 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef ec 3a 9f f2 9a 9a 17 c0 0b 35 |0E.!...:.......5| +peer0.org2.example.com | ] +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | 00000010 bf e1 dd 68 24 44 7b 6c f1 67 c0 5e 40 d6 c4 3c |...h$D{l.g.^@..<| +peer1.org2.example.com | [0b7 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.8" , sending back REGISTERED +peer0.org1.example.com | 00000010 3b 13 d3 4a 99 97 88 79 64 26 12 dd 74 c8 56 b7 |;..J...yd&..t.V.| +peer0.org2.example.com | [15e 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28430] for tx ID: [fd92ece786eb33a140499e967ed74e3a3bbcb8e88456d50f7454e373b6da94d6] to txid-index +orderer0.example.com | "2020-08-31 20:50:43.440 UTC [common.channelconfig] NewStandardValues -> DEBU 1d1 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org1.example.com | 00000020 1d 06 0c 92 ba 02 20 60 6c 69 34 26 72 45 06 31 |...... `li4&rE.1| +peer1.org2.example.com | [0b8 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.8" +peer0.org1.example.com | 00000020 3a 0f 63 3c 9e 02 20 2a 21 a9 05 29 3d 56 88 e5 |:.c<.. *!..)=V..| +peer0.org2.example.com | [15f 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28430] for tx number:[0] ID: [fd92ece786eb33a140499e967ed74e3a3bbcb8e88456d50f7454e373b6da94d6] to blockNumTranNum index +orderer0.example.com | "2020-08-31 20:50:43.440 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d2 Processing field: MSP" +peer1.org1.example.com | 00000030 e6 92 b0 35 73 37 a7 98 08 33 9e 20 09 b7 46 f7 |...5s7...3. ..F.| +peer1.org2.example.com | [0b9 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.8" +peer0.org1.example.com | 00000030 b1 9b 21 67 4a ba e6 c5 cd 26 13 47 0e 27 86 e9 |..!gJ....&.G.'..| +peer0.org2.example.com | [160 08-31 20:50:58.23 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28476], isChainEmpty=[false], lastBlockNumber=[0] +peer1.org1.example.com | 00000040 03 02 b5 7d 4a 99 b7 |...}J..| +orderer0.example.com | "2020-08-31 20:50:43.440 UTC [common.channelconfig] validateMSP -> DEBU 1d3 Setting up MSP for org Org2MSP" +peer1.org2.example.com | [0ba 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.8" +peer0.org1.example.com | 00000040 e9 2f ca 77 34 52 01 |./.w4R.| +peer0.org2.example.com | [161 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +peer1.org1.example.com | [1ce 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:50:43.440 UTC [msp] newBccspMsp -> DEBU 1d4 Creating BCCSP-based MSP instance" +peer1.org2.example.com | [0bb 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org2.example.com | [0bc 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [0bd 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +orderer0.example.com | "2020-08-31 20:50:43.440 UTC [msp] New -> DEBU 1d5 Creating Cache-MSP instance" +peer1.org1.example.com | [1cf 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [0be 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU [40ff712c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [10f 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [162 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +orderer0.example.com | "2020-08-31 20:50:43.440 UTC [msp] Setup -> DEBU 1d6 Setting up MSP instance Org2MSP" +peer1.org1.example.com | [1d0 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer1.org2.example.com | [0bf 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU [40ff712c] notifying Txid:40ff712c-58f0-40b6-91ff-96374166627d, channelID: +peer0.org1.example.com | [110 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]} +peer0.org2.example.com | [163 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +orderer0.example.com | "2020-08-31 20:50:43.440 UTC [msp.identity] newIdentity -> DEBU 1d7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [1d1 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" +peer1.org2.example.com | [0c0 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [111 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [164 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [1d2 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [0c1 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org1.example.com | [112 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [165 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [1d3 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [0c2 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer1.org2.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.8,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org1.example.com | [113 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [166 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [1d4 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [0c3 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.8 +peer0.org1.example.com | [114 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [167 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | [1d5 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [0c4 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer1.org2.example.com:7052 +peer0.org1.example.com | [115 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [168 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [1d6 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [0c5 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org1.example.com | [116 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [169 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | [1d7 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2192 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1d8 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\250\265D\233'wD\366\255\346\356\224\270\213\306\036\2759\374\005\024\002 \037\202\366=\247u\021\336F\273\241\205\246o\036\237\304\023\320p\310:\221\241\220\006\271\271r\224\377\221" secret_envelope: > alive:O#\315O\300\267\353\231IL\213V\256\3243\214Pd\002 N\2266\024k\0303\300\\\320\345\303Z\350\270\001\327p\357.|\357\277[\0222\236\355`2\265|" secret_envelope: > +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org2.example.com | [16a 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +peer0.org2.example.com | [16b 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +peer0.org2.example.com | [16c 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [16d 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [16e 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [16f 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org2.example.com | [170 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [171 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +peer0.org2.example.com | [172 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +peer0.org2.example.com | [173 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [174 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +peer0.org2.example.com | [175 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +peer0.org2.example.com | [176 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org2.example.com | [177 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +peer0.org2.example.com | [178 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +peer0.org2.example.com | [179 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 14ms (state_validation=2ms block_and_pvtdata_commit=6ms state_commit=3ms) commitHash=[] +peer0.org2.example.com | [17a 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +peer0.org2.example.com | [17b 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [62101a59-1328-4390-811a-91f21ec23d70] +peer0.org2.example.com | [17c 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +peer0.org2.example.com | [17d 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [62101a59-1328-4390-811a-91f21ec23d70] +peer0.org2.example.com | [17e 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org2.example.com | [17f 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org2.example.com | [180 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org2.example.com | [181 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org2.example.com | [182 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org2.example.com | [183 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [184 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | [185 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | [186 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org2.example.com | [187 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | [188 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org2.example.com | [189 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org2.example.com | [18a 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer1.org1.example.com | [1d9 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2192 bytes, Signature: 0 bytes +peer1.org2.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | [117 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [118 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 091B16D621614325C42E7353D9C14E267DF21920F15E58FB00848C61528CA7F6 +peer0.org1.example.com | [119 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:43.440 UTC [common.channelconfig] NewStandardValues -> DEBU 1d8 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-08-31 20:50:43.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d9 Processing field: ConsensusType" +orderer0.example.com | "2020-08-31 20:50:43.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1da Processing field: BatchSize" +peer1.org1.example.com | [1da 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | CORE_CHAINCODE_ID_NAME=qscc:1.4.8 +peer0.org2.example.com | [18b 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org1.example.com | [11a 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-08-31 20:50:43.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1db Processing field: BatchTimeout" +peer1.org1.example.com | [1db 08-31 20:50:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1dc 08-31 20:50:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161008 +peer0.org2.example.com | [18c 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org1.example.com | [11b 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +orderer0.example.com | "2020-08-31 20:50:43.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dc Processing field: KafkaBrokers" +peer1.org1.example.com | [1dd 08-31 20:50:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8448F22A895C46D051891A114E23AC0F4F4852DBE092B4D78E0EBCDB3171D236 +peer1.org2.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org2.example.com | [18d 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [11c 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 5199577545387710782, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2202 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:50:43.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dd Processing field: ChannelRestrictions" +peer1.org1.example.com | [1de 08-31 20:50:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer1.org2.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | [11d 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +orderer0.example.com | "2020-08-31 20:50:43.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1de Processing field: Capabilities" +peer1.org1.example.com | [1df 08-31 20:50:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org1.example.com | [11e 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 5199577545387710782, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2202 bytes, Signature: 0 bytes +peer0.org1.example.com | [11f 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:50:43.441 UTC [common.channelconfig] NewStandardValues -> DEBU 1df Initializing protos for *channelconfig.OrdererOrgProtos" +peer1.org1.example.com | [1e0 08-31 20:50:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | [0c6 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.8) lock +peer0.org1.example.com | [120 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [18e 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [18f 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org1.example.com | [121 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [122 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [123 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e1 08-31 20:50:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +orderer0.example.com | "2020-08-31 20:50:43.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e0 Processing field: Endpoints" +peer0.org1.example.com | [124 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes +peer1.org2.example.com | [0c7 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.8) lock +peer0.org2.example.com | [190 08-31 20:50:58.24 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [1e2 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:50:43.441 UTC [common.channelconfig] NewStandardValues -> DEBU 1e1 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | [125 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [0c8 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.8 +peer0.org2.example.com | [191 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [1e3 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:50:43.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e2 Processing field: MSP" +peer1.org2.example.com | [0c9 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.8) +peer0.org2.example.com | [192 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org1.example.com | [126 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e4 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:50:43.441 UTC [common.channelconfig] validateMSP -> DEBU 1e3 Setting up MSP for org OrdererOrg" +peer1.org2.example.com | [0ca 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.8) lock +peer0.org2.example.com | [193 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [127 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b3 c6 21 fa f4 ec 97 02 68 bd 3d 0e c9 64 e2 68 |..!.....h.=..d.h| +peer1.org1.example.com | [1e5 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:50:43.441 UTC [msp] newBccspMsp -> DEBU 1e4 Creating BCCSP-based MSP instance" +peer1.org2.example.com | [0cb 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.8) lock +peer0.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | 00000010 11 c9 93 2f 34 9e 94 a4 02 8b 6f a1 70 ea 3e 40 |.../4.....o.p.>@| +peer1.org1.example.com | [1e6 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:50:43.441 UTC [msp] New -> DEBU 1e5 Creating Cache-MSP instance" +peer1.org2.example.com | [0cc 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.8) +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | [128 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b ba e6 c6 6c 38 df 8d fc 45 1a |0E.!.....l8...E.| +peer1.org1.example.com | [1e7 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:50:43.441 UTC [msp] Setup -> DEBU 1e6 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-08-31 20:50:43.441 UTC [msp.identity] newIdentity -> DEBU 1e7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | [0cd 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.8 +peer0.org1.example.com | 00000010 48 0d ee b0 a9 aa 25 f9 43 29 9a 50 73 34 c8 39 |H.....%.C).Ps4.9| +peer1.org1.example.com | [1e8 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org2.example.com | [0ce 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.8 +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org1.example.com | 00000020 ba 4c e8 19 dc 02 20 22 f0 5e a5 c9 36 f9 d9 c7 |.L.... ".^..6...| +peer1.org1.example.com | [1e9 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org2.example.com | [0cf 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | 00000030 64 d8 e3 72 cf aa 22 ae f2 fb 1d 92 59 72 77 17 |d..r..".....Yrw.| +peer1.org1.example.com | [1ea 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cc dc ab dd 13 4e bd 90 9d 8c 94 1f 1d 19 fc 99 |.....N..........| +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | [0d0 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer0.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | 00000040 15 0d 8a 71 4f 42 66 |...qOBf| +peer1.org1.example.com | 00000010 0c ec 21 5e 8a 69 9a 83 80 8d 61 88 d0 56 72 4c |..!^.i....a..VrL| +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org2.example.com | [0d1 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.8 +peer0.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org1.example.com | [129 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | [1eb 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 bf d3 c5 91 eb 29 15 6a 81 d2 |0E.!.......).j..| +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org2.example.com | [0d2 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.8" , sending back REGISTERED +peer0.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | 00000010 e6 7a 10 53 04 1a 4b 25 e7 a8 6d 64 5f d4 4e ec |.z.S..K%..md_.N.| +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org2.example.com | [0d3 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.8" +peer0.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | [12a 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 01 e4 0f f6 f0 1c 01 15 7a 3d 82 3b |0D. ........z=.;| +peer1.org1.example.com | 00000020 0c e9 e1 6f 25 02 20 28 e8 15 79 dc 82 e3 ac d9 |...o%. (..y.....| +orderer0.example.com | nw== +peer1.org2.example.com | [0d4 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.8" +peer0.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org1.example.com | 00000010 c2 1f 2f 75 3c 06 58 b0 6b d6 c5 de f7 aa 07 32 |../u<.X.k......2| +peer0.org1.example.com | 00000020 42 cc 24 b3 02 20 4f 00 ef bc ee 4d 40 f0 8f 74 |B.$.. O....M@..t| +peer0.org1.example.com | 00000030 2a 0b 28 75 69 9e ee 50 b4 a6 de d7 fd df 4e da |*.(ui..P......N.| +peer0.org1.example.com | 00000040 ce e0 5c 7b 18 40 |..\{.@| +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [msp] Setup -> DEBU 1e8 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [msp] Setup -> DEBU 1e9 MSP manager setup complete, setup 3 msps" +peer0.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org2.example.com | [0d5 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.8" +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1ea Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +peer0.org2.example.com | nw== +peer0.org1.example.com | [12b 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | 00000030 a8 ff 9e 43 42 bf d4 2a f7 11 c1 32 bf 4b df db |...CB..*...2.K..| +peer1.org2.example.com | [0d6 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1eb Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [12c 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | 00000040 36 ed 64 67 88 c4 1e |6.dg...| +peer1.org2.example.com | [0d7 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1ec Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +peer0.org2.example.com | [194 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org1.example.com | [12d 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [1ec 08-31 20:50:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org2.example.com | [0d8 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1ed Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +peer0.org2.example.com | [195 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [12e 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer1.org2.example.com | [0d9 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU [90a5896a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1ee Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +peer0.org2.example.com | [196 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [197 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [0da 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU [90a5896a] notifying Txid:90a5896a-21ea-43cc-899f-a3e0d34ce0fb, channelID: +peer0.org2.example.com | [198 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [0db 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [0dc 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org2.example.com | [0dd 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer0.org2.example.com | [199 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [0de 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +peer1.org2.example.com | [0df 08-31 20:50:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer1.org2.example.com | [0e0 08-31 20:50:45.04 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +peer1.org2.example.com | [0e1 08-31 20:50:45.04 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +peer1.org2.example.com | [0e2 08-31 20:50:45.04 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051] +peer1.org2.example.com | [0e3 08-31 20:50:45.04 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer1.org2.example.com" ], network ID=[dev], address=[peer1.org2.example.com:7051] +peer1.org2.example.com | [0e4 08-31 20:50:45.04 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +peer1.org2.example.com | [0e5 08-31 20:50:45.04 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +peer1.org2.example.com | [0e6 08-31 20:50:45.04 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +peer1.org2.example.com | [0e7 08-31 20:50:45.04 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +peer1.org2.example.com | [0e8 08-31 20:50:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.8) lock +peer1.org2.example.com | [0e9 08-31 20:50:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.8) lock +peer1.org2.example.com | [0ea 08-31 20:50:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.8) +peer1.org2.example.com | [0eb 08-31 20:50:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [0ec 08-31 20:50:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [0ed 08-31 20:50:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FF56ECC6FE35106D59B554E60B83BD548C2481C23C98BE0E429CA19F35965508 +peer1.org2.example.com | [0ee 08-31 20:50:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [0ef 08-31 20:50:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [0f0 08-31 20:50:49.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [0f1 08-31 20:50:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [0f2 08-31 20:50:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [0f3 08-31 20:50:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E34D6D6E56AE6CAE2D4476A7681438C495B06489172CC257102A26D4BC155823 +peer1.org2.example.com | [0f4 08-31 20:50:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [0f5 08-31 20:50:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [0f6 08-31 20:50:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [0f7 08-31 20:50:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [0f8 08-31 20:50:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [0f9 08-31 20:50:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A84070A3F0A1B70656572312E6F...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [0fa 08-31 20:50:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A224092458072B1A379A21F24B945DAF0923845290E47E2B020C29712EFD58DA +peer1.org2.example.com | [0fb 08-31 20:50:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [0fc 08-31 20:50:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [0fd 08-31 20:50:53.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [0fe 08-31 20:50:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [0ff 08-31 20:50:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161006 +peer1.org2.example.com | [100 08-31 20:50:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AAE3DDE5492DA9BAC7EE40586A3DBFE6B4AA2C027C0EDDF1D77B904D1C1222B3 +peer1.org2.example.com | [101 08-31 20:50:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [102 08-31 20:50:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [103 08-31 20:50:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [104 08-31 20:50:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [105 08-31 20:50:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [106 08-31 20:50:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161007 +peer1.org2.example.com | [107 08-31 20:50:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 782CA671D29FFF1CEDF434170281BD94F151EB963A4FFB389FC1AA3C8F46ED05 +peer1.org2.example.com | [108 08-31 20:50:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [109 08-31 20:50:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [10a 08-31 20:50:57.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [10b 08-31 20:50:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:49044 +peer1.org2.example.com | [10c 08-31 20:50:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0025a9ea0 +peer1.org2.example.com | [10d 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org2.example.com | [10e 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [10f 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [110 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | [12f 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1ed 08-31 20:50:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 d8 48 d9 3a 9f 8c c9 1a 21 13 53 |0D. ..H.:....!.S| +peer1.org1.example.com | 00000010 93 52 93 36 22 93 ce b7 26 36 52 a0 7a a7 28 73 |.R.6"...&6R.z.(s| +peer1.org1.example.com | 00000020 f9 dd 5e ac 02 20 39 a4 fc 0e b4 e8 e7 bd a1 9d |..^.. 9.........| +peer1.org1.example.com | 00000030 a1 94 60 57 c1 90 91 a7 25 71 80 ea b9 63 20 83 |..`W....%q...c .| +peer1.org1.example.com | 00000040 ef 04 29 b5 0b 6e |..)..n| +peer1.org1.example.com | [1ee 08-31 20:50:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1ef 08-31 20:50:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [1f0 08-31 20:50:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1f1 08-31 20:50:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1f2 08-31 20:50:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1f3 08-31 20:50:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | [130 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | [19a 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [131 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [132 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [133 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [134 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [135 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [136 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4CCD27BCF4471B5C13E13D60F4428CDCDDAFCCFD9FD7DF889D9512177DC5B998 +peer0.org1.example.com | [137 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [138 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [139 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [13a 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [13b 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\272O\345\200" secret_envelope:G0\215=uX\003\020\377\313\357;\377\3438\362\231\2749=pY\211\266\303\361\036\244\262\002 \001\320\345\r\010.(\275\223j8\314>3\354\245\243\t\326\022O\032\373k@\004\216\257RCX\332" > > +peer0.org1.example.com | [13c 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer0.org1.example.com | [13d 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13e 08-31 20:50:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [13f 08-31 20:50:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [140 08-31 20:50:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [141 08-31 20:50:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [142 08-31 20:50:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [143 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [144 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A18D7B17F4FEC7717B799AA37834AAE88DFAE4ACBA13CBF2314C5011DD62BD7C +peer0.org1.example.com | [145 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org1.example.com | [146 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | [147 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [148 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [149 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [14a 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [14b 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1097 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [14c 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1097 bytes, Signature: 0 bytes +peer0.org1.example.com | [14d 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14e 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer0.org1.example.com | [14f 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [150 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +peer0.org1.example.com | [151 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 8d 7b 17 f4 fe c7 71 7b 79 9a a3 78 34 aa e8 |..{....q{y..x4..| +peer0.org1.example.com | 00000010 8d fa e4 ac ba 13 cb f2 31 4c 50 11 dd 62 bd 7c |........1LP..b.|| +peer0.org1.example.com | [152 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 2e 39 a2 80 83 f7 26 77 41 b0 76 |0D. ..9....&wA.v| +peer0.org1.example.com | 00000010 da 71 dd d0 4a a5 f1 ec ba 7d dc 1e 26 c9 2f 4e |.q..J....}..&./N| +peer0.org1.example.com | 00000020 0b ff 82 9a 02 20 04 66 5d b9 f2 df b2 3c 5a 08 |..... .f].... DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [154 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d e5 99 40 7b f1 4f 56 cb 47 6f eb |0D. M..@{.OV.Go.| +peer0.org1.example.com | 00000010 ac a6 63 08 c3 b0 2c c7 b4 94 4e e1 5e 99 29 69 |..c...,...N.^.)i| +peer0.org1.example.com | 00000020 b8 5c 95 3d 02 20 1c e7 ab ea 8d 6f 72 cc 0a 05 |.\.=. .....or...| +peer0.org1.example.com | 00000030 94 dd 96 55 86 42 29 15 3c a1 ae 6e 2a 7a e8 4f |...U.B).<..n*z.O| +peer0.org1.example.com | 00000040 4c 16 91 5b 1b 28 |L..[.(| +peer0.org1.example.com | [155 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org1.example.com | [156 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [157 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [158 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 dd b5 ea 3e 3c 67 4d 6f 6d d4 65 21 b3 4e f4 |T...> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 3c 38 bf 49 24 0b 64 e2 e3 b0 |0E.!..<8.I$.d...| +peer0.org1.example.com | 00000010 27 fc 87 66 7e ce e6 cc 8a 23 a7 00 7e 21 ac d3 |'..f~....#..~!..| +peer0.org1.example.com | 00000020 e7 8f 1e c6 72 02 20 24 7a bc 2c 73 03 2e 43 53 |....r. $z.,s..CS| +peer0.org1.example.com | 00000030 50 5a 17 ac 22 ed ed 2c 2c fb 62 1c 8f 1b ef 45 |PZ.."..,,.b....E| +peer0.org1.example.com | 00000040 41 e3 8a 2f c2 ff 4a |A../..J| +peer1.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org1.example.com | [15a 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [15b 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 b6 3e a2 c5 35 c8 40 fa d6 a2 |0E.!...>..5.@...| +peer0.org1.example.com | 00000010 81 1d 0b 70 6f 52 dd 08 15 72 da 3f 92 3c a8 a3 |...poR...r.?.<..| +peer0.org1.example.com | 00000020 27 5c 6a 68 ab 02 20 50 7e 14 a5 51 69 5a 57 d2 |'\jh.. P~..QiZW.| +peer1.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org1.example.com | 00000030 25 0c 98 f8 29 1b 01 43 0d dc b3 69 88 89 fb 32 |%...)..C...i...2| +peer0.org2.example.com | [19b 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1ef Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +peer1.org1.example.com | [1f4 08-31 20:50:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 94 c3 79 60 15 36 2a |..y`.6*| +peer1.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org1.example.com | [15c 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [19c 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org1.example.com | [15d 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [1f5 08-31 20:50:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [111 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [19d 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [15e 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [15f 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer1.org2.example.com | [112 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f0 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +peer0.org2.example.com | [19e 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [113 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [114 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [115 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b fa 3f 10 47 47 fe 65 d7 bb 47 36 81 3e 2e cc |..?.GG.e..G6.>..| +peer1.org2.example.com | 00000010 81 69 b1 ba fd 36 13 b8 e9 59 be 0e 50 22 bc 18 |.i...6...Y..P"..| +peer0.org1.example.com | [160 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [116 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 3b d7 b2 4d 8d ad a5 90 73 97 |0E.!..;..M....s.| +peer0.org2.example.com | [19f 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org2.example.com | [1a0 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | 00000010 bb 3a 5c 17 eb 1f 91 aa 11 82 18 29 d0 8d 5c 30 |.:\........)..\0| +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f1 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +peer0.org1.example.com | [161 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [162 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 a2 4a 15 d6 58 02 20 5e fa a1 4b 5a e0 db d3 28 |.J..X. ^..KZ...(| +peer1.org1.example.com | [1f6 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f2 Proposed new policy Admins for Channel/Consortiums" +peer0.org1.example.com | [163 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 a8 ed d2 5f e6 d2 c9 4b 08 18 4f bd bd 26 13 08 |..._...K..O..&..| +peer1.org2.example.com | 00000040 36 3b 59 3f a9 a3 cb |6;Y?...| +peer0.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f3 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f4 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [117 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [1f7 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f8 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [118 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000110620, header 0xc00271c7d0 +peer0.org1.example.com | [164 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [165 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f9 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fa 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org2.example.com | [119 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org1.example.com | [166 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [1fb 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org2.example.com | [11a 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU [][6aec13fd] processing txid: 6aec13fd7934b77594136330d5de2a87b429b2642a9d8149f2acbb36da0bd864 +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f5 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org1.example.com | [167 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [11b 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU [][6aec13fd] Entry chaincode: name:"cscc" +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f6 Proposed new policy BlockValidation for Channel/Orderer" +peer0.org1.example.com | [168 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | [1fc 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fd 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11c 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> INFO [][6aec13fd] Entry chaincode: name:"cscc" +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f7 Proposed new policy Readers for Channel/Orderer" +peer0.org1.example.com | [169 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | [1fe 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1ff 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161009 +peer1.org2.example.com | [11d 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f8 Proposed new policy Writers for Channel/Orderer" +peer0.org1.example.com | [16a 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | [11e 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +peer0.org1.example.com | [16b 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 d4 83 2d e6 b8 24 a2 da c6 a5 3c 75 f0 74 49 |$..-..$.... DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer0.org1.example.com | 00000010 5b 22 66 2e 9e 96 d5 40 72 71 bc 74 07 ea 22 ba |["f....@rq.t..".| +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f9 Proposed new policy Admins for Channel/Orderer" +peer0.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org2.example.com | [120 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org2.example.com | [121 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [16c 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 8a c2 e7 c7 13 8e a1 41 4c 66 |0E.!.........ALf| +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] GetPolicy -> DEBU 1fa Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1fb Proposed new policy Writers for Channel" +orderer0.example.com | "2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1fc Proposed new policy Admins for Channel" +orderer0.example.com | "2020-08-31 20:50:43.443 UTC [policies] GetPolicy -> DEBU 1fd Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +peer1.org1.example.com | [200 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9DC8AE7AF7E826B5D06ABE9052A1DAADFA9196FB3BA5FA6B2CDB234C9289F484 +peer1.org2.example.com | [122 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | 00000010 30 41 3e 4f 23 cd 4f c0 b7 eb 99 49 4c 8b 56 ae |0A>O#.O....IL.V.| +peer0.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | [201 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:50:43.443 UTC [policies] NewManagerImpl -> DEBU 1fe Proposed new policy Readers for Channel" +peer1.org2.example.com | [123 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org2.example.com | [124 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | 00000020 d4 33 8c 50 64 02 20 4e 96 36 14 6b 18 33 c0 5c |.3.Pd. N.6.k.3.\| +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [202 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-08-31 20:50:43.447 UTC [common.configtx] addToMap -> DEBU 1ff Adding to config map: [Group] /Channel" +peer1.org2.example.com | [125 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9b fa 3f 10 47 47 fe 65 d7 bb 47 36 81 3e 2e cc |..?.GG.e..G6.>..| +peer0.org1.example.com | 00000030 d0 e5 c3 5a e8 b8 01 d7 70 ef 2e 7c ef bf 5b 12 |...Z....p..|..[.| +peer1.org1.example.com | [203 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | 00000010 81 69 b1 ba fd 36 13 b8 e9 59 be 0e 50 22 bc 18 |.i...6...Y..P"..| +orderer0.example.com | "2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 200 Adding to config map: [Group] /Channel/Consortiums" +peer0.org1.example.com | 00000040 32 9e ed 60 32 b5 7c |2..`2.|| +peer0.org2.example.com | [1a1 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [204 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [126 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 3b d7 b2 4d 8d ad a5 90 73 97 |0E.!..;..M....s.| +orderer0.example.com | "2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 201 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +peer0.org1.example.com | [16d 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [1a2 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [205 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 202 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [1a3 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | 00000010 bb 3a 5c 17 eb 1f 91 aa 11 82 18 29 d0 8d 5c 30 |.:\........)..\0| +peer1.org1.example.com | [206 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 203 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +peer0.org1.example.com | [16e 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b f3 ef ce ac 19 90 17 fd 35 36 15 |0D. .........56.| +peer0.org2.example.com | [1a4 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | 00000020 a2 4a 15 d6 58 02 20 5e fa a1 4b 5a e0 db d3 28 |.J..X. ^..KZ...(| +peer1.org1.example.com | [207 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 204 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +peer0.org1.example.com | 00000010 18 7f db ab 3f 8a 2b 37 e4 89 45 d8 a2 25 82 cc |....?.+7..E..%..| +peer0.org2.example.com | [1a5 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org2.example.com | 00000030 a8 ed d2 5f e6 d2 c9 4b 08 18 4f bd bd 26 13 08 |..._...K..O..&..| +peer1.org1.example.com | [208 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 205 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +peer0.org1.example.com | 00000020 2e 06 47 c5 02 20 78 d8 66 21 d0 f3 d3 24 61 9d |..G.. x.f!...$a.| +peer0.org1.example.com | 00000030 51 00 24 65 7b 9c bc 51 6f fa 47 9d f1 8f b1 5b |Q.$e{..Qo.G....[| +peer0.org1.example.com | 00000040 bb a9 04 e6 64 aa |....d.| +peer0.org1.example.com | [16f 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | 00000040 36 3b 59 3f a9 a3 cb |6;Y?...| +peer1.org2.example.com | [127 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer0.org2.example.com | [1a6 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +orderer0.example.com | "2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 206 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +peer1.org1.example.com | [209 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [170 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [128 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +peer0.org2.example.com | [1a7 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +orderer0.example.com | "2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 207 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +peer1.org1.example.com | [20a 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer0.org1.example.com | [171 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer1.org2.example.com | [129 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +peer0.org2.example.com | [1a8 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +orderer0.example.com | "2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 208 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +peer1.org1.example.com | [20b 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [172 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer1.org2.example.com | [12a 08-31 20:50:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +peer0.org2.example.com | [1a9 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +orderer0.example.com | "2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 209 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +peer1.org1.example.com | [20c 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d c8 ae 7a f7 e8 26 b5 d0 6a be 90 52 a1 da ad |...z..&..j..R...| +peer0.org1.example.com | [173 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [12b 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +peer0.org2.example.com | [1aa 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 20a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +peer1.org1.example.com | 00000010 fa 91 96 fb 3b a5 fa 6b 2c db 23 4c 92 89 f4 84 |....;..k,.#L....| +peer0.org1.example.com | [174 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12c 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | "2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 20b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +peer1.org1.example.com | [20d 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 25 6f de 0b 24 70 96 f0 b2 0a 6d |0D. .%o..$p....m| +peer0.org1.example.com | [175 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12d 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 20c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +peer1.org1.example.com | 00000010 51 05 aa 74 ad 9c c0 8b d2 8c 59 e1 9d 35 92 41 |Q..t......Y..5.A| +peer0.org1.example.com | [176 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12e 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 20d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +peer1.org1.example.com | 00000020 1b 55 34 df 02 20 08 69 fc ec b6 dd ce cd d5 3b |.U4.. .i.......;| +peer0.org1.example.com | [177 08-31 20:50:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to peer1.org1.example.com:7051 +peer1.org2.example.com | [12f 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 20e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +peer1.org1.example.com | 00000030 bc 03 fd 45 47 0d 8f 5d 2a 77 56 aa 7e 0c f5 69 |...EG..]*wV.~..i| +peer0.org1.example.com | [179 08-31 20:50:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [130 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 20f Adding to config map: [Policy] /Channel/Consortiums/Admins" +peer1.org1.example.com | 00000040 8f 2b ec 25 e0 53 |.+.%.S| +peer0.org1.example.com | [17a 08-31 20:50:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org2.example.com | [131 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 210 Adding to config map: [Group] /Channel/Orderer" +peer1.org1.example.com | [20e 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | [17b 08-31 20:50:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [132 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc002748b40)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [178 08-31 20:50:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [133 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +peer0.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | [20f 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c 59 40 08 6d 32 7d 73 fc d1 da 35 |0D. |Y@.m2}s...5| +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 211 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | [17c 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [134 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org1.example.com | 00000010 fd 22 5e 96 4e f2 8a b8 d7 9c f0 f1 94 23 24 30 |."^.N........#$0| +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 212 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | [17d 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 34C5FD22B642F5F36D6403A73B770B868071DFE4A1092A5E1D4122032CA98823 +peer1.org2.example.com | [136 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +peer0.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | 00000020 96 cd 83 89 02 20 1c 38 c8 4e a6 68 84 9a 70 a5 |..... .8.N.h..p.| +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 213 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | [17e 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [135 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +peer0.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org1.example.com | 00000030 72 e9 93 b3 c0 1f e7 75 eb 41 f7 2f 0f fb 5a 62 |r......u.A./..Zb| +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 214 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | [17f 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [137 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +peer0.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org1.example.com | 00000040 48 c1 a9 c5 71 5c |H...q\| +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 215 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | [180 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org2.example.com | [138 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [210 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 216 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org1.example.com | [181 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [139 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +peer0.org2.example.com | [1ab 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 217 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer1.org1.example.com | [211 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [182 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8874356403793367540, Envelope: 961 bytes, Signature: 0 bytes +peer1.org2.example.com | [13a 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +peer1.org1.example.com | [212 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13b 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +peer0.org2.example.com | [1ac 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org2.example.com | [1ad 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 218 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer1.org1.example.com | [213 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13c 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +peer0.org2.example.com | [1ae 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [183 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 4b 7a 1c f7 72 7d 98 69 35 3d b5 df d3 65 1b |IKz..r}.i5=...e.| +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 219 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer1.org1.example.com | [214 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [13d 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +peer0.org2.example.com | [1af 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org1.example.com | 00000010 92 b9 33 b2 38 d6 6e 7c de 50 99 3b 20 ac 8a ca |..3.8.n|.P.; ...| +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 21a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer1.org1.example.com | [215 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [13e 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +peer0.org2.example.com | [1b0 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org1.example.com | [184 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac 23 6c 2d c7 a0 da 5a c3 f0 f7 |0E.!..#l-...Z...| +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 21b Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer1.org1.example.com | [216 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [13f 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +peer0.org2.example.com | [1b1 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org1.example.com | 00000010 d6 40 8a e2 7b 6c 69 7c f4 58 f0 6d c6 b6 8e 66 |.@..{li|.X.m...f| +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 21c Adding to config map: [Policy] /Channel/Orderer/Readers" +peer1.org1.example.com | [217 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [218 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [219 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [140 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +peer0.org1.example.com | 00000020 19 b3 29 15 9c 02 20 3e 5c 45 a5 b4 f1 29 ac c4 |..)... >\E...)..| +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 21d Adding to config map: [Policy] /Channel/Orderer/Writers" +peer1.org1.example.com | [21a 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [141 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [1b2 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org1.example.com | 00000030 48 f4 26 46 a0 5d 02 4b 61 2a f5 68 69 6c 69 63 |H.&F.].Ka*.hilic| +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 21e Adding to config map: [Policy] /Channel/Orderer/Admins" +peer1.org1.example.com | [21b 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [142 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +peer0.org2.example.com | [1b3 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org1.example.com | 00000040 6a cc 13 36 bf 11 76 |j..6..v| +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 21f Adding to config map: [Value] /Channel/OrdererAddresses" +peer1.org1.example.com | [21c 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [143 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +peer0.org2.example.com | [1b4 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org1.example.com | [185 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8874356403793367540, Envelope: 961 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 220 Adding to config map: [Value] /Channel/Capabilities" +peer1.org1.example.com | [21d 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [144 08-31 20:50:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +peer0.org2.example.com | [1b5 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org1.example.com | [186 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 86 55 55 54 110 52 72 121 77 106 104 56 53 74 78 83 53 49 103 84 50 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 65 68 78 102 66 47 108 56 79 74 113 49 10 89 50 65 114 110 84 82 43 74 114 97 65 97 67 49 53 43 84 81 68 79 51 114 109 99 80 43 53 112 122 106 72 43 77 80 69 77 109 105 110 80 48 53 111 47 121 81 50 48 56 109 117 119 113 107 120 100 84 90 100 108 118 72 90 10 107 109 73 73 52 52 104 101 43 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 110 98 111 104 114 104 56 113 100 119 49 50 88 83 118 43 68 68 71 85 79 98 89 56 110 67 98 66 72 43 97 55 108 79 113 83 68 111 88 65 48 122 99 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 80 103 118 111 81 111 79 69 43 49 115 85 114 69 120 47 120 70 115 47 122 107 70 106 103 82 53 79 87 119 117 74 112 105 120 54 75 57 56 110 70 115 122 65 105 65 51 66 80 98 110 10 88 101 112 122 72 86 82 119 103 73 69 84 109 121 66 87 85 101 81 88 73 101 107 89 72 105 48 51 83 120 113 88 109 99 107 50 77 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +orderer0.example.com | "2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 221 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer1.org1.example.com | [21e 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 85 21 17 8d bb 44 08 0e 89 83 a7 47 f7 e5 0e |..!...D.....G...| +peer1.org2.example.com | [145 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +peer0.org2.example.com | [1b6 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +peer0.org1.example.com | [187 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Added � �0��U�n�����##~J�9���o�R=� to the in memory item map, total items: 2 +orderer0.example.com | "2020-08-31 20:50:43.450 UTC [common.configtx] addToMap -> DEBU 222 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer1.org1.example.com | 00000010 0f 21 1d 84 f8 08 7b 97 5c 4d 03 d3 3f 71 5a cc |.!....{.\M..?qZ.| +peer1.org2.example.com | [146 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [1b7 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org2.example.com | [1b8 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org2.example.com | [1b9 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org2.example.com | [1ba 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org2.example.com | [1bb 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer1.org2.example.com | [147 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [1bc 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org2.example.com | [1bd 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org2.example.com | [1be 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [1bf 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [1c0 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org2.example.com | [148 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [149 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +peer0.org2.example.com | [1c1 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org1.example.com | [21f 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 b7 fa d8 51 1b 9c f5 2d 5b c8 |0E.!.....Q...-[.| +peer0.org1.example.com | [188 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14a 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [1c2 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +orderer0.example.com | "2020-08-31 20:50:43.450 UTC [common.configtx] addToMap -> DEBU 223 Adding to config map: [Policy] /Channel/Writers" +peer1.org1.example.com | 00000010 60 49 0e 65 19 e9 4c 24 8a 1b 16 c4 97 f0 0b 81 |`I.e..L$........| +peer0.org1.example.com | [189 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org2.example.com | [14b 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org2.example.com | [1c3 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +orderer0.example.com | "2020-08-31 20:50:43.450 UTC [common.configtx] addToMap -> DEBU 224 Adding to config map: [Policy] /Channel/Admins" +peer1.org1.example.com | 00000020 38 d1 f9 33 95 02 20 4b 46 5c f0 ad 2a 2f 0a d9 |8..3.. KF\..*/..| +peer0.org1.example.com | [18a 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [18b 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18c 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [14c 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +orderer0.example.com | "2020-08-31 20:50:43.450 UTC [common.configtx] addToMap -> DEBU 225 Adding to config map: [Policy] /Channel/Readers" +peer1.org1.example.com | 00000030 8b 03 25 ab a6 0a 60 19 33 5e 69 bb f3 35 b9 db |..%...`.3^i..5..| +peer0.org1.example.com | [18d 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [14d 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org2.example.com | [1c4 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +orderer0.example.com | "2020-08-31 20:50:43.450 UTC [orderer.common.server] Start -> INFO 226 Setting up cluster for orderer type etcdraft" +peer1.org1.example.com | 00000040 7b 88 aa cd 4d 00 98 |{...M..| +peer0.org1.example.com | [18e 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [14e 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [1c5 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +orderer0.example.com | "2020-08-31 20:50:43.468 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 227 Booted with a genesis block, replication isn't an option" +peer1.org1.example.com | [220 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | [18f 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14f 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org2.example.com | [1c6 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +orderer0.example.com | "2020-08-31 20:50:43.488 UTC [msp] GetDefaultSigningIdentity -> DEBU 228 Obtaining default signing identity" +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [190 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes +peer1.org2.example.com | [150 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org2.example.com | [1c7 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +orderer0.example.com | "2020-08-31 20:50:43.493 UTC [fsblkstorage] newBlockfileMgr -> DEBU 229 newBlockfileMgr() initializing file-based block storage for ledger: testchainid " +peer1.org1.example.com | [221 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 34 e0 c2 0f c2 c8 a0 a0 8d 38 |0E.!..4........8| +peer0.org1.example.com | [191 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 9d b3 b8 a4 6c 4d e6 19 36 57 d8 11 81 e6 da ee |....lM..6W......| +peer1.org2.example.com | [151 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org2.example.com | [1c8 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +orderer0.example.com | "2020-08-31 20:50:43.493 UTC [kvledger.util] CreateDirIfMissing -> DEBU 22a CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" +peer1.org2.example.com | [152 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | 00000020 5d b6 f8 32 4b 02 20 32 b7 2a b1 07 c7 8f e5 f6 |]..2K. 2.*......| +peer0.org2.example.com | [1c9 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [192 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:50:43.493 UTC [kvledger.util] logDirStatus -> DEBU 22b Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" +peer1.org2.example.com | [153 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org1.example.com | 00000030 2d 48 c6 21 55 a3 e4 ee 18 ab 6a a1 44 dd 9a 0d |-H.!U.....j.D...| +peer1.org1.example.com | 00000040 ed cc 32 a6 84 3f 79 |..2..?y| +peer1.org1.example.com | [222 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [223 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [224 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [225 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [226 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [227 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ca 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [154 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +peer0.org2.example.com | [1cb 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [193 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 d2 bb d7 9f 63 e7 08 02 c8 b5 26 6f 21 08 aa |.....c.....&o!..| +orderer0.example.com | "2020-08-31 20:50:43.493 UTC [kvledger.util] logDirStatus -> DEBU 22c After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" +orderer0.example.com | "2020-08-31 20:50:43.493 UTC [fsblkstorage] newBlockfileMgr -> INFO 22d Getting block information from block storage" +peer1.org2.example.com | [155 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00282e640)} +peer0.org2.example.com | [1cc 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | 00000010 e3 71 f2 c1 ac 72 9a ba 00 23 a9 23 fc 4b d3 1c |.q...r...#.#.K..| +peer0.org1.example.com | [194 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 97 33 95 87 65 34 46 21 d7 69 |0E.!...3..e4F!.i| +peer1.org2.example.com | [156 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | 00000010 11 19 1f f4 fb e8 93 17 bd cd eb 02 d4 0d 2c 1b |..............,.| +peer0.org2.example.com | [1cd 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [1ce 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [1cf 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [1d0 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [1d1 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1d2 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [157 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [158 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [1d3 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [1d4 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | 00000020 9a 50 4c b9 ea 02 20 33 d3 bb f9 c1 4e 63 8c 0e |.PL... 3....Nc..| +peer0.org1.example.com | 00000030 4f 6c 17 ea 15 ef 80 c1 62 dc 95 f2 b7 0a bb 66 |Ol......b......f| +peer0.org1.example.com | 00000040 77 a6 76 ee 90 57 de |w.v..W.| +peer1.org2.example.com | [159 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +peer0.org2.example.com | [1d5 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [228 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d6 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [195 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | [15a 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +orderer0.example.com | "2020-08-31 20:50:43.494 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 22e Retrieving checkpoint info from block files" +peer1.org1.example.com | [229 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d7 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | [15b 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +orderer0.example.com | "2020-08-31 20:50:43.494 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 22f retrieveLastFileSuffix()" +peer1.org1.example.com | [22a 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [1d8 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [196 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 52 1b c3 5e 3a 2a f7 45 cf 25 7b |0D. xR..^:*.E.%{| +peer1.org2.example.com | [15c 08-31 20:50:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +orderer0.example.com | "2020-08-31 20:50:43.494 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 230 retrieveLastFileSuffix() - biggestFileNum = -1" +peer1.org1.example.com | [22b 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [22c 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer1.org1.example.com | [22d 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15d 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0x9a, 0x52, 0x4c, 0x2b, 0x43, 0x65, 0xfd, 0x57, 0x33, 0x8e, 0x73, 0xf4, 0x8a, 0x80, 0xa7, 0x23, 0x93, 0x2, 0xb5, 0x41, 0x2, 0x4d, 0xf3, 0x50, 0xe8, 0x90, 0xb1, 0xd5, 0x7a, 0xc7, 0x1e, 0x2e} txOffsets= +orderer0.example.com | "2020-08-31 20:50:43.494 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 231 Last file number found = -1" +peer1.org1.example.com | [22e 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +peer0.org2.example.com | [1d9 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org2.example.com | txId=fd92ece786eb33a140499e967ed74e3a3bbcb8e88456d50f7454e373b6da94d6 locPointer=offset=39, bytesLength=28430 +peer0.org1.example.com | 00000010 0a 40 4e f1 e1 9b 66 e7 99 ce 80 c8 d8 2e 3f c1 |.@N...f.......?.| +orderer0.example.com | "2020-08-31 20:50:43.494 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 232 No block file found" +peer1.org1.example.com | [22f 08-31 20:50:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:53336 +peer0.org2.example.com | [1da 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org2.example.com | ] +peer0.org1.example.com | 00000020 43 14 b9 4e 02 20 65 f5 f1 cd c4 d9 09 50 45 35 |C..N. e......PE5| +peer1.org1.example.com | [230 08-31 20:50:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0029a4780 +peer0.org2.example.com | [1db 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org2.example.com | [15e 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28430] for tx ID: [fd92ece786eb33a140499e967ed74e3a3bbcb8e88456d50f7454e373b6da94d6] to txid-index +peer0.org1.example.com | 00000030 d6 fb c5 7c b1 df 1e 3f 55 fb 06 a6 3b ce 07 cc |...|...?U...;...| +orderer0.example.com | "2020-08-31 20:50:43.494 UTC [fsblkstorage] newBlockfileMgr -> DEBU 233 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc00033e660)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +peer1.org1.example.com | [231 08-31 20:50:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org2.example.com | [15f 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28430] for tx number:[0] ID: [fd92ece786eb33a140499e967ed74e3a3bbcb8e88456d50f7454e373b6da94d6] to blockNumTranNum index +peer0.org1.example.com | 00000040 26 32 cf 0b 87 b3 |&2....| +orderer0.example.com | "2020-08-31 20:50:43.498 UTC [fsblkstorage] newBlockIndex -> DEBU 234 newBlockIndex() - indexItems:[[BlockNum]]" +peer0.org2.example.com | [1dc 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org1.example.com | [232 08-31 20:50:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [160 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28476], isChainEmpty=[false], lastBlockNumber=[0] +peer1.org2.example.com | [161 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +peer1.org2.example.com | [162 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +peer0.org1.example.com | [197 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [163 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +peer0.org1.example.com | [198 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [164 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +peer0.org2.example.com | [1dd 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [233 08-31 20:50:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:50:43.509 UTC [fsblkstorage] indexBlock -> DEBU 235 Indexing block [blockNum=0, blockHash=[]byte{0x48, 0x55, 0xad, 0xef, 0x6c, 0xdb, 0x22, 0x69, 0x71, 0xcd, 0x6f, 0x1c, 0x81, 0xaf, 0xc3, 0xaa, 0x9e, 0x4d, 0x72, 0x22, 0x6e, 0xe, 0x6f, 0xf, 0xa7, 0xc9, 0xc6, 0x64, 0xf1, 0x4, 0x22, 0x36} txOffsets= +orderer0.example.com | txId=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 locPointer=offset=39, bytesLength=22885 +peer1.org2.example.com | [165 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +peer0.org2.example.com | [1de 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | [166 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +peer1.org2.example.com | [167 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +peer1.org2.example.com | [168 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [169 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +peer1.org2.example.com | [16a 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +peer1.org2.example.com | [16b 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +peer1.org2.example.com | [16c 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [16d 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [16e 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [16f 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org2.example.com | [170 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [171 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [172 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +peer1.org2.example.com | [173 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +peer1.org2.example.com | [174 08-31 20:50:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +peer1.org2.example.com | [175 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +peer1.org2.example.com | [176 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +peer1.org2.example.com | [177 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org2.example.com | [178 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +peer1.org2.example.com | [179 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 21ms (state_validation=6ms block_and_pvtdata_commit=8ms state_commit=4ms) commitHash=[] +peer1.org2.example.com | [17a 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +peer1.org2.example.com | [17b 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [a210d1a9-fabc-40de-831e-368066171262] +peer1.org2.example.com | [17c 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +peer1.org2.example.com | [17d 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a210d1a9-fabc-40de-831e-368066171262] +peer1.org2.example.com | [17e 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [17f 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org2.example.com | [180 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org2.example.com | [181 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org2.example.com | [182 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [183 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [184 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org2.example.com | [185 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org2.example.com | [186 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org2.example.com | [187 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | [1df 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org2.example.com | [1e0 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org2.example.com | [1e1 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org2.example.com | [1e2 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org2.example.com | [1e3 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org2.example.com | [1e4 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org2.example.com | [1e5 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org2.example.com | [1e6 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org2.example.com | [1e7 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org2.example.com | [1e8 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org2.example.com | [1e9 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org2.example.com | [1ea 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org2.example.com | [1eb 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org2.example.com | [1ec 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org2.example.com | [1ed 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org2.example.com | [1ee 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org2.example.com | [1ef 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org1.example.com | [199 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer0.org1.example.com | [19a 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +peer1.org1.example.com | [234 08-31 20:50:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [235 08-31 20:50:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [236 08-31 20:50:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [237 08-31 20:50:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [238 08-31 20:50:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [239 08-31 20:50:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 b6 b3 32 d5 1d f8 45 63 60 0c 2b 02 56 c0 c4 |...2...Ec`.+.V..| +peer1.org1.example.com | 00000010 02 05 5e bb 33 a7 02 47 51 05 11 ad 27 e6 51 22 |..^.3..GQ...'.Q"| +peer1.org1.example.com | [23a 08-31 20:50:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 17 08 0c 8e aa 4e ec d7 32 61 a5 |0D. ......N..2a.| +peer1.org1.example.com | 00000010 fa d2 a7 dc 43 ce ce 60 91 49 4f 51 2a 62 09 40 |....C..`.IOQ*b.@| +peer1.org1.example.com | 00000020 fb 9f 32 ab 02 20 52 b2 68 85 ce 62 57 5e d7 00 |..2.. R.h..bW^..| +peer1.org1.example.com | 00000030 0e 93 c0 5a 68 1d 95 6f 9b 06 f8 4a a8 0a 1c d3 |...Zh..o...J....| +peer1.org1.example.com | 00000040 d9 24 dc e7 a5 ce |.$....| +peer1.org1.example.com | [23b 08-31 20:50:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [23c 08-31 20:50:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0002ed960, header 0xc0029a5090 +peer1.org1.example.com | [23d 08-31 20:50:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org1.example.com | [23e 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU [][abb47d68] processing txid: abb47d68c2e4f4fa214c136a2249db8615c4e914354017dad27df8a0e5b9ac05 +peer1.org1.example.com | [23f 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU [][abb47d68] Entry chaincode: name:"cscc" +peer1.org1.example.com | [240 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> INFO [][abb47d68] Entry chaincode: name:"cscc" +peer1.org1.example.com | [241 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [242 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +peer1.org1.example.com | [243 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer1.org1.example.com | [244 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer1.org1.example.com | [245 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [246 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [247 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org1.example.com | [248 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [249 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 b6 b3 32 d5 1d f8 45 63 60 0c 2b 02 56 c0 c4 |...2...Ec`.+.V..| +peer1.org1.example.com | 00000010 02 05 5e bb 33 a7 02 47 51 05 11 ad 27 e6 51 22 |..^.3..GQ...'.Q"| +peer1.org1.example.com | [24a 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 17 08 0c 8e aa 4e ec d7 32 61 a5 |0D. ......N..2a.| +peer1.org1.example.com | 00000010 fa d2 a7 dc 43 ce ce 60 91 49 4f 51 2a 62 09 40 |....C..`.IOQ*b.@| +peer1.org1.example.com | 00000020 fb 9f 32 ab 02 20 52 b2 68 85 ce 62 57 5e d7 00 |..2.. R.h..bW^..| +peer1.org1.example.com | 00000030 0e 93 c0 5a 68 1d 95 6f 9b 06 f8 4a a8 0a 1c d3 |...Zh..o...J....| +peer1.org1.example.com | 00000040 d9 24 dc e7 a5 ce |.$....| +peer1.org1.example.com | [24b 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer1.org1.example.com | [24c 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +peer1.org1.example.com | [24d 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +peer1.org1.example.com | [24e 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +peer1.org1.example.com | [24f 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +peer1.org1.example.com | [250 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer1.org1.example.com | [251 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +peer1.org1.example.com | [252 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +peer1.org1.example.com | [253 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +peer1.org1.example.com | [254 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +peer1.org1.example.com | [255 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +peer1.org1.example.com | [256 08-31 20:50:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc002b1c060)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +peer1.org1.example.com | [257 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +peer1.org1.example.com | [258 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +peer1.org1.example.com | [259 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +peer1.org1.example.com | [25a 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +peer1.org1.example.com | [25b 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +peer1.org1.example.com | [25c 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +peer1.org1.example.com | [25d 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +peer1.org1.example.com | [25e 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +peer1.org1.example.com | [25f 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +peer1.org1.example.com | [260 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +peer1.org1.example.com | [261 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +peer1.org1.example.com | [262 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +peer1.org1.example.com | [263 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +peer1.org1.example.com | [264 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +peer1.org1.example.com | [265 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [266 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +peer1.org1.example.com | [267 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +peer1.org1.example.com | [268 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +peer1.org1.example.com | [269 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +peer1.org1.example.com | [26a 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [26b 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [26c 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [26d 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +peer1.org1.example.com | [26e 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [26f 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org1.example.com | [270 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org1.example.com | [271 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org1.example.com | [272 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [273 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org1.example.com | [274 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org1.example.com | [275 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org1.example.com | [276 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | [277 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org1.example.com | [278 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +peer1.org1.example.com | [279 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002b4e840)} +peer1.org1.example.com | [27a 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [27b 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [27c 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [27d 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +peer1.org1.example.com | [27e 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +peer1.org1.example.com | [27f 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +peer1.org1.example.com | [280 08-31 20:50:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +peer1.org1.example.com | [281 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0x9a, 0x52, 0x4c, 0x2b, 0x43, 0x65, 0xfd, 0x57, 0x33, 0x8e, 0x73, 0xf4, 0x8a, 0x80, 0xa7, 0x23, 0x93, 0x2, 0xb5, 0x41, 0x2, 0x4d, 0xf3, 0x50, 0xe8, 0x90, 0xb1, 0xd5, 0x7a, 0xc7, 0x1e, 0x2e} txOffsets= +peer1.org1.example.com | txId=fd92ece786eb33a140499e967ed74e3a3bbcb8e88456d50f7454e373b6da94d6 locPointer=offset=39, bytesLength=28430 +peer1.org1.example.com | ] +peer1.org1.example.com | [282 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28430] for tx ID: [fd92ece786eb33a140499e967ed74e3a3bbcb8e88456d50f7454e373b6da94d6] to txid-index +peer1.org1.example.com | [283 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28430] for tx number:[0] ID: [fd92ece786eb33a140499e967ed74e3a3bbcb8e88456d50f7454e373b6da94d6] to blockNumTranNum index +peer1.org1.example.com | [284 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28476], isChainEmpty=[false], lastBlockNumber=[0] +peer1.org2.example.com | [188 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org2.example.com | [189 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org2.example.com | [18a 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [18b 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org2.example.com | [18c 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org2.example.com | [18d 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [18e 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [18f 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org2.example.com | [190 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [191 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [192 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org2.example.com | [193 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org2.example.com | nw== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [194 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org2.example.com | [195 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org2.example.com | [196 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [197 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [198 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [199 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [19a 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [19b 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +peer1.org2.example.com | [19c 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org2.example.com | [19d 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [19e 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [19f 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org2.example.com | [1a0 08-31 20:50:58.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [1a1 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [1a2 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [1a3 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [1a4 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [1a5 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org2.example.com | [1a6 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org2.example.com | [1a7 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [1a8 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [1a9 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [1aa 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [1f0 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org2.example.com | [1f1 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org2.example.com | [1f2 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org2.example.com | [1f3 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org2.example.com | [1f4 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [1f5 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [1f6 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [1f7 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [1f8 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [1f9 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [1fa 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org2.example.com | [1fb 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org2.example.com | [1fc 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org2.example.com | [1fd 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org2.example.com | [1fe 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [1ff 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [200 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org2.example.com | [201 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org2.example.com | [202 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org2.example.com | [203 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org2.example.com | [204 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org2.example.com | [205 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org2.example.com | [206 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org2.example.com | [207 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org2.example.com | [208 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +peer0.org2.example.com | [209 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer0.org2.example.com | [20a 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org2.example.com | [20b 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org2.example.com | [20c 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer0.org2.example.com | [20d 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org2.example.com | [20e 08-31 20:50:58.25 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org2.example.com | [20f 08-31 20:50:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org2.example.com | [210 08-31 20:50:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org2.example.com | [211 08-31 20:50:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org2.example.com | [212 08-31 20:50:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org2.example.com | [213 08-31 20:50:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +peer0.org2.example.com | [214 08-31 20:50:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +peer0.org2.example.com | [215 08-31 20:50:58.27 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +peer0.org2.example.com | [216 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org2.example.com | [217 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [218 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer0.org2.example.com | [219 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer0.org2.example.com | [21a 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +peer0.org2.example.com | [21b 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +peer0.org2.example.com | [21c 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +peer0.org2.example.com | [21d 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [21e 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408B0BECFA2F8AF9D9816...9C09DCBB6042B0C019B601802A020801 +peer0.org2.example.com | [21f 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4984F4C5CD00431CDE6E4C48374D50296E2EF450CEFF4C6308F37FDE0D1F7F24 +peer0.org2.example.com | [220 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +peer0.org2.example.com | [221 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +peer0.org2.example.com | [222 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [223 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [224 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +peer0.org2.example.com | [225 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [226 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [24f08ea5-6e4a-4144-97c4-21522640fa64] +peer0.org2.example.com | [227 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [228 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU [24f08ea5] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [229 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU [24f08ea5] notifying Txid:24f08ea5-6e4a-4144-97c4-21522640fa64, channelID:businesschannel +peer0.org2.example.com | [22a 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [22b 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org1.example.com | [19b 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [19c 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19d 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19e 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19f 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [1a0 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2192 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a1 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\347ggq\311\237\336\364\037\215\022g|\035" secret_envelope: > +peer0.org1.example.com | [1a2 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2192 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a3 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a4 08-31 20:50:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1a5 08-31 20:50:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a6 08-31 20:50:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a7 08-31 20:50:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a8 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a9 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [1aa 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ab 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1ac 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [1ad 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3649826F40B1A862D7AD8842DCBFEB1DAE7FFF924183182AAFCBCF5CF56C377E +peer0.org1.example.com | [1ae 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1af 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1b0 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [285 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +peer1.org1.example.com | [286 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +peer1.org1.example.com | [288 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +peer1.org1.example.com | [289 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +peer1.org1.example.com | [28a 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +peer1.org1.example.com | [28b 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +peer1.org1.example.com | [287 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +peer1.org1.example.com | [28c 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [28d 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +peer1.org1.example.com | [28e 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [28f 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +peer1.org1.example.com | [290 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +peer1.org1.example.com | [291 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [292 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [293 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org1.example.com | [294 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [295 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +peer1.org1.example.com | [296 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +peer1.org1.example.com | [297 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [298 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +peer1.org1.example.com | [299 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +peer1.org1.example.com | [29a 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org1.example.com | [29b 08-31 20:50:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +peer1.org1.example.com | [29c 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +peer1.org1.example.com | [29d 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 16ms (state_validation=3ms block_and_pvtdata_commit=6ms state_commit=4ms) commitHash=[] +peer1.org1.example.com | [29e 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +peer1.org1.example.com | [29f 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [201d6955-310c-4d3b-b25f-88fb5b1b747d] +peer1.org1.example.com | [2a0 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +peer1.org1.example.com | [2a1 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [201d6955-310c-4d3b-b25f-88fb5b1b747d] +peer1.org1.example.com | [2a2 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org1.example.com | [2a3 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org1.example.com | [2a4 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org1.example.com | [2a5 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org1.example.com | [2a6 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org1.example.com | [2a7 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [2a8 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org1.example.com | [2a9 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org1.example.com | [2aa 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org1.example.com | [2ab 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org1.example.com | [2ac 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org1.example.com | [2ad 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org1.example.com | [2ae 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [2af 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org1.example.com | [2b0 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org1.example.com | [2b1 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [2b2 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [2b3 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org1.example.com | [2b4 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [2b5 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [2b6 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org1.example.com | [2b7 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org2.example.com | [22c 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [24f08ea5-6e4a-4144-97c4-21522640fa64] +peer0.org2.example.com | [22d 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [22e 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [5fed7891-5e7f-4697-a31e-04b0eddc84a5] +peer0.org2.example.com | [22f 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [230 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org2.example.com | [231 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU [5fed7891] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [232 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU [5fed7891] notifying Txid:5fed7891-5e7f-4697-a31e-04b0eddc84a5, channelID:businesschannel +peer0.org2.example.com | [233 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [234 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org2.example.com | [235 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5fed7891-5e7f-4697-a31e-04b0eddc84a5] +peer0.org2.example.com | [236 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [237 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [a9679c7f-0883-4779-b6c8-5e65c8245150] +peer0.org2.example.com | [238 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [239 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org2.example.com | [23a 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU [a9679c7f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [23b 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU [a9679c7f] notifying Txid:a9679c7f-0883-4779-b6c8-5e65c8245150, channelID:businesschannel +peer0.org2.example.com | [23c 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [23d 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org2.example.com | [23e 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a9679c7f-0883-4779-b6c8-5e65c8245150] +peer0.org2.example.com | [23f 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer0.org2.example.com | [240 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [232388a4-6e7c-456e-a08a-2ad74a8208ed] +peer0.org2.example.com | [241 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer0.org2.example.com | [242 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [232388a4-6e7c-456e-a08a-2ad74a8208ed] +peer0.org2.example.com | [243 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [244 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408B0BECFA2F8AF9D9816...9C09DCBB6042B0C019B601802A020801 +peer0.org2.example.com | [245 08-31 20:50:58.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D53FC9DA9D254360AAA4B5C97B354F0534613353182EDB4D44C37FC5D5D27AA1 +peer0.org2.example.com | [246 08-31 20:50:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer0.org2.example.com | [247 08-31 20:50:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU [4201a36e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [248 08-31 20:50:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU [4201a36e] notifying Txid:4201a36e822495432c272cc8fbeff0830652fd2f2e0acaacb796f42ba88255bb, channelID: +peer0.org2.example.com | [249 08-31 20:50:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [24a 08-31 20:50:58.29 UTC] [%{longpkg}] %{callpath} -> INFO [][4201a36e] Exit chaincode: name:"cscc" (72ms) +peer0.org2.example.com | [24b 08-31 20:50:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU [][4201a36e] Exit +peer0.org2.example.com | [24c 08-31 20:50:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37810 +peer0.org2.example.com | [24d 08-31 20:50:58.29 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37810 grpc.code=OK grpc.call_duration=78.9905ms +peer0.org2.example.com | [24e 08-31 20:50:58.29 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [24f 08-31 20:50:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting, peers found 0 +peer0.org2.example.com | [250 08-31 20:50:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [251 08-31 20:50:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [252 08-31 20:50:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [253 08-31 20:50:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [254 08-31 20:50:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...9B28120C08E8C0ACB0F8AF9D98161001 +peer0.org2.example.com | [255 08-31 20:50:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DBA73AD10DAE2DFF2AD3C3C4044071EB4E17A72ADD023890864E93D0D2C55CA4 +peer0.org2.example.com | [256 08-31 20:50:59.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [257 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37818 +peer0.org2.example.com | [258 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002f26870 +peer0.org2.example.com | [259 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [25a 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [25b 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [25c 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [25d 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 5d 8f ad 11 37 e2 f5 d0 a2 9d 6b 77 69 84 92 |.]...7.....kwi..| +peer0.org2.example.com | 00000010 bf cf 4f 69 8b 4d 83 46 41 84 14 e3 f9 16 c8 04 |..Oi.M.FA.......| +peer0.org2.example.com | [25e 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 80 45 0c 49 2e 35 f5 26 0b a5 |0E.!...E.I.5.&..| +peer0.org2.example.com | 00000010 60 61 07 47 bf 05 f3 7d 64 44 65 d7 9d d5 5d 9f |`a.G...}dDe...].| +peer0.org2.example.com | 00000020 67 a1 46 04 6b 02 20 27 07 c1 b3 ce 99 71 b0 13 |g.F.k. '.....q..| +peer0.org2.example.com | 00000030 71 0a 44 b8 84 d5 a4 e6 36 7d 15 56 9d c7 5e a4 |q.D.....6}.V..^.| +peer0.org2.example.com | 00000040 1f b9 66 f9 b8 93 56 |..f...V| +peer0.org2.example.com | [25f 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [260 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0002bd420, header 0xc002f26c80 +peer0.org2.example.com | [261 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org2.example.com | [262 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU [][fb1d31e1] processing txid: fb1d31e17e3958c5b7ba80af5b4d1b0dc404271b93eab4238ad6a6fbbe3a3dc2 +peer0.org2.example.com | [263 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU [][fb1d31e1] Entry chaincode: name:"cscc" +peer0.org1.example.com | [1b1 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\250\265D\233'wD\366\255\346\356\224\270\213\306\036\2759\374\005\024\002 \037\202\366=\247u\021\336F\273\241\205\246o\036\237\304\023\320p\310:\221\241\220\006\271\271r\224\377\221" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b2 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\250\265D\233'wD\366\255\346\356\224\270\213\306\036\2759\374\005\024\002 \037\202\366=\247u\021\336F\273\241\205\246o\036\237\304\023\320p\310:\221\241\220\006\271\271r\224\377\221" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b3 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b4 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2192 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b5 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b6 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2192 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b7 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 49 82 6f 40 b1 a8 62 d7 ad 88 42 dc bf eb 1d |6I.o@..b...B....| +peer0.org1.example.com | 00000010 ae 7f ff 92 41 83 18 2a af cb cf 5c f5 6c 37 7e |....A..*...\.l7~| +peer0.org1.example.com | [1b8 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 69 37 4b 52 9c 1a 15 de ea 3e |0E.!..i7KR.....>| +peer0.org1.example.com | 00000010 a8 b5 44 9b 27 77 44 f6 ad e6 ee 94 b8 8b c6 1e |..D.'wD.........| +peer0.org1.example.com | 00000020 bd 39 fc 05 14 02 20 1f 82 f6 3d a7 75 11 de 46 |.9.... ...=.u..F| +peer0.org1.example.com | 00000030 bb a1 85 a6 6f 1e 9f c4 13 d0 70 c8 3a 91 a1 90 |....o.....p.:...| +peer0.org1.example.com | 00000040 06 b9 b9 72 94 ff 91 |...r...| +peer0.org1.example.com | [1b9 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [1ba 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 79 23 65 79 93 cf 14 f9 81 a4 |0E.!..y#ey......| +peer0.org1.example.com | 00000010 bf e1 dd 68 24 44 7b 6c f1 67 c0 5e 40 d6 c4 3c |...h$D{l.g.^@..<| +peer0.org1.example.com | 00000020 1d 06 0c 92 ba 02 20 60 6c 69 34 26 72 45 06 31 |...... `li4&rE.1| +peer0.org1.example.com | 00000030 e6 92 b0 35 73 37 a7 98 08 33 9e 20 09 b7 46 f7 |...5s7...3. ..F.| +peer0.org1.example.com | 00000040 03 02 b5 7d 4a 99 b7 |...}J..| +peer0.org1.example.com | [1bb 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org1.example.com | nw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [2b8 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org1.example.com | [2b9 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | [2ba 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [2bb 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [2bc 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [2bd 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [2be 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [2bf 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +peer1.org1.example.com | [2c0 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org1.example.com | [2c1 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [2c2 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [2c3 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [2c4 08-31 20:50:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [2c5 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [2c6 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [2c7 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [2c8 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [2c9 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org1.example.com | [2ca 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | [2cb 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [2cc 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [2cd 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org1.example.com | [2ce 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [2cf 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org1.example.com | [2d0 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org1.example.com | [2d1 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [2d2 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [2d3 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [2d4 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org1.example.com | [2d5 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org1.example.com | [2d6 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org1.example.com | [2d7 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org1.example.com | [2d8 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org1.example.com | [2d9 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org1.example.com | [2da 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer1.org1.example.com | [2db 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org1.example.com | [2dc 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +peer1.org1.example.com | [2dd 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org1.example.com | [2de 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org1.example.com | [2df 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org1.example.com | [2e0 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org1.example.com | [1bc 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1bd 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1be 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bf 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1c0 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c1 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1c2 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1c3 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 48 f2 2a 89 5c 46 d0 51 89 1a 11 4e 23 ac 0f |.H.*.\F.Q...N#..| +peer0.org1.example.com | 00000010 4f 48 52 db e0 92 b4 d7 8e 0e bc db 31 71 d2 36 |OHR.........1q.6| +peer0.org1.example.com | [1c4 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 62 f2 4b 74 fd f7 42 cf 84 35 14 |0D. Gb.Kt..B..5.| +peer0.org1.example.com | 00000010 5a 85 38 23 35 a1 1d 88 63 bf 67 58 95 74 0f 26 |Z.8#5...c.gX.t.&| +peer0.org1.example.com | 00000020 f2 f9 be 7f 02 20 16 1e 8d 25 53 fc 19 fc cd f1 |..... ...%S.....| +peer0.org1.example.com | 00000030 a4 75 e6 01 60 a9 dc 0c 9b 44 8d 8f e5 6e c6 c9 |.u..`....D...n..| +peer0.org1.example.com | 00000040 ee 92 bb cf 6e 86 |....n.| +peer0.org1.example.com | [1c5 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [1c6 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b 7b ff c4 37 9d d5 2f 39 3f d6 d9 |0D. +{..7../9?..| +peer0.org1.example.com | 00000010 b2 e4 7c 9c ed f9 6d ac ff 4d fc c5 0d 42 8e e5 |..|...m..M...B..| +peer0.org1.example.com | 00000020 03 09 92 50 02 20 1a 5f 5e df c0 51 36 cb 74 1e |...P. ._^..Q6.t.| +peer0.org1.example.com | 00000030 6d a7 ce 14 a3 d9 26 ef d3 02 17 6e 78 f2 cc 96 |m.....&....nx...| +peer0.org1.example.com | 00000040 39 94 c0 fb bc 7c |9....|| +peer0.org1.example.com | [1c7 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1c8 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [1c9 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1ca 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1cb 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1cc 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cd 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ce 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cf 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1d0 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161008 +peer0.org1.example.com | [1d1 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CCDCABDD134EBD909D8C941F1D19FC990CEC215E8A699A83808D6188D056724C +peer0.org1.example.com | [1d2 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1d3 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1d4 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1d5 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [1d6 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1d7 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1d8 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [264 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> INFO [][fb1d31e1] Entry chaincode: name:"cscc" +peer0.org2.example.com | [265 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [266 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer0.org2.example.com | [267 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [268 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [269 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [26a 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 5d 8f ad 11 37 e2 f5 d0 a2 9d 6b 77 69 84 92 |.]...7.....kwi..| +peer0.org2.example.com | 00000010 bf cf 4f 69 8b 4d 83 46 41 84 14 e3 f9 16 c8 04 |..Oi.M.FA.......| +peer0.org2.example.com | [26b 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 80 45 0c 49 2e 35 f5 26 0b a5 |0E.!...E.I.5.&..| +peer0.org2.example.com | 00000010 60 61 07 47 bf 05 f3 7d 64 44 65 d7 9d d5 5d 9f |`a.G...}dDe...].| +peer0.org2.example.com | 00000020 67 a1 46 04 6b 02 20 27 07 c1 b3 ce 99 71 b0 13 |g.F.k. '.....q..| +peer0.org2.example.com | 00000030 71 0a 44 b8 84 d5 a4 e6 36 7d 15 56 9d c7 5e a4 |q.D.....6}.V..^.| +peer0.org2.example.com | 00000040 1f b9 66 f9 b8 93 56 |..f...V| +peer0.org2.example.com | [26c 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU [fb1d31e1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [26d 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU [fb1d31e1] notifying Txid:fb1d31e17e3958c5b7ba80af5b4d1b0dc404271b93eab4238ad6a6fbbe3a3dc2, channelID: +peer0.org2.example.com | [26e 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [26f 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> INFO [][fb1d31e1] Exit chaincode: name:"cscc" (2ms) +peer0.org2.example.com | [270 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU [][fb1d31e1] Exit +peer0.org2.example.com | [271 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37818 +peer0.org2.example.com | [272 08-31 20:50:59.29 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37818 grpc.code=OK grpc.call_duration=4.8315ms +peer0.org2.example.com | [273 08-31 20:50:59.30 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [274 08-31 20:51:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37826 +peer0.org2.example.com | [275 08-31 20:51:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0029dc730 +peer0.org2.example.com | [276 08-31 20:51:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [277 08-31 20:51:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [278 08-31 20:51:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [279 08-31 20:51:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [27a 08-31 20:51:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 4e 1b 22 3b 70 10 d4 e7 ed c5 99 50 23 a6 b4 |.N.";p......P#..| +peer0.org2.example.com | 00000010 30 34 84 09 d4 ac 69 fd 94 82 0f 37 a8 6a 17 0a |04....i....7.j..| +peer0.org2.example.com | [27b 08-31 20:51:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f a2 0f 5e a9 f9 f1 b5 73 8f 3c 54 |0D. ...^....s. DEBU exits successfully +peer0.org2.example.com | [27d 08-31 20:51:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0000f92d0, header 0xc0029dcb40 +peer0.org2.example.com | [27e 08-31 20:51:00.14 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org2.example.com | [27f 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU [][ca3319e5] processing txid: ca3319e5a6d164d6e9b33caa2886cdfb5dab1c1ecd85c53ce825c8db3a853b40 +peer0.org2.example.com | [280 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU [][ca3319e5] Entry chaincode: name:"qscc" +peer0.org2.example.com | [281 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> INFO [][ca3319e5] Entry chaincode: name:"qscc" +peer0.org2.example.com | [282 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [283 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer0.org2.example.com | [284 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer0.org2.example.com | [285 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org2.example.com | [286 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | ]" +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [2e1 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org1.example.com | [1d9 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [287 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:50:43.511 UTC [fsblkstorage] updateCheckpoint -> DEBU 236 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[22930], isChainEmpty=[false], lastBlockNumber=[0]" +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | "2020-08-31 20:50:43.511 UTC [common.channelconfig] NewStandardValues -> DEBU 237 Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | [1da 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [288 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | "2020-08-31 20:50:43.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 238 Processing field: HashingAlgorithm" +peer1.org1.example.com | [2e2 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org1.example.com | [1db 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [289 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | "2020-08-31 20:50:43.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 239 Processing field: BlockDataHashingStructure" +peer1.org1.example.com | [2e3 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org1.example.com | [1dc 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28a 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | "2020-08-31 20:50:43.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23a Processing field: OrdererAddresses" +peer1.org1.example.com | [2e4 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org1.example.com | [1dd 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | "2020-08-31 20:50:43.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23b Processing field: Consortium" +peer1.org1.example.com | [2e5 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org1.example.com | [1de 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | "2020-08-31 20:50:43.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23c Processing field: Capabilities" +peer1.org1.example.com | [2e6 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org1.example.com | [1df 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | "2020-08-31 20:50:43.511 UTC [common.channelconfig] NewStandardValues -> DEBU 23d Initializing protos for *channelconfig.ConsortiumProtos" +peer1.org1.example.com | [2e7 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org1.example.com | [2e8 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [1e0 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | "2020-08-31 20:50:43.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23e Processing field: ChannelCreationPolicy" +peer1.org1.example.com | [2e9 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org1.example.com | [1e1 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d c8 ae 7a f7 e8 26 b5 d0 6a be 90 52 a1 da ad |...z..&..j..R...| +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | "2020-08-31 20:50:43.511 UTC [common.channelconfig] NewStandardValues -> DEBU 23f Initializing protos for *channelconfig.OrganizationProtos" +peer1.org1.example.com | [2ea 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org1.example.com | 00000010 fa 91 96 fb 3b a5 fa 6b 2c db 23 4c 92 89 f4 84 |....;..k,.#L....| +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | "2020-08-31 20:50:43.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 240 Processing field: MSP" +peer1.org1.example.com | [2eb 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org1.example.com | [1e2 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 25 6f de 0b 24 70 96 f0 b2 0a 6d |0D. .%o..$p....m| +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer1.org1.example.com | [2ec 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org1.example.com | 00000010 51 05 aa 74 ad 9c c0 8b d2 8c 59 e1 9d 35 92 41 |Q..t......Y..5.A| +peer1.org2.example.com | [1ab 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +orderer0.example.com | "2020-08-31 20:50:43.511 UTC [common.channelconfig] validateMSP -> DEBU 241 Setting up MSP for org Org1MSP" +peer1.org1.example.com | [2ed 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [2ee 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | [1ac 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | "2020-08-31 20:50:43.511 UTC [msp] newBccspMsp -> DEBU 242 Creating BCCSP-based MSP instance" +peer1.org1.example.com | [2ef 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [1ad 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org1.example.com | 00000020 1b 55 34 df 02 20 08 69 fc ec b6 dd ce cd d5 3b |.U4.. .i.......;| +peer0.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer1.org2.example.com | [1ae 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | 00000030 bc 03 fd 45 47 0d 8f 5d 2a 77 56 aa 7e 0c f5 69 |...EG..]*wV.~..i| +orderer0.example.com | "2020-08-31 20:50:43.511 UTC [msp] New -> DEBU 243 Creating Cache-MSP instance" +peer1.org1.example.com | [2f0 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer1.org2.example.com | [1af 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | 00000040 8f 2b ec 25 e0 53 |.+.%.S| +orderer0.example.com | "2020-08-31 20:50:43.511 UTC [msp] Setup -> DEBU 244 Setting up MSP instance Org1MSP" +peer1.org1.example.com | [2f1 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [1b0 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org2.example.com | [28b 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb4410 gate 1598907060153171900 evaluation starts +orderer0.example.com | "2020-08-31 20:50:43.512 UTC [msp.identity] newIdentity -> DEBU 245 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [2f2 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [1b1 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org2.example.com | [28c 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb4410 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1e3 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [2f3 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [1b2 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | [28d 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb4410 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [1b3 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | [28e 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb4410 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [1e4 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c 59 40 08 6d 32 7d 73 fc d1 da 35 |0D. |Y@.m2}s...5| +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | [2f4 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [1b4 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org2.example.com | [28f 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb4410 principal evaluation fails +peer0.org1.example.com | 00000010 fd 22 5e 96 4e f2 8a b8 d7 9c f0 f1 94 23 24 30 |."^.N........#$0| +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [2f5 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [1b5 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +peer0.org2.example.com | [290 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb4410 gate 1598907060153171900 evaluation fails +peer0.org1.example.com | 00000020 96 cd 83 89 02 20 1c 38 c8 4e a6 68 84 9a 70 a5 |..... .8.N.h..p.| +peer1.org1.example.com | [2f6 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [1b6 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org2.example.com | [291 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000030 72 e9 93 b3 c0 1f e7 75 eb 41 f7 2f 0f fb 5a 62 |r......u.A./..Zb| +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | [2f7 08-31 20:50:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [1b7 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org2.example.com | [292 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000040 48 c1 a9 c5 71 5c |H...q\| +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | [2f8 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [1b8 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org2.example.com | [293 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1e5 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org1.example.com | [2f9 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [1b9 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org2.example.com | [294 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb5260 gate 1598907060154145200 evaluation starts +peer0.org1.example.com | [1e6 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | [2fa 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [1ba 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer0.org2.example.com | [295 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb5260 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org2.example.com | [1bb 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org1.example.com | [2fb 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [1e7 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1e8 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1bc 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org2.example.com | [1bd 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org2.example.com | [1be 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org2.example.com | [1bf 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org2.example.com | [1c0 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org2.example.com | [1c1 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org2.example.com | [1c2 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org2.example.com | [1c3 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org2.example.com | [1c4 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [1c5 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org2.example.com | [1c6 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org2.example.com | [1c7 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org2.example.com | [1c8 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org2.example.com | [1c9 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [1ca 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | [1cb 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [1cc 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [1cd 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [1ce 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [1cf 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [1d0 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [1d1 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [1d2 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [1d3 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [1d4 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [1d5 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [1d6 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [1d7 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1d8 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [1d9 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [1da 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [1db 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [1dc 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [1dd 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [1de 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [1df 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [1e0 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e1 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [1e2 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [1e3 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [1e4 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [1e5 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [1e6 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [1e7 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [1e8 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org2.example.com | [1e9 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org2.example.com | [1ea 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org2.example.com | [1eb 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org2.example.com | [1ec 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org2.example.com | [1ed 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org2.example.com | [1ee 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org2.example.com | [1ef 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org2.example.com | [1f0 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org2.example.com | [1f1 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org2.example.com | [1f2 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org2.example.com | [1f3 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org2.example.com | [1f4 08-31 20:50:58.50 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [1f5 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [1f6 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [1f7 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [1f8 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [1f9 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [1fa 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org2.example.com | [1fb 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org2.example.com | [1fc 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org2.example.com | [1fd 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org2.example.com | [1fe 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [1ff 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [200 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org2.example.com | [201 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org2.example.com | [202 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org2.example.com | [203 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org2.example.com | [204 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org2.example.com | [205 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org2.example.com | [206 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org2.example.com | [207 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org2.example.com | [208 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +peer1.org2.example.com | [209 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer0.org1.example.com | [1e9 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [20a 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [20b 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org2.example.com | [20c 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer1.org2.example.com | [20d 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org2.example.com | [20e 08-31 20:50:58.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org2.example.com | [20f 08-31 20:50:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org2.example.com | [210 08-31 20:50:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org2.example.com | [211 08-31 20:50:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org2.example.com | [212 08-31 20:50:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org2.example.com | [213 08-31 20:50:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +peer1.org2.example.com | [214 08-31 20:50:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +peer1.org2.example.com | [215 08-31 20:50:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +peer1.org2.example.com | [216 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [217 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [218 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer1.org2.example.com | [219 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer1.org2.example.com | [21a 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +peer0.org1.example.com | [1ea 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fc 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [21b 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +peer0.org1.example.com | [1eb 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | [2fd 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [21c 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +peer0.org1.example.com | [1ec 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [296 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb5260 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [297 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [298 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [21d 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [21e 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408B8BB829CF9AF9D9816...A55D1049CA35F5343DC503CE2A020801 +peer0.org2.example.com | [299 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [21f 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 65301E4E1788A655D0F619F539903A30D236851E19072310A447505E695A1C05 +peer0.org1.example.com | [1ed 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [220 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +peer0.org1.example.com | [1ee 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | [2fe 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [29a 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb5260 principal matched by identity 0 +peer1.org2.example.com | [221 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +peer0.org1.example.com | [1ef 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | [2ff 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [29b 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 4e 1b 22 3b 70 10 d4 e7 ed c5 99 50 23 a6 b4 |.N.";p......P#..| +peer1.org2.example.com | [222 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [1f0 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +peer1.org1.example.com | [300 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | 00000010 30 34 84 09 d4 ac 69 fd 94 82 0f 37 a8 6a 17 0a |04....i....7.j..| +peer1.org2.example.com | [223 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +orderer0.example.com | "2020-08-31 20:50:43.512 UTC [common.channelconfig] NewStandardValues -> DEBU 246 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | [1f1 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [301 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [29c 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1f a2 0f 5e a9 f9 f1 b5 73 8f 3c 54 |0D. ...^....s. DEBU Deploying system CC, for channel +peer1.org2.example.com | [225 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [1f2 08-31 20:50:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [302 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | 00000010 63 46 25 c4 9e c7 e5 16 6a 7b 5d 41 fa ff 1e 61 |cF%.....j{]A...a| +peer1.org2.example.com | [226 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [f0dc4713-955f-40ca-bed2-32823a545a93] +peer0.org1.example.com | [1f3 08-31 20:50:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:50:43.512 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: MSP" +peer1.org1.example.com | [303 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [227 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [1f4 08-31 20:50:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:50:43.512 UTC [common.channelconfig] validateMSP -> DEBU 248 Setting up MSP for org Org2MSP" +peer1.org1.example.com | [304 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [228 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU [f0dc4713] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | 00000020 1d e4 0a 79 02 20 5e e2 88 00 de b2 70 1b f3 92 |...y. ^.....p...| +peer0.org1.example.com | [1f5 08-31 20:50:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:50:43.512 UTC [msp] newBccspMsp -> DEBU 249 Creating BCCSP-based MSP instance" +peer1.org1.example.com | [305 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [229 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU [f0dc4713] notifying Txid:f0dc4713-955f-40ca-bed2-32823a545a93, channelID:businesschannel +peer0.org2.example.com | 00000030 bd 13 47 a1 16 f1 87 1c b9 dd c9 2f 26 6e dd 17 |..G......../&n..| +peer0.org2.example.com | 00000040 a6 69 6a 60 d6 06 |.ij`..| +orderer0.example.com | "2020-08-31 20:50:43.512 UTC [msp] New -> DEBU 24a Creating Cache-MSP instance" +peer1.org1.example.com | [306 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [22a 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [29d 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb5260 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:50:43.512 UTC [msp] Setup -> DEBU 24b Setting up MSP instance Org2MSP" +peer0.org1.example.com | [1f6 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [307 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [22b 08-31 20:50:58.53 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org2.example.com | [29e 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb5260 gate 1598907060154145200 evaluation succeeds +orderer0.example.com | "2020-08-31 20:50:43.512 UTC [msp.identity] newIdentity -> DEBU 24c Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [1f7 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [308 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [29f 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [22c 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f0dc4713-955f-40ca-bed2-32823a545a93] +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [1f8 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [309 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [2a0 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [22d 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [1f9 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [30a 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [2a1 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [22e 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [cae84b6f-3375-44df-b7ea-3802dd9e5c2c] +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | [1fa 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161009 +peer0.org2.example.com | [2a2 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [22f 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [1fb 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 158521178DBB44080E8983A747F7E50E0F211D84F8087B975C4D03D33F715ACC +peer1.org1.example.com | [30b 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [2a3 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU [ca3319e5] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [230 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | [1fc 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [30c 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org2.example.com | [2a4 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU [ca3319e5] notifying Txid:ca3319e5a6d164d6e9b33caa2886cdfb5dab1c1ecd85c53ce825c8db3a853b40, channelID: +peer1.org2.example.com | [231 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU [cae84b6f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | [1fd 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2a5 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [232 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU [cae84b6f] notifying Txid:cae84b6f-3375-44df-b7ea-3802dd9e5c2c, channelID:businesschannel +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org1.example.com | [30d 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org1.example.com | [1fe 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1ff 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [233 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | [30e 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org1.example.com | [200 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [234 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer1.org2.example.com | [235 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [cae84b6f-3375-44df-b7ea-3802dd9e5c2c] +peer0.org1.example.com | [201 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [236 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [2a6 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> INFO [][ca3319e5] Exit chaincode: name:"qscc" (7ms) +peer0.org2.example.com | [2a7 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU [][ca3319e5] Exit +peer0.org2.example.com | [2a8 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37826 +peer0.org2.example.com | [2a9 08-31 20:51:00.15 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37826 grpc.code=OK grpc.call_duration=10.0423ms +peer1.org2.example.com | [237 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [1e4dcbb8-ae0f-4274-a8c1-3810aae29076] +peer1.org2.example.com | [238 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [239 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer1.org2.example.com | [23a 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU [1e4dcbb8] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [23b 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU [1e4dcbb8] notifying Txid:1e4dcbb8-ae0f-4274-a8c1-3810aae29076, channelID:businesschannel +peer0.org2.example.com | [2aa 08-31 20:51:00.16 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [23c 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [23d 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer1.org2.example.com | [23e 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1e4dcbb8-ae0f-4274-a8c1-3810aae29076] +peer1.org2.example.com | [23f 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer1.org2.example.com | [240 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [8e71821f-4926-434f-82d3-7990ceb3d5a1] +peer1.org2.example.com | [241 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer1.org2.example.com | [242 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8e71821f-4926-434f-82d3-7990ceb3d5a1] +peer1.org2.example.com | [243 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [244 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408B8BB829CF9AF9D9816...A55D1049CA35F5343DC503CE2A020801 +peer1.org2.example.com | [245 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6BAFF3B48FA83D7539BEEDC7D08B393AD7B1269B6E5C6859B855D440C47EC4C5 +peer1.org2.example.com | [246 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer1.org2.example.com | [247 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU [6aec13fd] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [248 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU [6aec13fd] notifying Txid:6aec13fd7934b77594136330d5de2a87b429b2642a9d8149f2acbb36da0bd864, channelID: +peer1.org2.example.com | [249 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [24a 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> INFO [][6aec13fd] Exit chaincode: name:"cscc" (89ms) +peer1.org2.example.com | [24b 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU [][6aec13fd] Exit +peer1.org2.example.com | [24c 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:49044 +peer1.org2.example.com | [24d 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:49044 grpc.code=OK grpc.call_duration=94.261ms +peer1.org2.example.com | [24e 08-31 20:50:58.54 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [2ab 08-31 20:51:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [24f 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:49052 +peer0.org2.example.com | [2ac 08-31 20:51:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161008 +peer1.org2.example.com | [250 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002ee2e60 +peer0.org2.example.com | [2ad 08-31 20:51:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 502EE489B9811976DD4180DA2A6784FD7EC33C00EFF3D8ED6D0228463582FD01 +peer0.org1.example.com | [202 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org1.example.com | [30f 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org2.example.com | [251 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [2ae 08-31 20:51:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [203 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | [310 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org2.example.com | [252 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [2af 08-31 20:51:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [204 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | [253 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [2b0 08-31 20:51:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | [205 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org2.example.com | [254 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [2b1 08-31 20:51:00.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [206 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 85 21 17 8d bb 44 08 0e 89 83 a7 47 f7 e5 0e |..!...D.....G...| +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | [311 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org2.example.com | [255 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 4b e2 e4 c8 a6 7b d3 85 85 05 c1 68 51 69 63 |.K....{.....hQic| +peer0.org2.example.com | [2b2 08-31 20:51:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000010 0f 21 1d 84 f8 08 7b 97 5c 4d 03 d3 3f 71 5a cc |.!....{.\M..?qZ.| +orderer0.example.com | "2020-08-31 20:50:43.513 UTC [common.channelconfig] NewStandardValues -> DEBU 24d Initializing protos for *channelconfig.OrdererProtos" +peer1.org1.example.com | [312 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org2.example.com | 00000010 dc 74 f0 fa 6a 66 97 c0 8e 60 bf 81 62 bc 21 0f |.t..jf...`..b.!.| +peer0.org2.example.com | [2b3 08-31 20:51:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161009 +peer0.org1.example.com | [207 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 b7 fa d8 51 1b 9c f5 2d 5b c8 |0E.!.....Q...-[.| +orderer0.example.com | "2020-08-31 20:50:43.513 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24e Processing field: ConsensusType" +peer1.org2.example.com | [256 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 d8 0d a1 61 fe 64 94 0b 85 92 |0E.!.....a.d....| +peer0.org2.example.com | [2b4 08-31 20:51:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7871D672D604BA50A7292F2FDACC1D8A2E059B962BC56248254FF743BAF4BD56 +peer0.org1.example.com | 00000010 60 49 0e 65 19 e9 4c 24 8a 1b 16 c4 97 f0 0b 81 |`I.e..L$........| +orderer0.example.com | "2020-08-31 20:50:43.513 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24f Processing field: BatchSize" +peer1.org2.example.com | 00000010 78 5e f0 c0 f2 c7 b0 2a 5a 37 d9 88 e1 ab a8 28 |x^.....*Z7.....(| +peer0.org2.example.com | [2b5 08-31 20:51:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000020 38 d1 f9 33 95 02 20 4b 46 5c f0 ad 2a 2f 0a d9 |8..3.. KF\..*/..| +orderer0.example.com | "2020-08-31 20:50:43.513 UTC [common.channelconfig] initializeProtosStruct -> DEBU 250 Processing field: BatchTimeout" +peer1.org2.example.com | 00000020 3a f4 c1 d1 e9 02 20 39 6f 39 5e 10 7f e8 0f 61 |:..... 9o9^....a| +peer1.org1.example.com | [313 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org2.example.com | [2b6 08-31 20:51:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | 00000030 8b 03 25 ab a6 0a 60 19 33 5e 69 bb f3 35 b9 db |..%...`.3^i..5..| +orderer0.example.com | "2020-08-31 20:50:43.513 UTC [common.channelconfig] initializeProtosStruct -> DEBU 251 Processing field: KafkaBrokers" +peer1.org2.example.com | 00000030 09 fe a2 56 b1 a2 35 a9 e0 98 31 2f 7d 84 af c1 |...V..5...1/}...| +peer1.org1.example.com | [314 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org2.example.com | [2b7 08-31 20:51:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [2b8 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.025Z grpc.peer_address=172.18.0.7:51252 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=250.6µs +peer0.org2.example.com | [2b9 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000040 c2 8f a5 8f 25 76 c8 |....%v.| +peer1.org1.example.com | [315 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org2.example.com | [2ba 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer1.org2.example.com | [257 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | 00000040 7b 88 aa cd 4d 00 98 |{...M..| +orderer0.example.com | "2020-08-31 20:50:43.513 UTC [common.channelconfig] initializeProtosStruct -> DEBU 252 Processing field: ChannelRestrictions" +peer1.org1.example.com | [316 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org2.example.com | [2bb 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer1.org2.example.com | [258 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000216c40, header 0xc002ee3270 +peer0.org1.example.com | [208 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +orderer0.example.com | "2020-08-31 20:50:43.513 UTC [common.channelconfig] initializeProtosStruct -> DEBU 253 Processing field: Capabilities" +peer1.org1.example.com | [317 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org1.example.com | [318 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [259 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org2.example.com | [25a 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU [][b430ed60] processing txid: b430ed6008277f6c24862eaa0028a1839482c60a23627889c8f61fd94a61696b +orderer0.example.com | "2020-08-31 20:50:43.513 UTC [common.channelconfig] NewStandardValues -> DEBU 254 Initializing protos for *channelconfig.OrdererOrgProtos" +peer1.org2.example.com | [25b 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU [][b430ed60] Entry chaincode: name:"cscc" +peer0.org2.example.com | [2bc 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU 255 Processing field: Endpoints" +peer1.org2.example.com | [25c 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> INFO [][b430ed60] Entry chaincode: name:"cscc" +peer0.org2.example.com | [2bd 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:51252 +peer0.org1.example.com | [209 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 34 e0 c2 0f c2 c8 a0 a0 8d 38 |0E.!..4........8| +peer1.org1.example.com | [31a 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +orderer0.example.com | "2020-08-31 20:50:43.513 UTC [common.channelconfig] NewStandardValues -> DEBU 256 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org2.example.com | [25d 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [2be 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 9d b3 b8 a4 6c 4d e6 19 36 57 d8 11 81 e6 da ee |....lM..6W......| +peer1.org1.example.com | [31b 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +orderer0.example.com | "2020-08-31 20:50:43.513 UTC [common.channelconfig] initializeProtosStruct -> DEBU 257 Processing field: MSP" +peer1.org2.example.com | [25e 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer0.org2.example.com | [2bf 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 5d b6 f8 32 4b 02 20 32 b7 2a b1 07 c7 8f e5 f6 |]..2K. 2.*......| +peer1.org2.example.com | [25f 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [2c0 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | [260 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [261 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +orderer0.example.com | "2020-08-31 20:50:43.513 UTC [common.channelconfig] validateMSP -> DEBU 258 Setting up MSP for org OrdererOrg" +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [262 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 4b e2 e4 c8 a6 7b d3 85 85 05 c1 68 51 69 63 |.K....{.....hQic| +peer0.org1.example.com | 00000030 2d 48 c6 21 55 a3 e4 ee 18 ab 6a a1 44 dd 9a 0d |-H.!U.....j.D...| +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | 00000010 dc 74 f0 fa 6a 66 97 c0 8e 60 bf 81 62 bc 21 0f |.t..jf...`..b.!.| +peer0.org1.example.com | 00000040 ed cc 32 a6 84 3f 79 |..2..?y| +peer1.org1.example.com | [31c 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +orderer0.example.com | "2020-08-31 20:50:43.513 UTC [msp] newBccspMsp -> DEBU 259 Creating BCCSP-based MSP instance" +peer0.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | [263 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 d8 0d a1 61 fe 64 94 0b 85 92 |0E.!.....a.d....| +peer1.org1.example.com | [31d 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +orderer0.example.com | "2020-08-31 20:50:43.513 UTC [msp] New -> DEBU 25a Creating Cache-MSP instance" +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | 00000010 78 5e f0 c0 f2 c7 b0 2a 5a 37 d9 88 e1 ab a8 28 |x^.....*Z7.....(| +peer0.org1.example.com | [20a 08-31 20:50:57.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:50:43.513 UTC [msp] Setup -> DEBU 25b Setting up MSP instance OrdererMSP" +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | 00000020 3a f4 c1 d1 e9 02 20 39 6f 39 5e 10 7f e8 0f 61 |:..... 9o9^....a| +peer1.org1.example.com | [31e 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +orderer0.example.com | "2020-08-31 20:50:43.513 UTC [msp.identity] newIdentity -> DEBU 25c Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [20b 08-31 20:50:57.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org2.example.com | 00000030 09 fe a2 56 b1 a2 35 a9 e0 98 31 2f 7d 84 af c1 |...V..5...1/}...| +peer1.org1.example.com | [31f 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | [20c 08-31 20:50:57.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org2.example.com | 00000040 c2 8f a5 8f 25 76 c8 |....%v.| +peer1.org1.example.com | [320 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | [20d 08-31 20:50:57.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | [264 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU [b430ed60] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [265 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU [b430ed60] notifying Txid:b430ed6008277f6c24862eaa0028a1839482c60a23627889c8f61fd94a61696b, channelID: +peer1.org2.example.com | [266 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [20e 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36692 +peer0.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org2.example.com | [267 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> INFO [][b430ed60] Exit chaincode: name:"cscc" (2ms) +peer1.org1.example.com | [321 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org1.example.com | [20f 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00284f630 +peer0.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org2.example.com | [268 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU [][b430ed60] Exit +peer0.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | [269 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:49052 +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [322 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org1.example.com | [210 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org2.example.com | [26a 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:49052 grpc.code=OK grpc.call_duration=4.0468ms +peer0.org2.example.com | [2c1 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [323 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org1.example.com | [211 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [26b 08-31 20:50:59.45 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [2c2 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [324 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | [212 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26c 08-31 20:50:59.53 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting, peers found 0 +peer0.org2.example.com | [2c3 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [325 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org1.example.com | [213 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org2.example.com | [26d 08-31 20:50:59.53 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer0.org2.example.com | [2c4 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26e 08-31 20:50:59.53 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer0.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [26f 08-31 20:50:59.53 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer0.org2.example.com | [2c5 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [326 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org2.example.com | [270 08-31 20:50:59.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2c6 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [327 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org2.example.com | [271 08-31 20:50:59.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...7482120C08CCB4D3A7F9AF9D98161001 +peer0.org2.example.com | [2c7 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | [328 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +orderer0.example.com | nw== +peer1.org2.example.com | [272 08-31 20:50:59.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5063B1F70CEB4C7BDF7C3DF6F15EB05B1ACBE9306E3D0D5D55A558E16539E73F +peer0.org2.example.com | [2c8 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [329 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org2.example.com | [273 08-31 20:50:59.53 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer0.org2.example.com | [2c9 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | [32a 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [msp] Setup -> DEBU 25d Setting up the MSP manager (3 msps)" +peer1.org2.example.com | [274 08-31 20:51:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2ca 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [2cb 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2cc 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2cd 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [275 08-31 20:51:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161008 +peer0.org2.example.com | [2ce 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [276 08-31 20:51:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1CFCF57DF92ADC83C56406513333A9770F7C6FD69288DF4DE1206CEA0AF8F21F +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org1.example.com | [32b 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org2.example.com | [2cf 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00302b670 gate 1598907064042137100 evaluation starts +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [msp] Setup -> DEBU 25e MSP manager setup complete, setup 3 msps" +peer1.org2.example.com | [277 08-31 20:51:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org1.example.com | [32c 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer0.org2.example.com | [2d0 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00302b670 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 25f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +peer1.org2.example.com | [278 08-31 20:51:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | [32d 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +peer0.org2.example.com | [2d1 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00302b670 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 260 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +peer1.org2.example.com | [279 08-31 20:51:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer0.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [27a 08-31 20:51:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [27b 08-31 20:51:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:49060 +peer1.org2.example.com | [27c 08-31 20:51:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002fa4000 +peer1.org2.example.com | [27d 08-31 20:51:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [27e 08-31 20:51:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [27f 08-31 20:51:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org2.example.com | [280 08-31 20:51:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [281 08-31 20:51:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 11 bc 48 e0 a9 b2 2a 68 8d c6 25 d9 57 d1 bc |S..H...*h..%.W..| +peer1.org2.example.com | 00000010 fd bb 86 e7 6d 66 c2 f0 ef d3 26 ef 23 55 b2 d3 |....mf....&.#U..| +peer1.org2.example.com | [282 08-31 20:51:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 df 99 12 fd a3 cd 7e 58 1c 38 50 |0E.!.......~X.8P| +peer1.org2.example.com | 00000010 d4 6b 77 84 09 1d 91 75 df 67 7c cc 16 0d 67 45 |.kw....u.g|...gE| +peer1.org2.example.com | 00000020 83 9f a3 0d 62 02 20 26 63 9e f4 18 1a 03 98 91 |....b. &c.......| +peer1.org2.example.com | 00000030 f9 5b b4 77 20 4a f7 f1 0e f3 6b b6 35 42 5f a9 |.[.w J....k.5B_.| +peer1.org2.example.com | 00000040 83 e5 1c ad e9 82 c5 |.......| +peer1.org2.example.com | [283 08-31 20:51:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [284 08-31 20:51:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0002170a0, header 0xc002fa4410 +peer1.org2.example.com | [285 08-31 20:51:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer1.org2.example.com | [286 08-31 20:51:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU [][f6e2baa3] processing txid: f6e2baa3f9f0a8e9c84fd43d7810ca4772156fe43a9b19da06b03f1d077b76f0 +peer1.org2.example.com | [287 08-31 20:51:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU [][f6e2baa3] Entry chaincode: name:"qscc" +peer1.org2.example.com | [288 08-31 20:51:00.31 UTC] [%{longpkg}] %{callpath} -> INFO [][f6e2baa3] Entry chaincode: name:"qscc" +peer1.org2.example.com | [289 08-31 20:51:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [28a 08-31 20:51:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer1.org2.example.com | [28b 08-31 20:51:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer1.org2.example.com | [28c 08-31 20:51:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org2.example.com | [28d 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [28e 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [28f 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [290 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [291 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer1.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer1.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer1.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [292 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb6220 gate 1598907060322170800 evaluation starts +peer1.org2.example.com | [293 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb6220 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [294 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb6220 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [295 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb6220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [296 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb6220 principal evaluation fails +peer1.org2.example.com | [297 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb6220 gate 1598907060322170800 evaluation fails +peer1.org2.example.com | [298 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [299 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [29a 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [29b 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb7070 gate 1598907060324789700 evaluation starts +peer1.org2.example.com | [29c 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb7070 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [29d 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb7070 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [29e 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | [29f 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [2a0 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [2a1 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb7070 principal matched by identity 0 +peer1.org2.example.com | [2a2 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 53 11 bc 48 e0 a9 b2 2a 68 8d c6 25 d9 57 d1 bc |S..H...*h..%.W..| +peer1.org2.example.com | 00000010 fd bb 86 e7 6d 66 c2 f0 ef d3 26 ef 23 55 b2 d3 |....mf....&.#U..| +peer1.org2.example.com | [2a3 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 df 99 12 fd a3 cd 7e 58 1c 38 50 |0E.!.......~X.8P| +peer1.org2.example.com | 00000010 d4 6b 77 84 09 1d 91 75 df 67 7c cc 16 0d 67 45 |.kw....u.g|...gE| +peer1.org2.example.com | 00000020 83 9f a3 0d 62 02 20 26 63 9e f4 18 1a 03 98 91 |....b. &c.......| +peer1.org2.example.com | 00000030 f9 5b b4 77 20 4a f7 f1 0e f3 6b b6 35 42 5f a9 |.[.w J....k.5B_.| +peer1.org2.example.com | 00000040 83 e5 1c ad e9 82 c5 |.......| +peer1.org2.example.com | [2a4 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb7070 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2a5 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb7070 gate 1598907060324789700 evaluation succeeds +peer1.org2.example.com | [2a6 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2a7 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2a8 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2a9 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2aa 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU [f6e2baa3] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [2ab 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU [f6e2baa3] notifying Txid:f6e2baa3f9f0a8e9c84fd43d7810ca4772156fe43a9b19da06b03f1d077b76f0, channelID: +peer1.org2.example.com | [2ac 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [2ad 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> INFO [][f6e2baa3] Exit chaincode: name:"qscc" (18ms) +peer1.org2.example.com | [2ae 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU [][f6e2baa3] Exit +peer1.org2.example.com | [2af 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:49060 +peer1.org2.example.com | [2b0 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:49060 grpc.code=OK grpc.call_duration=24.1149ms +peer1.org2.example.com | [2b1 08-31 20:51:00.34 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [2b2 08-31 20:51:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2b3 08-31 20:51:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161009 +peer1.org2.example.com | [2b4 08-31 20:51:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 391868E6F04FAAE858090362B5627F7C4EE5E40658C910354E5FED52328FC7E1 +peer1.org2.example.com | [2b5 08-31 20:51:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2b6 08-31 20:51:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2b7 08-31 20:51:01.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [2b8 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [2b9 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> INFO 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Becoming a leader +peer1.org2.example.com | [2ba 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel +peer1.org2.example.com | [2bb 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> INFO This peer will retrieve blocks from ordering service and disseminate to other peers in the organization for channel businesschannel +peer1.org2.example.com | [2bc 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [2bd 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [2be 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2bf 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D981610021801 +peer1.org2.example.com | [2c0 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2633F495BAB62C24D17754C294D9B78788A152BBEFCFD9FE50F725CF7BB1C3DE +peer1.org2.example.com | [2c1 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [2c2 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU Creating a new connection +peer1.org2.example.com | [2c3 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [2c4 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [2c5 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{orderer0.example.com:7050 0 }] +peer1.org2.example.com | [2c6 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [2c7 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003009190, CONNECTING +peer1.org2.example.com | [2c8 08-31 20:51:04.51 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003009190, READY +peer1.org2.example.com | [2c9 08-31 20:51:04.51 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to {orderer0.example.com:7050 [OrdererMSP]} +peer1.org2.example.com | [2ca 08-31 20:51:04.51 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to orderer0.example.com:7050 +peer1.org2.example.com | [2cb 08-31 20:51:04.51 UTC] [%{longpkg}] %{callpath} -> DEBU Establishing gRPC stream with orderer0.example.com:7050 ... +peer1.org2.example.com | [2cc 08-31 20:51:04.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer1.org2.example.com | [2cd 08-31 20:51:04.51 UTC] [%{longpkg}] %{callpath} -> INFO Starting deliver with block [1] for channel businesschannel +peer1.org2.example.com | [2ce 08-31 20:51:04.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2cf 08-31 20:51:04.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2d0 08-31 20:51:04.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A91070A3D08051A0608B8C5B5FA0522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 +peer1.org2.example.com | [2d1 08-31 20:51:04.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 575BEEBBF7E17665EB7021DABA1CA8D080FCE8BC627D372D90AEE51AA5F938C9 +peer1.org2.example.com | [2d2 08-31 20:51:04.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d3 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d4 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d5 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | [2d6 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2d7 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [2d8 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d9 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org2.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org2.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org2.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org2.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org2.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org2.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [2da 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003009750 gate 1598907064526350700 evaluation starts +peer1.org2.example.com | [2db 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003009750 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2dc 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003009750 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2dd 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer1.org2.example.com | [2de 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [2df 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org2.example.com | [2e0 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003009750 principal matched by identity 0 +peer1.org2.example.com | [2e1 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 c8 44 32 18 b1 98 dd 01 3b 2a 89 7a 89 2b 13 |X.D2.....;*.z.+.| +peer1.org2.example.com | 00000010 f7 ce 98 55 e9 ec 55 9e ca ec 78 b4 51 c3 90 63 |...U..U...x.Q..c| +peer1.org2.example.com | [2e2 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 00 29 77 b3 13 39 4d 01 2e f3 e6 |0D. u.)w..9M....| +peer1.org2.example.com | 00000010 e0 26 f0 03 a8 bc ea f4 8e 30 c4 50 d2 7a b6 70 |.&.......0.P.z.p| +peer1.org2.example.com | 00000020 2c 33 f8 4a 02 20 02 29 ff c7 e1 f1 fe e8 d3 1f |,3.J. .)........| +peer1.org2.example.com | 00000030 90 25 ce f9 8c f7 58 78 71 b7 04 6d 5f cc 4e 47 |.%....Xxq..m_.NG| +peer1.org2.example.com | 00000040 8d 9f a1 ae 6b b2 |....k.| +peer1.org2.example.com | [2e3 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003009750 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2e4 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003009750 gate 1598907064526350700 evaluation succeeds +peer1.org2.example.com | [2e5 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2e6 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2e7 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2e8 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2e9 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer1.org2.example.com | [2ea 08-31 20:51:04.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer1.org2.example.com | [2eb 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [2ed 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [1], peers number [0] +peer1.org2.example.com | [2ec 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +peer1.org2.example.com | [2ee 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +peer1.org2.example.com | [2ef 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +peer1.org2.example.com | [2f0 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +peer1.org2.example.com | [2f1 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +peer1.org2.example.com | [2f2 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [2f3 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002f31900 env 0xc002f878b0 txn 0 +peer1.org2.example.com | [2f4 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002f878b0 +peer1.org2.example.com | [2f5 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\264\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\0305\231\256\356\005\207\177s\320\333\2161g\250g\375\0331i\366p\262\234\235" +peer1.org2.example.com | [2f6 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org2.example.com | [2f7 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [2f8 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [2f9 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer1.org2.example.com | [2fa 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [2fb 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org2.example.com | [2fc 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [2fd 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a c9 56 74 d0 ac d1 53 26 ca 88 78 dd d1 98 e3 |*.Vt...S&..x....| +peer1.org2.example.com | 00000010 ee b9 13 91 2d c5 2c 69 ec 14 2a 0f f3 f1 54 a2 |....-.,i..*...T.| +peer1.org2.example.com | [2fe 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 b4 a7 cf 0c d5 ef fc 4a 2d 2b 1c |0D. ........J-+.| +peer1.org2.example.com | 00000010 62 61 50 e5 d5 98 dc d2 14 31 4f 44 6a a4 86 44 |baP......1ODj..D| +peer1.org2.example.com | 00000020 b0 89 10 60 02 20 58 11 e4 1a 38 2d 02 16 fb d0 |...`. X...8-....| +peer1.org2.example.com | 00000030 3e 3a 82 7c a3 2e 16 22 69 6d a8 0c 03 8a 46 67 |>:.|..."im....Fg| +peer1.org2.example.com | 00000040 2d c0 ba 70 a1 eb |-..p..| +peer1.org2.example.com | [2ff 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [300 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0030b3500, header channel_header:"\010\001\032\006\010\264\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\0305\231\256\356\005\207\177s\320\333\2161g\250g\375\0331i\366p\262\234\235" +peer1.org2.example.com | [301 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [302 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [303 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [304 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [305 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [306 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [307 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [308 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [309 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [30a 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [30b 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [30c 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org2.example.com | [30d 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [30e 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [30f 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [310 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [311 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [312 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +peer0.org1.example.com | [214 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 261 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +peer1.org2.example.com | [313 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [215 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [2d2 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [32e 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 262 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +peer1.org2.example.com | [314 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [216 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [2d3 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [2d4 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [315 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [217 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [2d5 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00302b670 principal matched by identity 0 +peer1.org2.example.com | [316 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [32f 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org1.example.com | [218 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c f6 5e 9d 16 3c 10 6b 55 7b a4 ab 18 dc e8 54 |..^..<.kU{.....T| +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 263 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 264 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +peer1.org2.example.com | [317 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [330 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org1.example.com | 00000010 03 88 27 d9 dc 5d 79 d6 5e 10 86 1a d1 d9 07 b9 |..'..]y.^.......| +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 265 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +peer1.org2.example.com | [318 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [2d6 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | [331 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer0.org1.example.com | [219 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 45 ee 27 6d 63 34 39 bd 84 e6 6b |0D. jE.'mc49...k| +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 266 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +peer1.org2.example.com | [319 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [332 08-31 20:50:58.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org1.example.com | 00000010 45 4b 02 54 19 22 73 4f 43 04 71 b0 de 24 3e 60 |EK.T."sOC.q..$>`| +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 267 Proposed new policy Admins for Channel/Consortiums" +peer1.org2.example.com | [31a 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [2d7 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d c6 b1 ff 8b b3 92 64 53 1e 0b 45 |0D. .......dS..E| +peer1.org1.example.com | [333 08-31 20:50:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org1.example.com | 00000020 85 78 94 68 02 20 46 a2 f3 f7 64 a5 51 9d fe e2 |.x.h. F...d.Q...| +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 268 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [31b 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | 00000010 05 14 73 69 cc bf 82 36 e1 7f 1d a1 83 38 e9 b7 |..si...6.....8..| +peer1.org1.example.com | [334 08-31 20:50:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org1.example.com | 00000030 53 15 5e b2 8d 9d 78 51 c2 42 c8 fc 26 30 e0 58 |S.^...xQ.B..&0.X| +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 269 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [31c 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +peer0.org2.example.com | 00000020 2d 00 59 47 02 20 44 ae 78 7b bd 63 be 1e 7f d1 |-.YG. D.x{.c....| +peer1.org1.example.com | [335 08-31 20:50:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org1.example.com | 00000040 44 9b 1b 1a b1 3b |D....;| +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 26a Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [31d 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org2.example.com | 00000030 72 94 7f 41 a3 84 12 28 dc 86 d1 61 c0 27 6f 0d |r..A...(...a.'o.| +peer1.org1.example.com | [336 08-31 20:50:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org1.example.com | [21a 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 26b Proposed new policy BlockValidation for Channel/Orderer" +peer1.org2.example.com | [31e 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28181 bytes, seq: 1}, Envelope: 28214 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | 00000040 ff bd 82 6f d0 00 |...o..| +peer1.org1.example.com | [337 08-31 20:50:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +peer0.org1.example.com | [21b 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001d50a0, header 0xc00284ff40 +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 26c Proposed new policy Readers for Channel/Orderer" +peer1.org2.example.com | [31f 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d8 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00302b670 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [338 08-31 20:50:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +peer0.org1.example.com | [21c 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 26d Proposed new policy Writers for Channel/Orderer" +peer1.org2.example.com | [320 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1 +peer0.org2.example.com | [2d9 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00302b670 gate 1598907064042137100 evaluation succeeds +peer1.org1.example.com | [339 08-31 20:50:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +peer0.org1.example.com | [21d 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU [][06112b95] processing txid: 06112b950bc851abedd0a38297e055c4ca2219e7de0f29e8a2e16bd4f82d0b72 +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 26e Proposed new policy Admins for Channel/Orderer" +peer1.org2.example.com | [321 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [2da 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [33a 08-31 20:50:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [21e 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU [][06112b95] Entry chaincode: name:"cscc" +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] GetPolicy -> DEBU 26f Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +peer1.org2.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | [2db 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [33b 08-31 20:50:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [21f 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> INFO [][06112b95] Entry chaincode: name:"cscc" +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 270 Proposed new policy Readers for Channel" +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [2dc 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [33c 08-31 20:50:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer0.org1.example.com | [220 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] GetPolicy -> DEBU 271 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [2dd 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [33d 08-31 20:50:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer0.org1.example.com | [221 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 272 Proposed new policy Writers for Channel" +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | [2de 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:51252 +peer0.org2.example.com | [2df 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:51252 +peer0.org2.example.com | [2e0 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org2.example.com | [2e1 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:51252 disconnected +peer0.org1.example.com | [222 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer1.org2.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [223 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org2.example.com | [2e2 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:51:14.027Z grpc.peer_address=172.18.0.7:51252 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.3846ms +peer1.org1.example.com | [33e 08-31 20:50:58.04 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +peer1.org1.example.com | [33f 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org2.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org1.example.com | [340 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +peer1.org2.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 273 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [common.configtx] addToMap -> DEBU 274 Adding to config map: [Group] /Channel" +peer0.org1.example.com | [224 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [341 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [common.configtx] addToMap -> DEBU 275 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [common.configtx] addToMap -> DEBU 276 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [common.configtx] addToMap -> DEBU 277 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [common.configtx] addToMap -> DEBU 278 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [common.configtx] addToMap -> DEBU 279 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +peer0.org1.example.com | [225 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +orderer0.example.com | "2020-08-31 20:50:43.514 UTC [common.configtx] addToMap -> DEBU 27a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 27b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 27c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 27d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 27e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 27f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 280 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +peer0.org1.example.com | [226 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org2.example.com | [2e3 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [227 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org2.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer1.org1.example.com | [342 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408D8CA91B5F7AF9D9816...387B0008A61A99B98BA4E6D12A020801 +peer0.org1.example.com | [228 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c f6 5e 9d 16 3c 10 6b 55 7b a4 ab 18 dc e8 54 |..^..<.kU{.....T| +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [322 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c1f30 gate 1598907064535864100 evaluation starts +peer1.org1.example.com | [343 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9A6D23EC2C38B474ADD3B871C7F550D6BAB35F7F66740F94B9338304DBF6B8A8 +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 281 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +peer0.org1.example.com | 00000010 03 88 27 d9 dc 5d 79 d6 5e 10 86 1a d1 d9 07 b9 |..'..]y.^.......| +peer0.org1.example.com | [229 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 45 ee 27 6d 63 34 39 bd 84 e6 6b |0D. jE.'mc49...k| +peer0.org1.example.com | 00000010 45 4b 02 54 19 22 73 4f 43 04 71 b0 de 24 3e 60 |EK.T."sOC.q..$>`| +peer1.org2.example.com | [323 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c1f30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [324 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [325 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c1f30 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [326 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [344 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +peer1.org1.example.com | [345 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +peer0.org2.example.com | [2e4 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.068Z grpc.peer_address=172.18.0.7:51254 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=221.3µs +peer0.org1.example.com | 00000020 85 78 94 68 02 20 46 a2 f3 f7 64 a5 51 9d fe e2 |.x.h. F...d.Q...| +peer1.org2.example.com | [327 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer1.org1.example.com | [346 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 282 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 283 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +peer0.org1.example.com | 00000030 53 15 5e b2 8d 9d 78 51 c2 42 c8 fc 26 30 e0 58 |S.^...xQ.B..&0.X| +peer0.org1.example.com | 00000040 44 9b 1b 1a b1 3b |D....;| +peer0.org1.example.com | [22a 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +peer0.org1.example.com | [22b 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +peer0.org1.example.com | [22c 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +peer0.org1.example.com | [22d 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +peer0.org1.example.com | [22e 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +peer0.org1.example.com | [22f 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +peer0.org1.example.com | [230 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +peer0.org1.example.com | [231 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +peer0.org1.example.com | [232 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +peer0.org1.example.com | [233 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +peer0.org1.example.com | [234 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +peer0.org1.example.com | [235 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0029d1680)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +peer0.org1.example.com | [236 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +peer0.org1.example.com | [238 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +peer1.org2.example.com | [328 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer1.org2.example.com | [329 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | [32a 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [32b 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [32c 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [32d 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003099230 gate 1598907064536140100 evaluation starts +peer1.org2.example.com | [32e 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [32f 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003099230 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [330 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003099230 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [331 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003099230 principal matched by identity 0 +peer1.org2.example.com | [332 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org2.example.com | [333 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [334 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d8 3b 71 5b 21 f6 82 ed c1 8b 71 68 0e 60 7c fa |.;q[!.....qh.`|.| +peer1.org2.example.com | 00000010 f8 df 66 d5 28 bb 60 5e f1 c2 4c 3f 47 a7 93 fa |..f.(.`^..L?G...| +peer1.org2.example.com | [335 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd 82 bf 5f 7c a3 dc d0 c8 e9 21 |0E.!...._|.....!| +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 284 Adding to config map: [Policy] /Channel/Consortiums/Admins" +peer1.org2.example.com | 00000010 09 51 02 d1 a5 05 b8 99 0a e9 e9 71 43 ec d1 a3 |.Q.........qC...| +peer0.org1.example.com | [239 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +peer0.org1.example.com | [23a 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +peer0.org2.example.com | [2e5 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 285 Adding to config map: [Group] /Channel/Orderer" +peer1.org2.example.com | 00000020 96 03 03 05 2d 02 20 23 27 76 b3 e5 6c 20 63 2c |....-. #'v..l c,| +peer0.org1.example.com | [23b 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +peer1.org1.example.com | [347 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer0.org2.example.com | [2e6 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer1.org2.example.com | 00000030 f0 c8 80 9e 6b 2b 01 8f 40 18 5f 6e 77 c4 d1 55 |....k+..@._nw..U| +peer1.org1.example.com | [348 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +peer0.org2.example.com | [2e7 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer1.org2.example.com | 00000040 b3 a7 35 30 51 41 f9 |..50QA.| +peer1.org2.example.com | [336 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003099230 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [337 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003099230 gate 1598907064536140100 evaluation succeeds +peer1.org2.example.com | [338 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [339 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [33a 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [33b 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [33c 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer1.org2.example.com | [33d 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c1f30 principal matched by identity 0 +peer1.org2.example.com | [33e 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer0.org1.example.com | [237 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +peer0.org1.example.com | [23c 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +peer1.org2.example.com | [33f 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [23d 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 286 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer1.org1.example.com | [349 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [2e8 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU 287 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer1.org1.example.com | [34a 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [ec70dfed-5838-47e9-9b91-32c1fa3ae945] +peer0.org2.example.com | [2e9 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:51254 +peer0.org2.example.com | [2ea 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 40 21 8f 78 1d c2 88 4f 31 16 8b 9b 25 00 fb 20 |@!.x...O1...%.. | +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 288 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [34b 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [2eb 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [341 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [2], peers number [0] +peer0.org1.example.com | [23f 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 289 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org2.example.com | [2ec 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34c 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU [ec70dfed] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [342 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d d5 10 d0 47 15 e1 14 bb 9f dc b9 |0D. ....G.......| +peer1.org2.example.com | 00000010 21 20 fe 43 aa a5 85 eb 20 91 d3 d3 25 c3 40 6f |! .C.... ...%.@o| +peer0.org1.example.com | [240 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +peer1.org1.example.com | [34d 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU [ec70dfed] notifying Txid:ec70dfed-5838-47e9-9b91-32c1fa3ae945, channelID:businesschannel +peer0.org2.example.com | [2ed 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [241 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 28a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer1.org2.example.com | 00000020 be ec 7e 52 02 20 3f 97 e3 ab d5 5a 98 c6 78 08 |..~R. ?....Z..x.| +peer1.org1.example.com | [34e 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [2ee 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [242 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer1.org2.example.com | 00000030 e3 1a 1c 9b 18 c4 79 e9 08 26 b7 2a 98 01 0e 55 |......y..&.*...U| +peer1.org1.example.com | [34f 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org2.example.com | [2ef 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [243 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer1.org2.example.com | 00000040 0c af 35 37 61 76 |..57av| +peer1.org1.example.com | [350 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ec70dfed-5838-47e9-9b91-32c1fa3ae945] +peer0.org2.example.com | [2f0 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [244 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer1.org2.example.com | [343 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28187 bytes, seq: 2}, Envelope: 28220 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [351 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [2f1 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [245 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer1.org2.example.com | [344 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2 +peer1.org1.example.com | [352 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [11a92f6d-23e3-42d5-ad0a-e944ff06e821] +peer0.org2.example.com | [2f2 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [246 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer1.org2.example.com | [345 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c1f30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [353 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [2f3 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [247 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer1.org2.example.com | [346 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030c1f30 gate 1598907064535864100 evaluation succeeds +peer1.org1.example.com | [354 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org2.example.com | [2f4 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [248 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +peer1.org2.example.com | [347 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer1.org1.example.com | [355 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU [11a92f6d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [2f5 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a2150 gate 1598907064077866500 evaluation starts +peer0.org1.example.com | [249 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [348 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer1.org1.example.com | [356 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU [11a92f6d] notifying Txid:11a92f6d-23e3-42d5-ad0a-e944ff06e821, channelID:businesschannel +peer0.org2.example.com | [2f6 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a2150 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [24a 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [349 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer1.org1.example.com | [357 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [2f7 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a2150 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [24b 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [34a 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Value] /Channel/OrdererAddresses" +peer1.org1.example.com | [358 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org2.example.com | [2f8 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a2150 principal matched by identity 0 +peer0.org1.example.com | [24c 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +peer1.org2.example.com | [34b 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Value] /Channel/Capabilities" +peer0.org2.example.com | [2f9 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org1.example.com | [24d 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [34c 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer1.org1.example.com | [359 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [11a92f6d-23e3-42d5-ad0a-e944ff06e821] +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org1.example.com | [24e 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org2.example.com | [34d 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer1.org1.example.com | [35a 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [2fa 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 fa 7d b9 df 91 9d 11 58 4d ba |0E.!...}.....XM.| +peer0.org1.example.com | [24f 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org2.example.com | [34e 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Policy] /Channel/Readers" +peer1.org1.example.com | [35b 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [67c120ac-f009-4f7f-b682-d8becbacd578] +peer0.org2.example.com | 00000010 3a 18 75 2e da 34 a5 0e 87 d7 60 1b 59 bc af 54 |:.u..4....`.Y..T| +peer0.org1.example.com | [250 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org1.example.com | [251 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [34f 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-08-31 20:50:43.516 UTC [fsblkstorage] Next -> DEBU 29b Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +peer1.org1.example.com | [35c 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [350 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +orderer0.example.com | "2020-08-31 20:50:43.516 UTC [fsblkstorage] newBlockfileStream -> DEBU 29c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +peer1.org1.example.com | [35d 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org1.example.com | [252 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org2.example.com | 00000020 c1 d0 b8 fd 6e 02 20 32 a2 8c 9f fa 3b 73 6e fc |....n. 2....;sn.| +peer1.org2.example.com | [351 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +orderer0.example.com | "2020-08-31 20:50:43.516 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 29d Remaining bytes=[22930], Going to peek [8] bytes" +orderer0.example.com | "2020-08-31 20:50:43.516 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 29e Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer0.org1.example.com | [253 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org2.example.com | 00000030 57 1d 15 2e 7a e6 cf 3e 3d dc a1 81 1a 47 f9 c3 |W...z..>=....G..| +peer1.org2.example.com | [352 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +orderer0.example.com | "2020-08-31 20:50:43.516 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 29f blockbytes [22927] read from file [0]" +peer1.org1.example.com | [35e 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU [67c120ac] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | 00000040 9b 7f eb 28 24 39 64 |...($9d| +peer0.org1.example.com | [254 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org2.example.com | [353 08-31 20:51:04.53 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +orderer0.example.com | "2020-08-31 20:50:43.516 UTC [fsblkstorage] Next -> DEBU 2a0 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +peer1.org1.example.com | [35f 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU [67c120ac] notifying Txid:67c120ac-f009-4f7f-b682-d8becbacd578, channelID:businesschannel +peer0.org2.example.com | [2fb 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a2150 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [255 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [354 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [355 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [360 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [2fc 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a2150 gate 1598907064077866500 evaluation succeeds +peer0.org1.example.com | [256 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org2.example.com | [356 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +orderer0.example.com | "2020-08-31 20:50:43.516 UTC [fsblkstorage] newBlockfileStream -> DEBU 2a1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +peer1.org1.example.com | [361 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org2.example.com | [2fd 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [357 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +orderer0.example.com | "2020-08-31 20:50:43.516 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2a2 Remaining bytes=[22930], Going to peek [8] bytes" +peer1.org1.example.com | [362 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [67c120ac-f009-4f7f-b682-d8becbacd578] +peer0.org2.example.com | [2fe 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [257 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | [258 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002a53480)} +orderer0.example.com | "2020-08-31 20:50:43.516 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2a3 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer1.org1.example.com | [363 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer0.org2.example.com | [2ff 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [300 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [259 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [25a 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [301 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:51254 +peer1.org2.example.com | [358 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +orderer0.example.com | "2020-08-31 20:50:43.516 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2a4 blockbytes [22927] read from file [0]" +peer0.org2.example.com | [302 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:51254 +peer0.org1.example.com | [25b 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [359 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [303 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51254 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: nonce:9492522150986590262 tag:EMPTY mem_req:?\0008\034\252\023\307" > > , Envelope: 176 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:50:43.516 UTC [common.channelconfig] NewStandardValues -> DEBU 2a5 Initializing protos for *channelconfig.ChannelProtos" +peer1.org1.example.com | [364 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [8390de2a-4a2c-442f-a1b8-82a50ce59584] +peer0.org1.example.com | [25c 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +peer1.org2.example.com | [35a 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +orderer0.example.com | "2020-08-31 20:50:43.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2a6 Processing field: HashingAlgorithm" +peer1.org1.example.com | [365 08-31 20:50:58.05 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer0.org1.example.com | [25d 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +peer1.org2.example.com | [35b 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [304 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:50:43.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2a7 Processing field: BlockDataHashingStructure" +peer1.org1.example.com | [366 08-31 20:50:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8390de2a-4a2c-442f-a1b8-82a50ce59584] +peer0.org1.example.com | [25e 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +peer1.org2.example.com | [35c 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [305 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:9492522150986590262 tag:EMPTY mem_req:?\0008\034\252\023\307" > > , Envelope: 176 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:50:43.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2a8 Processing field: OrdererAddresses" +peer1.org1.example.com | [367 08-31 20:50:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [25f 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +peer1.org2.example.com | [35d 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [306 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-08-31 20:50:43.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2a9 Processing field: Consortium" +peer1.org1.example.com | [368 08-31 20:50:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408D8CA91B5F7AF9D9816...387B0008A61A99B98BA4E6D12A020801 +peer0.org1.example.com | [260 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0x9a, 0x52, 0x4c, 0x2b, 0x43, 0x65, 0xfd, 0x57, 0x33, 0x8e, 0x73, 0xf4, 0x8a, 0x80, 0xa7, 0x23, 0x93, 0x2, 0xb5, 0x41, 0x2, 0x4d, 0xf3, 0x50, 0xe8, 0x90, 0xb1, 0xd5, 0x7a, 0xc7, 0x1e, 0x2e} txOffsets= +peer1.org2.example.com | [35e 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [307 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:50:43.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2aa Processing field: Capabilities" +peer1.org1.example.com | [369 08-31 20:50:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BF2D0F93FA5A38EA1EA6979B852170636DCC60E107C2EDA809442222BD46B110 +peer0.org1.example.com | txId=fd92ece786eb33a140499e967ed74e3a3bbcb8e88456d50f7454e373b6da94d6 locPointer=offset=39, bytesLength=28430 +peer0.org1.example.com | ] +peer0.org1.example.com | [261 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28430] for tx ID: [fd92ece786eb33a140499e967ed74e3a3bbcb8e88456d50f7454e373b6da94d6] to txid-index +peer1.org2.example.com | [35f 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [360 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [361 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org2.example.com | [362 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org2.example.com | [363 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org2.example.com | [364 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [365 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [366 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org2.example.com | [367 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org2.example.com | [368 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org2.example.com | [369 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org2.example.com | [36a 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org2.example.com | [36b 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org2.example.com | [36c 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [36d 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org2.example.com | [36e 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org2.example.com | [36f 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [370 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [308 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [309 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [30a 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [30b 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [30c 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [30d 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [30e 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9ad0 gate 1598907064097500500 evaluation starts +peer0.org2.example.com | [30f 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9ad0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [371 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org2.example.com | [310 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9ad0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [372 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [373 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +orderer0.example.com | "2020-08-31 20:50:43.517 UTC [common.channelconfig] NewStandardValues -> DEBU 2ab Initializing protos for *channelconfig.OrdererProtos" +peer1.org1.example.com | [36a 08-31 20:50:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer0.org2.example.com | [311 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9ad0 principal matched by identity 0 +peer1.org2.example.com | [374 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org1.example.com | [262 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28430] for tx number:[0] ID: [fd92ece786eb33a140499e967ed74e3a3bbcb8e88456d50f7454e373b6da94d6] to blockNumTranNum index +orderer0.example.com | "2020-08-31 20:50:43.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ac Processing field: ConsensusType" +peer0.org1.example.com | [263 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28476], isChainEmpty=[false], lastBlockNumber=[0] +peer0.org1.example.com | [264 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +peer1.org2.example.com | [375 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | [265 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +peer0.org1.example.com | [266 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +peer0.org1.example.com | [267 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +peer0.org1.example.com | [268 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +peer0.org1.example.com | [269 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +peer0.org1.example.com | [26a 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org1.example.com | [26b 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [26c 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +peer0.org1.example.com | [26d 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +peer0.org1.example.com | [26f 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [26e 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +peer0.org1.example.com | [270 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [271 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org1.example.com | [272 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org2.example.com | [312 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 ee 7b 72 f4 78 ce 93 cd cb 23 14 91 44 a8 b1 |..{r.x....#..D..| +peer1.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | [36b 08-31 20:50:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU [abb47d68] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [273 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +orderer0.example.com | "2020-08-31 20:50:43.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ad Processing field: BatchSize" +peer0.org2.example.com | 00000010 ca d1 c3 09 1f 1d cb 18 6d 90 bc f0 b6 18 ed 0a |........m.......| +peer1.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org1.example.com | [36c 08-31 20:50:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU [abb47d68] notifying Txid:abb47d68c2e4f4fa214c136a2249db8615c4e914354017dad27df8a0e5b9ac05, channelID: +peer0.org1.example.com | [274 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +orderer0.example.com | "2020-08-31 20:50:43.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ae Processing field: BatchTimeout" +peer0.org2.example.com | [313 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 54 00 e9 d9 95 16 75 e4 02 b0 83 |0D. .T.....u....| +peer1.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org1.example.com | [36d 08-31 20:50:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [276 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +orderer0.example.com | "2020-08-31 20:50:43.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2af Processing field: KafkaBrokers" +peer0.org2.example.com | 00000010 95 cf 52 86 07 f2 ae 92 7c d6 3a c9 15 3c 1b 5e |..R.....|.:..<.^| +peer1.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org1.example.com | [36e 08-31 20:50:58.06 UTC] [%{longpkg}] %{callpath} -> INFO [][abb47d68] Exit chaincode: name:"cscc" (91ms) +peer0.org1.example.com | [277 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +peer0.org1.example.com | [275 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | 00000020 37 7a 5d 53 02 20 6f 65 cb 88 cc ec dc 94 ea c7 |7z]S. oe........| +peer1.org2.example.com | nw== +peer1.org1.example.com | [36f 08-31 20:50:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU [][abb47d68] Exit +peer0.org1.example.com | [278 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +orderer0.example.com | "2020-08-31 20:50:43.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b0 Processing field: ChannelRestrictions" +peer0.org2.example.com | 00000030 f5 09 51 14 98 c3 6c 80 57 78 c8 6a 12 ce 3e 3f |..Q...l.Wx.j..>?| +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [370 08-31 20:50:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:53336 +peer0.org1.example.com | [279 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +orderer0.example.com | "2020-08-31 20:50:43.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b1 Processing field: Capabilities" +peer0.org2.example.com | 00000040 00 38 1c aa 13 c7 |.8....| +peer1.org2.example.com | [376 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org1.example.com | [371 08-31 20:50:58.06 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:53336 grpc.code=OK grpc.call_duration=96.9673ms +peer0.org1.example.com | [27a 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org1.example.com | [27b 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +orderer0.example.com | "2020-08-31 20:50:43.517 UTC [common.channelconfig] NewStandardValues -> DEBU 2b2 Initializing protos for *channelconfig.OrdererOrgProtos" +peer1.org2.example.com | [377 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | [372 08-31 20:50:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.8:7051->172.18.0.9:53336: read: connection reset by peer +peer0.org1.example.com | [27c 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 22ms (state_validation=7ms block_and_pvtdata_commit=8ms state_commit=4ms) commitHash=[] +orderer0.example.com | "2020-08-31 20:50:43.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b3 Processing field: Endpoints" +peer0.org2.example.com | [314 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9ad0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [378 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [373 08-31 20:50:58.06 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [27d 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +orderer0.example.com | "2020-08-31 20:50:43.517 UTC [common.channelconfig] NewStandardValues -> DEBU 2b4 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org2.example.com | [315 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9ad0 gate 1598907064097500500 evaluation succeeds +peer1.org2.example.com | [379 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [27e 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [805bb9d3-d762-4cc4-9490-4bacd6ad389e] +orderer0.example.com | "2020-08-31 20:50:43.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b5 Processing field: MSP" +peer0.org2.example.com | [316 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [37a 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [374 08-31 20:50:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting, peers found 0 +peer0.org1.example.com | [27f 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +orderer0.example.com | "2020-08-31 20:50:43.517 UTC [common.channelconfig] validateMSP -> DEBU 2b6 Setting up MSP for org OrdererOrg" +peer0.org2.example.com | [317 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [37b 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [375 08-31 20:50:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer0.org1.example.com | [280 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [805bb9d3-d762-4cc4-9490-4bacd6ad389e] +orderer0.example.com | "2020-08-31 20:50:43.517 UTC [msp] newBccspMsp -> DEBU 2b7 Creating BCCSP-based MSP instance" +peer0.org2.example.com | [318 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [37c 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [376 08-31 20:50:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer0.org1.example.com | [281 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +orderer0.example.com | "2020-08-31 20:50:43.517 UTC [msp] New -> DEBU 2b8 Creating Cache-MSP instance" +peer0.org2.example.com | [319 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [37d 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org1.example.com | [377 08-31 20:50:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer0.org1.example.com | [282 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +orderer0.example.com | "2020-08-31 20:50:43.517 UTC [msp] Setup -> DEBU 2b9 Setting up MSP instance OrdererMSP" +peer0.org2.example.com | [31a 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [37e 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | [378 08-31 20:50:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [283 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +orderer0.example.com | "2020-08-31 20:50:43.518 UTC [msp.identity] newIdentity -> DEBU 2ba Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [31b 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +peer1.org2.example.com | [37f 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [379 08-31 20:50:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...3D9B120C08E0BB98C1F7AF9D98161001 +peer0.org1.example.com | [284 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | [380 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [285 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [381 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [382 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [286 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org1.example.com | [287 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | [31c 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [37a 08-31 20:50:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A748B89AB528B69B12AF61FF79BC05BA6EDA6E8AC1106D01EA9974E6108135F8 +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | [288 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | [31d 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37b 08-31 20:50:59.05 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | [289 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org2.example.com | [31e 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37c 08-31 20:50:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:53344 +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org1.example.com | [28a 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | [31f 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37d 08-31 20:50:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002b5bd60 +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org1.example.com | [28b 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org2.example.com | [320 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [37e 08-31 20:50:59.11 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | [28c 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org2.example.com | [321 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37f 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org1.example.com | [28d 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [322 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [380 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org1.example.com | [28e 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org2.example.com | [323 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 9492522150986590262, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [381 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org1.example.com | [28f 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org2.example.com | [324 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:?\0008\034\252\023\307" > alive: +peer1.org1.example.com | [382 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a 29 f8 83 c8 90 b8 28 b9 22 53 79 50 8f 94 ca |J).....(."SyP...| +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | nw== +peer0.org1.example.com | [290 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [325 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9492522150986590262, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 86 70 6a 6f f7 c6 f2 86 49 4c 6a 80 4c f3 cb 15 |.pjo....ILj.L...| +peer1.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [291 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [292 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org1.example.com | [383 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 54 ef 89 53 1a ab c1 0b 41 eb 06 |0D. HT..S....A..| +peer1.org1.example.com | 00000010 a9 f1 0c fc 41 b9 a3 11 4b 67 01 36 76 08 b4 33 |....A...Kg.6v..3| +peer1.org1.example.com | 00000020 07 35 b6 18 02 20 7a 85 c9 50 13 e1 ad 0f c8 5d |.5... z..P.....]| +orderer0.example.com | "2020-08-31 20:50:43.519 UTC [common.channelconfig] NewStandardValues -> DEBU 2bb Initializing protos for *channelconfig.ConsortiumProtos" +peer0.org1.example.com | [293 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [326 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 43 9e 9a d8 af fd 50 a2 f0 f9 87 11 f6 e4 9f 03 |C.....P.........| +peer1.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | "2020-08-31 20:50:43.519 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2bc Processing field: ChannelCreationPolicy" +peer0.org1.example.com | [294 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [327 08-31 20:51:04.11 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.114Z grpc.peer_address=172.18.0.8:34436 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=99.9µs +peer1.org1.example.com | 00000040 21 96 b0 b9 b3 8c |!.....| +peer1.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | "2020-08-31 20:50:43.519 UTC [common.channelconfig] NewStandardValues -> DEBU 2bd Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | [295 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org2.example.com | [328 08-31 20:51:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [384 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | -----END CERTIFICATE----- +orderer0.example.com | "2020-08-31 20:50:43.519 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2be Processing field: MSP" +peer0.org1.example.com | [296 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [329 08-31 20:51:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer1.org1.example.com | [385 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0003eeb60, header 0xc003272190 +peer1.org2.example.com | [383 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +orderer0.example.com | "2020-08-31 20:50:43.519 UTC [common.channelconfig] validateMSP -> DEBU 2bf Setting up MSP for org Org1MSP" +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | [32a 08-31 20:51:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer1.org1.example.com | [386 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org2.example.com | [384 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +orderer0.example.com | "2020-08-31 20:50:43.519 UTC [msp] newBccspMsp -> DEBU 2c0 Creating BCCSP-based MSP instance" +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [32b 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU 2c1 Creating Cache-MSP instance" +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | [32c 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:34436 +peer1.org1.example.com | [388 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU [][fba0f36c] Entry chaincode: name:"cscc" +peer1.org2.example.com | [386 08-31 20:51:04.54 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +orderer0.example.com | "2020-08-31 20:50:43.519 UTC [msp] Setup -> DEBU 2c2 Setting up MSP instance Org1MSP" +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org2.example.com | [32d 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [389 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> INFO [][fba0f36c] Entry chaincode: name:"cscc" +peer1.org2.example.com | [387 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +orderer0.example.com | "2020-08-31 20:50:43.520 UTC [msp.identity] newIdentity -> DEBU 2c3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | [32e 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38a 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [388 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | [32f 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [38b 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer1.org2.example.com | [389 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [38c 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [38a 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [38d 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [38b 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org2.example.com | [38c 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [38e 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | [38f 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a 29 f8 83 c8 90 b8 28 b9 22 53 79 50 8f 94 ca |J).....(."SyP...| +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | 00000010 86 70 6a 6f f7 c6 f2 86 49 4c 6a 80 4c f3 cb 15 |.pjo....ILj.L...| +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org1.example.com | [390 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 54 ef 89 53 1a ab c1 0b 41 eb 06 |0D. HT..S....A..| +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer1.org1.example.com | 00000010 a9 f1 0c fc 41 b9 a3 11 4b 67 01 36 76 08 b4 33 |....A...Kg.6v..3| +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | nw== +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer1.org1.example.com | 00000020 07 35 b6 18 02 20 7a 85 c9 50 13 e1 ad 0f c8 5d |.5... z..P.....]| +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | -----END CERTIFICATE----- +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org2.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org1.example.com | 00000030 43 9e 9a d8 af fd 50 a2 f0 f9 87 11 f6 e4 9f 03 |C.....P.........| +peer1.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | [297 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer1.org1.example.com | 00000040 21 96 b0 b9 b3 8c |!.....| +peer1.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org1.example.com | [298 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org2.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer1.org1.example.com | [391 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU [fba0f36c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer1.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org1.example.com | [299 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | -----END CERTIFICATE----- +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | [392 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU [fba0f36c] notifying Txid:fba0f36c2ef2a97581d7fe68700398cf938714384424ada595f1e599edbe58f7, channelID: +peer1.org1.example.com | [393 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [29a 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [29b 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [330 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +orderer0.example.com | "2020-08-31 20:50:43.520 UTC [common.channelconfig] NewStandardValues -> DEBU 2c4 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org1.example.com | [394 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> INFO [][fba0f36c] Exit chaincode: name:"cscc" (1ms) +peer0.org1.example.com | [29c 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [38d 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org2.example.com | [331 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +orderer0.example.com | "2020-08-31 20:50:43.521 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c5 Processing field: MSP" +peer1.org1.example.com | [395 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU [][fba0f36c] Exit +peer0.org1.example.com | [29d 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [38e 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +orderer0.example.com | "2020-08-31 20:50:43.521 UTC [common.channelconfig] validateMSP -> DEBU 2c6 Setting up MSP for org Org2MSP" +peer0.org2.example.com | [332 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [396 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:53344 +peer0.org1.example.com | [29e 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org2.example.com | [38f 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +orderer0.example.com | "2020-08-31 20:50:43.521 UTC [msp] newBccspMsp -> DEBU 2c7 Creating BCCSP-based MSP instance" +peer0.org2.example.com | [333 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [397 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:53344 grpc.code=OK grpc.call_duration=2.8385ms +peer0.org1.example.com | [29f 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org2.example.com | [390 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +orderer0.example.com | "2020-08-31 20:50:43.521 UTC [msp] New -> DEBU 2c8 Creating Cache-MSP instance" +peer0.org2.example.com | [334 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [398 08-31 20:50:59.12 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2a0 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [391 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +orderer0.example.com | "2020-08-31 20:50:43.521 UTC [msp] Setup -> DEBU 2c9 Setting up MSP instance Org2MSP" +peer0.org2.example.com | [335 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [399 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:53352 +peer0.org1.example.com | [2a1 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [392 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +orderer0.example.com | "2020-08-31 20:50:43.521 UTC [msp.identity] newIdentity -> DEBU 2ca Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [336 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39a 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003272d70 +peer0.org1.example.com | [2a2 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [393 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | [337 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [39b 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2a3 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [394 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [338 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [39c 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [395 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [339 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [39d 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [396 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | [33a 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [39e 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [397 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [33b 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [39f 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 73 4d d2 c8 93 63 72 25 bd 9a ab 74 52 39 50 |.sM...cr%...tR9P| +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | [398 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | [33c 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000010 47 39 2c d8 ac be 18 3f dd 3d 2a 8b 20 e5 6e e6 |G9,....?.=*. .n.| +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [399 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | [33d 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00310f7d0 gate 1598907064129534200 evaluation starts +peer1.org1.example.com | [3a0 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 3c ab 19 3e b6 91 72 58 c3 d7 52 |0D. 7<..>..rX..R| +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | [39a 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org2.example.com | [33e 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00310f7d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 9f 94 47 a7 b1 34 15 76 3e 8f ab 6e f6 51 35 ff |..G..4.v>..n.Q5.| +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | [39b 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | [33f 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00310f7d0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000020 e1 9b 25 36 02 20 30 de 6d 3b a7 d2 05 85 f2 e6 |..%6. 0.m;......| +peer0.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org2.example.com | [39c 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org2.example.com | [340 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | 00000030 45 b2 f0 95 b6 32 fc 01 e9 e1 f4 c3 29 14 dd f2 |E....2......)...| +peer0.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | [39d 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | [341 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | 00000040 2e 28 a7 33 c8 b1 |.(.3..| +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org2.example.com | [39e 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org2.example.com | [342 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [3a1 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | [39f 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org2.example.com | [343 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00310f7d0 principal matched by identity 0 +peer1.org1.example.com | [3a2 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0003eefc0, header 0xc003273180 +peer0.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | [3a0 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org2.example.com | [3a1 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [344 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer1.org1.example.com | [3a3 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org2.example.com | [3a2 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer1.org1.example.com | [3a4 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU [][18e58d2e] processing txid: 18e58d2e52ab8182fb9089aec190621b9f79ca5feb5a2945de78cad0a6784bf2 +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [3a3 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +orderer0.example.com | "2020-08-31 20:50:43.522 UTC [msp] Setup -> DEBU 2cb Setting up the MSP manager (3 msps)" +peer0.org2.example.com | [345 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ec 8e 8b 0c 11 ba 24 06 f0 18 8b |0E.!.......$....| +peer1.org1.example.com | [3a5 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU [][18e58d2e] Entry chaincode: name:"qscc" +peer0.org1.example.com | [2a4 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [2a5 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +orderer0.example.com | "2020-08-31 20:50:43.522 UTC [msp] Setup -> DEBU 2cc MSP manager setup complete, setup 3 msps" +peer0.org2.example.com | 00000010 cf 03 85 54 af 65 22 e0 af 11 ea cc 56 f9 a5 1a |...T.e".....V...| +peer1.org1.example.com | [3a6 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> INFO [][18e58d2e] Entry chaincode: name:"qscc" +peer0.org1.example.com | [2a6 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +orderer0.example.com | "2020-08-31 20:50:43.522 UTC [policies] NewManagerImpl -> DEBU 2cd Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +peer1.org2.example.com | [3a4 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org2.example.com | 00000020 eb 24 0a b7 ea 02 20 70 76 66 11 2c d7 61 c1 7a |.$.... pvf.,.a.z| +peer1.org1.example.com | [3a7 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2a7 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +orderer0.example.com | "2020-08-31 20:50:43.522 UTC [policies] NewManagerImpl -> DEBU 2ce Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +peer1.org2.example.com | [3a5 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | 00000030 d4 38 a2 89 68 c8 53 7b 96 9b eb b5 e7 46 08 6b |.8..h.S{.....F.k| +peer1.org1.example.com | [3a8 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer0.org1.example.com | [2a8 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +orderer0.example.com | "2020-08-31 20:50:43.522 UTC [policies] NewManagerImpl -> DEBU 2cf Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +peer1.org2.example.com | [3a6 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | 00000040 63 82 f2 2e 93 40 7f |c....@.| +peer1.org1.example.com | [3a9 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer0.org1.example.com | [2a9 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +orderer0.example.com | "2020-08-31 20:50:43.522 UTC [policies] NewManagerImpl -> DEBU 2d0 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +peer1.org2.example.com | [3a7 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [346 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00310f7d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3aa 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [2aa 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +orderer0.example.com | "2020-08-31 20:50:43.522 UTC [policies] NewManagerImpl -> DEBU 2d1 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +peer1.org2.example.com | [3a8 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org1.example.com | [3ab 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [347 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00310f7d0 gate 1598907064129534200 evaluation succeeds +peer0.org2.example.com | [348 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [349 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2ab 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [3ac 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3ad 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [34a 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2ac 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [2ad 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [3a9 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | [34b 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [3aa 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org1.example.com | [3ae 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:50:43.522 UTC [policies] NewManagerImpl -> DEBU 2d2 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +peer0.org2.example.com | [34c 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:34436 +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [3ab 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org1.example.com | [3af 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2020-08-31 20:50:43.522 UTC [policies] NewManagerImpl -> DEBU 2d3 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +peer0.org2.example.com | [34d 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:34436 +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | [3ac 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | "2020-08-31 20:50:43.522 UTC [policies] NewManagerImpl -> DEBU 2d4 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +peer0.org2.example.com | [34e 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [3ad 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | "2020-08-31 20:50:43.522 UTC [policies] NewManagerImpl -> DEBU 2d5 Proposed new policy Admins for Channel/Consortiums" +peer0.org2.example.com | [34f 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | [3ae 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | "2020-08-31 20:50:43.523 UTC [policies] NewManagerImpl -> DEBU 2d6 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer0.org2.example.com | [350 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:34436 disconnected +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | [3af 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | "2020-08-31 20:50:43.523 UTC [policies] NewManagerImpl -> DEBU 2d7 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer0.org2.example.com | [351 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:51:14.117Z grpc.peer_address=172.18.0.8:34436 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=33.4771ms +peer0.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org2.example.com | [3b0 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | "2020-08-31 20:50:43.525 UTC [policies] NewManagerImpl -> DEBU 2d8 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer0.org2.example.com | [352 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | [3b1 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +orderer0.example.com | "2020-08-31 20:50:43.525 UTC [policies] NewManagerImpl -> DEBU 2d9 Proposed new policy BlockValidation for Channel/Orderer" +peer0.org2.example.com | [353 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.162Z grpc.peer_address=172.18.0.8:34440 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=119.2µs +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org2.example.com | [3b2 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +orderer0.example.com | "2020-08-31 20:50:43.525 UTC [policies] NewManagerImpl -> DEBU 2da Proposed new policy Readers for Channel/Orderer" +peer0.org2.example.com | [354 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org2.example.com | [3b3 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +orderer0.example.com | "2020-08-31 20:50:43.525 UTC [policies] NewManagerImpl -> DEBU 2db Proposed new policy Writers for Channel/Orderer" +peer0.org2.example.com | [355 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org2.example.com | [3b4 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | "2020-08-31 20:50:43.525 UTC [policies] NewManagerImpl -> DEBU 2dc Proposed new policy Admins for Channel/Orderer" +peer0.org2.example.com | [356 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org2.example.com | [3b5 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +orderer0.example.com | "2020-08-31 20:50:43.525 UTC [policies] GetPolicy -> DEBU 2dd Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +peer0.org2.example.com | [357 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU 2de Proposed new policy Writers for Channel" +peer0.org2.example.com | [358 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:34440 +peer0.org1.example.com | [2ae 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org2.example.com | [3b7 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +orderer0.example.com | "2020-08-31 20:50:43.525 UTC [policies] NewManagerImpl -> DEBU 2df Proposed new policy Admins for Channel" +peer0.org2.example.com | [359 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2af 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org2.example.com | [3b8 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | -----END CERTIFICATE----- +orderer0.example.com | "2020-08-31 20:50:43.526 UTC [policies] GetPolicy -> DEBU 2e0 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +peer0.org2.example.com | [35a 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2b0 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [3b9 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [3b0 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c82e0 gate 1598907059999225500 evaluation starts +orderer0.example.com | "2020-08-31 20:50:43.526 UTC [policies] NewManagerImpl -> DEBU 2e1 Proposed new policy Readers for Channel" +peer0.org2.example.com | [35b 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b1 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [3ba 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [3b1 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c82e0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:50:43.526 UTC [common.configtx] addToMap -> DEBU 2e2 Adding to config map: [Group] /Channel" +peer0.org1.example.com | [2b2 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [3bb 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [35c 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3b2 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c82e0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:50:43.526 UTC [common.configtx] addToMap -> DEBU 2e3 Adding to config map: [Group] /Channel/Orderer" +peer0.org1.example.com | [2b3 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org2.example.com | [3bc 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [35d 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b3 08-31 20:50:59.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c82e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:50:43.526 UTC [common.configtx] addToMap -> DEBU 2e4 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org1.example.com | [2b4 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org2.example.com | [3bd 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [35e 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3b4 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c82e0 principal evaluation fails +orderer0.example.com | "2020-08-31 20:50:43.526 UTC [common.configtx] addToMap -> DEBU 2e5 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org1.example.com | [2b5 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org2.example.com | [3be 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [35f 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3b5 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c82e0 gate 1598907059999225500 evaluation fails +orderer0.example.com | "2020-08-31 20:50:43.526 UTC [common.configtx] addToMap -> DEBU 2e6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org1.example.com | [2b6 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org2.example.com | [3bf 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [360 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3b6 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b7 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b8 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3b9 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c9130 gate 1598907060001372500 evaluation starts +peer1.org1.example.com | [3ba 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c9130 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3bb 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c9130 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3bc 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [3bd 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [3be 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [3bf 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c9130 principal matched by identity 0 +peer0.org1.example.com | [2b7 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org1.example.com | [3c0 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 73 4d d2 c8 93 63 72 25 bd 9a ab 74 52 39 50 |.sM...cr%...tR9P| +peer0.org1.example.com | [2b8 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org2.example.com | [3c0 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [2b9 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org2.example.com | [3c1 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [3c2 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2ba 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer1.org2.example.com | [3c3 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +orderer0.example.com | "2020-08-31 20:50:43.526 UTC [common.configtx] addToMap -> DEBU 2e7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [361 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000010 47 39 2c d8 ac be 18 3f dd 3d 2a 8b 20 e5 6e e6 |G9,....?.=*. .n.| +peer0.org1.example.com | [2bb 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org1.example.com | [2bc 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +peer0.org1.example.com | [2bd 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org1.example.com | [2be 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org1.example.com | [3c1 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 3c ab 19 3e b6 91 72 58 c3 d7 52 |0D. 7<..>..rX..R| +peer1.org1.example.com | 00000010 9f 94 47 a7 b1 34 15 76 3e 8f ab 6e f6 51 35 ff |..G..4.v>..n.Q5.| +peer0.org1.example.com | [2bf 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org1.example.com | [2c0 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org1.example.com | [2c1 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org1.example.com | [2c2 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org2.example.com | [3c4 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [3c5 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [2c3 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org2.example.com | [3c6 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | 00000020 e1 9b 25 36 02 20 30 de 6d 3b a7 d2 05 85 f2 e6 |..%6. 0.m;......| +orderer0.example.com | "2020-08-31 20:50:43.526 UTC [common.configtx] addToMap -> DEBU 2e8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2e9 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2ea Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2eb Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2ec Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2ed Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2ee Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2ef Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2f0 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2f1 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2f2 Adding to config map: [Group] /Channel/Consortiums" +orderer0.example.com | "2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2f3 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +orderer0.example.com | "2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2f4 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2f5 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +orderer0.example.com | "2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2f6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +orderer0.example.com | "2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2f7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2f8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 2f9 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 2fa Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 2fb Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 2fc Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 2fd Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 2fe Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 2ff Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +peer0.org1.example.com | [2c4 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 300 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +peer0.org1.example.com | [2c5 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org2.example.com | [3c7 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [362 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [363 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 301 Adding to config map: [Policy] /Channel/Consortiums/Admins" +peer0.org1.example.com | [2c6 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org2.example.com | [3c8 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [364 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317eab0 gate 1598907064172165200 evaluation starts +peer1.org1.example.com | 00000030 45 b2 f0 95 b6 32 fc 01 e9 e1 f4 c3 29 14 dd f2 |E....2......)...| +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 302 Adding to config map: [Value] /Channel/Capabilities" +peer1.org2.example.com | [3c9 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [2c7 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [365 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317eab0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000040 2e 28 a7 33 c8 b1 |.(.3..| +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 303 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer1.org2.example.com | [3ca 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [366 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317eab0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3c2 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c9130 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 304 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer1.org2.example.com | [3cb 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org1.example.com | [2c8 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | [367 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317eab0 principal matched by identity 0 +peer0.org2.example.com | [368 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer1.org1.example.com | [3c3 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c9130 gate 1598907060001372500 evaluation succeeds +peer1.org2.example.com | [3cc 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org1.example.com | [2c9 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer1.org1.example.com | [3c4 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 305 Adding to config map: [Value] /Channel/OrdererAddresses" +peer1.org2.example.com | [3cd 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org1.example.com | [2ca 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org2.example.com | [369 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f ac fa 89 78 9c 95 30 65 ff f7 39 |0D. o...x..0e..9| +peer1.org1.example.com | [3c5 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 306 Adding to config map: [Policy] /Channel/Writers" +peer1.org2.example.com | [3ce 08-31 20:51:04.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org1.example.com | [2cb 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org2.example.com | 00000010 5c 46 96 60 d7 50 f6 a5 d3 87 17 8b 0b 62 11 3e |\F.`.P.......b.>| +peer1.org1.example.com | [3c6 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 307 Adding to config map: [Policy] /Channel/Admins" +peer1.org2.example.com | [3cf 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org1.example.com | [2cc 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | 00000020 40 6d 88 e8 02 20 54 2c 07 62 1a 88 5a 8c 50 d3 |@m... T,.b..Z.P.| +peer1.org1.example.com | [3c7 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 308 Adding to config map: [Policy] /Channel/Readers" +peer1.org2.example.com | [3d0 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org1.example.com | [2cd 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org2.example.com | 00000030 46 29 7a 73 f3 83 51 d5 e2 24 26 0c 3c a2 d2 78 |F)zs..Q..$&.<..x| +peer1.org1.example.com | [3c8 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU [18e58d2e] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.channelconfig] LogSanityChecks -> DEBU 309 As expected, current configuration has policy '/Channel/Readers'" +peer1.org2.example.com | [3d1 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org2.example.com | [3d2 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org2.example.com | [3d3 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org2.example.com | [3d4 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org2.example.com | [3d5 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [3d6 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [3d7 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [3d8 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [3d9 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [3da 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [2ce 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [3db 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org2.example.com | [3dc 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org1.example.com | [2cf 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org1.example.com | [3c9 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU [18e58d2e] notifying Txid:18e58d2e52ab8182fb9089aec190621b9f79ca5feb5a2945de78cad0a6784bf2, channelID: +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.channelconfig] LogSanityChecks -> DEBU 30a As expected, current configuration has policy '/Channel/Writers'" +peer1.org2.example.com | [3dd 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org1.example.com | [2d0 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org1.example.com | [2d1 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org1.example.com | [2d2 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org1.example.com | [3ca 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [3de 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org2.example.com | [3df 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | 00000040 a7 17 7d 75 55 ef |..}uU.| +peer1.org1.example.com | [3cb 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> INFO [][18e58d2e] Exit chaincode: name:"qscc" (6ms) +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [policies] Manager -> DEBU 30b Manager Channel looking up path [Application]" +peer1.org2.example.com | [3e0 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [2d3 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org2.example.com | [36a 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317eab0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3cc 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU [][18e58d2e] Exit +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [policies] Manager -> DEBU 30c Manager Channel has managers Consortiums" +peer1.org2.example.com | [3e1 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org1.example.com | [2d4 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org2.example.com | [36b 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317eab0 gate 1598907064172165200 evaluation succeeds +peer0.org2.example.com | [36c 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3cd 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:53352 +peer1.org2.example.com | [3e2 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org2.example.com | [3e3 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org2.example.com | [3e4 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org2.example.com | [3e5 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org2.example.com | [3e6 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org2.example.com | [3e7 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org2.example.com | [3e8 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org1.example.com | [2d5 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [3e9 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org2.example.com | [3ea 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org2.example.com | [3eb 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer1.org2.example.com | [3ec 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org2.example.com | [3ed 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [3ee 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org1.example.com | [2d6 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [3ef 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org2.example.com | [3f0 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer0.org2.example.com | [36d 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3ce 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:53352 grpc.code=OK grpc.call_duration=11.3925ms +peer1.org1.example.com | [3cf 08-31 20:51:00.00 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [3f1 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [3f2 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f3 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org2.example.com | [3f4 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org2.example.com | [3f5 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [3f6 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [3f7 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org1.example.com | [2d7 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [3f8 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [3f9 08-31 20:51:04.56 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0032513d0, CONNECTING +peer1.org2.example.com | [3fa 08-31 20:51:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0032513d0, READY +peer1.org2.example.com | [3fb 08-31 20:51:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3fc 08-31 20:51:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [3fd 08-31 20:51:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [3fe 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer1.org2.example.com | [3ff 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org2.example.com | [400 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org2.example.com | [401 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [402 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [403 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org2.example.com | [404 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org1.example.com | [2d8 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [2d9 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [2da 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [2db 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [2dc 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [405 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org1.example.com | [2dd 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2de 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [36e 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3d0 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [406 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org1.example.com | [2df 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [36f 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [policies] Manager -> DEBU 30d Manager Channel has managers Orderer" +peer1.org1.example.com | [3d1 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D9816100A +peer1.org2.example.com | [407 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002f31900 env 0xc002f878b0 txn 0 +peer0.org1.example.com | [2e0 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [370 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:34440 +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [policies] Manager -> DEBU 30e Manager Channel looking up path [Orderer]" +peer1.org1.example.com | [3d2 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C8460124253338E8FE5B5FAE4811EB805CC1B08AAF2A11ABC2694FDDBC9A1ED5 +peer1.org1.example.com | [3d3 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [408 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [2e1 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [371 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:34440 +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [policies] Manager -> DEBU 30f Manager Channel has managers Consortiums" +peer1.org1.example.com | [3d4 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [409 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 64ms +peer0.org1.example.com | [2e2 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [policies] Manager -> DEBU 310 Manager Channel has managers Orderer" +peer0.org2.example.com | [372 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:10715564970673300445 tag:EMPTY mem_req:\241" > > , Envelope: 177 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d5 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | [40a 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [2e3 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [policies] Manager -> DEBU 311 Manager Channel/Orderer looking up path []" +peer0.org2.example.com | [373 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d6 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | [2e4 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [policies] Manager -> DEBU 312 Manager Channel/Orderer has managers OrdererOrg" +peer0.org2.example.com | [374 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:10715564970673300445 tag:EMPTY mem_req:\241" > > , Envelope: 177 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d7 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3d8 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3d9 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [375 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3da 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | [2e5 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.channelconfig] LogSanityChecks -> DEBU 313 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org2.example.com | [376 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3db 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | [2e6 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.channelconfig] LogSanityChecks -> DEBU 314 As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer0.org2.example.com | [377 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3dc 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | [2e7 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.channelconfig] LogSanityChecks -> DEBU 315 As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer0.org2.example.com | [378 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | [3dd 08-31 20:51:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2e8 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.channelconfig] LogSanityChecks -> DEBU 316 As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer0.org2.example.com | [379 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | [3de 08-31 20:51:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2e9 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.capabilities] Supported -> DEBU 317 Orderer capability V1_4_2 is supported and is enabled" +peer0.org2.example.com | [37a 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org1.example.com | [3df 08-31 20:51:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 05 66 be 9e f2 e7 99 db 13 b1 a3 32 51 7d d5 |V.f.........2Q}.| +peer0.org1.example.com | [2ea 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [common.capabilities] Supported -> DEBU 318 Channel capability V1_4_3 is supported and is enabled" +peer0.org2.example.com | [37b 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | 00000010 55 dd 9a 89 3b a4 8f 85 1f 20 e6 9f 1f e8 85 d4 |U...;.... ......| +peer0.org1.example.com | [2eb 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [orderer.common.server] func1 -> DEBU 319 Executing callback to update root CAs" +peer0.org2.example.com | [37c 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | [3e0 08-31 20:51:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 7d b1 4d 9f 97 d6 03 0a 12 b1 ad |0D. %}.M........| +peer0.org1.example.com | [2ec 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [orderer.common.server] updateTrustedRoots -> DEBU 31a updating root CAs for channel [testchainid]" +peer0.org2.example.com | [37d 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319c030 gate 1598907064193806700 evaluation starts +peer1.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org1.example.com | 00000010 7c fb 73 d9 0d 2d b7 cb 7f 72 e2 ae db f6 12 76 ||.s..-...r.....v| +peer1.org1.example.com | 00000020 89 34 10 00 02 20 42 52 ef 00 80 8d 76 d5 f3 74 |.4... BR....v..t| +peer1.org1.example.com | 00000030 c0 30 10 a5 77 49 1d 08 a4 e6 c7 92 33 bf 20 ba |.0..wI......3. .| +peer0.org1.example.com | [2ed 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org1.example.com | 00000040 52 b0 f1 2e d8 bf |R.....| +peer0.org1.example.com | [2ee 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org2.example.com | [37e 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319c030 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [orderer.common.server] updateTrustedRoots -> DEBU 31b adding orderer root CAs for MSP [OrdererMSP]" +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [40b 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [2ef 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org2.example.com | [37f 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319c030 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:50:43.528 UTC [orderer.common.server] updateTrustedRoots -> DEBU 31c adding app root CAs for MSP [Org1MSP]" +peer1.org2.example.com | [40c 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [2f0 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org1.example.com | [3e1 08-31 20:51:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [380 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319c030 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:50:43.529 UTC [orderer.common.server] updateTrustedRoots -> DEBU 31d adding app root CAs for MSP [Org2MSP]" +peer1.org2.example.com | [40d 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [2f1 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | [381 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 80 45 14 27 44 2b 05 04 95 01 7d 80 39 c3 19 |..E.'D+....}.9..| +orderer0.example.com | "2020-08-31 20:50:43.529 UTC [fsblkstorage] Next -> DEBU 31e Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +peer1.org2.example.com | [40e 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [2f2 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org1.example.com | [3e2 08-31 20:51:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 0c fb d2 f7 41 1b 0a 2c b3 d7 |0E.!......A..,..| +peer0.org2.example.com | 00000010 f0 a3 17 0d df ae 86 a1 85 56 de 7c 76 83 df 9c |.........V.|v...| +peer1.org2.example.com | [40f 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:50:43.529 UTC [fsblkstorage] newBlockfileStream -> DEBU 31f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +peer0.org1.example.com | [2f3 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org1.example.com | 00000010 70 39 10 7d f0 4c 9e 86 fe 5c 12 c4 77 43 cd 88 |p9.}.L...\..wC..| +peer0.org2.example.com | [382 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 c8 d2 3c bb 9b b9 12 9a fb a7 |0E.!....<.......| +peer1.org2.example.com | [410 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:50:43.529 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 320 Remaining bytes=[22930], Going to peek [8] bytes" +peer0.org1.example.com | [2f4 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org1.example.com | 00000020 f2 c6 f2 5a f7 02 20 21 13 c4 6e 90 8b 1d 60 53 |...Z.. !..n...`S| +peer0.org2.example.com | 00000010 5f 7e 52 53 82 fc 22 7d 77 96 49 bc 87 67 d1 18 |_~RS.."}w.I..g..| +peer1.org2.example.com | [411 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:50:43.529 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 321 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer0.org1.example.com | [2f5 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org1.example.com | 00000030 0b 9e d0 dd 3b be 8f 66 34 43 1c b6 c0 f5 2a 5f |....;..f4C....*_| +peer0.org2.example.com | 00000020 9a 02 c4 08 86 02 20 66 93 d5 01 7f 13 e5 5b fb |...... f......[.| +peer1.org2.example.com | [412 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +orderer0.example.com | "2020-08-31 20:50:43.529 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 322 blockbytes [22927] read from file [0]" +peer0.org1.example.com | [2f6 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org1.example.com | 00000040 3e 0f 49 95 34 44 6e |>.I.4Dn| +peer0.org2.example.com | 00000030 6d 95 ab 5e 75 28 e7 83 fa 50 85 c9 33 11 35 ad |m..^u(...P..3.5.| +peer1.org2.example.com | [413 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2020-08-31 20:50:43.529 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 323 [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" +peer0.org1.example.com | [2f7 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [3e3 08-31 20:51:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | 00000040 73 6c 63 d9 aa 3e a1 |slc..>.| +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | "2020-08-31 20:50:43.530 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 324 EvictionSuspicion not set, defaulting to 10m0s" +peer0.org1.example.com | [2f8 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [3e4 08-31 20:51:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [383 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319c030 principal evaluation succeeds for identity 0 +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | "2020-08-31 20:50:43.530 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 325 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 +peer0.org1.example.com | [2f9 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [3e5 08-31 20:51:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [384 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319c030 gate 1598907064193806700 evaluation succeeds +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | [2fa 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [2fb 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [2fc 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [2fd 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org1.example.com | [2fe 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org1.example.com | [2ff 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org1.example.com | [300 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +orderer0.example.com | "2020-08-31 20:50:43.530 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 326 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | [3e6 08-31 20:51:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [301 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [385 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:50:43.541 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 327 Loading WAL at Term 0 and Index 0" channel=testchainid node=1 +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | [3e7 08-31 20:51:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [302 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [386 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:50:43.542 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 328 Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | [3e8 08-31 20:51:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [303 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org2.example.com | [387 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [414 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [415 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +peer1.org2.example.com | [416 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [417 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [418 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [419 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [304 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org1.example.com | [305 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org1.example.com | [306 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org1.example.com | [307 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org1.example.com | [308 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org1.example.com | [309 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org1.example.com | [30a 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org1.example.com | [30b 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer0.org1.example.com | [30c 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +peer0.org1.example.com | [30d 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [30e 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org1.example.com | [30f 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org1.example.com | [310 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +peer0.org1.example.com | [311 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org1.example.com | [312 08-31 20:50:57.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org1.example.com | [313 08-31 20:50:57.79 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org1.example.com | [314 08-31 20:50:57.79 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org1.example.com | [315 08-31 20:50:57.79 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org1.example.com | [316 08-31 20:50:57.79 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +peer0.org1.example.com | [317 08-31 20:50:57.79 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +peer0.org1.example.com | [318 08-31 20:50:57.79 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +peer0.org1.example.com | [319 08-31 20:50:57.80 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [31a 08-31 20:50:57.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [31b 08-31 20:50:57.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +peer0.org1.example.com | [31c 08-31 20:50:57.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +peer0.org1.example.com | [31d 08-31 20:50:57.80 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +peer0.org1.example.com | [31e 08-31 20:50:57.80 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +peer0.org1.example.com | [31f 08-31 20:50:57.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +peer0.org1.example.com | [320 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [321 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408A8CFEFBEF6AF9D9816...096D8DADEA4206176416CB532A020801 +peer0.org1.example.com | [322 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0334B40F401EAF1BDBDDA56DF36DA4D05B4B08479256359EDFD1595952CAD655 +peer0.org1.example.com | [323 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +peer0.org1.example.com | [324 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +peer0.org1.example.com | [325 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [326 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [327 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +peer0.org1.example.com | [328 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [329 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [fe2220aa-e2f5-4af1-8dfb-194d5dd142a5] +peer0.org1.example.com | [32a 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [32b 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU [fe2220aa] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [32c 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU [fe2220aa] notifying Txid:fe2220aa-e2f5-4af1-8dfb-194d5dd142a5, channelID:businesschannel +peer0.org1.example.com | [32d 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [32e 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +peer0.org1.example.com | [32f 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [fe2220aa-e2f5-4af1-8dfb-194d5dd142a5] +peer0.org1.example.com | [330 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [331 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [0ab1a7cd-e502-4075-96a2-2fe9d206bfa5] +peer0.org1.example.com | [332 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [333 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +peer0.org1.example.com | [334 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU [0ab1a7cd] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [335 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU [0ab1a7cd] notifying Txid:0ab1a7cd-e502-4075-96a2-2fe9d206bfa5, channelID:businesschannel +peer0.org1.example.com | [336 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [337 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +peer0.org1.example.com | [338 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [0ab1a7cd-e502-4075-96a2-2fe9d206bfa5] +peer0.org1.example.com | [339 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [33a 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [878f767b-fd16-40bd-bbc5-8ab2aa83f73c] +peer0.org1.example.com | [33b 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [33c 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +peer0.org1.example.com | [33d 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU [878f767b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [33e 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU [878f767b] notifying Txid:878f767b-fd16-40bd-bbc5-8ab2aa83f73c, channelID:businesschannel +peer1.org2.example.com | [41a 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [41b 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41c 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +peer1.org2.example.com | [41d 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41e 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [41f 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [420 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [421 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [422 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [424 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [425 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [426 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003331b20 gate 1598907064602348900 evaluation starts +peer1.org2.example.com | [427 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003331b20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [423 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org2.example.com | [428 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org2.example.com | [429 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org2.example.com | [42a 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [42b 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org2.example.com | [42c 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org1.example.com | [3e9 08-31 20:51:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ea 08-31 20:51:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3eb 08-31 20:51:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [3ec 08-31 20:51:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3ed 08-31 20:51:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ee 08-31 20:51:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ef 08-31 20:51:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f0 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f1 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f2 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f3 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3f4 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D9816100B +peer1.org1.example.com | [3f5 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 859AAE9C60243E8019FA0653C1745E2C43717B46517D9051EBFC1B67FA126C6E +peer1.org1.example.com | [3f6 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3f7 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3f8 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3f9 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [388 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [389 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [38a 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]} +peer0.org1.example.com | [33f 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [340 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +peer0.org1.example.com | [341 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [878f767b-fd16-40bd-bbc5-8ab2aa83f73c] +peer0.org1.example.com | [342 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +peer0.org1.example.com | [343 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [d21280aa-c271-417c-b0cd-721345e46807] +peer0.org1.example.com | [344 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +peer0.org1.example.com | [345 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d21280aa-c271-417c-b0cd-721345e46807] +peer0.org1.example.com | [346 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [347 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408A8CFEFBEF6AF9D9816...096D8DADEA4206176416CB532A020801 +peer0.org1.example.com | [348 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7DDBF73028F351BD6A240C999670B203E26B44EF08FCF0FD1C63D8D3DDE8C111 +peer0.org1.example.com | [349 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer0.org1.example.com | [34a 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU [06112b95] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [34b 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU [06112b95] notifying Txid:06112b950bc851abedd0a38297e055c4ca2219e7de0f29e8a2e16bd4f82d0b72, channelID: +peer0.org1.example.com | [34c 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [34d 08-31 20:50:57.82 UTC] [%{longpkg}] %{callpath} -> INFO [][06112b95] Exit chaincode: name:"cscc" (104ms) +peer0.org1.example.com | [34e 08-31 20:50:57.82 UTC] [%{longpkg}] %{callpath} -> DEBU [][06112b95] Exit +peer0.org1.example.com | [34f 08-31 20:50:57.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36692 +peer0.org1.example.com | [350 08-31 20:50:57.82 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36692 grpc.code=OK grpc.call_duration=110.5382ms +peer0.org1.example.com | [351 08-31 20:50:57.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [352 08-31 20:50:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting, peers found 0 +peer0.org1.example.com | [353 08-31 20:50:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [354 08-31 20:50:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [355 08-31 20:50:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [356 08-31 20:50:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [357 08-31 20:50:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...2D3C120C08D0DCBCCDF6AF9D98161001 +peer0.org1.example.com | [358 08-31 20:50:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3CD1450C3FF3F940A90526DBAD5868B370E699F4DF7B68D6AE241C6B49DC0EAF +peer0.org1.example.com | [359 08-31 20:50:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [35a 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36700 +peer0.org1.example.com | [35b 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0031b67d0 +peer0.org1.example.com | [35c 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [35d 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [35e 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [35f 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [360 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc 91 a7 f6 18 80 89 66 21 eb 8a d7 b8 73 f1 71 |.......f!....s.q| +peer0.org1.example.com | 00000010 49 73 dd 40 63 f1 e1 e4 9c cd 9c 13 4b 66 81 6b |Is.@c.......Kf.k| +peer0.org1.example.com | [361 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 9e 60 e0 9f 55 65 29 e5 c7 19 |0E.!...`..Ue)...| +peer0.org1.example.com | 00000010 2f 8f b4 33 1c 4d f2 c2 6d a0 ef d9 47 a0 5e c6 |/..3.M..m...G.^.| +peer0.org1.example.com | 00000020 95 da a3 b8 83 02 20 74 8e dc 8f 92 3a 59 16 12 |...... t....:Y..| +peer0.org1.example.com | 00000030 b0 a4 3d b2 5f 18 76 66 b1 9d fa aa f1 4f 7e ee |..=._.vf.....O~.| +peer0.org1.example.com | 00000040 e4 0d 4f ec 2b dc 88 |..O.+..| +peer0.org1.example.com | [362 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [363 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00015fe30, header 0xc0031b6be0 +peer0.org1.example.com | [364 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org1.example.com | [365 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU [][d22acefe] processing txid: d22acefea6dc93765745aed6e15aaadb9bca1cb8c9cb52d9925a1ee7881380d0 +peer0.org1.example.com | [366 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU [][d22acefe] Entry chaincode: name:"cscc" +peer0.org1.example.com | [367 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> INFO [][d22acefe] Entry chaincode: name:"cscc" +peer0.org1.example.com | [368 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [369 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer0.org1.example.com | [36a 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [36b 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [36c 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [36d 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc 91 a7 f6 18 80 89 66 21 eb 8a d7 b8 73 f1 71 |.......f!....s.q| +peer0.org1.example.com | 00000010 49 73 dd 40 63 f1 e1 e4 9c cd 9c 13 4b 66 81 6b |Is.@c.......Kf.k| +peer0.org1.example.com | [36e 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 9e 60 e0 9f 55 65 29 e5 c7 19 |0E.!...`..Ue)...| +peer0.org1.example.com | 00000010 2f 8f b4 33 1c 4d f2 c2 6d a0 ef d9 47 a0 5e c6 |/..3.M..m...G.^.| +peer0.org1.example.com | 00000020 95 da a3 b8 83 02 20 74 8e dc 8f 92 3a 59 16 12 |...... t....:Y..| +peer0.org1.example.com | 00000030 b0 a4 3d b2 5f 18 76 66 b1 9d fa aa f1 4f 7e ee |..=._.vf.....O~.| +peer0.org1.example.com | 00000040 e4 0d 4f ec 2b dc 88 |..O.+..| +peer0.org1.example.com | [36f 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU [d22acefe] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [370 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU [d22acefe] notifying Txid:d22acefea6dc93765745aed6e15aaadb9bca1cb8c9cb52d9925a1ee7881380d0, channelID: +peer0.org1.example.com | [371 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [372 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> INFO [][d22acefe] Exit chaincode: name:"cscc" (2ms) +peer1.org1.example.com | [3fa 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [3fb 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fc 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +peer1.org1.example.com | [3fd 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +peer1.org1.example.com | [3fe 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ff 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +peer1.org1.example.com | [400 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [401 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 9a ae 9c 60 24 3e 80 19 fa 06 53 c1 74 5e 2c |....`$>....S.t^,| +peer1.org1.example.com | 00000010 43 71 7b 46 51 7d 90 51 eb fc 1b 67 fa 12 6c 6e |Cq{FQ}.Q...g..ln| +peer1.org1.example.com | [402 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 9b b9 c1 d8 3f 75 22 d4 90 16 |0E.!......?u"...| +peer1.org1.example.com | 00000010 85 9e 5c 63 f8 44 a1 f6 7f 6e 86 8e 41 ee 32 67 |..\c.D...n..A.2g| +peer1.org1.example.com | 00000020 1f 5d ef 87 81 02 20 59 b9 0d 2e e5 e0 b5 b8 95 |.].... Y........| +peer1.org1.example.com | 00000030 37 84 96 66 08 85 49 66 ef 14 c9 81 9f 15 d1 a6 |7..f..If........| +peer1.org1.example.com | 00000040 fb 0f 63 6b 35 30 2a |..ck50*| +peer1.org1.example.com | [403 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [404 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 6f 99 1c f6 0b 93 db d7 07 1c |0E.!..o.........| +peer1.org1.example.com | 00000010 bf e7 34 41 9d cb 30 67 fc 85 b0 3f d5 1d 44 7d |..4A..0g...?..D}| +peer1.org1.example.com | 00000020 97 27 4d 53 da 02 20 68 af ed 2b fb 41 c6 d4 4e |.'MS.. h..+.A..N| +peer1.org1.example.com | 00000030 49 89 b6 53 82 f8 9d c3 8a 08 ef 1d 44 22 b5 da |I..S........D"..| +peer1.org1.example.com | 00000040 04 1e 84 e3 0c d8 32 |......2| +peer1.org1.example.com | [405 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [406 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [407 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [408 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [409 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [40a 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [40b 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [40c 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [40d 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40e 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\020\025\362Y\0343z)\270\035t5\237\202\330{\256\277e*bB" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [40f 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\020\025\362Y\0343z)\270\035t5\237\202\330{\256\277e*bB" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [410 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:50:43.542 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 329 Appending 0 entries to memory storage" channel=testchainid node=1 +orderer0.example.com | "2020-08-31 20:50:43.542 UTC [fsblkstorage] Next -> DEBU 32a Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2020-08-31 20:50:43.542 UTC [fsblkstorage] newBlockfileStream -> DEBU 32b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-08-31 20:50:43.542 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 32c Remaining bytes=[22930], Going to peek [8] bytes" +orderer0.example.com | "2020-08-31 20:50:43.542 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 32d Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-08-31 20:50:43.542 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 32e blockbytes [22927] read from file [0]" +orderer0.example.com | "2020-08-31 20:50:43.542 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 32f [channel: testchainid] Done creating channel support resources" +orderer0.example.com | "2020-08-31 20:50:43.542 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 330 Creating system channel msg processor for channel testchainid" +orderer0.example.com | "2020-08-31 20:50:43.542 UTC [fsblkstorage] Next -> DEBU 331 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2020-08-31 20:50:43.543 UTC [fsblkstorage] newBlockfileStream -> DEBU 332 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-08-31 20:50:43.543 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 333 Remaining bytes=[22930], Going to peek [8] bytes" +orderer0.example.com | "2020-08-31 20:50:43.543 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 334 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-08-31 20:50:43.543 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 335 blockbytes [22927] read from file [0]" +orderer0.example.com | "2020-08-31 20:50:43.543 UTC [orderer.commmon.multichannel] Initialize -> INFO 336 Starting system channel 'testchainid' with genesis block hash 4855adef6cdb226971cd6f1c81afc3aa9e4d72226e0e6f0fa7c9c664f1042236 and orderer type etcdraft" +orderer0.example.com | "2020-08-31 20:50:43.543 UTC [orderer.consensus.etcdraft] Start -> INFO 337 Starting Raft node" channel=testchainid node=1 +orderer0.example.com | "2020-08-31 20:50:43.543 UTC [orderer.common.cluster] Configure -> INFO 338 Entering, channel: testchainid, nodes: [ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +peer0.org1.example.com | [373 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU [][d22acefe] Exit +peer1.org1.example.com | [411 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\020\025\362Y\0343z)\270\035t5\237\202\330{\256\277e*bB" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [42d 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +peer0.org2.example.com | [38b 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [412 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [42e 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [42f 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org2.example.com | [430 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +peer1.org2.example.com | [431 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003382740)} +peer1.org2.example.com | [432 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [433 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [434 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [435 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +peer1.org2.example.com | [436 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +peer1.org2.example.com | [437 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +peer1.org2.example.com | [438 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003331b20 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [439 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003331b20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [43a 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003331b20 principal evaluation fails +peer1.org2.example.com | [43b 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003331b20 gate 1598907064602348900 evaluation fails +peer1.org2.example.com | [43c 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [43d 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [43e 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [43f 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fd160 gate 1598907064607954000 evaluation starts +peer1.org2.example.com | [441 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fd160 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [440 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +peer1.org2.example.com | [442 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fd160 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [443 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [444 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [445 08-31 20:51:04.60 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [446 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fd160 principal matched by identity 0 +peer1.org2.example.com | [447 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org2.example.com | [448 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0xe3, 0x22, 0xef, 0xdb, 0x1a, 0xb5, 0x8a, 0x4e, 0xca, 0x29, 0x72, 0xa1, 0x82, 0xd5, 0x73, 0xd2, 0x6c, 0x30, 0x29, 0x25, 0x12, 0x30, 0x2d, 0xc5, 0xc9, 0xfc, 0x53, 0x0, 0x88, 0x62, 0x25, 0xd} txOffsets= +peer1.org2.example.com | txId=0ab5ac5f1d5a2551b49ec6c24c6da873616029271ac520b4a7140ef88dfe6b38 locPointer=offset=71, bytesLength=27136 +peer1.org2.example.com | ] +peer1.org2.example.com | [449 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28547, bytesLength=27136] for tx ID: [0ab5ac5f1d5a2551b49ec6c24c6da873616029271ac520b4a7140ef88dfe6b38] to txid-index +peer1.org2.example.com | [44a 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28547, bytesLength=27136] for tx number:[0] ID: [0ab5ac5f1d5a2551b49ec6c24c6da873616029271ac520b4a7140ef88dfe6b38] to blockNumTranNum index +peer1.org2.example.com | [44b 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c db 9f a7 93 4b f1 95 89 60 5a |0E.!......K...`Z| +peer1.org2.example.com | 00000010 f2 35 6d 1d 88 61 e8 3e d7 4e 46 3b a3 45 74 ab |.5m..a.>.NF;.Et.| +peer1.org2.example.com | 00000020 46 6d c5 31 54 02 20 4c 45 aa b2 da 0b 3c 60 2a |Fm.1T. LE....<`*| +peer1.org2.example.com | 00000030 49 13 f3 c0 83 f1 12 fd 57 f4 a5 5e 5a 9e 44 7d |I.......W..^Z.D}| +peer1.org2.example.com | 00000040 b4 5d a7 95 60 9d ef |.]..`..| +peer1.org2.example.com | [44c 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fd160 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [44d 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fd160 gate 1598907064607954000 evaluation succeeds +peer1.org2.example.com | [44e 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [44f 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [450 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56679], isChainEmpty=[false], lastBlockNumber=[1] +peer1.org2.example.com | [451 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +peer1.org2.example.com | [452 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [453 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [454 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org2.example.com | [455 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [456 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [457 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D9816100D +peer1.org2.example.com | [458 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AB70E22E5C3459F322A770F5FCCEF7ECBCD6A3B9A49D0436D330AED88D5CA958 +peer1.org2.example.com | [459 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [413 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 9c 81 fd b5 3f e6 76 f7 7b 94 db 53 81 96 2f |.....?.v.{..S../| +peer1.org1.example.com | 00000010 32 bd ef 8f 82 30 ed f7 ae 68 39 cb 77 0d 65 ca |2....0...h9.w.e.| +peer1.org1.example.com | [414 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 c8 b9 66 cb b0 21 18 97 a8 90 |0E.!....f..!....| +peer1.org1.example.com | 00000010 00 f7 53 51 15 e9 81 62 76 1f 74 99 25 3f f9 8b |..SQ...bv.t.%?..| +peer1.org1.example.com | 00000020 e6 4e 83 7d 9e 02 20 78 48 34 c0 b7 72 34 b8 65 |.N.}.. xH4..r4.e| +peer1.org1.example.com | 00000030 3e 10 15 f2 59 1c 33 7a 29 b8 1d 74 35 9f 82 d8 |>...Y.3z)..t5...| +peer1.org1.example.com | 00000040 7b ae bf 65 2a 62 42 |{..e*bB| +peer1.org1.example.com | [415 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [416 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a ba 77 00 cd 70 eb d3 8a 6e 10 ca |0D. Z.w..p...n..| +peer1.org1.example.com | 00000010 d2 fa 28 d7 03 2c 08 dc e5 c3 7c 58 39 23 ca b1 |..(..,....|X9#..| +peer1.org1.example.com | 00000020 fd da 6f 40 02 20 1d 5c f7 fc bb d8 e2 e0 19 90 |..o@. .\........| +peer1.org1.example.com | 00000030 eb 2a c8 db 7e 55 16 42 16 f8 0e c7 5c 47 ce 94 |.*..~U.B....\G..| +peer1.org1.example.com | 00000040 c4 ab c8 4b 55 6b |...KUk| +peer1.org1.example.com | [417 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [418 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [419 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [41a 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [41b 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [41c 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41d 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41e 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41f 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [420 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [421 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\020\025\362Y\0343z)\270\035t5\237\202\330{\256\277e*bB" secret_envelope: > alive: > +peer1.org1.example.com | [422 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer1.org1.example.com | [423 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [424 08-31 20:51:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [425 08-31 20:51:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [426 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [427 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 69 bytes +peer1.org1.example.com | [428 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 69 bytes +peer1.org1.example.com | [429 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d db f7 30 28 f3 51 bd 6a 24 0c 99 96 70 b2 03 |}..0(.Q.j$...p..| +peer1.org1.example.com | 00000010 e2 6b 44 ef 08 fc f0 fd 1c 63 d8 d3 dd e8 c1 11 |.kD......c......| +peer1.org1.example.com | [42a 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 68 c4 26 6f 7b 21 ed a9 a5 3f 84 a8 |0C. h.&o{!...?..| +peer1.org1.example.com | 00000010 b1 40 99 63 b5 07 70 86 b7 94 7b d1 f4 fc db 60 |.@.c..p...{....`| +peer1.org1.example.com | 00000020 a2 47 34 74 02 1f 07 d1 39 67 f0 4d d1 ef fd 7a |.G4t....9g.M...z| +peer1.org1.example.com | 00000030 e2 38 7c ac 12 5e 64 36 2f e3 b0 37 8c cb da 35 |.8|..^d6/..7...5| +peer1.org1.example.com | 00000040 bf eb 50 e7 b3 |..P..| +peer1.org1.example.com | [42b 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [42c 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [42d 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [42e 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [42f 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [430 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +peer0.org2.example.com | [38c 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38d 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38e 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [38f 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [390 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [391 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [392 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 10715564970673300445, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [393 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:?\0008\034\252\023\307" > alive:\241" > alive: +peer0.org2.example.com | [394 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 10715564970673300445, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer0.org2.example.com | [395 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [396 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [397 08-31 20:51:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [398 08-31 20:51:04.25 UTC] [%{longpkg}] %{callpath} -> INFO a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Becoming a leader +peer0.org2.example.com | [399 08-31 20:51:04.25 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel +peer0.org2.example.com | [39a 08-31 20:51:04.25 UTC] [%{longpkg}] %{callpath} -> INFO This peer will retrieve blocks from ordering service and disseminate to other peers in the organization for channel businesschannel +peer0.org2.example.com | [39b 08-31 20:51:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [39c 08-31 20:51:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning true +peer0.org2.example.com | [39d 08-31 20:51:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [39e 08-31 20:51:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E8C0ACB0F8AF9D981610021801 +peer0.org2.example.com | [39f 08-31 20:51:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F5F2BEF8B226CA9B20F753083BBF7F0F741EAF763DC0559BA945BE41F656DFB2 +peer0.org2.example.com | [3a0 08-31 20:51:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [3a1 08-31 20:51:04.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating a new connection +peer0.org2.example.com | [3a2 08-31 20:51:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [3a3 08-31 20:51:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [3a4 08-31 20:51:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }] +peer0.org2.example.com | [3a5 08-31 20:51:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [3a6 08-31 20:51:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0031e1ff0, CONNECTING +peer0.org2.example.com | [3a7 08-31 20:51:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a8 08-31 20:51:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a9 08-31 20:51:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0031e1ff0, READY +peer0.org2.example.com | [3aa 08-31 20:51:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to {orderer1.example.com:7050 [OrdererMSP]} +peer0.org2.example.com | [3ab 08-31 20:51:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to orderer1.example.com:7050 +peer0.org2.example.com | [3ac 08-31 20:51:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Establishing gRPC stream with orderer1.example.com:7050 ... +peer0.org2.example.com | [3ad 08-31 20:51:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer0.org2.example.com | [3ae 08-31 20:51:04.26 UTC] [%{longpkg}] %{callpath} -> INFO Starting deliver with block [1] for channel businesschannel +peer0.org2.example.com | [3af 08-31 20:51:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3b0 08-31 20:51:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3b1 08-31 20:51:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A95070A3D08051A0608B8C5B5FA0522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 +peer0.org2.example.com | [3b2 08-31 20:51:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2A0B6996E8716BD222A41844CB0874E6712BB82CCE6C33657426BD2AAD90D9FC +peer0.org2.example.com | [3b3 08-31 20:51:04.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b4 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3b5 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3b6 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [3b7 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3b8 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [3b9 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ba 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICHzCCAcWgAwIBAgIQMouXBTDQE4goJmTJFNR/ODAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | [374 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36700 +peer0.org1.example.com | [375 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36700 grpc.code=OK grpc.call_duration=4.1337ms +peer0.org1.example.com | [376 08-31 20:50:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [377 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36708 +peer0.org1.example.com | [378 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003188fa0 +peer0.org1.example.com | [379 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [37a 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [37b 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [37c 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [37d 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 7f 72 66 32 cc 24 0b 8c d9 f0 25 aa 64 8f 0b |o.rf2.$....%.d..| +peer0.org1.example.com | 00000010 d6 86 2c 41 50 0a 15 be 9b ef 02 c3 a5 4a 02 58 |..,AP........J.X| +peer0.org1.example.com | [37e 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 17 78 77 40 53 b2 5d 12 f5 67 cd |0D. k.xw@S.]..g.| +peer0.org1.example.com | 00000010 e6 f6 01 2b 65 22 7f ae 18 b5 70 3f f8 54 14 76 |...+e"....p?.T.v| +peer0.org1.example.com | 00000020 6c 5e d6 22 02 20 62 a9 f6 a4 ca 91 ac 68 73 60 |l^.". b......hs`| +peer0.org1.example.com | 00000030 a9 9e f1 8d 5e 9a 04 9a 98 10 5a d5 f5 e4 fb 20 |....^.....Z.... | +peer0.org1.example.com | 00000040 a5 77 e5 63 fd 1e |.w.c..| +peer0.org1.example.com | [37f 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [380 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc002c5df80, header 0xc0031893b0 +peer0.org1.example.com | [381 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org1.example.com | [382 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU [][61f15dda] processing txid: 61f15dda710fe8ad8b98f3c6ae58ecc57ca157b30ade1b0f6949a32b0453dc04 +peer0.org1.example.com | [383 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU [][61f15dda] Entry chaincode: name:"qscc" +peer0.org1.example.com | [384 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> INFO [][61f15dda] Entry chaincode: name:"qscc" +peer0.org1.example.com | [385 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [386 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer0.org1.example.com | [387 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer0.org1.example.com | [388 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [389 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [38a 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [38b 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [38c 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38d 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer0.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer0.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer0.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [38e 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227270 gate 1598907059840897700 evaluation starts +peer0.org1.example.com | [38f 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227270 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [390 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227270 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [391 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [392 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [393 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [394 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227270 principal matched by identity 0 +peer0.org1.example.com | [395 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 7f 72 66 32 cc 24 0b 8c d9 f0 25 aa 64 8f 0b |o.rf2.$....%.d..| +peer0.org1.example.com | 00000010 d6 86 2c 41 50 0a 15 be 9b ef 02 c3 a5 4a 02 58 |..,AP........J.X| +peer0.org1.example.com | [396 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 17 78 77 40 53 b2 5d 12 f5 67 cd |0D. k.xw@S.]..g.| +peer0.org1.example.com | 00000010 e6 f6 01 2b 65 22 7f ae 18 b5 70 3f f8 54 14 76 |...+e"....p?.T.v| +peer0.org1.example.com | 00000020 6c 5e d6 22 02 20 62 a9 f6 a4 ca 91 ac 68 73 60 |l^.". b......hs`| +peer0.org1.example.com | 00000030 a9 9e f1 8d 5e 9a 04 9a 98 10 5a d5 f5 e4 fb 20 |....^.....Z.... | +peer0.org1.example.com | 00000040 a5 77 e5 63 fd 1e |.w.c..| +peer0.org1.example.com | [397 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227270 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [398 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227270 gate 1598907059840897700 evaluation succeeds +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org2.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer0.org2.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org2.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIxLmV4YW1wbGUu +peer0.org2.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEsq6PjE4puQmE+U7I708zjCX/ +peer0.org2.example.com | O8R2b4sbvbqNhwptzYew2nBKOpTTNMRHYlQrNk+JI5jscC0pyoSjer+71i8UnKNN +peer0.org2.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer0.org2.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDSAAwRQIh +peer0.org2.example.com | AM05c3uO0EAJuGf/PIR6W/1NTFUGDlgzY/xh17ZiAxjFAiBqizpEHO+vDu/prkbt +peer0.org2.example.com | zT4JIZZIt8ZQKDz2PbySBfC+rA== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3bb 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003206e50 gate 1598907064272770000 evaluation starts +peer0.org2.example.com | [3bc 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003206e50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3bd 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003206e50 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3be 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer0.org2.example.com | [3bf 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [3c0 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org2.example.com | [3c1 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003206e50 principal matched by identity 0 +peer0.org2.example.com | [3c2 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 29 44 9b 92 95 40 10 f6 d9 00 f4 b1 13 9c 96 |.)D...@.........| +peer0.org2.example.com | 00000010 83 ab 5f cb d9 66 42 27 c3 51 4a 4b 5e 7a 79 56 |.._..fB'.QJK^zyV| +peer0.org2.example.com | [3c3 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 fc 4d 9e 1d a8 37 f2 5e 05 45 05 |0D. ..M...7.^.E.| +peer0.org2.example.com | 00000010 ac 4c 02 e6 89 ab a3 3c 61 ba 51 43 d7 79 fd 17 |.L..... DEBU 0xc003206e50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3c5 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003206e50 gate 1598907064272770000 evaluation succeeds +peer0.org2.example.com | [3c6 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [3c7 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [3c8 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [3c9 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [3ca 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer0.org2.example.com | [3cb 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer0.org2.example.com | [3cc 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +peer0.org2.example.com | [3cd 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +peer0.org2.example.com | [3ce 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +peer0.org2.example.com | [3cf 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +peer0.org2.example.com | [3d0 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +peer0.org2.example.com | [3d1 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [3d2 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0031a4580 env 0xc0031e2640 txn 0 +peer0.org2.example.com | [3d3 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0031e2640 +peer0.org2.example.com | [3d4 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\264\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\0305\231\256\356\005\207\177s\320\333\2161g\250g\375\0331i\366p\262\234\235" +peer0.org2.example.com | [3d5 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org2.example.com | [3d6 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [3d7 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [3d8 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d9 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer0.org2.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer0.org2.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer0.org2.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org2.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org2.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer0.org2.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3da 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org2.example.com | [3db 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [3dc 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org2.example.com | [3dd 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [3de 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a c9 56 74 d0 ac d1 53 26 ca 88 78 dd d1 98 e3 |*.Vt...S&..x....| +peer0.org2.example.com | 00000010 ee b9 13 91 2d c5 2c 69 ec 14 2a 0f f3 f1 54 a2 |....-.,i..*...T.| +peer0.org2.example.com | [3df 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 b4 a7 cf 0c d5 ef fc 4a 2d 2b 1c |0D. ........J-+.| +peer0.org2.example.com | 00000010 62 61 50 e5 d5 98 dc d2 14 31 4f 44 6a a4 86 44 |baP......1ODj..D| +peer0.org2.example.com | 00000020 b0 89 10 60 02 20 58 11 e4 1a 38 2d 02 16 fb d0 |...`. X...8-....| +peer0.org2.example.com | 00000030 3e 3a 82 7c a3 2e 16 22 69 6d a8 0c 03 8a 46 67 |>:.|..."im....Fg| +peer0.org2.example.com | 00000040 2d c0 ba 70 a1 eb |-..p..| +peer0.org2.example.com | [3e0 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [3e1 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0032bd500, header channel_header:"\010\001\032\006\010\264\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\0305\231\256\356\005\207\177s\320\333\2161g\250g\375\0331i\366p\262\234\235" +peer0.org2.example.com | [3e2 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [3e3 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [3e4 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [3e5 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [3e6 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [3e7 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e8 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [3e9 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [3ea 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [3eb 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [3ec 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [3ed 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [3ee 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [3ef 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [3f0 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f1 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [3f2 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [3f3 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +peer0.org2.example.com | [3f4 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [3f5 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [3f6 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [3f7 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [3f8 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [3f9 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [3fa 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +peer0.org2.example.com | [3fb 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [3fc 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [3fd 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +peer0.org2.example.com | [3fe 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org2.example.com | [3ff 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [400 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer0.org2.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer0.org2.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org2.example.com | [45a 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [45b 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [45c 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1] +peer1.org2.example.com | [45d 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database +peer1.org2.example.com | [45e 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [45f 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [460 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [461 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [462 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org2.example.com | [463 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [464 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [465 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:11251703883015026869 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [466 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:11251703883015026869 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer1.org2.example.com | [467 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [468 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [469 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +peer1.org2.example.com | [46a 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +peer1.org2.example.com | [46c 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [46d 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +peer1.org2.example.com | [46e 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +peer1.org2.example.com | [46f 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org2.example.com | [470 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +peer1.org2.example.com | [46b 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [471 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [472 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | [474 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [473 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +peer1.org2.example.com | [475 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 22ms (state_validation=6ms block_and_pvtdata_commit=10ms state_commit=3ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +peer1.org2.example.com | [476 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [478 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408B8BB829CF9AF9D9816...A55D1049CA35F5343DC503CE2A020802 +peer1.org2.example.com | [479 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8BCE12AF46F4B84A8D159A4AFDA681BCD54BB5B935ECDC7A500CC2BAD1C09C8A +peer1.org2.example.com | [47a 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +peer1.org2.example.com | [47b 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +peer1.org2.example.com | [47c 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +peer1.org2.example.com | [47d 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +peer1.org2.example.com | [47e 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +peer1.org2.example.com | [47f 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [480 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00324d280 env 0xc003443540 txn 0 +peer1.org2.example.com | [481 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc003443540 +peer1.org2.example.com | [482 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\267\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030>\316\004\035\247\263T!\025\236\244\230\014\355k\242EsT\003\377-\204\213" +peer1.org2.example.com | [483 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org2.example.com | [484 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [485 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [486 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [487 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org2.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org2.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org2.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org2.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org2.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org2.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [488 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer1.org2.example.com | [489 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [48a 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org2.example.com | [48b 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [48c 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 bb f3 d3 49 26 2e 3e 88 71 29 7d 0a 91 00 7f |....I&.>.q)}....| +peer1.org2.example.com | 00000010 c6 f2 a5 3e 3c 38 d2 3f 9b 58 9e bb c7 96 e4 4d |...><8.?.X.....M| +peer1.org2.example.com | [48d 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 8d d9 5c 84 4b 47 09 13 06 b6 |0E.!....\.KG....| +peer1.org2.example.com | 00000010 45 89 d8 00 01 66 d3 67 41 9b 6b b8 ac 4e 5e 22 |E....f.gA.k..N^"| +peer1.org2.example.com | 00000020 b8 13 f9 48 dd 02 20 05 54 f1 7c ff d1 ca b3 76 |...H.. .T.|....v| +peer1.org2.example.com | 00000030 87 15 bf 1a e7 b1 28 ba a1 6e 04 d2 71 8a 64 10 |......(..n..q.d.| +peer1.org2.example.com | 00000040 f4 9e 1e 26 55 d7 b6 |...&U..| +peer1.org2.example.com | [48e 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [48f 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc003496000, header channel_header:"\010\001\032\006\010\267\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030>\316\004\035\247\263T!\025\236\244\230\014\355k\242EsT\003\377-\204\213" +peer1.org2.example.com | [490 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [491 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [492 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [493 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [494 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [495 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [496 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [497 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [498 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [499 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [49a 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [49b 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org2.example.com | [49c 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [49d 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [49e 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [49f 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [4a0 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org2.example.com | [4a1 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [4a2 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +peer1.org2.example.com | [4a3 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [4a4 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [4a5 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [4a6 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [4a7 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [4a8 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [4a9 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +peer1.org2.example.com | [4aa 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [4ab 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [477 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00341cb70, CONNECTING +peer1.org2.example.com | [4ac 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +peer1.org2.example.com | [4ad 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer1.org2.example.com | [4ae 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4af 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer1.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer1.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer1.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [4b0 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c2e80 gate 1598907064629136900 evaluation starts +peer1.org2.example.com | [4b1 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c2e80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4b2 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c2e80 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4b3 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org2.example.com | [4b4 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org2.example.com | [4b5 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [4b6 08-31 20:51:04.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [4b7 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org2.example.com | [4b8 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [4b9 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c2e80 principal matched by identity 0 +peer1.org2.example.com | [4ba 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 3d f8 a1 bf ae 7d e4 fb dc 40 c7 07 6d de 8d |.=....}...@..m..| +peer1.org2.example.com | 00000010 fb 6b e1 2c 0c 1e 66 98 ba 3d 47 90 dc a4 d0 63 |.k.,..f..=G....c| +peer1.org2.example.com | [4bb 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 27 f4 6f dd 5b 2d 12 b9 82 60 1a |0D. u'.o.[-...`.| +peer1.org2.example.com | 00000010 88 90 67 88 50 b6 97 37 e6 93 6d 8e 20 ca 9f 40 |..g.P..7..m. ..@| +peer0.org1.example.com | [399 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [39a 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [39b 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [39c 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [39d 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU [61f15dda] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [39e 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU [61f15dda] notifying Txid:61f15dda710fe8ad8b98f3c6ae58ecc57ca157b30ade1b0f6949a32b0453dc04, channelID: +peer0.org1.example.com | [39f 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [3a0 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> INFO [][61f15dda] Exit chaincode: name:"qscc" (9ms) +peer0.org1.example.com | [3a1 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU [][61f15dda] Exit +peer0.org1.example.com | [3a2 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36708 +peer0.org1.example.com | [3a3 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36708 grpc.code=OK grpc.call_duration=13.018ms +peer0.org1.example.com | [3a4 08-31 20:50:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3a5 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3a6 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a7 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3a8 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3a9 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 46 01 24 25 33 38 e8 fe 5b 5f ae 48 11 eb 80 |.F.$%38..[_.H...| +peer0.org1.example.com | 00000010 5c c1 b0 8a af 2a 11 ab c2 69 4f dd bc 9a 1e d5 |\....*...iO.....| +peer0.org1.example.com | [3aa 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 42 bd c4 70 c1 e5 fc a1 3c b5 |0E.!..B..p....<.| +peer0.org1.example.com | 00000010 0d 1d 56 e9 86 a2 6b 81 84 71 ed 83 40 df 93 4a |..V...k..q..@..J| +peer0.org1.example.com | 00000020 7d bc 25 c0 32 02 20 34 4c e8 bf 4a 2d 71 fa 76 |}.%.2. 4L..J-q.v| +peer0.org1.example.com | 00000030 ba 8b e5 cd 23 d4 75 8e 13 0f 0c 39 9a 97 45 13 |....#.u....9..E.| +peer0.org1.example.com | 00000040 c8 4d 0b 9c ed f3 4b |.M....K| +peer0.org1.example.com | [3ab 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [3ac 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 2a 37 79 c8 8e 70 c9 e5 2c 9b 34 |0D. x*7y..p..,.4| +peer0.org1.example.com | 00000010 27 13 b7 9f da 2b 4b 05 8f 5b d0 06 1c 35 f8 ee |'....+K..[...5..| +peer0.org1.example.com | 00000020 6a 1f d7 07 02 20 52 9c 8c 27 cc bc e4 5d 93 c2 |j.... R..'...]..| +peer0.org1.example.com | 00000030 41 1f df 83 d7 f5 82 d5 10 36 2f 03 5d 67 c5 17 |A........6/.]g..| +peer0.org1.example.com | 00000040 47 af a7 69 5b 84 |G..i[.| +peer0.org1.example.com | [3ad 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [3ae 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [3af 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3b0 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3b1 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3b2 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b3 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b4 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b5 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3b6 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816100A +peer0.org1.example.com | [3b7 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 560566BE9EF2E799DB13B1A332517DD555DD9A893BA48F851F20E69F1FE885D4 +peer0.org1.example.com | [3b8 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3b9 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3ba 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3bb 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [3bc 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3bd 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [3be 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3bf 08-31 20:51:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c0 08-31 20:51:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c1 08-31 20:51:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3c2 08-31 20:51:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c3 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c4 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c5 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c6 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3c7 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 9a ae 9c 60 24 3e 80 19 fa 06 53 c1 74 5e 2c |....`$>....S.t^,| +peer0.org1.example.com | 00000010 43 71 7b 46 51 7d 90 51 eb fc 1b 67 fa 12 6c 6e |Cq{FQ}.Q...g..ln| +peer0.org1.example.com | [3c8 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 9b b9 c1 d8 3f 75 22 d4 90 16 |0E.!......?u"...| +peer0.org1.example.com | 00000010 85 9e 5c 63 f8 44 a1 f6 7f 6e 86 8e 41 ee 32 67 |..\c.D...n..A.2g| +peer0.org1.example.com | 00000020 1f 5d ef 87 81 02 20 59 b9 0d 2e e5 e0 b5 b8 95 |.].... Y........| +peer0.org1.example.com | 00000030 37 84 96 66 08 85 49 66 ef 14 c9 81 9f 15 d1 a6 |7..f..If........| +peer0.org1.example.com | 00000040 fb 0f 63 6b 35 30 2a |..ck50*| +peer0.org1.example.com | [3c9 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [3ca 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 6f 99 1c f6 0b 93 db d7 07 1c |0E.!..o.........| +peer0.org1.example.com | 00000010 bf e7 34 41 9d cb 30 67 fc 85 b0 3f d5 1d 44 7d |..4A..0g...?..D}| +peer0.org1.example.com | 00000020 97 27 4d 53 da 02 20 68 af ed 2b fb 41 c6 d4 4e |.'MS.. h..+.A..N| +peer0.org1.example.com | 00000030 49 89 b6 53 82 f8 9d c3 8a 08 ef 1d 44 22 b5 da |I..S........D"..| +peer0.org1.example.com | 00000040 04 1e 84 e3 0c d8 32 |......2| +peer0.org1.example.com | [3cb 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [3cc 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [3cd 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3ce 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3cf 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3d0 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d1 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d2 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d3 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [3d4 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3d5 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\017I\2254Dn" > > +peer0.org1.example.com | [3d6 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +peer0.org1.example.com | [3d7 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3d8 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3d9 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3da 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3db 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3dc 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [3dd 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [3de 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3df 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3e0 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816100B +peer0.org1.example.com | [3e1 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E29C81FDB53FE676F77B94DB5381962F32BDEF8F8230EDF7AE6839CB770D65CA +peer0.org1.example.com | [3e2 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3e3 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3e4 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3e5 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\020\025\362Y\0343z)\270\035t5\237\202\330{\256\277e*bB" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3e6 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\020\025\362Y\0343z)\270\035t5\237\202\330{\256\277e*bB" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e7 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e8 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e9 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ea 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer0.org1.example.com | [3eb 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3ec 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 9c 81 fd b5 3f e6 76 f7 7b 94 db 53 81 96 2f |.....?.v.{..S../| +peer0.org1.example.com | 00000010 32 bd ef 8f 82 30 ed f7 ae 68 39 cb 77 0d 65 ca |2....0...h9.w.e.| +peer0.org1.example.com | [3ed 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 c8 b9 66 cb b0 21 18 97 a8 90 |0E.!....f..!....| +peer0.org1.example.com | 00000010 00 f7 53 51 15 e9 81 62 76 1f 74 99 25 3f f9 8b |..SQ...bv.t.%?..| +peer0.org1.example.com | 00000020 e6 4e 83 7d 9e 02 20 78 48 34 c0 b7 72 34 b8 65 |.N.}.. xH4..r4.e| +peer0.org1.example.com | 00000030 3e 10 15 f2 59 1c 33 7a 29 b8 1d 74 35 9f 82 d8 |>...Y.3z)..t5...| +peer0.org1.example.com | 00000040 7b ae bf 65 2a 62 42 |{..e*bB| +peer0.org1.example.com | [3ee 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | [431 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [432 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033467d0 gate 1598907061761861800 evaluation starts +peer1.org1.example.com | [433 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033467d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [434 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033467d0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [435 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033467d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [436 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033467d0 principal evaluation fails +peer1.org1.example.com | [437 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033467d0 gate 1598907061761861800 evaluation fails +peer1.org1.example.com | [438 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [439 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [43a 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [43b 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003347620 gate 1598907061762549900 evaluation starts +peer1.org1.example.com | [43c 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003347620 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [43d 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003347620 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [43e 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [43f 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [440 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [441 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003347620 principal matched by identity 0 +peer1.org1.example.com | [442 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d db f7 30 28 f3 51 bd 6a 24 0c 99 96 70 b2 03 |}..0(.Q.j$...p..| +peer1.org1.example.com | 00000010 e2 6b 44 ef 08 fc f0 fd 1c 63 d8 d3 dd e8 c1 11 |.kD......c......| +peer1.org1.example.com | [443 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 68 c4 26 6f 7b 21 ed a9 a5 3f 84 a8 |0C. h.&o{!...?..| +peer1.org1.example.com | 00000010 b1 40 99 63 b5 07 70 86 b7 94 7b d1 f4 fc db 60 |.@.c..p...{....`| +peer1.org1.example.com | 00000020 a2 47 34 74 02 1f 07 d1 39 67 f0 4d d1 ef fd 7a |.G4t....9g.M...z| +peer1.org1.example.com | 00000030 e2 38 7c ac 12 5e 64 36 2f e3 b0 37 8c cb da 35 |.8|..^d6/..7...5| +peer1.org1.example.com | 00000040 bf eb 50 e7 b3 |..P..| +peer1.org1.example.com | [444 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003347620 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [445 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003347620 gate 1598907061762549900 evaluation succeeds +peer1.org1.example.com | [446 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [447 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [448 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [449 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [44a 08-31 20:51:01.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [44b 08-31 20:51:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [44c 08-31 20:51:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [44d 08-31 20:51:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [44e 08-31 20:51:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [44f 08-31 20:51:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [450 08-31 20:51:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [451 08-31 20:51:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer0.org2.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [401 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032eeed0 gate 1598907064284615700 evaluation starts +peer0.org2.example.com | [402 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032eeed0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [403 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032eeed0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [404 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org2.example.com | [405 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org2.example.com | [406 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [407 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [408 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org2.example.com | [40a 08-31 20:51:04.27 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [40b 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [1], peers number [0] +peer0.org2.example.com | [40c 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28181 bytes, seq: 1}, Envelope: 28214 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [40d 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1 +peer0.org2.example.com | [40e 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [40f 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [410 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [411 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [412 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [413 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa940 gate 1598907064288203900 evaluation starts +peer0.org2.example.com | [414 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa940 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [415 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa940 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [416 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa940 principal matched by identity 0 +peer0.org2.example.com | [417 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff e3 73 22 b0 81 c2 53 44 fc cf 9b e3 0e 70 81 |..s"...SD.....p.| +peer0.org2.example.com | 00000010 1d d6 12 bc 89 43 76 b1 c6 69 be e2 ec 5a 76 c9 |.....Cv..i...Zv.| +peer0.org2.example.com | [418 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 30 56 c8 ec 8a 9e 0e 98 45 3a ef |0D. s0V......E:.| +peer0.org2.example.com | 00000010 26 17 7c 0d 3e cd 67 1b f7 10 51 47 a3 35 2d dc |&.|.>.g...QG.5-.| +peer0.org2.example.com | 00000020 37 a3 df be 02 20 55 1e a0 91 79 25 c2 fb fb 58 |7.... U...y%...X| +peer0.org2.example.com | 00000030 e9 8f b4 d6 96 69 f5 c2 f0 51 b5 0d 1d 8d cb a5 |.....i...Q......| +peer0.org2.example.com | 00000040 fa 7f 6f 54 13 4f |..oT.O| +peer0.org2.example.com | [419 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa940 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [41a 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aa940 gate 1598907064288203900 evaluation succeeds +peer0.org2.example.com | [41b 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [41c 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [41d 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [41e 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [41f 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer0.org2.example.com | [420 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer0.org2.example.com | [421 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [422 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [2], peers number [0] +peer0.org2.example.com | [423 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28186 bytes, seq: 2}, Envelope: 28219 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [424 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2 +peer0.org2.example.com | [409 08-31 20:51:04.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [425 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032eeed0 principal matched by identity 0 +peer0.org2.example.com | [426 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 6a 5e 90 37 00 25 29 cc 2f 3d ec 44 8f 23 98 |.j^.7.%)./=.D.#.| +peer0.org2.example.com | 00000010 40 21 8f 78 1d c2 88 4f 31 16 8b 9b 25 00 fb 20 |@!.x...O1...%.. | +peer0.org2.example.com | [427 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d d5 10 d0 47 15 e1 14 bb 9f dc b9 |0D. ....G.......| +peer0.org2.example.com | 00000010 21 20 fe 43 aa a5 85 eb 20 91 d3 d3 25 c3 40 6f |! .C.... ...%.@o| +peer0.org2.example.com | 00000020 be ec 7e 52 02 20 3f 97 e3 ab d5 5a 98 c6 78 08 |..~R. ?....Z..x.| +peer0.org2.example.com | 00000030 e3 1a 1c 9b 18 c4 79 e9 08 26 b7 2a 98 01 0e 55 |......y..&.*...U| +peer0.org2.example.com | 00000040 0c af 35 37 61 76 |..57av| +peer0.org2.example.com | [428 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032eeed0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [429 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032eeed0 gate 1598907064284615700 evaluation succeeds +peer0.org2.example.com | [42a 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [42b 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [42c 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [42d 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [42e 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [42f 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [430 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org2.example.com | [431 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [432 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [433 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [434 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org2.example.com | [435 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org2.example.com | [436 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org2.example.com | [437 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [438 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [452 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 372 bytes, Signature: 0 bytes +peer1.org1.example.com | [453 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 372 bytes, Signature: 0 bytes +peer1.org1.example.com | [454 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d db f7 30 28 f3 51 bd 6a 24 0c 99 96 70 b2 03 |}..0(.Q.j$...p..| +peer1.org1.example.com | 00000010 e2 6b 44 ef 08 fc f0 fd 1c 63 d8 d3 dd e8 c1 11 |.kD......c......| +peer1.org1.example.com | [455 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 68 c4 26 6f 7b 21 ed a9 a5 3f 84 a8 |0C. h.&o{!...?..| +peer1.org1.example.com | 00000010 b1 40 99 63 b5 07 70 86 b7 94 7b d1 f4 fc db 60 |.@.c..p...{....`| +peer1.org1.example.com | 00000020 a2 47 34 74 02 1f 07 d1 39 67 f0 4d d1 ef fd 7a |.G4t....9g.M...z| +peer1.org1.example.com | 00000030 e2 38 7c ac 12 5e 64 36 2f e3 b0 37 8c cb da 35 |.8|..^d6/..7...5| +peer1.org1.example.com | 00000040 bf eb 50 e7 b3 |..P..| +peer1.org1.example.com | [456 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 2d 0f 93 fa 5a 38 ea 1e a6 97 9b 85 21 70 63 |.-...Z8......!pc| +peer1.org1.example.com | 00000010 6d cc 60 e1 07 c2 ed a8 09 44 22 22 bd 46 b1 10 |m.`......D"".F..| +peer1.org1.example.com | [457 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b a9 f8 b1 8d 68 b8 c3 5a 96 2e d2 |0D. k....h..Z...| +peer1.org1.example.com | 00000010 4d 57 70 40 2f 28 0c 43 57 5f c2 00 c3 7d f0 87 |MWp@/(.CW_...}..| +peer1.org1.example.com | 00000020 a9 76 21 13 02 20 76 bd 5e 18 6f e2 bd 3d 0e e4 |.v!.. v.^.o..=..| +peer1.org1.example.com | 00000030 68 62 d6 ef 08 e3 5d 5c eb 6b c4 b5 f3 9d 3b 8c |hb....]\.k....;.| +peer1.org1.example.com | 00000040 d3 68 59 f1 33 fd |.hY.3.| +peer1.org1.example.com | [458 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [459 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [45a 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [45b 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [45c 08-31 20:51:02.99 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org1.example.com:7051]] , current view: [[peer0.org1.example.com:7051]] +peer1.org1.example.com | [45d 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [45e 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [45f 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 87 37 af d6 a1 b7 06 0d 2e 09 d6 4d b1 7c 44 |..7.........M.|D| +peer1.org1.example.com | 00000010 1b 4c ca 83 a3 52 88 56 c6 5b 2c 15 80 98 43 08 |.L...R.V.[,...C.| +peer1.org1.example.com | [460 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2c af ee c4 7c be aa 0b 79 c2 |0E.!..,...|...y.| +peer1.org1.example.com | 00000010 9b 62 51 5e 2b ba 8f 09 da 55 2f 38 46 61 b9 01 |.bQ^+....U/8Fa..| +peer1.org1.example.com | 00000020 4b 0c 5e 3f b7 02 20 45 4b ba b1 b1 45 ff b2 f3 |K.^?.. EK...E...| +peer1.org1.example.com | 00000030 84 fb ba 2d 08 ea 7e ec 05 cc b7 0b 95 01 f5 1c |...-..~.........| +peer1.org1.example.com | 00000040 9a e7 f5 f7 f5 74 a5 |.....t.| +peer1.org1.example.com | [461 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [462 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [463 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [464 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> INFO 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Some peer is already a leader +peer1.org1.example.com | [465 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [466 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org1.example.com | [467 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [468 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28177 bytes, seq: 1}, Envelope: 28210 bytes, Signature: 0 bytes +peer1.org1.example.com | [469 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28177 bytes, seq: 1}, Envelope: 28210 bytes, Signature: 0 bytes +peer1.org1.example.com | [46a 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [46b 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [46c 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org1.example.com | [46d 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [46e 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org1.example.com | [46f 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [470 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICHjCCAcWgAwIBAgIQUak2hDd8j2SLaQNMbXpZRDAKBggqhkjOPQQDAjBpMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer1.org1.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ]" +orderer0.example.com | "2020-08-31 20:50:43.543 UTC [orderer.common.cluster] updateStubInMapping -> INFO 339 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +orderer0.example.com | "2020-08-31 20:50:43.543 UTC [orderer.common.cluster] updateStubInMapping -> INFO 33a Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2020-08-31 20:50:43.543 UTC [orderer.common.cluster] func1 -> DEBU 33b Connecting to ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel testchainid" +orderer0.example.com | "2020-08-31 20:50:43.544 UTC [grpc] DialContext -> DEBU 33c parsed scheme: """ +orderer0.example.com | "2020-08-31 20:50:43.544 UTC [grpc] DialContext -> DEBU 33d scheme "" not registered, fallback to default scheme" +orderer0.example.com | "2020-08-31 20:50:43.545 UTC [orderer.common.cluster] updateStubInMapping -> INFO 33e Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +orderer0.example.com | "2020-08-31 20:50:43.545 UTC [orderer.common.cluster] updateStubInMapping -> INFO 33f Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2020-08-31 20:50:43.545 UTC [grpc] watcher -> DEBU 340 ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" +orderer0.example.com | "2020-08-31 20:50:43.545 UTC [grpc] switchBalancer -> DEBU 341 ClientConn switching balancer to "pick_first"" +orderer0.example.com | "2020-08-31 20:50:43.545 UTC [orderer.common.cluster] func1 -> DEBU 342 Connecting to ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel testchainid" +peer1.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer1.org1.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUu +peer1.org1.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET8B7vvN/rxdMqWGK+yqvj2vj +peer1.org1.example.com | zcoh0PNOTfowTjKzggxnGNjm57Tabe8mSEp3J79IN+Z0BUjlRX7ePe1Y9MnQP6NN +peer1.org1.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer1.org1.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +peer1.org1.example.com | MQtqMO2tIswbOnZ/EyE1ZgEdzPAma23Urf8qNS+mD/ACICsZIm7LFxHSrXc9AD5h +peer1.org1.example.com | WFUnXFrrWMedpv6WCUtVYuZy +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [471 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a0540 gate 1598907063822262100 evaluation starts +peer1.org1.example.com | [472 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a0540 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [473 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a0540 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [474 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer1.org1.example.com | [475 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [476 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org1.example.com | [477 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a0540 principal matched by identity 0 +peer1.org1.example.com | [478 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 4e 02 62 d8 ce 08 d6 21 32 3c 63 e0 2f cb f3 |.N.b....!2 DEBU Verify: sig = 00000000 30 44 02 20 65 5c b1 94 00 fb 6c 86 4f 01 bd 14 |0D. e\....l.O...| +peer1.org1.example.com | 00000010 78 85 5b 30 e2 c4 da 3d ab 42 97 95 e8 5d 25 ea |x.[0...=.B...]%.| +peer1.org1.example.com | 00000020 30 0e 43 9b 02 20 75 a0 a3 5b da cb 12 76 2a 73 |0.C.. u..[...v*s| +peer1.org1.example.com | 00000030 7e d8 d6 e1 fe 07 28 d4 40 eb 54 bc 28 0f 7f 71 |~.....(.@.T.(..q| +peer1.org1.example.com | 00000040 81 38 7b e9 17 2a |.8{..*| +peer1.org1.example.com | [47a 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a0540 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [47b 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a0540 gate 1598907063822262100 evaluation succeeds +peer1.org1.example.com | [47c 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [47d 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [47e 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [47f 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [480 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28177 bytes, seq: 1}, Envelope: 28210 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [481 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1 +peer1.org1.example.com | [482 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [483 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer1.org1.example.com | [484 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer1.org1.example.com | [485 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +peer1.org1.example.com | [486 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +peer1.org1.example.com | [487 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +peer1.org1.example.com | [488 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +peer1.org1.example.com | [489 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +peer1.org1.example.com | [48a 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org1.example.com | [48b 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003348480 env 0xc003354c30 txn 0 +peer1.org1.example.com | [48c 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc003354c30 +peer1.org1.example.com | [48d 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\264\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\0305\231\256\356\005\207\177s\320\333\2161g\250g\375\0331i\366p\262\234\235" +peer1.org1.example.com | [48e 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org1.example.com | [48f 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [490 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [491 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [492 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org1.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org1.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org1.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org1.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org1.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org1.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [493 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer1.org1.example.com | [494 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [495 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org1.example.com | [496 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [497 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a c9 56 74 d0 ac d1 53 26 ca 88 78 dd d1 98 e3 |*.Vt...S&..x....| +orderer0.example.com | "2020-08-31 20:50:43.545 UTC [grpc] HandleSubConnStateChange -> DEBU 343 pickfirstBalancer: HandleSubConnStateChange: 0xc0003842a0, CONNECTING" +orderer0.example.com | "2020-08-31 20:50:43.545 UTC [grpc] DialContext -> DEBU 344 parsed scheme: """ +orderer0.example.com | "2020-08-31 20:50:43.545 UTC [grpc] DialContext -> DEBU 345 scheme "" not registered, fallback to default scheme" +orderer0.example.com | "2020-08-31 20:50:43.547 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 347 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer0.example.com | "2020-08-31 20:50:43.547 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 348 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +orderer0.example.com | "2020-08-31 20:50:43.547 UTC [grpc] watcher -> DEBU 346 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" +orderer0.example.com | "2020-08-31 20:50:43.547 UTC [orderer.common.cluster] Configure -> INFO 349 Exiting" +orderer0.example.com | "2020-08-31 20:50:43.547 UTC [orderer.consensus.etcdraft] start -> DEBU 34a Starting raft node: #peers: 3" channel=testchainid node=1 +orderer0.example.com | "2020-08-31 20:50:43.547 UTC [grpc] switchBalancer -> DEBU 34b ClientConn switching balancer to "pick_first"" +orderer0.example.com | "2020-08-31 20:50:43.547 UTC [orderer.consensus.etcdraft] start -> INFO 34c Starting raft node as part of a new channel" channel=testchainid node=1 +orderer0.example.com | "2020-08-31 20:50:43.547 UTC [grpc] HandleSubConnStateChange -> DEBU 34d pickfirstBalancer: HandleSubConnStateChange: 0xc000384db0, CONNECTING" +orderer0.example.com | "2020-08-31 20:50:43.547 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 34e 1 became follower at term 0" channel=testchainid node=1 +orderer0.example.com | "2020-08-31 20:50:43.547 UTC [orderer.consensus.etcdraft] newRaft -> INFO 34f newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 +orderer0.example.com | "2020-08-31 20:50:43.548 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 350 1 became follower at term 1" channel=testchainid node=1 +orderer0.example.com | "2020-08-31 20:50:43.548 UTC [orderer.common.server] Start -> INFO 351 Starting orderer: +orderer0.example.com | Version: 1.4.8 +orderer0.example.com | Commit SHA: development build +orderer0.example.com | Go version: go1.13.15 +orderer0.example.com | OS/Arch: linux/amd64" +orderer0.example.com | "2020-08-31 20:50:43.548 UTC [orderer.common.server] Start -> INFO 352 Starting cluster listener on [::]:7055" +orderer0.example.com | "2020-08-31 20:50:43.548 UTC [orderer.common.server] Start -> INFO 353 Beginning to serve requests" +orderer0.example.com | "2020-08-31 20:50:43.551 UTC [orderer.consensus.etcdraft] apply -> INFO 354 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2020-08-31 20:50:43.551 UTC [orderer.consensus.etcdraft] apply -> INFO 355 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2020-08-31 20:50:43.551 UTC [orderer.consensus.etcdraft] apply -> INFO 356 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 +orderer0.example.com | "2020-08-31 20:50:43.559 UTC [grpc] HandleSubConnStateChange -> DEBU 357 pickfirstBalancer: HandleSubConnStateChange: 0xc0003842a0, READY" +orderer0.example.com | "2020-08-31 20:50:43.565 UTC [grpc] HandleSubConnStateChange -> DEBU 358 pickfirstBalancer: HandleSubConnStateChange: 0xc000384db0, READY" +orderer0.example.com | "2020-08-31 20:50:44.429 UTC [orderer.common.cluster] Step -> DEBU 359 Connection from orderer2.example.com(172.18.0.2:58986)" +orderer0.example.com | "2020-08-31 20:50:44.430 UTC [orderer.common.cluster.step] handleMessage -> DEBU 35a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 36" +orderer0.example.com | "2020-08-31 20:50:44.430 UTC [orderer.consensus.etcdraft] Step -> INFO 35b 1 [term: 1] received a MsgApp message with higher term from 3 [term: 2]" channel=testchainid node=1 +orderer0.example.com | "2020-08-31 20:50:44.430 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 35c 1 became follower at term 2" channel=testchainid node=1 +orderer0.example.com | "2020-08-31 20:50:44.430 UTC [orderer.consensus.etcdraft] run -> INFO 35d raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 +orderer0.example.com | "2020-08-31 20:50:44.437 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 35e Raft leader changed: 0 -> 3" channel=testchainid node=1 +orderer0.example.com | "2020-08-31 20:50:44.437 UTC [orderer.common.cluster] NewStream -> DEBU 35f Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2020-08-31 20:50:44.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 360 Sending msg of 28 bytes to 3 on channel testchainid took 243µs" +orderer0.example.com | "2020-08-31 20:50:44.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU 361 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:44.439 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 362 Sending msg of 28 bytes to 3 on channel testchainid took 69.1µs" +orderer0.example.com | "2020-08-31 20:50:44.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 363 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 304.2µs " +orderer0.example.com | "2020-08-31 20:50:44.442 UTC [orderer.common.cluster.step] sendMessage -> DEBU 364 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.5473ms " +orderer0.example.com | "2020-08-31 20:50:44.910 UTC [orderer.common.cluster.step] handleMessage -> DEBU 365 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:44.911 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 366 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +orderer0.example.com | "2020-08-31 20:50:44.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU 367 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 220.8µs " +orderer0.example.com | "2020-08-31 20:50:45.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU 368 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:45.413 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 369 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +orderer0.example.com | "2020-08-31 20:50:45.413 UTC [orderer.common.cluster.step] sendMessage -> DEBU 36a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.1µs " +orderer0.example.com | "2020-08-31 20:50:45.909 UTC [orderer.common.cluster.step] handleMessage -> DEBU 36b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:45.909 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 36c Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +orderer0.example.com | "2020-08-31 20:50:45.909 UTC [orderer.common.cluster.step] sendMessage -> DEBU 36d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.2µs " +orderer0.example.com | "2020-08-31 20:50:46.408 UTC [orderer.common.cluster.step] handleMessage -> DEBU 36e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:46.408 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 36f Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +orderer0.example.com | "2020-08-31 20:50:46.409 UTC [orderer.common.cluster.step] sendMessage -> DEBU 370 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.9µs " +orderer0.example.com | "2020-08-31 20:50:46.908 UTC [orderer.common.cluster.step] handleMessage -> DEBU 371 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:46.908 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 372 Sending msg of 28 bytes to 3 on channel testchainid took 21.3µs" +orderer0.example.com | "2020-08-31 20:50:46.908 UTC [orderer.common.cluster.step] sendMessage -> DEBU 373 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.6µs " +orderer0.example.com | "2020-08-31 20:50:47.408 UTC [orderer.common.cluster.step] handleMessage -> DEBU 374 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:47.409 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 375 Sending msg of 28 bytes to 3 on channel testchainid took 24.2µs" +orderer0.example.com | "2020-08-31 20:50:47.409 UTC [orderer.common.cluster.step] sendMessage -> DEBU 376 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.2µs " +orderer0.example.com | "2020-08-31 20:50:47.910 UTC [orderer.common.cluster.step] handleMessage -> DEBU 377 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:47.911 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 378 Sending msg of 28 bytes to 3 on channel testchainid took 21.1µs" +orderer0.example.com | "2020-08-31 20:50:47.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU 379 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 158.8µs " +orderer0.example.com | "2020-08-31 20:50:48.409 UTC [orderer.common.cluster.step] handleMessage -> DEBU 37a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:48.409 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 37b Sending msg of 28 bytes to 3 on channel testchainid took 20.3µs" +orderer0.example.com | "2020-08-31 20:50:48.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 37c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 423.7µs " +orderer0.example.com | "2020-08-31 20:50:48.909 UTC [orderer.common.cluster.step] handleMessage -> DEBU 37d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:48.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 37e Sending msg of 28 bytes to 3 on channel testchainid took 189.4µs" +orderer0.example.com | "2020-08-31 20:50:48.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU 37f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.8µs " +orderer0.example.com | "2020-08-31 20:50:49.409 UTC [orderer.common.cluster.step] handleMessage -> DEBU 380 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:49.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 381 Sending msg of 28 bytes to 3 on channel testchainid took 23.8µs" +orderer0.example.com | "2020-08-31 20:50:49.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 382 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.6µs " +orderer0.example.com | "2020-08-31 20:50:49.909 UTC [orderer.common.cluster.step] handleMessage -> DEBU 383 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:49.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 384 Sending msg of 28 bytes to 3 on channel testchainid took 29.2µs" +orderer0.example.com | "2020-08-31 20:50:49.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU 385 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.2µs " +orderer0.example.com | "2020-08-31 20:50:50.409 UTC [orderer.common.cluster.step] handleMessage -> DEBU 386 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:50.409 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 387 Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" +orderer0.example.com | "2020-08-31 20:50:50.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 388 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 188.2µs " +orderer0.example.com | "2020-08-31 20:50:50.910 UTC [orderer.common.cluster.step] handleMessage -> DEBU 389 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:50.911 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 38a Sending msg of 28 bytes to 3 on channel testchainid took 177.6µs" +orderer0.example.com | "2020-08-31 20:50:50.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU 38b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 709.7µs " +orderer0.example.com | "2020-08-31 20:50:51.410 UTC [orderer.common.cluster.step] handleMessage -> DEBU 38c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:51.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 38d Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" +orderer0.example.com | "2020-08-31 20:50:51.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU 38e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 268.4µs " +orderer0.example.com | "2020-08-31 20:50:51.909 UTC [orderer.common.cluster.step] handleMessage -> DEBU 38f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:51.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 390 Sending msg of 28 bytes to 3 on channel testchainid took 32.6µs" +orderer0.example.com | "2020-08-31 20:50:51.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU 391 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 501.6µs " +orderer0.example.com | "2020-08-31 20:50:52.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU 392 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:52.413 UTC [orderer.common.cluster.step] sendMessage -> DEBU 394 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.7µs " +orderer0.example.com | "2020-08-31 20:50:52.413 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 393 Sending msg of 28 bytes to 3 on channel testchainid took 25.2µs" +orderer0.example.com | "2020-08-31 20:50:52.910 UTC [orderer.common.cluster.step] handleMessage -> DEBU 395 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:52.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 396 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +orderer0.example.com | "2020-08-31 20:50:52.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU 397 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 269µs " +orderer0.example.com | "2020-08-31 20:50:53.409 UTC [orderer.common.cluster.step] handleMessage -> DEBU 398 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:53.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 399 Sending msg of 28 bytes to 3 on channel testchainid took 30.5µs" +orderer0.example.com | "2020-08-31 20:50:53.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 39a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113µs " +orderer0.example.com | "2020-08-31 20:50:53.517 UTC [orderer.common.server] replicateDisabledChains -> DEBU 39b No inactive chains to try to replicate" +orderer0.example.com | "2020-08-31 20:50:53.909 UTC [orderer.common.cluster.step] handleMessage -> DEBU 39c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:53.909 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 39d Sending msg of 28 bytes to 3 on channel testchainid took 28.2µs" +orderer0.example.com | "2020-08-31 20:50:53.909 UTC [orderer.common.cluster.step] sendMessage -> DEBU 39e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.9µs " +orderer0.example.com | "2020-08-31 20:50:54.409 UTC [orderer.common.cluster.step] handleMessage -> DEBU 39f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:54.409 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a0 Sending msg of 28 bytes to 3 on channel testchainid took 29.4µs" +orderer0.example.com | "2020-08-31 20:50:54.409 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3a1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 218.8µs " +orderer0.example.com | "2020-08-31 20:50:54.915 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3a2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:54.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a3 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +orderer0.example.com | "2020-08-31 20:50:54.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3a4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.9µs " +orderer0.example.com | "2020-08-31 20:50:55.409 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3a5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:55.409 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a6 Sending msg of 28 bytes to 3 on channel testchainid took 21.7µs" +orderer0.example.com | "2020-08-31 20:50:55.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3a7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.6µs " +orderer0.example.com | "2020-08-31 20:50:55.908 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3a8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:55.909 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a9 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2020-08-31 20:50:55.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3aa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 638.7µs " +orderer0.example.com | "2020-08-31 20:50:55.938 UTC [orderer.common.server] Deliver -> DEBU 3ab Starting new Deliver handler" +orderer0.example.com | "2020-08-31 20:50:55.938 UTC [common.deliver] Handle -> DEBU 3ac Starting new deliver loop for 172.18.0.9:50712" +orderer0.example.com | "2020-08-31 20:50:55.938 UTC [common.deliver] Handle -> DEBU 3ad Attempting to read seek info message from 172.18.0.9:50712" +orderer0.example.com | "2020-08-31 20:50:55.967 UTC [orderer.common.server] Broadcast -> DEBU 3ae Starting new Broadcast handler" +orderer0.example.com | "2020-08-31 20:50:55.968 UTC [orderer.common.broadcast] Handle -> DEBU 3af Starting new broadcast loop for 172.18.0.9:50714" +orderer0.example.com | "2020-08-31 20:50:55.969 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 3b0 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:50714" +orderer0.example.com | "2020-08-31 20:50:55.969 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 3b1 Processing config update tx with system channel message processor for channel ID businesschannel" +orderer0.example.com | "2020-08-31 20:50:55.970 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 3b2 Processing channel create tx for channel businesschannel on system channel testchainid" +orderer0.example.com | "2020-08-31 20:50:55.971 UTC [common.channelconfig] NewStandardValues -> DEBU 3b3 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-08-31 20:50:55.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b4 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-08-31 20:50:55.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b5 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-08-31 20:50:55.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b6 Processing field: OrdererAddresses" +orderer0.example.com | "2020-08-31 20:50:55.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b7 Processing field: Consortium" +orderer0.example.com | "2020-08-31 20:50:55.973 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b8 Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:50:55.973 UTC [common.channelconfig] NewStandardValues -> DEBU 3b9 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-08-31 20:50:55.974 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3ba Processing field: ConsensusType" +orderer0.example.com | "2020-08-31 20:50:55.974 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bb Processing field: BatchSize" +orderer0.example.com | "2020-08-31 20:50:55.974 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bc Processing field: BatchTimeout" +orderer0.example.com | "2020-08-31 20:50:55.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bd Processing field: KafkaBrokers" +orderer0.example.com | "2020-08-31 20:50:55.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3be Processing field: ChannelRestrictions" +orderer0.example.com | "2020-08-31 20:50:55.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bf Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:50:55.976 UTC [common.channelconfig] NewStandardValues -> DEBU 3c0 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-08-31 20:50:55.976 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c1 Processing field: Endpoints" +orderer0.example.com | "2020-08-31 20:50:55.976 UTC [common.channelconfig] NewStandardValues -> DEBU 3c2 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:50:55.977 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c3 Processing field: MSP" +orderer0.example.com | "2020-08-31 20:50:55.977 UTC [common.channelconfig] validateMSP -> DEBU 3c4 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:55.978 UTC [msp] newBccspMsp -> DEBU 3c5 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:55.978 UTC [msp] New -> DEBU 3c6 Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:50:55.979 UTC [msp] Setup -> DEBU 3c7 Setting up MSP instance OrdererMSP" +peer0.org2.example.com | [439 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [43a 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [43b 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [43c 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [43d 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43e 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43f 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [440 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [441 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [442 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [443 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [444 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [445 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org2.example.com | [446 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org2.example.com | [447 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org2.example.com | [448 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org2.example.com | [449 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org2.example.com | [44a 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [44b 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org2.example.com | [44c 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org2.example.com | [44d 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [44e 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [44f 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [450 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [451 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [452 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer0.org2.example.com | [453 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org2.example.com | [454 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [455 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [456 08-31 20:51:04.29 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org2.example.com | [457 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [458 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [459 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [45a 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [45b 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [45c 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org2.example.com | [45d 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org2.example.com | [45e 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [45f 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [460 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org2.example.com | [461 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [462 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | [463 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | [464 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org2.example.com | [465 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | [466 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org2.example.com | [467 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org2.example.com | [468 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [469 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +orderer0.example.com | "2020-08-31 20:50:55.980 UTC [msp.identity] newIdentity -> DEBU 3c8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:55.981 UTC [common.channelconfig] NewStandardValues -> DEBU 3c9 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-08-31 20:50:55.981 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3ca Processing field: ACLs" +orderer0.example.com | "2020-08-31 20:50:55.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3cb Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:50:55.982 UTC [common.channelconfig] NewStandardValues -> DEBU 3cc Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-08-31 20:50:55.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3cd Processing field: AnchorPeers" +orderer0.example.com | "2020-08-31 20:50:55.983 UTC [common.channelconfig] NewStandardValues -> DEBU 3ce Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:50:55.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3cf Processing field: MSP" +orderer0.example.com | "2020-08-31 20:50:55.984 UTC [common.channelconfig] Validate -> DEBU 3d0 Anchor peers for org Org1MSP are " +orderer0.example.com | "2020-08-31 20:50:55.984 UTC [common.channelconfig] validateMSP -> DEBU 3d1 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-08-31 20:50:55.985 UTC [msp] newBccspMsp -> DEBU 3d2 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:55.985 UTC [msp] New -> DEBU 3d3 Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:50:55.985 UTC [msp] Setup -> DEBU 3d4 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-08-31 20:50:55.986 UTC [msp.identity] newIdentity -> DEBU 3d5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:55.987 UTC [common.channelconfig] NewStandardValues -> DEBU 3d6 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-08-31 20:50:55.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d7 Processing field: AnchorPeers" +orderer0.example.com | "2020-08-31 20:50:55.987 UTC [common.channelconfig] NewStandardValues -> DEBU 3d8 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:50:55.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d9 Processing field: MSP" +orderer0.example.com | "2020-08-31 20:50:55.988 UTC [common.channelconfig] Validate -> DEBU 3da Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-08-31 20:50:55.988 UTC [common.channelconfig] validateMSP -> DEBU 3db Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-08-31 20:50:55.988 UTC [msp] newBccspMsp -> DEBU 3dc Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:55.988 UTC [msp] New -> DEBU 3dd Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:50:55.989 UTC [msp] Setup -> DEBU 3de Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-08-31 20:50:55.989 UTC [msp.identity] newIdentity -> DEBU 3df Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:55.990 UTC [msp] Setup -> DEBU 3e0 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-08-31 20:50:55.990 UTC [msp] Setup -> DEBU 3e1 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-08-31 20:50:55.990 UTC [policies] NewManagerImpl -> DEBU 3e2 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:55.991 UTC [policies] NewManagerImpl -> DEBU 3e3 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:55.991 UTC [policies] NewManagerImpl -> DEBU 3e4 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:55.991 UTC [policies] NewManagerImpl -> DEBU 3e5 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:55.991 UTC [policies] NewManagerImpl -> DEBU 3e6 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:55.991 UTC [policies] NewManagerImpl -> DEBU 3e7 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:55.992 UTC [policies] NewManagerImpl -> DEBU 3e8 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:55.992 UTC [policies] NewManagerImpl -> DEBU 3e9 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:55.992 UTC [policies] NewManagerImpl -> DEBU 3ea Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:55.993 UTC [policies] NewManagerImpl -> DEBU 3eb Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:55.993 UTC [policies] NewManagerImpl -> DEBU 3ec Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:55.994 UTC [policies] NewManagerImpl -> DEBU 3ed Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:55.994 UTC [policies] NewManagerImpl -> DEBU 3ee Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:55.995 UTC [policies] NewManagerImpl -> DEBU 3ef Proposed new policy Endorsement for Channel/Application/Org1MSP" +peer0.org2.example.com | [46a 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org2.example.com | [46b 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [46c 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [46d 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org2.example.com | [46e 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [46f 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [470 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org2.example.com | [471 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org2.example.com | nw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [472 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org2.example.com | [473 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org2.example.com | [474 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [475 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [476 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [477 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org2.example.com | [478 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | [479 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | [47a 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org2.example.com | [47b 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org2.example.com | [47c 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org2.example.com | [47d 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer0.org2.example.com | [47e 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org2.example.com | [47f 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org2.example.com | [480 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org2.example.com | [481 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org2.example.com | [482 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [483 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [484 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [485 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org2.example.com | [486 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [487 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org2.example.com | [488 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org2.example.com | [489 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | [48a 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | [48b 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org2.example.com | [48c 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [48d 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | [48e 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | [48f 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org2.example.com | [490 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [491 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org2.example.com | [492 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org2.example.com | [493 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org2.example.com | [494 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org2.example.com | [495 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org2.example.com | [496 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org2.example.com | [497 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org2.example.com | [498 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org2.example.com | [499 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org2.example.com | [49a 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org2.example.com | [49b 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org2.example.com | [49c 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [49d 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [49e 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [49f 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [4a0 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [4a1 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [4a2 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [4a3 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [4a4 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [4a5 08-31 20:51:04.30 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [4a6 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [4a7 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4a8 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [4a9 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [4aa 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [4ab 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [4ac 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [4ad 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [4ae 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [4af 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [4b0 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org2.example.com | [4b1 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org2.example.com | [4b2 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org2.example.com | [4b3 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org2.example.com | [4b4 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org2.example.com | [4b5 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org2.example.com | [4b6 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org2.example.com | [4b7 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org2.example.com | [4b8 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org2.example.com | [4b9 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org2.example.com | [4ba 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [4bb 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [4bc 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [4bd 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [4be 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [4bf 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [4c0 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org2.example.com | [4c1 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org2.example.com | [4c2 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org2.example.com | [4c3 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org2.example.com | [4c4 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [4c5 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [4c6 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org2.example.com | [4c7 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org2.example.com | [4c8 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org2.example.com | [4c9 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org2.example.com | [4ca 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org2.example.com | [4cb 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org2.example.com | [4cc 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org2.example.com | [4cd 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org2.example.com | 00000020 df d1 ae 7e 02 20 2b 77 8a 7e aa 5c bd fa f5 76 |...~. +w.~.\...v| +peer1.org2.example.com | 00000030 6b bd 3d 49 6e 73 1a 12 7f 30 6c 34 57 c0 06 c4 |k.=Ins...0l4W...| +peer1.org2.example.com | 00000040 56 0c 2b fa b4 c4 |V.+...| +peer1.org2.example.com | [4bc 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c2e80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4bd 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034c2e80 gate 1598907064629136900 evaluation succeeds +peer1.org2.example.com | [4be 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [4bf 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [4c0 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4c1 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [4c2 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4c3 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4c4 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4c5 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [4c6 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org2.example.com | [4c7 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [4c8 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4c9 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4ca 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org2.example.com | [4cb 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org2.example.com | [4cc 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org2.example.com | [4cd 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4ce 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4cf 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [4d0 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [4d1 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org2.example.com | [4d2 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4d3 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [4d4 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org2.example.com | [4d5 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org2.example.com | [4d6 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org2.example.com | [4d7 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org2.example.com | [4d8 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org2.example.com | [4d9 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org2.example.com | [4da 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [4db 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org2.example.com | [4dc 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org2.example.com | [4dd 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org2.example.com | [4de 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org2.example.com | [4df 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org2.example.com | [4e0 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org2.example.com | [4e1 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [4e2 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org2.example.com | [4e3 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org2.example.com | [4e4 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [4e5 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [4e6 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org2.example.com | [4e7 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [4e8 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [4e9 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org2.example.com | [4ea 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org2.example.com | nw== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [4eb 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org2.example.com | [4ec 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org2.example.com | [4ed 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org2.example.com | [4ee 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [4ef 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [4f0 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [4f1 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [4f2 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [3ef 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a ba 77 00 cd 70 eb d3 8a 6e 10 ca |0D. Z.w..p...n..| +peer0.org1.example.com | 00000010 d2 fa 28 d7 03 2c 08 dc e5 c3 7c 58 39 23 ca b1 |..(..,....|X9#..| +orderer0.example.com | "2020-08-31 20:50:55.996 UTC [policies] NewManagerImpl -> DEBU 3f0 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:55.997 UTC [policies] NewManagerImpl -> DEBU 3f1 Proposed new policy ChannelCreationPolicy for Channel/Application" +orderer0.example.com | "2020-08-31 20:50:55.997 UTC [policies] GetPolicy -> DEBU 3f2 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +orderer0.example.com | "2020-08-31 20:50:55.997 UTC [policies] NewManagerImpl -> DEBU 3f3 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-08-31 20:50:55.998 UTC [policies] GetPolicy -> DEBU 3f4 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +orderer0.example.com | "2020-08-31 20:50:55.998 UTC [policies] NewManagerImpl -> DEBU 3f5 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-08-31 20:50:55.998 UTC [policies] GetPolicy -> DEBU 3f6 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:50:55.998 UTC [policies] NewManagerImpl -> DEBU 3f7 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-08-31 20:50:55.999 UTC [common.configtx] addToMap -> DEBU 3f8 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-08-31 20:50:55.999 UTC [common.configtx] addToMap -> DEBU 3f9 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:55.999 UTC [common.configtx] addToMap -> DEBU 3fa Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:56.000 UTC [common.configtx] addToMap -> DEBU 3fb Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-08-31 20:50:56.000 UTC [common.configtx] addToMap -> DEBU 3fc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:50:56.000 UTC [common.configtx] addToMap -> DEBU 3fd Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-08-31 20:50:56.000 UTC [common.configtx] addToMap -> DEBU 3fe Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-08-31 20:50:56.001 UTC [common.configtx] addToMap -> DEBU 3ff Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-08-31 20:50:56.001 UTC [common.configtx] addToMap -> DEBU 400 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.001 UTC [common.configtx] addToMap -> DEBU 401 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-08-31 20:50:56.002 UTC [common.configtx] addToMap -> DEBU 402 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-08-31 20:50:56.002 UTC [common.configtx] addToMap -> DEBU 403 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-08-31 20:50:56.002 UTC [common.configtx] addToMap -> DEBU 404 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-08-31 20:50:56.003 UTC [common.configtx] addToMap -> DEBU 405 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:50:56.003 UTC [common.configtx] addToMap -> DEBU 406 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-08-31 20:50:56.003 UTC [common.configtx] addToMap -> DEBU 407 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-08-31 20:50:56.003 UTC [common.configtx] addToMap -> DEBU 408 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.004 UTC [common.configtx] addToMap -> DEBU 409 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.004 UTC [common.configtx] addToMap -> DEBU 40a Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-08-31 20:50:56.005 UTC [common.configtx] addToMap -> DEBU 40b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-08-31 20:50:56.005 UTC [common.configtx] addToMap -> DEBU 40c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:50:56.005 UTC [common.configtx] addToMap -> DEBU 40d Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:50:56.005 UTC [common.configtx] addToMap -> DEBU 40e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:50:56.005 UTC [common.configtx] addToMap -> DEBU 40f Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.005 UTC [common.configtx] addToMap -> DEBU 410 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-08-31 20:50:56.006 UTC [common.configtx] addToMap -> DEBU 411 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:50:56.006 UTC [common.configtx] addToMap -> DEBU 412 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-08-31 20:50:56.006 UTC [common.configtx] addToMap -> DEBU 413 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-08-31 20:50:56.006 UTC [common.configtx] addToMap -> DEBU 414 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:50:56.007 UTC [common.configtx] addToMap -> DEBU 415 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2020-08-31 20:50:56.007 UTC [common.configtx] addToMap -> DEBU 416 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.007 UTC [common.configtx] addToMap -> DEBU 417 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-08-31 20:50:56.007 UTC [common.configtx] addToMap -> DEBU 418 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-08-31 20:50:56.007 UTC [common.configtx] addToMap -> DEBU 419 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-08-31 20:50:56.008 UTC [common.configtx] addToMap -> DEBU 41a Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-08-31 20:50:56.008 UTC [common.configtx] addToMap -> DEBU 41b Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-08-31 20:50:56.008 UTC [common.configtx] addToMap -> DEBU 41c Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-08-31 20:50:56.008 UTC [common.configtx] addToMap -> DEBU 41d Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-08-31 20:50:56.008 UTC [common.configtx] addToMap -> DEBU 41e Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-08-31 20:50:56.009 UTC [common.configtx] addToMap -> DEBU 41f Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.009 UTC [common.configtx] addToMap -> DEBU 420 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.009 UTC [common.configtx] addToMap -> DEBU 421 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.009 UTC [common.configtx] addToMap -> DEBU 422 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-08-31 20:50:56.010 UTC [common.configtx] addToMap -> DEBU 423 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-08-31 20:50:56.010 UTC [common.configtx] addToMap -> DEBU 424 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.010 UTC [common.configtx] addToMap -> DEBU 425 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.010 UTC [common.configtx] addToMap -> DEBU 426 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.011 UTC [common.configtx] addToMap -> DEBU 427 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org2.example.com | [4ce 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org2.example.com | [4cf 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org2.example.com | [4d0 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer0.org2.example.com | [4d1 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org2.example.com | [4d2 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org2.example.com | [4d3 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org2.example.com | [4d4 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer0.org2.example.com | [4d5 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer0.org2.example.com | [4d6 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4d7 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org2.example.com | [4d8 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org2.example.com | [4d9 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [4da 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [4db 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | [4f3 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org2.example.com | [4f4 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [4f5 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [4f6 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org2.example.com | [4f7 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [4f8 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org2.example.com | [4f9 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org2.example.com | [4fa 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org2.example.com | [4fb 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org2.example.com | [4fc 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org2.example.com | [4fd 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org2.example.com | [4fe 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org2.example.com | [4ff 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org2.example.com | [500 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org2.example.com | [501 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [502 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org2.example.com | [503 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org2.example.com | [504 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [505 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [506 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org2.example.com | [507 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org2.example.com | [508 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00341cb70, READY +peer1.org2.example.com | [509 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [50a 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [50b 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [50c 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer1.org2.example.com | [50d 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org2.example.com | [50e 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:50:56.011 UTC [common.configtx] addToMap -> DEBU 428 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.011 UTC [common.configtx] addToMap -> DEBU 429 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-08-31 20:50:56.011 UTC [common.configtx] addToMap -> DEBU 42a Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-08-31 20:50:56.012 UTC [common.configtx] addToMap -> DEBU 42b Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-08-31 20:50:56.012 UTC [common.configtx] addToMap -> DEBU 42c Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-08-31 20:50:56.012 UTC [common.configtx] addToMap -> DEBU 42d Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:50:56.013 UTC [common.configtx] addToMap -> DEBU 42e Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-08-31 20:50:56.013 UTC [common.configtx] verifyDeltaSet -> DEBU 42f Processing change to key: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-08-31 20:50:56.013 UTC [common.configtx] verifyDeltaSet -> DEBU 430 Processing change to key: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-08-31 20:50:56.014 UTC [common.configtx] verifyDeltaSet -> DEBU 431 Processing change to key: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-08-31 20:50:56.014 UTC [common.configtx] verifyDeltaSet -> DEBU 432 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-08-31 20:50:56.014 UTC [common.configtx] verifyDeltaSet -> DEBU 433 Processing change to key: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-08-31 20:50:56.014 UTC [common.configtx] verifyDeltaSet -> DEBU 434 Processing change to key: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:50:56.015 UTC [common.configtx] verifyDeltaSet -> DEBU 435 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.016 UTC [common.configtx] policyForItem -> DEBU 436 Getting policy for item Application with mod_policy ChannelCreationPolicy" +orderer0.example.com | "2020-08-31 20:50:56.016 UTC [policies] Manager -> DEBU 437 Manager Channel looking up path []" +orderer0.example.com | "2020-08-31 20:50:56.016 UTC [policies] Manager -> DEBU 438 Manager Channel has managers Application" +orderer0.example.com | "2020-08-31 20:50:56.017 UTC [policies] Manager -> DEBU 439 Manager Channel has managers Orderer" +orderer0.example.com | "2020-08-31 20:50:56.017 UTC [policies] Manager -> DEBU 43a Manager Channel looking up path [Application]" +orderer0.example.com | "2020-08-31 20:50:56.017 UTC [policies] Manager -> DEBU 43b Manager Channel has managers Orderer" +orderer0.example.com | "2020-08-31 20:50:56.017 UTC [policies] Manager -> DEBU 43c Manager Channel has managers Application" +orderer0.example.com | "2020-08-31 20:50:56.017 UTC [policies] Manager -> DEBU 43d Manager Channel/Application looking up path []" +orderer0.example.com | "2020-08-31 20:50:56.018 UTC [policies] Manager -> DEBU 43e Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.018 UTC [policies] Manager -> DEBU 43f Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.018 UTC [policies] Evaluate -> DEBU 440 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +orderer0.example.com | "2020-08-31 20:50:56.018 UTC [policies] Evaluate -> DEBU 441 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:50:56.018 UTC [policies] Evaluate -> DEBU 442 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2020-08-31 20:50:56.018 UTC [msp] DeserializeIdentity -> DEBU 443 Obtaining identity" +orderer0.example.com | "2020-08-31 20:50:56.019 UTC [msp.identity] newIdentity -> DEBU 444 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +orderer0.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +orderer0.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +orderer0.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +orderer0.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:56.019 UTC [cauthdsl] func1 -> DEBU 445 0xc0009e8a00 gate 1598907056019312600 evaluation starts" +orderer0.example.com | "2020-08-31 20:50:56.019 UTC [cauthdsl] func2 -> DEBU 446 0xc0009e8a00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:50:56.019 UTC [cauthdsl] func2 -> DEBU 447 0xc0009e8a00 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:50:56.019 UTC [cauthdsl] func2 -> DEBU 448 0xc0009e8a00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +orderer0.example.com | "2020-08-31 20:50:56.019 UTC [cauthdsl] func2 -> DEBU 449 0xc0009e8a00 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:50:56.019 UTC [cauthdsl] func1 -> DEBU 44a 0xc0009e8a00 gate 1598907056019312600 evaluation fails" +orderer0.example.com | "2020-08-31 20:50:56.019 UTC [policies] Evaluate -> DEBU 44b Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-08-31 20:50:56.019 UTC [policies] Evaluate -> DEBU 44c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-08-31 20:50:56.019 UTC [policies] Evaluate -> DEBU 44d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2020-08-31 20:50:56.019 UTC [cauthdsl] func1 -> DEBU 44e 0xc0009e9bc0 gate 1598907056019627400 evaluation starts" +orderer0.example.com | "2020-08-31 20:50:56.019 UTC [cauthdsl] func2 -> DEBU 44f 0xc0009e9bc0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:50:56.019 UTC [cauthdsl] func2 -> DEBU 450 0xc0009e9bc0 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:50:56.019 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 451 Checking if identity has been named explicitly as an admin for Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.019 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 452 Checking if identity carries the admin ou for Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.020 UTC [msp] Validate -> DEBU 453 MSP Org1MSP validating identity" +orderer0.example.com | "2020-08-31 20:50:56.021 UTC [msp] getCertificationChain -> DEBU 454 MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-08-31 20:50:56.022 UTC [msp] hasOURole -> DEBU 455 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2020-08-31 20:50:56.022 UTC [msp] getCertificationChain -> DEBU 456 MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-08-31 20:50:56.022 UTC [cauthdsl] func2 -> DEBU 457 0xc0009e9bc0 principal matched by identity 0" +orderer0.example.com | "2020-08-31 20:50:56.022 UTC [msp.identity] Verify -> DEBU 458 Verify: digest = 00000000 7b aa e0 b7 8c 39 88 52 d3 c7 42 36 0c c0 87 77 |{....9.R..B6...w| +orderer0.example.com | 00000010 ee 05 17 15 bb 6e d1 44 66 85 79 9d 67 86 ef e3 |.....n.Df.y.g...|" +orderer0.example.com | "2020-08-31 20:50:56.023 UTC [msp.identity] Verify -> DEBU 459 Verify: sig = 00000000 30 45 02 21 00 a2 72 8c e7 15 80 e5 4c e7 66 4a |0E.!..r.....L.fJ| +orderer0.example.com | 00000010 9a 9a c3 fd 15 cd 7e 00 02 e9 75 1d 42 fa 91 17 |......~...u.B...| +peer0.org2.example.com | [4dc 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 fd da 6f 40 02 20 1d 5c f7 fc bb d8 e2 e0 19 90 |..o@. .\........| +peer1.org2.example.com | [50f 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 ee b9 13 91 2d c5 2c 69 ec 14 2a 0f f3 f1 54 a2 |....-.,i..*...T.| +orderer0.example.com | 00000020 49 33 d6 c0 6b 02 20 5e 5b d2 a8 61 f8 27 b2 72 |I3..k. ^[..a.'.r| +peer0.org2.example.com | [4dd 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | 00000030 eb 2a c8 db 7e 55 16 42 16 f8 0e c7 5c 47 ce 94 |.*..~U.B....\G..| +peer1.org2.example.com | [510 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [498 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 b4 a7 cf 0c d5 ef fc 4a 2d 2b 1c |0D. ........J-+.| +orderer0.example.com | 00000030 2e 0d 62 b7 ba ef c0 c0 87 90 8a b9 20 a6 de f5 |..b......... ...| +peer0.org2.example.com | [4de 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003458c70, CONNECTING +peer0.org1.example.com | 00000040 c4 ab c8 4b 55 6b |...KUk| +peer1.org2.example.com | [511 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 62 61 50 e5 d5 98 dc d2 14 31 4f 44 6a a4 86 44 |baP......1ODj..D| +orderer0.example.com | 00000040 b1 31 27 56 61 a9 0c |.1'Va..|" +peer0.org2.example.com | [4df 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3f0 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [512 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org1.example.com | 00000020 b0 89 10 60 02 20 58 11 e4 1a 38 2d 02 16 fb d0 |...`. X...8-....| +orderer0.example.com | "2020-08-31 20:50:56.023 UTC [cauthdsl] func2 -> DEBU 45a 0xc0009e9bc0 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [4e0 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f1 08-31 20:51:01.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [513 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 3e 3a 82 7c a3 2e 16 22 69 6d a8 0c 03 8a 46 67 |>:.|..."im....Fg| +peer1.org1.example.com | 00000040 2d c0 ba 70 a1 eb |-..p..| +orderer0.example.com | "2020-08-31 20:50:56.024 UTC [cauthdsl] func1 -> DEBU 45b 0xc0009e9bc0 gate 1598907056019627400 evaluation succeeds" +peer0.org1.example.com | [3f2 08-31 20:51:01.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [514 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org1.example.com | [499 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +orderer0.example.com | "2020-08-31 20:50:56.024 UTC [policies] Evaluate -> DEBU 45c Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +peer0.org2.example.com | [4e1 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3f3 08-31 20:51:01.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [515 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org1.example.com | [49a 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0033dd500, header channel_header:"\010\001\032\006\010\264\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\0305\231\256\356\005\207\177s\320\333\2161g\250g\375\0331i\366p\262\234\235" +orderer0.example.com | "2020-08-31 20:50:56.024 UTC [policies] Evaluate -> DEBU 45d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:50:56.025 UTC [policies] Evaluate -> DEBU 45e Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2020-08-31 20:50:56.025 UTC [policies] Evaluate -> DEBU 45f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2020-08-31 20:50:56.025 UTC [common.configtx] verifyDeltaSet -> DEBU 460 Processing change to key: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.026 UTC [common.configtx] recurseConfigMap -> DEBU 461 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.026 UTC [common.configtx] recurseConfigMap -> DEBU 462 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.026 UTC [common.configtx] recurseConfigMap -> DEBU 463 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.027 UTC [common.configtx] recurseConfigMap -> DEBU 464 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.027 UTC [common.configtx] recurseConfigMap -> DEBU 465 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.027 UTC [common.configtx] recurseConfigMap -> DEBU 466 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [4e2 08-31 20:51:04.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +orderer0.example.com | "2020-08-31 20:50:56.028 UTC [common.configtx] recurseConfigMap -> DEBU 467 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.028 UTC [common.configtx] recurseConfigMap -> DEBU 468 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.028 UTC [common.configtx] recurseConfigMap -> DEBU 469 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.028 UTC [common.configtx] recurseConfigMap -> DEBU 46a Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 46b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer1.org2.example.com | [516 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org1.example.com | [49b 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org1.example.com | [49c 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [49d 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +orderer0.example.com | "2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 46c Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 46d Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 46e Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 46f Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 470 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 471 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 472 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 473 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 474 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 475 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 476 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 477 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.029 UTC [msp] GetDefaultSigningIdentity -> DEBU 478 Obtaining default signing identity" +orderer0.example.com | "2020-08-31 20:50:56.029 UTC [msp] GetDefaultSigningIdentity -> DEBU 479 Obtaining default signing identity" +orderer0.example.com | "2020-08-31 20:50:56.030 UTC [msp.identity] Sign -> DEBU 47a Sign: plaintext: 0AEA060A1B08011A0608B0C5B5FA0522...0E56BB6710C9F273C601DF91CB8DAD86 " +orderer0.example.com | "2020-08-31 20:50:56.030 UTC [msp.identity] Sign -> DEBU 47b Sign: digest: F84A3513D527AC2AB3DEEA6B9EEFE6320527C75111F6C9EF8BE7F1132AE98C1B " +orderer0.example.com | "2020-08-31 20:50:56.030 UTC [msp] GetDefaultSigningIdentity -> DEBU 47c Obtaining default signing identity" +orderer0.example.com | "2020-08-31 20:50:56.030 UTC [msp] GetDefaultSigningIdentity -> DEBU 47d Obtaining default signing identity" +orderer0.example.com | "2020-08-31 20:50:56.030 UTC [msp.identity] Sign -> DEBU 47e Sign: plaintext: 0AE6060A1708041A0608B0C5B5FA0522...92E1047AA70A4A8656123FAD6A098BED " +peer0.org1.example.com | [3f4 08-31 20:51:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [517 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4e3 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003458c70, READY +peer0.org2.example.com | [4e4 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4e5 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [4e6 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [4e7 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [4ea 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4eb 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ed 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4ec 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org2.example.com | [4ee 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org2.example.com | [4ef 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4f0 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org2.example.com | [4f1 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org2.example.com | [4f2 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4f3 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4f4 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org2.example.com | [4f5 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4f9 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4fa 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4fd 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:51254 disconnected +peer0.org2.example.com | [4fe 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:51254 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error=EOF grpc.code=Unknown grpc.call_duration=264.813ms +peer0.org2.example.com | [4f8 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [4fc 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4ff 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e2c80 gate 1598907064336799600 evaluation starts +peer0.org2.example.com | [501 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e2c80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [502 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e2c80 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4fb 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer0.org2.example.com | [500 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [4f6 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0031a4580 env 0xc0031e2640 txn 0 +peer0.org2.example.com | [4f7 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [504 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 61ms +peer0.org2.example.com | [503 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e2c80 principal matched by identity 0 +peer0.org2.example.com | [505 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [506 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 be c5 33 e0 1f 4d 62 b9 64 54 |0E.!....3..Mb.dT| +peer0.org2.example.com | 00000010 08 cc fc ae 0d d7 b3 20 65 1e 9b ae d6 69 bd 01 |....... e....i..| +peer0.org2.example.com | 00000020 65 6f d8 cd 7a 02 20 03 14 ae 35 bf 45 3a 51 ec |eo..z. ...5.E:Q.| +peer0.org2.example.com | 00000030 e3 0c dc d1 1a 11 b7 31 4a 26 e1 94 26 4f d9 02 |.......1J&..&O..| +peer0.org2.example.com | 00000040 1c 4b a4 e4 75 73 a3 |.K..us.| +peer0.org2.example.com | [507 08-31 20:51:04.33 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [508 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [509 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org2.example.com | [50a 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e2c80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [50b 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +peer0.org2.example.com | [50c 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e2c80 gate 1598907064336799600 evaluation succeeds +peer0.org2.example.com | [50e 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [50d 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [50f 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [510 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [511 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [512 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [513 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +peer0.org2.example.com | [514 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [515 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [516 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org2.example.com | [517 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org2.example.com | [518 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org2.example.com | [519 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [51a 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org2.example.com | [51c 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [51b 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [51d 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org2.example.com | [520 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org2.example.com | [51e 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [51f 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [521 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [522 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816100D +peer0.org2.example.com | [523 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9F43861C03E499E391B6A7AEA67F5345A75ED190CBBCEC0FF68D46109485644C +peer0.org2.example.com | [524 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [525 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [526 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [527 08-31 20:51:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [528 08-31 20:51:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:7651936313432245060 tag:EMPTY mem_req:\310\027~\352\216\253>" > > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [529 08-31 20:51:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:7651936313432245060 tag:EMPTY mem_req:\310\027~\352\216\253>" > > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [52a 08-31 20:51:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [52b 08-31 20:51:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [52c 08-31 20:51:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [52d 08-31 20:51:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org2.example.com | [52e 08-31 20:51:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [52f 08-31 20:51:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00357f3f0, CONNECTING +orderer0.example.com | "2020-08-31 20:50:56.030 UTC [msp.identity] Sign -> DEBU 47f Sign: digest: A9043439659B475E463C9D4545675D8185BC42AAA1D96F3F4CFE7A6F725B412A " +orderer0.example.com | "2020-08-31 20:50:56.030 UTC [policies] Evaluate -> DEBU 480 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-08-31 20:50:56.030 UTC [policies] Evaluate -> DEBU 481 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:50:56.030 UTC [policies] Evaluate -> DEBU 482 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2020-08-31 20:50:56.030 UTC [policies] Evaluate -> DEBU 483 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [3f5 08-31 20:51:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f6 08-31 20:51:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f7 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f8 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 2d 0f 93 fa 5a 38 ea 1e a6 97 9b 85 21 70 63 |.-...Z8......!pc| +peer0.org1.example.com | 00000010 6d cc 60 e1 07 c2 ed a8 09 44 22 22 bd 46 b1 10 |m.`......D"".F..| +peer0.org1.example.com | [3f9 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b a9 f8 b1 8d 68 b8 c3 5a 96 2e d2 |0D. k....h..Z...| +peer0.org1.example.com | 00000010 4d 57 70 40 2f 28 0c 43 57 5f c2 00 c3 7d f0 87 |MWp@/(.CW_...}..| +peer0.org1.example.com | 00000020 a9 76 21 13 02 20 76 bd 5e 18 6f e2 bd 3d 0e e4 |.v!.. v.^.o..=..| +peer0.org1.example.com | 00000030 68 62 d6 ef 08 e3 5d 5c eb 6b c4 b5 f3 9d 3b 8c |hb....]\.k....;.| +peer0.org1.example.com | 00000040 d3 68 59 f1 33 fd |.hY.3.| +peer0.org1.example.com | [3fa 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3fb 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3fc 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3fd 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3fe 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3ff 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [400 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [401 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265ec0 gate 1598907061755097400 evaluation starts +peer0.org1.example.com | [402 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265ec0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [403 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265ec0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [404 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [405 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [406 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [407 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265ec0 principal matched by identity 0 +peer0.org1.example.com | [408 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 2d 0f 93 fa 5a 38 ea 1e a6 97 9b 85 21 70 63 |.-...Z8......!pc| +peer0.org1.example.com | 00000010 6d cc 60 e1 07 c2 ed a8 09 44 22 22 bd 46 b1 10 |m.`......D"".F..| +peer0.org1.example.com | [409 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b a9 f8 b1 8d 68 b8 c3 5a 96 2e d2 |0D. k....h..Z...| +peer0.org1.example.com | 00000010 4d 57 70 40 2f 28 0c 43 57 5f c2 00 c3 7d f0 87 |MWp@/(.CW_...}..| +peer0.org1.example.com | 00000020 a9 76 21 13 02 20 76 bd 5e 18 6f e2 bd 3d 0e e4 |.v!.. v.^.o..=..| +peer0.org1.example.com | 00000030 68 62 d6 ef 08 e3 5d 5c eb 6b c4 b5 f3 9d 3b 8c |hb....]\.k....;.| +peer0.org1.example.com | 00000040 d3 68 59 f1 33 fd |.hY.3.| +peer0.org1.example.com | [40a 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265ec0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [40b 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265ec0 gate 1598907061755097400 evaluation succeeds +peer0.org1.example.com | [40c 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [40d 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [40e 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [40f 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [410 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [411 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 69 bytes to 1 peers +peer1.org2.example.com | [518 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org2.example.com | [519 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +orderer0.example.com | "2020-08-31 20:50:56.030 UTC [policies] Evaluate -> DEBU 484 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2020-08-31 20:50:56.030 UTC [msp] DeserializeIdentity -> DEBU 485 Obtaining identity" +orderer0.example.com | "2020-08-31 20:50:56.030 UTC [msp.identity] newIdentity -> DEBU 486 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +orderer0.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +orderer0.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +orderer0.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +orderer0.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +orderer0.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +orderer0.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:56.030 UTC [cauthdsl] func1 -> DEBU 487 0xc000cd0c00 gate 1598907056030976200 evaluation starts" +orderer0.example.com | "2020-08-31 20:50:56.031 UTC [cauthdsl] func2 -> DEBU 488 0xc000cd0c00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:50:56.031 UTC [cauthdsl] func2 -> DEBU 489 0xc000cd0c00 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:50:56.031 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 48a Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2020-08-31 20:50:56.031 UTC [msp] Validate -> DEBU 48b MSP OrdererMSP validating identity" +orderer0.example.com | "2020-08-31 20:50:56.031 UTC [msp] getCertificationChain -> DEBU 48c MSP OrdererMSP getting certification chain" +orderer0.example.com | "2020-08-31 20:50:56.031 UTC [cauthdsl] func2 -> DEBU 48d 0xc000cd0c00 principal matched by identity 0" +orderer0.example.com | "2020-08-31 20:50:56.031 UTC [msp.identity] Verify -> DEBU 48e Verify: digest = 00000000 a9 04 34 39 65 9b 47 5e 46 3c 9d 45 45 67 5d 81 |..49e.G^F<.EEg].| +orderer0.example.com | 00000010 85 bc 42 aa a1 d9 6f 3f 4c fe 7a 6f 72 5b 41 2a |..B...o?L.zor[A*|" +orderer0.example.com | "2020-08-31 20:50:56.031 UTC [msp.identity] Verify -> DEBU 48f Verify: sig = 00000000 30 45 02 21 00 fc 53 3d 35 42 71 ed d4 81 a3 f5 |0E.!..S=5Bq.....| +orderer0.example.com | 00000010 57 8f 1b 24 7f eb 84 9a bf 01 56 3d 14 0a c5 27 |W..$......V=...'| +orderer0.example.com | 00000020 e2 59 33 af a5 02 20 7f ee c6 b3 e4 81 81 0c 5a |.Y3... ........Z| +orderer0.example.com | 00000030 56 0e 53 bb 01 33 64 d1 9a 5e 2e c1 c0 4f 6a 98 |V.S..3d..^...Oj.| +orderer0.example.com | 00000040 cf 8b e5 34 49 dc b7 |...4I..|" +orderer0.example.com | "2020-08-31 20:50:56.031 UTC [cauthdsl] func2 -> DEBU 490 0xc000cd0c00 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-08-31 20:50:56.031 UTC [cauthdsl] func1 -> DEBU 491 0xc000cd0c00 gate 1598907056030976200 evaluation succeeds" +orderer0.example.com | "2020-08-31 20:50:56.031 UTC [policies] Evaluate -> DEBU 492 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-08-31 20:50:56.031 UTC [policies] Evaluate -> DEBU 493 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-08-31 20:50:56.031 UTC [policies] Evaluate -> DEBU 494 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-08-31 20:50:56.031 UTC [policies] Evaluate -> DEBU 495 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-08-31 20:50:56.031 UTC [policies] Evaluate -> DEBU 496 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-08-31 20:50:56.031 UTC [policies] Evaluate -> DEBU 497 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [common.channelconfig] NewStandardValues -> DEBU 498 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [common.channelconfig] initializeProtosStruct -> DEBU 499 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49a Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49b Processing field: OrdererAddresses" +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49c Processing field: Consortium" +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49d Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [common.channelconfig] NewStandardValues -> DEBU 49e Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49f Processing field: ACLs" +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a0 Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [common.channelconfig] NewStandardValues -> DEBU 4a1 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a2 Processing field: AnchorPeers" +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [common.channelconfig] NewStandardValues -> DEBU 4a3 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a4 Processing field: MSP" +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [common.channelconfig] Validate -> DEBU 4a5 Anchor peers for org Org1MSP are " +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [common.channelconfig] validateMSP -> DEBU 4a6 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [msp] newBccspMsp -> DEBU 4a7 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [msp] New -> DEBU 4a8 Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [msp] Setup -> DEBU 4a9 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.032 UTC [msp.identity] newIdentity -> DEBU 4aa Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:56.033 UTC [common.channelconfig] NewStandardValues -> DEBU 4ab Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-08-31 20:50:56.033 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ac Processing field: AnchorPeers" +orderer0.example.com | "2020-08-31 20:50:56.034 UTC [common.channelconfig] NewStandardValues -> DEBU 4ad Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:50:56.034 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ae Processing field: MSP" +orderer0.example.com | "2020-08-31 20:50:56.034 UTC [common.channelconfig] Validate -> DEBU 4af Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-08-31 20:50:56.034 UTC [common.channelconfig] validateMSP -> DEBU 4b0 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.034 UTC [msp] newBccspMsp -> DEBU 4b1 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:56.034 UTC [msp] New -> DEBU 4b2 Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:50:56.034 UTC [msp] Setup -> DEBU 4b3 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.035 UTC [msp.identity] newIdentity -> DEBU 4b4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:56.036 UTC [common.channelconfig] NewStandardValues -> DEBU 4b5 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-08-31 20:50:56.036 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b6 Processing field: ConsensusType" +orderer0.example.com | "2020-08-31 20:50:56.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b7 Processing field: BatchSize" +orderer0.example.com | "2020-08-31 20:50:56.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b8 Processing field: BatchTimeout" +orderer0.example.com | "2020-08-31 20:50:56.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b9 Processing field: KafkaBrokers" +orderer0.example.com | "2020-08-31 20:50:56.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ba Processing field: ChannelRestrictions" +orderer0.example.com | "2020-08-31 20:50:56.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4bb Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.037 UTC [common.channelconfig] NewStandardValues -> DEBU 4bc Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-08-31 20:50:56.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4bd Processing field: Endpoints" +orderer0.example.com | "2020-08-31 20:50:56.038 UTC [common.channelconfig] NewStandardValues -> DEBU 4be Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:50:56.038 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4bf Processing field: MSP" +orderer0.example.com | "2020-08-31 20:50:56.038 UTC [common.channelconfig] validateMSP -> DEBU 4c0 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:56.038 UTC [msp] newBccspMsp -> DEBU 4c1 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:56.038 UTC [msp] New -> DEBU 4c2 Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:50:56.039 UTC [msp] Setup -> DEBU 4c3 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-08-31 20:50:56.039 UTC [msp.identity] newIdentity -> DEBU 4c4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org1.example.com | [49e 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [49f 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [4a0 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4a1 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [4a2 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [4a3 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [4a4 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [4a5 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [4a6 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org1.example.com | [4a7 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [4a8 08-31 20:51:03.82 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org1.example.com | [4a9 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [4aa 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4ab 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [4ac 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [4ad 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +peer1.org1.example.com | [4ae 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [4af 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [4b0 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [4b1 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [4b2 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [4b3 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [4b4 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +peer1.org1.example.com | [4b5 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes +peer1.org1.example.com | [4b6 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes +peer1.org1.example.com | [4b7 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [4b9 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [4ba 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +peer1.org1.example.com | [4bb 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer1.org1.example.com | [4bc 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003424630 gate 1598907063845044000 evaluation starts +peer1.org1.example.com | [4bd 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003424630 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4be 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003424630 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [4bf 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer1.org1.example.com | [4c0 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer1.org1.example.com | [4c1 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [4c2 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [4b8 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4c3 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org1.example.com | [4c4 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [4c5 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [51a 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [51b 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org2.example.com | [51c 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [51d 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [51e 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org2.example.com | [51f 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [520 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org2.example.com | [521 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [522 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org2.example.com | [523 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org2.example.com | [524 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7540 gate 1598907064639938300 evaluation starts +peer1.org2.example.com | [525 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org2.example.com | [526 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7540 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [527 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [528 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7540 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [529 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [52a 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org2.example.com | [52b 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [52c 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [52d 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7540 principal evaluation fails +peer1.org2.example.com | [52e 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [52f 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7540 gate 1598907064639938300 evaluation fails +peer1.org2.example.com | [530 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org2.example.com | [531 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [532 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [533 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org2.example.com | [534 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [535 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org2.example.com | [536 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7ab0 gate 1598907064640239000 evaluation starts +peer1.org2.example.com | [537 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org2.example.com | [538 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7ab0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [539 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7ab0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [53a 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org2.example.com | [53b 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7ab0 principal matched by identity 0 +peer1.org2.example.com | [53c 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org2.example.com | [53d 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [53e 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org2.example.com | [53f 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org2.example.com | [540 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 69 35 ec 59 09 e3 3a 3d 6d cf 50 ca |0D. i5.Y..:=m.P.| +peer1.org2.example.com | 00000010 b5 28 1b e7 80 90 e6 1b 87 31 b7 d5 77 8b a5 e8 |.(.......1..w...| +peer1.org2.example.com | 00000020 a7 16 da 9e 02 20 37 ca 30 e1 d4 d9 77 56 6f 64 |..... 7.0...wVod| +peer1.org2.example.com | 00000030 01 a2 b9 be 6c f4 11 6b 7c 06 d0 11 06 66 c0 f5 |....l..k|....f..| +peer1.org2.example.com | 00000040 ba 30 36 74 ed 33 |.06t.3| +peer1.org2.example.com | [541 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org2.example.com | [542 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [543 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | [544 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org2.example.com | [545 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7ab0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [546 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org2.example.com | [547 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c7ab0 gate 1598907064640239000 evaluation succeeds +peer1.org2.example.com | [548 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org2.example.com | [54a 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org2.example.com | [549 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [54b 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [54c 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org2.example.com | [54d 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [54e 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org2.example.com | [54f 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org2.example.com | [550 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org2.example.com | [551 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [552 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org2.example.com | [553 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org2.example.com | [554 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org2.example.com | [555 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org2.example.com | [556 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org2.example.com | [557 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org2.example.com | [558 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org2.example.com | [559 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org2.example.com | [55a 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [55b 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org2.example.com | [55c 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org2.example.com | [55d 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org2.example.com | [55e 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org2.example.com | [55f 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org2.example.com | [560 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org2.example.com | [561 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org2.example.com | [562 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org2.example.com | [563 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org2.example.com | [564 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org2.example.com | [565 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org2.example.com | [566 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org2.example.com | [567 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org2.example.com | [568 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org2.example.com | [569 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org2.example.com | [56a 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org2.example.com | [56b 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org2.example.com | [56c 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org2.example.com | [56d 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org2.example.com | [56e 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org2.example.com | [56f 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [570 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [571 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [572 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org2.example.com | [573 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org2.example.com | [574 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org2.example.com | [575 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org2.example.com | [576 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org2.example.com | [577 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org2.example.com | [578 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org2.example.com | [579 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org2.example.com | [57a 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org2.example.com | [57b 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org2.example.com | [57c 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org2.example.com | [57d 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org2.example.com | [57e 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org2.example.com | [530 08-31 20:51:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org2.example.com | [531 08-31 20:51:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org2.example.com | [532 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org2.example.com | [533 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +peer0.org2.example.com | [534 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0034bdf80)} +peer0.org2.example.com | [535 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [536 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [537 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [538 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +peer0.org2.example.com | [539 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +peer0.org2.example.com | [53a 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +peer0.org2.example.com | [53b 08-31 20:51:04.35 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00357f3f0, READY +peer0.org2.example.com | [53c 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +peer0.org2.example.com | [53d 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0xe3, 0x22, 0xef, 0xdb, 0x1a, 0xb5, 0x8a, 0x4e, 0xca, 0x29, 0x72, 0xa1, 0x82, 0xd5, 0x73, 0xd2, 0x6c, 0x30, 0x29, 0x25, 0x12, 0x30, 0x2d, 0xc5, 0xc9, 0xfc, 0x53, 0x0, 0x88, 0x62, 0x25, 0xd} txOffsets= +peer0.org2.example.com | txId=0ab5ac5f1d5a2551b49ec6c24c6da873616029271ac520b4a7140ef88dfe6b38 locPointer=offset=71, bytesLength=27136 +peer0.org2.example.com | ] +peer0.org2.example.com | [53e 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28547, bytesLength=27136] for tx ID: [0ab5ac5f1d5a2551b49ec6c24c6da873616029271ac520b4a7140ef88dfe6b38] to txid-index +peer0.org2.example.com | [53f 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28547, bytesLength=27136] for tx number:[0] ID: [0ab5ac5f1d5a2551b49ec6c24c6da873616029271ac520b4a7140ef88dfe6b38] to blockNumTranNum index +peer0.org2.example.com | [540 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [541 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [542 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56679], isChainEmpty=[false], lastBlockNumber=[1] +peer0.org2.example.com | [543 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +peer0.org2.example.com | [544 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [545 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU 4c5 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-08-31 20:50:56.041 UTC [msp] Setup -> DEBU 4c6 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-08-31 20:50:56.041 UTC [policies] NewManagerImpl -> DEBU 4c7 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:56.041 UTC [policies] NewManagerImpl -> DEBU 4c8 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:56.041 UTC [policies] NewManagerImpl -> DEBU 4c9 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:56.042 UTC [policies] NewManagerImpl -> DEBU 4ca Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:56.042 UTC [policies] NewManagerImpl -> DEBU 4cb Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:56.042 UTC [policies] NewManagerImpl -> DEBU 4cc Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:56.042 UTC [policies] NewManagerImpl -> DEBU 4cd Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:56.043 UTC [policies] NewManagerImpl -> DEBU 4ce Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.043 UTC [policies] NewManagerImpl -> DEBU 4cf Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.043 UTC [policies] NewManagerImpl -> DEBU 4d0 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.043 UTC [policies] NewManagerImpl -> DEBU 4d1 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.044 UTC [policies] NewManagerImpl -> DEBU 4d2 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.044 UTC [policies] NewManagerImpl -> DEBU 4d3 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.044 UTC [policies] NewManagerImpl -> DEBU 4d4 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.044 UTC [policies] NewManagerImpl -> DEBU 4d5 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.045 UTC [policies] NewManagerImpl -> DEBU 4d6 Proposed new policy ChannelCreationPolicy for Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.045 UTC [policies] GetPolicy -> DEBU 4d7 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:50:56.045 UTC [policies] NewManagerImpl -> DEBU 4d8 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-08-31 20:50:56.045 UTC [policies] GetPolicy -> DEBU 4d9 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +orderer0.example.com | "2020-08-31 20:50:56.045 UTC [policies] NewManagerImpl -> DEBU 4da Proposed new policy Writers for Channel" +peer1.org1.example.com | [4c6 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003424630 principal matched by identity 0 +peer1.org1.example.com | [4c7 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 6a 5e 90 37 00 25 29 cc 2f 3d ec 44 8f 23 98 |.j^.7.%)./=.D.#.| +peer1.org1.example.com | 00000010 40 21 8f 78 1d c2 88 4f 31 16 8b 9b 25 00 fb 20 |@!.x...O1...%.. | +peer1.org1.example.com | [4c8 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d d5 10 d0 47 15 e1 14 bb 9f dc b9 |0D. ....G.......| +peer1.org1.example.com | 00000010 21 20 fe 43 aa a5 85 eb 20 91 d3 d3 25 c3 40 6f |! .C.... ...%.@o| +peer1.org1.example.com | 00000020 be ec 7e 52 02 20 3f 97 e3 ab d5 5a 98 c6 78 08 |..~R. ?....Z..x.| +peer1.org1.example.com | 00000030 e3 1a 1c 9b 18 c4 79 e9 08 26 b7 2a 98 01 0e 55 |......y..&.*...U| +peer1.org1.example.com | 00000040 0c af 35 37 61 76 |..57av| +peer1.org1.example.com | [4c9 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org1.example.com | [4ca 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003424630 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4cc 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003424630 gate 1598907063845044000 evaluation succeeds +peer1.org1.example.com | [4cd 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [4ce 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [4cf 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org1.example.com | [4cb 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4d0 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org1.example.com | [4d1 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org1.example.com | [4d2 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org1.example.com | [4d3 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org1.example.com | [4d4 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4d6 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [4d7 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [4d8 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4d9 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [4da 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [4d5 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fbef0 gate 1598907063848289500 evaluation starts +peer1.org1.example.com | [4db 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [4dc 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4dd 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fbef0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4df 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fbef0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [4e0 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fbef0 principal matched by identity 0 +peer1.org1.example.com | [4e1 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec df f2 ac 7d f3 0f 90 97 c6 fa 5a 88 ae 1a c5 |....}......Z....| +peer1.org1.example.com | 00000010 5a bb 6f b7 33 60 d2 91 59 2b 32 e5 3e 80 d5 1a |Z.o.3`..Y+2.>...| +peer1.org1.example.com | [4e2 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 72 3d 11 03 5c aa ca 61 05 2f |0E.!..r=..\..a./| +peer1.org1.example.com | 00000010 c5 ac 3d 38 a9 1d 8a 39 b0 a1 eb af c4 32 23 b8 |..=8...9.....2#.| +peer1.org1.example.com | 00000020 a0 82 2f dd 97 02 20 1d 25 fc 05 ba 0c ff 88 fe |../... .%.......| +peer1.org1.example.com | 00000030 64 89 ec 28 d5 2f d6 34 18 78 cb f5 d2 cc 91 36 |d..(./.4.x.....6| +peer1.org1.example.com | 00000040 b5 6e 94 36 fc dd 04 |.n.6...| +peer1.org1.example.com | [4de 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4e3 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4e4 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4e5 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fbef0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4e7 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fbef0 gate 1598907063848289500 evaluation succeeds +peer1.org1.example.com | [4e8 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [4e9 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [4e6 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [4eb 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4ec 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [4ed 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org1.example.com | [4ee 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4ef 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4ea 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [4f1 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [548 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [549 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [54a 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [54b 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [54c 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org2.example.com | [54d 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer0.org2.example.com | [54e 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [54f 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [550 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +peer0.org2.example.com | [551 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +peer0.org2.example.com | [552 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +peer0.org2.example.com | [553 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [554 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +peer0.org2.example.com | [555 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +peer0.org2.example.com | [556 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org2.example.com | [557 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [558 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +peer0.org2.example.com | [559 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 36ms (state_validation=19ms block_and_pvtdata_commit=9ms state_commit=4ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +peer0.org2.example.com | [55a 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [55b 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408B0BECFA2F8AF9D9816...9C09DCBB6042B0C019B601802A020802 +peer0.org2.example.com | [55c 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E2E57DA6BC2654FD9DCABA7268C3F10D46B74C4ED67A28D766D4BB6DA53173A2 +peer0.org2.example.com | [55d 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +peer0.org2.example.com | [55e 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +peer0.org2.example.com | [55f 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +peer0.org2.example.com | [560 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +peer0.org2.example.com | [561 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +peer0.org2.example.com | [562 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [563 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003610380 env 0xc003594f00 txn 0 +peer0.org2.example.com | [564 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc003594f00 +peer0.org2.example.com | [565 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\267\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030>\316\004\035\247\263T!\025\236\244\230\014\355k\242EsT\003\377-\204\213" +peer0.org2.example.com | [566 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org2.example.com | [567 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [568 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [569 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [56a 08-31 20:51:04.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [56b 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer0.org2.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer0.org2.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer0.org2.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org2.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org2.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer0.org2.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [56d 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org2.example.com | [56e 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [56f 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org2.example.com | [570 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [571 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 bb f3 d3 49 26 2e 3e 88 71 29 7d 0a 91 00 7f |....I&.>.q)}....| +peer0.org2.example.com | 00000010 c6 f2 a5 3e 3c 38 d2 3f 9b 58 9e bb c7 96 e4 4d |...><8.?.X.....M| +peer0.org2.example.com | [56c 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [572 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [573 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 8d d9 5c 84 4b 47 09 13 06 b6 |0E.!....\.KG....| +peer0.org2.example.com | 00000010 45 89 d8 00 01 66 d3 67 41 9b 6b b8 ac 4e 5e 22 |E....f.gA.k..N^"| +peer0.org2.example.com | 00000020 b8 13 f9 48 dd 02 20 05 54 f1 7c ff d1 ca b3 76 |...H.. .T.|....v| +orderer0.example.com | "2020-08-31 20:50:56.045 UTC [policies] GetPolicy -> DEBU 4db Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +orderer0.example.com | "2020-08-31 20:50:56.045 UTC [policies] NewManagerImpl -> DEBU 4dc Proposed new policy Admins for Channel" +orderer0.example.com | "2020-08-31 20:50:56.045 UTC [common.configtx] addToMap -> DEBU 4dd Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-08-31 20:50:56.046 UTC [common.configtx] addToMap -> DEBU 4de Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:56.046 UTC [common.configtx] addToMap -> DEBU 4df Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:56.046 UTC [common.configtx] addToMap -> DEBU 4e0 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-08-31 20:50:56.046 UTC [common.configtx] addToMap -> DEBU 4e1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:50:56.046 UTC [common.configtx] addToMap -> DEBU 4e2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-08-31 20:50:56.046 UTC [common.configtx] addToMap -> DEBU 4e3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-08-31 20:50:56.046 UTC [common.configtx] addToMap -> DEBU 4e4 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-08-31 20:50:56.047 UTC [common.configtx] addToMap -> DEBU 4e5 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-08-31 20:50:56.048 UTC [common.configtx] addToMap -> DEBU 4e6 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-08-31 20:50:56.048 UTC [common.configtx] addToMap -> DEBU 4e7 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.048 UTC [common.configtx] addToMap -> DEBU 4e8 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-08-31 20:50:56.048 UTC [common.configtx] addToMap -> DEBU 4e9 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-08-31 20:50:56.048 UTC [common.configtx] addToMap -> DEBU 4ea Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:50:56.048 UTC [common.configtx] addToMap -> DEBU 4eb Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4ec Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4ed Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4ee Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4ef Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f4 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f5 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4fa Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4fb Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-08-31 20:50:56.050 UTC [common.configtx] addToMap -> DEBU 4fc Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-08-31 20:50:56.050 UTC [common.configtx] addToMap -> DEBU 4fd Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.050 UTC [common.configtx] addToMap -> DEBU 4fe Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-08-31 20:50:56.050 UTC [common.configtx] addToMap -> DEBU 4ff Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 500 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 501 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 502 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 503 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 504 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 505 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 506 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 507 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 508 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 509 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.052 UTC [common.configtx] addToMap -> DEBU 50a Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.052 UTC [common.configtx] addToMap -> DEBU 50b Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.052 UTC [common.configtx] addToMap -> DEBU 50c Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-08-31 20:50:56.052 UTC [common.configtx] addToMap -> DEBU 50d Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.052 UTC [common.configtx] addToMap -> DEBU 50e Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-08-31 20:50:56.053 UTC [common.configtx] addToMap -> DEBU 50f Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-08-31 20:50:56.053 UTC [common.configtx] addToMap -> DEBU 510 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-08-31 20:50:56.053 UTC [common.configtx] addToMap -> DEBU 511 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-08-31 20:50:56.053 UTC [common.configtx] addToMap -> DEBU 512 Adding to config map: [Policy] /Channel/Application/Readers" +peer1.org2.example.com | [57f 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org2.example.com | [580 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org2.example.com | [581 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org2.example.com | [582 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org2.example.com | [583 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org2.example.com | [584 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org2.example.com | [585 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org2.example.com | [586 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org2.example.com | [587 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [588 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org2.example.com | [589 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer1.org2.example.com | [58a 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer0.org1.example.com | [412 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 69 bytes +peer0.org1.example.com | [413 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [414 08-31 20:51:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [415 08-31 20:51:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [416 08-31 20:51:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [417 08-31 20:51:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [418 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [419 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [41a 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 2d 0f 93 fa 5a 38 ea 1e a6 97 9b 85 21 70 63 |.-...Z8......!pc| +peer0.org1.example.com | 00000010 6d cc 60 e1 07 c2 ed a8 09 44 22 22 bd 46 b1 10 |m.`......D"".F..| +peer0.org1.example.com | [41b 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b a9 f8 b1 8d 68 b8 c3 5a 96 2e d2 |0D. k....h..Z...| +peer0.org1.example.com | 00000010 4d 57 70 40 2f 28 0c 43 57 5f c2 00 c3 7d f0 87 |MWp@/(.CW_...}..| +peer0.org1.example.com | 00000020 a9 76 21 13 02 20 76 bd 5e 18 6f e2 bd 3d 0e e4 |.v!.. v.^.o..=..| +peer0.org1.example.com | 00000030 68 62 d6 ef 08 e3 5d 5c eb 6b c4 b5 f3 9d 3b 8c |hb....]\.k....;.| +peer0.org1.example.com | 00000040 d3 68 59 f1 33 fd |.hY.3.| +peer0.org1.example.com | [41c 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41d 08-31 20:51:02.74 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]] +peer0.org1.example.com | [41e 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [41f 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> INFO 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Becoming a leader +peer0.org1.example.com | [420 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel +peer0.org1.example.com | [421 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> INFO This peer will retrieve blocks from ordering service and disseminate to other peers in the organization for channel businesschannel +peer0.org1.example.com | [422 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [423 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [424 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [425 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610021801 +peer0.org1.example.com | [426 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU Creating a new connection +peer0.org1.example.com | [427 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B68737AFD6A1B7060D2E09D64DB17C441B4CCA83A3528856C65B2C1580984308 +peer0.org1.example.com | [428 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [429 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [42a 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [42b 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }] +peer0.org1.example.com | [42c 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [42d 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00330d110, CONNECTING +peer0.org1.example.com | [42e 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [42f 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [430 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [431 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00330d110, READY +peer0.org1.example.com | [432 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to {orderer2.example.com:7050 [OrdererMSP]} +peer0.org1.example.com | [433 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to orderer2.example.com:7050 +peer0.org1.example.com | [434 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Establishing gRPC stream with orderer2.example.com:7050 ... +peer0.org1.example.com | [435 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer0.org1.example.com | [436 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> INFO Starting deliver with block [1] for channel businesschannel +peer0.org1.example.com | [437 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [438 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [439 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A95070A3D08051A0608B7C5B5FA0522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 +peer0.org1.example.com | [43a 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 54765BDADC6694A8BF3CEBA789D219A4687109CA4AE0D413F1FC6BE0748F1527 +peer0.org1.example.com | [43b 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43c 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:50:56.053 UTC [common.configtx] addToMap -> DEBU 513 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-08-31 20:50:56.054 UTC [common.configtx] verifyDeltaSet -> DEBU 514 Processing change to key: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-08-31 20:50:56.055 UTC [common.configtx] verifyDeltaSet -> DEBU 515 Processing change to key: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-08-31 20:50:56.055 UTC [common.configtx] verifyDeltaSet -> DEBU 516 Processing change to key: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-08-31 20:50:56.055 UTC [common.configtx] verifyDeltaSet -> DEBU 517 Processing change to key: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:50:56.056 UTC [common.configtx] verifyDeltaSet -> DEBU 518 Processing change to key: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.056 UTC [common.configtx] policyForItem -> DEBU 519 Getting policy for item Application with mod_policy ChannelCreationPolicy" +orderer0.example.com | "2020-08-31 20:50:56.056 UTC [policies] Manager -> DEBU 51a Manager Channel looking up path []" +orderer0.example.com | "2020-08-31 20:50:56.056 UTC [policies] Manager -> DEBU 51b Manager Channel has managers Orderer" +orderer0.example.com | "2020-08-31 20:50:56.056 UTC [policies] Manager -> DEBU 51c Manager Channel has managers Application" +orderer0.example.com | "2020-08-31 20:50:56.056 UTC [policies] Manager -> DEBU 51d Manager Channel looking up path [Application]" +orderer0.example.com | "2020-08-31 20:50:56.056 UTC [policies] Manager -> DEBU 51e Manager Channel has managers Orderer" +orderer0.example.com | "2020-08-31 20:50:56.058 UTC [policies] Manager -> DEBU 51f Manager Channel has managers Application" +orderer0.example.com | "2020-08-31 20:50:56.058 UTC [policies] Manager -> DEBU 520 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-08-31 20:50:56.058 UTC [policies] Manager -> DEBU 521 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.058 UTC [policies] Manager -> DEBU 522 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.059 UTC [policies] Evaluate -> DEBU 523 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +orderer0.example.com | "2020-08-31 20:50:56.059 UTC [policies] Evaluate -> DEBU 524 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:50:56.059 UTC [policies] Evaluate -> DEBU 525 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2020-08-31 20:50:56.059 UTC [msp] DeserializeIdentity -> DEBU 526 Obtaining identity" +orderer0.example.com | "2020-08-31 20:50:56.059 UTC [msp.identity] newIdentity -> DEBU 527 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +orderer0.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +orderer0.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +orderer0.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +orderer0.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:56.059 UTC [cauthdsl] func1 -> DEBU 528 0xc000d89220 gate 1598907056059748400 evaluation starts" +orderer0.example.com | "2020-08-31 20:50:56.059 UTC [cauthdsl] func2 -> DEBU 529 0xc000d89220 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:50:56.059 UTC [cauthdsl] func2 -> DEBU 52a 0xc000d89220 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:50:56.059 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 52b Checking if identity has been named explicitly as an admin for Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.059 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 52c Checking if identity carries the admin ou for Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.059 UTC [msp] Validate -> DEBU 52d MSP Org1MSP validating identity" +orderer0.example.com | "2020-08-31 20:50:56.060 UTC [msp] getCertificationChain -> DEBU 52e MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-08-31 20:50:56.060 UTC [msp] hasOURole -> DEBU 52f MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2020-08-31 20:50:56.060 UTC [msp] getCertificationChain -> DEBU 530 MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-08-31 20:50:56.060 UTC [cauthdsl] func2 -> DEBU 531 0xc000d89220 principal matched by identity 0" +orderer0.example.com | "2020-08-31 20:50:56.061 UTC [msp.identity] Verify -> DEBU 532 Verify: digest = 00000000 7b aa e0 b7 8c 39 88 52 d3 c7 42 36 0c c0 87 77 |{....9.R..B6...w| +orderer0.example.com | 00000010 ee 05 17 15 bb 6e d1 44 66 85 79 9d 67 86 ef e3 |.....n.Df.y.g...|" +orderer0.example.com | "2020-08-31 20:50:56.061 UTC [msp.identity] Verify -> DEBU 533 Verify: sig = 00000000 30 45 02 21 00 a2 72 8c e7 15 80 e5 4c e7 66 4a |0E.!..r.....L.fJ| +orderer0.example.com | 00000010 9a 9a c3 fd 15 cd 7e 00 02 e9 75 1d 42 fa 91 17 |......~...u.B...| +orderer0.example.com | 00000020 49 33 d6 c0 6b 02 20 5e 5b d2 a8 61 f8 27 b2 72 |I3..k. ^[..a.'.r| +orderer0.example.com | 00000030 2e 0d 62 b7 ba ef c0 c0 87 90 8a b9 20 a6 de f5 |..b......... ...| +orderer0.example.com | 00000040 b1 31 27 56 61 a9 0c |.1'Va..|" +orderer0.example.com | "2020-08-31 20:50:56.061 UTC [cauthdsl] func2 -> DEBU 534 0xc000d89220 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-08-31 20:50:56.061 UTC [cauthdsl] func1 -> DEBU 535 0xc000d89220 gate 1598907056059748400 evaluation succeeds" +orderer0.example.com | "2020-08-31 20:50:56.062 UTC [policies] Evaluate -> DEBU 536 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:50:56.062 UTC [policies] Evaluate -> DEBU 537 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:50:56.062 UTC [policies] Evaluate -> DEBU 538 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2020-08-31 20:50:56.063 UTC [policies] Evaluate -> DEBU 539 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +orderer0.example.com | "2020-08-31 20:50:56.063 UTC [common.configtx] verifyDeltaSet -> DEBU 53a Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-08-31 20:50:56.063 UTC [common.configtx] verifyDeltaSet -> DEBU 53b Processing change to key: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-08-31 20:50:56.063 UTC [common.configtx] verifyDeltaSet -> DEBU 53c Processing change to key: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.064 UTC [common.configtx] recurseConfigMap -> DEBU 53d Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.064 UTC [common.configtx] recurseConfigMap -> DEBU 53e Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 53f Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 540 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer1.org2.example.com | [58b 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [58c 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +peer1.org2.example.com | [58d 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer1.org2.example.com | [58e 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [58f 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org2.example.com | [590 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [591 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [592 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org2.example.com | [593 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [594 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [595 08-31 20:51:04.64 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org2.example.com | [596 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [597 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [598 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [599 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [59a 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [59c 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [59d 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org2.example.com | [59e 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [59f 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003665360, CONNECTING +peer1.org2.example.com | [59b 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 11251703883015026869, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer1.org2.example.com | [5a0 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 11251703883015026869, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer1.org2.example.com | [5a1 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5a2 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 11251703883015026869, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer1.org2.example.com | [5a3 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org2.example.com | [5a4 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org2.example.com | [5a5 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [5a6 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 70 e2 2e 5c 34 59 f3 22 a7 70 f5 fc ce f7 ec |.p..\4Y.".p.....| +peer1.org2.example.com | 00000010 bc d6 a3 b9 a4 9d 04 36 d3 30 ae d8 8d 5c a9 58 |.......6.0...\.X| +peer1.org2.example.com | [5a7 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 b6 42 78 d4 f5 83 c2 21 50 a5 44 |0D. A.Bx....!P.D| +peer1.org2.example.com | 00000010 49 b8 79 18 95 42 81 66 1f fe 0b 82 89 13 7e 1f |I.y..B.f......~.| +peer1.org2.example.com | 00000020 89 91 19 7b 02 20 37 6a 3a c9 d8 d4 8d f4 8a fc |...{. 7j:.......| +peer1.org2.example.com | 00000030 4b 67 7c 16 b0 d7 7c 55 75 f9 35 77 64 47 a9 ea |Kg|...|Uu.5wdG..| +peer1.org2.example.com | 00000040 b5 96 22 af d8 89 |.."...| +peer1.org2.example.com | [5a8 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4f0 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [4f2 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [4f3 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org1.example.com | [4f4 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org1.example.com | [4f5 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org1.example.com | [4f6 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org1.example.com | [4f7 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org1.example.com | [4f8 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [4f9 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org1.example.com | [4fa 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org1.example.com | [4fb 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org1.example.com | [4fc 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org1.example.com | [4fd 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org1.example.com | [4fe 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org1.example.com | [4ff 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [500 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org1.example.com | [501 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org1.example.com | [502 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [503 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [504 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org1.example.com | [505 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [506 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [507 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2 +peer1.org1.example.com | [508 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [509 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer1.org1.example.com | [50a 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer1.org1.example.com | [50b 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org1.example.com | [50c 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [50d 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org1.example.com | [50e 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org1.example.com | nw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [50f 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org1.example.com | [510 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | [511 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [512 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [513 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [514 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [515 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [516 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer1.org1.example.com | [517 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | [518 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [519 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [51a 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org1.example.com | [51b 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [51c 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [51d 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [51e 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [51f 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [520 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org1.example.com | [521 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org1.example.com | [522 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [523 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +orderer0.example.com | "2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 541 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 542 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 543 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 544 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 545 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 546 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 547 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 548 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 549 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 54a Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 54b Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 54c Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 54d Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 54e Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.066 UTC [common.configtx] recurseConfigMap -> DEBU 54f Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.066 UTC [common.configtx] recurseConfigMap -> DEBU 550 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.066 UTC [common.configtx] recurseConfigMap -> DEBU 551 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.066 UTC [common.configtx] recurseConfigMap -> DEBU 552 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.066 UTC [common.configtx] recurseConfigMap -> DEBU 553 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:50:56.066 UTC [common.channelconfig] NewStandardValues -> DEBU 554 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-08-31 20:50:56.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 555 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-08-31 20:50:56.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 556 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-08-31 20:50:56.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 557 Processing field: OrdererAddresses" +orderer0.example.com | "2020-08-31 20:50:56.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 558 Processing field: Consortium" +orderer0.example.com | "2020-08-31 20:50:56.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 559 Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.066 UTC [common.channelconfig] NewStandardValues -> DEBU 55a Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-08-31 20:50:56.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55b Processing field: ConsensusType" +orderer0.example.com | "2020-08-31 20:50:56.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55c Processing field: BatchSize" +orderer0.example.com | "2020-08-31 20:50:56.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55d Processing field: BatchTimeout" +orderer0.example.com | "2020-08-31 20:50:56.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55e Processing field: KafkaBrokers" +orderer0.example.com | "2020-08-31 20:50:56.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55f Processing field: ChannelRestrictions" +orderer0.example.com | "2020-08-31 20:50:56.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 560 Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.067 UTC [common.channelconfig] NewStandardValues -> DEBU 561 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-08-31 20:50:56.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 562 Processing field: Endpoints" +orderer0.example.com | "2020-08-31 20:50:56.067 UTC [common.channelconfig] NewStandardValues -> DEBU 563 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:50:56.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 564 Processing field: MSP" +orderer0.example.com | "2020-08-31 20:50:56.067 UTC [common.channelconfig] validateMSP -> DEBU 565 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:56.067 UTC [msp] newBccspMsp -> DEBU 566 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:56.067 UTC [msp] New -> DEBU 567 Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:50:56.067 UTC [msp] Setup -> DEBU 568 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-08-31 20:50:56.069 UTC [msp.identity] newIdentity -> DEBU 569 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:56.070 UTC [common.channelconfig] NewStandardValues -> DEBU 56a Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-08-31 20:50:56.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56b Processing field: ACLs" +orderer0.example.com | "2020-08-31 20:50:56.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56c Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.070 UTC [common.channelconfig] NewStandardValues -> DEBU 56d Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-08-31 20:50:56.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56e Processing field: AnchorPeers" +orderer0.example.com | "2020-08-31 20:50:56.070 UTC [common.channelconfig] NewStandardValues -> DEBU 56f Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:50:56.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 570 Processing field: MSP" +orderer0.example.com | "2020-08-31 20:50:56.070 UTC [common.channelconfig] Validate -> DEBU 571 Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-08-31 20:50:56.070 UTC [common.channelconfig] validateMSP -> DEBU 572 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.070 UTC [msp] newBccspMsp -> DEBU 573 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:56.070 UTC [msp] New -> DEBU 574 Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:50:56.070 UTC [msp] Setup -> DEBU 575 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.070 UTC [msp.identity] newIdentity -> DEBU 576 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:56.071 UTC [common.channelconfig] NewStandardValues -> DEBU 577 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-08-31 20:50:56.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 578 Processing field: AnchorPeers" +orderer0.example.com | "2020-08-31 20:50:56.071 UTC [common.channelconfig] NewStandardValues -> DEBU 579 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:50:56.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57a Processing field: MSP" +orderer0.example.com | "2020-08-31 20:50:56.071 UTC [common.channelconfig] Validate -> DEBU 57b Anchor peers for org Org1MSP are " +orderer0.example.com | "2020-08-31 20:50:56.071 UTC [common.channelconfig] validateMSP -> DEBU 57c Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.071 UTC [msp] newBccspMsp -> DEBU 57d Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:56.071 UTC [msp] New -> DEBU 57e Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:50:56.071 UTC [msp] Setup -> DEBU 57f Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.071 UTC [msp.identity] newIdentity -> DEBU 580 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [msp] Setup -> DEBU 581 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [msp] Setup -> DEBU 582 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 583 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 584 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 585 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 586 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 587 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 588 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 589 Proposed new policy Admins for Channel/Orderer" +peer0.org2.example.com | 00000030 87 15 bf 1a e7 b1 28 ba a1 6e 04 d2 71 8a 64 10 |......(..n..q.d.| +peer0.org2.example.com | 00000040 f4 9e 1e 26 55 d7 b6 |...&U..| +peer0.org2.example.com | [574 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [575 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [576 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [577 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc003690a80, header channel_header:"\010\001\032\006\010\267\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030>\316\004\035\247\263T!\025\236\244\230\014\355k\242EsT\003\377-\204\213" +peer1.org2.example.com | [5a9 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [5aa 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5ab 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [5ac 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5ad 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [5ae 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5af 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [5b0 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [5b1 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [5b2 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [5b3 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003696bf0 gate 1598907064658283500 evaluation starts +peer1.org2.example.com | [5b4 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003696bf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [5b5 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003696bf0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [5b6 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003696bf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [5b7 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003696bf0 principal evaluation fails +peer1.org2.example.com | [5b8 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003696bf0 gate 1598907064658283500 evaluation fails +peer1.org2.example.com | [5b9 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [5ba 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [5bb 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [5bc 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003697160 gate 1598907064658857900 evaluation starts +peer1.org2.example.com | [5bd 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003697160 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [5be 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003697160 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [5bf 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003697160 principal matched by identity 0 +peer1.org2.example.com | [5c0 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 05 66 be 9e f2 e7 99 db 13 b1 a3 32 51 7d d5 |V.f.........2Q}.| +peer1.org2.example.com | 00000010 55 dd 9a 89 3b a4 8f 85 1f 20 e6 9f 1f e8 85 d4 |U...;.... ......| +peer1.org2.example.com | [5c1 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 7d b1 4d 9f 97 d6 03 0a 12 b1 ad |0D. %}.M........| +peer1.org2.example.com | 00000010 7c fb 73 d9 0d 2d b7 cb 7f 72 e2 ae db f6 12 76 ||.s..-...r.....v| +peer1.org2.example.com | 00000020 89 34 10 00 02 20 42 52 ef 00 80 8d 76 d5 f3 74 |.4... BR....v..t| +peer1.org2.example.com | 00000030 c0 30 10 a5 77 49 1d 08 a4 e6 c7 92 33 bf 20 ba |.0..wI......3. .| +peer1.org2.example.com | 00000040 52 b0 f1 2e d8 bf |R.....| +peer1.org2.example.com | [5c2 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003697160 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [5c3 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003697160 gate 1598907064658857900 evaluation succeeds +peer1.org2.example.com | [5c4 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [5c5 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [5c6 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [5c7 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [5c8 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [5c9 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +peer1.org2.example.com | [5ca 08-31 20:51:04.66 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [5cb 08-31 20:51:04.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5cc 08-31 20:51:04.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5cd 08-31 20:51:04.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [5ce 08-31 20:51:04.66 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [5cf 08-31 20:51:04.66 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org2.example.com | [5d0 08-31 20:51:04.66 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [5d1 08-31 20:51:04.66 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00365fa10, CONNECTING +peer1.org2.example.com | [5d2 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00365fa10, READY +peer1.org2.example.com | [5d3 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003665360, READY +peer1.org2.example.com | [5d4 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [5d5 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [5d6 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [5d7 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:7051 +peer1.org2.example.com | [5d8 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org2.example.com | [5d9 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org2.example.com | [5da 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org2.example.com | [5db 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org2.example.com | [5dc 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org2.example.com | [5dd 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00324d280 env 0xc003443540 txn 0 +peer1.org2.example.com | [5de 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [5df 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 55ms +peer1.org2.example.com | [5e0 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [5e1 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [5e2 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org2.example.com | [5e3 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +peer1.org2.example.com | [5e4 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [5e5 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [5e6 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [5e7 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +peer1.org2.example.com | [5e8 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [5e9 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org2.example.com | [5ea 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org2.example.com | [5eb 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org2.example.com | [5ec 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [5ed 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org2.example.com | [5ee 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org1.example.com | [524 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [525 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [526 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org1.example.com | [527 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org1.example.com | [528 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [529 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [52a 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [52b 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org1.example.com | [52c 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org1.example.com | [52d 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org1.example.com | [52e 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org1.example.com | [52f 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org1.example.com | [530 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org1.example.com | [531 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer1.org1.example.com | [532 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org1.example.com | [533 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org1.example.com | [534 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org1.example.com | [535 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org1.example.com | [536 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org1.example.com | [537 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [538 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org1.example.com | [539 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [53a 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org1.example.com | [53b 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org1.example.com | [53c 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org1.example.com | [53d 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org1.example.com | [53e 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org1.example.com | [53f 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org1.example.com | [540 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [541 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org1.example.com | [542 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org1.example.com | [543 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org1.example.com | [544 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [545 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org1.example.com | [546 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org1.example.com | [547 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org1.example.com | [548 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org1.example.com | [549 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org1.example.com | [54a 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org1.example.com | [54b 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org1.example.com | [54c 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org1.example.com | [54d 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org1.example.com | [54e 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org1.example.com | [54f 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org1.example.com | [550 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [551 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [552 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [553 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [554 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [555 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [556 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [557 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [558 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org1.example.com | [559 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [55a 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [55b 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [55c 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [55d 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [55e 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [55f 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [560 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [561 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [562 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [563 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [564 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org1.example.com | [565 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org1.example.com | [566 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org1.example.com | [567 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org1.example.com | [568 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org1.example.com | [569 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org1.example.com | [56a 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org1.example.com | [56b 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org1.example.com | [56c 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org1.example.com | [56d 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org1.example.com | [56e 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [56f 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [570 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [571 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [572 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [573 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [574 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org1.example.com | [575 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org1.example.com | [576 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org1.example.com | [577 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org1.example.com | [578 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [579 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [57a 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org1.example.com | [57b 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org1.example.com | [57c 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org1.example.com | [57d 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org1.example.com | [57e 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org1.example.com | [57f 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org1.example.com | [580 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org1.example.com | [581 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org1.example.com | [582 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org1.example.com | [583 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org1.example.com | [584 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer1.org1.example.com | [585 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org1.example.com | [586 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org1.example.com | [587 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [588 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [589 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [58a 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [58b 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [58c 08-31 20:51:03.89 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003578bd0 gate 1598907063899519500 evaluation starts +peer1.org1.example.com | [58d 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003578bd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [58e 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003578bd0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [58f 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003578bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [590 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003578bd0 principal evaluation fails +peer1.org1.example.com | [591 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003578bd0 gate 1598907063899519500 evaluation fails +peer1.org1.example.com | [592 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [593 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [594 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [595 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003579140 gate 1598907063902294000 evaluation starts +peer1.org1.example.com | [596 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003579140 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [597 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003579140 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [598 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003579140 principal matched by identity 0 +peer1.org1.example.com | [599 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d db f7 30 28 f3 51 bd 6a 24 0c 99 96 70 b2 03 |}..0(.Q.j$...p..| +peer1.org1.example.com | 00000010 e2 6b 44 ef 08 fc f0 fd 1c 63 d8 d3 dd e8 c1 11 |.kD......c......| +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 58a Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 58b Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 58c Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 58d Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 58e Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 58f Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 590 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 591 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 592 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 593 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 594 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 595 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 596 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 597 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [policies] NewManagerImpl -> DEBU 598 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [policies] NewManagerImpl -> DEBU 599 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 59a Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 59b Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 59c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 59d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 59e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 59f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a1 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a3 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a4 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a5 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a6 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a7 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a8 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a9 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5aa Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5ab Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5ac Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5ad Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5ae Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5af Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5b0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5b1 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5b2 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5b3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5b4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5b5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5b6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5b7 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5b8 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5b9 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5ba Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5bb Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5bc Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5bd Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5be Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5bf Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5c0 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5c1 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5c2 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5c3 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5c4 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5c5 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-08-31 20:50:56.074 UTC [common.capabilities] Supported -> DEBU 5c6 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2020-08-31 20:50:56.075 UTC [common.capabilities] Supported -> DEBU 5c7 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-08-31 20:50:56.075 UTC [orderer.common.cluster] NewStream -> DEBU 5c8 Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" +orderer0.example.com | "2020-08-31 20:50:56.075 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 5c9 Sending msg of 29304 bytes to 3 on channel testchainid took 126.3µs" +orderer0.example.com | "2020-08-31 20:50:56.075 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 5ca [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:50714" +orderer0.example.com | "2020-08-31 20:50:56.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5cb Send of SubmitRequest for channel testchainid with payload of size 29304 to orderer2.example.com(orderer2.example.com:7050) took 142.5µs " +orderer0.example.com | "2020-08-31 20:50:56.077 UTC [common.deliver] deliverBlocks -> DEBU 5cc Rejecting deliver for 172.18.0.9:50712 because channel businesschannel not found" +orderer0.example.com | "2020-08-31 20:50:56.077 UTC [orderer.common.server] func1 -> DEBU 5cd Closing Deliver stream" +orderer0.example.com | "2020-08-31 20:50:56.077 UTC [comm.grpc.server] 1 -> INFO 5ce streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50712 grpc.code=OK grpc.call_duration=140.0339ms +orderer0.example.com | "2020-08-31 20:50:56.078 UTC [orderer.common.broadcast] Handle -> DEBU 5cf Received EOF from 172.18.0.9:50714, hangup" +orderer0.example.com | "2020-08-31 20:50:56.078 UTC [orderer.common.server] func1 -> DEBU 5d0 Closing Broadcast stream" +orderer0.example.com | "2020-08-31 20:50:56.078 UTC [comm.grpc.server] 1 -> INFO 5d1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:50714 grpc.code=OK grpc.call_duration=110.9747ms +orderer0.example.com | "2020-08-31 20:50:56.095 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5d2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 29515" +orderer0.example.com | "2020-08-31 20:50:56.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5d3 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:56.102 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5d4 Sending msg of 28 bytes to 3 on channel testchainid took 93.4µs" +orderer0.example.com | "2020-08-31 20:50:56.105 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5d5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.8479ms " +orderer0.example.com | "2020-08-31 20:50:56.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5d6 Sending msg of 28 bytes to 3 on channel testchainid took 855.1µs" +orderer0.example.com | "2020-08-31 20:50:56.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5d7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0211ms " +orderer0.example.com | "2020-08-31 20:50:56.110 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 5d8 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 +orderer0.example.com | "2020-08-31 20:50:56.112 UTC [common.channelconfig] NewStandardValues -> DEBU 5d9 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-08-31 20:50:56.112 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5da Processing field: HashingAlgorithm" +orderer0.example.com | "2020-08-31 20:50:56.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5db Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-08-31 20:50:56.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5dc Processing field: OrdererAddresses" +orderer0.example.com | "2020-08-31 20:50:56.115 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5dd Processing field: Consortium" +orderer0.example.com | "2020-08-31 20:50:56.115 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5de Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.116 UTC [common.channelconfig] NewStandardValues -> DEBU 5df Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-08-31 20:50:56.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e0 Processing field: ConsensusType" +orderer0.example.com | "2020-08-31 20:50:56.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e1 Processing field: BatchSize" +orderer0.example.com | "2020-08-31 20:50:56.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e2 Processing field: BatchTimeout" +orderer0.example.com | "2020-08-31 20:50:56.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e3 Processing field: KafkaBrokers" +orderer0.example.com | "2020-08-31 20:50:56.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e4 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-08-31 20:50:56.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e5 Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.120 UTC [common.channelconfig] NewStandardValues -> DEBU 5e6 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-08-31 20:50:56.120 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e7 Processing field: Endpoints" +orderer0.example.com | "2020-08-31 20:50:56.121 UTC [common.channelconfig] NewStandardValues -> DEBU 5e8 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:50:56.122 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e9 Processing field: MSP" +orderer0.example.com | "2020-08-31 20:50:56.122 UTC [common.channelconfig] validateMSP -> DEBU 5ea Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:56.123 UTC [msp] newBccspMsp -> DEBU 5eb Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:56.124 UTC [msp] New -> DEBU 5ec Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:50:56.124 UTC [msp] Setup -> DEBU 5ed Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-08-31 20:50:56.125 UTC [msp.identity] newIdentity -> DEBU 5ee Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:56.126 UTC [common.channelconfig] NewStandardValues -> DEBU 5ef Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-08-31 20:50:56.126 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f0 Processing field: ACLs" +orderer0.example.com | "2020-08-31 20:50:56.126 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f1 Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.127 UTC [common.channelconfig] NewStandardValues -> DEBU 5f2 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-08-31 20:50:56.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f3 Processing field: AnchorPeers" +orderer0.example.com | "2020-08-31 20:50:56.128 UTC [common.channelconfig] NewStandardValues -> DEBU 5f4 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:50:56.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f5 Processing field: MSP" +orderer0.example.com | "2020-08-31 20:50:56.128 UTC [common.channelconfig] Validate -> DEBU 5f6 Anchor peers for org Org1MSP are " +orderer0.example.com | "2020-08-31 20:50:56.129 UTC [common.channelconfig] validateMSP -> DEBU 5f7 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.129 UTC [msp] newBccspMsp -> DEBU 5f8 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:56.129 UTC [msp] New -> DEBU 5f9 Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:50:56.129 UTC [msp] Setup -> DEBU 5fa Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.131 UTC [msp.identity] newIdentity -> DEBU 5fb Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | [578 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [579 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [57a 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [57b 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [57c 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [57d 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [57e 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [57f 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7f80 gate 1598907064391771800 evaluation starts +peer0.org2.example.com | [581 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7f80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [580 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [582 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7f80 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [583 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [584 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7f80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [586 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [585 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7f80 principal evaluation fails +peer0.org2.example.com | [587 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7f80 gate 1598907064391771800 evaluation fails +peer0.org2.example.com | [588 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [589 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [58a 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [58b 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [58c 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [58d 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [58e 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dc510 gate 1598907064392553800 evaluation starts +peer0.org2.example.com | [58f 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [590 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dc510 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [591 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dc510 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [592 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [593 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [594 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [595 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [596 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [597 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [598 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org2.example.com | [599 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [59a 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [59b 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [59c 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [59d 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dc510 principal matched by identity 0 +peer0.org2.example.com | [59e 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [5a0 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [5a1 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 97 f1 03 77 23 5b 51 e2 fe 34 |0E.!.....w#[Q..4| +peer0.org2.example.com | 00000010 5c 14 da f3 34 65 83 f7 d7 42 d3 01 52 d4 9d 26 |\...4e...B..R..&| +peer0.org2.example.com | 00000020 f4 73 69 de b0 02 20 61 43 1f 6b 72 53 10 b9 0a |.si... aC.krS...| +peer0.org2.example.com | 00000030 30 64 89 00 18 16 6f 88 9d a2 0f 63 e4 63 b6 30 |0d....o....c.c.0| +peer0.org2.example.com | 00000040 db 9a 98 0c 1e ae 3e |......>| +peer0.org2.example.com | [59f 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +peer0.org2.example.com | [5a2 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [5a3 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [5a4 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dc510 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [5a5 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dc510 gate 1598907064392553800 evaluation succeeds +peer0.org2.example.com | [5a6 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [5a7 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [5a8 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [5a9 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [5aa 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org2.example.com | [5ab 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5ac 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [5ad 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5ae 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [5af 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [5b0 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [5b1 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [5b2 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +peer0.org2.example.com | [5b3 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [5b4 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [5b5 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +peer0.org2.example.com | [5b6 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer0.org2.example.com | [5b7 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5b8 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [5b9 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eea00 gate 1598907064399280800 evaluation starts +peer0.org2.example.com | [5ba 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eea00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [5bb 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eea00 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [5bc 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer0.org2.example.com | [5bd 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer0.org2.example.com | [5be 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [5bf 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [5c0 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer0.org2.example.com | [5c1 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [5c2 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eea00 principal matched by identity 0 +peer0.org2.example.com | [5c3 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 3d f8 a1 bf ae 7d e4 fb dc 40 c7 07 6d de 8d |.=....}...@..m..| +peer0.org2.example.com | 00000010 fb 6b e1 2c 0c 1e 66 98 ba 3d 47 90 dc a4 d0 63 |.k.,..f..=G....c| +peer0.org2.example.com | [5c4 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 27 f4 6f dd 5b 2d 12 b9 82 60 1a |0D. u'.o.[-...`.| +peer0.org2.example.com | 00000010 88 90 67 88 50 b6 97 37 e6 93 6d 8e 20 ca 9f 40 |..g.P..7..m. ..@| +peer0.org2.example.com | 00000020 df d1 ae 7e 02 20 2b 77 8a 7e aa 5c bd fa f5 76 |...~. +w.~.\...v| +peer0.org2.example.com | 00000030 6b bd 3d 49 6e 73 1a 12 7f 30 6c 34 57 c0 06 c4 |k.=Ins...0l4W...| +peer0.org2.example.com | 00000040 56 0c 2b fa b4 c4 |V.+...| +peer0.org2.example.com | [5c5 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eea00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [5c6 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 7651936313432245060, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer0.org2.example.com | [5c7 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 7651936313432245060, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer0.org2.example.com | [5c8 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [5c9 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 7651936313432245060, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer0.org2.example.com | [5ca 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [5cb 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5cc 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [5cd 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [59a 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 68 c4 26 6f 7b 21 ed a9 a5 3f 84 a8 |0C. h.&o{!...?..| +peer1.org1.example.com | 00000010 b1 40 99 63 b5 07 70 86 b7 94 7b d1 f4 fc db 60 |.@.c..p...{....`| +peer1.org1.example.com | 00000020 a2 47 34 74 02 1f 07 d1 39 67 f0 4d d1 ef fd 7a |.G4t....9g.M...z| +peer1.org1.example.com | 00000030 e2 38 7c ac 12 5e 64 36 2f e3 b0 37 8c cb da 35 |.8|..^d6/..7...5| +peer1.org1.example.com | 00000040 bf eb 50 e7 b3 |..P..| +peer1.org1.example.com | [59b 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003579140 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [59c 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003579140 gate 1598907063902294000 evaluation succeeds +peer1.org1.example.com | [59d 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [59e 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [59f 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [5a0 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [5a1 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org1.example.com | [5a2 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer1.org1.example.com | [5a3 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer1.org1.example.com | [5a4 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [5a5 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [5a6 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [5a7 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [5a8 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [5a9 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [5aa 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0035b8030, CONNECTING +peer1.org1.example.com | [5ab 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org1.example.com | [5ac 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer1.org1.example.com | [5ad 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org1.example.com | [5ae 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0035b8030, READY +peer1.org1.example.com | [5af 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [5b0 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [5b1 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [5b2 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:7051 +peer1.org1.example.com | [5b3 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org1.example.com | [5b4 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [5b5 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 9f 54 d8 1a 2f d1 6a 27 c0 84 |0E.!...T../.j'..| +peer1.org1.example.com | 00000010 88 3e 25 95 d3 4b 06 d1 be 52 33 6b 1d 1a be 29 |.>%..K...R3k...)| +peer1.org1.example.com | 00000020 23 89 af 29 9e 02 20 24 70 34 80 4b ac e0 9b b8 |#..).. $p4.K....| +peer1.org1.example.com | 00000030 9b 3f b4 eb 78 b4 bf 0e e5 7a 8b e3 68 83 be d8 |.?..x....z..h...| +peer1.org1.example.com | 00000040 99 9c 3b cc 83 3e e9 |..;..>.| +peer0.org1.example.com | [43d 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [43e 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [43f 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [440 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [441 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [442 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICHjCCAcWgAwIBAgIQUak2hDd8j2SLaQNMbXpZRDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUu +peer0.org1.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET8B7vvN/rxdMqWGK+yqvj2vj +peer0.org1.example.com | zcoh0PNOTfowTjKzggxnGNjm57Tabe8mSEp3J79IN+Z0BUjlRX7ePe1Y9MnQP6NN +peer0.org1.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer0.org1.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +peer0.org1.example.com | MQtqMO2tIswbOnZ/EyE1ZgEdzPAma23Urf8qNS+mD/ACICsZIm7LFxHSrXc9AD5h +peer0.org1.example.com | WFUnXFrrWMedpv6WCUtVYuZy +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [443 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b82e0 gate 1598907063808281300 evaluation starts +peer0.org1.example.com | [444 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b82e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [445 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b82e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [446 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer0.org1.example.com | [447 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [448 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org1.example.com | [449 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b82e0 principal matched by identity 0 +peer0.org1.example.com | [44a 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 4e 02 62 d8 ce 08 d6 21 32 3c 63 e0 2f cb f3 |.N.b....!2 DEBU Verify: sig = 00000000 30 44 02 20 65 5c b1 94 00 fb 6c 86 4f 01 bd 14 |0D. e\....l.O...| +peer0.org1.example.com | 00000010 78 85 5b 30 e2 c4 da 3d ab 42 97 95 e8 5d 25 ea |x.[0...=.B...]%.| +peer0.org1.example.com | 00000020 30 0e 43 9b 02 20 75 a0 a3 5b da cb 12 76 2a 73 |0.C.. u..[...v*s| +peer0.org1.example.com | 00000030 7e d8 d6 e1 fe 07 28 d4 40 eb 54 bc 28 0f 7f 71 |~.....(.@.T.(..q| +peer0.org1.example.com | 00000040 81 38 7b e9 17 2a |.8{..*| +peer0.org1.example.com | [44c 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b82e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [44d 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b82e0 gate 1598907063808281300 evaluation succeeds +peer0.org1.example.com | [44e 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [44f 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [450 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [451 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [452 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer0.org1.example.com | [453 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +peer0.org1.example.com | [454 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [455 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [1], peers number [1] +peer0.org1.example.com | [456 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28177 bytes, seq: 1}, Envelope: 28210 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [457 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1 +peer0.org1.example.com | [458 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [459 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [45a 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [45b 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [45c 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [45d 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9dd0 gate 1598907063814615500 evaluation starts +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org2.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org2.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org2.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org2.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [5ce 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [5cf 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [5d0 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [5d1 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5d2 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [5d3 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [5d4 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [5d5 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [5d6 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003716a50 gate 1598907064413210900 evaluation starts +peer0.org2.example.com | [5d7 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003716a50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [5d8 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003716a50 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [5d9 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003716a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [5da 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003716a50 principal evaluation fails +peer0.org2.example.com | [5db 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003716a50 gate 1598907064413210900 evaluation fails +peer0.org2.example.com | [5dc 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [5dd 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036eea00 gate 1598907064399280800 evaluation succeeds +peer0.org2.example.com | [5de 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [5df 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [5e0 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org2.example.com | [5e1 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [5e2 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [5e3 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003716fe0 gate 1598907064415047000 evaluation starts +peer0.org2.example.com | [5e4 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003716fe0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [5e5 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003716fe0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [5e6 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [5e7 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [5e8 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [5e9 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [5ea 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [5eb 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [5ec 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [5ed 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [5b6 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org1.example.com | [5b7 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [5b8 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D9816100E +peer1.org1.example.com | [5b9 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 395192E181193BBC95BDDE3ED0C29197F47746A2D56A83A5818A7C24A2232AA0 +peer1.org1.example.com | [5ba 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [5bb 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [5bc 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [5bd 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:11080509220039814310 tag:EMPTY mem_req:\302\216S\276\256bY\002 \0215\226\376\354\221X\201\002\031\262Y\225\352\345I\331\351\215\362?\352\272\262\ti\027\310\256m\273c" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [5be 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:11080509220039814310 tag:EMPTY mem_req:\302\216S\276\256bY\002 \0215\226\376\354\221X\201\002\031\262Y\225\352\345I\331\351\215\362?\352\272\262\ti\027\310\256m\273c" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes +peer1.org1.example.com | [5bf 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [5c0 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [5c1 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer1.org1.example.com | [5c2 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org1.example.com | [5c3 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org1.example.com | [5c4 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org1.example.com | [5c5 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org1.example.com | [5c6 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org1.example.com | [5c8 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | [5c9 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 114ms +peer1.org1.example.com | [5ca 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org1.example.com | [5cb 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | [5cc 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org1.example.com | [5cd 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +peer1.org1.example.com | [5ce 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [5cf 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [5d0 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [5d1 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +peer1.org1.example.com | [5d2 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [5d3 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org1.example.com | [5d4 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org1.example.com | [5d5 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org1.example.com | [5d6 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [5d7 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org1.example.com | [5c7 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003348480 env 0xc003354c30 txn 0 +peer1.org1.example.com | [5d8 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:56.132 UTC [common.channelconfig] NewStandardValues -> DEBU 5fc Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-08-31 20:50:56.134 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5fd Processing field: AnchorPeers" +orderer0.example.com | "2020-08-31 20:50:56.134 UTC [common.channelconfig] NewStandardValues -> DEBU 5fe Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:50:56.134 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ff Processing field: MSP" +orderer0.example.com | "2020-08-31 20:50:56.134 UTC [common.channelconfig] Validate -> DEBU 600 Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-08-31 20:50:56.135 UTC [common.channelconfig] validateMSP -> DEBU 601 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.135 UTC [msp] newBccspMsp -> DEBU 602 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:50:56.135 UTC [msp] New -> DEBU 603 Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:50:56.136 UTC [msp] Setup -> DEBU 604 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.137 UTC [msp.identity] newIdentity -> DEBU 605 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:56.138 UTC [msp] Setup -> DEBU 606 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-08-31 20:50:56.138 UTC [msp] Setup -> DEBU 607 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-08-31 20:50:56.139 UTC [policies] NewManagerImpl -> DEBU 608 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:56.139 UTC [policies] NewManagerImpl -> DEBU 609 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:56.139 UTC [policies] NewManagerImpl -> DEBU 60a Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:56.140 UTC [policies] NewManagerImpl -> DEBU 60b Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:56.140 UTC [policies] NewManagerImpl -> DEBU 60c Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:56.140 UTC [policies] NewManagerImpl -> DEBU 60d Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:56.141 UTC [policies] NewManagerImpl -> DEBU 60e Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:56.141 UTC [policies] NewManagerImpl -> DEBU 60f Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.142 UTC [policies] NewManagerImpl -> DEBU 610 Proposed new policy Endorsement for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.142 UTC [policies] NewManagerImpl -> DEBU 611 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.142 UTC [policies] NewManagerImpl -> DEBU 612 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.143 UTC [policies] NewManagerImpl -> DEBU 613 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.143 UTC [policies] NewManagerImpl -> DEBU 614 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.143 UTC [policies] NewManagerImpl -> DEBU 615 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.144 UTC [policies] NewManagerImpl -> DEBU 616 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.144 UTC [policies] NewManagerImpl -> DEBU 617 Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.144 UTC [policies] NewManagerImpl -> DEBU 618 Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.148 UTC [orderer.common.server] Deliver -> DEBU 619 Starting new Deliver handler" +orderer0.example.com | "2020-08-31 20:50:56.149 UTC [common.deliver] Handle -> DEBU 61a Starting new deliver loop for 172.18.0.9:50716" +orderer0.example.com | "2020-08-31 20:50:56.149 UTC [common.deliver] Handle -> DEBU 61b Attempting to read seek info message from 172.18.0.9:50716" +orderer0.example.com | "2020-08-31 20:50:56.150 UTC [policies] NewManagerImpl -> DEBU 61c Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.151 UTC [policies] NewManagerImpl -> DEBU 61d Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.151 UTC [policies] NewManagerImpl -> DEBU 61e Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.152 UTC [policies] NewManagerImpl -> DEBU 61f Proposed new policy Admins for Channel" +orderer0.example.com | "2020-08-31 20:50:56.152 UTC [policies] NewManagerImpl -> DEBU 620 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-08-31 20:50:56.153 UTC [policies] NewManagerImpl -> DEBU 621 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-08-31 20:50:56.153 UTC [common.configtx] addToMap -> DEBU 622 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-08-31 20:50:56.154 UTC [common.configtx] addToMap -> DEBU 623 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-08-31 20:50:56.154 UTC [common.configtx] addToMap -> DEBU 624 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:50:56.154 UTC [common.configtx] addToMap -> DEBU 625 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-08-31 20:50:56.155 UTC [common.configtx] addToMap -> DEBU 626 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:50:56.155 UTC [common.configtx] addToMap -> DEBU 627 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org2.example.com | [5ee 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [5ef 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org2.example.com | [5f0 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003716fe0 principal matched by identity 0 +peer0.org2.example.com | [5f2 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 9a ae 9c 60 24 3e 80 19 fa 06 53 c1 74 5e 2c |....`$>....S.t^,| +peer0.org2.example.com | 00000010 43 71 7b 46 51 7d 90 51 eb fc 1b 67 fa 12 6c 6e |Cq{FQ}.Q...g..ln| +peer0.org2.example.com | [5f1 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org2.example.com | [5f3 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 9b b9 c1 d8 3f 75 22 d4 90 16 |0E.!......?u"...| +peer0.org2.example.com | 00000010 85 9e 5c 63 f8 44 a1 f6 7f 6e 86 8e 41 ee 32 67 |..\c.D...n..A.2g| +peer0.org2.example.com | 00000020 1f 5d ef 87 81 02 20 59 b9 0d 2e e5 e0 b5 b8 95 |.].... Y........| +peer0.org2.example.com | 00000030 37 84 96 66 08 85 49 66 ef 14 c9 81 9f 15 d1 a6 |7..f..If........| +peer0.org2.example.com | 00000040 fb 0f 63 6b 35 30 2a |..ck50*| +peer0.org2.example.com | [5f4 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org2.example.com | [5f5 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org2.example.com | [5f6 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [5f7 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003716fe0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [5f8 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [5f9 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003716fe0 gate 1598907064415047000 evaluation succeeds +peer0.org2.example.com | [5fa 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [5fb 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [5fc 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [5fd 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [5fe 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [5ff 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [600 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [601 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [602 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [603 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [604 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [605 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" lastAliveTS: 1598907045315872200, 20 but got ts: inc_num:1598907045315872200 seq_num:11 +peer0.org2.example.com | [606 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [607 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [608 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [609 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [60a 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [60b 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org2.example.com | [60c 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org2.example.com | [60d 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f 43 86 1c 03 e4 99 e3 91 b6 a7 ae a6 7f 53 45 |.C............SE| +peer0.org2.example.com | 00000010 a7 5e d1 90 cb bc ec 0f f6 8d 46 10 94 85 64 4c |.^........F...dL| +peer0.org2.example.com | [60e 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org2.example.com | [60f 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 03 5a 2c 42 53 7a d0 e2 6e 62 |0E.!...Z,BSz..nb| +peer0.org2.example.com | 00000010 e4 8d 68 0c fe 4d 10 37 e3 bf 91 53 cd 9f 2d af |..h..M.7...S..-.| +peer0.org2.example.com | 00000020 e7 2a 98 74 8c 02 20 7a 87 10 12 60 42 fa 6a 82 |.*.t.. z...`B.j.| +peer0.org2.example.com | 00000030 d7 62 c2 40 47 21 b2 80 a2 37 92 42 52 1c 9b 3e |.b.@G!...7.BR..>| +peer0.org2.example.com | 00000040 c8 17 7e ea 8e ab 3e |..~...>| +peer0.org2.example.com | [610 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org2.example.com | [611 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org2.example.com | [612 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [613 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | [614 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | [615 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org2.example.com | [616 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | [617 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org2.example.com | [618 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org2.example.com | [619 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [61a 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org2.example.com | [61b 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org2.example.com | [61c 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [45e 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9dd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [45f 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9dd0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [460 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9dd0 principal matched by identity 0 +peer0.org1.example.com | [461 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec df f2 ac 7d f3 0f 90 97 c6 fa 5a 88 ae 1a c5 |....}......Z....| +peer0.org1.example.com | 00000010 5a bb 6f b7 33 60 d2 91 59 2b 32 e5 3e 80 d5 1a |Z.o.3`..Y+2.>...| +peer0.org1.example.com | [462 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 72 3d 11 03 5c aa ca 61 05 2f |0E.!..r=..\..a./| +peer0.org1.example.com | 00000010 c5 ac 3d 38 a9 1d 8a 39 b0 a1 eb af c4 32 23 b8 |..=8...9.....2#.| +peer0.org1.example.com | 00000020 a0 82 2f dd 97 02 20 1d 25 fc 05 ba 0c ff 88 fe |../... .%.......| +peer0.org1.example.com | 00000030 64 89 ec 28 d5 2f d6 34 18 78 cb f5 d2 cc 91 36 |d..(./.4.x.....6| +peer0.org1.example.com | 00000040 b5 6e 94 36 fc dd 04 |.n.6...| +peer0.org1.example.com | [463 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9dd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [464 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9dd0 gate 1598907063814615500 evaluation succeeds +peer0.org1.example.com | [465 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [466 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [467 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [468 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [469 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28177 bytes, seq: 1}, Envelope: 28210 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [46a 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer0.org1.example.com | [46b 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +peer0.org1.example.com | [46c 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 2 blocks +peer0.org1.example.com | [46d 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28177 bytes, seq: 1}, Envelope: 28210 bytes, Signature: 0 bytes +peer0.org1.example.com | [46f 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [470 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +peer0.org1.example.com | [46e 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [2], peers number [1] +peer0.org1.example.com | [471 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [472 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2 +peer0.org1.example.com | [473 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +peer0.org1.example.com | [474 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +peer0.org1.example.com | [475 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +peer0.org1.example.com | [476 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +peer0.org1.example.com | [477 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [478 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0031c0000 env 0xc000252000 txn 0 +peer0.org1.example.com | [479 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc000252000 +peer0.org1.example.com | [47a 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\264\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\0305\231\256\356\005\207\177s\320\333\2161g\250g\375\0331i\366p\262\234\235" +peer0.org1.example.com | [47b 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org1.example.com | [47c 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [47d 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [47e 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47f 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer0.org1.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer0.org1.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer0.org1.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org1.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org1.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer0.org1.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [480 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [481 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes +peer0.org1.example.com | [482 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [483 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org1.example.com | [484 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [485 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org1.example.com | [486 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [487 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a c9 56 74 d0 ac d1 53 26 ca 88 78 dd d1 98 e3 |*.Vt...S&..x....| +peer0.org1.example.com | 00000010 ee b9 13 91 2d c5 2c 69 ec 14 2a 0f f3 f1 54 a2 |....-.,i..*...T.| +peer0.org1.example.com | [488 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 b4 a7 cf 0c d5 ef fc 4a 2d 2b 1c |0D. ........J-+.| +peer0.org1.example.com | 00000010 62 61 50 e5 d5 98 dc d2 14 31 4f 44 6a a4 86 44 |baP......1ODj..D| +peer0.org1.example.com | 00000020 b0 89 10 60 02 20 58 11 e4 1a 38 2d 02 16 fb d0 |...`. X...8-....| +peer0.org1.example.com | 00000030 3e 3a 82 7c a3 2e 16 22 69 6d a8 0c 03 8a 46 67 |>:.|..."im....Fg| +peer0.org1.example.com | 00000040 2d c0 ba 70 a1 eb |-..p..| +peer0.org1.example.com | [489 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [48a 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc003386a80, header channel_header:"\010\001\032\006\010\264\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\0305\231\256\356\005\207\177s\320\333\2161g\250g\375\0331i\366p\262\234\235" +peer0.org1.example.com | [48b 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [48c 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [48d 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [48e 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [48f 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [490 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [491 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [492 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [493 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [494 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [495 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [496 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [497 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [498 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [499 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [49a 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [49b 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [49c 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +peer0.org1.example.com | [49d 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [49e 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [49f 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [4a0 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [4a1 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [4a2 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [4a3 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +peer0.org1.example.com | [4a4 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [4a5 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [4a6 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +peer0.org1.example.com | [4a7 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org1.example.com | [4a8 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00019f980 gate 1598907063857382600 evaluation starts +peer0.org1.example.com | [4a9 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00019f980 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4aa 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00019f980 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4ab 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org1.example.com | [4ac 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org1.example.com | [4ad 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [4ae 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [4af 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer0.org1.example.com | [4b0 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [4b1 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00019f980 principal matched by identity 0 +peer0.org1.example.com | [4b2 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 6a 5e 90 37 00 25 29 cc 2f 3d ec 44 8f 23 98 |.j^.7.%)./=.D.#.| +peer0.org1.example.com | 00000010 40 21 8f 78 1d c2 88 4f 31 16 8b 9b 25 00 fb 20 |@!.x...O1...%.. | +peer0.org1.example.com | [4b3 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d d5 10 d0 47 15 e1 14 bb 9f dc b9 |0D. ....G.......| +peer0.org1.example.com | 00000010 21 20 fe 43 aa a5 85 eb 20 91 d3 d3 25 c3 40 6f |! .C.... ...%.@o| +peer0.org1.example.com | 00000020 be ec 7e 52 02 20 3f 97 e3 ab d5 5a 98 c6 78 08 |..~R. ?....Z..x.| +peer0.org1.example.com | 00000030 e3 1a 1c 9b 18 c4 79 e9 08 26 b7 2a 98 01 0e 55 |......y..&.*...U| +peer0.org1.example.com | 00000040 0c af 35 37 61 76 |..57av| +peer0.org2.example.com | [61d 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [61e 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [620 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [621 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [61f 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org2.example.com | [622 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [623 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [625 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org2.example.com | [626 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org2.example.com | nw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [624 08-31 20:51:04.41 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [627 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [628 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [629 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [62a 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [62b 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [62c 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [62d 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [62e 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003750fb0 gate 1598907064423260000 evaluation starts +peer0.org2.example.com | [62f 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003750fb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [630 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003750fb0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [631 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003750fb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [632 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003750fb0 principal evaluation fails +peer0.org2.example.com | [633 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003750fb0 gate 1598907064423260000 evaluation fails +peer0.org2.example.com | [634 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [635 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [636 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [637 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751520 gate 1598907064424953100 evaluation starts +peer0.org2.example.com | [638 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751520 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [639 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751520 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [63a 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751520 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:50:56.155 UTC [common.configtx] addToMap -> DEBU 628 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-08-31 20:50:56.156 UTC [common.configtx] addToMap -> DEBU 629 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.156 UTC [common.configtx] addToMap -> DEBU 62a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-08-31 20:50:56.157 UTC [common.configtx] addToMap -> DEBU 62b Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-08-31 20:50:56.157 UTC [common.configtx] addToMap -> DEBU 62c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-08-31 20:50:56.157 UTC [common.configtx] addToMap -> DEBU 62d Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-08-31 20:50:56.159 UTC [common.configtx] addToMap -> DEBU 62e Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-08-31 20:50:56.160 UTC [common.configtx] addToMap -> DEBU 62f Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:50:56.160 UTC [common.configtx] addToMap -> DEBU 630 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-08-31 20:50:56.163 UTC [common.configtx] addToMap -> DEBU 631 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-08-31 20:50:56.163 UTC [common.configtx] addToMap -> DEBU 632 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:50:56.163 UTC [common.configtx] addToMap -> DEBU 633 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.164 UTC [common.configtx] addToMap -> DEBU 634 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-08-31 20:50:56.164 UTC [common.configtx] addToMap -> DEBU 635 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:50:56.165 UTC [common.configtx] addToMap -> DEBU 636 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:50:56.165 UTC [common.configtx] addToMap -> DEBU 637 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:50:56.165 UTC [common.configtx] addToMap -> DEBU 638 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-08-31 20:50:56.166 UTC [common.configtx] addToMap -> DEBU 639 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.167 UTC [common.configtx] addToMap -> DEBU 63a Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-08-31 20:50:56.167 UTC [common.configtx] addToMap -> DEBU 63b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:50:56.167 UTC [common.configtx] addToMap -> DEBU 63c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:50:56.167 UTC [common.configtx] addToMap -> DEBU 63d Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-08-31 20:50:56.168 UTC [common.configtx] addToMap -> DEBU 63e Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-08-31 20:50:56.168 UTC [common.configtx] addToMap -> DEBU 63f Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-08-31 20:50:56.168 UTC [common.configtx] addToMap -> DEBU 640 Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.169 UTC [common.configtx] addToMap -> DEBU 641 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-08-31 20:50:56.169 UTC [common.configtx] addToMap -> DEBU 642 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:50:56.169 UTC [common.configtx] addToMap -> DEBU 643 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-08-31 20:50:56.170 UTC [common.configtx] addToMap -> DEBU 644 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-08-31 20:50:56.170 UTC [common.configtx] addToMap -> DEBU 645 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-08-31 20:50:56.171 UTC [common.configtx] addToMap -> DEBU 646 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-08-31 20:50:56.171 UTC [common.configtx] addToMap -> DEBU 647 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-08-31 20:50:56.172 UTC [common.configtx] addToMap -> DEBU 648 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-08-31 20:50:56.172 UTC [common.configtx] addToMap -> DEBU 649 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-08-31 20:50:56.172 UTC [common.configtx] addToMap -> DEBU 64a Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-08-31 20:50:56.172 UTC [common.configtx] addToMap -> DEBU 64b Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-08-31 20:50:56.173 UTC [common.configtx] addToMap -> DEBU 64c Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-08-31 20:50:56.173 UTC [common.configtx] addToMap -> DEBU 64d Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-08-31 20:50:56.173 UTC [common.channelconfig] LogSanityChecks -> DEBU 64e As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2020-08-31 20:50:56.174 UTC [common.channelconfig] LogSanityChecks -> DEBU 64f As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2020-08-31 20:50:56.174 UTC [policies] Manager -> DEBU 650 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-08-31 20:50:56.174 UTC [policies] Manager -> DEBU 651 Manager Channel has managers Orderer" +orderer0.example.com | "2020-08-31 20:50:56.174 UTC [policies] Manager -> DEBU 652 Manager Channel has managers Application" +orderer0.example.com | "2020-08-31 20:50:56.174 UTC [policies] Manager -> DEBU 653 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-08-31 20:50:56.175 UTC [policies] Manager -> DEBU 654 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-08-31 20:50:56.175 UTC [policies] Manager -> DEBU 655 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-08-31 20:50:56.175 UTC [common.channelconfig] LogSanityChecks -> DEBU 656 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2020-08-31 20:50:56.175 UTC [common.channelconfig] LogSanityChecks -> DEBU 657 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2020-08-31 20:50:56.175 UTC [common.channelconfig] LogSanityChecks -> DEBU 658 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2020-08-31 20:50:56.175 UTC [policies] Manager -> DEBU 659 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2020-08-31 20:50:56.175 UTC [policies] Manager -> DEBU 65a Manager Channel has managers Orderer" +orderer0.example.com | "2020-08-31 20:50:56.175 UTC [policies] Manager -> DEBU 65b Manager Channel has managers Application" +orderer0.example.com | "2020-08-31 20:50:56.175 UTC [policies] Manager -> DEBU 65c Manager Channel/Orderer looking up path []" +orderer0.example.com | "2020-08-31 20:50:56.175 UTC [policies] Manager -> DEBU 65d Manager Channel/Orderer has managers OrdererOrg" +peer0.org2.example.com | [63b 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 05 66 be 9e f2 e7 99 db 13 b1 a3 32 51 7d d5 |V.f.........2Q}.| +peer0.org2.example.com | 00000010 55 dd 9a 89 3b a4 8f 85 1f 20 e6 9f 1f e8 85 d4 |U...;.... ......| +peer0.org2.example.com | [63c 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 7d b1 4d 9f 97 d6 03 0a 12 b1 ad |0D. %}.M........| +peer0.org2.example.com | 00000010 7c fb 73 d9 0d 2d b7 cb 7f 72 e2 ae db f6 12 76 ||.s..-...r.....v| +peer0.org2.example.com | 00000020 89 34 10 00 02 20 42 52 ef 00 80 8d 76 d5 f3 74 |.4... BR....v..t| +peer0.org2.example.com | 00000030 c0 30 10 a5 77 49 1d 08 a4 e6 c7 92 33 bf 20 ba |.0..wI......3. .| +peer0.org2.example.com | 00000040 52 b0 f1 2e d8 bf |R.....| +peer0.org2.example.com | [63d 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751520 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [63e 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003751520 gate 1598907064424953100 evaluation succeeds +peer0.org2.example.com | [63f 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [640 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [641 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [642 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [643 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [644 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" lastAliveTS: 1598907045534780300, 17 but got ts: inc_num:1598907045534780300 seq_num:10 +peer0.org2.example.com | [645 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [646 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [647 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org2.example.com | [648 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org2.example.com | [649 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [64a 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [64b 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [64c 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [64d 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [64e 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org2.example.com | [64f 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org2.example.com | [650 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [651 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [652 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org2.example.com | [653 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | [4b4 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00019f980 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4b5 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00019f980 gate 1598907063857382600 evaluation succeeds +peer0.org1.example.com | [4b6 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [4b7 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [4b8 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [4b9 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4ba 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4bb 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4bc 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4bd 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org1.example.com | [4be 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4bf 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4c0 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4c1 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4c2 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4c3 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org1.example.com | [4c4 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org1.example.com | [4c5 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org1.example.com | [4c6 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org1.example.com | [4c7 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org1.example.com | [4c8 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4c9 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4ca 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4cb 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer0.org1.example.com | [4cc 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4cd 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [4ce 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [4cf 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org1.example.com | [4d0 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org1.example.com | [4d1 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org1.example.com | [4d2 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org1.example.com | [4d3 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org1.example.com | [4d4 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [4d5 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org1.example.com | [4d6 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org1.example.com | [4d7 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org1.example.com | [4d8 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org1.example.com | [4d9 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org1.example.com | [4da 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org1.example.com | [4db 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [4dc 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org1.example.com | [4dd 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org1.example.com | [4de 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [4df 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [4e0 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org1.example.com | [4e1 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [4e2 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [4e3 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org1.example.com | [4e4 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [654 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [655 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [656 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [657 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [658 08-31 20:51:04.42 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer0.org2.example.com | [659 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org2.example.com | [65a 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [65b 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [65c 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org2.example.com | [65d 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [65e 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org2.example.com | [65f 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org2.example.com | [660 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [661 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [662 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [663 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | [664 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org2.example.com | [665 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +orderer0.example.com | "2020-08-31 20:50:56.175 UTC [common.channelconfig] LogSanityChecks -> DEBU 65e As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2020-08-31 20:50:56.175 UTC [common.channelconfig] LogSanityChecks -> DEBU 65f As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2020-08-31 20:50:56.175 UTC [common.channelconfig] LogSanityChecks -> DEBU 660 As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2020-08-31 20:50:56.175 UTC [common.channelconfig] LogSanityChecks -> DEBU 661 As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2020-08-31 20:50:56.175 UTC [common.capabilities] Supported -> DEBU 662 Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2020-08-31 20:50:56.175 UTC [common.capabilities] Supported -> DEBU 663 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-08-31 20:50:56.175 UTC [fsblkstorage] newBlockfileMgr -> DEBU 664 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +orderer0.example.com | "2020-08-31 20:50:56.176 UTC [kvledger.util] CreateDirIfMissing -> DEBU 665 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" +orderer0.example.com | "2020-08-31 20:50:56.176 UTC [kvledger.util] logDirStatus -> DEBU 666 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" +orderer0.example.com | "2020-08-31 20:50:56.176 UTC [kvledger.util] logDirStatus -> DEBU 667 After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" +orderer0.example.com | "2020-08-31 20:50:56.176 UTC [fsblkstorage] newBlockfileMgr -> INFO 668 Getting block information from block storage" +orderer0.example.com | "2020-08-31 20:50:56.176 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 669 Retrieving checkpoint info from block files" +orderer0.example.com | "2020-08-31 20:50:56.176 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 66a retrieveLastFileSuffix()" +orderer0.example.com | "2020-08-31 20:50:56.176 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 66b retrieveLastFileSuffix() - biggestFileNum = -1" +orderer0.example.com | "2020-08-31 20:50:56.176 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 66c Last file number found = -1" +orderer0.example.com | "2020-08-31 20:50:56.176 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 66d No block file found" +orderer0.example.com | "2020-08-31 20:50:56.176 UTC [fsblkstorage] newBlockfileMgr -> DEBU 66e Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000d55100)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +orderer0.example.com | "2020-08-31 20:50:56.178 UTC [fsblkstorage] newBlockIndex -> DEBU 66f newBlockIndex() - indexItems:[[BlockNum]]" +orderer0.example.com | "2020-08-31 20:50:56.179 UTC [orderer.common.server] func1 -> DEBU 670 Executing callback to update root CAs" +orderer0.example.com | "2020-08-31 20:50:56.179 UTC [orderer.common.server] updateTrustedRoots -> DEBU 671 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2020-08-31 20:50:56.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 672 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2020-08-31 20:50:56.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 673 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2020-08-31 20:50:56.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 674 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2020-08-31 20:50:56.183 UTC [fsblkstorage] indexBlock -> DEBU 675 Indexing block [blockNum=0, blockHash=[]byte{0x9a, 0x52, 0x4c, 0x2b, 0x43, 0x65, 0xfd, 0x57, 0x33, 0x8e, 0x73, 0xf4, 0x8a, 0x80, 0xa7, 0x23, 0x93, 0x2, 0xb5, 0x41, 0x2, 0x4d, 0xf3, 0x50, 0xe8, 0x90, 0xb1, 0xd5, 0x7a, 0xc7, 0x1e, 0x2e} txOffsets= +orderer0.example.com | txId=fd92ece786eb33a140499e967ed74e3a3bbcb8e88456d50f7454e373b6da94d6 locPointer=offset=39, bytesLength=28430 +orderer0.example.com | ]" +orderer0.example.com | "2020-08-31 20:50:56.184 UTC [fsblkstorage] updateCheckpoint -> DEBU 676 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28475], isChainEmpty=[false], lastBlockNumber=[0]" +orderer0.example.com | "2020-08-31 20:50:56.185 UTC [fsblkstorage] Next -> DEBU 677 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2020-08-31 20:50:56.185 UTC [fsblkstorage] newBlockfileStream -> DEBU 678 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-08-31 20:50:56.185 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 679 Remaining bytes=[28475], Going to peek [8] bytes" +orderer0.example.com | "2020-08-31 20:50:56.186 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 67a Returning blockbytes - length=[28472], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-08-31 20:50:56.186 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 67b blockbytes [28472] read from file [0]" +orderer0.example.com | "2020-08-31 20:50:56.186 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 67c [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" +orderer0.example.com | "2020-08-31 20:50:56.186 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 67d EvictionSuspicion not set, defaulting to 10m0s" +orderer0.example.com | "2020-08-31 20:50:56.186 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 67e No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:56.187 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 67f No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:56.192 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 680 Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:56.193 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 681 Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:56.193 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 682 Appending 0 entries to memory storage" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:56.193 UTC [fsblkstorage] Next -> DEBU 683 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2020-08-31 20:50:56.193 UTC [fsblkstorage] newBlockfileStream -> DEBU 684 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-08-31 20:50:56.193 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 685 Remaining bytes=[28475], Going to peek [8] bytes" +peer0.org2.example.com | [666 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | [667 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org2.example.com | [668 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org2.example.com | [669 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org2.example.com | [66a 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org2.example.com | [66b 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org2.example.com | [66c 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org2.example.com | [66d 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [66e 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [66f 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [670 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org2.example.com | [671 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [672 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [673 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org2.example.com | [674 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org2.example.com | [675 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [676 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | [677 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org2.example.com | [678 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | [679 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [67a 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | [67b 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | [67c 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org2.example.com | [67d 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org2.example.com | [67e 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [67f 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org2.example.com | [680 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org2.example.com | [681 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org2.example.com | [682 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org2.example.com | [683 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org2.example.com | [684 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org2.example.com | [685 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org2.example.com | [686 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org2.example.com | [687 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org2.example.com | [688 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org2.example.com | [689 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [68a 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [68b 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org2.example.com | [68c 08-31 20:51:04.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [68d 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [68e 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [68f 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [690 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [691 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [692 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [693 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [694 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org1.example.com | nw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [4e5 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org1.example.com | [4e6 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org1.example.com | [4e7 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [4e8 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [4e9 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [4ea 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [4eb 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [4ec 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +peer0.org1.example.com | [4ed 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org1.example.com | [4ee 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [4ef 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [4f0 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org1.example.com | [4f1 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [4f2 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [4f3 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [4f4 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [4f5 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [4f6 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org1.example.com | [4f7 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org1.example.com | [4f8 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [4f9 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [4fa 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [4fb 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [4fc 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org1.example.com | [4fd 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org1.example.com | [4fe 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [4ff 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [500 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [501 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org1.example.com | [502 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org1.example.com | [503 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org1.example.com | [504 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org1.example.com | [505 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org1.example.com | [506 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +peer0.org1.example.com | [507 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org1.example.com | [508 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org1.example.com | [509 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org1.example.com | [50a 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org1.example.com | [50b 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org1.example.com | [50c 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [50d 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org1.example.com | [50e 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org1.example.com | [50f 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org1.example.com | [510 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org1.example.com | [511 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [512 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org1.example.com | [513 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org1.example.com | [514 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +orderer0.example.com | "2020-08-31 20:50:56.194 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 686 Returning blockbytes - length=[28472], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-08-31 20:50:56.194 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 687 blockbytes [28472] read from file [0]" +orderer0.example.com | "2020-08-31 20:50:56.194 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 688 [channel: businesschannel] Done creating channel support resources" +orderer0.example.com | "2020-08-31 20:50:56.195 UTC [orderer.commmon.multichannel] newChain -> INFO 689 Created and starting new chain businesschannel" +orderer0.example.com | "2020-08-31 20:50:56.195 UTC [orderer.consensus.etcdraft] Start -> INFO 68a Starting Raft node" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:56.195 UTC [orderer.common.cluster] Configure -> INFO 68b Entering, channel: businesschannel, nodes: [ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | ]" +orderer0.example.com | "2020-08-31 20:50:56.197 UTC [orderer.common.cluster] updateStubInMapping -> INFO 68c Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +orderer0.example.com | "2020-08-31 20:50:56.197 UTC [orderer.common.cluster] updateStubInMapping -> INFO 68d Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +orderer0.example.com | "2020-08-31 20:50:56.197 UTC [orderer.common.cluster] func1 -> DEBU 68e Connecting to ID: 2, +orderer0.example.com | Endpoint: orderer1.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +orderer0.example.com | eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +orderer0.example.com | BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +orderer0.example.com | bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +orderer0.example.com | AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +orderer0.example.com | siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +orderer0.example.com | BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +orderer0.example.com | AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +orderer0.example.com | MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +orderer0.example.com | hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +orderer0.example.com | IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel businesschannel" +orderer0.example.com | "2020-08-31 20:50:56.197 UTC [orderer.common.cluster] updateStubInMapping -> INFO 68f Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +orderer0.example.com | "2020-08-31 20:50:56.197 UTC [orderer.common.cluster] updateStubInMapping -> INFO 690 Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +peer0.org1.example.com | [515 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org1.example.com | [516 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [517 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org1.example.com | [518 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org1.example.com | [519 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org1.example.com | [51a 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [51b 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org1.example.com | [51c 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org1.example.com | [51d 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org1.example.com | [51e 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org1.example.com | [51f 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org1.example.com | [520 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org1.example.com | [521 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org1.example.com | [522 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org1.example.com | [523 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org1.example.com | [524 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org1.example.com | [525 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org1.example.com | [526 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [527 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [528 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [529 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [52a 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [52b 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [52c 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [52d 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [52e 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [52f 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [530 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [531 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [532 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [533 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [534 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [535 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [536 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [537 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [538 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [539 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [53a 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org1.example.com | [53b 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org1.example.com | [53c 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org1.example.com | [53d 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org1.example.com | [53e 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org1.example.com | [53f 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org1.example.com | [540 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org1.example.com | [541 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org1.example.com | [542 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org1.example.com | [543 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org1.example.com | [544 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [545 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [546 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [547 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [548 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [549 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [54a 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org1.example.com | [54b 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org1.example.com | [54c 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org1.example.com | [54d 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org1.example.com | [54e 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [54f 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [550 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org2.example.com | [695 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [696 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +orderer0.example.com | "2020-08-31 20:50:56.198 UTC [orderer.common.cluster] func1 -> DEBU 691 Connecting to ID: 3, +orderer0.example.com | Endpoint: orderer2.example.com:7050, +orderer0.example.com | ServerTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | , ClientTLSCert:-----BEGIN CERTIFICATE----- +orderer0.example.com | MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +orderer0.example.com | YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +orderer0.example.com | A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +orderer0.example.com | Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +orderer0.example.com | AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +orderer0.example.com | f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +orderer0.example.com | BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +orderer0.example.com | MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +orderer0.example.com | KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +orderer0.example.com | SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +orderer0.example.com | JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +orderer0.example.com | -----END CERTIFICATE----- +orderer0.example.com | for channel businesschannel" +orderer0.example.com | "2020-08-31 20:50:56.198 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 692 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer0.example.com | "2020-08-31 20:50:56.198 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 693 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +orderer0.example.com | "2020-08-31 20:50:56.198 UTC [orderer.common.cluster] Configure -> INFO 694 Exiting" +orderer0.example.com | "2020-08-31 20:50:56.198 UTC [orderer.consensus.etcdraft] start -> DEBU 695 Starting raft node: #peers: 3" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:56.198 UTC [orderer.consensus.etcdraft] start -> INFO 696 Starting raft node as part of a new channel" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:56.198 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 697 1 became follower at term 0" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:56.198 UTC [orderer.consensus.etcdraft] newRaft -> INFO 698 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:56.198 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 699 1 became follower at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:56.199 UTC [orderer.consensus.etcdraft] run -> INFO 69a This node is picked to start campaign" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:56.199 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 69b [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" +orderer0.example.com | "2020-08-31 20:50:56.199 UTC [msp] GetDefaultSigningIdentity -> DEBU 69c Obtaining default signing identity" +orderer0.example.com | "2020-08-31 20:50:56.200 UTC [msp] GetDefaultSigningIdentity -> DEBU 69d Obtaining default signing identity" +orderer0.example.com | "2020-08-31 20:50:56.200 UTC [msp.identity] Sign -> DEBU 69e Sign: plaintext: 0A00120B0A090A03010203100418050A...7C65F39AE8B58335C29B6163B49750E3 " +orderer0.example.com | "2020-08-31 20:50:56.200 UTC [msp.identity] Sign -> DEBU 69f Sign: digest: 409BDDC31A3181E4EE31C0AF30CCF0DD7C987E54114927C9968E1F751F9FE661 " +orderer0.example.com | "2020-08-31 20:50:56.201 UTC [orderer.consensus.etcdraft] apply -> INFO 6a0 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:56.201 UTC [orderer.consensus.etcdraft] apply -> INFO 6a1 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:56.201 UTC [orderer.consensus.etcdraft] apply -> INFO 6a2 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:56.203 UTC [fsblkstorage] indexBlock -> DEBU 6a3 Indexing block [blockNum=1, blockHash=[]byte{0xfb, 0xa7, 0xa, 0x71, 0x21, 0x62, 0xcb, 0x58, 0xf3, 0xa3, 0x94, 0xf0, 0x6c, 0x9d, 0xec, 0x84, 0x5a, 0x3b, 0x7c, 0x76, 0xf2, 0x9c, 0x2d, 0xb2, 0xe3, 0xae, 0x89, 0x4e, 0x6c, 0x48, 0xc, 0xae} txOffsets= +orderer0.example.com | txId=207ed8b1e6ee8f7547b19b18954ae7d1f0d7a1b238b7fa2e23a4bff66b838f66 locPointer=offset=71, bytesLength=29384 +orderer0.example.com | ]" +orderer0.example.com | "2020-08-31 20:50:56.205 UTC [fsblkstorage] updateCheckpoint -> DEBU 6a4 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[53341], isChainEmpty=[false], lastBlockNumber=[1]" +orderer0.example.com | "2020-08-31 20:50:56.205 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 6a5 [channel: testchainid] Wrote block [1]" +orderer0.example.com | "2020-08-31 20:50:56.357 UTC [common.deliver] deliverBlocks -> WARN 6a6 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:50716 because of consenter error" +orderer0.example.com | "2020-08-31 20:50:56.358 UTC [orderer.common.server] func1 -> DEBU 6a7 Closing Deliver stream" +orderer0.example.com | "2020-08-31 20:50:56.359 UTC [comm.grpc.server] 1 -> INFO 6a8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50716 grpc.code=OK grpc.call_duration=210.8024ms +orderer0.example.com | "2020-08-31 20:50:56.380 UTC [orderer.common.server] Deliver -> DEBU 6a9 Starting new Deliver handler" +orderer0.example.com | "2020-08-31 20:50:56.380 UTC [common.deliver] Handle -> DEBU 6aa Starting new deliver loop for 172.18.0.9:50718" +orderer0.example.com | "2020-08-31 20:50:56.380 UTC [common.deliver] Handle -> DEBU 6ab Attempting to read seek info message from 172.18.0.9:50718" +orderer0.example.com | "2020-08-31 20:50:56.408 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ac Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:56.409 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ad Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +orderer0.example.com | "2020-08-31 20:50:56.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 452µs " +orderer0.example.com | "2020-08-31 20:50:56.587 UTC [common.deliver] deliverBlocks -> WARN 6af [channel: businesschannel] Rejecting deliver request for 172.18.0.9:50718 because of consenter error" +orderer0.example.com | "2020-08-31 20:50:56.587 UTC [orderer.common.server] func1 -> DEBU 6b0 Closing Deliver stream" +orderer0.example.com | "2020-08-31 20:50:56.587 UTC [comm.grpc.server] 1 -> INFO 6b1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50718 grpc.code=OK grpc.call_duration=207.4938ms +orderer0.example.com | "2020-08-31 20:50:56.601 UTC [orderer.common.server] Deliver -> DEBU 6b2 Starting new Deliver handler" +peer1.org2.example.com | [5ef 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org2.example.com | [5f0 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [5f1 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org2.example.com | [5f2 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +peer1.org2.example.com | [5f3 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0035dfd80)} +peer1.org2.example.com | [5f4 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [5f5 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [5f6 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [5f7 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +peer1.org2.example.com | [5f8 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +peer1.org2.example.com | [5f9 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +peer1.org2.example.com | [5fa 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org2.example.com | [5fb 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5fc 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [5fd 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [5fe 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [5ff 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [600 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [601 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [5d9 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org1.example.com | [5da 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | [5db 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org1.example.com | [5dc 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +peer1.org1.example.com | [5dd 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0035fd600)} +peer1.org1.example.com | [5de 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [5df 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [5e0 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [5e1 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +peer1.org1.example.com | [5e2 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +peer1.org1.example.com | [5e3 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +peer1.org1.example.com | [5e4 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +peer1.org1.example.com | [5e5 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0xe3, 0x22, 0xef, 0xdb, 0x1a, 0xb5, 0x8a, 0x4e, 0xca, 0x29, 0x72, 0xa1, 0x82, 0xd5, 0x73, 0xd2, 0x6c, 0x30, 0x29, 0x25, 0x12, 0x30, 0x2d, 0xc5, 0xc9, 0xfc, 0x53, 0x0, 0x88, 0x62, 0x25, 0xd} txOffsets= +peer1.org1.example.com | txId=0ab5ac5f1d5a2551b49ec6c24c6da873616029271ac520b4a7140ef88dfe6b38 locPointer=offset=71, bytesLength=27136 +peer1.org1.example.com | ] +peer1.org1.example.com | [5e6 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28547, bytesLength=27136] for tx ID: [0ab5ac5f1d5a2551b49ec6c24c6da873616029271ac520b4a7140ef88dfe6b38] to txid-index +peer1.org1.example.com | [5e7 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28547, bytesLength=27136] for tx number:[0] ID: [0ab5ac5f1d5a2551b49ec6c24c6da873616029271ac520b4a7140ef88dfe6b38] to blockNumTranNum index +peer1.org1.example.com | [5e8 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56675], isChainEmpty=[false], lastBlockNumber=[1] +peer1.org1.example.com | [5e9 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +peer1.org1.example.com | [5ea 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1] +peer1.org1.example.com | [5eb 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database +peer1.org1.example.com | [5ec 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [5ed 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [5ee 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [5ef 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [5f0 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org1.example.com | [5f1 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [5f2 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +peer1.org1.example.com | [5f3 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +peer1.org1.example.com | [5f4 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +orderer0.example.com | "2020-08-31 20:50:56.601 UTC [common.deliver] Handle -> DEBU 6b3 Starting new deliver loop for 172.18.0.9:50720" +orderer0.example.com | "2020-08-31 20:50:56.601 UTC [common.deliver] Handle -> DEBU 6b4 Attempting to read seek info message from 172.18.0.9:50720" +orderer0.example.com | "2020-08-31 20:50:56.807 UTC [common.deliver] deliverBlocks -> WARN 6b5 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:50720 because of consenter error" +orderer0.example.com | "2020-08-31 20:50:56.808 UTC [orderer.common.server] func1 -> DEBU 6b6 Closing Deliver stream" +orderer0.example.com | "2020-08-31 20:50:56.810 UTC [comm.grpc.server] 1 -> INFO 6b7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50720 grpc.code=OK grpc.call_duration=211.0551ms +orderer0.example.com | "2020-08-31 20:50:56.827 UTC [orderer.common.server] Deliver -> DEBU 6b8 Starting new Deliver handler" +orderer0.example.com | "2020-08-31 20:50:56.828 UTC [common.deliver] Handle -> DEBU 6b9 Starting new deliver loop for 172.18.0.9:50722" +orderer0.example.com | "2020-08-31 20:50:56.828 UTC [common.deliver] Handle -> DEBU 6ba Attempting to read seek info message from 172.18.0.9:50722" +orderer0.example.com | "2020-08-31 20:50:56.914 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6bb Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:56.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6bc Sending msg of 28 bytes to 3 on channel testchainid took 25.2µs" +orderer0.example.com | "2020-08-31 20:50:56.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6bd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 219.9µs " +orderer0.example.com | "2020-08-31 20:50:57.035 UTC [common.deliver] deliverBlocks -> WARN 6be [channel: businesschannel] Rejecting deliver request for 172.18.0.9:50722 because of consenter error" +orderer0.example.com | "2020-08-31 20:50:57.037 UTC [orderer.common.server] func1 -> DEBU 6bf Closing Deliver stream" +orderer0.example.com | "2020-08-31 20:50:57.043 UTC [comm.grpc.server] 1 -> INFO 6c0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50722 grpc.code=OK grpc.call_duration=215.7913ms +orderer0.example.com | "2020-08-31 20:50:57.057 UTC [orderer.common.server] Deliver -> DEBU 6c1 Starting new Deliver handler" +orderer0.example.com | "2020-08-31 20:50:57.058 UTC [common.deliver] Handle -> DEBU 6c2 Starting new deliver loop for 172.18.0.9:50724" +orderer0.example.com | "2020-08-31 20:50:57.058 UTC [common.deliver] Handle -> DEBU 6c3 Attempting to read seek info message from 172.18.0.9:50724" +orderer0.example.com | "2020-08-31 20:50:57.200 UTC [orderer.consensus.etcdraft] Step -> INFO 6c4 1 is starting a new election at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.202 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 6c5 1 became pre-candidate at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.202 UTC [orderer.consensus.etcdraft] poll -> INFO 6c6 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.203 UTC [orderer.consensus.etcdraft] campaign -> INFO 6c7 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.203 UTC [orderer.consensus.etcdraft] campaign -> INFO 6c8 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.204 UTC [orderer.common.cluster] NewStream -> DEBU 6c9 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2020-08-31 20:50:57.205 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ca Sending msg of 28 bytes to 3 on channel businesschannel took 960.8µs" +orderer0.example.com | "2020-08-31 20:50:57.205 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6cb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.4µs " +orderer0.example.com | "2020-08-31 20:50:57.209 UTC [orderer.common.cluster] Step -> DEBU 6cc Connection from orderer2.example.com(172.18.0.2:58986)" +orderer0.example.com | "2020-08-31 20:50:57.209 UTC [orderer.common.cluster] NewStream -> DEBU 6cd Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" +orderer0.example.com | "2020-08-31 20:50:57.210 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6cf Sending msg of 28 bytes to 2 on channel businesschannel took 4.5779ms" +orderer0.example.com | "2020-08-31 20:50:57.209 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ce Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:57.211 UTC [orderer.consensus.etcdraft] poll -> INFO 6d0 1 received MsgPreVoteResp from 3 at term 1" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.210 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.8µs " +orderer0.example.com | "2020-08-31 20:50:57.211 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6d2 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.213 UTC [orderer.common.cluster] Step -> DEBU 6d3 Connection from orderer1.example.com(172.18.0.4:47136)" +orderer0.example.com | "2020-08-31 20:50:57.213 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 6d4 1 became candidate at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d5 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:57.213 UTC [orderer.consensus.etcdraft] poll -> INFO 6d6 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.214 UTC [orderer.consensus.etcdraft] campaign -> INFO 6d7 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.215 UTC [orderer.consensus.etcdraft] campaign -> INFO 6d8 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d9 Sending msg of 28 bytes to 2 on channel businesschannel took 22.1µs" +orderer0.example.com | "2020-08-31 20:50:57.218 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 210.8µs " +orderer0.example.com | "2020-08-31 20:50:57.220 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6db Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:57.221 UTC [orderer.consensus.etcdraft] poll -> INFO 6dc 1 received MsgVoteResp from 2 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.221 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6dd 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.221 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 6de 1 became leader at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.222 UTC [orderer.consensus.etcdraft] run -> INFO 6df raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.222 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e0 Sending msg of 28 bytes to 3 on channel businesschannel took 30µs" +orderer0.example.com | "2020-08-31 20:50:57.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 517.2µs " +orderer0.example.com | "2020-08-31 20:50:57.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:57.227 UTC [orderer.consensus.etcdraft] run -> INFO 6e3 Leader 1 is present, quit campaign" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e5 Sending msg of 36 bytes to 3 on channel businesschannel took 12.9µs" +orderer0.example.com | "2020-08-31 20:50:57.227 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6e4 Raft leader changed: 0 -> 1" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.228 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6e7 There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e6 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 86.7µs " +orderer0.example.com | "2020-08-31 20:50:57.229 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:57.230 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e9 Sending msg of 36 bytes to 2 on channel businesschannel took 112.6µs" +orderer0.example.com | "2020-08-31 20:50:57.230 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ea Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 60.1µs " +orderer0.example.com | "2020-08-31 20:50:57.233 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6eb Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:57.234 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6ec Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:50:57.237 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ed Sending msg of 28 bytes to 3 on channel businesschannel took 2.0669ms" +orderer0.example.com | "2020-08-31 20:50:57.238 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 288.2µs " +orderer0.example.com | "2020-08-31 20:50:57.239 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ef Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:57.240 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f0 Sending msg of 28 bytes to 2 on channel businesschannel took 343.5µs" +orderer0.example.com | "2020-08-31 20:50:57.241 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.2µs " +orderer0.example.com | "2020-08-31 20:50:57.242 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f2 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:57.262 UTC [policies] Evaluate -> DEBU 6f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-08-31 20:50:57.262 UTC [policies] Evaluate -> DEBU 6f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:50:57.262 UTC [policies] Evaluate -> DEBU 6f5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-08-31 20:50:57.262 UTC [policies] Evaluate -> DEBU 6f6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:50:57.263 UTC [policies] Evaluate -> DEBU 6f7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-08-31 20:50:57.263 UTC [msp] DeserializeIdentity -> DEBU 6f8 Obtaining identity" +orderer0.example.com | "2020-08-31 20:50:57.263 UTC [msp.identity] newIdentity -> DEBU 6f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +orderer0.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +orderer0.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +orderer0.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +orderer0.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +orderer0.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:50:57.264 UTC [cauthdsl] func1 -> DEBU 6fa 0xc000d36e30 gate 1598907057264748800 evaluation starts" +orderer0.example.com | "2020-08-31 20:50:57.264 UTC [cauthdsl] func2 -> DEBU 6fb 0xc000d36e30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:50:57.264 UTC [cauthdsl] func2 -> DEBU 6fc 0xc000d36e30 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:50:57.265 UTC [cauthdsl] func2 -> DEBU 6fd 0xc000d36e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2020-08-31 20:50:57.265 UTC [cauthdsl] func2 -> DEBU 6fe 0xc000d36e30 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:50:57.265 UTC [cauthdsl] func1 -> DEBU 6ff 0xc000d36e30 gate 1598907057264748800 evaluation fails" +orderer0.example.com | "2020-08-31 20:50:57.265 UTC [policies] Evaluate -> DEBU 700 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:50:57.265 UTC [policies] Evaluate -> DEBU 701 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:50:57.265 UTC [policies] func1 -> DEBU 702 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +orderer0.example.com | "2020-08-31 20:50:57.265 UTC [policies] Evaluate -> DEBU 703 Signature set did not satisfy policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:50:57.265 UTC [policies] Evaluate -> DEBU 704 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:50:57.265 UTC [policies] Evaluate -> DEBU 705 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-08-31 20:50:57.265 UTC [policies] Evaluate -> DEBU 706 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:50:57.265 UTC [policies] Evaluate -> DEBU 707 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-08-31 20:50:57.265 UTC [cauthdsl] func1 -> DEBU 708 0xc0009bc610 gate 1598907057265712800 evaluation starts" +orderer0.example.com | "2020-08-31 20:50:57.265 UTC [cauthdsl] func2 -> DEBU 709 0xc0009bc610 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:50:57.265 UTC [cauthdsl] func2 -> DEBU 70a 0xc0009bc610 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:50:57.265 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 70b Checking if identity satisfies MEMBER role for Org1MSP" +orderer0.example.com | "2020-08-31 20:50:57.266 UTC [msp] Validate -> DEBU 70c MSP Org1MSP validating identity" +orderer0.example.com | "2020-08-31 20:50:57.266 UTC [msp] getCertificationChain -> DEBU 70d MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-08-31 20:50:57.266 UTC [cauthdsl] func2 -> DEBU 70e 0xc0009bc610 principal matched by identity 0" +orderer0.example.com | "2020-08-31 20:50:57.266 UTC [msp.identity] Verify -> DEBU 70f Verify: digest = 00000000 1d ae 3a ec b1 17 dc 5e fb 9e 21 31 73 0c cb 89 |..:....^..!1s...| +orderer0.example.com | 00000010 9c 11 c1 83 64 ed 6b 4c a3 d2 49 dd 6e bf 49 51 |....d.kL..I.n.IQ|" +orderer0.example.com | "2020-08-31 20:50:57.266 UTC [msp.identity] Verify -> DEBU 710 Verify: sig = 00000000 30 44 02 20 67 bc bc 8a 4b 06 00 73 ce 2b 3b 84 |0D. g...K..s.+;.| +orderer0.example.com | 00000010 5f 2f d1 ed 4c 8f 3f bf 73 c7 01 85 99 79 6e ca |_/..L.?.s....yn.| +orderer0.example.com | 00000020 a2 2b b6 34 02 20 39 b5 72 bc ae 7f 3a e5 97 7d |.+.4. 9.r...:..}| +orderer0.example.com | 00000030 72 f4 cc 46 bb ef 29 b7 5b 98 7e 79 20 2a 26 b5 |r..F..).[.~y *&.| +orderer0.example.com | 00000040 92 da d1 a7 27 ca |....'.|" +orderer0.example.com | "2020-08-31 20:50:57.267 UTC [cauthdsl] func2 -> DEBU 711 0xc0009bc610 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-08-31 20:50:57.267 UTC [cauthdsl] func1 -> DEBU 712 0xc0009bc610 gate 1598907057265712800 evaluation succeeds" +orderer0.example.com | "2020-08-31 20:50:57.267 UTC [policies] Evaluate -> DEBU 713 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:50:57.267 UTC [policies] Evaluate -> DEBU 714 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:50:57.267 UTC [policies] Evaluate -> DEBU 715 Signature set satisfies policy /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:50:57.267 UTC [policies] Evaluate -> DEBU 716 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:50:57.267 UTC [policies] Evaluate -> DEBU 717 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-08-31 20:50:57.267 UTC [policies] Evaluate -> DEBU 718 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-08-31 20:50:57.267 UTC [common.deliver] deliverBlocks -> DEBU 719 [channel: businesschannel] Received seekInfo (0xc000cae180) start: > stop: > from 172.18.0.9:50724" +orderer0.example.com | "2020-08-31 20:50:57.267 UTC [fsblkstorage] Next -> DEBU 71a Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +orderer0.example.com | "2020-08-31 20:50:57.267 UTC [fsblkstorage] newBlockfileStream -> DEBU 71b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-08-31 20:50:57.267 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 71c Remaining bytes=[28475], Going to peek [8] bytes" +orderer0.example.com | "2020-08-31 20:50:57.268 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 71d Returning blockbytes - length=[28472], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-08-31 20:50:57.268 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 71e blockbytes [28472] read from file [0]" +orderer0.example.com | "2020-08-31 20:50:57.268 UTC [common.deliver] deliverBlocks -> DEBU 71f [channel: businesschannel] Delivering block [0] for (0xc000cae180) for 172.18.0.9:50724" +orderer0.example.com | "2020-08-31 20:50:57.268 UTC [common.deliver] deliverBlocks -> DEBU 720 [channel: businesschannel] Done delivering to 172.18.0.9:50724 for (0xc000cae180)" +orderer0.example.com | "2020-08-31 20:50:57.268 UTC [common.deliver] Handle -> DEBU 721 Waiting for new SeekInfo from 172.18.0.9:50724" +orderer0.example.com | "2020-08-31 20:50:57.268 UTC [common.deliver] Handle -> DEBU 722 Attempting to read seek info message from 172.18.0.9:50724" +orderer0.example.com | "2020-08-31 20:50:57.271 UTC [common.deliver] Handle -> DEBU 723 Received EOF from 172.18.0.9:50724, hangup" +orderer0.example.com | "2020-08-31 20:50:57.271 UTC [orderer.common.server] func1 -> DEBU 724 Closing Deliver stream" +orderer0.example.com | "2020-08-31 20:50:57.271 UTC [comm.grpc.server] 1 -> INFO 725 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50724 grpc.code=OK grpc.call_duration=213.8387ms +orderer0.example.com | "2020-08-31 20:50:57.272 UTC [grpc] infof -> DEBU 726 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-08-31 20:50:57.273 UTC [grpc] infof -> DEBU 727 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-08-31 20:50:57.273 UTC [grpc] infof -> DEBU 728 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-08-31 20:50:57.273 UTC [grpc] warningf -> DEBU 729 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:50724: read: connection reset by peer" +orderer0.example.com | "2020-08-31 20:50:57.273 UTC [grpc] infof -> DEBU 72a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-08-31 20:50:57.273 UTC [grpc] infof -> DEBU 72b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-08-31 20:50:57.273 UTC [grpc] infof -> DEBU 72c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-08-31 20:50:57.273 UTC [grpc] infof -> DEBU 72d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-08-31 20:50:57.410 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:57.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 72f Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +orderer0.example.com | "2020-08-31 20:50:57.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 730 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " +peer1.org2.example.com | [602 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [603 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer1.org2.example.com | [604 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [605 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [607 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [608 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [609 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:7051 +peer1.org2.example.com | [60a 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:7051 +peer1.org2.example.com | [60b 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [60c 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer1.org2.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer1.org2.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer1.org2.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [60d 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [60e 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [60f 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer1.org2.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer1.org2.example.com | [610 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 75 88 2a 0c 04 91 bf f1 3f 70 d6 |0D. Tu.*.....?p.| +peer1.org2.example.com | 00000010 64 ee e3 f2 27 14 b0 c9 81 40 09 78 10 27 f6 ad |d...'....@.x.'..| +peer1.org2.example.com | 00000020 95 fa 31 a2 02 20 02 f8 d5 3f dd ed 2e 37 32 c3 |..1.. ...?...72.| +peer1.org2.example.com | 00000030 18 5a 53 ff 53 59 fc c3 15 29 57 37 af 82 74 b1 |.ZS.SY...)W7..t.| +peer1.org2.example.com | 00000040 ee 78 c3 2a 17 f0 |.x.*..| +peer1.org2.example.com | [611 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer1.org2.example.com | [612 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [613 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161013 +peer1.org2.example.com | [614 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D7B2D653619232ED71278D92DC7424723705E7F9CF20ECC38506F31DE16F3039 +peer0.org2.example.com | [697 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [698 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [699 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [69a 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [69b 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [69c 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [69d 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org2.example.com | [69e 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org2.example.com | [69f 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org2.example.com | [6a0 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org2.example.com | [6a1 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org2.example.com | [6a2 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org2.example.com | [6a3 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org2.example.com | [6a4 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org2.example.com | [6a5 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org2.example.com | [6a6 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org2.example.com | [6a7 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [6a8 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [6a9 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [6aa 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [6ab 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [6ac 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [6ad 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org2.example.com | [6ae 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org2.example.com | [6af 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org2.example.com | [6b0 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org2.example.com | [6b1 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [6b2 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [6b3 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org2.example.com | [6b4 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org2.example.com | [6b5 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org2.example.com | [6b6 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org2.example.com | [6b7 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org2.example.com | [6b8 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org2.example.com | [6b9 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org2.example.com | [6ba 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org2.example.com | [6bb 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org2.example.com | [6bc 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org2.example.com | [6bd 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org2.example.com | [6be 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer0.org2.example.com | [6bf 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org2.example.com | [6c0 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org2.example.com | [6c1 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer0.org2.example.com | [6c2 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer0.org2.example.com | [6c3 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [6c4 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [6c5 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org2.example.com | [6c6 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [6c7 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00382f460, CONNECTING +peer0.org2.example.com | [6c8 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [6c9 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +peer0.org2.example.com | [6ca 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer for channel businesschannel with same endpoint, skipping connecting to myself +peer0.org2.example.com | [6cb 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org2.example.com | [6cc 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [5f5 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +peer1.org1.example.com | [5f6 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +peer1.org1.example.com | [5f7 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org1.example.com | [5f8 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +peer1.org1.example.com | [5f9 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +peer1.org1.example.com | [5fa 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 39ms (state_validation=13ms block_and_pvtdata_commit=18ms state_commit=5ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +peer1.org1.example.com | [5fb 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [5fc 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408D8CA91B5F7AF9D9816...387B0008A61A99B98BA4E6D12A020802 +peer1.org1.example.com | [5fd 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4BD9CE438235AE4F01B0BC0DEF6883AA4DEB111D28CB09AA32A7B6DFC681A2A5 +peer1.org1.example.com | [5fe 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +peer1.org1.example.com | [5ff 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +peer1.org1.example.com | [600 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +peer1.org1.example.com | [601 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +peer1.org1.example.com | [602 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +peer1.org1.example.com | [603 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org1.example.com | [604 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00008b180 env 0xc000290820 txn 0 +peer1.org1.example.com | [605 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc000290820 +peer1.org1.example.com | [606 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\267\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030>\316\004\035\247\263T!\025\236\244\230\014\355k\242EsT\003\377-\204\213" +peer1.org1.example.com | [607 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org1.example.com | [608 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [609 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [60a 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [60b 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org1.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org1.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org1.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org1.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org1.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org1.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [60c 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer1.org1.example.com | [60d 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [60e 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org1.example.com | [60f 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [610 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 bb f3 d3 49 26 2e 3e 88 71 29 7d 0a 91 00 7f |....I&.>.q)}....| +peer1.org1.example.com | 00000010 c6 f2 a5 3e 3c 38 d2 3f 9b 58 9e bb c7 96 e4 4d |...><8.?.X.....M| +peer1.org1.example.com | [611 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 8d d9 5c 84 4b 47 09 13 06 b6 |0E.!....\.KG....| +peer1.org1.example.com | 00000010 45 89 d8 00 01 66 d3 67 41 9b 6b b8 ac 4e 5e 22 |E....f.gA.k..N^"| +peer1.org1.example.com | 00000020 b8 13 f9 48 dd 02 20 05 54 f1 7c ff d1 ca b3 76 |...H.. .T.|....v| +peer1.org1.example.com | 00000030 87 15 bf 1a e7 b1 28 ba a1 6e 04 d2 71 8a 64 10 |......(..n..q.d.| +peer1.org1.example.com | 00000040 f4 9e 1e 26 55 d7 b6 |...&U..| +peer1.org1.example.com | [612 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [613 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0024fea80, header channel_header:"\010\001\032\006\010\267\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030>\316\004\035\247\263T!\025\236\244\230\014\355k\242EsT\003\377-\204\213" +peer1.org1.example.com | [614 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org1.example.com | [615 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [616 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [617 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [6cd 08-31 20:51:04.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [6ce 08-31 20:51:04.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [6cf 08-31 20:51:04.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [6d0 08-31 20:51:04.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org2.example.com | [6d1 08-31 20:51:04.45 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00382f460, READY +peer0.org2.example.com | [6d2 08-31 20:51:04.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [6d3 08-31 20:51:04.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [6d4 08-31 20:51:04.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [6d5 08-31 20:51:04.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [6d8 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [6d9 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [6da 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [6db 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [6dc 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [6dd 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [6de 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [6df 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [6e0 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [6e1 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [6e2 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003861e40 gate 1598907064461772900 evaluation starts +peer0.org2.example.com | [6e3 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003861e40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [6e4 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003861e40 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [6e5 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003861e40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [6e6 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003861e40 principal evaluation fails +peer0.org2.example.com | [6e7 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003861e40 gate 1598907064461772900 evaluation fails +peer0.org2.example.com | [6e8 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [6e9 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [6ea 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [6eb 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b03b0 gate 1598907064462412400 evaluation starts +peer0.org2.example.com | [6ec 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b03b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [6ed 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b03b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [6ee 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b03b0 principal matched by identity 0 +peer0.org2.example.com | [6ef 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [6f0 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 17 d4 d0 71 69 26 04 1c fc f9 8e |0D. r...qi&.....| +peer0.org2.example.com | 00000010 dc 5b 45 23 bf 24 f1 07 d4 82 01 c1 d4 fb 6c fa |.[E#.$........l.| +peer0.org2.example.com | 00000020 38 d3 a7 f5 02 20 20 fd a6 5b 58 e5 a2 98 78 6f |8.... ..[X...xo| +peer0.org2.example.com | 00000030 ce 9a 85 94 df 43 24 ae 83 43 b7 3f 96 b4 55 9d |.....C$..C.?..U.| +peer0.org2.example.com | 00000040 d4 35 4a 77 c1 d3 |.5Jw..| +peer0.org2.example.com | [6f1 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b03b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [6f2 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b03b0 gate 1598907064462412400 evaluation succeeds +peer0.org2.example.com | [6f3 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [6f4 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [6f5 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [6f6 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [6f7 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org2.example.com | [6f8 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [551 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org1.example.com | [552 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org1.example.com | [553 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org1.example.com | [554 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org1.example.com | [555 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org1.example.com | [556 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org1.example.com | [557 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org1.example.com | [558 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org1.example.com | [559 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org1.example.com | [55a 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +peer0.org1.example.com | [55b 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org1.example.com | [55c 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [55d 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [55e 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [55f 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [560 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [561 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [562 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca210 gate 1598907063888309400 evaluation starts +peer0.org1.example.com | [563 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca210 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [564 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca210 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [565 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca210 principal matched by identity 0 +peer0.org1.example.com | [566 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 2d 0f 93 fa 5a 38 ea 1e a6 97 9b 85 21 70 63 |.-...Z8......!pc| +peer0.org1.example.com | 00000010 6d cc 60 e1 07 c2 ed a8 09 44 22 22 bd 46 b1 10 |m.`......D"".F..| +peer0.org1.example.com | [567 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b a9 f8 b1 8d 68 b8 c3 5a 96 2e d2 |0D. k....h..Z...| +peer0.org1.example.com | 00000010 4d 57 70 40 2f 28 0c 43 57 5f c2 00 c3 7d f0 87 |MWp@/(.CW_...}..| +peer0.org1.example.com | 00000020 a9 76 21 13 02 20 76 bd 5e 18 6f e2 bd 3d 0e e4 |.v!.. v.^.o..=..| +peer0.org1.example.com | 00000030 68 62 d6 ef 08 e3 5d 5c eb 6b c4 b5 f3 9d 3b 8c |hb....]\.k....;.| +peer0.org1.example.com | 00000040 d3 68 59 f1 33 fd |.hY.3.| +peer0.org1.example.com | [568 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca210 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [569 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca210 gate 1598907063888309400 evaluation succeeds +peer0.org1.example.com | [56a 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [56b 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [56c 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [56d 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [56e 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org1.example.com | [56f 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +peer0.org1.example.com | [570 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer0.org1.example.com | [571 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer for channel businesschannel with same endpoint, skipping connecting to myself +peer0.org1.example.com | [572 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org1.example.com | [573 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org1.example.com | [574 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org1.example.com | [575 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org1.example.com | [576 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +orderer0.example.com | "2020-08-31 20:50:57.700 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 731 Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +orderer0.example.com | "2020-08-31 20:50:57.700 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 732 Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +orderer0.example.com | "2020-08-31 20:50:57.700 UTC [orderer.common.cluster.step] sendMessage -> DEBU 733 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.2µs " +orderer0.example.com | "2020-08-31 20:50:57.700 UTC [orderer.common.cluster.step] sendMessage -> DEBU 734 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.4µs " +orderer0.example.com | "2020-08-31 20:50:57.701 UTC [orderer.common.cluster.step] handleMessage -> DEBU 735 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:57.702 UTC [orderer.common.cluster.step] handleMessage -> DEBU 736 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:57.910 UTC [orderer.common.cluster.step] handleMessage -> DEBU 737 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [618 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [619 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [61a 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [61b 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [61c 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [61d 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [61e 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [61f 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org1.example.com | [620 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [621 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [622 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [623 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [624 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [625 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +peer1.org1.example.com | [626 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [627 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [628 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [629 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [62a 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [62b 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [62c 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +peer1.org1.example.com | [62d 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [62e 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [62f 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +peer1.org1.example.com | [630 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer1.org1.example.com | [631 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [632 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org1.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer1.org1.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org1.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org1.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer1.org1.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer1.org1.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [633 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034f080 gate 1598907064013128700 evaluation starts +peer1.org1.example.com | [634 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034f080 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [635 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034f080 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [636 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org1.example.com | [637 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org1.example.com | [638 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [639 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [63a 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org1.example.com | [63b 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [63c 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034f080 principal matched by identity 0 +peer1.org1.example.com | [63d 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 3d f8 a1 bf ae 7d e4 fb dc 40 c7 07 6d de 8d |.=....}...@..m..| +peer1.org1.example.com | 00000010 fb 6b e1 2c 0c 1e 66 98 ba 3d 47 90 dc a4 d0 63 |.k.,..f..=G....c| +peer1.org1.example.com | [63e 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 27 f4 6f dd 5b 2d 12 b9 82 60 1a |0D. u'.o.[-...`.| +peer1.org1.example.com | 00000010 88 90 67 88 50 b6 97 37 e6 93 6d 8e 20 ca 9f 40 |..g.P..7..m. ..@| +peer1.org1.example.com | 00000020 df d1 ae 7e 02 20 2b 77 8a 7e aa 5c bd fa f5 76 |...~. +w.~.\...v| +peer1.org1.example.com | 00000030 6b bd 3d 49 6e 73 1a 12 7f 30 6c 34 57 c0 06 c4 |k.=Ins...0l4W...| +peer1.org1.example.com | 00000040 56 0c 2b fa b4 c4 |V.+...| +peer1.org1.example.com | [63f 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034f080 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [640 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034f080 gate 1598907064013128700 evaluation succeeds +peer1.org1.example.com | [641 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [642 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [643 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org1.example.com | [644 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [645 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [646 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [647 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [648 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [649 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org1.example.com | [64a 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [64b 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org1.example.com | [64c 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org1.example.com | [64d 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org1.example.com | [64e 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [64f 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [650 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [651 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [652 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [653 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [654 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [655 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [656 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [657 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [658 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [659 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org1.example.com | [65a 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org1.example.com | [65b 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org1.example.com | [65c 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org1.example.com | [65d 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org1.example.com | [65e 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [65f 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org1.example.com | [660 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | [661 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [662 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [663 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [664 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [665 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [666 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer1.org1.example.com | [667 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | [668 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [669 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [66a 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org1.example.com | [66b 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [66c 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [66d 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [66e 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [66f 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [670 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org1.example.com | [671 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org1.example.com | [672 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [673 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [674 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [675 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [676 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org1.example.com | [677 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org1.example.com | [678 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org1.example.com | [679 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org1.example.com | [67a 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org1.example.com | [67b 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org1.example.com | [67c 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [67d 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org1.example.com | [67e 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org1.example.com | [67f 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [680 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [681 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org1.example.com | [682 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [683 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [684 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org1.example.com | [685 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org1.example.com | nw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [686 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer1.org1.example.com | [687 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer1.org1.example.com | [688 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [689 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [68a 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer1.org1.example.com | [68b 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer1.org1.example.com | [68c 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer1.org1.example.com | [68d 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer1.org1.example.com | [68e 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer1.org1.example.com | [68f 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org1.example.com | [690 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org1.example.com | [691 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org1.example.com | [692 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org1.example.com | [693 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org1.example.com | [694 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org1.example.com | [695 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [696 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [697 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer1.org1.example.com | [698 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org1.example.com | [699 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org1.example.com | [69a 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer1.org1.example.com | [69b 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer1.org1.example.com | [69c 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer1.org1.example.com | [69d 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org1.example.com | [69e 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer1.org1.example.com | [69f 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer1.org1.example.com | [6a0 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer1.org1.example.com | [6a1 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [6a2 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer1.org1.example.com | [6a3 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer1.org1.example.com | [6a4 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer1.org1.example.com | [6a5 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [6a6 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer1.org1.example.com | [6a7 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer1.org1.example.com | [6a8 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer1.org1.example.com | [6a9 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer1.org1.example.com | [6aa 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org1.example.com | [6ab 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer1.org1.example.com | [6ac 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer1.org1.example.com | [6ad 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer1.org1.example.com | [6ae 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer1.org1.example.com | [6af 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer1.org1.example.com | [6b0 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer1.org1.example.com | [6b1 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [6b2 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [6b3 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer1.org1.example.com | [6b4 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer1.org1.example.com | [6b5 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [6b6 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer1.org1.example.com | [6b7 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [6b8 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [6b9 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer1.org1.example.com | [6ba 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer1.org1.example.com | [6bb 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [6bc 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [6bd 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer1.org1.example.com | [6be 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [6bf 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [6c0 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [6c1 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [6c2 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [6c3 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [6c4 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [6c5 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer1.org1.example.com | [6c6 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer1.org1.example.com | [6c7 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer1.org1.example.com | [6c8 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer1.org1.example.com | [6c9 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer1.org1.example.com | [6ca 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer1.org1.example.com | [6cb 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer1.org1.example.com | [6cc 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer1.org1.example.com | [6cd 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer1.org1.example.com | [6ce 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer1.org1.example.com | [6cf 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [6d0 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [6d1 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [6d2 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +orderer0.example.com | "2020-08-31 20:50:57.911 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 738 Sending msg of 28 bytes to 3 on channel testchainid took 30.1µs" +orderer0.example.com | "2020-08-31 20:50:57.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU 739 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.2µs " +orderer0.example.com | "2020-08-31 20:50:58.199 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 73a Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +orderer0.example.com | "2020-08-31 20:50:58.199 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 73b Sending msg of 28 bytes to 2 on channel businesschannel took 8.3µs" +orderer0.example.com | "2020-08-31 20:50:58.200 UTC [orderer.common.cluster.step] sendMessage -> DEBU 73c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.9µs " +orderer0.example.com | "2020-08-31 20:50:58.200 UTC [orderer.common.cluster.step] sendMessage -> DEBU 73d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.3µs " +orderer0.example.com | "2020-08-31 20:50:58.202 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73e Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:58.202 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:58.409 UTC [orderer.common.cluster.step] handleMessage -> DEBU 740 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:58.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 741 Sending msg of 28 bytes to 3 on channel testchainid took 148.9µs" +orderer0.example.com | "2020-08-31 20:50:58.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 742 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 319.3µs " +orderer0.example.com | "2020-08-31 20:50:58.699 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 743 Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" +orderer0.example.com | "2020-08-31 20:50:58.699 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 744 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +orderer0.example.com | "2020-08-31 20:50:58.699 UTC [orderer.common.cluster.step] sendMessage -> DEBU 745 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.7µs " +orderer0.example.com | "2020-08-31 20:50:58.699 UTC [orderer.common.cluster.step] sendMessage -> DEBU 746 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.4µs " +orderer0.example.com | "2020-08-31 20:50:58.700 UTC [orderer.common.cluster.step] handleMessage -> DEBU 747 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:58.701 UTC [orderer.common.cluster.step] handleMessage -> DEBU 748 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:58.909 UTC [orderer.common.cluster.step] handleMessage -> DEBU 749 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:58.909 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 74a Sending msg of 28 bytes to 3 on channel testchainid took 176.2µs" +orderer0.example.com | "2020-08-31 20:50:58.909 UTC [orderer.common.cluster.step] sendMessage -> DEBU 74b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.4µs " +orderer0.example.com | "2020-08-31 20:50:59.199 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 74c Sending msg of 28 bytes to 3 on channel businesschannel took 19.4µs" +orderer0.example.com | "2020-08-31 20:50:59.200 UTC [orderer.common.cluster.step] sendMessage -> DEBU 74d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.2µs " +orderer0.example.com | "2020-08-31 20:50:59.201 UTC [orderer.common.cluster.step] handleMessage -> DEBU 751 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:59.201 UTC [orderer.common.cluster.step] handleMessage -> DEBU 74e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:59.201 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 74f Sending msg of 28 bytes to 2 on channel businesschannel took 14.8µs" +orderer0.example.com | "2020-08-31 20:50:59.201 UTC [orderer.common.cluster.step] sendMessage -> DEBU 750 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.6µs " +orderer0.example.com | "2020-08-31 20:50:59.409 UTC [orderer.common.cluster.step] handleMessage -> DEBU 752 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:59.409 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 753 Sending msg of 28 bytes to 3 on channel testchainid took 10.4µs" +orderer0.example.com | "2020-08-31 20:50:59.409 UTC [orderer.common.cluster.step] sendMessage -> DEBU 754 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.6µs " +orderer0.example.com | "2020-08-31 20:50:59.699 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 755 Sending msg of 28 bytes to 2 on channel businesschannel took 15.9µs" +orderer0.example.com | "2020-08-31 20:50:59.699 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 756 Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +orderer0.example.com | "2020-08-31 20:50:59.700 UTC [orderer.common.cluster.step] sendMessage -> DEBU 757 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.6µs " +orderer0.example.com | "2020-08-31 20:50:59.700 UTC [orderer.common.cluster.step] sendMessage -> DEBU 758 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.6µs " +orderer0.example.com | "2020-08-31 20:50:59.700 UTC [orderer.common.cluster.step] handleMessage -> DEBU 759 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:59.701 UTC [orderer.common.cluster.step] handleMessage -> DEBU 75a Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:59.908 UTC [orderer.common.cluster.step] handleMessage -> DEBU 75b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:50:59.909 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 75c Sending msg of 28 bytes to 3 on channel testchainid took 72.5µs" +orderer0.example.com | "2020-08-31 20:50:59.909 UTC [orderer.common.cluster.step] sendMessage -> DEBU 75d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.8µs " +orderer0.example.com | "2020-08-31 20:51:00.199 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 75e Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +orderer0.example.com | "2020-08-31 20:51:00.199 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 75f Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +orderer0.example.com | "2020-08-31 20:51:00.199 UTC [orderer.common.cluster.step] sendMessage -> DEBU 760 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.9µs " +orderer0.example.com | "2020-08-31 20:51:00.200 UTC [orderer.common.cluster.step] sendMessage -> DEBU 761 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 41.3µs " +orderer0.example.com | "2020-08-31 20:51:00.200 UTC [orderer.common.cluster.step] handleMessage -> DEBU 762 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:00.201 UTC [orderer.common.cluster.step] handleMessage -> DEBU 763 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:00.408 UTC [orderer.common.cluster.step] handleMessage -> DEBU 764 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:00.408 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 765 Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +orderer0.example.com | "2020-08-31 20:51:00.408 UTC [orderer.common.cluster.step] sendMessage -> DEBU 766 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.1µs " +orderer0.example.com | "2020-08-31 20:51:00.699 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 767 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +orderer0.example.com | "2020-08-31 20:51:00.700 UTC [orderer.common.cluster.step] sendMessage -> DEBU 768 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 393.6µs " +orderer0.example.com | "2020-08-31 20:51:00.700 UTC [orderer.common.cluster.step] sendMessage -> DEBU 769 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.8µs " +orderer0.example.com | "2020-08-31 20:51:00.701 UTC [orderer.common.cluster.step] handleMessage -> DEBU 76a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:00.702 UTC [orderer.common.cluster.step] handleMessage -> DEBU 76b Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:00.700 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 76c Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +orderer0.example.com | "2020-08-31 20:51:00.752 UTC [orderer.common.server] Deliver -> DEBU 76d Starting new Deliver handler" +orderer0.example.com | "2020-08-31 20:51:00.752 UTC [common.deliver] Handle -> DEBU 76e Starting new deliver loop for 172.18.0.9:50750" +orderer0.example.com | "2020-08-31 20:51:00.752 UTC [common.deliver] Handle -> DEBU 76f Attempting to read seek info message from 172.18.0.9:50750" +orderer0.example.com | "2020-08-31 20:51:00.770 UTC [orderer.common.server] Broadcast -> DEBU 770 Starting new Broadcast handler" +orderer0.example.com | "2020-08-31 20:51:00.770 UTC [orderer.common.broadcast] Handle -> DEBU 771 Starting new broadcast loop for 172.18.0.9:50752" +orderer0.example.com | "2020-08-31 20:51:00.770 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 772 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:50752" +orderer0.example.com | "2020-08-31 20:51:00.770 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 773 Processing config update message for exisitng channel businesschannel" +orderer0.example.com | "2020-08-31 20:51:00.771 UTC [policies] Evaluate -> DEBU 774 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-08-31 20:51:00.771 UTC [policies] Evaluate -> DEBU 775 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:51:00.771 UTC [policies] Evaluate -> DEBU 776 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2020-08-31 20:51:00.771 UTC [policies] Evaluate -> DEBU 777 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:51:00.771 UTC [policies] Evaluate -> DEBU 778 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2020-08-31 20:51:00.771 UTC [cauthdsl] func1 -> DEBU 779 0xc000d6dcf0 gate 1598907060771461500 evaluation starts" +orderer0.example.com | "2020-08-31 20:51:00.771 UTC [cauthdsl] func2 -> DEBU 77a 0xc000d6dcf0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:51:00.771 UTC [cauthdsl] func2 -> DEBU 77b 0xc000d6dcf0 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:51:00.771 UTC [cauthdsl] func2 -> DEBU 77c 0xc000d6dcf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +orderer0.example.com | "2020-08-31 20:51:00.772 UTC [cauthdsl] func2 -> DEBU 77d 0xc000d6dcf0 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:51:00.772 UTC [cauthdsl] func1 -> DEBU 77e 0xc000d6dcf0 gate 1598907060771461500 evaluation fails" +orderer0.example.com | "2020-08-31 20:51:00.772 UTC [policies] Evaluate -> DEBU 77f Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-08-31 20:51:00.772 UTC [policies] Evaluate -> DEBU 780 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-08-31 20:51:00.772 UTC [policies] func1 -> DEBU 781 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2020-08-31 20:51:00.772 UTC [policies] Evaluate -> DEBU 782 Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-08-31 20:51:00.772 UTC [policies] Evaluate -> DEBU 783 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-08-31 20:51:00.772 UTC [policies] Evaluate -> DEBU 784 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2020-08-31 20:51:00.772 UTC [policies] Evaluate -> DEBU 785 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:51:00.773 UTC [policies] Evaluate -> DEBU 786 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +orderer0.example.com | "2020-08-31 20:51:00.773 UTC [cauthdsl] func1 -> DEBU 787 0xc000d429e0 gate 1598907060773172600 evaluation starts" +orderer0.example.com | "2020-08-31 20:51:00.773 UTC [cauthdsl] func2 -> DEBU 788 0xc000d429e0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:51:00.773 UTC [cauthdsl] func2 -> DEBU 789 0xc000d429e0 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:51:00.773 UTC [cauthdsl] func2 -> DEBU 78a 0xc000d429e0 principal matched by identity 0" +orderer0.example.com | "2020-08-31 20:51:00.773 UTC [msp.identity] Verify -> DEBU 78b Verify: digest = 00000000 c2 9a 53 de cf 67 f1 04 05 0d ab ca 93 9b 27 4c |..S..g........'L| +orderer0.example.com | 00000010 dc 47 52 8b 97 67 45 4b 59 f3 df 86 cd 13 c0 a3 |.GR..gEKY.......|" +orderer0.example.com | "2020-08-31 20:51:00.773 UTC [msp.identity] Verify -> DEBU 78c Verify: sig = 00000000 30 45 02 21 00 90 db 28 2b d6 45 48 84 10 6b 82 |0E.!...(+.EH..k.| +orderer0.example.com | 00000010 4f 41 c2 76 49 bc 6d c6 b7 94 67 f2 3b 9b 89 73 |OA.vI.m...g.;..s| +orderer0.example.com | 00000020 aa e4 bd c7 83 02 20 3c 65 c3 9d f6 09 6e 5d f9 |...... ..&..?|" +orderer0.example.com | "2020-08-31 20:51:00.774 UTC [cauthdsl] func2 -> DEBU 78d 0xc000d429e0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-08-31 20:51:00.774 UTC [cauthdsl] func1 -> DEBU 78e 0xc000d429e0 gate 1598907060773172600 evaluation succeeds" +orderer0.example.com | "2020-08-31 20:51:00.774 UTC [policies] Evaluate -> DEBU 78f Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-08-31 20:51:00.774 UTC [policies] Evaluate -> DEBU 790 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-08-31 20:51:00.774 UTC [policies] Evaluate -> DEBU 791 Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2020-08-31 20:51:00.774 UTC [policies] Evaluate -> DEBU 792 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2020-08-31 20:51:00.774 UTC [policies] Evaluate -> DEBU 793 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-08-31 20:51:00.774 UTC [policies] Evaluate -> DEBU 794 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-08-31 20:51:00.775 UTC [common.configtx] addToMap -> DEBU 795 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-08-31 20:51:00.775 UTC [common.configtx] addToMap -> DEBU 796 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.775 UTC [common.configtx] addToMap -> DEBU 797 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.775 UTC [common.configtx] addToMap -> DEBU 798 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-08-31 20:51:00.775 UTC [common.configtx] addToMap -> DEBU 799 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:51:00.775 UTC [common.configtx] addToMap -> DEBU 79a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-08-31 20:51:00.775 UTC [common.configtx] addToMap -> DEBU 79b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:51:00.775 UTC [common.configtx] addToMap -> DEBU 79c Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-08-31 20:51:00.776 UTC [common.configtx] addToMap -> DEBU 79d Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.776 UTC [common.configtx] addToMap -> DEBU 79e Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.776 UTC [common.configtx] addToMap -> DEBU 79f Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-08-31 20:51:00.776 UTC [common.configtx] addToMap -> DEBU 7a0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-08-31 20:51:00.776 UTC [common.configtx] addToMap -> DEBU 7a1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:51:00.776 UTC [common.configtx] addToMap -> DEBU 7a2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:51:00.776 UTC [common.configtx] addToMap -> DEBU 7a3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [common.configtx] verifyDeltaSet -> DEBU 7a4 Processing change to key: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [common.configtx] policyForItem -> DEBU 7a5 Getting policy for item Org1MSP with mod_policy Admins" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7a6 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7a7 Manager Channel has managers Orderer" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7a8 Manager Channel has managers Application" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7a9 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7aa Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7ab Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7ac Manager Channel/Application looking up path [Org1MSP]" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7ad Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7ae Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7af Manager Channel/Application/Org1MSP looking up path []" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [policies] Evaluate -> DEBU 7b0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [cauthdsl] func1 -> DEBU 7b1 0xc000d2d570 gate 1598907060777544800 evaluation starts" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [cauthdsl] func2 -> DEBU 7b2 0xc000d2d570 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [cauthdsl] func2 -> DEBU 7b3 0xc000d2d570 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 7b4 Checking if identity has been named explicitly as an admin for Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 7b5 Checking if identity carries the admin ou for Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.777 UTC [msp] Validate -> DEBU 7b6 MSP Org1MSP validating identity" +orderer0.example.com | "2020-08-31 20:51:00.779 UTC [msp] getCertificationChain -> DEBU 7b7 MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-08-31 20:51:00.779 UTC [msp] hasOURole -> DEBU 7b8 MSP Org1MSP checking if the identity is a client" +orderer0.example.com | "2020-08-31 20:51:00.779 UTC [msp] getCertificationChain -> DEBU 7b9 MSP Org1MSP getting certification chain" +orderer0.example.com | "2020-08-31 20:51:00.780 UTC [cauthdsl] func2 -> DEBU 7ba 0xc000d2d570 principal matched by identity 0" +orderer0.example.com | "2020-08-31 20:51:00.780 UTC [msp.identity] Verify -> DEBU 7bb Verify: digest = 00000000 0a 6a 5e 90 37 00 25 29 cc 2f 3d ec 44 8f 23 98 |.j^.7.%)./=.D.#.| +orderer0.example.com | 00000010 40 21 8f 78 1d c2 88 4f 31 16 8b 9b 25 00 fb 20 |@!.x...O1...%.. |" +orderer0.example.com | "2020-08-31 20:51:00.780 UTC [msp.identity] Verify -> DEBU 7bc Verify: sig = 00000000 30 44 02 20 0d d5 10 d0 47 15 e1 14 bb 9f dc b9 |0D. ....G.......| +orderer0.example.com | 00000010 21 20 fe 43 aa a5 85 eb 20 91 d3 d3 25 c3 40 6f |! .C.... ...%.@o| +orderer0.example.com | 00000020 be ec 7e 52 02 20 3f 97 e3 ab d5 5a 98 c6 78 08 |..~R. ?....Z..x.| +orderer0.example.com | 00000030 e3 1a 1c 9b 18 c4 79 e9 08 26 b7 2a 98 01 0e 55 |......y..&.*...U| +orderer0.example.com | 00000040 0c af 35 37 61 76 |..57av|" +orderer0.example.com | "2020-08-31 20:51:00.780 UTC [cauthdsl] func2 -> DEBU 7bd 0xc000d2d570 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-08-31 20:51:00.780 UTC [cauthdsl] func1 -> DEBU 7be 0xc000d2d570 gate 1598907060777544800 evaluation succeeds" +orderer0.example.com | "2020-08-31 20:51:00.780 UTC [policies] Evaluate -> DEBU 7bf Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:51:00.780 UTC [policies] Evaluate -> DEBU 7c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:51:00.781 UTC [common.configtx] verifyDeltaSet -> DEBU 7c1 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-08-31 20:51:00.781 UTC [common.configtx] recurseConfigMap -> DEBU 7c2 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org2.example.com | [6f9 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [6fa 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161012 +peer0.org2.example.com | [6fb 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6106FEF8DBB4D77F1B2ACED8A83A1E5E3AFA9874015A87275FA8E4A0847BB7EC +peer0.org2.example.com | [6fc 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [6fd 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [6fe 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [6ff 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [700 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [701 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:9094981273582956271 tag:EMPTY mem_req:\322\327\217\322\373\014SX+\002 `\022\355\361\274\256\226\021\311\312\037\325\240\003\257\374\235\177T\356\007S\276\210\th^\367\322\010\317\366" > > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [702 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:9094981273582956271 tag:EMPTY mem_req:\322\327\217\322\373\014SX+\002 `\022\355\361\274\256\226\021\311\312\037\325\240\003\257\374\235\177T\356\007S\276\210\th^\367\322\010\317\366" > > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org2.example.com | [703 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [704 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer0.org2.example.com | [705 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org2.example.com | [706 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org2.example.com | [707 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org2.example.com | [708 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org2.example.com | [709 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org2.example.com | [70a 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003610380 env 0xc003594f00 txn 0 +peer0.org2.example.com | [70b 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [70c 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 102ms +peer0.org2.example.com | [70d 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [70e 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [70f 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org2.example.com | [710 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +peer0.org2.example.com | [711 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [712 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [713 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [714 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +peer0.org2.example.com | [715 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [716 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org2.example.com | [717 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org2.example.com | [718 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org2.example.com | [719 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [71a 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org2.example.com | [71b 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org2.example.com | [615 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [616 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [617 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [618 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:4556179005521168221 tag:EMPTY mem_req: > > , Envelope: 281 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [619 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:4556179005521168221 tag:EMPTY mem_req: > > , Envelope: 281 bytes, Signature: 0 bytes +peer1.org2.example.com | [61a 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [61b 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [61c 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [61d 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org2.example.com | [61e 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [61f 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00382f380, CONNECTING +peer1.org2.example.com | [606 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +peer1.org2.example.com | [620 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [621 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [622 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [623 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [624 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [627 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [628 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037dd040 gate 1598907064701901100 evaluation starts +peer1.org2.example.com | [629 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037dd040 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [62a 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037dd040 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [62b 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037dd040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [62c 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037dd040 principal evaluation fails +peer1.org2.example.com | [62d 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037dd040 gate 1598907064701901100 evaluation fails +peer1.org2.example.com | [62e 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [62f 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [630 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [631 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037dd5d0 gate 1598907064702853800 evaluation starts +orderer0.example.com | "2020-08-31 20:51:00.781 UTC [common.configtx] recurseConfigMap -> DEBU 7c3 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.781 UTC [common.configtx] recurseConfigMap -> DEBU 7c4 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.781 UTC [common.configtx] recurseConfigMap -> DEBU 7c5 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.781 UTC [common.configtx] recurseConfigMap -> DEBU 7c6 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.781 UTC [common.configtx] recurseConfigMap -> DEBU 7c7 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.781 UTC [common.configtx] recurseConfigMap -> DEBU 7c8 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7c9 Setting policy for key Admins to " +orderer0.example.com | "2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7ca Setting policy for key Readers to " +orderer0.example.com | "2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7cb Setting policy for key Writers to " +orderer0.example.com | "2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7cc Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7cd Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7ce Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7cf Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7d0 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7d1 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7d2 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7d3 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7d4 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7d5 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.783 UTC [common.configtx] recurseConfigMap -> DEBU 7d6 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.783 UTC [common.configtx] recurseConfigMap -> DEBU 7d7 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.783 UTC [common.channelconfig] NewStandardValues -> DEBU 7d8 Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-08-31 20:51:00.783 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d9 Processing field: HashingAlgorithm" +orderer0.example.com | "2020-08-31 20:51:00.783 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7da Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-08-31 20:51:00.783 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7db Processing field: OrdererAddresses" +orderer0.example.com | "2020-08-31 20:51:00.783 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7dc Processing field: Consortium" +orderer0.example.com | "2020-08-31 20:51:00.783 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7dd Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:51:00.783 UTC [common.channelconfig] NewStandardValues -> DEBU 7de Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-08-31 20:51:00.783 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7df Processing field: ConsensusType" +orderer0.example.com | "2020-08-31 20:51:00.783 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e0 Processing field: BatchSize" +orderer0.example.com | "2020-08-31 20:51:00.784 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e1 Processing field: BatchTimeout" +orderer0.example.com | "2020-08-31 20:51:00.784 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e2 Processing field: KafkaBrokers" +orderer0.example.com | "2020-08-31 20:51:00.784 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e3 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-08-31 20:51:00.784 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e4 Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:51:00.784 UTC [common.channelconfig] NewStandardValues -> DEBU 7e5 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-08-31 20:51:00.785 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e6 Processing field: Endpoints" +orderer0.example.com | "2020-08-31 20:51:00.785 UTC [common.channelconfig] NewStandardValues -> DEBU 7e7 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:51:00.785 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e8 Processing field: MSP" +orderer0.example.com | "2020-08-31 20:51:00.785 UTC [common.channelconfig] validateMSP -> DEBU 7e9 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-08-31 20:51:00.785 UTC [msp] newBccspMsp -> DEBU 7ea Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:51:00.786 UTC [msp] New -> DEBU 7eb Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:51:00.786 UTC [msp] Setup -> DEBU 7ec Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-08-31 20:51:00.787 UTC [msp.identity] newIdentity -> DEBU 7ed Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org1.example.com | [6d3 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [6d4 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [6d5 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org1.example.com | [6d6 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org1.example.com | [6d7 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org1.example.com | [6d8 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org1.example.com | [6d9 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [6da 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [6db 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org1.example.com | [6dc 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org1.example.com | [6dd 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org1.example.com | [6de 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org1.example.com | [6df 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org1.example.com | [6e0 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org1.example.com | [6e1 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org1.example.com | [6e2 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org1.example.com | [6e3 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org1.example.com | [6e4 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org1.example.com | [6e5 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org1.example.com | [6e6 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org1.example.com | [6e7 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [577 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org1.example.com | [578 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org1.example.com | [579 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0031c0000 env 0xc000252000 txn 0 +peer0.org1.example.com | [57a 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [57b 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 67ms +peer0.org1.example.com | [57c 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [57d 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [57e 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org1.example.com | [57f 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +peer0.org1.example.com | [580 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [581 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [582 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [583 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +peer0.org1.example.com | [584 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [585 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | [586 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org1.example.com | [587 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:51:00.787 UTC [common.channelconfig] NewStandardValues -> DEBU 7ee Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-08-31 20:51:00.788 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ef Processing field: ACLs" +orderer0.example.com | "2020-08-31 20:51:00.788 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f0 Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:51:00.788 UTC [common.channelconfig] NewStandardValues -> DEBU 7f1 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-08-31 20:51:00.789 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f2 Processing field: AnchorPeers" +orderer0.example.com | "2020-08-31 20:51:00.789 UTC [common.channelconfig] NewStandardValues -> DEBU 7f3 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:51:00.789 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f4 Processing field: MSP" +orderer0.example.com | "2020-08-31 20:51:00.790 UTC [common.channelconfig] Validate -> DEBU 7f5 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-08-31 20:51:00.790 UTC [common.channelconfig] validateMSP -> DEBU 7f6 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.790 UTC [msp] newBccspMsp -> DEBU 7f7 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:51:00.791 UTC [msp] New -> DEBU 7f8 Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:51:00.791 UTC [msp] Setup -> DEBU 7f9 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.792 UTC [msp.identity] newIdentity -> DEBU 7fa Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:51:00.793 UTC [common.channelconfig] NewStandardValues -> DEBU 7fb Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-08-31 20:51:00.793 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7fc Processing field: AnchorPeers" +orderer0.example.com | "2020-08-31 20:51:00.793 UTC [common.channelconfig] NewStandardValues -> DEBU 7fd Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:51:00.793 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7fe Processing field: MSP" +orderer0.example.com | "2020-08-31 20:51:00.793 UTC [common.channelconfig] Validate -> DEBU 7ff Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-08-31 20:51:00.793 UTC [common.channelconfig] validateMSP -> DEBU 800 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.794 UTC [msp] newBccspMsp -> DEBU 801 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:51:00.794 UTC [msp] New -> DEBU 802 Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:51:00.794 UTC [msp] Setup -> DEBU 803 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.795 UTC [msp.identity] newIdentity -> DEBU 804 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:51:00.796 UTC [msp] Setup -> DEBU 805 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-08-31 20:51:00.796 UTC [msp] Setup -> DEBU 806 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 807 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 808 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 809 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 80a Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 80b Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 80c Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 80d Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 80e Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 80f Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 810 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 811 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 812 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 813 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.797 UTC [policies] NewManagerImpl -> DEBU 814 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.797 UTC [policies] NewManagerImpl -> DEBU 815 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.797 UTC [policies] GetPolicy -> DEBU 816 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:51:00.797 UTC [policies] NewManagerImpl -> DEBU 817 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.798 UTC [policies] GetPolicy -> DEBU 818 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:51:00.798 UTC [policies] NewManagerImpl -> DEBU 819 Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | [588 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [589 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org1.example.com | [58a 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org2.example.com | [632 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037dd5d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [633 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037dd5d0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [634 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [635 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [636 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [637 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037dd5d0 principal matched by identity 0 +peer1.org2.example.com | [638 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org2.example.com | [639 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 35 0a 5c d4 60 f6 29 a1 d9 ae |0E.!..5.\.`.)...| +peer1.org2.example.com | 00000010 cf c3 61 57 59 35 84 16 2e 82 76 da d0 d4 6e 82 |..aWY5....v...n.| +peer1.org2.example.com | 00000020 e8 06 ea 22 5f 02 20 1c 24 9d 10 47 0b ec 7c 3f |..."_. .$..G..|?| +peer1.org2.example.com | 00000030 5f f7 57 60 90 31 9f f6 2c 78 a5 92 8d 5b 4c 01 |_.W`.1..,x...[L.| +peer1.org2.example.com | 00000040 47 41 b7 00 58 a2 14 |GA..X..| +peer1.org2.example.com | [63a 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037dd5d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [63b 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037dd5d0 gate 1598907064702853800 evaluation succeeds +peer1.org2.example.com | [63c 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [63d 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [63e 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [63f 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [640 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org2.example.com | [641 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [642 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [643 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161014 +peer1.org2.example.com | [644 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9966FD9CC9B8D932A52B551B0E4B55EEAE7542516DFFAD4DF6EA73A81999E89E +peer1.org2.example.com | [645 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [646 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [647 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [648 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [649 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:14031637786944006989 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [64a 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:14031637786944006989 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer1.org2.example.com | [64b 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [64c 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c isn't responsive: EOF +peer1.org2.example.com | [625 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [626 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0x22, 0x1, 0xdc, 0x78, 0x27, 0xf2, 0x2d, 0xc3, 0x61, 0xf7, 0x88, 0xbc, 0x3b, 0x31, 0x2f, 0x16, 0xf3, 0xa9, 0x7a, 0x3d, 0x6c, 0xaa, 0xbe, 0x10, 0x69, 0xd3, 0x9f, 0xc0, 0xb5, 0xb6, 0x7a, 0xbf} txOffsets= +peer1.org2.example.com | txId=ed7b76e084105979adee38a130a3cf311c0f2d9b0dc1c2dda158f0d55a15426c locPointer=offset=71, bytesLength=27141 +peer1.org2.example.com | ] +peer1.org2.example.com | [64d 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56750, bytesLength=27141] for tx ID: [ed7b76e084105979adee38a130a3cf311c0f2d9b0dc1c2dda158f0d55a15426c] to txid-index +peer1.org2.example.com | [64e 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56750, bytesLength=27141] for tx number:[0] ID: [ed7b76e084105979adee38a130a3cf311c0f2d9b0dc1c2dda158f0d55a15426c] to blockNumTranNum index +peer1.org2.example.com | [64f 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00382f380, READY +peer1.org2.example.com | [650 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84888], isChainEmpty=[false], lastBlockNumber=[2] +peer1.org2.example.com | [651 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +peer1.org2.example.com | [652 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +peer1.org2.example.com | [653 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +peer1.org2.example.com | [654 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [655 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [656 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [657 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [658 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org2.example.com | [659 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [65b 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org1.example.com | [6e8 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [6e9 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [6ea 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [6eb 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [6ec 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [6ed 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [6ee 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [6ef 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004df970 gate 1598907064100366700 evaluation starts +peer1.org1.example.com | [6f0 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004df970 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [6f1 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004df970 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [6f2 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004df970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [6f3 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004df970 principal evaluation fails +peer1.org1.example.com | [6f4 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004df970 gate 1598907064100366700 evaluation fails +peer1.org1.example.com | [6f5 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [6f6 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [6f7 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [6f8 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003867f0 gate 1598907064101864200 evaluation starts +peer1.org1.example.com | [6f9 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003867f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [6fa 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003867f0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [6fb 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [6fc 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [6fd 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [6fe 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003867f0 principal matched by identity 0 +peer1.org1.example.com | [6ff 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d db f7 30 28 f3 51 bd 6a 24 0c 99 96 70 b2 03 |}..0(.Q.j$...p..| +peer1.org1.example.com | 00000010 e2 6b 44 ef 08 fc f0 fd 1c 63 d8 d3 dd e8 c1 11 |.kD......c......| +peer1.org1.example.com | [700 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 68 c4 26 6f 7b 21 ed a9 a5 3f 84 a8 |0C. h.&o{!...?..| +peer1.org1.example.com | 00000010 b1 40 99 63 b5 07 70 86 b7 94 7b d1 f4 fc db 60 |.@.c..p...{....`| +peer1.org1.example.com | 00000020 a2 47 34 74 02 1f 07 d1 39 67 f0 4d d1 ef fd 7a |.G4t....9g.M...z| +peer1.org1.example.com | 00000030 e2 38 7c ac 12 5e 64 36 2f e3 b0 37 8c cb da 35 |.8|..^d6/..7...5| +peer1.org1.example.com | 00000040 bf eb 50 e7 b3 |..P..| +peer1.org1.example.com | [701 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003867f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [702 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003867f0 gate 1598907064101864200 evaluation succeeds +peer1.org1.example.com | [703 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [704 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [705 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [706 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [707 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer1.org1.example.com | [708 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +peer1.org1.example.com | [709 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [70a 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [70c 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer1.org1.example.com | [70b 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +orderer0.example.com | "2020-08-31 20:51:00.798 UTC [policies] NewManagerImpl -> DEBU 81a Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.798 UTC [policies] NewManagerImpl -> DEBU 81b Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.798 UTC [policies] NewManagerImpl -> DEBU 81c Proposed new policy Writers for Channel" +orderer0.example.com | "2020-08-31 20:51:00.798 UTC [policies] NewManagerImpl -> DEBU 81d Proposed new policy Admins for Channel" +orderer0.example.com | "2020-08-31 20:51:00.799 UTC [policies] NewManagerImpl -> DEBU 81e Proposed new policy Readers for Channel" +orderer0.example.com | "2020-08-31 20:51:00.799 UTC [common.configtx] addToMap -> DEBU 81f Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-08-31 20:51:00.800 UTC [common.configtx] addToMap -> DEBU 820 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-08-31 20:51:00.800 UTC [common.configtx] addToMap -> DEBU 821 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:51:00.800 UTC [common.configtx] addToMap -> DEBU 822 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 823 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 824 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 825 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 826 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 827 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 828 Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 829 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 82a Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 82b Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 82c Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 82d Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 82e Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 82f Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 830 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 831 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 832 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 833 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 834 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-08-31 20:51:00.802 UTC [common.configtx] addToMap -> DEBU 835 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:51:00.802 UTC [common.configtx] addToMap -> DEBU 836 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.802 UTC [common.configtx] addToMap -> DEBU 837 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-08-31 20:51:00.802 UTC [common.configtx] addToMap -> DEBU 838 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:51:00.802 UTC [common.configtx] addToMap -> DEBU 839 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 83a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 83b Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 83c Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 83d Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 83e Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 83f Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 840 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 841 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 842 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 843 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-08-31 20:51:00.804 UTC [common.configtx] addToMap -> DEBU 844 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-08-31 20:51:00.804 UTC [common.configtx] addToMap -> DEBU 845 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-08-31 20:51:00.804 UTC [common.configtx] addToMap -> DEBU 846 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-08-31 20:51:00.804 UTC [common.configtx] addToMap -> DEBU 847 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-08-31 20:51:00.804 UTC [common.configtx] addToMap -> DEBU 848 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-08-31 20:51:00.804 UTC [common.configtx] addToMap -> DEBU 849 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-08-31 20:51:00.804 UTC [common.configtx] addToMap -> DEBU 84a Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-08-31 20:51:00.804 UTC [common.channelconfig] LogSanityChecks -> DEBU 84b As expected, current configuration has policy '/Channel/Readers'" +peer1.org2.example.com | [65d 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [65f 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.6:7051 +peer1.org2.example.com | [65a 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [65c 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> WARN Entering [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] +peer1.org2.example.com | [660 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: +peer1.org2.example.com | [65e 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [661 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:7051 +peer1.org2.example.com | [662 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer1.org2.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer1.org2.example.com | [663 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 5a 23 25 d5 b2 0a 54 ff 75 7a 02 |0D. zZ#%...T.uz.| +peer1.org2.example.com | 00000010 2e 7d 88 82 2a 6f a7 9a 36 0f 0b c3 da dc bc d3 |.}..*o..6.......| +peer1.org2.example.com | 00000020 fa 07 a9 07 02 20 1b 10 71 9e 39 fd a7 a9 e4 d9 |..... ..q.9.....| +peer1.org2.example.com | 00000030 09 93 f9 6b f5 fd b3 14 82 22 63 95 eb 99 59 2b |...k....."c...Y+| +peer1.org2.example.com | 00000040 e4 77 f9 73 1f fe |.w.s..| +peer1.org2.example.com | [664 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer1.org2.example.com | [665 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [666 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [667 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [668 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [669 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +peer1.org2.example.com | [66a 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +peer1.org2.example.com | [66b 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +peer1.org2.example.com | [66c 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [66d 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +peer1.org2.example.com | [66f 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +peer1.org2.example.com | [66e 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [671 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer1.org2.example.com | [670 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org2.example.com | [672 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 4556179005521168221, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes +peer1.org2.example.com | [673 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 4556179005521168221, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes +peer1.org2.example.com | [674 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [675 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 4556179005521168221, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes +peer1.org2.example.com | [676 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [677 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 b2 d6 53 61 92 32 ed 71 27 8d 92 dc 74 24 72 |...Sa.2.q'...t$r| +peer1.org2.example.com | 00000010 37 05 e7 f9 cf 20 ec c3 85 06 f3 1d e1 6f 30 39 |7.... .......o09| +peer1.org2.example.com | [678 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e 78 bb 73 fd ed f9 c3 e3 21 49 5f |0D. ~x.s.....!I_| +peer1.org2.example.com | 00000010 79 c3 0f 84 86 3c 57 03 b0 77 17 8b b6 65 1c 01 |y.... DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [70e 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org1.example.com | [70f 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [710 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0004c57c0, CONNECTING +peer1.org1.example.com | [711 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer1.org1.example.com | [712 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [713 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer1.org1.example.com | [714 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer1.org1.example.com | [715 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org1.example.com | [716 08-31 20:51:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [679 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [67a 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 88 bd 34 24 d2 a7 88 05 39 c4 |0E.!....4$....9.| +peer1.org2.example.com | 00000010 fe c4 16 21 03 4e c2 57 6c 48 54 d5 95 16 e0 fe |...!.N.WlHT.....| +peer1.org2.example.com | 00000020 f3 3f 2c 15 18 02 20 59 de e7 2c e3 a1 dc 1b 31 |.?,... Y..,....1| +peer1.org2.example.com | 00000030 df 4b e1 ba c9 3a 73 59 17 bf 10 2b 41 59 7a 1f |.K...:sY...+AYz.| +peer1.org2.example.com | 00000040 48 52 eb 66 fa 66 5b |HR.f.f[| +peer1.org2.example.com | [67b 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [67c 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [67d 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [67e 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [67f 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 2e e4 89 b9 81 19 76 dd 41 80 da 2a 67 84 fd |P......v.A..*g..| +peer1.org2.example.com | 00000010 7e c3 3c 00 ef f3 d8 ed 6d 02 28 46 35 82 fd 01 |~.<.....m.(F5...| +peer1.org2.example.com | [680 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b fb ec 1e 5e bd 7f 28 24 c1 31 1b |0D. ....^..($.1.| +peer1.org2.example.com | 00000010 b0 dc 4e 24 33 24 b0 45 76 af c2 2c 01 63 b7 54 |..N$3$.Ev..,.c.T| +peer1.org2.example.com | 00000020 5a 5f 5f 8e 02 20 2f c2 21 e4 eb 53 8d 07 f4 56 |Z__.. /.!..S...V| +peer1.org2.example.com | 00000030 fd 6e 90 22 e6 3d c9 ad ac 93 63 33 33 f1 20 2e |.n.".=....c33. .| +peer1.org2.example.com | 00000040 f5 29 06 76 35 7b |.).v5{| +peer1.org2.example.com | [681 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [682 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 e8 d7 93 43 15 24 63 69 43 ca 6d |0D. %...C.$ciC.m| +peer1.org2.example.com | 00000010 09 3c 53 53 9d 8b 7b 3b 9a 4e ba 40 f8 8e 79 9a |. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [684 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]}, deadMembers={[]} +peer1.org2.example.com | [685 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [686 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [687 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [688 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [689 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +peer1.org2.example.com | [68a 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 52ms (state_validation=2ms block_and_pvtdata_commit=29ms state_commit=10ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +peer1.org2.example.com | [68b 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [68c 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408B8BB829CF9AF9D9816...A55D1049CA35F5343DC503CE2A020803 +peer1.org2.example.com | [68d 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B50677C37B1DAC82D70E67E7C2EACD610ABD34874B733F87ED4A64B0E14CDE33 +peer1.org2.example.com | [68e 08-31 20:51:04.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +peer1.org2.example.com | [68f 08-31 20:51:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [690 08-31 20:51:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [691 08-31 20:51:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [692 08-31 20:51:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [693 08-31 20:51:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [694 08-31 20:51:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161015 +peer1.org2.example.com | [695 08-31 20:51:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [696 08-31 20:51:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E64A5023F4A467B477DFA46544C68639EAB602BB01EB36DB28B6F550970C242C +peer1.org2.example.com | [697 08-31 20:51:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:00.804 UTC [common.channelconfig] LogSanityChecks -> DEBU 84c As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2020-08-31 20:51:00.804 UTC [policies] Manager -> DEBU 84d Manager Channel looking up path [Application]" +orderer0.example.com | "2020-08-31 20:51:00.804 UTC [policies] Manager -> DEBU 84e Manager Channel has managers Orderer" +orderer0.example.com | "2020-08-31 20:51:00.804 UTC [policies] Manager -> DEBU 84f Manager Channel has managers Application" +orderer0.example.com | "2020-08-31 20:51:00.804 UTC [policies] Manager -> DEBU 850 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-08-31 20:51:00.805 UTC [policies] Manager -> DEBU 851 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.805 UTC [policies] Manager -> DEBU 852 Manager Channel/Application has managers Org1MSP" +peer0.org2.example.com | [71c 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org2.example.com | [71d 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org2.example.com | [71e 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org2.example.com | [71f 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +peer0.org2.example.com | [720 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00394c6c0)} +peer0.org2.example.com | [721 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [722 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [723 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [724 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +peer0.org2.example.com | [725 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +peer0.org2.example.com | [726 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +peer0.org2.example.com | [727 08-31 20:51:04.48 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +peer0.org2.example.com | [728 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0x22, 0x1, 0xdc, 0x78, 0x27, 0xf2, 0x2d, 0xc3, 0x61, 0xf7, 0x88, 0xbc, 0x3b, 0x31, 0x2f, 0x16, 0xf3, 0xa9, 0x7a, 0x3d, 0x6c, 0xaa, 0xbe, 0x10, 0x69, 0xd3, 0x9f, 0xc0, 0xb5, 0xb6, 0x7a, 0xbf} txOffsets= +peer0.org2.example.com | txId=ed7b76e084105979adee38a130a3cf311c0f2d9b0dc1c2dda158f0d55a15426c locPointer=offset=71, bytesLength=27141 +peer0.org2.example.com | ] +peer0.org2.example.com | [729 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56750, bytesLength=27141] for tx ID: [ed7b76e084105979adee38a130a3cf311c0f2d9b0dc1c2dda158f0d55a15426c] to txid-index +peer0.org2.example.com | [72a 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56750, bytesLength=27141] for tx number:[0] ID: [ed7b76e084105979adee38a130a3cf311c0f2d9b0dc1c2dda158f0d55a15426c] to blockNumTranNum index +peer0.org2.example.com | [72b 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84887], isChainEmpty=[false], lastBlockNumber=[2] +peer0.org2.example.com | [72c 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +peer1.org1.example.com | [717 08-31 20:51:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [718 08-31 20:51:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [719 08-31 20:51:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [71a 08-31 20:51:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025871a0, CONNECTING +peer1.org1.example.com | [71b 08-31 20:51:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0004c57c0, READY +peer1.org1.example.com | [71c 08-31 20:51:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [71d 08-31 20:51:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [71e 08-31 20:51:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [71f 08-31 20:51:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:7051 +peer1.org1.example.com | [720 08-31 20:51:04.11 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025871a0, READY +peer1.org1.example.com | [721 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:7051 +peer1.org1.example.com | [722 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [723 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [724 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer1.org1.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer1.org1.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer1.org1.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [725 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [726 08-31 20:51:04.12 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [727 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [728 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [729 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [72a 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org2.example.com | [699 08-31 20:51:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [69a 08-31 20:51:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [698 08-31 20:51:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [69b 08-31 20:51:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [69c 08-31 20:51:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [69d 08-31 20:51:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [69e 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org2.example.com | [69f 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [6a0 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6a1 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [6a2 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161016 +peer1.org2.example.com | [6a3 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2AE170713BF2E37BAE26BB0FCE2D395EB20038E70D727885568519EF2892458F +peer1.org2.example.com | [6a4 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [6a5 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [6a6 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [6a7 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\n\340\220:Q\254\275-7QQc^\251\307!\264\214\\\025\346\\\n\351\304:\343\253\327\002 \021\310i\235_?D\223\370(>U\025z>\010\201\346g\327N\266\177[\247P\212Z\262UJ\275" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [6a8 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\n\340\220:Q\254\275-7QQc^\251\307!\264\214\\\025\346\\\n\351\304:\343\253\327\002 \021\310i\235_?D\223\370(>U\025z>\010\201\346g\327N\266\177[\247P\212Z\262UJ\275" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [6a9 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6aa 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes +peer1.org2.example.com | [6ab 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes +peer1.org2.example.com | [6ac 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6ad 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes +peer1.org2.example.com | [6ae 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [6af 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a e1 70 71 3b f2 e3 7b ae 26 bb 0f ce 2d 39 5e |*.pq;..{.&...-9^| +peer1.org2.example.com | 00000010 b2 00 38 e7 0d 72 78 85 56 85 19 ef 28 92 45 8f |..8..rx.V...(.E.| +peer1.org2.example.com | [6b0 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 2c 3e 0a e0 90 3a 51 ac bd 2d 37 |0D. ),>...:Q..-7| +peer1.org2.example.com | 00000010 51 51 63 5e a9 c7 21 b4 8c 5c 15 e6 5c 0a e9 c4 |QQc^..!..\..\...| +peer1.org2.example.com | 00000020 3a e3 ab d7 02 20 11 c8 69 9d 5f 3f 44 93 f8 28 |:.... ..i._?D..(| +peer1.org2.example.com | 00000030 3e 55 15 7a 3e 08 81 e6 67 d7 4e b6 7f 5b a7 50 |>U.z>...g.N..[.P| +peer1.org2.example.com | 00000040 8a 5a b2 55 4a bd |.Z.UJ.| +peer1.org2.example.com | [6b1 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [6b2 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 79 0e 93 4a 50 86 0b 32 28 aa d6 |0D. dy..JP..2(..| +peer1.org2.example.com | 00000010 9d a5 5f 88 ea ba 3f 66 02 1c 10 28 47 ae dd 55 |.._...?f...(G..U| +peer1.org2.example.com | 00000020 4d f8 29 5e 02 20 6a 8c 17 40 19 1c 54 be e4 c4 |M.)^. j..@..T...| +peer1.org2.example.com | 00000030 42 3f 72 ef d5 1a 24 84 73 81 d4 f0 8b 14 9e d9 |B?r...$.s.......| +peer1.org2.example.com | 00000040 9c 51 71 67 eb b4 |.Qqg..| +peer1.org2.example.com | [6b3 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [6b4 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [6b5 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6b6 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [6b7 08-31 20:51:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 2e e4 89 b9 81 19 76 dd 41 80 da 2a 67 84 fd |P......v.A..*g..| +peer1.org2.example.com | 00000010 7e c3 3c 00 ef f3 d8 ed 6d 02 28 46 35 82 fd 01 |~.<.....m.(F5...| +peer1.org2.example.com | [6b8 08-31 20:51:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b fb ec 1e 5e bd 7f 28 24 c1 31 1b |0D. ....^..($.1.| +peer1.org2.example.com | 00000010 b0 dc 4e 24 33 24 b0 45 76 af c2 2c 01 63 b7 54 |..N$3$.Ev..,.c.T| +peer1.org2.example.com | 00000020 5a 5f 5f 8e 02 20 2f c2 21 e4 eb 53 8d 07 f4 56 |Z__.. /.!..S...V| +peer1.org2.example.com | 00000030 fd 6e 90 22 e6 3d c9 ad ac 93 63 33 33 f1 20 2e |.n.".=....c33. .| +peer1.org2.example.com | 00000040 f5 29 06 76 35 7b |.).v5{| +peer1.org2.example.com | [6b9 08-31 20:51:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [6ba 08-31 20:51:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 25 e8 d7 93 43 15 24 63 69 43 ca 6d |0D. %...C.$ciC.m| +peer1.org2.example.com | 00000010 09 3c 53 53 9d 8b 7b 3b 9a 4e ba 40 f8 8e 79 9a |. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [6bc 08-31 20:51:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6bd 08-31 20:51:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6be 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [6bf 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [6c0 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6c1 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [6c2 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org2.example.com | [6c3 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6c4 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:07.358Z grpc.peer_address=172.18.0.7:48146 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=111.9µs +peer1.org2.example.com | [6c5 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [6c6 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org2.example.com | [6c7 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org2.example.com | [6c8 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.7:48146 +peer1.org2.example.com | [6c9 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:48146 +peer1.org2.example.com | [6ca 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [72b 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [72c 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer1.org1.example.com | [72d 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [72e 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [72f 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [730 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [731 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [732 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [733 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [734 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [735 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [736 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002618540 gate 1598907064137753300 evaluation starts +peer1.org1.example.com | [737 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002618540 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [738 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002618540 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [739 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org1.example.com | [73a 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [73b 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [73c 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002618540 principal matched by identity 0 +peer1.org1.example.com | [73e 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer1.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer1.org1.example.com | [73d 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org1.example.com | [73f 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 53 aa 0c 48 5e 28 26 09 0f bf |0E.!..S..H^(&...| +peer1.org1.example.com | 00000010 5d 81 f2 e5 62 57 ad 3e ff d6 3f 7d e3 68 9d c5 |]...bW.>..?}.h..| +peer1.org1.example.com | 00000020 fb 1a 9e d7 4b 02 20 7c ed 12 9b 6a 97 7d 6b 50 |....K. |...j.}kP| +peer1.org1.example.com | 00000030 62 04 34 f4 4d 79 c4 1b c5 fa 0e 42 84 e3 da 9b |b.4.My.....B....| +peer1.org1.example.com | 00000040 d5 69 f9 0b ba 89 a7 |.i.....| +peer1.org1.example.com | [740 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002618540 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [741 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002618540 gate 1598907064137753300 evaluation succeeds +peer1.org1.example.com | [742 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [744 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 6f 38 10 7b 31 6e 3e 3f 64 b4 f4 |0D. \o8.{1n>?d..| +peer1.org1.example.com | 00000010 d2 82 d6 92 76 c4 40 02 50 83 16 85 2b 91 fc da |....v.@.P...+...| +peer1.org1.example.com | 00000020 b1 21 76 2f 02 20 6b af 38 ed 60 06 bf 5e a8 44 |.!v/. k.8.`..^.D| +peer1.org1.example.com | 00000030 25 8f c6 07 6a 3a cd 99 0b 84 98 c9 09 42 cd f6 |%...j:.......B..| +peer1.org1.example.com | 00000040 d4 bb b2 33 b2 9b |...3..| +peer1.org1.example.com | [743 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [745 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [746 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [747 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [748 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer1.org1.example.com | [749 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [74a 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [74b 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161014 +peer1.org1.example.com | [74c 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AE80451427442B050495017D8039C319F0A3170DDFAE86A18556DE7C7683DF9C +peer1.org1.example.com | [74d 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [74e 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [74f 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [750 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [751 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:10715564970673300445 tag:EMPTY mem_req:\241" > > , Envelope: 177 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [752 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:10715564970673300445 tag:EMPTY mem_req:\241" > > , Envelope: 177 bytes, Signature: 0 bytes +peer1.org1.example.com | [753 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [754 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org1.example.com | [756 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [757 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161015 +peer1.org1.example.com | [758 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 08A3C6CAC4CC18CE24C31E75A7133D4BB41ABEB9834008C890AD9DA842DE8971 +peer1.org1.example.com | [759 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [75a 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [75b 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [75c 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [75d 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:270579457140118257 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [75e 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:270579457140118257 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes +peer1.org1.example.com | [75f 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [760 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c isn't responsive: EOF +peer1.org1.example.com | [755 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [761 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [762 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org1.example.com | [763 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [764 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [765 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org1.example.com | [766 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org1.example.com | [767 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org1.example.com | [768 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org1.example.com | [769 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025ebd90, CONNECTING +peer1.org1.example.com | [76a 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> WARN Entering [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] +peer1.org1.example.com | [76b 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: +peer1.org1.example.com | [76c 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [76d 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer1.org1.example.com | [76e 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [76f 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org1.example.com | [770 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00008b180 env 0xc000290820 txn 0 +peer1.org1.example.com | [771 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | [772 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 169ms +peer1.org1.example.com | [773 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org1.example.com | [774 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | [775 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org1.example.com | [776 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +peer1.org1.example.com | [777 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [778 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [779 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [77a 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +peer1.org1.example.com | [77b 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [77c 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0025ebd90, READY +peer1.org1.example.com | [77d 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +orderer0.example.com | "2020-08-31 20:51:00.805 UTC [common.channelconfig] LogSanityChecks -> DEBU 853 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2020-08-31 20:51:00.805 UTC [common.channelconfig] LogSanityChecks -> DEBU 854 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2020-08-31 20:51:00.805 UTC [common.channelconfig] LogSanityChecks -> DEBU 855 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2020-08-31 20:51:00.805 UTC [policies] Manager -> DEBU 856 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2020-08-31 20:51:00.805 UTC [policies] Manager -> DEBU 857 Manager Channel has managers Orderer" +orderer0.example.com | "2020-08-31 20:51:00.805 UTC [policies] Manager -> DEBU 858 Manager Channel has managers Application" +orderer0.example.com | "2020-08-31 20:51:00.805 UTC [policies] Manager -> DEBU 859 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2020-08-31 20:51:00.805 UTC [policies] Manager -> DEBU 85a Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2020-08-31 20:51:00.805 UTC [common.channelconfig] LogSanityChecks -> DEBU 85b As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2020-08-31 20:51:00.805 UTC [common.channelconfig] LogSanityChecks -> DEBU 85c As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2020-08-31 20:51:00.806 UTC [common.channelconfig] LogSanityChecks -> DEBU 85d As expected, current configuration has policy '/Channel/Orderer/Writers'" +orderer0.example.com | "2020-08-31 20:51:00.806 UTC [common.channelconfig] LogSanityChecks -> DEBU 85e As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2020-08-31 20:51:00.806 UTC [common.capabilities] Supported -> DEBU 85f Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2020-08-31 20:51:00.806 UTC [common.capabilities] Supported -> DEBU 860 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-08-31 20:51:00.806 UTC [msp] GetDefaultSigningIdentity -> DEBU 861 Obtaining default signing identity" +orderer0.example.com | "2020-08-31 20:51:00.806 UTC [msp] GetDefaultSigningIdentity -> DEBU 862 Obtaining default signing identity" +orderer0.example.com | "2020-08-31 20:51:00.806 UTC [msp.identity] Sign -> DEBU 863 Sign: plaintext: 0AEA060A1B08011A0608B4C5B5FA0522...6062CF663D2C2E009C3EBD00268F013F " +orderer0.example.com | "2020-08-31 20:51:00.806 UTC [msp.identity] Sign -> DEBU 864 Sign: digest: 2AC95674D0ACD15326CA8878DDD198E3EEB913912DC52C69EC142A0FF3F154A2 " +orderer0.example.com | "2020-08-31 20:51:00.807 UTC [policies] Evaluate -> DEBU 865 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-08-31 20:51:00.807 UTC [policies] Evaluate -> DEBU 866 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:51:00.807 UTC [policies] Evaluate -> DEBU 867 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2020-08-31 20:51:00.807 UTC [policies] Evaluate -> DEBU 868 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:51:00.807 UTC [policies] Evaluate -> DEBU 869 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2020-08-31 20:51:00.807 UTC [msp] DeserializeIdentity -> DEBU 86a Obtaining identity" +orderer0.example.com | "2020-08-31 20:51:00.807 UTC [msp.identity] newIdentity -> DEBU 86b Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +orderer0.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +orderer0.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +orderer0.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +orderer0.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +orderer0.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +orderer0.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:51:00.808 UTC [cauthdsl] func1 -> DEBU 86c 0xc00096e820 gate 1598907060808536300 evaluation starts" +orderer0.example.com | "2020-08-31 20:51:00.808 UTC [cauthdsl] func2 -> DEBU 86d 0xc00096e820 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:51:00.808 UTC [cauthdsl] func2 -> DEBU 86e 0xc00096e820 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:51:00.808 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 86f Checking if identity satisfies MEMBER role for OrdererMSP" +orderer0.example.com | "2020-08-31 20:51:00.808 UTC [msp] Validate -> DEBU 870 MSP OrdererMSP validating identity" +orderer0.example.com | "2020-08-31 20:51:00.809 UTC [msp] getCertificationChain -> DEBU 871 MSP OrdererMSP getting certification chain" +orderer0.example.com | "2020-08-31 20:51:00.809 UTC [cauthdsl] func2 -> DEBU 872 0xc00096e820 principal matched by identity 0" +orderer0.example.com | "2020-08-31 20:51:00.809 UTC [msp.identity] Verify -> DEBU 873 Verify: digest = 00000000 2a c9 56 74 d0 ac d1 53 26 ca 88 78 dd d1 98 e3 |*.Vt...S&..x....| +orderer0.example.com | 00000010 ee b9 13 91 2d c5 2c 69 ec 14 2a 0f f3 f1 54 a2 |....-.,i..*...T.|" +orderer0.example.com | "2020-08-31 20:51:00.809 UTC [msp.identity] Verify -> DEBU 874 Verify: sig = 00000000 30 44 02 20 05 b4 a7 cf 0c d5 ef fc 4a 2d 2b 1c |0D. ........J-+.| +orderer0.example.com | 00000010 62 61 50 e5 d5 98 dc d2 14 31 4f 44 6a a4 86 44 |baP......1ODj..D| +orderer0.example.com | 00000020 b0 89 10 60 02 20 58 11 e4 1a 38 2d 02 16 fb d0 |...`. X...8-....| +orderer0.example.com | 00000030 3e 3a 82 7c a3 2e 16 22 69 6d a8 0c 03 8a 46 67 |>:.|..."im....Fg| +orderer0.example.com | 00000040 2d c0 ba 70 a1 eb |-..p..|" +orderer0.example.com | "2020-08-31 20:51:00.810 UTC [cauthdsl] func2 -> DEBU 875 0xc00096e820 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-08-31 20:51:00.810 UTC [cauthdsl] func1 -> DEBU 876 0xc00096e820 gate 1598907060808536300 evaluation succeeds" +orderer0.example.com | "2020-08-31 20:51:00.810 UTC [policies] Evaluate -> DEBU 877 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-08-31 20:51:00.810 UTC [policies] Evaluate -> DEBU 878 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-08-31 20:51:00.810 UTC [policies] Evaluate -> DEBU 879 Signature set satisfies policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-08-31 20:51:00.810 UTC [policies] Evaluate -> DEBU 87a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-08-31 20:51:00.810 UTC [policies] Evaluate -> DEBU 87b Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-08-31 20:51:00.810 UTC [policies] Evaluate -> DEBU 87c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +peer0.org2.example.com | [72d 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +peer0.org2.example.com | [72e 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +peer0.org2.example.com | [72f 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [730 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [731 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [732 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [733 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org2.example.com | [734 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [735 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +peer0.org2.example.com | [736 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +peer0.org2.example.com | [737 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [738 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +peer0.org2.example.com | [739 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +peer0.org2.example.com | [73a 08-31 20:51:04.49 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org2.example.com | [73b 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +peer0.org2.example.com | [73c 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +peer0.org2.example.com | [73d 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 18ms (state_validation=4ms block_and_pvtdata_commit=8ms state_commit=3ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +peer0.org2.example.com | [73e 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [73f 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408B0BECFA2F8AF9D9816...9C09DCBB6042B0C019B601802A020803 +peer0.org2.example.com | [740 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EF9B250180A197E41692B3178BFD474E90FE2BBF3487C455CED1412F510A2DBC +peer0.org2.example.com | [741 08-31 20:51:04.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +peer0.org2.example.com | [742 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.673Z grpc.peer_address=172.18.0.5:42530 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=322.5µs +peer0.org2.example.com | [743 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [744 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [745 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [746 08-31 20:51:04.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.708Z grpc.peer_address=172.18.0.5:42532 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=255µs +peer0.org2.example.com | [749 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [74a 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [74b 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [74c 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [74f 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org2.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org2.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org2.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org2.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [750 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [751 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [752 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org2.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org2.example.com | [753 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a9 90 bf c0 8c b2 26 1a 95 dc 89 |0E.!.......&....| +peer0.org2.example.com | 00000010 e5 99 e4 00 01 e0 6b 06 cd e1 75 c3 e1 a2 67 87 |......k...u...g.| +peer0.org2.example.com | 00000020 ba eb da 0c f0 02 20 22 98 c8 68 d6 af 2d a2 33 |...... "..h..-.3| +peer0.org2.example.com | 00000030 00 bc 76 d8 ab 8a 30 5a 73 74 70 5b 9c 75 4a a0 |..v...0Zstp[.uJ.| +peer0.org2.example.com | 00000040 85 55 85 86 75 cd ba |.U..u..| +peer0.org2.example.com | [754 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:42532 +peer0.org2.example.com | [755 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:42532 +peer0.org2.example.com | [756 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:4556179005521168221 tag:EMPTY mem_req: > > , Envelope: 281 bytes, Signature: 0 bytes +peer0.org2.example.com | [757 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [758 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:4556179005521168221 tag:EMPTY mem_req: > > , Envelope: 281 bytes, Signature: 0 bytes +peer0.org2.example.com | [759 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [75a 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d7 b2 d6 53 61 92 32 ed 71 27 8d 92 dc 74 24 72 |...Sa.2.q'...t$r| +peer0.org2.example.com | 00000010 37 05 e7 f9 cf 20 ec c3 85 06 f3 1d e1 6f 30 39 |7.... .......o09| +peer0.org2.example.com | [75b 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7e 78 bb 73 fd ed f9 c3 e3 21 49 5f |0D. ~x.s.....!I_| +peer0.org2.example.com | 00000010 79 c3 0f 84 86 3c 57 03 b0 77 17 8b b6 65 1c 01 |y.... DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [75d 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 86 88 bd 34 24 d2 a7 88 05 39 c4 |0E.!....4$....9.| +peer0.org2.example.com | 00000010 fe c4 16 21 03 4e c2 57 6c 48 54 d5 95 16 e0 fe |...!.N.WlHT.....| +peer0.org2.example.com | 00000020 f3 3f 2c 15 18 02 20 59 de e7 2c e3 a1 dc 1b 31 |.?,... Y..,....1| +peer0.org2.example.com | 00000030 df 4b e1 ba c9 3a 73 59 17 bf 10 2b 41 59 7a 1f |.K...:sY...+AYz.| +peer0.org2.example.com | 00000040 48 52 eb 66 fa 66 5b |HR.f.f[| +peer0.org2.example.com | [75e 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [75f 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]} +peer0.org2.example.com | [760 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [761 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [762 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [763 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [764 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [765 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [766 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [767 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [768 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [769 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [76a 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org2.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org2.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org2.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org2.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [76b 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 4556179005521168221, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [76c 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +peer0.org2.example.com | [76d 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 4556179005521168221, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 546 bytes, Signature: 0 bytes +peer0.org2.example.com | [76e 08-31 20:51:04.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6cb 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [6cc 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [6cd 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [6ce 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [6cf 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [6d0 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [6d1 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [6d2 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [6d3 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [6d4 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [6d5 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399cc10 gate 1598907065367456200 evaluation starts +peer1.org2.example.com | [6d6 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399cc10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [77e 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org1.example.com | [77f 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org1.example.com | [780 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [781 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org1.example.com | [782 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org2.example.com | [76f 08-31 20:51:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [770 08-31 20:51:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [771 08-31 20:51:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [772 08-31 20:51:04.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [773 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [774 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [775 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [776 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [777 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 4a 50 23 f4 a4 67 b4 77 df a4 65 44 c6 86 39 |.JP#..g.w..eD..9| +peer0.org2.example.com | 00000010 ea b6 02 bb 01 eb 36 db 28 b6 f5 50 97 0c 24 2c |......6.(..P..$,| +peer0.org2.example.com | [778 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 9c 95 07 1a 92 05 94 f0 47 65 |0E.!..........Ge| +peer0.org2.example.com | 00000010 bf 57 61 8d 3d b2 1a b1 d0 f5 8a ef 70 af b6 dd |.Wa.=.......p...| +peer0.org2.example.com | 00000020 fb d8 32 88 2c 02 20 01 fe 05 2b 66 a8 e3 37 d0 |..2.,. ...+f..7.| +peer0.org2.example.com | 00000030 30 6c a1 fe 90 89 ae 1b d8 1d 8a 05 14 31 e9 fe |0l...........1..| +peer0.org2.example.com | 00000040 01 fe fa 78 82 10 d2 |...x...| +peer0.org2.example.com | [779 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [77a 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 12 09 05 b6 78 75 1c b2 58 2e e0 |0D. .....xu..X..| +peer0.org2.example.com | 00000010 b1 9d 30 2d c2 56 33 48 ee c0 8d 12 bb fc 12 0d |..0-.V3H........| +peer0.org2.example.com | 00000020 a6 49 16 c4 02 20 05 16 c7 52 d1 46 66 3a 41 0a |.I... ...R.Ff:A.| +peer0.org2.example.com | 00000030 38 04 27 0a f8 ef 35 7d 7c bc 2d 49 a1 59 ab 37 |8.'...5}|.-I.Y.7| +peer0.org2.example.com | 00000040 9a 75 93 aa eb a8 |.u....| +peer0.org2.example.com | [77b 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [77c 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [77d 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [77e 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [77f 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [780 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [781 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [782 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [783 08-31 20:51:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [784 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [785 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [786 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [787 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [788 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [789 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [78a 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [78b 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c isn't responsive: EOF +peer0.org2.example.com | [78c 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [78d 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [78e 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> WARN Entering [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] +peer0.org2.example.com | [78f 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: +peer0.org2.example.com | [790 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [791 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer0.org2.example.com | [792 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [793 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\n\340\220:Q\254\275-7QQc^\251\307!\264\214\\\025\346\\\n\351\304:\343\253\327\002 \021\310i\235_?D\223\370(>U\025z>\010\201\346g\327N\266\177[\247P\212Z\262UJ\275" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [794 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [795 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\n\340\220:Q\254\275-7QQc^\251\307!\264\214\\\025\346\\\n\351\304:\343\253\327\002 \021\310i\235_?D\223\370(>U\025z>\010\201\346g\327N\266\177[\247P\212Z\262UJ\275" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [796 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [797 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a e1 70 71 3b f2 e3 7b ae 26 bb 0f ce 2d 39 5e |*.pq;..{.&...-9^| +peer0.org2.example.com | 00000010 b2 00 38 e7 0d 72 78 85 56 85 19 ef 28 92 45 8f |..8..rx.V...(.E.| +peer0.org2.example.com | [798 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 2c 3e 0a e0 90 3a 51 ac bd 2d 37 |0D. ),>...:Q..-7| +peer0.org2.example.com | 00000010 51 51 63 5e a9 c7 21 b4 8c 5c 15 e6 5c 0a e9 c4 |QQc^..!..\..\...| +peer0.org2.example.com | 00000020 3a e3 ab d7 02 20 11 c8 69 9d 5f 3f 44 93 f8 28 |:.... ..i._?D..(| +peer0.org2.example.com | 00000030 3e 55 15 7a 3e 08 81 e6 67 d7 4e b6 7f 5b a7 50 |>U.z>...g.N..[.P| +peer0.org2.example.com | 00000040 8a 5a b2 55 4a bd |.Z.UJ.| +peer0.org2.example.com | [799 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [79a 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 79 0e 93 4a 50 86 0b 32 28 aa d6 |0D. dy..JP..2(..| +peer0.org2.example.com | 00000010 9d a5 5f 88 ea ba 3f 66 02 1c 10 28 47 ae dd 55 |.._...?f...(G..U| +peer0.org2.example.com | 00000020 4d f8 29 5e 02 20 6a 8c 17 40 19 1c 54 be e4 c4 |M.)^. j..@..T...| +peer0.org2.example.com | 00000030 42 3f 72 ef d5 1a 24 84 73 81 d4 f0 8b 14 9e d9 |B?r...$.s.......| +peer0.org2.example.com | 00000040 9c 51 71 67 eb b4 |.Qqg..| +peer0.org2.example.com | [79b 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [79c 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [79d 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [79e 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [79f 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [7a0 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7a1 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7a2 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7a3 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [7a4 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7a5 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7a6 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [7a7 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 535 bytes, Signature: 0 bytes +peer0.org2.example.com | [7a8 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7a9 08-31 20:51:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\n\340\220:Q\254\275-7QQc^\251\307!\264\214\\\025\346\\\n\351\304:\343\253\327\002 \021\310i\235_?D\223\370(>U\025z>\010\201\346g\327N\266\177[\247P\212Z\262UJ\275" secret_envelope: > alive: > +peer0.org2.example.com | [7aa 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [7ab 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [7ac 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7ad 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [7ae 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7af 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [7b0 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7b1 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [7b2 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [7b3 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7b4 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [7b5 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [7b6 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [7b7 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [7b8 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [7b9 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [7ba 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [7bb 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [7bc 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acff40 gate 1598907065305527300 evaluation starts +peer0.org2.example.com | [7bd 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acff40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [7be 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acff40 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [7bf 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acff40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [7c0 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acff40 principal evaluation fails +peer0.org2.example.com | [7c1 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acff40 gate 1598907065305527300 evaluation fails +peer0.org2.example.com | [7c2 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [7c3 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [7c4 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [7c5 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af04d0 gate 1598907065307553200 evaluation starts +peer0.org2.example.com | [7c6 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af04d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [7c7 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af04d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [7c8 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [7c9 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [7ca 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [7cb 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af04d0 principal matched by identity 0 +peer0.org2.example.com | [7cc 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 a1 6e 8e 0a 84 2f 6e 0b 58 2e 74 48 a3 1d a5 |..n.../n.X.tH...| +peer0.org2.example.com | 00000010 c9 42 d4 63 e9 67 22 a5 66 e9 2f cf e9 bd fb e6 |.B.c.g".f./.....| +peer0.org2.example.com | [7cd 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e e3 2c 3b ae 3d 43 bb 64 bb 66 cb |0D. ..,;.=C.d.f.| +peer0.org2.example.com | 00000010 3d 4c 23 e1 e0 3c 37 ee 10 9b 88 eb e7 d3 0a e0 |=L#..<7.........| +peer0.org2.example.com | 00000020 30 99 40 64 02 20 26 89 16 12 13 cf 5f bc f4 b3 |0.@d. &....._...| +peer0.org2.example.com | 00000030 dd 90 3b 09 8c 38 a2 16 ad 94 f3 ef 32 3f be e4 |..;..8......2?..| +peer0.org1.example.com | [58b 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org1.example.com | [58c 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [58d 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org1.example.com | [58e 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | [58f 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0026d3240)} +peer0.org1.example.com | [590 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [591 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [592 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [593 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +peer0.org1.example.com | [594 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +peer0.org1.example.com | [595 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +peer0.org1.example.com | [596 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +peer0.org1.example.com | [597 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0xe3, 0x22, 0xef, 0xdb, 0x1a, 0xb5, 0x8a, 0x4e, 0xca, 0x29, 0x72, 0xa1, 0x82, 0xd5, 0x73, 0xd2, 0x6c, 0x30, 0x29, 0x25, 0x12, 0x30, 0x2d, 0xc5, 0xc9, 0xfc, 0x53, 0x0, 0x88, 0x62, 0x25, 0xd} txOffsets= +peer0.org1.example.com | txId=0ab5ac5f1d5a2551b49ec6c24c6da873616029271ac520b4a7140ef88dfe6b38 locPointer=offset=71, bytesLength=27136 +peer0.org1.example.com | ] +peer0.org1.example.com | [598 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28547, bytesLength=27136] for tx ID: [0ab5ac5f1d5a2551b49ec6c24c6da873616029271ac520b4a7140ef88dfe6b38] to txid-index +peer0.org1.example.com | [599 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28547, bytesLength=27136] for tx number:[0] ID: [0ab5ac5f1d5a2551b49ec6c24c6da873616029271ac520b4a7140ef88dfe6b38] to blockNumTranNum index +peer0.org1.example.com | [59a 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56675], isChainEmpty=[false], lastBlockNumber=[1] +peer0.org1.example.com | [59b 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +peer0.org1.example.com | [59c 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1] +peer0.org1.example.com | [59d 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database +peer0.org1.example.com | [59e 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [59f 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [5a0 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [5a1 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [5a2 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org1.example.com | [5a3 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:05.917Z grpc.peer_address=172.18.0.8:53970 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=228.5µs +peer0.org1.example.com | [5a4 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [5a5 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [5a6 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [5a7 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:53970 +peer0.org1.example.com | [5a8 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:53970 +peer0.org1.example.com | [5a9 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org1.example.com | [5aa 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 3e eb d0 74 2b 10 a6 95 27 00 |0E.!..>..t+...'.| +peer0.org1.example.com | 00000010 5a 3a cc e6 6f 90 b2 6b b9 b1 84 ae 3b be 47 94 |Z:..o..k....;.G.| +peer0.org1.example.com | 00000020 7b 69 b5 cb c3 02 20 7e 8f 67 d2 6b 07 26 90 0d |{i.... ~.g.k.&..| +peer0.org1.example.com | 00000030 8e 8c 65 6c f4 07 94 23 53 77 73 82 9f aa f0 0d |..el...#Sws.....| +peer0.org1.example.com | 00000040 27 df a7 88 a6 7c bf |'....|.| +peer0.org1.example.com | [5ab 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:53970 +peer0.org1.example.com | [5ac 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:53970 +peer0.org1.example.com | [5ad 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [5ae 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:53920 disconnected +peer0.org1.example.com | [5af 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:53920 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=17.5665106s +peer0.org1.example.com | [5b0 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:53970 disconnected +peer0.org1.example.com | [5b3 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:51:13.921Z grpc.peer_address=172.18.0.8:53970 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=5.7853ms +peer0.org1.example.com | [5b4 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b canceling read because closing +peer0.org1.example.com | [5b2 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [5b5 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +peer0.org1.example.com | [5b7 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +peer0.org1.example.com | [5b1 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [5b6 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [5b8 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +peer0.org1.example.com | [5ba 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [5b9 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +peer0.org1.example.com | [5bb 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +peer0.org1.example.com | [5bc 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org1.example.com | [5bd 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +peer0.org1.example.com | [5be 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 32ms (state_validation=1ms block_and_pvtdata_commit=8ms state_commit=16ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +peer0.org1.example.com | [5bf 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [5c0 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408A8CFEFBEF6AF9D9816...096D8DADEA4206176416CB532A020802 +peer0.org1.example.com | [5c1 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 677563607E0DC87C82F66FCACAF6D692883AC6E34D584C41D4EC9C435A1CF9EF +peer0.org1.example.com | [5c2 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +peer0.org1.example.com | [5c3 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +peer0.org1.example.com | [5c4 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +peer0.org1.example.com | [5c5 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +peer0.org1.example.com | [5c6 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +peer0.org1.example.com | [5c7 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +orderer0.example.com | "2020-08-31 20:51:00.811 UTC [orderer.common.msgprocessor] Apply -> DEBU 87d Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +orderer0.example.com | "2020-08-31 20:51:00.811 UTC [common.channelconfig] NewStandardValues -> DEBU 87e Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-08-31 20:51:00.811 UTC [common.channelconfig] initializeProtosStruct -> DEBU 87f Processing field: HashingAlgorithm" +orderer0.example.com | "2020-08-31 20:51:00.811 UTC [common.channelconfig] initializeProtosStruct -> DEBU 880 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-08-31 20:51:00.811 UTC [common.channelconfig] initializeProtosStruct -> DEBU 881 Processing field: OrdererAddresses" +peer0.org2.example.com | 00000040 96 81 f6 d1 25 38 |....%8| +peer0.org2.example.com | [7ce 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af04d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [7cf 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af04d0 gate 1598907065307553200 evaluation succeeds +peer0.org2.example.com | [7d0 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [7d1 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [7d2 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [7d3 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [6d7 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399cc10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [6d8 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399cc10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [6d9 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399cc10 principal evaluation fails +peer1.org2.example.com | [6da 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399cc10 gate 1598907065367456200 evaluation fails +peer1.org2.example.com | [6db 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [6dc 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [6dd 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [6de 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399d180 gate 1598907065369294400 evaluation starts +peer1.org2.example.com | [6df 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399d180 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [6e0 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399d180 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [6e1 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399d180 principal matched by identity 0 +peer1.org2.example.com | [6e2 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org2.example.com | [6e3 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a b3 d9 1b 77 94 55 33 03 75 d8 |0E.!.....w.U3.u.| +peer1.org2.example.com | 00000010 0d e5 58 4a 7d 65 77 99 8c 65 4e 2f bc 51 b7 8a |..XJ}ew..eN/.Q..| +peer1.org2.example.com | 00000020 84 7a 49 64 27 02 20 79 40 23 0f 33 04 95 52 2a |.zId'. y@#.3..R*| +peer1.org2.example.com | 00000030 b1 ae f4 d6 8f 46 04 3f 7e 76 39 0d 8b a8 7c 57 |.....F.?~v9...|W| +peer1.org2.example.com | 00000040 5c 80 34 b9 7d 4a 94 |\.4.}J.| +peer1.org2.example.com | [6e4 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399d180 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [6e5 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399d180 gate 1598907065369294400 evaluation succeeds +peer1.org2.example.com | [6e6 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [6e7 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [6e8 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [6e9 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [6ea 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:48146 +peer1.org2.example.com | [6eb 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:48146 +peer1.org2.example.com | [6ec 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [6ed 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6ee 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [6ef 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org2.example.com | [6f0 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6f1 08-31 20:51:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [6f2 08-31 20:51:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [6f3 08-31 20:51:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [6f4 08-31 20:51:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [6f5 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [6f6 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [6f7 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [6f8 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [6f9 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [5c8 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0026d3dc0 env 0xc0004c4d20 txn 0 +peer0.org1.example.com | [5c9 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0004c4d20 +peer0.org1.example.com | [5ca 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\267\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030>\316\004\035\247\263T!\025\236\244\230\014\355k\242EsT\003\377-\204\213" +peer0.org1.example.com | [5cb 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org1.example.com | [5cc 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [5cd 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [5ce 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5cf 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer0.org1.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer0.org1.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer0.org1.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org1.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org1.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer0.org1.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [5d0 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org1.example.com | [5d1 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [5d2 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org1.example.com | [5d3 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [5d4 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 bb f3 d3 49 26 2e 3e 88 71 29 7d 0a 91 00 7f |....I&.>.q)}....| +peer0.org1.example.com | 00000010 c6 f2 a5 3e 3c 38 d2 3f 9b 58 9e bb c7 96 e4 4d |...><8.?.X.....M| +peer0.org1.example.com | [5d5 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 8d d9 5c 84 4b 47 09 13 06 b6 |0E.!....\.KG....| +peer0.org1.example.com | 00000010 45 89 d8 00 01 66 d3 67 41 9b 6b b8 ac 4e 5e 22 |E....f.gA.k..N^"| +peer0.org1.example.com | 00000020 b8 13 f9 48 dd 02 20 05 54 f1 7c ff d1 ca b3 76 |...H.. .T.|....v| +peer0.org1.example.com | 00000030 87 15 bf 1a e7 b1 28 ba a1 6e 04 d2 71 8a 64 10 |......(..n..q.d.| +peer0.org1.example.com | 00000040 f4 9e 1e 26 55 d7 b6 |...&U..| +peer0.org1.example.com | [5d6 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [5d7 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc002806a80, header channel_header:"\010\001\032\006\010\267\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030>\316\004\035\247\263T!\025\236\244\230\014\355k\242EsT\003\377-\204\213" +peer0.org1.example.com | [5d8 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [5d9 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [5da 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [5db 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [5dc 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [5dd 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5de 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [5df 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [5e0 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [5e1 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [5e2 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [5e3 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [5e4 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org1.example.com | [5e5 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [5e6 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [5e7 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [5e8 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org1.example.com | [5e9 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [5ea 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +peer0.org1.example.com | [5eb 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org2.example.com | [6fa 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [6fb 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [6fc 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [6fd 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 16 86 03 a9 c2 f9 09 da 67 b3 32 d1 55 f8 e9 |.........g.2.U..| +peer1.org2.example.com | 00000010 5d ec db a2 72 bf 7c 18 82 c4 01 38 af 3e ee b8 |]...r.|....8.>..| +peer1.org2.example.com | [6fe 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 1c 3f df 9d c6 bb 74 0b 35 7b 46 |0D. M.?....t.5{F| +peer1.org2.example.com | 00000010 1b 7d 4e 16 2b 4c fb 26 e8 af 49 12 79 5f 30 59 |.}N.+L.&..I.y_0Y| +peer1.org2.example.com | 00000020 c2 64 2d 3c 02 20 36 40 3d e0 ff 09 4c e4 bf 12 |.d-<. 6@=...L...| +peer1.org2.example.com | 00000030 92 1b c0 99 9b d1 9b c5 ce 14 0c bf 18 be 6d 1e |..............m.| +peer1.org2.example.com | 00000040 de 3c 61 a0 d3 7e |. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [700 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [701 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [702 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [703 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [704 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [705 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [706 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [707 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [708 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [709 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [70a 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb 77 49 82 df 02 61 02 72 88 8e 81 72 83 a8 26 |.wI...a.r...r..&| +peer1.org2.example.com | 00000010 40 55 f1 dd 5b cd 7a 30 06 81 f2 4a 19 ab 60 fe |@U..[.z0...J..`.| +peer1.org2.example.com | [70b 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 d6 75 03 22 db e7 7f b6 0c 45 57 |0D. h.u.".....EW| +peer1.org2.example.com | 00000010 33 14 47 82 79 65 68 d2 2d 67 7a c0 03 2c cf f9 |3.G.yeh.-gz..,..| +peer1.org2.example.com | 00000020 87 c1 0e af 02 20 0e 51 64 e0 1e 68 06 33 78 3b |..... .Qd..h.3x;| +peer1.org2.example.com | 00000030 21 c8 9b ec 7d 38 1e 6b a0 93 0a d6 49 6a 20 a0 |!...}8.k....Ij .| +peer1.org2.example.com | 00000040 2c 5f 3d cf 1d 39 |,_=..9| +peer1.org2.example.com | [70c 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [70d 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 35 ae ed 63 25 e3 00 cb 27 fe |0E.!..5..c%...'.| +peer1.org2.example.com | 00000010 32 e4 c8 d3 7e c4 14 58 52 af 2b d8 61 bc c0 6b |2...~..XR.+.a..k| +peer1.org2.example.com | 00000020 2b 2a 89 64 fb 02 20 05 fe 18 41 4d 80 70 e7 99 |+*.d.. ...AM.p..| +peer1.org2.example.com | 00000030 f9 26 7b dc ed 96 31 0c b2 49 b6 aa 53 89 c5 4c |.&{...1..I..S..L| +peer1.org2.example.com | 00000040 86 7e d6 be 63 b7 dc |.~..c..| +peer1.org2.example.com | [70e 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [70f 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [710 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:51:00.811 UTC [common.channelconfig] initializeProtosStruct -> DEBU 882 Processing field: Consortium" +orderer0.example.com | "2020-08-31 20:51:00.811 UTC [common.channelconfig] initializeProtosStruct -> DEBU 883 Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:51:00.811 UTC [common.channelconfig] NewStandardValues -> DEBU 884 Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-08-31 20:51:00.812 UTC [common.channelconfig] initializeProtosStruct -> DEBU 885 Processing field: ACLs" +orderer0.example.com | "2020-08-31 20:51:00.812 UTC [common.channelconfig] initializeProtosStruct -> DEBU 886 Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:51:00.812 UTC [common.channelconfig] NewStandardValues -> DEBU 887 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-08-31 20:51:00.812 UTC [common.channelconfig] initializeProtosStruct -> DEBU 888 Processing field: AnchorPeers" +orderer0.example.com | "2020-08-31 20:51:00.812 UTC [common.channelconfig] NewStandardValues -> DEBU 889 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:51:00.812 UTC [common.channelconfig] initializeProtosStruct -> DEBU 88a Processing field: MSP" +orderer0.example.com | "2020-08-31 20:51:00.813 UTC [common.channelconfig] Validate -> DEBU 88b Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-08-31 20:51:00.813 UTC [common.channelconfig] validateMSP -> DEBU 88c Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.813 UTC [msp] newBccspMsp -> DEBU 88d Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:51:00.813 UTC [msp] New -> DEBU 88e Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:51:00.813 UTC [msp] Setup -> DEBU 88f Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.814 UTC [msp.identity] newIdentity -> DEBU 890 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:51:00.815 UTC [common.channelconfig] NewStandardValues -> DEBU 891 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-08-31 20:51:00.815 UTC [common.channelconfig] initializeProtosStruct -> DEBU 892 Processing field: AnchorPeers" +orderer0.example.com | "2020-08-31 20:51:00.815 UTC [common.channelconfig] NewStandardValues -> DEBU 893 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:51:00.815 UTC [common.channelconfig] initializeProtosStruct -> DEBU 894 Processing field: MSP" +orderer0.example.com | "2020-08-31 20:51:00.815 UTC [common.channelconfig] Validate -> DEBU 895 Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-08-31 20:51:00.816 UTC [common.channelconfig] validateMSP -> DEBU 896 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.816 UTC [msp] newBccspMsp -> DEBU 897 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:51:00.816 UTC [msp] New -> DEBU 898 Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:51:00.816 UTC [msp] Setup -> DEBU 899 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.816 UTC [msp.identity] newIdentity -> DEBU 89a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:51:00.818 UTC [common.channelconfig] NewStandardValues -> DEBU 89b Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-08-31 20:51:00.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89c Processing field: ConsensusType" +orderer0.example.com | "2020-08-31 20:51:00.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89d Processing field: BatchSize" +orderer0.example.com | "2020-08-31 20:51:00.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89e Processing field: BatchTimeout" +orderer0.example.com | "2020-08-31 20:51:00.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89f Processing field: KafkaBrokers" +orderer0.example.com | "2020-08-31 20:51:00.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a0 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-08-31 20:51:00.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a1 Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:51:00.819 UTC [common.channelconfig] NewStandardValues -> DEBU 8a2 Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-08-31 20:51:00.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a3 Processing field: Endpoints" +orderer0.example.com | "2020-08-31 20:51:00.819 UTC [common.channelconfig] NewStandardValues -> DEBU 8a4 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:51:00.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a5 Processing field: MSP" +orderer0.example.com | "2020-08-31 20:51:00.819 UTC [common.channelconfig] validateMSP -> DEBU 8a6 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-08-31 20:51:00.819 UTC [msp] newBccspMsp -> DEBU 8a7 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:51:00.819 UTC [msp] New -> DEBU 8a8 Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:51:00.819 UTC [msp] Setup -> DEBU 8a9 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-08-31 20:51:00.821 UTC [msp.identity] newIdentity -> DEBU 8aa Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:51:00.822 UTC [msp] Setup -> DEBU 8ab Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-08-31 20:51:00.822 UTC [msp] Setup -> DEBU 8ac MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-08-31 20:51:00.822 UTC [policies] NewManagerImpl -> DEBU 8ad Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:51:00.822 UTC [policies] NewManagerImpl -> DEBU 8ae Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:51:00.822 UTC [policies] NewManagerImpl -> DEBU 8af Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:51:00.823 UTC [policies] NewManagerImpl -> DEBU 8b0 Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:51:00.823 UTC [policies] NewManagerImpl -> DEBU 8b1 Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:51:00.823 UTC [policies] NewManagerImpl -> DEBU 8b2 Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:51:00.823 UTC [policies] NewManagerImpl -> DEBU 8b3 Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:51:00.823 UTC [policies] NewManagerImpl -> DEBU 8b4 Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.823 UTC [policies] NewManagerImpl -> DEBU 8b5 Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.824 UTC [policies] NewManagerImpl -> DEBU 8b6 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.824 UTC [policies] NewManagerImpl -> DEBU 8b7 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.824 UTC [policies] NewManagerImpl -> DEBU 8b8 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.824 UTC [policies] NewManagerImpl -> DEBU 8b9 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.824 UTC [policies] NewManagerImpl -> DEBU 8ba Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.825 UTC [policies] NewManagerImpl -> DEBU 8bb Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.825 UTC [policies] NewManagerImpl -> DEBU 8bc Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.825 UTC [policies] NewManagerImpl -> DEBU 8bd Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.825 UTC [policies] GetPolicy -> DEBU 8be Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:51:00.825 UTC [policies] NewManagerImpl -> DEBU 8bf Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.825 UTC [policies] GetPolicy -> DEBU 8c0 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:51:00.825 UTC [policies] NewManagerImpl -> DEBU 8c1 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.826 UTC [policies] NewManagerImpl -> DEBU 8c2 Proposed new policy Writers for Channel" +orderer0.example.com | "2020-08-31 20:51:00.826 UTC [policies] NewManagerImpl -> DEBU 8c3 Proposed new policy Admins for Channel" +orderer0.example.com | "2020-08-31 20:51:00.826 UTC [policies] NewManagerImpl -> DEBU 8c4 Proposed new policy Readers for Channel" +orderer0.example.com | "2020-08-31 20:51:00.826 UTC [common.configtx] addToMap -> DEBU 8c5 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-08-31 20:51:00.826 UTC [common.configtx] addToMap -> DEBU 8c6 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-08-31 20:51:00.826 UTC [common.configtx] addToMap -> DEBU 8c7 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:51:00.827 UTC [common.configtx] addToMap -> DEBU 8c8 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-08-31 20:51:00.827 UTC [common.configtx] addToMap -> DEBU 8c9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-08-31 20:51:00.827 UTC [common.configtx] addToMap -> DEBU 8ca Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-08-31 20:51:00.827 UTC [common.configtx] addToMap -> DEBU 8cb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:51:00.827 UTC [common.configtx] addToMap -> DEBU 8cc Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-08-31 20:51:00.827 UTC [common.configtx] addToMap -> DEBU 8cd Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-08-31 20:51:00.827 UTC [common.configtx] addToMap -> DEBU 8ce Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-08-31 20:51:00.827 UTC [common.configtx] addToMap -> DEBU 8cf Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d0 Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d1 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d2 Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d3 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d4 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d5 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d6 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8da Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-08-31 20:51:00.830 UTC [common.configtx] addToMap -> DEBU 8db Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-08-31 20:51:00.830 UTC [common.configtx] addToMap -> DEBU 8dc Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.831 UTC [common.configtx] addToMap -> DEBU 8dd Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-08-31 20:51:00.831 UTC [common.configtx] addToMap -> DEBU 8de Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-08-31 20:51:00.831 UTC [common.configtx] addToMap -> DEBU 8df Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:51:00.832 UTC [common.configtx] addToMap -> DEBU 8e0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:51:00.832 UTC [common.configtx] addToMap -> DEBU 8e1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-08-31 20:51:00.832 UTC [common.configtx] addToMap -> DEBU 8e2 Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-08-31 20:51:00.832 UTC [common.configtx] addToMap -> DEBU 8e3 Adding to config map: [Value] /Channel/Application/Capabilities" +peer1.org1.example.com | [783 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org1.example.com | [784 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [786 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [785 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | [787 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org1.example.com | [788 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +peer1.org1.example.com | [789 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00293ca80)} +peer1.org1.example.com | [78a 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [78b 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [78c 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [78d 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [78e 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +peer1.org1.example.com | [78f 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:7051 +peer1.org1.example.com | [791 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:7051 +peer1.org1.example.com | [792 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [790 08-31 20:51:04.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +peer1.org1.example.com | [793 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [795 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | [5ec 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [5ed 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [5ee 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [5ef 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [5f0 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [5f1 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +peer0.org1.example.com | [5f2 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [5f3 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [5f4 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +peer0.org1.example.com | [5f5 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer0.org1.example.com | [5f6 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [5f7 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org1.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org1.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org1.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org1.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org1.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org1.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [5f8 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9500 gate 1598907063967326300 evaluation starts +peer0.org1.example.com | [5f9 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9500 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [5fa 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9500 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [5fb 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer0.org1.example.com | [5fc 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer0.org1.example.com | [5fd 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [5fe 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [5ff 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer0.org1.example.com | [600 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [601 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9500 principal matched by identity 0 +peer0.org1.example.com | [602 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 3d f8 a1 bf ae 7d e4 fb dc 40 c7 07 6d de 8d |.=....}...@..m..| +peer0.org1.example.com | 00000010 fb 6b e1 2c 0c 1e 66 98 ba 3d 47 90 dc a4 d0 63 |.k.,..f..=G....c| +peer0.org1.example.com | [603 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 27 f4 6f dd 5b 2d 12 b9 82 60 1a |0D. u'.o.[-...`.| +peer0.org1.example.com | 00000010 88 90 67 88 50 b6 97 37 e6 93 6d 8e 20 ca 9f 40 |..g.P..7..m. ..@| +peer0.org1.example.com | 00000020 df d1 ae 7e 02 20 2b 77 8a 7e aa 5c bd fa f5 76 |...~. +w.~.\...v| +peer0.org1.example.com | 00000030 6b bd 3d 49 6e 73 1a 12 7f 30 6c 34 57 c0 06 c4 |k.=Ins...0l4W...| +peer0.org1.example.com | 00000040 56 0c 2b fa b4 c4 |V.+...| +peer0.org1.example.com | [604 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9500 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [605 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9500 gate 1598907063967326300 evaluation succeeds +peer0.org1.example.com | [606 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [607 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [608 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [609 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [60a 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [60b 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [60c 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [60d 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [60e 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org1.example.com | [60f 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [610 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [611 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [612 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org1.example.com | [613 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org1.example.com | [614 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org1.example.com | [615 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org1.example.com | [616 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [617 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [618 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [619 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +peer0.org1.example.com | [61a 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [61b 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [61c 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [61d 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org1.example.com | [61e 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org1.example.com | [61f 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org1.example.com | [620 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org1.example.com | [621 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org1.example.com | [622 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [623 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org1.example.com | [624 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org1.example.com | [625 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org1.example.com | [626 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org1.example.com | [627 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org1.example.com | [628 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org1.example.com | [629 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [62a 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org1.example.com | [62b 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org1.example.com | [62c 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [62d 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [62e 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org1.example.com | [62f 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [630 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [631 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org1.example.com | [632 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org1.example.com | nw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [711 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [712 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [713 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [714 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [715 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [716 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [717 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [718 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [719 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +peer1.org2.example.com | [71a 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer1.org2.example.com | [71b 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [71c 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [71d 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [71e 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [71f 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [720 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [721 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [722 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [723 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [724 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [725 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [726 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [727 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [728 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [729 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [72a 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [72b 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [72c 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [72d 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [72e 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [72f 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [730 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f28a0 gate 1598907065549576300 evaluation starts +peer1.org2.example.com | [731 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f28a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [732 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f28a0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [733 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f28a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [734 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f28a0 principal evaluation fails +peer1.org2.example.com | [735 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f28a0 gate 1598907065549576300 evaluation fails +peer1.org2.example.com | [736 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [737 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [738 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [739 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f2e10 gate 1598907065553553800 evaluation starts +peer1.org2.example.com | [73a 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f2e10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [73b 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f2e10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [73d 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f2e10 principal matched by identity 0 +peer1.org2.example.com | [73e 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 57 bf 6d b3 4e 55 fd 88 5d 68 ba 35 0e 17 84 |dW.m.NU..]h.5...| +peer1.org2.example.com | 00000010 77 b6 56 aa 4a f8 c8 6e 7e 80 c4 25 88 44 c6 b9 |w.V.J..n~..%.D..| +peer1.org2.example.com | [73c 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [73f 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 23 bd 43 66 86 ac 07 1e 0d 13 |0E.!..#.Cf......| +peer1.org2.example.com | 00000010 9d bd ec 6f 51 18 8d b0 7a 0b 1a ba 4e 11 5c 36 |...oQ...z...N.\6| +peer1.org2.example.com | 00000020 a6 15 38 dc f3 02 20 23 d9 03 09 b4 55 a9 64 56 |..8... #....U.dV| +peer1.org2.example.com | 00000030 b9 7f 65 cb 26 db 6c 5b 73 44 80 8a 24 4e c9 90 |..e.&.l[sD..$N..| +peer1.org2.example.com | 00000040 99 cd 63 81 39 7b b9 |..c.9{.| +peer1.org2.example.com | [740 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f2e10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [741 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f2e10 gate 1598907065553553800 evaluation succeeds +peer1.org2.example.com | [742 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [743 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [744 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [745 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [746 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [747 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes t: {1598907045534780300 18 {} [] 0} +peer1.org2.example.com | [748 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [749 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [74a 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [74b 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [74c 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [74d 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [74e 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [74f 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [750 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [751 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [752 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [753 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [755 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [754 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [757 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [758 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [759 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [75a 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [75b 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0c430 gate 1598907065578108800 evaluation starts +peer1.org2.example.com | [756 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [75c 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0c430 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [75e 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0c430 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [75f 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0c430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [760 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0c430 principal evaluation fails +peer1.org2.example.com | [761 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0c430 gate 1598907065578108800 evaluation fails +peer1.org2.example.com | [762 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [763 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [764 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [75d 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [765 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c5d10 gate 1598907065580249000 evaluation starts +peer1.org2.example.com | [766 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c5d10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [767 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c5d10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [768 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c5d10 principal matched by identity 0 +peer1.org2.example.com | [769 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 df 23 9b a5 6a 7c 85 35 b0 95 5b 13 8e 7a 41 |..#..j|.5..[..zA| +peer1.org2.example.com | 00000010 0a a0 14 ea e5 9e 21 72 df 90 f3 47 d1 be e1 80 |......!r...G....| +peer1.org2.example.com | [76a 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 eb e4 06 cf 12 30 36 e7 e3 c8 |0E.!.......06...| +peer1.org2.example.com | 00000010 cd 9e fe 53 d2 87 a2 b3 48 46 59 da 58 96 fa 72 |...S....HFY.X..r| +peer1.org2.example.com | 00000020 0c 73 41 95 3b 02 20 18 4e 90 1b c7 45 0a 2b ed |.sA.;. .N...E.+.| +peer1.org2.example.com | 00000030 4b 34 be 3e a1 98 c0 27 db 05 24 4f e4 2e a9 a5 |K4.>...'..$O....| +peer1.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer1.org1.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer1.org1.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer1.org1.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [796 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [794 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +peer1.org1.example.com | [797 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [798 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [799 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [79b 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [79c 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [79a 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +peer0.org2.example.com | [7d4 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [7d5 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [7d6 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [7d7 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [7d8 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [7d9 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7da 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7db 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [7dc 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7dd 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [7de 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [7df 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7e0 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [7e1 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7e2 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7e3 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [7e4 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [7e5 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [7e6 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [7e7 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [7e8 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\n\340\220:Q\254\275-7QQc^\251\307!\264\214\\\025\346\\\n\351\304:\343\253\327\002 \021\310i\235_?D\223\370(>U\025z>\010\201\346g\327N\266\177[\247P\212Z\262UJ\275" > alive: dead:?\0008\034\252\023\307" > +peer0.org2.example.com | [7e9 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [7ea 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [7eb 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7ec 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [7ed 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [7ee 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af1f00 gate 1598907065313490400 evaluation starts +peer0.org2.example.com | [7ef 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af1f00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [7f0 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af1f00 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [7f1 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af1f00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [7f2 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af1f00 principal evaluation fails +peer0.org2.example.com | [7f3 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af1f00 gate 1598907065313490400 evaluation fails +peer0.org2.example.com | [7f4 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [7f5 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [7f6 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [7f7 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [7f8 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12470 gate 1598907065313854600 evaluation starts +peer0.org2.example.com | [7f9 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12470 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [7fa 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12470 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [7fb 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12470 principal matched by identity 0 +peer0.org2.example.com | [7fc 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 67 2b 54 7c 62 9e 9a 8d 1a 61 9c 2e f9 93 78 |.g+T|b....a....x| +peer0.org2.example.com | 00000010 fb ca be 63 be 09 ee 03 34 85 3c f9 44 63 66 7a |...c....4.<.Dcfz| +peer0.org2.example.com | [7fd 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 48 0d 46 1d 66 43 70 4f 7f 88 87 |0D. }H.F.fCpO...| +peer0.org2.example.com | 00000010 a3 ad ba 14 26 70 7e 1c bc 43 a7 84 35 24 a3 01 |....&p~..C..5$..| +peer0.org2.example.com | 00000020 3e 0a ef b0 02 20 53 bc 1f 56 ea 4b 37 33 70 61 |>.... S..V.K73pa| +peer0.org2.example.com | 00000030 72 d5 0d 3f 4e af 85 36 5c e2 85 78 32 8d a3 9b |r..?N..6\..x2...| +peer0.org2.example.com | 00000040 3e f0 4e 3e e8 d7 |>.N>..| +peer0.org2.example.com | [7fe 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12470 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [7ff 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12470 gate 1598907065313854600 evaluation succeeds +peer0.org2.example.com | [800 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [801 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [802 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [803 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [804 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [805 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" lastAliveTS: 1598907045315872200, 23 but got ts: inc_num:1598907045315872200 seq_num:22 +peer0.org2.example.com | [806 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [807 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [808 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [809 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [80a 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [80b 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [80c 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [80d 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [80e 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [80f 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:07.362Z grpc.peer_address=172.18.0.7:51286 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=113.3µs +peer0.org2.example.com | [810 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [811 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [812 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer1.org1.example.com | [79d 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [79e 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [79f 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [7a0 08-31 20:51:04.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [7a1 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [7a2 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [7a4 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c4110 gate 1598907064181022500 evaluation starts +peer1.org1.example.com | [7a5 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c4110 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [7a6 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c4110 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [7a7 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org1.example.com | [7a3 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0x22, 0x1, 0xdc, 0x78, 0x27, 0xf2, 0x2d, 0xc3, 0x61, 0xf7, 0x88, 0xbc, 0x3b, 0x31, 0x2f, 0x16, 0xf3, 0xa9, 0x7a, 0x3d, 0x6c, 0xaa, 0xbe, 0x10, 0x69, 0xd3, 0x9f, 0xc0, 0xb5, 0xb6, 0x7a, 0xbf} txOffsets= +peer1.org1.example.com | txId=ed7b76e084105979adee38a130a3cf311c0f2d9b0dc1c2dda158f0d55a15426c locPointer=offset=71, bytesLength=27141 +peer1.org1.example.com | ] +peer1.org1.example.com | [7a8 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [7aa 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [7a9 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56746, bytesLength=27141] for tx ID: [ed7b76e084105979adee38a130a3cf311c0f2d9b0dc1c2dda158f0d55a15426c] to txid-index +peer1.org1.example.com | [7ab 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56746, bytesLength=27141] for tx number:[0] ID: [ed7b76e084105979adee38a130a3cf311c0f2d9b0dc1c2dda158f0d55a15426c] to blockNumTranNum index +peer1.org1.example.com | [7ac 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c4110 principal matched by identity 0 +peer1.org1.example.com | [7ad 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer1.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer1.org1.example.com | [7ae 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 88 fa d1 b0 db 9e d8 da 5d 51 ed |0D. .........]Q.| +peer1.org1.example.com | 00000010 65 9b a4 89 b5 99 81 4a a3 98 07 aa 89 10 9e 62 |e......J.......b| +peer1.org1.example.com | 00000020 07 2d 03 62 02 20 1c 72 ac 07 11 4a 14 c9 f5 75 |.-.b. .r...J...u| +peer1.org1.example.com | 00000030 29 4e 4d c6 11 5e 92 ab 40 30 b0 6d 8b df 34 25 |)NM..^..@0.m..4%| +peer1.org1.example.com | 00000040 97 28 06 68 de 45 |.(.h.E| +peer1.org1.example.com | [7af 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84880], isChainEmpty=[false], lastBlockNumber=[2] +peer1.org1.example.com | [7b0 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +peer1.org1.example.com | [7b1 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c4110 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [7b2 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c4110 gate 1598907064181022500 evaluation succeeds +peer1.org1.example.com | [7b3 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [7b4 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [7b5 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [7b7 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [7b8 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer1.org1.example.com | [7b6 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +peer1.org1.example.com | [7b9 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +peer1.org1.example.com | [7ba 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [7bb 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [7bc 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [7bd 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [7be 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer1.org1.example.com | [7bf 08-31 20:51:04.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7c0 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [7c1 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7c2 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [7c4 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +peer1.org1.example.com | [7c5 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +peer1.org1.example.com | [7c6 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +peer1.org1.example.com | [7c7 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [7c8 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +peer1.org1.example.com | [7c9 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +peer1.org1.example.com | [7ca 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer1.org1.example.com | [7c3 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 10715564970673300445, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer1.org1.example.com | [7cb 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 10715564970673300445, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer1.org1.example.com | [7cc 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7cd 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 10715564970673300445, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer1.org1.example.com | [7ce 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [7cf 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 ee 7b 72 f4 78 ce 93 cd cb 23 14 91 44 a8 b1 |..{r.x....#..D..| +peer1.org1.example.com | 00000010 ca d1 c3 09 1f 1d cb 18 6d 90 bc f0 b6 18 ed 0a |........m.......| +peer1.org1.example.com | [7d0 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 54 00 e9 d9 95 16 75 e4 02 b0 83 |0D. .T.....u....| +peer1.org1.example.com | 00000010 95 cf 52 86 07 f2 ae 92 7c d6 3a c9 15 3c 1b 5e |..R.....|.:..<.^| +peer1.org1.example.com | 00000020 37 7a 5d 53 02 20 6f 65 cb 88 cc ec dc 94 ea c7 |7z]S. oe........| +peer1.org1.example.com | 00000030 f5 09 51 14 98 c3 6c 80 57 78 c8 6a 12 ce 3e 3f |..Q...l.Wx.j..>?| +peer1.org1.example.com | 00000040 00 38 1c aa 13 c7 |.8....| +peer1.org1.example.com | [7d1 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [7d2 08-31 20:51:04.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes t: {1598907045534780300 17 {} [] 0} +peer1.org1.example.com | [7d3 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7d4 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7d5 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [7d6 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ae 80 45 14 27 44 2b 05 04 95 01 7d 80 39 c3 19 |..E.'D+....}.9..| +peer1.org1.example.com | 00000010 f0 a3 17 0d df ae 86 a1 85 56 de 7c 76 83 df 9c |.........V.|v...| +peer1.org1.example.com | [7d7 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 c8 d2 3c bb 9b b9 12 9a fb a7 |0E.!....<.......| +peer1.org1.example.com | 00000010 5f 7e 52 53 82 fc 22 7d 77 96 49 bc 87 67 d1 18 |_~RS.."}w.I..g..| +peer1.org1.example.com | 00000020 9a 02 c4 08 86 02 20 66 93 d5 01 7f 13 e5 5b fb |...... f......[.| +peer1.org1.example.com | 00000030 6d 95 ab 5e 75 28 e7 83 fa 50 85 c9 33 11 35 ad |m..^u(...P..3.5.| +peer1.org1.example.com | 00000040 73 6c 63 d9 aa 3e a1 |slc..>.| +peer1.org1.example.com | [7d9 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [7da 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [7db 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7dc 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [7dd 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [7d8 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +peer1.org2.example.com | 00000040 76 f5 9c 26 b5 d7 2e |v..&...| +peer1.org2.example.com | [76b 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c5d10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [76c 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c5d10 gate 1598907065580249000 evaluation succeeds +peer1.org2.example.com | [76d 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [76e 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [76f 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [770 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [633 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org1.example.com | [634 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org1.example.com | [635 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [636 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [637 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [638 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [639 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [63a 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer0.org1.example.com | [63b 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org1.example.com | [63c 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [63d 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [63e 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org1.example.com | [63f 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [640 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [641 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [642 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [643 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [644 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org1.example.com | [645 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org1.example.com | [646 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [647 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [648 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [649 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [64a 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +peer0.org1.example.com | [64b 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +peer0.org1.example.com | [64c 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [64d 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [64e 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [64f 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org1.example.com | [650 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org1.example.com | [651 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org1.example.com | [652 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org1.example.com | [653 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org1.example.com | [654 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org1.example.com | [655 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org1.example.com | [656 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org1.example.com | [657 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org1.example.com | [658 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org1.example.com | [659 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [65a 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [65b 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org1.example.com | [65c 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [65d 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [65e 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org1.example.com | [65f 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org1.example.com | [660 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org1.example.com | [661 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org1.example.com | [662 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org1.example.com | [663 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org1.example.com | [664 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org1.example.com | [665 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [666 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org1.example.com | [667 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org1.example.com | [668 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org1.example.com | [669 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [66a 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org1.example.com | [66b 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org1.example.com | [66c 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org1.example.com | [66d 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org1.example.com | [66e 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org1.example.com | [66f 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org1.example.com | [670 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org1.example.com | [671 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org1.example.com | [672 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org1.example.com | [673 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org1.example.com | [674 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org1.example.com | [675 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [676 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [677 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org1.example.com | [678 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [679 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [67a 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [67b 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [67c 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [67d 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [67e 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [67f 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [680 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [681 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [682 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [683 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [684 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [685 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [686 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [687 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [688 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [689 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org1.example.com | [68a 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org1.example.com | [68b 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org1.example.com | [68c 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org1.example.com | [68d 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org1.example.com | [68e 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org1.example.com | [68f 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org1.example.com | [690 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org1.example.com | [691 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org1.example.com | [692 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org1.example.com | [693 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [694 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [695 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [696 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [697 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [698 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [699 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org1.example.com | [69a 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org1.example.com | [69b 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org1.example.com | [69c 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org1.example.com | [69d 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [69e 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [69f 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org1.example.com | [6a0 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org1.example.com | [6a1 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org1.example.com | [6a2 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org1.example.com | [6a3 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org2.example.com | [813 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [816 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [817 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [818 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [819 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [81a 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [81b 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [81c 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [81d 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [81e 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [81f 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [820 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [821 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [822 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6c850 gate 1598907065371543300 evaluation starts +peer0.org2.example.com | [823 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6c850 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [824 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6c850 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [825 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6c850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [826 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6c850 principal evaluation fails +peer0.org2.example.com | [827 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6c850 gate 1598907065371543300 evaluation fails +peer0.org2.example.com | [828 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [829 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [82a 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [82b 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6cde0 gate 1598907065372372000 evaluation starts +peer0.org2.example.com | [82c 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6cde0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [82d 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6cde0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [82e 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [82f 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [830 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [831 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6cde0 principal matched by identity 0 +peer0.org2.example.com | [832 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [833 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd ab e1 5e e1 3f de 04 20 9f 13 |0E.!....^.?.. ..| +peer0.org2.example.com | 00000010 5b 1d 95 4b 47 8a dc 97 55 10 c5 0e d8 56 2e 53 |[..KG...U....V.S| +peer0.org2.example.com | 00000020 d6 2f 77 c2 3b 02 20 4f d3 bd 1f d5 b7 ff 1d af |./w.;. O........| +peer0.org2.example.com | 00000030 0b e8 f5 1c 18 c6 2a e6 0c c0 8f f8 9e 6d 38 c3 |......*......m8.| +peer0.org2.example.com | 00000040 11 37 df 29 60 e8 28 |.7.)`.(| +peer0.org2.example.com | [834 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6cde0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [835 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6cde0 gate 1598907065372372000 evaluation succeeds +peer0.org2.example.com | [836 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [837 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [838 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [839 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [83a 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:51286 +peer0.org2.example.com | [83b 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:51286 +peer0.org2.example.com | [83c 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [83d 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [83e 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [83f 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [840 08-31 20:51:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [841 08-31 20:51:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [842 08-31 20:51:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [843 08-31 20:51:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [844 08-31 20:51:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [845 08-31 20:51:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [846 08-31 20:51:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [847 08-31 20:51:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [848 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org2.example.com | [849 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org2.example.com | [84a 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [84b 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [84c 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161013 +peer0.org2.example.com | [84d 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [84e 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [84f 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [850 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 11168603A9C2F909DA67B332D155F8E95DECDBA272BF7C1882C40138AF3EEEB8 +peer0.org2.example.com | [851 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [852 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [853 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [854 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [855 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [856 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161014 +peer0.org2.example.com | [857 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CB774982DF02610272888E817283A8264055F1DD5BCD7A300681F24A19AB60FE +peer0.org2.example.com | [858 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [859 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [85a 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [85b 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [85c 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [85e 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [85f 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [860 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [861 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [85d 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [862 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [863 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [864 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [865 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [866 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [867 08-31 20:51:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [868 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer0.org2.example.com | [869 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [86a 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer0.org2.example.com | [86b 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [86c 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb 77 49 82 df 02 61 02 72 88 8e 81 72 83 a8 26 |.wI...a.r...r..&| +peer0.org2.example.com | 00000010 40 55 f1 dd 5b cd 7a 30 06 81 f2 4a 19 ab 60 fe |@U..[.z0...J..`.| +peer0.org2.example.com | [86d 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 d6 75 03 22 db e7 7f b6 0c 45 57 |0D. h.u.".....EW| +peer0.org2.example.com | 00000010 33 14 47 82 79 65 68 d2 2d 67 7a c0 03 2c cf f9 |3.G.yeh.-gz..,..| +peer0.org2.example.com | 00000020 87 c1 0e af 02 20 0e 51 64 e0 1e 68 06 33 78 3b |..... .Qd..h.3x;| +peer0.org2.example.com | 00000030 21 c8 9b ec 7d 38 1e 6b a0 93 0a d6 49 6a 20 a0 |!...}8.k....Ij .| +peer0.org2.example.com | 00000040 2c 5f 3d cf 1d 39 |,_=..9| +peer0.org2.example.com | [86e 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [86f 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 35 ae ed 63 25 e3 00 cb 27 fe |0E.!..5..c%...'.| +peer0.org2.example.com | 00000010 32 e4 c8 d3 7e c4 14 58 52 af 2b d8 61 bc c0 6b |2...~..XR.+.a..k| +peer0.org2.example.com | 00000020 2b 2a 89 64 fb 02 20 05 fe 18 41 4d 80 70 e7 99 |+*.d.. ...AM.p..| +peer0.org2.example.com | 00000030 f9 26 7b dc ed 96 31 0c b2 49 b6 aa 53 89 c5 4c |.&{...1..I..S..L| +peer0.org2.example.com | 00000040 86 7e d6 be 63 b7 dc |.~..c..| +peer0.org2.example.com | [870 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [871 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [872 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [873 08-31 20:51:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [874 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [875 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [876 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [877 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [878 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [879 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 16 86 03 a9 c2 f9 09 da 67 b3 32 d1 55 f8 e9 |.........g.2.U..| +peer0.org2.example.com | 00000010 5d ec db a2 72 bf 7c 18 82 c4 01 38 af 3e ee b8 |]...r.|....8.>..| +peer1.org2.example.com | [771 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [772 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [773 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [774 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [775 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [776 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [777 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [778 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [779 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [77a 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [77b 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [77c 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [77d 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer1.org2.example.com | [77e 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [77f 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." > alive: +peer1.org2.example.com | [780 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [781 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [782 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [783 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [784 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [785 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [786 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [787 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [788 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org2.example.com | [789 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:00.832 UTC [common.configtx] addToMap -> DEBU 8e4 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-08-31 20:51:00.832 UTC [common.configtx] addToMap -> DEBU 8e5 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-08-31 20:51:00.832 UTC [common.configtx] addToMap -> DEBU 8e6 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +orderer0.example.com | "2020-08-31 20:51:00.832 UTC [common.configtx] addToMap -> DEBU 8e7 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-08-31 20:51:00.832 UTC [common.configtx] addToMap -> DEBU 8e8 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:51:00.833 UTC [common.configtx] addToMap -> DEBU 8e9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-08-31 20:51:00.833 UTC [common.configtx] addToMap -> DEBU 8ea Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-08-31 20:51:00.833 UTC [common.configtx] addToMap -> DEBU 8eb Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-08-31 20:51:00.833 UTC [common.configtx] addToMap -> DEBU 8ec Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-08-31 20:51:00.833 UTC [common.configtx] addToMap -> DEBU 8ed Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-08-31 20:51:00.833 UTC [common.configtx] addToMap -> DEBU 8ee Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-08-31 20:51:00.834 UTC [common.configtx] addToMap -> DEBU 8ef Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-08-31 20:51:00.834 UTC [common.configtx] addToMap -> DEBU 8f0 Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-08-31 20:51:00.834 UTC [orderer.consensus.etcdraft] propose -> INFO 8f1 Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:51:00.835 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 8f2 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:51:00.836 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 8f3 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:50752" +orderer0.example.com | "2020-08-31 20:51:00.836 UTC [orderer.consensus.etcdraft] 2 -> DEBU 8f4 Proposed block [1] to raft consensus" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:51:00.838 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8f5 Sending msg of 27267 bytes to 2 on channel businesschannel took 17.8µs" +orderer0.example.com | "2020-08-31 20:51:00.839 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8f6 Sending msg of 27267 bytes to 3 on channel businesschannel took 14µs" +orderer0.example.com | "2020-08-31 20:51:00.839 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8f7 Send of ConsensusRequest for channel businesschannel with payload of size 27267 to orderer1.example.com(orderer1.example.com:7050) took 101.5µs " +orderer0.example.com | "2020-08-31 20:51:00.839 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8f8 Send of ConsensusRequest for channel businesschannel with payload of size 27267 to orderer2.example.com(orderer2.example.com:7050) took 91.1µs " +orderer0.example.com | "2020-08-31 20:51:00.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 8f9 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:00.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8fa Sending msg of 28 bytes to 2 on channel businesschannel took 13.2µs" +orderer0.example.com | "2020-08-31 20:51:00.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8fb Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" +orderer0.example.com | "2020-08-31 20:51:00.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8fc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.4µs " +orderer0.example.com | "2020-08-31 20:51:00.842 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 8fd Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 +orderer0.example.com | "2020-08-31 20:51:00.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.8µs " +orderer0.example.com | "2020-08-31 20:51:00.842 UTC [common.configtx] addToMap -> DEBU 8ff Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-08-31 20:51:00.842 UTC [common.configtx] addToMap -> DEBU 900 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.842 UTC [common.configtx] addToMap -> DEBU 901 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.842 UTC [common.configtx] addToMap -> DEBU 902 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-08-31 20:51:00.842 UTC [common.configtx] addToMap -> DEBU 903 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:51:00.842 UTC [common.configtx] addToMap -> DEBU 904 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-08-31 20:51:00.842 UTC [common.configtx] addToMap -> DEBU 905 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:51:00.842 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-08-31 20:51:00.842 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [common.configtx] addToMap -> DEBU 908 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [common.configtx] addToMap -> DEBU 909 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [common.configtx] addToMap -> DEBU 90a Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [common.configtx] addToMap -> DEBU 90b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [common.configtx] addToMap -> DEBU 90c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [common.configtx] addToMap -> DEBU 90d Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [common.configtx] verifyDeltaSet -> DEBU 90e Processing change to key: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [common.configtx] policyForItem -> DEBU 90f Getting policy for item Org1MSP with mod_policy Admins" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 910 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 911 Manager Channel has managers Application" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 912 Manager Channel has managers Orderer" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 913 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 914 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 915 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 916 Manager Channel/Application looking up path [Org1MSP]" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 917 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 918 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 919 Manager Channel/Application/Org1MSP looking up path []" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [policies] Evaluate -> DEBU 91a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [cauthdsl] func1 -> DEBU 91b 0xc000cb8180 gate 1598907060843553900 evaluation starts" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [cauthdsl] func2 -> DEBU 91c 0xc000cb8180 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [cauthdsl] func2 -> DEBU 91d 0xc000cb8180 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [cauthdsl] func2 -> DEBU 91e 0xc000cb8180 principal matched by identity 0" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [msp.identity] Verify -> DEBU 91f Verify: digest = 00000000 0a 6a 5e 90 37 00 25 29 cc 2f 3d ec 44 8f 23 98 |.j^.7.%)./=.D.#.| +orderer0.example.com | 00000010 40 21 8f 78 1d c2 88 4f 31 16 8b 9b 25 00 fb 20 |@!.x...O1...%.. |" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [msp.identity] Verify -> DEBU 920 Verify: sig = 00000000 30 44 02 20 0d d5 10 d0 47 15 e1 14 bb 9f dc b9 |0D. ....G.......| +orderer0.example.com | 00000010 21 20 fe 43 aa a5 85 eb 20 91 d3 d3 25 c3 40 6f |! .C.... ...%.@o| +orderer0.example.com | 00000020 be ec 7e 52 02 20 3f 97 e3 ab d5 5a 98 c6 78 08 |..~R. ?....Z..x.| +orderer0.example.com | 00000030 e3 1a 1c 9b 18 c4 79 e9 08 26 b7 2a 98 01 0e 55 |......y..&.*...U| +orderer0.example.com | 00000040 0c af 35 37 61 76 |..57av|" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [cauthdsl] func2 -> DEBU 921 0xc000cb8180 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [cauthdsl] func1 -> DEBU 922 0xc000cb8180 gate 1598907060843553900 evaluation succeeds" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [policies] Evaluate -> DEBU 923 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [policies] Evaluate -> DEBU 924 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:51:00.843 UTC [common.configtx] verifyDeltaSet -> DEBU 925 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-08-31 20:51:00.844 UTC [common.configtx] recurseConfigMap -> DEBU 926 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.844 UTC [common.configtx] recurseConfigMap -> DEBU 927 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.844 UTC [common.configtx] recurseConfigMap -> DEBU 928 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.845 UTC [orderer.common.cluster.step] handleMessage -> DEBU 929 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:00.844 UTC [common.configtx] recurseConfigMap -> DEBU 92a Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 92b Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 92c Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 92d Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 92e Setting policy for key Admins to " +orderer0.example.com | "2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 92f Setting policy for key Readers to " +orderer0.example.com | "2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 930 Setting policy for key Writers to " +orderer0.example.com | "2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 931 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 932 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 933 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 934 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 935 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 936 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 937 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 938 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 939 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.846 UTC [orderer.common.cluster.step] handleMessage -> DEBU 93a Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:00.847 UTC [common.configtx] recurseConfigMap -> DEBU 93b Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.847 UTC [common.configtx] recurseConfigMap -> DEBU 93c Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.849 UTC [common.configtx] recurseConfigMap -> DEBU 93d Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:00.850 UTC [common.channelconfig] NewStandardValues -> DEBU 93e Initializing protos for *channelconfig.ChannelProtos" +orderer0.example.com | "2020-08-31 20:51:00.850 UTC [common.channelconfig] initializeProtosStruct -> DEBU 93f Processing field: HashingAlgorithm" +orderer0.example.com | "2020-08-31 20:51:00.850 UTC [common.channelconfig] initializeProtosStruct -> DEBU 940 Processing field: BlockDataHashingStructure" +orderer0.example.com | "2020-08-31 20:51:00.852 UTC [common.channelconfig] initializeProtosStruct -> DEBU 941 Processing field: OrdererAddresses" +orderer0.example.com | "2020-08-31 20:51:00.852 UTC [common.channelconfig] initializeProtosStruct -> DEBU 942 Processing field: Consortium" +orderer0.example.com | "2020-08-31 20:51:00.853 UTC [common.channelconfig] initializeProtosStruct -> DEBU 943 Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:51:00.853 UTC [common.channelconfig] NewStandardValues -> DEBU 944 Initializing protos for *channelconfig.OrdererProtos" +orderer0.example.com | "2020-08-31 20:51:00.853 UTC [common.channelconfig] initializeProtosStruct -> DEBU 945 Processing field: ConsensusType" +orderer0.example.com | "2020-08-31 20:51:00.854 UTC [common.channelconfig] initializeProtosStruct -> DEBU 946 Processing field: BatchSize" +orderer0.example.com | "2020-08-31 20:51:00.855 UTC [common.channelconfig] initializeProtosStruct -> DEBU 947 Processing field: BatchTimeout" +orderer0.example.com | "2020-08-31 20:51:00.855 UTC [common.channelconfig] initializeProtosStruct -> DEBU 948 Processing field: KafkaBrokers" +orderer0.example.com | "2020-08-31 20:51:00.856 UTC [common.channelconfig] initializeProtosStruct -> DEBU 949 Processing field: ChannelRestrictions" +orderer0.example.com | "2020-08-31 20:51:00.856 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94a Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:51:00.857 UTC [common.channelconfig] NewStandardValues -> DEBU 94b Initializing protos for *channelconfig.OrdererOrgProtos" +orderer0.example.com | "2020-08-31 20:51:00.857 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94c Processing field: Endpoints" +orderer0.example.com | "2020-08-31 20:51:00.857 UTC [common.channelconfig] NewStandardValues -> DEBU 94d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:51:00.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94e Processing field: MSP" +orderer0.example.com | "2020-08-31 20:51:00.858 UTC [common.deliver] Handle -> WARN 94f Error reading from 172.18.0.9:50750: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-08-31 20:51:00.858 UTC [orderer.common.server] func1 -> DEBU 950 Closing Deliver stream" +orderer0.example.com | "2020-08-31 20:51:00.858 UTC [common.channelconfig] validateMSP -> DEBU 951 Setting up MSP for org OrdererOrg" +orderer0.example.com | "2020-08-31 20:51:00.858 UTC [comm.grpc.server] 1 -> INFO 952 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50750 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=106.4078ms +orderer0.example.com | "2020-08-31 20:51:00.859 UTC [msp] newBccspMsp -> DEBU 953 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:51:00.860 UTC [msp] New -> DEBU 954 Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:51:00.860 UTC [orderer.common.cluster.step] handleMessage -> DEBU 957 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:00.860 UTC [msp] Setup -> DEBU 958 Setting up MSP instance OrdererMSP" +orderer0.example.com | "2020-08-31 20:51:00.860 UTC [grpc] warningf -> DEBU 956 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:50752: read: connection reset by peer" +orderer0.example.com | "2020-08-31 20:51:00.861 UTC [orderer.common.broadcast] Handle -> WARN 959 Error reading from 172.18.0.9:50752: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-08-31 20:51:00.861 UTC [orderer.common.server] func1 -> DEBU 95a Closing Broadcast stream" +orderer0.example.com | "2020-08-31 20:51:00.862 UTC [comm.grpc.server] 1 -> INFO 95b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:50752 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=92.3427ms +orderer0.example.com | "2020-08-31 20:51:00.860 UTC [grpc] infof -> DEBU 955 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-08-31 20:51:00.862 UTC [grpc] infof -> DEBU 95c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-08-31 20:51:00.862 UTC [msp.identity] newIdentity -> DEBU 95d Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +orderer0.example.com | nw== +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:51:00.867 UTC [common.channelconfig] NewStandardValues -> DEBU 95e Initializing protos for *channelconfig.ApplicationProtos" +orderer0.example.com | "2020-08-31 20:51:00.867 UTC [common.channelconfig] initializeProtosStruct -> DEBU 95f Processing field: ACLs" +orderer0.example.com | "2020-08-31 20:51:00.867 UTC [common.channelconfig] initializeProtosStruct -> DEBU 960 Processing field: Capabilities" +orderer0.example.com | "2020-08-31 20:51:00.868 UTC [common.channelconfig] NewStandardValues -> DEBU 961 Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-08-31 20:51:00.868 UTC [common.channelconfig] initializeProtosStruct -> DEBU 962 Processing field: AnchorPeers" +orderer0.example.com | "2020-08-31 20:51:00.868 UTC [common.channelconfig] NewStandardValues -> DEBU 963 Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:51:00.868 UTC [common.channelconfig] initializeProtosStruct -> DEBU 964 Processing field: MSP" +orderer0.example.com | "2020-08-31 20:51:00.869 UTC [common.channelconfig] Validate -> DEBU 965 Anchor peers for org Org2MSP are " +orderer0.example.com | "2020-08-31 20:51:00.869 UTC [common.channelconfig] validateMSP -> DEBU 966 Setting up MSP for org Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.869 UTC [msp] newBccspMsp -> DEBU 967 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:51:00.870 UTC [msp] New -> DEBU 968 Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:51:00.871 UTC [msp] Setup -> DEBU 969 Setting up MSP instance Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.874 UTC [msp.identity] newIdentity -> DEBU 96a Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | [6a4 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org1.example.com | [6a5 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org1.example.com | [6a6 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org1.example.com | [6a7 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org1.example.com | [6a8 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org1.example.com | [6a9 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer0.org1.example.com | [6aa 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org1.example.com | [6ab 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [6ac 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [6ad 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [6ae 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [6af 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [6b0 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [6b1 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [6b2 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [6b3 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ed90 gate 1598907064009977200 evaluation starts +peer0.org1.example.com | [6b4 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ed90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [6b5 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ed90 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [6b6 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ed90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [6b7 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ed90 principal evaluation fails +peer0.org1.example.com | [6b8 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ed90 gate 1598907064009977200 evaluation fails +peer0.org1.example.com | [6b9 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [6ba 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [6bb 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [6bc 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026cad50 gate 1598907064011561000 evaluation starts +peer0.org1.example.com | [6bd 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026cad50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [6be 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026cad50 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [6bf 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [6c0 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [6c1 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [6c2 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026cad50 principal matched by identity 0 +peer0.org1.example.com | [6c3 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 2d 0f 93 fa 5a 38 ea 1e a6 97 9b 85 21 70 63 |.-...Z8......!pc| +peer0.org1.example.com | 00000010 6d cc 60 e1 07 c2 ed a8 09 44 22 22 bd 46 b1 10 |m.`......D"".F..| +peer0.org1.example.com | [6c4 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b a9 f8 b1 8d 68 b8 c3 5a 96 2e d2 |0D. k....h..Z...| +peer0.org1.example.com | 00000010 4d 57 70 40 2f 28 0c 43 57 5f c2 00 c3 7d f0 87 |MWp@/(.CW_...}..| +peer0.org1.example.com | 00000020 a9 76 21 13 02 20 76 bd 5e 18 6f e2 bd 3d 0e e4 |.v!.. v.^.o..=..| +peer0.org1.example.com | 00000030 68 62 d6 ef 08 e3 5d 5c eb 6b c4 b5 f3 9d 3b 8c |hb....]\.k....;.| +peer0.org1.example.com | 00000040 d3 68 59 f1 33 fd |.hY.3.| +peer0.org1.example.com | [6c5 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026cad50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [6c6 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026cad50 gate 1598907064011561000 evaluation succeeds +peer0.org1.example.com | [6c7 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [6c8 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [6c9 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [6ca 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [6cb 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +peer0.org1.example.com | [6cc 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +peer0.org1.example.com | [6cd 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer0.org1.example.com | [6ce 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [6cf 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [6d0 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [6d1 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer0.org1.example.com | [6d2 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [6d3 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002783410, CONNECTING +peer0.org1.example.com | [6d4 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer0.org1.example.com | [6d6 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer for channel businesschannel with same endpoint, skipping connecting to myself +peer0.org1.example.com | [6d5 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002783410, READY +peer0.org1.example.com | [6d7 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org1.example.com | [6d8 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org1.example.com | [6d9 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [6da 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [6db 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [6dc 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:7051 +peer0.org1.example.com | [6dd 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:7051 +peer0.org1.example.com | [6de 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [6df 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [6e0 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer0.org1.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer0.org1.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer0.org1.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [6e1 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [6e2 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [6e3 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [6e4 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [6e5 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [6e6 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [6e7 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [6e8 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [6e9 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [6ea 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [6eb 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [6ec 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [6ed 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [6ee 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e530 gate 1598907064034128300 evaluation starts +peer0.org1.example.com | [6ef 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e530 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [6f0 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e530 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [6f1 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org1.example.com | [6f2 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [6f3 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [6f4 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e530 principal matched by identity 0 +peer0.org1.example.com | [6f5 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [6f6 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c e1 48 1b a9 bc f5 4d 2f 45 ed 0d |0D. L.H....M/E..| +peer0.org1.example.com | 00000010 b7 2e 15 c3 f9 10 6b 7b 5c e9 06 76 60 80 68 28 |......k{\..v`.h(| +peer0.org1.example.com | 00000020 46 da 77 59 02 20 55 42 62 69 81 fe 3b 56 b9 14 |F.wY. UBbi..;V..| +peer0.org1.example.com | 00000030 7f cc 49 69 60 29 0a e8 fc 25 a4 65 39 a9 5f cc |..Ii`)...%.e9._.| +peer0.org1.example.com | 00000040 c7 40 3d 66 5c 29 |.@=f\)| +peer0.org1.example.com | [6f7 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e530 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [6f8 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e530 gate 1598907064034128300 evaluation succeeds +peer0.org1.example.com | [6f9 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [6fa 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [6fb 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [6fc 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [6fd 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer0.org1.example.com | [6fe 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [6ff 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [700 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161011 +peer0.org1.example.com | [701 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 82EE7B72F478CE93CDCB23149144A8B1CAD1C3091F1DCB186D90BCF0B618ED0A +peer0.org1.example.com | [702 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [703 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [7de 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [7e0 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [7e1 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [7e2 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [7e3 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [7e4 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [7e5 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027e9cf0 gate 1598907064202327600 evaluation starts +peer1.org1.example.com | [7e6 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027e9cf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [7e7 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027e9cf0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [7e8 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027e9cf0 principal matched by identity 0 +peer1.org1.example.com | [7e9 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 2e e4 89 b9 81 19 76 dd 41 80 da 2a 67 84 fd |P......v.A..*g..| +peer1.org1.example.com | 00000010 7e c3 3c 00 ef f3 d8 ed 6d 02 28 46 35 82 fd 01 |~.<.....m.(F5...| +peer1.org1.example.com | [7ea 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b fb ec 1e 5e bd 7f 28 24 c1 31 1b |0D. ....^..($.1.| +peer1.org1.example.com | 00000010 b0 dc 4e 24 33 24 b0 45 76 af c2 2c 01 63 b7 54 |..N$3$.Ev..,.c.T| +peer1.org1.example.com | 00000020 5a 5f 5f 8e 02 20 2f c2 21 e4 eb 53 8d 07 f4 56 |Z__.. /.!..S...V| +peer1.org1.example.com | 00000030 fd 6e 90 22 e6 3d c9 ad ac 93 63 33 33 f1 20 2e |.n.".=....c33. .| +peer1.org1.example.com | 00000040 f5 29 06 76 35 7b |.).v5{| +peer1.org1.example.com | [7eb 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027e9cf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [7ec 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027e9cf0 gate 1598907064202327600 evaluation succeeds +peer1.org1.example.com | [7ed 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [7ee 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [7ef 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [7f0 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [7df 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 42ms (state_validation=10ms block_and_pvtdata_commit=20ms state_commit=8ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +peer1.org1.example.com | [7f1 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [7f2 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [7f3 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +peer1.org1.example.com | [7f4 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408D8CA91B5F7AF9D9816...387B0008A61A99B98BA4E6D12A020803 +peer1.org1.example.com | [7f5 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BC885E528EECD4252BB900777A4901AE208E816A8CE8E1430730AD9BC553C8D3 +peer1.org1.example.com | [7f6 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [7f7 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7f8 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7f9 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +peer1.org1.example.com | [7fa 08-31 20:51:04.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7fb 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [7fc 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [7fd 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [7fe 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [7ff 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org1.example.com | [800 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [801 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [802 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [803 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [804 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [805 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [806 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [807 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [808 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [809 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [80a 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [80b 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [80c 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [80d 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [80e 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [80f 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [810 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [811 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0029d2720, CONNECTING +peer1.org1.example.com | [812 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [813 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161016 +peer1.org1.example.com | [814 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F7672B547C629E9A8D1A619C2EF99378FBCABE63BE09EE0334853CF94463667A +peer1.org1.example.com | [815 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [816 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [817 08-31 20:51:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [818 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [819 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [81a 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161017 +peer1.org1.example.com | [81b 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E3A16E8E0A842F6E0B582E7448A31DA5C942D463E96722A566E92FCFE9BDFBE6 +peer1.org1.example.com | [81c 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [81d 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [81e 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [81f 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [820 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [821 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [78a 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [78b 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [78c 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [78d 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [78e 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [78f 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [790 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d6b0 gate 1598907065805227200 evaluation starts +peer1.org2.example.com | [791 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d6b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [792 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d6b0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [793 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d6b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [794 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d6b0 principal evaluation fails +peer1.org2.example.com | [795 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d6b0 gate 1598907065805227200 evaluation fails +peer1.org2.example.com | [796 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [797 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [798 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [799 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0dc20 gate 1598907065805620600 evaluation starts +peer1.org2.example.com | [79a 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0dc20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [79b 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0dc20 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [79c 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0dc20 principal matched by identity 0 +peer1.org2.example.com | [79d 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [79e 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [79f 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0dc20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [7a0 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0dc20 gate 1598907065805620600 evaluation succeeds +peer1.org2.example.com | [7a1 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [7a2 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [7a3 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [7a4 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [7a5 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7a6 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7a7 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [7a8 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [7a9 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [7aa 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [7ab 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [7ac 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a48810 gate 1598907065809931300 evaluation starts +peer1.org2.example.com | [7ad 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a48810 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [7ae 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a48810 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [7af 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a48810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [7b0 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a48810 principal evaluation fails +peer1.org2.example.com | [7b1 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a48810 gate 1598907065809931300 evaluation fails +peer1.org2.example.com | [7b2 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [7b3 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org2.example.com | [7b4 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:51:00.876 UTC [common.channelconfig] NewStandardValues -> DEBU 96b Initializing protos for *channelconfig.ApplicationOrgProtos" +orderer0.example.com | "2020-08-31 20:51:00.876 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96c Processing field: AnchorPeers" +peer1.org1.example.com | [822 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [823 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [824 08-31 20:51:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [825 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [826 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [827 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [828 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [829 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [82a 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [82b 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [82c 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [82d 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [82e 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [82f 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 1, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [830 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [831 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 a1 6e 8e 0a 84 2f 6e 0b 58 2e 74 48 a3 1d a5 |..n.../n.X.tH...| +peer1.org1.example.com | 00000010 c9 42 d4 63 e9 67 22 a5 66 e9 2f cf e9 bd fb e6 |.B.c.g".f./.....| +peer1.org1.example.com | [832 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e e3 2c 3b ae 3d 43 bb 64 bb 66 cb |0D. ..,;.=C.d.f.| +peer1.org1.example.com | 00000010 3d 4c 23 e1 e0 3c 37 ee 10 9b 88 eb e7 d3 0a e0 |=L#..<7.........| +peer1.org1.example.com | 00000020 30 99 40 64 02 20 26 89 16 12 13 cf 5f bc f4 b3 |0.@d. &....._...| +peer1.org1.example.com | 00000030 dd 90 3b 09 8c 38 a2 16 ad 94 f3 ef 32 3f be e4 |..;..8......2?..| +peer1.org1.example.com | 00000040 96 81 f6 d1 25 38 |....%8| +peer1.org1.example.com | [833 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [834 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [835 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [836 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org1.example.com | [837 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [838 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [839 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [83a 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [83b 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [83c 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [83d 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [83e 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [83f 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b13fe0 gate 1598907065316502100 evaluation starts +peer1.org1.example.com | [840 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b13fe0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [841 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b13fe0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [842 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b13fe0 principal matched by identity 0 +peer1.org1.example.com | [843 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0029d2720, READY +peer1.org1.example.com | [844 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 2e e4 89 b9 81 19 76 dd 41 80 da 2a 67 84 fd |P......v.A..*g..| +peer1.org1.example.com | 00000010 7e c3 3c 00 ef f3 d8 ed 6d 02 28 46 35 82 fd 01 |~.<.....m.(F5...| +peer1.org1.example.com | [845 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b fb ec 1e 5e bd 7f 28 24 c1 31 1b |0D. ....^..($.1.| +peer1.org1.example.com | 00000010 b0 dc 4e 24 33 24 b0 45 76 af c2 2c 01 63 b7 54 |..N$3$.Ev..,.c.T| +peer1.org1.example.com | 00000020 5a 5f 5f 8e 02 20 2f c2 21 e4 eb 53 8d 07 f4 56 |Z__.. /.!..S...V| +peer1.org1.example.com | 00000030 fd 6e 90 22 e6 3d c9 ad ac 93 63 33 33 f1 20 2e |.n.".=....c33. .| +peer1.org1.example.com | 00000040 f5 29 06 76 35 7b |.).v5{| +peer1.org1.example.com | [846 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b13fe0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [847 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b13fe0 gate 1598907065316502100 evaluation succeeds +peer1.org1.example.com | [848 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [849 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [84a 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [84b 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [84c 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [84d 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [84e 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [84f 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 ee 7b 72 f4 78 ce 93 cd cb 23 14 91 44 a8 b1 |..{r.x....#..D..| +peer1.org1.example.com | 00000010 ca d1 c3 09 1f 1d cb 18 6d 90 bc f0 b6 18 ed 0a |........m.......| +peer1.org1.example.com | [850 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 54 00 e9 d9 95 16 75 e4 02 b0 83 |0D. .T.....u....| +peer1.org1.example.com | 00000010 95 cf 52 86 07 f2 ae 92 7c d6 3a c9 15 3c 1b 5e |..R.....|.:..<.^| +peer1.org1.example.com | 00000020 37 7a 5d 53 02 20 6f 65 cb 88 cc ec dc 94 ea c7 |7z]S. oe........| +peer1.org1.example.com | 00000030 f5 09 51 14 98 c3 6c 80 57 78 c8 6a 12 ce 3e 3f |..Q...l.Wx.j..>?| +peer1.org1.example.com | 00000040 00 38 1c aa 13 c7 |.8....| +peer1.org1.example.com | [851 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[]}, deadMembers={[]} +peer1.org1.example.com | [852 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [853 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [854 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [855 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org1.example.com | [856 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org1.example.com | [857 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:7051 +peer1.org1.example.com | [858 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org1.example.com | [859 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [85a 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 1c 7d 20 cb 11 55 46 f8 5b e2 |0E.!...} ..UF.[.| +peer1.org1.example.com | 00000010 61 d1 3a 37 bc 8b 64 6f 92 64 08 1f e5 e9 42 06 |a.:7..do.d....B.| +peer1.org1.example.com | 00000020 ed 70 2e e9 95 02 20 7e d2 46 b3 55 e0 94 00 4d |.p.... ~.F.U...M| +peer1.org1.example.com | 00000030 6c e2 42 6e 81 c2 92 15 7a 03 b8 5d 25 3b 43 01 |l.Bn....z..]%;C.| +peer1.org1.example.com | 00000040 a0 9c 8d 07 b8 be 6f |......o| +peer1.org1.example.com | [85b 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer1.org1.example.com | [85c 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [85d 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [85e 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [85f 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [860 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [861 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [862 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [863 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +peer1.org1.example.com | [864 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [865 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer1.org1.example.com | [866 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer1.org1.example.com | [867 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [868 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer1.org1.example.com | [869 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [86a 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 a1 6e 8e 0a 84 2f 6e 0b 58 2e 74 48 a3 1d a5 |..n.../n.X.tH...| +peer1.org1.example.com | 00000010 c9 42 d4 63 e9 67 22 a5 66 e9 2f cf e9 bd fb e6 |.B.c.g".f./.....| +peer1.org1.example.com | [86b 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e e3 2c 3b ae 3d 43 bb 64 bb 66 cb |0D. ..,;.=C.d.f.| +peer1.org1.example.com | 00000010 3d 4c 23 e1 e0 3c 37 ee 10 9b 88 eb e7 d3 0a e0 |=L#..<7.........| +peer1.org1.example.com | 00000020 30 99 40 64 02 20 26 89 16 12 13 cf 5f bc f4 b3 |0.@d. &....._...| +peer1.org1.example.com | 00000030 dd 90 3b 09 8c 38 a2 16 ad 94 f3 ef 32 3f be e4 |..;..8......2?..| +peer1.org1.example.com | 00000040 96 81 f6 d1 25 38 |....%8| +peer1.org1.example.com | [86c 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [86d 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 7d 22 b0 05 20 c2 9a 61 22 34 90 |0D. U}".. ..a"4.| +peer1.org1.example.com | 00000010 3b 00 f2 55 41 27 cf a3 4f b3 68 07 24 7d ce d6 |;..UA'..O.h.$}..| +peer1.org1.example.com | 00000020 32 1f 00 ed 02 20 57 b4 96 70 3b b4 71 03 8a 98 |2.... W..p;.q...| +peer1.org1.example.com | 00000030 2d e3 85 ed ad 53 23 87 1a 20 6d fb eb cf fd a3 |-....S#.. m.....| +peer1.org1.example.com | 00000040 3f ac 55 0d 6a 77 |?.U.jw| +peer1.org1.example.com | [86e 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [86f 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [870 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [871 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [872 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [873 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [874 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [875 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [876 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [877 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [878 08-31 20:51:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [879 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [87a 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [87b 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [87c 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [87d 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [87e 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [87f 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [880 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [881 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [882 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [883 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [884 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [885 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6c020 gate 1598907065485113700 evaluation starts +peer1.org1.example.com | [886 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6c020 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [887 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6c020 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [888 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6c020 principal matched by identity 0 +peer1.org1.example.com | [889 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 16 86 03 a9 c2 f9 09 da 67 b3 32 d1 55 f8 e9 |.........g.2.U..| +peer1.org1.example.com | 00000010 5d ec db a2 72 bf 7c 18 82 c4 01 38 af 3e ee b8 |]...r.|....8.>..| +peer1.org1.example.com | [88a 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 1c 3f df 9d c6 bb 74 0b 35 7b 46 |0D. M.?....t.5{F| +peer1.org1.example.com | 00000010 1b 7d 4e 16 2b 4c fb 26 e8 af 49 12 79 5f 30 59 |.}N.+L.&..I.y_0Y| +peer1.org1.example.com | 00000020 c2 64 2d 3c 02 20 36 40 3d e0 ff 09 4c e4 bf 12 |.d-<. 6@=...L...| +peer1.org1.example.com | 00000030 92 1b c0 99 9b d1 9b c5 ce 14 0c bf 18 be 6d 1e |..............m.| +peer1.org1.example.com | 00000040 de 3c 61 a0 d3 7e |. DEBU 0xc002c6c020 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [88c 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6c020 gate 1598907065485113700 evaluation succeeds +peer1.org1.example.com | [88d 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [88e 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [88f 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [890 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [891 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [892 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [87a 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 1c 3f df 9d c6 bb 74 0b 35 7b 46 |0D. M.?....t.5{F| +peer0.org2.example.com | 00000010 1b 7d 4e 16 2b 4c fb 26 e8 af 49 12 79 5f 30 59 |.}N.+L.&..I.y_0Y| +peer0.org2.example.com | 00000020 c2 64 2d 3c 02 20 36 40 3d e0 ff 09 4c e4 bf 12 |.d-<. 6@=...L...| +peer0.org2.example.com | 00000030 92 1b c0 99 9b d1 9b c5 ce 14 0c bf 18 be 6d 1e |..............m.| +peer0.org2.example.com | 00000040 de 3c 61 a0 d3 7e |. DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [87c 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [87d 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [87e 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 485 bytes, Signature: 0 bytes +peer0.org2.example.com | [87f 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [881 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [880 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 485 bytes, Signature: 0 bytes +peer0.org2.example.com | [882 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [883 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [884 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [885 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [887 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [888 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [886 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [889 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [88a 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [88b 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [88c 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [88d 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5b540 gate 1598907065525420200 evaluation starts +peer0.org2.example.com | [88e 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5b540 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [88f 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5b540 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [890 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5b540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [891 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5b540 principal evaluation fails +peer0.org2.example.com | [892 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5b540 gate 1598907065525420200 evaluation fails +peer0.org2.example.com | [893 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [894 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [895 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [896 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5bac0 gate 1598907065526104600 evaluation starts +peer0.org2.example.com | [897 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5bac0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [898 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5bac0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [899 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5bac0 principal matched by identity 0 +peer0.org2.example.com | [89a 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 ee 7b 72 f4 78 ce 93 cd cb 23 14 91 44 a8 b1 |..{r.x....#..D..| +peer0.org2.example.com | 00000010 ca d1 c3 09 1f 1d cb 18 6d 90 bc f0 b6 18 ed 0a |........m.......| +peer0.org2.example.com | [89b 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 54 00 e9 d9 95 16 75 e4 02 b0 83 |0D. .T.....u....| +peer0.org2.example.com | 00000010 95 cf 52 86 07 f2 ae 92 7c d6 3a c9 15 3c 1b 5e |..R.....|.:..<.^| +peer0.org2.example.com | 00000020 37 7a 5d 53 02 20 6f 65 cb 88 cc ec dc 94 ea c7 |7z]S. oe........| +peer0.org2.example.com | 00000030 f5 09 51 14 98 c3 6c 80 57 78 c8 6a 12 ce 3e 3f |..Q...l.Wx.j..>?| +peer0.org2.example.com | 00000040 00 38 1c aa 13 c7 |.8....| +peer0.org2.example.com | [89c 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5bac0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [89d 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a5bac0 gate 1598907065526104600 evaluation succeeds +peer0.org2.example.com | [89e 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [89f 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [8a0 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [8a1 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [8a2 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [8a3 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8a4 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [8a5 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb 77 49 82 df 02 61 02 72 88 8e 81 72 83 a8 26 |.wI...a.r...r..&| +peer0.org2.example.com | 00000010 40 55 f1 dd 5b cd 7a 30 06 81 f2 4a 19 ab 60 fe |@U..[.z0...J..`.| +peer0.org2.example.com | [8a7 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8a6 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 d6 75 03 22 db e7 7f b6 0c 45 57 |0D. h.u.".....EW| +peer0.org2.example.com | 00000010 33 14 47 82 79 65 68 d2 2d 67 7a c0 03 2c cf f9 |3.G.yeh.-gz..,..| +peer0.org2.example.com | 00000020 87 c1 0e af 02 20 0e 51 64 e0 1e 68 06 33 78 3b |..... .Qd..h.3x;| +peer0.org2.example.com | 00000030 21 c8 9b ec 7d 38 1e 6b a0 93 0a d6 49 6a 20 a0 |!...}8.k....Ij .| +peer0.org2.example.com | 00000040 2c 5f 3d cf 1d 39 |,_=..9| +peer0.org2.example.com | [8a8 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [8a9 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [8aa 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8ab 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8ac 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [8ad 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8ae 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [8af 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [8b0 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [8b1 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8b2 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [8b3 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8b4 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8b5 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [8b6 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [8b7 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [8b8 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002165b0 gate 1598907065569669100 evaluation starts +peer0.org2.example.com | [8b9 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002165b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [8ba 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002165b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [8bb 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002165b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [8bc 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002165b0 principal evaluation fails +peer0.org2.example.com | [8bd 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002165b0 gate 1598907065569669100 evaluation fails +peer0.org2.example.com | [8be 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [8bf 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [8c0 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [8c1 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a6a70 gate 1598907065589709500 evaluation starts +peer0.org2.example.com | [8c2 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a6a70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [8c3 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a6a70 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [8c4 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a6a70 principal matched by identity 0 +peer0.org2.example.com | [8c5 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 df 23 9b a5 6a 7c 85 35 b0 95 5b 13 8e 7a 41 |..#..j|.5..[..zA| +orderer0.example.com | "2020-08-31 20:51:00.877 UTC [common.channelconfig] NewStandardValues -> DEBU 96d Initializing protos for *channelconfig.OrganizationProtos" +orderer0.example.com | "2020-08-31 20:51:00.877 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96e Processing field: MSP" +orderer0.example.com | "2020-08-31 20:51:00.878 UTC [common.channelconfig] Validate -> DEBU 96f Anchor peers for org Org1MSP are anchor_peers: " +orderer0.example.com | "2020-08-31 20:51:00.879 UTC [common.channelconfig] validateMSP -> DEBU 970 Setting up MSP for org Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.879 UTC [msp] newBccspMsp -> DEBU 971 Creating BCCSP-based MSP instance" +orderer0.example.com | "2020-08-31 20:51:00.879 UTC [msp] New -> DEBU 972 Creating Cache-MSP instance" +orderer0.example.com | "2020-08-31 20:51:00.879 UTC [msp] Setup -> DEBU 973 Setting up MSP instance Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.880 UTC [msp.identity] newIdentity -> DEBU 974 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:51:00.881 UTC [msp] Setup -> DEBU 975 Setting up the MSP manager (3 msps)" +orderer0.example.com | "2020-08-31 20:51:00.881 UTC [msp] Setup -> DEBU 976 MSP manager setup complete, setup 3 msps" +orderer0.example.com | "2020-08-31 20:51:00.882 UTC [policies] NewManagerImpl -> DEBU 977 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:51:00.882 UTC [policies] NewManagerImpl -> DEBU 978 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:51:00.882 UTC [policies] NewManagerImpl -> DEBU 979 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:51:00.882 UTC [policies] NewManagerImpl -> DEBU 97a Proposed new policy Readers for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:51:00.882 UTC [policies] NewManagerImpl -> DEBU 97b Proposed new policy Writers for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:51:00.882 UTC [policies] NewManagerImpl -> DEBU 97c Proposed new policy Admins for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:51:00.884 UTC [policies] NewManagerImpl -> DEBU 97d Proposed new policy BlockValidation for Channel/Orderer" +orderer0.example.com | "2020-08-31 20:51:00.884 UTC [policies] NewManagerImpl -> DEBU 97e Proposed new policy Writers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.885 UTC [policies] NewManagerImpl -> DEBU 97f Proposed new policy Admins for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.885 UTC [policies] NewManagerImpl -> DEBU 980 Proposed new policy Endorsement for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.885 UTC [policies] NewManagerImpl -> DEBU 981 Proposed new policy Readers for Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.886 UTC [policies] NewManagerImpl -> DEBU 982 Proposed new policy Admins for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.886 UTC [policies] NewManagerImpl -> DEBU 983 Proposed new policy Readers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.886 UTC [policies] NewManagerImpl -> DEBU 984 Proposed new policy Writers for Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.887 UTC [policies] NewManagerImpl -> DEBU 985 Proposed new policy Admins for Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.887 UTC [policies] GetPolicy -> DEBU 986 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:51:00.887 UTC [policies] NewManagerImpl -> DEBU 987 Proposed new policy LifecycleEndorsement for Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.887 UTC [policies] GetPolicy -> DEBU 988 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:51:00.888 UTC [policies] NewManagerImpl -> DEBU 989 Proposed new policy Endorsement for Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.888 UTC [policies] NewManagerImpl -> DEBU 98a Proposed new policy Readers for Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.888 UTC [policies] NewManagerImpl -> DEBU 98b Proposed new policy Writers for Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.889 UTC [policies] NewManagerImpl -> DEBU 98c Proposed new policy Writers for Channel" +orderer0.example.com | "2020-08-31 20:51:00.889 UTC [policies] NewManagerImpl -> DEBU 98d Proposed new policy Admins for Channel" +orderer0.example.com | "2020-08-31 20:51:00.890 UTC [policies] NewManagerImpl -> DEBU 98e Proposed new policy Readers for Channel" +orderer0.example.com | "2020-08-31 20:51:00.890 UTC [common.configtx] addToMap -> DEBU 98f Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-08-31 20:51:00.890 UTC [common.configtx] addToMap -> DEBU 990 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:51:00.891 UTC [common.configtx] addToMap -> DEBU 991 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.891 UTC [common.configtx] addToMap -> DEBU 992 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-08-31 20:51:00.891 UTC [common.configtx] addToMap -> DEBU 993 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-08-31 20:51:00.892 UTC [common.configtx] addToMap -> DEBU 994 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +orderer0.example.com | "2020-08-31 20:51:00.892 UTC [common.configtx] addToMap -> DEBU 995 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:51:00.892 UTC [common.configtx] addToMap -> DEBU 996 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-08-31 20:51:00.892 UTC [common.configtx] addToMap -> DEBU 997 Adding to config map: [Group] /Channel/Application/Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.893 UTC [common.configtx] addToMap -> DEBU 998 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +orderer0.example.com | "2020-08-31 20:51:00.893 UTC [common.configtx] addToMap -> DEBU 999 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +orderer0.example.com | "2020-08-31 20:51:00.893 UTC [common.configtx] addToMap -> DEBU 99a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +orderer0.example.com | "2020-08-31 20:51:00.893 UTC [common.configtx] addToMap -> DEBU 99b Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:51:00.893 UTC [common.configtx] addToMap -> DEBU 99c Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +orderer0.example.com | "2020-08-31 20:51:00.894 UTC [common.configtx] addToMap -> DEBU 99d Adding to config map: [Value] /Channel/Application/ACLs" +orderer0.example.com | "2020-08-31 20:51:00.894 UTC [common.configtx] addToMap -> DEBU 99e Adding to config map: [Value] /Channel/Application/Capabilities" +orderer0.example.com | "2020-08-31 20:51:00.894 UTC [common.configtx] addToMap -> DEBU 99f Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | [704 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [705 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [706 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [707 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:9492522150986590262 tag:EMPTY mem_req:?\0008\034\252\023\307" > > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [708 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:9492522150986590262 tag:EMPTY mem_req:?\0008\034\252\023\307" > > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [709 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [70a 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [70b 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [70c 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer0.org1.example.com | [70d 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [70e 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002ac5050, CONNECTING +peer0.org1.example.com | [70f 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org1.example.com | [710 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org1.example.com | [711 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org1.example.com | [712 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org1.example.com | [713 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org1.example.com | [714 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0026d3dc0 env 0xc0004c4d20 txn 0 +peer0.org1.example.com | [715 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [716 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 113ms +peer0.org1.example.com | [717 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [718 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [719 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org1.example.com | [71a 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +peer0.org1.example.com | [71b 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [71c 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [71d 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [71e 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +peer0.org1.example.com | [71f 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [720 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | [721 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org1.example.com | [722 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org1.example.com | [723 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [724 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org1.example.com | [725 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org1.example.com | [726 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002ac5050, READY +peer0.org1.example.com | [727 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [728 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [729 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [72a 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:7051 +peer0.org2.example.com | 00000010 0a a0 14 ea e5 9e 21 72 df 90 f3 47 d1 be e1 80 |......!r...G....| +peer0.org2.example.com | [8c6 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 eb e4 06 cf 12 30 36 e7 e3 c8 |0E.!.......06...| +peer0.org2.example.com | 00000010 cd 9e fe 53 d2 87 a2 b3 48 46 59 da 58 96 fa 72 |...S....HFY.X..r| +peer0.org2.example.com | 00000020 0c 73 41 95 3b 02 20 18 4e 90 1b c7 45 0a 2b ed |.sA.;. .N...E.+.| +peer0.org2.example.com | 00000030 4b 34 be 3e a1 98 c0 27 db 05 24 4f e4 2e a9 a5 |K4.>...'..$O....| +peer0.org2.example.com | 00000040 76 f5 9c 26 b5 d7 2e |v..&...| +peer0.org2.example.com | [8c7 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a6a70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [8c8 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a6a70 gate 1598907065589709500 evaluation succeeds +peer0.org2.example.com | [8c9 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [8ca 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [8cb 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [8cc 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [8cd 08-31 20:51:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [8ce 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes t: {1598907045534780300 19 {} [] 0} +peer0.org2.example.com | [8cf 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8d0 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8d2 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [8d3 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8d4 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8d5 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8d6 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [893 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [894 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [895 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [896 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [897 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [898 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [899 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [89a 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [89b 08-31 20:51:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [89c 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [89d 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [89e 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [89f 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8a0 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [8a1 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [8a2 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8a3 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [8a4 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [8a5 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8a6 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [8a7 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [8a8 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [8a9 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [8aa 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [8ab 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [8ac 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cf6f60 gate 1598907065495177600 evaluation starts +peer1.org1.example.com | [8ad 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cf6f60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [7b5 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [7b6 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a48d80 gate 1598907065825489500 evaluation starts +peer1.org2.example.com | [7b7 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a48d80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [7b8 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a48d80 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [7b9 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a48d80 principal matched by identity 0 +peer1.org2.example.com | [7ba 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [7bb 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [7bc 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a48d80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [7bd 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a48d80 gate 1598907065825489500 evaluation succeeds +peer1.org2.example.com | [7be 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [7bf 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [7c0 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [7c1 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [7c2 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7c3 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org2.example.com | [7c4 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7c5 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [7c6 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [7c7 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [7c8 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [7c9 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [7ca 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [7cb 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7cc 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [7cd 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7ce 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org2.example.com | [7cf 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7d0 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a68040 gate 1598907065829024800 evaluation starts +peer1.org2.example.com | [7d1 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a68040 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [7d2 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a68040 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [7d3 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a68040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [7d4 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a68040 principal evaluation fails +peer1.org2.example.com | [7d5 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a68040 gate 1598907065829024800 evaluation fails +peer1.org2.example.com | [7d6 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [7d7 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [7d8 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [7d9 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a685b0 gate 1598907065834509700 evaluation starts +peer1.org2.example.com | [7da 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a685b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [7db 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a685b0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [7dc 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a685b0 principal matched by identity 0 +peer1.org2.example.com | [7dd 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [7de 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [7df 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a685b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [7e0 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a685b0 gate 1598907065834509700 evaluation succeeds +peer1.org2.example.com | [7e1 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [7e2 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [7e3 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [7e4 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [7e5 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7e6 08-31 20:51:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to peer0.org2.example.com:7051 +peer1.org2.example.com | [7e7 08-31 20:51:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [7e8 08-31 20:51:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [7e9 08-31 20:51:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7ea 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13527294091339406941, Envelope: 962 bytes, Signature: 0 bytes +peer1.org2.example.com | [7eb 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13527294091339406941, Envelope: 962 bytes, Signature: 0 bytes +peer1.org2.example.com | [7ec 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 25 f6 22 1c d3 e4 fd 28 6d f6 b0 4b 35 35 b6 |.%."....(m..K55.| +peer1.org2.example.com | 00000010 b7 57 78 91 67 e7 fe 5a cf 4c 44 4e 25 37 10 23 |.Wx.g..Z.LDN%7.#| +peer1.org2.example.com | [7ed 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 08 73 47 bc f3 8c 1f 9f 8d bd |0E.!...sG.......| +peer1.org2.example.com | 00000010 52 c7 75 74 c8 ca c9 e7 5a 06 db ef 9f ab c9 6a |R.ut....Z......j| +peer1.org2.example.com | 00000020 2a 06 27 12 e5 02 20 57 7e 9f be cb 71 bb 2d f5 |*.'... W~...q.-.| +peer1.org2.example.com | 00000030 a1 a2 a0 f8 13 3e 6d 22 eb 81 2f 3a b2 ac 63 57 |.....>m"../:..cW| +peer1.org2.example.com | 00000040 cd 6a 32 a0 2d 76 78 |.j2.-vx| +peer1.org2.example.com | [7ee 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13527294091339406941, Envelope: 962 bytes, Signature: 0 bytes +peer1.org2.example.com | [7ef 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 77 114 85 53 109 108 114 103 84 49 82 104 120 79 108 113 83 65 121 80 83 99 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 70 102 72 121 75 118 101 70 56 113 81 10 52 54 73 90 51 80 88 97 97 57 49 118 101 113 83 111 97 99 98 86 119 52 69 80 106 120 111 47 118 43 70 105 86 50 50 108 101 86 114 86 80 98 88 47 109 82 86 104 69 52 86 67 78 51 69 122 113 49 109 112 43 66 79 81 10 83 80 110 55 109 77 86 43 74 50 50 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 67 110 50 107 48 100 57 99 113 107 109 97 75 87 79 54 122 51 114 55 49 101 65 115 43 85 75 108 76 83 68 103 107 65 65 71 98 67 112 48 86 85 57 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 66 115 112 70 108 117 53 110 90 88 109 49 83 112 49 70 85 72 69 47 89 111 108 57 68 117 102 85 104 115 54 79 109 76 102 82 75 117 83 83 119 121 106 65 105 65 97 88 107 87 87 10 104 98 89 77 116 53 73 103 68 97 77 51 83 70 86 47 107 54 49 71 77 120 84 112 75 68 103 90 71 71 117 103 72 78 68 68 108 103 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org2.example.com | [7f0 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Added ����)�����H�5���K��q���2���( to the in memory item map, total items: 2 +peer1.org2.example.com | [7f1 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7f2 08-31 20:51:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org2.example.com | [7f3 08-31 20:51:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org2.example.com | [7f4 08-31 20:51:06.05 UTC] [%{longpkg}] %{callpath} -> WARN StateInfo message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes is found invalid: PKIID wasn't found +peer1.org2.example.com | [7f5 08-31 20:51:06.05 UTC] [%{longpkg}] %{callpath} -> WARN Message GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes isn't valid +peer1.org2.example.com | [7f6 08-31 20:51:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7f7 08-31 20:51:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [7f8 08-31 20:51:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [7f9 08-31 20:51:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [7fa 08-31 20:51:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [7fb 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org2.example.com | [7fc 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org2.example.com | [7fd 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [7fe 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [7ff 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [800 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [801 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [802 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [803 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [804 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [805 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer1.org2.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer1.org2.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer1.org2.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [806 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a69c80 gate 1598907066245073700 evaluation starts +peer1.org2.example.com | [807 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a69c80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [808 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a69c80 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [809 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | [80a 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [80b 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [80c 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a69c80 principal matched by identity 0 +peer1.org2.example.com | [80d 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [80e 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | [8d7 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\n\340\220:Q\254\275-7QQc^\251\307!\264\214\\\025\346\\\n\351\304:\343\253\327\002 \021\310i\235_?D\223\370(>U\025z>\010\201\346g\327N\266\177[\247P\212Z\262UJ\275" > alive:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." > alive: +peer0.org2.example.com | [8d8 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [8d9 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8d1 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8da 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [8db 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [8dc 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8dd 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [8de 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8df 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [8e0 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8e1 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [8e2 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [8e3 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [8e4 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [8e5 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031c5d0 gate 1598907065617527200 evaluation starts +peer0.org2.example.com | [8e6 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031c5d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [8e7 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031c5d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [8e8 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031c5d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [8e9 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031c5d0 principal evaluation fails +peer0.org2.example.com | [8ea 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031c5d0 gate 1598907065617527200 evaluation fails +peer0.org2.example.com | [8eb 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [8ec 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [8ed 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [8ee 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031cc00 gate 1598907065620939700 evaluation starts +peer0.org2.example.com | [8ef 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031cc00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [8f0 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031cc00 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [8f1 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031cc00 principal matched by identity 0 +peer0.org2.example.com | [8f2 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 57 bf 6d b3 4e 55 fd 88 5d 68 ba 35 0e 17 84 |dW.m.NU..]h.5...| +peer0.org2.example.com | 00000010 77 b6 56 aa 4a f8 c8 6e 7e 80 c4 25 88 44 c6 b9 |w.V.J..n~..%.D..| +peer0.org2.example.com | [8f3 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 23 bd 43 66 86 ac 07 1e 0d 13 |0E.!..#.Cf......| +peer0.org2.example.com | 00000010 9d bd ec 6f 51 18 8d b0 7a 0b 1a ba 4e 11 5c 36 |...oQ...z...N.\6| +peer0.org2.example.com | 00000020 a6 15 38 dc f3 02 20 23 d9 03 09 b4 55 a9 64 56 |..8... #....U.dV| +peer0.org2.example.com | 00000030 b9 7f 65 cb 26 db 6c 5b 73 44 80 8a 24 4e c9 90 |..e.&.l[sD..$N..| +peer0.org2.example.com | 00000040 99 cd 63 81 39 7b b9 |..c.9{.| +peer0.org2.example.com | [8f4 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031cc00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [8f5 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031cc00 gate 1598907065620939700 evaluation succeeds +peer0.org2.example.com | [8f6 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [8f7 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [8f8 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [8f9 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [8fa 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [8fb 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" lastAliveTS: 1598907045534780300, 19 but got ts: inc_num:1598907045534780300 seq_num:18 +peer0.org2.example.com | [8fc 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8fd 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [8fe 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [8ff 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [900 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [901 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [902 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [903 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [904 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [905 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [906 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [907 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [908 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [909 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [90a 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [90b 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [90c 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [90d 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [90e 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [90f 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [910 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [911 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [912 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [913 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [914 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [915 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [916 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [917 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [918 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [919 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [91a 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [91b 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [91c 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [91d 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [91e 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030c970 gate 1598907065815665800 evaluation starts +peer0.org2.example.com | [91f 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030c970 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [920 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030c970 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [921 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030c970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [922 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030c970 principal evaluation fails +peer0.org2.example.com | [923 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030c970 gate 1598907065815665800 evaluation fails +peer0.org2.example.com | [924 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [925 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [926 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [927 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030cee0 gate 1598907065815957700 evaluation starts +peer0.org2.example.com | [928 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030cee0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [929 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030cee0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [92a 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030cee0 principal matched by identity 0 +peer0.org2.example.com | [92b 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [92c 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [92d 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030cee0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [92e 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030cee0 gate 1598907065815957700 evaluation succeeds +peer0.org2.example.com | [92f 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [930 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [931 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [932 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [933 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [934 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [935 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [936 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [937 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [938 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [939 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [93a 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030dba0 gate 1598907065818195800 evaluation starts +peer0.org2.example.com | [93b 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030dba0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [93c 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030dba0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [93d 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030dba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [93e 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030dba0 principal evaluation fails +peer0.org2.example.com | [93f 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030dba0 gate 1598907065818195800 evaluation fails +peer0.org2.example.com | [940 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [941 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [942 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [943 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ec160 gate 1598907065818830600 evaluation starts +peer0.org2.example.com | [944 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ec160 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [945 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ec160 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [946 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ec160 principal matched by identity 0 +peer0.org2.example.com | [947 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [948 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [949 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ec160 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [94a 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ec160 gate 1598907065818830600 evaluation succeeds +peer0.org2.example.com | [94b 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [94c 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [94d 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [94e 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [94f 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [950 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [951 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [952 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 2 peers +peer0.org2.example.com | [953 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [954 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [955 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [956 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [957 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [958 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [959 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [95a 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [95b 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [95c 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [95d 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [95e 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [95f 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c64b0 gate 1598907065822529400 evaluation starts +peer0.org2.example.com | [960 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c64b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [961 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c64b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [962 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c64b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [963 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c64b0 principal evaluation fails +peer0.org2.example.com | [964 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c64b0 gate 1598907065822529400 evaluation fails +peer1.org1.example.com | [8ae 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cf6f60 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [8af 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cf6f60 principal matched by identity 0 +peer1.org1.example.com | [8b0 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb 77 49 82 df 02 61 02 72 88 8e 81 72 83 a8 26 |.wI...a.r...r..&| +peer1.org1.example.com | 00000010 40 55 f1 dd 5b cd 7a 30 06 81 f2 4a 19 ab 60 fe |@U..[.z0...J..`.| +peer1.org1.example.com | [8b1 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 d6 75 03 22 db e7 7f b6 0c 45 57 |0D. h.u.".....EW| +peer1.org1.example.com | 00000010 33 14 47 82 79 65 68 d2 2d 67 7a c0 03 2c cf f9 |3.G.yeh.-gz..,..| +peer1.org1.example.com | 00000020 87 c1 0e af 02 20 0e 51 64 e0 1e 68 06 33 78 3b |..... .Qd..h.3x;| +peer1.org1.example.com | 00000030 21 c8 9b ec 7d 38 1e 6b a0 93 0a d6 49 6a 20 a0 |!...}8.k....Ij .| +peer1.org1.example.com | 00000040 2c 5f 3d cf 1d 39 |,_=..9| +peer1.org1.example.com | [8b2 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cf6f60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [8b3 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cf6f60 gate 1598907065495177600 evaluation succeeds +peer1.org1.example.com | [8b4 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [8b5 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [8b6 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [8b7 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [8b8 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [8b9 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [8ba 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [8bb 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [8bc 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [8bd 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8be 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8bf 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [8c0 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8c1 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8c2 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 485 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [8c3 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:?\0008\034\252\023\307" > alive: alive:\n\357\260\002 S\274\037V\352K73par\325\r?N\257\2056\\\342\205x2\215\243\233>\360N>\350\327" > +peer1.org1.example.com | [8c4 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 485 bytes, Signature: 0 bytes +peer1.org1.example.com | [8c5 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8c6 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8c7 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [8c8 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [8c9 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [8ca 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [8cb 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [80f 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a69c80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [810 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a69c80 gate 1598907066245073700 evaluation succeeds +peer1.org2.example.com | [811 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [812 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [813 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [814 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [815 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [816 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [817 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [818 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [819 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org2.example.com | [81a 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [81b 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [81c 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [81d 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [81e 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [81f 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [820 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [821 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers +peer1.org2.example.com | [822 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [823 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [824 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [825 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [826 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [827 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [828 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [82a 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:00.894 UTC [common.configtx] addToMap -> DEBU 9a0 Adding to config map: [Policy] /Channel/Application/Endorsement" +orderer0.example.com | "2020-08-31 20:51:00.894 UTC [common.configtx] addToMap -> DEBU 9a1 Adding to config map: [Policy] /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:51:00.895 UTC [common.configtx] addToMap -> DEBU 9a2 Adding to config map: [Policy] /Channel/Application/Writers" +orderer0.example.com | "2020-08-31 20:51:00.895 UTC [common.configtx] addToMap -> DEBU 9a3 Adding to config map: [Policy] /Channel/Application/Admins" +orderer0.example.com | "2020-08-31 20:51:00.895 UTC [common.configtx] addToMap -> DEBU 9a4 Adding to config map: [Group] /Channel/Orderer" +orderer0.example.com | "2020-08-31 20:51:00.896 UTC [common.configtx] addToMap -> DEBU 9a5 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +orderer0.example.com | "2020-08-31 20:51:00.896 UTC [common.configtx] addToMap -> DEBU 9a6 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +orderer0.example.com | "2020-08-31 20:51:00.896 UTC [common.configtx] addToMap -> DEBU 9a7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-08-31 20:51:00.896 UTC [common.configtx] addToMap -> DEBU 9a8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +orderer0.example.com | "2020-08-31 20:51:00.897 UTC [common.configtx] addToMap -> DEBU 9a9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:51:00.897 UTC [common.configtx] addToMap -> DEBU 9aa Adding to config map: [Value] /Channel/Orderer/Capabilities" +orderer0.example.com | "2020-08-31 20:51:00.897 UTC [common.configtx] addToMap -> DEBU 9ab Adding to config map: [Value] /Channel/Orderer/ConsensusType" +orderer0.example.com | "2020-08-31 20:51:00.897 UTC [common.configtx] addToMap -> DEBU 9ac Adding to config map: [Value] /Channel/Orderer/BatchSize" +orderer0.example.com | "2020-08-31 20:51:00.898 UTC [common.configtx] addToMap -> DEBU 9ad Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +orderer0.example.com | "2020-08-31 20:51:00.898 UTC [common.configtx] addToMap -> DEBU 9ae Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +orderer0.example.com | "2020-08-31 20:51:00.898 UTC [common.configtx] addToMap -> DEBU 9af Adding to config map: [Policy] /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:51:00.899 UTC [common.configtx] addToMap -> DEBU 9b0 Adding to config map: [Policy] /Channel/Orderer/Writers" +orderer0.example.com | "2020-08-31 20:51:00.899 UTC [common.configtx] addToMap -> DEBU 9b1 Adding to config map: [Policy] /Channel/Orderer/Admins" +orderer0.example.com | "2020-08-31 20:51:00.899 UTC [common.configtx] addToMap -> DEBU 9b2 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +orderer0.example.com | "2020-08-31 20:51:00.899 UTC [common.configtx] addToMap -> DEBU 9b3 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +orderer0.example.com | "2020-08-31 20:51:00.900 UTC [common.configtx] addToMap -> DEBU 9b4 Adding to config map: [Value] /Channel/OrdererAddresses" +orderer0.example.com | "2020-08-31 20:51:00.900 UTC [common.configtx] addToMap -> DEBU 9b5 Adding to config map: [Value] /Channel/Consortium" +orderer0.example.com | "2020-08-31 20:51:00.900 UTC [common.configtx] addToMap -> DEBU 9b6 Adding to config map: [Value] /Channel/Capabilities" +orderer0.example.com | "2020-08-31 20:51:00.900 UTC [common.configtx] addToMap -> DEBU 9b7 Adding to config map: [Value] /Channel/HashingAlgorithm" +orderer0.example.com | "2020-08-31 20:51:00.901 UTC [common.configtx] addToMap -> DEBU 9b8 Adding to config map: [Policy] /Channel/Writers" +orderer0.example.com | "2020-08-31 20:51:00.901 UTC [common.configtx] addToMap -> DEBU 9b9 Adding to config map: [Policy] /Channel/Admins" +orderer0.example.com | "2020-08-31 20:51:00.901 UTC [common.configtx] addToMap -> DEBU 9ba Adding to config map: [Policy] /Channel/Readers" +orderer0.example.com | "2020-08-31 20:51:00.901 UTC [common.channelconfig] LogSanityChecks -> DEBU 9bb As expected, current configuration has policy '/Channel/Readers'" +orderer0.example.com | "2020-08-31 20:51:00.901 UTC [common.channelconfig] LogSanityChecks -> DEBU 9bc As expected, current configuration has policy '/Channel/Writers'" +orderer0.example.com | "2020-08-31 20:51:00.902 UTC [policies] Manager -> DEBU 9bd Manager Channel looking up path [Application]" +orderer0.example.com | "2020-08-31 20:51:00.902 UTC [policies] Manager -> DEBU 9be Manager Channel has managers Orderer" +orderer0.example.com | "2020-08-31 20:51:00.902 UTC [policies] Manager -> DEBU 9bf Manager Channel has managers Application" +orderer0.example.com | "2020-08-31 20:51:00.902 UTC [policies] Manager -> DEBU 9c0 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-08-31 20:51:00.903 UTC [policies] Manager -> DEBU 9c1 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-08-31 20:51:00.903 UTC [policies] Manager -> DEBU 9c2 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-08-31 20:51:00.903 UTC [common.channelconfig] LogSanityChecks -> DEBU 9c3 As expected, current configuration has policy '/Channel/Application/Readers'" +orderer0.example.com | "2020-08-31 20:51:00.903 UTC [common.channelconfig] LogSanityChecks -> DEBU 9c4 As expected, current configuration has policy '/Channel/Application/Writers'" +orderer0.example.com | "2020-08-31 20:51:00.904 UTC [common.channelconfig] LogSanityChecks -> DEBU 9c5 As expected, current configuration has policy '/Channel/Application/Admins'" +orderer0.example.com | "2020-08-31 20:51:00.904 UTC [policies] Manager -> DEBU 9c6 Manager Channel looking up path [Orderer]" +orderer0.example.com | "2020-08-31 20:51:00.904 UTC [policies] Manager -> DEBU 9c7 Manager Channel has managers Orderer" +orderer0.example.com | "2020-08-31 20:51:00.905 UTC [policies] Manager -> DEBU 9c8 Manager Channel has managers Application" +orderer0.example.com | "2020-08-31 20:51:00.905 UTC [policies] Manager -> DEBU 9c9 Manager Channel/Orderer looking up path []" +orderer0.example.com | "2020-08-31 20:51:00.905 UTC [policies] Manager -> DEBU 9ca Manager Channel/Orderer has managers OrdererOrg" +orderer0.example.com | "2020-08-31 20:51:00.905 UTC [common.channelconfig] LogSanityChecks -> DEBU 9cb As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +orderer0.example.com | "2020-08-31 20:51:00.906 UTC [common.channelconfig] LogSanityChecks -> DEBU 9cc As expected, current configuration has policy '/Channel/Orderer/Admins'" +orderer0.example.com | "2020-08-31 20:51:00.906 UTC [common.channelconfig] LogSanityChecks -> DEBU 9cd As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer0.org1.example.com | [72b 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org1.example.com | [72c 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [72d 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org1.example.com | [72e 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | [72f 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003289200)} +peer0.org1.example.com | [730 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [731 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [732 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [733 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +peer0.org1.example.com | [734 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +peer0.org1.example.com | [735 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +peer0.org1.example.com | [736 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:7051 +peer0.org1.example.com | [737 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [738 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [739 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer0.org1.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer0.org1.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer0.org1.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [73a 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +peer0.org1.example.com | [73b 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [73c 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [73d 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0x22, 0x1, 0xdc, 0x78, 0x27, 0xf2, 0x2d, 0xc3, 0x61, 0xf7, 0x88, 0xbc, 0x3b, 0x31, 0x2f, 0x16, 0xf3, 0xa9, 0x7a, 0x3d, 0x6c, 0xaa, 0xbe, 0x10, 0x69, 0xd3, 0x9f, 0xc0, 0xb5, 0xb6, 0x7a, 0xbf} txOffsets= +peer0.org1.example.com | txId=ed7b76e084105979adee38a130a3cf311c0f2d9b0dc1c2dda158f0d55a15426c locPointer=offset=71, bytesLength=27141 +peer0.org1.example.com | ] +peer0.org1.example.com | [73e 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56746, bytesLength=27141] for tx ID: [ed7b76e084105979adee38a130a3cf311c0f2d9b0dc1c2dda158f0d55a15426c] to txid-index +peer1.org1.example.com | [8cc 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [8cd 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [8ce 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8cf 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [8d0 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [8d1 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 df 23 9b a5 6a 7c 85 35 b0 95 5b 13 8e 7a 41 |..#..j|.5..[..zA| +peer1.org1.example.com | 00000010 0a a0 14 ea e5 9e 21 72 df 90 f3 47 d1 be e1 80 |......!r...G....| +peer1.org1.example.com | [8d2 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 eb e4 06 cf 12 30 36 e7 e3 c8 |0E.!.......06...| +peer1.org1.example.com | 00000010 cd 9e fe 53 d2 87 a2 b3 48 46 59 da 58 96 fa 72 |...S....HFY.X..r| +peer1.org1.example.com | 00000020 0c 73 41 95 3b 02 20 18 4e 90 1b c7 45 0a 2b ed |.sA.;. .N...E.+.| +peer1.org1.example.com | 00000030 4b 34 be 3e a1 98 c0 27 db 05 24 4f e4 2e a9 a5 |K4.>...'..$O....| +peer1.org1.example.com | 00000040 76 f5 9c 26 b5 d7 2e |v..&...| +peer1.org1.example.com | [8d3 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [8d4 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 f8 ac 8f c9 98 55 fd 74 cd fa |0E.!.......U.t..| +peer1.org1.example.com | 00000010 92 df fd aa df 51 c7 bf 91 b1 9e 17 91 52 40 93 |.....Q.......R@.| +peer1.org1.example.com | 00000020 37 af b2 31 a2 02 20 52 a4 db 2a a7 fe 07 39 1a |7..1.. R..*...9.| +peer1.org1.example.com | 00000030 d7 93 67 7f 77 2d b5 6f 16 d5 4e 3f d1 62 25 60 |..g.w-.o..N?.b%`| +peer1.org1.example.com | 00000040 a5 0e 1b 91 5a dc ee |....Z..| +peer1.org1.example.com | [8d5 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [8d6 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [8d7 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [8d8 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [8d9 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [8da 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [8db 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [8dc 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8dd 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8de 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8df 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [8e0 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8e1 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [8e2 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." secret_envelope: > alive:\n\357\260\002 S\274\037V\352K73par\325\r?N\257\2056\\\342\205x2\215\243\233>\360N>\350\327" > +peer1.org1.example.com | [8e3 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [8e4 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8e5 08-31 20:51:05.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8e6 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [8e7 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [8e8 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 64 57 bf 6d b3 4e 55 fd 88 5d 68 ba 35 0e 17 84 |dW.m.NU..]h.5...| +peer1.org1.example.com | 00000010 77 b6 56 aa 4a f8 c8 6e 7e 80 c4 25 88 44 c6 b9 |w.V.J..n~..%.D..| +peer1.org1.example.com | [8e9 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 23 bd 43 66 86 ac 07 1e 0d 13 |0E.!..#.Cf......| +peer1.org1.example.com | 00000010 9d bd ec 6f 51 18 8d b0 7a 0b 1a ba 4e 11 5c 36 |...oQ...z...N.\6| +peer1.org1.example.com | 00000020 a6 15 38 dc f3 02 20 23 d9 03 09 b4 55 a9 64 56 |..8... #....U.dV| +peer1.org1.example.com | 00000030 b9 7f 65 cb 26 db 6c 5b 73 44 80 8a 24 4e c9 90 |..e.&.l[sD..$N..| +peer1.org1.example.com | 00000040 99 cd 63 81 39 7b b9 |..c.9{.| +peer1.org1.example.com | [8ea 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [8eb 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" lastAliveTS: 1598907045534780300, 19 but got ts: inc_num:1598907045534780300 seq_num:18 +peer1.org1.example.com | [8ec 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8ed 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8ee 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8ef 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [8f0 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [8f1 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [8f2 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8f3 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [8f4 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [8f5 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8f6 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [8f7 08-31 20:51:05.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8f8 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [8f9 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [8fa 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [8fb 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [8fc 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [8fd 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [8fe 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [8ff 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [900 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [901 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [902 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [903 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [904 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [905 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [906 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [907 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [908 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [909 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [90a 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [90b 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003156cd0 gate 1598907065800750100 evaluation starts +peer1.org1.example.com | [90c 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003156cd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [90d 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003156cd0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [90e 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003156cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [90f 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003156cd0 principal evaluation fails +peer1.org1.example.com | [910 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003156cd0 gate 1598907065800750100 evaluation fails +peer1.org1.example.com | [911 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [912 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [913 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [914 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003157b50 gate 1598907065801836800 evaluation starts +peer1.org1.example.com | [915 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003157b50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [916 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003157b50 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [917 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [918 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [919 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [91a 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003157b50 principal matched by identity 0 +peer1.org1.example.com | [91b 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [91c 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [91d 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003157b50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [91e 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003157b50 gate 1598907065801836800 evaluation succeeds +peer1.org1.example.com | [91f 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [920 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [921 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [922 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [923 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [924 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [925 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [926 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [927 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [928 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [929 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [92a 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers +peer1.org1.example.com | [92b 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [92c 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [92d 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [92e 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [92f 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [930 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [931 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [932 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [933 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [934 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 2 peers +peer1.org1.example.com | [935 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [936 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [937 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [938 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [939 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [93a 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [93b 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [93c 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [93d 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [93e 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [93f 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer N�@�����9�\F���`�y(כ���Jt� message sent from ���Ċtz0�P�zP˹�{� ��w��kqu-< +peer1.org1.example.com | [940 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [941 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [942 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [943 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [944 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes +peer1.org1.example.com | [945 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes +peer1.org1.example.com | [946 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [947 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [948 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [949 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [94a 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [94b 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [94c 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [94d 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [94e 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [94f 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d2b470 gate 1598907066021726000 evaluation starts +peer1.org1.example.com | [950 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d2b470 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [951 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d2b470 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [952 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d2b470 principal matched by identity 0 +peer1.org1.example.com | [953 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [954 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | [965 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [966 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [967 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [968 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c6a40 gate 1598907065822965500 evaluation starts +peer0.org2.example.com | [969 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c6a40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [96a 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c6a40 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [96b 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c6a40 principal matched by identity 0 +peer0.org2.example.com | [96c 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [96d 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [96e 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c6a40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [96f 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002c6a40 gate 1598907065822965500 evaluation succeeds +peer0.org2.example.com | [970 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [971 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [972 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [973 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [974 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [975 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [976 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [977 08-31 20:51:05.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [978 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org2.example.com | [979 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [97a 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [97b 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [97c 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [97d 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [97e 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [97f 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [980 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002edb00 gate 1598907065832206900 evaluation starts +peer0.org2.example.com | [981 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002edb00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [982 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002edb00 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [73f 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56746, bytesLength=27141] for tx number:[0] ID: [ed7b76e084105979adee38a130a3cf311c0f2d9b0dc1c2dda158f0d55a15426c] to blockNumTranNum index +peer0.org1.example.com | [740 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [741 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [742 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [744 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [743 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84880], isChainEmpty=[false], lastBlockNumber=[2] +peer0.org1.example.com | [745 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +peer0.org1.example.com | [746 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [747 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [748 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [749 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [74a 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [74b 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [74c 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c11ca0 gate 1598907064082520500 evaluation starts +peer0.org1.example.com | [74d 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c11ca0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [74e 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c11ca0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [74f 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org1.example.com | [750 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [751 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [752 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c11ca0 principal matched by identity 0 +peer0.org1.example.com | [753 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [754 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 bd f4 34 65 48 b1 57 9c 57 79 4f |0D. ...4eH.W.WyO| +peer0.org1.example.com | 00000010 80 8f de 67 5a 2c 84 34 d1 d4 65 55 02 ed ac 4d |...gZ,.4..eU...M| +peer0.org1.example.com | 00000020 55 7e fd e6 02 20 66 bc 46 6b 20 e6 ed 31 e2 82 |U~... f.Fk ..1..| +peer0.org1.example.com | 00000030 94 cc 36 ed 20 c5 8d df e1 b0 e8 2e f0 d1 12 18 |..6. ...........| +peer0.org1.example.com | 00000040 77 08 5c 6b 25 4e |w.\k%N| +peer0.org1.example.com | [755 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c11ca0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [756 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c11ca0 gate 1598907064082520500 evaluation succeeds +peer0.org1.example.com | [757 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [758 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [759 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [75a 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [75b 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer0.org1.example.com | [75c 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [75d 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [75e 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [75f 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +peer0.org1.example.com | [760 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +peer0.org1.example.com | [761 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [762 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [763 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [764 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [765 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org1.example.com | [766 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [767 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +peer0.org1.example.com | [768 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +peer0.org1.example.com | [769 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +peer0.org1.example.com | [76a 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [76b 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +peer0.org1.example.com | [76c 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +peer0.org1.example.com | [76d 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org1.example.com | [76e 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +peer0.org1.example.com | [76f 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 29ms (state_validation=11ms block_and_pvtdata_commit=14ms state_commit=2ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +peer0.org1.example.com | [770 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [771 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408A8CFEFBEF6AF9D9816...096D8DADEA4206176416CB532A020803 +peer0.org1.example.com | [772 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B4FD8B149153DB333D1D7784771D0CD6F00C52DA6F22A150F68573D08B489EE2 +peer0.org1.example.com | [773 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +peer0.org1.example.com | [774 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 9492522150986590262, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +peer1.org2.example.com | [82b 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes to 2 peers +peer1.org2.example.com | [82c 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [82d 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org2.example.com | [82e 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [82f 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org2.example.com | [830 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [829 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [831 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [832 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [833 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [834 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [835 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [836 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [837 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adc910 gate 1598907066499029600 evaluation starts +peer1.org2.example.com | [838 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adc910 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [839 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adc910 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [83a 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adc910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [83b 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adc910 principal evaluation fails +peer1.org2.example.com | [83d 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adc910 gate 1598907066499029600 evaluation fails +peer1.org2.example.com | [83e 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [83f 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [840 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [841 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adce80 gate 1598907066499963300 evaluation starts +peer1.org2.example.com | [842 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adce80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [843 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adce80 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [844 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adce80 principal matched by identity 0 +peer1.org2.example.com | [845 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [846 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [847 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adce80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [848 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003adce80 gate 1598907066499963300 evaluation succeeds +peer1.org2.example.com | [849 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [84a 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [84b 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [84c 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [84d 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [84e 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [84f 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer � �0��U�n�����##~J�9���o�R=� message sent from ���Ċtz0�P�zP˹�{� ��w��kqu-< +peer1.org2.example.com | [850 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [83c 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [851 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [852 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [853 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [854 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [855 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [857 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [858 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [859 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [85a 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [85b 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [85c 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [856 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [85d 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [85e 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [85f 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [860 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [861 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [862 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af90e0 gate 1598907066506710300 evaluation starts +peer1.org2.example.com | [863 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af90e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [864 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af90e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [865 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af90e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [866 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af90e0 principal evaluation fails +peer1.org2.example.com | [867 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af90e0 gate 1598907066506710300 evaluation fails +peer1.org2.example.com | [868 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [775 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 9492522150986590262, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +peer0.org1.example.com | [776 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [777 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 9492522150986590262, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +peer0.org1.example.com | [778 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [779 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 ee 7b 72 f4 78 ce 93 cd cb 23 14 91 44 a8 b1 |..{r.x....#..D..| +peer0.org1.example.com | 00000010 ca d1 c3 09 1f 1d cb 18 6d 90 bc f0 b6 18 ed 0a |........m.......| +peer0.org1.example.com | [77a 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 54 00 e9 d9 95 16 75 e4 02 b0 83 |0D. .T.....u....| +peer0.org1.example.com | 00000010 95 cf 52 86 07 f2 ae 92 7c d6 3a c9 15 3c 1b 5e |..R.....|.:..<.^| +peer0.org1.example.com | 00000020 37 7a 5d 53 02 20 6f 65 cb 88 cc ec dc 94 ea c7 |7z]S. oe........| +peer0.org1.example.com | 00000030 f5 09 51 14 98 c3 6c 80 57 78 c8 6a 12 ce 3e 3f |..Q...l.Wx.j..>?| +peer0.org1.example.com | 00000040 00 38 1c aa 13 c7 |.8....| +peer0.org1.example.com | [77b 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [77c 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [77d 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [77e 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [77f 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [780 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [781 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [782 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [783 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [784 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [785 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [786 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e200 gate 1598907064105917900 evaluation starts +peer0.org1.example.com | [787 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e200 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [788 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e200 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [789 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e200 principal matched by identity 0 +peer0.org1.example.com | [78a 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 2e e4 89 b9 81 19 76 dd 41 80 da 2a 67 84 fd |P......v.A..*g..| +peer0.org1.example.com | 00000010 7e c3 3c 00 ef f3 d8 ed 6d 02 28 46 35 82 fd 01 |~.<.....m.(F5...| +peer0.org1.example.com | [78b 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b fb ec 1e 5e bd 7f 28 24 c1 31 1b |0D. ....^..($.1.| +peer0.org1.example.com | 00000010 b0 dc 4e 24 33 24 b0 45 76 af c2 2c 01 63 b7 54 |..N$3$.Ev..,.c.T| +peer0.org1.example.com | 00000020 5a 5f 5f 8e 02 20 2f c2 21 e4 eb 53 8d 07 f4 56 |Z__.. /.!..S...V| +peer0.org1.example.com | 00000030 fd 6e 90 22 e6 3d c9 ad ac 93 63 33 33 f1 20 2e |.n.".=....c33. .| +peer0.org1.example.com | 00000040 f5 29 06 76 35 7b |.).v5{| +peer0.org1.example.com | [78c 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e200 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [78d 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e200 gate 1598907064105917900 evaluation succeeds +peer0.org1.example.com | [78e 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [78f 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [790 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [791 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [955 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d2b470 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [956 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d2b470 gate 1598907066021726000 evaluation succeeds +peer1.org1.example.com | [957 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [958 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [959 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [95a 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [95b 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [95c 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [95d 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [95e 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [95f 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [960 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [961 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d2bfb0 gate 1598907066024815800 evaluation starts +peer1.org1.example.com | [962 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d2bfb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [963 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d2bfb0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [964 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d2bfb0 principal matched by identity 0 +peer1.org1.example.com | [965 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [966 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [967 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d2bfb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [968 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d2bfb0 gate 1598907066024815800 evaluation succeeds +peer1.org1.example.com | [969 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [96a 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [96b 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [96c 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [869 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [86a 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [86b 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af9650 gate 1598907066507226100 evaluation starts +peer1.org2.example.com | [86c 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af9650 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [86d 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af9650 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [86e 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af9650 principal matched by identity 0 +peer1.org2.example.com | [86f 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [870 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [871 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af9650 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [872 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af9650 gate 1598907066507226100 evaluation succeeds +peer1.org2.example.com | [873 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [874 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [875 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [876 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [877 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer � �0��U�n�����##~J�9���o�R=� message sent from ����)�����H�5���K��q���2���( +peer1.org2.example.com | [878 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [879 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [87a 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [87b 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [87c 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [87d 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [87e 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [87f 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [880 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [881 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [882 08-31 20:51:08.47 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ]] +peer1.org2.example.com | [883 08-31 20:51:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:49122 +peer1.org2.example.com | [884 08-31 20:51:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003b1c820 +peer1.org2.example.com | [885 08-31 20:51:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [886 08-31 20:51:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [887 08-31 20:51:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org2.example.com | [888 08-31 20:51:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [889 08-31 20:51:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a0 51 9a c8 e6 89 1c ab 51 3b 35 82 84 a6 09 9a |.Q......Q;5.....| +peer1.org2.example.com | 00000010 8c 98 d3 69 38 3e 24 a6 ac 5f e8 39 65 ee 84 06 |...i8>$.._.9e...| +peer1.org2.example.com | [88a 08-31 20:51:08.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 12 e6 5f 5a db 5f 81 0d 81 87 |0E.!...._Z._....| +peer1.org2.example.com | 00000010 24 1c 92 a8 9e bc 6e 20 01 a3 a1 9f 88 97 16 9d |$.....n ........| +peer1.org2.example.com | 00000020 d7 5d f7 69 1f 02 20 09 71 3c b4 30 56 ae e5 75 |.].i.. .q<.0V..u| +peer1.org2.example.com | 00000030 df df 8f 3e cd 02 34 52 23 ed 62 3e 7c b1 16 00 |...>..4R#.b>|...| +peer1.org2.example.com | 00000040 b6 ea 00 e1 51 e9 1d |....Q..| +peer1.org2.example.com | [88b 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [88c 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0039df6c0, header 0xc003b1cc30 +peer1.org2.example.com | [88d 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer1.org2.example.com | [88e 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU [][a254ab9d] processing txid: a254ab9d65176c7d4c8e32821b50a59a7f7687f907e4a8f2887b020a20e74966 +peer1.org2.example.com | [88f 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU [][a254ab9d] Entry chaincode: name:"lscc" +peer1.org2.example.com | [890 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> INFO [][a254ab9d] Entry chaincode: name:"lscc" +peer1.org2.example.com | [891 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [892 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a0 51 9a c8 e6 89 1c ab 51 3b 35 82 84 a6 09 9a |.Q......Q;5.....| +peer1.org2.example.com | 00000010 8c 98 d3 69 38 3e 24 a6 ac 5f e8 39 65 ee 84 06 |...i8>$.._.9e...| +peer1.org2.example.com | [893 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 12 e6 5f 5a db 5f 81 0d 81 87 |0E.!...._Z._....| +peer1.org2.example.com | 00000010 24 1c 92 a8 9e bc 6e 20 01 a3 a1 9f 88 97 16 9d |$.....n ........| +peer1.org2.example.com | 00000020 d7 5d f7 69 1f 02 20 09 71 3c b4 30 56 ae e5 75 |.].i.. .q<.0V..u| +peer1.org2.example.com | 00000030 df df 8f 3e cd 02 34 52 23 ed 62 3e 7c b1 16 00 |...>..4R#.b>|...| +peer1.org2.example.com | 00000040 b6 ea 00 e1 51 e9 1d |....Q..| +peer1.org2.example.com | [894 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer1.org2.example.com | [895 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +peer1.org2.example.com | [896 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +peer1.org2.example.com | [897 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [518be05e-4ab5-4d59-bc7f-719a2c8fe148] +peer1.org2.example.com | [898 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [899 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [518be05e-4ab5-4d59-bc7f-719a2c8fe148] +peer1.org2.example.com | [89a 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +peer1.org2.example.com | [89b 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +peer1.org2.example.com | [89c 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU [a254ab9d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [89d 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU [a254ab9d] notifying Txid:a254ab9d65176c7d4c8e32821b50a59a7f7687f907e4a8f2887b020a20e74966, channelID: +peer1.org2.example.com | [89e 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [89f 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> INFO [][a254ab9d] Exit chaincode: name:"lscc" (4ms) +peer1.org2.example.com | [8a0 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU [][a254ab9d] Exit +peer1.org2.example.com | [8a1 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:49122 +peer1.org2.example.com | [8a2 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:49122 grpc.code=OK grpc.call_duration=7.1323ms +peer1.org2.example.com | [8a3 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [8a4 08-31 20:51:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [8a5 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [8a6 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [8a7 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [8a8 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [8a9 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [8aa 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [8ab 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8ac 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8ad 08-31 20:51:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [8ae 08-31 20:51:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [8af 08-31 20:51:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [8b0 08-31 20:51:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8b1 08-31 20:51:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [8b2 08-31 20:51:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [8b3 08-31 20:51:08.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8b4 08-31 20:51:09.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [8b5 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161017 +peer1.org2.example.com | [8b6 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B845233A251588DA8F534A1B0079C1F8614717A6050C7CA52C8E3289CDD4AB53 +peer1.org2.example.com | [8b7 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [8b8 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [8b9 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [8ba 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [8bb 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [8bc 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [8bd 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [8be 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8bf 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [8c0 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8c1 08-31 20:51:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [8c2 08-31 20:51:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8c3 08-31 20:51:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [8c4 08-31 20:51:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer1.org2.example.com | [8c5 08-31 20:51:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [8c6 08-31 20:51:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb 77 49 82 df 02 61 02 72 88 8e 81 72 83 a8 26 |.wI...a.r...r..&| +peer1.org2.example.com | 00000010 40 55 f1 dd 5b cd 7a 30 06 81 f2 4a 19 ab 60 fe |@U..[.z0...J..`.| +peer1.org2.example.com | [8c7 08-31 20:51:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 d6 75 03 22 db e7 7f b6 0c 45 57 |0D. h.u.".....EW| +peer1.org2.example.com | 00000010 33 14 47 82 79 65 68 d2 2d 67 7a c0 03 2c cf f9 |3.G.yeh.-gz..,..| +peer1.org2.example.com | 00000020 87 c1 0e af 02 20 0e 51 64 e0 1e 68 06 33 78 3b |..... .Qd..h.3x;| +peer1.org2.example.com | 00000030 21 c8 9b ec 7d 38 1e 6b a0 93 0a d6 49 6a 20 a0 |!...}8.k....Ij .| +peer1.org2.example.com | 00000040 2c 5f 3d cf 1d 39 |,_=..9| +peer0.org1.example.com | [792 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [793 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +peer0.org1.example.com | [794 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [795 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [796 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [797 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [798 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.129Z grpc.peer_address=172.18.0.8:53978 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=287.6µs +peer0.org1.example.com | [799 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [79a 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [79b 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [79c 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.8:53978 +peer0.org1.example.com | [79d 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:53978 +peer0.org1.example.com | [79e 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org1.example.com | [79f 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 67 f9 18 63 8d 80 a1 02 b9 33 0f |0D. og..c.....3.| +peer0.org1.example.com | 00000010 a3 13 05 68 75 76 8d 31 7e 7d e9 36 0a f6 4a 7b |...huv.1~}.6..J{| +peer0.org1.example.com | 00000020 e2 08 39 48 02 20 2c 2b 6b 47 60 aa 09 fe 05 58 |..9H. ,+kG`....X| +peer0.org1.example.com | 00000030 d0 44 2e fb 0d 51 af 88 14 63 d8 05 8d 22 37 6a |.D...Q...c..."7j| +peer0.org1.example.com | 00000040 f3 db a4 4c 1c 1e |...L..| +peer0.org1.example.com | [7a0 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:53978 +peer0.org1.example.com | [7a1 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:53978 +peer0.org1.example.com | [7a2 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [7a3 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [7a4 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:53978 disconnected +peer0.org1.example.com | [7a5 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:51:14.133Z grpc.peer_address=172.18.0.8:53978 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.0098ms +peer0.org1.example.com | [7a6 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [7a7 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [7a8 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.321Z grpc.peer_address=172.18.0.6:54886 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=108.8µs +peer0.org1.example.com | [7a9 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [7aa 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [7ab 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +orderer0.example.com | "2020-08-31 20:51:00.906 UTC [common.channelconfig] LogSanityChecks -> DEBU 9ce As expected, current configuration has policy '/Channel/Orderer/Readers'" +orderer0.example.com | "2020-08-31 20:51:00.906 UTC [common.capabilities] Supported -> DEBU 9cf Orderer capability V1_4_2 is supported and is enabled" +orderer0.example.com | "2020-08-31 20:51:00.907 UTC [common.capabilities] Supported -> DEBU 9d0 Channel capability V1_4_3 is supported and is enabled" +orderer0.example.com | "2020-08-31 20:51:00.907 UTC [orderer.common.server] func1 -> DEBU 9d1 Executing callback to update root CAs" +orderer0.example.com | "2020-08-31 20:51:00.908 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9d2 updating root CAs for channel [businesschannel]" +orderer0.example.com | "2020-08-31 20:51:00.908 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9d3 adding orderer root CAs for MSP [OrdererMSP]" +orderer0.example.com | "2020-08-31 20:51:00.908 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9d4 adding app root CAs for MSP [Org2MSP]" +orderer0.example.com | "2020-08-31 20:51:00.909 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9d5 adding app root CAs for MSP [Org1MSP]" +orderer0.example.com | "2020-08-31 20:51:00.909 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9d6 [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" +orderer0.example.com | "2020-08-31 20:51:00.910 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9d7 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" +orderer0.example.com | "2020-08-31 20:51:00.910 UTC [msp] GetDefaultSigningIdentity -> DEBU 9d8 Obtaining default signing identity" +orderer0.example.com | "2020-08-31 20:51:00.910 UTC [msp] GetDefaultSigningIdentity -> DEBU 9da Obtaining default signing identity" +orderer0.example.com | "2020-08-31 20:51:00.910 UTC [msp.identity] Sign -> DEBU 9db Sign: plaintext: 0A020801120B0A090A03010203100418...9BA90BF45430B1114E959C72D83B225D " +orderer0.example.com | "2020-08-31 20:51:00.911 UTC [msp.identity] Sign -> DEBU 9dc Sign: digest: 58C8443218B198DD013B2A897A892B13F7CE9855E9EC559ECAEC78B451C39063 " +orderer0.example.com | "2020-08-31 20:51:00.910 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9d9 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:00.911 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9dd Sending msg of 28 bytes to 3 on channel testchainid took 12.2µs" +orderer0.example.com | "2020-08-31 20:51:00.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9de Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145.3µs " +orderer0.example.com | "2020-08-31 20:51:00.915 UTC [fsblkstorage] indexBlock -> DEBU 9df Indexing block [blockNum=1, blockHash=[]byte{0xe3, 0x22, 0xef, 0xdb, 0x1a, 0xb5, 0x8a, 0x4e, 0xca, 0x29, 0x72, 0xa1, 0x82, 0xd5, 0x73, 0xd2, 0x6c, 0x30, 0x29, 0x25, 0x12, 0x30, 0x2d, 0xc5, 0xc9, 0xfc, 0x53, 0x0, 0x88, 0x62, 0x25, 0xd} txOffsets= +orderer0.example.com | txId=0ab5ac5f1d5a2551b49ec6c24c6da873616029271ac520b4a7140ef88dfe6b38 locPointer=offset=71, bytesLength=27136 +orderer0.example.com | ]" +orderer0.example.com | "2020-08-31 20:51:00.918 UTC [fsblkstorage] updateCheckpoint -> DEBU 9e0 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56643], isChainEmpty=[false], lastBlockNumber=[1]" +orderer0.example.com | "2020-08-31 20:51:00.918 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 9e1 [channel: businesschannel] Wrote block [1]" +orderer0.example.com | "2020-08-31 20:51:01.200 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9e2 Sending msg of 28 bytes to 2 on channel businesschannel took 305.3µs" +orderer0.example.com | "2020-08-31 20:51:01.200 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9e3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 413.3µs " +orderer0.example.com | "2020-08-31 20:51:01.200 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9e4 Sending msg of 28 bytes to 3 on channel businesschannel took 54.9µs" +orderer0.example.com | "2020-08-31 20:51:01.201 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9e5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.9µs " +orderer0.example.com | "2020-08-31 20:51:01.204 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9e6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:01.205 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9e7 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:01.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9e8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:01.412 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9e9 Sending msg of 28 bytes to 3 on channel testchainid took 31µs" +orderer0.example.com | "2020-08-31 20:51:01.414 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9ea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5784ms " +orderer0.example.com | "2020-08-31 20:51:01.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9eb Sending msg of 28 bytes to 2 on channel businesschannel took 35.4µs" +orderer0.example.com | "2020-08-31 20:51:01.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9ec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 352.1µs " +orderer0.example.com | "2020-08-31 20:51:01.667 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9ed Sending msg of 28 bytes to 3 on channel businesschannel took 488.4µs" +orderer0.example.com | "2020-08-31 20:51:01.668 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.7µs " +orderer0.example.com | "2020-08-31 20:51:01.669 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9ef Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:01.670 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9f0 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:01.876 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9f1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:01.877 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f2 Sending msg of 28 bytes to 3 on channel testchainid took 118.2µs" +orderer0.example.com | "2020-08-31 20:51:01.878 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9f3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 435.3µs " +orderer0.example.com | "2020-08-31 20:51:02.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f4 Sending msg of 28 bytes to 2 on channel businesschannel took 110.4µs" +orderer0.example.com | "2020-08-31 20:51:02.167 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f5 Sending msg of 28 bytes to 3 on channel businesschannel took 216.5µs" +orderer0.example.com | "2020-08-31 20:51:02.168 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9f6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 362.7µs " +peer1.org2.example.com | [8c8 08-31 20:51:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [7ac 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:54886 +peer0.org1.example.com | [7ad 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:54886 +peer0.org1.example.com | [7ae 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7af 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7b0 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7b1 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7b2 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [983 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002edb00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [984 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002edb00 principal evaluation fails +peer0.org2.example.com | [985 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002edb00 gate 1598907065832206900 evaluation fails +peer0.org2.example.com | [986 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [987 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [988 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [989 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000288070 gate 1598907065832589800 evaluation starts +peer0.org2.example.com | [98a 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000288070 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [98b 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000288070 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [98c 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000288070 principal matched by identity 0 +peer0.org2.example.com | [98d 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [98e 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [98f 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000288070 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [990 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000288070 gate 1598907065832589800 evaluation succeeds +peer0.org2.example.com | [991 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [992 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [993 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [994 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [995 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [996 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [997 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [998 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [999 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [99a 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [99b 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [99c 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [99d 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [99e 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [99f 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9a0 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [96d 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [96e 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [96f 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [970 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [971 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [972 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [973 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [974 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [975 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [976 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [977 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [978 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [979 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [97a 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [97b 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [97c 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [97d 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [97e 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213510 gate 1598907066243624600 evaluation starts +peer1.org1.example.com | [97f 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213510 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [980 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213510 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [981 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213510 principal matched by identity 0 +peer1.org1.example.com | [982 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [983 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | [9a1 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [9a2 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [9a3 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [9a4 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [9a5 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [9a6 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000442080 gate 1598907066014608300 evaluation starts +peer0.org2.example.com | [9a7 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000442080 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [9a8 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000442080 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [9a9 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000442080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [9aa 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000442080 principal evaluation fails +peer0.org2.example.com | [9ab 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000442080 gate 1598907066014608300 evaluation fails +peer0.org2.example.com | [9ac 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [9ad 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [9ae 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [9af 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000442920 gate 1598907066016949000 evaluation starts +peer0.org2.example.com | [9b0 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000442920 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [9b1 08-31 20:51:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000442920 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [9b2 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000442920 principal matched by identity 0 +peer0.org2.example.com | [9b3 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [9b4 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [9b5 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000442920 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [9b6 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000442920 gate 1598907066016949000 evaluation succeeds +peer0.org2.example.com | [9b7 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [9b8 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [9b9 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [9ba 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [9bb 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9bc 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9bd 08-31 20:51:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [9be 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [9bf 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [9c0 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [9c1 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [9c2 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443c10 gate 1598907066031800100 evaluation starts +peer0.org2.example.com | [9c3 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443c10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [9c4 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443c10 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [9c5 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [9c6 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443c10 principal evaluation fails +peer0.org2.example.com | [9c7 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443c10 gate 1598907066031800100 evaluation fails +peer0.org2.example.com | [9c8 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [9c9 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [9ca 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [9cb 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000484480 gate 1598907066034445200 evaluation starts +peer0.org2.example.com | [9cc 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000484480 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [9cd 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000484480 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [9ce 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000484480 principal matched by identity 0 +peer0.org2.example.com | [9cf 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [9d0 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [9d1 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000484480 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [9d2 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000484480 gate 1598907066034445200 evaluation succeeds +peer0.org2.example.com | [9d3 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [9d4 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [9d5 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [9d6 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [9d7 08-31 20:51:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9d8 08-31 20:51:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9d9 08-31 20:51:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9da 08-31 20:51:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [9db 08-31 20:51:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9dc 08-31 20:51:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9dd 08-31 20:51:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [9de 08-31 20:51:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9df 08-31 20:51:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [9e0 08-31 20:51:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9e1 08-31 20:51:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9e2 08-31 20:51:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9e3 08-31 20:51:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [9e4 08-31 20:51:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [9e7 08-31 20:51:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9e5 08-31 20:51:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [9e6 08-31 20:51:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [9e8 08-31 20:51:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9e9 08-31 20:51:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9ea 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [9eb 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9ec 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9ee 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9ef 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9f0 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes to 3 peers +peer0.org2.example.com | [9f1 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9f2 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9f3 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [9f4 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9f5 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [9f6 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [984 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213510 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [985 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213510 gate 1598907066243624600 evaluation succeeds +peer1.org1.example.com | [986 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [987 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [988 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [989 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [98a 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [98b 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [98c 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to peer0.org2.example.com:7051 +peer1.org1.example.com | [98d 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [98e 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [98f 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [990 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13377390619896559762, Envelope: 962 bytes, Signature: 0 bytes +peer1.org1.example.com | [991 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13377390619896559762, Envelope: 962 bytes, Signature: 0 bytes +peer1.org1.example.com | [992 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [993 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [994 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [995 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [996 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [997 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [998 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [999 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227b60 gate 1598907066297874300 evaluation starts +peer1.org1.example.com | [99a 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227b60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [99b 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227b60 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [99c 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227b60 principal matched by identity 0 +peer1.org1.example.com | [99d 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 25 f6 22 1c d3 e4 fd 28 6d f6 b0 4b 35 35 b6 |.%."....(m..K55.| +peer1.org1.example.com | 00000010 b7 57 78 91 67 e7 fe 5a cf 4c 44 4e 25 37 10 23 |.Wx.g..Z.LDN%7.#| +peer1.org1.example.com | [99e 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 08 73 47 bc f3 8c 1f 9f 8d bd |0E.!...sG.......| +peer1.org1.example.com | 00000010 52 c7 75 74 c8 ca c9 e7 5a 06 db ef 9f ab c9 6a |R.ut....Z......j| +peer1.org1.example.com | 00000020 2a 06 27 12 e5 02 20 57 7e 9f be cb 71 bb 2d f5 |*.'... W~...q.-.| +peer1.org1.example.com | 00000030 a1 a2 a0 f8 13 3e 6d 22 eb 81 2f 3a b2 ac 63 57 |.....>m"../:..cW| +peer1.org1.example.com | 00000040 cd 6a 32 a0 2d 76 78 |.j2.-vx| +peer1.org1.example.com | [99f 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227b60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [9a0 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227b60 gate 1598907066297874300 evaluation succeeds +peer1.org1.example.com | [9a1 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9a2 08-31 20:51:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:02.168 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9f7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 440µs " +orderer0.example.com | "2020-08-31 20:51:02.170 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9f8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:02.171 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9f9 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:02.375 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9fa Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:02.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9fb Sending msg of 28 bytes to 3 on channel testchainid took 155.8µs" +orderer0.example.com | "2020-08-31 20:51:02.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9fc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 239.3µs " +orderer0.example.com | "2020-08-31 20:51:02.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9fd Sending msg of 28 bytes to 2 on channel businesschannel took 138.4µs" +orderer0.example.com | "2020-08-31 20:51:02.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 224.1µs " +orderer0.example.com | "2020-08-31 20:51:02.668 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9ff Sending msg of 28 bytes to 3 on channel businesschannel took 987.3µs" +orderer0.example.com | "2020-08-31 20:51:02.668 UTC [orderer.common.cluster.step] sendMessage -> DEBU a00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.6µs " +orderer0.example.com | "2020-08-31 20:51:02.669 UTC [orderer.common.cluster.step] handleMessage -> DEBU a01 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:02.670 UTC [orderer.common.cluster.step] handleMessage -> DEBU a02 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:02.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU a03 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:02.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a04 Sending msg of 28 bytes to 3 on channel testchainid took 34.2µs" +orderer0.example.com | "2020-08-31 20:51:02.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU a05 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 47.8µs " +orderer0.example.com | "2020-08-31 20:51:02.985 UTC [orderer.common.server] Deliver -> DEBU a06 Starting new Deliver handler" +orderer0.example.com | "2020-08-31 20:51:02.986 UTC [common.deliver] Handle -> DEBU a07 Starting new deliver loop for 172.18.0.9:50754" +orderer0.example.com | "2020-08-31 20:51:02.986 UTC [common.deliver] Handle -> DEBU a08 Attempting to read seek info message from 172.18.0.9:50754" +orderer0.example.com | "2020-08-31 20:51:03.004 UTC [orderer.common.server] Broadcast -> DEBU a09 Starting new Broadcast handler" +orderer0.example.com | "2020-08-31 20:51:03.004 UTC [orderer.common.broadcast] Handle -> DEBU a0a Starting new broadcast loop for 172.18.0.9:50756" +orderer0.example.com | "2020-08-31 20:51:03.005 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a0b [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:50756" +orderer0.example.com | "2020-08-31 20:51:03.005 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU a0c Processing config update message for exisitng channel businesschannel" +orderer0.example.com | "2020-08-31 20:51:03.006 UTC [policies] Evaluate -> DEBU a0d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +orderer0.example.com | "2020-08-31 20:51:03.006 UTC [policies] Evaluate -> DEBU a0e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:51:03.006 UTC [policies] Evaluate -> DEBU a0f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +orderer0.example.com | "2020-08-31 20:51:03.007 UTC [policies] Evaluate -> DEBU a10 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:51:03.007 UTC [policies] Evaluate -> DEBU a11 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +orderer0.example.com | "2020-08-31 20:51:03.007 UTC [msp] DeserializeIdentity -> DEBU a12 Obtaining identity" +orderer0.example.com | "2020-08-31 20:51:03.008 UTC [msp.identity] newIdentity -> DEBU a13 Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +orderer0.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +orderer0.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +orderer0.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +orderer0.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +orderer0.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +orderer0.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +orderer0.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +orderer0.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +orderer0.example.com | -----END CERTIFICATE-----" +orderer0.example.com | "2020-08-31 20:51:03.008 UTC [cauthdsl] func1 -> DEBU a14 0xc0010b9360 gate 1598907063008917800 evaluation starts" +orderer0.example.com | "2020-08-31 20:51:03.009 UTC [cauthdsl] func2 -> DEBU a15 0xc0010b9360 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:51:03.009 UTC [cauthdsl] func2 -> DEBU a16 0xc0010b9360 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:51:03.009 UTC [cauthdsl] func2 -> DEBU a17 0xc0010b9360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +orderer0.example.com | "2020-08-31 20:51:03.010 UTC [cauthdsl] func2 -> DEBU a18 0xc0010b9360 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:51:03.010 UTC [cauthdsl] func1 -> DEBU a19 0xc0010b9360 gate 1598907063008917800 evaluation fails" +orderer0.example.com | "2020-08-31 20:51:03.010 UTC [policies] Evaluate -> DEBU a1a Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-08-31 20:51:03.011 UTC [policies] Evaluate -> DEBU a1b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +orderer0.example.com | "2020-08-31 20:51:03.011 UTC [policies] func1 -> DEBU a1c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +orderer0.example.com | "2020-08-31 20:51:03.011 UTC [policies] Evaluate -> DEBU a1d Signature set did not satisfy policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-08-31 20:51:03.011 UTC [policies] Evaluate -> DEBU a1e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +orderer0.example.com | "2020-08-31 20:51:03.012 UTC [policies] Evaluate -> DEBU a1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +orderer0.example.com | "2020-08-31 20:51:03.012 UTC [policies] Evaluate -> DEBU a20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:51:03.012 UTC [policies] Evaluate -> DEBU a21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +orderer0.example.com | "2020-08-31 20:51:03.012 UTC [cauthdsl] func1 -> DEBU a22 0xc0011269d0 gate 1598907063012736200 evaluation starts" +orderer0.example.com | "2020-08-31 20:51:03.012 UTC [cauthdsl] func2 -> DEBU a23 0xc0011269d0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:51:03.013 UTC [cauthdsl] func2 -> DEBU a24 0xc0011269d0 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:51:03.013 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a25 Checking if identity satisfies MEMBER role for Org2MSP" +orderer0.example.com | "2020-08-31 20:51:03.013 UTC [msp] Validate -> DEBU a26 MSP Org2MSP validating identity" +orderer0.example.com | "2020-08-31 20:51:03.014 UTC [msp] getCertificationChain -> DEBU a27 MSP Org2MSP getting certification chain" +orderer0.example.com | "2020-08-31 20:51:03.014 UTC [cauthdsl] func2 -> DEBU a28 0xc0011269d0 principal matched by identity 0" +orderer0.example.com | "2020-08-31 20:51:03.015 UTC [msp.identity] Verify -> DEBU a29 Verify: digest = 00000000 3e 05 5b 15 1a 09 ab 32 06 ff 4c 4e 78 b7 57 2f |>.[....2..LNx.W/| +orderer0.example.com | 00000010 f6 40 a4 b5 ea 6e 4f 3c b0 8b da 94 bb 64 e1 50 |.@...nO<.....d.P|" +orderer0.example.com | "2020-08-31 20:51:03.015 UTC [msp.identity] Verify -> DEBU a2a Verify: sig = 00000000 30 45 02 21 00 95 43 a6 47 cd 4c 50 cc 6e a3 4a |0E.!..C.G.LP.n.J| +orderer0.example.com | 00000010 c0 11 65 e1 9a a2 2a 9f 46 b6 78 d0 12 94 c1 e9 |..e...*.F.x.....| +orderer0.example.com | 00000020 0d 59 4e f3 e3 02 20 11 c4 ab 2e bc 31 d5 c0 3f |.YN... .....1..?| +orderer0.example.com | 00000030 60 55 3f 88 1f 6d 87 76 14 3f 24 86 ce 51 da d8 |`U?..m.v.?$..Q..| +orderer0.example.com | 00000040 b2 44 b8 31 16 64 d5 |.D.1.d.|" +orderer0.example.com | "2020-08-31 20:51:03.016 UTC [cauthdsl] func2 -> DEBU a2b 0xc0011269d0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-08-31 20:51:03.016 UTC [cauthdsl] func1 -> DEBU a2c 0xc0011269d0 gate 1598907063012736200 evaluation succeeds" +orderer0.example.com | "2020-08-31 20:51:03.016 UTC [policies] Evaluate -> DEBU a2d Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-08-31 20:51:03.016 UTC [policies] Evaluate -> DEBU a2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-08-31 20:51:03.017 UTC [policies] Evaluate -> DEBU a2f Signature set satisfies policy /Channel/Application/Writers" +orderer0.example.com | "2020-08-31 20:51:03.017 UTC [policies] Evaluate -> DEBU a30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +orderer0.example.com | "2020-08-31 20:51:03.017 UTC [policies] Evaluate -> DEBU a31 Signature set satisfies policy /Channel/Writers" +orderer0.example.com | "2020-08-31 20:51:03.017 UTC [policies] Evaluate -> DEBU a32 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +orderer0.example.com | "2020-08-31 20:51:03.018 UTC [common.configtx] addToMap -> DEBU a33 Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-08-31 20:51:03.018 UTC [common.configtx] addToMap -> DEBU a34 Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:51:03.018 UTC [common.configtx] addToMap -> DEBU a35 Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:51:03.019 UTC [common.configtx] addToMap -> DEBU a36 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-08-31 20:51:03.019 UTC [common.configtx] addToMap -> DEBU a37 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:51:03.019 UTC [common.configtx] addToMap -> DEBU a38 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-08-31 20:51:03.020 UTC [common.configtx] addToMap -> DEBU a39 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-08-31 20:51:03.020 UTC [common.configtx] addToMap -> DEBU a3a Adding to config map: [Group] /Channel" +orderer0.example.com | "2020-08-31 20:51:03.021 UTC [common.configtx] addToMap -> DEBU a3b Adding to config map: [Group] /Channel/Application" +orderer0.example.com | "2020-08-31 20:51:03.021 UTC [common.configtx] addToMap -> DEBU a3c Adding to config map: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:51:03.021 UTC [common.configtx] addToMap -> DEBU a3d Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-08-31 20:51:03.021 UTC [common.configtx] addToMap -> DEBU a3e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +orderer0.example.com | "2020-08-31 20:51:03.022 UTC [common.configtx] addToMap -> DEBU a3f Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:51:03.022 UTC [common.configtx] addToMap -> DEBU a40 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +orderer0.example.com | "2020-08-31 20:51:03.022 UTC [common.configtx] addToMap -> DEBU a41 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-08-31 20:51:03.022 UTC [common.configtx] verifyDeltaSet -> DEBU a42 Processing change to key: [Group] /Channel/Application/Org2MSP" +orderer0.example.com | "2020-08-31 20:51:03.023 UTC [common.configtx] policyForItem -> DEBU a43 Getting policy for item Org2MSP with mod_policy Admins" +orderer0.example.com | "2020-08-31 20:51:03.023 UTC [policies] Manager -> DEBU a44 Manager Channel looking up path [Application]" +orderer0.example.com | "2020-08-31 20:51:03.023 UTC [policies] Manager -> DEBU a45 Manager Channel has managers Orderer" +orderer0.example.com | "2020-08-31 20:51:03.023 UTC [policies] Manager -> DEBU a46 Manager Channel has managers Application" +orderer0.example.com | "2020-08-31 20:51:03.023 UTC [policies] Manager -> DEBU a47 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-08-31 20:51:03.024 UTC [policies] Manager -> DEBU a48 Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-08-31 20:51:03.024 UTC [policies] Manager -> DEBU a49 Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-08-31 20:51:03.024 UTC [policies] Manager -> DEBU a4a Manager Channel/Application looking up path [Org2MSP]" +orderer0.example.com | "2020-08-31 20:51:03.024 UTC [policies] Manager -> DEBU a4b Manager Channel/Application has managers Org2MSP" +orderer0.example.com | "2020-08-31 20:51:03.024 UTC [policies] Manager -> DEBU a4c Manager Channel/Application has managers Org1MSP" +orderer0.example.com | "2020-08-31 20:51:03.024 UTC [policies] Manager -> DEBU a4d Manager Channel/Application/Org2MSP looking up path []" +orderer0.example.com | "2020-08-31 20:51:03.025 UTC [policies] Evaluate -> DEBU a4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +orderer0.example.com | "2020-08-31 20:51:03.025 UTC [cauthdsl] func1 -> DEBU a4f 0xc00113b730 gate 1598907063025257800 evaluation starts" +orderer0.example.com | "2020-08-31 20:51:03.025 UTC [cauthdsl] func2 -> DEBU a50 0xc00113b730 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:51:03.025 UTC [cauthdsl] func2 -> DEBU a51 0xc00113b730 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:51:03.025 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU a52 Checking if identity has been named explicitly as an admin for Org2MSP" +orderer0.example.com | "2020-08-31 20:51:03.026 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU a53 Checking if identity carries the admin ou for Org2MSP" +orderer0.example.com | "2020-08-31 20:51:03.026 UTC [msp] Validate -> DEBU a54 MSP Org2MSP validating identity" +orderer0.example.com | "2020-08-31 20:51:03.026 UTC [msp] getCertificationChain -> DEBU a55 MSP Org2MSP getting certification chain" +orderer0.example.com | "2020-08-31 20:51:03.027 UTC [msp] hasOURole -> DEBU a56 MSP Org2MSP checking if the identity is a client" +orderer0.example.com | "2020-08-31 20:51:03.027 UTC [msp] getCertificationChain -> DEBU a57 MSP Org2MSP getting certification chain" +orderer0.example.com | "2020-08-31 20:51:03.027 UTC [cauthdsl] func2 -> DEBU a58 0xc00113b730 principal matched by identity 0" +orderer0.example.com | "2020-08-31 20:51:03.027 UTC [msp.identity] Verify -> DEBU a59 Verify: digest = 00000000 16 3d f8 a1 bf ae 7d e4 fb dc 40 c7 07 6d de 8d |.=....}...@..m..| +orderer0.example.com | 00000010 fb 6b e1 2c 0c 1e 66 98 ba 3d 47 90 dc a4 d0 63 |.k.,..f..=G....c|" +orderer0.example.com | "2020-08-31 20:51:03.028 UTC [msp.identity] Verify -> DEBU a5a Verify: sig = 00000000 30 44 02 20 75 27 f4 6f dd 5b 2d 12 b9 82 60 1a |0D. u'.o.[-...`.| +orderer0.example.com | 00000010 88 90 67 88 50 b6 97 37 e6 93 6d 8e 20 ca 9f 40 |..g.P..7..m. ..@| +orderer0.example.com | 00000020 df d1 ae 7e 02 20 2b 77 8a 7e aa 5c bd fa f5 76 |...~. +w.~.\...v| +orderer0.example.com | 00000030 6b bd 3d 49 6e 73 1a 12 7f 30 6c 34 57 c0 06 c4 |k.=Ins...0l4W...| +orderer0.example.com | 00000040 56 0c 2b fa b4 c4 |V.+...|" +orderer0.example.com | "2020-08-31 20:51:03.028 UTC [cauthdsl] func2 -> DEBU a5b 0xc00113b730 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-08-31 20:51:03.029 UTC [cauthdsl] func1 -> DEBU a5c 0xc00113b730 gate 1598907063025257800 evaluation succeeds" +orderer0.example.com | "2020-08-31 20:51:03.029 UTC [policies] Evaluate -> DEBU a5d Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-08-31 20:51:03.029 UTC [policies] Evaluate -> DEBU a5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +orderer0.example.com | "2020-08-31 20:51:03.029 UTC [common.configtx] verifyDeltaSet -> DEBU a5f Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +orderer0.example.com | "2020-08-31 20:51:03.030 UTC [common.configtx] recurseConfigMap -> DEBU a60 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:03.030 UTC [common.configtx] recurseConfigMap -> DEBU a61 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:03.030 UTC [common.configtx] recurseConfigMap -> DEBU a62 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:03.031 UTC [common.configtx] recurseConfigMap -> DEBU a63 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:03.031 UTC [common.configtx] recurseConfigMap -> DEBU a64 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:03.031 UTC [common.configtx] recurseConfigMap -> DEBU a65 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:03.032 UTC [common.configtx] recurseConfigMap -> DEBU a66 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:03.032 UTC [common.configtx] recurseConfigMap -> DEBU a67 Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:03.032 UTC [common.configtx] recurseConfigMap -> DEBU a68 Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:03.033 UTC [common.configtx] recurseConfigMap -> DEBU a69 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:03.033 UTC [common.configtx] recurseConfigMap -> DEBU a6a Setting policy for key Readers to " +orderer0.example.com | "2020-08-31 20:51:03.034 UTC [common.configtx] recurseConfigMap -> DEBU a6b Setting policy for key Writers to " +orderer0.example.com | "2020-08-31 20:51:03.034 UTC [common.configtx] recurseConfigMap -> DEBU a6c Setting policy for key Admins to " +orderer0.example.com | "2020-08-31 20:51:03.034 UTC [common.configtx] recurseConfigMap -> DEBU a6d Setting policy for key Endorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:03.034 UTC [common.configtx] recurseConfigMap -> DEBU a6e Setting policy for key Readers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:03.034 UTC [common.configtx] recurseConfigMap -> DEBU a6f Setting policy for key Writers to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:03.035 UTC [common.configtx] recurseConfigMap -> DEBU a70 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:03.035 UTC [common.configtx] recurseConfigMap -> DEBU a71 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:03.035 UTC [common.configtx] recurseConfigMap -> DEBU a72 Setting policy for key Admins to policy: mod_policy:"Admins" " +orderer0.example.com | "2020-08-31 20:51:03.035 UTC [common.configtx] recurseConfigMap -> DEBU a73 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [7b3 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7b4 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [7b5 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [7b6 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [7b7 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [7b8 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [7b9 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d3910 gate 1598907064325986700 evaluation starts +peer0.org1.example.com | [7ba 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d3910 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [7bb 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d3910 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [7bc 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d3910 principal matched by identity 0 +peer0.org1.example.com | [7bd 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [7be 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 f7 64 51 44 99 fd 8f c6 0d 6d |0E.!...dQD.....m| +peer0.org1.example.com | 00000010 fb 97 4b ad c0 a5 31 1c dc 9b bd f7 0c 24 88 13 |..K...1......$..| +peer0.org1.example.com | 00000020 e5 6a 12 e6 9c 02 20 46 50 79 d2 2f 70 d8 a6 53 |.j.... FPy./p..S| +peer0.org1.example.com | 00000030 c8 ff 35 2e ff 4f 5c bb a1 ed 82 30 38 23 d5 0c |..5..O\....08#..| +peer0.org1.example.com | 00000040 96 df 28 50 40 29 c1 |..(P@).| +peer0.org1.example.com | [7bf 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d3910 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [7c0 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d3910 gate 1598907064325986700 evaluation succeeds +peer0.org1.example.com | [7c1 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [7c2 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [7c3 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [7c4 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [7c5 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:54886 +peer0.org1.example.com | [7c6 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:54886 +peer0.org1.example.com | [7c7 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [7c8 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [7c9 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 canceling read because closing +peer0.org1.example.com | [7ca 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [7cb 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [7cc 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:54886 disconnected +peer0.org1.example.com | [7cd 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:51:14.324Z grpc.peer_address=172.18.0.6:54886 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.7663ms +peer0.org1.example.com | [7ce 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [7cf 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.362Z grpc.peer_address=172.18.0.6:54888 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=319.1µs +peer0.org1.example.com | [7d0 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [7d1 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [7d2 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [7d3 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:54888 +peer0.org1.example.com | [7d4 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:54888 +peer0.org1.example.com | [7d5 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7d6 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7d7 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7d8 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7d9 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7da 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7db 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [7dc 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [7dd 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [7de 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [7df 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [7e0 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198960 gate 1598907064383216200 evaluation starts +peer0.org1.example.com | [7e1 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198960 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [7e2 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198960 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [7e3 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198960 principal matched by identity 0 +peer0.org1.example.com | [7e4 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [7e5 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 55 32 7a 05 ca 84 c3 07 5e c6 b4 |0D. (U2z.....^..| +peer0.org1.example.com | 00000010 5c dd 41 ee 45 c3 03 83 b2 04 6a 6a ad 8b 01 f2 |\.A.E.....jj....| +peer0.org1.example.com | 00000020 3a 92 bf c3 02 20 6e 08 f3 aa 47 ce 22 c9 72 ea |:.... n...G.".r.| +peer0.org1.example.com | 00000030 5d 3c d8 9a e6 57 b0 68 52 1c c5 d4 a7 77 ae 4d |]<...W.hR....w.M| +peer0.org1.example.com | 00000040 07 fe 22 d3 5e 02 |..".^.| +peer0.org1.example.com | [7e6 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198960 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [7e7 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198960 gate 1598907064383216200 evaluation succeeds +peer0.org1.example.com | [7e8 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [7e9 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [7ea 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [7eb 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [7ec 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:54888 +peer0.org1.example.com | [7ed 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:54888 +peer0.org1.example.com | [7ee 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54888 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: nonce:7651936313432245060 tag:EMPTY mem_req:\310\027~\352\216\253>" > > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [7ef 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [7f0 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:7651936313432245060 tag:EMPTY mem_req:\310\027~\352\216\253>" > > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [7f1 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [7f2 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [7f3 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [7f4 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [7f5 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [7f6 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [7f7 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [7f8 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [7f9 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003199410 gate 1598907064401738000 evaluation starts +peer0.org1.example.com | [7fa 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003199410 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [7fb 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003199410 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [7fc 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003199410 principal matched by identity 0 +peer0.org1.example.com | [7fd 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f 43 86 1c 03 e4 99 e3 91 b6 a7 ae a6 7f 53 45 |.C............SE| +peer0.org1.example.com | 00000010 a7 5e d1 90 cb bc ec 0f f6 8d 46 10 94 85 64 4c |.^........F...dL| +peer0.org1.example.com | [7fe 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 03 5a 2c 42 53 7a d0 e2 6e 62 |0E.!...Z,BSz..nb| +peer0.org1.example.com | 00000010 e4 8d 68 0c fe 4d 10 37 e3 bf 91 53 cd 9f 2d af |..h..M.7...S..-.| +peer0.org1.example.com | 00000020 e7 2a 98 74 8c 02 20 7a 87 10 12 60 42 fa 6a 82 |.*.t.. z...`B.j.| +peer0.org1.example.com | 00000030 d7 62 c2 40 47 21 b2 80 a2 37 92 42 52 1c 9b 3e |.b.@G!...7.BR..>| +peer0.org1.example.com | 00000040 c8 17 7e ea 8e ab 3e |..~...>| +peer0.org1.example.com | [7ff 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003199410 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [800 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003199410 gate 1598907064401738000 evaluation succeeds +peer0.org1.example.com | [801 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [802 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [803 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [804 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [805 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [806 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [807 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [808 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [809 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [80a 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [80b 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [80c 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [80d 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [80e 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [80f 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [810 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 7651936313432245060, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [811 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7651936313432245060, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +peer0.org1.example.com | [812 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [813 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\310\027~\352\216\253>" > alive: +peer0.org1.example.com | [814 08-31 20:51:04.45 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.453Z grpc.peer_address=172.18.0.6:54890 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=201.7µs +peer0.org1.example.com | [815 08-31 20:51:04.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [816 08-31 20:51:04.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [817 08-31 20:51:04.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [818 08-31 20:51:04.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:54890 +peer0.org1.example.com | [819 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:54890 +peer0.org1.example.com | [81a 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [81b 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [81c 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [81d 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [81e 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [81f 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [820 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [821 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [822 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [823 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [824 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [825 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003226630 gate 1598907064464371200 evaluation starts +peer0.org1.example.com | [826 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003226630 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [827 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003226630 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [828 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003226630 principal matched by identity 0 +peer0.org1.example.com | [829 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [82a 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 48 08 d2 fa 5a c6 ec ea 43 87 82 |0D. HH...Z...C..| +peer0.org1.example.com | 00000010 ef 17 9b 39 81 a6 23 d5 3a 92 a3 86 3a e8 7d 64 |...9..#.:...:.}d| +peer0.org1.example.com | 00000020 e6 7b e2 b6 02 20 53 59 c4 58 d9 6f b1 35 41 23 |.{... SY.X.o.5A#| +peer0.org1.example.com | 00000030 ed 69 28 ad c4 04 6f 12 2a ca 35 44 11 07 7f f2 |.i(...o.*.5D....| +peer0.org1.example.com | 00000040 a3 8f 53 6f 7f 47 |..So.G| +peer0.org1.example.com | [82b 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003226630 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [82c 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003226630 gate 1598907064464371200 evaluation succeeds +peer0.org1.example.com | [82d 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [82e 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [82f 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [830 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [831 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [832 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:54890 +peer0.org1.example.com | [833 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:54890 +peer0.org1.example.com | [835 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:54888 disconnected +peer0.org1.example.com | [836 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:54888 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=105.9213ms +peer0.org1.example.com | [837 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [838 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:54890 disconnected +peer0.org1.example.com | [839 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:51:14.457Z grpc.peer_address=172.18.0.6:54890 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=15.2633ms +peer0.org1.example.com | [834 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [83a 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 canceling read because closing +peer0.org1.example.com | [83b 08-31 20:51:04.57 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.573Z grpc.peer_address=172.18.0.5:39432 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=251.4µs +peer0.org1.example.com | [83c 08-31 20:51:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [83d 08-31 20:51:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [83e 08-31 20:51:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [83f 08-31 20:51:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:39432 +peer0.org1.example.com | [840 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.5:39432 +peer0.org1.example.com | [841 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [842 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [843 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org1.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org1.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org1.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [844 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [8c9 08-31 20:51:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8ca 08-31 20:51:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [8cb 08-31 20:51:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 45 23 3a 25 15 88 da 8f 53 4a 1b 00 79 c1 f8 |.E#:%....SJ..y..| +peer1.org2.example.com | 00000010 61 47 17 a6 05 0c 7c a5 2c 8e 32 89 cd d4 ab 53 |aG....|.,.2....S| +peer1.org2.example.com | [8cc 08-31 20:51:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 96 2d 33 a9 0f 8e 0a 58 ac e1 |0E.!...-3....X..| +peer1.org2.example.com | 00000010 e1 cf dd 39 bc 9a 6b 4a b8 24 7d a8 d8 5f 60 13 |...9..kJ.$}.._`.| +peer1.org2.example.com | 00000020 1f 92 ed c4 6b 02 20 52 28 b2 cc d3 6c ac c0 78 |....k. R(...l..x| +peer1.org2.example.com | 00000030 6b 85 f8 08 54 72 4f 15 e4 be 07 d9 0e 2d 45 61 |k...TrO......-Ea| +peer1.org2.example.com | 00000040 67 ba 52 10 74 ab 11 |g.R.t..| +peer1.org2.example.com | [8cd 08-31 20:51:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [8ce 08-31 20:51:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [8cf 08-31 20:51:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [8d0 08-31 20:51:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [8d1 08-31 20:51:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8d2 08-31 20:51:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8d3 08-31 20:51:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [8d4 08-31 20:51:09.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [8d5 08-31 20:51:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 45 23 3a 25 15 88 da 8f 53 4a 1b 00 79 c1 f8 |.E#:%....SJ..y..| +peer1.org2.example.com | 00000010 61 47 17 a6 05 0c 7c a5 2c 8e 32 89 cd d4 ab 53 |aG....|.,.2....S| +peer1.org2.example.com | [8d6 08-31 20:51:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 96 2d 33 a9 0f 8e 0a 58 ac e1 |0E.!...-3....X..| +peer1.org2.example.com | 00000010 e1 cf dd 39 bc 9a 6b 4a b8 24 7d a8 d8 5f 60 13 |...9..kJ.$}.._`.| +peer1.org2.example.com | 00000020 1f 92 ed c4 6b 02 20 52 28 b2 cc d3 6c ac c0 78 |....k. R(...l..x| +peer1.org2.example.com | 00000030 6b 85 f8 08 54 72 4f 15 e4 be 07 d9 0e 2d 45 61 |k...TrO......-Ea| +peer1.org2.example.com | 00000040 67 ba 52 10 74 ab 11 |g.R.t..| +peer1.org2.example.com | [8d7 08-31 20:51:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [8d8 08-31 20:51:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 49 f2 33 07 12 7a 0a 25 0b 97 |0E.!..I.3..z.%..| +peer1.org2.example.com | 00000010 99 e1 44 7b a0 37 87 ff df d3 52 48 15 ec 7c d8 |..D{.7....RH..|.| +peer1.org2.example.com | 00000020 88 90 f7 c2 3a 02 20 7a a4 dc ff f1 5a 53 7c c6 |....:. z....ZS|.| +peer1.org2.example.com | 00000030 9a 20 e5 29 4d 10 db f2 79 f7 85 11 1d 9c 25 5e |. .)M...y.....%^| +peer1.org2.example.com | 00000040 29 21 27 bb 2d 66 ee |)!'.-f.| +peer1.org2.example.com | [8d9 08-31 20:51:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [8da 08-31 20:51:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [8db 08-31 20:51:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8dc 08-31 20:51:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8dd 08-31 20:51:09.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8de 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [8df 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [8e0 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 91 49 4c 33 6a 73 b2 3b e8 aa 4e 32 8d a0 f9 |..IL3js.;..N2...| +peer1.org2.example.com | 00000010 42 67 bc 6e 08 f6 68 6d 3b 66 66 68 ec f7 1d 61 |Bg.n..hm;ffh...a| +peer1.org2.example.com | [8e1 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ff 7a 6a 30 50 ee 22 0b 9b 85 |0E.!...zj0P."...| +peer1.org2.example.com | 00000010 d0 f5 ce e6 c8 82 f5 a0 4b a9 98 6a 78 52 59 72 |........K..jxRYr| +peer1.org2.example.com | 00000020 d4 3c 2b 26 d4 02 20 1e 37 fe 35 95 57 ca 84 80 |.<+&.. .7.5.W...| +peer1.org2.example.com | 00000030 b3 0c ac e9 b7 39 c3 1c eb 11 3c 50 a9 c6 d5 9c |.....9.... DEBU Exiting +peer1.org2.example.com | [8e3 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [8e4 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us declaration +peer0.org2.example.com | [9f7 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [9f8 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [9ed 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [9f9 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [9fa 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [9fb 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [9fc 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [9fd 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [9fe 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [9ff 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000180600 gate 1598907066249742400 evaluation starts +peer0.org2.example.com | [a00 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000180600 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a01 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000180600 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [a02 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000180600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [a03 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000180600 principal evaluation fails +peer0.org2.example.com | [a04 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000180600 gate 1598907066249742400 evaluation fails +peer0.org2.example.com | [a05 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a06 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a07 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [a08 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000180d20 gate 1598907066250181000 evaluation starts +peer0.org2.example.com | [a09 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000180d20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a0a 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000180d20 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [a0b 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000180d20 principal matched by identity 0 +peer0.org2.example.com | [a0c 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [a0d 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [a0e 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000180d20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [a0f 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000180d20 gate 1598907066250181000 evaluation succeeds +peer0.org2.example.com | [a10 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a11 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [a12 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [a13 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [a14 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [a15 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [a16 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a17 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a18 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [a19 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [a1a 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [a1b 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a1c 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org2.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org2.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org2.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org2.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [a1d 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000181ee0 gate 1598907066251357500 evaluation starts +peer0.org2.example.com | [a1e 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000181ee0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a1f 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000181ee0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [a20 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [a21 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [a22 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [a23 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000181ee0 principal matched by identity 0 +peer0.org2.example.com | [a24 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [a25 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [a26 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000181ee0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [a28 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000181ee0 gate 1598907066251357500 evaluation succeeds +peer0.org2.example.com | [a29 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a27 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a2a 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a2b 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [a2c 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [a2d 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [a2e 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a2f 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a30 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a31 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a32 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a33 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [a34 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [8e5 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [8e6 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [8e7 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [8e8 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D981610031801 +peer1.org2.example.com | [8e9 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CB81B7FD2C7B7C572239094B14D57DD47B54BA32FF615E0369528C0F521A62EB +peer1.org2.example.com | [8ea 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [8eb 08-31 20:51:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [8ec 08-31 20:51:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [8ed 08-31 20:51:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [8ee 08-31 20:51:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [8ef 08-31 20:51:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [8f0 08-31 20:51:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8f1 08-31 20:51:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [8f2 08-31 20:51:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [8f3 08-31 20:51:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [8f4 08-31 20:51:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [8f5 08-31 20:51:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8f6 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [8f7 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [8f8 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [8f9 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [8fa 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [8fb 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 a7 64 a1 59 2f 08 ef 19 da 91 37 9a b5 49 98 |I.d.Y/.....7..I.| +peer1.org2.example.com | 00000010 15 63 00 ab 9c 13 83 36 60 dc 57 6d df 31 1b 11 |.c.....6`.Wm.1..| +peer1.org2.example.com | [8fc 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 9d 53 bd aa 48 cc 88 5a 1c 15 |0E.!...S..H..Z..| +peer1.org2.example.com | 00000010 83 dc d6 95 46 d4 65 0b a5 5b 92 6e 2f 70 c0 8b |....F.e..[.n/p..| +peer1.org2.example.com | 00000020 d8 0a 17 fe c0 02 20 14 9a 17 05 81 a7 93 ce c9 |...... .........| +peer1.org2.example.com | 00000030 0b 18 48 d1 e0 56 16 62 4c e8 73 fd c9 21 7a 62 |..H..V.bL.s..!zb| +peer1.org2.example.com | 00000040 ee d4 2f 0e c1 8b 64 |../...d| +peer1.org2.example.com | [8fd 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [8fe 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0c da 10 87 7e 21 8e 67 00 a1 83 43 |0D. ....~!.g...C| +peer1.org2.example.com | 00000010 3f 33 e4 e0 14 0a b2 a0 eb 46 fa f3 48 a4 8c 8d |?3.......F..H...| +peer1.org2.example.com | 00000020 0c 8a 57 18 02 20 48 a3 15 84 94 03 43 ae 90 1e |..W.. H.....C...| +peer1.org2.example.com | 00000030 6e 21 89 69 db c0 6d 2d 2a 7f 18 cb 34 7c 86 c5 |n!.i..m-*...4|..| +peer1.org2.example.com | 00000040 68 01 a3 72 e3 0e |h..r..| +peer1.org2.example.com | [8ff 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [900 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [901 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [902 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [903 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [904 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [905 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [907 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [908 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [909 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [90a 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +peer1.org2.example.com | [90b 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer1.org2.example.com | [90c 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [906 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [90d 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [90e 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [90f 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [910 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [911 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [912 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [913 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [914 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [915 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [916 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [917 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [918 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [919 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [91a 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [91b 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [91c 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [91d 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [91e 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003976f0 gate 1598907069555860100 evaluation starts +peer1.org2.example.com | [91f 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003976f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [920 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003976f0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [921 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003976f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [922 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003976f0 principal evaluation fails +peer1.org2.example.com | [923 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003976f0 gate 1598907069555860100 evaluation fails +peer1.org2.example.com | [924 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [925 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [926 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [927 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000397c60 gate 1598907069558363400 evaluation starts +peer1.org2.example.com | [928 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000397c60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [929 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000397c60 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [92a 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000397c60 principal matched by identity 0 +peer1.org2.example.com | [92b 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f 9b 70 86 9c 21 8c 04 61 a8 97 0f 34 51 37 a8 |..p..!..a...4Q7.| +peer1.org2.example.com | 00000010 8c b8 fe 8e df 8c f9 29 04 cb a2 69 ce 90 94 22 |.......)...i..."| +peer1.org2.example.com | [92c 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 50 cd 21 f6 c0 4c f9 23 4e ec |0E.!..P.!..L.#N.| +peer1.org2.example.com | 00000010 40 3a 91 75 e8 8c 2e 5c cc 24 be 30 ad d6 e2 f2 |@:.u...\.$.0....| +peer1.org2.example.com | 00000020 81 13 ba f1 62 02 20 22 84 86 fa c4 db b9 6f e1 |....b. "......o.| +peer1.org2.example.com | 00000030 47 27 9d 59 2e 0d 70 78 03 93 59 69 54 ba 48 1c |G'.Y..px..YiT.H.| +peer1.org2.example.com | 00000040 f7 07 5a 5f 3b 73 3c |..Z_;s<| +peer1.org2.example.com | [92d 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000397c60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [92e 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000397c60 gate 1598907069558363400 evaluation succeeds +peer1.org2.example.com | [92f 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [930 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [931 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [932 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [933 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [934 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [935 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [936 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [937 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [938 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [939 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [93a 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [93b 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [93c 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [93d 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [93e 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [93f 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +peer1.org2.example.com | [940 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes +peer1.org2.example.com | [941 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [942 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [943 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [944 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [945 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [946 08-31 20:51:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org2.example.com | [947 08-31 20:51:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to peer0.org2.example.com:7051 +peer1.org2.example.com | [948 08-31 20:51:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [949 08-31 20:51:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to peer0.org1.example.com:7051 +peer1.org2.example.com | [94a 08-31 20:51:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [94b 08-31 20:51:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [94c 08-31 20:51:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [94d 08-31 20:51:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org2.example.com | [94e 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [94f 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 996968295522414921, Envelope: 961 bytes, Signature: 0 bytes +peer1.org2.example.com | [950 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 996968295522414921, Envelope: 961 bytes, Signature: 0 bytes +peer1.org2.example.com | [951 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [952 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [953 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer1.org2.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer1.org2.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer1.org2.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer1.org2.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [954 08-31 20:51:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [955 08-31 20:51:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [956 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [957 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [958 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [959 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [95a 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [95b 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [95c 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e8950 gate 1598907070016103300 evaluation starts +peer1.org2.example.com | [95d 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e8950 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [95e 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e8950 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [95f 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e8950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [960 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e8950 principal evaluation fails +peer1.org1.example.com | [9a3 08-31 20:51:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:03.036 UTC [common.configtx] recurseConfigMap -> DEBU a74 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [845 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [a35 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [961 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e8950 gate 1598907070016103300 evaluation fails +peer1.org1.example.com | [9a4 08-31 20:51:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:03.036 UTC [common.channelconfig] NewStandardValues -> DEBU a75 Initializing protos for *channelconfig.ChannelProtos" +peer0.org1.example.com | [846 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a36 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033bd70 gate 1598907066263737300 evaluation starts +peer1.org2.example.com | [962 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9a5 08-31 20:51:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.036 UTC [common.channelconfig] initializeProtosStruct -> DEBU a76 Processing field: HashingAlgorithm" +peer0.org1.example.com | [847 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a37 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033bd70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [963 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9a6 08-31 20:51:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.036 UTC [common.channelconfig] initializeProtosStruct -> DEBU a77 Processing field: BlockDataHashingStructure" +peer0.org1.example.com | [848 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a38 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033bd70 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [964 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [9a7 08-31 20:51:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 13377390619896559762, Envelope: 962 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.036 UTC [common.channelconfig] initializeProtosStruct -> DEBU a78 Processing field: OrdererAddresses" +peer0.org1.example.com | [849 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a39 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033bd70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [965 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e8f20 gate 1598907070021508100 evaluation starts +peer1.org1.example.com | [9a8 08-31 20:51:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU a79 Processing field: Consortium" +peer0.org1.example.com | [84a 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a3a 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033bd70 principal evaluation fails +peer1.org2.example.com | [966 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e8f20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [9a9 08-31 20:51:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU a7a Processing field: Capabilities" +peer0.org1.example.com | [84b 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a3b 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033bd70 gate 1598907066263737300 evaluation fails +peer1.org2.example.com | [967 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e8f20 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [9aa 08-31 20:51:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.037 UTC [common.channelconfig] NewStandardValues -> DEBU a7b Initializing protos for *channelconfig.OrdererProtos" +peer0.org1.example.com | [84c 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a3c 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [968 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +orderer0.example.com | "2020-08-31 20:51:03.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU a7c Processing field: ConsensusType" +peer0.org1.example.com | [84d 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a3d 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [969 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [9ab 08-31 20:51:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.038 UTC [common.channelconfig] initializeProtosStruct -> DEBU a7d Processing field: BatchSize" +peer0.org1.example.com | [84e 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [a3e 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [96a 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [9ac 08-31 20:51:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 77 114 85 53 109 108 114 103 84 49 82 104 120 79 108 113 83 65 121 80 83 99 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 70 102 72 121 75 118 101 70 56 113 81 10 52 54 73 90 51 80 88 97 97 57 49 118 101 113 83 111 97 99 98 86 119 52 69 80 106 120 111 47 118 43 70 105 86 50 50 108 101 86 114 86 80 98 88 47 109 82 86 104 69 52 86 67 78 51 69 122 113 49 109 112 43 66 79 81 10 83 80 110 55 109 77 86 43 74 50 50 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 67 110 50 107 48 100 57 99 113 107 109 97 75 87 79 54 122 51 114 55 49 101 65 115 43 85 75 108 76 83 68 103 107 65 65 71 98 67 112 48 86 85 57 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 66 115 112 70 108 117 53 110 90 88 109 49 83 112 49 70 85 72 69 47 89 111 108 57 68 117 102 85 104 115 54 79 109 76 102 82 75 117 83 83 119 121 106 65 105 65 97 88 107 87 87 10 104 98 89 77 116 53 73 103 68 97 77 51 83 70 86 47 107 54 49 71 77 120 84 112 75 68 103 90 71 71 117 103 72 78 68 68 108 103 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +orderer0.example.com | "2020-08-31 20:51:03.038 UTC [common.channelconfig] initializeProtosStruct -> DEBU a7e Processing field: BatchTimeout" +peer0.org1.example.com | [84f 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [a3f 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a62e0 gate 1598907066265607400 evaluation starts +peer1.org2.example.com | [96b 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e8f20 principal matched by identity 0 +peer1.org1.example.com | [9ad 08-31 20:51:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Added ����)�����H�5���K��q���2���( to the in memory item map, total items: 3 +orderer0.example.com | "2020-08-31 20:51:03.038 UTC [common.channelconfig] initializeProtosStruct -> DEBU a7f Processing field: KafkaBrokers" +peer0.org1.example.com | [850 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [a40 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a62e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [96c 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 4b 7a 1c f7 72 7d 98 69 35 3d b5 df d3 65 1b |IKz..r}.i5=...e.| +peer1.org1.example.com | [9ae 08-31 20:51:06.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.038 UTC [common.channelconfig] initializeProtosStruct -> DEBU a80 Processing field: ChannelRestrictions" +peer0.org1.example.com | [851 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 gate 1598907064591937500 evaluation starts +peer0.org2.example.com | [a41 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a62e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | 00000010 92 b9 33 b2 38 d6 6e 7c de 50 99 3b 20 ac 8a ca |..3.8.n|.P.; ...| +peer1.org1.example.com | [9af 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 85 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.038 UTC [common.channelconfig] initializeProtosStruct -> DEBU a81 Processing field: Capabilities" +peer0.org1.example.com | [852 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a42 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a62e0 principal matched by identity 0 +peer1.org2.example.com | [96d 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac 23 6c 2d c7 a0 da 5a c3 f0 f7 |0E.!..#l-...Z...| +peer1.org1.example.com | [9b0 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 85 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.038 UTC [common.channelconfig] NewStandardValues -> DEBU a82 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org1.example.com | [853 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [a43 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 d6 40 8a e2 7b 6c 69 7c f4 58 f0 6d c6 b6 8e 66 |.@..{li|.X.m...f| +peer1.org1.example.com | [9b1 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 85 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.038 UTC [common.channelconfig] initializeProtosStruct -> DEBU a83 Processing field: Endpoints" +peer0.org1.example.com | [854 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | 00000020 19 b3 29 15 9c 02 20 3e 5c 45 a5 b4 f1 29 ac c4 |..)... >\E...)..| +peer1.org1.example.com | [9b2 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.038 UTC [common.channelconfig] NewStandardValues -> DEBU a84 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | [855 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [a44 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000030 48 f4 26 46 a0 5d 02 4b 61 2a f5 68 69 6c 69 63 |H.&F.].Ka*.hilic| +peer1.org1.example.com | [9b3 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.038 UTC [common.channelconfig] initializeProtosStruct -> DEBU a85 Processing field: MSP" +peer0.org1.example.com | [856 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000040 6a cc 13 36 bf 11 76 |j..6..v| +peer1.org1.example.com | [9b5 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 2 IDENTITY_MSG items to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +orderer0.example.com | "2020-08-31 20:51:03.038 UTC [common.channelconfig] validateMSP -> DEBU a86 Setting up MSP for org OrdererOrg" +peer0.org1.example.com | [857 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 principal matched by identity 0 +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | [96e 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e8f20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [9b4 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.038 UTC [msp] newBccspMsp -> DEBU a87 Creating BCCSP-based MSP instance" +peer0.org1.example.com | [858 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | [96f 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e8f20 gate 1598907070021508100 evaluation succeeds +peer1.org1.example.com | [9b6 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:53410 +orderer0.example.com | "2020-08-31 20:51:03.038 UTC [msp] New -> DEBU a88 Creating Cache-MSP instance" +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [970 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [9b7 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002c5c870 +orderer0.example.com | "2020-08-31 20:51:03.038 UTC [msp] Setup -> DEBU a89 Setting up MSP instance OrdererMSP" +peer0.org1.example.com | [859 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 0d 5a 0c 3e 23 5e d7 8d 78 ee 08 |0D. O.Z.>#^..x..| +peer0.org2.example.com | [a45 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a62e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [971 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [9b8 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +orderer0.example.com | "2020-08-31 20:51:03.038 UTC [msp.identity] newIdentity -> DEBU a8a Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | 00000010 0a 56 93 cf 71 19 e3 c7 60 68 11 26 0e 21 16 72 |.V..q...`h.&.!.r| +peer0.org2.example.com | [a46 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a62e0 gate 1598907066265607400 evaluation succeeds +peer1.org2.example.com | [972 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [9b9 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU begin +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | 00000020 d5 ef 2f 40 02 20 09 56 d8 5c 42 ca b8 38 ab 80 |../@. .V.\B..8..| +peer0.org2.example.com | [a47 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [973 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [9ba 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | 00000030 45 3e b8 b6 00 56 9a 2e 58 b9 05 de 74 97 ba ca |E>...V..X...t...| +peer0.org2.example.com | [a48 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [974 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9bb 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | 00000040 51 e6 f0 29 92 43 |Q..).C| +peer0.org2.example.com | [a49 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [975 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [9bc 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 12 29 88 28 8b a6 cd b3 70 7d 08 c2 d0 26 86 |&.).(....p}...&.| +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org1.example.com | [85a 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [a4a 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [977 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 996968295522414921, Envelope: 961 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 07 bb 44 7d 2f 8c 23 6d 5f 6c a5 bd 1d 0b a1 3c |..D}/.#m_l.....<| +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | [85b 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 gate 1598907064591937500 evaluation succeeds +peer0.org2.example.com | [a4b 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | [978 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9bd 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 7f d5 63 aa 31 01 55 37 d2 20 ef |0D. '..c.1.U7. .| +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [85c 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [976 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000010 1d 72 22 63 f3 a5 f6 9e 05 9e 9c c2 0d 6a 32 db |.r"c.........j2.| +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org2.example.com | [a4c 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | [85d 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [979 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161018 +peer1.org1.example.com | 00000020 5b 03 67 a4 02 20 0c 09 8a 2e 74 70 1d ff 00 d2 |[.g.. ....tp....| +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [85e 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [97a 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 908FCA88758B7C36A5184B1C197C3B5AA7B045ABE420B746390447B61E2EFB8B +peer1.org1.example.com | 00000030 b9 5b 0d 5b 39 a7 0f dd 87 85 64 87 28 bc 18 76 |.[.[9.....d.(..v| +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | [85f 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [97b 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000040 2a 60 c8 22 c3 bc |*`."..| +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | [860 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:39432 +peer1.org2.example.com | [97c 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [9be 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [861 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:39432 +peer1.org2.example.com | [97d 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org1.example.com | [9bf 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc002c0e9a0, header 0xc002c5cd70 +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org2.example.com | [a4d 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [862 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer1.org2.example.com | [97e 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [9c0 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +orderer0.example.com | nw== +peer0.org2.example.com | [a4e 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 374 bytes, Signature: 0 bytes +peer0.org1.example.com | [863 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:39432 disconnected +peer1.org2.example.com | [97f 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [9c1 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU [][98dd4411] processing txid: 98dd4411ccdcc9a11e1a2c8d450d027b62fd283b48aad52ad86298973a91cc7f +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | [a4f 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | [864 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:51:14.578Z grpc.peer_address=172.18.0.5:39432 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.5216ms +peer1.org2.example.com | [980 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9c2 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU [][98dd4411] Entry chaincode: name:"lscc" +orderer0.example.com | "2020-08-31 20:51:03.040 UTC [common.channelconfig] NewStandardValues -> DEBU a8b Initializing protos for *channelconfig.ApplicationProtos" +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [865 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org2.example.com | [981 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [9c3 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> INFO [][98dd4411] Entry chaincode: name:"lscc" +orderer0.example.com | "2020-08-31 20:51:03.040 UTC [common.channelconfig] initializeProtosStruct -> DEBU a8c Processing field: ACLs" +peer0.org2.example.com | [a50 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | [866 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [982 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9c4 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +orderer0.example.com | "2020-08-31 20:51:03.040 UTC [common.channelconfig] initializeProtosStruct -> DEBU a8d Processing field: Capabilities" +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | [867 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.636Z grpc.peer_address=172.18.0.5:39434 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=92.1µs +peer1.org1.example.com | [9c5 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 26 12 29 88 28 8b a6 cd b3 70 7d 08 c2 d0 26 86 |&.).(....p}...&.| +peer1.org2.example.com | [983 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 86 55 55 54 110 52 72 121 77 106 104 56 53 74 78 83 53 49 103 84 50 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 65 68 78 102 66 47 108 56 79 74 113 49 10 89 50 65 114 110 84 82 43 74 114 97 65 97 67 49 53 43 84 81 68 79 51 114 109 99 80 43 53 112 122 106 72 43 77 80 69 77 109 105 110 80 48 53 111 47 121 81 50 48 56 109 117 119 113 107 120 100 84 90 100 108 118 72 90 10 107 109 73 73 52 52 104 101 43 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 110 98 111 104 114 104 56 113 100 119 49 50 88 83 118 43 68 68 71 85 79 98 89 56 110 67 98 66 72 43 97 55 108 79 113 83 68 111 88 65 48 122 99 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 80 103 118 111 81 111 79 69 43 49 115 85 114 69 120 47 120 70 115 47 122 107 70 106 103 82 53 79 87 119 117 74 112 105 120 54 75 57 56 110 70 115 122 65 105 65 51 66 80 98 110 10 88 101 112 122 72 86 82 119 103 73 69 84 109 121 66 87 85 101 81 88 73 101 107 89 72 105 48 51 83 120 113 88 109 99 107 50 77 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +orderer0.example.com | "2020-08-31 20:51:03.040 UTC [common.channelconfig] NewStandardValues -> DEBU a8e Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | [868 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000010 07 bb 44 7d 2f 8c 23 6d 5f 6c a5 bd 1d 0b a1 3c |..D}/.#m_l.....<| +peer1.org2.example.com | [984 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Added � �0��U�n�����##~J�9���o�R=� to the in memory item map, total items: 3 +orderer0.example.com | "2020-08-31 20:51:03.040 UTC [common.channelconfig] initializeProtosStruct -> DEBU a8f Processing field: AnchorPeers" +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | [869 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer1.org1.example.com | [9c6 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 7f d5 63 aa 31 01 55 37 d2 20 ef |0D. '..c.1.U7. .| +peer1.org2.example.com | [985 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.040 UTC [common.channelconfig] NewStandardValues -> DEBU a90 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [86a 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer1.org1.example.com | 00000010 1d 72 22 63 f3 a5 f6 9e 05 9e 9c c2 0d 6a 32 db |.r"c.........j2.| +peer1.org2.example.com | [986 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16451035163478688939, Envelope: 961 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.040 UTC [common.channelconfig] initializeProtosStruct -> DEBU a91 Processing field: MSP" +peer0.org2.example.com | [a51 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [86b 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.5:39434 +peer1.org1.example.com | 00000020 5b 03 67 a4 02 20 0c 09 8a 2e 74 70 1d ff 00 d2 |[.g.. ....tp....| +peer1.org2.example.com | [987 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.040 UTC [common.channelconfig] Validate -> DEBU a92 Anchor peers for org Org2MSP are anchor_peers: " +peer0.org2.example.com | [a52 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [86c 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.5:39434 +peer1.org2.example.com | [988 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000030 b9 5b 0d 5b 39 a7 0f dd 87 85 64 87 28 bc 18 76 |.[.[9.....d.(..v| +orderer0.example.com | "2020-08-31 20:51:03.040 UTC [common.channelconfig] validateMSP -> DEBU a93 Setting up MSP for org Org2MSP" +peer0.org1.example.com | [86d 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a53 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [989 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000040 2a 60 c8 22 c3 bc |*`."..| +orderer0.example.com | "2020-08-31 20:51:03.040 UTC [msp] newBccspMsp -> DEBU a94 Creating BCCSP-based MSP instance" +peer0.org1.example.com | [86e 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a54 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [98a 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [9c7 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +orderer0.example.com | "2020-08-31 20:51:03.040 UTC [msp] New -> DEBU a95 Creating Cache-MSP instance" +peer0.org1.example.com | [86f 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a55 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [98b 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [9c8 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +orderer0.example.com | "2020-08-31 20:51:03.040 UTC [msp] Setup -> DEBU a96 Setting up MSP instance Org2MSP" +peer0.org2.example.com | [a56 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [870 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [98c 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [9c9 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +orderer0.example.com | "2020-08-31 20:51:03.040 UTC [msp.identity] newIdentity -> DEBU a97 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [a57 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [871 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [98d 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [9ca 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [9bbf7993-a4e2-4fea-b51f-20007c65142f] +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | [a58 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [872 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [98e 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9cb 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [a59 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003be540 gate 1598907066274977200 evaluation starts +peer0.org1.example.com | [873 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [990 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9cc 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [9bbf7993-a4e2-4fea-b51f-20007c65142f] +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [a5a 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003be540 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [874 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [98f 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ed70 gate 1598907070037759500 evaluation starts +peer1.org1.example.com | [9cd 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | [a5b 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003be540 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [875 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [991 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [9ce 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [a5c 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003be540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [876 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [992 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ed70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [9cf 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU [98dd4411] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | [a5d 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003be540 principal evaluation fails +peer0.org1.example.com | [877 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [993 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [9d0 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU [98dd4411] notifying Txid:98dd4411ccdcc9a11e1a2c8d450d027b62fd283b48aad52ad86298973a91cc7f, channelID: +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | [a5e 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003be540 gate 1598907066274977200 evaluation fails +peer0.org1.example.com | [878 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1140 gate 1598907064638442800 evaluation starts +peer1.org2.example.com | [994 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [9d1 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org2.example.com | [a5f 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [879 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1140 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [995 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9d2 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> INFO [][98dd4411] Exit chaincode: name:"lscc" (3ms) +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | [a60 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [87a 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1140 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [996 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [9d3 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU [][98dd4411] Exit +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | [997 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [9d4 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:53410 +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org2.example.com | [a61 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [998 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ed70 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [9d5 08-31 20:51:07.80 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:53410 grpc.code=OK grpc.call_duration=5.6159ms +peer0.org1.example.com | [87b 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1140 principal matched by identity 0 +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | [a62 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003beab0 gate 1598907066276593800 evaluation starts +peer1.org2.example.com | [999 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ed70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [9d6 08-31 20:51:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [87c 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +orderer0.example.com | "2020-08-31 20:51:03.041 UTC [common.channelconfig] NewStandardValues -> DEBU a98 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org2.example.com | [a63 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003beab0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [99a 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ed70 principal evaluation fails +peer1.org1.example.com | [9d7 08-31 20:51:07.81 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +orderer0.example.com | "2020-08-31 20:51:03.041 UTC [common.channelconfig] initializeProtosStruct -> DEBU a99 Processing field: AnchorPeers" +peer0.org2.example.com | [a64 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003beab0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [99b 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ed70 gate 1598907070037759500 evaluation fails +peer1.org1.example.com | [9d8 08-31 20:51:07.99 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ]] +peer0.org1.example.com | [87d 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 bd c8 ac 44 98 69 a3 a2 f8 1e 0c |0D. 5...D.i.....| +orderer0.example.com | "2020-08-31 20:51:03.041 UTC [common.channelconfig] NewStandardValues -> DEBU a9a Initializing protos for *channelconfig.OrganizationProtos" +peer0.org2.example.com | [a65 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003beab0 principal matched by identity 0 +peer1.org2.example.com | [99c 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9d9 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 bb a5 9b e7 9c 75 5d 0e 53 29 b7 10 35 67 b0 ac |.....u].S)..5g..| +orderer0.example.com | "2020-08-31 20:51:03.041 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9b Processing field: MSP" +peer0.org2.example.com | [a66 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | [99d 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [9da 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000020 89 b6 30 b0 02 20 08 ca a3 10 f9 01 ae 49 8f 6c |..0.. .......I.l| +orderer0.example.com | "2020-08-31 20:51:03.042 UTC [common.channelconfig] Validate -> DEBU a9c Anchor peers for org Org1MSP are anchor_peers: " +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [99e 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [9db 08-31 20:51:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 da 8f 68 e0 e7 cb b3 1b 65 c0 2d e2 54 87 0f f3 |..h.....e.-.T...| +peer0.org1.example.com | 00000030 1e 68 f4 06 77 26 e6 11 61 d2 ef 67 4d e4 8c 1d |.h..w&..a..gM...| +orderer0.example.com | "2020-08-31 20:51:03.042 UTC [common.channelconfig] validateMSP -> DEBU a9d Setting up MSP for org Org1MSP" +peer0.org2.example.com | [a67 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | [99f 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fbb0 gate 1598907070049168200 evaluation starts +peer1.org1.example.com | 00000010 02 62 2f 12 83 27 d8 8d 1f d7 19 d4 1a d6 cf 19 |.b/..'..........| +peer0.org1.example.com | 00000040 2f d5 e3 e9 a6 13 |/.....| +orderer0.example.com | "2020-08-31 20:51:03.043 UTC [msp] newBccspMsp -> DEBU a9e Creating BCCSP-based MSP instance" +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | [9a0 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fbb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [9dc 08-31 20:51:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d 34 67 82 73 33 ea 5d 6e 0a 0c 0e |0D. ]4g.s3.]n...| +peer0.org1.example.com | [87e 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1140 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:03.043 UTC [msp] New -> DEBU a9f Creating Cache-MSP instance" +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | [9a1 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fbb0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000010 ed 07 16 4a fd 4f c5 91 c7 a9 18 51 fc 13 b0 cc |...J.O.....Q....| +peer0.org1.example.com | [87f 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1140 gate 1598907064638442800 evaluation succeeds +orderer0.example.com | "2020-08-31 20:51:03.043 UTC [msp] Setup -> DEBU aa0 Setting up MSP instance Org1MSP" +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | [9a2 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fbb0 principal matched by identity 0 +peer1.org1.example.com | 00000020 dd 92 72 e3 02 20 5d ab 60 f7 a7 d8 f9 d6 e7 1e |..r.. ].`.......| +peer0.org1.example.com | [880 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:03.043 UTC [msp.identity] newIdentity -> DEBU aa1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [9a3 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 18 6c 4b f2 40 be d4 5f 0b bc f7 13 5c 6b dc |..lK.@.._....\k.| +peer1.org1.example.com | 00000030 25 40 aa 7a 25 da 38 f9 78 aa 93 81 e2 c3 e5 16 |%@.z%.8.x.......| +peer0.org1.example.com | [881 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | [a68 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003beab0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 18 30 90 86 03 08 4d c2 b5 67 54 3c 23 e2 8b 78 |.0....M..gT<#..x| +peer0.org1.example.com | [882 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [a69 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003beab0 gate 1598907066276593800 evaluation succeeds +peer1.org2.example.com | [9a4 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 50 84 c1 c5 4f ae 54 1a 24 62 d0 |0D. .P...O.T.$b.| +peer1.org1.example.com | 00000040 48 c8 e1 7a 41 36 |H..zA6| +peer0.org1.example.com | [883 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [a6a 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 dd 76 19 0e 1d 96 47 73 10 71 94 9f ca 1a 82 a3 |.v....Gs.q......| +peer1.org1.example.com | [9dd 08-31 20:51:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [884 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:39434 +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | [a6b 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000020 7a fe c6 3a 02 20 3f 51 55 0f c5 02 2c e1 2c b2 |z..:. ?QU...,.,.| +peer1.org1.example.com | [9de 08-31 20:51:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [885 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:39434 +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [a6c 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 d5 16 f3 3b 2d 2d 3f 24 20 e3 18 7d e2 ba a0 8d |...;--?$ ..}....| +peer1.org1.example.com | [9df 08-31 20:51:08.80 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | [886 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39434 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:11251703883015026869 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [a6d 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000040 99 e1 9f 68 56 56 |...hVV| +peer1.org1.example.com | [9e0 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | [887 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a6e 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9a5 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fbb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [9e1 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org1.example.com | [888 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:11251703883015026869 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [a6f 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer1.org2.example.com | [9a6 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fbb0 gate 1598907070049168200 evaluation succeeds +peer1.org1.example.com | [9e2 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | [889 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [a70 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9a7 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [9e3 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org1.example.com | [88a 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a71 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9a8 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [9e4 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | [88b 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a72 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9a9 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [9e5 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org1.example.com | [88c 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a73 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [9aa 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [9e6 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org1.example.com | [88d 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [a74 08-31 20:51:06.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [9ab 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [9e7 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [88e 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [a75 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [9ac 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [9e8 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.044 UTC [msp] Setup -> DEBU aa2 Setting up the MSP manager (3 msps)" +peer0.org1.example.com | [88f 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [a76 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [9ad 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16451035163478688939, Envelope: 961 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.044 UTC [msp] Setup -> DEBU aa3 MSP manager setup complete, setup 3 msps" +peer1.org1.example.com | [9e9 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [890 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [a77 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [9ae 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.044 UTC [policies] NewManagerImpl -> DEBU aa4 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer1.org1.example.com | [9ea 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [891 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1bb0 gate 1598907064651929900 evaluation starts +peer0.org2.example.com | [a78 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [9af 08-31 20:51:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.044 UTC [policies] NewManagerImpl -> DEBU aa5 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer1.org1.example.com | [9eb 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [892 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1bb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [a79 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bff70 gate 1598907066280889800 evaluation starts +peer1.org2.example.com | [9b0 08-31 20:51:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.044 UTC [policies] NewManagerImpl -> DEBU aa6 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer1.org1.example.com | [9ec 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [893 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1bb0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [a7a 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bff70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [9b1 08-31 20:51:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.044 UTC [policies] NewManagerImpl -> DEBU aa7 Proposed new policy BlockValidation for Channel/Orderer" +peer1.org1.example.com | [9ed 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161018 +peer0.org1.example.com | [894 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1bb0 principal matched by identity 0 +peer0.org2.example.com | [a7b 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bff70 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [9b2 08-31 20:51:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 76 106 80 76 72 86 83 114 120 66 108 57 51 88 84 65 106 67 68 97 89 65 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 71 107 103 76 50 121 65 76 107 104 55 10 98 117 68 121 84 105 67 66 122 52 120 84 82 98 78 66 67 65 103 87 110 110 105 74 56 76 119 89 113 111 86 89 98 97 78 66 102 98 84 51 90 73 106 104 115 107 105 50 69 70 57 100 110 121 117 110 85 68 108 119 85 99 47 102 10 86 88 81 121 49 80 122 53 86 55 101 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 74 50 54 73 97 52 102 75 110 99 78 100 108 48 114 47 103 119 120 108 68 109 50 80 74 119 109 119 82 47 109 117 53 84 113 107 103 54 70 119 78 77 51 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 67 115 66 82 84 100 76 105 105 102 69 86 65 85 117 117 101 113 52 100 81 114 55 98 81 49 43 88 120 70 112 101 87 86 72 51 49 69 99 84 110 43 107 65 105 66 86 98 119 68 120 10 80 103 109 75 77 83 88 118 56 118 49 47 108 72 117 120 86 52 87 80 77 99 53 102 86 48 110 85 83 53 89 115 73 106 83 54 108 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +orderer0.example.com | "2020-08-31 20:51:03.044 UTC [policies] NewManagerImpl -> DEBU aa8 Proposed new policy Readers for Channel/Orderer" +peer1.org1.example.com | [9ee 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 576AB48666E3DDF11D071602FECCE3E9188B7E5D68D01349FD21B3E5AACA4F08 +peer0.org1.example.com | [895 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 70 e2 2e 5c 34 59 f3 22 a7 70 f5 fc ce f7 ec |.p..\4Y.".p.....| +peer1.org2.example.com | [9b3 08-31 20:51:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Added ���Ċtz0�P�zP˹�{� ��w��kqu-< to the in memory item map, total items: 4 +orderer0.example.com | "2020-08-31 20:51:03.044 UTC [policies] NewManagerImpl -> DEBU aa9 Proposed new policy Writers for Channel/Orderer" +peer1.org1.example.com | [9ef 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [a7c 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bff70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000010 bc d6 a3 b9 a4 9d 04 36 d3 30 ae d8 8d 5c a9 58 |.......6.0...\.X| +peer1.org2.example.com | [9b4 08-31 20:51:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.044 UTC [policies] NewManagerImpl -> DEBU aaa Proposed new policy Admins for Channel/Orderer" +peer1.org1.example.com | [9f0 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [a7d 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bff70 principal evaluation fails +peer0.org1.example.com | [896 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 b6 42 78 d4 f5 83 c2 21 50 a5 44 |0D. A.Bx....!P.D| +peer1.org2.example.com | [9b5 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU aab Proposed new policy Writers for Channel/Application/Org2MSP" +peer1.org1.example.com | [9f1 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org2.example.com | [a7e 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bff70 gate 1598907066280889800 evaluation fails +peer0.org1.example.com | 00000010 49 b8 79 18 95 42 81 66 1f fe 0b 82 89 13 7e 1f |I.y..B.f......~.| +peer1.org2.example.com | [9b6 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU aac Proposed new policy Admins for Channel/Application/Org2MSP" +peer1.org1.example.com | [9f2 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [a7f 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 89 91 19 7b 02 20 37 6a 3a c9 d8 d4 8d f4 8a fc |...{. 7j:.......| +peer1.org2.example.com | [9b7 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU aad Proposed new policy Readers for Channel/Application/Org2MSP" +peer1.org1.example.com | [9f3 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a80 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000030 4b 67 7c 16 b0 d7 7c 55 75 f9 35 77 64 47 a9 ea |Kg|...|Uu.5wdG..| +peer1.org2.example.com | [9b8 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU aae Proposed new policy Readers for Channel/Application/Org1MSP" +peer1.org1.example.com | [9f4 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [a81 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000040 b5 96 22 af d8 89 |.."...| +peer1.org2.example.com | [9b9 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU aaf Proposed new policy Writers for Channel/Application/Org1MSP" +peer1.org1.example.com | [9f5 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [a82 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004104e0 gate 1598907066281227200 evaluation starts +peer0.org1.example.com | [897 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1bb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [9ba 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU ab0 Proposed new policy Admins for Channel/Application/Org1MSP" +peer1.org1.example.com | [9f6 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a83 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004104e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [898 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1bb0 gate 1598907064651929900 evaluation succeeds +peer1.org2.example.com | [9bb 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [policies] GetPolicy -> DEBU ab1 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +peer1.org1.example.com | [9f7 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [a84 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004104e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [899 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [9bc 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [policies] GetPolicy -> DEBU ab2 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer1.org1.example.com | [9f8 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a85 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004104e0 principal matched by identity 0 +peer0.org1.example.com | [89a 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [9bd 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU ab3 Proposed new policy Endorsement for Channel/Application" +peer1.org1.example.com | [9f9 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [a86 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | [89b 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [9be 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU ab4 Proposed new policy Readers for Channel/Application" +peer1.org1.example.com | [9fa 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [89c 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [9bf 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU ab5 Proposed new policy Writers for Channel/Application" +peer1.org1.example.com | [9fb 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [a87 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | [89d 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [9c0 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU ab6 Proposed new policy Admins for Channel/Application" +peer1.org1.example.com | [9fc 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | [89e 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +peer1.org2.example.com | [9c1 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [policies] GetPolicy -> DEBU ab7 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +peer1.org1.example.com | [9fd 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | [9c2 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [89f 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [policies] GetPolicy -> DEBU ab8 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer1.org1.example.com | [9fe 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | [9c3 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [8a0 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU ab9 Proposed new policy LifecycleEndorsement for Channel/Application" +peer1.org1.example.com | [9ff 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [9c4 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [8a1 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU aba Proposed new policy Writers for Channel" +peer1.org1.example.com | [a00 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [a88 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004104e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [9c5 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [8a2 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU abb Proposed new policy Admins for Channel" +peer0.org2.example.com | [a89 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004104e0 gate 1598907066281227200 evaluation succeeds +peer1.org1.example.com | [a01 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [9c6 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [8a3 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU abc Proposed new policy Readers for Channel" +peer0.org2.example.com | [a8a 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [a02 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 6a b4 86 66 e3 dd f1 1d 07 16 02 fe cc e3 e9 |Wj..f...........| +peer1.org2.example.com | [9c7 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [8a4 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [common.configtx] addToMap -> DEBU abd Adding to config map: [Group] /Channel" +peer0.org2.example.com | [a8b 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 18 8b 7e 5d 68 d0 13 49 fd 21 b3 e5 aa ca 4f 08 |..~]h..I.!....O.| +peer1.org2.example.com | [9c8 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [8a5 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [common.configtx] addToMap -> DEBU abe Adding to config map: [Group] /Channel/Orderer" +peer0.org2.example.com | [a8c 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [a03 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 92 7d f2 a4 f9 89 e7 88 b7 2c 69 |0D. ..}.......,i| +peer1.org2.example.com | [9c9 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [8a6 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [common.configtx] addToMap -> DEBU abf Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer0.org2.example.com | [a8d 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 6e b8 79 6d 59 07 0a 7f 8f e3 34 86 c7 7f 4e e2 |n.ymY.....4...N.| +peer1.org2.example.com | [9ca 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d4000 gate 1598907070324133500 evaluation starts +peer0.org1.example.com | [8a7 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 11251703883015026869, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [common.configtx] addToMap -> DEBU ac0 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer0.org2.example.com | [a8e 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 51 3f cb d5 02 20 43 20 38 fe 37 27 3f 36 a7 91 |Q?... C 8.7'?6..| +peer1.org2.example.com | [9cb 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d4000 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [8a8 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\310\027~\352\216\253>" > alive: alive: +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [common.configtx] addToMap -> DEBU ac1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [a8f 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 a7 12 05 38 8c e3 f9 76 39 bb 31 a6 6b 37 03 bc |...8...v9.1.k7..| +peer1.org2.example.com | [9cc 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d4000 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [8a9 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 11251703883015026869, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [common.configtx] addToMap -> DEBU ac2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer0.org2.example.com | [a90 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000040 b9 60 49 bc 66 f3 |.`I.f.| +peer1.org2.example.com | [9cd 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d4000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [8aa 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [common.configtx] addToMap -> DEBU ac3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer0.org2.example.com | [a91 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a04 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | [9ce 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d4000 principal evaluation fails +peer0.org1.example.com | [8ab 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.672Z grpc.peer_address=172.18.0.5:39436 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=129.5µs +orderer0.example.com | "2020-08-31 20:51:03.045 UTC [common.configtx] addToMap -> DEBU ac4 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer0.org2.example.com | [a92 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | [9cf 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d4000 gate 1598907070324133500 evaluation fails +peer0.org1.example.com | [8ac 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ac5 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer0.org2.example.com | [a93 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [a05 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 26 23 44 48 87 5e b9 35 e1 9b 44 |0D. .&#DH.^.5..D| +peer1.org2.example.com | [9d0 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [8ad 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +orderer0.example.com | "2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ac6 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer0.org2.example.com | [a94 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 01 14 42 3a e3 4b 78 6c 3c 13 20 32 51 a3 0e 7d |..B:.Kxl<. 2Q..}| +peer1.org2.example.com | [9d1 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [8ae 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +orderer0.example.com | "2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ac7 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer0.org2.example.com | [a95 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000020 a1 07 98 9a 02 20 39 ae 9c 30 23 03 68 6b 79 d4 |..... 9..0#.hky.| +peer1.org2.example.com | [9d2 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [8af 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:39436 +orderer0.example.com | "2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ac8 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer0.org2.example.com | [a96 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411720 gate 1598907066282137200 evaluation starts +peer1.org1.example.com | 00000030 6f 39 8c d3 ab 93 f7 12 bd 73 85 c5 22 a8 6a 8e |o9.......s..".j.| +peer1.org2.example.com | [9d3 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d4570 gate 1598907070324389600 evaluation starts +peer0.org1.example.com | [8b0 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.5:39436 +orderer0.example.com | "2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ac9 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org2.example.com | [a97 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411720 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000040 8b 20 a6 c9 37 49 |. ..7I| +peer1.org2.example.com | [9d4 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d4570 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [8b1 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU aca Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org2.example.com | [a98 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411720 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [a06 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [9d5 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d4570 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU acb Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | [8b2 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [a99 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [a07 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [9d6 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d4570 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU acc Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | [8b3 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [a9a 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411720 principal evaluation fails +peer1.org1.example.com | [a08 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9d7 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 91 20 92 8e 48 a6 b6 19 57 df 95 3d 88 3d e5 |h. ..H...W..=.=.| +orderer0.example.com | "2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU acd Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | [8b4 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [a09 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a9b 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411720 gate 1598907066282137200 evaluation fails +peer1.org2.example.com | 00000010 66 b4 0b 81 d5 85 0b e6 77 2d 0e b6 d4 68 63 44 |f.......w-...hcD| +orderer0.example.com | "2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ace Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | [8b5 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a0a 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [a9c 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [9d8 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 c6 d4 3b 78 e3 47 4a 19 13 74 |0E.!....;x.GJ..t| +orderer0.example.com | "2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU acf Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | [8b6 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [a0b 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [a9d 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 dd fe ae e6 cb b5 19 c9 92 3e e4 18 a0 b7 e7 5d |.........>.....]| +orderer0.example.com | "2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ad0 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | [8b7 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a0c 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [a9e 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | 00000020 5d 0f 89 3e 4f 02 20 51 46 80 04 71 34 63 ef 88 |]..>O. QF..q4c..| +orderer0.example.com | "2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ad1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | [8b8 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a0d 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [a9f 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411ee0 gate 1598907066282374400 evaluation starts +peer1.org2.example.com | 00000030 94 e4 49 d8 a3 f7 16 c1 4d 18 80 30 f4 8e f8 ef |..I.....M..0....| +orderer0.example.com | "2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ad2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | [8b9 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [a0e 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +peer0.org2.example.com | [aa0 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411ee0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000040 3e da 85 85 b9 2a 3a |>....*:| +orderer0.example.com | "2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ad3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | [8ba 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [a0f 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [aa1 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411ee0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [9d9 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d4570 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ad4 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | [8bb 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [a10 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 df 23 9b a5 6a 7c 85 35 b0 95 5b 13 8e 7a 41 |..#..j|.5..[..zA| +peer0.org2.example.com | [aa2 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411ee0 principal matched by identity 0 +peer1.org2.example.com | [9da 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d4570 gate 1598907070324389600 evaluation succeeds +peer0.org1.example.com | [8bc 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033029e0 gate 1598907064686009600 evaluation starts +orderer0.example.com | "2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ad5 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer1.org1.example.com | 00000010 0a a0 14 ea e5 9e 21 72 df 90 f3 47 d1 be e1 80 |......!r...G....| +peer0.org2.example.com | [aa3 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | [9db 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [8bd 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033029e0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ad6 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer1.org1.example.com | [a11 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 eb e4 06 cf 12 30 36 e7 e3 c8 |0E.!.......06...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [9dc 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [8be 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033029e0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ad7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer1.org1.example.com | 00000010 cd 9e fe 53 d2 87 a2 b3 48 46 59 da 58 96 fa 72 |...S....HFY.X..r| +peer0.org2.example.com | [aa4 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | [9dd 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [8bf 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033029e0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ad8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | 00000020 0c 73 41 95 3b 02 20 18 4e 90 1b c7 45 0a 2b ed |.sA.;. .N...E.+.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | [9de 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [8c0 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +orderer0.example.com | "2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ad9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer1.org1.example.com | 00000030 4b 34 be 3e a1 98 c0 27 db 05 24 4f e4 2e a9 a5 |K4.>...'..$O....| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | [9df 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +orderer0.example.com | "2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ada Adding to config map: [Value] /Channel/Application/ACLs" +peer1.org1.example.com | 00000040 76 f5 9c 26 b5 d7 2e |v..&...| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | [9e0 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]}, deadMembers={[]} +peer0.org1.example.com | [8c1 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 98 97 dd 03 93 8d d2 0d cc 7c |0E.!...........|| +orderer0.example.com | "2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU adb Adding to config map: [Value] /Channel/Application/Capabilities" +peer1.org1.example.com | [a12 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [9e1 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU adc Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | 00000010 90 df c3 e3 f1 19 c0 1a 1b 14 9d 68 76 81 99 9b |...........hv...| +peer1.org1.example.com | [a13 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [aa5 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411ee0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [9e2 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU add Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | 00000020 68 c9 18 3b 95 02 20 61 5e c2 36 b5 bc 0d 6f 5f |h..;.. a^.6...o_| +peer1.org1.example.com | [a14 08-31 20:51:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [aa6 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411ee0 gate 1598907066282374400 evaluation succeeds +peer1.org2.example.com | [9e3 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ade Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | 00000030 5b 4c 75 0b 52 8d 42 93 1d 46 a1 da f1 a4 7b f4 |[Lu.R.B..F....{.| +peer1.org1.example.com | [a15 08-31 20:51:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 6a b4 86 66 e3 dd f1 1d 07 16 02 fe cc e3 e9 |Wj..f...........| +peer0.org2.example.com | [aa7 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [9e4 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU adf Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | 00000040 4e 6d 94 6d 15 cd 01 |Nm.m...| +peer1.org1.example.com | 00000010 18 8b 7e 5d 68 d0 13 49 fd 21 b3 e5 aa ca 4f 08 |..~]h..I.!....O.| +peer0.org2.example.com | [aa8 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [9e5 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ae0 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | [8c2 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033029e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [a16 08-31 20:51:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 92 7d f2 a4 f9 89 e7 88 b7 2c 69 |0D. ..}.......,i| +peer0.org2.example.com | [aa9 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [9e6 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ae1 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org1.example.com | [8c3 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033029e0 gate 1598907064686009600 evaluation succeeds +peer1.org1.example.com | 00000010 6e b8 79 6d 59 07 0a 7f 8f e3 34 86 c7 7f 4e e2 |n.ymY.....4...N.| +peer0.org2.example.com | [aaa 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [9e7 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ae2 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org1.example.com | [8c4 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 51 3f cb d5 02 20 43 20 38 fe 37 27 3f 36 a7 91 |Q?... C 8.7'?6..| +peer0.org2.example.com | [aab 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | [9e8 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ae3 Adding to config map: [Value] /Channel/Consortium" +peer0.org1.example.com | [8c5 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000030 a7 12 05 38 8c e3 f9 76 39 bb 31 a6 6b 37 03 bc |...8...v9.1.k7..| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [9e9 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ae4 Adding to config map: [Value] /Channel/Capabilities" +peer0.org1.example.com | [8c6 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 b9 60 49 bc 66 f3 |.`I.f.| +peer0.org2.example.com | [aac 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | [9ea 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ae5 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org1.example.com | [8c7 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [a17 08-31 20:51:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | [9eb 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.048 UTC [common.configtx] addToMap -> DEBU ae6 Adding to config map: [Policy] /Channel/Readers" +peer0.org1.example.com | [8c8 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:39436 +peer1.org1.example.com | [a18 08-31 20:51:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | [9ec 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:03.048 UTC [common.configtx] addToMap -> DEBU ae7 Adding to config map: [Policy] /Channel/Writers" +peer0.org1.example.com | [8c9 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:39436 +peer1.org1.example.com | [a19 08-31 20:51:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | [9ed 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.048 UTC [common.configtx] addToMap -> DEBU ae8 Adding to config map: [Policy] /Channel/Admins" +peer0.org1.example.com | [8ca 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org1.example.com | [a1a 08-31 20:51:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [9ee 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.048 UTC [common.channelconfig] LogSanityChecks -> DEBU ae9 As expected, current configuration has policy '/Channel/Readers'" +peer0.org1.example.com | [8cb 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:39434 disconnected +peer1.org1.example.com | [a1b 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [aad 08-31 20:51:06.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9ef 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:03.048 UTC [common.channelconfig] LogSanityChecks -> DEBU aea As expected, current configuration has policy '/Channel/Writers'" +peer0.org1.example.com | [8cc 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org1.example.com | [a1c 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [aae 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [9f0 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.048 UTC [policies] Manager -> DEBU aeb Manager Channel looking up path [Application]" +peer0.org1.example.com | [8ce 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:39436 disconnected +peer1.org1.example.com | [a1d 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [aaf 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [9f1 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.049 UTC [policies] Manager -> DEBU aec Manager Channel has managers Orderer" +peer0.org1.example.com | [8cf 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:51:14.675Z grpc.peer_address=172.18.0.5:39436 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=12.7899ms +peer1.org1.example.com | [a1e 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ab0 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9f2 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.049 UTC [policies] Manager -> DEBU aed Manager Channel has managers Application" +peer0.org1.example.com | [8d0 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +peer1.org1.example.com | [a1f 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ab1 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9f3 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.049 UTC [policies] Manager -> DEBU aee Manager Channel/Application looking up path []" +peer0.org1.example.com | [8cd 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:39434 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=51.7646ms +peer0.org2.example.com | [ab2 08-31 20:51:06.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | [a20 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9f4 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.049 UTC [policies] Manager -> DEBU aef Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | [8d1 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +peer0.org2.example.com | [ab3 08-31 20:51:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to peer1.org1.example.com:7051 +peer1.org1.example.com | [a21 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9f5 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +orderer0.example.com | "2020-08-31 20:51:03.049 UTC [policies] Manager -> DEBU af0 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | [8d2 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [ab4 08-31 20:51:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 85 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [a22 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [9f6 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.049 UTC [common.channelconfig] LogSanityChecks -> DEBU af1 As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | [8d3 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [ab5 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to peer1.org2.example.com:7051 +peer1.org1.example.com | [a23 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9f7 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.049 UTC [common.channelconfig] LogSanityChecks -> DEBU af2 As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | [8d4 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [ab7 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [a24 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [9f8 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +orderer0.example.com | "2020-08-31 20:51:03.049 UTC [common.channelconfig] LogSanityChecks -> DEBU af3 As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | [8d5 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:07.317Z grpc.peer_address=172.18.0.8:54002 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=135.5µs +peer0.org2.example.com | [ab6 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org1.example.com | [a25 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [9f9 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +orderer0.example.com | "2020-08-31 20:51:03.050 UTC [policies] Manager -> DEBU af4 Manager Channel looking up path [Orderer]" +peer0.org1.example.com | [8d6 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [ab8 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a26 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [9fa 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }] +orderer0.example.com | "2020-08-31 20:51:03.050 UTC [policies] Manager -> DEBU af5 Manager Channel has managers Orderer" +peer0.org1.example.com | [8d7 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org2.example.com | [ab9 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [a27 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [9fb 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +orderer0.example.com | "2020-08-31 20:51:03.050 UTC [policies] Manager -> DEBU af6 Manager Channel has managers Application" +peer0.org1.example.com | [8d8 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org2.example.com | [aba 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a28 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [9fc 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0003693d0, CONNECTING +orderer0.example.com | "2020-08-31 20:51:03.050 UTC [policies] Manager -> DEBU af7 Manager Channel/Orderer looking up path []" +peer0.org1.example.com | [8d9 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:54002 +peer0.org2.example.com | [abb 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 2, nonce: 16007724499294329997, Envelope: 1905 bytes, Signature: 0 bytes +peer1.org1.example.com | [a29 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [9fd 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0003693d0, READY +orderer0.example.com | "2020-08-31 20:51:03.050 UTC [policies] Manager -> DEBU af8 Manager Channel/Orderer has managers OrdererOrg" +peer0.org1.example.com | [8da 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:54002 +peer0.org2.example.com | [abc 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a2a 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [9fe 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:51:03.050 UTC [common.channelconfig] LogSanityChecks -> DEBU af9 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org1.example.com | [8db 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer1.org1.example.com | [a2b 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [abd 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [9ff 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +orderer0.example.com | "2020-08-31 20:51:03.050 UTC [common.channelconfig] LogSanityChecks -> DEBU afa As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer1.org1.example.com | [a2c 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [abe 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [a00 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +orderer0.example.com | "2020-08-31 20:51:03.050 UTC [common.channelconfig] LogSanityChecks -> DEBU afb As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer0.org1.example.com | [8dc 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 35 b3 76 95 fe 4a fe 06 c0 ff |0E.!..5.v..J....| +peer1.org1.example.com | [a2d 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [abf 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [a01 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 71 bytes to 172.18.0.8:7051 +orderer0.example.com | "2020-08-31 20:51:03.050 UTC [common.channelconfig] LogSanityChecks -> DEBU afc As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer0.org1.example.com | 00000010 a8 ce a2 ad 54 f4 b9 d7 8e 3f d9 2a 3b 63 20 50 |....T....?.*;c P| +peer1.org1.example.com | [a2e 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [ac0 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [a02 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:7051 +orderer0.example.com | "2020-08-31 20:51:03.050 UTC [common.capabilities] Supported -> DEBU afd Orderer capability V1_4_2 is supported and is enabled" +peer0.org1.example.com | 00000020 7a 6a a8 d9 b7 02 20 52 1a ad a7 f0 ab b8 8c fd |zj.... R........| +peer1.org1.example.com | [a2f 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [ac1 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [a03 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.050 UTC [common.capabilities] Supported -> DEBU afe Channel capability V1_4_3 is supported and is enabled" +peer0.org1.example.com | 00000030 52 a1 b2 a8 19 79 6e 62 15 04 87 e9 7e d2 db e9 |R....ynb....~...| +peer1.org1.example.com | [a30 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fb930 gate 1598907069467383600 evaluation starts +peer0.org2.example.com | [ac2 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [a04 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.050 UTC [msp] GetDefaultSigningIdentity -> DEBU aff Obtaining default signing identity" +peer0.org1.example.com | 00000040 94 f6 ac 77 5c 7e f4 |...w\~.| +peer1.org1.example.com | [a31 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fb930 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [ac3 08-31 20:51:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042bed0 gate 1598907066459718300 evaluation starts +peer1.org2.example.com | [a05 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.051 UTC [msp] GetDefaultSigningIdentity -> DEBU b00 Obtaining default signing identity" +peer0.org1.example.com | [8dd 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:54002 +peer1.org1.example.com | [a32 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fb930 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [ac4 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042bed0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [a06 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.051 UTC [msp.identity] Sign -> DEBU b01 Sign: plaintext: 0AEA060A1B08011A0608B7C5B5FA0522...76143F2486CE51DAD8B244B8311664D5 " +peer0.org1.example.com | [8de 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:54002 +peer1.org1.example.com | [a33 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fb930 principal matched by identity 0 +peer0.org2.example.com | [ac5 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042bed0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [a07 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.051 UTC [msp.identity] Sign -> DEBU b02 Sign: digest: F0BBF3D349262E3E8871297D0A91007FC6F2A53E3C38D23F9B589EBBC796E44D " +peer0.org1.example.com | [8df 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [a34 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 a7 64 a1 59 2f 08 ef 19 da 91 37 9a b5 49 98 |I.d.Y/.....7..I.| +peer0.org2.example.com | [ac6 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042bed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:51:03.053 UTC [policies] Evaluate -> DEBU b03 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +peer1.org2.example.com | [a08 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [8e0 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 15 63 00 ab 9c 13 83 36 60 dc 57 6d df 31 1b 11 |.c.....6`.Wm.1..| +peer0.org2.example.com | [ac7 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042bed0 principal evaluation fails +orderer0.example.com | "2020-08-31 20:51:03.053 UTC [policies] Evaluate -> DEBU b04 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [a09 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a35 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 9d 53 bd aa 48 cc 88 5a 1c 15 |0E.!...S..H..Z..| +peer0.org1.example.com | [8e1 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [ac8 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042bed0 gate 1598907066459718300 evaluation fails +orderer0.example.com | "2020-08-31 20:51:03.053 UTC [policies] Evaluate -> DEBU b05 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +peer1.org2.example.com | [a0a 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 83 dc d6 95 46 d4 65 0b a5 5b 92 6e 2f 70 c0 8b |....F.e..[.n/p..| +peer0.org1.example.com | [8e2 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ac9 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:03.054 UTC [policies] Evaluate -> DEBU b06 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [a0b 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000020 d8 0a 17 fe c0 02 20 14 9a 17 05 81 a7 93 ce c9 |...... .........| +peer0.org1.example.com | [8e3 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [aca 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:03.054 UTC [policies] Evaluate -> DEBU b07 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer1.org2.example.com | [a0c 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000030 0b 18 48 d1 e0 56 16 62 4c e8 73 fd c9 21 7a 62 |..H..V.bL.s..!zb| +peer0.org1.example.com | [8e4 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [acb 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:03.054 UTC [msp] DeserializeIdentity -> DEBU b08 Obtaining identity" +peer1.org2.example.com | [a0d 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000040 ee d4 2f 0e c1 8b 64 |../...d| +peer0.org1.example.com | [8e5 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [acc 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000434570 gate 1598907066462708700 evaluation starts +orderer0.example.com | "2020-08-31 20:51:03.055 UTC [msp.identity] newIdentity -> DEBU b09 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [a0e 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411ed0 gate 1598907070350785900 evaluation starts +peer1.org1.example.com | [a36 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fb930 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [8e6 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [acd 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000434570 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | [a0f 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411ed0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [a37 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fb930 gate 1598907069467383600 evaluation succeeds +peer0.org1.example.com | [8e7 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [ace 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000434570 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [a10 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411ed0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [a38 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [8e8 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 a1 6e 8e 0a 84 2f 6e 0b 58 2e 74 48 a3 1d a5 |..n.../n.X.tH...| +peer0.org2.example.com | [acf 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000434570 principal matched by identity 0 +peer1.org2.example.com | [a11 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000010 c9 42 d4 63 e9 67 22 a5 66 e9 2f cf e9 bd fb e6 |.B.c.g".f./.....| +peer1.org1.example.com | [a39 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [ad0 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 4b 7a 1c f7 72 7d 98 69 35 3d b5 df d3 65 1b |IKz..r}.i5=...e.| +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | [a12 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411ed0 principal evaluation fails +peer0.org1.example.com | [8e9 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e e3 2c 3b ae 3d 43 bb 64 bb 66 cb |0D. ..,;.=C.d.f.| +peer1.org1.example.com | [a3a 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 92 b9 33 b2 38 d6 6e 7c de 50 99 3b 20 ac 8a ca |..3.8.n|.P.; ...| +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org2.example.com | [a13 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000411ed0 gate 1598907070350785900 evaluation fails +peer0.org1.example.com | 00000010 3d 4c 23 e1 e0 3c 37 ee 10 9b 88 eb e7 d3 0a e0 |=L#..<7.........| +peer1.org1.example.com | [a3b 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [ad1 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac 23 6c 2d c7 a0 da 5a c3 f0 f7 |0E.!..#l-...Z...| +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | [a14 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 30 99 40 64 02 20 26 89 16 12 13 cf 5f bc f4 b3 |0.@d. &....._...| +peer1.org1.example.com | [a3c 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 d6 40 8a e2 7b 6c 69 7c f4 58 f0 6d c6 b6 8e 66 |.@..{li|.X.m...f| +orderer0.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org2.example.com | [a15 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000030 dd 90 3b 09 8c 38 a2 16 ad 94 f3 ef 32 3f be e4 |..;..8......2?..| +peer1.org1.example.com | [a3d 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | 00000020 19 b3 29 15 9c 02 20 3e 5c 45 a5 b4 f1 29 ac c4 |..)... >\E...)..| +orderer0.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org2.example.com | [a16 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000040 96 81 f6 d1 25 38 |....%8| +peer1.org1.example.com | [a3e 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000030 48 f4 26 46 a0 5d 02 4b 61 2a f5 68 69 6c 69 63 |H.&F.].Ka*.hilic| +peer1.org2.example.com | [a17 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042e440 gate 1598907070353264400 evaluation starts +orderer0.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer0.org1.example.com | [8ea 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | [a3f 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000040 6a cc 13 36 bf 11 76 |j..6..v| +peer1.org2.example.com | [a18 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042e440 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [a40 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [ad2 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000434570 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [a19 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042e440 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org1.example.com | [8eb 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 7d 22 b0 05 20 c2 9a 61 22 34 90 |0D. U}".. ..a"4.| +peer1.org1.example.com | [a41 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ad3 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000434570 gate 1598907066462708700 evaluation succeeds +peer1.org2.example.com | [a1a 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042e440 principal matched by identity 0 +orderer0.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer0.org1.example.com | 00000010 3b 00 f2 55 41 27 cf a3 4f b3 68 07 24 7d ce d6 |;..UA'..O.h.$}..| +peer1.org1.example.com | [a42 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ad4 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [a1b 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +orderer0.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org1.example.com | 00000020 32 1f 00 ed 02 20 57 b4 96 70 3b b4 71 03 8a 98 |2.... W..p;.q...| +peer1.org1.example.com | [a43 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ad5 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | 00000030 2d e3 85 ed ad 53 23 87 1a 20 6d fb eb cf fd a3 |-....S#.. m.....| +peer1.org1.example.com | [a44 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org2.example.com | [ad6 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [a1c 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 65 8a ad 0f 29 00 e8 d3 7c 27 |0E.!..e...)...|'| +orderer0.example.com | "2020-08-31 20:51:03.056 UTC [cauthdsl] func1 -> DEBU b0a 0xc001242260 gate 1598907063056702900 evaluation starts" +peer0.org1.example.com | 00000040 3f ac 55 0d 6a 77 |?.U.jw| +peer1.org1.example.com | [a45 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ad7 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 ae e3 c2 e2 0b f5 67 f4 29 8e 4e fd ed 8e 73 1a |......g.).N...s.| +orderer0.example.com | "2020-08-31 20:51:03.057 UTC [cauthdsl] func2 -> DEBU b0b 0xc001242260 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [8ec 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [a46 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ad8 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 a4 f8 af b4 42 02 20 3f 42 63 16 7f 6a 46 b8 63 |....B. ?Bc..jF.c| +orderer0.example.com | "2020-08-31 20:51:03.057 UTC [cauthdsl] func2 -> DEBU b0c 0xc001242260 processing identity 0 with bytes of fe10e0" +peer0.org1.example.com | [8ed 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [a47 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000030 ff c9 54 54 26 a8 4e a0 db 6c 2a fd a3 d3 4a 5c |..TT&.N..l*...J\| +peer0.org2.example.com | [ad9 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.057 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b0d Checking if identity satisfies MEMBER role for OrdererMSP" +peer0.org1.example.com | [8ee 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [a48 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." > alive:\n\357\260\002 S\274\037V\352K73par\325\r?N\257\2056\\\342\205x2\215\243\233>\360N>\350\327" > +peer1.org2.example.com | 00000040 aa c4 19 ba 69 a7 e0 |....i..| +peer0.org2.example.com | [ada 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.057 UTC [msp] Validate -> DEBU b0e MSP OrdererMSP validating identity" +peer0.org1.example.com | [8ef 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [a49 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer1.org2.example.com | [a1d 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042e440 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [adb 08-31 20:51:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.057 UTC [msp] getCertificationChain -> DEBU b0f MSP OrdererMSP getting certification chain" +peer0.org1.example.com | [8f0 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [a4a 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a1e 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042e440 gate 1598907070353264400 evaluation succeeds +peer0.org2.example.com | [adc 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:03.057 UTC [cauthdsl] func2 -> DEBU b10 0xc001242260 principal matched by identity 0" +peer0.org1.example.com | [8f1 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a4b 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [a1f 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [add 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:03.058 UTC [msp.identity] Verify -> DEBU b11 Verify: digest = 00000000 f0 bb f3 d3 49 26 2e 3e 88 71 29 7d 0a 91 00 7f |....I&.>.q)}....| +peer0.org1.example.com | [8f2 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a4c 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [a20 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [ade 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | 00000010 c6 f2 a5 3e 3c 38 d2 3f 9b 58 9e bb c7 96 e4 4d |...><8.?.X.....M|" +peer0.org1.example.com | [8f3 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a4d 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [a21 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [adf 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:03.058 UTC [msp.identity] Verify -> DEBU b12 Verify: sig = 00000000 30 45 02 21 00 e6 8d d9 5c 84 4b 47 09 13 06 b6 |0E.!....\.KG....| +peer0.org1.example.com | [8f5 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [a4e 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [a22 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [ae0 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | 00000010 45 89 d8 00 01 66 d3 67 41 9b 6b b8 ac 4e 5e 22 |E....f.gA.k..N^"| +peer0.org1.example.com | [8f6 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a4f 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a23 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051 +peer0.org2.example.com | [ae1 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039a9c0 gate 1598907066472828300 evaluation starts +orderer0.example.com | 00000020 b8 13 f9 48 dd 02 20 05 54 f1 7c ff d1 ca b3 76 |...H.. .T.|....v| +peer0.org1.example.com | [8f4 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org1.example.com | [a50 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [a24 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ae2 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039a9c0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | 00000030 87 15 bf 1a e7 b1 28 ba a1 6e 04 d2 71 8a 64 10 |......(..n..q.d.| +peer0.org1.example.com | [8f7 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a51 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [a25 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [ae3 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039a9c0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | 00000040 f4 9e 1e 26 55 d7 b6 |...&U..|" +peer0.org1.example.com | [8f8 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a52 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a26 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ae4 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039a9c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:51:03.058 UTC [cauthdsl] func2 -> DEBU b13 0xc001242260 principal evaluation succeeds for identity 0" +peer0.org1.example.com | [8f9 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [a53 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [a27 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ae5 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039a9c0 principal evaluation fails +orderer0.example.com | "2020-08-31 20:51:03.059 UTC [cauthdsl] func1 -> DEBU b14 0xc001242260 gate 1598907063056702900 evaluation succeeds" +peer0.org1.example.com | [8fa 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [a54 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [a28 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ae6 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039a9c0 gate 1598907066472828300 evaluation fails +orderer0.example.com | "2020-08-31 20:51:03.059 UTC [policies] Evaluate -> DEBU b15 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer1.org1.example.com | [a55 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f 9b 70 86 9c 21 8c 04 61 a8 97 0f 34 51 37 a8 |..p..!..a...4Q7.| +peer0.org1.example.com | [8fb 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\017I\2254Dn" > > +peer1.org2.example.com | [a29 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ae7 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:03.059 UTC [policies] Evaluate -> DEBU b16 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer1.org1.example.com | 00000010 8c b8 fe 8e df 8c f9 29 04 cb a2 69 ce 90 94 22 |.......)...i..."| +peer0.org1.example.com | [8fc 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +peer1.org2.example.com | [a2a 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [ae8 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:03.059 UTC [policies] Evaluate -> DEBU b17 Signature set satisfies policy /Channel/Orderer/Writers" +peer1.org1.example.com | [a56 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 50 cd 21 f6 c0 4c f9 23 4e ec |0E.!..P.!..L.#N.| +peer0.org1.example.com | [8fd 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a2b 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [ae9 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:03.059 UTC [policies] Evaluate -> DEBU b18 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +peer1.org1.example.com | 00000010 40 3a 91 75 e8 8c 2e 5c cc 24 be 30 ad d6 e2 f2 |@:.u...\.$.0....| +peer0.org1.example.com | [8fe 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 67 2b 54 7c 62 9e 9a 8d 1a 61 9c 2e f9 93 78 |.g+T|b....a....x| +peer1.org2.example.com | [a2c 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 95 5e 83 6c 57 7a f0 82 e6 4d 59 21 74 46 ca |..^.lWz...MY!tF.| +peer0.org2.example.com | [aea 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039af50 gate 1598907066474790100 evaluation starts +orderer0.example.com | "2020-08-31 20:51:03.059 UTC [policies] Evaluate -> DEBU b19 Signature set satisfies policy /Channel/Writers" +peer1.org1.example.com | 00000020 81 13 ba f1 62 02 20 22 84 86 fa c4 db b9 6f e1 |....b. "......o.| +peer0.org1.example.com | 00000010 fb ca be 63 be 09 ee 03 34 85 3c f9 44 63 66 7a |...c....4.<.Dcfz| +peer1.org2.example.com | 00000010 85 f7 1a 34 5a 8f 38 60 46 51 d8 a4 fe 6a 94 35 |...4Z.8`FQ...j.5| +peer0.org2.example.com | [aeb 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039af50 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:03.059 UTC [policies] Evaluate -> DEBU b1a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +peer1.org1.example.com | 00000030 47 27 9d 59 2e 0d 70 78 03 93 59 69 54 ba 48 1c |G'.Y..px..YiT.H.| +peer0.org1.example.com | [8ff 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 48 0d 46 1d 66 43 70 4f 7f 88 87 |0D. }H.F.fCpO...| +peer1.org2.example.com | [a2d 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 8c 8c 80 ad 9c 55 38 8c a4 b4 |0E.!.......U8...| +peer0.org2.example.com | [aec 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039af50 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:03.060 UTC [orderer.common.msgprocessor] Apply -> DEBU b1b Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +peer1.org1.example.com | 00000040 f7 07 5a 5f 3b 73 3c |..Z_;s<| +peer0.org1.example.com | 00000010 a3 ad ba 14 26 70 7e 1c bc 43 a7 84 35 24 a3 01 |....&p~..C..5$..| +peer1.org2.example.com | 00000010 fd db 68 47 c5 5c a3 3a 2e 03 08 73 79 90 ff 63 |..hG.\.:...sy..c| +peer0.org2.example.com | [aed 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039af50 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:51:03.060 UTC [common.channelconfig] NewStandardValues -> DEBU b1c Initializing protos for *channelconfig.ChannelProtos" +peer1.org1.example.com | [a57 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000020 3e 0a ef b0 02 20 53 bc 1f 56 ea 4b 37 33 70 61 |>.... S..V.K73pa| +peer1.org2.example.com | 00000020 37 58 62 04 e5 02 20 45 70 6e 12 cc a2 f7 ae 91 |7Xb... Epn......| +peer0.org2.example.com | [aee 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 18 6c 4b f2 40 be d4 5f 0b bc f7 13 5c 6b dc |..lK.@.._....\k.| +orderer0.example.com | "2020-08-31 20:51:03.060 UTC [common.channelconfig] initializeProtosStruct -> DEBU b1d Processing field: HashingAlgorithm" +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | 00000030 72 d5 0d 3f 4e af 85 36 5c e2 85 78 32 8d a3 9b |r..?N..6\..x2...| +peer1.org2.example.com | 00000030 c4 e6 b4 9d b4 c8 5d 1a 07 90 5f fd 72 2d 3b d9 |......]..._.r-;.| +peer0.org2.example.com | 00000010 18 30 90 86 03 08 4d c2 b5 67 54 3c 23 e2 8b 78 |.0....M..gT<#..x| +orderer0.example.com | "2020-08-31 20:51:03.060 UTC [common.channelconfig] initializeProtosStruct -> DEBU b1e Processing field: BlockDataHashingStructure" +peer1.org1.example.com | [a58 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f b9 9d 07 c3 6c a9 f4 bd 66 2c |0E.!......l...f,| +peer0.org1.example.com | 00000040 3e f0 4e 3e e8 d7 |>.N>..| +peer0.org2.example.com | [aef 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 50 84 c1 c5 4f ae 54 1a 24 62 d0 |0D. .P...O.T.$b.| +peer1.org2.example.com | 00000040 db 49 3c 1c c6 f5 d4 |.I<....| +orderer0.example.com | "2020-08-31 20:51:03.061 UTC [common.channelconfig] initializeProtosStruct -> DEBU b1f Processing field: OrdererAddresses" +peer1.org1.example.com | 00000010 c4 ed 50 fa 67 31 5d c3 55 47 bc e1 c4 e1 3f 10 |..P.g1].UG....?.| +peer0.org1.example.com | [900 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 dd 76 19 0e 1d 96 47 73 10 71 94 9f ca 1a 82 a3 |.v....Gs.q......| +peer1.org2.example.com | [a2e 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.061 UTC [common.channelconfig] initializeProtosStruct -> DEBU b20 Processing field: Consortium" +peer1.org1.example.com | 00000020 8f b2 8d 96 64 02 20 17 b1 cd 04 18 ca da 4b 21 |....d. .......K!| +peer0.org1.example.com | [901 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" lastAliveTS: 1598907045315872200, 23 but got ts: inc_num:1598907045315872200 seq_num:22 +peer0.org2.example.com | 00000020 7a fe c6 3a 02 20 3f 51 55 0f c5 02 2c e1 2c b2 |z..:. ?QU...,.,.| +peer1.org2.example.com | [a2f 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2020-08-31 20:51:03.061 UTC [common.channelconfig] initializeProtosStruct -> DEBU b21 Processing field: Capabilities" +peer1.org1.example.com | 00000030 57 b4 da b4 b9 cd 52 87 1a f3 ed d1 7c 5a 14 3b |W.....R.....|Z.;| +peer0.org1.example.com | [902 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 d5 16 f3 3b 2d 2d 3f 24 20 e3 18 7d e2 ba a0 8d |...;--?$ ..}....| +peer1.org2.example.com | [a30 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:51:03.061 UTC [common.channelconfig] NewStandardValues -> DEBU b22 Initializing protos for *channelconfig.OrdererProtos" +peer1.org1.example.com | 00000040 2a 02 8a 22 27 c8 4b |*.."'.K| +peer0.org1.example.com | [903 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 99 e1 9f 68 56 56 |...hVV| +peer1.org2.example.com | [a31 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:51:03.061 UTC [common.channelconfig] initializeProtosStruct -> DEBU b23 Processing field: ConsensusType" +peer1.org1.example.com | [a59 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [904 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [af0 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039af50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [a32 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:51:03.061 UTC [common.channelconfig] initializeProtosStruct -> DEBU b24 Processing field: BatchSize" +peer1.org1.example.com | [a5a 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [905 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [af1 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00039af50 gate 1598907066474790100 evaluation succeeds +peer1.org2.example.com | [a33 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.061 UTC [common.channelconfig] initializeProtosStruct -> DEBU b25 Processing field: BatchTimeout" +peer1.org1.example.com | [a5b 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [906 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [af2 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [a34 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.061 UTC [common.channelconfig] initializeProtosStruct -> DEBU b26 Processing field: KafkaBrokers" +peer1.org1.example.com | [a5c 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [907 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [af3 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [a35 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.061 UTC [common.channelconfig] initializeProtosStruct -> DEBU b27 Processing field: ChannelRestrictions" +peer1.org1.example.com | [a5d 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [908 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [af4 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [a36 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.062 UTC [common.channelconfig] initializeProtosStruct -> DEBU b28 Processing field: Capabilities" +peer1.org1.example.com | [a5e 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [909 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [af5 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [a37 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.062 UTC [common.channelconfig] NewStandardValues -> DEBU b29 Initializing protos for *channelconfig.OrdererOrgProtos" +peer1.org1.example.com | [a5f 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [90a 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [af6 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a38 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.062 UTC [common.channelconfig] initializeProtosStruct -> DEBU b2a Processing field: Endpoints" +peer1.org1.example.com | [a60 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [90b 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org2.example.com | [a39 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [af7 08-31 20:51:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.062 UTC [common.channelconfig] NewStandardValues -> DEBU b2b Initializing protos for *channelconfig.OrganizationProtos" +peer1.org1.example.com | [a61 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org1.example.com | [90c 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [a3a 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [af8 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 2, nonce: 16007724499294329997, Envelope: 1905 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.062 UTC [common.channelconfig] initializeProtosStruct -> DEBU b2c Processing field: MSP" +peer1.org1.example.com | [a62 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [90d 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [a3b 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [af9 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.063 UTC [common.channelconfig] validateMSP -> DEBU b2d Setting up MSP for org OrdererOrg" +peer1.org1.example.com | [a63 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [90e 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org2.example.com | [a3c 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [afa 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.063 UTC [msp] newBccspMsp -> DEBU b2e Creating BCCSP-based MSP instance" +peer1.org1.example.com | [a64 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\n\357\260\002 S\274\037V\352K73par\325\r?N\257\2056\\\342\205x2\215\243\233>\360N>\350\327" > +peer0.org1.example.com | [90f 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [a3d 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [afb 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.063 UTC [msp] New -> DEBU b2f Creating Cache-MSP instance" +peer1.org1.example.com | [a65 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [910 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +peer1.org2.example.com | [a3e 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [afc 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.064 UTC [msp] Setup -> DEBU b30 Setting up MSP instance OrdererMSP" +peer1.org1.example.com | [a66 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [911 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [a3f 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.064 UTC [msp.identity] newIdentity -> DEBU b31 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [afd 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 86 55 55 54 110 52 72 121 77 106 104 56 53 74 78 83 53 49 103 84 50 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 65 68 78 102 66 47 108 56 79 74 113 49 10 89 50 65 114 110 84 82 43 74 114 97 65 97 67 49 53 43 84 81 68 79 51 114 109 99 80 43 53 112 122 106 72 43 77 80 69 77 109 105 110 80 48 53 111 47 121 81 50 48 56 109 117 119 113 107 120 100 84 90 100 108 118 72 90 10 107 109 73 73 52 52 104 101 43 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 110 98 111 104 114 104 56 113 100 119 49 50 88 83 118 43 68 68 71 85 79 98 89 56 110 67 98 66 72 43 97 55 108 79 113 83 68 111 88 65 48 122 99 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 80 103 118 111 81 111 79 69 43 49 115 85 114 69 120 47 120 70 115 47 122 107 70 106 103 82 53 79 87 119 117 74 112 105 120 54 75 57 56 110 70 115 122 65 105 65 51 66 80 98 110 10 88 101 112 122 72 86 82 119 103 73 69 84 109 121 66 87 85 101 81 88 73 101 107 89 72 105 48 51 83 120 113 88 109 99 107 50 77 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org2.example.com | [afe 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Added � �0��U�n�����##~J�9���o�R=� to the in memory item map, total items: 2 +peer0.org1.example.com | [912 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003279e30, CONNECTING +peer1.org2.example.com | [a40 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | [aff 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [913 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [a67 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [a41 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | [b00 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [914 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [a68 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [a42 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | [b01 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [915 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org1.example.com | [a69 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a43 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org2.example.com | [b02 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [916 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [a6a 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a44 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | [917 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003359870, CONNECTING +peer0.org2.example.com | [b03 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 76 106 80 76 72 86 83 114 120 66 108 57 51 88 84 65 106 67 68 97 89 65 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 71 107 103 76 50 121 65 76 107 104 55 10 98 117 68 121 84 105 67 66 122 52 120 84 82 98 78 66 67 65 103 87 110 110 105 74 56 76 119 89 113 111 86 89 98 97 78 66 102 98 84 51 90 73 106 104 115 107 105 50 69 70 57 100 110 121 117 110 85 68 108 119 85 99 47 102 10 86 88 81 121 49 80 122 53 86 55 101 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 74 50 54 73 97 52 102 75 110 99 78 100 108 48 114 47 103 119 120 108 68 109 50 80 74 119 109 119 82 47 109 117 53 84 113 107 103 54 70 119 78 77 51 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 67 115 66 82 84 100 76 105 105 102 69 86 65 85 117 117 101 113 52 100 81 114 55 98 81 49 43 88 120 70 112 101 87 86 72 51 49 69 99 84 110 43 107 65 105 66 86 98 119 68 120 10 80 103 109 75 77 83 88 118 56 118 49 47 108 72 117 120 86 52 87 80 77 99 53 102 86 48 110 85 83 53 89 115 73 106 83 54 108 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org1.example.com | [a6b 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [a45 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | [918 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003279e30, READY +peer0.org2.example.com | [b04 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Added ���Ċtz0�P�zP˹�{� ��w��kqu-< to the in memory item map, total items: 3 +peer1.org1.example.com | [a6c 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [a46 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org1.example.com | [919 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [b05 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a6d 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [a47 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org1.example.com | [91a 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org2.example.com | [b06 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 14064923366492091860, Envelope: 958 bytes, Signature: 0 bytes +peer1.org1.example.com | [a6e 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [a49 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | [91b 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org2.example.com | [b07 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ea 79 63 7f 04 88 19 83 be cb 2d 77 29 da 67 |..yc.......-w).g| +peer1.org1.example.com | [a6f 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a48 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org2.example.com | 00000010 71 a3 58 87 1c ba 8b be 44 c8 a4 39 47 38 cb 9b |q.X.....D..9G8..| +peer0.org1.example.com | [91c 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:7051 +peer1.org1.example.com | [a70 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a71 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 2 peers +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org2.example.com | [b08 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 33 8c 2c fe 58 22 8c a8 e4 91 |0E.!..3.,.X"....| +peer0.org1.example.com | [91d 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003359870, READY +peer1.org1.example.com | [a72 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [a4a 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org2.example.com | 00000010 88 90 ce c8 fc 50 7a 0b b0 78 9c 29 7b f6 3d 93 |.....Pz..x.){.=.| +peer0.org1.example.com | [91e 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [a74 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a4c 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | nw== +peer0.org2.example.com | 00000020 57 1a 9e b3 e6 02 20 62 19 16 58 7c f8 0f 8c 96 |W..... b..X|....| +peer0.org1.example.com | [91f 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer1.org1.example.com | [a73 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [a4b 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | 00000030 d3 36 65 f9 ec 7c 8f ac 08 e1 33 26 1d 93 16 63 |.6e..|....3&...c| +peer0.org1.example.com | [920 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer1.org1.example.com | [a75 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a4d 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.065 UTC [common.channelconfig] NewStandardValues -> DEBU b32 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org2.example.com | 00000040 30 89 11 53 29 96 fa |0..S)..| +peer0.org1.example.com | [921 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:7051 +peer1.org1.example.com | [a76 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a4f 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +orderer0.example.com | "2020-08-31 20:51:03.065 UTC [common.channelconfig] initializeProtosStruct -> DEBU b33 Processing field: ACLs" +peer0.org2.example.com | [b09 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 14064923366492091860, Envelope: 958 bytes, Signature: 0 bytes +peer0.org1.example.com | [922 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:7051 +peer1.org1.example.com | [a77 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +orderer0.example.com | "2020-08-31 20:51:03.065 UTC [common.channelconfig] initializeProtosStruct -> DEBU b34 Processing field: Capabilities" +peer0.org2.example.com | [b0a 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 75 47 48 75 66 88 106 53 54 48 88 50 52 104 73 76 107 50 57 115 51 68 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 97 100 106 84 100 70 104 47 53 100 55 65 10 110 56 48 120 68 68 114 104 114 53 103 109 83 115 119 47 55 82 105 68 114 68 83 84 72 109 103 71 113 55 72 90 78 120 89 89 53 82 85 109 71 102 111 43 118 83 73 43 121 55 77 85 98 73 103 113 103 114 90 105 97 106 80 50 10 122 43 52 55 116 74 84 43 104 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 75 102 97 84 82 51 49 121 113 83 90 111 112 89 55 114 80 101 118 118 86 52 67 122 53 81 113 85 116 73 79 67 81 65 65 90 115 75 110 82 86 84 48 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 102 84 70 55 51 101 57 100 122 81 43 98 72 116 49 87 86 105 54 43 84 65 97 115 109 113 81 68 52 79 85 103 100 105 121 70 117 77 52 108 116 99 81 67 73 66 120 67 73 119 122 43 10 51 120 73 103 115 51 115 121 99 97 47 86 101 122 101 57 121 118 76 48 77 111 81 57 82 101 112 115 67 97 51 86 103 118 117 118 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org1.example.com | [923 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a78 08-31 20:51:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a50 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +orderer0.example.com | "2020-08-31 20:51:03.065 UTC [common.channelconfig] NewStandardValues -> DEBU b35 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org2.example.com | [b0b 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Added N�@�����9�\F���`�y(כ���Jt� to the in memory item map, total items: 4 +peer0.org1.example.com | [924 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.065 UTC [common.channelconfig] initializeProtosStruct -> DEBU b36 Processing field: AnchorPeers" +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | [b0c 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a79 08-31 20:51:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [925 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.5:7051 +orderer0.example.com | "2020-08-31 20:51:03.065 UTC [common.channelconfig] NewStandardValues -> DEBU b37 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | [b0d 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [a7a 08-31 20:51:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [926 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.065 UTC [common.channelconfig] initializeProtosStruct -> DEBU b38 Processing field: MSP" +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | [b0e 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a7b 08-31 20:51:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [928 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.066 UTC [common.channelconfig] Validate -> DEBU b39 Anchor peers for org Org2MSP are anchor_peers: " +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [b0f 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a7c 08-31 20:51:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [927 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.066 UTC [common.channelconfig] validateMSP -> DEBU b3a Setting up MSP for org Org2MSP" +peer1.org2.example.com | [a51 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b10 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a7d 08-31 20:51:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [929 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.066 UTC [msp] newBccspMsp -> DEBU b3b Creating BCCSP-based MSP instance" +peer1.org2.example.com | [a52 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a7e 08-31 20:51:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b11 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [92b 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.066 UTC [msp] New -> DEBU b3c Creating Cache-MSP instance" +peer1.org2.example.com | [a53 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [a7f 08-31 20:51:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b12 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | [92c 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.066 UTC [msp] Setup -> DEBU b3d Setting up MSP instance Org2MSP" +peer1.org2.example.com | [a54 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a80 08-31 20:51:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [92a 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.067 UTC [msp.identity] newIdentity -> DEBU b3e Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [a55 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [a81 08-31 20:51:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [b13 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [92d 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [a56 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | [a82 08-31 20:51:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [92e 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [a57 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | [a83 08-31 20:51:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [92f 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [a58 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | [a84 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | [930 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [a59 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000507690 gate 1598907070505139100 evaluation starts +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [a85 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [931 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [a5a 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000507690 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [b14 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a86 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | [932 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [a5b 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000507690 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [b15 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [a87 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a1870 gate 1598907070012615800 evaluation starts +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | [933 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cdb10 gate 1598907065387983700 evaluation starts +peer1.org2.example.com | [a5c 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000507690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [b16 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [a88 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a1870 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org1.example.com | [934 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cdb10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [a5d 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000507690 principal evaluation fails +peer0.org2.example.com | [b17 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [a89 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a1870 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | [935 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cdb10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [a5e 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000507690 gate 1598907070505139100 evaluation fails +peer0.org2.example.com | [b18 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [a8a 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a1870 principal matched by identity 0 +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org1.example.com | [936 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cdb10 principal matched by identity 0 +peer1.org2.example.com | [a5f 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [b19 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [a8b 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | [937 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer1.org2.example.com | [a60 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [b1a 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer1.org2.example.com | [a61 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [b1b 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [a8d 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org1.example.com | [938 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac cb e3 d5 99 a9 b4 75 8d 8e 73 |0E.!........u..s| +peer1.org2.example.com | [a62 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000507c00 gate 1598907070507444900 evaluation starts +peer0.org2.example.com | [b1c 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | 00000010 22 fa 4c 16 8e 5d b8 85 57 32 e9 f1 43 0e d2 3b |".L..]..W2..C..;| +peer1.org2.example.com | [a63 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000507c00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [b1d 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +orderer0.example.com | "2020-08-31 20:51:03.068 UTC [common.channelconfig] NewStandardValues -> DEBU b3f Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | 00000020 42 f4 16 78 a0 02 20 6e 62 e0 ec 4a d3 5d 4e a5 |B..x.. nb..J.]N.| +peer1.org2.example.com | [a64 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000507c00 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [b1e 08-31 20:51:06.69 UTC] [%{longpkg}] %{callpath} -> WARN Failed reading messge from 172.18.0.5:42530, reason: timed out waiting for connection message from 172.18.0.5:42530 +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +orderer0.example.com | "2020-08-31 20:51:03.068 UTC [common.channelconfig] initializeProtosStruct -> DEBU b40 Processing field: AnchorPeers" +peer0.org1.example.com | 00000030 9a 94 24 e2 22 23 ed 52 0f 53 3a 9a f2 53 81 9a |..$."#.R.S:..S..| +peer1.org2.example.com | [a65 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000507c00 principal matched by identity 0 +peer0.org2.example.com | [b1f 08-31 20:51:06.69 UTC] [%{longpkg}] %{callpath} -> ERRO Authentication failed: timed out waiting for connection message from 172.18.0.5:42530 +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +orderer0.example.com | "2020-08-31 20:51:03.068 UTC [common.channelconfig] NewStandardValues -> DEBU b41 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | 00000040 f1 20 63 4a 2a dd db |. cJ*..| +peer1.org2.example.com | [a4e 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b20 08-31 20:51:06.69 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:51:14.691Z grpc.peer_address=172.18.0.5:42530 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="timed out waiting for connection message from 172.18.0.5:42530" grpc.code=Unknown grpc.call_duration=2.0031492s +peer1.org1.example.com | [a8c 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.068 UTC [common.channelconfig] initializeProtosStruct -> DEBU b42 Processing field: MSP" +peer0.org1.example.com | [939 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cdb10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [a66 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | [b21 08-31 20:51:08.22 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ] [peer1.org2.example.com:7051] [peer0.org1.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051 ] [peer1.org2.example.com:7051] [peer0.org1.example.com:7051 ]] +peer1.org1.example.com | [a8e 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.068 UTC [common.channelconfig] Validate -> DEBU b43 Anchor peers for org Org1MSP are anchor_peers: " +peer0.org1.example.com | [93a 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cdb10 gate 1598907065387983700 evaluation succeeds +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [b22 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:37886 +peer1.org1.example.com | [a8f 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a1870 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:03.068 UTC [common.channelconfig] validateMSP -> DEBU b44 Setting up MSP for org Org1MSP" +peer0.org1.example.com | [93b 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [a67 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | [b23 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc000500460 +peer1.org1.example.com | [a90 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033a1870 gate 1598907070012615800 evaluation succeeds +orderer0.example.com | "2020-08-31 20:51:03.068 UTC [msp] newBccspMsp -> DEBU b45 Creating BCCSP-based MSP instance" +peer0.org1.example.com | [93c 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | [b24 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [a91 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:03.068 UTC [msp] New -> DEBU b46 Creating Cache-MSP instance" +peer0.org1.example.com | [93d 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | [b25 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [a92 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:03.069 UTC [msp] Setup -> DEBU b47 Setting up MSP instance Org1MSP" +peer0.org1.example.com | [93e 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | [b26 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org1.example.com | [a93 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:03.069 UTC [msp.identity] newIdentity -> DEBU b48 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [93f 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [b27 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [a94 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [940 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a68 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000507c00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [b28 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 9f 32 6b b1 3f b2 81 e1 59 c7 d6 9d 5e ba eb |Q.2k.?...Y...^..| +peer1.org1.example.com | [a95 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [941 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org2.example.com | [a6a 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000507c00 gate 1598907070507444900 evaluation succeeds +peer0.org2.example.com | 00000010 19 f8 bf 9b 45 14 9d fb 9c 0c f8 98 6e c2 55 04 |....E.......n.U.| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [942 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [a6b 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [b29 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f e3 a7 5c 1f 72 ab 93 b0 73 6e b6 |0D. ...\.r...sn.| +peer1.org1.example.com | [a96 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | [943 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [a6c 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000010 27 f5 43 d3 3b c9 96 00 d3 e1 6f 81 ce e0 3c d1 |'.C.;.....o...<.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [944 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [a6d 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000020 6c 42 d0 08 02 20 55 18 f4 7c 0a b8 47 b7 09 25 |lB... U..|..G..%| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | [945 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [a6e 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000030 24 d7 ad d4 a8 3c ff 3b 1d 62 12 80 51 cd cb cb |$....<.;.b..Q...| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | [a69 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [946 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000040 25 a4 dc 3f 3a 32 |%..?:2| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org2.example.com | [a6f 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [947 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [b2a 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [a97 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | [a71 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [948 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [b2b 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0035650a0, header 0xc000500870 +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org2.example.com | [a70 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [949 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [b2c 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer1.org1.example.com | [a98 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org2.example.com | [a72 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [94a 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0f30 gate 1598907065397216100 evaluation starts +peer0.org2.example.com | [b2d 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU [][06b731fe] processing txid: 06b731fe779e496bcb67cdc15fb4a68ebc78bb5600adb7729743fd2c0b9ee6a6 +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org2.example.com | [a73 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [94b 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0f30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [b2e 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU [][06b731fe] Entry chaincode: name:"lscc" +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org2.example.com | [a74 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [94c 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0f30 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [b2f 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> INFO [][06b731fe] Entry chaincode: name:"lscc" +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org2.example.com | [a76 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [94d 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0f30 principal matched by identity 0 +peer0.org2.example.com | [b30 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +orderer0.example.com | "2020-08-31 20:51:03.070 UTC [msp] Setup -> DEBU b49 Setting up the MSP manager (3 msps)" +peer1.org2.example.com | [a77 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [94e 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org2.example.com | [b31 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 9f 32 6b b1 3f b2 81 e1 59 c7 d6 9d 5e ba eb |Q.2k.?...Y...^..| +peer1.org1.example.com | [a99 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer N�@�����9�\F���`�y(כ���Jt� message sent from ����)�����H�5���K��q���2���( +orderer0.example.com | "2020-08-31 20:51:03.070 UTC [msp] Setup -> DEBU b4a MSP manager setup complete, setup 3 msps" +peer1.org2.example.com | [a78 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org2.example.com | 00000010 19 f8 bf 9b 45 14 9d fb 9c 0c f8 98 6e c2 55 04 |....E.......n.U.| +peer1.org1.example.com | [a9a 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.070 UTC [policies] NewManagerImpl -> DEBU b4b Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [a75 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [94f 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 9e 3b cd c8 92 b0 5b 57 d9 94 |0E.!...;....[W..| +peer0.org2.example.com | [b32 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f e3 a7 5c 1f 72 ab 93 b0 73 6e b6 |0D. ...\.r...sn.| +peer1.org1.example.com | [a9b 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.070 UTC [policies] NewManagerImpl -> DEBU b4c Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [a79 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 e5 91 8e a1 3c 60 81 70 b5 c4 b3 ce 3f cb 8b 1e |....<`.p....?...| +peer0.org2.example.com | 00000010 27 f5 43 d3 3b c9 96 00 d3 e1 6f 81 ce e0 3c d1 |'.C.;.....o...<.| +peer1.org1.example.com | [a9c 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | "2020-08-31 20:51:03.070 UTC [policies] NewManagerImpl -> DEBU b4d Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [a7a 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000020 91 90 c6 6d 29 02 20 7a 9b dc 43 35 43 02 71 d8 |...m). z..C5C.q.| +peer0.org2.example.com | 00000020 6c 42 d0 08 02 20 55 18 f4 7c 0a b8 47 b7 09 25 |lB... U..|..G..%| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:51:03.070 UTC [policies] NewManagerImpl -> DEBU b4e Proposed new policy BlockValidation for Channel/Orderer" +peer1.org2.example.com | [a7b 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000030 9b e1 8a 4e 8f 42 bb 03 7d b5 88 6f 97 0e fd 82 |...N.B..}..o....| +peer0.org2.example.com | 00000030 24 d7 ad d4 a8 3c ff 3b 1d 62 12 80 51 cd cb cb |$....<.;.b..Q...| +peer1.org1.example.com | [a9d 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b4f Proposed new policy Readers for Channel/Orderer" +peer1.org2.example.com | [a7c 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004fb6e0 gate 1598907070516880100 evaluation starts +peer0.org1.example.com | 00000040 7c 8f 4b 3a 83 00 71 ||.K:..q| +peer0.org2.example.com | 00000040 25 a4 dc 3f 3a 32 |%..?:2| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | "2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b50 Proposed new policy Writers for Channel/Orderer" +peer1.org2.example.com | [a7d 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004fb6e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [950 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0f30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [b33 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | "2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b51 Proposed new policy Admins for Channel/Orderer" +peer1.org2.example.com | [a7e 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004fb6e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [951 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0f30 gate 1598907065397216100 evaluation succeeds +peer0.org2.example.com | [b34 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | "2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b52 Proposed new policy Readers for Channel/Application/Org2MSP" +peer1.org2.example.com | [a7f 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004fb6e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [952 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [b35 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | "2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b53 Proposed new policy Writers for Channel/Application/Org2MSP" +peer1.org2.example.com | [a80 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004fb6e0 principal evaluation fails +peer0.org1.example.com | [953 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [b36 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [88422bda-7147-465c-8722-b639e71f1467] +peer1.org1.example.com | [a9e 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel : Couldn't find org identity of peer N�@�����9�\F���`�y(כ���Jt� message sent from ���Ċtz0�P�zP˹�{� ��w��kqu-< +orderer0.example.com | "2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b54 Proposed new policy Admins for Channel/Application/Org2MSP" +peer1.org2.example.com | [a81 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004fb6e0 gate 1598907070516880100 evaluation fails +peer0.org1.example.com | [954 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [b37 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [a9f 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b55 Proposed new policy Admins for Channel/Application/Org1MSP" +peer1.org2.example.com | [a82 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [955 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [b38 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [88422bda-7147-465c-8722-b639e71f1467] +peer1.org1.example.com | [aa0 08-31 20:51:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b56 Proposed new policy Readers for Channel/Application/Org1MSP" +peer1.org2.example.com | [a84 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [956 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer0.org2.example.com | [b39 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +peer1.org1.example.com | [aa1 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b57 Proposed new policy Writers for Channel/Application/Org1MSP" +peer1.org2.example.com | [a85 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [957 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b3a 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +peer1.org1.example.com | [aa2 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.071 UTC [policies] GetPolicy -> DEBU b58 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +peer1.org2.example.com | [a86 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004fbc60 gate 1598907070519557000 evaluation starts +peer0.org1.example.com | [958 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org2.example.com | [b3b 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU [06b731fe] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [aa3 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.071 UTC [policies] GetPolicy -> DEBU b59 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer1.org2.example.com | [a87 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org1.example.com | [959 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b3c 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU [06b731fe] notifying Txid:06b731fe779e496bcb67cdc15fb4a68ebc78bb5600adb7729743fd2c0b9ee6a6, channelID: +peer1.org1.example.com | [aa4 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b5a Proposed new policy Endorsement for Channel/Application" +peer1.org2.example.com | [a83 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [95a 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [b3d 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [aa5 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b5b Proposed new policy Readers for Channel/Application" +peer1.org2.example.com | [a88 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004fbc60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [95b 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b3e 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> INFO [][06b731fe] Exit chaincode: name:"lscc" (2ms) +peer1.org1.example.com | [aa6 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b5c Proposed new policy Writers for Channel/Application" +peer1.org2.example.com | [a89 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004fbc60 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [95c 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [b3f 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU [][06b731fe] Exit +peer1.org1.example.com | [aa7 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +orderer0.example.com | "2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b5d Proposed new policy Admins for Channel/Application" +peer1.org2.example.com | [a8a 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004fbc60 principal matched by identity 0 +peer0.org1.example.com | [95d 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [b40 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:37886 +peer1.org1.example.com | [aa8 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.071 UTC [policies] GetPolicy -> DEBU b5e Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +peer1.org2.example.com | [a8b 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | [95e 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b41 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:37886 grpc.code=OK grpc.call_duration=3.7886ms +peer1.org1.example.com | [aa9 08-31 20:51:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.072 UTC [policies] GetPolicy -> DEBU b5f Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [95f 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [b42 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [aaa 08-31 20:51:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.072 UTC [policies] NewManagerImpl -> DEBU b60 Proposed new policy LifecycleEndorsement for Channel/Application" +peer1.org2.example.com | [a8c 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | [960 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [b43 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.6:7051->172.18.0.9:37886: read: connection reset by peer +peer1.org1.example.com | [aab 08-31 20:51:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.072 UTC [policies] NewManagerImpl -> DEBU b61 Proposed new policy Readers for Channel" +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | [961 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [b44 08-31 20:51:08.40 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [aac 08-31 20:51:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.072 UTC [policies] NewManagerImpl -> DEBU b62 Proposed new policy Writers for Channel" +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | [962 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [b45 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [aad 08-31 20:51:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Don't have certificate for membership: timestamp: +orderer0.example.com | "2020-08-31 20:51:03.072 UTC [policies] NewManagerImpl -> DEBU b63 Proposed new policy Admins for Channel" +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | [963 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [b46 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [aae 08-31 20:51:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.072 UTC [common.configtx] addToMap -> DEBU b64 Adding to config map: [Group] /Channel" +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [964 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [b47 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [aaf 08-31 20:51:10.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.072 UTC [common.configtx] addToMap -> DEBU b65 Adding to config map: [Group] /Channel/Orderer" +peer1.org2.example.com | [a8d 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004fbc60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [965 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fa5d0 gate 1598907065498531900 evaluation starts +peer0.org2.example.com | [b48 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ab0 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b66 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [a8e 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004fbc60 gate 1598907070519557000 evaluation succeeds +peer0.org1.example.com | [966 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fa5d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [b49 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [ab1 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b67 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer1.org2.example.com | [a8f 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [967 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fa5d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [b4a 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ab2 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b68 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer1.org2.example.com | [a90 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [968 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fa5d0 principal matched by identity 0 +peer0.org2.example.com | [b4b 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b69 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer1.org2.example.com | [a91 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [969 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 16 86 03 a9 c2 f9 09 da 67 b3 32 d1 55 f8 e9 |.........g.2.U..| +peer0.org2.example.com | [b4c 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [ab3 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b6a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [a92 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 5d ec db a2 72 bf 7c 18 82 c4 01 38 af 3e ee b8 |]...r.|....8.>..| +peer0.org2.example.com | [b4d 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 45 23 3a 25 15 88 da 8f 53 4a 1b 00 79 c1 f8 |.E#:%....SJ..y..| +peer1.org1.example.com | [ab4 08-31 20:51:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +orderer0.example.com | "2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b6b Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer1.org2.example.com | [a93 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [96a 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 1c 3f df 9d c6 bb 74 0b 35 7b 46 |0D. M.?....t.5{F| +peer0.org2.example.com | 00000010 61 47 17 a6 05 0c 7c a5 2c 8e 32 89 cd d4 ab 53 |aG....|.,.2....S| +peer1.org1.example.com | [ab5 08-31 20:51:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to peer0.org1.example.com:7051 +orderer0.example.com | "2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b6c Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer1.org2.example.com | [a94 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 1b 7d 4e 16 2b 4c fb 26 e8 af 49 12 79 5f 30 59 |.}N.+L.&..I.y_0Y| +peer0.org2.example.com | [b4e 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 96 2d 33 a9 0f 8e 0a 58 ac e1 |0E.!...-3....X..| +peer1.org1.example.com | [ab6 08-31 20:51:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b6d Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer1.org2.example.com | [a95 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 c2 64 2d 3c 02 20 36 40 3d e0 ff 09 4c e4 bf 12 |.d-<. 6@=...L...| +peer0.org2.example.com | 00000010 e1 cf dd 39 bc 9a 6b 4a b8 24 7d a8 d8 5f 60 13 |...9..kJ.$}.._`.| +peer1.org1.example.com | [ab7 08-31 20:51:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b6e Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer1.org2.example.com | [a96 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000030 92 1b c0 99 9b d1 9b c5 ce 14 0c bf 18 be 6d 1e |..............m.| +peer0.org2.example.com | 00000020 1f 92 ed c4 6b 02 20 52 28 b2 cc d3 6c ac c0 78 |....k. R(...l..x| +peer1.org1.example.com | [ab8 08-31 20:51:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b6f Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer1.org2.example.com | [a97 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000040 de 3c 61 a0 d3 7e |. DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 743458667508970115, Envelope: 957 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b70 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer1.org2.example.com | [a98 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [96b 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fa5d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000040 67 ba 52 10 74 ab 11 |g.R.t..| +peer1.org1.example.com | [aba 08-31 20:51:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 743458667508970115, Envelope: 957 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b71 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer1.org2.example.com | [a99 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b28b0 gate 1598907070529460500 evaluation starts +peer0.org1.example.com | [96c 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fa5d0 gate 1598907065498531900 evaluation succeeds +peer0.org2.example.com | [b4f 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | [abb 08-31 20:51:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b72 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer1.org2.example.com | [a9a 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b28b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [96d 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org1.example.com | [abc 08-31 20:51:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.074 UTC [common.configtx] addToMap -> DEBU b73 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer1.org2.example.com | [a9b 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b28b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [96e 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [b50 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 49 f2 33 07 12 7a 0a 25 0b 97 |0E.!..I.3..z.%..| +peer1.org1.example.com | [abd 08-31 20:51:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +orderer0.example.com | "2020-08-31 20:51:03.074 UTC [common.configtx] addToMap -> DEBU b74 Adding to config map: [Group] /Channel/Application" +peer1.org2.example.com | [a9c 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b28b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [96f 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 99 e1 44 7b a0 37 87 ff df d3 52 48 15 ec 7c d8 |..D{.7....RH..|.| +peer1.org1.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +orderer0.example.com | "2020-08-31 20:51:03.074 UTC [common.configtx] addToMap -> DEBU b75 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer1.org2.example.com | [a9d 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b28b0 principal evaluation fails +peer0.org1.example.com | [970 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000020 88 90 f7 c2 3a 02 20 7a a4 dc ff f1 5a 53 7c c6 |....:. z....ZS|.| +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +orderer0.example.com | "2020-08-31 20:51:03.074 UTC [common.configtx] addToMap -> DEBU b76 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer1.org2.example.com | [a9e 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b28b0 gate 1598907070529460500 evaluation fails +peer0.org1.example.com | [971 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000030 9a 20 e5 29 4d 10 db f2 79 f7 85 11 1d 9c 25 5e |. .)M...y.....%^| +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +orderer0.example.com | "2020-08-31 20:51:03.074 UTC [common.configtx] addToMap -> DEBU b77 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer1.org2.example.com | [a9f 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [972 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | 00000040 29 21 27 bb 2d 66 ee |)!'.-f.| +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +orderer0.example.com | "2020-08-31 20:51:03.074 UTC [common.configtx] addToMap -> DEBU b78 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer1.org2.example.com | [aa0 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [973 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [b51 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +orderer0.example.com | "2020-08-31 20:51:03.075 UTC [common.configtx] addToMap -> DEBU b79 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [aa1 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [974 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org2.example.com | [b52 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +orderer0.example.com | "2020-08-31 20:51:03.075 UTC [common.configtx] addToMap -> DEBU b7a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer1.org2.example.com | [aa2 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b2e30 gate 1598907070531420300 evaluation starts +peer0.org1.example.com | [975 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org2.example.com | [b53 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:51:03.075 UTC [common.configtx] addToMap -> DEBU b7b Adding to config map: [Group] /Channel/Application/Org1MSP" +peer1.org2.example.com | [aa3 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b2e30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [976 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org2.example.com | [b54 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:51:03.075 UTC [common.configtx] addToMap -> DEBU b7c Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer1.org2.example.com | [aa4 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b2e30 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [977 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | [b55 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:51:03.075 UTC [common.configtx] addToMap -> DEBU b7d Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer1.org2.example.com | [aa5 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b2e30 principal matched by identity 0 +peer0.org1.example.com | [978 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org2.example.com | [b56 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.075 UTC [common.configtx] addToMap -> DEBU b7e Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer1.org2.example.com | [aa6 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | [979 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org2.example.com | [b57 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.076 UTC [common.configtx] addToMap -> DEBU b7f Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [97a 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org2.example.com | [b58 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.076 UTC [common.configtx] addToMap -> DEBU b80 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer1.org2.example.com | [aa7 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | [97b 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [b59 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +orderer0.example.com | "2020-08-31 20:51:03.076 UTC [common.configtx] addToMap -> DEBU b81 Adding to config map: [Value] /Channel/Application/Capabilities" +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | [97c 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [abe 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [b5a 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.076 UTC [common.configtx] addToMap -> DEBU b82 Adding to config map: [Value] /Channel/Application/ACLs" +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | [97d 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [abf 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [b5b 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.076 UTC [common.configtx] addToMap -> DEBU b83 Adding to config map: [Policy] /Channel/Application/Writers" +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | [97e 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ac0 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161019 +peer0.org2.example.com | [b5c 08-31 20:51:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:03.076 UTC [common.configtx] addToMap -> DEBU b84 Adding to config map: [Policy] /Channel/Application/Admins" +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [97f 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ac1 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 689120928E48A6B61957DF953D883DE566B40B81D5850BE6772D0EB6D4686344 +peer0.org2.example.com | [b5d 08-31 20:51:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +orderer0.example.com | "2020-08-31 20:51:03.077 UTC [common.configtx] addToMap -> DEBU b85 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer1.org2.example.com | [aa8 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b2e30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [980 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [ac2 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [b5e 08-31 20:51:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.077 UTC [common.configtx] addToMap -> DEBU b86 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer1.org2.example.com | [aa9 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b2e30 gate 1598907070531420300 evaluation succeeds +peer0.org1.example.com | [981 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [ac3 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [b5f 08-31 20:51:09.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.077 UTC [common.configtx] addToMap -> DEBU b87 Adding to config map: [Policy] /Channel/Application/Readers" +peer1.org2.example.com | [aaa 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [982 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ac4 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org2.example.com | [b60 08-31 20:51:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +orderer0.example.com | "2020-08-31 20:51:03.077 UTC [common.configtx] addToMap -> DEBU b88 Adding to config map: [Value] /Channel/Consortium" +peer1.org2.example.com | [aab 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [983 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ac5 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [b61 08-31 20:51:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning true +orderer0.example.com | "2020-08-31 20:51:03.077 UTC [common.configtx] addToMap -> DEBU b89 Adding to config map: [Value] /Channel/Capabilities" +peer1.org2.example.com | [aac 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [984 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ac6 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [b62 08-31 20:51:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:51:03.077 UTC [common.configtx] addToMap -> DEBU b8a Adding to config map: [Value] /Channel/HashingAlgorithm" +peer1.org2.example.com | [aad 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [985 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [b63 08-31 20:51:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08E8C0ACB0F8AF9D981610031801 +peer1.org1.example.com | [ac7 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.077 UTC [common.configtx] addToMap -> DEBU b8b Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer1.org2.example.com | [aae 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | [986 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [b64 08-31 20:51:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E491494C336A73B23BE8AA4E328DA0F94267BC6E08F6686D3B666668ECF71D61 +peer1.org1.example.com | [ac8 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:03.078 UTC [common.configtx] addToMap -> DEBU b8c Adding to config map: [Value] /Channel/OrdererAddresses" +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [987 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b65 08-31 20:51:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer1.org1.example.com | [ac9 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:03.078 UTC [common.configtx] addToMap -> DEBU b8d Adding to config map: [Policy] /Channel/Readers" +peer1.org2.example.com | [aaf 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | [988 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [b66 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [aca 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:03.078 UTC [common.configtx] addToMap -> DEBU b8e Adding to config map: [Policy] /Channel/Writers" +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | [989 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [b67 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [acb 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:03.078 UTC [common.configtx] addToMap -> DEBU b8f Adding to config map: [Policy] /Channel/Admins" +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | [98a 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [b68 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [acc 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:03.079 UTC [orderer.common.broadcast] ProcessMessage -> DEBU b90 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:50756" +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | [98b 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [b69 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [acd 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b9c60 gate 1598907070305383400 evaluation starts +orderer0.example.com | "2020-08-31 20:51:03.079 UTC [orderer.consensus.etcdraft] propose -> INFO b91 Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [98c 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [b6a 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [ace 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b9c60 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:03.079 UTC [orderer.consensus.etcdraft] serveRequest -> INFO b92 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +peer1.org2.example.com | [ab0 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [98d 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [b6b 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [acf 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b9c60 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:03.079 UTC [orderer.consensus.etcdraft] 2 -> DEBU b93 Proposed block [2] to raft consensus" channel=businesschannel node=1 +peer1.org2.example.com | [ab1 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [98e 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [b6c 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ad0 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +orderer0.example.com | "2020-08-31 20:51:03.082 UTC [grpc] warningf -> DEBU b94 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:50756: read: connection reset by peer" +peer1.org2.example.com | [ab2 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [98f 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b6d 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [ad1 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +orderer0.example.com | "2020-08-31 20:51:03.082 UTC [orderer.common.broadcast] Handle -> WARN b95 Error reading from 172.18.0.9:50756: rpc error: code = Canceled desc = context canceled" +peer1.org2.example.com | [ab3 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b6e 08-31 20:51:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [990 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [ad2 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +orderer0.example.com | "2020-08-31 20:51:03.082 UTC [orderer.common.server] func1 -> DEBU b96 Closing Broadcast stream" +peer1.org2.example.com | [ab4 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b6f 08-31 20:51:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [991 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ad3 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b9c60 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:51:03.082 UTC [comm.grpc.server] 1 -> INFO b97 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:50756 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=78.4544ms +peer1.org2.example.com | [ab5 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [b70 08-31 20:51:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb 81 b7 fd 2c 7b 7c 57 22 39 09 4b 14 d5 7d d4 |....,{|W"9.K..}.| +peer0.org1.example.com | [992 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [ad4 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ea 79 63 7f 04 88 19 83 be cb 2d 77 29 da 67 |..yc.......-w).g| +orderer0.example.com | "2020-08-31 20:51:03.083 UTC [grpc] infof -> DEBU b98 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | 00000010 7b 54 ba 32 ff 61 5e 03 69 52 8c 0f 52 1a 62 eb |{T.2.a^.iR..R.b.| +peer1.org2.example.com | [ab6 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [993 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 71 a3 58 87 1c ba 8b be 44 c8 a4 39 47 38 cb 9b |q.X.....D..9G8..| +peer0.org2.example.com | [b71 08-31 20:51:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 c9 00 75 24 2e bb a3 f7 6e 34 |0E.!....u$....n4| +orderer0.example.com | "2020-08-31 20:51:03.084 UTC [common.deliver] Handle -> WARN b99 Error reading from 172.18.0.9:50754: rpc error: code = Canceled desc = context canceled" +peer1.org2.example.com | [ab7 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [994 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [ad5 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 33 8c 2c fe 58 22 8c a8 e4 91 |0E.!..3.,.X"....| +peer0.org2.example.com | 00000010 c1 56 6f 99 42 80 7b 36 16 36 66 f2 ad 8e 64 cb |.Vo.B.{6.6f...d.| +orderer0.example.com | "2020-08-31 20:51:03.084 UTC [orderer.common.server] func1 -> DEBU b9a Closing Deliver stream" +peer1.org2.example.com | [ab8 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [995 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 88 90 ce c8 fc 50 7a 0b b0 78 9c 29 7b f6 3d 93 |.....Pz..x.){.=.| +peer0.org2.example.com | 00000020 0b f3 fb c6 b3 02 20 29 00 bc 1d dd f9 60 4e 00 |...... ).....`N.| +orderer0.example.com | "2020-08-31 20:51:03.084 UTC [comm.grpc.server] 1 -> INFO b9b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50754 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=99.0476ms +peer1.org2.example.com | [ab9 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [996 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 57 1a 9e b3 e6 02 20 62 19 16 58 7c f8 0f 8c 96 |W..... b..X|....| +peer0.org2.example.com | 00000030 6c 0e 04 be 92 79 4c a6 02 9c b1 d0 77 20 a3 a3 |l....yL.....w ..| +orderer0.example.com | "2020-08-31 20:51:03.084 UTC [grpc] infof -> DEBU b9c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org2.example.com | [aba 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [997 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 d3 36 65 f9 ec 7c 8f ac 08 e1 33 26 1d 93 16 63 |.6e..|....3&...c| +peer0.org2.example.com | 00000040 81 65 10 32 ed ba 23 |.e.2..#| +orderer0.example.com | "2020-08-31 20:51:03.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b9d Sending msg of 27272 bytes to 2 on channel businesschannel took 21.5µs" +peer1.org2.example.com | [abb 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026229d0 gate 1598907070537778200 evaluation starts +peer0.org1.example.com | [998 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000040 30 89 11 53 29 96 fa |0..S)..| +peer0.org2.example.com | [b72 08-31 20:51:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b9e Sending msg of 27272 bytes to 3 on channel businesschannel took 15.5µs" +peer1.org2.example.com | [abc 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026229d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [999 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161012 +peer1.org1.example.com | [ad6 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b9c60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [b73 08-31 20:51:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU b9f Send of ConsensusRequest for channel businesschannel with payload of size 27272 to orderer1.example.com(orderer1.example.com:7050) took 98.8µs " +peer1.org2.example.com | [abd 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026229d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [99a 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6457BF6DB34E55FD885D68BA350E178477B656AA4AF8C86E7E80C4258844C6B9 +peer1.org1.example.com | [ad7 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034b9c60 gate 1598907070305383400 evaluation succeeds +peer0.org2.example.com | [b74 08-31 20:51:09.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU ba0 Send of ConsensusRequest for channel businesschannel with payload of size 27272 to orderer2.example.com(orderer2.example.com:7050) took 102µs " +peer1.org2.example.com | [abe 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [99b 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [ad8 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [b75 08-31 20:51:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +orderer0.example.com | "2020-08-31 20:51:03.093 UTC [orderer.common.cluster.step] handleMessage -> DEBU ba1 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [abf 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026229d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [99c 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [ad9 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [b76 08-31 20:51:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning true +orderer0.example.com | "2020-08-31 20:51:03.095 UTC [orderer.common.cluster.step] handleMessage -> DEBU ba2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [ac0 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026229d0 principal evaluation fails +peer0.org1.example.com | [99d 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [ada 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b77 08-31 20:51:09.28 UTC] [%{longpkg}] %{callpath} -> INFO a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 Stopped being a leader +orderer0.example.com | "2020-08-31 20:51:03.095 UTC [orderer.consensus.etcdraft] writeBlock -> INFO ba3 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 +peer1.org2.example.com | [ac1 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026229d0 gate 1598907070537778200 evaluation fails +peer0.org1.example.com | [99e 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org1.example.com | [adb 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b78 08-31 20:51:09.28 UTC] [%{longpkg}] %{callpath} -> INFO Renounced leadership, stopping delivery service for channel businesschannel +orderer0.example.com | "2020-08-31 20:51:03.095 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ba4 Sending msg of 28 bytes to 2 on channel businesschannel took 61.4µs" +peer1.org2.example.com | [ac2 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [99f 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [adc 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [b79 08-31 20:51:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +orderer0.example.com | "2020-08-31 20:51:03.105 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ba7 Sending msg of 28 bytes to 3 on channel businesschannel took 86.2µs" +peer1.org2.example.com | [ac3 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [9a3 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer1.org1.example.com | [add 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [b7a 08-31 20:51:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU ba5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 785.9µs " +peer1.org2.example.com | [ac4 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [9a2 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161013 +peer1.org1.example.com | [ade 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [b7b 08-31 20:51:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU This peer will stop pass blocks from orderer service to other peers +orderer0.example.com | "2020-08-31 20:51:03.098 UTC [common.configtx] addToMap -> DEBU ba6 Adding to config map: [Group] /Channel" +peer1.org2.example.com | [ac5 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002622f40 gate 1598907070560337800 evaluation starts +peer0.org1.example.com | [9a4 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [adf 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b7c 08-31 20:51:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +orderer0.example.com | "2020-08-31 20:51:03.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU ba8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 995.1µs " +peer1.org2.example.com | [ac6 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002622f40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [9a5 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E5DF239BA56A7C8535B0955B138E7A410AA014EAE59E2172DF90F347D1BEE180 +peer1.org1.example.com | [ae0 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [b7d 08-31 20:51:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +orderer0.example.com | "2020-08-31 20:51:03.108 UTC [common.configtx] addToMap -> DEBU ba9 Adding to config map: [Group] /Channel/Application" +peer1.org2.example.com | [ac7 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002622f40 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [9a0 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [ae1 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b7f 08-31 20:51:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +orderer0.example.com | "2020-08-31 20:51:03.108 UTC [orderer.common.cluster.step] handleMessage -> DEBU baa Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [ac8 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002622f40 principal matched by identity 0 +peer0.org1.example.com | [9a1 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [ae2 08-31 20:51:10.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [b7e 08-31 20:51:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +orderer0.example.com | "2020-08-31 20:51:03.108 UTC [common.configtx] addToMap -> DEBU bab Adding to config map: [Group] /Channel/Application/Org2MSP" +peer1.org2.example.com | [ac9 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | [9a6 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [b80 08-31 20:51:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [ae3 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:03.109 UTC [common.configtx] addToMap -> DEBU bac Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [9a7 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [b81 08-31 20:51:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ae4 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.110 UTC [common.configtx] addToMap -> DEBU bad Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [aca 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | [9a8 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b82 08-31 20:51:09.28 UTC] [%{longpkg}] %{callpath} -> WARN Got error: rpc error: code = Canceled desc = context canceled , at 1 attempt. Retrying in 1s +peer1.org1.example.com | [ae5 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.111 UTC [common.configtx] addToMap -> DEBU bae Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | [9a9 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [b83 08-31 20:51:09.28 UTC] [%{longpkg}] %{callpath} -> WARN [businesschannel] Receive error: client is closing +peer1.org1.example.com | [ae6 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 743458667508970115, Envelope: 957 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.111 UTC [common.configtx] addToMap -> DEBU baf Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | [9aa 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [b84 08-31 20:51:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +peer1.org1.example.com | [ae7 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.111 UTC [common.configtx] addToMap -> DEBU bb0 Adding to config map: [Group] /Channel" +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | [9ab 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org2.example.com | [b85 08-31 20:51:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ae8 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.112 UTC [common.configtx] addToMap -> DEBU bb1 Adding to config map: [Group] /Channel/Application" +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [9ac 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [b86 08-31 20:51:09.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer1.org1.example.com | [ae9 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.112 UTC [common.configtx] addToMap -> DEBU bb2 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer1.org2.example.com | [acb 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002622f40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [9ae 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [b87 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.112 UTC [common.configtx] addToMap -> DEBU bb3 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer1.org1.example.com | [aea 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [acc 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002622f40 gate 1598907070560337800 evaluation succeeds +peer0.org1.example.com | [9af 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b88 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.113 UTC [common.configtx] addToMap -> DEBU bb4 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer1.org1.example.com | [aeb 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [acd 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [9ad 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b89 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.113 UTC [common.configtx] addToMap -> DEBU bb5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer1.org1.example.com | [aec 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 75 47 48 75 66 88 106 53 54 48 88 50 52 104 73 76 107 50 57 115 51 68 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 97 100 106 84 100 70 104 47 53 100 55 65 10 110 56 48 120 68 68 114 104 114 53 103 109 83 115 119 47 55 82 105 68 114 68 83 84 72 109 103 71 113 55 72 90 78 120 89 89 53 82 85 109 71 102 111 43 118 83 73 43 121 55 77 85 98 73 103 113 103 114 90 105 97 106 80 50 10 122 43 52 55 116 74 84 43 104 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 75 102 97 84 82 51 49 121 113 83 90 111 112 89 55 114 80 101 118 118 86 52 67 122 53 81 113 85 116 73 79 67 81 65 65 90 115 75 110 82 86 84 48 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 102 84 70 55 51 101 57 100 122 81 43 98 72 116 49 87 86 105 54 43 84 65 97 115 109 113 81 68 52 79 85 103 100 105 121 70 117 77 52 108 116 99 81 67 73 66 120 67 73 119 122 43 10 51 120 73 103 115 51 115 121 99 97 47 86 101 122 101 57 121 118 76 48 77 111 81 57 82 101 112 115 67 97 51 86 103 118 117 118 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org2.example.com | [ace 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [9b0 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [b8a 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.113 UTC [common.configtx] addToMap -> DEBU bb6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer1.org1.example.com | [aed 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Added N�@�����9�\F���`�y(כ���Jt� to the in memory item map, total items: 4 +peer1.org2.example.com | [acf 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [9b1 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [b8b 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.114 UTC [common.configtx] addToMap -> DEBU bb7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer1.org1.example.com | [aee 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ad0 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [9b2 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b8c 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.114 UTC [common.configtx] verifyDeltaSet -> DEBU bb8 Processing change to key: [Group] /Channel/Application/Org2MSP" +peer1.org1.example.com | [aef 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:12.339Z grpc.peer_address=172.18.0.5:41200 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=214.5µs +peer1.org2.example.com | [ad1 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | [9b3 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b8d 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.114 UTC [common.configtx] policyForItem -> DEBU bb9 Getting policy for item Org2MSP with mod_policy Admins" +peer1.org1.example.com | [af0 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [9b4 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b8e 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.114 UTC [policies] Manager -> DEBU bba Manager Channel looking up path [Application]" +peer1.org1.example.com | [af1 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org2.example.com | [ad2 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | [9b5 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b8f 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +orderer0.example.com | "2020-08-31 20:51:03.115 UTC [policies] Manager -> DEBU bbb Manager Channel has managers Orderer" +peer1.org1.example.com | [af2 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | [9b6 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org2.example.com | [b90 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.115 UTC [policies] Manager -> DEBU bbc Manager Channel has managers Application" +peer1.org1.example.com | [af3 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:41200 +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | [9b7 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b91 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.116 UTC [orderer.common.cluster.step] handleMessage -> DEBU bbd Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [af4 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.5:41200 +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | [9b8 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [b92 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.115 UTC [policies] Manager -> DEBU bbe Manager Channel/Application looking up path []" +peer1.org1.example.com | [af5 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [9b9 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [b93 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.117 UTC [policies] Manager -> DEBU bbf Manager Channel/Application has managers Org2MSP" +peer1.org2.example.com | [ad3 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [af6 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [9ba 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [b94 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:51:03.118 UTC [policies] Manager -> DEBU bc0 Manager Channel/Application has managers Org1MSP" +peer1.org2.example.com | [ad4 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [af7 08-31 20:51:10.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9bb 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [b95 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.118 UTC [policies] Manager -> DEBU bc1 Manager Channel/Application looking up path [Org2MSP]" +peer1.org2.example.com | [ad5 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [af8 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [9bc 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b96 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.119 UTC [policies] Manager -> DEBU bc2 Manager Channel/Application has managers Org2MSP" +peer1.org1.example.com | [af9 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ad6 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9bd 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [b97 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:03.120 UTC [policies] Manager -> DEBU bc3 Manager Channel/Application has managers Org1MSP" +peer1.org1.example.com | [afa 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [ad7 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9be 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b98 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:03.120 UTC [policies] Manager -> DEBU bc4 Manager Channel/Application/Org2MSP looking up path []" +peer1.org1.example.com | [afb 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ad8 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [9bf 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [b99 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:03.120 UTC [policies] Evaluate -> DEBU bc5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +peer1.org1.example.com | [afc 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ad9 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [9c0 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b9a 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:03.121 UTC [cauthdsl] func1 -> DEBU bc6 0xc0012fdee0 gate 1598907063121067700 evaluation starts" +peer1.org1.example.com | [afd 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [ada 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [9c1 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [b9b 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:03.121 UTC [cauthdsl] func2 -> DEBU bc7 0xc0012fdee0 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [afe 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [adb 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026328e0 gate 1598907070565065600 evaluation starts +peer0.org1.example.com | [9c2 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [b9c 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265e8f0 gate 1598907069320787100 evaluation starts +orderer0.example.com | "2020-08-31 20:51:03.121 UTC [cauthdsl] func2 -> DEBU bc8 0xc0012fdee0 processing identity 0 with bytes of fe10e0" +peer1.org1.example.com | [aff 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [adc 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026328e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [9c3 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b9d 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265e8f0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:03.121 UTC [cauthdsl] func2 -> DEBU bc9 0xc0012fdee0 principal matched by identity 0" +peer1.org1.example.com | [b00 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035248b0 gate 1598907070358780200 evaluation starts +peer1.org2.example.com | [add 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026328e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [9c4 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [b9e 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265e8f0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:03.122 UTC [msp.identity] Verify -> DEBU bca Verify: digest = 00000000 16 3d f8 a1 bf ae 7d e4 fb dc 40 c7 07 6d de 8d |.=....}...@..m..| +peer1.org1.example.com | [b01 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035248b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [ade 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026328e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [9c5 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [b9f 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265e8f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | 00000010 fb 6b e1 2c 0c 1e 66 98 ba 3d 47 90 dc a4 d0 63 |.k.,..f..=G....c|" +peer1.org1.example.com | [b02 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035248b0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [adf 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026328e0 principal evaluation fails +peer0.org1.example.com | [9c6 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [ba0 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265e8f0 principal evaluation fails +peer1.org1.example.com | [b03 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035248b0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:51:03.122 UTC [msp.identity] Verify -> DEBU bcb Verify: sig = 00000000 30 44 02 20 75 27 f4 6f dd 5b 2d 12 b9 82 60 1a |0D. u'.o.[-...`.| +peer1.org2.example.com | [ae0 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026328e0 gate 1598907070565065600 evaluation fails +peer0.org1.example.com | [9c7 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [ba1 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265e8f0 gate 1598907069320787100 evaluation fails +peer1.org1.example.com | [b04 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +orderer0.example.com | 00000010 88 90 67 88 50 b6 97 37 e6 93 6d 8e 20 ca 9f 40 |..g.P..7..m. ..@| +peer1.org2.example.com | [ae1 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [9c8 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 df 23 9b a5 6a 7c 85 35 b0 95 5b 13 8e 7a 41 |..#..j|.5..[..zA| +peer0.org2.example.com | [ba2 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +orderer0.example.com | 00000020 df d1 ae 7e 02 20 2b 77 8a 7e aa 5c bd fa f5 76 |...~. +w.~.\...v| +peer1.org2.example.com | [ae2 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 0a a0 14 ea e5 9e 21 72 df 90 f3 47 d1 be e1 80 |......!r...G....| +peer0.org2.example.com | [ba3 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b05 08-31 20:51:10.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd e1 d9 0e bb 91 2b 5e 04 d5 27 |0E.!.......+^..'| +orderer0.example.com | 00000030 6b bd 3d 49 6e 73 1a 12 7f 30 6c 34 57 c0 06 c4 |k.=Ins...0l4W...| +peer1.org2.example.com | [ae3 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [9c9 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 eb e4 06 cf 12 30 36 e7 e3 c8 |0E.!.......06...| +peer0.org2.example.com | [ba4 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000010 2e d0 cf 06 a1 bc 51 77 7d 21 dc 96 02 ac 84 66 |......Qw}!.....f| +orderer0.example.com | 00000040 56 0c 2b fa b4 c4 |V.+...|" +peer1.org2.example.com | [ae4 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002632e60 gate 1598907070566280900 evaluation starts +peer0.org1.example.com | 00000010 cd 9e fe 53 d2 87 a2 b3 48 46 59 da 58 96 fa 72 |...S....HFY.X..r| +peer0.org2.example.com | [ba5 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ee60 gate 1598907069324520200 evaluation starts +orderer0.example.com | "2020-08-31 20:51:03.122 UTC [cauthdsl] func2 -> DEBU bcc 0xc0012fdee0 principal evaluation succeeds for identity 0" +peer1.org1.example.com | 00000020 32 18 d9 2e 70 02 20 6c cc 98 ed 31 f1 fd 5b 55 |2...p. l...1..[U| +peer1.org2.example.com | [ae5 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002632e60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000020 0c 73 41 95 3b 02 20 18 4e 90 1b c7 45 0a 2b ed |.sA.;. .N...E.+.| +peer0.org2.example.com | [ba6 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ee60 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:03.122 UTC [cauthdsl] func1 -> DEBU bcd 0xc0012fdee0 gate 1598907063121067700 evaluation succeeds" +peer1.org1.example.com | 00000030 e6 25 6b 6f fb d2 24 2f 1e 3d a2 fc a5 bc e6 27 |.%ko..$/.=.....'| +peer1.org2.example.com | [ae6 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002632e60 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000030 4b 34 be 3e a1 98 c0 27 db 05 24 4f e4 2e a9 a5 |K4.>...'..$O....| +peer0.org2.example.com | [ba7 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ee60 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:03.123 UTC [policies] Evaluate -> DEBU bce Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +peer1.org1.example.com | 00000040 d5 96 51 b9 b7 36 43 |..Q..6C| +peer1.org2.example.com | [ae7 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002632e60 principal matched by identity 0 +peer0.org1.example.com | 00000040 76 f5 9c 26 b5 d7 2e |v..&...| +peer0.org2.example.com | [ba8 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ee60 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:51:03.123 UTC [policies] Evaluate -> DEBU bcf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +peer1.org1.example.com | [b06 08-31 20:51:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035248b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [ae8 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | [9ca 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [ba9 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 6a b4 86 66 e3 dd f1 1d 07 16 02 fe cc e3 e9 |Wj..f...........| +orderer0.example.com | "2020-08-31 20:51:03.123 UTC [common.configtx] verifyDeltaSet -> DEBU bd0 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer1.org1.example.com | [b07 08-31 20:51:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035248b0 gate 1598907070358780200 evaluation succeeds +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | 00000010 18 8b 7e 5d 68 d0 13 49 fd 21 b3 e5 aa ca 4f 08 |..~]h..I.!....O.| +orderer0.example.com | "2020-08-31 20:51:03.124 UTC [common.configtx] recurseConfigMap -> DEBU bd1 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer1.org1.example.com | [b08 08-31 20:51:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [ae9 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | [9cb 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 f8 ac 8f c9 98 55 fd 74 cd fa |0E.!.......U.t..| +peer0.org2.example.com | [baa 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 92 7d f2 a4 f9 89 e7 88 b7 2c 69 |0D. ..}.......,i| +orderer0.example.com | "2020-08-31 20:51:03.124 UTC [common.configtx] recurseConfigMap -> DEBU bd2 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer1.org1.example.com | [b09 08-31 20:51:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000010 92 df fd aa df 51 c7 bf 91 b1 9e 17 91 52 40 93 |.....Q.......R@.| +peer0.org2.example.com | 00000010 6e b8 79 6d 59 07 0a 7f 8f e3 34 86 c7 7f 4e e2 |n.ymY.....4...N.| +orderer0.example.com | "2020-08-31 20:51:03.124 UTC [common.configtx] recurseConfigMap -> DEBU bd3 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer1.org1.example.com | [b0a 08-31 20:51:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000020 37 af b2 31 a2 02 20 52 a4 db 2a a7 fe 07 39 1a |7..1.. R..*...9.| +peer0.org2.example.com | 00000020 51 3f cb d5 02 20 43 20 38 fe 37 27 3f 36 a7 91 |Q?... C 8.7'?6..| +orderer0.example.com | "2020-08-31 20:51:03.125 UTC [common.configtx] recurseConfigMap -> DEBU bd4 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer1.org1.example.com | [b0b 08-31 20:51:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000030 d7 93 67 7f 77 2d b5 6f 16 d5 4e 3f d1 62 25 60 |..g.w-.o..N?.b%`| +peer0.org2.example.com | 00000030 a7 12 05 38 8c e3 f9 76 39 bb 31 a6 6b 37 03 bc |...8...v9.1.k7..| +orderer0.example.com | "2020-08-31 20:51:03.125 UTC [common.configtx] recurseConfigMap -> DEBU bd5 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer1.org1.example.com | [b0c 08-31 20:51:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:41200 +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | 00000040 a5 0e 1b 91 5a dc ee |....Z..| +peer0.org2.example.com | 00000040 b9 60 49 bc 66 f3 |.`I.f.| +orderer0.example.com | "2020-08-31 20:51:03.126 UTC [common.configtx] recurseConfigMap -> DEBU bd6 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer1.org1.example.com | [b0d 08-31 20:51:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:41200 +peer1.org2.example.com | [aea 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002632e60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [bab 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ee60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [9cc 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.126 UTC [common.configtx] recurseConfigMap -> DEBU bd7 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer1.org1.example.com | [b0e 08-31 20:51:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [aeb 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002632e60 gate 1598907070566280900 evaluation succeeds +peer0.org2.example.com | [bac 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ee60 gate 1598907069324520200 evaluation succeeds +peer0.org1.example.com | [9cd 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.126 UTC [common.configtx] recurseConfigMap -> DEBU bd8 Setting policy for key Readers to " +peer1.org1.example.com | [b0f 08-31 20:51:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [aec 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [bad 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [9ce 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.127 UTC [common.configtx] recurseConfigMap -> DEBU bd9 Setting policy for key Writers to " +peer1.org1.example.com | [b10 08-31 20:51:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [aed 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [bae 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [9cf 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.127 UTC [common.configtx] recurseConfigMap -> DEBU bda Setting policy for key Admins to " +peer1.org1.example.com | [b11 08-31 20:51:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [aee 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [baf 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [9d0 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.128 UTC [common.configtx] recurseConfigMap -> DEBU bdb Setting policy for key Writers to policy: mod_policy:"Admins" " +peer1.org1.example.com | [b12 08-31 20:51:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 91 20 92 8e 48 a6 b6 19 57 df 95 3d 88 3d e5 |h. ..H...W..=.=.| +peer1.org2.example.com | [aef 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [bb0 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [9d1 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.128 UTC [common.configtx] recurseConfigMap -> DEBU bdc Setting policy for key Admins to policy: mod_policy:"Admins" " +peer1.org1.example.com | 00000010 66 b4 0b 81 d5 85 0b e6 77 2d 0e b6 d4 68 63 44 |f.......w-...hcD| +peer1.org2.example.com | [af0 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | [bb1 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [9d2 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.128 UTC [common.configtx] recurseConfigMap -> DEBU bdd Setting policy for key Readers to policy: mod_policy:"Admins" " +peer1.org1.example.com | [b13 08-31 20:51:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 c6 d4 3b 78 e3 47 4a 19 13 74 |0E.!....;x.GJ..t| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [bb2 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [9d3 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.128 UTC [common.configtx] recurseConfigMap -> DEBU bde Setting policy for key Writers to policy: mod_policy:"Admins" " +peer1.org1.example.com | 00000010 dd fe ae e6 cb b5 19 c9 92 3e e4 18 a0 b7 e7 5d |.........>.....]| +peer1.org2.example.com | [af1 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | [bb3 08-31 20:51:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [9d4 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | "2020-08-31 20:51:03.129 UTC [common.configtx] recurseConfigMap -> DEBU bdf Setting policy for key Admins to policy: mod_policy:"Admins" " +peer1.org1.example.com | 00000020 5d 0f 89 3e 4f 02 20 51 46 80 04 71 34 63 ef 88 |]..>O. QF..q4c..| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | [bb4 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [9d5 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.129 UTC [common.configtx] recurseConfigMap -> DEBU be0 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +peer1.org1.example.com | 00000030 94 e4 49 d8 a3 f7 16 c1 4d 18 80 30 f4 8e f8 ef |..I.....M..0....| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | [bb5 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [9d6 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.129 UTC [common.configtx] recurseConfigMap -> DEBU be1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer1.org1.example.com | 00000040 3e da 85 85 b9 2a 3a |>....*:| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | [bb6 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9d7 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:03.130 UTC [common.configtx] recurseConfigMap -> DEBU be2 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer1.org1.example.com | [b14 08-31 20:51:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [bb7 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9d8 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:03.130 UTC [common.configtx] recurseConfigMap -> DEBU be3 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer1.org1.example.com | [b15 08-31 20:51:10.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [af2 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bb8 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [9d9 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:03.130 UTC [common.configtx] recurseConfigMap -> DEBU be4 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer1.org1.example.com | [b16 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [af3 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org2.example.com | [bb9 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9da 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:03.130 UTC [common.configtx] recurseConfigMap -> DEBU be5 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer1.org1.example.com | [b17 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [af4 08-31 20:51:10.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bba 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9db 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:03.131 UTC [common.channelconfig] NewStandardValues -> DEBU be6 Initializing protos for *channelconfig.ChannelProtos" +peer1.org1.example.com | [b18 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [af5 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bbb 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9dc 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567440 gate 1598907065607909700 evaluation starts +orderer0.example.com | "2020-08-31 20:51:03.131 UTC [common.channelconfig] initializeProtosStruct -> DEBU be7 Processing field: HashingAlgorithm" +peer1.org1.example.com | [b19 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [af6 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9dd 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567440 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [bbc 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:03.131 UTC [common.channelconfig] initializeProtosStruct -> DEBU be8 Processing field: BlockDataHashingStructure" +peer1.org1.example.com | [b1a 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [af7 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [9de 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567440 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [bbd 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." > alive: alive: +orderer0.example.com | "2020-08-31 20:51:03.131 UTC [common.channelconfig] initializeProtosStruct -> DEBU be9 Processing field: OrdererAddresses" +peer1.org1.example.com | [b1b 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [af8 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9df 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567440 principal matched by identity 0 +peer0.org2.example.com | [bbe 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.132 UTC [common.channelconfig] initializeProtosStruct -> DEBU bea Processing field: Consortium" +peer1.org1.example.com | [b1c 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [af9 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9e0 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb 77 49 82 df 02 61 02 72 88 8e 81 72 83 a8 26 |.wI...a.r...r..&| +peer0.org2.example.com | [bbf 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.132 UTC [common.channelconfig] initializeProtosStruct -> DEBU beb Processing field: Capabilities" +peer1.org1.example.com | [b1d 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [afa 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 40 55 f1 dd 5b cd 7a 30 06 81 f2 4a 19 ab 60 fe |@U..[.z0...J..`.| +peer0.org2.example.com | [bc0 08-31 20:51:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.132 UTC [common.channelconfig] NewStandardValues -> DEBU bec Initializing protos for *channelconfig.OrdererProtos" +peer1.org2.example.com | [afb 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [b1e 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [9e1 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 d6 75 03 22 db e7 7f b6 0c 45 57 |0D. h.u.".....EW| +peer0.org2.example.com | [bc1 08-31 20:51:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +orderer0.example.com | "2020-08-31 20:51:03.132 UTC [common.channelconfig] initializeProtosStruct -> DEBU bed Processing field: ConsensusType" +peer1.org2.example.com | [afc 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [b1f 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 33 14 47 82 79 65 68 d2 2d 67 7a c0 03 2c cf f9 |3.G.yeh.-gz..,..| +peer0.org2.example.com | [bc2 08-31 20:51:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:03.132 UTC [common.channelconfig] initializeProtosStruct -> DEBU bee Processing field: BatchSize" +peer1.org2.example.com | [afd 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264a9a0 gate 1598907070571279200 evaluation starts +peer1.org1.example.com | [b20 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000020 87 c1 0e af 02 20 0e 51 64 e0 1e 68 06 33 78 3b |..... .Qd..h.3x;| +peer0.org2.example.com | [bc3 08-31 20:51:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +orderer0.example.com | "2020-08-31 20:51:03.133 UTC [common.channelconfig] initializeProtosStruct -> DEBU bef Processing field: BatchTimeout" +peer1.org2.example.com | [afe 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264a9a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [b21 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000030 21 c8 9b ec 7d 38 1e 6b a0 93 0a d6 49 6a 20 a0 |!...}8.k....Ij .| +peer0.org2.example.com | [bc4 08-31 20:51:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:03.133 UTC [common.channelconfig] initializeProtosStruct -> DEBU bf0 Processing field: KafkaBrokers" +peer1.org2.example.com | [aff 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264a9a0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [b22 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035469c0 gate 1598907070497777000 evaluation starts +peer0.org1.example.com | 00000040 2c 5f 3d cf 1d 39 |,_=..9| +peer0.org2.example.com | [bc5 08-31 20:51:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +orderer0.example.com | "2020-08-31 20:51:03.133 UTC [common.channelconfig] initializeProtosStruct -> DEBU bf1 Processing field: ChannelRestrictions" +peer1.org2.example.com | [b00 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264a9a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [b23 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035469c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [9e2 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567440 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [bc6 08-31 20:51:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:03.134 UTC [common.channelconfig] initializeProtosStruct -> DEBU bf2 Processing field: Capabilities" +peer1.org2.example.com | [b01 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264a9a0 principal evaluation fails +peer1.org1.example.com | [b24 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035469c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [9e3 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567440 gate 1598907065607909700 evaluation succeeds +peer0.org2.example.com | [bc7 08-31 20:51:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.134 UTC [common.channelconfig] NewStandardValues -> DEBU bf3 Initializing protos for *channelconfig.OrdererOrgProtos" +peer1.org2.example.com | [b02 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264a9a0 gate 1598907070571279200 evaluation fails +peer1.org1.example.com | [b25 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035469c0 principal matched by identity 0 +peer0.org1.example.com | [9e4 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [bc8 08-31 20:51:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.134 UTC [common.channelconfig] initializeProtosStruct -> DEBU bf4 Processing field: Endpoints" +peer1.org2.example.com | [b03 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b26 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 95 5e 83 6c 57 7a f0 82 e6 4d 59 21 74 46 ca |..^.lWz...MY!tF.| +peer0.org1.example.com | [9e5 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [bc9 08-31 20:51:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.134 UTC [common.channelconfig] NewStandardValues -> DEBU bf5 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org2.example.com | [b04 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 85 f7 1a 34 5a 8f 38 60 46 51 d8 a4 fe 6a 94 35 |...4Z.8`FQ...j.5| +peer0.org1.example.com | [9e6 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [bca 08-31 20:51:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.134 UTC [common.channelconfig] initializeProtosStruct -> DEBU bf6 Processing field: MSP" +peer1.org2.example.com | [b05 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [b27 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 8c 8c 80 ad 9c 55 38 8c a4 b4 |0E.!.......U8...| +peer0.org1.example.com | [9e7 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [bcb 08-31 20:51:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.134 UTC [common.channelconfig] validateMSP -> DEBU bf7 Setting up MSP for org OrdererOrg" +peer1.org2.example.com | [b06 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264af10 gate 1598907070572369700 evaluation starts +peer1.org1.example.com | 00000010 fd db 68 47 c5 5c a3 3a 2e 03 08 73 79 90 ff 63 |..hG.\.:...sy..c| +peer0.org1.example.com | [9e8 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [bcc 08-31 20:51:09.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.134 UTC [msp] newBccspMsp -> DEBU bf8 Creating BCCSP-based MSP instance" +peer1.org2.example.com | [b07 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264af10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 37 58 62 04 e5 02 20 45 70 6e 12 cc a2 f7 ae 91 |7Xb... Epn......| +peer0.org2.example.com | [bcd 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [9e9 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-08-31 20:51:03.134 UTC [msp] New -> DEBU bf9 Creating Cache-MSP instance" +peer1.org2.example.com | [b08 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264af10 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000030 c4 e6 b4 9d b4 c8 5d 1a 07 90 5f fd 72 2d 3b d9 |......]..._.r-;.| +peer0.org2.example.com | [bce 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [9ea 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:51:03.134 UTC [msp] Setup -> DEBU bfa Setting up MSP instance OrdererMSP" +peer1.org2.example.com | [b09 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264af10 principal matched by identity 0 +peer1.org1.example.com | 00000040 db 49 3c 1c c6 f5 d4 |.I<....| +peer0.org2.example.com | [bcf 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9eb 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [b0a 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | "2020-08-31 20:51:03.135 UTC [msp.identity] newIdentity -> DEBU bfb Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [b28 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [bd0 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +peer0.org1.example.com | [9ec 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | [b29 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [bd1 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +peer0.org1.example.com | [9ed 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b0b 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [b2a 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035469c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [bd2 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9ee 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | [b2b 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035469c0 gate 1598907070497777000 evaluation succeeds +peer0.org2.example.com | [bd3 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [9ef 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org1.example.com | [b2c 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [bd4 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [9f0 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 df 23 9b a5 6a 7c 85 35 b0 95 5b 13 8e 7a 41 |..#..j|.5..[..zA| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | [b2d 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [bd5 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 0a a0 14 ea e5 9e 21 72 df 90 f3 47 d1 be e1 80 |......!r...G....| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | [b2e 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [bd6 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [9f1 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 eb e4 06 cf 12 30 36 e7 e3 c8 |0E.!.......06...| +peer1.org2.example.com | [b0c 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264af10 principal evaluation succeeds for identity 0 +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org1.example.com | [b2f 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [bd7 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161015 +peer0.org1.example.com | 00000010 cd 9e fe 53 d2 87 a2 b3 48 46 59 da 58 96 fa 72 |...S....HFY.X..r| +peer1.org2.example.com | [b0d 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00264af10 gate 1598907070572369700 evaluation succeeds +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org1.example.com | [b30 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [bd8 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 49A764A1592F08EF19DA91379AB54998156300AB9C13833660DC576DDF311B11 +peer0.org1.example.com | 00000020 0c 73 41 95 3b 02 20 18 4e 90 1b c7 45 0a 2b ed |.sA.;. .N...E.+.| +peer1.org2.example.com | [b0e 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | [b31 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [bd9 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000030 4b 34 be 3e a1 98 c0 27 db 05 24 4f e4 2e a9 a5 |K4.>...'..$O....| +peer1.org2.example.com | [b0f 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org1.example.com | [b32 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [bda 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | 00000040 76 f5 9c 26 b5 d7 2e |v..&...| +peer1.org2.example.com | [b10 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org1.example.com | [b33 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [bdb 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | [9f2 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [b11 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org1.example.com | [b34 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [bdc 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9f3 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [b12 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b13 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | nw== +peer0.org2.example.com | [bdd 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [9f4 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b14 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | [b35 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bde 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [9f5 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [b15 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:03.135 UTC [common.channelconfig] NewStandardValues -> DEBU bfc Initializing protos for *channelconfig.ApplicationProtos" +peer1.org1.example.com | [b36 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bdf 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [9f6 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b16 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [b17 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:03.135 UTC [common.channelconfig] initializeProtosStruct -> DEBU bfd Processing field: ACLs" +peer0.org2.example.com | [be0 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [9f7 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [b18 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:03.135 UTC [common.channelconfig] initializeProtosStruct -> DEBU bfe Processing field: Capabilities" +peer1.org1.example.com | [b37 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [be1 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [9f8 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:03.135 UTC [common.channelconfig] NewStandardValues -> DEBU bff Initializing protos for *channelconfig.ApplicationOrgProtos" +peer1.org1.example.com | [b38 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [be2 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9f9 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [b19 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:03.135 UTC [common.channelconfig] initializeProtosStruct -> DEBU c00 Processing field: AnchorPeers" +peer1.org1.example.com | [b39 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [be3 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [9fa 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [b1a 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002660140 gate 1598907070575319600 evaluation starts +orderer0.example.com | "2020-08-31 20:51:03.135 UTC [common.channelconfig] NewStandardValues -> DEBU c01 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org1.example.com | [b3a 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [be4 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9fb 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:03.135 UTC [common.channelconfig] initializeProtosStruct -> DEBU c02 Processing field: MSP" +peer1.org2.example.com | [b1b 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002660140 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [b3b 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [be5 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [9fc 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:03.135 UTC [common.channelconfig] Validate -> DEBU c03 Anchor peers for org Org2MSP are anchor_peers: " +peer1.org2.example.com | [b1c 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002660140 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [b3c 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [be6 08-31 20:51:09.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9fd 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357f420 gate 1598907065612609800 evaluation starts +orderer0.example.com | "2020-08-31 20:51:03.135 UTC [common.channelconfig] validateMSP -> DEBU c04 Setting up MSP for org Org2MSP" +peer1.org2.example.com | [b1d 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002660140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [b3d 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [be7 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer0.org1.example.com | [9fe 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357f420 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:03.135 UTC [msp] newBccspMsp -> DEBU c05 Creating BCCSP-based MSP instance" +peer1.org2.example.com | [b1e 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002660140 principal evaluation fails +peer1.org2.example.com | [b1f 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002660140 gate 1598907070575319600 evaluation fails +peer1.org1.example.com | [b3e 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [9ff 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357f420 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:03.135 UTC [msp] New -> DEBU c06 Creating Cache-MSP instance" +peer1.org2.example.com | [b20 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b3f 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [be8 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a00 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357f420 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:51:03.135 UTC [msp] Setup -> DEBU c07 Setting up MSP instance Org2MSP" +peer1.org2.example.com | [b21 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b40 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [be9 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +peer0.org1.example.com | [a01 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 4a 50 23 f4 a4 67 b4 77 df a4 65 44 c6 86 39 |.JP#..g.w..eD..9| +orderer0.example.com | "2020-08-31 20:51:03.136 UTC [msp.identity] newIdentity -> DEBU c08 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [b22 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [b41 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [bea 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | 00000010 ea b6 02 bb 01 eb 36 db 28 b6 f5 50 97 0c 24 2c |......6.(..P..$,| +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [b23 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026606b0 gate 1598907070576115300 evaluation starts +peer1.org1.example.com | [b42 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [beb 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 a7 64 a1 59 2f 08 ef 19 da 91 37 9a b5 49 98 |I.d.Y/.....7..I.| +peer0.org1.example.com | [a02 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 9c 95 07 1a 92 05 94 f0 47 65 |0E.!..........Ge| +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [b24 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026606b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [b43 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 15 63 00 ab 9c 13 83 36 60 dc 57 6d df 31 1b 11 |.c.....6`.Wm.1..| +peer0.org1.example.com | 00000010 bf 57 61 8d 3d b2 1a b1 d0 f5 8a ef 70 af b6 dd |.Wa.=.......p...| +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [b25 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026606b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [bec 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 9d 53 bd aa 48 cc 88 5a 1c 15 |0E.!...S..H..Z..| +peer1.org1.example.com | [b44 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 fb d8 32 88 2c 02 20 01 fe 05 2b 66 a8 e3 37 d0 |..2.,. ...+f..7.| +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | [b26 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026606b0 principal matched by identity 0 +peer0.org2.example.com | 00000010 83 dc d6 95 46 d4 65 0b a5 5b 92 6e 2f 70 c0 8b |....F.e..[.n/p..| +peer1.org1.example.com | [b45 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 30 6c a1 fe 90 89 ae 1b d8 1d 8a 05 14 31 e9 fe |0l...........1..| +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [b27 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000020 d8 0a 17 fe c0 02 20 14 9a 17 05 81 a7 93 ce c9 |...... .........| +peer1.org1.example.com | [b46 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 01 fe fa 78 82 10 d2 |...x...| +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | 00000030 0b 18 48 d1 e0 56 16 62 4c e8 73 fd c9 21 7a 62 |..H..V.bL.s..!zb| +peer1.org1.example.com | [b47 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a03 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357f420 principal evaluation succeeds for identity 0 +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | [b28 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000040 ee d4 2f 0e c1 8b 64 |../...d| +peer1.org1.example.com | [b48 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [a04 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357f420 gate 1598907065612609800 evaluation succeeds +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | [bed 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org1.example.com | [b49 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a05 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org1.example.com | [a06 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [bee 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0c da 10 87 7e 21 8e 67 00 a1 83 43 |0D. ....~!.g...C| +peer1.org1.example.com | [b4a 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a07 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | [b29 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026606b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 3f 33 e4 e0 14 0a b2 a0 eb 46 fa f3 48 a4 8c 8d |?3.......F..H...| +peer1.org1.example.com | [b4b 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a08 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | [b2a 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026606b0 gate 1598907070576115300 evaluation succeeds +peer0.org2.example.com | 00000020 0c 8a 57 18 02 20 48 a3 15 84 94 03 43 ae 90 1e |..W.. H.....C...| +peer1.org1.example.com | [b4c 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a09 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org2.example.com | [b2b 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [b4d 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 6e 21 89 69 db c0 6d 2d 2a 7f 18 cb 34 7c 86 c5 |n!.i..m-*...4|..| +peer0.org1.example.com | [a0a 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org2.example.com | [b2c 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [b4e 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000040 68 01 a3 72 e3 0e |h..r..| +peer0.org1.example.com | [a0b 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:51:03.136 UTC [common.channelconfig] NewStandardValues -> DEBU c09 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer1.org2.example.com | [b2d 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [b4f 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [bef 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [a0c 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:51:03.136 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0a Processing field: AnchorPeers" +peer1.org2.example.com | [b2e 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [b50 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 ba fe 89 f0 27 88 7e 5b 8e 76 2a 4d cd 4f cc |.....'.~[.v*M.O.| +peer0.org2.example.com | [bf0 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [a0d 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:51:03.136 UTC [common.channelconfig] NewStandardValues -> DEBU c0b Initializing protos for *channelconfig.OrganizationProtos" +peer1.org2.example.com | [b2f 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 8e d6 a9 e0 d0 f1 57 37 f2 b5 e0 8a ee 5d 9b c6 |......W7.....]..| +peer0.org2.example.com | [bf1 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a0e 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.136 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0c Processing field: MSP" +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [b51 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 a4 7b e4 45 26 8f b5 53 67 4c |0E.!...{.E&..SgL| +peer0.org2.example.com | [bf2 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a0f 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a10 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.136 UTC [common.channelconfig] Validate -> DEBU c0d Anchor peers for org Org1MSP are anchor_peers: " +peer1.org1.example.com | 00000010 1d e7 5a cf 96 99 3c fc 4f 9b 20 c2 03 a3 7a 89 |..Z...<.O. ...z.| +peer0.org2.example.com | [bf3 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org1.example.com | [a11 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.136 UTC [common.channelconfig] validateMSP -> DEBU c0e Setting up MSP for org Org1MSP" +peer1.org2.example.com | [b30 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000020 41 b4 ac bd 0b 02 20 17 16 91 ec a1 6b 6a 6f 6d |A..... .....kjom| +peer0.org2.example.com | [bf4 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a12 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.137 UTC [msp] newBccspMsp -> DEBU c0f Creating BCCSP-based MSP instance" +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000030 65 2b 94 d2 57 18 1f 63 71 85 e2 e8 1d 27 41 45 |e+..W..cq....'AE| +peer0.org2.example.com | [bf5 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +peer0.org1.example.com | [a13 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.137 UTC [msp] New -> DEBU c10 Creating Cache-MSP instance" +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000040 1e 20 df d1 39 b1 82 |. ..9..| +peer0.org2.example.com | [bf6 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [a14 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.137 UTC [msp] Setup -> DEBU c11 Setting up MSP instance Org1MSP" +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | [b52 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [bf7 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 a7 64 a1 59 2f 08 ef 19 da 91 37 9a b5 49 98 |I.d.Y/.....7..I.| +peer0.org1.example.com | [a15 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:51:03.137 UTC [msp.identity] newIdentity -> DEBU c12 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [b53 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | 00000010 15 63 00 ab 9c 13 83 36 60 dc 57 6d df 31 1b 11 |.c.....6`.Wm.1..| +peer0.org1.example.com | [a16 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 a1 6e 8e 0a 84 2f 6e 0b 58 2e 74 48 a3 1d a5 |..n.../n.X.tH...| +peer1.org2.example.com | [b31 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b54 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [bf8 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 9d 53 bd aa 48 cc 88 5a 1c 15 |0E.!...S..H..Z..| +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [b32 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [b33 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 83 dc d6 95 46 d4 65 0b a5 5b 92 6e 2f 70 c0 8b |....F.e..[.n/p..| +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | 00000010 c9 42 d4 63 e9 67 22 a5 66 e9 2f cf e9 bd fb e6 |.B.c.g".f./.....| +peer1.org1.example.com | [b55 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000020 d8 0a 17 fe c0 02 20 14 9a 17 05 81 a7 93 ce c9 |...... .........| +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [a17 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e e3 2c 3b ae 3d 43 bb 64 bb 66 cb |0D. ..,;.=C.d.f.| +peer1.org2.example.com | [b34 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b56 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | 00000030 0b 18 48 d1 e0 56 16 62 4c e8 73 fd c9 21 7a 62 |..H..V.bL.s..!zb| +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | 00000010 3d 4c 23 e1 e0 3c 37 ee 10 9b 88 eb e7 d3 0a e0 |=L#..<7.........| +peer1.org2.example.com | [b35 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [b57 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 ee d4 2f 0e c1 8b 64 |../...d| +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | 00000020 30 99 40 64 02 20 26 89 16 12 13 cf 5f bc f4 b3 |0.@d. &....._...| +peer1.org2.example.com | [b36 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [b58 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bf9 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | 00000030 dd 90 3b 09 8c 38 a2 16 ad 94 f3 ef 32 3f be e4 |..;..8......2?..| +peer1.org2.example.com | [b37 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [b59 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [bfa 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | 00000040 96 81 f6 d1 25 38 |....%8| +peer1.org2.example.com | [b38 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b5a 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [bfb 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org1.example.com | [a18 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [b5b 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b39 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [bfc 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org1.example.com | [a19 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a1a 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [a1b 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | [b5c 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [a1c 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [b3a 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [bfd 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | [b5d 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [b3b 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [a1d 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [bfe 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | [b5e 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b3c 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [a1e 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [bff 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | [b5f 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [b3d 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [a1f 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [c00 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:03.137 UTC [msp] Setup -> DEBU c13 Setting up the MSP manager (3 msps)" +peer1.org1.example.com | [b60 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [b3e 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [a20 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [c01 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:03.137 UTC [msp] Setup -> DEBU c14 MSP manager setup complete, setup 3 msps" +peer1.org1.example.com | [b61 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b3f 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002593b50 gate 1598907070580252200 evaluation starts +peer0.org1.example.com | [a21 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [c02 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c15 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer1.org1.example.com | [b62 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [b40 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002593b50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [a22 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a3760 gate 1598907065617137200 evaluation starts +peer0.org2.example.com | [c03 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c16 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer1.org1.example.com | [b63 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b41 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002593b50 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [a23 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a3760 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [c04 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026c9a50 gate 1598907069474970600 evaluation starts +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c17 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [b42 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002593b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [b64 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a24 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a3760 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [c05 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026c9a50 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c18 Proposed new policy Admins for Channel/Orderer" +peer1.org2.example.com | [b43 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002593b50 principal evaluation fails +peer1.org1.example.com | [b65 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a25 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a3760 principal matched by identity 0 +peer0.org2.example.com | [c06 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026c9a50 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c19 Proposed new policy BlockValidation for Channel/Orderer" +peer1.org2.example.com | [b44 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002593b50 gate 1598907070580252200 evaluation fails +peer1.org1.example.com | [b66 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a26 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a e1 70 71 3b f2 e3 7b ae 26 bb 0f ce 2d 39 5e |*.pq;..{.&...-9^| +peer0.org2.example.com | [c07 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026c9a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c1a Proposed new policy Readers for Channel/Orderer" +peer1.org2.example.com | [b45 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b67 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 b2 00 38 e7 0d 72 78 85 56 85 19 ef 28 92 45 8f |..8..rx.V...(.E.| +peer0.org2.example.com | [c08 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026c9a50 principal evaluation fails +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c1b Proposed new policy Writers for Channel/Orderer" +peer1.org2.example.com | [b46 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [b68 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [a27 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 2c 3e 0a e0 90 3a 51 ac bd 2d 37 |0D. ),>...:Q..-7| +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c1c Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org2.example.com | [c09 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026c9a50 gate 1598907069474970600 evaluation fails +peer1.org2.example.com | [b47 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [b69 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 51 51 63 5e a9 c7 21 b4 8c 5c 15 e6 5c 0a e9 c4 |QQc^..!..\..\...| +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c1d Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org2.example.com | [c0a 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [b48 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266a110 gate 1598907070581248300 evaluation starts +peer1.org1.example.com | [b6a 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 3a e3 ab d7 02 20 11 c8 69 9d 5f 3f 44 93 f8 28 |:.... ..i._?D..(| +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c1e Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org2.example.com | [c0b 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [b49 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266a110 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [b6b 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 3e 55 15 7a 3e 08 81 e6 67 d7 4e b6 7f 5b a7 50 |>U.z>...g.N..[.P| +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c1f Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org2.example.com | [c0c 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [b4a 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266a110 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [b6c 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 8a 5a b2 55 4a bd |.Z.UJ.| +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c20 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org2.example.com | [c0d 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026c9fc0 gate 1598907069475762000 evaluation starts +peer1.org2.example.com | [b4b 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266a110 principal matched by identity 0 +peer1.org1.example.com | [b6d 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a28 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a3760 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c21 Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org2.example.com | [c0e 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026c9fc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [b4c 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 ba fe 89 f0 27 88 7e 5b 8e 76 2a 4d cd 4f cc |.....'.~[.v*M.O.| +peer1.org1.example.com | [b6e 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a29 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a3760 gate 1598907065617137200 evaluation succeeds +peer0.org2.example.com | [c0f 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026c9fc0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] GetPolicy -> DEBU c22 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer1.org2.example.com | 00000010 8e d6 a9 e0 d0 f1 57 37 f2 b5 e0 8a ee 5d 9b c6 |......W7.....]..| +peer1.org1.example.com | [b6f 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a2a 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [c10 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026c9fc0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] GetPolicy -> DEBU c23 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +peer1.org2.example.com | [b4d 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 a4 7b e4 45 26 8f b5 53 67 4c |0E.!...{.E&..SgL| +peer1.org1.example.com | [b70 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [a2b 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [c11 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 df 23 9b a5 6a 7c 85 35 b0 95 5b 13 8e 7a 41 |..#..j|.5..[..zA| +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c24 Proposed new policy LifecycleEndorsement for Channel/Application" +peer1.org2.example.com | 00000010 1d e7 5a cf 96 99 3c fc 4f 9b 20 c2 03 a3 7a 89 |..Z...<.O. ...z.| +peer1.org1.example.com | [b71 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a2c 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 0a a0 14 ea e5 9e 21 72 df 90 f3 47 d1 be e1 80 |......!r...G....| +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] GetPolicy -> DEBU c25 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer1.org2.example.com | 00000020 41 b4 ac bd 0b 02 20 17 16 91 ec a1 6b 6a 6f 6d |A..... .....kjom| +peer1.org1.example.com | [b72 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [a2d 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [c12 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 eb e4 06 cf 12 30 36 e7 e3 c8 |0E.!.......06...| +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] GetPolicy -> DEBU c26 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +peer1.org2.example.com | 00000030 65 2b 94 d2 57 18 1f 63 71 85 e2 e8 1d 27 41 45 |e+..W..cq....'AE| +peer1.org1.example.com | [b73 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a2e 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 cd 9e fe 53 d2 87 a2 b3 48 46 59 da 58 96 fa 72 |...S....HFY.X..r| +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c27 Proposed new policy Endorsement for Channel/Application" +peer1.org2.example.com | 00000040 1e 20 df d1 39 b1 82 |. ..9..| +peer1.org1.example.com | [b74 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [a2f 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | 00000020 0c 73 41 95 3b 02 20 18 4e 90 1b c7 45 0a 2b ed |.sA.;. .N...E.+.| +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c28 Proposed new policy Readers for Channel/Application" +peer1.org2.example.com | [b4e 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266a110 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [b75 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [a30 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000030 4b 34 be 3e a1 98 c0 27 db 05 24 4f e4 2e a9 a5 |K4.>...'..$O....| +orderer0.example.com | "2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c29 Proposed new policy Writers for Channel/Application" +peer1.org2.example.com | [b4f 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266a110 gate 1598907070581248300 evaluation succeeds +peer1.org1.example.com | [b76 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a31 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000040 76 f5 9c 26 b5 d7 2e |v..&...| +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [policies] NewManagerImpl -> DEBU c2a Proposed new policy Admins for Channel/Application" +peer1.org2.example.com | [b50 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [b77 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [a32 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [c13 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026c9fc0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [policies] NewManagerImpl -> DEBU c2b Proposed new policy Readers for Channel" +peer1.org2.example.com | [b51 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [b78 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [a33 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c14 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026c9fc0 gate 1598907069475762000 evaluation succeeds +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [policies] NewManagerImpl -> DEBU c2c Proposed new policy Writers for Channel" +peer1.org2.example.com | [b52 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [b79 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [a34 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c15 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [policies] NewManagerImpl -> DEBU c2d Proposed new policy Admins for Channel" +peer1.org2.example.com | [b53 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [b7a 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [a35 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [c16 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c2e Adding to config map: [Group] /Channel" +peer1.org2.example.com | [b54 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [b7b 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [a36 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 df 23 9b a5 6a 7c 85 35 b0 95 5b 13 8e 7a 41 |..#..j|.5..[..zA| +peer0.org2.example.com | [c17 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c2f Adding to config map: [Group] /Channel/Orderer" +peer1.org2.example.com | [b55 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [b7c 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 0a a0 14 ea e5 9e 21 72 df 90 f3 47 d1 be e1 80 |......!r...G....| +peer0.org2.example.com | [c18 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c30 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [b56 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [b7d 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e640 gate 1598907073038915400 evaluation starts +peer0.org1.example.com | [a37 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 eb e4 06 cf 12 30 36 e7 e3 c8 |0E.!.......06...| +peer0.org2.example.com | [c19 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c31 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer1.org2.example.com | [b57 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [b7e 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e640 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 cd 9e fe 53 d2 87 a2 b3 48 46 59 da 58 96 fa 72 |...S....HFY.X..r| +peer0.org2.example.com | [c1a 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c32 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer1.org2.example.com | [b58 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [b7f 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e640 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000020 0c 73 41 95 3b 02 20 18 4e 90 1b c7 45 0a 2b ed |.sA.;. .N...E.+.| +peer0.org2.example.com | [c1b 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c33 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer1.org2.example.com | [b59 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b80 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e640 principal matched by identity 0 +peer0.org1.example.com | 00000030 4b 34 be 3e a1 98 c0 27 db 05 24 4f e4 2e a9 a5 |K4.>...'..$O....| +peer0.org2.example.com | [c1c 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c34 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [b5a 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 76 f5 9c 26 b5 d7 2e |v..&...| +peer1.org1.example.com | [b81 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 62 52 2f a0 7a a2 5f f5 b0 4e 19 86 d1 11 1b |.bR/.z._..N.....| +peer0.org2.example.com | [c1d 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c35 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer1.org2.example.com | [b5b 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a38 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 46 16 b9 bb 1a 0a 30 86 a8 1a 6d fd a4 fd 6c 81 |F.....0...m...l.| +peer0.org2.example.com | [c1e 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c36 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer1.org2.example.com | [b5c 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a39 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [b82 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 f4 4b d8 b1 26 7a 12 19 fc 48 0f |0D. ".K..&z...H.| +peer0.org2.example.com | [c1f 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c37 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer1.org2.example.com | [b5d 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a3a 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 23 96 b6 1c b0 4a 29 77 64 3c 44 db 5e d8 f8 29 |#....J)wd DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c38 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer1.org2.example.com | [b5e 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a3b 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 5a 83 67 be 02 20 3d d4 ec 36 6c 44 09 2b bd e6 |Z.g.. =..6lD.+..| +peer0.org2.example.com | [c21 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c39 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer1.org2.example.com | [b5f 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a3c 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 ee 08 f2 fa f8 be fa ca ba 5b d3 18 d6 d8 c4 9f |.........[......| +peer0.org2.example.com | [c22 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c3a Adding to config map: [Policy] /Channel/Orderer/Admins" +peer1.org2.example.com | [b60 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a3d 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 67 f2 8b 69 99 24 |g..i.$| +peer0.org2.example.com | [c23 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c3b Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer1.org2.example.com | [b61 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a3e 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [b83 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e640 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [c24 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c3c Adding to config map: [Policy] /Channel/Orderer/Readers" +peer1.org2.example.com | [b62 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [a3f 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [b84 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e640 gate 1598907073038915400 evaluation succeeds +peer0.org2.example.com | [c25 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c3d Adding to config map: [Policy] /Channel/Orderer/Writers" +peer1.org2.example.com | [b63 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a40 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b85 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [c26 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c3e Adding to config map: [Group] /Channel/Application" +peer1.org2.example.com | [b64 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a41 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [b86 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [c27 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ce7e0 gate 1598907069484789200 evaluation starts +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c3f Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | [a42 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b65 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [b87 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [c28 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ce7e0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c40 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer1.org2.example.com | [b66 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a43 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [b88 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [c29 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ce7e0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c41 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer1.org2.example.com | [b67 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a44 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [b89 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c42 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org2.example.com | [c2a 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ce7e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [b68 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a45 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes +peer1.org1.example.com | [b8a 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c43 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org2.example.com | [c2b 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ce7e0 principal evaluation fails +peer1.org2.example.com | [b69 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a46 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes +peer1.org1.example.com | [b8b 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c44 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org2.example.com | [c2c 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ce7e0 gate 1598907069484789200 evaluation fails +peer1.org2.example.com | [b6a 08-31 20:51:10.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a47 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b8c 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c45 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org2.example.com | [c2d 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [b6b 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a48 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b8d 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c46 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org2.example.com | [c2e 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [b6c 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a49 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [b8e 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c47 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org2.example.com | [c2f 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [b6d 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a4a 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [b8f 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c48 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org2.example.com | [c30 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ceda0 gate 1598907069485093000 evaluation starts +peer1.org2.example.com | [b6e 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a4b 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [b90 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c49 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org2.example.com | [c31 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ceda0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [b6f 08-31 20:51:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [a4c 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [b91 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c4a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org2.example.com | [c32 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ceda0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [b70 08-31 20:51:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a4d 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [b92 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c4b Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org2.example.com | [c33 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ceda0 principal matched by identity 0 +peer1.org2.example.com | [b71 08-31 20:51:12.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [a4e 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [b93 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\344\030\240\267\347]]\017\211>O\002 QF\200\004q4c\357\210\224\344I\330\243\367\026\301M\030\2000\364\216\370\357>\332\205\205\271*:" > +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c4c Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org2.example.com | [c34 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 6a b4 86 66 e3 dd f1 1d 07 16 02 fe cc e3 e9 |Wj..f...........| +peer1.org2.example.com | [b72 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [a4f 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [b94 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c4d Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org2.example.com | 00000010 18 8b 7e 5d 68 d0 13 49 fd 21 b3 e5 aa ca 4f 08 |..~]h..I.!....O.| +peer1.org2.example.com | [b73 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a50 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7bd0 gate 1598907065752678900 evaluation starts +peer1.org1.example.com | [b95 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c4e Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org2.example.com | [c35 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 92 7d f2 a4 f9 89 e7 88 b7 2c 69 |0D. ..}.......,i| +peer1.org2.example.com | [b74 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [a51 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7bd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [b96 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c4f Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org2.example.com | 00000010 6e b8 79 6d 59 07 0a 7f 8f e3 34 86 c7 7f 4e e2 |n.ymY.....4...N.| +peer1.org2.example.com | [b75 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [a52 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7bd0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [b97 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c50 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org2.example.com | 00000020 51 3f cb d5 02 20 43 20 38 fe 37 27 3f 36 a7 91 |Q?... C 8.7'?6..| +peer1.org2.example.com | [b76 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [a53 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7bd0 principal matched by identity 0 +peer1.org1.example.com | [b98 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c51 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org2.example.com | 00000030 a7 12 05 38 8c e3 f9 76 39 bb 31 a6 6b 37 03 bc |...8...v9.1.k7..| +peer1.org2.example.com | [b77 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a54 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | [b99 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +orderer0.example.com | "2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c52 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer0.org2.example.com | 00000040 b9 60 49 bc 66 f3 |.`I.f.| +peer1.org2.example.com | [b78 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [b9a 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [common.configtx] addToMap -> DEBU c53 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org2.example.com | [c36 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ceda0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [b79 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a55 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | [b9b 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [common.configtx] addToMap -> DEBU c54 Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org2.example.com | [c37 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027ceda0 gate 1598907069485093000 evaluation succeeds +peer1.org2.example.com | [b7a 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | [b9c 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [common.configtx] addToMap -> DEBU c55 Adding to config map: [Value] /Channel/Consortium" +peer0.org2.example.com | [c38 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [b7b 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | [b9d 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [common.configtx] addToMap -> DEBU c56 Adding to config map: [Value] /Channel/Capabilities" +peer0.org2.example.com | [c39 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [b7c 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | [b9e 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [common.configtx] addToMap -> DEBU c57 Adding to config map: [Policy] /Channel/Readers" +peer0.org2.example.com | [c3a 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [b7d 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [b9f 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [common.configtx] addToMap -> DEBU c58 Adding to config map: [Policy] /Channel/Writers" +peer0.org2.example.com | [c3b 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [b7e 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a56 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7bd0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [ba0 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c3c 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [common.configtx] addToMap -> DEBU c59 Adding to config map: [Policy] /Channel/Admins" +peer1.org2.example.com | [b7f 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes +peer0.org1.example.com | [a57 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7bd0 gate 1598907065752678900 evaluation succeeds +peer1.org1.example.com | [ba1 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [c3d 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [common.channelconfig] LogSanityChecks -> DEBU c5a As expected, current configuration has policy '/Channel/Readers'" +peer1.org2.example.com | [b80 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes +peer0.org1.example.com | [a58 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ba2 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c3e 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [common.channelconfig] LogSanityChecks -> DEBU c5b As expected, current configuration has policy '/Channel/Writers'" +peer1.org2.example.com | [b81 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 118 bytes, Signature: 0 bytes +peer0.org1.example.com | [a59 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [c3f 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 a7 64 a1 59 2f 08 ef 19 da 91 37 9a b5 49 98 |I.d.Y/.....7..I.| +peer1.org1.example.com | [ba3 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [policies] Manager -> DEBU c5c Manager Channel looking up path [Application]" +peer0.org1.example.com | [a5a 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [b82 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 15 63 00 ab 9c 13 83 36 60 dc 57 6d df 31 1b 11 |.c.....6`.Wm.1..| +peer1.org1.example.com | [ba4 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [policies] Manager -> DEBU c5d Manager Channel has managers Orderer" +peer0.org1.example.com | [a5b 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [b83 08-31 20:51:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [c40 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 9d 53 bd aa 48 cc 88 5a 1c 15 |0E.!...S..H..Z..| +peer1.org1.example.com | [ba5 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [policies] Manager -> DEBU c5e Manager Channel has managers Application" +peer0.org1.example.com | [a5c 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b84 08-31 20:51:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 83 dc d6 95 46 d4 65 0b a5 5b 92 6e 2f 70 c0 8b |....F.e..[.n/p..| +peer1.org1.example.com | [ba6 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [policies] Manager -> DEBU c5f Manager Channel/Application looking up path []" +peer0.org1.example.com | [a5d 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [b85 08-31 20:51:13.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 d8 0a 17 fe c0 02 20 14 9a 17 05 81 a7 93 ce c9 |...... .........| +peer1.org1.example.com | [ba7 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [policies] Manager -> DEBU c60 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | [a5e 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [b86 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | 00000030 0b 18 48 d1 e0 56 16 62 4c e8 73 fd c9 21 7a 62 |..H..V.bL.s..!zb| +peer1.org1.example.com | [ba8 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [policies] Manager -> DEBU c61 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | [a5f 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [b87 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161019 +peer0.org2.example.com | 00000040 ee d4 2f 0e c1 8b 64 |../...d| +peer1.org1.example.com | [ba9 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [common.channelconfig] LogSanityChecks -> DEBU c62 As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org1.example.com | [a60 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [b88 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F562522FA07AA25FF5B04E1986D1111B4616B9BB1A0A3086A81A6DFDA4FD6C81 +peer0.org2.example.com | [c41 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [baa 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [common.channelconfig] LogSanityChecks -> DEBU c63 As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org1.example.com | [a61 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [b89 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [c42 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [bab 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [common.channelconfig] LogSanityChecks -> DEBU c64 As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org1.example.com | [a62 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614710 gate 1598907065754494600 evaluation starts +peer1.org2.example.com | [b8a 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [c43 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bac 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.141 UTC [policies] Manager -> DEBU c65 Manager Channel looking up path [Orderer]" +peer0.org1.example.com | [a63 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614710 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [b8b 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | [c44 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [bad 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [policies] Manager -> DEBU c66 Manager Channel has managers Orderer" +peer0.org1.example.com | [a64 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614710 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [b8c 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [c45 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 45 23 3a 25 15 88 da 8f 53 4a 1b 00 79 c1 f8 |.E#:%....SJ..y..| +peer1.org1.example.com | [bae 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [policies] Manager -> DEBU c67 Manager Channel has managers Application" +peer1.org2.example.com | [b8d 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a65 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614710 principal matched by identity 0 +peer0.org2.example.com | 00000010 61 47 17 a6 05 0c 7c a5 2c 8e 32 89 cd d4 ab 53 |aG....|.,.2....S| +peer1.org1.example.com | [baf 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D9816101A +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [policies] Manager -> DEBU c68 Manager Channel/Orderer looking up path []" +peer1.org2.example.com | [b8e 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a66 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [c46 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 96 2d 33 a9 0f 8e 0a 58 ac e1 |0E.!...-3....X..| +peer1.org1.example.com | [bb0 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 33D96B098CAA7EBDAB1AA755C52B89517E5F9C3D5720A01A0481EC7EB28A7BB9 +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [policies] Manager -> DEBU c69 Manager Channel/Orderer has managers OrdererOrg" +peer1.org2.example.com | [b8f 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | 00000010 e1 cf dd 39 bc 9a 6b 4a b8 24 7d a8 d8 5f 60 13 |...9..kJ.$}.._`.| +peer1.org1.example.com | [bb1 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [common.channelconfig] LogSanityChecks -> DEBU c6a As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer1.org2.example.com | [b90 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a67 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000020 1f 92 ed c4 6b 02 20 52 28 b2 cc d3 6c ac c0 78 |....k. R(...l..x| +peer1.org1.example.com | [bb2 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [common.channelconfig] LogSanityChecks -> DEBU c6b As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer1.org2.example.com | [b91 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000030 6b 85 f8 08 54 72 4f 15 e4 be 07 d9 0e 2d 45 61 |k...TrO......-Ea| +peer1.org1.example.com | [bb3 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [common.channelconfig] LogSanityChecks -> DEBU c6c As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer1.org2.example.com | [b92 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000040 67 ba 52 10 74 ab 11 |g.R.t..| +peer1.org1.example.com | [bb4 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [common.channelconfig] LogSanityChecks -> DEBU c6d As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer1.org2.example.com | [b93 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [c47 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [bb5 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [common.capabilities] Supported -> DEBU c6e Orderer capability V1_4_2 is supported and is enabled" +peer1.org2.example.com | [b94 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [c48 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bb6 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [common.capabilities] Supported -> DEBU c6f Channel capability V1_4_3 is supported and is enabled" +peer1.org2.example.com | [b95 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [a68 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614710 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [c49 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [orderer.common.server] func1 -> DEBU c70 Executing callback to update root CAs" +peer1.org1.example.com | [bb7 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [b96 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a6a 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614710 gate 1598907065754494600 evaluation succeeds +peer0.org2.example.com | [c4a 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [orderer.common.server] updateTrustedRoots -> DEBU c71 updating root CAs for channel [businesschannel]" +peer1.org1.example.com | [bb8 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [b97 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [a6b 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [c4b 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [orderer.common.server] updateTrustedRoots -> DEBU c72 adding app root CAs for MSP [Org2MSP]" +peer1.org1.example.com | [bb9 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b98 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [a6c 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [c4c 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [orderer.common.server] updateTrustedRoots -> DEBU c73 adding app root CAs for MSP [Org1MSP]" +peer1.org1.example.com | [bba 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [b99 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a6d 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [c4d 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [orderer.common.server] updateTrustedRoots -> DEBU c74 adding orderer root CAs for MSP [OrdererMSP]" +peer1.org1.example.com | [bbb 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [b9a 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [a6e 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [c4e 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c75 [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" +peer1.org1.example.com | [bbc 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a6f 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [b9b 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [c4f 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c76 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +peer1.org1.example.com | [bbd 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [a70 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +peer1.org2.example.com | [b9c 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 62 52 2f a0 7a a2 5f f5 b0 4e 19 86 d1 11 1b |.bR/.z._..N.....| +peer0.org2.example.com | [c50 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [msp] GetDefaultSigningIdentity -> DEBU c77 Obtaining default signing identity" +peer1.org1.example.com | [bbe 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a71 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d db f7 30 28 f3 51 bd 6a 24 0c 99 96 70 b2 03 |}..0(.Q.j$...p..| +peer1.org2.example.com | 00000010 46 16 b9 bb 1a 0a 30 86 a8 1a 6d fd a4 fd 6c 81 |F.....0...m...l.| +peer0.org2.example.com | [c51 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:03.142 UTC [msp] GetDefaultSigningIdentity -> DEBU c78 Obtaining default signing identity" +peer1.org1.example.com | [bbf 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 e2 6b 44 ef 08 fc f0 fd 1c 63 d8 d3 dd e8 c1 11 |.kD......c......| +peer1.org2.example.com | [b9d 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 f4 4b d8 b1 26 7a 12 19 fc 48 0f |0D. ".K..&z...H.| +orderer0.example.com | "2020-08-31 20:51:03.143 UTC [msp.identity] Sign -> DEBU c79 Sign: plaintext: 0A020802120B0A090A03010203100418...0AA37327943750B2C7541B8FC5E43804 " +peer0.org2.example.com | [c52 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [bc0 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a72 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 68 c4 26 6f 7b 21 ed a9 a5 3f 84 a8 |0C. h.&o{!...?..| +peer1.org2.example.com | 00000010 23 96 b6 1c b0 4a 29 77 64 3c 44 db 5e d8 f8 29 |#....J)wd DEBU c7a Sign: digest: D83B715B21F682EDC18B71680E607CFAF8DF66D528BB605EF1C24C3F47A793FA " +peer0.org2.example.com | [c53 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bc1 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 b1 40 99 63 b5 07 70 86 b7 94 7b d1 f4 fc db 60 |.@.c..p...{....`| +peer1.org2.example.com | 00000020 5a 83 67 be 02 20 3d d4 ec 36 6c 44 09 2b bd e6 |Z.g.. =..6lD.+..| +orderer0.example.com | "2020-08-31 20:51:03.145 UTC [fsblkstorage] indexBlock -> DEBU c7b Indexing block [blockNum=2, blockHash=[]byte{0x22, 0x1, 0xdc, 0x78, 0x27, 0xf2, 0x2d, 0xc3, 0x61, 0xf7, 0x88, 0xbc, 0x3b, 0x31, 0x2f, 0x16, 0xf3, 0xa9, 0x7a, 0x3d, 0x6c, 0xaa, 0xbe, 0x10, 0x69, 0xd3, 0x9f, 0xc0, 0xb5, 0xb6, 0x7a, 0xbf} txOffsets= +peer0.org2.example.com | [c54 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [bc2 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | 00000020 a2 47 34 74 02 1f 07 d1 39 67 f0 4d d1 ef fd 7a |.G4t....9g.M...z| +peer1.org2.example.com | 00000030 ee 08 f2 fa f8 be fa ca ba 5b d3 18 d6 d8 c4 9f |.........[......| +orderer0.example.com | txId=ed7b76e084105979adee38a130a3cf311c0f2d9b0dc1c2dda158f0d55a15426c locPointer=offset=71, bytesLength=27141 +peer0.org2.example.com | [c55 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bc3 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 d9 6b 09 8c aa 7e bd ab 1a a7 55 c5 2b 89 51 |3.k...~....U.+.Q| +peer0.org1.example.com | 00000030 e2 38 7c ac 12 5e 64 36 2f e3 b0 37 8c cb da 35 |.8|..^d6/..7...5| +peer1.org2.example.com | 00000040 67 f2 8b 69 99 24 |g..i.$| +orderer0.example.com | ]" +peer0.org2.example.com | [c56 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 7e 5f 9c 3d 57 20 a0 1a 04 81 ec 7e b2 8a 7b b9 |~_.=W .....~..{.| +peer0.org1.example.com | 00000040 bf eb 50 e7 b3 |..P..| +peer1.org2.example.com | [b9e 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +orderer0.example.com | "2020-08-31 20:51:03.147 UTC [fsblkstorage] updateCheckpoint -> DEBU c7c Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84817], isChainEmpty=[false], lastBlockNumber=[2]" +peer0.org2.example.com | [c57 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [bc4 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 e2 5d 94 fc ae 8f 76 e8 23 1c b9 |0D. y.]....v.#..| +peer0.org1.example.com | [a73 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +orderer0.example.com | "2020-08-31 20:51:03.147 UTC [orderer.commmon.multichannel] commitBlock -> DEBU c7d [channel: businesschannel] Wrote block [2]" +peer0.org2.example.com | [c58 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 d9 60 be 1f 03 e6 e7 c3 47 91 9b 77 b9 3b df cb |.`......G..w.;..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [b9f 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 42 c1 58 4d 9a db cd 8e eb 63 |0E.!..B.XM.....c| +orderer0.example.com | "2020-08-31 20:51:03.169 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7e Sending msg of 28 bytes to 2 on channel businesschannel took 31.1µs" +peer0.org2.example.com | [c59 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000020 7d a7 69 90 02 20 2e 72 62 ff 22 9f 3d dd 2e 9c |}.i.. .rb.".=...| +peer0.org1.example.com | [a74 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 5a 0e 69 51 67 f5 fa 80 3f 5f 8a 90 a7 04 0c 04 |Z.iQg...?_......| +orderer0.example.com | "2020-08-31 20:51:03.169 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7f Sending msg of 28 bytes to 3 on channel businesschannel took 19.5µs" +peer0.org2.example.com | [c5a 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000030 d9 97 80 77 23 79 e2 32 f9 1f 00 1c 06 55 fb ac |...w#y.2.....U..| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 e8 1c c6 24 6c 02 20 1a 38 0f cf dc fa cb 02 5c |...$l. .8......\| +orderer0.example.com | "2020-08-31 20:51:03.169 UTC [orderer.common.cluster.step] sendMessage -> DEBU c80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.8µs " +peer0.org2.example.com | [c5b 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000040 cd ca ca 0b bb f5 |......| +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 49 25 52 90 63 8b 0d 8f 11 aa 1a e4 87 9b d8 d8 |I%R.c...........| +orderer0.example.com | "2020-08-31 20:51:03.170 UTC [orderer.common.cluster.step] sendMessage -> DEBU c81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102.3µs " +peer0.org2.example.com | [c5c 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [bc5 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 9e b9 f3 6f e7 9f 61 |...o..a| +orderer0.example.com | "2020-08-31 20:51:03.172 UTC [orderer.common.cluster.step] handleMessage -> DEBU c82 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [c5d 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [bc6 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [ba0 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.172 UTC [orderer.common.cluster.step] handleMessage -> DEBU c83 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [c5e 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [bc7 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a75 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ba1 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:03.376 UTC [orderer.common.cluster.step] handleMessage -> DEBU c84 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [c5f 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002717700 gate 1598907069575774700 evaluation starts +peer1.org1.example.com | [bc8 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [a76 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ba2 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.377 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c85 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" +peer0.org2.example.com | [c60 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002717700 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [bc9 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a77 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [ba3 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU c86 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 366.3µs " +peer0.org2.example.com | [c61 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002717700 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [a78 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [bca 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [ba4 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:03.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c87 Sending msg of 28 bytes to 2 on channel businesschannel took 22µs" +peer0.org2.example.com | [c62 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002717700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [a79 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [bcb 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ba5 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:03.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c88 Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +peer0.org2.example.com | [c63 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002717700 principal evaluation fails +peer0.org1.example.com | [a7a 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bcc 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [ba6 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [c64 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002717700 gate 1598907069575774700 evaluation fails +orderer0.example.com | "2020-08-31 20:51:03.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU c89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 389.3µs " +peer0.org1.example.com | [a7b 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [bcd 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [ba7 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [c65 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:03.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 735.7µs " +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [bce 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [ba8 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 62 52 2f a0 7a a2 5f f5 b0 4e 19 86 d1 11 1b |.bR/.z._..N.....| +peer0.org2.example.com | [c66 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:03.669 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [bcf 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000010 46 16 b9 bb 1a 0a 30 86 a8 1a 6d fd a4 fd 6c 81 |F.....0...m...l.| +peer0.org2.example.com | [c67 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:03.670 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8c Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [bd0 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bea720 gate 1598907073318583800 evaluation starts +peer1.org2.example.com | [ba9 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 f4 4b d8 b1 26 7a 12 19 fc 48 0f |0D. ".K..&z...H.| +peer0.org2.example.com | [c68 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002717c70 gate 1598907069578195400 evaluation starts +orderer0.example.com | "2020-08-31 20:51:03.875 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | [bd1 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bea720 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 23 96 b6 1c b0 4a 29 77 64 3c 44 db 5e d8 f8 29 |#....J)wd DEBU 0xc002717c70 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:03.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c8e Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [bd2 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bea720 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | 00000020 5a 83 67 be 02 20 3d d4 ec 36 6c 44 09 2b bd e6 |Z.g.. =..6lD.+..| +peer0.org2.example.com | [c6a 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002717c70 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:03.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.7µs " +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer1.org1.example.com | [bd3 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 ee 08 f2 fa f8 be fa ca ba 5b d3 18 d6 d8 c4 9f |.........[......| +peer0.org2.example.com | [c6b 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002717c70 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:51:04.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c90 Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer1.org1.example.com | [bd4 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 67 f2 8b 69 99 24 |g..i.$| +peer0.org2.example.com | [c6c 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f 9b 70 86 9c 21 8c 04 61 a8 97 0f 34 51 37 a8 |..p..!..a...4Q7.| +orderer0.example.com | "2020-08-31 20:51:04.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c91 Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +peer0.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer1.org1.example.com | [bd5 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [baa 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 8c b8 fe 8e df 8c f9 29 04 cb a2 69 ce 90 94 22 |.......)...i..."| +orderer0.example.com | "2020-08-31 20:51:04.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU c92 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 409.9µs " +peer0.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer1.org2.example.com | [bab 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [c6d 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 50 cd 21 f6 c0 4c f9 23 4e ec |0E.!..P.!..L.#N.| +orderer0.example.com | "2020-08-31 20:51:04.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU c93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.9µs " +peer0.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer1.org1.example.com | [bd6 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bea720 principal matched by identity 0 +peer1.org2.example.com | [bac 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 40 3a 91 75 e8 8c 2e 5c cc 24 be 30 ad d6 e2 f2 |@:.u...\.$.0....| +orderer0.example.com | "2020-08-31 20:51:04.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU c94 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer1.org1.example.com | [bd7 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 8f ca 88 75 8b 7c 36 a5 18 4b 1c 19 7c 3b 5a |....u.|6..K..|;Z| +peer1.org2.example.com | [bad 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 81 13 ba f1 62 02 20 22 84 86 fa c4 db b9 6f e1 |....b. "......o.| +orderer0.example.com | "2020-08-31 20:51:04.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU c95 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer1.org1.example.com | 00000010 a7 b0 45 ab e4 20 b7 46 39 04 47 b6 1e 2e fb 8b |..E.. .F9.G.....| +peer1.org2.example.com | [bae 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 47 27 9d 59 2e 0d 70 78 03 93 59 69 54 ba 48 1c |G'.Y..px..YiT.H.| +orderer0.example.com | "2020-08-31 20:51:04.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU c96 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [bd8 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 03 81 18 c8 42 fb f5 0c b9 92 |0E.!......B.....| +peer1.org2.example.com | [baf 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 f7 07 5a 5f 3b 73 3c |..Z_;s<| +orderer0.example.com | "2020-08-31 20:51:04.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c97 Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +peer0.org1.example.com | [a69 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 12 50 72 ef 20 07 76 b4 f9 17 57 62 57 a6 33 4d |.Pr. .v...WbW.3M| +peer1.org1.example.com | 00000020 4a b2 ef 50 9d 02 20 6b 3f 0c 5d e8 27 04 4c 8a |J..P.. k?.].'.L.| +peer1.org2.example.com | [bb0 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:04.374 UTC [orderer.common.cluster.step] sendMessage -> DEBU c98 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " +peer0.org1.example.com | [a7c 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362a240 gate 1598907065761110600 evaluation starts +peer1.org1.example.com | 00000030 ee 77 82 93 fc 33 2b 69 d0 d1 8c 09 0f 43 f4 28 |.w...3+i.....C.(| +peer1.org2.example.com | [bb1 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [c6e 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002717c70 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:04.515 UTC [orderer.common.server] Deliver -> DEBU c99 Starting new Deliver handler" +peer0.org1.example.com | [a7d 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362a240 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000040 5b 4d 29 44 01 01 0b |[M)D...| +peer1.org2.example.com | [bb2 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-08-31 20:51:04.515 UTC [common.deliver] Handle -> DEBU c9a Starting new deliver loop for 172.18.0.5:56650" +peer0.org2.example.com | [c6f 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002717c70 gate 1598907069578195400 evaluation succeeds +peer0.org1.example.com | [a7e 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362a240 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [bd9 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bea720 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [bb3 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 62 52 2f a0 7a a2 5f f5 b0 4e 19 86 d1 11 1b |.bR/.z._..N.....| +orderer0.example.com | "2020-08-31 20:51:04.515 UTC [common.deliver] Handle -> DEBU c9b Attempting to read seek info message from 172.18.0.5:56650" +peer0.org2.example.com | [c70 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [a7f 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362a240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [bda 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bea720 gate 1598907073318583800 evaluation succeeds +peer1.org2.example.com | 00000010 46 16 b9 bb 1a 0a 30 86 a8 1a 6d fd a4 fd 6c 81 |F.....0...m...l.| +orderer0.example.com | "2020-08-31 20:51:04.516 UTC [policies] Evaluate -> DEBU c9c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org2.example.com | [c71 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [a82 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362a240 principal evaluation fails +peer1.org1.example.com | [bdb 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [bb4 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 f4 4b d8 b1 26 7a 12 19 fc 48 0f |0D. ".K..&z...H.| +orderer0.example.com | "2020-08-31 20:51:04.516 UTC [policies] Evaluate -> DEBU c9d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [c72 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [a80 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bdc 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 23 96 b6 1c b0 4a 29 77 64 3c 44 db 5e d8 f8 29 |#....J)wd DEBU c9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org2.example.com | [c73 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [a84 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [bdd 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000020 5a 83 67 be 02 20 3d d4 ec 36 6c 44 09 2b bd e6 |Z.g.. =..6lD.+..| +orderer0.example.com | "2020-08-31 20:51:04.516 UTC [policies] Evaluate -> DEBU c9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [c74 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a85 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bde 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 ee 08 f2 fa f8 be fa ca ba 5b d3 18 d6 d8 c4 9f |.........[......| +orderer0.example.com | "2020-08-31 20:51:04.516 UTC [policies] Evaluate -> DEBU ca0 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org2.example.com | [c75 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [a86 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [bdf 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 67 f2 8b 69 99 24 |g..i.$| +orderer0.example.com | "2020-08-31 20:51:04.516 UTC [msp] DeserializeIdentity -> DEBU ca1 Obtaining identity" +peer0.org2.example.com | [c76 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [a83 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362a240 gate 1598907065761110600 evaluation fails +peer1.org2.example.com | [bb5 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:04.517 UTC [msp.identity] newIdentity -> DEBU ca2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [c77 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [a87 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [bb6 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [be0 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" lastAliveTS: 1598907045014135600, 25 but got ts: inc_num:1598907045014135600 seq_num:24 +orderer0.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | [c78 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [a88 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [bb7 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [be1 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [c79 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a81 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bb8 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [be2 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [c7a 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a89 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [bb9 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [be3 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | [a8c 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bba 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [be4 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [c7b 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a8a 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [bbb 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [be5 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 d9 6b 09 8c aa 7e bd ab 1a a7 55 c5 2b 89 51 |3.k...~....U.+.Q| +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org2.example.com | [c7c 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org1.example.com | [a8d 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362b240 gate 1598907065764256400 evaluation starts +peer1.org2.example.com | [bbc 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 7e 5f 9c 3d 57 20 a0 1a 04 81 ec 7e b2 8a 7b b9 |~_.=W .....~..{.| +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org2.example.com | [c7d 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a8e 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362b240 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [bbd 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [be6 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 e2 5d 94 fc ae 8f 76 e8 23 1c b9 |0D. y.]....v.#..| +orderer0.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org2.example.com | [c7e 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a8f 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362b240 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [bbe 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 d9 60 be 1f 03 e6 e7 c3 47 91 9b 77 b9 3b df cb |.`......G..w.;..| +orderer0.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | [c7f 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a90 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [bbf 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 7d a7 69 90 02 20 2e 72 62 ff 22 9f 3d dd 2e 9c |}.i.. .rb.".=...| +orderer0.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org2.example.com | [c80 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [a8b 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bc0 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 d9 97 80 77 23 79 e2 32 f9 1f 00 1c 06 55 fb ac |...w#y.2.....U..| +orderer0.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org2.example.com | [c81 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [a91 08-31 20:51:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [bc1 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 cd ca ca 0b bb f5 |......| +orderer0.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org2.example.com | [c82 08-31 20:51:09.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [a93 08-31 20:51:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [bc2 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | [be7 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | [c83 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a94 08-31 20:51:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362b240 principal matched by identity 0 +peer1.org2.example.com | [bc3 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [be8 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:04.517 UTC [cauthdsl] func1 -> DEBU ca3 0xc00004fa30 gate 1598907064517428000 evaluation starts" +peer0.org2.example.com | [c84 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [a95 08-31 20:51:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | [bc4 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [be9 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +orderer0.example.com | "2020-08-31 20:51:04.518 UTC [cauthdsl] func2 -> DEBU ca4 0xc00004fa30 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [c85 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [bc5 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +orderer0.example.com | "2020-08-31 20:51:04.518 UTC [cauthdsl] func2 -> DEBU ca5 0xc00004fa30 processing identity 0 with bytes of fe10e0" +peer0.org2.example.com | [c86 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a96 08-31 20:51:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | [bc6 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bea 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a 19 7e 9a 8d 2b 03 8c 58 95 61 2f |0D. :.~..+..X.a/| +orderer0.example.com | "2020-08-31 20:51:04.518 UTC [cauthdsl] func2 -> DEBU ca6 0xc00004fa30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +peer0.org2.example.com | [c87 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | [bc7 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 66 6e 76 92 d8 ac fd 2b 7d 67 3b 42 4d 3a 57 26 |fnv....+}g;BM:W&| +orderer0.example.com | "2020-08-31 20:51:04.518 UTC [cauthdsl] func2 -> DEBU ca7 0xc00004fa30 principal evaluation fails" +peer0.org2.example.com | [c88 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | [bc8 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | 00000020 a6 e1 27 7c 02 20 00 f0 b7 c6 02 58 cc 21 34 88 |..'|. .....X.!4.| +orderer0.example.com | "2020-08-31 20:51:04.518 UTC [cauthdsl] func1 -> DEBU ca8 0xc00004fa30 gate 1598907064517428000 evaluation fails" +peer0.org2.example.com | [c89 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | [bc9 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 39 39 be 72 fa 1d 0e ab 04 ac 8d 65 14 a9 38 ec |99.r.......e..8.| +orderer0.example.com | "2020-08-31 20:51:04.518 UTC [policies] Evaluate -> DEBU ca9 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [c8a 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [bca 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000040 16 b5 9e d4 a2 8a |......| +orderer0.example.com | "2020-08-31 20:51:04.518 UTC [policies] Evaluate -> DEBU caa == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [c8b 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a97 08-31 20:51:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362b240 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [bcb 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [beb 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:04.518 UTC [policies] func1 -> DEBU cab Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +peer0.org2.example.com | [c8c 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [a98 08-31 20:51:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362b240 gate 1598907065764256400 evaluation succeeds +peer1.org2.example.com | [bcc 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [bec 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:04.518 UTC [policies] Evaluate -> DEBU cac Signature set did not satisfy policy /Channel/Orderer/Readers" +peer0.org2.example.com | [c8d 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [a99 08-31 20:51:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [bcd 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:04.519 UTC [policies] Evaluate -> DEBU cad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org1.example.com | [bed 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c8e 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a9a 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [bce 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:04.519 UTC [policies] Evaluate -> DEBU cae == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer1.org1.example.com | [bee 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [c8f 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a9b 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [bcf 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:04.519 UTC [policies] Evaluate -> DEBU caf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [bef 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [c90 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [a9c 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [bd0 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274ec20 gate 1598907073311051200 evaluation starts +orderer0.example.com | "2020-08-31 20:51:04.519 UTC [policies] Evaluate -> DEBU cb0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer1.org1.example.com | [bf0 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [c91 08-31 20:51:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a9d 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bd1 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274ec20 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:04.519 UTC [cauthdsl] func1 -> DEBU cb1 0xc000111e50 gate 1598907064519609200 evaluation starts" +peer1.org1.example.com | [bf1 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 d9 6b 09 8c aa 7e bd ab 1a a7 55 c5 2b 89 51 |3.k...~....U.+.Q| +peer0.org2.example.com | [c92 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [a9e 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes +peer1.org2.example.com | [bd2 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274ec20 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:04.519 UTC [cauthdsl] func2 -> DEBU cb2 0xc000111e50 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | 00000010 7e 5f 9c 3d 57 20 a0 1a 04 81 ec 7e b2 8a 7b b9 |~_.=W .....~..{.| +peer0.org2.example.com | [c93 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [a9f 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bd3 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274ec20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [bf2 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 e2 5d 94 fc ae 8f 76 e8 23 1c b9 |0D. y.]....v.#..| +orderer0.example.com | "2020-08-31 20:51:04.519 UTC [cauthdsl] func2 -> DEBU cb3 0xc000111e50 processing identity 0 with bytes of fe10e0" +peer0.org2.example.com | [c94 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [aa0 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 d9 60 be 1f 03 e6 e7 c3 47 91 9b 77 b9 3b df cb |.`......G..w.;..| +peer1.org2.example.com | [bd4 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274ec20 principal evaluation fails +orderer0.example.com | "2020-08-31 20:51:04.519 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU cb4 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org2.example.com | [c95 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [aa1 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 7d a7 69 90 02 20 2e 72 62 ff 22 9f 3d dd 2e 9c |}.i.. .rb.".=...| +peer1.org2.example.com | [bd5 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274ec20 gate 1598907073311051200 evaluation fails +orderer0.example.com | "2020-08-31 20:51:04.520 UTC [msp] Validate -> DEBU cb5 MSP Org2MSP validating identity" +peer0.org2.example.com | [c96 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 8f ca 88 75 8b 7c 36 a5 18 4b 1c 19 7c 3b 5a |....u.|6..K..|;Z| +peer0.org1.example.com | [a92 08-31 20:51:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 3 peers +peer1.org1.example.com | 00000030 d9 97 80 77 23 79 e2 32 f9 1f 00 1c 06 55 fb ac |...w#y.2.....U..| +peer1.org2.example.com | [bd6 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:04.520 UTC [msp] getCertificationChain -> DEBU cb6 MSP Org2MSP getting certification chain" +peer0.org2.example.com | 00000010 a7 b0 45 ab e4 20 b7 46 39 04 47 b6 1e 2e fb 8b |..E.. .F9.G.....| +peer0.org1.example.com | [aa2 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 cd ca ca 0b bb f5 |......| +peer1.org2.example.com | [bd7 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:04.520 UTC [cauthdsl] func2 -> DEBU cb7 0xc000111e50 principal matched by identity 0" +peer0.org2.example.com | [c97 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 03 81 18 c8 42 fb f5 0c b9 92 |0E.!......B.....| +peer0.org1.example.com | [aa3 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [bf3 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bd8 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:04.520 UTC [msp.identity] Verify -> DEBU cb8 Verify: digest = 00000000 57 5b ee bb f7 e1 76 65 eb 70 21 da ba 1c a8 d0 |W[....ve.p!.....| +peer0.org2.example.com | 00000010 12 50 72 ef 20 07 76 b4 f9 17 57 62 57 a6 33 4d |.Pr. .v...WbW.3M| +peer0.org1.example.com | [aa4 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [bf4 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [bd9 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274f190 gate 1598907073311480000 evaluation starts +orderer0.example.com | 00000010 80 fc e8 bc 62 7d 37 2d 90 ae e5 1a a5 f9 38 c9 |....b}7-......8.|" +peer0.org2.example.com | 00000020 4a b2 ef 50 9d 02 20 6b 3f 0c 5d e8 27 04 4c 8a |J..P.. k?.].'.L.| +peer0.org1.example.com | [aa5 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bf5 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [bda 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274f190 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:04.521 UTC [msp.identity] Verify -> DEBU cb9 Verify: sig = 00000000 30 44 02 20 6f 2a 9e 2e 15 ce b3 a9 88 a8 d3 ef |0D. o*..........| +peer0.org2.example.com | 00000030 ee 77 82 93 fc 33 2b 69 d0 d1 8c 09 0f 43 f4 28 |.w...3+i.....C.(| +peer0.org1.example.com | [aa6 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [bf6 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [bdb 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274f190 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | 00000010 61 ae 42 1f 51 86 ea d1 b4 ce 06 95 ae 6d 7f 5d |a.B.Q........m.]| +peer0.org2.example.com | 00000040 5b 4d 29 44 01 01 0b |[M)D...| +peer0.org1.example.com | [aa7 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bf7 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [bdc 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274f190 principal matched by identity 0 +orderer0.example.com | 00000020 43 12 01 d0 02 20 02 e3 a8 43 f2 35 bf cf 62 43 |C.... ...C.5..bC| +peer0.org2.example.com | [c98 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [aa8 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer1.org1.example.com | [bf8 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bdd 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 d9 6b 09 8c aa 7e bd ab 1a a7 55 c5 2b 89 51 |3.k...~....U.+.Q| +orderer0.example.com | 00000030 c7 53 f2 04 cf 6d a8 32 cd 64 e5 12 82 bd e4 58 |.S...m.2.d.....X| +peer0.org2.example.com | [c99 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [aa9 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bf9 08-31 20:51:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 7e 5f 9c 3d 57 20 a0 1a 04 81 ec 7e b2 8a 7b b9 |~_.=W .....~..{.| +orderer0.example.com | 00000040 48 7d bb cc 85 d0 |H}....|" +peer0.org2.example.com | [c9a 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [bfa 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [aaa 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [bde 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 e2 5d 94 fc ae 8f 76 e8 23 1c b9 |0D. y.]....v.#..| +orderer0.example.com | "2020-08-31 20:51:04.521 UTC [cauthdsl] func2 -> DEBU cba 0xc000111e50 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [c9b 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [bfb 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [aab 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 d9 60 be 1f 03 e6 e7 c3 47 91 9b 77 b9 3b df cb |.`......G..w.;..| +orderer0.example.com | "2020-08-31 20:51:04.521 UTC [cauthdsl] func1 -> DEBU cbb 0xc000111e50 gate 1598907064519609200 evaluation succeeds" +peer0.org2.example.com | [c9c 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [bfc 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [aac 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 7d a7 69 90 02 20 2e 72 62 ff 22 9f 3d dd 2e 9c |}.i.. .rb.".=...| +orderer0.example.com | "2020-08-31 20:51:04.521 UTC [policies] Evaluate -> DEBU cbc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org2.example.com | [c9d 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bfd 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [aad 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000030 d9 97 80 77 23 79 e2 32 f9 1f 00 1c 06 55 fb ac |...w#y.2.....U..| +orderer0.example.com | "2020-08-31 20:51:04.521 UTC [policies] Evaluate -> DEBU cbd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org2.example.com | [c9e 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bfe 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [aae 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000040 cd ca ca 0b bb f5 |......| +orderer0.example.com | "2020-08-31 20:51:04.521 UTC [policies] Evaluate -> DEBU cbe Signature set satisfies policy /Channel/Application/Readers" +peer0.org2.example.com | [c9f 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [bff 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c05820 gate 1598907073330280600 evaluation starts +peer0.org1.example.com | [aaf 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [bdf 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274f190 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:04.521 UTC [policies] Evaluate -> DEBU cbf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org2.example.com | [ca0 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c00 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c05820 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [ab0 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003654ff0 gate 1598907065792201400 evaluation starts +peer1.org2.example.com | [be0 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274f190 gate 1598907073311480000 evaluation succeeds +orderer0.example.com | "2020-08-31 20:51:04.522 UTC [policies] Evaluate -> DEBU cc0 Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | [ca1 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c01 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c05820 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [ab1 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003654ff0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [be1 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:51:04.522 UTC [policies] Evaluate -> DEBU cc1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [ca2 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c02 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c05820 principal matched by identity 0 +peer0.org1.example.com | [ab2 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003654ff0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [be2 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:51:04.522 UTC [common.deliver] deliverBlocks -> DEBU cc2 [channel: businesschannel] Received seekInfo (0xc000a09280) start: > stop: > from 172.18.0.5:56650" +peer0.org2.example.com | [ca3 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [c03 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 62 52 2f a0 7a a2 5f f5 b0 4e 19 86 d1 11 1b |.bR/.z._..N.....| +peer0.org1.example.com | [ab3 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003654ff0 principal matched by identity 0 +peer1.org2.example.com | [be3 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:04.522 UTC [fsblkstorage] Next -> DEBU cc3 Initializing block stream for iterator. itr.maxBlockNumAvailable=2" +peer0.org2.example.com | [ca4 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 46 16 b9 bb 1a 0a 30 86 a8 1a 6d fd a4 fd 6c 81 |F.....0...m...l.| +peer0.org1.example.com | [ab4 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | [be4 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:04.522 UTC [fsblkstorage] newBlockfileStream -> DEBU cc4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[28475]" +peer0.org2.example.com | [ca5 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [c04 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 f4 4b d8 b1 26 7a 12 19 fc 48 0f |0D. ".K..&z...H.| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [be5 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:04.522 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cc5 Remaining bytes=[56342], Going to peek [8] bytes" +peer0.org2.example.com | [ca6 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 23 96 b6 1c b0 4a 29 77 64 3c 44 db 5e d8 f8 29 |#....J)wd DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | [be6 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-08-31 20:51:04.522 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cc6 Returning blockbytes - length=[28165], placementInfo={fileNum=[0], startOffset=[28475], bytesOffset=[28478]}" +peer0.org2.example.com | [ca7 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 5a 83 67 be 02 20 3d d4 ec 36 6c 44 09 2b bd e6 |Z.g.. =..6lD.+..| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | [be7 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:51:04.522 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cc7 blockbytes [28165] read from file [0]" +peer0.org2.example.com | [ca8 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000030 ee 08 f2 fa f8 be fa ca ba 5b d3 18 d6 d8 c4 9f |.........[......| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | [be8 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:51:04.523 UTC [common.deliver] deliverBlocks -> DEBU cc8 [channel: businesschannel] Delivering block [1] for (0xc000a09280) for 172.18.0.5:56650" +peer0.org2.example.com | [ca9 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 67 f2 8b 69 99 24 |g..i.$| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | [be9 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:51:04.523 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cc9 Remaining bytes=[28174], Going to peek [8] bytes" +peer0.org2.example.com | [caa 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [c05 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c05820 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [bea 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:04.523 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cca Returning blockbytes - length=[28171], placementInfo={fileNum=[0], startOffset=[56643], bytesOffset=[56646]}" +peer0.org2.example.com | [cab 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c06 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c05820 gate 1598907073330280600 evaluation succeeds +peer0.org1.example.com | [ab6 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003654ff0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [beb 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:04.523 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ccb blockbytes [28171] read from file [0]" +peer0.org2.example.com | [cac 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [c07 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ab7 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003654ff0 gate 1598907065792201400 evaluation succeeds +peer1.org2.example.com | [bec 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:04.523 UTC [common.deliver] deliverBlocks -> DEBU ccc [channel: businesschannel] Delivering block [2] for (0xc000a09280) for 172.18.0.5:56650" +peer0.org2.example.com | [cad 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c08 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ab8 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [bed 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +orderer0.example.com | "2020-08-31 20:51:04.523 UTC [fsblkstorage] waitForBlock -> DEBU ccd Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +peer0.org2.example.com | [cae 08-31 20:51:10.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c09 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [ab9 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [bee 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:04.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cce Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +peer0.org2.example.com | [caf 08-31 20:51:10.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c0a 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [aba 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [bef 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:04.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ccf Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +peer0.org2.example.com | [cb0 08-31 20:51:10.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [c0b 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [abb 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [bf0 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:04.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.7µs " +peer0.org2.example.com | [cb1 08-31 20:51:10.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [c0c 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [abc 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bf1 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:04.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 211µs " +peer1.org1.example.com | [c0d 08-31 20:51:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cb3 08-31 20:51:10.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [abd 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [bf2 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +orderer0.example.com | "2020-08-31 20:51:04.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [c0e 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [cb4 08-31 20:51:10.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [abe 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [bf3 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:04.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd3 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [c0f 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [cb5 08-31 20:51:10.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [abf 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [bf4 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:04.875 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [c10 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [cb2 08-31 20:51:10.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [ac0 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [bf5 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:04.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd5 Sending msg of 28 bytes to 3 on channel testchainid took 119µs" +peer1.org1.example.com | [c11 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cb6 08-31 20:51:10.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ac1 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [ac2 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003655b30 gate 1598907065812435700 evaluation starts +peer0.org1.example.com | [ac3 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003655b30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [cb7 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org1.example.com | [ac4 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003655b30 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [cb8 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | [bf6 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [ac5 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003655b30 principal matched by identity 0 +peer1.org1.example.com | [c12 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:04.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1025ms " +peer1.org2.example.com | [bf7 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [cb9 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | [ac6 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | [c13 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:05.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd7 Sending msg of 28 bytes to 2 on channel businesschannel took 20µs" +peer1.org2.example.com | [bf8 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [c14 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bf9 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:05.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd8 Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | [ac7 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | [c15 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [bfa 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:05.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146.3µs " +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | [bfb 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [c16 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:05.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU cda Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146.3µs " +peer1.org2.example.com | [bfc 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [c17 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +orderer0.example.com | "2020-08-31 20:51:05.166 UTC [orderer.common.cluster.step] handleMessage -> DEBU cdb Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [bfd 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [cba 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c18 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c19 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:05.166 UTC [orderer.common.cluster.step] handleMessage -> DEBU cdc Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [bfe 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [cbb 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c1a 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +orderer0.example.com | "2020-08-31 20:51:05.375 UTC [orderer.common.cluster.step] handleMessage -> DEBU cdd Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [bff 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 d6 ed 84 b2 eb d3 92 e8 ad 8a a9 48 e8 44 42 |............H.DB| +peer0.org2.example.com | [cbc 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [c1b 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +orderer0.example.com | "2020-08-31 20:51:05.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cde Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +peer1.org2.example.com | 00000010 4e 4d db 72 61 e4 55 ce ce e0 93 dd 0a 6c bf 8b |NM.ra.U......l..| +peer0.org2.example.com | [cbd 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c1c 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [ac8 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003655b30 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:05.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 569.9µs " +peer1.org2.example.com | [c00 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 6f e0 4e 37 ca de e7 13 97 27 e9 |0D. .o.N7.....'.| +peer0.org2.example.com | [cbe 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c1d 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [ac9 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003655b30 gate 1598907065812435700 evaluation succeeds +orderer0.example.com | "2020-08-31 20:51:05.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce0 Sending msg of 28 bytes to 2 on channel businesschannel took 32.5µs" +peer1.org2.example.com | 00000010 a8 ec 75 e2 19 aa f6 5d 81 00 bb ea e6 d9 d3 81 |..u....]........| +peer0.org2.example.com | [cbf 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [c1e 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [aca 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [acb 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [acc 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [acd 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [ace 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [acf 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [ad0 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [ad1 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ad2 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [ad3 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +peer0.org1.example.com | [ad4 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [ad5 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 82 fe df b9 02 20 53 53 53 3a 2f 80 e0 0b 20 c9 |..... SSS:/... .| +orderer0.example.com | "2020-08-31 20:51:05.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce1 Sending msg of 28 bytes to 3 on channel businesschannel took 10.1µs" +peer0.org2.example.com | [cc0 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [c1f 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 45 9b 9f 22 f0 43 60 a0 71 76 ec da db 98 b8 53 |E..".C`.qv.....S| +orderer0.example.com | "2020-08-31 20:51:05.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 285.6µs " +peer0.org2.example.com | [cc1 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [c20 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 a0 60 9b 29 94 3c |.`.).<| +orderer0.example.com | "2020-08-31 20:51:05.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 326.7µs " +peer0.org2.example.com | [cc2 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002937110 gate 1598907070236453100 evaluation starts +peer1.org1.example.com | [c21 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [c01 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +orderer0.example.com | "2020-08-31 20:51:05.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce4 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [cc3 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002937110 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c22 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [ad6 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +orderer0.example.com | "2020-08-31 20:51:05.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [cc4 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002937110 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [c23 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [ad7 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c02 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fd c3 02 d1 49 78 b3 2b 75 1d d0 |0D. S....Ix.+u..| +orderer0.example.com | "2020-08-31 20:51:05.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [cc5 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002937110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [c24 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [ad8 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 4e d6 21 b6 61 84 29 aa e5 0f 6c b5 d9 e5 7b ff |N.!.a.)...l...{.| +orderer0.example.com | "2020-08-31 20:51:05.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce7 Sending msg of 28 bytes to 3 on channel testchainid took 28.2µs" +peer0.org2.example.com | [cc6 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002937110 principal evaluation fails +peer0.org1.example.com | [ad9 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c25 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367b4a0 gate 1598907073501868700 evaluation starts +peer1.org2.example.com | 00000020 04 d7 b9 50 02 20 1e ce 3b 71 b2 eb a8 6c 0d aa |...P. ..;q...l..| +orderer0.example.com | "2020-08-31 20:51:05.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.2µs " +peer0.org2.example.com | [cc7 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002937110 gate 1598907070236453100 evaluation fails +peer0.org1.example.com | [ada 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c26 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367b4a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000030 db ef 3a 10 84 58 7b a0 6a da 46 a7 38 f4 7b 17 |..:..X{.j.F.8.{.| +orderer0.example.com | "2020-08-31 20:51:06.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce9 Sending msg of 28 bytes to 2 on channel businesschannel took 31.8µs" +peer0.org2.example.com | [cc8 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [adb 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c27 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367b4a0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | 00000040 c9 82 c5 7d 55 a8 |...}U.| +orderer0.example.com | "2020-08-31 20:51:06.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cea Sending msg of 28 bytes to 3 on channel businesschannel took 22.9µs" +peer0.org2.example.com | [cc9 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [adc 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [c28 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367b4a0 principal matched by identity 0 +peer1.org2.example.com | [c03 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org1.example.com:7051 ]] , current view: [[peer0.org2.example.com:7051] [peer0.org1.example.com:7051 ] [peer1.org1.example.com:7051 ]] +orderer0.example.com | "2020-08-31 20:51:06.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU ceb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.3573ms " +peer0.org2.example.com | [cca 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [add 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [c29 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 d6 ed 84 b2 eb d3 92 e8 ad 8a a9 48 e8 44 42 |............H.DB| +peer1.org2.example.com | [c04 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:06.168 UTC [orderer.common.cluster.step] sendMessage -> DEBU cec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.9µs " +peer0.org2.example.com | [ccb 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002937680 gate 1598907070237829200 evaluation starts +peer0.org1.example.com | [ade 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | 00000010 4e 4d db 72 61 e4 55 ce ce e0 93 dd 0a 6c bf 8b |NM.ra.U......l..| +peer1.org2.example.com | [c05 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +orderer0.example.com | "2020-08-31 20:51:06.170 UTC [orderer.common.cluster.step] handleMessage -> DEBU ced Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [ccc 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002937680 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [adf 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c2a 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 6f e0 4e 37 ca de e7 13 97 27 e9 |0D. .o.N7.....'.| +peer1.org2.example.com | [c06 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:51:06.171 UTC [orderer.common.cluster.step] handleMessage -> DEBU cee Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [ccd 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002937680 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [ae0 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 a8 ec 75 e2 19 aa f6 5d 81 00 bb ea e6 d9 d3 81 |..u....]........| +peer1.org2.example.com | [c07 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:51:06.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU cef Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [cce 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002937680 principal matched by identity 0 +peer0.org1.example.com | [ae1 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000020 82 fe df b9 02 20 53 53 53 3a 2f 80 e0 0b 20 c9 |..... SSS:/... .| +peer1.org2.example.com | [c08 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:51:06.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf0 Sending msg of 28 bytes to 3 on channel testchainid took 325.1µs" +peer0.org2.example.com | [ccf 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | 00000030 45 9b 9f 22 f0 43 60 a0 71 76 ec da db 98 b8 53 |E..".C`.qv.....S| +peer1.org2.example.com | [c09 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:06.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.9µs " +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [ae2 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000040 a0 60 9b 29 94 3c |.`.).<| +peer1.org2.example.com | [c0a 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:06.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf2 Sending msg of 28 bytes to 2 on channel businesschannel took 20µs" +peer0.org2.example.com | [cd0 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | [c2b 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367b4a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [c0b 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:06.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf3 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | [c2c 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367b4a0 gate 1598907073501868700 evaluation succeeds +orderer0.example.com | "2020-08-31 20:51:06.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 325.8µs " +peer1.org2.example.com | [c0c 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | [c2d 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:06.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 295.9µs " +peer1.org2.example.com | [c0d 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [c2e 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:06.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf6 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [c0e 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [ae3 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c2f 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:06.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf7 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [c0f 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [ae4 08-31 20:51:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [cd1 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002937680 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [c30 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:06.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [c11 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [ae5 08-31 20:51:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [cd2 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002937680 gate 1598907070237829200 evaluation succeeds +peer1.org1.example.com | [c31 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:06.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf9 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +peer1.org2.example.com | [c10 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [ae6 08-31 20:51:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | [cd3 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [c32 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-08-31 20:51:06.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 866.3µs " +peer1.org2.example.com | [c12 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [cd4 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [c33 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:51:07.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfb Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +peer1.org2.example.com | [c13 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [ae7 08-31 20:51:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | [cd5 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [c34 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:51:07.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfc Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +peer1.org2.example.com | [c14 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | [cd6 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [c35 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:51:07.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 906.2µs " +peer1.org2.example.com | [c15 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | [cd7 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | [c36 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c16 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:07.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 322.6µs " +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [c37 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c17 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:07.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU cff Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [cd8 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | [c38 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c18 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:07.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU d00 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [ae8 08-31 20:51:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | [c39 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [c19 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:07.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU d01 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [ae9 08-31 20:51:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | [c3a 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c1a 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:07.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d02 Sending msg of 28 bytes to 3 on channel testchainid took 20.9µs" +peer0.org1.example.com | [aea 08-31 20:51:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | [c3b 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c1b 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +orderer0.example.com | "2020-08-31 20:51:07.374 UTC [orderer.common.cluster.step] sendMessage -> DEBU d03 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52µs " +peer0.org1.example.com | [aeb 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [c3c 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c1c 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:07.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d04 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +peer0.org1.example.com | [aec 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cd9 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c3d 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [c1d 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:07.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d05 Sending msg of 28 bytes to 3 on channel businesschannel took 8.4µs" +peer0.org1.example.com | [aed 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cda 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer1.org1.example.com | [c3e 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\344\030\240\267\347]]\017\211>O\002 QF\200\004q4c\357\210\224\344I\330\243\367\026\301M\030\2000\364\216\370\357>\332\205\205\271*:" > +peer1.org2.example.com | [c1e 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:07.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU d06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.7µs " +peer0.org1.example.com | [aee 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [cdb 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c3f 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [c1f 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:07.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU d07 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 389.5µs " +peer0.org1.example.com | [aef 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [cdc 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c40 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c20 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-08-31 20:51:07.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU d08 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [af0 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [cdd 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c41 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [c21 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:07.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU d09 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [cde 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [af1 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer1.org1.example.com | [c42 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [c22 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:07.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [cdf 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [af2 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c43 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [c23 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:07.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0b Sending msg of 28 bytes to 3 on channel testchainid took 10µs" +peer0.org2.example.com | [ce0 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [af3 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [c44 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [c24 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:07.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.1µs " +peer0.org2.example.com | [ce1 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [ce2 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [ce3 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [ce4 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029511f0 gate 1598907070243235400 evaluation starts +orderer0.example.com | "2020-08-31 20:51:08.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0d Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" +peer0.org2.example.com | [ce5 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029511f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [af4 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c25 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [c45 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:08.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0e Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +peer0.org2.example.com | [ce6 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029511f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [af5 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [c26 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [c46 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:08.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.1µs " +peer0.org2.example.com | [ce7 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029511f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [af6 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [c27 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [c47 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:08.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU d10 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 558.6µs " +peer0.org2.example.com | [ce8 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029511f0 principal evaluation fails +peer0.org1.example.com | [af7 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [c28 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291e070 gate 1598907073561580900 evaluation starts +peer1.org1.example.com | [c48 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:08.170 UTC [orderer.common.cluster.step] handleMessage -> DEBU d12 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [ce9 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029511f0 gate 1598907070243235400 evaluation fails +peer0.org1.example.com | [af8 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [c29 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291e070 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c49 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:08.170 UTC [orderer.common.cluster.step] handleMessage -> DEBU d11 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [af9 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac970 gate 1598907066243733700 evaluation starts +peer0.org2.example.com | [cea 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c2a 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291e070 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [c4a 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-08-31 20:51:08.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU d13 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [afa 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac970 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [ceb 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c2b 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291e070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [c4b 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 7b 4b 5e 5c 7d fc 0e ff 8c 54 b1 23 0c ce 27 |B{K^\}....T.#..'| +orderer0.example.com | "2020-08-31 20:51:08.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d14 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +peer0.org1.example.com | [afb 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac970 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [cec 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [c2c 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291e070 principal evaluation fails +peer1.org1.example.com | 00000010 2a 02 60 e1 f1 29 d1 a5 9e f3 b6 cb 3b 47 84 0b |*.`..)......;G..| +orderer0.example.com | "2020-08-31 20:51:08.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU d15 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 592.4µs " +peer0.org1.example.com | [afc 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac970 principal matched by identity 0 +peer0.org2.example.com | [ced 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002951760 gate 1598907070245202400 evaluation starts +peer1.org2.example.com | [c2d 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291e070 gate 1598907073561580900 evaluation fails +peer1.org1.example.com | [c4c 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d ca 98 86 2f 16 ad de 8b a3 52 01 |0D. ].../.....R.| +orderer0.example.com | "2020-08-31 20:51:08.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d16 Sending msg of 28 bytes to 2 on channel businesschannel took 18µs" +peer0.org1.example.com | [afd 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | [cee 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002951760 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c2e 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 1e 50 64 87 e8 df f8 f1 f2 81 c1 91 16 ca 28 21 |.Pd...........(!| +orderer0.example.com | "2020-08-31 20:51:08.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d17 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [cef 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002951760 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [c2f 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 e9 ce a8 40 02 20 60 43 80 ab 5e 48 0a c4 ba 20 |...@. `C..^H... | +orderer0.example.com | "2020-08-31 20:51:08.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU d18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.7µs " +peer0.org1.example.com | [afe 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | [cf0 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002951760 principal matched by identity 0 +peer1.org2.example.com | [c30 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000030 c1 61 7e f2 86 b1 92 f7 94 f4 97 3f fc e9 34 9e |.a~........?..4.| +orderer0.example.com | "2020-08-31 20:51:08.666 UTC [orderer.common.cluster.step] handleMessage -> DEBU d19 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | [cf1 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | [c31 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291e600 gate 1598907073564523500 evaluation starts +peer1.org1.example.com | 00000040 7c bf f1 d1 ce 6b ||....k| +orderer0.example.com | "2020-08-31 20:51:08.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.1µs " +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [c32 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291e600 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c4d 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +orderer0.example.com | "2020-08-31 20:51:08.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | [cf2 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | [c33 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291e600 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +orderer0.example.com | "2020-08-31 20:51:08.873 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | [c34 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291e600 principal matched by identity 0 +peer1.org1.example.com | [c4e 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 90 33 fe 3d 42 5d 49 1e f6 11 de |0D. ..3.=B]I....| +orderer0.example.com | "2020-08-31 20:51:08.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1d Sending msg of 28 bytes to 3 on channel testchainid took 44.3µs" +peer0.org1.example.com | [aff 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac970 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | [c35 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 7b 4b 5e 5c 7d fc 0e ff 8c 54 b1 23 0c ce 27 |B{K^\}....T.#..'| +peer1.org1.example.com | 00000010 10 89 7f 5c c6 50 e5 71 ec 2f 96 98 94 2c 3f 5d |...\.P.q./...,?]| +orderer0.example.com | "2020-08-31 20:51:08.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.1µs " +peer0.org1.example.com | [b00 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac970 gate 1598907066243733700 evaluation succeeds +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000010 2a 02 60 e1 f1 29 d1 a5 9e f3 b6 cb 3b 47 84 0b |*.`..)......;G..| +peer1.org1.example.com | 00000020 80 20 3b 48 02 20 5f 83 03 99 57 98 6d 69 b6 20 |. ;H. _...W.mi. | +orderer0.example.com | "2020-08-31 20:51:09.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1f Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" +peer0.org1.example.com | [b01 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [c36 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d ca 98 86 2f 16 ad de 8b a3 52 01 |0D. ].../.....R.| +peer1.org1.example.com | 00000030 ab a9 28 33 93 6a 27 83 e0 4d 4b 97 b7 d5 f9 a3 |..(3.j'..MK.....| +orderer0.example.com | "2020-08-31 20:51:09.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d20 Sending msg of 28 bytes to 2 on channel businesschannel took 10.4µs" +peer0.org1.example.com | [b02 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [cf3 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002951760 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 1e 50 64 87 e8 df f8 f1 f2 81 c1 91 16 ca 28 21 |.Pd...........(!| +peer1.org1.example.com | 00000040 92 43 bc 77 c0 26 |.C.w.&| +orderer0.example.com | "2020-08-31 20:51:09.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.8µs " +peer0.org1.example.com | [b03 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [cf4 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002951760 gate 1598907070245202400 evaluation succeeds +peer1.org2.example.com | 00000020 e9 ce a8 40 02 20 60 43 80 ab 5e 48 0a c4 ba 20 |...@. `C..^H... | +peer1.org1.example.com | [c4f 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:09.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU d22 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [b04 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [cf5 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000030 c1 61 7e f2 86 b1 92 f7 94 f4 97 3f fc e9 34 9e |.a~........?..4.| +peer1.org1.example.com | [c50 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +orderer0.example.com | "2020-08-31 20:51:09.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d23 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 333.8µs " +peer0.org1.example.com | [b05 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b06 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b07 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org1.example.com | [b08 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [cf6 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [b09 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b0a 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [c51 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [c52 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [cf7 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [b0b 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:09.170 UTC [orderer.common.cluster.step] handleMessage -> DEBU d24 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [c53 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | 00000040 7c bf f1 d1 ce 6b ||....k| +peer0.org2.example.com | [cf8 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [b0c 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:09.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU d25 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [c54 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c37 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291e600 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [cf9 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b0d 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:09.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d26 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +peer1.org1.example.com | [c55 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c38 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291e600 gate 1598907073564523500 evaluation succeeds +peer0.org2.example.com | [cfa 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b0e 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:09.374 UTC [orderer.common.cluster.step] sendMessage -> DEBU d27 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 319.2µs " +peer1.org1.example.com | [c56 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c39 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [cfb 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b0f 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:09.402 UTC [orderer.common.server] Broadcast -> DEBU d28 Starting new Broadcast handler" +peer1.org1.example.com | [c57 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [c3a 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [cfc 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b10 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c42d0 gate 1598907066260554700 evaluation starts +orderer0.example.com | "2020-08-31 20:51:09.402 UTC [orderer.common.broadcast] Handle -> DEBU d29 Starting new broadcast loop for 172.18.0.9:50818" +peer1.org1.example.com | [c58 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c3b 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [cfd 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b11 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c42d0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:09.667 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2a Sending msg of 28 bytes to 2 on channel businesschannel took 49.5µs" +peer1.org1.example.com | [c59 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c3c 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [cfe 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [b12 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c42d0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:09.667 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2b Sending msg of 28 bytes to 3 on channel businesschannel took 23.7µs" +peer1.org1.example.com | [c5a 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [c3d 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [cff 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [b13 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c42d0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:51:09.668 UTC [orderer.common.cluster.step] sendMessage -> DEBU d2c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 827.1µs " +peer1.org2.example.com | [c3e 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [c5b 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\344\030\240\267\347]]\017\211>O\002 QF\200\004q4c\357\210\224\344I\330\243\367\026\301M\030\2000\364\216\370\357>\332\205\205\271*:" > +peer0.org2.example.com | [d00 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [b14 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +orderer0.example.com | "2020-08-31 20:51:09.670 UTC [orderer.common.cluster.step] sendMessage -> DEBU d2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.3467ms " +peer1.org2.example.com | [c3f 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [c5c 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [d01 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6960 gate 1598907070248296600 evaluation starts +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +orderer0.example.com | "2020-08-31 20:51:09.671 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [c40 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [c5d 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d02 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6960 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [b15 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +orderer0.example.com | "2020-08-31 20:51:09.672 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2f Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [c41 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [c5e 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [d03 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6960 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +orderer0.example.com | "2020-08-31 20:51:09.875 UTC [orderer.common.cluster.step] handleMessage -> DEBU d30 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [c42 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c5f 08-31 20:51:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [d04 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +orderer0.example.com | "2020-08-31 20:51:09.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d31 Sending msg of 28 bytes to 3 on channel testchainid took 28.4µs" +peer1.org2.example.com | [c43 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c60 08-31 20:51:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d05 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6960 principal evaluation fails +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +orderer0.example.com | "2020-08-31 20:51:09.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU d32 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.7µs " +peer1.org2.example.com | [c44 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c61 08-31 20:51:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d06 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6960 gate 1598907070248296600 evaluation fails +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +orderer0.example.com | "2020-08-31 20:51:10.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d33 Sending msg of 28 bytes to 2 on channel businesschannel took 30.3µs" +peer1.org2.example.com | [c45 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [c62 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [d07 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b16 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c42d0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:10.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d34 Sending msg of 28 bytes to 3 on channel businesschannel took 20.9µs" +peer1.org2.example.com | [c46 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c63 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [d08 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b17 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c42d0 gate 1598907066260554700 evaluation succeeds +orderer0.example.com | "2020-08-31 20:51:10.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU d35 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 172.4µs " +peer1.org2.example.com | [c47 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c64 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [d09 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [b18 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:10.169 UTC [orderer.common.cluster.step] handleMessage -> DEBU d36 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [c48 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c65 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [d0a 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6ed0 gate 1598907070248552100 evaluation starts +peer0.org1.example.com | [b19 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:10.170 UTC [orderer.common.cluster.step] sendMessage -> DEBU d37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 4.2719ms " +peer1.org2.example.com | [c49 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [c66 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d0b 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6ed0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [b1a 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:10.172 UTC [orderer.common.cluster.step] handleMessage -> DEBU d38 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [c67 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [c4a 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [d0c 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6ed0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [b1b 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:10.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU d39 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [c68 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [c4b 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [d0d 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6ed0 principal matched by identity 0 +peer0.org1.example.com | [b1c 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:10.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3a Sending msg of 28 bytes to 3 on channel testchainid took 18.7µs" +peer1.org1.example.com | [c69 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 e0 8f d1 e2 4e d6 e3 6a e8 54 d0 a3 bb 1e 5b |e....N..j.T....[| +peer1.org2.example.com | [c4c 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b1d 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d0e 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | "2020-08-31 20:51:10.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 428.2µs " +peer1.org1.example.com | 00000010 a9 f7 fb 13 c1 ee 55 74 41 80 65 86 ff c9 e8 22 |......UtA.e...."| +peer1.org2.example.com | [c4d 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [b1e 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:51:10.667 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3c Sending msg of 28 bytes to 2 on channel businesschannel took 32.8µs" +peer1.org1.example.com | [c6a 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 36 0e b1 08 61 13 18 91 ba f9 |0E.!..6...a.....| +peer1.org2.example.com | [c4e 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b1f 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [d0f 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:51:10.667 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3d Sending msg of 28 bytes to 3 on channel businesschannel took 23.4µs" +peer1.org1.example.com | 00000010 70 80 fe a6 ea 82 8f b5 89 a5 f8 9d 97 f6 9b 21 |p..............!| +peer1.org2.example.com | [c4f 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b20 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | "2020-08-31 20:51:10.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.3µs " +peer1.org1.example.com | 00000020 65 f0 8b 97 cd 02 20 59 a0 70 da 6d 1b 87 23 1f |e..... Y.p.m..#.| +peer1.org2.example.com | [c50 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b21 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | "2020-08-31 20:51:10.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.1µs " +peer1.org1.example.com | 00000030 98 3a 4f 89 ae 2e 78 62 b9 ef 4c db f5 5a 1f cc |.:O...xb..L..Z..| +peer1.org2.example.com | [c51 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b22 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | "2020-08-31 20:51:10.669 UTC [orderer.common.cluster.step] handleMessage -> DEBU d40 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | 00000040 a2 38 b8 f1 ef d2 f3 |.8.....| +peer1.org2.example.com | [c52 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [b23 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | "2020-08-31 20:51:10.669 UTC [orderer.common.cluster.step] handleMessage -> DEBU d41 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [c6b 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [c53 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [b24 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [d10 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6ed0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:10.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU d42 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [c6c 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c54 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b25 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +peer0.org2.example.com | [d11 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6ed0 gate 1598907070248552100 evaluation succeeds +orderer0.example.com | "2020-08-31 20:51:10.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d43 Sending msg of 28 bytes to 3 on channel testchainid took 27.4µs" +peer1.org1.example.com | [c6d 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org2.example.com | [c55 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b26 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d12 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:51:10.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU d44 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.9µs " +peer1.org1.example.com | [c6e 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org2.example.com | [c56 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d13 08-31 20:51:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [b27 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:11.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d45 Sending msg of 28 bytes to 2 on channel businesschannel took 32.7µs" +peer1.org1.example.com | [c6f 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org2.example.com | [c57 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d14 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [b28 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:11.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d46 Sending msg of 28 bytes to 3 on channel businesschannel took 23µs" +orderer0.example.com | "2020-08-31 20:51:11.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.2µs " +peer1.org1.example.com | [c70 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer0.org2.example.com | [d15 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [b29 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:11.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU d48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 189.6µs " +peer1.org1.example.com | [c71 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c58 08-31 20:51:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [d16 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | [b2a 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:11.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU d49 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [c72 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [c59 08-31 20:51:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [b2b 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:11.169 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4a Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [c73 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [c5a 08-31 20:51:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d17 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | [b2c 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [c74 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:11.375 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [c5b 08-31 20:51:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [b2d 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5b60 gate 1598907066495163300 evaluation starts +peer1.org1.example.com | [c75 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:11.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4c Sending msg of 28 bytes to 3 on channel testchainid took 59.5µs" +peer1.org2.example.com | [c5c 08-31 20:51:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | [b2e 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5b60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c76 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:11.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174.4µs " +peer1.org2.example.com | [c5d 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | [b2f 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5b60 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [c77 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:11.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4e Sending msg of 28 bytes to 2 on channel businesschannel took 35.5µs" +peer1.org2.example.com | [c5e 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [b30 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5b60 principal matched by identity 0 +peer1.org1.example.com | [c78 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:11.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4f Sending msg of 28 bytes to 3 on channel businesschannel took 25.7µs" +peer1.org2.example.com | [c5f 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [d18 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b31 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | [c79 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:11.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU d50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 215.9µs " +peer1.org2.example.com | [c60 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org2.example.com | [d19 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [c7a 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:11.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU d51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 169.1µs " +peer1.org2.example.com | [c61 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d1a 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b32 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | [c7b 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:11.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU d52 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [c62 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer0.org2.example.com | [d1b 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | [c7c 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:11.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU d53 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [c63 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer0.org2.example.com | [d1c 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | [c7d 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:11.876 UTC [orderer.common.cluster.step] handleMessage -> DEBU d54 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [c64 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [d1d 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | [c7e 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:11.877 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d55 Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" +peer1.org2.example.com | [c65 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D981610041801 +peer0.org2.example.com | [d1e 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [c7f 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:11.878 UTC [orderer.common.cluster.step] sendMessage -> DEBU d56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 291.3µs " +peer1.org2.example.com | [c66 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CBF92D575EE9E7F6B9CA3D8A69D0902B3C7334DB3337DC195A35B991056620AC +peer0.org2.example.com | [d1f 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b33 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5b60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [c80 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:12.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d57 Sending msg of 28 bytes to 2 on channel businesschannel took 47.5µs" +peer1.org2.example.com | [c67 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer0.org2.example.com | [d20 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [b34 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5b60 gate 1598907066495163300 evaluation succeeds +peer1.org1.example.com | [c81 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:12.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d58 Sending msg of 28 bytes to 3 on channel businesschannel took 17.7µs" +peer1.org2.example.com | [c68 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d21 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [b35 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c82 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:12.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d59 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.4µs " +peer1.org2.example.com | [c69 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d22 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [b36 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c83 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:12.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 552.1µs " +peer1.org2.example.com | [c6a 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d23 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029dab50 gate 1598907070253548800 evaluation starts +peer0.org1.example.com | [b37 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [c84 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cb4100 gate 1598907073999092100 evaluation starts +orderer0.example.com | "2020-08-31 20:51:12.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5b Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [c6b 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d24 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029dab50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [b38 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [c85 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cb4100 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:12.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [c6c 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [d25 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029dab50 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [b39 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c86 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cb4100 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:12.379 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [c6d 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d26 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029dab50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [b3a 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c87 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cb4100 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:51:12.379 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5e Sending msg of 28 bytes to 3 on channel testchainid took 67.7µs" +peer1.org2.example.com | [c6e 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d27 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029dab50 principal evaluation fails +peer0.org1.example.com | [b3b 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to peer1.org2.example.com:7051 +peer1.org1.example.com | [c88 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | "2020-08-31 20:51:12.380 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.8µs " +peer0.org2.example.com | [d28 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029dab50 gate 1598907070253548800 evaluation fails +peer1.org2.example.com | [c6f 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [b3c 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +orderer0.example.com | "2020-08-31 20:51:12.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d60 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +peer0.org2.example.com | [d29 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [c70 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b3d 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to peer0.org2.example.com:7051 +peer1.org1.example.com | [c89 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | "2020-08-31 20:51:12.667 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d61 Sending msg of 28 bytes to 3 on channel businesschannel took 21.2µs" +peer0.org2.example.com | [d2a 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [d2b 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [c71 08-31 20:51:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +orderer0.example.com | "2020-08-31 20:51:12.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU d62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.2µs " +peer0.org2.example.com | [d2c 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029db0c0 gate 1598907070254574000 evaluation starts +peer1.org2.example.com | [c72 08-31 20:51:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b3e 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | "2020-08-31 20:51:12.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU d63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 934.3µs " +peer0.org2.example.com | [d2d 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029db0c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c73 08-31 20:51:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [b3f 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +orderer0.example.com | "2020-08-31 20:51:12.670 UTC [orderer.common.cluster.step] handleMessage -> DEBU d64 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [d2e 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029db0c0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [c74 08-31 20:51:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [b40 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +orderer0.example.com | "2020-08-31 20:51:12.670 UTC [orderer.common.cluster.step] handleMessage -> DEBU d65 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [c75 08-31 20:51:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d2f 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029db0c0 principal matched by identity 0 +peer0.org1.example.com | [b41 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [c8a 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cb4100 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:12.875 UTC [orderer.common.cluster.step] handleMessage -> DEBU d66 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [c76 08-31 20:51:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [d30 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | [b42 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [c8b 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cb4100 gate 1598907073999092100 evaluation succeeds +orderer0.example.com | "2020-08-31 20:51:12.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d67 Sending msg of 28 bytes to 3 on channel testchainid took 22.3µs" +peer1.org2.example.com | [c77 08-31 20:51:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [b43 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16864709295300465862, Envelope: 958 bytes, Signature: 0 bytes +peer1.org1.example.com | [c8c 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:12.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU d68 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 631.3µs " +peer1.org2.example.com | [c78 08-31 20:51:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [d31 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | [b44 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16864709295300465862, Envelope: 958 bytes, Signature: 0 bytes +peer1.org1.example.com | [c8d 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:13.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d69 Sending msg of 28 bytes to 2 on channel businesschannel took 58.1µs" +peer1.org2.example.com | [c79 08-31 20:51:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | [b45 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [c8e 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:13.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6a Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +peer1.org2.example.com | [c7a 08-31 20:51:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | [b46 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [c8f 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:13.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102µs " +peer1.org2.example.com | [c7b 08-31 20:51:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | [b47 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c90 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:13.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.2µs " +peer1.org2.example.com | [c7c 08-31 20:51:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [b48 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [c91 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:13.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6d Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [c7d 08-31 20:51:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d32 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029db0c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [b49 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [c92 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:13.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [c7e 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [d33 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029db0c0 gate 1598907070254574000 evaluation succeeds +peer0.org1.example.com | [b4a 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [c93 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:13.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [c7f 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d34 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [b4b 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [c94 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:13.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d70 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +peer1.org2.example.com | [c80 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d35 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [b4c 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036adef0 gate 1598907066516246000 evaluation starts +peer1.org1.example.com | [c95 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [c81 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:13.374 UTC [orderer.common.cluster.step] sendMessage -> DEBU d71 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.9µs " +peer0.org2.example.com | [d36 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [b4d 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036adef0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [c96 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [c82 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:13.483 UTC [orderer.common.server] replicateDisabledChains -> DEBU d72 No inactive chains to try to replicate" +peer0.org2.example.com | [d37 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [b4e 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036adef0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [c97 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [c83 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:13.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d73 Sending msg of 28 bytes to 2 on channel businesschannel took 83.2µs" +peer0.org2.example.com | [d38 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b50 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17496144708945142343, Envelope: 962 bytes, Signature: 0 bytes +peer1.org1.example.com | [c98 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c7f820 gate 1598907074003985100 evaluation starts +peer1.org2.example.com | [c84 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ccd10 gate 1598907074501598500 evaluation starts +orderer0.example.com | "2020-08-31 20:51:13.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d74 Sending msg of 28 bytes to 3 on channel businesschannel took 25.9µs" +peer0.org2.example.com | [d39 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b4f 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036adef0 principal matched by identity 0 +peer1.org1.example.com | [c99 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c7f820 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [c85 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ccd10 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:13.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU d75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 400.8µs " +peer0.org2.example.com | [d3a 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [b51 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ea 79 63 7f 04 88 19 83 be cb 2d 77 29 da 67 |..yc.......-w).g| +peer1.org1.example.com | [c9a 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c7f820 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:13.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU d76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 413.6µs " +peer0.org2.example.com | [d3b 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 71 a3 58 87 1c ba 8b be 44 c8 a4 39 47 38 cb 9b |q.X.....D..9G8..| +peer1.org1.example.com | [c9b 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c7f820 principal matched by identity 0 +peer1.org2.example.com | [c86 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ccd10 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:13.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU d77 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [d3c 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b52 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 33 8c 2c fe 58 22 8c a8 e4 91 |0E.!..3.,.X"....| +peer1.org1.example.com | [c9c 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | [c87 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ccd10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:51:13.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU d78 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [d3d 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 88 90 ce c8 fc 50 7a 0b b0 78 9c 29 7b f6 3d 93 |.....Pz..x.){.=.| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [c88 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ccd10 principal evaluation fails +orderer0.example.com | "2020-08-31 20:51:13.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU d79 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | 00000020 57 1a 9e b3 e6 02 20 62 19 16 58 7c f8 0f 8c 96 |W..... b..X|....| +peer1.org1.example.com | [c9d 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | [c89 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029ccd10 gate 1598907074501598500 evaluation fails +orderer0.example.com | "2020-08-31 20:51:13.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7a Sending msg of 28 bytes to 3 on channel testchainid took 33.6µs" +peer0.org2.example.com | [d3e 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000030 d3 36 65 f9 ec 7c 8f ac 08 e1 33 26 1d 93 16 63 |.6e..|....3&...c| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | [c8a 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:13.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100µs " +peer0.org2.example.com | [d3f 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 30 89 11 53 29 96 fa |0..S)..| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | [c8b 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:14.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7c Sending msg of 28 bytes to 2 on channel businesschannel took 116.9µs" +peer0.org2.example.com | [d40 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | [b53 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036adef0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | [c8c 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:14.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7d Sending msg of 28 bytes to 3 on channel businesschannel took 23.4µs" +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | [b54 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036adef0 gate 1598907066516246000 evaluation succeeds +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [c8d 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029cd280 gate 1598907074504767600 evaluation starts +orderer0.example.com | "2020-08-31 20:51:14.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.6µs " +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | [b55 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c9e 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c7f820 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [c8e 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029cd280 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:14.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.2µs " +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | [b56 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [c9f 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c7f820 gate 1598907074003985100 evaluation succeeds +peer1.org2.example.com | [c8f 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029cd280 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:14.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU d80 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [b57 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [c90 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029cd280 principal matched by identity 0 +peer1.org1.example.com | [ca0 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:14.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU d81 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [d41 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b58 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [c91 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | [ca1 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:14.375 UTC [orderer.common.cluster.step] handleMessage -> DEBU d82 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [d42 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b59 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [ca2 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:14.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d83 Sending msg of 28 bytes to 3 on channel testchainid took 37.3µs" +peer0.org2.example.com | [d43 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b5a 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [c92 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | [ca3 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:14.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU d84 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 6.7071ms " +peer0.org1.example.com | [b5b 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16864709295300465862, Envelope: 958 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | [ca4 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | [d44 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:14.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d85 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +peer0.org1.example.com | [b5c 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [d45 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:14.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d86 Sending msg of 28 bytes to 3 on channel businesschannel took 21.3µs" +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | [ca5 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | [d46 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:14.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU d87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.7µs " +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [b5d 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | [d47 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:14.668 UTC [orderer.common.cluster.step] sendMessage -> DEBU d88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.4508ms " +peer1.org2.example.com | [c93 08-31 20:51:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029cd280 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [b5e 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | [d48 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:14.670 UTC [orderer.common.cluster.step] handleMessage -> DEBU d89 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [c94 08-31 20:51:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b5f 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | [d49 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:14.670 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [c95 08-31 20:51:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b60 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 75 47 48 75 66 88 106 53 54 48 88 50 52 104 73 76 107 50 57 115 51 68 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 97 100 106 84 100 70 104 47 53 100 55 65 10 110 56 48 120 68 68 114 104 114 53 103 109 83 115 119 47 55 82 105 68 114 68 83 84 72 109 103 71 113 55 72 90 78 120 89 89 53 82 85 109 71 102 111 43 118 83 73 43 121 55 77 85 98 73 103 113 103 114 90 105 97 106 80 50 10 122 43 52 55 116 74 84 43 104 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 75 102 97 84 82 51 49 121 113 83 90 111 112 89 55 114 80 101 118 118 86 52 67 122 53 81 113 85 116 73 79 67 81 65 65 90 115 75 110 82 86 84 48 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 102 84 70 55 51 101 57 100 122 81 43 98 72 116 49 87 86 105 54 43 84 65 97 115 109 113 81 68 52 79 85 103 100 105 121 70 117 77 52 108 116 99 81 67 73 66 120 67 73 119 122 43 10 51 120 73 103 115 51 115 121 99 97 47 86 101 122 101 57 121 118 76 48 77 111 81 57 82 101 112 115 67 97 51 86 103 118 117 118 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [d4a 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f29b0 gate 1598907070259534000 evaluation starts +orderer0.example.com | "2020-08-31 20:51:14.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [c96 08-31 20:51:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [b61 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Added N�@�����9�\F���`�y(כ���Jt� to the in memory item map, total items: 3 +peer1.org1.example.com | [ca6 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d4b 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f29b0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:14.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8c Sending msg of 28 bytes to 3 on channel testchainid took 23.6µs" +peer1.org2.example.com | [c97 08-31 20:51:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029cd280 gate 1598907074504767600 evaluation succeeds +peer1.org1.example.com | [ca7 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b62 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d4c 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f29b0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:14.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.4µs " +peer1.org2.example.com | [c98 08-31 20:51:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ca8 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b63 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17496144708945142343, Envelope: 962 bytes, Signature: 0 bytes +peer0.org2.example.com | [d4d 08-31 20:51:10.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f29b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:51:15.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8e Sending msg of 28 bytes to 2 on channel businesschannel took 22.8µs" +peer1.org2.example.com | [c99 08-31 20:51:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ca9 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b64 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d4e 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f29b0 principal evaluation fails +orderer0.example.com | "2020-08-31 20:51:15.167 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8f Sending msg of 28 bytes to 3 on channel businesschannel took 34µs" +peer1.org2.example.com | [c9a 08-31 20:51:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [caa 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b65 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:15.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU d90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.9µs " +peer1.org2.example.com | [c9c 08-31 20:51:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [cab 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [b66 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:15.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU d91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.6µs " +peer0.org2.example.com | [d4f 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f29b0 gate 1598907070259534000 evaluation fails +peer1.org2.example.com | [c9d 08-31 20:51:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [cac 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [b67 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:15.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU d92 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [c9e 08-31 20:51:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [d50 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [cad 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [b68 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:15.169 UTC [orderer.common.cluster.step] handleMessage -> DEBU d93 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [c9f 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [d51 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [cae 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d05110 gate 1598907074006223400 evaluation starts +peer0.org1.example.com | [b69 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:15.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU d94 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [d52 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [caf 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d05110 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [b6a 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:15.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d95 Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" +peer1.org2.example.com | [ca0 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | [d53 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f2f20 gate 1598907070260845900 evaluation starts +peer1.org1.example.com | [cb0 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d05110 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [b6b 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003720880 gate 1598907066526177900 evaluation starts +orderer0.example.com | "2020-08-31 20:51:15.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU d96 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 772.6µs " +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [d54 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f2f20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [cb1 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d05110 principal matched by identity 0 +peer0.org1.example.com | [b6c 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003720880 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:15.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d97 Sending msg of 28 bytes to 2 on channel businesschannel took 20.8µs" +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | [d55 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f2f20 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [cb2 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | [b6d 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003720880 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +orderer0.example.com | "2020-08-31 20:51:15.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d98 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +peer0.org2.example.com | [d56 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f2f20 principal matched by identity 0 +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [b6e 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003720880 principal matched by identity 0 +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +orderer0.example.com | "2020-08-31 20:51:15.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU d99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.6µs " +peer0.org2.example.com | [d57 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | [cb3 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | [b6f 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 25 f6 22 1c d3 e4 fd 28 6d f6 b0 4b 35 35 b6 |.%."....(m..K55.| +peer1.org2.example.com | [c9b 08-31 20:51:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:15.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.2µs " +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000010 b7 57 78 91 67 e7 fe 5a cf 4c 44 4e 25 37 10 23 |.Wx.g..Z.LDN%7.#| +peer1.org2.example.com | [ca1 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:15.666 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [d58 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | [b70 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 08 73 47 bc f3 8c 1f 9f 8d bd |0E.!...sG.......| +peer1.org2.example.com | [ca2 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:15.666 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9c Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000010 52 c7 75 74 c8 ca c9 e7 5a 06 db ef 9f ab c9 6a |R.ut....Z......j| +peer1.org2.example.com | [ca3 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:15.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | 00000020 2a 06 27 12 e5 02 20 57 7e 9f be cb 71 bb 2d f5 |*.'... W~...q.-.| +peer1.org2.example.com | [ca4 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:15.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9e Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | [cb4 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 a1 a2 a0 f8 13 3e 6d 22 eb 81 2f 3a b2 ac 63 57 |.....>m"../:..cW| +peer1.org2.example.com | [ca5 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:15.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.6µs " +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [cb5 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 cd 6a 32 a0 2d 76 78 |.j2.-vx| +peer1.org2.example.com | [ca6 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:16.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da0 Sending msg of 28 bytes to 2 on channel businesschannel took 53.6µs" +peer0.org2.example.com | [d59 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f2f20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [cb6 08-31 20:51:14.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [b71 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003720880 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [ca7 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:16.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da1 Sending msg of 28 bytes to 3 on channel businesschannel took 56.2µs" +peer0.org2.example.com | [d5a 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f2f20 gate 1598907070260845900 evaluation succeeds +peer1.org1.example.com | [cb7 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b72 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003720880 gate 1598907066526177900 evaluation succeeds +peer1.org2.example.com | [ca8 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:16.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU da2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.6µs " +peer0.org2.example.com | [d5b 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [cb8 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b73 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:16.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU da3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 189.7µs " +peer0.org2.example.com | [d5c 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [cb9 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [b74 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [ca9 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:16.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU da4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [d5d 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [cba 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [b75 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [caa 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:16.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU da5 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [d5e 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [cbb 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [b76 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [cab 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029facb0 gate 1598907074522341600 evaluation starts +orderer0.example.com | "2020-08-31 20:51:16.375 UTC [orderer.common.cluster.step] handleMessage -> DEBU da6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [d5f 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | [cbc 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [b77 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cac 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029facb0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:16.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da7 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [cbd 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d05110 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [cad 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029facb0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [b78 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:16.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU da8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.5µs " +peer0.org2.example.com | [d60 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | [cbe 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d05110 gate 1598907074006223400 evaluation succeeds +peer1.org2.example.com | [cae 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029facb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [b79 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17496144708945142343, Envelope: 962 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:16.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da9 Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | [cbf 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [caf 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029facb0 principal evaluation fails +peer0.org1.example.com | [b7a 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:16.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU daa Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | [cc0 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [cb0 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029facb0 gate 1598907074522341600 evaluation fails +peer0.org1.example.com | [b7b 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:16.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU dab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83µs " +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | [cb1 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [cc1 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [b7c 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:16.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU dac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 120.8µs " +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [cb2 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [cc2 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [b7d 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:16.666 UTC [orderer.common.cluster.step] handleMessage -> DEBU dad Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [d61 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [cc3 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | [cb3 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:16.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU dae Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [b7e 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 77 114 85 53 109 108 114 103 84 49 82 104 120 79 108 113 83 65 121 80 83 99 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 70 102 72 121 75 118 101 70 56 113 81 10 52 54 73 90 51 80 88 97 97 57 49 118 101 113 83 111 97 99 98 86 119 52 69 80 106 120 111 47 118 43 70 105 86 50 50 108 101 86 114 86 80 98 88 47 109 82 86 104 69 52 86 67 78 51 69 122 113 49 109 112 43 66 79 81 10 83 80 110 55 109 77 86 43 74 50 50 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 67 110 50 107 48 100 57 99 113 107 109 97 75 87 79 54 122 51 114 55 49 101 65 115 43 85 75 108 76 83 68 103 107 65 65 71 98 67 112 48 86 85 57 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 66 115 112 70 108 117 53 110 90 88 109 49 83 112 49 70 85 72 69 47 89 111 108 57 68 117 102 85 104 115 54 79 109 76 102 82 75 117 83 83 119 121 106 65 105 65 97 88 107 87 87 10 104 98 89 77 116 53 73 103 68 97 77 51 83 70 86 47 107 54 49 71 77 120 84 112 75 68 103 90 71 71 117 103 72 78 68 68 108 103 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +peer0.org2.example.com | [d62 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [cb4 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029fb220 gate 1598907074523521800 evaluation starts +orderer0.example.com | "2020-08-31 20:51:16.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU daf Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [b7f 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Added ����)�����H�5���K��q���2���( to the in memory item map, total items: 4 +peer0.org2.example.com | [d63 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [cc4 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | [cb5 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029fb220 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:16.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db0 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +peer0.org1.example.com | [b80 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [d64 08-31 20:51:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | [cb6 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029fb220 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:16.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU db1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.3µs " +peer0.org1.example.com | [b81 08-31 20:51:07.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36764 +peer0.org2.example.com | [d65 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | [cb7 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029fb220 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:51:17.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db2 Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +peer0.org1.example.com | [b82 08-31 20:51:07.22 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0036b7180 +peer0.org2.example.com | [d66 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | [cb8 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | "2020-08-31 20:51:17.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db3 Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +peer0.org1.example.com | [b83 08-31 20:51:07.22 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [d67 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | "2020-08-31 20:51:17.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU db4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 143.3µs " +peer0.org1.example.com | [b84 08-31 20:51:07.22 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [d68 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [cc5 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [cb9 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | "2020-08-31 20:51:17.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU db5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.6µs " +peer0.org1.example.com | [b85 08-31 20:51:07.22 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org2.example.com | [d69 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [cc6 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +orderer0.example.com | "2020-08-31 20:51:17.166 UTC [orderer.common.cluster.step] handleMessage -> DEBU db6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [b86 08-31 20:51:07.22 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [d6a 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [cc7 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +orderer0.example.com | "2020-08-31 20:51:17.166 UTC [orderer.common.cluster.step] handleMessage -> DEBU db7 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [b87 08-31 20:51:07.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f b7 ce de d4 72 ca 97 07 e5 d9 e9 d3 08 a3 d9 |.....r..........| +peer0.org2.example.com | [d6b 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +orderer0.example.com | "2020-08-31 20:51:17.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU db8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | 00000010 a6 9a ab 80 96 d1 5d 0d 59 ac 17 4d 98 3b dd 26 |......].Y..M.;.&| +peer1.org1.example.com | [cc8 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | [d6c 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +orderer0.example.com | "2020-08-31 20:51:17.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db9 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +peer0.org1.example.com | [b88 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 1e 24 de 7a 17 3a 4e 5a d6 70 da |0D. k.$.z.:NZ.p.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | [d6d 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [cba 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029fb220 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:17.374 UTC [orderer.common.cluster.step] sendMessage -> DEBU dba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.2µs " +peer0.org1.example.com | 00000010 c2 7f 1e c0 54 2d e0 63 4f 7a 5a 91 75 11 d8 ab |....T-.cOzZ.u...| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | [d6e 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [cbb 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029fb220 gate 1598907074523521800 evaluation succeeds +orderer0.example.com | "2020-08-31 20:51:17.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbb Sending msg of 28 bytes to 2 on channel businesschannel took 26.3µs" +peer0.org1.example.com | 00000020 1f 14 66 af 02 20 02 3f 96 7a 76 0e c5 87 d2 9a |..f.. .?.zv.....| +orderer0.example.com | "2020-08-31 20:51:17.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbc Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | [d6f 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [cbc 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000030 2b f7 73 59 75 19 45 77 12 b5 94 d4 6d c1 76 31 |+.sYu.Ew....m.v1| +orderer0.example.com | "2020-08-31 20:51:17.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.3µs " +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [d70 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e504a0 gate 1598907070317201100 evaluation starts +peer0.org1.example.com | 00000040 41 4d e6 96 38 e3 |AM..8.| +peer1.org1.example.com | [cc9 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:17.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.6µs " +peer1.org2.example.com | [cbd 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [d71 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e504a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [b89 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [cca 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:17.666 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbf Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [cbe 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [d72 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e504a0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [b8a 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003519180, header 0xc0036b7590 +peer1.org1.example.com | [ccb 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:17.666 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc0 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [cbf 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [d73 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e504a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [b8b 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer1.org1.example.com | [ccc 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:17.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [cc0 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | [d74 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e504a0 principal evaluation fails +peer0.org1.example.com | [b8c 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU [][3e6121d1] processing txid: 3e6121d142f3532efc3688fd85c8ec47e09ff474db3bf327d3ff33291c4fe50d +peer1.org1.example.com | [ccd 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:17.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc2 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [d75 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e504a0 gate 1598907070317201100 evaluation fails +peer0.org1.example.com | [b8d 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU [][3e6121d1] Entry chaincode: name:"lscc" +peer1.org1.example.com | [cce 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:17.874 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65µs " +peer1.org2.example.com | [cc1 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | [d76 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b8e 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> INFO [][3e6121d1] Entry chaincode: name:"lscc" +peer1.org1.example.com | [ccf 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:18.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc4 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +peer0.org2.example.com | [d77 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [b8f 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [cd0 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:18.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc5 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +peer0.org2.example.com | [d78 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [b90 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f b7 ce de d4 72 ca 97 07 e5 d9 e9 d3 08 a3 d9 |.....r..........| +peer1.org1.example.com | [cd1 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d33290 gate 1598907074022172600 evaluation starts +orderer0.example.com | "2020-08-31 20:51:18.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.7µs " +peer0.org2.example.com | [d79 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e50a30 gate 1598907070317604400 evaluation starts +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000010 a6 9a ab 80 96 d1 5d 0d 59 ac 17 4d 98 3b dd 26 |......].Y..M.;.&| +peer1.org1.example.com | [cd2 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d33290 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:18.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.3µs " +peer0.org2.example.com | [d7a 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e50a30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | [b91 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 1e 24 de 7a 17 3a 4e 5a d6 70 da |0D. k.$.z.:NZ.p.| +peer1.org1.example.com | [cd3 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d33290 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:18.166 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [d7b 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e50a30 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | 00000010 c2 7f 1e c0 54 2d e0 63 4f 7a 5a 91 75 11 d8 ab |....T-.cOzZ.u...| +peer1.org1.example.com | [cd4 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d33290 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:51:18.166 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc9 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [d7c 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e50a30 principal matched by identity 0 +peer1.org2.example.com | [cc2 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 1f 14 66 af 02 20 02 3f 96 7a 76 0e c5 87 d2 9a |..f.. .?.zv.....| +peer1.org1.example.com | [cd5 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | "2020-08-31 20:51:18.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU dca Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [d7d 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 91 20 92 8e 48 a6 b6 19 57 df 95 3d 88 3d e5 |h. ..H...W..=.=.| +peer1.org2.example.com | [cc3 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 2b f7 73 59 75 19 45 77 12 b5 94 d4 6d c1 76 31 |+.sYu.Ew....m.v1| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +orderer0.example.com | "2020-08-31 20:51:18.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcb Sending msg of 28 bytes to 3 on channel testchainid took 27.2µs" +peer0.org2.example.com | 00000010 66 b4 0b 81 d5 85 0b e6 77 2d 0e b6 d4 68 63 44 |f.......w-...hcD| +peer1.org2.example.com | [cc4 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 41 4d e6 96 38 e3 |AM..8.| +peer1.org1.example.com | [cd6 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | "2020-08-31 20:51:18.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.2µs " +peer0.org2.example.com | [d7e 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 c6 d4 3b 78 e3 47 4a 19 13 74 |0E.!....;x.GJ..t| +peer1.org2.example.com | [cc5 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [b92 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +orderer0.example.com | "2020-08-31 20:51:18.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcd Sending msg of 28 bytes to 2 on channel businesschannel took 55.2µs" +peer0.org2.example.com | 00000010 dd fe ae e6 cb b5 19 c9 92 3e e4 18 a0 b7 e7 5d |.........>.....]| +peer1.org2.example.com | [cc6 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | [b93 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | "2020-08-31 20:51:18.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dce Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +peer0.org2.example.com | 00000020 5d 0f 89 3e 4f 02 20 51 46 80 04 71 34 63 ef 88 |]..>O. QF..q4c..| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [b94 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +orderer0.example.com | "2020-08-31 20:51:18.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86µs " +peer0.org2.example.com | 00000030 94 e4 49 d8 a3 f7 16 c1 4d 18 80 30 f4 8e f8 ef |..I.....M..0....| +peer1.org2.example.com | [cc7 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | [b95 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [0755046a-dc1b-411f-9854-c2fc6e4cc255] +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +orderer0.example.com | "2020-08-31 20:51:18.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 178µs " +peer0.org2.example.com | 00000040 3e da 85 85 b9 2a 3a |>....*:| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [b96 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [cd7 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d33290 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:18.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [d7f 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e50a30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | [b97 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [0755046a-dc1b-411f-9854-c2fc6e4cc255] +peer1.org1.example.com | [cd8 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d33290 gate 1598907074022172600 evaluation succeeds +orderer0.example.com | "2020-08-31 20:51:18.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd2 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [d80 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e50a30 gate 1598907070317604400 evaluation succeeds +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | [b98 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +peer1.org1.example.com | [cd9 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:18.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd3 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [d81 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [b99 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +peer1.org1.example.com | [cda 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:18.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd4 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +peer0.org2.example.com | [d82 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [cc8 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b9a 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU [3e6121d1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [cdb 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:18.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.3µs " +peer0.org2.example.com | [d83 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [cc9 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [b9b 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU [3e6121d1] notifying Txid:3e6121d142f3532efc3688fd85c8ec47e09ff474db3bf327d3ff33291c4fe50d, channelID: +peer1.org1.example.com | [cdc 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:19.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd6 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +peer0.org2.example.com | [d84 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [cca 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [b9c 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [cdd 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | "2020-08-31 20:51:19.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd7 Sending msg of 28 bytes to 3 on channel businesschannel took 21.1µs" +peer0.org2.example.com | [d85 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [ccb 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b9d 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> INFO [][3e6121d1] Exit chaincode: name:"lscc" (5ms) +orderer0.example.com | "2020-08-31 20:51:19.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.3µs " +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [d86 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [ccc 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [b9e 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU [][3e6121d1] Exit +orderer0.example.com | "2020-08-31 20:51:19.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 520.5µs " +peer1.org1.example.com | [cde 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | [d87 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [ccd 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [b9f 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36764 +orderer0.example.com | "2020-08-31 20:51:19.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU dda Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | [d88 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [cce 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [ba0 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36764 grpc.code=OK grpc.call_duration=9.6895ms +orderer0.example.com | "2020-08-31 20:51:19.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddb Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | [d89 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [ba1 08-31 20:51:07.24 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [ccf 08-31 20:51:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:19.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddc Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | [d8a 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ba2 08-31 20:51:07.24 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [cd0 08-31 20:51:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e44dd0 gate 1598907074538392100 evaluation starts +orderer0.example.com | "2020-08-31 20:51:19.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddd Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [d8b 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ba3 08-31 20:51:07.74 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] +peer1.org2.example.com | [cd1 08-31 20:51:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e44dd0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:19.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU dde Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 434.4µs " +peer1.org1.example.com | [cdf 08-31 20:51:14.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d8c 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ba4 08-31 20:51:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer1.org2.example.com | [cd2 08-31 20:51:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e44dd0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:19.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddf Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +peer1.org1.example.com | [ce0 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [d8d 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cd3 08-31 20:51:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e44dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [ba5 08-31 20:51:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +orderer0.example.com | "2020-08-31 20:51:19.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de0 Sending msg of 28 bytes to 3 on channel businesschannel took 14.8µs" +peer1.org1.example.com | [ce1 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [d8e 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cd4 08-31 20:51:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e44dd0 principal evaluation fails +peer0.org1.example.com | [ba6 08-31 20:51:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:51:19.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU de1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 265.3µs " +peer1.org1.example.com | [ce2 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d8f 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cd5 08-31 20:51:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e44dd0 gate 1598907074538392100 evaluation fails +peer0.org1.example.com | [ba7 08-31 20:51:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610031801 +orderer0.example.com | "2020-08-31 20:51:19.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU de2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 502.4µs " +peer1.org1.example.com | [ce3 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [d90 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cd6 08-31 20:51:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ba8 08-31 20:51:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DA8F68E0E7CBB31B65C02DE254870FF302622F128327D88D1FD719D41AD6CF19 +orderer0.example.com | "2020-08-31 20:51:19.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU de3 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [ce4 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [d91 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cd7 08-31 20:51:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ba9 08-31 20:51:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +orderer0.example.com | "2020-08-31 20:51:19.669 UTC [orderer.common.cluster.step] handleMessage -> DEBU de4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [ce5 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [d92 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cd8 08-31 20:51:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [baa 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:19.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU de5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [ce6 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [d93 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [cd9 08-31 20:51:14.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e45340 gate 1598907074539239200 evaluation starts +peer0.org1.example.com | [bab 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:19.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de6 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +peer1.org1.example.com | [ce7 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317eb80 gate 1598907074031812100 evaluation starts +peer0.org2.example.com | [d94 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cda 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e45340 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [bac 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:19.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU de7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 289.8µs " +peer1.org1.example.com | [ce8 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317eb80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [d95 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cdb 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e45340 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [bad 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:20.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de8 Sending msg of 28 bytes to 2 on channel businesschannel took 27.2µs" +peer1.org1.example.com | [ce9 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317eb80 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [d96 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [cdc 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e45340 principal matched by identity 0 +peer0.org1.example.com | [bae 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:20.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de9 Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +peer1.org1.example.com | [cea 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317eb80 principal matched by identity 0 +peer0.org2.example.com | [d97 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [cdd 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | [baf 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:20.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU dea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.3µs " +peer1.org1.example.com | [ceb 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | [d98 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [bb1 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:20.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU deb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 653.8µs " +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [cde 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | [d99 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [bb0 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:20.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU dec Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [cec 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | [d9a 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bb2 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:20.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU ded Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | [d9b 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [bb3 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:20.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU dee Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | [d9c 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bb4 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:20.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU def Sending msg of 28 bytes to 3 on channel testchainid took 78.8µs" +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [d9d 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [bb5 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:20.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU df0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 424.7µs " +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [cdf 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e45340 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [d9e 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bb6 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:20.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df1 Sending msg of 28 bytes to 2 on channel businesschannel took 25.9µs" +peer1.org1.example.com | [ced 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317eb80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [ce0 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e45340 gate 1598907074539239200 evaluation succeeds +peer0.org2.example.com | [d9f 08-31 20:51:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [bb7 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:20.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df2 Sending msg of 28 bytes to 3 on channel businesschannel took 9.8µs" +peer1.org1.example.com | [cee 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317eb80 gate 1598907074031812100 evaluation succeeds +peer1.org2.example.com | [ce1 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [da0 08-31 20:51:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [bb8 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:20.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU df3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.3µs " +peer1.org1.example.com | [cef 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [ce2 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [da1 08-31 20:51:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161016 +peer0.org1.example.com | [bb9 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:20.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU df4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.182ms " +peer1.org1.example.com | [cf0 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [ce3 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [da2 08-31 20:51:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 02955E836C577AF082E64D59217446CA85F71A345A8F38604651D8A4FE6A9435 +peer0.org1.example.com | [bba 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:20.666 UTC [orderer.common.cluster.step] handleMessage -> DEBU df5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [cf1 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [ce4 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [da3 08-31 20:51:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [bbb 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:20.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU df6 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [cf2 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [ce5 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [da4 08-31 20:51:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [bbc 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +orderer0.example.com | "2020-08-31 20:51:20.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU df7 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [cf3 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ce6 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [da5 08-31 20:51:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | [bbd 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:20.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df8 Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +peer1.org1.example.com | [cf4 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [ce7 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [da6 08-31 20:51:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [bbe 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:20.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU df9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145µs " +peer1.org1.example.com | [cf5 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ce8 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [da7 08-31 20:51:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bbf 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:21.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfa Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" +peer1.org1.example.com | [cf6 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ce9 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [da8 08-31 20:51:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bc0 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:21.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfb Sending msg of 28 bytes to 3 on channel businesschannel took 15.2µs" +peer1.org1.example.com | [cf7 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [cea 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [da9 08-31 20:51:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bc1 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:21.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 255.5µs " +peer1.org2.example.com | [ceb 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [cf8 08-31 20:51:14.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [daa 08-31 20:51:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [bc2 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-08-31 20:51:21.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfd Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [cec 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [cf9 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [dab 08-31 20:51:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [bc3 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:21.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.1969ms " +peer1.org2.example.com | [ced 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [cfa 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [dac 08-31 20:51:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:21.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU dff Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [bc4 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [cee 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e4a560 gate 1598907074545369800 evaluation starts +peer1.org1.example.com | [cfb 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [dae 08-31 20:51:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:21.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU e00 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [bc5 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [cef 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e4a560 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [cfc 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [db0 08-31 20:51:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:21.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e01 Sending msg of 28 bytes to 3 on channel testchainid took 12µs" +peer0.org1.example.com | [bc6 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [cf0 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e4a560 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [cfd 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [db1 08-31 20:51:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:21.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU e02 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.6µs " +peer0.org1.example.com | [bc7 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [cf1 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e4a560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [cfe 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317ffd0 gate 1598907074043662500 evaluation starts +peer0.org2.example.com | [dad 08-31 20:51:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:21.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e03 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +peer0.org1.example.com | [bc8 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [cf2 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e4a560 principal evaluation fails +peer1.org1.example.com | [cff 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317ffd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [db2 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:21.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e04 Sending msg of 28 bytes to 3 on channel businesschannel took 10.1µs" +peer0.org1.example.com | [bc9 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [cf3 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e4a560 gate 1598907074545369800 evaluation fails +peer1.org1.example.com | [d00 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317ffd0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [daf 08-31 20:51:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:21.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 272.6µs " +peer0.org1.example.com | [bca 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373dff0 gate 1598907069024573200 evaluation starts +peer1.org2.example.com | [cf4 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d01 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317ffd0 principal matched by identity 0 +peer0.org2.example.com | [db3 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:21.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 294.7µs " +peer0.org1.example.com | [bcb 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373dff0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [cf5 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d02 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | [db4 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:21.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU e07 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [bcc 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373dff0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [cf6 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [db5 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:21.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU e08 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [bcd 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373dff0 principal matched by identity 0 +peer1.org2.example.com | [cf7 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e4aad0 gate 1598907074551249000 evaluation starts +peer1.org1.example.com | [d03 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | [db6 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:21.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e09 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [bce 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 45 23 3a 25 15 88 da 8f 53 4a 1b 00 79 c1 f8 |.E#:%....SJ..y..| +peer1.org2.example.com | [cf8 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e4aad0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | [db7 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:21.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0a Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +peer0.org1.example.com | 00000010 61 47 17 a6 05 0c 7c a5 2c 8e 32 89 cd d4 ab 53 |aG....|.,.2....S| +peer1.org2.example.com | [cf9 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e4aad0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | [db8 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:21.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 698.6µs " +peer0.org1.example.com | [bcf 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 96 2d 33 a9 0f 8e 0a 58 ac e1 |0E.!...-3....X..| +peer1.org2.example.com | [cfa 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e4aad0 principal matched by identity 0 +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | [db9 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:22.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0c Sending msg of 28 bytes to 2 on channel businesschannel took 30.4µs" +peer0.org1.example.com | 00000010 e1 cf dd 39 bc 9a 6b 4a b8 24 7d a8 d8 5f 60 13 |...9..kJ.$}.._`.| +peer1.org2.example.com | [cfb 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [dba 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +orderer0.example.com | "2020-08-31 20:51:22.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0d Sending msg of 28 bytes to 3 on channel businesschannel took 20µs" +peer0.org1.example.com | 00000020 1f 92 ed c4 6b 02 20 52 28 b2 cc d3 6c ac c0 78 |....k. R(...l..x| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [d04 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317ffd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [dbb 08-31 20:51:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:22.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 295.4µs " +peer0.org1.example.com | 00000030 6b 85 f8 08 54 72 4f 15 e4 be 07 d9 0e 2d 45 61 |k...TrO......-Ea| +peer1.org2.example.com | [cfc 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | [d05 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00317ffd0 gate 1598907074043662500 evaluation succeeds +peer0.org2.example.com | [dbc 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:51:22.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 549.7µs " +peer0.org1.example.com | 00000040 67 ba 52 10 74 ab 11 |g.R.t..| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | [d06 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [dbd 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:22.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU e10 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [bd0 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373dff0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | [d07 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:22.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU e11 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [dbe 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [bd1 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373dff0 gate 1598907069024573200 evaluation succeeds +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | [d08 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:22.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU e12 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [dbf 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [bd2 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [d09 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:22.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e13 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +peer0.org2.example.com | [dc0 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 95 5e 83 6c 57 7a f0 82 e6 4d 59 21 74 46 ca |..^.lWz...MY!tF.| +peer0.org1.example.com | [bd3 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [cfd 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e4aad0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [d0a 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | "2020-08-31 20:51:22.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU e14 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 242.2µs " +peer0.org2.example.com | 00000010 85 f7 1a 34 5a 8f 38 60 46 51 d8 a4 fe 6a 94 35 |...4Z.8`FQ...j.5| +peer0.org1.example.com | [bd4 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [cfe 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e4aad0 gate 1598907074551249000 evaluation succeeds +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:51:22.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e15 Sending msg of 28 bytes to 2 on channel businesschannel took 84.4µs" +peer0.org2.example.com | [dc1 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 8c 8c 80 ad 9c 55 38 8c a4 b4 |0E.!.......U8...| +peer0.org1.example.com | [bd5 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [cff 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [d0b 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:51:22.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e16 Sending msg of 28 bytes to 3 on channel businesschannel took 6.8µs" +peer0.org2.example.com | 00000010 fd db 68 47 c5 5c a3 3a 2e 03 08 73 79 90 ff 63 |..hG.\.:...sy..c| +peer0.org1.example.com | [bd6 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d00 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | "2020-08-31 20:51:22.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e17 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 577.7µs " +peer0.org2.example.com | 00000020 37 58 62 04 e5 02 20 45 70 6e 12 cc a2 f7 ae 91 |7Xb... Epn......| +peer0.org1.example.com | [bd7 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [d01 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | "2020-08-31 20:51:22.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.303ms " +peer0.org2.example.com | 00000030 c4 e6 b4 9d b4 c8 5d 1a 07 90 5f fd 72 2d 3b d9 |......]..._.r-;.| +peer0.org1.example.com | [bd8 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [d02 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | "2020-08-31 20:51:22.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU e19 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000040 db 49 3c 1c c6 f5 d4 |.I<....| +peer0.org1.example.com | [bd9 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [d03 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | "2020-08-31 20:51:22.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1a Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [dc2 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [bda 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [d0c 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | "2020-08-31 20:51:22.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [dc3 08-31 20:51:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bdb 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d04 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | "2020-08-31 20:51:22.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1c Sending msg of 28 bytes to 3 on channel testchainid took 57.7µs" +peer0.org2.example.com | [dc4 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [bdc 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | [d0d 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | "2020-08-31 20:51:22.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 187.6µs " +peer0.org2.example.com | [dc5 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bdd 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +orderer0.example.com | "2020-08-31 20:51:23.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1e Sending msg of 28 bytes to 2 on channel businesschannel took 90.6µs" +peer0.org2.example.com | [dc6 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [bde 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +orderer0.example.com | "2020-08-31 20:51:23.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1f Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +peer0.org2.example.com | [dc7 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [bdf 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +orderer0.example.com | "2020-08-31 20:51:23.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e20 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 331.1µs " +peer0.org2.example.com | [dc8 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [be0 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d05 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +orderer0.example.com | "2020-08-31 20:51:23.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 373.5µs " +peer0.org2.example.com | [dc9 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [be1 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d06 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [d0e 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:23.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU e22 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [dca 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [be2 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [d07 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [d0f 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:23.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU e23 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [dcb 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [d08 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [be3 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +orderer0.example.com | "2020-08-31 20:51:23.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU e24 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [d10 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [dcc 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [d09 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [be4 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:23.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e25 Sending msg of 28 bytes to 3 on channel testchainid took 150.2µs" +peer1.org1.example.com | [d11 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [dcd 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [d0a 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [be5 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:23.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU e26 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58µs " +peer1.org1.example.com | [d12 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [dce 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [d0b 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [be6 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:23.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e27 Sending msg of 28 bytes to 2 on channel businesschannel took 22.3µs" +peer1.org1.example.com | [d13 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [dcf 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a13c40 gate 1598907070544106500 evaluation starts +peer1.org2.example.com | [d0c 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [be7 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:23.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e28 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +peer1.org1.example.com | [d14 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [dd0 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a13c40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [d0d 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [be8 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +orderer0.example.com | "2020-08-31 20:51:23.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 325.4µs " +peer1.org1.example.com | [d15 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [dd1 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a13c40 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [d0e 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [be9 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:23.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 287.3µs " +peer1.org1.example.com | [d16 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319bfb0 gate 1598907074048433200 evaluation starts +peer0.org2.example.com | [dd2 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a13c40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [d0f 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [bea 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:23.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [d17 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319bfb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [dd3 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a13c40 principal evaluation fails +peer1.org2.example.com | [d10 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [beb 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:23.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2c Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [d18 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319bfb0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [dd4 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a13c40 gate 1598907070544106500 evaluation fails +peer1.org2.example.com | [d11 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [bec 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:51:23.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [d19 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319bfb0 principal matched by identity 0 +peer0.org2.example.com | [dd5 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [bed 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 6a b4 86 66 e3 dd f1 1d 07 16 02 fe cc e3 e9 |Wj..f...........| +peer1.org2.example.com | [d12 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:23.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2e Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +peer1.org1.example.com | [d1a 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [dd6 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 18 8b 7e 5d 68 d0 13 49 fd 21 b3 e5 aa ca 4f 08 |..~]h..I.!....O.| +peer1.org2.example.com | [d13 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a0bed0 gate 1598907074555167500 evaluation starts +orderer0.example.com | "2020-08-31 20:51:23.874 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.4µs " +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [dd7 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [bee 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 92 7d f2 a4 f9 89 e7 88 b7 2c 69 |0D. ..}.......,i| +peer1.org2.example.com | [d14 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a0bed0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [d1b 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | "2020-08-31 20:51:24.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e30 Sending msg of 28 bytes to 2 on channel businesschannel took 25.7µs" +peer0.org2.example.com | [dd8 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efa1b0 gate 1598907070545815400 evaluation starts +peer0.org1.example.com | 00000010 6e b8 79 6d 59 07 0a 7f 8f e3 34 86 c7 7f 4e e2 |n.ymY.....4...N.| +peer1.org2.example.com | [d15 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a0bed0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +orderer0.example.com | "2020-08-31 20:51:24.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e31 Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +peer0.org2.example.com | [dd9 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efa1b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000020 51 3f cb d5 02 20 43 20 38 fe 37 27 3f 36 a7 91 |Q?... C 8.7'?6..| +peer1.org2.example.com | [d16 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a0bed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | "2020-08-31 20:51:24.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 665.3µs " +peer0.org2.example.com | [dda 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efa1b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000030 a7 12 05 38 8c e3 f9 76 39 bb 31 a6 6b 37 03 bc |...8...v9.1.k7..| +peer1.org2.example.com | [d17 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a0bed0 principal evaluation fails +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +orderer0.example.com | "2020-08-31 20:51:24.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU e34 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [ddb 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efa1b0 principal matched by identity 0 +peer0.org1.example.com | 00000040 b9 60 49 bc 66 f3 |.`I.f.| +peer1.org2.example.com | [d18 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a0bed0 gate 1598907074555167500 evaluation fails +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +orderer0.example.com | "2020-08-31 20:51:24.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU e35 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [bef 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ddc 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 ba fe 89 f0 27 88 7e 5b 8e 76 2a 4d cd 4f cc |.....'.~[.v*M.O.| +peer1.org2.example.com | [d19 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d1c 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319bfb0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:24.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 367.6µs " +peer0.org1.example.com | [bf0 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | 00000010 8e d6 a9 e0 d0 f1 57 37 f2 b5 e0 8a ee 5d 9b c6 |......W7.....]..| +peer1.org2.example.com | [d1a 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d1d 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319bfb0 gate 1598907074048433200 evaluation succeeds +orderer0.example.com | "2020-08-31 20:51:24.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU e36 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [ddd 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 a4 7b e4 45 26 8f b5 53 67 4c |0E.!...{.E&..SgL| +peer1.org2.example.com | [d1b 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [d1e 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:24.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e37 Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +peer0.org1.example.com | [bf1 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 26 23 44 48 87 5e b9 35 e1 9b 44 |0D. .&#DH.^.5..D| +peer0.org2.example.com | 00000010 1d e7 5a cf 96 99 3c fc 4f 9b 20 c2 03 a3 7a 89 |..Z...<.O. ...z.| +peer1.org2.example.com | [d1c 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee44c0 gate 1598907074556091200 evaluation starts +peer1.org1.example.com | [d1f 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:24.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU e38 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 232.3µs " +peer0.org1.example.com | 00000010 01 14 42 3a e3 4b 78 6c 3c 13 20 32 51 a3 0e 7d |..B:.Kxl<. 2Q..}| +peer0.org2.example.com | 00000020 41 b4 ac bd 0b 02 20 17 16 91 ec a1 6b 6a 6f 6d |A..... .....kjom| +peer1.org2.example.com | [d1d 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee44c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [d20 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:24.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e39 Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +peer0.org1.example.com | 00000020 a1 07 98 9a 02 20 39 ae 9c 30 23 03 68 6b 79 d4 |..... 9..0#.hky.| +peer0.org2.example.com | 00000030 65 2b 94 d2 57 18 1f 63 71 85 e2 e8 1d 27 41 45 |e+..W..cq....'AE| +peer1.org2.example.com | [d1e 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee44c0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [d21 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:24.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3a Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +peer0.org1.example.com | 00000030 6f 39 8c d3 ab 93 f7 12 bd 73 85 c5 22 a8 6a 8e |o9.......s..".j.| +peer0.org2.example.com | 00000040 1e 20 df d1 39 b1 82 |. ..9..| +peer1.org2.example.com | [d1f 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee44c0 principal matched by identity 0 +peer1.org1.example.com | [d22 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:24.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 185.1µs " +peer0.org1.example.com | 00000040 8b 20 a6 c9 37 49 |. ..7I| +peer0.org2.example.com | [dde 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efa1b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [d20 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | [d23 08-31 20:51:14.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:24.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 220.3µs " +peer0.org1.example.com | [bf2 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [ddf 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efa1b0 gate 1598907070545815400 evaluation succeeds +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [d24 08-31 20:51:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:24.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3d Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [bf3 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [de0 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [d21 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | [d25 08-31 20:51:14.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:24.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [bf4 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [de1 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | [d26 08-31 20:51:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:24.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [bf5 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [de2 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | [d27 08-31 20:51:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:24.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e40 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +peer0.org1.example.com | [bf6 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [de3 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | [d28 08-31 20:51:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:24.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU e41 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 358.8µs " +peer0.org1.example.com | [bf7 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [de4 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [d29 08-31 20:51:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:25.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e42 Sending msg of 28 bytes to 3 on channel businesschannel took 20µs" +peer0.org1.example.com | [bf8 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [de5 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [d22 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee44c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [d2a 08-31 20:51:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:25.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e43 Sending msg of 28 bytes to 2 on channel businesschannel took 8.4µs" +peer0.org1.example.com | [bf9 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [de6 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [d23 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee44c0 gate 1598907074556091200 evaluation succeeds +peer1.org1.example.com | [d2b 08-31 20:51:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:25.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53.5µs " +peer0.org1.example.com | [bfa 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [de7 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [d24 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [d2c 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:25.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 441µs " +peer0.org2.example.com | [de8 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [bfb 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d25 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [d2d 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:25.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU e46 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [de9 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bfc 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d26 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [d2e 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:25.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU e47 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [dea 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bfd 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [d27 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [d2f 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:25.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU e48 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [deb 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [bfe 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [d28 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d30 08-31 20:51:14.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:25.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e49 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +peer0.org2.example.com | [dec 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [bff 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d29 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d31 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:25.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 461.2µs " +peer0.org2.example.com | [ded 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c00 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [d2a 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [d32 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:25.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4b Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +peer0.org2.example.com | [dee 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [c01 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36780 +peer1.org2.example.com | [d2b 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d33 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:25.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4c Sending msg of 28 bytes to 3 on channel businesschannel took 7.6µs" +peer0.org2.example.com | [def 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c02 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0037b07d0 +peer1.org2.example.com | [d2c 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d34 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:25.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.1µs " +peer0.org2.example.com | [df0 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c03 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [d2d 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [d35 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:25.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 372.3µs " +peer0.org2.example.com | [df1 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c04 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [d2e 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:25.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4f Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [d36 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [df2 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c05 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [d2f 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:25.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU e50 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [d37 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [df3 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c06 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d30 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee56c0 gate 1598907074557788200 evaluation starts +orderer0.example.com | "2020-08-31 20:51:25.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e51 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [d38 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [df4 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c07 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [d31 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee56c0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:25.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e52 Sending msg of 28 bytes to 3 on channel testchainid took 11.4µs" +peer1.org1.example.com | [d39 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [df5 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [d32 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee56c0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:25.874 UTC [orderer.common.cluster.step] sendMessage -> DEBU e53 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.6µs " +peer1.org1.example.com | [d3a 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [df6 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [d33 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee56c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:51:26.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e54 Sending msg of 28 bytes to 3 on channel businesschannel took 52.2µs" +peer1.org1.example.com | [d3b 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [df7 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [d34 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee56c0 principal evaluation fails +orderer0.example.com | "2020-08-31 20:51:26.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e55 Sending msg of 28 bytes to 2 on channel businesschannel took 12.3µs" +peer1.org1.example.com | [d3c 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [df9 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | [d35 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee56c0 gate 1598907074557788200 evaluation fails +peer1.org1.example.com | [d3d 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:26.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 373.8µs " +peer0.org2.example.com | [dfa 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org2.example.com | [d36 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d3e 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:26.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.7µs " +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org1.example.com | [d3f 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031d6070 gate 1598907075057136900 evaluation starts +orderer0.example.com | "2020-08-31 20:51:26.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU e58 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [df8 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org1.example.com | [d40 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031d6070 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [d37 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:26.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU e59 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [dfb 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | [d41 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031d6070 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [d38 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:26.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [dfc 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | [d42 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031d6070 principal matched by identity 0 +peer1.org2.example.com | [d39 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee5c30 gate 1598907074558383800 evaluation starts +orderer0.example.com | "2020-08-31 20:51:26.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5b Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +peer0.org2.example.com | [dfd 08-31 20:51:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org1.example.com | [d43 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 c6 fb 04 b1 1e 80 82 72 6e bf d9 28 84 cf 03 |........rn..(...| +peer1.org2.example.com | [d3a 08-31 20:51:14.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee5c30 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:26.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 559.5µs " +peer0.org2.example.com | [dfe 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer1.org1.example.com | 00000010 0e 80 24 0c ba b4 14 1a 78 3f 46 4e 70 66 38 e5 |..$.....x?FNpf8.| +peer1.org2.example.com | [d3b 08-31 20:51:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee5c30 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:26.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5d Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +peer0.org2.example.com | [dff 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [d44 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d f5 02 25 29 ca 0d 64 ab d7 23 cc |0D. }..%)..d..#.| +peer1.org2.example.com | [d3c 08-31 20:51:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee5c30 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:51:26.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5e Sending msg of 28 bytes to 3 on channel businesschannel took 6.8µs" +peer0.org2.example.com | [e00 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [c08 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | 00000010 ca 13 e4 4a bd 7f f8 de 48 ca 70 22 62 6c 6b 06 |...J....H.p"blk.| +peer1.org2.example.com | [d3d 08-31 20:51:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | "2020-08-31 20:51:26.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 219.8µs " +peer0.org2.example.com | [e01 08-31 20:51:10.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c09 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | 00000020 02 dc 34 52 02 20 0e cd 6e 16 69 05 64 06 a6 4e |..4R. ..n.i.d..N| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:51:26.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 164.6µs " +peer0.org2.example.com | [e02 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [c0a 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | 00000030 af 00 35 af 03 26 e1 bb 33 ff 38 84 c0 00 53 37 |..5..&..3.8...S7| +peer1.org2.example.com | [d3e 08-31 20:51:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:51:26.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU e61 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [e03 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [c0b 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | 00000040 86 f9 8a 35 5d a0 |...5].| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | "2020-08-31 20:51:26.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU e62 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [e04 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [c0c 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 5f 52 bb d1 40 68 8c ea 33 51 a6 c7 dc 40 72 |._R..@h..3Q...@r| +peer1.org1.example.com | [d45 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031d6070 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | "2020-08-31 20:51:26.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e63 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [e05 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 3b a5 f2 ec 77 ad b7 12 d2 70 75 eb bd 7b 02 4c |;...w....pu..{.L| +peer1.org1.example.com | [d46 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031d6070 gate 1598907075057136900 evaluation succeeds +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | "2020-08-31 20:51:26.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e64 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +peer0.org2.example.com | [e06 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [c0d 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 73 7a fb b7 87 ef 5e 36 5a 8e |0E.!..sz....^6Z.| +peer1.org1.example.com | [d47 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | "2020-08-31 20:51:26.874 UTC [orderer.common.cluster.step] sendMessage -> DEBU e65 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 374µs " +peer0.org2.example.com | [e07 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 1e 7e 9c 8c 38 da a5 5f 0f 72 d2 24 0b 64 ab 31 |.~..8.._.r.$.d.1| +peer1.org1.example.com | [d48 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [d3f 08-31 20:51:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee5c30 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:27.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e66 Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +peer0.org2.example.com | [e08 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 db f7 ca cd 66 02 20 26 32 cb 10 84 78 42 e6 cf |....f. &2...xB..| +peer1.org1.example.com | [d49 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [d40 08-31 20:51:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ee5c30 gate 1598907074558383800 evaluation succeeds +orderer0.example.com | "2020-08-31 20:51:27.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e67 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +peer0.org2.example.com | [e09 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | 00000030 e1 03 6f 11 2c 17 53 37 9e 2b c3 38 29 3e 18 4d |..o.,.S7.+.8)>.M| +peer1.org1.example.com | [d4a 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [d41 08-31 20:51:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:51:27.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 372.1µs " +peer0.org2.example.com | [e0a 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 62 52 2f a0 7a a2 5f f5 b0 4e 19 86 d1 11 1b |.bR/.z._..N.....| +peer0.org1.example.com | 00000040 d6 e3 fa c2 d8 60 18 |.....`.| +peer1.org1.example.com | [d4b 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [d42 08-31 20:51:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:51:27.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU e69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0752ms " +peer0.org2.example.com | 00000010 46 16 b9 bb 1a 0a 30 86 a8 1a 6d fd a4 fd 6c 81 |F.....0...m...l.| +peer0.org1.example.com | [c0e 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [d4c 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [d43 08-31 20:51:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:27.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [e0b 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 f4 4b d8 b1 26 7a 12 19 fc 48 0f |0D. ".K..&z...H.| +peer0.org1.example.com | [c0f 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0037a6540, header 0xc0037b0be0 +peer1.org1.example.com | [d4d 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [d44 08-31 20:51:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:27.169 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6b Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000010 23 96 b6 1c b0 4a 29 77 64 3c 44 db 5e d8 f8 29 |#....J)wd DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer1.org1.example.com | [d4e 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [d45 08-31 20:51:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +orderer0.example.com | "2020-08-31 20:51:27.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | 00000020 5a 83 67 be 02 20 3d d4 ec 36 6c 44 09 2b bd e6 |Z.g.. =..6lD.+..| +peer0.org1.example.com | [c11 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d0697242] processing txid: d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a +peer1.org1.example.com | [d4f 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +orderer0.example.com | "2020-08-31 20:51:27.380 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6d Sending msg of 28 bytes to 3 on channel testchainid took 19.5µs" +peer0.org2.example.com | 00000030 ee 08 f2 fa f8 be fa ca ba 5b d3 18 d6 d8 c4 9f |.........[......| +peer0.org1.example.com | [c12 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] +peer1.org1.example.com | [d50 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d46 08-31 20:51:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +orderer0.example.com | "2020-08-31 20:51:27.381 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 178.3µs " +peer0.org2.example.com | 00000040 67 f2 8b 69 99 24 |g..i.$| +peer0.org1.example.com | [c13 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [d51 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +orderer0.example.com | "2020-08-31 20:51:27.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6f Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +peer0.org2.example.com | [e0c 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org1.example.com | [c14 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] +peer1.org1.example.com | [d52 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +orderer0.example.com | "2020-08-31 20:51:27.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e70 Sending msg of 28 bytes to 3 on channel businesschannel took 13.9µs" +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org1.example.com | [c15 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d0697242] Entry chaincode: name:"lscc" +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | [d53 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:27.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e71 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.5µs " +peer0.org2.example.com | [e0d 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 42 c1 58 4d 9a db cd 8e eb 63 |0E.!..B.XM.....c| +peer0.org1.example.com | [c16 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][d0697242] Entry chaincode: name:"lscc" +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [d54 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:27.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU e72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 487.4µs " +peer0.org2.example.com | 00000010 5a 0e 69 51 67 f5 fa 80 3f 5f 8a 90 a7 04 0c 04 |Z.iQg...?_......| +peer0.org1.example.com | [c17 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [d47 08-31 20:51:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | [d55 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:27.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU e73 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000020 e8 1c c6 24 6c 02 20 1a 38 0f cf dc fa cb 02 5c |...$l. .8......\| +peer0.org1.example.com | [c18 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [d56 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:27.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU e74 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000030 49 25 52 90 63 8b 0d 8f 11 aa 1a e4 87 9b d8 d8 |I%R.c...........| +peer0.org1.example.com | [c19 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] handling GET_STATE from chaincode +peer1.org2.example.com | [d48 08-31 20:51:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | [d57 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:27.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e75 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | 00000040 9e b9 f3 6f e7 9f 61 |...o..a| +peer0.org1.example.com | [c1a 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] getting state for chaincode lscc, key exp02, channel businesschannel +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | [d58 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:27.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e76 Sending msg of 28 bytes to 3 on channel testchainid took 8.1µs" +peer0.org2.example.com | [e0e 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [c1b 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | [d59 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:27.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU e77 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.8µs " +peer0.org2.example.com | [e0f 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [c1c 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] No state associated with key: exp02. Sending RESPONSE with an empty payload +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | [d5a 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:28.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e78 Sending msg of 28 bytes to 2 on channel businesschannel took 50µs" +peer0.org2.example.com | [e10 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [c1d 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Completed GET_STATE. Sending RESPONSE +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [d5b 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:28.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU e79 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.2µs " +peer0.org2.example.com | [e11 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [c1e 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [d49 08-31 20:51:14.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d5c 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:28.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7a Sending msg of 28 bytes to 3 on channel businesschannel took 17.9µs" +peer0.org2.example.com | [e12 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [c1f 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003847a10 gate 1598907069400889200 evaluation starts +peer1.org2.example.com | [d4a 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [d5d 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:28.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 361.6µs " +peer0.org2.example.com | [e13 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c20 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003847a10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [d4b 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D9816101A +peer1.org1.example.com | [d5e 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e14 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:28.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [c21 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003847a10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [d4c 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 18C6FB04B11E8082726EBFD92884CF030E80240CBAB4141A783F464E706638E5 +peer1.org1.example.com | [d5f 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e15 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:28.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7d Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [c22 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer1.org2.example.com | [d4d 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [d4e 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [d4f 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [d50 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [d60 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c23 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer1.org2.example.com | [d51 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d61 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [e16 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +orderer0.example.com | "2020-08-31 20:51:28.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [c24 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [d52 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d62 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e17 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:28.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7f Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +peer1.org2.example.com | [d53 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org1.example.com | [c25 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [d63 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [e18 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:28.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU e80 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.2µs " +peer1.org2.example.com | [d54 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c26 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org1.example.com | [d64 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [e19 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:28.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e81 Sending msg of 28 bytes to 2 on channel businesschannel took 26.6µs" +peer1.org2.example.com | [d55 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [c27 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [d65 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e1a 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:28.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e82 Sending msg of 28 bytes to 3 on channel businesschannel took 101.5µs" +peer1.org2.example.com | [d56 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c28 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003847a10 principal matched by identity 0 +peer1.org1.example.com | [d66 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [e1b 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:28.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e83 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.5µs " +peer1.org2.example.com | [d57 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [c29 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 5f 52 bb d1 40 68 8c ea 33 51 a6 c7 dc 40 72 |._R..@h..3Q...@r| +peer1.org1.example.com | [d67 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:28.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU e84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 165.6µs " +orderer0.example.com | "2020-08-31 20:51:28.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU e85 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [d58 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [d59 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d5a 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [d5b 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d5c 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [d5d 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d5e 08-31 20:51:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [d5f 08-31 20:51:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [d60 08-31 20:51:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d61 08-31 20:51:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [d62 08-31 20:51:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [d63 08-31 20:51:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 c6 fb 04 b1 1e 80 82 72 6e bf d9 28 84 cf 03 |........rn..(...| +peer1.org2.example.com | 00000010 0e 80 24 0c ba b4 14 1a 78 3f 46 4e 70 66 38 e5 |..$.....x?FNpf8.| +peer1.org2.example.com | [d64 08-31 20:51:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d f5 02 25 29 ca 0d 64 ab d7 23 cc |0D. }..%)..d..#.| +peer1.org2.example.com | 00000010 ca 13 e4 4a bd 7f f8 de 48 ca 70 22 62 6c 6b 06 |...J....H.p"blk.| +peer1.org2.example.com | 00000020 02 dc 34 52 02 20 0e cd 6e 16 69 05 64 06 a6 4e |..4R. ..n.i.d..N| +peer1.org2.example.com | 00000030 af 00 35 af 03 26 e1 bb 33 ff 38 84 c0 00 53 37 |..5..&..3.8...S7| +peer1.org2.example.com | 00000040 86 f9 8a 35 5d a0 |...5].| +peer1.org2.example.com | [d65 08-31 20:51:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:51:28.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU e86 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:28.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e87 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:28.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e88 Sending msg of 28 bytes to 3 on channel testchainid took 11.1µs" +orderer0.example.com | "2020-08-31 20:51:28.874 UTC [orderer.common.cluster.step] sendMessage -> DEBU e89 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.1µs " +orderer0.example.com | "2020-08-31 20:51:29.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8a Sending msg of 28 bytes to 2 on channel businesschannel took 62.6µs" +orderer0.example.com | "2020-08-31 20:51:29.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8b Sending msg of 28 bytes to 3 on channel businesschannel took 20.1µs" +orderer0.example.com | "2020-08-31 20:51:29.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.1µs " +orderer0.example.com | "2020-08-31 20:51:29.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.9µs " +orderer0.example.com | "2020-08-31 20:51:29.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:29.169 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8f Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:29.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU e90 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:29.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e91 Sending msg of 28 bytes to 3 on channel testchainid took 85.7µs" +orderer0.example.com | "2020-08-31 20:51:29.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU e92 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 801.3µs " +orderer0.example.com | "2020-08-31 20:51:29.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 195.5µs " +orderer0.example.com | "2020-08-31 20:51:29.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e94 Sending msg of 28 bytes to 2 on channel businesschannel took 28µs" +orderer0.example.com | "2020-08-31 20:51:29.667 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e95 Sending msg of 28 bytes to 3 on channel businesschannel took 493.3µs" +orderer0.example.com | "2020-08-31 20:51:29.668 UTC [orderer.common.cluster.step] sendMessage -> DEBU e96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 483.2µs " +orderer0.example.com | "2020-08-31 20:51:29.669 UTC [orderer.common.cluster.step] handleMessage -> DEBU e97 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:29.669 UTC [orderer.common.cluster.step] handleMessage -> DEBU e98 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:29.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e99 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:29.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9a Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +orderer0.example.com | "2020-08-31 20:51:29.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 644.3µs " +orderer0.example.com | "2020-08-31 20:51:30.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9c Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs" +orderer0.example.com | "2020-08-31 20:51:30.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9d Sending msg of 28 bytes to 3 on channel businesschannel took 33.7µs" +orderer0.example.com | "2020-08-31 20:51:30.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.7µs " +orderer0.example.com | "2020-08-31 20:51:30.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 172.9µs " +orderer0.example.com | "2020-08-31 20:51:30.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea0 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:30.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:30.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:30.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea3 Sending msg of 28 bytes to 3 on channel testchainid took 11.4µs" +orderer0.example.com | "2020-08-31 20:51:30.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 546.5µs " +orderer0.example.com | "2020-08-31 20:51:30.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea5 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +orderer0.example.com | "2020-08-31 20:51:30.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea6 Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +orderer0.example.com | "2020-08-31 20:51:30.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.6µs " +orderer0.example.com | "2020-08-31 20:51:30.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 455.7µs " +orderer0.example.com | "2020-08-31 20:51:30.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea9 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:30.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU eaa Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:30.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU eab Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:30.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eac Sending msg of 28 bytes to 3 on channel testchainid took 12.1µs" +orderer0.example.com | "2020-08-31 20:51:30.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU ead Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.4µs " +orderer0.example.com | "2020-08-31 20:51:31.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eae Sending msg of 28 bytes to 2 on channel businesschannel took 24.4µs" +orderer0.example.com | "2020-08-31 20:51:31.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eaf Sending msg of 28 bytes to 3 on channel businesschannel took 62.1µs" +orderer0.example.com | "2020-08-31 20:51:31.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.6µs " +orderer0.example.com | "2020-08-31 20:51:31.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:31.168 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.904ms " +orderer0.example.com | "2020-08-31 20:51:31.169 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb3 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:31.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:31.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb5 Sending msg of 28 bytes to 3 on channel testchainid took 44µs" +orderer0.example.com | "2020-08-31 20:51:31.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 457.3µs " +orderer0.example.com | "2020-08-31 20:51:31.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb7 Sending msg of 28 bytes to 2 on channel businesschannel took 25µs" +orderer0.example.com | "2020-08-31 20:51:31.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb8 Sending msg of 28 bytes to 3 on channel businesschannel took 341.1µs" +orderer0.example.com | "2020-08-31 20:51:31.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.5µs " +orderer0.example.com | "2020-08-31 20:51:31.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU eba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 260.5µs " +orderer0.example.com | "2020-08-31 20:51:31.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebb Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:31.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebc Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:31.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebd Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:31.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebe Sending msg of 28 bytes to 3 on channel testchainid took 107.2µs" +orderer0.example.com | "2020-08-31 20:51:31.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 312.9µs " +orderer0.example.com | "2020-08-31 20:51:32.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec0 Sending msg of 28 bytes to 2 on channel businesschannel took 51.5µs" +orderer0.example.com | "2020-08-31 20:51:32.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.7µs " +orderer0.example.com | "2020-08-31 20:51:32.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec2 Sending msg of 28 bytes to 3 on channel businesschannel took 8.9µs" +orderer0.example.com | "2020-08-31 20:51:32.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec4 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:32.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:32.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135µs " +orderer0.example.com | "2020-08-31 20:51:32.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:32.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec7 Sending msg of 28 bytes to 3 on channel testchainid took 65.2µs" +peer0.org1.example.com | 00000010 3b a5 f2 ec 77 ad b7 12 d2 70 75 eb bd 7b 02 4c |;...w....pu..{.L| +peer0.org1.example.com | [c2a 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 73 7a fb b7 87 ef 5e 36 5a 8e |0E.!..sz....^6Z.| +peer0.org1.example.com | 00000010 1e 7e 9c 8c 38 da a5 5f 0f 72 d2 24 0b 64 ab 31 |.~..8.._.r.$.d.1| +peer0.org1.example.com | 00000020 db f7 ca cd 66 02 20 26 32 cb 10 84 78 42 e6 cf |....f. &2...xB..| +peer0.org1.example.com | 00000030 e1 03 6f 11 2c 17 53 37 9e 2b c3 38 29 3e 18 4d |..o.,.S7.+.8)>.M| +peer0.org1.example.com | 00000040 d6 e3 fa c2 d8 60 18 |.....`.| +peer0.org1.example.com | [c2b 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003847a10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [c2c 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003847a10 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [c2d 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003847a10 skipping identity 0 because it has already been used +peer0.org1.example.com | [c2e 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003847a10 principal evaluation fails +peer0.org1.example.com | [c2f 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003847a10 gate 1598907069400889200 evaluation succeeds +peer0.org1.example.com | [c30 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org1.example.com | [c31 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] handling PUT_STATE from chaincode +peer0.org1.example.com | [c32 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Completed PUT_STATE. Sending RESPONSE +peer0.org1.example.com | [c33 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU No collection configuration specified +peer0.org1.example.com | [c34 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [c35 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] notifying Txid:d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a, channelID:businesschannel +peer0.org1.example.com | [c36 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [c37 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02:1.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +peer0.org1.example.com | [c38 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU start container: exp02:1.0 +peer0.org1.example.com | [c39 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +peer0.org1.example.com | [c3a 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_LEVEL=info +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_SHIM=warning +peer0.org1.example.com | CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} +peer0.org1.example.com | CORE_CHAINCODE_ID_NAME=exp02:1.0 +peer0.org1.example.com | CORE_PEER_TLS_ENABLED=true +peer0.org1.example.com | CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key +peer0.org1.example.com | CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt +peer0.org1.example.com | CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +peer0.org1.example.com | [c3b 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(exp02-1.0) lock +peer0.org1.example.com | [c3c 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU got container (exp02-1.0) lock +peer0.org1.example.com | [c3d 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU stopping container id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | [c3e 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU stop container result error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | [c3f 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU killing container id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | [c40 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU kill container result id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | [c41 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU removing container id=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | [c42 08-31 20:51:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU remove container result id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +peer0.org1.example.com | [c43 08-31 20:51:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU create container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer0.org1.example.com | [c44 08-31 20:51:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +peer0.org1.example.com | [c45 08-31 20:51:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU +peer0.org1.example.com | FROM hyperledger/fabric-baseos:amd64-0.4.21 +peer0.org1.example.com | ADD binpackage.tar /usr/local/bin +peer0.org1.example.com | LABEL org.hyperledger.fabric.chaincode.id.name="exp02" \ +peer0.org1.example.com | org.hyperledger.fabric.chaincode.id.version="1.0" \ +peer0.org1.example.com | org.hyperledger.fabric.chaincode.type="GOLANG" \ +peer0.org1.example.com | org.hyperledger.fabric.version="1.4.8" \ +peer0.org1.example.com | org.hyperledger.fabric.base.version="0.4.21" +peer0.org1.example.com | ENV CORE_CHAINCODE_BUILDLEVEL=1.4.8 +peer0.org1.example.com | [c46 08-31 20:51:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +peer0.org2.example.com | [e1c 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [e1d 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [e1e 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [e1f 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e20 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e21 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e22 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e23 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e24 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e25 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [e26 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e27 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [e28 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e29 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [e2a 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [e2b 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e2c 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [e2d 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [e2e 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [e2f 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [e30 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [e31 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [e32 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f2e0 gate 1598907073307780900 evaluation starts +peer0.org2.example.com | [e33 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f2e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [e34 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f2e0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [d68 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [d69 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D9816101B +peer1.org1.example.com | [d6a 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9D74B006CEC27FFA349597C92A7D708379FFFB88196DB14CBBB743C7EFAE4DF1 +peer1.org1.example.com | [d6b 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [d6c 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [d6d 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [d6e 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [d6f 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d70 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d71 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d72 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [d73 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d74 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [d75 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [d76 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d77 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d78 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d79 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d7a 08-31 20:51:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d7b 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d7c 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d7d 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d7e 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d7f 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d80 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [d81 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 74 b0 06 ce c2 7f fa 34 95 97 c9 2a 7d 70 83 |.t......4...*}p.| +peer1.org1.example.com | 00000010 79 ff fb 88 19 6d b1 4c bb b7 43 c7 ef ae 4d f1 |y....m.L..C...M.| +peer1.org1.example.com | [d82 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 3b 65 7b 43 94 98 d4 c8 84 d0 34 |0D. h;e{C......4| +peer1.org1.example.com | 00000010 be 0c 38 1e 49 55 8b 2d e7 57 78 c4 72 4e c7 dd |..8.IU.-.Wx.rN..| +peer1.org1.example.com | 00000020 2a 04 1e d7 02 20 3a 9c a0 d5 4e cc 45 3e 65 8b |*.... :...N.E>e.| +peer1.org1.example.com | 00000030 8b 16 ac f4 52 05 d2 6f e7 64 58 78 8c 04 5e a5 |....R..o.dXx..^.| +peer1.org1.example.com | 00000040 3a d1 88 c7 52 c1 |:...R.| +peer1.org1.example.com | [d83 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [d84 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d85 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d86 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d87 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [d88 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d89 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [d8a 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [d8b 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [d8c 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d8d 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [d8e 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [d8f 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [d90 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [d91 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003231530 gate 1598907075468215600 evaluation starts +peer1.org1.example.com | [d92 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003231530 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [d93 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003231530 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [d94 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003231530 principal matched by identity 0 +peer1.org1.example.com | [d95 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 1f 34 d8 0a 1b 64 bf 99 6e d1 d9 23 93 8d 9b |..4...d..n..#...| +peer1.org1.example.com | 00000010 2f 5d 01 fb 17 fd 46 02 76 f8 40 fa 52 a2 9e fe |/]....F.v.@.R...| +peer1.org1.example.com | [d96 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 81 aa 57 a4 fa 87 e8 c8 7d 0e |0E.!....W.....}.| +peer1.org1.example.com | 00000010 54 95 10 9a 24 ac 12 47 e9 3e 6a 70 ac 54 ab 5d |T...$..G.>jp.T.]| +peer1.org1.example.com | 00000020 98 31 54 f8 ef 02 20 5b c0 d9 0f 61 bc 51 16 75 |.1T... [...a.Q.u| +peer1.org1.example.com | 00000030 99 0b 98 d5 e0 e9 7e 54 47 47 0e 91 c2 df 38 ef |......~TGG....8.| +peer1.org1.example.com | 00000040 75 87 e9 bc 32 a7 55 |u...2.U| +peer1.org1.example.com | [d97 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003231530 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [d98 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003231530 gate 1598907075468215600 evaluation succeeds +peer1.org1.example.com | [d99 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d9a 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [d9b 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [d9c 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [d9d 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [d9e 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [d9f 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [da0 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [da1 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [da2 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [da3 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [da4 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [da5 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [da6 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [da7 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [da8 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [da9 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [daa 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dab 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dac 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [dad 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dae 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [daf 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [db0 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [db1 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [db2 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [db3 08-31 20:51:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [db4 08-31 20:51:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [db5 08-31 20:51:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [db6 08-31 20:51:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [db7 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [d66 08-31 20:51:15.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d67 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [d68 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [d69 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d6a 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [d6b 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [d6c 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d6d 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [d6e 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [d6f 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [d70 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [d71 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [d72 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [d73 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26e90 gate 1598907075311597200 evaluation starts +peer1.org2.example.com | [d74 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26e90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [e35 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f2e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [e36 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f2e0 principal evaluation fails +peer0.org2.example.com | [e37 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f2e0 gate 1598907073307780900 evaluation fails +peer0.org2.example.com | [e38 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [e39 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [e3a 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [e3b 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f870 gate 1598907073308199100 evaluation starts +peer0.org2.example.com | [e3c 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f870 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [e3d 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f870 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [e3e 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f870 principal matched by identity 0 +peer0.org2.example.com | [e3f 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 d9 6b 09 8c aa 7e bd ab 1a a7 55 c5 2b 89 51 |3.k...~....U.+.Q| +peer0.org2.example.com | 00000010 7e 5f 9c 3d 57 20 a0 1a 04 81 ec 7e b2 8a 7b b9 |~_.=W .....~..{.| +peer0.org2.example.com | [e40 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 e2 5d 94 fc ae 8f 76 e8 23 1c b9 |0D. y.]....v.#..| +peer0.org2.example.com | 00000010 d9 60 be 1f 03 e6 e7 c3 47 91 9b 77 b9 3b df cb |.`......G..w.;..| +peer0.org2.example.com | 00000020 7d a7 69 90 02 20 2e 72 62 ff 22 9f 3d dd 2e 9c |}.i.. .rb.".=...| +peer0.org2.example.com | 00000030 d9 97 80 77 23 79 e2 32 f9 1f 00 1c 06 55 fb ac |...w#y.2.....U..| +peer0.org2.example.com | 00000040 cd ca ca 0b bb f5 |......| +peer0.org2.example.com | [e41 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f870 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [e42 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f2f870 gate 1598907073308199100 evaluation succeeds +peer0.org2.example.com | [e43 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [e44 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [e45 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [e46 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [e47 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [e48 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [e49 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [e4a 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [e4b 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [e4c 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e4d 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e4e 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e4f 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [e50 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e51 08-31 20:51:13.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e52 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e53 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [e54 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [e55 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [e56 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e57 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [c47 08-31 20:51:09.43 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' +peer0.org1.example.com | [c48 08-31 20:51:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting build with image hyperledger/fabric-ccenv:1.4 +peer0.org1.example.com | [c49 08-31 20:51:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Image hyperledger/fabric-ccenv:1.4 does not exist locally, attempt pull +peer0.org1.example.com | [c4a 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [c4b 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [c4c 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [c4d 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c4e 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [db8 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [db9 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dba 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [dbb 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dbc 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [dbd 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dbe 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [dbf 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [dc0 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 6c 7f 1b 65 57 9a bc c3 e3 23 19 66 54 d9 0f |Ml..eW....#.fT..| +peer1.org1.example.com | 00000010 5e 15 81 0a 9a 12 3a 31 b0 81 25 7f 88 16 49 a3 |^.....:1..%...I.| +peer1.org1.example.com | [dc1 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be 25 48 43 49 2c 8d 94 5c ca d9 |0E.!..%HCI,..\..| +peer1.org1.example.com | 00000010 3a a2 94 06 4c d9 7c 97 55 ad fa e9 b8 31 a4 08 |:...L.|.U....1..| +peer1.org1.example.com | 00000020 30 fb 43 01 97 02 20 6b 9d d4 3b c4 d7 b5 43 4d |0.C... k..;...CM| +peer1.org1.example.com | 00000030 f2 ff 5d 8a d6 c1 f1 55 a4 0d 8f 93 8c de 1b 1f |..]....U........| +peer1.org1.example.com | 00000040 f8 4b de 15 20 ff 3a |.K.. .:| +peer1.org1.example.com | [dc2 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [dc3 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [dc4 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [dc5 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [dc6 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [dc7 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [dc8 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [dc9 08-31 20:51:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dca 08-31 20:51:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dcb 08-31 20:51:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dcc 08-31 20:51:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dcd 08-31 20:51:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [dce 08-31 20:51:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dcf 08-31 20:51:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [dd0 08-31 20:51:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [dd1 08-31 20:51:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dd2 08-31 20:51:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [dd3 08-31 20:51:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [dd4 08-31 20:51:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dd5 08-31 20:51:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dd6 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dd7 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [d75 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26e90 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [d76 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [d77 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26e90 principal evaluation fails +peer1.org2.example.com | [d78 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26e90 gate 1598907075311597200 evaluation fails +peer1.org2.example.com | [d79 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [d7a 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [d7b 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [d7c 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f27410 gate 1598907075313905500 evaluation starts +peer1.org2.example.com | [d7d 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f27410 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [d7e 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f27410 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [d7f 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f27410 principal matched by identity 0 +peer1.org2.example.com | [d80 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 74 b0 06 ce c2 7f fa 34 95 97 c9 2a 7d 70 83 |.t......4...*}p.| +peer1.org2.example.com | 00000010 79 ff fb 88 19 6d b1 4c bb b7 43 c7 ef ae 4d f1 |y....m.L..C...M.| +peer1.org2.example.com | [d81 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 3b 65 7b 43 94 98 d4 c8 84 d0 34 |0D. h;e{C......4| +peer1.org2.example.com | 00000010 be 0c 38 1e 49 55 8b 2d e7 57 78 c4 72 4e c7 dd |..8.IU.-.Wx.rN..| +peer1.org2.example.com | 00000020 2a 04 1e d7 02 20 3a 9c a0 d5 4e cc 45 3e 65 8b |*.... :...N.E>e.| +peer1.org2.example.com | 00000030 8b 16 ac f4 52 05 d2 6f e7 64 58 78 8c 04 5e a5 |....R..o.dXx..^.| +peer1.org2.example.com | 00000040 3a d1 88 c7 52 c1 |:...R.| +peer1.org2.example.com | [d82 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f27410 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [d83 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f27410 gate 1598907075313905500 evaluation succeeds +peer1.org2.example.com | [d84 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [d85 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [d86 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [d87 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [d88 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [d89 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [d8a 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [d8b 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [d8c 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [d8d 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d8e 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d8f 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d90 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [d91 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d92 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [d93 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d94 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d95 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d96 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d97 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d98 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d99 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d9b 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [d9a 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [d9c 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [d9e 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [d9d 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [d9f 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [da0 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [da1 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [da2 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [da3 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [da4 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [da5 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [da6 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [da7 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [da8 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [da9 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [daa 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [dab 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [dac 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 1f 34 d8 0a 1b 64 bf 99 6e d1 d9 23 93 8d 9b |..4...d..n..#...| +peer1.org2.example.com | 00000010 2f 5d 01 fb 17 fd 46 02 76 f8 40 fa 52 a2 9e fe |/]....F.v.@.R...| +peer1.org2.example.com | [dad 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 81 aa 57 a4 fa 87 e8 c8 7d 0e |0E.!....W.....}.| +peer1.org2.example.com | 00000010 54 95 10 9a 24 ac 12 47 e9 3e 6a 70 ac 54 ab 5d |T...$..G.>jp.T.]| +peer1.org2.example.com | 00000020 98 31 54 f8 ef 02 20 5b c0 d9 0f 61 bc 51 16 75 |.1T... [...a.Q.u| +peer1.org2.example.com | 00000030 99 0b 98 d5 e0 e9 7e 54 47 47 0e 91 c2 df 38 ef |......~TGG....8.| +peer1.org2.example.com | 00000040 75 87 e9 bc 32 a7 55 |u...2.U| +peer1.org2.example.com | [dae 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [daf 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [db0 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [db1 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [db2 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [db3 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [db4 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [db5 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [db6 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [db7 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [db8 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [db9 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [dba 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dbb 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [dbc 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [dbd 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dbe 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [dbf 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dc0 08-31 20:51:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [dc1 08-31 20:51:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [dc2 08-31 20:51:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dc3 08-31 20:51:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [dc4 08-31 20:51:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dc5 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [dc6 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dc7 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [dc8 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [dc9 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dca 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [dcb 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [dcc 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [dcd 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [dce 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [dcf 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [dd0 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd27f0 gate 1598907075539615200 evaluation starts +peer1.org2.example.com | [dd1 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd27f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [dd2 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd27f0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [dd3 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd27f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [dd4 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd27f0 principal evaluation fails +peer1.org2.example.com | [dd5 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd27f0 gate 1598907075539615200 evaluation fails +peer1.org2.example.com | [dd6 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [dd7 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [dd8 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [dd9 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd2d60 gate 1598907075542085000 evaluation starts +orderer0.example.com | "2020-08-31 20:51:32.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152µs " +orderer0.example.com | "2020-08-31 20:51:32.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec9 Sending msg of 28 bytes to 3 on channel businesschannel took 56.6µs" +orderer0.example.com | "2020-08-31 20:51:32.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eca Sending msg of 28 bytes to 2 on channel businesschannel took 12µs" +orderer0.example.com | "2020-08-31 20:51:32.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.4µs " +peer0.org2.example.com | [e58 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [e59 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [e5a 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [e5b 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [e5c 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [e5d 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [e5e 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e5f 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [e60 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e61 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [e62 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e63 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [e64 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [e65 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e66 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [e67 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [e68 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e69 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [e6a 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [e6b 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e6c 08-31 20:51:13.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [e6d 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161017 +peer0.org2.example.com | [e6e 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C4D6ED84B2EBD392E8AD8AA948E844424E4DDB7261E455CECEE093DD0A6CBF8B +peer0.org2.example.com | [e6f 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [e70 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [e71 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [e72 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e73 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [e74 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c4f 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c50 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c51 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c52 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c53 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [c54 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c55 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [c56 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [c57 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c58 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [c59 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [c5a 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c5b 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [c5c 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [c5d 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [dd8 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [dd9 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [dda 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ddb 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ddc 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ddd 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [dde 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [ddf 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [de0 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [de1 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [de2 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [de3 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [de4 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [de5 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [de6 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [de7 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [de8 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [de9 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [dea 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [deb 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [dec 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [ded 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [dee 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [def 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [df0 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [df1 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [dda 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd2d60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [ddb 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd2d60 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [ddc 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd2d60 principal matched by identity 0 +peer1.org2.example.com | [ddd 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 6c 7f 1b 65 57 9a bc c3 e3 23 19 66 54 d9 0f |Ml..eW....#.fT..| +peer1.org2.example.com | 00000010 5e 15 81 0a 9a 12 3a 31 b0 81 25 7f 88 16 49 a3 |^.....:1..%...I.| +peer1.org2.example.com | [dde 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be 25 48 43 49 2c 8d 94 5c ca d9 |0E.!..%HCI,..\..| +peer1.org2.example.com | 00000010 3a a2 94 06 4c d9 7c 97 55 ad fa e9 b8 31 a4 08 |:...L.|.U....1..| +peer1.org2.example.com | 00000020 30 fb 43 01 97 02 20 6b 9d d4 3b c4 d7 b5 43 4d |0.C... k..;...CM| +peer1.org2.example.com | 00000030 f2 ff 5d 8a d6 c1 f1 55 a4 0d 8f 93 8c de 1b 1f |..]....U........| +peer1.org2.example.com | 00000040 f8 4b de 15 20 ff 3a |.K.. .:| +peer1.org2.example.com | [ddf 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd2d60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [de0 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd2d60 gate 1598907075542085000 evaluation succeeds +peer1.org2.example.com | [de1 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [de2 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [de3 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [de4 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [de5 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [de6 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [de7 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [de8 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [de9 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [dea 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [deb 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dec 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ded 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [dee 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [def 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [df0 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [df1 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [df2 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [df3 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [df4 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [df5 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [df6 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [df7 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [df8 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [df9 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [dfa 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dfb 08-31 20:51:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [dfc 08-31 20:51:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [dfd 08-31 20:51:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [dfe 08-31 20:51:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [dff 08-31 20:51:15.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e00 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [e01 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [e02 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [e03 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [e04 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [e05 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [e06 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e07 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [e08 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [e09 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e0a 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [e0b 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e0c 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [e0d 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [e0e 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e0f 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [e10 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [e11 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [e12 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e13 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [e14 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [e15 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [e16 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e17 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [e18 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D9816101B +peer1.org2.example.com | [e19 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 744F626EF851B2B97A89A194934319A1E130A3494527564C0181421462F0C4BF +peer1.org2.example.com | [e1a 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [e1b 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [e1c 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [e1d 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [e1e 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e1f 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [e20 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [e21 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e22 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e23 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [e24 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [e25 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e26 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [e27 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e28 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [e29 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [e2a 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 4f 62 6e f8 51 b2 b9 7a 89 a1 94 93 43 19 a1 |tObn.Q..z....C..| +peer1.org2.example.com | 00000010 e1 30 a3 49 45 27 56 4c 01 81 42 14 62 f0 c4 bf |.0.IE'VL..B.b...| +peer1.org2.example.com | [e2b 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 4c 56 6b dd 24 ae 93 da c4 0d |0E.!..LVk.$.....| +peer1.org2.example.com | 00000010 34 59 24 07 9d eb 5d d4 90 ae 99 d7 00 49 bd 50 |4Y$...]......I.P| +peer1.org2.example.com | 00000020 97 b1 3a eb 68 02 20 7c b3 d6 f6 1c cf 91 b2 30 |..:.h. |.......0| +peer1.org2.example.com | 00000030 b2 77 db bc bc 9f b5 b7 b2 42 30 82 2e d9 85 95 |.w.......B0.....| +peer1.org2.example.com | 00000040 b9 ce 81 9e 49 97 68 |....I.h| +peer1.org2.example.com | [e2c 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e2d 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e2e 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e2f 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e30 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [e31 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [e32 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e33 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [e34 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [e35 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 4f 62 6e f8 51 b2 b9 7a 89 a1 94 93 43 19 a1 |tObn.Q..z....C..| +peer1.org2.example.com | 00000010 e1 30 a3 49 45 27 56 4c 01 81 42 14 62 f0 c4 bf |.0.IE'VL..B.b...| +peer1.org2.example.com | [e36 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 4c 56 6b dd 24 ae 93 da c4 0d |0E.!..LVk.$.....| +peer1.org2.example.com | 00000010 34 59 24 07 9d eb 5d d4 90 ae 99 d7 00 49 bd 50 |4Y$...]......I.P| +peer1.org2.example.com | 00000020 97 b1 3a eb 68 02 20 7c b3 d6 f6 1c cf 91 b2 30 |..:.h. |.......0| +peer1.org2.example.com | 00000030 b2 77 db bc bc 9f b5 b7 b2 42 30 82 2e d9 85 95 |.w.......B0.....| +peer1.org2.example.com | 00000040 b9 ce 81 9e 49 97 68 |....I.h| +peer1.org2.example.com | [e37 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [e38 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6e a7 1e 7d fc 72 53 a8 4a d3 30 9f |0D. n..}.rS.J.0.| +peer1.org2.example.com | 00000010 b5 72 d3 dd 4b 42 7f 71 a8 b4 31 f0 f2 98 fb 0f |.r..KB.q..1.....| +peer1.org2.example.com | 00000020 48 bc ec 51 02 20 76 2d 05 d7 ff 47 d3 1d 05 c2 |H..Q. v-...G....| +peer1.org2.example.com | 00000030 ea 1f a8 fd 5f 38 3a 84 76 73 69 3a e1 37 7f 5b |...._8:.vsi:.7.[| +peer1.org2.example.com | 00000040 da 36 d7 bd 2f e2 |.6../.| +peer1.org2.example.com | [e39 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [e3a 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [e3b 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e3c 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e3d 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [e3e 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e3f 08-31 20:51:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [e40 08-31 20:51:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [e41 08-31 20:51:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e42 08-31 20:51:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [e43 08-31 20:51:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [e44 08-31 20:51:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 4f 62 6e f8 51 b2 b9 7a 89 a1 94 93 43 19 a1 |tObn.Q..z....C..| +peer1.org2.example.com | 00000010 e1 30 a3 49 45 27 56 4c 01 81 42 14 62 f0 c4 bf |.0.IE'VL..B.b...| +peer1.org2.example.com | [e45 08-31 20:51:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 4c 56 6b dd 24 ae 93 da c4 0d |0E.!..LVk.$.....| +peer1.org2.example.com | 00000010 34 59 24 07 9d eb 5d d4 90 ae 99 d7 00 49 bd 50 |4Y$...]......I.P| +peer1.org2.example.com | 00000020 97 b1 3a eb 68 02 20 7c b3 d6 f6 1c cf 91 b2 30 |..:.h. |.......0| +peer0.org2.example.com | [e75 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [e76 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [e77 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [e78 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e79 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [e7a 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e7b 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [e7c 08-31 20:51:13.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e7d 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [e7e 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e7f 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [e80 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [e81 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 d6 ed 84 b2 eb d3 92 e8 ad 8a a9 48 e8 44 42 |............H.DB| +peer0.org2.example.com | 00000010 4e 4d db 72 61 e4 55 ce ce e0 93 dd 0a 6c bf 8b |NM.ra.U......l..| +peer0.org2.example.com | [e82 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 6f e0 4e 37 ca de e7 13 97 27 e9 |0D. .o.N7.....'.| +peer0.org2.example.com | 00000010 a8 ec 75 e2 19 aa f6 5d 81 00 bb ea e6 d9 d3 81 |..u....]........| +peer0.org2.example.com | 00000020 82 fe df b9 02 20 53 53 53 3a 2f 80 e0 0b 20 c9 |..... SSS:/... .| +peer0.org2.example.com | 00000030 45 9b 9f 22 f0 43 60 a0 71 76 ec da db 98 b8 53 |E..".C`.qv.....S| +peer0.org2.example.com | 00000040 a0 60 9b 29 94 3c |.`.).<| +peer0.org2.example.com | [e83 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [e84 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 fd c3 02 d1 49 78 b3 2b 75 1d d0 |0D. S....Ix.+u..| +peer0.org2.example.com | 00000010 4e d6 21 b6 61 84 29 aa e5 0f 6c b5 d9 e5 7b ff |N.!.a.)...l...{.| +peer0.org2.example.com | 00000020 04 d7 b9 50 02 20 1e ce 3b 71 b2 eb a8 6c 0d aa |...P. ..;q...l..| +peer0.org2.example.com | 00000030 db ef 3a 10 84 58 7b a0 6a da 46 a7 38 f4 7b 17 |..:..X{.j.F.8.{.| +peer0.org2.example.com | 00000040 c9 82 c5 7d 55 a8 |...}U.| +peer0.org2.example.com | [e85 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [e86 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [e87 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e88 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e89 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [e8a 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [e8b 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [e8c 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [e8d 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [e8e 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [e8f 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [e90 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [e91 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [e92 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [e93 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [e94 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9fb0 gate 1598907073502445300 evaluation starts +peer0.org2.example.com | [e95 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9fb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [e96 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9fb0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [e97 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9fb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [e98 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9fb0 principal evaluation fails +peer0.org2.example.com | [e99 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9fb0 gate 1598907073502445300 evaluation fails +peer0.org2.example.com | [e9a 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [e9b 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [e9c 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [e9d 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003046610 gate 1598907073504470400 evaluation starts +peer0.org2.example.com | [e9e 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003046610 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [e9f 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003046610 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [ea0 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003046610 principal matched by identity 0 +peer0.org2.example.com | [ea1 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 d9 6b 09 8c aa 7e bd ab 1a a7 55 c5 2b 89 51 |3.k...~....U.+.Q| +peer0.org2.example.com | 00000010 7e 5f 9c 3d 57 20 a0 1a 04 81 ec 7e b2 8a 7b b9 |~_.=W .....~..{.| +peer0.org2.example.com | [ea2 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 e2 5d 94 fc ae 8f 76 e8 23 1c b9 |0D. y.]....v.#..| +peer0.org2.example.com | 00000010 d9 60 be 1f 03 e6 e7 c3 47 91 9b 77 b9 3b df cb |.`......G..w.;..| +peer0.org2.example.com | 00000020 7d a7 69 90 02 20 2e 72 62 ff 22 9f 3d dd 2e 9c |}.i.. .rb.".=...| +peer0.org2.example.com | 00000030 d9 97 80 77 23 79 e2 32 f9 1f 00 1c 06 55 fb ac |...w#y.2.....U..| +peer0.org2.example.com | 00000040 cd ca ca 0b bb f5 |......| +peer0.org2.example.com | [ea3 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003046610 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [ea4 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003046610 gate 1598907073504470400 evaluation succeeds +peer0.org2.example.com | [ea5 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [ea6 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [ea7 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [ea8 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [ea9 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [eaa 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [eab 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [eac 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [ead 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 d6 ed 84 b2 eb d3 92 e8 ad 8a a9 48 e8 44 42 |............H.DB| +peer0.org2.example.com | 00000010 4e 4d db 72 61 e4 55 ce ce e0 93 dd 0a 6c bf 8b |NM.ra.U......l..| +peer0.org2.example.com | [eae 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 6f e0 4e 37 ca de e7 13 97 27 e9 |0D. .o.N7.....'.| +peer0.org2.example.com | 00000010 a8 ec 75 e2 19 aa f6 5d 81 00 bb ea e6 d9 d3 81 |..u....]........| +peer0.org2.example.com | 00000020 82 fe df b9 02 20 53 53 53 3a 2f 80 e0 0b 20 c9 |..... SSS:/... .| +peer0.org2.example.com | 00000030 45 9b 9f 22 f0 43 60 a0 71 76 ec da db 98 b8 53 |E..".C`.qv.....S| +peer0.org2.example.com | 00000040 a0 60 9b 29 94 3c |.`.).<| +peer0.org2.example.com | [eaf 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [eb0 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [eb1 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [eb2 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [eb3 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 62 52 2f a0 7a a2 5f f5 b0 4e 19 86 d1 11 1b |.bR/.z._..N.....| +peer0.org2.example.com | 00000010 46 16 b9 bb 1a 0a 30 86 a8 1a 6d fd a4 fd 6c 81 |F.....0...m...l.| +peer0.org2.example.com | [eb4 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 f4 4b d8 b1 26 7a 12 19 fc 48 0f |0D. ".K..&z...H.| +peer0.org2.example.com | 00000010 23 96 b6 1c b0 4a 29 77 64 3c 44 db 5e d8 f8 29 |#....J)wd DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [eb6 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [eb7 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [eb8 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [eb9 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [eba 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 d6 ed 84 b2 eb d3 92 e8 ad 8a a9 48 e8 44 42 |............H.DB| +peer0.org2.example.com | 00000010 4e 4d db 72 61 e4 55 ce ce e0 93 dd 0a 6c bf 8b |NM.ra.U......l..| +peer0.org2.example.com | [ebb 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 6f e0 4e 37 ca de e7 13 97 27 e9 |0D. .o.N7.....'.| +peer0.org2.example.com | 00000010 a8 ec 75 e2 19 aa f6 5d 81 00 bb ea e6 d9 d3 81 |..u....]........| +peer0.org2.example.com | 00000020 82 fe df b9 02 20 53 53 53 3a 2f 80 e0 0b 20 c9 |..... SSS:/... .| +peer0.org2.example.com | 00000030 45 9b 9f 22 f0 43 60 a0 71 76 ec da db 98 b8 53 |E..".C`.qv.....S| +peer0.org2.example.com | 00000040 a0 60 9b 29 94 3c |.`.).<| +peer0.org2.example.com | [ebc 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [ebd 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [ebe 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ebf 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [ec0 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 62 52 2f a0 7a a2 5f f5 b0 4e 19 86 d1 11 1b |.bR/.z._..N.....| +peer0.org2.example.com | 00000010 46 16 b9 bb 1a 0a 30 86 a8 1a 6d fd a4 fd 6c 81 |F.....0...m...l.| +peer0.org2.example.com | [ec1 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 f4 4b d8 b1 26 7a 12 19 fc 48 0f |0D. ".K..&z...H.| +peer0.org2.example.com | 00000010 23 96 b6 1c b0 4a 29 77 64 3c 44 db 5e d8 f8 29 |#....J)wd DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [ec3 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ec4 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ec5 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ec6 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [ec7 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [ec8 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ec9 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [eca 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ecb 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ecc 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ecd 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:32.633 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 194.7µs " +orderer0.example.com | "2020-08-31 20:51:32.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecd Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:32.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU ece Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:32.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecf Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:32.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed0 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2020-08-31 20:51:32.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 300.4µs " +orderer0.example.com | "2020-08-31 20:51:33.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed2 Sending msg of 28 bytes to 3 on channel businesschannel took 54.2µs" +orderer0.example.com | "2020-08-31 20:51:33.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.2µs " +orderer0.example.com | "2020-08-31 20:51:33.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed4 Sending msg of 28 bytes to 2 on channel businesschannel took 9µs" +orderer0.example.com | "2020-08-31 20:51:33.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:33.133 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 312.2µs " +orderer0.example.com | "2020-08-31 20:51:33.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed7 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:33.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:33.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed9 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +orderer0.example.com | "2020-08-31 20:51:33.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU eda Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 389.8µs " +orderer0.example.com | "2020-08-31 20:51:33.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edb Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" +orderer0.example.com | "2020-08-31 20:51:33.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edc Sending msg of 28 bytes to 3 on channel businesschannel took 29.9µs" +orderer0.example.com | "2020-08-31 20:51:33.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU edd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.8µs " +orderer0.example.com | "2020-08-31 20:51:33.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU ede Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 557µs " +orderer0.example.com | "2020-08-31 20:51:33.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU edf Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:33.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee0 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:33.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:33.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee2 Sending msg of 28 bytes to 3 on channel testchainid took 25.5µs" +orderer0.example.com | "2020-08-31 20:51:33.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.9µs " +orderer0.example.com | "2020-08-31 20:51:34.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee4 Sending msg of 28 bytes to 2 on channel businesschannel took 65.4µs" +orderer0.example.com | "2020-08-31 20:51:34.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee5 Sending msg of 28 bytes to 3 on channel businesschannel took 9.9µs" +orderer0.example.com | "2020-08-31 20:51:34.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 123.8µs " +orderer0.example.com | "2020-08-31 20:51:34.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 729.4µs " +orderer0.example.com | "2020-08-31 20:51:34.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:34.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee9 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:34.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU eea Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:34.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eeb Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +orderer0.example.com | "2020-08-31 20:51:34.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU eec Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 707.7µs " +orderer0.example.com | "2020-08-31 20:51:34.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eed Sending msg of 28 bytes to 2 on channel businesschannel took 50.8µs" +orderer0.example.com | "2020-08-31 20:51:34.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eef Sending msg of 28 bytes to 3 on channel businesschannel took 13.2µs" +orderer0.example.com | "2020-08-31 20:51:34.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.4µs " +orderer0.example.com | "2020-08-31 20:51:34.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU eee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 111.6µs " +peer0.org1.example.com | [c5e 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [c5f 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [c60 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [c61 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f8420 gate 1598907069480303400 evaluation starts +peer0.org1.example.com | [c62 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f8420 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [c63 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f8420 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [c64 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f8420 principal matched by identity 0 +peer0.org1.example.com | [c65 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 a7 64 a1 59 2f 08 ef 19 da 91 37 9a b5 49 98 |I.d.Y/.....7..I.| +peer0.org1.example.com | 00000010 15 63 00 ab 9c 13 83 36 60 dc 57 6d df 31 1b 11 |.c.....6`.Wm.1..| +peer0.org1.example.com | [c66 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 9d 53 bd aa 48 cc 88 5a 1c 15 |0E.!...S..H..Z..| +peer0.org1.example.com | 00000010 83 dc d6 95 46 d4 65 0b a5 5b 92 6e 2f 70 c0 8b |....F.e..[.n/p..| +peer0.org1.example.com | 00000020 d8 0a 17 fe c0 02 20 14 9a 17 05 81 a7 93 ce c9 |...... .........| +peer0.org1.example.com | 00000030 0b 18 48 d1 e0 56 16 62 4c e8 73 fd c9 21 7a 62 |..H..V.bL.s..!zb| +peer0.org1.example.com | 00000040 ee d4 2f 0e c1 8b 64 |../...d| +peer0.org1.example.com | [c67 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f8420 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [c68 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f8420 gate 1598907069480303400 evaluation succeeds +peer0.org1.example.com | [c69 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [c6a 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [c6b 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [c6c 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [c6d 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [c6e 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [c6f 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [c70 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [c71 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [c72 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c73 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c74 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c75 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [c76 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c77 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c78 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c79 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [c7a 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [c7b 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [c7c 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c7d 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [c7e 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [c7f 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [ece 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [ecf 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ed0 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [ed1 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ed2 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [ed3 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [ed4 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ed5 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [ed6 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [ed7 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [ed8 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [ed9 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [eda 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [edb 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd19b0 gate 1598907073566337700 evaluation starts +peer0.org2.example.com | [edc 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd19b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [edd 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd19b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [ede 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd19b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [edf 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd19b0 principal evaluation fails +peer0.org2.example.com | [ee0 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd19b0 gate 1598907073566337700 evaluation fails +peer0.org2.example.com | [ee1 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [ee2 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [ee3 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [ee4 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd1f20 gate 1598907073566884700 evaluation starts +peer0.org2.example.com | [ee5 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd1f20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [ee6 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd1f20 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [ee7 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd1f20 principal matched by identity 0 +peer0.org2.example.com | [ee8 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 7b 4b 5e 5c 7d fc 0e ff 8c 54 b1 23 0c ce 27 |B{K^\}....T.#..'| +peer0.org2.example.com | 00000010 2a 02 60 e1 f1 29 d1 a5 9e f3 b6 cb 3b 47 84 0b |*.`..)......;G..| +peer0.org2.example.com | [ee9 08-31 20:51:13.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d ca 98 86 2f 16 ad de 8b a3 52 01 |0D. ].../.....R.| +peer0.org2.example.com | 00000010 1e 50 64 87 e8 df f8 f1 f2 81 c1 91 16 ca 28 21 |.Pd...........(!| +peer0.org2.example.com | 00000020 e9 ce a8 40 02 20 60 43 80 ab 5e 48 0a c4 ba 20 |...@. `C..^H... | +peer0.org2.example.com | 00000030 c1 61 7e f2 86 b1 92 f7 94 f4 97 3f fc e9 34 9e |.a~........?..4.| +peer0.org2.example.com | 00000040 7c bf f1 d1 ce 6b ||....k| +peer0.org2.example.com | [eea 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd1f20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [eeb 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd1f20 gate 1598907073566884700 evaluation succeeds +peer0.org2.example.com | [eec 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [eed 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [eee 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [eef 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [ef0 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [ef1 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [ef2 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [ef3 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [ef4 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [ef5 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ef6 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ef7 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ef8 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [ef9 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [efa 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [efb 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [efc 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [efd 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [efe 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [eff 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f00 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [f01 08-31 20:51:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f02 08-31 20:51:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f03 08-31 20:51:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f04 08-31 20:51:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f05 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [f06 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f07 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f08 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f09 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f0a 08-31 20:51:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f0b 08-31 20:51:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f0c 08-31 20:51:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [f0d 08-31 20:51:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [f0e 08-31 20:51:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f0f 08-31 20:51:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [f10 08-31 20:51:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f11 08-31 20:51:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [f12 08-31 20:51:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f13 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [f14 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [f15 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [f16 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f17 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f18 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [f19 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f1a 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f1b 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [f1c 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [f1d 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [f1e 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312ac20 gate 1598907074233525500 evaluation starts +peer0.org2.example.com | [f1f 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312ac20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f20 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312ac20 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [f21 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312ac20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [f22 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312ac20 principal evaluation fails +peer0.org2.example.com | [f23 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312ac20 gate 1598907074233525500 evaluation fails +peer0.org2.example.com | [f24 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f25 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f26 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [f27 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312b190 gate 1598907074234156100 evaluation starts +peer0.org2.example.com | [f28 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312b190 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f29 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312b190 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [f2a 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312b190 principal matched by identity 0 +peer0.org2.example.com | [f2b 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [f2c 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [f2d 08-31 20:51:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312b190 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [f2e 08-31 20:51:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312b190 gate 1598907074234156100 evaluation succeeds +peer0.org2.example.com | [f2f 08-31 20:51:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [f30 08-31 20:51:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [f31 08-31 20:51:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [f32 08-31 20:51:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [f33 08-31 20:51:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [f34 08-31 20:51:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [f35 08-31 20:51:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f36 08-31 20:51:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f37 08-31 20:51:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:34.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:34.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef2 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:34.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef3 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:34.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef4 Sending msg of 28 bytes to 3 on channel testchainid took 26.6µs" +orderer0.example.com | "2020-08-31 20:51:34.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.4µs " +orderer0.example.com | "2020-08-31 20:51:35.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef6 Sending msg of 28 bytes to 2 on channel businesschannel took 25µs" +orderer0.example.com | "2020-08-31 20:51:35.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef7 Sending msg of 28 bytes to 3 on channel businesschannel took 13.7µs" +orderer0.example.com | "2020-08-31 20:51:35.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.6µs " +orderer0.example.com | "2020-08-31 20:51:35.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 556.7µs " +orderer0.example.com | "2020-08-31 20:51:35.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU efa Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:35.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU efb Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:35.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU efc Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:35.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efd Sending msg of 28 bytes to 3 on channel testchainid took 106µs" +orderer0.example.com | "2020-08-31 20:51:35.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU efe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 311.4µs " +orderer0.example.com | "2020-08-31 20:51:35.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eff Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +orderer0.example.com | "2020-08-31 20:51:35.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f00 Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +orderer0.example.com | "2020-08-31 20:51:35.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU f01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.9µs " +orderer0.example.com | "2020-08-31 20:51:35.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU f02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 392.4µs " +orderer0.example.com | "2020-08-31 20:51:35.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU f03 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:35.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU f04 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:35.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU f05 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:35.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f06 Sending msg of 28 bytes to 3 on channel testchainid took 22.8µs" +orderer0.example.com | "2020-08-31 20:51:35.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU f07 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 540.9µs " +orderer0.example.com | "2020-08-31 20:51:36.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f08 Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +orderer0.example.com | "2020-08-31 20:51:36.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU f09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.3µs " +orderer0.example.com | "2020-08-31 20:51:36.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0a Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +orderer0.example.com | "2020-08-31 20:51:36.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.4µs " +orderer0.example.com | "2020-08-31 20:51:36.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0c Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:36.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:36.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:36.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0f Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +orderer0.example.com | "2020-08-31 20:51:36.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU f10 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 555.9µs " +orderer0.example.com | "2020-08-31 20:51:36.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f11 Sending msg of 28 bytes to 2 on channel businesschannel took 24.7µs" +orderer0.example.com | "2020-08-31 20:51:36.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU f12 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 311.4µs " +orderer0.example.com | "2020-08-31 20:51:36.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f13 Sending msg of 28 bytes to 3 on channel businesschannel took 25.7µs" +orderer0.example.com | "2020-08-31 20:51:36.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU f14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71µs " +orderer0.example.com | "2020-08-31 20:51:36.632 UTC [orderer.common.cluster.step] handleMessage -> DEBU f15 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:36.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU f16 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:36.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU f17 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:36.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f18 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +orderer0.example.com | "2020-08-31 20:51:36.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU f19 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 415.3µs " +orderer0.example.com | "2020-08-31 20:51:37.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1a Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +orderer0.example.com | "2020-08-31 20:51:37.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1b Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +orderer0.example.com | "2020-08-31 20:51:37.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.7µs " +orderer0.example.com | "2020-08-31 20:51:37.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 602.2µs " +orderer0.example.com | "2020-08-31 20:51:37.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:37.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1f Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:37.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU f20 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:37.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f21 Sending msg of 28 bytes to 3 on channel testchainid took 10.2µs" +orderer0.example.com | "2020-08-31 20:51:37.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU f22 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 821.3µs " +orderer0.example.com | "2020-08-31 20:51:37.634 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f23 Sending msg of 28 bytes to 2 on channel businesschannel took 27.7µs" +orderer0.example.com | "2020-08-31 20:51:37.634 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f24 Sending msg of 28 bytes to 3 on channel businesschannel took 128.3µs" +orderer0.example.com | "2020-08-31 20:51:37.635 UTC [orderer.common.cluster.step] sendMessage -> DEBU f25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 176.4µs " +orderer0.example.com | "2020-08-31 20:51:37.635 UTC [orderer.common.cluster.step] sendMessage -> DEBU f26 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 498.4µs " +orderer0.example.com | "2020-08-31 20:51:37.636 UTC [orderer.common.cluster.step] handleMessage -> DEBU f27 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:37.637 UTC [orderer.common.cluster.step] handleMessage -> DEBU f28 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:37.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU f29 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:37.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2a Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +orderer0.example.com | "2020-08-31 20:51:37.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.4µs " +orderer0.example.com | "2020-08-31 20:51:38.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2c Sending msg of 28 bytes to 3 on channel businesschannel took 29.4µs" +orderer0.example.com | "2020-08-31 20:51:38.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2d Sending msg of 28 bytes to 2 on channel businesschannel took 92µs" +orderer0.example.com | "2020-08-31 20:51:38.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105.1µs " +orderer0.example.com | "2020-08-31 20:51:38.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2778ms " +orderer0.example.com | "2020-08-31 20:51:38.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f30 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:38.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f31 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:38.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU f32 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:38.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f33 Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +peer1.org1.example.com | [df2 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d6bc0 gate 1598907077046238700 evaluation starts +peer1.org1.example.com | [df3 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d6bc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [df4 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d6bc0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [df5 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d6bc0 principal matched by identity 0 +peer1.org1.example.com | [df6 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 4f 62 6e f8 51 b2 b9 7a 89 a1 94 93 43 19 a1 |tObn.Q..z....C..| +peer1.org1.example.com | 00000010 e1 30 a3 49 45 27 56 4c 01 81 42 14 62 f0 c4 bf |.0.IE'VL..B.b...| +peer1.org1.example.com | [df7 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 4c 56 6b dd 24 ae 93 da c4 0d |0E.!..LVk.$.....| +peer1.org1.example.com | 00000010 34 59 24 07 9d eb 5d d4 90 ae 99 d7 00 49 bd 50 |4Y$...]......I.P| +peer1.org1.example.com | 00000020 97 b1 3a eb 68 02 20 7c b3 d6 f6 1c cf 91 b2 30 |..:.h. |.......0| +peer1.org1.example.com | 00000030 b2 77 db bc bc 9f b5 b7 b2 42 30 82 2e d9 85 95 |.w.......B0.....| +peer1.org1.example.com | 00000040 b9 ce 81 9e 49 97 68 |....I.h| +peer1.org1.example.com | [df8 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d6bc0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [df9 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d6bc0 gate 1598907077046238700 evaluation succeeds +peer1.org1.example.com | [dfa 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [dfb 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [dfc 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [dfd 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [dfe 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [dff 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [e00 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [e01 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [e02 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [e03 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e04 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e05 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e06 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [e07 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e08 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e09 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e0a 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [e0b 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:jp\254T\253]\2301T\370\357\002 [\300\331\017a\274Q\026u\231\013\230\325\340\351~TGG\016\221\302\3378\357u\207\351\2742\247U" > alive: alive:e\213\213\026\254\364R\005\322o\347dXx\214\004^\245:\321\210\307R\301" > +peer1.org1.example.com | [e0c 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [e0d 08-31 20:51:17.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e0e 08-31 20:51:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [e0f 08-31 20:51:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000030 b2 77 db bc bc 9f b5 b7 b2 42 30 82 2e d9 85 95 |.w.......B0.....| +peer1.org2.example.com | 00000040 b9 ce 81 9e 49 97 68 |....I.h| +peer1.org2.example.com | [e46 08-31 20:51:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e47 08-31 20:51:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e48 08-31 20:51:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e49 08-31 20:51:17.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e4a 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [e4b 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [e4c 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [e4d 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [e4e 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e4f 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e50 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e51 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e52 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e53 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e54 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [e55 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e56 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [e57 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e58 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [e59 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [e5a 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e5b 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [e5c 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [e5d 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [e5e 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [e5f 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [e60 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [e61 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098900 gate 1598907077312347800 evaluation starts +peer1.org2.example.com | [e62 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098900 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [e63 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098900 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [e64 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098900 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [e65 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098900 principal evaluation fails +peer1.org2.example.com | [e66 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098900 gate 1598907077312347800 evaluation fails +peer1.org2.example.com | [e67 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [e68 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [e69 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [e6a 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098ee0 gate 1598907077312890400 evaluation starts +peer1.org2.example.com | [e6b 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098ee0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [e6c 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098ee0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [e6d 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098ee0 principal matched by identity 0 +peer1.org2.example.com | [e6e 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 7b 55 40 22 53 fb bd b2 ea 57 b6 c3 68 bf 11 |.{U@"S....W..h..| +peer1.org2.example.com | 00000010 b7 47 2f 6d 7f cd 9a 57 86 c2 3c 49 73 3d 5f d5 |.G/m...W.. DEBU Verify: sig = 00000000 30 45 02 21 00 8d 65 c2 3a e7 ad bd 89 c0 57 ec |0E.!..e.:.....W.| +peer1.org2.example.com | 00000010 3f 8c 8c db 68 8e 65 97 24 b6 db cb 05 11 40 b6 |?...h.e.$.....@.| +peer1.org2.example.com | 00000020 ac c0 db 55 9c 02 20 25 da 0e f6 bb 23 97 81 1d |...U.. %....#...| +peer1.org2.example.com | 00000030 de 28 62 07 23 09 5e 9e b8 af 62 cc 86 15 b4 83 |.(b.#.^...b.....| +peer1.org2.example.com | 00000040 4d e4 d5 c3 33 24 8f |M...3$.| +peer1.org2.example.com | [e70 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098ee0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [c80 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [c81 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [c82 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [c83 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [c84 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c85 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [c86 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c87 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [c88 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c89 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [c8b 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [c8a 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [c8c 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +peer0.org1.example.com | [c8d 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c8e 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +peer0.org1.example.com | [c8f 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +peer0.org1.example.com | [c90 08-31 20:51:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c91 08-31 20:51:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [c92 08-31 20:51:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [c93 08-31 20:51:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [c94 08-31 20:51:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [c95 08-31 20:51:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161014 +peer0.org1.example.com | [c96 08-31 20:51:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9F9B70869C218C0461A8970F345137A88CB8FE8EDF8CF92904CBA269CE909422 +peer0.org1.example.com | [c97 08-31 20:51:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [c98 08-31 20:51:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [c99 08-31 20:51:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [c9a 08-31 20:51:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [f38 08-31 20:51:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f3a 08-31 20:51:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f3b 08-31 20:51:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [f39 08-31 20:51:14.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f3c 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f3d 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [f3e 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f3f 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f40 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [f41 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [f42 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f43 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [f44 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [f45 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319cba0 gate 1598907074265792700 evaluation starts +peer0.org2.example.com | [f46 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319cba0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f47 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319cba0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [f48 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319cba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [f49 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319cba0 principal evaluation fails +peer0.org2.example.com | [f4a 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319cba0 gate 1598907074265792700 evaluation fails +peer0.org2.example.com | [f4b 08-31 20:51:14.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f4c 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f4d 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [f4e 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319d110 gate 1598907074272150200 evaluation starts +peer0.org2.example.com | [f4f 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319d110 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f50 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319d110 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [f51 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319d110 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:51:38.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU f34 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 509.6µs " +orderer0.example.com | "2020-08-31 20:51:38.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f35 Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +orderer0.example.com | "2020-08-31 20:51:38.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f36 Sending msg of 28 bytes to 2 on channel businesschannel took 11.4µs" +orderer0.example.com | "2020-08-31 20:51:38.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU f37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 155.2µs " +orderer0.example.com | "2020-08-31 20:51:38.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU f38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 219.7µs " +orderer0.example.com | "2020-08-31 20:51:38.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU f39 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:38.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:38.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:38.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3c Sending msg of 28 bytes to 3 on channel testchainid took 151.4µs" +orderer0.example.com | "2020-08-31 20:51:38.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 662.8µs " +peer1.org2.example.com | [e71 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098ee0 gate 1598907077312890400 evaluation succeeds +peer1.org2.example.com | [e72 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [e73 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [e74 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [e75 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [e76 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [e77 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [e78 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [e79 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [e7a 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [e7b 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e7c 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e7d 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e7e 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [e7f 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e80 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e81 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e82 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [e83 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:jp\254T\253]\2301T\370\357\002 [\300\331\017a\274Q\026u\231\013\230\325\340\351~TGG\016\221\302\3378\357u\207\351\2742\247U" > alive: alive: alive: +peer1.org2.example.com | [e84 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [e85 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e86 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [e87 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [e88 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [e89 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [e8a 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e8b 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [f52 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [f53 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [f54 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319d110 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [f55 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319d110 gate 1598907074272150200 evaluation succeeds +peer0.org2.example.com | [f56 08-31 20:51:14.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [f57 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [f58 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [f59 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [f5a 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f5b 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [f5c 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f5d 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f5e 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f5f 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [f60 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f61 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f62 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [f63 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [f64 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [f65 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c2560 gate 1598907074283624100 evaluation starts +peer0.org2.example.com | [f66 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c2560 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f67 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c2560 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [f68 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c2560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [f69 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c2560 principal evaluation fails +peer0.org2.example.com | [f6a 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c2560 gate 1598907074283624100 evaluation fails +peer0.org2.example.com | [f6b 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f6c 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f6d 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [f6e 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c2ad0 gate 1598907074285427600 evaluation starts +peer0.org2.example.com | [f6f 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c2ad0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f70 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c2ad0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [f71 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c2ad0 principal matched by identity 0 +peer0.org2.example.com | [f72 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [f73 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [f74 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c2ad0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [f75 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c2ad0 gate 1598907074285427600 evaluation succeeds +peer0.org2.example.com | [f76 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [f77 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [f78 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [f79 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [f7a 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [f7b 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [f7c 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f7d 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f7e 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [f7f 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f80 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [f81 08-31 20:51:14.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [f82 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [f83 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [f84 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e03f0 gate 1598907074291233700 evaluation starts +peer0.org2.example.com | [f85 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e03f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f86 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e03f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [f87 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e03f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [f88 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e03f0 principal evaluation fails +peer0.org2.example.com | [f89 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e03f0 gate 1598907074291233700 evaluation fails +peer0.org2.example.com | [f8a 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f8b 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [f8c 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:39.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3e Sending msg of 28 bytes to 2 on channel businesschannel took 25.9µs" +orderer0.example.com | "2020-08-31 20:51:39.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3f Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +orderer0.example.com | "2020-08-31 20:51:39.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 269.2µs " +orderer0.example.com | "2020-08-31 20:51:39.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1163ms " +orderer0.example.com | "2020-08-31 20:51:39.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f42 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:39.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f43 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:39.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU f44 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:39.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f45 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +orderer0.example.com | "2020-08-31 20:51:39.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU f46 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.2µs " +orderer0.example.com | "2020-08-31 20:51:39.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f47 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +orderer0.example.com | "2020-08-31 20:51:39.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f48 Sending msg of 28 bytes to 3 on channel businesschannel took 7.3µs" +orderer0.example.com | "2020-08-31 20:51:39.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU f49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 253.4µs " +orderer0.example.com | "2020-08-31 20:51:39.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 343.1µs " +orderer0.example.com | "2020-08-31 20:51:39.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:39.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4c Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:39.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:39.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4e Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +orderer0.example.com | "2020-08-31 20:51:39.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.1µs " +orderer0.example.com | "2020-08-31 20:51:40.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f50 Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +orderer0.example.com | "2020-08-31 20:51:40.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f51 Sending msg of 28 bytes to 3 on channel businesschannel took 8.5µs" +orderer0.example.com | "2020-08-31 20:51:40.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU f52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 343.1µs " +orderer0.example.com | "2020-08-31 20:51:40.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f53 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 506µs " +orderer0.example.com | "2020-08-31 20:51:40.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f54 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:40.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f55 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:40.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU f56 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:40.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f57 Sending msg of 28 bytes to 3 on channel testchainid took 54.7µs" +orderer0.example.com | "2020-08-31 20:51:40.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU f58 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.5µs " +orderer0.example.com | "2020-08-31 20:51:40.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f59 Sending msg of 28 bytes to 2 on channel businesschannel took 50.4µs" +orderer0.example.com | "2020-08-31 20:51:40.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.8µs " +orderer0.example.com | "2020-08-31 20:51:40.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5b Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +orderer0.example.com | "2020-08-31 20:51:40.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.5µs " +orderer0.example.com | "2020-08-31 20:51:40.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5d Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:40.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:40.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [e10 08-31 20:51:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [e11 08-31 20:51:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [e12 08-31 20:51:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [e13 08-31 20:51:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [e14 08-31 20:51:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [e15 08-31 20:51:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e16 08-31 20:51:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [e17 08-31 20:51:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e18 08-31 20:51:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [e19 08-31 20:51:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e1a 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [e1b 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [e1c 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [e1d 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e1e 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [e1f 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [e20 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [e21 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e22 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [e23 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D9816101C +peer1.org1.example.com | [e24 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 807B55402253FBBDB2EA57B6C368BF11B7472F6D7FCD9A5786C23C49733D5FD5 +peer1.org1.example.com | [e25 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [e26 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [e27 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [e28 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\202J\341\206\345Rj\274\002 t\353\343\003H\222;\354\274C6,9W\215\360\361s\264\367\205\315\241\250\270\247\017\000yd\244\247" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [e29 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e8c 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [e8d 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e8e 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [e8f 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [e90 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 a9 f7 2c a0 f6 b3 39 b4 40 60 70 02 0d 8d db |f..,...9.@`p....| +peer1.org2.example.com | 00000010 fa d7 ae 80 29 9c cd 1c 4a e0 65 7b 8e c0 ca 13 |....)...J.e{....| +peer1.org2.example.com | [e91 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 5b cf fe d5 c5 4b c6 f2 a2 15 |0E.!..[....K....| +peer1.org2.example.com | 00000010 6b a2 72 5b 8b 94 46 8a 0a 7b 9d 5d 6f 89 e7 bf |k.r[..F..{.]o...| +peer1.org2.example.com | 00000020 8c cf 76 f6 7b 02 20 65 0e 52 94 55 59 f3 3e 78 |..v.{. e.R.UY.>x| +peer1.org2.example.com | 00000030 26 ea 4a 41 5e 47 da 63 17 44 ed 6f 7d cc 6f 57 |&.JA^G.c.D.o}.oW| +peer1.org2.example.com | 00000040 f0 81 92 96 a6 e0 6b |......k| +peer1.org2.example.com | [e92 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [e93 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 43 a3 60 45 de ef 30 e1 33 a8 e4 |0D. SC.`E..0.3..| +peer1.org2.example.com | 00000010 94 4a 81 76 02 0b 36 8f 17 c9 27 7c b6 5e ec d4 |.J.v..6...'|.^..| +peer1.org2.example.com | 00000020 bc 46 f2 5c 02 20 5a d5 13 7d 92 33 98 83 63 60 |.F.\. Z..}.3..c`| +peer1.org2.example.com | 00000030 b4 04 ca e6 09 8e a5 9d 91 05 10 68 6f 61 00 eb |...........hoa..| +peer1.org2.example.com | 00000040 0f a8 13 4b 3b 81 |...K;.| +peer1.org2.example.com | [e94 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [e95 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [e96 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [e97 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [e98 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [e99 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e9a 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e9b 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [e9c 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [e9d 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e9e 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [e9f 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [ea0 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" secret_envelope: > alive: +peer1.org2.example.com | [ea1 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [ea2 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ea3 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:40.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f60 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +orderer0.example.com | "2020-08-31 20:51:40.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU f61 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 375.4µs " +orderer0.example.com | "2020-08-31 20:51:41.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f62 Sending msg of 28 bytes to 2 on channel businesschannel took 55.9µs" +orderer0.example.com | "2020-08-31 20:51:41.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f63 Sending msg of 28 bytes to 3 on channel businesschannel took 7.6µs" +orderer0.example.com | "2020-08-31 20:51:41.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f64 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 205.8µs " +orderer0.example.com | "2020-08-31 20:51:41.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 376.9µs " +orderer0.example.com | "2020-08-31 20:51:41.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f66 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:41.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU f67 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:41.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU f68 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:41.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f69 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +orderer0.example.com | "2020-08-31 20:51:41.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.1µs " +orderer0.example.com | "2020-08-31 20:51:41.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6b Sending msg of 28 bytes to 2 on channel businesschannel took 26.5µs" +orderer0.example.com | "2020-08-31 20:51:41.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6c Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +orderer0.example.com | "2020-08-31 20:51:41.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 187.7µs " +orderer0.example.com | "2020-08-31 20:51:41.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 205.9µs " +orderer0.example.com | "2020-08-31 20:51:41.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:41.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU f70 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:41.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU f71 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:41.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f72 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +orderer0.example.com | "2020-08-31 20:51:41.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU f73 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 618.9µs " +orderer0.example.com | "2020-08-31 20:51:42.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f74 Sending msg of 28 bytes to 2 on channel businesschannel took 56.2µs" +orderer0.example.com | "2020-08-31 20:51:42.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f75 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +orderer0.example.com | "2020-08-31 20:51:42.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU f76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 316.2µs " +orderer0.example.com | "2020-08-31 20:51:42.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 132.8µs " +orderer0.example.com | "2020-08-31 20:51:42.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f78 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:42.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f79 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:42.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:42.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7b Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +orderer0.example.com | "2020-08-31 20:51:42.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 406.3µs " +orderer0.example.com | "2020-08-31 20:51:42.636 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7d Sending msg of 28 bytes to 2 on channel businesschannel took 19.5µs" +orderer0.example.com | "2020-08-31 20:51:42.636 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7e Sending msg of 28 bytes to 3 on channel businesschannel took 19.2µs" +orderer0.example.com | "2020-08-31 20:51:42.637 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 115µs " +orderer0.example.com | "2020-08-31 20:51:42.637 UTC [orderer.common.cluster.step] sendMessage -> DEBU f80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.5µs " +orderer0.example.com | "2020-08-31 20:51:42.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU f81 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:42.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU f82 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:42.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU f83 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:42.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f84 Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" +orderer0.example.com | "2020-08-31 20:51:42.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU f85 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 255.9µs " +orderer0.example.com | "2020-08-31 20:51:43.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f86 Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" +orderer0.example.com | "2020-08-31 20:51:43.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f87 Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +orderer0.example.com | "2020-08-31 20:51:43.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU f88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.9µs " +orderer0.example.com | "2020-08-31 20:51:43.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 644.1µs " +orderer0.example.com | "2020-08-31 20:51:43.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8a Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:43.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:43.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:43.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8d Sending msg of 28 bytes to 3 on channel testchainid took 11.6µs" +orderer0.example.com | "2020-08-31 20:51:43.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 446.2µs " +orderer0.example.com | "2020-08-31 20:51:43.635 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8f Sending msg of 28 bytes to 2 on channel businesschannel took 26.7µs" +orderer0.example.com | "2020-08-31 20:51:43.635 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f90 Sending msg of 28 bytes to 3 on channel businesschannel took 18µs" +orderer0.example.com | "2020-08-31 20:51:43.637 UTC [orderer.common.cluster.step] sendMessage -> DEBU f91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 258µs " +orderer0.example.com | "2020-08-31 20:51:43.637 UTC [orderer.common.cluster.step] sendMessage -> DEBU f92 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.2µs " +orderer0.example.com | "2020-08-31 20:51:43.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU f93 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:43.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU f94 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:43.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU f95 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:43.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f96 Sending msg of 28 bytes to 3 on channel testchainid took 10.9µs" +orderer0.example.com | "2020-08-31 20:51:43.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU f97 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.6µs " +orderer0.example.com | "2020-08-31 20:51:44.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f98 Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +orderer0.example.com | "2020-08-31 20:51:44.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f99 Sending msg of 28 bytes to 3 on channel businesschannel took 7.6µs" +orderer0.example.com | "2020-08-31 20:51:44.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.7µs " +orderer0.example.com | "2020-08-31 20:51:44.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.2µs " +orderer0.example.com | "2020-08-31 20:51:44.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9c Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:44.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:44.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:44.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9f Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +orderer0.example.com | "2020-08-31 20:51:44.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 306.6µs " +orderer0.example.com | "2020-08-31 20:51:44.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa1 Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +orderer0.example.com | "2020-08-31 20:51:44.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa2 Sending msg of 28 bytes to 2 on channel businesschannel took 14µs" +orderer0.example.com | "2020-08-31 20:51:44.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 144.7µs " +orderer0.example.com | "2020-08-31 20:51:44.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113µs " +orderer0.example.com | "2020-08-31 20:51:44.632 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa5 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:44.632 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:44.846 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa7 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:44.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa8 Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs" +orderer0.example.com | "2020-08-31 20:51:44.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 299.7µs " +orderer0.example.com | "2020-08-31 20:51:45.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU faa Sending msg of 28 bytes to 2 on channel businesschannel took 57.1µs" +orderer0.example.com | "2020-08-31 20:51:45.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU fab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 171.1µs " +orderer0.example.com | "2020-08-31 20:51:45.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fac Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" +orderer0.example.com | "2020-08-31 20:51:45.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU fad Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:45.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU fae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 416.9µs " +orderer0.example.com | "2020-08-31 20:51:45.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU faf Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:45.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb0 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:45.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb1 Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" +orderer0.example.com | "2020-08-31 20:51:45.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55µs " +orderer0.example.com | "2020-08-31 20:51:45.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb3 Sending msg of 28 bytes to 2 on channel businesschannel took 17.9µs" +orderer0.example.com | "2020-08-31 20:51:45.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb4 Sending msg of 28 bytes to 3 on channel businesschannel took 7.8µs" +orderer0.example.com | "2020-08-31 20:51:45.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157µs " +orderer0.example.com | "2020-08-31 20:51:45.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 358.8µs " +orderer0.example.com | "2020-08-31 20:51:45.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb7 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:45.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:45.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb9 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:45.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fba Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +orderer0.example.com | "2020-08-31 20:51:45.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.8µs " +orderer0.example.com | "2020-08-31 20:51:46.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbc Sending msg of 28 bytes to 3 on channel businesschannel took 36.3µs" +orderer0.example.com | "2020-08-31 20:51:46.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbd Sending msg of 28 bytes to 2 on channel businesschannel took 5.6µs" +orderer0.example.com | "2020-08-31 20:51:46.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 274.6µs " +orderer0.example.com | "2020-08-31 20:51:46.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.7µs " +orderer0.example.com | "2020-08-31 20:51:46.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc0 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:46.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc1 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:46.341 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:46.342 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc3 Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" +orderer0.example.com | "2020-08-31 20:51:46.343 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 781.3µs " +orderer0.example.com | "2020-08-31 20:51:46.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc5 Sending msg of 28 bytes to 2 on channel businesschannel took 26.8µs" +orderer0.example.com | "2020-08-31 20:51:46.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc6 Sending msg of 28 bytes to 3 on channel businesschannel took 31.9µs" +orderer0.example.com | "2020-08-31 20:51:46.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 545.9µs " +orderer0.example.com | "2020-08-31 20:51:46.633 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 656.8µs " +orderer0.example.com | "2020-08-31 20:51:46.636 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc9 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:46.637 UTC [orderer.common.cluster.step] handleMessage -> DEBU fca Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:46.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU fcb Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:46.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcc Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +orderer0.example.com | "2020-08-31 20:51:46.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.9µs " +orderer0.example.com | "2020-08-31 20:51:47.132 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fce Sending msg of 28 bytes to 2 on channel businesschannel took 37µs" +orderer0.example.com | "2020-08-31 20:51:47.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 329.2µs " +orderer0.example.com | "2020-08-31 20:51:47.132 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd0 Sending msg of 28 bytes to 3 on channel businesschannel took 15.5µs" +orderer0.example.com | "2020-08-31 20:51:47.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd1 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:47.135 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.249ms " +orderer0.example.com | "2020-08-31 20:51:47.137 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd3 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:47.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:47.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd5 Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" +orderer0.example.com | "2020-08-31 20:51:47.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.6µs " +orderer0.example.com | "2020-08-31 20:51:47.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd7 Sending msg of 28 bytes to 2 on channel businesschannel took 35.3µs" +orderer0.example.com | "2020-08-31 20:51:47.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd8 Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +orderer0.example.com | "2020-08-31 20:51:47.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.2µs " +orderer0.example.com | "2020-08-31 20:51:47.633 UTC [orderer.common.cluster.step] sendMessage -> DEBU fda Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 891µs " +orderer0.example.com | "2020-08-31 20:51:47.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU fdb Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:47.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU fdc Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:47.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU fdd Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:47.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fde Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +orderer0.example.com | "2020-08-31 20:51:47.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU fdf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.6µs " +orderer0.example.com | "2020-08-31 20:51:48.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe0 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +orderer0.example.com | "2020-08-31 20:51:48.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe1 Sending msg of 28 bytes to 3 on channel businesschannel took 9.8µs" +orderer0.example.com | "2020-08-31 20:51:48.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 322.6µs " +orderer0.example.com | "2020-08-31 20:51:48.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 254µs " +orderer0.example.com | "2020-08-31 20:51:48.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:48.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe5 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:48.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:48.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe7 Sending msg of 28 bytes to 3 on channel testchainid took 66µs" +orderer0.example.com | "2020-08-31 20:51:48.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 721.2µs " +orderer0.example.com | "2020-08-31 20:51:48.635 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe9 Sending msg of 28 bytes to 2 on channel businesschannel took 27µs" +orderer0.example.com | "2020-08-31 20:51:48.636 UTC [orderer.common.cluster.step] sendMessage -> DEBU fea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.8µs " +orderer0.example.com | "2020-08-31 20:51:48.635 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU feb Sending msg of 28 bytes to 3 on channel businesschannel took 17.9µs" +orderer0.example.com | "2020-08-31 20:51:48.637 UTC [orderer.common.cluster.step] sendMessage -> DEBU fec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.5µs " +orderer0.example.com | "2020-08-31 20:51:48.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU fed Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:48.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU fee Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:48.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU fef Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:48.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff0 Sending msg of 28 bytes to 3 on channel testchainid took 73.6µs" +orderer0.example.com | "2020-08-31 20:51:48.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2334ms " +orderer0.example.com | "2020-08-31 20:51:49.134 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff2 Sending msg of 28 bytes to 3 on channel businesschannel took 39.8µs" +orderer0.example.com | "2020-08-31 20:51:49.134 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff3 Sending msg of 28 bytes to 2 on channel businesschannel took 12.2µs" +orderer0.example.com | "2020-08-31 20:51:49.134 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 194.8µs " +orderer0.example.com | "2020-08-31 20:51:49.135 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57µs " +orderer0.example.com | "2020-08-31 20:51:49.136 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff6 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:49.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff7 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [e2a 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [e2b 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e2c 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [e2d 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [e2e 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e2f 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [e30 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e31 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\202J\341\206\345Rj\274\002 t\353\343\003H\222;\354\274C6,9W\215\360\361s\264\367\205\315\241\250\270\247\017\000yd\244\247" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [e32 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e33 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [e34 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [e35 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e36 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [e37 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [e38 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [e39 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [e3a 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 7b 55 40 22 53 fb bd b2 ea 57 b6 c3 68 bf 11 |.{U@"S....W..h..| +peer1.org1.example.com | 00000010 b7 47 2f 6d 7f cd 9a 57 86 c2 3c 49 73 3d 5f d5 |.G/m...W.. DEBU Verify: sig = 00000000 30 45 02 21 00 8d 65 c2 3a e7 ad bd 89 c0 57 ec |0E.!..e.:.....W.| +peer1.org1.example.com | 00000010 3f 8c 8c db 68 8e 65 97 24 b6 db cb 05 11 40 b6 |?...h.e.$.....@.| +peer1.org1.example.com | 00000020 ac c0 db 55 9c 02 20 25 da 0e f6 bb 23 97 81 1d |...U.. %....#...| +peer1.org1.example.com | 00000030 de 28 62 07 23 09 5e 9e b8 af 62 cc 86 15 b4 83 |.(b.#.^...b.....| +peer1.org1.example.com | 00000040 4d e4 d5 c3 33 24 8f |M...3$.| +peer1.org1.example.com | [e3c 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [e3d 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 55 81 71 5e 64 65 29 9b 22 83 |0E.!..U.q^de).".| +peer1.org1.example.com | 00000010 f8 74 9b b2 8c 0e 58 a3 23 22 30 d4 3e 82 4a e1 |.t....X.#"0.>.J.| +peer1.org1.example.com | 00000020 86 e5 52 6a bc 02 20 74 eb e3 03 48 92 3b ec bc |..Rj.. t...H.;..| +peer1.org1.example.com | 00000030 43 36 2c 39 57 8d f0 f1 73 b4 f7 85 cd a1 a8 b8 |C6,9W...s.......| +peer1.org1.example.com | 00000040 a7 0f 00 79 64 a4 a7 |...yd..| +peer1.org1.example.com | [e3e 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [e3f 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [e40 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e41 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e42 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [e43 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [c9b 08-31 20:51:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c9c 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [c9d 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [c9e 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [c9f 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [ca0 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ca1 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [ca2 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ca3 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [ca4 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ca5 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [ca6 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [ca7 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ca8 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [ca9 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [caa 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cab 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [cac 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [cad 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [cae 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [caf 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:49.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:49.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff9 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +orderer0.example.com | "2020-08-31 20:51:49.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU ffa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 42.5µs " +orderer0.example.com | "2020-08-31 20:51:49.639 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ffb Sending msg of 28 bytes to 2 on channel businesschannel took 52.9µs" +orderer0.example.com | "2020-08-31 20:51:49.639 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ffc Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +orderer0.example.com | "2020-08-31 20:51:49.639 UTC [orderer.common.cluster.step] sendMessage -> DEBU ffd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.1µs " +orderer0.example.com | "2020-08-31 20:51:49.639 UTC [orderer.common.cluster.step] sendMessage -> DEBU ffe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 135.2µs " +orderer0.example.com | "2020-08-31 20:51:49.640 UTC [orderer.common.cluster.step] handleMessage -> DEBU fff Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:49.641 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1000 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:49.858 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1001 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:49.858 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1002 Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +orderer0.example.com | "2020-08-31 20:51:49.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1003 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.6µs " +orderer0.example.com | "2020-08-31 20:51:50.136 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1004 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 189µs " +orderer0.example.com | "2020-08-31 20:51:50.136 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1005 Sending msg of 28 bytes to 2 on channel businesschannel took 568.4µs" +orderer0.example.com | "2020-08-31 20:51:50.140 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1006 Sending msg of 28 bytes to 3 on channel businesschannel took 147.7µs" +orderer0.example.com | "2020-08-31 20:51:50.140 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1007 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133µs " +orderer0.example.com | "2020-08-31 20:51:50.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1008 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:50.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1009 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:50.341 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:50.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100b Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +orderer0.example.com | "2020-08-31 20:51:50.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54µs " +orderer0.example.com | "2020-08-31 20:51:50.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100d Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" +orderer0.example.com | "2020-08-31 20:51:50.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100e Sending msg of 28 bytes to 3 on channel businesschannel took 42.6µs" +orderer0.example.com | "2020-08-31 20:51:50.633 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 557.1µs " +orderer0.example.com | "2020-08-31 20:51:50.634 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1010 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 541.8µs " +orderer0.example.com | "2020-08-31 20:51:50.635 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1011 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:50.636 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1012 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:50.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1013 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:50.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1014 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +orderer0.example.com | "2020-08-31 20:51:50.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1015 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51µs " +orderer0.example.com | "2020-08-31 20:51:51.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1016 Sending msg of 28 bytes to 3 on channel businesschannel took 20µs" +orderer0.example.com | "2020-08-31 20:51:51.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1018 Sending msg of 28 bytes to 2 on channel businesschannel took 18.2µs" +orderer0.example.com | "2020-08-31 20:51:51.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1017 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.4µs " +orderer0.example.com | "2020-08-31 20:51:51.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1019 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:51.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 157.9µs " +orderer0.example.com | "2020-08-31 20:51:51.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101b Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:51.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:51.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101d Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +peer1.org2.example.com | [ea4 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [ea5 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ea6 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ea7 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ea8 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ea9 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [eaa 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [eab 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [eac 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ead 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [eae 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [eaf 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [eb0 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [eb1 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [eb2 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [eb3 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [eb4 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [eb5 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [eb6 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [eb7 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [eb8 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fcb00 gate 1598907077560446500 evaluation starts +peer1.org2.example.com | [eb9 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fcb00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [eba 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fcb00 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [ebb 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fcb00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [ebc 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fcb00 principal evaluation fails +peer1.org2.example.com | [ebd 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fcb00 gate 1598907077560446500 evaluation fails +peer1.org2.example.com | [ebe 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [ebf 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [ec0 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [ec1 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fd070 gate 1598907077560972400 evaluation starts +peer1.org2.example.com | [ec2 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fd070 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [ec3 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fd070 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [ec4 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fd070 principal matched by identity 0 +peer1.org2.example.com | [ec5 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 32 c2 ff 63 90 50 fc 8a 02 30 ec 41 8a e2 12 |.2..c.P...0.A...| +peer1.org2.example.com | 00000010 24 51 bd 90 29 cd 37 f0 49 62 07 c3 a4 db 69 1f |$Q..).7.Ib....i.| +peer1.org2.example.com | [ec6 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d af 77 90 ed aa a9 66 05 e0 0f |0E.!...w....f...| +peer1.org2.example.com | 00000010 fb c7 a9 89 84 a4 47 54 18 d6 44 61 7a d4 2a 80 |......GT..Daz.*.| +peer1.org2.example.com | 00000020 18 27 f0 9e 74 02 20 22 29 d3 31 f0 eb ac af 9b |.'..t. ").1.....| +peer1.org2.example.com | 00000030 e5 39 79 0a b9 f9 12 5e be 3b 52 d3 d5 c9 68 90 |.9y....^.;R...h.| +peer1.org2.example.com | 00000040 ee 6f fa 73 27 58 c7 |.o.s'X.| +peer1.org2.example.com | [ec7 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fd070 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [ec8 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fd070 gate 1598907077560972400 evaluation succeeds +peer1.org2.example.com | [ec9 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [eca 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [ecb 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [ecc 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [ecd 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [ece 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [ecf 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [ed0 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [ed1 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [ed2 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ed3 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ed4 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ed5 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [ed6 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ed7 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ed8 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ed9 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [eda 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" > alive: alive: alive: +peer1.org2.example.com | [edb 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [edc 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [edd 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [ede 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [edf 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ee0 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ee1 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ee2 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [ee3 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [ee4 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ee5 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ee6 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ee7 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ee8 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [ee9 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [eea 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [eeb 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [eec 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [eed 08-31 20:51:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [eee 08-31 20:51:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [eef 08-31 20:51:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [ef0 08-31 20:51:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [ef1 08-31 20:51:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ef2 08-31 20:51:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ef3 08-31 20:51:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [ef4 08-31 20:51:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [ef5 08-31 20:51:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [f8d 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e0960 gate 1598907074292915400 evaluation starts +peer0.org2.example.com | [f8e 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e0960 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [f8f 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e0960 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [f90 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e0960 principal matched by identity 0 +peer0.org2.example.com | [f91 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [f92 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [f93 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e0960 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [e44 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 7b 55 40 22 53 fb bd b2 ea 57 b6 c3 68 bf 11 |.{U@"S....W..h..| +peer1.org1.example.com | 00000010 b7 47 2f 6d 7f cd 9a 57 86 c2 3c 49 73 3d 5f d5 |.G/m...W.. DEBU Verify: sig = 00000000 30 45 02 21 00 8d 65 c2 3a e7 ad bd 89 c0 57 ec |0E.!..e.:.....W.| +peer1.org1.example.com | 00000010 3f 8c 8c db 68 8e 65 97 24 b6 db cb 05 11 40 b6 |?...h.e.$.....@.| +peer1.org1.example.com | 00000020 ac c0 db 55 9c 02 20 25 da 0e f6 bb 23 97 81 1d |...U.. %....#...| +peer1.org1.example.com | 00000030 de 28 62 07 23 09 5e 9e b8 af 62 cc 86 15 b4 83 |.(b.#.^...b.....| +peer1.org1.example.com | 00000040 4d e4 d5 c3 33 24 8f |M...3$.| +peer1.org1.example.com | [e46 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e47 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e48 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e49 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e4a 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [e4b 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [e4c 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e4d 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [e4e 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [e4f 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e50 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [e51 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e52 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e53 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [e54 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [e55 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [e56 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003391720 gate 1598907077326297800 evaluation starts +peer1.org1.example.com | [e57 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003391720 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [e58 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003391720 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [e59 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003391720 principal matched by identity 0 +peer1.org1.example.com | [e5a 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 4f 62 6e f8 51 b2 b9 7a 89 a1 94 93 43 19 a1 |tObn.Q..z....C..| +peer1.org1.example.com | 00000010 e1 30 a3 49 45 27 56 4c 01 81 42 14 62 f0 c4 bf |.0.IE'VL..B.b...| +peer1.org1.example.com | [e5b 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 4c 56 6b dd 24 ae 93 da c4 0d |0E.!..LVk.$.....| +peer1.org1.example.com | 00000010 34 59 24 07 9d eb 5d d4 90 ae 99 d7 00 49 bd 50 |4Y$...]......I.P| +orderer0.example.com | "2020-08-31 20:51:51.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161µs " +orderer0.example.com | "2020-08-31 20:51:51.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101f Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +orderer0.example.com | "2020-08-31 20:51:51.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1020 Sending msg of 28 bytes to 3 on channel businesschannel took 13.9µs" +orderer0.example.com | "2020-08-31 20:51:51.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1021 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.7µs " +orderer0.example.com | "2020-08-31 20:51:51.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1022 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 253.3µs " +orderer0.example.com | "2020-08-31 20:51:51.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1023 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:51.635 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1024 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:51.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1025 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:51.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1026 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +orderer0.example.com | "2020-08-31 20:51:51.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1027 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.4µs " +orderer0.example.com | "2020-08-31 20:51:52.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1028 Sending msg of 28 bytes to 2 on channel businesschannel took 22.7µs" +orderer0.example.com | "2020-08-31 20:51:52.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1029 Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +orderer0.example.com | "2020-08-31 20:51:52.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.7µs " +orderer0.example.com | "2020-08-31 20:51:52.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.5µs " +orderer0.example.com | "2020-08-31 20:51:52.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102c Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:52.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:52.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:52.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102f Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +orderer0.example.com | "2020-08-31 20:51:52.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1030 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.7µs " +orderer0.example.com | "2020-08-31 20:51:52.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1031 Sending msg of 28 bytes to 2 on channel businesschannel took 260.5µs" +orderer0.example.com | "2020-08-31 20:51:52.633 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1032 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +orderer0.example.com | "2020-08-31 20:51:52.634 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1033 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 634.3µs " +orderer0.example.com | "2020-08-31 20:51:52.634 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1034 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.9µs " +orderer0.example.com | "2020-08-31 20:51:52.637 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1035 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:52.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1036 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:52.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1037 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:52.844 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1038 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.4µs " +orderer0.example.com | "2020-08-31 20:51:52.843 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1039 Sending msg of 28 bytes to 3 on channel testchainid took 131.9µs" +orderer0.example.com | "2020-08-31 20:51:53.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103a Sending msg of 28 bytes to 2 on channel businesschannel took 31.4µs" +orderer0.example.com | "2020-08-31 20:51:53.132 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103b Sending msg of 28 bytes to 3 on channel businesschannel took 21.2µs" +orderer0.example.com | "2020-08-31 20:51:53.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.8µs " +orderer0.example.com | "2020-08-31 20:51:53.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 380µs " +orderer0.example.com | "2020-08-31 20:51:53.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:53.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103f Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:53.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1040 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:53.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1041 Sending msg of 28 bytes to 3 on channel testchainid took 9.9µs" +orderer0.example.com | "2020-08-31 20:51:53.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1042 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.7µs " +orderer0.example.com | "2020-08-31 20:51:53.450 UTC [orderer.common.server] replicateDisabledChains -> DEBU 1043 No inactive chains to try to replicate" +orderer0.example.com | "2020-08-31 20:51:53.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1044 Sending msg of 28 bytes to 2 on channel businesschannel took 18.1µs" +orderer0.example.com | "2020-08-31 20:51:53.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1045 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.5µs " +orderer0.example.com | "2020-08-31 20:51:53.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1046 Sending msg of 28 bytes to 3 on channel businesschannel took 6.6µs" +orderer0.example.com | "2020-08-31 20:51:53.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1047 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.1µs " +orderer0.example.com | "2020-08-31 20:51:53.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1048 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:53.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1049 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:53.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:53.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104b Sending msg of 28 bytes to 3 on channel testchainid took 10.1µs" +orderer0.example.com | "2020-08-31 20:51:53.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 341.4µs " +orderer0.example.com | "2020-08-31 20:51:54.133 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104d Sending msg of 28 bytes to 2 on channel businesschannel took 37µs" +orderer0.example.com | "2020-08-31 20:51:54.133 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104e Sending msg of 28 bytes to 3 on channel businesschannel took 20.9µs" +orderer0.example.com | "2020-08-31 20:51:54.134 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 606.3µs " +orderer0.example.com | "2020-08-31 20:51:54.136 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1050 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.7363ms " +orderer0.example.com | "2020-08-31 20:51:54.137 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1051 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:54.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1052 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:54.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1053 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:54.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1054 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +orderer0.example.com | "2020-08-31 20:51:54.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1055 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.4µs " +orderer0.example.com | "2020-08-31 20:51:54.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1056 Sending msg of 28 bytes to 3 on channel businesschannel took 46.9µs" +orderer0.example.com | "2020-08-31 20:51:54.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1057 Sending msg of 28 bytes to 2 on channel businesschannel took 152.3µs" +orderer0.example.com | "2020-08-31 20:51:54.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1058 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.1µs " +orderer0.example.com | "2020-08-31 20:51:54.633 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1059 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.2µs " +orderer0.example.com | "2020-08-31 20:51:54.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105a Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:54.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:54.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:54.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105d Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +orderer0.example.com | "2020-08-31 20:51:54.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.7µs " +orderer0.example.com | "2020-08-31 20:51:55.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105f Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +orderer0.example.com | "2020-08-31 20:51:55.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1060 Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +orderer0.example.com | "2020-08-31 20:51:55.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1061 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.7µs " +orderer0.example.com | "2020-08-31 20:51:55.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1062 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.8µs " +orderer0.example.com | "2020-08-31 20:51:55.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1063 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:55.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1064 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:55.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1065 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:55.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1066 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +orderer0.example.com | "2020-08-31 20:51:55.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1067 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.3µs " +orderer0.example.com | "2020-08-31 20:51:55.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1068 Sending msg of 28 bytes to 2 on channel businesschannel took 25µs" +orderer0.example.com | "2020-08-31 20:51:55.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1069 Sending msg of 28 bytes to 3 on channel businesschannel took 23.7µs" +orderer0.example.com | "2020-08-31 20:51:55.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.6µs " +orderer0.example.com | "2020-08-31 20:51:55.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.8µs " +orderer0.example.com | "2020-08-31 20:51:55.632 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:55.632 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106d Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:55.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:55.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 106f Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +orderer0.example.com | "2020-08-31 20:51:55.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1070 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 235.2µs " +orderer0.example.com | "2020-08-31 20:51:56.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1071 Sending msg of 28 bytes to 2 on channel businesschannel took 16.7µs" +orderer0.example.com | "2020-08-31 20:51:56.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1072 Sending msg of 28 bytes to 3 on channel businesschannel took 5.6µs" +orderer0.example.com | "2020-08-31 20:51:56.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1073 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116µs " +orderer0.example.com | "2020-08-31 20:51:56.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1074 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.6µs " +orderer0.example.com | "2020-08-31 20:51:56.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1075 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:56.135 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1076 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:56.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1077 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:56.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1078 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +orderer0.example.com | "2020-08-31 20:51:56.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1079 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.2µs " +orderer0.example.com | "2020-08-31 20:51:56.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107a Sending msg of 28 bytes to 2 on channel businesschannel took 28µs" +orderer0.example.com | "2020-08-31 20:51:56.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107b Sending msg of 28 bytes to 3 on channel businesschannel took 19.2µs" +orderer0.example.com | "2020-08-31 20:51:56.634 UTC [orderer.common.cluster.step] sendMessage -> DEBU 107c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.311ms " +orderer0.example.com | "2020-08-31 20:51:56.635 UTC [orderer.common.cluster.step] sendMessage -> DEBU 107d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 119.4µs " +orderer0.example.com | "2020-08-31 20:51:56.637 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107e Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:56.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:51:56.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1080 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [ef6 08-31 20:51:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f94 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e0960 gate 1598907074292915400 evaluation succeeds +peer0.org1.example.com | [cb0 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000020 97 b1 3a eb 68 02 20 7c b3 d6 f6 1c cf 91 b2 30 |..:.h. |.......0| +orderer0.example.com | "2020-08-31 20:51:56.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1081 Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +peer1.org2.example.com | [ef7 08-31 20:51:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [f95 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [cb1 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a25820 gate 1598907069581523500 evaluation starts +peer1.org1.example.com | 00000030 b2 77 db bc bc 9f b5 b7 b2 42 30 82 2e d9 85 95 |.w.......B0.....| +orderer0.example.com | "2020-08-31 20:51:56.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1082 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.9µs " +peer1.org2.example.com | [ef8 08-31 20:51:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f96 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [cb2 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a25820 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000040 b9 ce 81 9e 49 97 68 |....I.h| +orderer0.example.com | "2020-08-31 20:51:57.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1083 Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +peer1.org2.example.com | [ef9 08-31 20:51:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [f97 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [cb3 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a25820 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [e5c 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003391720 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:57.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1084 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +peer1.org2.example.com | [efa 08-31 20:51:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [f98 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [cb4 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a25820 principal matched by identity 0 +peer1.org1.example.com | [e5d 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003391720 gate 1598907077326297800 evaluation succeeds +orderer0.example.com | "2020-08-31 20:51:57.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1085 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.4µs " +peer1.org2.example.com | [efb 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [f99 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [e5e 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:57.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1086 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.4µs " +orderer0.example.com | "2020-08-31 20:51:57.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1087 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [efc 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [cb5 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 45 23 3a 25 15 88 da 8f 53 4a 1b 00 79 c1 f8 |.E#:%....SJ..y..| +peer1.org1.example.com | [e5f 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [efd 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [f9a 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 61 47 17 a6 05 0c 7c a5 2c 8e 32 89 cd d4 ab 53 |aG....|.,.2....S| +peer1.org1.example.com | [e60 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [efe 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:57.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1088 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [cb6 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 96 2d 33 a9 0f 8e 0a 58 ac e1 |0E.!...-3....X..| +peer1.org1.example.com | [e61 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [eff 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:57.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1089 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000010 e1 cf dd 39 bc 9a 6b 4a b8 24 7d a8 d8 5f 60 13 |...9..kJ.$}.._`.| +peer1.org1.example.com | [e62 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [f00 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:57.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108a Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000020 1f 92 ed c4 6b 02 20 52 28 b2 cc d3 6c ac c0 78 |....k. R(...l..x| +peer1.org1.example.com | [e63 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f01 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:57.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60µs " +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | 00000030 6b 85 f8 08 54 72 4f 15 e4 be 07 d9 0e 2d 45 61 |k...TrO......-Ea| +peer1.org1.example.com | [e64 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f02 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:57.508 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 108c [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:50818 with txid 'd069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a' of type ENDORSER_TRANSACTION" +peer0.org2.example.com | [f9b 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 67 ba 52 10 74 ab 11 |g.R.t..| +peer1.org1.example.com | [e65 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [f03 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:57.509 UTC [policies] Evaluate -> DEBU 108d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +peer0.org2.example.com | [f9c 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [cb7 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a25820 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [e66 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f04 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:57.509 UTC [policies] Evaluate -> DEBU 108e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [f9d 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cb8 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a25820 gate 1598907069581523500 evaluation succeeds +peer1.org1.example.com | [e67 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:51:57.510 UTC [policies] Evaluate -> DEBU 108f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +peer1.org2.example.com | [f05 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [f9e 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cb9 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [e68 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 7b 55 40 22 53 fb bd b2 ea 57 b6 c3 68 bf 11 |.{U@"S....W..h..| +orderer0.example.com | "2020-08-31 20:51:57.510 UTC [policies] Evaluate -> DEBU 1090 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [f06 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003385e20 gate 1598907078481251500 evaluation starts +peer0.org2.example.com | [f9f 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cba 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 b7 47 2f 6d 7f cd 9a 57 86 c2 3c 49 73 3d 5f d5 |.G/m...W.. DEBU 0xc003385e20 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:57.511 UTC [policies] Evaluate -> DEBU 1091 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org2.example.com | [fa0 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [cbb 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [e69 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 65 c2 3a e7 ad bd 89 c0 57 ec |0E.!..e.:.....W.| +peer1.org2.example.com | [f08 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003385e20 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:57.511 UTC [msp] DeserializeIdentity -> DEBU 1092 Obtaining identity" +peer0.org2.example.com | [fa1 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [cbc 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 3f 8c 8c db 68 8e 65 97 24 b6 db cb 05 11 40 b6 |?...h.e.$.....@.| +peer1.org2.example.com | [f09 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003385e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:51:57.515 UTC [msp.identity] newIdentity -> DEBU 1093 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [fa2 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [cbd 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000020 ac c0 db 55 9c 02 20 25 da 0e f6 bb 23 97 81 1d |...U.. %....#...| +peer1.org2.example.com | [f0a 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003385e20 principal evaluation fails +orderer0.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | [fa3 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [cbe 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 de 28 62 07 23 09 5e 9e b8 af 62 cc 86 15 b4 83 |.(b.#.^...b.....| +peer1.org2.example.com | [f0b 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003385e20 gate 1598907078481251500 evaluation fails +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [fa4 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [cbf 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | 00000040 4d e4 d5 c3 33 24 8f |M...3$.| +peer1.org2.example.com | [f0c 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [fa5 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [cc0 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f 9b 70 86 9c 21 8c 04 61 a8 97 0f 34 51 37 a8 |..p..!..a...4Q7.| +peer1.org1.example.com | [e6a 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [f0e 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | [fa6 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ec640 gate 1598907074297050900 evaluation starts +peer0.org1.example.com | 00000010 8c b8 fe 8e df 8c f9 29 04 cb a2 69 ce 90 94 22 |.......)...i..."| +peer1.org1.example.com | [e6b 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [f0d 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [fa7 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ec640 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [cc1 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 50 cd 21 f6 c0 4c f9 23 4e ec |0E.!..P.!..L.#N.| +peer1.org1.example.com | [e6c 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f0f 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org2.example.com | [fa8 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ec640 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 40 3a 91 75 e8 8c 2e 5c cc 24 be 30 ad d6 e2 f2 |@:.u...\.$.0....| +peer1.org1.example.com | [e6d 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f10 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345a3a0 gate 1598907078483129200 evaluation starts +orderer0.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer0.org2.example.com | [fa9 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ec640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000020 81 13 ba f1 62 02 20 22 84 86 fa c4 db b9 6f e1 |....b. "......o.| +peer1.org1.example.com | [e6e 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [f11 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345a3a0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer0.org2.example.com | [faa 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ec640 principal evaluation fails +peer0.org1.example.com | 00000030 47 27 9d 59 2e 0d 70 78 03 93 59 69 54 ba 48 1c |G'.Y..px..YiT.H.| +peer1.org1.example.com | [e6f 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [f12 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345a3a0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | [fab 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ec640 gate 1598907074297050900 evaluation fails +peer0.org1.example.com | 00000040 f7 07 5a 5f 3b 73 3c |..Z_;s<| +peer1.org1.example.com | [e70 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [f13 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345a3a0 principal matched by identity 0 +orderer0.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | [fac 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [cc2 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e71 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f14 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer0.org2.example.com | [fad 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [cc3 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [e72 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org2.example.com | [fae 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [cc4 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e73 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f15 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | [faf 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ecbb0 gate 1598907074297427000 evaluation starts +peer0.org1.example.com | [cc5 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [e74 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +orderer0.example.com | "2020-08-31 20:51:57.517 UTC [cauthdsl] func1 -> DEBU 1094 0xc000e68400 gate 1598907117517135800 evaluation starts" +peer0.org2.example.com | [fb0 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ecbb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [cc6 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 6a b4 86 66 e3 dd f1 1d 07 16 02 fe cc e3 e9 |Wj..f...........| +peer1.org1.example.com | [e75 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +orderer0.example.com | "2020-08-31 20:51:57.517 UTC [cauthdsl] func2 -> DEBU 1095 0xc000e68400 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [fb1 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ecbb0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 18 8b 7e 5d 68 d0 13 49 fd 21 b3 e5 aa ca 4f 08 |..~]h..I.!....O.| +peer1.org1.example.com | [e76 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +orderer0.example.com | "2020-08-31 20:51:57.518 UTC [cauthdsl] func2 -> DEBU 1096 0xc000e68400 processing identity 0 with bytes of fe10e0" +peer0.org2.example.com | [fb2 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ecbb0 principal matched by identity 0 +peer0.org1.example.com | [cc7 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 92 7d f2 a4 f9 89 e7 88 b7 2c 69 |0D. ..}.......,i| +peer1.org1.example.com | [e77 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +orderer0.example.com | "2020-08-31 20:51:57.535 UTC [cauthdsl] func2 -> DEBU 1097 0xc000e68400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +peer0.org2.example.com | [fb3 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 6e b8 79 6d 59 07 0a 7f 8f e3 34 86 c7 7f 4e e2 |n.ymY.....4...N.| +peer1.org1.example.com | [e78 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f16 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345a3a0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:57.536 UTC [cauthdsl] func2 -> DEBU 1098 0xc000e68400 principal evaluation fails" +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | 00000020 51 3f cb d5 02 20 43 20 38 fe 37 27 3f 36 a7 91 |Q?... C 8.7'?6..| +peer1.org1.example.com | [e79 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [f17 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345a3a0 gate 1598907078483129200 evaluation succeeds +orderer0.example.com | "2020-08-31 20:51:57.538 UTC [cauthdsl] func1 -> DEBU 1099 0xc000e68400 gate 1598907117517135800 evaluation fails" +peer0.org2.example.com | [fb4 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000030 a7 12 05 38 8c e3 f9 76 39 bb 31 a6 6b 37 03 bc |...8...v9.1.k7..| +peer1.org1.example.com | [e7a 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [f18 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:51:57.543 UTC [policies] Evaluate -> DEBU 109a Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000040 b9 60 49 bc 66 f3 |.`I.f.| +peer1.org1.example.com | [e7b 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f19 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:51:57.543 UTC [policies] Evaluate -> DEBU 109b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | [cc8 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [e7c 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [f1a 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:57.543 UTC [policies] func1 -> DEBU 109c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | [cc9 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e7d 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [f1b 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:57.543 UTC [policies] Evaluate -> DEBU 109d Signature set did not satisfy policy /Channel/Orderer/Writers" +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [cca 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e7e 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f1c 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:57.543 UTC [policies] Evaluate -> DEBU 109e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +peer0.org1.example.com | [ccb 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [fb5 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ecbb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [f1d 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e7f 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:57.543 UTC [policies] Evaluate -> DEBU 109f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | [ccc 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fb6 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ecbb0 gate 1598907074297427000 evaluation succeeds +peer1.org2.example.com | [f1e 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [e80 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:57.543 UTC [policies] Evaluate -> DEBU 10a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [ccd 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [fb7 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [f1f 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e81 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:57.543 UTC [policies] Evaluate -> DEBU 10a1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | [cce 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes +peer0.org2.example.com | [fb8 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [f20 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e82 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:57.543 UTC [cauthdsl] func1 -> DEBU 10a2 0xc000e69a70 gate 1598907117543752100 evaluation starts" +peer0.org1.example.com | [ccf 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes +peer0.org2.example.com | [fb9 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [f21 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [e83 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:57.543 UTC [cauthdsl] func2 -> DEBU 10a3 0xc000e69a70 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [cd0 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [fba 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [f22 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [e84 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:57.543 UTC [cauthdsl] func2 -> DEBU 10a4 0xc000e69a70 processing identity 0 with bytes of fe10e0" +peer0.org1.example.com | [cd1 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f 9b 70 86 9c 21 8c 04 61 a8 97 0f 34 51 37 a8 |..p..!..a...4Q7.| +peer0.org2.example.com | [fbb 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f23 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [e85 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003456130 gate 1598907077480218500 evaluation starts +orderer0.example.com | "2020-08-31 20:51:57.543 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 10a5 Checking if identity satisfies MEMBER role for Org1MSP" +peer0.org1.example.com | 00000010 8c b8 fe 8e df 8c f9 29 04 cb a2 69 ce 90 94 22 |.......)...i..."| +peer0.org2.example.com | [fbc 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f24 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345b5a0 gate 1598907078484518600 evaluation starts +peer1.org1.example.com | [e86 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003456130 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:57.544 UTC [msp] Validate -> DEBU 10a6 MSP Org1MSP validating identity" +peer0.org1.example.com | [cd2 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 50 cd 21 f6 c0 4c f9 23 4e ec |0E.!..P.!..L.#N.| +peer0.org2.example.com | [fbd 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [f25 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345b5a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [e87 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003456130 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:57.544 UTC [msp] getCertificationChain -> DEBU 10a7 MSP Org1MSP getting certification chain" +peer0.org1.example.com | 00000010 40 3a 91 75 e8 8c 2e 5c cc 24 be 30 ad d6 e2 f2 |@:.u...\.$.0....| +peer0.org2.example.com | [fbe 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e88 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003456130 principal matched by identity 0 +peer1.org2.example.com | [f26 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345b5a0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:57.544 UTC [cauthdsl] func2 -> DEBU 10a8 0xc000e69a70 principal matched by identity 0" +peer0.org1.example.com | 00000020 81 13 ba f1 62 02 20 22 84 86 fa c4 db b9 6f e1 |....b. "......o.| +peer0.org2.example.com | [fbf 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e89 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 a9 f7 2c a0 f6 b3 39 b4 40 60 70 02 0d 8d db |f..,...9.@`p....| +peer1.org2.example.com | [f27 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345b5a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:51:57.544 UTC [msp.identity] Verify -> DEBU 10a9 Verify: digest = 00000000 f4 e7 93 52 4d 20 48 5f 66 91 8b fc cc 39 18 f3 |...RM H_f....9..| +peer0.org2.example.com | [fc0 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000030 47 27 9d 59 2e 0d 70 78 03 93 59 69 54 ba 48 1c |G'.Y..px..YiT.H.| +peer1.org1.example.com | 00000010 fa d7 ae 80 29 9c cd 1c 4a e0 65 7b 8e c0 ca 13 |....)...J.e{....| +peer1.org2.example.com | [f28 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345b5a0 principal evaluation fails +orderer0.example.com | 00000010 ab 30 31 6f 86 19 f3 33 c1 37 13 23 32 7f d5 15 |.01o...3.7.#2...|" +peer0.org2.example.com | [fc1 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000040 f7 07 5a 5f 3b 73 3c |..Z_;s<| +peer1.org1.example.com | [e8a 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 5b cf fe d5 c5 4b c6 f2 a2 15 |0E.!..[....K....| +peer1.org2.example.com | [f29 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345b5a0 gate 1598907078484518600 evaluation fails +orderer0.example.com | "2020-08-31 20:51:57.544 UTC [msp.identity] Verify -> DEBU 10aa Verify: sig = 00000000 30 45 02 21 00 8a 2c 62 ac cb 2a ec 5a fd 13 e7 |0E.!..,b..*.Z...| +peer0.org2.example.com | [fc2 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [cd3 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 6b a2 72 5b 8b 94 46 8a 0a 7b 9d 5d 6f 89 e7 bf |k.r[..F..{.]o...| +peer1.org2.example.com | [f2a 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | 00000010 37 92 88 81 15 e1 12 b2 64 18 04 1a 42 b8 ea 7e |7.......d...B..~| +peer0.org2.example.com | [fc3 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031eddb0 gate 1598907074299015900 evaluation starts +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | 00000020 8c cf 76 f6 7b 02 20 65 0e 52 94 55 59 f3 3e 78 |..v.{. e.R.UY.>x| +peer1.org2.example.com | [f2b 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | 00000020 09 25 0c b1 3f 02 20 73 43 54 f1 e5 d4 0d 2e 2e |.%..?. sCT......| +peer0.org2.example.com | [fc4 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031eddb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [cd4 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f b9 9d 07 c3 6c a9 f4 bd 66 2c |0E.!......l...f,| +peer1.org1.example.com | 00000030 26 ea 4a 41 5e 47 da 63 17 44 ed 6f 7d cc 6f 57 |&.JA^G.c.D.o}.oW| +peer1.org2.example.com | [f2c 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | 00000030 08 f9 2b df dd 4b cf cb ee a4 66 5c 1c 4d 8f 79 |..+..K....f\.M.y| +peer0.org2.example.com | [fc5 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031eddb0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 c4 ed 50 fa 67 31 5d c3 55 47 bc e1 c4 e1 3f 10 |..P.g1].UG....?.| +peer1.org1.example.com | 00000040 f0 81 92 96 a6 e0 6b |......k| +peer1.org2.example.com | [f2d 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345bb10 gate 1598907078484942600 evaluation starts +orderer0.example.com | 00000040 73 ba e7 6f 4b 96 21 |s..oK.!|" +peer0.org2.example.com | [fc6 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031eddb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000020 8f b2 8d 96 64 02 20 17 b1 cd 04 18 ca da 4b 21 |....d. .......K!| +peer1.org1.example.com | [e8b 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003456130 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [f2e 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345bb10 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:57.544 UTC [cauthdsl] func2 -> DEBU 10ab 0xc000e69a70 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [fc7 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031eddb0 principal evaluation fails +peer0.org1.example.com | 00000030 57 b4 da b4 b9 cd 52 87 1a f3 ed d1 7c 5a 14 3b |W.....R.....|Z.;| +peer1.org1.example.com | [e8c 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003456130 gate 1598907077480218500 evaluation succeeds +peer1.org2.example.com | [f2f 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345bb10 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:57.544 UTC [cauthdsl] func1 -> DEBU 10ac 0xc000e69a70 gate 1598907117543752100 evaluation succeeds" +peer0.org2.example.com | [fc8 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031eddb0 gate 1598907074299015900 evaluation fails +peer0.org1.example.com | 00000040 2a 02 8a 22 27 c8 4b |*.."'.K| +peer1.org1.example.com | [e8d 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [f30 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345bb10 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:51:57.545 UTC [policies] Evaluate -> DEBU 10ad Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org2.example.com | [fc9 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [cd5 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [e8e 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [f31 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | "2020-08-31 20:51:57.545 UTC [policies] Evaluate -> DEBU 10ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org2.example.com | [fca 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [cd6 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [e8f 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:51:57.545 UTC [policies] Evaluate -> DEBU 10af Signature set satisfies policy /Channel/Application/Writers" +peer0.org2.example.com | [fcb 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [cd7 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e90 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [f32 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:51:57.545 UTC [policies] Evaluate -> DEBU 10b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org2.example.com | [fcc 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003206360 gate 1598907074299448600 evaluation starts +peer0.org1.example.com | [cd8 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e91 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | "2020-08-31 20:51:57.545 UTC [policies] Evaluate -> DEBU 10b1 Signature set satisfies policy /Channel/Writers" +peer0.org2.example.com | [fcd 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003206360 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [cd9 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes +peer1.org1.example.com | [e92 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | "2020-08-31 20:51:57.545 UTC [policies] Evaluate -> DEBU 10b2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +peer0.org2.example.com | [fce 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003206360 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [cda 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [e93 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | "2020-08-31 20:51:57.552 UTC [orderer.common.blockcutter] Ordered -> DEBU 10b3 Enqueuing message into batch" +peer0.org2.example.com | [fcf 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003206360 principal matched by identity 0 +peer0.org1.example.com | [cdb 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [e94 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | "2020-08-31 20:51:57.552 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 10b4 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:50818" +peer0.org2.example.com | [fd0 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | [cdc 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [e95 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [f33 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345bb10 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:57.556 UTC [grpc] infof -> DEBU 10b5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [cdd 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [e96 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f34 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00345bb10 gate 1598907078484942600 evaluation succeeds +orderer0.example.com | "2020-08-31 20:51:57.557 UTC [orderer.common.broadcast] Handle -> WARN 10b6 Error reading from 172.18.0.9:50818: rpc error: code = Canceled desc = context canceled" +peer0.org2.example.com | [fd1 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | [cde 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e97 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f35 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:51:57.559 UTC [orderer.common.server] func1 -> DEBU 10b7 Closing Broadcast stream" +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | [cdf 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [e98 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f36 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:51:57.560 UTC [comm.grpc.server] 1 -> INFO 10b8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:50818 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=48.1929211s +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | [ce0 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [e99 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [f37 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:57.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b9 Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | [ce1 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [e9a 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f38 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:57.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ba Sending msg of 28 bytes to 3 on channel businesschannel took 26µs" +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [ce2 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [e9b 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f39 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +orderer0.example.com | "2020-08-31 20:51:57.633 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10bb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 401.5µs " +peer0.org2.example.com | [fd2 08-31 20:51:14.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003206360 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [ce3 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a59a30 gate 1598907069588236800 evaluation starts +peer1.org1.example.com | [e9c 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +orderer0.example.com | "2020-08-31 20:51:57.634 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10bc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 321.4µs " +peer0.org2.example.com | [fd3 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003206360 gate 1598907074299448600 evaluation succeeds +peer0.org1.example.com | [ce4 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a59a30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [f3a 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | [e9d 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:51:57.637 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10bd Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [fd4 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [ce5 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a59a30 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | [e9e 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:57.637 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10be Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [fd5 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [ce6 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a59a30 principal matched by identity 0 +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | [e9f 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:57.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10bf Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [fd6 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [ce7 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 a7 64 a1 59 2f 08 ef 19 da 91 37 9a b5 49 98 |I.d.Y/.....7..I.| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | [ea0 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" > alive: alive: alive:e\213\213\026\254\364R\005\322o\347dXx\214\004^\245:\321\210\307R\301" > +orderer0.example.com | "2020-08-31 20:51:57.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c0 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +peer0.org2.example.com | [fd7 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 15 63 00 ab 9c 13 83 36 60 dc 57 6d df 31 1b 11 |.c.....6`.Wm.1..| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [ea1 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:57.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.4µs " +peer0.org2.example.com | [fd8 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | [ce8 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 9d 53 bd aa 48 cc 88 5a 1c 15 |0E.!...S..H..Z..| +peer1.org2.example.com | [f3b 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | [ea2 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:58.133 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c2 Sending msg of 28 bytes to 3 on channel businesschannel took 239.3µs" +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | 00000010 83 dc d6 95 46 d4 65 0b a5 5b 92 6e 2f 70 c0 8b |....F.e..[.n/p..| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [ea3 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:58.134 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c4 Sending msg of 28 bytes to 2 on channel businesschannel took 29.9µs" +peer0.org1.example.com | 00000020 d8 0a 17 fe c0 02 20 14 9a 17 05 81 a7 93 ce c9 |...... .........| +peer0.org2.example.com | [fd9 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | [f3c 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | [ea4 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +orderer0.example.com | "2020-08-31 20:51:58.133 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 342.2µs " +peer0.org1.example.com | 00000030 0b 18 48 d1 e0 56 16 62 4c e8 73 fd c9 21 7a 62 |..H..V.bL.s..!zb| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | [ea5 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:58.134 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.4µs " +peer0.org1.example.com | 00000040 ee d4 2f 0e c1 8b 64 |../...d| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | [ea6 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:58.136 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c6 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [ce9 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a59a30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | [ea7 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:58.136 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c7 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [cea 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a59a30 gate 1598907069588236800 evaluation succeeds +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [ea8 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:58.341 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [ceb 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [fda 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | [f3d 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ea9 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:58.344 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c9 Sending msg of 28 bytes to 3 on channel testchainid took 24.2µs" +peer0.org1.example.com | [cec 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [f3e 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [eaa 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-08-31 20:51:58.344 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ca Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.4µs " +peer0.org1.example.com | [ced 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [fdb 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | [f3f 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [eab 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 32 c2 ff 63 90 50 fc 8a 02 30 ec 41 8a e2 12 |.2..c.P...0.A...| +orderer0.example.com | "2020-08-31 20:51:58.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cb Sending msg of 28 bytes to 2 on channel businesschannel took 28µs" +peer0.org1.example.com | [cee 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | [f40 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 24 51 bd 90 29 cd 37 f0 49 62 07 c3 a4 db 69 1f |$Q..).7.Ib....i.| +orderer0.example.com | "2020-08-31 20:51:58.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cc Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | [cef 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [f41 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [eac 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d af 77 90 ed aa a9 66 05 e0 0f |0E.!...w....f...| +orderer0.example.com | "2020-08-31 20:51:58.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10cd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82µs " +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | [cf0 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f42 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 fb c7 a9 89 84 a4 47 54 18 d6 44 61 7a d4 2a 80 |......GT..Daz.*.| +orderer0.example.com | "2020-08-31 20:51:58.633 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 656.8µs " +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [cf1 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | 00000020 18 27 f0 9e 74 02 20 22 29 d3 31 f0 eb ac af 9b |.'..t. ").1.....| +peer1.org2.example.com | [f43 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:58.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10cf Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [fdc 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [cf2 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f 9b 70 86 9c 21 8c 04 61 a8 97 0f 34 51 37 a8 |..p..!..a...4Q7.| +orderer0.example.com | "2020-08-31 20:51:58.635 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d0 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | 00000030 e5 39 79 0a b9 f9 12 5e be 3b 52 d3 d5 c9 68 90 |.9y....^.;R...h.| +peer0.org2.example.com | [fdd 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 8c b8 fe 8e df 8c f9 29 04 cb a2 69 ce 90 94 22 |.......)...i..."| +peer1.org2.example.com | [f44 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:58.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | 00000040 ee 6f fa 73 27 58 c7 |.o.s'X.| +peer0.org2.example.com | [fde 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [cf3 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 50 cd 21 f6 c0 4c f9 23 4e ec |0E.!..P.!..L.#N.| +peer1.org2.example.com | [f45 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:58.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d2 Sending msg of 28 bytes to 3 on channel testchainid took 19.2µs" +peer1.org1.example.com | [ead 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [fdf 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 40 3a 91 75 e8 8c 2e 5c cc 24 be 30 ad d6 e2 f2 |@:.u...\.$.0....| +peer1.org2.example.com | [f46 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:58.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.8µs " +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | [fe0 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000020 81 13 ba f1 62 02 20 22 84 86 fa c4 db b9 6f e1 |....b. "......o.| +peer1.org2.example.com | [f47 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:59.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d4 Sending msg of 28 bytes to 2 on channel businesschannel took 31.5µs" +peer1.org1.example.com | [eae 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 a6 6a 78 5c b3 e6 ac ad de 38 |0E.!...jx\.....8| +peer0.org2.example.com | [fe1 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb f9 2d 57 5e e9 e7 f6 b9 ca 3d 8a 69 d0 90 2b |..-W^.....=.i..+| +peer0.org1.example.com | 00000030 47 27 9d 59 2e 0d 70 78 03 93 59 69 54 ba 48 1c |G'.Y..px..YiT.H.| +peer1.org2.example.com | [f48 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493e00 gate 1598907078487233300 evaluation starts +orderer0.example.com | "2020-08-31 20:51:59.132 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d6 Sending msg of 28 bytes to 3 on channel businesschannel took 19.5µs" +peer1.org1.example.com | 00000010 03 16 76 64 53 ff b5 6f 16 00 a6 ea 01 f5 64 53 |..vdS..o......dS| +peer0.org2.example.com | 00000010 3c 73 34 db 33 37 dc 19 5a 35 b9 91 05 66 20 ac | DEBU 0xc003493e00 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:59.133 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.7µs " +peer1.org1.example.com | 00000020 28 6a 39 88 6a 02 20 27 fe 88 8d fc c0 74 4e 7d |(j9.j. '.....tN}| +peer0.org2.example.com | [fe2 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 14 b8 39 d1 42 0d 36 fa d9 e1 |0E.!....9.B.6...| +peer0.org1.example.com | [cf4 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [f4a 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493e00 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:59.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 168.4µs " +peer1.org1.example.com | 00000030 15 7d 92 bf 45 ef f7 f2 b9 7d 99 91 16 89 4c 1e |.}..E....}....L.| +peer0.org2.example.com | 00000010 3e ec 09 cc 9b 3a 33 a5 c7 63 07 5f ef 27 18 b3 |>....:3..c._.'..| +peer0.org1.example.com | [cf5 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [f4b 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493e00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:51:59.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d8 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | 00000040 b9 d9 56 55 69 96 9c |..VUi..| +peer0.org2.example.com | 00000020 b2 81 46 28 ef 02 20 0c 32 a1 e0 bc 84 16 1d d5 |..F(.. .2.......| +peer0.org1.example.com | [cf6 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f4c 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493e00 principal evaluation fails +orderer0.example.com | "2020-08-31 20:51:59.135 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d9 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [eaf 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | 00000030 f2 0f 76 73 8c 98 61 23 ff 21 33 c0 32 5c 4b 76 |..vs..a#.!3.2\Kv| +peer0.org1.example.com | [cf7 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [f4d 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493e00 gate 1598907078487233300 evaluation fails +orderer0.example.com | "2020-08-31 20:51:59.341 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10da Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [eb0 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | 00000040 5f e7 86 74 73 24 28 |_..ts$(| +peer0.org1.example.com | [cf8 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f4e 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:59.342 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10db Sending msg of 28 bytes to 3 on channel testchainid took 23µs" +peer1.org1.example.com | [eb1 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [fe3 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [cf9 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [f4f 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:51:59.343 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10dc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 636.6µs " +peer1.org1.example.com | [eb2 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [fe4 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f50 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:59.553 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 10dd Batch timer expired, creating block" channel=businesschannel node=1 +peer1.org1.example.com | [eb3 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [fe5 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer1.org2.example.com | [f51 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003510380 gate 1598907078488859600 evaluation starts +peer0.org1.example.com | [cfa 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:59.553 UTC [orderer.consensus.etcdraft] propose -> INFO 10de Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 +peer1.org1.example.com | [eb4 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fe6 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer1.org2.example.com | [f52 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003510380 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [cfb 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:59.554 UTC [orderer.consensus.etcdraft] 2 -> DEBU 10df Proposed block [3] to raft consensus" channel=businesschannel node=1 +peer1.org1.example.com | [eb5 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fe7 08-31 20:51:14.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f53 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003510380 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [cfc 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:59.558 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e0 Sending msg of 3648 bytes to 2 on channel businesschannel took 18.3µs" +peer1.org1.example.com | [eb6 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fe8 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [f54 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003510380 principal matched by identity 0 +peer0.org1.example.com | [cfd 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:59.559 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e1 Sending msg of 3648 bytes to 3 on channel businesschannel took 18.4µs" +peer1.org1.example.com | [eb7 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [fe9 08-31 20:51:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [f55 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | [cfe 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:51:59.559 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e2 Send of ConsensusRequest for channel businesschannel with payload of size 3648 to orderer1.example.com(orderer1.example.com:7050) took 187.8µs " +peer1.org1.example.com | [eb8 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [fea 08-31 20:51:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [cff 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6f6e0 gate 1598907069592125300 evaluation starts +orderer0.example.com | "2020-08-31 20:51:59.559 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e3 Send of ConsensusRequest for channel businesschannel with payload of size 3648 to orderer2.example.com(orderer2.example.com:7050) took 88.6µs " +peer1.org1.example.com | [eb9 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [feb 08-31 20:51:14.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f56 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | [d00 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6f6e0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:51:59.563 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e4 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [eba 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [fec 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | [d01 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6f6e0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:51:59.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e5 Sending msg of 28 bytes to 2 on channel businesschannel took 14.8µs" +peer1.org1.example.com | [ebb 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:e\213\213\026\254\364R\005\322o\347dXx\214\004^\245:\321\210\307R\301" > +peer0.org2.example.com | [fed 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | [d02 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6f6e0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:51:59.565 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e6 Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs" +peer1.org1.example.com | [ebc 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [fee 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | [d03 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 4a 50 23 f4 a4 67 b4 77 df a4 65 44 c6 86 39 |.JP#..g.w..eD..9| +orderer0.example.com | "2020-08-31 20:51:59.565 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 180.3µs " +peer1.org1.example.com | [ebd 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fef 08-31 20:51:14.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | 00000010 ea b6 02 bb 01 eb 36 db 28 b6 f5 50 97 0c 24 2c |......6.(..P..$,| +orderer0.example.com | "2020-08-31 20:51:59.565 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 10e8 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 +peer1.org1.example.com | [ebe 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [ff0 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f57 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003510380 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:51:59.565 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 619.7µs " +peer0.org1.example.com | [d04 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 9c 95 07 1a 92 05 94 f0 47 65 |0E.!..........Ge| +peer1.org1.example.com | [ebf 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [ff1 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f58 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003510380 gate 1598907078488859600 evaluation succeeds +orderer0.example.com | "2020-08-31 20:51:59.565 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 10ea [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +peer0.org1.example.com | 00000010 bf 57 61 8d 3d b2 1a b1 d0 f5 8a ef 70 af b6 dd |.Wa.=.......p...| +peer1.org1.example.com | [ec0 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ff2 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f59 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:51:59.566 UTC [msp] GetDefaultSigningIdentity -> DEBU 10eb Obtaining default signing identity" +peer0.org1.example.com | 00000020 fb d8 32 88 2c 02 20 01 fe 05 2b 66 a8 e3 37 d0 |..2.,. ...+f..7.| +peer1.org1.example.com | [ec1 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ff3 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [f5a 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:51:59.567 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ec Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000030 30 6c a1 fe 90 89 ae 1b d8 1d 8a 05 14 31 e9 fe |0l...........1..| +peer1.org1.example.com | [ec2 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ff4 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 c6 fb 04 b1 1e 80 82 72 6e bf d9 28 84 cf 03 |........rn..(...| +peer1.org2.example.com | [f5b 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:59.567 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ed Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000040 01 fe fa 78 82 10 d2 |...x...| +peer1.org1.example.com | [ec3 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 0e 80 24 0c ba b4 14 1a 78 3f 46 4e 70 66 38 e5 |..$.....x?FNpf8.| +peer1.org2.example.com | [f5c 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:51:59.570 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ee Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [d05 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6f6e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [ec4 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [ff5 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d f5 02 25 29 ca 0d 64 ab d7 23 cc |0D. }..%)..d..#.| +peer1.org2.example.com | [f5d 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | "2020-08-31 20:51:59.572 UTC [msp] GetDefaultSigningIdentity -> DEBU 10ef Obtaining default signing identity" +peer0.org1.example.com | [d06 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6f6e0 gate 1598907069592125300 evaluation succeeds +peer1.org1.example.com | [ec5 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 ca 13 e4 4a bd 7f f8 de 48 ca 70 22 62 6c 6b 06 |...J....H.p"blk.| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +orderer0.example.com | "2020-08-31 20:51:59.574 UTC [msp.identity] Sign -> DEBU 10f0 Sign: plaintext: 0A020802120B0A090A03010203100418...0F15FDD756F3A82F84C30D706B5B9866 " +peer0.org1.example.com | [d07 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ec6 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | 00000020 02 dc 34 52 02 20 0e cd 6e 16 69 05 64 06 a6 4e |..4R. ..n.i.d..N| +peer1.org2.example.com | [f5e 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | "2020-08-31 20:51:59.574 UTC [msp.identity] Sign -> DEBU 10f1 Sign: digest: 816B67D98C669E2F8763EA181B5E989E510C1526E786A4C939F9009CC2410D02 " +peer0.org1.example.com | [d08 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [ec7 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 af 00 35 af 03 26 e1 bb 33 ff 38 84 c0 00 53 37 |..5..&..3.8...S7| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +orderer0.example.com | "2020-08-31 20:51:59.588 UTC [fsblkstorage] indexBlock -> DEBU 10f2 Indexing block [blockNum=3, blockHash=[]byte{0x62, 0xc8, 0x94, 0xe0, 0x8d, 0xe8, 0xc7, 0x50, 0xec, 0x14, 0xce, 0xf7, 0xf6, 0x41, 0xb9, 0x45, 0x45, 0x74, 0xf1, 0x40, 0xf4, 0xb9, 0x19, 0x48, 0x1a, 0x35, 0x67, 0xf7, 0x3c, 0xf, 0xe3, 0xf2} txOffsets= +peer0.org1.example.com | [d09 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [ec9 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 86 f9 8a 35 5d a0 |...5].| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | txId=d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a locPointer=offset=70, bytesLength=3520 +peer0.org1.example.com | [d0a 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [ec8 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org2.example.com:7051 ]] , current view: [[peer0.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] +peer0.org2.example.com | [ff6 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +orderer0.example.com | ]" +peer0.org1.example.com | [d0b 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [eca 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ff7 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +orderer0.example.com | "2020-08-31 20:51:59.590 UTC [fsblkstorage] updateCheckpoint -> DEBU 10f3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89369], isChainEmpty=[false], lastBlockNumber=[3]" +peer0.org1.example.com | [d0c 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" lastAliveTS: 1598907045014135600, 23 but got ts: inc_num:1598907045014135600 seq_num:21 +peer1.org1.example.com | [ecb 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [ff8 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [f5f 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:59.590 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 10f4 [channel: businesschannel] Wrote block [3]" +peer0.org1.example.com | [d0d 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ff9 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [ecc 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [f60 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:59.590 UTC [fsblkstorage] waitForBlock -> DEBU 10f5 Came out of wait. maxAvailaBlockNumber=[3]" +peer0.org1.example.com | [d0e 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [ffa 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [ecd 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f61 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:59.591 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10f6 Remaining bytes=[4552], Going to peek [8] bytes" +peer0.org1.example.com | [d0f 08-31 20:51:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ffb 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ece 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [f62 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:59.591 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10f7 Returning blockbytes - length=[4550], placementInfo={fileNum=[0], startOffset=[84817], bytesOffset=[84819]}" +peer0.org1.example.com | [d10 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [ffc 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ecf 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f63 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:59.591 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10f8 blockbytes [4550] read from file [0]" +peer0.org1.example.com | [d11 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [ffd 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ed0 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:59.591 UTC [common.deliver] deliverBlocks -> DEBU 10f9 [channel: businesschannel] Delivering block [3] for (0xc000a09280) for 172.18.0.5:56650" +peer1.org2.example.com | [f64 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [d12 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [ffe 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ed1 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:51:59.591 UTC [fsblkstorage] waitForBlock -> DEBU 10fa Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" +peer1.org2.example.com | [f65 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [d13 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [fff 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ed2 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:51:59.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10fb Sending msg of 28 bytes to 2 on channel businesschannel took 16.2µs" +peer1.org2.example.com | [f66 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [d14 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1000 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ed3 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:59.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10fc Sending msg of 28 bytes to 3 on channel businesschannel took 11µs" +peer1.org2.example.com | [f67 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003511de0 gate 1598907078490326900 evaluation starts +peer0.org1.example.com | [d15 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1001 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [ed4 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:59.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10fd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.6µs " +peer1.org2.example.com | [f68 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003511de0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [d16 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1002 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ed5 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:51:59.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 96.4µs " +peer1.org2.example.com | [f69 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003511de0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [d17 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1003 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [ed6 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:51:59.632 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ff Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [f6a 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003511de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [d18 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org2.example.com | [1004 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [ed7 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:59.632 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1100 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [f6b 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003511de0 principal evaluation fails +peer0.org1.example.com | [d19 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org2.example.com | [1005 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [ed8 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:51:59.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1101 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [f6c 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003511de0 gate 1598907078490326900 evaluation fails +peer0.org1.example.com | [d1a 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1006 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ed9 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:51:59.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1102 Sending msg of 28 bytes to 3 on channel testchainid took 26.2µs" +peer1.org2.example.com | [f6d 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d1b 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1007 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [edb 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:51:59.843 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1103 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.2µs " +peer1.org2.example.com | [f6e 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d1c 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1008 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [eda 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:00.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1104 Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +peer1.org2.example.com | [f6f 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [d1d 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1009 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [edc 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:00.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1105 Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +peer1.org2.example.com | [f70 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353a350 gate 1598907078490997100 evaluation starts +peer0.org1.example.com | [d1e 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [100a 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [edd 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d88d0 gate 1598907077996579000 evaluation starts +orderer0.example.com | "2020-08-31 20:52:00.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1106 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 209.8µs " +peer1.org2.example.com | [f71 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353a350 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [d1f 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [100b 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ede 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d88d0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:00.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1107 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 118.9µs " +peer1.org2.example.com | [f72 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353a350 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [d20 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [100c 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [edf 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d88d0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:00.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1108 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [f73 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353a350 principal matched by identity 0 +peer0.org1.example.com | [d21 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [100d 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ee0 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d88d0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:00.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1109 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [f74 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | [d22 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [100e 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [ee1 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | "2020-08-31 20:52:00.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [d23 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94a80 gate 1598907069764221600 evaluation starts +peer0.org2.example.com | [100f 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [f75 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | "2020-08-31 20:52:00.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 110b Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +peer0.org1.example.com | [d24 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94a80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1010 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ee2 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +orderer0.example.com | "2020-08-31 20:52:00.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 408.9µs " +peer0.org1.example.com | [d25 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94a80 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [1011 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +orderer0.example.com | "2020-08-31 20:52:00.406 UTC [orderer.common.server] Broadcast -> DEBU 110d Starting new Broadcast handler" +peer0.org1.example.com | [d26 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94a80 principal matched by identity 0 +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | [1012 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +orderer0.example.com | "2020-08-31 20:52:00.406 UTC [orderer.common.broadcast] Handle -> DEBU 110e Starting new broadcast loop for 172.18.0.9:50882" +peer0.org1.example.com | [d27 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [1013 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 110f [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:50882 with txid 'a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d' of type ENDORSER_TRANSACTION" +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [1014 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [f76 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353a350 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 1110 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +peer0.org1.example.com | [d28 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | [ee3 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d88d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1015 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [f77 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00353a350 gate 1598907078490997100 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 1111 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | [ee4 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d88d0 gate 1598907077996579000 evaluation succeeds +peer0.org2.example.com | [1016 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [f78 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 1112 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | [ee5 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1017 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003458720 gate 1598907075321131200 evaluation starts +peer1.org2.example.com | [f79 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 1113 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | [ee6 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1018 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003458720 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [f7a 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 1114 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [ee7 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1019 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003458720 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [f7b 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [cauthdsl] func1 -> DEBU 1115 0xc0010dcad0 gate 1598907120427530200 evaluation starts" +peer0.org1.example.com | [d29 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94a80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [ee8 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [101a 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003458720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [f7c 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [cauthdsl] func2 -> DEBU 1116 0xc0010dcad0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [d2a 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94a80 gate 1598907069764221600 evaluation succeeds +peer1.org1.example.com | [ee9 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | [101b 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003458720 principal evaluation fails +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [cauthdsl] func2 -> DEBU 1117 0xc0010dcad0 processing identity 0 with bytes of fe10e0" +peer0.org1.example.com | [d2b 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [101c 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003458720 gate 1598907075321131200 evaluation fails +peer1.org2.example.com | [f7d 08-31 20:51:18.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [cauthdsl] func2 -> DEBU 1118 0xc0010dcad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +peer0.org1.example.com | [d2c 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [eea 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | [101d 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [cauthdsl] func2 -> DEBU 1119 0xc0010dcad0 principal evaluation fails" +peer0.org1.example.com | [d2d 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | [101e 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [cauthdsl] func1 -> DEBU 111a 0xc0010dcad0 gate 1598907120427530200 evaluation fails" +peer0.org1.example.com | [d2e 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | [101f 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 111b Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | [d2f 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | [1020 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003458c90 gate 1598907075321493800 evaluation starts +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 111c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [1021 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003458c90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [f7e 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [policies] func1 -> DEBU 111d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +peer0.org1.example.com | [d30 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | [eeb 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1022 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003458c90 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [f7f 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 111e Signature set did not satisfy policy /Channel/Orderer/Writers" +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | [eec 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1023 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003458c90 principal matched by identity 0 +peer1.org2.example.com | [f80 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 111f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | [eed 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1024 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 74 b0 06 ce c2 7f fa 34 95 97 c9 2a 7d 70 83 |.t......4...*}p.| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 1120 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | [eee 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 79 ff fb 88 19 6d b1 4c bb b7 43 c7 ef ae 4d f1 |y....m.L..C...M.| +peer1.org2.example.com | [f81 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +orderer0.example.com | "2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 1121 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [eef 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1025 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 3b 65 7b 43 94 98 d4 c8 84 d0 34 |0D. h;e{C......4| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +orderer0.example.com | "2020-08-31 20:52:00.428 UTC [policies] Evaluate -> DEBU 1122 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | [d31 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ef0 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000010 be 0c 38 1e 49 55 8b 2d e7 57 78 c4 72 4e c7 dd |..8.IU.-.Wx.rN..| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +orderer0.example.com | "2020-08-31 20:52:00.428 UTC [cauthdsl] func1 -> DEBU 1123 0xc0010dd7c0 gate 1598907120428041800 evaluation starts" +peer0.org1.example.com | [d32 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [ef1 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000020 2a 04 1e d7 02 20 3a 9c a0 d5 4e cc 45 3e 65 8b |*.... :...N.E>e.| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +orderer0.example.com | "2020-08-31 20:52:00.428 UTC [cauthdsl] func2 -> DEBU 1124 0xc0010dd7c0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [d33 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [ef2 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000030 8b 16 ac f4 52 05 d2 6f e7 64 58 78 8c 04 5e a5 |....R..o.dXx..^.| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +orderer0.example.com | "2020-08-31 20:52:00.428 UTC [cauthdsl] func2 -> DEBU 1125 0xc0010dd7c0 processing identity 0 with bytes of fe10e0" +peer0.org1.example.com | [d34 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [ef3 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035601c0 gate 1598907077999121700 evaluation starts +peer0.org2.example.com | 00000040 3a d1 88 c7 52 c1 |:...R.| +peer1.org2.example.com | [f82 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:00.428 UTC [cauthdsl] func2 -> DEBU 1126 0xc0010dd7c0 principal matched by identity 0" +peer0.org1.example.com | [d35 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [ef4 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035601c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1026 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003458c90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [f83 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:00.428 UTC [msp.identity] Verify -> DEBU 1127 Verify: digest = 00000000 7f 36 4f 61 9a cb be 2c 0e 7c f3 d3 0a ae 63 b0 |.6Oa...,.|....c.| +peer0.org1.example.com | [d36 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [ef5 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1027 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003458c90 gate 1598907075321493800 evaluation succeeds +orderer0.example.com | 00000010 cb df 45 66 c7 92 ad 14 79 e7 5b 4f 81 2e ae 1c |..Ef....y.[O....|" +peer1.org2.example.com | [f84 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [d37 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [ef6 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035601c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1028 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:00.428 UTC [msp.identity] Verify -> DEBU 1128 Verify: sig = 00000000 30 44 02 20 2b 6a 46 c8 38 65 ff 3e 84 0d 72 0a |0D. +jF.8e.>..r.| +peer1.org2.example.com | [f85 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d38 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [ef7 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035601c0 principal matched by identity 0 +peer0.org2.example.com | [1029 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | 00000010 1b 71 b6 da 55 29 15 fa 20 ed 85 cd e5 54 13 8e |.q..U).. ....T..| +peer1.org2.example.com | [f86 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [d39 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab4370 gate 1598907069765653500 evaluation starts +peer1.org1.example.com | [ef8 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | [102a 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | 00000020 73 d7 49 c1 02 20 55 36 0c 7d d4 d5 f6 0a a0 75 |s.I.. U6.}.....u| +peer1.org2.example.com | [f87 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [d3a 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab4370 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [102b 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | 00000030 26 3b e5 cd d5 60 48 c1 e0 09 21 1b f6 c1 c2 bb |&;...`H...!.....| +peer1.org2.example.com | [f88 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [d3b 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab4370 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [ef9 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | [102c 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | 00000040 35 e0 49 3f d9 2c |5.I?.,|" +peer1.org2.example.com | [f89 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [d3c 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab4370 principal matched by identity 0 +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | [102d 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-08-31 20:52:00.428 UTC [cauthdsl] func2 -> DEBU 1129 0xc0010dd7c0 principal evaluation succeeds for identity 0" +peer1.org2.example.com | [f8a 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035545c0 gate 1598907078508195400 evaluation starts +peer0.org1.example.com | [d3d 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | [102e 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:00.429 UTC [cauthdsl] func1 -> DEBU 112a 0xc0010dd7c0 gate 1598907120428041800 evaluation succeeds" +peer1.org2.example.com | [f8b 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035545c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | [102f 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:00.430 UTC [policies] Evaluate -> DEBU 112b Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer1.org2.example.com | [f8c 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035545c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [d3e 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [1030 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:00.430 UTC [policies] Evaluate -> DEBU 112c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer1.org2.example.com | [f8d 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035545c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | [efa 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035601c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1031 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:00.430 UTC [policies] Evaluate -> DEBU 112d Signature set satisfies policy /Channel/Application/Writers" +peer1.org2.example.com | [f8e 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035545c0 principal evaluation fails +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | [efb 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035601c0 gate 1598907077999121700 evaluation succeeds +peer0.org2.example.com | [1032 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:00.430 UTC [policies] Evaluate -> DEBU 112e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer1.org2.example.com | [f8f 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035545c0 gate 1598907078508195400 evaluation fails +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | [efc 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1033 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:00.430 UTC [policies] Evaluate -> DEBU 112f Signature set satisfies policy /Channel/Writers" +peer1.org2.example.com | [f90 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [efd 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1034 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:00.430 UTC [policies] Evaluate -> DEBU 1130 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +peer1.org2.example.com | [f91 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d3f 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab4370 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [efe 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1035 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:00.430 UTC [orderer.common.blockcutter] Ordered -> DEBU 1131 Enqueuing message into batch" +peer1.org2.example.com | [f92 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [d40 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab4370 gate 1598907069765653500 evaluation succeeds +peer1.org1.example.com | [eff 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1036 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:00.430 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1132 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:50882" +peer1.org2.example.com | [f93 08-31 20:51:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003554bd0 gate 1598907078509896700 evaluation starts +peer1.org1.example.com | [f00 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | [d41 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1037 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:00.434 UTC [grpc] infof -> DEBU 1133 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org2.example.com | [f94 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003554bd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [d42 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1038 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:00.434 UTC [orderer.common.broadcast] Handle -> WARN 1134 Error reading from 172.18.0.9:50882: rpc error: code = Canceled desc = context canceled" +peer1.org2.example.com | [f95 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003554bd0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [f01 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | [d43 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1039 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:00.434 UTC [orderer.common.server] func1 -> DEBU 1135 Closing Broadcast stream" +peer1.org2.example.com | [f96 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003554bd0 principal matched by identity 0 +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | [d44 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [103a 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:00.434 UTC [comm.grpc.server] 1 -> INFO 1136 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:50882 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.6718ms +peer1.org2.example.com | [f97 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | [d45 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [103b 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:00.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1137 Sending msg of 28 bytes to 2 on channel businesschannel took 18.1µs" +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | [d46 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [103c 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:00.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1139 Sending msg of 28 bytes to 3 on channel businesschannel took 14µs" +peer1.org2.example.com | [f98 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [d47 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [103d 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:00.633 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91µs " +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | [f02 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d48 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [103e 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | "2020-08-31 20:52:00.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1138 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 160.6µs " +peer1.org1.example.com | [f03 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [d49 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [103f 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | "2020-08-31 20:52:00.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU 113b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [f04 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d4a 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1040 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | "2020-08-31 20:52:00.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU 113c Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [f05 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d4b 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1041 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [f99 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003554bd0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:00.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 113d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [f06 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d4c 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1042 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f9a 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003554bd0 gate 1598907078509896700 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:00.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113e Sending msg of 28 bytes to 3 on channel testchainid took 26.2µs" +peer0.org1.example.com | [d4d 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [f07 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1043 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f9b 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:00.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 507.9µs " +peer0.org1.example.com | [d4e 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f08 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1044 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f9c 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:01.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1140 Sending msg of 28 bytes to 2 on channel businesschannel took 23µs" +peer0.org1.example.com | [d4f 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer1.org1.example.com | [f09 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1045 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f9d 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:01.132 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1141 Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +peer0.org1.example.com | [d50 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | [f0a 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1046 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [f9e 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:01.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1142 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 607.2µs " +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [f0b 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1047 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [f9f 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:01.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1143 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.4µs " +peer0.org1.example.com | [d51 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | [f0c 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1048 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [fa0 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:01.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1144 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | [f0d 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003561d00 gate 1598907078000926500 evaluation starts +peer0.org2.example.com | [1049 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fa1 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:01.135 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1145 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | [f0e 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003561d00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [104a 08-31 20:51:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [fa2 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:01.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1146 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | [f0f 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003561d00 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [104b 08-31 20:51:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161018 +orderer0.example.com | "2020-08-31 20:52:01.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1147 Sending msg of 28 bytes to 3 on channel testchainid took 40µs" +peer1.org2.example.com | [fa3 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [f10 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003561d00 principal matched by identity 0 +peer0.org2.example.com | [104c 08-31 20:51:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 181F34D80A1B64BF996ED1D923938D9B2F5D01FB17FD460276F840FA52A29EFE +orderer0.example.com | "2020-08-31 20:52:01.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1148 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.9µs " +peer1.org2.example.com | [fa4 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [d52 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | [f11 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | [104d 08-31 20:51:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:52:01.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1149 Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" +peer1.org2.example.com | [fa5 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [104e 08-31 20:51:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-08-31 20:52:01.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 114a Sending msg of 28 bytes to 2 on channel businesschannel took 12.2µs" +peer1.org2.example.com | [fa6 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [d53 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | [f12 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | [104f 08-31 20:51:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +orderer0.example.com | "2020-08-31 20:52:01.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 114b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 205.8µs " +peer1.org2.example.com | [fa7 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555dd0 gate 1598907078513242000 evaluation starts +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | [1050 08-31 20:51:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +orderer0.example.com | "2020-08-31 20:52:01.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 114c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 168.9µs " +peer1.org2.example.com | [fa8 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555dd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | [1051 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:01.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [fa9 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555dd0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | [1052 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:01.607 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114e Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [faa 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [1053 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:01.810 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [fab 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555dd0 principal evaluation fails +peer0.org1.example.com | [d54 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f13 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003561d00 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:01.811 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1150 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +peer1.org2.example.com | [fac 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555dd0 gate 1598907078513242000 evaluation fails +peer0.org1.example.com | [d55 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f14 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003561d00 gate 1598907078000926500 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:01.811 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1151 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 205µs " +peer0.org2.example.com | [1054 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [fad 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d56 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [f15 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:02.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1152 Sending msg of 28 bytes to 2 on channel businesschannel took 35.8µs" +peer0.org2.example.com | [1055 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fae 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [d57 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f16 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:02.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1153 Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +peer0.org2.example.com | [1056 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [faf 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [d58 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f17 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:02.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1154 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 868.3µs " +peer0.org2.example.com | [1057 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [fb0 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358c340 gate 1598907078514513100 evaluation starts +peer0.org1.example.com | [d59 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [f18 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:02.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1155 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 480.2µs " +peer0.org2.example.com | [1058 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [fb1 08-31 20:51:18.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358c340 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [d5a 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [f19 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | "2020-08-31 20:52:02.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1156 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1059 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fb2 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358c340 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [d5b 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:52:02.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1157 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [105a 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [fb3 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358c340 principal matched by identity 0 +peer0.org1.example.com | [d5c 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae04f0 gate 1598907069779399800 evaluation starts +peer1.org1.example.com | [f1a 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:52:02.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1158 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [105b 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fb4 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | [d5d 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae04f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | "2020-08-31 20:52:02.307 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1159 Sending msg of 28 bytes to 3 on channel testchainid took 84.6µs" +peer0.org2.example.com | [105c 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [d5e 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae04f0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | "2020-08-31 20:52:02.308 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 677.8µs " +peer0.org2.example.com | [105d 08-31 20:51:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [fb5 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | [d5f 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae04f0 principal matched by identity 0 +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | "2020-08-31 20:52:02.397 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 115b Batch timer expired, creating block" channel=businesschannel node=1 +peer0.org2.example.com | [105e 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | [d60 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | "2020-08-31 20:52:02.397 UTC [orderer.consensus.etcdraft] propose -> INFO 115c Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 +peer0.org2.example.com | [105f 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [f1b 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | "2020-08-31 20:52:02.397 UTC [orderer.consensus.etcdraft] 2 -> DEBU 115d Proposed block [4] to raft consensus" channel=businesschannel node=1 +peer0.org2.example.com | [1060 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | [d61 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | "2020-08-31 20:52:02.401 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115e Sending msg of 3109 bytes to 2 on channel businesschannel took 17.8µs" +peer0.org2.example.com | [1061 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | [f1c 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | "2020-08-31 20:52:02.401 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115f Sending msg of 3109 bytes to 3 on channel businesschannel took 115.3µs" +peer0.org2.example.com | [1062 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 1f 34 d8 0a 1b 64 bf 99 6e d1 d9 23 93 8d 9b |..4...d..n..#...| +peer1.org2.example.com | [fb6 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358c340 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +orderer0.example.com | "2020-08-31 20:52:02.402 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1160 Send of ConsensusRequest for channel businesschannel with payload of size 3109 to orderer2.example.com(orderer2.example.com:7050) took 313.1µs " +peer0.org2.example.com | 00000010 2f 5d 01 fb 17 fd 46 02 76 f8 40 fa 52 a2 9e fe |/]....F.v.@.R...| +peer1.org2.example.com | [fb7 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358c340 gate 1598907078514513100 evaluation succeeds +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | [1063 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 81 aa 57 a4 fa 87 e8 c8 7d 0e |0E.!....W.....}.| +orderer0.example.com | "2020-08-31 20:52:02.402 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1161 Send of ConsensusRequest for channel businesschannel with payload of size 3109 to orderer1.example.com(orderer1.example.com:7050) took 159.6µs " +peer1.org2.example.com | [fb8 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000010 54 95 10 9a 24 ac 12 47 e9 3e 6a 70 ac 54 ab 5d |T...$..G.>jp.T.]| +orderer0.example.com | "2020-08-31 20:52:02.405 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1162 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [fb9 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [d62 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae04f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | 00000020 98 31 54 f8 ef 02 20 5b c0 d9 0f 61 bc 51 16 75 |.1T... [...a.Q.u| +orderer0.example.com | "2020-08-31 20:52:02.406 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1163 Sending msg of 28 bytes to 2 on channel businesschannel took 19.5µs" +peer1.org2.example.com | [fba 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [d63 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae04f0 gate 1598907069779399800 evaluation succeeds +peer1.org1.example.com | [f1d 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 99 0b 98 d5 e0 e9 7e 54 47 47 0e 91 c2 df 38 ef |......~TGG....8.| +orderer0.example.com | "2020-08-31 20:52:02.406 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1164 Sending msg of 28 bytes to 3 on channel businesschannel took 28.1µs" +peer1.org2.example.com | [fbb 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [d64 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f1e 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 75 87 e9 bc 32 a7 55 |u...2.U| +orderer0.example.com | "2020-08-31 20:52:02.407 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1165 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.7µs " +peer1.org2.example.com | [fbc 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d65 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1064 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f1f 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:02.407 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1166 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 +peer1.org2.example.com | [fbd 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d66 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1065 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f20 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:02.407 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1167 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +peer1.org2.example.com | [fbe 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | [d67 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1066 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f21 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [d68 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1067 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f22 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [fbf 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [d69 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1068 08-31 20:51:15.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f23 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:02.408 UTC [msp] GetDefaultSigningIdentity -> DEBU 1168 Obtaining default signing identity" +peer1.org2.example.com | [fc0 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | [d6a 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1069 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [f24 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:02.408 UTC [msp] GetDefaultSigningIdentity -> DEBU 1169 Obtaining default signing identity" +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | [d6b 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [106a 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f25 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358dce0 gate 1598907078004439200 evaluation starts +orderer0.example.com | "2020-08-31 20:52:02.408 UTC [msp.identity] Sign -> DEBU 116a Sign: plaintext: 0A020802120B0A090A03010203100418...5AC34A0E14B5221B8599A7B6B53BEA8E " +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | [d6c 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [106b 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [f26 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358dce0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:02.408 UTC [msp.identity] Sign -> DEBU 116b Sign: digest: 12CF8A132D96AF0DA3439AC78AFAFC99347B05A5A54007BD54030C049A7867F8 " +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | [d6d 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [106c 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f27 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358dce0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:02.409 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 169.8µs " +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [d6e 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [106d 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [f28 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358dce0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:02.433 UTC [fsblkstorage] indexBlock -> DEBU 116d Indexing block [blockNum=4, blockHash=[]byte{0x81, 0x47, 0x7e, 0x41, 0x1c, 0xad, 0xf5, 0x8b, 0x36, 0x32, 0x94, 0x83, 0x50, 0xc2, 0x29, 0x32, 0xda, 0xd5, 0xc, 0x74, 0xc8, 0x4a, 0xac, 0xd3, 0xc3, 0x82, 0x1e, 0x87, 0x25, 0x9, 0x5, 0x17} txOffsets= +peer1.org2.example.com | [fc1 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d6f 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [106e 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [f29 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | txId=a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d locPointer=offset=70, bytesLength=2981 +peer1.org2.example.com | [fc2 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d70 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [106f 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +orderer0.example.com | ]" +peer1.org2.example.com | [fc3 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d71 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1070 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [f2a 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | "2020-08-31 20:52:02.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 116e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [fc4 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [d72 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1071 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e53f0 gate 1598907075553605100 evaluation starts +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +orderer0.example.com | "2020-08-31 20:52:02.438 UTC [fsblkstorage] updateCheckpoint -> DEBU 116f Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93381], isChainEmpty=[false], lastBlockNumber=[4]" +peer1.org2.example.com | [fc5 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [d73 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1940 gate 1598907069783987200 evaluation starts +peer0.org2.example.com | [1072 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e53f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | "2020-08-31 20:52:02.442 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1170 [channel: businesschannel] Wrote block [4]" +peer1.org2.example.com | [fc6 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [d74 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1940 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1073 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e53f0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +orderer0.example.com | "2020-08-31 20:52:02.442 UTC [fsblkstorage] waitForBlock -> DEBU 1171 Came out of wait. maxAvailaBlockNumber=[4]" +peer1.org2.example.com | [fc7 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [d75 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1940 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1074 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e53f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +orderer0.example.com | "2020-08-31 20:52:02.442 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1172 Remaining bytes=[4012], Going to peek [8] bytes" +peer1.org2.example.com | [fc8 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [d76 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1940 principal matched by identity 0 +peer1.org1.example.com | [f2b 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358dce0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1075 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e53f0 principal evaluation fails +orderer0.example.com | "2020-08-31 20:52:02.442 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1173 Returning blockbytes - length=[4010], placementInfo={fileNum=[0], startOffset=[89369], bytesOffset=[89371]}" +peer1.org2.example.com | [fc9 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [d77 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | [f2c 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358dce0 gate 1598907078004439200 evaluation succeeds +peer0.org2.example.com | [1076 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e53f0 gate 1598907075553605100 evaluation fails +orderer0.example.com | "2020-08-31 20:52:02.442 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1174 blockbytes [4010] read from file [0]" +peer1.org2.example.com | [fca 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [f2d 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1077 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:02.443 UTC [common.deliver] deliverBlocks -> DEBU 1175 [channel: businesschannel] Delivering block [4] for (0xc000a09280) for 172.18.0.5:56650" +peer1.org2.example.com | [fcb 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer0.org1.example.com | [d78 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | [f2e 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1078 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:02.443 UTC [fsblkstorage] waitForBlock -> DEBU 1176 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" +peer1.org2.example.com | [fcc 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | [f2f 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1079 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:02.444 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1177 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [fcd 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | [f30 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [107a 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5ad0 gate 1598907075553966200 evaluation starts +orderer0.example.com | "2020-08-31 20:52:02.448 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1178 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [fce 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D981610051801 +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | [f31 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [107b 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5ad0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:02.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1179 Sending msg of 28 bytes to 2 on channel businesschannel took 28.3µs" +peer1.org2.example.com | [fcf 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 97650891B6ED6690772C34B4C8EAC646189EA4DADD15CB89A0C199768E5E1972 +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [f32 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [107c 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5ad0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:02.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117a Sending msg of 28 bytes to 3 on channel businesschannel took 23.4µs" +peer1.org2.example.com | [fd0 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer0.org1.example.com | [d79 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1940 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [f33 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | [107d 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5ad0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:02.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 232µs " +peer1.org2.example.com | [fd1 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [d7a 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1940 gate 1598907069783987200 evaluation succeeds +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [107e 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 6c 7f 1b 65 57 9a bc c3 e3 23 19 66 54 d9 0f |Ml..eW....#.fT..| +orderer0.example.com | "2020-08-31 20:52:02.599 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 422.2µs " +peer0.org1.example.com | [d7b 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [fd2 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f34 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 5e 15 81 0a 9a 12 3a 31 b0 81 25 7f 88 16 49 a3 |^.....:1..%...I.| +orderer0.example.com | "2020-08-31 20:52:02.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117d Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [d7c 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [fd3 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | [107f 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be 25 48 43 49 2c 8d 94 5c ca d9 |0E.!..%HCI,..\..| +orderer0.example.com | "2020-08-31 20:52:02.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [d7d 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [fd4 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000010 3a a2 94 06 4c d9 7c 97 55 ad fa e9 b8 31 a4 08 |:...L.|.U....1..| +orderer0.example.com | "2020-08-31 20:52:02.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [d7e 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [fd5 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000020 30 fb 43 01 97 02 20 6b 9d d4 3b c4 d7 b5 43 4d |0.C... k..;...CM| +orderer0.example.com | "2020-08-31 20:52:02.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1180 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +peer0.org1.example.com | [d7f 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | [fd6 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | 00000030 f2 ff 5d 8a d6 c1 f1 55 a4 0d 8f 93 8c de 1b 1f |..]....U........| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:52:02.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1181 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 341.5µs " +peer1.org2.example.com | [fd7 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f35 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 f8 4b de 15 20 ff 3a |.K.. .:| +peer0.org1.example.com | [d80 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:52:02.958 UTC [orderer.common.server] Broadcast -> DEBU 1182 Starting new Broadcast handler" +peer1.org2.example.com | [fd8 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [f36 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1080 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5ad0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:02.958 UTC [orderer.common.broadcast] Handle -> DEBU 1183 Starting new broadcast loop for 172.18.0.9:50896" +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | [fd9 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f37 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1081 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5ad0 gate 1598907075553966200 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:02.968 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1184 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:50896 with txid 'ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b' of type ENDORSER_TRANSACTION" +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | [fda 08-31 20:51:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [f38 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1082 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:02.968 UTC [policies] Evaluate -> DEBU 1185 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | [fdb 08-31 20:51:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D9816101C +peer0.org2.example.com | [1083 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [f39 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:02.969 UTC [policies] Evaluate -> DEBU 1186 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [fdc 08-31 20:51:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 424C7AD81B8A9FD61E228BC141B1FB53AD8BC4D9AF7ADA609B62CADCC420CC84 +peer0.org2.example.com | [1084 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [f3a 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:02.969 UTC [policies] Evaluate -> DEBU 1187 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +peer0.org1.example.com | [d81 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | [fdd 08-31 20:51:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1085 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [f3b 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:02.969 UTC [policies] Evaluate -> DEBU 1188 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [fde 08-31 20:51:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1086 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f3c 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:02.969 UTC [policies] Evaluate -> DEBU 1189 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | [d82 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | [fdf 08-31 20:51:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | [1087 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [f3d 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7770 gate 1598907078006670700 evaluation starts +orderer0.example.com | "2020-08-31 20:52:02.969 UTC [msp] DeserializeIdentity -> DEBU 118a Obtaining identity" +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | [fe0 08-31 20:51:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [1088 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [f3e 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7770 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:02.970 UTC [msp.identity] newIdentity -> DEBU 118b Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | [fe1 08-31 20:51:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1089 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [f3f 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7770 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | [fe2 08-31 20:51:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [108a 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [f40 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7770 principal matched by identity 0 +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [fe3 08-31 20:51:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org2.example.com | [108b 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f41 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | [d83 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fe4 08-31 20:51:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [108c 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +orderer0.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | [d84 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [fe6 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [108d 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f42 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | [d85 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [fe7 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [108e 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +orderer0.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org1.example.com | [d86 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [fe9 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [108f 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org1.example.com | [d87 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [fe5 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1090 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +orderer0.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org1.example.com | [d88 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [fea 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1091 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +orderer0.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org1.example.com | [d89 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [fe8 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1092 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f43 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7770 principal evaluation succeeds for identity 0 +orderer0.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org1.example.com | [d8a 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [feb 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1093 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f44 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7770 gate 1598907078006670700 evaluation succeeds +peer1.org1.example.com | [f45 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org1.example.com | [d8b 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afb920 gate 1598907069790222300 evaluation starts +peer1.org2.example.com | [fec 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1094 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [f46 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org1.example.com | [d8c 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afb920 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [fed 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1095 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f47 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [d8d 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afb920 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [fee 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1096 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f48 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:02.970 UTC [cauthdsl] func1 -> DEBU 118c 0xc001135a90 gate 1598907122970898800 evaluation starts" +peer0.org1.example.com | [d8e 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afb920 principal matched by identity 0 +peer1.org2.example.com | [fef 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1097 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [f49 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | "2020-08-31 20:52:02.971 UTC [cauthdsl] func2 -> DEBU 118d 0xc001135a90 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [d8f 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | [ff0 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1098 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | "2020-08-31 20:52:02.971 UTC [cauthdsl] func2 -> DEBU 118e 0xc001135a90 processing identity 0 with bytes of fe10e0" +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [ff1 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1099 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f4a 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | "2020-08-31 20:52:02.971 UTC [cauthdsl] func2 -> DEBU 118f 0xc001135a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +peer0.org1.example.com | [d90 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | [ff2 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [109a 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +orderer0.example.com | "2020-08-31 20:52:02.971 UTC [cauthdsl] func2 -> DEBU 1190 0xc001135a90 principal evaluation fails" +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | [ff3 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [109b 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +orderer0.example.com | "2020-08-31 20:52:02.972 UTC [cauthdsl] func1 -> DEBU 1191 0xc001135a90 gate 1598907122970898800 evaluation fails" +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | [ff4 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [109c 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +orderer0.example.com | "2020-08-31 20:52:02.972 UTC [policies] Evaluate -> DEBU 1192 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | [ff5 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [109d 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +orderer0.example.com | "2020-08-31 20:52:02.972 UTC [policies] Evaluate -> DEBU 1193 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [ff6 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [109e 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f4b 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:02.972 UTC [policies] func1 -> DEBU 1194 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +peer0.org1.example.com | [d91 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afb920 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [ff7 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [109f 08-31 20:51:15.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f4c 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:02.972 UTC [policies] Evaluate -> DEBU 1195 Signature set did not satisfy policy /Channel/Orderer/Writers" +peer0.org1.example.com | [d92 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afb920 gate 1598907069790222300 evaluation succeeds +peer1.org2.example.com | [ff8 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [10a0 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f4d 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:02.973 UTC [policies] Evaluate -> DEBU 1196 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +peer0.org1.example.com | [d93 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [ff9 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [10a1 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f4e 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:02.973 UTC [policies] Evaluate -> DEBU 1197 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | [d94 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [ffa 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359ec20 gate 1598907080313682200 evaluation starts +peer0.org2.example.com | [10a2 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f4f 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:02.973 UTC [policies] Evaluate -> DEBU 1198 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [d95 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [ffb 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359ec20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [10a3 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f50 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:02.973 UTC [policies] Evaluate -> DEBU 1199 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer0.org1.example.com | [d96 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [ffc 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359ec20 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [10a4 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [f51 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:02.973 UTC [cauthdsl] func1 -> DEBU 119a 0xc001199100 gate 1598907122973812900 evaluation starts" +peer0.org1.example.com | [d97 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [ffd 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359ec20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [10a5 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [f52 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:02.973 UTC [cauthdsl] func2 -> DEBU 119b 0xc001199100 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [d98 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [ffe 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359ec20 principal evaluation fails +peer0.org2.example.com | [10a6 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [f53 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f1060 gate 1598907078008528000 evaluation starts +orderer0.example.com | "2020-08-31 20:52:02.974 UTC [cauthdsl] func2 -> DEBU 119c 0xc001199100 processing identity 0 with bytes of fe10e0" +peer0.org1.example.com | [d99 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [fff 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359ec20 gate 1598907080313682200 evaluation fails +peer0.org2.example.com | [10a7 08-31 20:51:16.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f54 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f1060 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:02.974 UTC [cauthdsl] func2 -> DEBU 119d 0xc001199100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org1.example.com | [d9a 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1000 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [10a8 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [f55 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f1060 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:02.974 UTC [cauthdsl] func2 -> DEBU 119e 0xc001199100 principal evaluation fails" +peer0.org1.example.com | [d9b 08-31 20:51:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [1001 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [10a9 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f56 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f1060 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:02.974 UTC [cauthdsl] func1 -> DEBU 119f 0xc001199100 gate 1598907122973812900 evaluation fails" +peer0.org1.example.com | [d9c 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [1002 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [10aa 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [f57 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +orderer0.example.com | "2020-08-31 20:52:02.974 UTC [policies] Evaluate -> DEBU 11a0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | [d9d 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [1003 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359f190 gate 1598907080314030600 evaluation starts +peer0.org2.example.com | [10ab 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +orderer0.example.com | "2020-08-31 20:52:02.974 UTC [policies] Evaluate -> DEBU 11a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | [d9e 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1004 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359f190 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [10ac 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 4f 62 6e f8 51 b2 b9 7a 89 a1 94 93 43 19 a1 |tObn.Q..z....C..| +peer1.org1.example.com | [f58 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +orderer0.example.com | "2020-08-31 20:52:02.974 UTC [policies] Evaluate -> DEBU 11a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +peer0.org1.example.com | [d9f 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1005 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359f190 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | 00000010 e1 30 a3 49 45 27 56 4c 01 81 42 14 62 f0 c4 bf |.0.IE'VL..B.b...| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +orderer0.example.com | "2020-08-31 20:52:02.974 UTC [cauthdsl] func1 -> DEBU 11a3 0xc001199960 gate 1598907122974319700 evaluation starts" +peer0.org1.example.com | [da0 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org2.example.com | [1006 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359f190 principal matched by identity 0 +peer0.org2.example.com | [10ad 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 4c 56 6b dd 24 ae 93 da c4 0d |0E.!..LVk.$.....| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +orderer0.example.com | "2020-08-31 20:52:02.974 UTC [cauthdsl] func2 -> DEBU 11a4 0xc001199960 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [da1 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1007 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 4d 1d dd ca 1c c9 e4 80 12 51 aa 7a a4 bb 5d |.M........Q.z..]| +peer0.org2.example.com | 00000010 34 59 24 07 9d eb 5d d4 90 ae 99 d7 00 49 bd 50 |4Y$...]......I.P| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +orderer0.example.com | "2020-08-31 20:52:02.974 UTC [cauthdsl] func2 -> DEBU 11a5 0xc001199960 processing identity 0 with bytes of fe10e0" +peer0.org1.example.com | [da2 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 86 b7 22 55 be 3d ab 3a 5e 77 7b 7e 19 ed 39 99 |.."U.=.:^w{~..9.| +peer0.org2.example.com | 00000020 97 b1 3a eb 68 02 20 7c b3 d6 f6 1c cf 91 b2 30 |..:.h. |.......0| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +orderer0.example.com | "2020-08-31 20:52:02.975 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 11a6 Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | [da3 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1008 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 00 df cf e7 48 6a be 12 05 d9 fc 4a |0D. ....Hj.....J| +peer0.org2.example.com | 00000030 b2 77 db bc bc 9f b5 b7 b2 42 30 82 2e d9 85 95 |.w.......B0.....| +peer1.org1.example.com | [f59 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f1060 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:02.975 UTC [msp] Validate -> DEBU 11a7 MSP Org2MSP validating identity" +peer0.org1.example.com | [da4 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 c9 a2 be 74 56 35 0f 37 62 29 d8 d5 cd 85 13 7b |...tV5.7b).....{| +peer0.org2.example.com | 00000040 b9 ce 81 9e 49 97 68 |....I.h| +peer1.org1.example.com | [f5a 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f1060 gate 1598907078008528000 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:02.975 UTC [msp] getCertificationChain -> DEBU 11a8 MSP Org2MSP getting certification chain" +peer0.org1.example.com | [da5 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 f1 e3 99 bd 02 20 67 02 25 88 aa 82 ba 0f 66 33 |..... g.%.....f3| +peer0.org2.example.com | [10ae 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | [f5b 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:02.976 UTC [cauthdsl] func2 -> DEBU 11a9 0xc001199960 principal matched by identity 0" +peer0.org1.example.com | [da6 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 df a6 19 48 59 ac be 87 fa 94 8c 84 5b 9e 9e e9 |...HY.......[...| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org1.example.com | [f5c 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:02.976 UTC [msp.identity] Verify -> DEBU 11aa Verify: digest = 00000000 60 35 37 a9 79 33 a2 e5 2b 9c 00 24 05 6e 93 3f |`57.y3..+..$.n.?| +peer0.org1.example.com | [da7 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | 00000040 a0 53 73 e1 0a 19 |.Ss...| +peer0.org2.example.com | [10af 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6e a7 1e 7d fc 72 53 a8 4a d3 30 9f |0D. n..}.rS.J.0.| +peer1.org1.example.com | [f5d 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | 00000010 8d d7 90 73 0d 35 87 ae 3b dd 80 ca fa 0e 01 84 |...s.5..;.......|" +peer0.org1.example.com | [da8 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1009 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359f190 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 b5 72 d3 dd 4b 42 7f 71 a8 b4 31 f0 f2 98 fb 0f |.r..KB.q..1.....| +peer1.org1.example.com | [f5e 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:02.976 UTC [msp.identity] Verify -> DEBU 11ab Verify: sig = 00000000 30 44 02 20 7c 1e 88 5b 8d 81 cf 0e a2 2f d3 11 |0D. |..[...../..| +peer0.org1.example.com | [da9 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [100a 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359f190 gate 1598907080314030600 evaluation succeeds +peer0.org2.example.com | 00000020 48 bc ec 51 02 20 76 2d 05 d7 ff 47 d3 1d 05 c2 |H..Q. v-...G....| +peer1.org1.example.com | [f5f 08-31 20:51:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000010 a4 a8 f1 b3 5c 74 52 c0 c6 9d 67 23 3f e7 8d d0 |....\tR...g#?...| +peer0.org1.example.com | [daa 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [100b 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000030 ea 1f a8 fd 5f 38 3a 84 76 73 69 3a e1 37 7f 5b |...._8:.vsi:.7.[| +peer1.org1.example.com | [f60 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000020 de 36 b3 af 02 20 14 7b 59 42 5f fc de 82 a4 91 |.6... .{YB_.....| +peer0.org1.example.com | [dab 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [100c 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000040 da 36 d7 bd 2f e2 |.6../.| +peer1.org1.example.com | [f61 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000030 9e 10 21 3b 91 48 0d fa dd 17 37 33 ab 68 b1 3b |..!;.H....73.h.;| +peer0.org1.example.com | [dac 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [100d 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [10b0 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [f62 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +orderer0.example.com | 00000040 92 ff b4 50 2d 54 |...P-T|" +peer0.org1.example.com | [dad 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [100e 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [10b1 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [f63 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [dae 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:02.976 UTC [cauthdsl] func2 -> DEBU 11ac 0xc001199960 principal evaluation succeeds for identity 0" +peer1.org2.example.com | [100f 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10b2 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [f64 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [daf 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:02.976 UTC [cauthdsl] func1 -> DEBU 11ad 0xc001199960 gate 1598907122974319700 evaluation succeeds" +peer1.org2.example.com | [1010 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [10b3 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [f65 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [db0 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:02.977 UTC [policies] Evaluate -> DEBU 11ae Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +peer1.org2.example.com | [1011 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [10b4 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [f66 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [db1 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:02.977 UTC [policies] Evaluate -> DEBU 11af == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +peer1.org2.example.com | [1012 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [10b5 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f67 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [db2 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:02.977 UTC [policies] Evaluate -> DEBU 11b0 Signature set satisfies policy /Channel/Application/Writers" +peer1.org2.example.com | [1013 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [10b6 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f68 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [db3 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:02.977 UTC [policies] Evaluate -> DEBU 11b1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer1.org2.example.com | [1014 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f69 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [10b7 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [db4 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:02.977 UTC [policies] Evaluate -> DEBU 11b2 Signature set satisfies policy /Channel/Writers" +peer1.org2.example.com | [1015 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f6a 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [10b8 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [db5 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b30040 gate 1598907070046567700 evaluation starts +orderer0.example.com | "2020-08-31 20:52:02.977 UTC [policies] Evaluate -> DEBU 11b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +peer1.org2.example.com | [1016 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f6b 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10b9 08-31 20:51:17.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [db6 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b30040 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:02.977 UTC [orderer.common.blockcutter] Ordered -> DEBU 11b4 Enqueuing message into batch" +peer1.org2.example.com | [1017 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f6c 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [10ba 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [db7 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b30040 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:02.977 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 11b5 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:50896" +peer1.org1.example.com | [f6d 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1018 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10bb 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [db8 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b30040 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:02.980 UTC [orderer.common.broadcast] Handle -> WARN 11b6 Error reading from 172.18.0.9:50896: rpc error: code = Canceled desc = context canceled" +peer1.org1.example.com | [f6e 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1019 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10bc 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:jp\254T\253]\2301T\370\357\002 [\300\331\017a\274Q\026u\231\013\230\325\340\351~TGG\016\221\302\3378\357u\207\351\2742\247U" > +orderer0.example.com | "2020-08-31 20:52:02.980 UTC [orderer.common.server] func1 -> DEBU 11b7 Closing Broadcast stream" +peer0.org1.example.com | [db9 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 8f ca 88 75 8b 7c 36 a5 18 4b 1c 19 7c 3b 5a |....u.|6..K..|;Z| +peer1.org1.example.com | [f6f 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [101a 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10bd 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:02.980 UTC [comm.grpc.server] 1 -> INFO 11b8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:50896 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.4692ms +peer0.org1.example.com | 00000010 a7 b0 45 ab e4 20 b7 46 39 04 47 b6 1e 2e fb 8b |..E.. .F9.G.....| +peer1.org1.example.com | [f70 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [101b 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10be 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:02.980 UTC [grpc] infof -> DEBU 11b9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | [dba 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 03 81 18 c8 42 fb f5 0c b9 92 |0E.!......B.....| +peer1.org1.example.com | [f71 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [101c 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10bf 08-31 20:51:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:03.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ba Sending msg of 28 bytes to 2 on channel businesschannel took 34.5µs" +peer0.org1.example.com | 00000010 12 50 72 ef 20 07 76 b4 f9 17 57 62 57 a6 33 4d |.Pr. .v...WbW.3M| +peer1.org1.example.com | [f72 08-31 20:51:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [101d 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10c0 08-31 20:51:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:03.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11bb Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +peer0.org1.example.com | 00000020 4a b2 ef 50 9d 02 20 6b 3f 0c 5d e8 27 04 4c 8a |J..P.. k?.].'.L.| +peer1.org1.example.com | [f73 08-31 20:51:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [101e 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10c1 08-31 20:51:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:03.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11bc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.8µs " +peer0.org1.example.com | 00000030 ee 77 82 93 fc 33 2b 69 d0 d1 8c 09 0f 43 f4 28 |.w...3+i.....C.(| +peer1.org1.example.com | [f74 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [101f 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10c2 08-31 20:51:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:03.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11bd Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000040 5b 4d 29 44 01 01 0b |[M)D...| +peer1.org1.example.com | [f75 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1020 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10c3 08-31 20:51:17.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:03.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11be Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.4976ms " +peer0.org1.example.com | [dbb 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b30040 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [f76 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1021 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [10c4 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:03.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11bf Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [dbc 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b30040 gate 1598907070046567700 evaluation succeeds +peer1.org1.example.com | [f77 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [1022 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10c5 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:03.308 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c0 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [dbd 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f78 08-31 20:51:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [1023 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10c6 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:03.309 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c1 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +peer0.org1.example.com | [dbe 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [f79 08-31 20:51:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d 4a a0 fa 5e 6e 5c 39 1d bc d4 ac b5 97 31 59 |]J..^n\9......1Y| +peer1.org2.example.com | [1024 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [10c7 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +orderer0.example.com | "2020-08-31 20:52:03.309 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 195.3µs " +peer0.org1.example.com | [dbf 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 0a a1 7b 1b 08 e5 d2 fe d8 7d fa b6 41 54 73 23 |..{......}..ATs#| +peer1.org2.example.com | [1025 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10c8 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:03.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c3 Sending msg of 28 bytes to 2 on channel businesschannel took 32.5µs" +peer0.org1.example.com | [dc0 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [f7a 08-31 20:51:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 72 c5 f8 b8 c4 b5 39 b1 2d 43 |0E.!..r.....9.-C| +peer1.org2.example.com | [1026 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10c9 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:03.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c4 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +peer0.org1.example.com | [dc1 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 aa c0 85 5a f7 07 9d 9e af ac 65 fc 06 4b ac 2f |...Z......e..K./| +peer1.org2.example.com | [1027 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10ca 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:03.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 377.2µs " +peer0.org1.example.com | [dc2 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000020 46 bf 24 68 52 02 20 6c ac 87 fc 89 4a 04 ab ad |F.$hR. l....J...| +peer1.org2.example.com | [1028 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10cb 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:03.599 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.162ms " +peer0.org1.example.com | [dc3 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000030 5c 76 a9 76 aa f9 ea 42 85 70 0e 4a fb 47 a8 0d |\v.v...B.p.J.G..| +peer1.org2.example.com | [1029 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10cc 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:52:03.600 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c7 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [dc4 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | 00000040 d5 7c 71 24 54 2b 14 |.|q$T+.| +peer1.org2.example.com | [102a 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10cd 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:03.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [dc5 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [f7b 08-31 20:51:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [102b 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:03.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c9 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [10ce 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [dc6 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [f7c 08-31 20:51:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [102c 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:03.807 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ca Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +peer0.org2.example.com | [10cf 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [dc7 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [f7d 08-31 20:51:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org2.example.com | [102d 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:03.807 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11cb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.6µs " +peer0.org2.example.com | [10d0 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [dc8 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f7e 08-31 20:51:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [102e 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:04.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11cc Sending msg of 28 bytes to 2 on channel businesschannel took 29.9µs" +peer0.org2.example.com | [10d1 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [dc9 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f7f 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [102f 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:04.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11cd Sending msg of 28 bytes to 3 on channel businesschannel took 26.7µs" +peer0.org2.example.com | [10d2 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [dca 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f80 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1030 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:04.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 357.4µs " +peer0.org2.example.com | [10d3 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [dcb 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1031 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f81 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:04.100 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 791.2µs " +peer0.org2.example.com | [10d4 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375c8a0 gate 1598907077311799900 evaluation starts +peer0.org1.example.com | [dcc 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1032 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [f82 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [f83 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [f84 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-08-31 20:52:04.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d0 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1033 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 58 d4 ea 29 6a 97 0b 2d 01 c0 5f f5 74 8e f0 |.X..)j..-.._.t..| +peer1.org1.example.com | [f85 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:04.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d1 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [10d5 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375c8a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [dcd 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 0b 2f 60 7d 52 6e a7 2f 35 87 98 2f 22 2c 8b bb |./`}Rn./5../",..| +peer1.org1.example.com | [f86 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:04.308 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [10d6 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375c8a0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [dce 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1034 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 81 e4 aa 2b 18 37 8d c9 58 99 |0E.!.....+.7..X.| +peer1.org1.example.com | [f87 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:04.309 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d3 Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" +peer0.org2.example.com | [10d7 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375c8a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [dcf 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 d0 81 42 79 e1 e7 83 38 50 08 38 6a 45 ee 51 4a |..By...8P.8jE.QJ| +peer1.org1.example.com | [f88 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:04.310 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193µs " +peer0.org2.example.com | [10d8 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375c8a0 principal evaluation fails +peer0.org1.example.com | [dd0 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 39 53 9d 40 49 02 20 48 4e 0a db 1b 0a 41 f9 59 |9S.@I. HN....A.Y| +peer1.org1.example.com | [f89 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [10d9 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375c8a0 gate 1598907077311799900 evaluation fails +orderer0.example.com | "2020-08-31 20:52:04.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d5 Sending msg of 28 bytes to 2 on channel businesschannel took 25.1µs" +peer0.org1.example.com | [dd1 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 9e 40 7e 3e dc 7c b2 6c cc d6 c1 04 5e 21 32 67 |.@~>.|.l....^!2g| +peer1.org1.example.com | [f8a 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [10da 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:04.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d6 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +peer0.org1.example.com | [dd2 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 dc 23 a5 15 9d f8 2c |.#....,| +peer1.org1.example.com | [f8b 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [10db 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:04.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 320.8µs " +peer0.org1.example.com | [dd3 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1035 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f8c 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036395e0 gate 1598907080052871400 evaluation starts +peer0.org2.example.com | [10dc 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:04.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.5µs " +peer0.org1.example.com | [dd4 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1036 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [f8d 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036395e0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:04.600 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d9 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [dd5 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1037 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [f8e 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036395e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [10dd 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375ce20 gate 1598907077312123100 evaluation starts +orderer0.example.com | "2020-08-31 20:52:04.600 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11da Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [dd6 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1038 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [f8f 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036395e0 principal matched by identity 0 +peer0.org2.example.com | [10de 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375ce20 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:04.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11db Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [dd7 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1039 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [f90 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 4c 7a d8 1b 8a 9f d6 1e 22 8b c1 41 b1 fb 53 |BLz......"..A..S| +peer0.org2.example.com | [10df 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375ce20 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:04.807 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11dc Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +peer0.org1.example.com | [dd8 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [103a 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 ad 8b c4 d9 af 7a da 60 9b 62 ca dc c4 20 cc 84 |.....z.`.b... ..| +peer0.org2.example.com | [10e0 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375ce20 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:04.808 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11dd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.3µs " +peer0.org1.example.com | [dd9 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [103b 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f91 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c f2 d8 98 c8 e6 fc b4 42 93 7a 69 |0D. L.......B.zi| +peer0.org2.example.com | [10e1 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 7b 55 40 22 53 fb bd b2 ea 57 b6 c3 68 bf 11 |.{U@"S....W..h..| +orderer0.example.com | "2020-08-31 20:52:04.978 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 11de Batch timer expired, creating block" channel=businesschannel node=1 +peer0.org1.example.com | [dda 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [103c 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 ed dc 18 ef 86 58 17 3f 0b 24 76 76 43 31 6d 31 |.....X.?.$vvC1m1| +peer0.org2.example.com | 00000010 b7 47 2f 6d 7f cd 9a 57 86 c2 3c 49 73 3d 5f d5 |.G/m...W.. INFO 11df Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 +peer0.org1.example.com | [ddb 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [103d 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 b2 78 3f 90 02 20 4c 0f f7 d5 18 88 4b 6e 68 65 |.x?.. L.....Knhe| +peer0.org2.example.com | [10e2 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 65 c2 3a e7 ad bd 89 c0 57 ec |0E.!..e.:.....W.| +orderer0.example.com | "2020-08-31 20:52:04.979 UTC [orderer.consensus.etcdraft] 2 -> DEBU 11e0 Proposed block [5] to raft consensus" channel=businesschannel node=1 +peer0.org1.example.com | [ddc 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [103e 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 8f 04 04 a6 57 ab a8 28 71 11 18 e8 49 6f 7a 82 |....W..(q...Ioz.| +peer0.org2.example.com | 00000010 3f 8c 8c db 68 8e 65 97 24 b6 db cb 05 11 40 b6 |?...h.e.$.....@.| +orderer0.example.com | "2020-08-31 20:52:04.981 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e1 Sending msg of 3108 bytes to 2 on channel businesschannel took 22.1µs" +peer1.org2.example.com | [103f 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ddd 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 bc 6c 6a d7 f4 92 |.lj...| +peer0.org2.example.com | 00000020 ac c0 db 55 9c 02 20 25 da 0e f6 bb 23 97 81 1d |...U.. %....#...| +orderer0.example.com | "2020-08-31 20:52:04.982 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e2 Sending msg of 3108 bytes to 3 on channel businesschannel took 18.6µs" +peer1.org2.example.com | [1040 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [dde 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f92 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036395e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000030 de 28 62 07 23 09 5e 9e b8 af 62 cc 86 15 b4 83 |.(b.#.^...b.....| +orderer0.example.com | "2020-08-31 20:52:04.982 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11e3 Send of ConsensusRequest for channel businesschannel with payload of size 3108 to orderer2.example.com(orderer2.example.com:7050) took 509.8µs " +peer1.org2.example.com | [1041 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ddf 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f93 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036395e0 gate 1598907080052871400 evaluation succeeds +peer0.org2.example.com | 00000040 4d e4 d5 c3 33 24 8f |M...3$.| +orderer0.example.com | "2020-08-31 20:52:04.982 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11e4 Send of ConsensusRequest for channel businesschannel with payload of size 3108 to orderer1.example.com(orderer1.example.com:7050) took 147.2µs " +peer1.org2.example.com | [1042 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [de0 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [f94 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [10e3 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375ce20 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:04.985 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11e5 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1043 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [de1 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f95 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [10e4 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375ce20 gate 1598907077312123100 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:04.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11e6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1044 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [de2 08-31 20:51:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org1.example.com | [f96 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [10e5 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:04.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e7 Sending msg of 28 bytes to 2 on channel businesschannel took 15.4µs" +peer1.org2.example.com | [1045 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [de3 08-31 20:51:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +peer1.org1.example.com | [f97 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [10e6 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:04.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e9 Sending msg of 28 bytes to 3 on channel businesschannel took 84.5µs" +peer1.org2.example.com | [1046 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [de4 08-31 20:51:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f98 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10e7 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:04.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 642.1µs " +peer1.org2.example.com | [1047 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [de5 08-31 20:51:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | [f99 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-08-31 20:52:04.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11eb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 227.6µs " +peer1.org2.example.com | [1048 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [de6 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f9a 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [10e8 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:04.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ec Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1049 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [de7 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [f9b 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [10e9 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:04.986 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 11e8 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 +peer1.org2.example.com | [104a 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [de8 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [f9c 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [10ea 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2020-08-31 20:52:04.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ed Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [104b 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [de9 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [f9d 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10eb 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:04.993 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 11ee [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +peer1.org2.example.com | [104c 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [dea 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 91 20 92 8e 48 a6 b6 19 57 df 95 3d 88 3d e5 |h. ..H...W..=.=.| +peer1.org1.example.com | [f9e 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10ec 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:04.994 UTC [msp] GetDefaultSigningIdentity -> DEBU 11ef Obtaining default signing identity" +peer1.org2.example.com | [104d 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 66 b4 0b 81 d5 85 0b e6 77 2d 0e b6 d4 68 63 44 |f.......w-...hcD| +peer1.org1.example.com | [f9f 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10ed 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:04.995 UTC [msp] GetDefaultSigningIdentity -> DEBU 11f0 Obtaining default signing identity" +peer1.org2.example.com | [104e 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [deb 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 c6 d4 3b 78 e3 47 4a 19 13 74 |0E.!....;x.GJ..t| +peer1.org1.example.com | [fa0 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10ee 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:04.996 UTC [msp.identity] Sign -> DEBU 11f1 Sign: plaintext: 0A020802120B0A090A03010203100418...59293EB35674F9F4F9A60E9D0E1DE7D5 " +peer1.org2.example.com | [104f 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 dd fe ae e6 cb b5 19 c9 92 3e e4 18 a0 b7 e7 5d |.........>.....]| +peer1.org1.example.com | [fa1 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10ef 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:04.996 UTC [msp.identity] Sign -> DEBU 11f2 Sign: digest: E04827E4D82BB30652C470A9E62BE4E0148D7E7558C64E89E94D5ABCC9BC396A " +peer1.org2.example.com | [1050 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000020 5d 0f 89 3e 4f 02 20 51 46 80 04 71 34 63 ef 88 |]..>O. QF..q4c..| +peer1.org1.example.com | [fa2 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10f0 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:05.011 UTC [fsblkstorage] indexBlock -> DEBU 11f3 Indexing block [blockNum=5, blockHash=[]byte{0xdc, 0x42, 0xca, 0x8d, 0x6b, 0x16, 0xf2, 0x93, 0x4, 0x29, 0x62, 0xf1, 0xe4, 0x9, 0xe8, 0xbf, 0x83, 0x51, 0xc9, 0xc7, 0x8b, 0xc4, 0x6, 0xa4, 0xd3, 0x7b, 0x3d, 0x42, 0xb5, 0xa5, 0x4, 0x73} txOffsets= +peer1.org2.example.com | [1051 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 94 e4 49 d8 a3 f7 16 c1 4d 18 80 30 f4 8e f8 ef |..I.....M..0....| +peer1.org1.example.com | [fa3 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10f1 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +orderer0.example.com | txId=ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b locPointer=offset=70, bytesLength=2980 +peer1.org2.example.com | [1052 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 3e da 85 85 b9 2a 3a |>....*:| +peer1.org1.example.com | [fa5 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10f2 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | ]" +peer1.org2.example.com | [1053 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [dec 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fa6 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10f3 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:05.012 UTC [fsblkstorage] updateCheckpoint -> DEBU 11f4 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97392], isChainEmpty=[false], lastBlockNumber=[5]" +peer1.org2.example.com | [1054 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ded 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [fa7 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [10f4 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:05.014 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 11f5 [channel: businesschannel] Wrote block [5]" +peer0.org1.example.com | [dee 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1055 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [fa8 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [10f5 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:05.014 UTC [fsblkstorage] waitForBlock -> DEBU 11f6 Came out of wait. maxAvailaBlockNumber=[5]" +peer0.org1.example.com | [def 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1056 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [fa4 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10f6 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:05.014 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11f7 Remaining bytes=[4011], Going to peek [8] bytes" +peer0.org1.example.com | [df0 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1057 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [fa9 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10f7 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:05.015 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11f8 Returning blockbytes - length=[4009], placementInfo={fileNum=[0], startOffset=[93381], bytesOffset=[93383]}" +peer0.org1.example.com | [df1 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1058 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [faa 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10f8 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:jp\254T\253]\2301T\370\357\002 [\300\331\017a\274Q\026u\231\013\230\325\340\351~TGG\016\221\302\3378\357u\207\351\2742\247U" > +orderer0.example.com | "2020-08-31 20:52:05.015 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11f9 blockbytes [4009] read from file [0]" +peer0.org1.example.com | [df2 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1059 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [fab 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10f9 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:05.015 UTC [common.deliver] deliverBlocks -> DEBU 11fa [channel: businesschannel] Delivering block [5] for (0xc000a09280) for 172.18.0.5:56650" +peer0.org1.example.com | [df3 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [105a 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [fac 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10fa 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:05.016 UTC [fsblkstorage] waitForBlock -> DEBU 11fb Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +peer0.org1.example.com | [df4 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [105b 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e1c00 gate 1598907080551073900 evaluation starts +peer1.org1.example.com | [fad 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10fb 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:05.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11fc Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +peer0.org1.example.com | [df5 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [105c 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e1c00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [fae 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [10fc 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:05.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11fe Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +peer0.org1.example.com | [df6 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [105d 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e1c00 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [faf 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10fd 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [df7 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:05.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.1µs " +peer1.org2.example.com | [105e 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e1c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [fb0 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [10fe 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [df8 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:05.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11fd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.1µs " +peer1.org2.example.com | [105f 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e1c00 principal evaluation fails +peer1.org1.example.com | [fb1 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [10ff 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [df9 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:05.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1200 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [fb2 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1100 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [dfa 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:05.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1201 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [fb3 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [dfb 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:05.307 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1202 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [fb4 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1060 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e1c00 gate 1598907080551073900 evaluation fails +peer0.org2.example.com | [1101 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [dfc 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:05.307 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1203 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +peer1.org1.example.com | [fb5 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1061 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1102 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [dfd 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:05.308 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1204 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 269.3µs " +peer1.org1.example.com | [fb6 08-31 20:51:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1062 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1103 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [dfe 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:05.599 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1205 Sending msg of 28 bytes to 3 on channel businesschannel took 39.7µs" +peer1.org1.example.com | [fb7 08-31 20:51:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D9816101D +peer1.org2.example.com | [1063 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1104 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:05.599 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1206 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +peer0.org1.example.com | [dff 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fb8 08-31 20:51:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 894D1DDDCA1CC9E4801251AA7AA4BB5D86B72255BE3DAB3A5E777B7E19ED3999 +peer1.org2.example.com | [1064 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c2170 gate 1598907080551363000 evaluation starts +peer0.org2.example.com | [1105 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:05.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1207 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.5µs " +peer0.org1.example.com | [e00 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [fb9 08-31 20:51:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1065 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c2170 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1106 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:05.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1208 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.7µs " +peer0.org1.example.com | [e01 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fba 08-31 20:51:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1066 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c2170 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1107 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:05.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1209 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e02 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fbb 08-31 20:51:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | [1067 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c2170 principal matched by identity 0 +peer0.org2.example.com | [1108 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:05.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e03 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fbc 08-31 20:51:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [1068 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 9f 1a a0 03 6c 05 e9 99 7d d1 3b 72 bf 81 09 |.....l...}.;r...| +peer0.org2.example.com | [1109 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:05.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [e04 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fbd 08-31 20:51:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 35 b9 62 8e 3c a3 9f 71 78 cb 17 fd 02 52 ef bb |5.b.<..qx....R..| +peer0.org2.example.com | [110a 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:05.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120c Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +peer0.org1.example.com | [e05 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fbe 08-31 20:51:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1069 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 5e ee 36 82 91 bb 81 3d 78 1c 0c |0D. h^.6....=x..| +peer0.org2.example.com | [110b 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:05.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 120d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.8µs " +peer0.org1.example.com | [e06 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fbf 08-31 20:51:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org2.example.com | 00000010 f2 9b 75 3b d5 44 c0 b6 2c 37 fb 34 e4 ec c3 41 |..u;.D..,7.4...A| +peer0.org2.example.com | [110c 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:06.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120e Sending msg of 28 bytes to 2 on channel businesschannel took 96.1µs" +peer0.org1.example.com | [e07 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fc0 08-31 20:51:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 67 88 75 a5 02 20 26 d9 d1 38 b0 36 97 15 5b fe |g.u.. &..8.6..[.| +peer0.org2.example.com | [110d 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:06.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120f Sending msg of 28 bytes to 3 on channel businesschannel took 34.1µs" +peer0.org1.example.com | [e08 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fc2 08-31 20:51:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | 00000030 db 92 b4 8d 5f c1 90 eb ff 7d 35 0a 92 68 b2 a8 |...._....}5..h..| +peer0.org2.example.com | [110e 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:52:06.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1210 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.2µs " +peer0.org1.example.com | [e09 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fc3 08-31 20:51:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 c2 22 3e 05 c7 e0 |.">...| +peer0.org2.example.com | [110f 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161019 +orderer0.example.com | "2020-08-31 20:52:06.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1211 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 131.6µs " +peer0.org1.example.com | [e0a 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fc5 08-31 20:51:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [106a 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c2170 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1110 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66A9F72CA0F6B339B4406070020D8DDBFAD7AE80299CCD1C4AE0657B8EC0CA13 +orderer0.example.com | "2020-08-31 20:52:06.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1212 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e0b 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [fc1 08-31 20:51:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [106b 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c2170 gate 1598907080551363000 evaluation succeeds +peer0.org2.example.com | [1111 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:52:06.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1213 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e0c 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [fc6 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [106c 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1112 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-08-31 20:52:06.305 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1214 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [e0d 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fc4 08-31 20:51:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [106d 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1113 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +orderer0.example.com | "2020-08-31 20:52:06.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1215 Sending msg of 28 bytes to 3 on channel testchainid took 8.3µs" +peer0.org1.example.com | [e0e 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [fc7 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [106e 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1114 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:06.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1216 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.2µs " +peer0.org1.example.com | [e0f 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [fc8 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [106f 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1115 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:06.596 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1217 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +peer0.org1.example.com | [e10 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [fc9 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1070 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1116 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:06.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1218 Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" +peer0.org1.example.com | [e11 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [fca 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1071 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1117 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:06.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1219 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.8µs " +peer0.org1.example.com | [e12 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [fcb 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1072 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1118 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:06.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 121a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 369.5µs " +peer0.org1.example.com | [e13 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [fcc 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1073 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1119 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:06.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 121b Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e14 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b11ce0 gate 1598907070479412600 evaluation starts +peer1.org1.example.com | [fcd 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1074 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [111a 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:06.600 UTC [orderer.common.cluster.step] handleMessage -> DEBU 121c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [e15 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b11ce0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [fce 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1075 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [111b 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" > > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:06.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 121d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [e16 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b11ce0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [fcf 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [111c 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1076 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:06.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 121e Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +peer0.org1.example.com | [e17 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b11ce0 principal matched by identity 0 +peer1.org1.example.com | [fd0 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [111d 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1077 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:06.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 121f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.4µs " +peer0.org1.example.com | [e18 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 95 5e 83 6c 57 7a f0 82 e6 4d 59 21 74 46 ca |..^.lWz...MY!tF.| +peer1.org1.example.com | [fd1 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [111e 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1078 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:07.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1220 Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +peer0.org1.example.com | 00000010 85 f7 1a 34 5a 8f 38 60 46 51 d8 a4 fe 6a 94 35 |...4Z.8`FQ...j.5| +peer1.org1.example.com | [fd2 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [111f 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1079 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:07.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1222 Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +peer1.org1.example.com | [fd3 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [e19 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 8c 8c 80 ad 9c 55 38 8c a4 b4 |0E.!.......U8...| +peer0.org2.example.com | [1120 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [107a 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:07.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1223 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [fd4 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 fd db 68 47 c5 5c a3 3a 2e 03 08 73 79 90 ff 63 |..hG.\.:...sy..c| +peer0.org2.example.com | [1121 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [107b 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:07.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1221 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 180.1µs " +peer1.org1.example.com | [fd5 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000020 37 58 62 04 e5 02 20 45 70 6e 12 cc a2 f7 ae 91 |7Xb... Epn......| +peer0.org2.example.com | [1122 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [107c 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fd6 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037034d0 gate 1598907080473760400 evaluation starts +peer1.org1.example.com | [fd7 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037034d0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:07.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1224 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.4µs " +orderer0.example.com | "2020-08-31 20:52:07.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1225 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:07.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1226 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [fd8 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037034d0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [fd9 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037034d0 principal matched by identity 0 +peer0.org1.example.com | 00000030 c4 e6 b4 9d b4 c8 5d 1a 07 90 5f fd 72 2d 3b d9 |......]..._.r-;.| +peer0.org2.example.com | [1123 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 a9 f7 2c a0 f6 b3 39 b4 40 60 70 02 0d 8d db |f..,...9.@`p....| +peer1.org2.example.com | [107d 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [fda 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 58 d4 ea 29 6a 97 0b 2d 01 c0 5f f5 74 8e f0 |.X..)j..-.._.t..| +peer0.org1.example.com | 00000040 db 49 3c 1c c6 f5 d4 |.I<....| +orderer0.example.com | "2020-08-31 20:52:07.307 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1227 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139µs " +peer0.org2.example.com | 00000010 fa d7 ae 80 29 9c cd 1c 4a e0 65 7b 8e c0 ca 13 |....)...J.e{....| +peer1.org2.example.com | [107e 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 0b 2f 60 7d 52 6e a7 2f 35 87 98 2f 22 2c 8b bb |./`}Rn./5../",..| +peer0.org1.example.com | [e1a 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b11ce0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:07.308 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1228 Sending msg of 28 bytes to 3 on channel testchainid took 218.9µs" +peer0.org2.example.com | [1124 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 5b cf fe d5 c5 4b c6 f2 a2 15 |0E.!..[....K....| +peer1.org2.example.com | [107f 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fdb 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 81 e4 aa 2b 18 37 8d c9 58 99 |0E.!.....+.7..X.| +peer0.org1.example.com | [e1b 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b11ce0 gate 1598907070479412600 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:07.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1229 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146µs " +peer0.org2.example.com | 00000010 6b a2 72 5b 8b 94 46 8a 0a 7b 9d 5d 6f 89 e7 bf |k.r[..F..{.]o...| +peer1.org2.example.com | [1080 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 d0 81 42 79 e1 e7 83 38 50 08 38 6a 45 ee 51 4a |..By...8P.8jE.QJ| +peer0.org1.example.com | [e1c 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:07.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 122a Sending msg of 28 bytes to 3 on channel businesschannel took 25.1µs" +peer0.org2.example.com | 00000020 8c cf 76 f6 7b 02 20 65 0e 52 94 55 59 f3 3e 78 |..v.{. e.R.UY.>x| +peer1.org2.example.com | [1081 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 39 53 9d 40 49 02 20 48 4e 0a db 1b 0a 41 f9 59 |9S.@I. HN....A.Y| +peer0.org1.example.com | [e1d 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:07.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 122b Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +peer0.org2.example.com | 00000030 26 ea 4a 41 5e 47 da 63 17 44 ed 6f 7d cc 6f 57 |&.JA^G.c.D.o}.oW| +peer1.org2.example.com | [1082 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1083 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 9e 40 7e 3e dc 7c b2 6c cc d6 c1 04 5e 21 32 67 |.@~>.|.l....^!2g| +orderer0.example.com | "2020-08-31 20:52:07.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 122c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.7µs " +peer0.org2.example.com | 00000040 f0 81 92 96 a6 e0 6b |......k| +peer1.org2.example.com | [1084 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 dc 23 a5 15 9d f8 2c |.#....,| +peer0.org1.example.com | [e1e 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:07.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 122d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:07.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 122e Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1125 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [1126 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 43 a3 60 45 de ef 30 e1 33 a8 e4 |0D. SC.`E..0.3..| +peer1.org1.example.com | [fdc 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037034d0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:07.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 122f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [1085 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 94 4a 81 76 02 0b 36 8f 17 c9 27 7c b6 5e ec d4 |.J.v..6...'|.^..| +peer1.org1.example.com | [fdd 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037034d0 gate 1598907080473760400 evaluation succeeds +peer0.org1.example.com | [e1f 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:07.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1230 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +peer1.org2.example.com | [1086 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 bc 46 f2 5c 02 20 5a d5 13 7d 92 33 98 83 63 60 |.F.\. Z..}.3..c`| +peer1.org1.example.com | [fde 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [e20 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:07.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1231 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.1µs " +peer1.org2.example.com | [1087 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 b4 04 ca e6 09 8e a5 9d 91 05 10 68 6f 61 00 eb |...........hoa..| +peer1.org1.example.com | [fdf 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [e21 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2020-08-31 20:52:08.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1232 Sending msg of 28 bytes to 2 on channel businesschannel took 51µs" +peer1.org2.example.com | [1088 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | 00000040 0f a8 13 4b 3b 81 |...K;.| +peer0.org1.example.com | [e22 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [fe0 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:08.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1234 Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +peer1.org2.example.com | [1089 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1127 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [e23 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [fe1 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:08.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1235 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [108a 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1128 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [e24 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [fe2 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:08.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1233 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 184.2µs " +peer1.org2.example.com | [108b 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1129 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e25 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fe3 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2020-08-31 20:52:08.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1236 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.4µs " +peer1.org2.example.com | [108c 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [112a 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e26 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fe4 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:08.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1237 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [108d 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [112b 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [e27 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [fe5 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:08.305 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1238 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [108e 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [112c 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e28 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fe6 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:08.305 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1239 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +peer1.org2.example.com | [108f 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [112d 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [e29 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fe7 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:08.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 123a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50µs " +peer1.org2.example.com | [1090 08-31 20:51:20.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [112e 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [e2a 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fe8 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.479 UTC [orderer.common.server] Deliver -> DEBU 123b Starting new Deliver handler" +peer1.org2.example.com | [1091 08-31 20:51:20.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [112f 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e2b 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fe9 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.479 UTC [common.deliver] Handle -> DEBU 123c Starting new deliver loop for 172.18.0.9:50942" +peer1.org2.example.com | [1092 08-31 20:51:20.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [1130 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [e2c 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fea 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.480 UTC [common.deliver] Handle -> DEBU 123d Attempting to read seek info message from 172.18.0.9:50942" +peer1.org2.example.com | [1094 08-31 20:51:20.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1131 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [e2d 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [feb 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:08.481 UTC [policies] Evaluate -> DEBU 123e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | [1093 08-31 20:51:20.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1132 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [e2e 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fec 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.481 UTC [policies] Evaluate -> DEBU 123f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1096 08-31 20:51:20.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1133 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [e2f 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [fed 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.481 UTC [policies] Evaluate -> DEBU 1240 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org2.example.com | [1097 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1134 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [e30 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [fee 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:08.482 UTC [policies] Evaluate -> DEBU 1241 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1098 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1135 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [e31 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [fef 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.482 UTC [policies] Evaluate -> DEBU 1242 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org2.example.com | [1095 08-31 20:51:20.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [1136 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c0990 gate 1598907077481566300 evaluation starts +peer0.org1.example.com | [e32 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ff0 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.482 UTC [msp] DeserializeIdentity -> DEBU 1243 Obtaining identity" +peer1.org2.example.com | [1099 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1137 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c0990 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [e33 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ff1 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.482 UTC [msp.identity] newIdentity -> DEBU 1244 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [109a 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1138 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c0990 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [e34 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ff2 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | [109b 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1139 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c0990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [e35 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ff3 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [109c 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [113a 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c0990 principal evaluation fails +peer0.org1.example.com | [e36 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ff4 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | [113b 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c0990 gate 1598907077481566300 evaluation fails +peer1.org2.example.com | [109d 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [e37 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ff5 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +peer0.org2.example.com | [113c 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [109e 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e38 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ff6 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | [113d 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [109f 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [e39 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [ff7 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +peer0.org2.example.com | [113e 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [10a0 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [e3a 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ff8 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +peer0.org2.example.com | [113f 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c0f10 gate 1598907077481942700 evaluation starts +peer1.org2.example.com | [10a1 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [e3b 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org1.example.com | [ff9 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +peer0.org2.example.com | [1140 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c0f10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [10a2 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [e3c 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [ffa 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +peer0.org2.example.com | [1141 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c0f10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [10a3 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [ffb 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [e3d 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | 0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +peer0.org2.example.com | [1142 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c0f10 principal matched by identity 0 +peer1.org2.example.com | [10a4 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [ffc 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e3e 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P +peer0.org2.example.com | [1143 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 7b 55 40 22 53 fb bd b2 ea 57 b6 c3 68 bf 11 |.{U@"S....W..h..| +peer1.org2.example.com | [10a5 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [ffd 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [e3f 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | +8n2/IwosEtn+wHpdsRI +peer0.org2.example.com | 00000010 b7 47 2f 6d 7f cd 9a 57 86 c2 3c 49 73 3d 5f d5 |.G/m...W.. DEBU Exiting +peer1.org1.example.com | [ffe 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e40 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org2.example.com | [10a7 08-31 20:51:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1144 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 65 c2 3a e7 ad bd 89 c0 57 ec |0E.!..e.:.....W.| +peer1.org1.example.com | [fff 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [e41 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.483 UTC [cauthdsl] func1 -> DEBU 1245 0xc00124ef90 gate 1598907128483673300 evaluation starts" +peer1.org2.example.com | [10a8 08-31 20:51:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D9816101D +peer0.org2.example.com | 00000010 3f 8c 8c db 68 8e 65 97 24 b6 db cb 05 11 40 b6 |?...h.e.$.....@.| +peer1.org1.example.com | [1000 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e42 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:52:08.483 UTC [cauthdsl] func2 -> DEBU 1246 0xc00124ef90 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [10a9 08-31 20:51:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DFDEA9436543256AA9BB7039024AC3D191A5F0A4DB56E575FEAFC32E3AB69E72 +peer0.org2.example.com | 00000020 ac c0 db 55 9c 02 20 25 da 0e f6 bb 23 97 81 1d |...U.. %....#...| +peer1.org1.example.com | [1001 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e43 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161015 +orderer0.example.com | "2020-08-31 20:52:08.484 UTC [cauthdsl] func2 -> DEBU 1247 0xc00124ef90 processing identity 0 with bytes of fe10e0" +peer1.org2.example.com | [10aa 08-31 20:51:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | 00000030 de 28 62 07 23 09 5e 9e b8 af 62 cc 86 15 b4 83 |.(b.#.^...b.....| +peer0.org1.example.com | [e44 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 05BAFE89F027887E5B8E762A4DCD4FCC8ED6A9E0D0F15737F2B5E08AEE5D9BC6 +peer1.org1.example.com | [1002 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:08.484 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1248 Checking if identity satisfies MEMBER role for OrdererMSP" +peer1.org2.example.com | [10ab 08-31 20:51:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | 00000040 4d e4 d5 c3 33 24 8f |M...3$.| +peer0.org1.example.com | [e45 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1003 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.484 UTC [msp] Validate -> DEBU 1249 MSP OrdererMSP validating identity" +peer1.org2.example.com | [10ac 08-31 20:51:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | [1145 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c0f10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [e46 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1004 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:08.485 UTC [msp] getCertificationChain -> DEBU 124a MSP OrdererMSP getting certification chain" +peer1.org2.example.com | [10ad 08-31 20:51:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1146 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c0f10 gate 1598907077481942700 evaluation succeeds +peer0.org1.example.com | [e47 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [1005 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-08-31 20:52:08.485 UTC [cauthdsl] func2 -> DEBU 124b 0xc00124ef90 principal matched by identity 0" +peer1.org2.example.com | [10ae 08-31 20:51:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1147 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [e48 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [1006 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 9f 1a a0 03 6c 05 e9 99 7d d1 3b 72 bf 81 09 |.....l...}.;r...| +peer1.org2.example.com | [10af 08-31 20:51:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:08.485 UTC [msp.identity] Verify -> DEBU 124c Verify: digest = 00000000 41 a1 40 ee 52 68 80 4d 76 92 c7 9f d0 ab 88 f7 |A.@.Rh.Mv.......| +peer0.org2.example.com | [1148 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [e49 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 35 b9 62 8e 3c a3 9f 71 78 cb 17 fd 02 52 ef bb |5.b.<..qx....R..| +peer1.org2.example.com | [10b0 08-31 20:51:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | 00000010 a8 72 1f d3 d2 9f 18 4f 5b 69 fd 0b 95 97 cd a1 |.r.....O[i......|" +peer0.org2.example.com | [1149 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [e4a 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1007 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 5e ee 36 82 91 bb 81 3d 78 1c 0c |0D. h^.6....=x..| +peer1.org2.example.com | [10b1 08-31 20:51:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.486 UTC [msp.identity] Verify -> DEBU 124d Verify: sig = 00000000 30 45 02 21 00 cd 87 6d 59 c6 07 2a 96 d3 6d eb |0E.!...mY..*..m.| +peer0.org2.example.com | [114a 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [e4b 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 f2 9b 75 3b d5 44 c0 b6 2c 37 fb 34 e4 ec c3 41 |..u;.D..,7.4...A| +peer1.org2.example.com | [10b2 08-31 20:51:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000010 43 03 20 e7 b0 a6 7b 14 90 df 7a 5a 61 fa 55 81 |C. ...{...zZa.U.| +peer0.org2.example.com | [114b 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [e4c 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | 00000020 67 88 75 a5 02 20 26 d9 d1 38 b0 36 97 15 5b fe |g.u.. &..8.6..[.| +orderer0.example.com | 00000020 3e 06 12 51 a1 02 20 1e e2 e9 aa 22 d1 7b 34 0e |>..Q.. ....".{4.| +peer1.org2.example.com | [10b3 08-31 20:51:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [114c 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [e4d 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | 00000030 db 92 b4 8d 5f c1 90 eb ff 7d 35 0a 92 68 b2 a8 |...._....}5..h..| +orderer0.example.com | 00000030 0d 07 53 a5 f1 45 05 1d 22 e4 a3 5f 0d dc 27 4c |..S..E..".._..'L| +peer1.org2.example.com | [10b4 08-31 20:51:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [114d 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e4e 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 c2 22 3e 05 c7 e0 |.">...| +orderer0.example.com | 00000040 a7 97 62 ef db e6 db |..b....|" +peer1.org2.example.com | [10b5 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [114e 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [e4f 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1008 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:08.486 UTC [cauthdsl] func2 -> DEBU 124e 0xc00124ef90 principal evaluation succeeds for identity 0" +peer1.org2.example.com | [10b6 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [114f 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 a9 f7 2c a0 f6 b3 39 b4 40 60 70 02 0d 8d db |f..,...9.@`p....| +peer0.org1.example.com | [e50 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1009 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-08-31 20:52:08.486 UTC [cauthdsl] func1 -> DEBU 124f 0xc00124ef90 gate 1598907128483673300 evaluation succeeds" +peer1.org2.example.com | [10b7 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 fa d7 ae 80 29 9c cd 1c 4a e0 65 7b 8e c0 ca 13 |....)...J.e{....| +peer0.org1.example.com | [e52 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [100a 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:08.487 UTC [policies] Evaluate -> DEBU 1250 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [10b8 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1150 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 5b cf fe d5 c5 4b c6 f2 a2 15 |0E.!..[....K....| +peer0.org1.example.com | [e51 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [100b 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:08.487 UTC [policies] Evaluate -> DEBU 1251 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [10b9 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 6b a2 72 5b 8b 94 46 8a 0a 7b 9d 5d 6f 89 e7 bf |k.r[..F..{.]o...| +peer0.org1.example.com | [e53 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [100c 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:08.488 UTC [policies] Evaluate -> DEBU 1252 Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org2.example.com | [10ba 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10bb 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [10bc 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | 00000020 8c cf 76 f6 7b 02 20 65 0e 52 94 55 59 f3 3e 78 |..v.{. e.R.UY.>x| +orderer0.example.com | "2020-08-31 20:52:08.488 UTC [policies] Evaluate -> DEBU 1253 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org2.example.com | [10bd 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df de a9 43 65 43 25 6a a9 bb 70 39 02 4a c3 d1 |...CeC%j..p9.J..| +peer0.org2.example.com | 00000030 26 ea 4a 41 5e 47 da 63 17 44 ed 6f 7d cc 6f 57 |&.JA^G.c.D.o}.oW| +peer0.org1.example.com | [e54 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [100d 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.488 UTC [policies] Evaluate -> DEBU 1254 Signature set satisfies policy /Channel/Readers" +peer1.org2.example.com | 00000010 91 a5 f0 a4 db 56 e5 75 fe af c3 2e 3a b6 9e 72 |.....V.u....:..r| +peer0.org2.example.com | 00000040 f0 81 92 96 a6 e0 6b |......k| +peer0.org1.example.com | [e55 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [100e 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.489 UTC [policies] Evaluate -> DEBU 1255 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org2.example.com | [10be 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 a3 4c 3c b8 49 5b c9 1f 66 87 44 |0D. R.L<.I[..f.D| +peer0.org2.example.com | [1151 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [e56 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [100f 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.489 UTC [common.deliver] deliverBlocks -> DEBU 1256 [channel: businesschannel] Received seekInfo (0xc0011f2fc0) start: > stop: > from 172.18.0.9:50942" +peer1.org2.example.com | 00000010 c0 f8 5c 9d 06 ba d4 5e cc ac 06 f6 41 41 44 00 |..\....^....AAD.| +peer0.org2.example.com | [1152 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [e57 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1010 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:08.489 UTC [fsblkstorage] Next -> DEBU 1257 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +peer1.org2.example.com | 00000020 58 b4 5d ed 02 20 38 4f fb 61 35 b5 8a 69 7d 8a |X.].. 8O.a5..i}.| +peer0.org2.example.com | [1153 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e58 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1011 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:08.490 UTC [fsblkstorage] newBlockfileStream -> DEBU 1258 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93381]" +peer1.org2.example.com | 00000030 c1 4e 97 95 22 c4 50 ea f5 c9 87 09 42 66 f8 90 |.N..".P.....Bf..| +peer0.org2.example.com | [1154 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [e59 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1012 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.490 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1259 Remaining bytes=[4011], Going to peek [8] bytes" +peer1.org2.example.com | 00000040 06 15 8a 5e 70 be |...^p.| +peer0.org2.example.com | [1155 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 4f 62 6e f8 51 b2 b9 7a 89 a1 94 93 43 19 a1 |tObn.Q..z....C..| +peer0.org1.example.com | [e5a 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1013 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:08.490 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 125a Returning blockbytes - length=[4009], placementInfo={fileNum=[0], startOffset=[93381], bytesOffset=[93383]}" +peer1.org2.example.com | [10bf 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 e1 30 a3 49 45 27 56 4c 01 81 42 14 62 f0 c4 bf |.0.IE'VL..B.b...| +peer0.org1.example.com | [e5b 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1014 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.490 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 125b blockbytes [4009] read from file [0]" +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [1156 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 4c 56 6b dd 24 ae 93 da c4 0d |0E.!..LVk.$.....| +peer0.org1.example.com | [e5c 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1015 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.491 UTC [common.deliver] deliverBlocks -> DEBU 125c [channel: businesschannel] Delivering block [5] for (0xc0011f2fc0) for 172.18.0.9:50942" +peer1.org2.example.com | [10c0 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 66 79 b3 0b 51 1b 53 00 cc 27 |0E.!..fy..Q.S..'| +peer0.org2.example.com | 00000010 34 59 24 07 9d eb 5d d4 90 ae 99 d7 00 49 bd 50 |4Y$...]......I.P| +peer0.org1.example.com | [e5d 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1016 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.491 UTC [common.deliver] deliverBlocks -> DEBU 125d [channel: businesschannel] Done delivering to 172.18.0.9:50942 for (0xc0011f2fc0)" +peer1.org2.example.com | 00000010 84 b9 79 14 6f f0 a8 42 46 77 25 9e d4 1e 17 a9 |..y.o..BFw%.....| +peer0.org2.example.com | 00000020 97 b1 3a eb 68 02 20 7c b3 d6 f6 1c cf 91 b2 30 |..:.h. |.......0| +peer0.org1.example.com | [e5e 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1017 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.491 UTC [common.deliver] Handle -> DEBU 125e Waiting for new SeekInfo from 172.18.0.9:50942" +peer1.org2.example.com | 00000020 64 b6 71 89 30 02 20 57 48 fb b0 4c 2f 4b bc 32 |d.q.0. WH..L/K.2| +peer0.org2.example.com | 00000030 b2 77 db bc bc 9f b5 b7 b2 42 30 82 2e d9 85 95 |.w.......B0.....| +peer0.org1.example.com | [e5f 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [1018 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:08.491 UTC [fsblkstorage] waitForBlock -> DEBU 125f Came out of wait. maxAvailaBlockNumber=[5]" +peer1.org2.example.com | 00000030 06 1b b6 aa 5b 87 b7 a9 92 53 32 f4 83 f6 22 b3 |....[....S2...".| +peer0.org2.example.com | 00000040 b9 ce 81 9e 49 97 68 |....I.h| +peer0.org1.example.com | [e60 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1019 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.492 UTC [fsblkstorage] waitForBlock -> DEBU 1260 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +peer1.org2.example.com | 00000040 e4 24 fd 5c 21 9d 4f |.$.\!.O| +peer0.org2.example.com | [1157 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [e61 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [101a 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:08.492 UTC [common.deliver] Handle -> DEBU 1261 Attempting to read seek info message from 172.18.0.9:50942" +peer1.org2.example.com | [10c1 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1158 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [101b 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e62 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:08.497 UTC [grpc] warningf -> DEBU 1262 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:50942: read: connection reset by peer" +peer1.org2.example.com | [10c2 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1159 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [101c 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e63 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.497 UTC [common.deliver] Handle -> WARN 1263 Error reading from 172.18.0.9:50942: rpc error: code = Canceled desc = context canceled" +peer1.org2.example.com | [10c3 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [115a 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [101d 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e64 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:08.497 UTC [orderer.common.server] func1 -> DEBU 1264 Closing Deliver stream" +peer1.org2.example.com | [10c4 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [115b 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [101e 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e65 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-08-31 20:52:08.498 UTC [comm.grpc.server] 1 -> INFO 1265 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50942 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.0261ms +peer1.org2.example.com | [10c5 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [115c 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [101f 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e66 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.499 UTC [grpc] infof -> DEBU 1266 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org2.example.com | [10c6 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [115d 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 a9 f7 2c a0 f6 b3 39 b4 40 60 70 02 0d 8d db |f..,...9.@`p....| +peer1.org1.example.com | [1020 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e67 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:08.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1267 Sending msg of 28 bytes to 2 on channel businesschannel took 121.8µs" +peer1.org2.example.com | [10c7 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 fa d7 ae 80 29 9c cd 1c 4a e0 65 7b 8e c0 ca 13 |....)...J.e{....| +peer1.org1.example.com | [1021 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e68 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:08.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1269 Sending msg of 28 bytes to 3 on channel businesschannel took 18.5µs" +peer1.org2.example.com | [10c8 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [115e 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 5b cf fe d5 c5 4b c6 f2 a2 15 |0E.!..[....K....| +peer1.org1.example.com | [1022 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e69 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:08.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1268 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 198.8µs " +peer1.org2.example.com | [10c9 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df de a9 43 65 43 25 6a a9 bb 70 39 02 4a c3 d1 |...CeC%j..p9.J..| +peer0.org2.example.com | 00000010 6b a2 72 5b 8b 94 46 8a 0a 7b 9d 5d 6f 89 e7 bf |k.r[..F..{.]o...| +peer1.org1.example.com | [1023 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [e6a 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:08.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 126a Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | 00000010 91 a5 f0 a4 db 56 e5 75 fe af c3 2e 3a b6 9e 72 |.....V.u....:..r| +peer0.org2.example.com | 00000020 8c cf 76 f6 7b 02 20 65 0e 52 94 55 59 f3 3e 78 |..v.{. e.R.UY.>x| +peer1.org1.example.com | [1024 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [e6b 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:08.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 126b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0569ms " +peer0.org2.example.com | 00000030 26 ea 4a 41 5e 47 da 63 17 44 ed 6f 7d cc 6f 57 |&.JA^G.c.D.o}.oW| +peer1.org2.example.com | [10ca 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 a3 4c 3c b8 49 5b c9 1f 66 87 44 |0D. R.L<.I[..f.D| +peer1.org1.example.com | [1025 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e6c 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:08.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 126c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000040 f0 81 92 96 a6 e0 6b |......k| +peer1.org2.example.com | 00000010 c0 f8 5c 9d 06 ba d4 5e cc ac 06 f6 41 41 44 00 |..\....^....AAD.| +peer1.org1.example.com | [1026 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e6d 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be2b50 gate 1598907073030229100 evaluation starts +orderer0.example.com | "2020-08-31 20:52:08.701 UTC [orderer.common.server] Deliver -> DEBU 126d Starting new Deliver handler" +peer0.org2.example.com | [115f 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 58 b4 5d ed 02 20 38 4f fb 61 35 b5 8a 69 7d 8a |X.].. 8O.a5..i}.| +peer1.org1.example.com | [1027 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e6e 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be2b50 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:08.701 UTC [common.deliver] Handle -> DEBU 126e Starting new deliver loop for 172.18.0.9:50944" +peer0.org2.example.com | [1160 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000030 c1 4e 97 95 22 c4 50 ea f5 c9 87 09 42 66 f8 90 |.N..".P.....Bf..| +peer1.org1.example.com | [1028 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e6f 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be2b50 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:08.702 UTC [common.deliver] Handle -> DEBU 126f Attempting to read seek info message from 172.18.0.9:50944" +peer0.org2.example.com | [1161 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 06 15 8a 5e 70 be |...^p.| +peer1.org1.example.com | [1029 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e70 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be2b50 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:08.704 UTC [policies] Evaluate -> DEBU 1270 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org2.example.com | [1162 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [10cb 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [102a 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e71 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 62 52 2f a0 7a a2 5f f5 b0 4e 19 86 d1 11 1b |.bR/.z._..N.....| +orderer0.example.com | "2020-08-31 20:52:08.704 UTC [policies] Evaluate -> DEBU 1271 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [1163 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 4f 62 6e f8 51 b2 b9 7a 89 a1 94 93 43 19 a1 |tObn.Q..z....C..| +peer1.org2.example.com | [10cc 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [102b 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | 00000010 46 16 b9 bb 1a 0a 30 86 a8 1a 6d fd a4 fd 6c 81 |F.....0...m...l.| +orderer0.example.com | "2020-08-31 20:52:08.705 UTC [policies] Evaluate -> DEBU 1272 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org2.example.com | 00000010 e1 30 a3 49 45 27 56 4c 01 81 42 14 62 f0 c4 bf |.0.IE'VL..B.b...| +peer1.org2.example.com | [10cd 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [102c 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e72 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 f4 4b d8 b1 26 7a 12 19 fc 48 0f |0D. ".K..&z...H.| +orderer0.example.com | "2020-08-31 20:52:08.705 UTC [policies] Evaluate -> DEBU 1273 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [1164 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 4c 56 6b dd 24 ae 93 da c4 0d |0E.!..LVk.$.....| +peer1.org2.example.com | [10ce 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [102d 08-31 20:51:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 23 96 b6 1c b0 4a 29 77 64 3c 44 db 5e d8 f8 29 |#....J)wd DEBU 1274 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org2.example.com | 00000010 34 59 24 07 9d eb 5d d4 90 ae 99 d7 00 49 bd 50 |4Y$...]......I.P| +peer1.org2.example.com | [10cf 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [102e 08-31 20:51:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 5a 83 67 be 02 20 3d d4 ec 36 6c 44 09 2b bd e6 |Z.g.. =..6lD.+..| +orderer0.example.com | "2020-08-31 20:52:08.706 UTC [cauthdsl] func1 -> DEBU 1275 0xc001291610 gate 1598907128706724800 evaluation starts" +peer0.org2.example.com | 00000020 97 b1 3a eb 68 02 20 7c b3 d6 f6 1c cf 91 b2 30 |..:.h. |.......0| +peer1.org2.example.com | [10d0 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [102f 08-31 20:51:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 ee 08 f2 fa f8 be fa ca ba 5b d3 18 d6 d8 c4 9f |.........[......| +orderer0.example.com | "2020-08-31 20:52:08.707 UTC [cauthdsl] func2 -> DEBU 1276 0xc001291610 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | 00000030 b2 77 db bc bc 9f b5 b7 b2 42 30 82 2e d9 85 95 |.w.......B0.....| +peer1.org2.example.com | [10d1 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1030 08-31 20:51:21.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | 00000040 67 f2 8b 69 99 24 |g..i.$| +orderer0.example.com | "2020-08-31 20:52:08.707 UTC [cauthdsl] func2 -> DEBU 1277 0xc001291610 processing identity 0 with bytes of fe10e0" +peer0.org2.example.com | 00000040 b9 ce 81 9e 49 97 68 |....I.h| +peer1.org2.example.com | [10d2 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1031 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [e73 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be2b50 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:08.707 UTC [cauthdsl] func2 -> DEBU 1278 0xc001291610 principal matched by identity 0" +peer0.org2.example.com | [1165 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [10d3 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1032 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [e74 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be2b50 gate 1598907073030229100 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:08.707 UTC [msp.identity] Verify -> DEBU 1279 Verify: digest = 00000000 6a f5 5a f3 f6 22 99 1b f6 3d ed 7a 98 77 53 91 |j.Z.."...=.z.wS.| +peer0.org2.example.com | [1166 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10d4 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df de a9 43 65 43 25 6a a9 bb 70 39 02 4a c3 d1 |...CeC%j..p9.J..| +peer1.org1.example.com | [1033 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [e75 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | 00000010 1a 7f 01 f2 cb 0b 12 f8 5f 88 68 71 e8 f3 86 9c |........_.hq....|" +peer0.org2.example.com | [1167 08-31 20:51:17.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 91 a5 f0 a4 db 56 e5 75 fe af c3 2e 3a b6 9e 72 |.....V.u....:..r| +peer1.org1.example.com | [1034 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [e76 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:08.708 UTC [msp.identity] Verify -> DEBU 127a Verify: sig = 00000000 30 44 02 20 45 20 89 10 b5 73 88 93 c3 fa 7e 39 |0D. E ...s....~9| +peer0.org2.example.com | [1168 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [10d5 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 a3 4c 3c b8 49 5b c9 1f 66 87 44 |0D. R.L<.I[..f.D| +peer1.org1.example.com | [1035 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [e77 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | 00000010 38 de 1c 59 ed b7 05 eb d4 2a f0 4e 8d c0 57 35 |8..Y.....*.N..W5| +peer0.org2.example.com | [1169 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 c0 f8 5c 9d 06 ba d4 5e cc ac 06 f6 41 41 44 00 |..\....^....AAD.| +peer1.org1.example.com | [1036 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [e78 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | 00000020 54 b5 14 bb 02 20 04 2d 16 60 45 fb eb fc 9d f1 |T.... .-.`E.....| +peer0.org2.example.com | [116a 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 58 b4 5d ed 02 20 38 4f fb 61 35 b5 8a 69 7d 8a |X.].. 8O.a5..i}.| +peer0.org1.example.com | [e79 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1037 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | 00000030 a5 c1 fe ab 10 f7 45 1e 1a 5f b7 df 12 4f 81 ab |......E.._...O..| +peer0.org2.example.com | [116b 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 c1 4e 97 95 22 c4 50 ea f5 c9 87 09 42 66 f8 90 |.N..".P.....Bf..| +peer0.org1.example.com | [e7a 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1038 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003763370 gate 1598907081031517800 evaluation starts +orderer0.example.com | 00000040 75 c5 e2 70 13 f8 |u..p..|" +peer0.org2.example.com | [116c 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 06 15 8a 5e 70 be |...^p.| +peer1.org1.example.com | [1039 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003763370 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [e7b 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:08.709 UTC [cauthdsl] func2 -> DEBU 127b 0xc001291610 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [116d 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10d6 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [103a 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003763370 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [e7c 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:08.709 UTC [cauthdsl] func1 -> DEBU 127c 0xc001291610 gate 1598907128706724800 evaluation succeeds" +peer0.org2.example.com | [116e 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10d7 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [103b 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003763370 principal matched by identity 0 +peer0.org1.example.com | [e7d 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:08.709 UTC [policies] Evaluate -> DEBU 127d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [116f 08-31 20:51:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10d8 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [103c 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df de a9 43 65 43 25 6a a9 bb 70 39 02 4a c3 d1 |...CeC%j..p9.J..| +peer0.org1.example.com | [e7e 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.709 UTC [policies] Evaluate -> DEBU 127e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [1170 08-31 20:51:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [10d9 08-31 20:51:21.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 91 a5 f0 a4 db 56 e5 75 fe af c3 2e 3a b6 9e 72 |.....V.u....:..r| +peer0.org1.example.com | [e7f 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.710 UTC [policies] Evaluate -> DEBU 127f Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org2.example.com | [1171 08-31 20:51:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10da 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [103d 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 a3 4c 3c b8 49 5b c9 1f 66 87 44 |0D. R.L<.I[..f.D| +peer0.org1.example.com | [e80 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.710 UTC [policies] Evaluate -> DEBU 1280 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org2.example.com | [1172 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [10db 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 c0 f8 5c 9d 06 ba d4 5e cc ac 06 f6 41 41 44 00 |..\....^....AAD.| +peer0.org1.example.com | [e81 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +orderer0.example.com | "2020-08-31 20:52:08.710 UTC [policies] Evaluate -> DEBU 1281 Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | [1173 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [10dc 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 58 b4 5d ed 02 20 38 4f fb 61 35 b5 8a 69 7d 8a |X.].. 8O.a5..i}.| +peer0.org1.example.com | [e82 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.710 UTC [policies] Evaluate -> DEBU 1282 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [1174 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [10dd 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 c1 4e 97 95 22 c4 50 ea f5 c9 87 09 42 66 f8 90 |.N..".P.....Bf..| +peer0.org1.example.com | [e83 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.711 UTC [common.deliver] deliverBlocks -> DEBU 1283 [channel: businesschannel] Received seekInfo (0xc0011fe980) start: > stop: > from 172.18.0.9:50944" +peer0.org2.example.com | [1175 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [10de 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 06 15 8a 5e 70 be |...^p.| +peer0.org1.example.com | [e84 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.711 UTC [fsblkstorage] Next -> DEBU 1284 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +peer0.org2.example.com | [1176 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [10df 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [103e 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003763370 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [e85 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:08.711 UTC [fsblkstorage] newBlockfileStream -> DEBU 1285 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93381]" +peer0.org2.example.com | [1177 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [10e0 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [103f 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003763370 gate 1598907081031517800 evaluation succeeds +peer0.org1.example.com | [e86 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:08.713 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1286 Remaining bytes=[4011], Going to peek [8] bytes" +peer1.org2.example.com | [10e1 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1178 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1040 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [e87 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.713 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1287 Returning blockbytes - length=[4009], placementInfo={fileNum=[0], startOffset=[93381], bytesOffset=[93383]}" +peer1.org2.example.com | [10e2 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1179 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1041 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [e88 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\344\030\240\267\347]]\017\211>O\002 QF\200\004q4c\357\210\224\344I\330\243\367\026\301M\030\2000\364\216\370\357>\332\205\205\271*:" > alive: alive: +orderer0.example.com | "2020-08-31 20:52:08.714 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1288 blockbytes [4009] read from file [0]" +peer1.org2.example.com | [10e3 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [117a 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1042 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [e89 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:08.715 UTC [common.deliver] deliverBlocks -> DEBU 1289 [channel: businesschannel] Delivering block [5] for (0xc0011fe980) for 172.18.0.9:50944" +peer1.org2.example.com | [10e4 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [117b 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1043 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [e8a 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:08.715 UTC [common.deliver] deliverBlocks -> DEBU 128a [channel: businesschannel] Done delivering to 172.18.0.9:50944 for (0xc0011fe980)" +peer1.org2.example.com | [10e5 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [117c 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1044 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [e8b 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +orderer0.example.com | "2020-08-31 20:52:08.716 UTC [common.deliver] Handle -> DEBU 128b Waiting for new SeekInfo from 172.18.0.9:50944" +peer1.org2.example.com | [10e6 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [117d 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380e190 gate 1598907077557449900 evaluation starts +peer1.org1.example.com | [1045 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [e8c 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.716 UTC [common.deliver] Handle -> DEBU 128c Attempting to read seek info message from 172.18.0.9:50944" +peer1.org2.example.com | [10e7 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [117e 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380e190 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1046 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [e8d 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:08.717 UTC [fsblkstorage] waitForBlock -> DEBU 128d Came out of wait. maxAvailaBlockNumber=[5]" +peer1.org2.example.com | [10e8 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [117f 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380e190 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1047 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [e8e 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.717 UTC [fsblkstorage] waitForBlock -> DEBU 128e Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +peer0.org2.example.com | [1180 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380e190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [10e9 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1048 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [e8f 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:08.720 UTC [policies] Evaluate -> DEBU 128f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org2.example.com | [1181 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380e190 principal evaluation fails +peer1.org2.example.com | [10ea 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1049 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e90 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:52:08.720 UTC [policies] Evaluate -> DEBU 1290 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [1182 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380e190 gate 1598907077557449900 evaluation fails +peer1.org2.example.com | [10eb 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [104a 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e91 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 d9 6b 09 8c aa 7e bd ab 1a a7 55 c5 2b 89 51 |3.k...~....U.+.Q| +orderer0.example.com | "2020-08-31 20:52:08.720 UTC [policies] Evaluate -> DEBU 1291 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org2.example.com | [1183 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [10ec 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [104b 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 7e 5f 9c 3d 57 20 a0 1a 04 81 ec 7e b2 8a 7b b9 |~_.=W .....~..{.| +orderer0.example.com | "2020-08-31 20:52:08.720 UTC [policies] Evaluate -> DEBU 1292 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [1184 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [10ed 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [104c 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [e92 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 e2 5d 94 fc ae 8f 76 e8 23 1c b9 |0D. y.]....v.#..| +orderer0.example.com | "2020-08-31 20:52:08.721 UTC [policies] Evaluate -> DEBU 1293 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org2.example.com | [1185 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [10ee 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [104d 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 d9 60 be 1f 03 e6 e7 c3 47 91 9b 77 b9 3b df cb |.`......G..w.;..| +orderer0.example.com | "2020-08-31 20:52:08.721 UTC [cauthdsl] func1 -> DEBU 1294 0xc000d8ea90 gate 1598907128721467900 evaluation starts" +peer0.org2.example.com | [1186 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380e700 gate 1598907077557919800 evaluation starts +peer1.org2.example.com | [10ef 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [104e 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 7d a7 69 90 02 20 2e 72 62 ff 22 9f 3d dd 2e 9c |}.i.. .rb.".=...| +orderer0.example.com | "2020-08-31 20:52:08.721 UTC [cauthdsl] func2 -> DEBU 1295 0xc000d8ea90 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [1187 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380e700 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [10f0 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [104f 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 d9 97 80 77 23 79 e2 32 f9 1f 00 1c 06 55 fb ac |...w#y.2.....U..| +orderer0.example.com | "2020-08-31 20:52:08.721 UTC [cauthdsl] func2 -> DEBU 1296 0xc000d8ea90 processing identity 0 with bytes of fe10e0" +peer0.org2.example.com | [1188 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380e700 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [10f1 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f6db0 gate 1598907081316153900 evaluation starts +peer1.org1.example.com | [1050 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000040 cd ca ca 0b bb f5 |......| +orderer0.example.com | "2020-08-31 20:52:08.722 UTC [cauthdsl] func2 -> DEBU 1297 0xc000d8ea90 principal matched by identity 0" +peer0.org2.example.com | [1189 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380e700 principal matched by identity 0 +peer1.org2.example.com | [10f2 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f6db0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1051 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\005\307\340" > alive:\334|\262l\314\326\301\004^!2g\334#\245\025\235\370," > alive: alive: +peer0.org1.example.com | [e93 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +orderer0.example.com | "2020-08-31 20:52:08.722 UTC [msp.identity] Verify -> DEBU 1298 Verify: digest = 00000000 d8 18 8c 00 7a 33 31 bb b0 09 51 cb 09 75 ac db |....z31...Q..u..| +peer0.org2.example.com | [118a 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 32 c2 ff 63 90 50 fc 8a 02 30 ec 41 8a e2 12 |.2..c.P...0.A...| +peer1.org2.example.com | [10f3 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f6db0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1052 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +orderer0.example.com | 00000010 32 3e 73 1c 95 08 a2 1c d1 9f 0a f7 3d 5f 8d 01 |2>s.........=_..|" +peer0.org2.example.com | 00000010 24 51 bd 90 29 cd 37 f0 49 62 07 c3 a4 db 69 1f |$Q..).7.Ib....i.| +peer1.org2.example.com | [10f4 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f6db0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1053 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [e94 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a 19 7e 9a 8d 2b 03 8c 58 95 61 2f |0D. :.~..+..X.a/| +orderer0.example.com | "2020-08-31 20:52:08.722 UTC [msp.identity] Verify -> DEBU 1299 Verify: sig = 00000000 30 44 02 20 1e 51 02 0c 2f 2b e6 eb d1 e2 d2 03 |0D. .Q../+......| +peer0.org2.example.com | [118b 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d af 77 90 ed aa a9 66 05 e0 0f |0E.!...w....f...| +peer1.org2.example.com | [10f5 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f6db0 principal evaluation fails +peer1.org1.example.com | [1054 08-31 20:51:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | 00000010 66 6e 76 92 d8 ac fd 2b 7d 67 3b 42 4d 3a 57 26 |fnv....+}g;BM:W&| +orderer0.example.com | 00000010 a9 f5 c2 9f 71 06 b0 f8 d1 43 7a 65 71 a3 6d dc |....q....Czeq.m.| +peer0.org2.example.com | 00000010 fb c7 a9 89 84 a4 47 54 18 d6 44 61 7a d4 2a 80 |......GT..Daz.*.| +peer1.org2.example.com | [10f6 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f6db0 gate 1598907081316153900 evaluation fails +peer1.org1.example.com | [1055 08-31 20:51:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000020 a6 e1 27 7c 02 20 00 f0 b7 c6 02 58 cc 21 34 88 |..'|. .....X.!4.| +orderer0.example.com | 00000020 bb a1 a2 0f 02 20 62 8a c7 51 e8 d0 ad af aa 2f |..... b..Q...../| +peer0.org2.example.com | 00000020 18 27 f0 9e 74 02 20 22 29 d3 31 f0 eb ac af 9b |.'..t. ").1.....| +peer1.org2.example.com | [10f7 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1056 08-31 20:51:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | 00000030 39 39 be 72 fa 1d 0e ab 04 ac 8d 65 14 a9 38 ec |99.r.......e..8.| +orderer0.example.com | 00000030 09 3a d6 75 20 8c 7d ad f3 92 c5 26 5e 2b 6a 53 |.:.u .}....&^+jS| +peer0.org2.example.com | 00000030 e5 39 79 0a b9 f9 12 5e be 3b 52 d3 d5 c9 68 90 |.9y....^.;R...h.| +peer1.org2.example.com | [10f8 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1057 08-31 20:51:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000040 16 b5 9e d4 a2 8a |......| +orderer0.example.com | 00000040 33 92 05 2a 4f 0c |3..*O.|" +peer0.org2.example.com | 00000040 ee 6f fa 73 27 58 c7 |.o.s'X.| +peer1.org2.example.com | [10f9 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [e95 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1058 08-31 20:51:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:08.722 UTC [cauthdsl] func2 -> DEBU 129a 0xc000d8ea90 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [118c 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380e700 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [10fa 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f7320 gate 1598907081316761300 evaluation starts +peer0.org1.example.com | [e96 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [1059 08-31 20:51:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.723 UTC [cauthdsl] func1 -> DEBU 129b 0xc000d8ea90 gate 1598907128721467900 evaluation succeeds" +peer0.org2.example.com | [118d 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380e700 gate 1598907077557919800 evaluation succeeds +peer1.org2.example.com | [10fb 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f7320 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [e97 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [105a 08-31 20:51:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:08.723 UTC [policies] Evaluate -> DEBU 129c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [118e 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [10fc 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f7320 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [e98 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [105b 08-31 20:51:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:08.723 UTC [policies] Evaluate -> DEBU 129d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [118f 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [10fd 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f7320 principal matched by identity 0 +peer0.org1.example.com | [e99 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [105c 08-31 20:51:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:08.723 UTC [policies] Evaluate -> DEBU 129e Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org2.example.com | [1190 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [10fe 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 94 f1 67 52 fd 9c dc e6 2b 61 ab 86 41 85 d1 |...gR....+a..A..| +peer0.org1.example.com | [e9a 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [105d 08-31 20:51:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.723 UTC [policies] Evaluate -> DEBU 129f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org2.example.com | [1191 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 cb 16 a3 f7 7d 4f 3b ba bd 8c 6b fb 15 b6 11 25 |....}O;...k....%| +peer0.org1.example.com | [e9b 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [105e 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:08.725 UTC [policies] Evaluate -> DEBU 12a0 Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | [1192 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [10ff 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 cb 11 89 70 22 07 b7 9f 3b b0 |0E.!.....p"...;.| +peer0.org1.example.com | [e9c 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [105f 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.725 UTC [policies] Evaluate -> DEBU 12a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [1193 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | 00000010 64 aa d2 66 cb e9 ac 80 49 b6 df f2 f2 3d 7e 24 |d..f....I....=~$| +peer0.org1.example.com | [e9d 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org1.example.com | [1060 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:08.726 UTC [common.deliver] deliverBlocks -> DEBU 12a2 [channel: businesschannel] Received seekInfo (0xc0013860c0) start: > stop: > from 172.18.0.9:50944" +peer0.org2.example.com | [1194 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | 00000020 d6 a3 37 8e 22 02 20 5a 23 26 9b b5 f6 5c 25 cc |..7.". Z#&...\%.| +peer0.org1.example.com | [e9e 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1061 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:08.727 UTC [fsblkstorage] Next -> DEBU 12a3 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +peer0.org2.example.com | [1195 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | 00000030 01 74 0e 34 c6 ce f4 6a 65 bc e0 56 e6 bc 46 48 |.t.4...je..V..FH| +peer0.org1.example.com | [e9f 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1062 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:08.727 UTC [fsblkstorage] newBlockfileStream -> DEBU 12a4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[56643]" +peer0.org2.example.com | [1196 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | 00000040 39 32 11 6a dc 78 d8 |92.j.x.| +peer0.org1.example.com | [ea0 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1063 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.728 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12a5 Remaining bytes=[40749], Going to peek [8] bytes" +peer0.org2.example.com | [1197 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1100 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f7320 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [ea1 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [1064 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:08.731 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12a6 Returning blockbytes - length=[28171], placementInfo={fileNum=[0], startOffset=[56643], bytesOffset=[56646]}" +peer0.org2.example.com | [1198 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1101 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f7320 gate 1598907081316761300 evaluation succeeds +peer0.org1.example.com | [ea2 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1066 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:08.731 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12a7 blockbytes [28171] read from file [0]" +peer0.org2.example.com | [1199 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1102 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [ea3 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1067 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [119a 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +orderer0.example.com | "2020-08-31 20:52:08.731 UTC [common.deliver] deliverBlocks -> DEBU 12a8 [channel: businesschannel] Delivering block [2] for (0xc0013860c0) for 172.18.0.9:50944" +peer1.org2.example.com | [1103 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [ea4 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1065 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [119b 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.732 UTC [common.deliver] deliverBlocks -> DEBU 12a9 [channel: businesschannel] Done delivering to 172.18.0.9:50944 for (0xc0013860c0)" +peer1.org2.example.com | [1104 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [ea5 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1068 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [119c 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.732 UTC [common.deliver] Handle -> DEBU 12aa Waiting for new SeekInfo from 172.18.0.9:50944" +peer1.org2.example.com | [1105 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [ea6 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1069 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [119d 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.732 UTC [common.deliver] Handle -> DEBU 12ab Attempting to read seek info message from 172.18.0.9:50944" +peer1.org2.example.com | [1106 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [ea7 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [106a 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [119e 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:08.733 UTC [fsblkstorage] waitForBlock -> DEBU 12ac Came out of wait. maxAvailaBlockNumber=[5]" +peer1.org2.example.com | [1107 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [ea8 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [106b 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:52:08.733 UTC [fsblkstorage] waitForBlock -> DEBU 12ad Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +peer0.org2.example.com | [119f 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:jp\254T\253]\2301T\370\357\002 [\300\331\017a\274Q\026u\231\013\230\325\340\351~TGG\016\221\302\3378\357u\207\351\2742\247U" > +peer0.org1.example.com | [ea9 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1108 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [106c 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D9816101E +orderer0.example.com | "2020-08-31 20:52:08.741 UTC [grpc] infof -> DEBU 12ae transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | [11a0 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [eaa 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1109 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [106d 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A694F16752FD9CDCE62B61AB864185D1CB16A3F77D4F3BBABD8C6BFB15B61125 +orderer0.example.com | "2020-08-31 20:52:08.743 UTC [common.deliver] Handle -> WARN 12af Error reading from 172.18.0.9:50944: rpc error: code = Canceled desc = context canceled" +peer0.org2.example.com | [11a1 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [eab 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [110a 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [106e 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:52:08.743 UTC [orderer.common.server] func1 -> DEBU 12b0 Closing Deliver stream" +peer0.org2.example.com | [11a2 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [eac 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [110b 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [106f 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-08-31 20:52:08.743 UTC [comm.grpc.server] 1 -> INFO 12b1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50944 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=42.3918ms +peer0.org2.example.com | [11a3 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ead 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [110c 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1070 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +orderer0.example.com | "2020-08-31 20:52:08.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12b2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [11a4 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [eae 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [110d 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.805 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12b3 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +peer1.org1.example.com | [1071 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [11a5 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [eaf 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [110e 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +orderer0.example.com | "2020-08-31 20:52:08.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12b4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95µs " +peer1.org1.example.com | [1072 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11a6 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [eb0 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [110f 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.880 UTC [orderer.common.server] Deliver -> DEBU 12b5 Starting new Deliver handler" +peer1.org1.example.com | [1073 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [11a7 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [eb1 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1110 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.881 UTC [common.deliver] Handle -> DEBU 12b6 Starting new deliver loop for 172.18.0.9:50946" +peer1.org1.example.com | [1074 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11a8 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1111 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [eb2 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:08.881 UTC [common.deliver] Handle -> DEBU 12b7 Attempting to read seek info message from 172.18.0.9:50946" +peer1.org1.example.com | [1075 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [11a9 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1112 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [eb3 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | "2020-08-31 20:52:08.881 UTC [policies] Evaluate -> DEBU 12b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org1.example.com | [1077 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11aa 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1113 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\334|\262l\314\326\301\004^!2g\334#\245\025\235\370," > alive:\005\307\340" > alive: +peer0.org1.example.com | [eb4 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.882 UTC [policies] Evaluate -> DEBU 12b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [1076 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [11ab 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1114 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [eb5 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:08.882 UTC [policies] Evaluate -> DEBU 12ba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org1.example.com | [1078 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [11ac 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1115 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [eb6 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:08.882 UTC [policies] Evaluate -> DEBU 12bb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [1079 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11ad 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1116 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [eb7 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:08.882 UTC [policies] Evaluate -> DEBU 12bc == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org1.example.com | [107a 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [11ae 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [1117 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [eb8 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:08.882 UTC [cauthdsl] func1 -> DEBU 12bd 0xc000a996d0 gate 1598907128882923600 evaluation starts" +peer1.org1.example.com | [107b 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11af 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1118 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [eb9 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:08.883 UTC [cauthdsl] func2 -> DEBU 12be 0xc000a996d0 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [107c 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [11b0 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1119 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [eba 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:08.883 UTC [cauthdsl] func2 -> DEBU 12bf 0xc000a996d0 processing identity 0 with bytes of fe10e0" +peer1.org1.example.com | [107d 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11b1 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [111a 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ebb 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ab90 gate 1598907073489952000 evaluation starts +orderer0.example.com | "2020-08-31 20:52:08.883 UTC [cauthdsl] func2 -> DEBU 12c0 0xc000a996d0 principal matched by identity 0" +peer0.org2.example.com | [11b2 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [111b 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:te*\035{\202\017>\024\001\002 \031}\017GZ\301\220?cS1F\227O\201\337B\002H\362\261\344M)\021\037\263\306-\330\357\236" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [ebc 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ab90 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:08.883 UTC [msp.identity] Verify -> DEBU 12c1 Verify: digest = 00000000 02 24 64 91 b4 40 45 16 ee 2b 68 af fa 60 46 ca |.$d..@E..+h..`F.| +peer1.org1.example.com | [107e 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [11b3 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [111c 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:te*\035{\202\017>\024\001\002 \031}\017GZ\301\220?cS1F\227O\201\337B\002H\362\261\344M)\021\037\263\306-\330\357\236" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [ebd 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ab90 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | 00000010 4c cc 1f cf 1e e1 92 38 63 6d 69 4e 96 db ed ae |L......8cmiN....|" +peer1.org1.example.com | [107f 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [11b4 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [111d 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ebe 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ab90 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:08.884 UTC [msp.identity] Verify -> DEBU 12c2 Verify: sig = 00000000 30 45 02 21 00 80 83 41 f9 0e 58 4c 29 4a 34 48 |0E.!...A..XL)J4H| +peer1.org1.example.com | [1080 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 94 f1 67 52 fd 9c dc e6 2b 61 ab 86 41 85 d1 |...gR....+a..A..| +peer0.org2.example.com | [11b5 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [111e 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:te*\035{\202\017>\024\001\002 \031}\017GZ\301\220?cS1F\227O\201\337B\002H\362\261\344M)\021\037\263\306-\330\357\236" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [ebf 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 d6 ed 84 b2 eb d3 92 e8 ad 8a a9 48 e8 44 42 |............H.DB| +orderer0.example.com | 00000010 a1 0a 5d f6 14 0e 47 2d 71 64 28 f0 24 49 d7 5e |..]...G-qd(.$I.^| +peer1.org1.example.com | 00000010 cb 16 a3 f7 7d 4f 3b ba bd 8c 6b fb 15 b6 11 25 |....}O;...k....%| +peer0.org2.example.com | [11b6 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [111f 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | 00000010 4e 4d db 72 61 e4 55 ce ce e0 93 dd 0a 6c bf 8b |NM.ra.U......l..| +orderer0.example.com | 00000020 9c 17 ba 7b 3a 02 20 03 ea ae 9a 15 e0 df 22 3e |...{:. .......">| +peer1.org1.example.com | [1081 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 cb 11 89 70 22 07 b7 9f 3b b0 |0E.!.....p"...;.| +peer0.org2.example.com | [11b7 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1120 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 f6 e0 95 9d 1c 80 eb 6f 79 9d 8c c2 7a 8d de |........oy...z..| +peer0.org1.example.com | [ec0 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 6f e0 4e 37 ca de e7 13 97 27 e9 |0D. .o.N7.....'.| +orderer0.example.com | 00000030 b0 8d 6f 5f c1 9a 43 78 61 33 88 42 f4 fb 1a a8 |..o_..Cxa3.B....| +peer1.org1.example.com | 00000010 64 aa d2 66 cb e9 ac 80 49 b6 df f2 f2 3d 7e 24 |d..f....I....=~$| +peer0.org2.example.com | [11b8 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 da 6f f9 1c c5 fd 67 d2 7d e2 fb 29 31 35 fb 13 |.o....g.}..)15..| +peer0.org1.example.com | 00000010 a8 ec 75 e2 19 aa f6 5d 81 00 bb ea e6 d9 d3 81 |..u....]........| +orderer0.example.com | 00000040 4a 57 cf 36 b4 a1 62 |JW.6..b|" +peer1.org1.example.com | 00000020 d6 a3 37 8e 22 02 20 5a 23 26 9b b5 f6 5c 25 cc |..7.". Z#&...\%.| +peer0.org2.example.com | [11b9 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1121 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 d8 36 b5 43 13 f8 35 49 b2 51 b7 |0D. c.6.C..5I.Q.| +peer0.org1.example.com | 00000020 82 fe df b9 02 20 53 53 53 3a 2f 80 e0 0b 20 c9 |..... SSS:/... .| +orderer0.example.com | "2020-08-31 20:52:08.884 UTC [cauthdsl] func2 -> DEBU 12c3 0xc000a996d0 principal evaluation succeeds for identity 0" +peer1.org1.example.com | 00000030 01 74 0e 34 c6 ce f4 6a 65 bc e0 56 e6 bc 46 48 |.t.4...je..V..FH| +peer0.org2.example.com | [11ba 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 15 9d 4f d9 24 7e a7 1b 2e 89 03 83 43 2b 46 5c |..O.$~......C+F\| +peer0.org1.example.com | 00000030 45 9b 9f 22 f0 43 60 a0 71 76 ec da db 98 b8 53 |E..".C`.qv.....S| +orderer0.example.com | "2020-08-31 20:52:08.884 UTC [cauthdsl] func1 -> DEBU 12c4 0xc000a996d0 gate 1598907128882923600 evaluation succeeds" +peer1.org1.example.com | 00000040 39 32 11 6a dc 78 d8 |92.j.x.| +peer0.org2.example.com | [11bb 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 98 eb ea a7 02 20 24 28 40 8c 46 12 16 47 b9 d1 |..... $(@.F..G..| +peer0.org1.example.com | 00000040 a0 60 9b 29 94 3c |.`.).<| +orderer0.example.com | "2020-08-31 20:52:08.884 UTC [policies] Evaluate -> DEBU 12c5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [1082 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [11bc 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000030 04 c1 0c b9 5d b5 94 a6 ff 22 8a f5 a4 d7 fe 80 |....]...."......| +peer0.org1.example.com | [ec1 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ab90 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:08.885 UTC [policies] Evaluate -> DEBU 12c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [1083 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 09 37 12 fb 78 cf |.7..x.| +peer0.org2.example.com | [11bd 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [ec2 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ab90 gate 1598907073489952000 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:08.885 UTC [policies] Evaluate -> DEBU 12c7 Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org1.example.com | [1084 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1122 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | [11be 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [ec3 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:08.885 UTC [policies] Evaluate -> DEBU 12c8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org1.example.com | [1085 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [11bf 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b0d10 gate 1598907078226584000 evaluation starts +peer0.org1.example.com | [ec4 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:08.885 UTC [policies] Evaluate -> DEBU 12c9 Signature set satisfies policy /Channel/Readers" +peer1.org1.example.com | [1086 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1123 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce e3 e9 30 f2 d5 5e dd 81 09 d2 |0E.!....0..^....| +peer0.org2.example.com | [11c0 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b0d10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [ec5 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:08.886 UTC [policies] Evaluate -> DEBU 12ca == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org1.example.com | [1087 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 08 de 69 5e b4 cb 21 35 ee bc 3e 74 65 2a 1d 7b |..i^..!5..>te*.{| +peer0.org2.example.com | [11c1 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b0d10 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [ec6 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:08.886 UTC [common.deliver] deliverBlocks -> DEBU 12cb [channel: businesschannel] Received seekInfo (0xc000d6e4c0) start: > stop: > from 172.18.0.9:50946" +peer1.org1.example.com | [1088 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 82 0f 3e 14 01 02 20 19 7d 0f 47 5a c1 90 3f 63 |..>... .}.GZ..?c| +peer0.org2.example.com | [11c2 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b0d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [ec7 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:08.886 UTC [fsblkstorage] Next -> DEBU 12cc Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +peer1.org1.example.com | [1089 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 53 31 46 97 4f 81 df 42 02 48 f2 b1 e4 4d 29 11 |S1F.O..B.H...M).| +peer0.org2.example.com | [11c3 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b0d10 principal evaluation fails +peer0.org1.example.com | [ec8 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-08-31 20:52:08.887 UTC [fsblkstorage] newBlockfileStream -> DEBU 12cd newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +peer1.org1.example.com | [108a 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | 00000040 1f b3 c6 2d d8 ef 9e |...-...| +peer0.org2.example.com | [11c4 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b0d10 gate 1598907078226584000 evaluation fails +peer0.org1.example.com | [ec9 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:08.887 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12ce Remaining bytes=[97392], Going to peek [8] bytes" +peer1.org1.example.com | [108b 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 94 f1 67 52 fd 9c dc e6 2b 61 ab 86 41 85 d1 |...gR....+a..A..| +peer1.org2.example.com | [1124 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [11c5 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [eca 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:08.887 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12cf Returning blockbytes - length=[28472], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer1.org1.example.com | 00000010 cb 16 a3 f7 7d 4f 3b ba bd 8c 6b fb 15 b6 11 25 |....}O;...k....%| +peer1.org2.example.com | [1125 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [11c6 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [ecb 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:08.888 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12d0 blockbytes [28472] read from file [0]" +peer1.org1.example.com | [108c 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 cb 11 89 70 22 07 b7 9f 3b b0 |0E.!.....p"...;.| +peer1.org2.example.com | [1126 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [11c7 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [ecc 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.888 UTC [common.deliver] deliverBlocks -> DEBU 12d1 [channel: businesschannel] Delivering block [0] for (0xc000d6e4c0) for 172.18.0.9:50946" +peer1.org1.example.com | 00000010 64 aa d2 66 cb e9 ac 80 49 b6 df f2 f2 3d 7e 24 |d..f....I....=~$| +peer1.org2.example.com | [1127 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [11c8 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b12b0 gate 1598907078227012400 evaluation starts +peer0.org1.example.com | [ecd 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:08.889 UTC [common.deliver] deliverBlocks -> DEBU 12d2 [channel: businesschannel] Done delivering to 172.18.0.9:50946 for (0xc000d6e4c0)" +peer1.org1.example.com | 00000020 d6 a3 37 8e 22 02 20 5a 23 26 9b b5 f6 5c 25 cc |..7.". Z#&...\%.| +peer1.org2.example.com | [1128 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [11c9 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b12b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [ece 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +orderer0.example.com | "2020-08-31 20:52:08.889 UTC [common.deliver] Handle -> DEBU 12d3 Waiting for new SeekInfo from 172.18.0.9:50946" +peer1.org1.example.com | 00000030 01 74 0e 34 c6 ce f4 6a 65 bc e0 56 e6 bc 46 48 |.t.4...je..V..FH| +peer1.org2.example.com | [1129 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11ca 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b12b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [ecf 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.889 UTC [common.deliver] Handle -> DEBU 12d5 Attempting to read seek info message from 172.18.0.9:50946" +peer1.org1.example.com | 00000040 39 32 11 6a dc 78 d8 |92.j.x.| +peer1.org2.example.com | [112a 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11cb 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b12b0 principal matched by identity 0 +peer0.org1.example.com | [ed0 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.889 UTC [fsblkstorage] waitForBlock -> DEBU 12d4 Came out of wait. maxAvailaBlockNumber=[5]" +peer1.org2.example.com | [112b 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11cc 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | [ed1 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:08.890 UTC [fsblkstorage] waitForBlock -> DEBU 12d6 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +peer1.org1.example.com | [108d 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [112c 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [ed2 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:08.897 UTC [grpc] infof -> DEBU 12d7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org1.example.com | [108e 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [112d 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11cd 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:52:08.897 UTC [common.deliver] Handle -> WARN 12d8 Error reading from 172.18.0.9:50946: rpc error: code = Canceled desc = context canceled" +peer1.org1.example.com | [108f 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [112e 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | [ed3 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +orderer0.example.com | "2020-08-31 20:52:08.897 UTC [orderer.common.server] func1 -> DEBU 12d9 Closing Deliver stream" +peer1.org1.example.com | [1090 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [112f 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | [ed4 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:08.897 UTC [comm.grpc.server] 1 -> INFO 12da streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50946 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.155ms +peer1.org1.example.com | [1091 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1130 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:te*\035{\202\017>\024\001\002 \031}\017GZ\301\220?cS1F\227O\201\337B\002H\362\261\344M)\021\037\263\306-\330\357\236" > > alive: +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | [ed5 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:09.053 UTC [orderer.common.server] Deliver -> DEBU 12db Starting new Deliver handler" +peer1.org1.example.com | [1092 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1131 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [ed6 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:09.053 UTC [common.deliver] Handle -> DEBU 12dc Starting new deliver loop for 172.18.0.9:50948" +peer1.org1.example.com | [1093 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1132 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ed7 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:09.053 UTC [common.deliver] Handle -> DEBU 12dd Attempting to read seek info message from 172.18.0.9:50948" +peer1.org1.example.com | [1094 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1133 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [ed8 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [11ce 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b12b0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:09.054 UTC [policies] Evaluate -> DEBU 12de == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org1.example.com | [1095 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1134 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [ed9 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [11cf 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b12b0 gate 1598907078227012400 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:09.054 UTC [policies] Evaluate -> DEBU 12df This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [1096 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1135 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [eda 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [11d0 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:09.054 UTC [policies] Evaluate -> DEBU 12e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org1.example.com | [1097 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1136 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [edb 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [11d1 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:09.054 UTC [policies] Evaluate -> DEBU 12e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [1098 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1137 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [edc 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [11d2 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:09.055 UTC [policies] Evaluate -> DEBU 12e2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org1.example.com | [1099 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1138 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [edd 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [11d3 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:09.055 UTC [cauthdsl] func1 -> DEBU 12e3 0xc0009bd730 gate 1598907129055313500 evaluation starts" +peer1.org1.example.com | [109a 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e4ee0 gate 1598907081329166800 evaluation starts +peer1.org2.example.com | [1139 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ede 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11d4 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | "2020-08-31 20:52:09.055 UTC [cauthdsl] func2 -> DEBU 12e4 0xc0009bd730 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [109b 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e4ee0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [113a 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [edf 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +orderer0.example.com | "2020-08-31 20:52:09.055 UTC [cauthdsl] func2 -> DEBU 12e5 0xc0009bd730 processing identity 0 with bytes of fe10e0" +peer1.org1.example.com | [109c 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e4ee0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [113b 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [ee0 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11d5 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | "2020-08-31 20:52:09.056 UTC [cauthdsl] func2 -> DEBU 12e6 0xc0009bd730 principal matched by identity 0" +peer1.org1.example.com | [109d 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e4ee0 principal matched by identity 0 +peer1.org2.example.com | [113c 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ee1 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +orderer0.example.com | "2020-08-31 20:52:09.056 UTC [msp.identity] Verify -> DEBU 12e7 Verify: digest = 00000000 ab 00 eb 9d 0d f4 38 b8 17 b5 a4 e0 90 2f 53 29 |......8....../S)| +peer1.org1.example.com | [109e 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df de a9 43 65 43 25 6a a9 bb 70 39 02 4a c3 d1 |...CeC%j..p9.J..| +peer1.org2.example.com | [113d 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [ee2 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | 00000010 ac b5 9e 31 8e 25 37 3a 52 f9 cf 26 3d 64 5c 92 |...1.%7:R..&=d\.|" +peer1.org1.example.com | 00000010 91 a5 f0 a4 db 56 e5 75 fe af c3 2e 3a b6 9e 72 |.....V.u....:..r| +peer1.org2.example.com | [113e 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ee3 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +orderer0.example.com | "2020-08-31 20:52:09.056 UTC [msp.identity] Verify -> DEBU 12e8 Verify: sig = 00000000 30 45 02 21 00 ac 47 8d 6e 70 db 42 96 86 43 3d |0E.!..G.np.B..C=| +peer1.org1.example.com | [109f 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 a3 4c 3c b8 49 5b c9 1f 66 87 44 |0D. R.L<.I[..f.D| +peer1.org2.example.com | [113f 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [ee4 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +orderer0.example.com | 00000010 fb e1 5e 2e 66 d7 af 21 54 15 e5 92 51 bf c8 58 |..^.f..!T...Q..X| +peer1.org1.example.com | 00000010 c0 f8 5c 9d 06 ba d4 5e cc ac 06 f6 41 41 44 00 |..\....^....AAD.| +peer1.org2.example.com | [1140 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [ee5 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11d6 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000020 29 5a 8a ad b0 02 20 0e 56 75 df ca f5 dd 75 0c |)Z.... .Vu....u.| +peer1.org1.example.com | 00000020 58 b4 5d ed 02 20 38 4f fb 61 35 b5 8a 69 7d 8a |X.].. 8O.a5..i}.| +peer1.org2.example.com | [1141 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ee6 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [11d7 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000030 1a 36 83 6e 33 9a c2 57 f8 2b f9 dc e8 47 58 66 |.6.n3..W.+...GXf| +peer1.org1.example.com | 00000030 c1 4e 97 95 22 c4 50 ea f5 c9 87 09 42 66 f8 90 |.N..".P.....Bf..| +peer1.org2.example.com | [1142 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [11d8 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [ee7 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | 00000040 e8 ae c2 6f 00 e6 24 |...o..$|" +peer1.org1.example.com | 00000040 06 15 8a 5e 70 be |...^p.| +peer1.org2.example.com | [1143 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [11d9 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ee8 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:09.056 UTC [cauthdsl] func2 -> DEBU 12e9 0xc0009bd730 principal evaluation succeeds for identity 0" +peer1.org1.example.com | [10a0 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e4ee0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1144 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [11da 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [ee9 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:09.057 UTC [cauthdsl] func1 -> DEBU 12ea 0xc0009bd730 gate 1598907129055313500 evaluation succeeds" +peer1.org1.example.com | [10a1 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037e4ee0 gate 1598907081329166800 evaluation succeeds +peer1.org2.example.com | [1145 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [11db 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [eea 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:09.057 UTC [policies] Evaluate -> DEBU 12eb Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [10a2 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1146 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [11dc 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [eeb 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:09.057 UTC [policies] Evaluate -> DEBU 12ec == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [10a3 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1147 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [11dd 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [eec 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:09.057 UTC [policies] Evaluate -> DEBU 12ed Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org1.example.com | [10a4 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1148 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388ff40 gate 1598907081566263100 evaluation starts +peer0.org1.example.com | [eed 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11de 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c8c10 gate 1598907078228282100 evaluation starts +orderer0.example.com | "2020-08-31 20:52:09.058 UTC [policies] Evaluate -> DEBU 12ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org1.example.com | [10a5 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1149 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388ff40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [eee 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [11df 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c8c10 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:09.058 UTC [policies] Evaluate -> DEBU 12ef Signature set satisfies policy /Channel/Readers" +peer1.org2.example.com | [114a 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388ff40 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [10a6 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [eef 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161016 +peer0.org2.example.com | [11e0 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c8c10 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:09.058 UTC [policies] Evaluate -> DEBU 12f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org2.example.com | [114b 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388ff40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [10a7 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ef0 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 427B4B5E5C7DFC0EFF8C54B1230CCE272A0260E1F129D1A59EF3B6CB3B47840B +peer0.org2.example.com | [11e1 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c8c10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:52:09.058 UTC [common.deliver] deliverBlocks -> DEBU 12f1 [channel: businesschannel] Received seekInfo (0xc0013867c0) start: > stop: > from 172.18.0.9:50948" +peer1.org2.example.com | [114c 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388ff40 principal evaluation fails +peer1.org1.example.com | [10a8 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ef1 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [11e2 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c8c10 principal evaluation fails +orderer0.example.com | "2020-08-31 20:52:09.059 UTC [fsblkstorage] Next -> DEBU 12f2 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +peer1.org2.example.com | [114d 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388ff40 gate 1598907081566263100 evaluation fails +peer1.org1.example.com | [10a9 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [ef2 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [11e3 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c8c10 gate 1598907078228282100 evaluation fails +orderer0.example.com | "2020-08-31 20:52:09.059 UTC [fsblkstorage] newBlockfileStream -> DEBU 12f3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[28475]" +peer1.org2.example.com | [114e 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [10aa 08-31 20:51:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ef3 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org2.example.com | [11e4 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:09.059 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12f4 Remaining bytes=[68917], Going to peek [8] bytes" +peer1.org2.example.com | [114f 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [10ab 08-31 20:51:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [ef4 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [11e5 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:09.061 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12f5 Returning blockbytes - length=[28165], placementInfo={fileNum=[0], startOffset=[28475], bytesOffset=[28478]}" +peer1.org2.example.com | [1150 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [10ac 08-31 20:51:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 94 f1 67 52 fd 9c dc e6 2b 61 ab 86 41 85 d1 |...gR....+a..A..| +peer0.org1.example.com | [ef5 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11e6 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:09.062 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12f6 blockbytes [28165] read from file [0]" +peer1.org2.example.com | [1151 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e24b0 gate 1598907081568617600 evaluation starts +peer1.org1.example.com | 00000010 cb 16 a3 f7 7d 4f 3b ba bd 8c 6b fb 15 b6 11 25 |....}O;...k....%| +peer0.org1.example.com | [ef6 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [11e7 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c91e0 gate 1598907078228585500 evaluation starts +orderer0.example.com | "2020-08-31 20:52:09.062 UTC [common.deliver] deliverBlocks -> DEBU 12f7 [channel: businesschannel] Delivering block [1] for (0xc0013867c0) for 172.18.0.9:50948" +peer1.org2.example.com | [1152 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e24b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [10ad 08-31 20:51:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 cb 11 89 70 22 07 b7 9f 3b b0 |0E.!.....p"...;.| +peer0.org1.example.com | [ef7 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11e8 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c91e0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:09.062 UTC [common.deliver] deliverBlocks -> DEBU 12f8 [channel: businesschannel] Done delivering to 172.18.0.9:50948 for (0xc0013867c0)" +peer1.org2.example.com | [1153 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e24b0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000010 64 aa d2 66 cb e9 ac 80 49 b6 df f2 f2 3d 7e 24 |d..f....I....=~$| +peer0.org1.example.com | [ef8 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [11e9 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c91e0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:09.063 UTC [fsblkstorage] waitForBlock -> DEBU 12f9 Came out of wait. maxAvailaBlockNumber=[5]" +peer1.org2.example.com | [1154 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e24b0 principal matched by identity 0 +peer1.org1.example.com | 00000020 d6 a3 37 8e 22 02 20 5a 23 26 9b b5 f6 5c 25 cc |..7.". Z#&...\%.| +peer0.org1.example.com | [ef9 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11ea 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c91e0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:09.063 UTC [fsblkstorage] waitForBlock -> DEBU 12fa Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +peer1.org2.example.com | [1155 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 2c 0a bb e8 62 57 e5 1c 19 9f cc 51 e1 bd de |.,...bW.....Q...| +peer1.org1.example.com | 00000030 01 74 0e 34 c6 ce f4 6a 65 bc e0 56 e6 bc 46 48 |.t.4...je..V..FH| +peer0.org1.example.com | [efa 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [11eb 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | "2020-08-31 20:52:09.063 UTC [common.deliver] Handle -> DEBU 12fb Waiting for new SeekInfo from 172.18.0.9:50948" +peer1.org2.example.com | 00000010 f6 3d 7a a4 97 e4 33 aa cc 3a 8f 54 07 ea 74 2b |.=z...3..:.T..t+| +peer1.org1.example.com | 00000040 39 32 11 6a dc 78 d8 |92.j.x.| +peer0.org1.example.com | [efb 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | "2020-08-31 20:52:09.064 UTC [common.deliver] Handle -> DEBU 12fc Attempting to read seek info message from 172.18.0.9:50948" +peer1.org2.example.com | [1156 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe 34 9c 55 9b 9b 7d a8 c5 8b 33 |0E.!..4.U..}...3| +peer1.org1.example.com | [10ae 08-31 20:51:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | [efc 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11ec 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | "2020-08-31 20:52:09.070 UTC [grpc] infof -> DEBU 12fd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org2.example.com | 00000010 7b 7f 35 92 85 b2 39 dc e2 de a5 3d f4 7f 7b 8f |{.5...9....=..{.| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | [efd 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:09.070 UTC [common.deliver] Handle -> WARN 12fe Error reading from 172.18.0.9:50948: rpc error: code = Canceled desc = context canceled" +peer1.org2.example.com | 00000020 de d6 7a fd 95 02 20 0a 8d d1 de 7a 04 47 e8 cd |..z... ....z.G..| +peer1.org1.example.com | [10af 08-31 20:51:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 64 65 2e 7d d5 60 3b 32 e1 0a |0E.!..de.}.`;2..| +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | [efe 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:09.071 UTC [orderer.common.server] func1 -> DEBU 12ff Closing Deliver stream" +peer1.org2.example.com | 00000030 45 fa d7 16 c6 0d f6 df be 09 17 89 c2 ae ef 58 |E..............X| +peer1.org1.example.com | 00000010 f1 9c 8e 3f 35 3d cb 09 e4 0b 4e b4 f0 31 66 74 |...?5=....N..1ft| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | [eff 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:09.071 UTC [comm.grpc.server] 1 -> INFO 1300 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50948 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.8143ms +peer1.org2.example.com | 00000040 84 b4 f1 55 a1 6f a8 |...U.o.| +peer1.org1.example.com | 00000020 4b 2f f2 b8 f0 02 20 6b 78 3c d4 bd 22 5a 4e 9e |K/.... kx<.."ZN.| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [f00 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:09.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1301 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +peer1.org2.example.com | [1157 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e24b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000030 52 38 8a 2d d9 7b 4c 5a 1b 37 02 a3 f3 c8 ec 7a |R8.-.{LZ.7.....z| +peer0.org2.example.com | [11ed 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c91e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [f01 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:09.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1302 Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +peer1.org2.example.com | [1158 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e24b0 gate 1598907081568617600 evaluation succeeds +peer1.org1.example.com | 00000040 5c 83 ae 7d 5b 61 76 |\..}[av| +peer0.org2.example.com | [11ee 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038c91e0 gate 1598907078228585500 evaluation succeeds +peer0.org1.example.com | [f02 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:09.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1303 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.3µs " +peer1.org2.example.com | [1159 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [10b0 08-31 20:51:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [11ef 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [f03 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | "2020-08-31 20:52:09.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1304 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.4µs " +peer1.org2.example.com | [115a 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [10b1 08-31 20:51:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [11f0 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [f04 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:09.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1305 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [115b 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [10b2 08-31 20:51:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11f1 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [f05 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:09.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1306 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [10b3 08-31 20:51:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [115c 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [11f2 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [f06 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:09.279 UTC [orderer.common.server] Deliver -> DEBU 1307 Starting new Deliver handler" +peer1.org1.example.com | [10b4 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [115d 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [11f3 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | [f07 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:09.279 UTC [common.deliver] Handle -> DEBU 1308 Starting new deliver loop for 172.18.0.9:50950" +peer1.org1.example.com | [10b5 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [115e 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [f08 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:09.280 UTC [common.deliver] Handle -> DEBU 1309 Attempting to read seek info message from 172.18.0.9:50950" +peer1.org1.example.com | [10b6 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [115f 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [11f4 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | [f09 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:09.280 UTC [policies] Evaluate -> DEBU 130a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org1.example.com | [10b7 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1160 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [f0a 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:09.280 UTC [policies] Evaluate -> DEBU 130b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [10b8 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1161 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | [f0b 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c82dd0 gate 1598907073574253300 evaluation starts +orderer0.example.com | "2020-08-31 20:52:09.280 UTC [policies] Evaluate -> DEBU 130c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org1.example.com | [10b9 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1162 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | [f0c 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c82dd0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:09.281 UTC [policies] Evaluate -> DEBU 130d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [10ba 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1163 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [f0d 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c82dd0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:09.281 UTC [policies] Evaluate -> DEBU 130e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org1.example.com | [10bb 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1164 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11f5 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f0e 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c82dd0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:09.281 UTC [cauthdsl] func1 -> DEBU 130f 0xc000cd05a0 gate 1598907129281525600 evaluation starts" +peer1.org1.example.com | [10bc 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1165 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [11f6 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [f0f 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 d6 ed 84 b2 eb d3 92 e8 ad 8a a9 48 e8 44 42 |............H.DB| +orderer0.example.com | "2020-08-31 20:52:09.281 UTC [cauthdsl] func2 -> DEBU 1310 0xc000cd05a0 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [10bd 08-31 20:51:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1166 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11f7 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 4e 4d db 72 61 e4 55 ce ce e0 93 dd 0a 6c bf 8b |NM.ra.U......l..| +orderer0.example.com | "2020-08-31 20:52:09.281 UTC [cauthdsl] func2 -> DEBU 1311 0xc000cd05a0 processing identity 0 with bytes of fe10e0" +peer1.org1.example.com | [10be 08-31 20:51:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1167 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [f10 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 6f e0 4e 37 ca de e7 13 97 27 e9 |0D. .o.N7.....'.| +orderer0.example.com | "2020-08-31 20:52:09.282 UTC [cauthdsl] func2 -> DEBU 1312 0xc000cd05a0 principal matched by identity 0" +peer1.org1.example.com | [10bf 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1168 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [11f8 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 a8 ec 75 e2 19 aa f6 5d 81 00 bb ea e6 d9 d3 81 |..u....]........| +orderer0.example.com | "2020-08-31 20:52:09.282 UTC [msp.identity] Verify -> DEBU 1313 Verify: digest = 00000000 7b 5f 4a c6 12 d5 5d 92 df 61 5e b0 d6 18 e9 6d |{_J...]..a^....m| +peer1.org1.example.com | [10c0 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1169 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000020 82 fe df b9 02 20 53 53 53 3a 2f 80 e0 0b 20 c9 |..... SSS:/... .| +orderer0.example.com | 00000010 9e c8 b0 a9 a6 b5 21 e4 cb 5e d6 b0 26 c2 5d e5 |......!..^..&.].|" +peer1.org1.example.com | [10c1 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [116a 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 45 9b 9f 22 f0 43 60 a0 71 76 ec da db 98 b8 53 |E..".C`.qv.....S| +orderer0.example.com | "2020-08-31 20:52:09.282 UTC [msp.identity] Verify -> DEBU 1314 Verify: sig = 00000000 30 45 02 21 00 c6 97 0e 0d 31 8e 87 c9 d6 b8 57 |0E.!.....1.....W| +peer1.org1.example.com | [10c2 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [116b 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a0 60 9b 29 94 3c |.`.).<| +orderer0.example.com | 00000010 e9 4c 69 a0 5c 61 54 89 47 ff c9 6e 3e 90 e3 13 |.Li.\aT.G..n>...| +peer1.org1.example.com | [10c3 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [116c 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [f11 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c82dd0 principal evaluation succeeds for identity 0 +orderer0.example.com | 00000020 92 ce 68 0c 19 02 20 77 85 5b 5f ab ff 52 7b 37 |..h... w.[_..R{7| +peer1.org1.example.com | [10c4 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [116d 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [11f9 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f12 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c82dd0 gate 1598907073574253300 evaluation succeeds +orderer0.example.com | 00000030 52 5b b8 41 26 f3 1a c3 ed d4 ee e2 88 7f fc 87 |R[.A&...........| +peer1.org2.example.com | [116e 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10c5 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [11fa 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f13 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | 00000040 82 92 28 25 f0 42 71 |..(%.Bq|" +peer1.org2.example.com | [116f 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10c6 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f14 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [11fb 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:09.283 UTC [cauthdsl] func2 -> DEBU 1315 0xc000cd05a0 principal evaluation succeeds for identity 0" +peer1.org2.example.com | [1170 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10c7 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [f15 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [11fc 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:09.283 UTC [cauthdsl] func1 -> DEBU 1316 0xc000cd05a0 gate 1598907129281525600 evaluation succeeds" +peer1.org2.example.com | [1171 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10c8 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [f16 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [11fd 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:09.283 UTC [policies] Evaluate -> DEBU 1317 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [1172 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [10c9 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [f17 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [11fe 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:09.283 UTC [policies] Evaluate -> DEBU 1318 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [1173 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [10ca 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [f18 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [11ff 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:09.283 UTC [policies] Evaluate -> DEBU 1319 Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org2.example.com | [1174 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10cb 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d7bd0 gate 1598907081489924900 evaluation starts +peer0.org1.example.com | [f19 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1200 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:09.283 UTC [policies] Evaluate -> DEBU 131a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org2.example.com | [1175 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10cc 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d7bd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [f1a 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 7b 4b 5e 5c 7d fc 0e ff 8c 54 b1 23 0c ce 27 |B{K^\}....T.#..'| +peer0.org2.example.com | [1201 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038db630 gate 1598907078230703800 evaluation starts +orderer0.example.com | "2020-08-31 20:52:09.284 UTC [policies] Evaluate -> DEBU 131b Signature set satisfies policy /Channel/Readers" +peer1.org2.example.com | [1176 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10cd 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d7bd0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 2a 02 60 e1 f1 29 d1 a5 9e f3 b6 cb 3b 47 84 0b |*.`..)......;G..| +peer0.org2.example.com | [1202 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038db630 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:09.284 UTC [policies] Evaluate -> DEBU 131c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org2.example.com | [1177 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10ce 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d7bd0 principal matched by identity 0 +peer0.org2.example.com | [1203 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038db630 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [f1b 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d ca 98 86 2f 16 ad de 8b a3 52 01 |0D. ].../.....R.| +orderer0.example.com | "2020-08-31 20:52:09.284 UTC [common.deliver] deliverBlocks -> DEBU 131d [channel: businesschannel] Received seekInfo (0xc000d6ed40) start: > stop: > from 172.18.0.9:50950" +peer1.org2.example.com | [1178 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [10cf 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 f6 e0 95 9d 1c 80 eb 6f 79 9d 8c c2 7a 8d de |........oy...z..| +peer0.org2.example.com | [1204 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038db630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000010 1e 50 64 87 e8 df f8 f1 f2 81 c1 91 16 ca 28 21 |.Pd...........(!| +orderer0.example.com | "2020-08-31 20:52:09.284 UTC [fsblkstorage] Next -> DEBU 131e Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +peer1.org2.example.com | [1179 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 da 6f f9 1c c5 fd 67 d2 7d e2 fb 29 31 35 fb 13 |.o....g.}..)15..| +peer0.org2.example.com | [1205 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038db630 principal evaluation fails +peer0.org1.example.com | 00000020 e9 ce a8 40 02 20 60 43 80 ab 5e 48 0a c4 ba 20 |...@. `C..^H... | +orderer0.example.com | "2020-08-31 20:52:09.285 UTC [fsblkstorage] newBlockfileStream -> DEBU 131f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[56643]" +peer1.org2.example.com | [117a 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10d0 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 d8 36 b5 43 13 f8 35 49 b2 51 b7 |0D. c.6.C..5I.Q.| +peer0.org2.example.com | [1206 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038db630 gate 1598907078230703800 evaluation fails +peer0.org1.example.com | 00000030 c1 61 7e f2 86 b1 92 f7 94 f4 97 3f fc e9 34 9e |.a~........?..4.| +orderer0.example.com | "2020-08-31 20:52:09.285 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1320 Remaining bytes=[40749], Going to peek [8] bytes" +peer1.org2.example.com | [117b 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 15 9d 4f d9 24 7e a7 1b 2e 89 03 83 43 2b 46 5c |..O.$~......C+F\| +peer0.org2.example.com | [1207 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000040 7c bf f1 d1 ce 6b ||....k| +orderer0.example.com | "2020-08-31 20:52:09.285 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1321 Returning blockbytes - length=[28171], placementInfo={fileNum=[0], startOffset=[56643], bytesOffset=[56646]}" +peer1.org2.example.com | [117c 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 98 eb ea a7 02 20 24 28 40 8c 46 12 16 47 b9 d1 |..... $(@.F..G..| +peer0.org2.example.com | [1208 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [f1c 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:09.286 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1322 blockbytes [28171] read from file [0]" +peer1.org2.example.com | [117d 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 04 c1 0c b9 5d b5 94 a6 ff 22 8a f5 a4 d7 fe 80 |....]...."......| +peer0.org2.example.com | [1209 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [f1d 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:09.286 UTC [common.deliver] deliverBlocks -> DEBU 1323 [channel: businesschannel] Delivering block [2] for (0xc000d6ed40) for 172.18.0.9:50950" +peer1.org2.example.com | [117e 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 09 37 12 fb 78 cf |.7..x.| +peer0.org2.example.com | [120a 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038dbbb0 gate 1598907078230990500 evaluation starts +peer0.org1.example.com | [f1e 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:09.286 UTC [common.deliver] deliverBlocks -> DEBU 1324 [channel: businesschannel] Done delivering to 172.18.0.9:50950 for (0xc000d6ed40)" +peer1.org2.example.com | [117f 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [10d1 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d7bd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [120b 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038dbbb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [f1f 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:09.286 UTC [common.deliver] Handle -> DEBU 1325 Waiting for new SeekInfo from 172.18.0.9:50950" +peer1.org2.example.com | [1180 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [10d2 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037d7bd0 gate 1598907081489924900 evaluation succeeds +peer0.org2.example.com | [120c 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038dbbb0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [f20 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:52:09.287 UTC [common.deliver] Handle -> DEBU 1326 Attempting to read seek info message from 172.18.0.9:50950" +peer1.org2.example.com | [1181 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10d3 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [120d 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038dbbb0 principal matched by identity 0 +peer0.org1.example.com | [f21 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 d9 6b 09 8c aa 7e bd ab 1a a7 55 c5 2b 89 51 |3.k...~....U.+.Q| +orderer0.example.com | "2020-08-31 20:52:09.287 UTC [fsblkstorage] waitForBlock -> DEBU 1327 Came out of wait. maxAvailaBlockNumber=[5]" +peer1.org2.example.com | [1182 08-31 20:51:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10d4 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [120e 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 7e 5f 9c 3d 57 20 a0 1a 04 81 ec 7e b2 8a 7b b9 |~_.=W .....~..{.| +orderer0.example.com | "2020-08-31 20:52:09.287 UTC [fsblkstorage] waitForBlock -> DEBU 1328 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +peer1.org2.example.com | [1183 08-31 20:51:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10d5 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [f22 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 e2 5d 94 fc ae 8f 76 e8 23 1c b9 |0D. y.]....v.#..| +orderer0.example.com | "2020-08-31 20:52:09.295 UTC [common.deliver] Handle -> WARN 1329 Error reading from 172.18.0.9:50950: rpc error: code = Canceled desc = context canceled" +peer1.org2.example.com | [1184 08-31 20:51:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [10d6 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [120f 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d9 60 be 1f 03 e6 e7 c3 47 91 9b 77 b9 3b df cb |.`......G..w.;..| +orderer0.example.com | "2020-08-31 20:52:09.295 UTC [grpc] infof -> DEBU 132a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org2.example.com | [1185 08-31 20:51:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [10d7 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 7d a7 69 90 02 20 2e 72 62 ff 22 9f 3d dd 2e 9c |}.i.. .rb.".=...| +orderer0.example.com | "2020-08-31 20:52:09.295 UTC [orderer.common.server] func1 -> DEBU 132b Closing Deliver stream" +peer1.org2.example.com | [1186 08-31 20:51:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10d8 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 d9 97 80 77 23 79 e2 32 f9 1f 00 1c 06 55 fb ac |...w#y.2.....U..| +orderer0.example.com | "2020-08-31 20:52:09.295 UTC [comm.grpc.server] 1 -> INFO 132c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50950 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.9489ms +peer1.org2.example.com | [1187 08-31 20:51:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [10d9 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 cd ca ca 0b bb f5 |......| +orderer0.example.com | "2020-08-31 20:52:09.305 UTC [orderer.common.cluster.step] handleMessage -> DEBU 132d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [1188 08-31 20:51:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10da 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [f23 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:09.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 132e Sending msg of 28 bytes to 3 on channel testchainid took 18.2µs" +peer1.org2.example.com | [1189 08-31 20:51:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [10db 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1210 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038dbbb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [f24 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:09.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 132f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.4µs " +peer1.org2.example.com | [118a 08-31 20:51:22.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [10dc 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1211 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038dbbb0 gate 1598907078230990500 evaluation succeeds +peer0.org1.example.com | [f25 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:09.536 UTC [orderer.common.server] Deliver -> DEBU 1330 Starting new Deliver handler" +peer1.org2.example.com | [118b 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [10dd 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1212 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [f26 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:09.536 UTC [common.deliver] Handle -> DEBU 1331 Starting new deliver loop for 172.18.0.9:50952" +peer1.org2.example.com | [118c 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [10de 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1213 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [f27 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:09.537 UTC [common.deliver] Handle -> DEBU 1332 Attempting to read seek info message from 172.18.0.9:50952" +peer1.org2.example.com | [118e 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10df 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org2.example.com | [1214 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [f28 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-08-31 20:52:09.537 UTC [policies] Evaluate -> DEBU 1333 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | [118f 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1215 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [10e0 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f29 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 7b 4b 5e 5c 7d fc 0e ff 8c 54 b1 23 0c ce 27 |B{K^\}....T.#..'| +orderer0.example.com | "2020-08-31 20:52:09.537 UTC [policies] Evaluate -> DEBU 1334 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [118d 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1216 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | [10e1 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 2a 02 60 e1 f1 29 d1 a5 9e f3 b6 cb 3b 47 84 0b |*.`..)......;G..| +orderer0.example.com | "2020-08-31 20:52:09.538 UTC [policies] Evaluate -> DEBU 1335 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org2.example.com | [1190 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [10e2 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f2a 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d ca 98 86 2f 16 ad de 8b a3 52 01 |0D. ].../.....R.| +peer1.org2.example.com | [1191 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:09.538 UTC [policies] Evaluate -> DEBU 1336 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [1217 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | [10e3 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000010 1e 50 64 87 e8 df f8 f1 f2 81 c1 91 16 ca 28 21 |.Pd...........(!| +peer1.org2.example.com | [1192 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:09.538 UTC [policies] Evaluate -> DEBU 1337 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | [10e4 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\005\307\340" > alive: +peer0.org1.example.com | 00000020 e9 ce a8 40 02 20 60 43 80 ab 5e 48 0a c4 ba 20 |...@. `C..^H... | +peer1.org2.example.com | [1193 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:09.539 UTC [cauthdsl] func1 -> DEBU 1338 0xc000385130 gate 1598907129539058000 evaluation starts" +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | [10e5 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 c1 61 7e f2 86 b1 92 f7 94 f4 97 3f fc e9 34 9e |.a~........?..4.| +peer1.org2.example.com | [1194 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:09.539 UTC [cauthdsl] func2 -> DEBU 1339 0xc000385130 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | [10e6 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 7c bf f1 d1 ce 6b ||....k| +peer1.org2.example.com | [1195 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:09.539 UTC [cauthdsl] func2 -> DEBU 133a 0xc000385130 processing identity 0 with bytes of fe10e0" +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [10e7 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [f2b 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org2.example.com | [1196 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:09.539 UTC [cauthdsl] func2 -> DEBU 133b 0xc000385130 principal matched by identity 0" +peer0.org2.example.com | [1218 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10e8 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org2.example.com | [1197 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948950 gate 1598907082487756100 evaluation starts +orderer0.example.com | "2020-08-31 20:52:09.539 UTC [msp.identity] Verify -> DEBU 133c Verify: digest = 00000000 8d d1 d5 4f 7e 0d 6c c8 d6 fc 69 e8 67 03 f9 43 |...O~.l...i.g..C| +peer0.org2.example.com | [1219 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10e9 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [f2c 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 90 33 fe 3d 42 5d 49 1e f6 11 de |0D. ..3.=B]I....| +peer1.org2.example.com | [1198 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948950 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | 00000010 5f 20 c5 1a 9d a9 e3 31 c0 6d 4a 32 ed 68 94 3b |_ .....1.mJ2.h.;|" +peer0.org2.example.com | [121a 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000010 10 89 7f 5c c6 50 e5 71 ec 2f 96 98 94 2c 3f 5d |...\.P.q./...,?]| +peer1.org2.example.com | [1199 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948950 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:09.540 UTC [msp.identity] Verify -> DEBU 133d Verify: sig = 00000000 30 45 02 21 00 8f 2c c4 4c 44 fa 7e 77 86 d2 07 |0E.!..,.LD.~w...| +peer1.org1.example.com | [10ea 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [121b 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 80 20 3b 48 02 20 5f 83 03 99 57 98 6d 69 b6 20 |. ;H. _...W.mi. | +peer1.org2.example.com | [119a 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | 00000010 2a fa 3d 33 04 e6 78 2c f5 8b 14 52 19 2a b6 43 |*.=3..x,...R.*.C| +peer1.org1.example.com | [10eb 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 ab a9 28 33 93 6a 27 83 e0 4d 4b 97 b7 d5 f9 a3 |..(3.j'..MK.....| +peer0.org2.example.com | [121c 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [119b 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948950 principal evaluation fails +orderer0.example.com | 00000020 db 22 b6 07 41 02 20 0c 11 56 bd b4 bb 41 56 c7 |."..A. ..V...AV.| +peer1.org1.example.com | [10ec 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 92 43 bc 77 c0 26 |.C.w.&| +peer0.org2.example.com | [121d 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [119c 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003948950 gate 1598907082487756100 evaluation fails +orderer0.example.com | 00000030 98 12 a6 eb 35 c5 2b bd 8e 3e df f4 cd f6 44 f1 |....5.+..>....D.| +peer1.org1.example.com | [10ed 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [f2d 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [121e 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [119d 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | 00000040 14 39 e8 37 93 b5 ff |.9.7...|" +peer1.org1.example.com | [10ee 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f2e 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [121f 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [119e 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:09.540 UTC [cauthdsl] func2 -> DEBU 133e 0xc000385130 principal evaluation succeeds for identity 0" +peer1.org1.example.com | [10ef 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [f2f 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1220 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75610 gate 1598907078232205600 evaluation starts +peer1.org2.example.com | [119f 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:09.540 UTC [cauthdsl] func1 -> DEBU 133f 0xc000385130 gate 1598907129539058000 evaluation succeeds" +peer1.org1.example.com | [10f0 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [f30 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1221 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75610 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [11a0 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039490b0 gate 1598907082488147800 evaluation starts +orderer0.example.com | "2020-08-31 20:52:09.540 UTC [policies] Evaluate -> DEBU 1340 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [10f1 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 2c 0a bb e8 62 57 e5 1c 19 9f cc 51 e1 bd de |.,...bW.....Q...| +peer0.org1.example.com | [f31 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1222 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75610 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [11a1 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039490b0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:09.541 UTC [policies] Evaluate -> DEBU 1341 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | 00000010 f6 3d 7a a4 97 e4 33 aa cc 3a 8f 54 07 ea 74 2b |.=z...3..:.T..t+| +peer0.org1.example.com | [f32 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1223 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [11a2 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039490b0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:09.541 UTC [policies] Evaluate -> DEBU 1342 Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org1.example.com | [10f2 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe 34 9c 55 9b 9b 7d a8 c5 8b 33 |0E.!..4.U..}...3| +peer0.org1.example.com | [f33 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1224 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75610 principal evaluation fails +peer1.org2.example.com | [11a3 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039490b0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:09.541 UTC [policies] Evaluate -> DEBU 1343 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org1.example.com | 00000010 7b 7f 35 92 85 b2 39 dc e2 de a5 3d f4 7f 7b 8f |{.5...9....=..{.| +peer0.org1.example.com | [f34 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1225 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75610 gate 1598907078232205600 evaluation fails +peer1.org2.example.com | [11a4 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | "2020-08-31 20:52:09.541 UTC [policies] Evaluate -> DEBU 1344 Signature set satisfies policy /Channel/Readers" +peer1.org1.example.com | 00000020 de d6 7a fd 95 02 20 0a 8d d1 de 7a 04 47 e8 cd |..z... ....z.G..| +peer0.org1.example.com | [f35 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1226 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | "2020-08-31 20:52:09.542 UTC [policies] Evaluate -> DEBU 1345 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org1.example.com | 00000030 45 fa d7 16 c6 0d f6 df be 09 17 89 c2 ae ef 58 |E..............X| +peer0.org1.example.com | [f36 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 7b 4b 5e 5c 7d fc 0e ff 8c 54 b1 23 0c ce 27 |B{K^\}....T.#..'| +peer0.org2.example.com | [1227 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [11a5 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | "2020-08-31 20:52:09.542 UTC [common.deliver] deliverBlocks -> DEBU 1346 [channel: businesschannel] Received seekInfo (0xc001387bc0) start: > stop: > from 172.18.0.9:50952" +peer1.org1.example.com | 00000040 84 b4 f1 55 a1 6f a8 |...U.o.| +peer1.org1.example.com | [10f3 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 2a 02 60 e1 f1 29 d1 a5 9e f3 b6 cb 3b 47 84 0b |*.`..)......;G..| +peer0.org2.example.com | [1228 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +orderer0.example.com | "2020-08-31 20:52:09.542 UTC [fsblkstorage] Next -> DEBU 1347 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [f37 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d ca 98 86 2f 16 ad de 8b a3 52 01 |0D. ].../.....R.| +peer0.org2.example.com | [1229 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75ca0 gate 1598907078232491100 evaluation starts +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +orderer0.example.com | "2020-08-31 20:52:09.543 UTC [fsblkstorage] newBlockfileStream -> DEBU 1348 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[84817]" +peer1.org1.example.com | [10f4 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 c6 79 15 a3 71 60 30 7c f8 19 |0E.!...y..q`0|..| +peer0.org1.example.com | 00000010 1e 50 64 87 e8 df f8 f1 f2 81 c1 91 16 ca 28 21 |.Pd...........(!| +peer0.org2.example.com | [122a 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75ca0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +orderer0.example.com | "2020-08-31 20:52:09.543 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1349 Remaining bytes=[12575], Going to peek [8] bytes" +peer1.org1.example.com | 00000010 49 d4 a7 d8 f6 25 cb 44 58 6a c4 c1 74 34 cf 41 |I....%.DXj..t4.A| +peer0.org1.example.com | 00000020 e9 ce a8 40 02 20 60 43 80 ab 5e 48 0a c4 ba 20 |...@. `C..^H... | +peer0.org2.example.com | [122b 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75ca0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +orderer0.example.com | "2020-08-31 20:52:09.543 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 134a Returning blockbytes - length=[4550], placementInfo={fileNum=[0], startOffset=[84817], bytesOffset=[84819]}" +peer1.org1.example.com | 00000020 8c d9 b1 6f 4d 02 20 59 0b 31 dd fa 3f d3 bd 94 |...oM. Y.1..?...| +peer0.org1.example.com | 00000030 c1 61 7e f2 86 b1 92 f7 94 f4 97 3f fc e9 34 9e |.a~........?..4.| +peer0.org2.example.com | [122c 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75ca0 principal matched by identity 0 +peer1.org2.example.com | [11a6 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039490b0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:09.543 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 134b blockbytes [4550] read from file [0]" +peer1.org1.example.com | 00000030 b9 cf f4 e0 79 4c b1 6f c5 c9 dc b7 29 e3 6f 1d |....yL.o....).o.| +peer0.org1.example.com | 00000040 7c bf f1 d1 ce 6b ||....k| +peer0.org2.example.com | [122d 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | [11a7 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039490b0 gate 1598907082488147800 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:09.544 UTC [common.deliver] deliverBlocks -> DEBU 134c [channel: businesschannel] Delivering block [3] for (0xc001387bc0) for 172.18.0.9:50952" +peer0.org1.example.com | [f38 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [11a8 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:09.544 UTC [common.deliver] deliverBlocks -> DEBU 134d [channel: businesschannel] Done delivering to 172.18.0.9:50952 for (0xc001387bc0)" +peer1.org1.example.com | 00000040 e1 8b af 4e f5 e9 44 |...N..D| +peer0.org2.example.com | [122e 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | [11a9 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [11aa 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:09.544 UTC [common.deliver] Handle -> DEBU 134e Waiting for new SeekInfo from 172.18.0.9:50952" +peer0.org1.example.com | [f39 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | [11ab 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [10f5 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:09.544 UTC [common.deliver] Handle -> DEBU 1350 Attempting to read seek info message from 172.18.0.9:50952" +peer0.org1.example.com | [f3a 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | [11ac 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10f6 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +orderer0.example.com | "2020-08-31 20:52:09.544 UTC [fsblkstorage] waitForBlock -> DEBU 134f Came out of wait. maxAvailaBlockNumber=[5]" +peer0.org1.example.com | [f3b 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | [11ad 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [10f7 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:09.545 UTC [fsblkstorage] waitForBlock -> DEBU 1351 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +peer0.org1.example.com | [f3c 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 d9 6b 09 8c aa 7e bd ab 1a a7 55 c5 2b 89 51 |3.k...~....U.+.Q| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [11ae 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [10f8 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:09.550 UTC [grpc] infof -> DEBU 1352 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | 00000010 7e 5f 9c 3d 57 20 a0 1a 04 81 ec 7e b2 8a 7b b9 |~_.=W .....~..{.| +peer0.org2.example.com | [122f 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75ca0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [11af 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [10f9 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:09.550 UTC [common.deliver] Handle -> WARN 1353 Error reading from 172.18.0.9:50952: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | [f3d 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 e2 5d 94 fc ae 8f 76 e8 23 1c b9 |0D. y.]....v.#..| +peer0.org2.example.com | [1230 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75ca0 gate 1598907078232491100 evaluation succeeds +peer1.org1.example.com | [10fa 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:09.550 UTC [orderer.common.server] func1 -> DEBU 1354 Closing Deliver stream" +peer0.org1.example.com | 00000010 d9 60 be 1f 03 e6 e7 c3 47 91 9b 77 b9 3b df cb |.`......G..w.;..| +peer0.org2.example.com | [1231 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [11b0 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [10fb 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:09.551 UTC [comm.grpc.server] 1 -> INFO 1355 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50952 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.5379ms +peer0.org1.example.com | 00000020 7d a7 69 90 02 20 2e 72 62 ff 22 9f 3d dd 2e 9c |}.i.. .rb.".=...| +peer0.org2.example.com | [1232 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [11b1 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [10fc 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:09.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1356 Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" +peer0.org1.example.com | 00000030 d9 97 80 77 23 79 e2 32 f9 1f 00 1c 06 55 fb ac |...w#y.2.....U..| +peer0.org2.example.com | [1233 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [11b2 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [10fd 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +orderer0.example.com | "2020-08-31 20:52:09.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1357 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +peer0.org1.example.com | 00000040 cd ca ca 0b bb f5 |......| +peer0.org2.example.com | [1234 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [11b3 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [10fe 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:09.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1358 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.5µs " +peer0.org1.example.com | [f3e 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1235 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11b4 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399c350 gate 1598907082489330400 evaluation starts +peer1.org1.example.com | [10ff 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:09.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1359 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.6µs " +peer0.org1.example.com | [f3f 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1236 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [11b5 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399c350 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1100 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:09.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [f40 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1237 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11b6 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399c350 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1101 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +orderer0.example.com | "2020-08-31 20:52:09.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135b Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [f41 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1238 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11b7 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399c350 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1102 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:09.767 UTC [orderer.common.server] Deliver -> DEBU 135c Starting new Deliver handler" +peer0.org1.example.com | [f42 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1239 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11b8 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399c350 principal evaluation fails +peer1.org1.example.com | [1103 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:09.768 UTC [common.deliver] Handle -> DEBU 135d Starting new deliver loop for 172.18.0.9:50954" +peer0.org1.example.com | [f43 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [123a 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [11b9 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399c350 gate 1598907082489330400 evaluation fails +peer1.org1.example.com | [1104 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:09.768 UTC [common.deliver] Handle -> DEBU 135e Attempting to read seek info message from 172.18.0.9:50954" +peer0.org1.example.com | [f44 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [123b 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [11ba 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1105 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:09.768 UTC [policies] Evaluate -> DEBU 135f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | [f45 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [123c 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [11bb 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1106 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:09.768 UTC [policies] Evaluate -> DEBU 1360 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [f46 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [123d 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [11bc 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1107 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:09.769 UTC [policies] Evaluate -> DEBU 1361 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org1.example.com | [f47 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [11bd 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399c8c0 gate 1598907082489817000 evaluation starts +peer0.org2.example.com | [123e 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1108 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:09.769 UTC [policies] Evaluate -> DEBU 1362 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [f48 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb9bf0 gate 1598907073587787500 evaluation starts +peer1.org2.example.com | [11be 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399c8c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [123f 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1109 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:09.769 UTC [policies] Evaluate -> DEBU 1363 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | [f49 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb9bf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [11bf 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399c8c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1240 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95160 gate 1598907078233574300 evaluation starts +peer1.org1.example.com | [110a 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:09.769 UTC [cauthdsl] func1 -> DEBU 1364 0xc000c9d750 gate 1598907129769856000 evaluation starts" +peer0.org1.example.com | [f4a 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb9bf0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [11c0 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399c8c0 principal matched by identity 0 +peer0.org2.example.com | [1241 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95160 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [110b 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [f4b 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb9bf0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:09.770 UTC [cauthdsl] func2 -> DEBU 1365 0xc000c9d750 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [11c1 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | [1242 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95160 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [110c 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [f4c 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 62 52 2f a0 7a a2 5f f5 b0 4e 19 86 d1 11 1b |.bR/.z._..N.....| +orderer0.example.com | "2020-08-31 20:52:09.770 UTC [cauthdsl] func2 -> DEBU 1366 0xc000c9d750 processing identity 0 with bytes of fe10e0" +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [1243 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [110d 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 46 16 b9 bb 1a 0a 30 86 a8 1a 6d fd a4 fd 6c 81 |F.....0...m...l.| +orderer0.example.com | "2020-08-31 20:52:09.770 UTC [cauthdsl] func2 -> DEBU 1367 0xc000c9d750 principal matched by identity 0" +peer0.org2.example.com | [1244 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95160 principal evaluation fails +peer1.org1.example.com | [110e 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11c2 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | [f4d 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 f4 4b d8 b1 26 7a 12 19 fc 48 0f |0D. ".K..&z...H.| +orderer0.example.com | "2020-08-31 20:52:09.770 UTC [msp.identity] Verify -> DEBU 1368 Verify: digest = 00000000 92 ee b6 af ff 1c c0 13 9a 07 5f a1 23 62 5b 46 |.........._.#b[F| +peer0.org2.example.com | [1245 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95160 gate 1598907078233574300 evaluation fails +peer1.org1.example.com | [110f 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000010 23 96 b6 1c b0 4a 29 77 64 3c 44 db 5e d8 f8 29 |#....J)wd DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1110 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000020 5a 83 67 be 02 20 3d d4 ec 36 6c 44 09 2b bd e6 |Z.g.. =..6lD.+..| +orderer0.example.com | "2020-08-31 20:52:09.770 UTC [msp.identity] Verify -> DEBU 1369 Verify: sig = 00000000 30 45 02 21 00 a5 e8 f0 8a 02 e9 08 ba 07 56 8e |0E.!..........V.| +peer0.org2.example.com | [1247 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1111 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000030 ee 08 f2 fa f8 be fa ca ba 5b d3 18 d6 d8 c4 9f |.........[......| +orderer0.example.com | 00000010 6d ae ce 25 bc e5 e6 a8 93 bc 0a 1a 61 4e 0a 86 |m..%........aN..| +peer0.org2.example.com | [1248 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1112 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | 00000040 67 f2 8b 69 99 24 |g..i.$| +orderer0.example.com | 00000020 d6 74 1b 37 42 02 20 4a 97 80 f3 04 00 ca 87 12 |.t.7B. J........| +peer0.org2.example.com | [1249 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a956d0 gate 1598907078236135600 evaluation starts +peer1.org1.example.com | [1113 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [11c3 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399c8c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [f4e 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb9bf0 principal evaluation succeeds for identity 0 +orderer0.example.com | 00000030 1a d8 ce bd 84 b5 03 1a 99 40 0c 87 18 37 b5 6a |.........@...7.j| +peer0.org2.example.com | [124a 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a956d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [11c4 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00399c8c0 gate 1598907082489817000 evaluation succeeds +peer1.org1.example.com | [1114 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [f4f 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb9bf0 gate 1598907073587787500 evaluation succeeds +orderer0.example.com | 00000040 00 c4 f6 71 1d 1b 59 |...q..Y|" +peer0.org2.example.com | [124b 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a956d0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [11c5 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1115 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f50 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:09.771 UTC [cauthdsl] func2 -> DEBU 136a 0xc000c9d750 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [124c 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a956d0 principal matched by identity 0 +peer1.org2.example.com | [11c6 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1116 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f51 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:09.771 UTC [cauthdsl] func1 -> DEBU 136b 0xc000c9d750 gate 1598907129769856000 evaluation succeeds" +peer0.org2.example.com | [124d 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | [11c7 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1117 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [f52 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:09.771 UTC [policies] Evaluate -> DEBU 136c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [11c8 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1118 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f53 08-31 20:51:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:09.771 UTC [policies] Evaluate -> DEBU 136d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [124e 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | [11c9 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | [1119 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:09.772 UTC [policies] Evaluate -> DEBU 136e Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org1.example.com | [f54 08-31 20:51:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [111a 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:09.772 UTC [policies] Evaluate -> DEBU 136f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org1.example.com | [f55 08-31 20:51:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | [11ca 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | [111b 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:09.772 UTC [policies] Evaluate -> DEBU 1370 Signature set satisfies policy /Channel/Readers" +peer0.org1.example.com | [f56 08-31 20:51:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +orderer0.example.com | "2020-08-31 20:52:09.772 UTC [policies] Evaluate -> DEBU 1371 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org1.example.com | [f57 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [124f 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a956d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | [111c 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:09.772 UTC [common.deliver] deliverBlocks -> DEBU 1372 [channel: businesschannel] Received seekInfo (0xc000d6f600) start: > stop: > from 172.18.0.9:50954" +peer0.org1.example.com | [f58 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1250 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a956d0 gate 1598907078236135600 evaluation succeeds +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [111d 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:09.773 UTC [fsblkstorage] Next -> DEBU 1373 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +peer0.org1.example.com | [f59 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1251 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [11cb 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | [111e 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:09.773 UTC [fsblkstorage] newBlockfileStream -> DEBU 1374 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89369]" +peer0.org1.example.com | [f5a 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1252 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [111f 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:09.773 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1375 Remaining bytes=[8023], Going to peek [8] bytes" +peer0.org1.example.com | [f5b 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1253 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [11cc 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | [1120 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:09.774 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1376 Returning blockbytes - length=[4010], placementInfo={fileNum=[0], startOffset=[89369], bytesOffset=[89371]}" +peer0.org1.example.com | [f5c 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1254 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | [1121 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:09.774 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1377 blockbytes [4010] read from file [0]" +peer0.org1.example.com | [f5d 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1255 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | [1122 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:09.774 UTC [common.deliver] deliverBlocks -> DEBU 1378 [channel: businesschannel] Delivering block [4] for (0xc000d6f600) for 172.18.0.9:50954" +peer0.org1.example.com | [f5e 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1256 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | [1123 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382bfa0 gate 1598907082003029500 evaluation starts +orderer0.example.com | "2020-08-31 20:52:09.774 UTC [common.deliver] deliverBlocks -> DEBU 1379 [channel: businesschannel] Done delivering to 172.18.0.9:50954 for (0xc000d6f600)" +peer0.org1.example.com | [f5f 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1257 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [1124 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382bfa0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:09.775 UTC [common.deliver] Handle -> DEBU 137a Waiting for new SeekInfo from 172.18.0.9:50954" +peer0.org1.example.com | [f60 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +peer0.org2.example.com | [1258 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [11cd 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1125 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382bfa0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:09.775 UTC [common.deliver] Handle -> DEBU 137b Attempting to read seek info message from 172.18.0.9:50954" +peer0.org1.example.com | [f61 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | [1259 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [11ce 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1126 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382bfa0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:09.775 UTC [fsblkstorage] waitForBlock -> DEBU 137c Came out of wait. maxAvailaBlockNumber=[5]" +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [125a 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [11cf 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1127 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | "2020-08-31 20:52:09.775 UTC [fsblkstorage] waitForBlock -> DEBU 137d Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +peer0.org1.example.com | [f62 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | [125b 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [11d0 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +orderer0.example.com | "2020-08-31 20:52:09.782 UTC [grpc] infof -> DEBU 137e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | [125c 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [11d1 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1128 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | "2020-08-31 20:52:09.783 UTC [common.deliver] Handle -> WARN 137f Error reading from 172.18.0.9:50954: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | [125d 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12950 gate 1598907078237207100 evaluation starts +peer1.org2.example.com | [11d2 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +orderer0.example.com | "2020-08-31 20:52:09.784 UTC [orderer.common.server] func1 -> DEBU 1380 Closing Deliver stream" +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | [125e 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12950 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [11d3 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | "2020-08-31 20:52:09.785 UTC [comm.grpc.server] 1 -> INFO 1381 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50954 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.8358ms +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [125f 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12950 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [11d4 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +orderer0.example.com | "2020-08-31 20:52:09.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1382 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [f63 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | [1260 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12950 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [11d5 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +orderer0.example.com | "2020-08-31 20:52:09.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1383 Sending msg of 28 bytes to 3 on channel testchainid took 26.3µs" +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [1261 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12950 principal evaluation fails +peer1.org2.example.com | [11d6 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1129 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382bfa0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:09.807 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1384 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 538.7µs " +peer0.org1.example.com | [f64 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | [11d7 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1262 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12950 gate 1598907078237207100 evaluation fails +peer1.org1.example.com | [112a 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382bfa0 gate 1598907082003029500 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:09.998 UTC [orderer.common.server] Deliver -> DEBU 1385 Starting new Deliver handler" +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | [11d8 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ceb00 gate 1598907082492906300 evaluation starts +peer0.org2.example.com | [1263 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [112b 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:09.999 UTC [common.deliver] Handle -> DEBU 1386 Starting new deliver loop for 172.18.0.9:50956" +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | [11d9 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ceb00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1264 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [112c 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:09.999 UTC [common.deliver] Handle -> DEBU 1387 Attempting to read seek info message from 172.18.0.9:50956" +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | [1265 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [11da 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ceb00 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [112d 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:09.999 UTC [policies] Evaluate -> DEBU 1388 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [1266 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12ee0 gate 1598907078237567900 evaluation starts +peer1.org2.example.com | [11db 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ceb00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [112e 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:10.000 UTC [policies] Evaluate -> DEBU 1389 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [f65 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1267 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12ee0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [11dc 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ceb00 principal evaluation fails +peer1.org1.example.com | [112f 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | "2020-08-31 20:52:10.000 UTC [policies] Evaluate -> DEBU 138a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org1.example.com | [f66 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1268 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12ee0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [11dd 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039ceb00 gate 1598907082492906300 evaluation fails +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:52:10.000 UTC [policies] Evaluate -> DEBU 138b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [f67 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1269 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12ee0 principal matched by identity 0 +peer1.org2.example.com | [11de 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1130 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:52:10.000 UTC [policies] Evaluate -> DEBU 138c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | [f68 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [126a 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | [11df 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | "2020-08-31 20:52:10.000 UTC [cauthdsl] func1 -> DEBU 138d 0xc00004fe30 gate 1598907130000976400 evaluation starts" +peer0.org1.example.com | [f69 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [11e0 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | [f6a 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:10.001 UTC [cauthdsl] func2 -> DEBU 138e 0xc00004fe30 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [126b 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | [11e1 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cf070 gate 1598907082493290100 evaluation starts +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | [f6b 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:10.001 UTC [cauthdsl] func2 -> DEBU 138f 0xc00004fe30 processing identity 0 with bytes of fe10e0" +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | [11e2 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cf070 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [f6c 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:10.001 UTC [cauthdsl] func2 -> DEBU 1390 0xc00004fe30 principal matched by identity 0" +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | [11e3 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cf070 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1131 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f6d 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf0480 gate 1598907073768126200 evaluation starts +orderer0.example.com | "2020-08-31 20:52:10.001 UTC [msp.identity] Verify -> DEBU 1391 Verify: digest = 00000000 cc 07 c0 e9 08 a1 53 f6 0a 2a fb a0 84 ea 79 e7 |......S..*....y.| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | [11e4 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cf070 principal matched by identity 0 +peer1.org1.example.com | [1132 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f6e 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf0480 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | 00000010 b2 5d d9 52 81 ed 88 bd 72 7a 47 f9 7c 8c 91 28 |.].R....rzG.|..(|" +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [11e5 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | [f6f 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf0480 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1133 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:10.002 UTC [msp.identity] Verify -> DEBU 1392 Verify: sig = 00000000 30 45 02 21 00 c8 04 a0 81 7e ef 22 17 41 26 bf |0E.!.....~.".A&.| +peer0.org2.example.com | [126c 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12ee0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [f70 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf0480 principal matched by identity 0 +peer1.org1.example.com | [1134 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | 00000010 62 72 4f a5 80 fa c1 16 9b 4a d1 72 7b de 3c 56 |brO......J.r{. DEBU 0xc003b12ee0 gate 1598907078237567900 evaluation succeeds +peer1.org2.example.com | [11e6 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | [f71 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | [1135 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | 00000020 95 69 08 c0 38 02 20 63 06 16 89 77 83 f6 6e f6 |.i..8. c...w..n.| +peer0.org2.example.com | [126e 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [1136 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | 00000030 22 63 46 15 7c 18 5d e6 b7 67 94 e9 7e f6 9b eb |"cF.|.]..g..~...| +peer0.org2.example.com | [126f 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | [f72 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | [1137 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | 00000040 32 2f 96 e4 e1 ab 19 |2/.....|" +peer0.org2.example.com | [1270 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | [1138 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:10.002 UTC [cauthdsl] func2 -> DEBU 1393 0xc00004fe30 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [1271 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | [1139 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387d890 gate 1598907082007726500 evaluation starts +orderer0.example.com | "2020-08-31 20:52:10.002 UTC [cauthdsl] func1 -> DEBU 1394 0xc00004fe30 gate 1598907130000976400 evaluation succeeds" +peer0.org2.example.com | [1272 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | [11e7 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cf070 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | [113a 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387d890 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:10.002 UTC [policies] Evaluate -> DEBU 1395 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [11e8 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cf070 gate 1598907082493290100 evaluation succeeds +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [113b 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387d890 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:10.003 UTC [policies] Evaluate -> DEBU 1396 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [1273 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | [11e9 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [f73 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf0480 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [113c 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387d890 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:10.003 UTC [policies] Evaluate -> DEBU 1397 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | [11ea 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [f74 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf0480 gate 1598907073768126200 evaluation succeeds +peer1.org1.example.com | [113d 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +orderer0.example.com | "2020-08-31 20:52:10.003 UTC [policies] Evaluate -> DEBU 1398 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | [11eb 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [f75 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +orderer0.example.com | "2020-08-31 20:52:10.003 UTC [policies] Evaluate -> DEBU 1399 Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | [11ec 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [f76 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [113e 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +orderer0.example.com | "2020-08-31 20:52:10.003 UTC [policies] Evaluate -> DEBU 139a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [11ed 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | [f77 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +orderer0.example.com | "2020-08-31 20:52:10.004 UTC [common.deliver] deliverBlocks -> DEBU 139b [channel: businesschannel] Received seekInfo (0xc00012cc80) start: > stop: > from 172.18.0.9:50956" +peer0.org2.example.com | [1274 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [f78 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +orderer0.example.com | "2020-08-31 20:52:10.004 UTC [fsblkstorage] Next -> DEBU 139c Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +orderer0.example.com | "2020-08-31 20:52:10.004 UTC [fsblkstorage] newBlockfileStream -> DEBU 139d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93381]" +peer1.org2.example.com | [11ee 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | [f79 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +orderer0.example.com | "2020-08-31 20:52:10.004 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 139e Remaining bytes=[4011], Going to peek [8] bytes" +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [f7a 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +orderer0.example.com | "2020-08-31 20:52:10.005 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 139f Returning blockbytes - length=[4009], placementInfo={fileNum=[0], startOffset=[93381], bytesOffset=[93383]}" +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | [1275 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | [f7b 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [113f 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387d890 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:10.005 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13a0 blockbytes [4009] read from file [0]" +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | [f7c 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1140 08-31 20:51:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00387d890 gate 1598907082007726500 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:10.005 UTC [common.deliver] deliverBlocks -> DEBU 13a1 [channel: businesschannel] Delivering block [5] for (0xc00012cc80) for 172.18.0.9:50956" +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | [f7d 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1141 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:10.005 UTC [common.deliver] deliverBlocks -> DEBU 13a2 [channel: businesschannel] Done delivering to 172.18.0.9:50956 for (0xc00012cc80)" +peer1.org2.example.com | [11ef 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | [f7e 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1142 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:10.006 UTC [fsblkstorage] waitForBlock -> DEBU 13a3 Came out of wait. maxAvailaBlockNumber=[5]" +peer1.org2.example.com | [11f0 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [f7f 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1143 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:10.006 UTC [fsblkstorage] waitForBlock -> DEBU 13a5 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +peer1.org2.example.com | [11f1 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1276 08-31 20:51:18.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f80 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1144 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:10.006 UTC [common.deliver] Handle -> DEBU 13a4 Waiting for new SeekInfo from 172.18.0.9:50956" +peer1.org2.example.com | [11f2 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1277 08-31 20:51:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f81 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1145 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | "2020-08-31 20:52:10.006 UTC [common.deliver] Handle -> DEBU 13a6 Attempting to read seek info message from 172.18.0.9:50956" +peer1.org2.example.com | [11f3 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1278 08-31 20:51:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f82 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | "2020-08-31 20:52:10.015 UTC [grpc] infof -> DEBU 13a7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org2.example.com | [11f4 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1279 08-31 20:51:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [f83 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1146 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | "2020-08-31 20:52:10.015 UTC [common.deliver] Handle -> WARN 13a8 Error reading from 172.18.0.9:50956: rpc error: code = Canceled desc = context canceled" +peer1.org2.example.com | [11f5 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [127a 08-31 20:51:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f84 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +orderer0.example.com | "2020-08-31 20:52:10.016 UTC [orderer.common.server] func1 -> DEBU 13a9 Closing Deliver stream" +peer1.org2.example.com | [11f6 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [127b 08-31 20:51:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [f85 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf19e0 gate 1598907073770569700 evaluation starts +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +orderer0.example.com | "2020-08-31 20:52:10.016 UTC [comm.grpc.server] 1 -> INFO 13aa streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50956 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.6325ms +peer1.org2.example.com | [11f7 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f29c0 gate 1598907082496943800 evaluation starts +peer0.org2.example.com | [127c 08-31 20:51:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [f86 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf19e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +orderer0.example.com | "2020-08-31 20:52:10.096 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ab Sending msg of 28 bytes to 2 on channel businesschannel took 13.5µs" +peer1.org2.example.com | [11f8 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f29c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [127d 08-31 20:51:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [f87 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf19e0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +orderer0.example.com | "2020-08-31 20:52:10.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ac Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +peer1.org2.example.com | [11f9 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f29c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [127e 08-31 20:51:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f88 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf19e0 principal matched by identity 0 +peer1.org1.example.com | [1147 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.3µs " +peer1.org2.example.com | [11fa 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f29c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [127f 08-31 20:51:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [f89 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | [1148 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:10.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.8µs " +peer0.org2.example.com | [1280 08-31 20:51:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [11fb 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f29c0 principal evaluation fails +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [1149 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | "2020-08-31 20:52:10.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13af Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1281 08-31 20:51:18.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [11fc 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f29c0 gate 1598907082496943800 evaluation fails +peer0.org1.example.com | [f8a 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:52:10.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b0 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1282 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [11fd 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | [114a 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:52:10.263 UTC [orderer.common.server] Deliver -> DEBU 13b1 Starting new Deliver handler" +peer0.org2.example.com | [1283 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [11fe 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | [1284 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:10.263 UTC [common.deliver] Handle -> DEBU 13b2 Starting new deliver loop for 172.18.0.9:50958" +peer1.org2.example.com | [11ff 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | [1285 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.263 UTC [common.deliver] Handle -> DEBU 13b3 Attempting to read seek info message from 172.18.0.9:50958" +peer1.org2.example.com | [1200 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f2f30 gate 1598907082497260300 evaluation starts +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | [1286 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:10.265 UTC [policies] Evaluate -> DEBU 13b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | [1201 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f2f30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [f8b 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf19e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [1287 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:10.265 UTC [policies] Evaluate -> DEBU 13b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1202 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f2f30 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [f8c 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf19e0 gate 1598907073770569700 evaluation succeeds +peer1.org1.example.com | [114b 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1288 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +orderer0.example.com | "2020-08-31 20:52:10.265 UTC [policies] Evaluate -> DEBU 13b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org2.example.com | [1203 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f2f30 principal matched by identity 0 +peer0.org1.example.com | [f8d 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [114c 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1289 08-31 20:51:18.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.266 UTC [policies] Evaluate -> DEBU 13b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1204 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | [f8e 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [114d 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:10.266 UTC [policies] Evaluate -> DEBU 13b8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org2.example.com | [128a 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [f8f 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [114e 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:10.266 UTC [msp] DeserializeIdentity -> DEBU 13b9 Obtaining identity" +peer0.org2.example.com | [128b 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 65 08 91 b6 ed 66 90 77 2c 34 b4 c8 ea c6 46 |.e....f.w,4....F| +peer1.org2.example.com | [1205 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | [1150 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [f90 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:10.267 UTC [msp.identity] newIdentity -> DEBU 13ba Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | 00000010 18 9e a4 da dd 15 cb 89 a0 c1 99 76 8e 5e 19 72 |...........v.^.r| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | [f91 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | [114f 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [128c 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 d2 79 26 19 35 5c de fa e4 64 8b |0D. 9.y&.5\...d.| +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [1152 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 5e 41 fe 5c 16 3e ee e4 d9 1e ba 2a 57 8d 57 9b |^A.\.>.....*W.W.| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | [f92 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | [1153 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000020 4e 2a 3f 9a 02 20 44 94 bd ac ee 46 73 66 f4 13 |N*?.. D....Fsf..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +peer1.org1.example.com | [1154 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000030 13 bf 2f 35 4b 8b 50 6f 1d 00 3d d4 2f 93 d8 58 |../5K.Po..=./..X| +peer1.org2.example.com | [1206 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f2f30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | [1151 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 6b ed 5e 8f 59 de |k.^.Y.| +peer1.org2.example.com | [1207 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f2f30 gate 1598907082497260300 evaluation succeeds +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +peer1.org1.example.com | [1156 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [128d 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1208 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +peer1.org1.example.com | [1157 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [128e 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1209 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [f93 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +peer0.org2.example.com | [128f 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [120a 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [f94 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +peer0.org2.example.com | [1290 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer1.org1.example.com | [1158 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [120b 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [f95 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | 0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +peer0.org2.example.com | [1291 08-31 20:51:19.27 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer1.org1.example.com | [1155 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [120c 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | [f96 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | 1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P +peer0.org2.example.com | [1292 08-31 20:51:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer1.org1.example.com | [1159 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [f97 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | +8n2/IwosEtn+wHpdsRI +peer0.org2.example.com | [1293 08-31 20:51:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer1.org1.example.com | [115b 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003899a10 gate 1598907082016473100 evaluation starts +peer1.org2.example.com | [120d 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | [f98 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org2.example.com | [1294 08-31 20:51:19.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer1.org1.example.com | [115c 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003899a10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [f99 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:10.267 UTC [cauthdsl] func1 -> DEBU 13bb 0xc000369ba0 gate 1598907130267567900 evaluation starts" +peer0.org2.example.com | [1295 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [115d 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003899a10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | [f9a 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:10.267 UTC [cauthdsl] func2 -> DEBU 13bc 0xc000369ba0 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [1296 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [115a 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | [f9b 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:10.267 UTC [cauthdsl] func2 -> DEBU 13bd 0xc000369ba0 processing identity 0 with bytes of fe10e0" +peer0.org2.example.com | [1297 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [115e 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [f9c 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:10.267 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 13be Checking if identity satisfies MEMBER role for OrdererMSP" +peer0.org2.example.com | [1298 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [115f 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003899a10 principal matched by identity 0 +peer1.org2.example.com | [120e 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [f9d 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:10.267 UTC [msp] Validate -> DEBU 13bf MSP OrdererMSP validating identity" +peer0.org2.example.com | [1299 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 4c 7a d8 1b 8a 9f d6 1e 22 8b c1 41 b1 fb 53 |BLz......"..A..S| +peer1.org1.example.com | [1160 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | [120f 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [f9e 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:10.267 UTC [msp] getCertificationChain -> DEBU 13c0 MSP OrdererMSP getting certification chain" +peer0.org2.example.com | 00000010 ad 8b c4 d9 af 7a da 60 9b 62 ca dc c4 20 cc 84 |.....z.`.b... ..| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [1210 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | [f9f 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:10.268 UTC [cauthdsl] func2 -> DEBU 13c1 0xc000369ba0 principal matched by identity 0" +peer0.org2.example.com | [129a 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c f2 d8 98 c8 e6 fc b4 42 93 7a 69 |0D. L.......B.zi| +peer1.org1.example.com | [1161 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [fa0 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:10.268 UTC [msp.identity] Verify -> DEBU 13c2 Verify: digest = 00000000 1d 48 57 35 8b ed ac 2b d8 dd b6 61 82 72 cc a2 |.HW5...+...a.r..| +peer0.org2.example.com | 00000010 ed dc 18 ef 86 58 17 3f 0b 24 76 76 43 31 6d 31 |.....X.?.$vvC1m1| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | [1211 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | [fa1 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000010 db 03 d6 a6 eb 7d 39 45 c0 32 36 11 a0 29 0a b3 |.....}9E.26..)..|" +peer0.org2.example.com | 00000020 b2 78 3f 90 02 20 4c 0f f7 d5 18 88 4b 6e 68 65 |.x?.. L.....Knhe| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [fa2 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:10.268 UTC [msp.identity] Verify -> DEBU 13c3 Verify: sig = 00000000 30 45 02 21 00 cc 52 46 ef f3 a8 35 7b 9f 57 01 |0E.!..RF...5{.W.| +peer0.org2.example.com | 00000030 8f 04 04 a6 57 ab a8 28 71 11 18 e8 49 6f 7a 82 |....W..(q...Ioz.| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | [fa3 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | 00000010 c3 cc 5c 5a 02 8a f9 8d 96 14 bf 7b 38 9e 93 60 |..\Z.......{8..`| +peer0.org2.example.com | 00000040 bc 6c 6a d7 f4 92 |.lj...| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | [fa4 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d092d0 gate 1598907073773898500 evaluation starts +orderer0.example.com | 00000020 be a7 bf 00 bd 02 20 2e 2d c7 26 16 e3 e8 95 41 |...... .-.&....A| +peer0.org2.example.com | [129b 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1162 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003899a10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [fa5 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d092d0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | 00000030 7a 8b be 89 13 ad a6 53 a6 9e 0f 0a 64 c7 96 b4 |z......S....d...| +peer0.org2.example.com | [129d 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1163 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003899a10 gate 1598907082016473100 evaluation succeeds +peer1.org2.example.com | [1212 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fa6 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d092d0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | 00000040 01 d2 ad a5 b9 9b 1b |.......|" +peer0.org2.example.com | [129c 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1164 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1213 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fa7 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d092d0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:10.268 UTC [cauthdsl] func2 -> DEBU 13c4 0xc000369ba0 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [129e 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1165 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1214 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [fa8 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +orderer0.example.com | "2020-08-31 20:52:10.268 UTC [cauthdsl] func1 -> DEBU 13c5 0xc000369ba0 gate 1598907130267567900 evaluation succeeds" +peer0.org2.example.com | [129f 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1166 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1215 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +orderer0.example.com | "2020-08-31 20:52:10.268 UTC [policies] Evaluate -> DEBU 13c6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [12a0 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1167 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1216 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [fa9 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +orderer0.example.com | "2020-08-31 20:52:10.268 UTC [policies] Evaluate -> DEBU 13c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [12a1 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1168 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | [1217 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +orderer0.example.com | "2020-08-31 20:52:10.268 UTC [policies] Evaluate -> DEBU 13c8 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org2.example.com | [12a2 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | [1218 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:10.268 UTC [policies] Evaluate -> DEBU 13c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org2.example.com | [12a3 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1169 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | [1219 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:10.268 UTC [policies] Evaluate -> DEBU 13ca Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | [12a4 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [121a 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d0e0 gate 1598907082499032400 evaluation starts +orderer0.example.com | "2020-08-31 20:52:10.268 UTC [policies] Evaluate -> DEBU 13cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [12a5 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | [faa 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d092d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [121b 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d0e0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:10.269 UTC [common.deliver] deliverBlocks -> DEBU 13cc [channel: testchainid] Received seekInfo (0xc000d6fe40) start: > stop: > from 172.18.0.9:50958" +peer0.org2.example.com | [12a6 08-31 20:51:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | [fab 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d092d0 gate 1598907073773898500 evaluation succeeds +peer1.org2.example.com | [121c 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d0e0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:10.269 UTC [fsblkstorage] Next -> DEBU 13cd Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer0.org2.example.com | [12a7 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [fac 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [121d 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d0e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:52:10.269 UTC [fsblkstorage] newBlockfileStream -> DEBU 13ce newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +peer0.org2.example.com | [12a8 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [116a 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fad 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [121e 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d0e0 principal evaluation fails +orderer0.example.com | "2020-08-31 20:52:10.269 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13cf Remaining bytes=[30411], Going to peek [8] bytes" +peer0.org2.example.com | [12a9 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [116b 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fae 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [121f 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d0e0 gate 1598907082499032400 evaluation fails +orderer0.example.com | "2020-08-31 20:52:10.272 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13d0 Returning blockbytes - length=[30408], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +peer0.org2.example.com | [12aa 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [faf 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [116c 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1220 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:10.272 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13d1 blockbytes [30408] read from file [0]" +peer0.org2.example.com | [12ab 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fb0 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | [116d 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1221 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:10.272 UTC [common.deliver] deliverBlocks -> DEBU 13d2 [channel: testchainid] Delivering block [1] for (0xc000d6fe40) for 172.18.0.9:50958" +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [12ac 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [116e 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1222 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:10.272 UTC [common.deliver] deliverBlocks -> DEBU 13d3 [channel: testchainid] Done delivering to 172.18.0.9:50958 for (0xc000d6fe40)" +peer0.org2.example.com | [12ad 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [fb1 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | [116f 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1223 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d650 gate 1598907082499383100 evaluation starts +orderer0.example.com | "2020-08-31 20:52:10.272 UTC [common.deliver] Handle -> DEBU 13d4 Waiting for new SeekInfo from 172.18.0.9:50958" +peer0.org2.example.com | [12ae 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | [1170 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1224 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d650 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:10.272 UTC [common.deliver] Handle -> DEBU 13d5 Attempting to read seek info message from 172.18.0.9:50958" +peer0.org2.example.com | [12af 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | [1171 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1225 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d650 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:10.285 UTC [grpc] infof -> DEBU 13d6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | [12b0 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | [1172 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bb300 gate 1598907082025036800 evaluation starts +peer1.org2.example.com | [1226 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d650 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:10.285 UTC [common.deliver] Handle -> WARN 13d7 Error reading from 172.18.0.9:50958: rpc error: code = Canceled desc = context canceled" +peer0.org2.example.com | [12b1 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [1173 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bb300 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1227 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | "2020-08-31 20:52:10.285 UTC [orderer.common.server] func1 -> DEBU 13d8 Closing Deliver stream" +peer0.org2.example.com | [12b2 08-31 20:51:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fb2 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1174 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bb300 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:52:10.285 UTC [comm.grpc.server] 1 -> INFO 13d9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50958 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.2438ms +peer0.org2.example.com | [12b3 08-31 20:51:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [fb3 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1175 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bb300 principal matched by identity 0 +peer1.org2.example.com | [1228 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:52:10.305 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13da Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [12b4 08-31 20:51:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fb4 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1176 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | "2020-08-31 20:52:10.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13db Sending msg of 28 bytes to 3 on channel testchainid took 8.3µs" +peer0.org2.example.com | [12b5 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [fb5 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | "2020-08-31 20:52:10.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13dc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.7µs " +peer0.org2.example.com | [12b6 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fb6 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1177 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | "2020-08-31 20:52:10.498 UTC [orderer.common.server] Deliver -> DEBU 13dd Starting new Deliver handler" +peer0.org2.example.com | [12b7 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [fb7 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [12b8 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:52:10.498 UTC [common.deliver] Handle -> DEBU 13de Starting new deliver loop for 172.18.0.9:50960" +peer0.org1.example.com | [fb8 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | [1229 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d650 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [12b9 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:10.498 UTC [common.deliver] Handle -> DEBU 13df Attempting to read seek info message from 172.18.0.9:50960" +peer0.org1.example.com | [fb9 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | [122a 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a0d650 gate 1598907082499383100 evaluation succeeds +peer0.org2.example.com | [12ba 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:10.518 UTC [policies] Evaluate -> DEBU 13e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | [fba 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [122b 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [12bb 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:10.518 UTC [policies] Evaluate -> DEBU 13e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [fbb 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1178 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bb300 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [122c 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [12bc 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:10.519 UTC [policies] Evaluate -> DEBU 13e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org1.example.com | [fbc 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1179 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038bb300 gate 1598907082025036800 evaluation succeeds +peer1.org2.example.com | [122d 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [12bd 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:10.519 UTC [policies] Evaluate -> DEBU 13e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [fbd 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34e10 gate 1598907073776263600 evaluation starts +peer1.org1.example.com | [117a 08-31 20:51:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [122e 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [12be 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:10.519 UTC [policies] Evaluate -> DEBU 13e4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | [fbe 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34e10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [117b 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [122f 08-31 20:51:22.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12bf 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:10.519 UTC [cauthdsl] func1 -> DEBU 13e5 0xc000958150 gate 1598907130519393900 evaluation starts" +peer0.org1.example.com | [fbf 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34e10 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [117c 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1230 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12c0 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb54c0 gate 1598907080311794000 evaluation starts +orderer0.example.com | "2020-08-31 20:52:10.519 UTC [cauthdsl] func2 -> DEBU 13e6 0xc000958150 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [fc0 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34e10 principal matched by identity 0 +peer1.org1.example.com | [117d 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1231 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [12c1 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb54c0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:10.519 UTC [cauthdsl] func2 -> DEBU 13e7 0xc000958150 processing identity 0 with bytes of fe10e0" +peer0.org1.example.com | [fc1 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | [117e 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1232 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [12c2 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb54c0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:10.519 UTC [cauthdsl] func2 -> DEBU 13e8 0xc000958150 principal matched by identity 0" +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [117f 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1233 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [12c3 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb54c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:52:10.519 UTC [msp.identity] Verify -> DEBU 13e9 Verify: digest = 00000000 6c b8 6f 55 7b 2e 7a fc 1a b3 b4 2f 74 b9 a4 4a |l.oU{.z..../t..J| +peer0.org1.example.com | [fc2 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | [1180 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1234 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [12c4 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb54c0 principal evaluation fails +orderer0.example.com | 00000010 71 94 96 76 a9 e2 92 d4 f7 3b 89 73 5d 22 cb e7 |q..v.....;.s]"..|" +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | [1181 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1235 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [12c5 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb54c0 gate 1598907080311794000 evaluation fails +orderer0.example.com | "2020-08-31 20:52:10.519 UTC [msp.identity] Verify -> DEBU 13ea Verify: sig = 00000000 30 44 02 20 73 4a 8a 2d a5 33 23 ba fb 27 d3 34 |0D. sJ.-.3#..'.4| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | [1182 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1236 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [12c6 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | 00000010 59 17 c7 4c d2 cd 1c d0 b7 46 a3 6d f1 41 ed 53 |Y..L.....F.m.A.S| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | [1183 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1237 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20850 gate 1598907082500409100 evaluation starts +peer0.org2.example.com | [12c7 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | 00000020 97 69 82 9c 02 20 7f fc 5f e8 56 d7 11 da 9d 78 |.i... .._.V....x| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [1238 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20850 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1184 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [12c8 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | 00000030 8f 9f 89 af bd 08 6e f0 6d 15 3b 68 69 a7 a8 62 |......n.m.;hi..b| +orderer0.example.com | 00000040 99 0c d9 6d 95 10 |...m..|" +orderer0.example.com | "2020-08-31 20:52:10.520 UTC [cauthdsl] func2 -> DEBU 13eb 0xc000958150 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-08-31 20:52:10.520 UTC [cauthdsl] func1 -> DEBU 13ec 0xc000958150 gate 1598907130519393900 evaluation succeeds" +peer0.org1.example.com | [fc3 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34e10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [12c9 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb5a30 gate 1598907080312182600 evaluation starts +orderer0.example.com | "2020-08-31 20:52:10.520 UTC [policies] Evaluate -> DEBU 13ed Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [1185 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1239 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20850 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [fc4 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34e10 gate 1598907073776263600 evaluation succeeds +peer0.org2.example.com | [12ca 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb5a30 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:10.520 UTC [policies] Evaluate -> DEBU 13ee == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [1186 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [123a 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [fc5 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [12cb 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb5a30 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:10.520 UTC [policies] Evaluate -> DEBU 13ef Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org1.example.com | [1187 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [123b 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20850 principal evaluation fails +peer0.org1.example.com | [fc6 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [12cc 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb5a30 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:10.520 UTC [policies] Evaluate -> DEBU 13f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org1.example.com | [1188 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [123c 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20850 gate 1598907082500409100 evaluation fails +peer0.org1.example.com | [fc7 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [12cd 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 4d 1d dd ca 1c c9 e4 80 12 51 aa 7a a4 bb 5d |.M........Q.z..]| +orderer0.example.com | "2020-08-31 20:52:10.520 UTC [policies] Evaluate -> DEBU 13f1 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-08-31 20:52:10.520 UTC [policies] Evaluate -> DEBU 13f2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org1.example.com | [1189 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d6750 gate 1598907082033033600 evaluation starts +peer0.org1.example.com | [fc8 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 86 b7 22 55 be 3d ab 3a 5e 77 7b 7e 19 ed 39 99 |.."U.=.:^w{~..9.| +orderer0.example.com | "2020-08-31 20:52:10.520 UTC [common.deliver] deliverBlocks -> DEBU 13f3 [channel: testchainid] Received seekInfo (0xc000d905c0) start: > stop: > from 172.18.0.9:50960" +peer1.org1.example.com | [118a 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d6750 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [123d 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [fc9 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | [12ce 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 00 df cf e7 48 6a be 12 05 d9 fc 4a |0D. ....Hj.....J| +orderer0.example.com | "2020-08-31 20:52:10.520 UTC [fsblkstorage] Next -> DEBU 13f4 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer1.org1.example.com | [118b 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d6750 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [123e 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | 00000010 c9 a2 be 74 56 35 0f 37 62 29 d8 d5 cd 85 13 7b |...tV5.7b).....{| +orderer0.example.com | "2020-08-31 20:52:10.520 UTC [fsblkstorage] newBlockfileStream -> DEBU 13f5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +peer1.org1.example.com | [118c 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d6750 principal matched by identity 0 +peer1.org2.example.com | [123f 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [fca 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000020 f1 e3 99 bd 02 20 67 02 25 88 aa 82 ba 0f 66 33 |..... g.%.....f3| +orderer0.example.com | "2020-08-31 20:52:10.521 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13f6 Remaining bytes=[30411], Going to peek [8] bytes" +peer1.org1.example.com | [118d 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | [1240 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20dc0 gate 1598907082505178100 evaluation starts +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000030 df a6 19 48 59 ac be 87 fa 94 8c 84 5b 9e 9e e9 |...HY.......[...| +orderer0.example.com | "2020-08-31 20:52:10.521 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13f7 Returning blockbytes - length=[30408], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [1241 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20dc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000040 a0 53 73 e1 0a 19 |.Ss...| +orderer0.example.com | "2020-08-31 20:52:10.521 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13f8 blockbytes [30408] read from file [0]" +peer1.org1.example.com | [118e 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | [1242 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20dc0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | [12cf 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb5a30 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:10.521 UTC [common.deliver] deliverBlocks -> DEBU 13f9 [channel: testchainid] Delivering block [1] for (0xc000d905c0) for 172.18.0.9:50960" +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | [1243 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20dc0 principal matched by identity 0 +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [12d0 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bb5a30 gate 1598907080312182600 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:10.522 UTC [common.deliver] deliverBlocks -> DEBU 13fa [channel: testchainid] Done delivering to 172.18.0.9:50960 for (0xc000d905c0)" +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | [1244 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | [fcb 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | [12d1 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:10.523 UTC [common.deliver] Handle -> DEBU 13fb Waiting for new SeekInfo from 172.18.0.9:50960" +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [12d2 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:10.523 UTC [common.deliver] Handle -> DEBU 13fc Attempting to read seek info message from 172.18.0.9:50960" +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [1245 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | [fcc 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | [12d3 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:10.530 UTC [policies] Evaluate -> DEBU 13fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org1.example.com | [118f 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d6750 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | [12d4 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:10.530 UTC [policies] Evaluate -> DEBU 13fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [1190 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d6750 gate 1598907082033033600 evaluation succeeds +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | [12d5 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:10.530 UTC [policies] Evaluate -> DEBU 13ff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org1.example.com | [1191 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | [12d6 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +orderer0.example.com | "2020-08-31 20:52:10.530 UTC [policies] Evaluate -> DEBU 1400 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [1192 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [12d7 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +orderer0.example.com | "2020-08-31 20:52:10.530 UTC [policies] Evaluate -> DEBU 1401 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org1.example.com | [1193 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1246 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20dc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [12d8 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [fcd 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:10.530 UTC [cauthdsl] func1 -> DEBU 1402 0xc00096e720 gate 1598907130530798900 evaluation starts" +peer1.org1.example.com | [1194 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1247 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a20dc0 gate 1598907082505178100 evaluation succeeds +peer0.org2.example.com | [12d9 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [fce 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:10.530 UTC [cauthdsl] func2 -> DEBU 1403 0xc00096e720 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [1195 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | [1248 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [12da 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fcf 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:10.531 UTC [cauthdsl] func2 -> DEBU 1404 0xc00096e720 processing identity 0 with bytes of fe10e0" +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [1249 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [12db 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fd0 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:10.531 UTC [cauthdsl] func2 -> DEBU 1405 0xc00096e720 principal matched by identity 0" +peer1.org1.example.com | [1196 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | [124a 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [12dc 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fd1 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:10.531 UTC [msp.identity] Verify -> DEBU 1406 Verify: digest = 00000000 4b c1 9c e9 62 ed 8d 23 ab 0e 27 e8 d7 e9 81 f8 |K...b..#..'.....| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | [124b 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [12dd 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [fd2 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | 00000010 d5 61 55 2d 67 a1 24 be 7f 89 9a 38 b8 b5 98 eb |.aU-g.$....8....|" +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | [124c 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [12de 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fd3 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:10.531 UTC [msp.identity] Verify -> DEBU 1407 Verify: sig = 00000000 30 44 02 20 40 df 18 43 d6 17 5c 95 de 35 4c 55 |0D. @..C..\..5LU| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [12df 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [fd4 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | 00000010 f3 f6 43 aa 90 0c b7 04 a6 d6 6b 4d 91 ac 1c 22 |..C.......kM..."| +orderer0.example.com | 00000020 c8 8e b9 0d 02 20 16 20 77 a0 75 97 b0 92 bc f5 |..... . w.u.....| +peer1.org2.example.com | [124d 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | [12e0 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fd5 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4edf0 gate 1598907073778261600 evaluation starts +orderer0.example.com | 00000030 0c 05 cc 9e 81 6f 41 48 27 52 68 64 50 d9 15 bc |.....oAH'RhdP...| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [12e1 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fd6 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4edf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | 00000040 8d d4 be f6 9e 42 |.....B|" +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | [fd7 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4edf0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [fd8 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4edf0 principal matched by identity 0 +peer1.org1.example.com | [1197 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [12e2 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fd9 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | "2020-08-31 20:52:10.531 UTC [cauthdsl] func2 -> DEBU 1408 0xc00096e720 principal evaluation succeeds for identity 0" +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [12e3 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [1198 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | "2020-08-31 20:52:10.531 UTC [cauthdsl] func1 -> DEBU 1409 0xc00096e720 gate 1598907130530798900 evaluation succeeds" +peer1.org2.example.com | [124e 08-31 20:51:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12e4 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [fda 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +orderer0.example.com | "2020-08-31 20:52:10.531 UTC [policies] Evaluate -> DEBU 140a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [124f 08-31 20:51:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12e5 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +orderer0.example.com | "2020-08-31 20:52:10.532 UTC [policies] Evaluate -> DEBU 140b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [1250 08-31 20:51:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [12e6 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +orderer0.example.com | "2020-08-31 20:52:10.532 UTC [policies] Evaluate -> DEBU 140c Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org2.example.com | [1251 08-31 20:51:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [12e7 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [1252 08-31 20:51:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:10.532 UTC [policies] Evaluate -> DEBU 140d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org2.example.com | [12e8 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [1199 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1253 08-31 20:51:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:10.532 UTC [policies] Evaluate -> DEBU 140e Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | [12e9 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fdb 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4edf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [119a 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1254 08-31 20:51:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:10.532 UTC [policies] Evaluate -> DEBU 140f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [12ea 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [fdc 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4edf0 gate 1598907073778261600 evaluation succeeds +peer1.org1.example.com | [119b 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1255 08-31 20:51:22.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:10.532 UTC [common.deliver] deliverBlocks -> DEBU 1410 [channel: testchainid] Received seekInfo (0xc00012d580) start: > stop: > from 172.18.0.9:50960" +peer0.org2.example.com | [12eb 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [fdd 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [119c 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1256 08-31 20:51:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.532 UTC [fsblkstorage] Next -> DEBU 1411 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer0.org2.example.com | [12ec 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fde 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [119d 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1257 08-31 20:51:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:10.533 UTC [fsblkstorage] newBlockfileStream -> DEBU 1412 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +peer0.org2.example.com | [12ed 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fdf 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [119e 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1258 08-31 20:51:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:10.533 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1413 Remaining bytes=[53341], Going to peek [8] bytes" +peer0.org2.example.com | [12ee 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [fe0 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [119f 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1259 08-31 20:51:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:10.533 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1414 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer0.org1.example.com | [fe1 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12ef 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [11a0 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [125a 08-31 20:51:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.533 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1415 blockbytes [22927] read from file [0]" +peer0.org1.example.com | [fe2 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [12f0 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11a1 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fa730 gate 1598907082039227800 evaluation starts +peer1.org2.example.com | [125b 08-31 20:51:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +orderer0.example.com | "2020-08-31 20:52:10.534 UTC [common.deliver] deliverBlocks -> DEBU 1416 [channel: testchainid] Delivering block [0] for (0xc00012d580) for 172.18.0.9:50960" +peer0.org1.example.com | [fe3 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [12f1 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [125c 08-31 20:51:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org1.example.com | [11a2 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fa730 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:10.534 UTC [common.deliver] deliverBlocks -> DEBU 1417 [channel: testchainid] Done delivering to 172.18.0.9:50960 for (0xc00012d580)" +peer0.org1.example.com | [fe4 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [12f2 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [125d 08-31 20:51:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [11a3 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fa730 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:10.534 UTC [common.deliver] Handle -> DEBU 1418 Waiting for new SeekInfo from 172.18.0.9:50960" +peer0.org1.example.com | [fe5 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org2.example.com | [12f3 08-31 20:51:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [125e 08-31 20:51:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D981610061801 +orderer0.example.com | "2020-08-31 20:52:10.534 UTC [common.deliver] Handle -> DEBU 1419 Attempting to read seek info message from 172.18.0.9:50960" +peer0.org1.example.com | [fe6 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [fe7 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [125f 08-31 20:51:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 658279680E90BD837613C0AE5A6C73E3725E16220B1FF06637B9207CADB6EDAE +peer1.org1.example.com | [11a4 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fa730 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:10.547 UTC [grpc] infof -> DEBU 141a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | [fe8 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610041801 +peer0.org2.example.com | [12f4 08-31 20:51:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816101A +peer1.org2.example.com | [1260 08-31 20:51:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org1.example.com | [11a5 08-31 20:51:22.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | "2020-08-31 20:52:10.547 UTC [common.deliver] Handle -> WARN 141b Error reading from 172.18.0.9:50960: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | [fe9 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 65E08FD1E24ED6E36AE854D0A3BB1E5BA9F7FB13C1EE557441806586FFC9E822 +peer0.org2.example.com | [12f5 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1458D4EA296A970B2D01C05FF5748EF00B2F607D526EA72F3587982F222C8BBB +peer1.org2.example.com | [1261 08-31 20:51:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +orderer0.example.com | "2020-08-31 20:52:10.548 UTC [orderer.common.server] func1 -> DEBU 141c Closing Deliver stream" +peer0.org2.example.com | [12f6 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [fea 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer1.org2.example.com | [1262 08-31 20:51:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11a6 08-31 20:51:22.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | "2020-08-31 20:52:10.548 UTC [comm.grpc.server] 1 -> INFO 141d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50960 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=50.3003ms +peer0.org2.example.com | [12f7 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [feb 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1263 08-31 20:51:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +orderer0.example.com | "2020-08-31 20:52:10.596 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141e Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +peer0.org2.example.com | [12f8 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | [fec 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1264 08-31 20:51:24.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | "2020-08-31 20:52:10.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141f Sending msg of 28 bytes to 3 on channel businesschannel took 9µs" +peer0.org2.example.com | [12f9 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [fed 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1265 08-31 20:51:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +orderer0.example.com | "2020-08-31 20:52:10.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1420 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79µs " +peer0.org2.example.com | [12fa 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fee 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1266 08-31 20:51:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +orderer0.example.com | "2020-08-31 20:52:10.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1421 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 178.8µs " +peer0.org2.example.com | [12fb 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fef 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1267 08-31 20:51:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11a7 08-31 20:51:22.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fa730 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:10.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1422 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [12fc 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ff0 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11a8 08-31 20:51:22.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038fa730 gate 1598907082039227800 evaluation succeeds +peer1.org2.example.com | [1268 08-31 20:51:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:10.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1423 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [12fd 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [ff1 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11a9 08-31 20:51:22.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1269 08-31 20:51:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.676 UTC [orderer.common.server] Deliver -> DEBU 1424 Starting new Deliver handler" +peer0.org2.example.com | [12fe 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [ff2 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [11aa 08-31 20:51:22.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [126a 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:10.676 UTC [common.deliver] Handle -> DEBU 1425 Starting new deliver loop for 172.18.0.9:50962" +peer0.org2.example.com | [12ff 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [ff3 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11ab 08-31 20:51:22.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [126b 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:10.676 UTC [common.deliver] Handle -> DEBU 1426 Attempting to read seek info message from 172.18.0.9:50962" +peer0.org2.example.com | [1300 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ff4 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [11ac 08-31 20:51:22.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [126c 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:10.677 UTC [policies] Evaluate -> DEBU 1427 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org2.example.com | [1301 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [ff5 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11ad 08-31 20:51:22.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [126d 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:10.677 UTC [policies] Evaluate -> DEBU 1428 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [1302 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [ff6 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11ae 08-31 20:51:22.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [126e 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:10.677 UTC [policies] Evaluate -> DEBU 1429 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org2.example.com | [1303 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [ff7 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11af 08-31 20:51:22.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [126f 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:10.677 UTC [policies] Evaluate -> DEBU 142a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [1304 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [ff8 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [11b0 08-31 20:51:22.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1270 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:10.677 UTC [policies] Evaluate -> DEBU 142b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org2.example.com | [1306 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ff9 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [11b1 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1271 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.677 UTC [cauthdsl] func1 -> DEBU 142c 0xc0009e0de0 gate 1598907130677645100 evaluation starts" +peer0.org2.example.com | [1305 08-31 20:51:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ffa 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | [11b2 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1272 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:10.677 UTC [cauthdsl] func2 -> DEBU 142d 0xc0009e0de0 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [1307 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [ffb 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11b3 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1273 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.677 UTC [cauthdsl] func2 -> DEBU 142e 0xc0009e0de0 processing identity 0 with bytes of fe10e0" +peer0.org2.example.com | [1308 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [ffc 08-31 20:51:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [11b4 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1274 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:10.678 UTC [cauthdsl] func2 -> DEBU 142f 0xc0009e0de0 principal matched by identity 0" +peer0.org2.example.com | [1309 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [ffd 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [11b5 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1275 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.678 UTC [msp.identity] Verify -> DEBU 1430 Verify: digest = 00000000 f8 20 77 7b 2e ea 6d b9 08 38 81 13 22 78 ae 17 |. w{..m..8.."x..| +peer0.org2.example.com | [130a 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [ffe 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11b6 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1276 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | 00000010 33 4c 1b 9c 48 93 11 c3 95 90 3d a8 6f 59 55 b2 |3L..H.....=.oYU.|" +peer0.org2.example.com | [130b 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [fff 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11b7 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1277 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:10.678 UTC [msp.identity] Verify -> DEBU 1431 Verify: sig = 00000000 30 44 02 20 65 93 58 a9 24 d2 42 3f c3 ce 66 71 |0D. e.X.$.B?..fq| +peer0.org1.example.com | [1000 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [130c 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [11b8 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1278 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | 00000010 2a a0 46 62 3f 92 28 f5 87 31 63 51 83 55 38 82 |*.Fb?.(..1cQ.U8.| +peer0.org1.example.com | [1001 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [130d 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11b9 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1279 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000020 87 fd e6 c3 02 20 16 99 16 ad 72 7d ac 67 62 9c |..... ....r}.gb.| +peer0.org1.example.com | [1002 08-31 20:51:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [130e 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11ba 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [127a 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | 00000030 8e 55 71 72 96 c8 d8 a6 77 8b b0 ce d0 76 85 a3 |.Uqr....w....v..| +peer0.org1.example.com | [1003 08-31 20:51:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [130f 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [11bb 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [127b 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | 00000040 5e 2a 6c 78 61 4f |^*lxaO|" +peer0.org1.example.com | [1004 08-31 20:51:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1310 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [11bc 08-31 20:51:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org2.example.com | [127c 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:10.678 UTC [cauthdsl] func2 -> DEBU 1432 0xc0009e0de0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | [1005 08-31 20:51:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1311 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [11bd 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org2.example.com | [127d 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.678 UTC [cauthdsl] func1 -> DEBU 1433 0xc0009e0de0 gate 1598907130677645100 evaluation succeeds" +peer0.org1.example.com | [1006 08-31 20:51:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1312 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031025d0 gate 1598907080548148100 evaluation starts +peer1.org1.example.com | [11be 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org2.example.com | [127e 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:10.678 UTC [policies] Evaluate -> DEBU 1434 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | [1007 08-31 20:51:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1313 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031025d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [11bf 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [127f 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:10.678 UTC [policies] Evaluate -> DEBU 1435 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | [1008 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1314 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031025d0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [11c0 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [1280 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.678 UTC [policies] Evaluate -> DEBU 1436 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org1.example.com | [1009 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1315 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031025d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [11c1 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 72 e3 55 2c 57 e9 ce 80 00 d9 dd 85 0f a1 95 |9r.U,W..........| +peer1.org2.example.com | [1281 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:52:10.679 UTC [policies] Evaluate -> DEBU 1437 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org1.example.com | [100a 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1316 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031025d0 principal evaluation fails +peer1.org1.example.com | 00000010 1a f6 37 4f 50 21 ce da 02 7f 6b 0f 0c b7 3d cb |..7OP!....k...=.| +peer1.org2.example.com | [1282 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D9816101E +orderer0.example.com | "2020-08-31 20:52:10.679 UTC [policies] Evaluate -> DEBU 1438 Signature set satisfies policy /Channel/Readers" +peer0.org1.example.com | [100b 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1317 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031025d0 gate 1598907080548148100 evaluation fails +peer1.org1.example.com | [11c2 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 f6 ae 86 ff 12 11 46 43 d6 55 |0E.!........FC.U| +peer1.org2.example.com | [1283 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2D78B156215482A3159F6587704E71EE6EAF81E5066113203FBC5441A36CBE75 +orderer0.example.com | "2020-08-31 20:52:10.679 UTC [policies] Evaluate -> DEBU 1439 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org1.example.com | [100c 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1318 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 f2 c3 e7 b9 0f 74 40 de 46 7f 4d 0d f1 ee 7c b9 |.....t@.F.M...|.| +peer1.org2.example.com | [1284 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:52:10.679 UTC [common.deliver] deliverBlocks -> DEBU 143a [channel: testchainid] Received seekInfo (0xc000d90c80) start: > stop: > from 172.18.0.9:50962" +peer0.org1.example.com | [100d 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1319 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 3c 16 26 a4 65 02 20 28 b1 37 a4 61 f1 a3 bb 40 |<.&.e. (.7.a...@| +peer1.org2.example.com | [1285 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-08-31 20:52:10.679 UTC [fsblkstorage] Next -> DEBU 143b Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer0.org2.example.com | [131a 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [100e 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000030 10 52 4f ee 50 72 32 4d 65 f7 56 81 52 51 66 67 |.RO.Pr2Me.V.RQfg| +peer1.org2.example.com | [1286 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | [131b 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003102b40 gate 1598907080549501300 evaluation starts +orderer0.example.com | "2020-08-31 20:52:10.679 UTC [fsblkstorage] newBlockfileStream -> DEBU 143c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +peer0.org1.example.com | [100f 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000040 06 26 21 68 85 88 d0 |.&!h...| +peer1.org2.example.com | [1287 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [131c 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003102b40 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:10.679 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 143d Remaining bytes=[53341], Going to peek [8] bytes" +peer0.org1.example.com | [1010 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [11c3 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1289 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D9816101F +peer0.org2.example.com | [131d 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003102b40 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:10.679 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 143e Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer0.org1.example.com | [1011 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [11c4 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [128a 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C5A341C5D2D4ABCC1AC69F727914FCEF86152B54C239730FA4FA823E2DEAE4F5 +peer0.org2.example.com | [131e 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003102b40 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:10.679 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 143f blockbytes [22927] read from file [0]" +peer0.org1.example.com | [1012 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [11c5 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [128b 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [131f 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 9f 1a a0 03 6c 05 e9 99 7d d1 3b 72 bf 81 09 |.....l...}.;r...| +orderer0.example.com | "2020-08-31 20:52:10.680 UTC [common.deliver] deliverBlocks -> DEBU 1440 [channel: testchainid] Delivering block [0] for (0xc000d90c80) for 172.18.0.9:50962" +peer0.org1.example.com | [1013 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [11c6 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org2.example.com | [128c 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | 00000010 35 b9 62 8e 3c a3 9f 71 78 cb 17 fd 02 52 ef bb |5.b.<..qx....R..| +orderer0.example.com | "2020-08-31 20:52:10.680 UTC [common.deliver] deliverBlocks -> DEBU 1441 [channel: testchainid] Done delivering to 172.18.0.9:50962 for (0xc000d90c80)" +peer0.org1.example.com | [1014 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75890 gate 1598907075040390000 evaluation starts +peer1.org1.example.com | [11c7 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1288 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1320 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 5e ee 36 82 91 bb 81 3d 78 1c 0c |0D. h^.6....=x..| +orderer0.example.com | "2020-08-31 20:52:10.680 UTC [common.deliver] Handle -> DEBU 1442 Waiting for new SeekInfo from 172.18.0.9:50962" +peer0.org1.example.com | [1015 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75890 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [11c8 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [128d 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | 00000010 f2 9b 75 3b d5 44 c0 b6 2c 37 fb 34 e4 ec c3 41 |..u;.D..,7.4...A| +orderer0.example.com | "2020-08-31 20:52:10.680 UTC [common.deliver] Handle -> DEBU 1443 Attempting to read seek info message from 172.18.0.9:50962" +peer0.org1.example.com | [1016 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75890 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [11c9 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [128f 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 67 88 75 a5 02 20 26 d9 d1 38 b0 36 97 15 5b fe |g.u.. &..8.6..[.| +orderer0.example.com | "2020-08-31 20:52:10.687 UTC [grpc] infof -> DEBU 1444 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | [1017 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75890 principal matched by identity 0 +peer1.org1.example.com | [11ca 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1291 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 db 92 b4 8d 5f c1 90 eb ff 7d 35 0a 92 68 b2 a8 |...._....}5..h..| +orderer0.example.com | "2020-08-31 20:52:10.687 UTC [common.deliver] Handle -> WARN 1445 Error reading from 172.18.0.9:50962: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | [1018 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 c6 fb 04 b1 1e 80 82 72 6e bf d9 28 84 cf 03 |........rn..(...| +peer1.org1.example.com | [11cb 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1290 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | 00000040 c2 22 3e 05 c7 e0 |.">...| +orderer0.example.com | "2020-08-31 20:52:10.687 UTC [orderer.common.server] func1 -> DEBU 1446 Closing Deliver stream" +peer0.org1.example.com | 00000010 0e 80 24 0c ba b4 14 1a 78 3f 46 4e 70 66 38 e5 |..$.....x?FNpf8.| +peer1.org1.example.com | [11cc 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [128e 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1321 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003102b40 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:10.687 UTC [comm.grpc.server] 1 -> INFO 1447 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50962 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.2299ms +peer0.org1.example.com | [1019 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d f5 02 25 29 ca 0d 64 ab d7 23 cc |0D. }..%)..d..#.| +peer1.org1.example.com | [11cd 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1292 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1322 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003102b40 gate 1598907080549501300 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:10.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1448 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | 00000010 ca 13 e4 4a bd 7f f8 de 48 ca 70 22 62 6c 6b 06 |...J....H.p"blk.| +peer1.org2.example.com | [1293 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [11ce 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1323 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:10.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1449 Sending msg of 28 bytes to 3 on channel testchainid took 10.5µs" +peer0.org1.example.com | 00000020 02 dc 34 52 02 20 0e cd 6e 16 69 05 64 06 a6 4e |..4R. ..n.i.d..N| +peer1.org2.example.com | [1294 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11cf 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1324 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:10.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 280.2µs " +peer0.org1.example.com | 00000030 af 00 35 af 03 26 e1 bb 33 ff 38 84 c0 00 53 37 |..5..&..3.8...S7| +peer1.org2.example.com | [1295 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11d0 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1325 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:10.862 UTC [orderer.common.server] Deliver -> DEBU 144b Starting new Deliver handler" +peer0.org1.example.com | 00000040 86 f9 8a 35 5d a0 |...5].| +peer1.org2.example.com | [1296 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [11d1 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1326 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:10.862 UTC [common.deliver] Handle -> DEBU 144c Starting new deliver loop for 172.18.0.9:50964" +peer0.org1.example.com | [101a 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75890 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1297 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [11d2 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1327 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:10.862 UTC [common.deliver] Handle -> DEBU 144d Attempting to read seek info message from 172.18.0.9:50964" +peer0.org1.example.com | [101b 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75890 gate 1598907075040390000 evaluation succeeds +peer1.org2.example.com | [1298 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11d3 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1328 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-08-31 20:52:10.863 UTC [policies] Evaluate -> DEBU 144e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | [101c 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1299 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11d4 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1329 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:10.863 UTC [policies] Evaluate -> DEBU 144f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [101d 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [129b 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [11d5 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [132a 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:10.863 UTC [policies] Evaluate -> DEBU 1450 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org1.example.com | [101e 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [129d 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [11d6 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [132b 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:10.863 UTC [policies] Evaluate -> DEBU 1451 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [101f 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [129e 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11d7 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [132c 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.863 UTC [policies] Evaluate -> DEBU 1452 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | [1020 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [129f 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [11d8 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [132d 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.863 UTC [cauthdsl] func1 -> DEBU 1453 0xc000431c60 gate 1598907130863950100 evaluation starts" +peer0.org1.example.com | [1021 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [12a0 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [11d9 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [132e 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.863 UTC [cauthdsl] func2 -> DEBU 1454 0xc000431c60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [1022 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [12a1 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 78 b1 56 21 54 82 a3 15 9f 65 87 70 4e 71 ee |-x.V!T....e.pNq.| +peer1.org1.example.com | [11da 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [132f 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:10.864 UTC [cauthdsl] func2 -> DEBU 1455 0xc000431c60 processing identity 0 with bytes of fe10e0" +peer0.org1.example.com | [1023 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | 00000010 6e af 81 e5 06 61 13 20 3f bc 54 41 a3 6c be 75 |n....a. ?.TA.l.u| +peer1.org1.example.com | [11db 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1330 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:10.864 UTC [cauthdsl] func2 -> DEBU 1456 0xc000431c60 principal matched by identity 0" +peer0.org1.example.com | [1024 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [12a2 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d3 7c e4 56 2b ee 75 a3 62 76 1a |0D. x.|.V+.u.bv.| +peer1.org1.example.com | [11dc 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039139f0 gate 1598907085042771200 evaluation starts +peer0.org2.example.com | [1331 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:10.864 UTC [msp.identity] Verify -> DEBU 1457 Verify: digest = 00000000 73 26 10 59 cc 4f 90 b8 f2 09 88 63 d8 f2 13 1b |s&.Y.O.....c....| +peer0.org1.example.com | [1025 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 69 cf fc d2 08 bc 7a 74 86 c5 04 e4 6d db 11 a7 |i.....zt....m...| +peer1.org1.example.com | [11dd 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039139f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1332 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000010 cf 8a 5f fa a3 90 d5 c9 8f bc e1 8c 15 5c 15 68 |.._..........\.h|" +peer0.org1.example.com | [1026 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 76 7a ac 35 02 20 4a f3 65 b0 31 3a 0f 41 a1 22 |vz.5. J.e.1:.A."| +peer1.org1.example.com | [11de 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039139f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1333 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:10.864 UTC [msp.identity] Verify -> DEBU 1458 Verify: sig = 00000000 30 45 02 21 00 e7 7d 70 5e 0d a0 08 1f bb f7 5f |0E.!..}p^......_| +peer0.org1.example.com | [1027 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 f9 b6 7b c1 e2 07 d5 b7 07 18 82 4a b3 4a 83 e0 |..{........J.J..| +peer1.org1.example.com | [11df 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039139f0 principal matched by identity 0 +peer0.org2.example.com | [1334 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000010 4a c9 2b 7c 89 b0 0f e7 c6 06 4d 2d e5 69 ae 3f |J.+|......M-.i.?| +peer0.org1.example.com | [1028 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000040 d6 f4 9b 74 25 1b |...t%.| +peer1.org1.example.com | [11e0 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 78 b1 56 21 54 82 a3 15 9f 65 87 70 4e 71 ee |-x.V!T....e.pNq.| +peer0.org2.example.com | [1335 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000020 e3 b3 1e bb 49 02 20 33 af f3 26 ba c1 06 f2 b9 |....I. 3..&.....| +peer0.org1.example.com | [1029 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12a3 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 6e af 81 e5 06 61 13 20 3f bc 54 41 a3 6c be 75 |n....a. ?.TA.l.u| +peer0.org2.example.com | [1336 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | 00000030 b3 d2 14 d7 ce 52 b6 31 54 3e 29 c6 f0 5b c9 06 |.....R.1T>)..[..| +peer0.org1.example.com | [102a 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12a4 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [11e1 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d3 7c e4 56 2b ee 75 a3 62 76 1a |0D. x.|.V+.u.bv.| +peer0.org2.example.com | [1337 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000040 70 e0 63 b3 67 5b 85 |p.c.g[.|" +peer0.org1.example.com | [102b 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12a5 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 69 cf fc d2 08 bc 7a 74 86 c5 04 e4 6d db 11 a7 |i.....zt....m...| +peer0.org2.example.com | [1338 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:10.864 UTC [cauthdsl] func2 -> DEBU 1459 0xc000431c60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | [102c 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12a6 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | 00000020 76 7a ac 35 02 20 4a f3 65 b0 31 3a 0f 41 a1 22 |vz.5. J.e.1:.A."| +peer0.org2.example.com | [1339 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:10.864 UTC [cauthdsl] func1 -> DEBU 145a 0xc000431c60 gate 1598907130863950100 evaluation succeeds" +peer0.org1.example.com | [102d 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12a7 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 f9 b6 7b c1 e2 07 d5 b7 07 18 82 4a b3 4a 83 e0 |..{........J.J..| +peer0.org2.example.com | [133a 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.864 UTC [policies] Evaluate -> DEBU 145b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [12a8 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [102e 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 d6 f4 9b 74 25 1b |...t%.| +peer0.org2.example.com | [133b 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:10.864 UTC [policies] Evaluate -> DEBU 145c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [129c 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [102f 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11e2 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039139f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [133c 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.865 UTC [policies] Evaluate -> DEBU 145d Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org2.example.com | [12a9 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1030 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11e3 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039139f0 gate 1598907085042771200 evaluation succeeds +peer0.org2.example.com | [133d 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:10.865 UTC [policies] Evaluate -> DEBU 145e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org2.example.com | [12aa 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1031 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11e4 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [133e 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.865 UTC [policies] Evaluate -> DEBU 145f Signature set satisfies policy /Channel/Readers" +peer1.org2.example.com | [12ab 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1032 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11e5 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [133f 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:10.865 UTC [policies] Evaluate -> DEBU 1460 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org2.example.com | [12ac 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1033 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [11e6 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1340 08-31 20:51:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.865 UTC [common.deliver] deliverBlocks -> DEBU 1461 [channel: testchainid] Received seekInfo (0xc000d91400) start: > stop: > from 172.18.0.9:50964" +peer0.org1.example.com | [1034 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [11e7 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1341 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:10.865 UTC [fsblkstorage] Next -> DEBU 1462 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer1.org2.example.com | [12ad 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1035 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1342 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11e8 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:10.865 UTC [fsblkstorage] newBlockfileStream -> DEBU 1463 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +peer1.org2.example.com | [12ae 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1036 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1343 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [11e9 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-08-31 20:52:10.866 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1464 Remaining bytes=[30411], Going to peek [8] bytes" +peer1.org2.example.com | [12af 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1037 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1344 08-31 20:51:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11ea 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:10.866 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1465 Returning blockbytes - length=[30408], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +peer1.org2.example.com | [129a 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [1038 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1345 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [11eb 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:10.866 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1466 blockbytes [30408] read from file [0]" +peer1.org2.example.com | [12b0 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [1039 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1346 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [11ec 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:10.866 UTC [common.deliver] deliverBlocks -> DEBU 1467 [channel: testchainid] Delivering block [1] for (0xc000d91400) for 172.18.0.9:50964" +peer1.org2.example.com | [12b1 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [103a 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1347 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [11ed 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.866 UTC [common.deliver] deliverBlocks -> DEBU 1468 [channel: testchainid] Done delivering to 172.18.0.9:50964 for (0xc000d91400)" +peer1.org2.example.com | [12b2 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [103b 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1348 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11ee 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.866 UTC [common.deliver] Handle -> DEBU 1469 Waiting for new SeekInfo from 172.18.0.9:50964" +peer1.org2.example.com | [12b3 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [103c 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1349 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [11ef 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.866 UTC [common.deliver] Handle -> DEBU 146a Attempting to read seek info message from 172.18.0.9:50964" +peer1.org2.example.com | [12b4 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [103d 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [134a 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [11f0 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org2.example.com | [12b5 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:10.874 UTC [grpc] infof -> DEBU 146b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | [103e 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [134b 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [11f1 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12b6 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:10.874 UTC [common.deliver] Handle -> WARN 146c Error reading from 172.18.0.9:50964: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | [103f 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [134c 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [11f2 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12b7 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:10.874 UTC [orderer.common.server] func1 -> DEBU 146d Closing Deliver stream" +peer0.org1.example.com | [1040 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [134d 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df de a9 43 65 43 25 6a a9 bb 70 39 02 4a c3 d1 |...CeC%j..p9.J..| +peer1.org1.example.com | [11f3 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12b8 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:10.875 UTC [comm.grpc.server] 1 -> INFO 146e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50964 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.7893ms +peer0.org1.example.com | [1041 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 91 a5 f0 a4 db 56 e5 75 fe af c3 2e 3a b6 9e 72 |.....V.u....:..r| +peer1.org1.example.com | [11f4 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [12b9 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:11.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 146f Sending msg of 28 bytes to 2 on channel businesschannel took 52.4µs" +peer0.org1.example.com | [1042 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [134e 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 a3 4c 3c b8 49 5b c9 1f 66 87 44 |0D. R.L<.I[..f.D| +peer1.org2.example.com | [12ba 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab86c0 gate 1598907085056894000 evaluation starts +orderer0.example.com | "2020-08-31 20:52:11.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1470 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 239.3µs " +peer0.org1.example.com | [1043 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 74 b0 06 ce c2 7f fa 34 95 97 c9 2a 7d 70 83 |.t......4...*}p.| +peer0.org2.example.com | 00000010 c0 f8 5c 9d 06 ba d4 5e cc ac 06 f6 41 41 44 00 |..\....^....AAD.| +peer1.org1.example.com | [11f5 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [12bb 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab86c0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:11.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1471 Sending msg of 28 bytes to 3 on channel businesschannel took 554.4µs" +peer0.org1.example.com | 00000010 79 ff fb 88 19 6d b1 4c bb b7 43 c7 ef ae 4d f1 |y....m.L..C...M.| +peer0.org2.example.com | 00000020 58 b4 5d ed 02 20 38 4f fb 61 35 b5 8a 69 7d 8a |X.].. 8O.a5..i}.| +peer1.org1.example.com | [11f6 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [12bc 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab86c0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:11.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1472 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1044 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 3b 65 7b 43 94 98 d4 c8 84 d0 34 |0D. h;e{C......4| +peer0.org2.example.com | 00000030 c1 4e 97 95 22 c4 50 ea f5 c9 87 09 42 66 f8 90 |.N..".P.....Bf..| +peer1.org1.example.com | [11f7 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12bd 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab86c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:52:11.100 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1473 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.1µs " +peer0.org1.example.com | 00000010 be 0c 38 1e 49 55 8b 2d e7 57 78 c4 72 4e c7 dd |..8.IU.-.Wx.rN..| +peer0.org2.example.com | 00000040 06 15 8a 5e 70 be |...^p.| +peer1.org1.example.com | [11f8 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12be 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab86c0 principal evaluation fails +orderer0.example.com | "2020-08-31 20:52:11.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1474 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000020 2a 04 1e d7 02 20 3a 9c a0 d5 4e cc 45 3e 65 8b |*.... :...N.E>e.| +peer0.org2.example.com | [134f 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | [11f9 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12bf 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab86c0 gate 1598907085056894000 evaluation fails +orderer0.example.com | "2020-08-31 20:52:11.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1475 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | 00000030 8b 16 ac f4 52 05 d2 6f e7 64 58 78 8c 04 5e a5 |....R..o.dXx..^.| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org1.example.com | [11fa 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12c0 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:11.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1476 Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +peer0.org1.example.com | 00000040 3a d1 88 c7 52 c1 |:...R.| +peer0.org2.example.com | [1350 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 66 79 b3 0b 51 1b 53 00 cc 27 |0E.!..fy..Q.S..'| +peer1.org1.example.com | [11fb 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [12c1 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:11.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1477 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.4µs " +peer0.org1.example.com | [1045 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 84 b9 79 14 6f f0 a8 42 46 77 25 9e d4 1e 17 a9 |..y.o..BFw%.....| +peer1.org1.example.com | [11fc 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12c2 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:11.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1478 Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +peer0.org1.example.com | [1046 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | 00000020 64 b6 71 89 30 02 20 57 48 fb b0 4c 2f 4b bc 32 |d.q.0. WH..L/K.2| +peer1.org2.example.com | [12c3 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab8c30 gate 1598907085069823200 evaluation starts +peer1.org1.example.com | [11fd 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:11.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1479 Sending msg of 28 bytes to 3 on channel businesschannel took 18.8µs" +peer0.org1.example.com | [1047 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000030 06 1b b6 aa 5b 87 b7 a9 92 53 32 f4 83 f6 22 b3 |....[....S2...".| +peer1.org2.example.com | [12c4 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab8c30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [11fe 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:11.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 147a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.8µs " +peer0.org1.example.com | [1048 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000040 e4 24 fd 5c 21 9d 4f |.$.\!.O| +peer1.org2.example.com | [12c5 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab8c30 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [11ff 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:11.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 147b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.8µs " +peer0.org1.example.com | [1049 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1351 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [12c6 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab8c30 principal matched by identity 0 +peer1.org1.example.com | [1200 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:11.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 147c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [104a 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1352 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [12c7 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 2c 0a bb e8 62 57 e5 1c 19 9f cc 51 e1 bd de |.,...bW.....Q...| +peer1.org1.example.com | [1201 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:11.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 147d Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [104b 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1353 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | 00000010 f6 3d 7a a4 97 e4 33 aa cc 3a 8f 54 07 ea 74 2b |.=z...3..:.T..t+| +peer1.org1.example.com | [1202 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:11.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 147e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:11.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 147f Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +orderer0.example.com | "2020-08-31 20:52:11.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1480 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.8µs " +peer0.org1.example.com | [104c 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [104d 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1203 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b900 gate 1598907085053783300 evaluation starts +peer0.org2.example.com | [1354 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [12c8 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe 34 9c 55 9b 9b 7d a8 c5 8b 33 |0E.!..4.U..}...3| +peer0.org1.example.com | [104e 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:12.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1481 Sending msg of 28 bytes to 2 on channel businesschannel took 51.9µs" +peer1.org1.example.com | [1204 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b900 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1355 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | 00000010 7b 7f 35 92 85 b2 39 dc e2 de a5 3d f4 7f 7b 8f |{.5...9....=..{.| +peer0.org1.example.com | [104f 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:12.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1482 Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" +peer1.org1.example.com | [1205 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b900 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1356 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 de d6 7a fd 95 02 20 0a 8d d1 de 7a 04 47 e8 cd |..z... ....z.G..| +orderer0.example.com | "2020-08-31 20:52:12.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1483 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 104.6µs " +peer0.org1.example.com | [1050 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1206 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b900 principal matched by identity 0 +peer0.org2.example.com | [1357 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 45 fa d7 16 c6 0d f6 df be 09 17 89 c2 ae ef 58 |E..............X| +orderer0.example.com | "2020-08-31 20:52:12.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1484 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.1µs " +peer0.org1.example.com | [1051 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1207 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 a3 41 c5 d2 d4 ab cc 1a c6 9f 72 79 14 fc ef |..A........ry...| +peer0.org2.example.com | [1358 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 84 b4 f1 55 a1 6f a8 |...U.o.| +orderer0.example.com | "2020-08-31 20:52:12.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1485 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1052 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | 00000010 86 15 2b 54 c2 39 73 0f a4 fa 82 3e 2d ea e4 f5 |..+T.9s....>-...| +peer0.org2.example.com | [1359 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org2.example.com | [12c9 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab8c30 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:12.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1486 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1053 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1208 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 97 fb 3d c9 61 8f 63 a5 f3 a4 0b |0D. F..=.a.c....| +peer0.org2.example.com | [135a 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12ca 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab8c30 gate 1598907085069823200 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:12.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1487 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [1054 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 e5 20 c6 b6 02 41 38 57 31 36 82 2b e7 bc 5a cb |. ...A8W16.+..Z.| +peer0.org2.example.com | [135b 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12cb 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:12.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1488 Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +peer0.org1.example.com | [1055 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000020 08 f4 62 b8 02 20 64 69 ae 76 ee 69 9b 5f 4e eb |..b.. di.v.i._N.| +peer0.org2.example.com | [135c 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [12cc 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:12.307 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1489 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.6µs " +peer0.org1.example.com | [1056 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 1f 1c 6b 75 83 b8 ba ae 78 fe 7c 67 c9 22 55 bb |..ku....x.|g."U.| +peer0.org2.example.com | [135d 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\334|\262l\314\326\301\004^!2g\334#\245\025\235\370," > +peer1.org2.example.com | [12cd 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:12.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 148a Sending msg of 28 bytes to 2 on channel businesschannel took 24.8µs" +peer0.org1.example.com | [1057 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000040 10 fa 29 a1 75 51 |..).uQ| +peer0.org2.example.com | [135e 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [12ce 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:12.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 148b Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" +peer0.org1.example.com | [1058 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1209 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b900 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [135f 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12cf 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:12.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 148c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.9µs " +peer0.org1.example.com | [1059 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [120a 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393b900 gate 1598907085053783300 evaluation succeeds +peer0.org2.example.com | [1360 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [12d0 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:12.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 148d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68µs " +peer0.org1.example.com | [105a 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [120b 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1361 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [12d1 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | "2020-08-31 20:52:12.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 148e Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [105b 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [120c 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1362 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12d2 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 f6 e0 95 9d 1c 80 eb 6f 79 9d 8c c2 7a 8d de |........oy...z..| +orderer0.example.com | "2020-08-31 20:52:12.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 148f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [105c 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [120d 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1363 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 da 6f f9 1c c5 fd 67 d2 7d e2 fb 29 31 35 fb 13 |.o....g.}..)15..| +orderer0.example.com | "2020-08-31 20:52:12.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1490 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [105d 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [120e 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1364 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12d3 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 d8 36 b5 43 13 f8 35 49 b2 51 b7 |0D. c.6.C..5I.Q.| +peer0.org1.example.com | [105e 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:12.805 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1491 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +peer1.org1.example.com | [120f 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1365 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 15 9d 4f d9 24 7e a7 1b 2e 89 03 83 43 2b 46 5c |..O.$~......C+F\| +peer0.org1.example.com | [105f 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:12.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1492 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.6µs " +peer1.org1.example.com | [1210 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1366 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 98 eb ea a7 02 20 24 28 40 8c 46 12 16 47 b9 d1 |..... $(@.F..G..| +peer0.org1.example.com | [1060 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | "2020-08-31 20:52:13.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1493 Sending msg of 28 bytes to 2 on channel businesschannel took 63µs" +peer1.org1.example.com | [1211 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1367 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 04 c1 0c b9 5d b5 94 a6 ff 22 8a f5 a4 d7 fe 80 |....]...."......| +peer0.org1.example.com | [1061 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:13.100 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1495 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +peer1.org1.example.com | [1212 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1368 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | 00000040 09 37 12 fb 78 cf |.7..x.| +peer0.org1.example.com | [1062 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:13.100 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1496 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.8µs " +peer1.org1.example.com | [1213 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1369 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12d4 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1063 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:13.100 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1494 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 88.6µs " +peer1.org1.example.com | [1214 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [136a 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [12d5 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1064 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:13.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1497 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1215 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [136b 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12d6 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1065 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:13.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1498 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1216 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [136c 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [12d7 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [1066 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:13.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1499 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [1217 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [136d 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [12d8 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1067 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:13.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 149a Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +peer1.org1.example.com | [1218 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [136e 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12d9 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1068 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da39c0 gate 1598907075472798600 evaluation starts +orderer0.example.com | "2020-08-31 20:52:13.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 149b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.8µs " +peer1.org1.example.com | [1219 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12da 08-31 20:51:25.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [136f 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:13.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 149c Sending msg of 28 bytes to 2 on channel businesschannel took 15.5µs" +peer0.org1.example.com | [1069 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da39c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [121a 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12db 08-31 20:51:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 78 b1 56 21 54 82 a3 15 9f 65 87 70 4e 71 ee |-x.V!T....e.pNq.| +peer0.org2.example.com | [1370 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:13.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 149d Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +peer0.org1.example.com | [106a 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da39c0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [121b 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 6e af 81 e5 06 61 13 20 3f bc 54 41 a3 6c be 75 |n....a. ?.TA.l.u| +peer0.org2.example.com | [1371 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:13.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 149e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72µs " +peer0.org1.example.com | [106b 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da39c0 principal matched by identity 0 +peer1.org1.example.com | [121c 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12dc 08-31 20:51:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d3 7c e4 56 2b ee 75 a3 62 76 1a |0D. x.|.V+.u.bv.| +peer0.org2.example.com | [1372 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:13.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 149f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 41.9µs " +peer0.org1.example.com | [106c 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 1f 34 d8 0a 1b 64 bf 99 6e d1 d9 23 93 8d 9b |..4...d..n..#...| +peer1.org1.example.com | [121d 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | 00000010 69 cf fc d2 08 bc 7a 74 86 c5 04 e4 6d db 11 a7 |i.....zt....m...| +peer0.org2.example.com | [1373 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:13.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a0 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000010 2f 5d 01 fb 17 fd 46 02 76 f8 40 fa 52 a2 9e fe |/]....F.v.@.R...| +peer1.org1.example.com | [121e 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 76 7a ac 35 02 20 4a f3 65 b0 31 3a 0f 41 a1 22 |vz.5. J.e.1:.A."| +peer0.org2.example.com | [1374 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:13.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a1 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [106d 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 81 aa 57 a4 fa 87 e8 c8 7d 0e |0E.!....W.....}.| +peer1.org1.example.com | [1220 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 f9 b6 7b c1 e2 07 d5 b7 07 18 82 4a b3 4a 83 e0 |..{........J.J..| +peer0.org2.example.com | [1375 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e6dc0 gate 1598907081318510600 evaluation starts +orderer0.example.com | "2020-08-31 20:52:13.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | 00000010 54 95 10 9a 24 ac 12 47 e9 3e 6a 70 ac 54 ab 5d |T...$..G.>jp.T.]| +peer1.org1.example.com | [1223 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | 00000040 d6 f4 9b 74 25 1b |...t%.| +peer0.org2.example.com | [1376 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e6dc0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:13.805 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a3 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +peer0.org1.example.com | 00000020 98 31 54 f8 ef 02 20 5b c0 d9 0f 61 bc 51 16 75 |.1T... [...a.Q.u| +peer1.org1.example.com | [1224 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12dd 08-31 20:51:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | [1377 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e6dc0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:13.805 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.9µs " +peer0.org1.example.com | 00000030 99 0b 98 d5 e0 e9 7e 54 47 47 0e 91 c2 df 38 ef |......~TGG....8.| +peer1.org1.example.com | [1225 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [1378 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e6dc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:52:14.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a5 Sending msg of 28 bytes to 2 on channel businesschannel took 18.1µs" +peer0.org1.example.com | 00000040 75 87 e9 bc 32 a7 55 |u...2.U| +peer1.org1.example.com | [1221 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12de 08-31 20:51:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9a dd 3f de 80 c6 6e b9 db 57 4f |0E.!...?...n..WO| +peer0.org2.example.com | [1379 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e6dc0 principal evaluation fails +orderer0.example.com | "2020-08-31 20:52:14.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a6 Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +peer0.org1.example.com | [106e 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da39c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 40 3c a9 20 d9 28 84 19 07 09 bf d5 b6 26 cb 6c |@<. .(.......&.l| +peer1.org1.example.com | [1226 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [137a 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e6dc0 gate 1598907081318510600 evaluation fails +orderer0.example.com | "2020-08-31 20:52:14.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.8µs " +peer0.org1.example.com | [106f 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da39c0 gate 1598907075472798600 evaluation succeeds +peer1.org2.example.com | 00000020 29 63 5e 29 b8 02 20 63 a4 66 0c d2 24 ed 72 8c |)c^).. c.f..$.r.| +peer1.org1.example.com | [1227 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [137b 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:14.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110µs " +peer0.org1.example.com | [1070 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000030 81 b5 2c 4d 16 59 65 29 ba 01 2c e8 c1 a4 01 25 |..,M.Ye)..,....%| +peer1.org1.example.com | [1228 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [137c 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:14.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a9 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1071 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000040 12 bd f5 ab f5 72 d9 |.....r.| +peer1.org1.example.com | [1229 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [137d 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:14.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14aa Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1072 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1222 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12df 08-31 20:51:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [137e 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e7330 gate 1598907081319109400 evaluation starts +orderer0.example.com | "2020-08-31 20:52:14.305 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ab Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [1073 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [122a 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12e0 08-31 20:51:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [137f 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e7330 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:14.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ac Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +peer0.org1.example.com | [1074 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [121f 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12e1 08-31 20:51:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1380 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e7330 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:14.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ad Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.7µs " +peer0.org1.example.com | [1075 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [122b 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12e2 08-31 20:51:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1381 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e7330 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:14.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ae Sending msg of 28 bytes to 2 on channel businesschannel took 22.2µs" +peer0.org1.example.com | [1076 08-31 20:51:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [122c 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12e3 08-31 20:51:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [1382 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 94 f1 67 52 fd 9c dc e6 2b 61 ab 86 41 85 d1 |...gR....+a..A..| +orderer0.example.com | "2020-08-31 20:52:14.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14af Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +peer0.org1.example.com | [1077 08-31 20:51:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [122d 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [12e4 08-31 20:51:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 cb 16 a3 f7 7d 4f 3b ba bd 8c 6b fb 15 b6 11 25 |....}O;...k....%| +orderer0.example.com | "2020-08-31 20:52:14.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86µs " +peer0.org1.example.com | [1078 08-31 20:51:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [122e 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12e5 08-31 20:51:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1383 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 cb 11 89 70 22 07 b7 9f 3b b0 |0E.!.....p"...;.| +orderer0.example.com | "2020-08-31 20:52:14.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.6µs " +peer0.org1.example.com | [1079 08-31 20:51:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [122f 08-31 20:51:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [12e6 08-31 20:51:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 64 aa d2 66 cb e9 ac 80 49 b6 df f2 f2 3d 7e 24 |d..f....I....=~$| +orderer0.example.com | "2020-08-31 20:52:14.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [107a 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1230 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [12e7 08-31 20:51:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000020 d6 a3 37 8e 22 02 20 5a 23 26 9b b5 f6 5c 25 cc |..7.". Z#&...\%.| +orderer0.example.com | "2020-08-31 20:52:14.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b3 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [107b 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1231 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [12e8 08-31 20:51:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000030 01 74 0e 34 c6 ce f4 6a 65 bc e0 56 e6 bc 46 48 |.t.4...je..V..FH| +orderer0.example.com | "2020-08-31 20:52:14.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [107c 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1232 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [12e9 08-31 20:51:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000040 39 32 11 6a dc 78 d8 |92.j.x.| +orderer0.example.com | "2020-08-31 20:52:14.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b5 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +peer0.org1.example.com | [107d 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1233 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [12ea 08-31 20:51:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1384 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e7330 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:14.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.8µs " +peer0.org1.example.com | [107e 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1234 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [12eb 08-31 20:51:25.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1385 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031e7330 gate 1598907081319109400 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:15.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b7 Sending msg of 28 bytes to 3 on channel businesschannel took 27.7µs" +peer0.org1.example.com | [107f 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1235 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [12ec 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1386 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:15.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b8 Sending msg of 28 bytes to 2 on channel businesschannel took 9.8µs" +peer0.org1.example.com | [1080 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1236 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12ed 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1fca0 gate 1598907085090856400 evaluation starts +peer0.org2.example.com | [1387 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:15.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.5µs " +peer0.org1.example.com | [1081 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1237 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [12ee 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1fca0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1388 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:15.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.6µs " +peer0.org1.example.com | [1082 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1238 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12ef 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1fca0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1389 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:15.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14bb Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1083 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1239 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [12f0 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1fca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [138a 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:15.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14bc Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1084 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [123a 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [12f1 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1fca0 principal evaluation fails +peer0.org2.example.com | [138b 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2020-08-31 20:52:15.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14bd Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [1085 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [123b 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [12f2 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1fca0 gate 1598907085090856400 evaluation fails +peer0.org2.example.com | [138c 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:15.309 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14be Sending msg of 28 bytes to 3 on channel testchainid took 121.4µs" +peer0.org1.example.com | [1086 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [123c 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D9816101F +peer1.org2.example.com | [12f3 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [138d 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:15.311 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14bf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 516.7µs " +peer0.org1.example.com | [1087 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [123d 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A9012382BF60B9DFA5A48779A9C0938F96B11DBC5599231BA168C3436D815AC2 +peer1.org2.example.com | [12f4 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [138e 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:15.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c0 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +peer0.org1.example.com | [1088 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [123e 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [12f5 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [138f 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:15.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c1 Sending msg of 28 bytes to 3 on channel businesschannel took 11.1µs" +peer0.org1.example.com | [1089 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [123f 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [12f6 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e210 gate 1598907085095112700 evaluation starts +peer0.org2.example.com | [1390 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:15.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.2µs " +peer0.org1.example.com | [108a 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1240 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | [12f7 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e210 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1391 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +orderer0.example.com | "2020-08-31 20:52:15.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 44.6µs " +peer1.org1.example.com | [1241 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [108b 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12f8 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e210 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1392 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:15.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1243 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [108c 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [12f9 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e210 principal matched by identity 0 +peer0.org2.example.com | [1393 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:15.600 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c5 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1242 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [108d 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1394 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [12fa 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 94 f1 67 52 fd 9c dc e6 2b 61 ab 86 41 85 d1 |...gR....+a..A..| +orderer0.example.com | "2020-08-31 20:52:15.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [1244 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [108e 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1395 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 cb 16 a3 f7 7d 4f 3b ba bd 8c 6b fb 15 b6 11 25 |....}O;...k....%| +orderer0.example.com | "2020-08-31 20:52:15.805 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c7 Sending msg of 28 bytes to 3 on channel testchainid took 20.4µs" +peer0.org1.example.com | [108f 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1245 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1396 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\005\307\340" > alive: alive: alive:\334|\262l\314\326\301\004^!2g\334#\245\025\235\370," > +peer1.org2.example.com | [12fb 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 cb 11 89 70 22 07 b7 9f 3b b0 |0E.!.....p"...;.| +orderer0.example.com | "2020-08-31 20:52:15.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.7µs " +peer0.org1.example.com | [1090 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1246 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1397 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 64 aa d2 66 cb e9 ac 80 49 b6 df f2 f2 3d 7e 24 |d..f....I....=~$| +orderer0.example.com | "2020-08-31 20:52:16.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c9 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +peer0.org1.example.com | [1091 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1247 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1398 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 d6 a3 37 8e 22 02 20 5a 23 26 9b b5 f6 5c 25 cc |..7.". Z#&...\%.| +orderer0.example.com | "2020-08-31 20:52:16.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.8µs " +peer0.org1.example.com | [1092 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1248 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1399 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 01 74 0e 34 c6 ce f4 6a 65 bc e0 56 e6 bc 46 48 |.t.4...je..V..FH| +orderer0.example.com | "2020-08-31 20:52:16.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14cb Sending msg of 28 bytes to 3 on channel businesschannel took 40.4µs" +peer0.org1.example.com | [1093 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1249 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [139a 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | 00000040 39 32 11 6a dc 78 d8 |92.j.x.| +orderer0.example.com | "2020-08-31 20:52:16.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14cc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.2µs " +peer0.org1.example.com | [1094 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161017 +peer1.org1.example.com | [124a 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [139b 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [12fc 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e210 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:16.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14cd Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1095 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4D6C7F1B65579ABCC3E323196654D90F5E15810A9A123A31B081257F881649A3 +peer1.org1.example.com | [124b 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [139c 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [12fd 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b9e210 gate 1598907085095112700 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:16.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ce Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1096 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [124c 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [139d 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [12fe 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:16.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14cf Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [1097 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [124d 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [139e 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [12ff 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:16.307 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d0 Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +peer0.org1.example.com | [1098 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [124e 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161020 +peer0.org2.example.com | [13a0 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1300 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:16.308 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.8µs " +peer0.org1.example.com | [1099 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [124f 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 44D86CFB8BB4BB1E3D373665AC75A1ABD6A9392DC086117A78B038504286020C +peer0.org2.example.com | [139f 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:16.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d2 Sending msg of 28 bytes to 2 on channel businesschannel took 52.2µs" +peer0.org1.example.com | [109a 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1250 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [13a1 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1301 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:16.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d3 Sending msg of 28 bytes to 3 on channel businesschannel took 24.1µs" +peer0.org1.example.com | [109b 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1251 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [13a2 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1302 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:16.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 801.3µs " +peer0.org1.example.com | [109c 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1252 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org2.example.com | [13a3 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1303 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:16.599 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 414.4µs " +peer0.org1.example.com | [109d 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1253 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13a4 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1304 08-31 20:51:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | "2020-08-31 20:52:16.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d6 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [109f 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1254 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [13a5 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1305 08-31 20:51:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 f6 e0 95 9d 1c 80 eb 6f 79 9d 8c c2 7a 8d de |........oy...z..| +orderer0.example.com | "2020-08-31 20:52:16.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d7 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [10a0 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1255 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13a6 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 da 6f f9 1c c5 fd 67 d2 7d e2 fb 29 31 35 fb 13 |.o....g.}..)15..| +orderer0.example.com | "2020-08-31 20:52:16.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [10a1 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1256 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [13a7 08-31 20:51:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1306 08-31 20:51:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 d8 36 b5 43 13 f8 35 49 b2 51 b7 |0D. c.6.C..5I.Q.| +orderer0.example.com | "2020-08-31 20:52:16.807 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d9 Sending msg of 28 bytes to 3 on channel testchainid took 28.7µs" +peer0.org1.example.com | [10a2 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1257 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [13a8 08-31 20:51:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 15 9d 4f d9 24 7e a7 1b 2e 89 03 83 43 2b 46 5c |..O.$~......C+F\| +orderer0.example.com | "2020-08-31 20:52:16.808 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14da Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 305.4µs " +peer0.org1.example.com | [10a3 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1258 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13a9 08-31 20:51:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 98 eb ea a7 02 20 24 28 40 8c 46 12 16 47 b9 d1 |..... $(@.F..G..| +orderer0.example.com | "2020-08-31 20:52:17.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14db Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +peer0.org1.example.com | [109e 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1259 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [13aa 08-31 20:51:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 04 c1 0c b9 5d b5 94 a6 ff 22 8a f5 a4 d7 fe 80 |....]...."......| +peer0.org1.example.com | [10a4 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:17.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14dc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.1µs " +peer1.org1.example.com | [125a 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [13ab 08-31 20:51:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 09 37 12 fb 78 cf |.7..x.| +peer0.org1.example.com | [10a5 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:17.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14dd Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +peer1.org1.example.com | [125b 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13ac 08-31 20:51:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1307 08-31 20:51:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [10a6 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:17.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14de Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.9µs " +peer1.org1.example.com | [125c 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [13ad 08-31 20:51:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1308 08-31 20:51:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10a7 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:17.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14df Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [125d 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13ae 08-31 20:51:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1309 08-31 20:51:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [10a8 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:17.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e0 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [125e 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [13af 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [130a 08-31 20:51:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 78 b1 56 21 54 82 a3 15 9f 65 87 70 4e 71 ee |-x.V!T....e.pNq.| +peer0.org1.example.com | [10a9 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:17.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [1260 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [13b0 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816101B +peer1.org2.example.com | 00000010 6e af 81 e5 06 61 13 20 3f bc 54 41 a3 6c be 75 |n....a. ?.TA.l.u| +peer0.org1.example.com | [10aa 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-08-31 20:52:17.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e2 Sending msg of 28 bytes to 3 on channel testchainid took 24.9µs" +peer1.org1.example.com | [125f 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13b1 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C1F6E0959D1C80EB6F799D8CC27A8DDEDA6FF91CC5FD67D27DE2FB293135FB13 +peer1.org2.example.com | [130b 08-31 20:51:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d3 7c e4 56 2b ee 75 a3 62 76 1a |0D. x.|.V+.u.bv.| +peer0.org1.example.com | [10ab 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 6c 7f 1b 65 57 9a bc c3 e3 23 19 66 54 d9 0f |Ml..eW....#.fT..| +orderer0.example.com | "2020-08-31 20:52:17.307 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.8µs " +peer1.org1.example.com | [1261 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13b2 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000010 69 cf fc d2 08 bc 7a 74 86 c5 04 e4 6d db 11 a7 |i.....zt....m...| +peer0.org1.example.com | 00000010 5e 15 81 0a 9a 12 3a 31 b0 81 25 7f 88 16 49 a3 |^.....:1..%...I.| +orderer0.example.com | "2020-08-31 20:52:17.599 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e4 Sending msg of 28 bytes to 2 on channel businesschannel took 27µs" +peer1.org1.example.com | [1262 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org2.example.com | [13b3 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | 00000020 76 7a ac 35 02 20 4a f3 65 b0 31 3a 0f 41 a1 22 |vz.5. J.e.1:.A."| +peer0.org1.example.com | [10ac 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be 25 48 43 49 2c 8d 94 5c ca d9 |0E.!..%HCI,..\..| +orderer0.example.com | "2020-08-31 20:52:17.599 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e5 Sending msg of 28 bytes to 3 on channel businesschannel took 14.6µs" +peer1.org1.example.com | [1263 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13b4 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | 00000030 f9 b6 7b c1 e2 07 d5 b7 07 18 82 4a b3 4a 83 e0 |..{........J.J..| +peer0.org1.example.com | 00000010 3a a2 94 06 4c d9 7c 97 55 ad fa e9 b8 31 a4 08 |:...L.|.U....1..| +orderer0.example.com | "2020-08-31 20:52:17.599 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83µs " +peer1.org1.example.com | [1264 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [13b5 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 d6 f4 9b 74 25 1b |...t%.| +orderer0.example.com | "2020-08-31 20:52:17.599 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.2µs " +peer0.org1.example.com | 00000020 30 fb 43 01 97 02 20 6b 9d d4 3b c4 d7 b5 43 4d |0.C... k..;...CM| +peer1.org1.example.com | [1265 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13b6 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [130c 08-31 20:51:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:17.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e8 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000030 f2 ff 5d 8a d6 c1 f1 55 a4 0d 8f 93 8c de 1b 1f |..]....U........| +peer1.org1.example.com | [1266 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [13b7 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:te*\035{\202\017>\024\001\002 \031}\017GZ\301\220?cS1F\227O\201\337B\002H\362\261\344M)\021\037\263\306-\330\357\236" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [130d 08-31 20:51:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:17.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e9 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | 00000040 f8 4b de 15 20 ff 3a |.K.. .:| +peer1.org1.example.com | [1267 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [13b8 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [130e 08-31 20:51:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:17.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ea Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [10ad 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1268 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13b9 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [130f 08-31 20:51:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:17.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14eb Sending msg of 28 bytes to 3 on channel testchainid took 18.2µs" +peer0.org1.example.com | [10ae 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1269 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [13ba 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1310 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:17.807 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ec Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.8µs " +peer0.org1.example.com | [10af 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [126a 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13bb 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1311 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:18.096 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ed Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +peer0.org1.example.com | [10b0 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [126b 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [13bc 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1312 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:18.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ee Sending msg of 28 bytes to 3 on channel businesschannel took 24.7µs" +peer0.org1.example.com | [10b1 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [126c 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13be 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1313 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:18.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 123.2µs " +peer0.org1.example.com | [10b2 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [126d 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13bd 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:te*\035{\202\017>\024\001\002 \031}\017GZ\301\220?cS1F\227O\201\337B\002H\362\261\344M)\021\037\263\306-\330\357\236" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1314 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:18.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 218.7µs " +peer0.org1.example.com | [10b3 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [126e 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [13bf 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1315 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:18.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f1 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [10b4 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1270 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [13c0 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1316 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:18.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [10b5 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [126f 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [13c1 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1317 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:18.305 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f3 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [10b6 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1271 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [13c2 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1318 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:18.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f4 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +peer0.org1.example.com | [10b7 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1272 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d8 6c fb 8b b4 bb 1e 3d 37 36 65 ac 75 a1 ab |D.l.....=76e.u..| +peer0.org2.example.com | [13c3 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1319 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +orderer0.example.com | "2020-08-31 20:52:18.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.1µs " +peer0.org1.example.com | [10b8 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | 00000010 d6 a9 39 2d c0 86 11 7a 78 b0 38 50 42 86 02 0c |..9-...zx.8PB...| +peer0.org2.example.com | [13c4 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 f6 e0 95 9d 1c 80 eb 6f 79 9d 8c c2 7a 8d de |........oy...z..| +peer1.org2.example.com | [131a 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:18.596 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f6 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +peer0.org1.example.com | [10b9 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1273 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c cc 0d 20 6f 76 e1 8c d0 cb c7 |0E.!.... ov.....| +peer1.org2.example.com | [131b 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 da 6f f9 1c c5 fd 67 d2 7d e2 fb 29 31 35 fb 13 |.o....g.}..)15..| +orderer0.example.com | "2020-08-31 20:52:18.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f7 Sending msg of 28 bytes to 3 on channel businesschannel took 25.6µs" +peer0.org1.example.com | [10ba 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 1b d5 69 4c 6d 69 9c 90 b7 33 ef e3 3e b6 ad 35 |..iLmi...3..>..5| +peer1.org2.example.com | [131c 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [13c5 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 d8 36 b5 43 13 f8 35 49 b2 51 b7 |0D. c.6.C..5I.Q.| +orderer0.example.com | "2020-08-31 20:52:18.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.4µs " +peer0.org1.example.com | [10bb 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 88 66 a7 0f c2 02 20 36 d5 b9 d9 13 ff 20 2c 0e |.f.... 6..... ,.| +peer1.org2.example.com | [131d 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 15 9d 4f d9 24 7e a7 1b 2e 89 03 83 43 2b 46 5c |..O.$~......C+F\| +orderer0.example.com | "2020-08-31 20:52:18.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 56.3µs " +peer0.org1.example.com | [10bc 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 d5 6c e0 aa 03 16 06 7e 75 b9 95 a8 7d b7 5a 26 |.l.....~u...}.Z&| +peer1.org2.example.com | [131e 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 98 eb ea a7 02 20 24 28 40 8c 46 12 16 47 b9 d1 |..... $(@.F..G..| +orderer0.example.com | "2020-08-31 20:52:18.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14fa Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [10bd 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 16 85 87 b4 f2 37 4f |.....7O| +peer1.org2.example.com | [131f 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | 00000030 04 c1 0c b9 5d b5 94 a6 ff 22 8a f5 a4 d7 fe 80 |....]...."......| +orderer0.example.com | "2020-08-31 20:52:18.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14fb Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [10be 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1274 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | [1320 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 09 37 12 fb 78 cf |.7..x.| +orderer0.example.com | "2020-08-31 20:52:18.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14fc Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [10bf 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | [1321 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [13c6 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +orderer0.example.com | "2020-08-31 20:52:18.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14fd Sending msg of 28 bytes to 3 on channel testchainid took 140.7µs" +peer0.org1.example.com | [10c0 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1275 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 2b a5 fa 8a 29 5c da 9c e1 2d f4 |0D. D+...)\...-.| +peer1.org2.example.com | [1322 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +orderer0.example.com | "2020-08-31 20:52:18.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14fe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 301.9µs " +peer0.org1.example.com | [10c1 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 20 53 3f 44 46 fb 35 f9 09 5a e3 ae 28 fa 4a 17 | S?DF.5..Z..(.J.| +peer1.org2.example.com | [1323 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [13c7 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce e3 e9 30 f2 d5 5e dd 81 09 d2 |0E.!....0..^....| +orderer0.example.com | "2020-08-31 20:52:19.096 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ff Sending msg of 28 bytes to 2 on channel businesschannel took 19.5µs" +peer0.org1.example.com | [10c2 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000020 f6 3d 4e a3 02 20 39 3c c5 dd bb ba d8 37 9f ac |.=N.. 9<.....7..| +peer1.org2.example.com | [1324 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000010 08 de 69 5e b4 cb 21 35 ee bc 3e 74 65 2a 1d 7b |..i^..!5..>te*.{| +orderer0.example.com | "2020-08-31 20:52:19.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1500 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +peer0.org1.example.com | [10c3 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000030 5b d6 24 e2 83 7a f1 c6 ad a8 8e fa e6 9b 54 e7 |[.$..z........T.| +peer1.org2.example.com | [1325 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000020 82 0f 3e 14 01 02 20 19 7d 0f 47 5a c1 90 3f 63 |..>... .}.GZ..?c| +orderer0.example.com | "2020-08-31 20:52:19.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1501 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.8µs " +peer0.org1.example.com | [10c4 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000040 95 c9 b8 ed ac ba |......| +peer1.org2.example.com | [1326 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000030 53 31 46 97 4f 81 df 42 02 48 f2 b1 e4 4d 29 11 |S1F.O..B.H...M).| +orderer0.example.com | "2020-08-31 20:52:19.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1502 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.3µs " +peer0.org1.example.com | [10c5 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1276 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1327 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003074870 gate 1598907085328536900 evaluation starts +peer0.org2.example.com | 00000040 1f b3 c6 2d d8 ef 9e |...-...| +orderer0.example.com | "2020-08-31 20:52:19.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1503 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [10c6 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27f80 gate 1598907077033514500 evaluation starts +peer1.org1.example.com | [1277 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1328 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003074870 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [13c8 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1504 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [10c7 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27f80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1278 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1329 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003074870 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [13c9 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.206 UTC [orderer.common.server] Deliver -> DEBU 1505 Starting new Deliver handler" +peer0.org1.example.com | [10c8 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27f80 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1279 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [132a 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003074870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [13ca 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.206 UTC [common.deliver] Handle -> DEBU 1506 Starting new deliver loop for 172.18.0.9:50966" +peer0.org1.example.com | [10c9 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27f80 principal matched by identity 0 +peer1.org1.example.com | [127a 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [132b 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003074870 principal evaluation fails +peer0.org2.example.com | [13cb 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.206 UTC [common.deliver] Handle -> DEBU 1507 Attempting to read seek info message from 172.18.0.9:50966" +peer0.org1.example.com | [10ca 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 4f 62 6e f8 51 b2 b9 7a 89 a1 94 93 43 19 a1 |tObn.Q..z....C..| +peer1.org1.example.com | [127b 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [132c 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003074870 gate 1598907085328536900 evaluation fails +peer0.org2.example.com | [13cc 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.218 UTC [orderer.common.server] Broadcast -> DEBU 1508 Starting new Broadcast handler" +peer0.org1.example.com | 00000010 e1 30 a3 49 45 27 56 4c 01 81 42 14 62 f0 c4 bf |.0.IE'VL..B.b...| +peer1.org1.example.com | [127c 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [132d 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [13cd 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.218 UTC [orderer.common.broadcast] Handle -> DEBU 1509 Starting new broadcast loop for 172.18.0.9:50968" +peer0.org1.example.com | [10cb 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 4c 56 6b dd 24 ae 93 da c4 0d |0E.!..LVk.$.....| +peer1.org1.example.com | [127d 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [132e 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [13ce 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.219 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 150a [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:50968" +peer0.org1.example.com | 00000010 34 59 24 07 9d eb 5d d4 90 ae 99 d7 00 49 bd 50 |4Y$...]......I.P| +peer1.org1.example.com | [127e 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [132f 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [13cf 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:52:19.219 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 150b Processing config update message for exisitng channel businesschannel" +peer0.org1.example.com | 00000020 97 b1 3a eb 68 02 20 7c b3 d6 f6 1c cf 91 b2 30 |..:.h. |.......0| +peer1.org1.example.com | [127f 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1330 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003074de0 gate 1598907085332743500 evaluation starts +peer0.org2.example.com | [13d0 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.220 UTC [policies] Evaluate -> DEBU 150c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +peer0.org1.example.com | 00000030 b2 77 db bc bc 9f b5 b7 b2 42 30 82 2e d9 85 95 |.w.......B0.....| +peer1.org1.example.com | [1280 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1331 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003074de0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [13d1 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:19.220 UTC [policies] Evaluate -> DEBU 150d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | 00000040 b9 ce 81 9e 49 97 68 |....I.h| +peer1.org1.example.com | [1281 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1332 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003074de0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [13d2 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.220 UTC [policies] Evaluate -> DEBU 150e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +peer0.org1.example.com | [10cc 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27f80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1282 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1333 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003074de0 principal matched by identity 0 +peer0.org2.example.com | [13d3 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.221 UTC [policies] Evaluate -> DEBU 150f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [10cd 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27f80 gate 1598907077033514500 evaluation succeeds +peer1.org1.example.com | [1283 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1334 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d8 6c fb 8b b4 bb 1e 3d 37 36 65 ac 75 a1 ab |D.l.....=76e.u..| +peer0.org2.example.com | [13d4 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:19.222 UTC [policies] Evaluate -> DEBU 1510 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer0.org1.example.com | [10ce 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1284 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000010 d6 a9 39 2d c0 86 11 7a 78 b0 38 50 42 86 02 0c |..9-...zx.8PB...| +peer0.org2.example.com | [13d5 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:19.222 UTC [cauthdsl] func1 -> DEBU 1511 0xc000e69a60 gate 1598907139222371400 evaluation starts" +peer0.org1.example.com | [10cf 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1285 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cb1f0 gate 1598907085383877600 evaluation starts +peer1.org2.example.com | [1335 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c cc 0d 20 6f 76 e1 8c d0 cb c7 |0E.!.... ov.....| +peer0.org2.example.com | [13d6 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:19.222 UTC [cauthdsl] func2 -> DEBU 1512 0xc000e69a60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [10d0 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1286 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cb1f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 1b d5 69 4c 6d 69 9c 90 b7 33 ef e3 3e b6 ad 35 |..iLmi...3..>..5| +peer0.org2.example.com | [13d7 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d0400 gate 1598907081501598300 evaluation starts +orderer0.example.com | "2020-08-31 20:52:19.222 UTC [cauthdsl] func2 -> DEBU 1513 0xc000e69a60 processing identity 0 with bytes of fe10e0" +peer0.org1.example.com | [10d1 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1287 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cb1f0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | 00000020 88 66 a7 0f c2 02 20 36 d5 b9 d9 13 ff 20 2c 0e |.f.... 6..... ,.| +peer0.org2.example.com | [13d8 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d0400 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:19.223 UTC [cauthdsl] func2 -> DEBU 1514 0xc000e69a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +peer0.org1.example.com | [10d2 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1288 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cb1f0 principal matched by identity 0 +peer1.org2.example.com | 00000030 d5 6c e0 aa 03 16 06 7e 75 b9 95 a8 7d b7 5a 26 |.l.....~u...}.Z&| +peer0.org2.example.com | [13d9 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d0400 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:19.223 UTC [cauthdsl] func2 -> DEBU 1515 0xc000e69a60 principal evaluation fails" +peer0.org1.example.com | [10d3 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1289 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 f6 e0 95 9d 1c 80 eb 6f 79 9d 8c c2 7a 8d de |........oy...z..| +peer1.org2.example.com | 00000040 16 85 87 b4 f2 37 4f |.....7O| +peer0.org2.example.com | [13da 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d0400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:52:19.223 UTC [cauthdsl] func1 -> DEBU 1516 0xc000e69a60 gate 1598907139222371400 evaluation fails" +peer0.org1.example.com | [10d4 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000010 da 6f f9 1c c5 fd 67 d2 7d e2 fb 29 31 35 fb 13 |.o....g.}..)15..| +peer1.org2.example.com | [1336 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003074de0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [13db 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d0400 principal evaluation fails +orderer0.example.com | "2020-08-31 20:52:19.223 UTC [policies] Evaluate -> DEBU 1517 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | [10d5 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [128a 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 d8 36 b5 43 13 f8 35 49 b2 51 b7 |0D. c.6.C..5I.Q.| +peer1.org2.example.com | [1337 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003074de0 gate 1598907085332743500 evaluation succeeds +peer0.org2.example.com | [13dc 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d0400 gate 1598907081501598300 evaluation fails +orderer0.example.com | "2020-08-31 20:52:19.226 UTC [policies] Evaluate -> DEBU 1518 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | [10d6 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | 00000010 15 9d 4f d9 24 7e a7 1b 2e 89 03 83 43 2b 46 5c |..O.$~......C+F\| +peer1.org2.example.com | [1338 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [13dd 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.226 UTC [policies] func1 -> DEBU 1519 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +peer0.org1.example.com | [10d7 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 98 eb ea a7 02 20 24 28 40 8c 46 12 16 47 b9 d1 |..... $(@.F..G..| +peer1.org2.example.com | [1339 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [13de 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.227 UTC [policies] Evaluate -> DEBU 151a Signature set did not satisfy policy /Channel/Orderer/Writers" +peer0.org1.example.com | [10d8 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 04 c1 0c b9 5d b5 94 a6 ff 22 8a f5 a4 d7 fe 80 |....]...."......| +peer1.org2.example.com | [133a 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [13df 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:19.228 UTC [policies] Evaluate -> DEBU 151b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +peer1.org1.example.com | 00000040 09 37 12 fb 78 cf |.7..x.| +peer1.org2.example.com | [133b 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [13e0 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d0970 gate 1598907081501909600 evaluation starts +orderer0.example.com | "2020-08-31 20:52:19.228 UTC [policies] Evaluate -> DEBU 151c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +peer0.org1.example.com | [10d9 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [133c 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [13e1 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d0970 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:19.228 UTC [policies] Evaluate -> DEBU 151d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [128b 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cb1f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [10da 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org2.example.com | [133d 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [13e2 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d0970 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:19.229 UTC [policies] Evaluate -> DEBU 151e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +peer1.org1.example.com | [128c 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039cb1f0 gate 1598907085383877600 evaluation succeeds +peer0.org1.example.com | [10db 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [133e 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [13e3 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d0970 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:19.229 UTC [cauthdsl] func1 -> DEBU 151f 0xc000e94750 gate 1598907139229477700 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:19.229 UTC [cauthdsl] func2 -> DEBU 1520 0xc000e94750 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [10dc 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1340 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [13e4 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 94 f1 67 52 fd 9c dc e6 2b 61 ab 86 41 85 d1 |...gR....+a..A..| +peer0.org1.example.com | [10dd 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [128d 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1341 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:19.229 UTC [cauthdsl] func2 -> DEBU 1521 0xc000e94750 processing identity 0 with bytes of fe10e0" +peer0.org2.example.com | 00000010 cb 16 a3 f7 7d 4f 3b ba bd 8c 6b fb 15 b6 11 25 |....}O;...k....%| +peer1.org2.example.com | [133f 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.230 UTC [cauthdsl] func2 -> DEBU 1522 0xc000e94750 principal matched by identity 0" +peer0.org2.example.com | [13e5 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 cb 11 89 70 22 07 b7 9f 3b b0 |0E.!.....p"...;.| +peer1.org1.example.com | [128e 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [10de 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1342 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.230 UTC [msp.identity] Verify -> DEBU 1523 Verify: digest = 00000000 d5 c0 2e 39 73 77 a2 28 e0 3c 68 35 af 9b e5 44 |...9sw.(. DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [10df 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1343 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000010 9b 69 e7 89 3c f1 e5 1f a8 21 e4 2d bd d8 20 53 |.i..<....!.-.. S|" +peer0.org2.example.com | 00000020 d6 a3 37 8e 22 02 20 5a 23 26 9b b5 f6 5c 25 cc |..7.". Z#&...\%.| +peer1.org1.example.com | [1290 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [10e0 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1344 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.230 UTC [msp.identity] Verify -> DEBU 1524 Verify: sig = 00000000 30 45 02 21 00 95 8a f4 c5 fe e2 6f ba 64 c8 4e |0E.!.......o.d.N| +peer0.org2.example.com | 00000030 01 74 0e 34 c6 ce f4 6a 65 bc e0 56 e6 bc 46 48 |.t.4...je..V..FH| +peer1.org1.example.com | [1291 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [10e1 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:e\213\213\026\254\364R\005\322o\347dXx\214\004^\245:\321\210\307R\301" > alive:jp\254T\253]\2301T\370\357\002 [\300\331\017a\274Q\026u\231\013\230\325\340\351~TGG\016\221\302\3378\357u\207\351\2742\247U" > alive: alive: +peer1.org2.example.com | [1345 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +orderer0.example.com | 00000010 d2 20 1e 9b e8 f5 b8 6c ed a8 f0 76 7f 21 1e 89 |. .....l...v.!..| +peer0.org2.example.com | 00000040 39 32 11 6a dc 78 d8 |92.j.x.| +peer1.org1.example.com | [1292 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10e2 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1346 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000020 f8 3d e7 cb a0 02 20 02 e6 c7 cb db b7 14 e9 de |.=.... .........| +peer0.org2.example.com | [13e6 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d0970 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1293 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [10e3 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1347 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000030 9f a7 0c 36 ae 1a b9 71 ac c9 1c 0b ee 2a d2 5c |...6...q.....*.\| +peer0.org2.example.com | [13e7 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032d0970 gate 1598907081501909600 evaluation succeeds +peer1.org1.example.com | [1294 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 2c 0a bb e8 62 57 e5 1c 19 9f cc 51 e1 bd de |.,...bW.....Q...| +peer1.org2.example.com | [1348 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10e4 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +orderer0.example.com | 00000040 1a 10 43 da 27 44 a3 |..C.'D.|" +peer0.org2.example.com | [13e8 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 f6 3d 7a a4 97 e4 33 aa cc 3a 8f 54 07 ea 74 2b |.=z...3..:.T..t+| +peer1.org2.example.com | [1349 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [10e5 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.231 UTC [cauthdsl] func2 -> DEBU 1525 0xc000e94750 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [13e9 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [134a 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1295 08-31 20:51:25.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe 34 9c 55 9b 9b 7d a8 c5 8b 33 |0E.!..4.U..}...3| +peer0.org1.example.com | [10e6 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\202J\341\206\345Rj\274\002 t\353\343\003H\222;\354\274C6,9W\215\360\361s\264\367\205\315\241\250\270\247\017\000yd\244\247" > > > , Envelope: 272 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.231 UTC [cauthdsl] func1 -> DEBU 1526 0xc000e94750 gate 1598907139229477700 evaluation succeeds" +peer0.org2.example.com | [13ea 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [134b 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" > alive: +peer1.org1.example.com | 00000010 7b 7f 35 92 85 b2 39 dc e2 de a5 3d f4 7f 7b 8f |{.5...9....=..{.| +peer0.org1.example.com | [10e7 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.231 UTC [policies] Evaluate -> DEBU 1527 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +peer0.org2.example.com | [13eb 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [134c 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 de d6 7a fd 95 02 20 0a 8d d1 de 7a 04 47 e8 cd |..z... ....z.G..| +peer0.org1.example.com | [10e8 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\202J\341\206\345Rj\274\002 t\353\343\003H\222;\354\274C6,9W\215\360\361s\264\367\205\315\241\250\270\247\017\000yd\244\247" > > > , Envelope: 272 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.232 UTC [policies] Evaluate -> DEBU 1528 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +peer0.org2.example.com | [13ec 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [134d 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 45 fa d7 16 c6 0d f6 df be 09 17 89 c2 ae ef 58 |E..............X| +peer0.org1.example.com | [10e9 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:52:19.232 UTC [policies] Evaluate -> DEBU 1529 Signature set satisfies policy /Channel/Application/Writers" +peer0.org2.example.com | [13ed 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [134e 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 84 b4 f1 55 a1 6f a8 |...U.o.| +peer0.org1.example.com | [10ea 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 7b 55 40 22 53 fb bd b2 ea 57 b6 c3 68 bf 11 |.{U@"S....W..h..| +orderer0.example.com | "2020-08-31 20:52:19.232 UTC [policies] Evaluate -> DEBU 152a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +peer0.org2.example.com | [13ee 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [134f 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1296 08-31 20:51:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 b7 47 2f 6d 7f cd 9a 57 86 c2 3c 49 73 3d 5f d5 |.G/m...W.. DEBU 152b Signature set satisfies policy /Channel/Writers" +peer0.org2.example.com | [13ef 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 f6 e0 95 9d 1c 80 eb 6f 79 9d 8c c2 7a 8d de |........oy...z..| +peer1.org2.example.com | [1350 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1297 08-31 20:51:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10eb 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 65 c2 3a e7 ad bd 89 c0 57 ec |0E.!..e.:.....W.| +orderer0.example.com | "2020-08-31 20:52:19.233 UTC [policies] Evaluate -> DEBU 152c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +peer0.org2.example.com | 00000010 da 6f f9 1c c5 fd 67 d2 7d e2 fb 29 31 35 fb 13 |.o....g.}..)15..| +peer1.org2.example.com | [1351 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1298 08-31 20:51:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | 00000010 3f 8c 8c db 68 8e 65 97 24 b6 db cb 05 11 40 b6 |?...h.e.$.....@.| +orderer0.example.com | "2020-08-31 20:52:19.233 UTC [common.configtx] addToMap -> DEBU 152d Adding to config map: [Group] /Channel" +peer0.org2.example.com | [13f0 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 d8 36 b5 43 13 f8 35 49 b2 51 b7 |0D. c.6.C..5I.Q.| +peer1.org2.example.com | [1352 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1299 08-31 20:51:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d8 6c fb 8b b4 bb 1e 3d 37 36 65 ac 75 a1 ab |D.l.....=76e.u..| +peer0.org1.example.com | 00000020 ac c0 db 55 9c 02 20 25 da 0e f6 bb 23 97 81 1d |...U.. %....#...| +orderer0.example.com | "2020-08-31 20:52:19.233 UTC [common.configtx] addToMap -> DEBU 152e Adding to config map: [Group] /Channel/Application" +peer0.org2.example.com | 00000010 15 9d 4f d9 24 7e a7 1b 2e 89 03 83 43 2b 46 5c |..O.$~......C+F\| +peer1.org2.example.com | [1354 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 d6 a9 39 2d c0 86 11 7a 78 b0 38 50 42 86 02 0c |..9-...zx.8PB...| +peer0.org1.example.com | 00000030 de 28 62 07 23 09 5e 9e b8 af 62 cc 86 15 b4 83 |.(b.#.^...b.....| +orderer0.example.com | "2020-08-31 20:52:19.234 UTC [common.configtx] addToMap -> DEBU 152f Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org2.example.com | 00000020 98 eb ea a7 02 20 24 28 40 8c 46 12 16 47 b9 d1 |..... $(@.F..G..| +peer1.org2.example.com | [1353 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [129a 08-31 20:51:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c cc 0d 20 6f 76 e1 8c d0 cb c7 |0E.!.... ov.....| +peer0.org1.example.com | 00000040 4d e4 d5 c3 33 24 8f |M...3$.| +orderer0.example.com | "2020-08-31 20:52:19.234 UTC [common.configtx] addToMap -> DEBU 1530 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org2.example.com | 00000030 04 c1 0c b9 5d b5 94 a6 ff 22 8a f5 a4 d7 fe 80 |....]...."......| +peer1.org2.example.com | [1355 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 1b d5 69 4c 6d 69 9c 90 b7 33 ef e3 3e b6 ad 35 |..iLmi...3..>..5| +peer0.org1.example.com | [10ec 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +orderer0.example.com | "2020-08-31 20:52:19.234 UTC [common.configtx] addToMap -> DEBU 1531 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org2.example.com | 00000040 09 37 12 fb 78 cf |.7..x.| +peer1.org2.example.com | [1356 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000020 88 66 a7 0f c2 02 20 36 d5 b9 d9 13 ff 20 2c 0e |.f.... 6..... ,.| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +orderer0.example.com | "2020-08-31 20:52:19.234 UTC [common.configtx] addToMap -> DEBU 1532 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org2.example.com | [13f1 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1357 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000030 d5 6c e0 aa 03 16 06 7e 75 b9 95 a8 7d b7 5a 26 |.l.....~u...}.Z&| +peer0.org1.example.com | [10ed 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 55 81 71 5e 64 65 29 9b 22 83 |0E.!..U.q^de).".| +peer0.org2.example.com | [13f2 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.235 UTC [common.configtx] addToMap -> DEBU 1533 Adding to config map: [Policy] /Channel/Application/Admins" +peer1.org2.example.com | [1358 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000040 16 85 87 b4 f2 37 4f |.....7O| +peer0.org1.example.com | 00000010 f8 74 9b b2 8c 0e 58 a3 23 22 30 d4 3e 82 4a e1 |.t....X.#"0.>.J.| +peer0.org2.example.com | [13f3 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.235 UTC [common.configtx] addToMap -> DEBU 1534 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer1.org2.example.com | [1359 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ae5c0 gate 1598907085353531400 evaluation starts +peer1.org1.example.com | [129b 08-31 20:51:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000020 86 e5 52 6a bc 02 20 74 eb e3 03 48 92 3b ec bc |..Rj.. t...H.;..| +peer0.org2.example.com | [13f4 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-08-31 20:52:19.235 UTC [common.configtx] addToMap -> DEBU 1535 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer1.org2.example.com | [135a 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ae5c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [129c 08-31 20:51:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000030 43 36 2c 39 57 8d f0 f1 73 b4 f7 85 cd a1 a8 b8 |C6,9W...s.......| +peer0.org2.example.com | [13f5 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df de a9 43 65 43 25 6a a9 bb 70 39 02 4a c3 d1 |...CeC%j..p9.J..| +orderer0.example.com | "2020-08-31 20:52:19.235 UTC [common.configtx] addToMap -> DEBU 1536 Adding to config map: [Policy] /Channel/Application/Readers" +peer1.org2.example.com | [135b 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ae5c0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [129d 08-31 20:51:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 a7 0f 00 79 64 a4 a7 |...yd..| +peer0.org2.example.com | 00000010 91 a5 f0 a4 db 56 e5 75 fe af c3 2e 3a b6 9e 72 |.....V.u....:..r| +orderer0.example.com | "2020-08-31 20:52:19.235 UTC [common.configtx] addToMap -> DEBU 1537 Adding to config map: [Policy] /Channel/Application/Writers" +peer1.org2.example.com | [135c 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ae5c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [129e 08-31 20:51:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10ee 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [13f6 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 a3 4c 3c b8 49 5b c9 1f 66 87 44 |0D. R.L<.I[..f.D| +orderer0.example.com | "2020-08-31 20:52:19.241 UTC [common.configtx] addToMap -> DEBU 1538 Adding to config map: [Group] /Channel" +peer1.org2.example.com | [135d 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ae5c0 principal evaluation fails +peer1.org1.example.com | [129f 08-31 20:51:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [10ef 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | 00000010 c0 f8 5c 9d 06 ba d4 5e cc ac 06 f6 41 41 44 00 |..\....^....AAD.| +orderer0.example.com | "2020-08-31 20:52:19.242 UTC [common.configtx] addToMap -> DEBU 1539 Adding to config map: [Group] /Channel/Application" +peer1.org2.example.com | [135e 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030ae5c0 gate 1598907085353531400 evaluation fails +peer1.org1.example.com | [12a1 08-31 20:51:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [10f0 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000020 58 b4 5d ed 02 20 38 4f fb 61 35 b5 8a 69 7d 8a |X.].. 8O.a5..i}.| +orderer0.example.com | "2020-08-31 20:52:19.242 UTC [common.configtx] addToMap -> DEBU 153a Adding to config map: [Group] /Channel/Application/Org1MSP" +peer1.org2.example.com | [135f 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [12a0 08-31 20:51:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10f1 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000030 c1 4e 97 95 22 c4 50 ea f5 c9 87 09 42 66 f8 90 |.N..".P.....Bf..| +orderer0.example.com | "2020-08-31 20:52:19.242 UTC [common.configtx] addToMap -> DEBU 153b Adding to config map: [Group] /Channel/Application/Org2MSP" +peer1.org2.example.com | [1360 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [12a2 08-31 20:51:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 2c 0a bb e8 62 57 e5 1c 19 9f cc 51 e1 bd de |.,...bW.....Q...| +peer0.org1.example.com | [10f2 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | 00000040 06 15 8a 5e 70 be |...^p.| +orderer0.example.com | "2020-08-31 20:52:19.242 UTC [common.configtx] addToMap -> DEBU 153c Adding to config map: [Group] /Channel/Application/Org3MSP" +peer1.org2.example.com | [1361 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000010 f6 3d 7a a4 97 e4 33 aa cc 3a 8f 54 07 ea 74 2b |.=z...3..:.T..t+| +peer0.org1.example.com | [10f3 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13f7 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.243 UTC [common.configtx] addToMap -> DEBU 153d Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +peer1.org2.example.com | [1362 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030aeb30 gate 1598907085355823300 evaluation starts +peer1.org1.example.com | [12a3 08-31 20:51:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe 34 9c 55 9b 9b 7d a8 c5 8b 33 |0E.!..4.U..}...3| +peer0.org1.example.com | [10f4 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13f8 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.244 UTC [common.configtx] addToMap -> DEBU 153e Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +peer1.org2.example.com | [1363 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030aeb30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 7b 7f 35 92 85 b2 39 dc e2 de a5 3d f4 7f 7b 8f |{.5...9....=..{.| +peer0.org1.example.com | [10f5 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [13f9 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.244 UTC [common.configtx] addToMap -> DEBU 153f Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer1.org2.example.com | [1364 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030aeb30 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000020 de d6 7a fd 95 02 20 0a 8d d1 de 7a 04 47 e8 cd |..z... ....z.G..| +peer0.org1.example.com | [10f6 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [13fa 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.244 UTC [common.configtx] addToMap -> DEBU 1540 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [1365 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030aeb30 principal matched by identity 0 +peer1.org1.example.com | 00000030 45 fa d7 16 c6 0d f6 df be 09 17 89 c2 ae ef 58 |E..............X| +peer0.org1.example.com | [10f7 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13fb 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.244 UTC [common.configtx] addToMap -> DEBU 1541 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer1.org2.example.com | [1366 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 01 23 82 bf 60 b9 df a5 a4 87 79 a9 c0 93 8f |..#..`.....y....| +peer1.org1.example.com | 00000040 84 b4 f1 55 a1 6f a8 |...U.o.| +peer0.org1.example.com | [10f8 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [13fc 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.245 UTC [common.configtx] addToMap -> DEBU 1542 Adding to config map: [Value] /Channel/Application/ACLs" +peer1.org2.example.com | 00000010 96 b1 1d bc 55 99 23 1b a1 68 c3 43 6d 81 5a c2 |....U.#..h.Cm.Z.| +peer1.org1.example.com | [12a4 08-31 20:51:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [10f9 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [13fd 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | "2020-08-31 20:52:19.245 UTC [common.configtx] addToMap -> DEBU 1543 Adding to config map: [Value] /Channel/Application/Capabilities" +peer1.org2.example.com | [1367 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 95 0a 7c 82 f3 8a 52 4f 41 85 |0E.!....|...ROA.| +peer1.org1.example.com | [12a5 08-31 20:51:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [10fa 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [13fe 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 f6 e0 95 9d 1c 80 eb 6f 79 9d 8c c2 7a 8d de |........oy...z..| +orderer0.example.com | "2020-08-31 20:52:19.245 UTC [common.configtx] addToMap -> DEBU 1544 Adding to config map: [Policy] /Channel/Application/Admins" +peer1.org2.example.com | 00000010 07 e5 ae 36 59 aa ea 29 35 a5 e8 8c 74 b1 2a 72 |...6Y..)5...t.*r| +peer1.org1.example.com | [12a6 08-31 20:51:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [10fb 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 da 6f f9 1c c5 fd 67 d2 7d e2 fb 29 31 35 fb 13 |.o....g.}..)15..| +orderer0.example.com | "2020-08-31 20:52:19.245 UTC [common.configtx] addToMap -> DEBU 1545 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer1.org2.example.com | 00000020 d4 44 6f 0a ce 02 20 59 64 55 00 21 05 6c 9f d0 |.Do... YdU.!.l..| +peer1.org1.example.com | [12a7 08-31 20:51:25.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d8 6c fb 8b b4 bb 1e 3d 37 36 65 ac 75 a1 ab |D.l.....=76e.u..| +peer0.org2.example.com | [13ff 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 d8 36 b5 43 13 f8 35 49 b2 51 b7 |0D. c.6.C..5I.Q.| +peer0.org1.example.com | [10fc 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\202J\341\206\345Rj\274\002 t\353\343\003H\222;\354\274C6,9W\215\360\361s\264\367\205\315\241\250\270\247\017\000yd\244\247" > > alive: +orderer0.example.com | "2020-08-31 20:52:19.245 UTC [common.configtx] addToMap -> DEBU 1546 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer1.org2.example.com | 00000030 a2 80 94 34 ce 87 24 fa 0f 23 98 7a b6 35 33 5c |...4..$..#.z.53\| +peer1.org1.example.com | 00000010 d6 a9 39 2d c0 86 11 7a 78 b0 38 50 42 86 02 0c |..9-...zx.8PB...| +peer0.org2.example.com | 00000010 15 9d 4f d9 24 7e a7 1b 2e 89 03 83 43 2b 46 5c |..O.$~......C+F\| +peer0.org1.example.com | [10fd 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.245 UTC [common.configtx] addToMap -> DEBU 1547 Adding to config map: [Policy] /Channel/Application/Readers" +peer1.org2.example.com | 00000040 c5 9b c7 ec 3c e2 04 |....<..| +peer1.org1.example.com | [12a8 08-31 20:51:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c cc 0d 20 6f 76 e1 8c d0 cb c7 |0E.!.... ov.....| +peer0.org2.example.com | 00000020 98 eb ea a7 02 20 24 28 40 8c 46 12 16 47 b9 d1 |..... $(@.F..G..| +peer0.org1.example.com | [10fe 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.246 UTC [common.configtx] addToMap -> DEBU 1548 Adding to config map: [Policy] /Channel/Application/Writers" +peer1.org2.example.com | [1368 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030aeb30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 1b d5 69 4c 6d 69 9c 90 b7 33 ef e3 3e b6 ad 35 |..iLmi...3..>..5| +peer0.org2.example.com | 00000030 04 c1 0c b9 5d b5 94 a6 ff 22 8a f5 a4 d7 fe 80 |....]...."......| +peer0.org1.example.com | [10ff 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.246 UTC [common.configtx] verifyDeltaSet -> DEBU 1549 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +peer1.org2.example.com | [1369 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030aeb30 gate 1598907085355823300 evaluation succeeds +peer1.org1.example.com | 00000020 88 66 a7 0f c2 02 20 36 d5 b9 d9 13 ff 20 2c 0e |.f.... 6..... ,.| +peer0.org2.example.com | 00000040 09 37 12 fb 78 cf |.7..x.| +peer0.org1.example.com | [1100 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.246 UTC [common.configtx] verifyDeltaSet -> DEBU 154a Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +peer1.org2.example.com | [136a 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000030 d5 6c e0 aa 03 16 06 7e 75 b9 95 a8 7d b7 5a 26 |.l.....~u...}.Z&| +peer0.org2.example.com | [1400 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1101 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.246 UTC [common.configtx] verifyDeltaSet -> DEBU 154b Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer1.org2.example.com | [136b 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000040 16 85 87 b4 f2 37 4f |.....7O| +peer0.org1.example.com | [1102 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1401 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.247 UTC [common.configtx] verifyDeltaSet -> DEBU 154c Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [136c 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [12a9 08-31 20:51:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1103 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1402 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.247 UTC [common.configtx] verifyDeltaSet -> DEBU 154d Processing change to key: [Group] /Channel/Application/Org3MSP" +peer1.org2.example.com | [136d 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [12aa 08-31 20:51:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1104 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1403 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-08-31 20:52:19.247 UTC [common.configtx] verifyDeltaSet -> DEBU 154e Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +peer1.org2.example.com | [136e 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12ab 08-31 20:51:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1105 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1404 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df de a9 43 65 43 25 6a a9 bb 70 39 02 4a c3 d1 |...CeC%j..p9.J..| +orderer0.example.com | "2020-08-31 20:52:19.247 UTC [common.configtx] verifyDeltaSet -> DEBU 154f Processing change to key: [Group] /Channel/Application" +peer1.org2.example.com | [136f 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" lastAliveTS: 1598907045315872200, 32 but got ts: inc_num:1598907045315872200 seq_num:31 +peer1.org1.example.com | [12ac 08-31 20:51:25.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1106 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org2.example.com | 00000010 91 a5 f0 a4 db 56 e5 75 fe af c3 2e 3a b6 9e 72 |.....V.u....:..r| +orderer0.example.com | "2020-08-31 20:52:19.247 UTC [common.configtx] policyForItem -> DEBU 1550 Getting policy for item Application with mod_policy Admins" +peer1.org2.example.com | [1370 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12ad 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1107 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1405 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 a3 4c 3c b8 49 5b c9 1f 66 87 44 |0D. R.L<.I[..f.D| +orderer0.example.com | "2020-08-31 20:52:19.248 UTC [policies] Manager -> DEBU 1551 Manager Channel looking up path []" +peer1.org2.example.com | [1371 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12ae 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1108 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 c0 f8 5c 9d 06 ba d4 5e cc ac 06 f6 41 41 44 00 |..\....^....AAD.| +orderer0.example.com | "2020-08-31 20:52:19.248 UTC [policies] Manager -> DEBU 1552 Manager Channel has managers Orderer" +peer1.org2.example.com | [1372 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12af 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1109 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 58 b4 5d ed 02 20 38 4f fb 61 35 b5 8a 69 7d 8a |X.].. 8O.a5..i}.| +orderer0.example.com | "2020-08-31 20:52:19.248 UTC [policies] Manager -> DEBU 1553 Manager Channel has managers Application" +peer1.org2.example.com | [1373 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12b0 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [110a 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 c1 4e 97 95 22 c4 50 ea f5 c9 87 09 42 66 f8 90 |.N..".P.....Bf..| +orderer0.example.com | "2020-08-31 20:52:19.248 UTC [policies] Manager -> DEBU 1554 Manager Channel looking up path [Application]" +peer1.org2.example.com | [1374 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12b1 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [110b 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 06 15 8a 5e 70 be |...^p.| +orderer0.example.com | "2020-08-31 20:52:19.248 UTC [policies] Manager -> DEBU 1555 Manager Channel has managers Orderer" +peer1.org2.example.com | [1375 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12b2 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [110c 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1406 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.248 UTC [policies] Manager -> DEBU 1556 Manager Channel has managers Application" +peer1.org2.example.com | [1376 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12b3 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [110d 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1407 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.249 UTC [policies] Manager -> DEBU 1557 Manager Channel/Application looking up path []" +peer1.org2.example.com | [1377 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12b4 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [110e 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1408 08-31 20:51:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.249 UTC [policies] Manager -> DEBU 1558 Manager Channel/Application has managers Org1MSP" +peer1.org2.example.com | [1378 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12b5 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [110f 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1409 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.249 UTC [policies] Manager -> DEBU 1559 Manager Channel/Application has managers Org2MSP" +peer1.org2.example.com | [1379 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1110 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [12b6 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org2.example.com | [140a 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.249 UTC [policies] Evaluate -> DEBU 155a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +peer1.org2.example.com | [137a 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1111 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [12b7 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [140b 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.249 UTC [policies] Evaluate -> DEBU 155b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [1112 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [137b 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12b8 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [140c 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.249 UTC [policies] Evaluate -> DEBU 155c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +peer0.org1.example.com | [1113 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [137c 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [12b9 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [140d 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.249 UTC [cauthdsl] deduplicate -> WARN 155d De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +peer0.org1.example.com | [1114 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e77d20 gate 1598907077477382100 evaluation starts +peer1.org2.example.com | [137d 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12ba 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [140e 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.249 UTC [cauthdsl] func1 -> DEBU 155e 0xc0009893e0 gate 1598907139249941000 evaluation starts" +peer0.org1.example.com | [1115 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e77d20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [137e 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12bb 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [140f 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.249 UTC [cauthdsl] func2 -> DEBU 155f 0xc0009893e0 signed by 0 principal evaluation starts (used [false false false])" +peer1.org2.example.com | [137f 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1116 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e77d20 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [12bc 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1410 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.250 UTC [cauthdsl] func2 -> DEBU 1560 0xc0009893e0 processing identity 0 with bytes of fe10e0" +peer1.org2.example.com | [1380 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1117 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e77d20 principal matched by identity 0 +peer1.org1.example.com | [12bd 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1411 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +orderer0.example.com | "2020-08-31 20:52:19.250 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1561 Checking if identity has been named explicitly as an admin for Org1MSP" +peer1.org2.example.com | [1381 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1118 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 a9 f7 2c a0 f6 b3 39 b4 40 60 70 02 0d 8d db |f..,...9.@`p....| +peer1.org1.example.com | [12be 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1412 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.250 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1562 Checking if identity carries the admin ou for Org1MSP" +peer1.org2.example.com | [1382 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 fa d7 ae 80 29 9c cd 1c 4a e0 65 7b 8e c0 ca 13 |....)...J.e{....| +peer1.org1.example.com | [12bf 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1413 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.250 UTC [msp] Validate -> DEBU 1563 MSP Org1MSP validating identity" +peer1.org2.example.com | [1383 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1119 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 5b cf fe d5 c5 4b c6 f2 a2 15 |0E.!..[....K....| +peer1.org1.example.com | [12c0 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1414 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.250 UTC [msp] getCertificationChain -> DEBU 1564 MSP Org1MSP getting certification chain" +peer1.org2.example.com | [1384 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 6b a2 72 5b 8b 94 46 8a 0a 7b 9d 5d 6f 89 e7 bf |k.r[..F..{.]o...| +peer1.org1.example.com | [12c1 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:19.251 UTC [msp] hasOURole -> DEBU 1565 MSP Org1MSP checking if the identity is a client" +peer1.org2.example.com | [1385 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | 00000020 8c cf 76 f6 7b 02 20 65 0e 52 94 55 59 f3 3e 78 |..v.{. e.R.UY.>x| +peer1.org1.example.com | [12c2 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1415 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.251 UTC [msp] getCertificationChain -> DEBU 1566 MSP Org1MSP getting certification chain" +peer1.org2.example.com | [1386 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000030 26 ea 4a 41 5e 47 da 63 17 44 ed 6f 7d cc 6f 57 |&.JA^G.c.D.o}.oW| +peer1.org1.example.com | [12c3 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1416 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-08-31 20:52:19.251 UTC [cauthdsl] func2 -> DEBU 1567 0xc0009893e0 principal matched by identity 0" +peer1.org2.example.com | [1387 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 f0 81 92 96 a6 e0 6b |......k| +peer0.org2.example.com | [1417 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.252 UTC [msp.identity] Verify -> DEBU 1568 Verify: digest = 00000000 74 79 4d e9 a3 71 1d 24 0f fe ed 23 9d 11 9b 00 |tyM..q.$...#....| +peer1.org2.example.com | [1388 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [111a 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e77d20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [12c4 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fcef0 gate 1598907085488897000 evaluation starts +peer0.org2.example.com | [1418 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | 00000010 3e 25 10 29 78 cb 07 bc 16 8a c0 53 e9 e3 ae 76 |>%.)x......S...v|" +peer1.org2.example.com | [1389 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [111b 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e77d20 gate 1598907077477382100 evaluation succeeds +peer1.org1.example.com | [12c5 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fcef0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1419 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.252 UTC [msp.identity] Verify -> DEBU 1569 Verify: sig = 00000000 30 45 02 21 00 ed 6e 97 55 ce e1 8f 4a 2e 44 e9 |0E.!..n.U...J.D.| +peer1.org2.example.com | [138a 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [111c 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [12c6 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fcef0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | 00000010 86 cc c7 d8 15 32 92 11 5c 0f ae 9c 24 1e e3 31 |.....2..\...$..1| +peer0.org2.example.com | [141a 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [138b 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [111d 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [12c7 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fcef0 principal matched by identity 0 +orderer0.example.com | 00000020 b0 8c 3d 39 f2 02 20 6c 7f 82 68 b5 f7 a9 fc 04 |..=9.. l..h.....| +peer0.org2.example.com | [141b 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [138c 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [111e 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [12c8 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 34 87 21 be 85 71 4e 5a 88 3d 3b 3b 75 ef 2c |.4.!..qNZ.=;;u.,| +orderer0.example.com | 00000030 9c c0 f7 ee 68 f9 99 1d 35 23 c7 b2 62 e6 51 30 |....h...5#..b.Q0| +peer0.org2.example.com | [141c 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [138d 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [111f 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 90 5b 49 5f 8c 7e d6 5f f8 12 28 23 b5 b9 60 99 |.[I_.~._..(#..`.| +orderer0.example.com | 00000040 4f f1 8e 15 f4 64 79 |O....dy|" +peer0.org2.example.com | [141d 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [138e 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1120 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [12c9 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 0c cb c2 a7 b7 57 f8 3d 0e d4 |0E.!.......W.=..| +orderer0.example.com | "2020-08-31 20:52:19.252 UTC [cauthdsl] func2 -> DEBU 156a 0xc0009893e0 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [141e 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033287b0 gate 1598907081564562100 evaluation starts +peer1.org2.example.com | [138f 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1121 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | 00000010 28 40 8f cb de 89 02 72 a2 df 9e 17 52 91 af 8b |(@.....r....R...| +orderer0.example.com | "2020-08-31 20:52:19.253 UTC [cauthdsl] func1 -> DEBU 156b 0xc0009893e0 gate 1598907139249941000 evaluation succeeds" +peer0.org2.example.com | [141f 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033287b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1390 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1122 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000020 0d 55 d4 e1 66 02 20 02 b2 a6 44 60 3d 64 27 1c |.U..f. ...D`=d'.| +orderer0.example.com | "2020-08-31 20:52:19.253 UTC [policies] Evaluate -> DEBU 156c Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +peer0.org2.example.com | [1420 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033287b0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1391 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1123 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | 00000030 d7 4d 29 d0 26 64 5d 7c a1 f9 29 23 ae b3 c8 af |.M).&d]|..)#....| +orderer0.example.com | "2020-08-31 20:52:19.253 UTC [policies] Evaluate -> DEBU 156d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +peer0.org2.example.com | [1421 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033287b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1392 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 34 87 21 be 85 71 4e 5a 88 3d 3b 3b 75 ef 2c |.4.!..qNZ.=;;u.,| +peer0.org1.example.com | [1124 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | 00000040 c5 2b 4f be 87 14 e0 |.+O....| +orderer0.example.com | "2020-08-31 20:52:19.253 UTC [policies] Evaluate -> DEBU 156e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +peer0.org2.example.com | [1422 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033287b0 principal evaluation fails +peer1.org2.example.com | 00000010 90 5b 49 5f 8c 7e d6 5f f8 12 28 23 b5 b9 60 99 |.[I_.~._..(#..`.| +peer0.org1.example.com | [1125 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12ca 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.253 UTC [cauthdsl] deduplicate -> WARN 156f De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +peer0.org2.example.com | [1423 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033287b0 gate 1598907081564562100 evaluation fails +peer1.org2.example.com | [1393 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 0c cb c2 a7 b7 57 f8 3d 0e d4 |0E.!.......W.=..| +peer0.org1.example.com | [1126 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12cb 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fcef0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:19.253 UTC [cauthdsl] func1 -> DEBU 1570 0xc0009ac1b0 gate 1598907139253522800 evaluation starts" +peer0.org2.example.com | [1424 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 28 40 8f cb de 89 02 72 a2 df 9e 17 52 91 af 8b |(@.....r....R...| +peer0.org1.example.com | [1127 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12cc 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039fcef0 gate 1598907085488897000 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:19.253 UTC [cauthdsl] func2 -> DEBU 1571 0xc0009ac1b0 signed by 0 principal evaluation starts (used [false false false])" +peer0.org2.example.com | [1425 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000020 0d 55 d4 e1 66 02 20 02 b2 a6 44 60 3d 64 27 1c |.U..f. ...D`=d'.| +peer0.org1.example.com | [1128 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [12cd 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.253 UTC [cauthdsl] func2 -> DEBU 1572 0xc0009ac1b0 processing identity 0 with bytes of fe10e0" +peer0.org2.example.com | [1426 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | 00000030 d7 4d 29 d0 26 64 5d 7c a1 f9 29 23 ae b3 c8 af |.M).&d]|..)#....| +peer0.org1.example.com | [1129 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12ce 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.253 UTC [cauthdsl] func2 -> DEBU 1573 0xc0009ac1b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org2.example.com | [1427 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003328d20 gate 1598907081568435500 evaluation starts +peer1.org2.example.com | 00000040 c5 2b 4f be 87 14 e0 |.+O....| +peer0.org1.example.com | [112a 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12cf 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.253 UTC [cauthdsl] func2 -> DEBU 1574 0xc0009ac1b0 processing identity 1 with bytes of fe10e0" +peer0.org2.example.com | [1428 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003328d20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1394 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [112b 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [12d0 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.253 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1575 Checking if identity has been named explicitly as an admin for Org2MSP" +peer0.org2.example.com | [1429 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003328d20 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1395 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [112c 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:19.253 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1576 Checking if identity carries the admin ou for Org2MSP" +peer1.org1.example.com | [12d1 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [142a 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003328d20 principal matched by identity 0 +peer1.org2.example.com | [1396 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [112d 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" > alive: alive: +orderer0.example.com | "2020-08-31 20:52:19.253 UTC [msp] Validate -> DEBU 1577 MSP Org2MSP validating identity" +peer1.org1.example.com | [12d2 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [142b 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 2c 0a bb e8 62 57 e5 1c 19 9f cc 51 e1 bd de |.,...bW.....Q...| +peer1.org2.example.com | [1397 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [112e 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.253 UTC [msp] getCertificationChain -> DEBU 1578 MSP Org2MSP getting certification chain" +peer1.org1.example.com | [12d3 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000010 f6 3d 7a a4 97 e4 33 aa cc 3a 8f 54 07 ea 74 2b |.=z...3..:.T..t+| +peer1.org2.example.com | [1398 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [112f 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.253 UTC [msp] hasOURole -> DEBU 1579 MSP Org2MSP checking if the identity is a client" +peer1.org1.example.com | [12d5 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [142c 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe 34 9c 55 9b 9b 7d a8 c5 8b 33 |0E.!..4.U..}...3| +peer1.org2.example.com | [1399 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1130 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:19.254 UTC [msp] getCertificationChain -> DEBU 157a MSP Org2MSP getting certification chain" +peer1.org1.example.com | [12d4 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 7b 7f 35 92 85 b2 39 dc e2 de a5 3d f4 7f 7b 8f |{.5...9....=..{.| +peer1.org2.example.com | [139a 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1131 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:19.254 UTC [cauthdsl] func2 -> DEBU 157b 0xc0009ac1b0 principal matched by identity 1" +peer1.org1.example.com | [12d6 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | 00000020 de d6 7a fd 95 02 20 0a 8d d1 de 7a 04 47 e8 cd |..z... ....z.G..| +peer1.org2.example.com | [139b 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1132 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:19.254 UTC [msp.identity] Verify -> DEBU 157c Verify: digest = 00000000 1c 16 ac 57 86 d3 c3 21 1e c6 7b f6 f4 33 15 53 |...W...!..{..3.S| +peer1.org1.example.com | [12d7 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 45 fa d7 16 c6 0d f6 df be 09 17 89 c2 ae ef 58 |E..............X| +peer1.org2.example.com | [139c 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1133 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | 00000010 51 0a 12 8c c9 dc af 08 54 64 1f 16 1c 10 79 1c |Q.......Td....y.|" +peer1.org1.example.com | [12d8 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 84 b4 f1 55 a1 6f a8 |...U.o.| +peer1.org2.example.com | [139d 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1134 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:19.254 UTC [msp.identity] Verify -> DEBU 157d Verify: sig = 00000000 30 45 02 21 00 fd 5d cb e8 72 66 8f d2 c7 ff a3 |0E.!..]..rf.....| +peer1.org1.example.com | [12d9 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [142d 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003328d20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [139e 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1135 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | 00000010 aa d3 dc 46 c5 bd 34 a5 d8 7d dc a8 35 2c d6 29 |...F..4..}..5,.)| +peer1.org1.example.com | [12da 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [142e 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003328d20 gate 1598907081568435500 evaluation succeeds +peer1.org2.example.com | [139f 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | 00000020 07 b0 75 b1 d5 02 20 0a ef 18 c5 de bf be 2c 7c |..u... .......,|| +peer0.org1.example.com | [1136 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [12db 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [142f 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [13a0 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | 00000030 16 ea 9e 3a ba 4b 56 95 85 92 21 ee 94 17 ad 3b |...:.KV...!....;| +peer0.org1.example.com | [1137 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12dc 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1430 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [13a1 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000040 78 aa 13 9c c2 d4 33 |x.....3|" +peer0.org1.example.com | [1138 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [12dd 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1431 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [13a2 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.254 UTC [cauthdsl] func2 -> DEBU 157e 0xc0009ac1b0 principal evaluation succeeds for identity 1" +peer0.org1.example.com | [1139 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12de 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1432 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [13a3 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:19.254 UTC [cauthdsl] func1 -> DEBU 157f 0xc0009ac1b0 gate 1598907139253522800 evaluation succeeds" +peer0.org1.example.com | [113a 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [12df 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1433 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [13a4 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.254 UTC [policies] Evaluate -> DEBU 1580 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | [113b 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12e0 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1434 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [13a5 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.255 UTC [policies] Evaluate -> DEBU 1581 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | [113c 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [12e1 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1435 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [13a6 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.255 UTC [policies] Evaluate -> DEBU 1582 Signature set satisfies policy /Channel/Application/Admins" +peer0.org1.example.com | [113d 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [12e2 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1436 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [13a7 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.255 UTC [policies] Evaluate -> DEBU 1583 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +peer0.org1.example.com | [113e 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12e3 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1437 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [13a8 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.256 UTC [common.configtx] recurseConfigMap -> DEBU 1584 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [113f 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [12e5 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1438 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13a9 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.256 UTC [common.configtx] recurseConfigMap -> DEBU 1585 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | [1140 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [12e6 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1439 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13aa 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.256 UTC [common.configtx] recurseConfigMap -> DEBU 1586 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [1141 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [12e7 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [143a 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13ab 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.256 UTC [common.configtx] recurseConfigMap -> DEBU 1587 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | [1142 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12e4 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [143b 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [13ac 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.257 UTC [common.configtx] recurseConfigMap -> DEBU 1588 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org1.example.com | [1143 08-31 20:51:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [12e8 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [143c 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13ad 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.257 UTC [common.configtx] recurseConfigMap -> DEBU 1589 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [1144 08-31 20:51:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [12e9 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [143d 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13ae 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | "2020-08-31 20:52:19.257 UTC [common.configtx] recurseConfigMap -> DEBU 158a Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [1145 08-31 20:51:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [12ea 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [143e 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13af 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 a0 91 8f c9 0d 9a f3 64 cb 73 56 41 2a fd a4 |u.......d.sVA*..| +orderer0.example.com | "2020-08-31 20:52:19.257 UTC [common.configtx] recurseConfigMap -> DEBU 158b Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | [1146 08-31 20:51:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [12eb 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [143f 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 c7 23 c5 80 ec 5e 5b 08 28 f6 66 94 65 25 e1 08 |.#...^[.(.f.e%..| +orderer0.example.com | "2020-08-31 20:52:19.258 UTC [common.configtx] recurseConfigMap -> DEBU 158c Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [1147 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [12ec 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [13b0 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f e5 1a c4 4d 07 23 7a d3 a5 2a 6d |0D. ....M.#z..*m| +peer0.org2.example.com | [1440 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\334|\262l\314\326\301\004^!2g\334#\245\025\235\370," > +orderer0.example.com | "2020-08-31 20:52:19.258 UTC [common.configtx] recurseConfigMap -> DEBU 158d Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [1148 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161018 +peer1.org1.example.com | [12ed 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 54 39 77 79 3c dd 18 bb da d5 1d 5a b7 96 d1 f6 |T9wy<......Z....| +peer0.org2.example.com | [1441 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.259 UTC [common.configtx] recurseConfigMap -> DEBU 158e Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [1149 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D532C2FF639050FC8A0230EC418AE2122451BD9029CD37F0496207C3A4DB691F +peer1.org1.example.com | [12ee 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 58 ac 39 61 02 20 2e 9c ef 20 ce ea cd 18 31 0e |X.9a. ... ....1.| +peer0.org2.example.com | [1442 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.259 UTC [common.configtx] recurseConfigMap -> DEBU 158f Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [114a 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [12ef 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | 00000030 91 1b f5 29 b4 2a d7 16 7c 4b 6b a0 ec d5 98 a4 |...).*..|Kk.....| +peer0.org2.example.com | [1443 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.259 UTC [common.configtx] recurseConfigMap -> DEBU 1590 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | [114b 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [12f0 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1444 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 82 7c 41 43 5c 48 |.|AC\H| +orderer0.example.com | "2020-08-31 20:52:19.260 UTC [common.configtx] recurseConfigMap -> DEBU 1591 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org1.example.com | [114c 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [12f1 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1445 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13b1 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +orderer0.example.com | "2020-08-31 20:52:19.260 UTC [common.configtx] recurseConfigMap -> DEBU 1592 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org1.example.com | [114d 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [12f2 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1446 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org1.example.com | [114e 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.260 UTC [common.configtx] recurseConfigMap -> DEBU 1593 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer1.org1.example.com | [12f3 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1447 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13b2 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 ff 6b 08 07 9d 89 fe 0b fe 0c |0E.!...k........| +peer0.org1.example.com | [114f 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.260 UTC [common.configtx] recurseConfigMap -> DEBU 1594 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer1.org1.example.com | [12f4 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1448 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 01 c1 10 aa be 77 74 8b 10 7a 40 9c e9 b9 f3 02 |.....wt..z@.....| +peer0.org1.example.com | [1150 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.260 UTC [common.configtx] recurseConfigMap -> DEBU 1595 Setting policy for key Admins to " +peer1.org1.example.com | [12f5 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1449 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 73 67 8a a5 cc 02 20 36 96 a7 ae 88 de 4a 02 81 |sg.... 6.....J..| +peer0.org1.example.com | [1151 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:19.260 UTC [common.configtx] recurseConfigMap -> DEBU 1596 Setting policy for key Endorsement to " +peer1.org1.example.com | [12f6 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [144a 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 85 86 6c 0a 77 55 3d d8 dd 51 b9 6a 23 e2 8a b5 |..l.wU=..Q.j#...| +peer0.org1.example.com | [1152 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.261 UTC [common.configtx] recurseConfigMap -> DEBU 1597 Setting policy for key LifecycleEndorsement to " +peer1.org1.example.com | [12f7 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [144b 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 b0 3a df 98 d6 38 23 |.:...8#| +peer0.org1.example.com | [1153 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.261 UTC [common.configtx] recurseConfigMap -> DEBU 1598 Setting policy for key Readers to " +peer1.org1.example.com | [12f8 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [144c 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13b3 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1154 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.261 UTC [common.configtx] recurseConfigMap -> DEBU 1599 Setting policy for key Writers to " +peer1.org1.example.com | [12f9 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [144d 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13b4 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [1155 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:19.261 UTC [common.configtx] recurseConfigMap -> DEBU 159a Setting policy for key Readers to policy: mod_policy:"Admins" " +peer1.org1.example.com | [12fa 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [144e 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13b5 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1156 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.configtx] recurseConfigMap -> DEBU 159b Setting policy for key Writers to policy: mod_policy:"Admins" " +peer1.org1.example.com | [12fb 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [144f 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [13b6 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1157 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.configtx] recurseConfigMap -> DEBU 159c Setting policy for key Admins to policy: mod_policy:"Admins" " +peer1.org1.example.com | [12fc 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1450 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [13b7 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1158 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.channelconfig] NewStandardValues -> DEBU 159d Initializing protos for *channelconfig.ChannelProtos" +peer1.org1.example.com | [12fd 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1452 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13b8 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1159 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159e Processing field: HashingAlgorithm" +peer1.org1.example.com | [12fe 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1451 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [13b9 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [115a 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159f Processing field: BlockDataHashingStructure" +peer1.org1.example.com | [12ff 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1453 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [13ba 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [115b 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a0 Processing field: OrdererAddresses" +peer1.org1.example.com | [1300 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1eea0 gate 1598907085530481600 evaluation starts +peer0.org2.example.com | [1454 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13bb 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [115c 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a1 Processing field: Consortium" +peer1.org1.example.com | [1301 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1eea0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1455 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13bc 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [115d 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 32 c2 ff 63 90 50 fc 8a 02 30 ec 41 8a e2 12 |.2..c.P...0.A...| +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a2 Processing field: Capabilities" +peer1.org1.example.com | [1302 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1eea0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1456 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [13bd 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 24 51 bd 90 29 cd 37 f0 49 62 07 c3 a4 db 69 1f |$Q..).7.Ib....i.| +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.channelconfig] NewStandardValues -> DEBU 15a3 Initializing protos for *channelconfig.OrdererProtos" +peer1.org1.example.com | [1303 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1eea0 principal matched by identity 0 +peer0.org2.example.com | [1457 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13be 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [115e 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d af 77 90 ed aa a9 66 05 e0 0f |0E.!...w....f...| +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a4 Processing field: ConsensusType" +peer1.org1.example.com | [1304 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 a0 91 8f c9 0d 9a f3 64 cb 73 56 41 2a fd a4 |u.......d.sVA*..| +peer0.org2.example.com | [1458 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13bf 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | 00000010 fb c7 a9 89 84 a4 47 54 18 d6 44 61 7a d4 2a 80 |......GT..Daz.*.| +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a5 Processing field: BatchSize" +peer1.org1.example.com | 00000010 c7 23 c5 80 ec 5e 5b 08 28 f6 66 94 65 25 e1 08 |.#...^[.(.f.e%..| +peer0.org2.example.com | [1459 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13c0 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 18 27 f0 9e 74 02 20 22 29 d3 31 f0 eb ac af 9b |.'..t. ").1.....| +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a6 Processing field: BatchTimeout" +peer1.org1.example.com | [1305 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f e5 1a c4 4d 07 23 7a d3 a5 2a 6d |0D. ....M.#z..*m| +peer0.org2.example.com | [145a 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [13c1 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 e5 39 79 0a b9 f9 12 5e be 3b 52 d3 d5 c9 68 90 |.9y....^.;R...h.| +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a7 Processing field: KafkaBrokers" +peer1.org1.example.com | 00000010 54 39 77 79 3c dd 18 bb da d5 1d 5a b7 96 d1 f6 |T9wy<......Z....| +peer0.org2.example.com | [145b 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [13c2 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000040 ee 6f fa 73 27 58 c7 |.o.s'X.| +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a8 Processing field: ChannelRestrictions" +peer1.org1.example.com | 00000020 58 ac 39 61 02 20 2e 9c ef 20 ce ea cd 18 31 0e |X.9a. ... ....1.| +peer0.org2.example.com | [145c 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [13c3 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [115f 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a9 Processing field: Capabilities" +peer1.org1.example.com | 00000030 91 1b f5 29 b4 2a d7 16 7c 4b 6b a0 ec d5 98 a4 |...).*..|Kk.....| +peer0.org2.example.com | [145d 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [13c4 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1160 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.channelconfig] NewStandardValues -> DEBU 15aa Initializing protos for *channelconfig.OrdererOrgProtos" +peer1.org1.example.com | 00000040 82 7c 41 43 5c 48 |.|AC\H| +peer0.org2.example.com | [145e 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [13c5 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1161 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ab Processing field: Endpoints" +peer1.org1.example.com | [1306 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1eea0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [145f 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [13c6 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1162 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.channelconfig] NewStandardValues -> DEBU 15ac Initializing protos for *channelconfig.OrganizationProtos" +peer1.org1.example.com | [1307 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1eea0 gate 1598907085530481600 evaluation succeeds +peer1.org2.example.com | [13c7 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1460 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003343330 gate 1598907082229915500 evaluation starts +peer0.org1.example.com | [1163 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 7b 55 40 22 53 fb bd b2 ea 57 b6 c3 68 bf 11 |.{U@"S....W..h..| +orderer0.example.com | "2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ad Processing field: MSP" +peer1.org1.example.com | [1308 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [13c8 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1461 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003343330 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 b7 47 2f 6d 7f cd 9a 57 86 c2 3c 49 73 3d 5f d5 |.G/m...W.. DEBU 15ae Setting up MSP for org OrdererOrg" +peer1.org1.example.com | [1309 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [13c9 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1462 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003343330 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1164 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 65 c2 3a e7 ad bd 89 c0 57 ec |0E.!..e.:.....W.| +orderer0.example.com | "2020-08-31 20:52:19.263 UTC [msp] newBccspMsp -> DEBU 15af Creating BCCSP-based MSP instance" +peer1.org1.example.com | [130a 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [13ca 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1463 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003343330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000010 3f 8c 8c db 68 8e 65 97 24 b6 db cb 05 11 40 b6 |?...h.e.$.....@.| +orderer0.example.com | "2020-08-31 20:52:19.264 UTC [msp] New -> DEBU 15b0 Creating Cache-MSP instance" +peer1.org1.example.com | [130b 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [13cb 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1464 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003343330 principal evaluation fails +peer0.org1.example.com | 00000020 ac c0 db 55 9c 02 20 25 da 0e f6 bb 23 97 81 1d |...U.. %....#...| +orderer0.example.com | "2020-08-31 20:52:19.264 UTC [msp] Setup -> DEBU 15b1 Setting up MSP instance OrdererMSP" +peer1.org1.example.com | [130c 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [13cc 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1465 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003343330 gate 1598907082229915500 evaluation fails +peer0.org1.example.com | 00000030 de 28 62 07 23 09 5e 9e b8 af 62 cc 86 15 b4 83 |.(b.#.^...b.....| +orderer0.example.com | "2020-08-31 20:52:19.264 UTC [msp.identity] newIdentity -> DEBU 15b2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [13cd 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [130d 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1466 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000040 4d e4 d5 c3 33 24 8f |M...3$.| +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | [13ce 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [130e 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1467 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1165 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [130f 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [13cf 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [1468 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | [1166 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1310 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [13d0 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1469 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033438a0 gate 1598907082230816300 evaluation starts +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org1.example.com | [1167 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1311 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13d1 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [146a 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033438a0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | [1168 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1312 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13d2 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [146b 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033438a0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | [1169 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1313 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13d3 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [146c 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033438a0 principal matched by identity 0 +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org1.example.com | [116a 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1314 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [13d4 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [146d 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org1.example.com | [116b 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1315 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13d5 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | [116c 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1316 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13d6 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [146e 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org1.example.com | [116d 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1317 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13d7 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org1.example.com | [116e 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1318 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [13d8 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org1.example.com | [116f 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eddc30 gate 1598907077562076200 evaluation starts +peer1.org1.example.com | [1319 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [13d9 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | nw== +peer0.org1.example.com | [1170 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eddc30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [131a 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [13da 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [1171 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eddc30 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [131b 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13db 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [146f 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033438a0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:19.266 UTC [common.channelconfig] NewStandardValues -> DEBU 15b3 Initializing protos for *channelconfig.ApplicationProtos" +peer0.org1.example.com | [1172 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eddc30 principal matched by identity 0 +peer1.org1.example.com | [131c 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [13dc 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161a70 gate 1598907085556613300 evaluation starts +peer0.org2.example.com | [1470 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033438a0 gate 1598907082230816300 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:19.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b4 Processing field: ACLs" +peer0.org1.example.com | [1173 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 4f 62 6e f8 51 b2 b9 7a 89 a1 94 93 43 19 a1 |tObn.Q..z....C..| +peer1.org1.example.com | [131d 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [13dd 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161a70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1471 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b5 Processing field: Capabilities" +peer0.org1.example.com | 00000010 e1 30 a3 49 45 27 56 4c 01 81 42 14 62 f0 c4 bf |.0.IE'VL..B.b...| +peer1.org1.example.com | [131e 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [13de 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161a70 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1472 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.266 UTC [common.channelconfig] NewStandardValues -> DEBU 15b6 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | [1174 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 4c 56 6b dd 24 ae 93 da c4 0d |0E.!..LVk.$.....| +peer1.org1.example.com | [131f 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [13df 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1473 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b7 Processing field: AnchorPeers" +peer0.org1.example.com | 00000010 34 59 24 07 9d eb 5d d4 90 ae 99 d7 00 49 bd 50 |4Y$...]......I.P| +peer1.org1.example.com | [1320 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [13e0 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161a70 principal evaluation fails +peer0.org2.example.com | [1474 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.267 UTC [common.channelconfig] NewStandardValues -> DEBU 15b8 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | 00000020 97 b1 3a eb 68 02 20 7c b3 d6 f6 1c cf 91 b2 30 |..:.h. |.......0| +peer1.org1.example.com | [1321 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 95 4c 04 7e 5e 5c 63 59 88 95 4c e2 a8 b6 a2 |K.L.~^\cY..L....| +peer1.org2.example.com | [13e1 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161a70 gate 1598907085556613300 evaluation fails +peer0.org2.example.com | [1475 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | "2020-08-31 20:52:19.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b9 Processing field: MSP" +peer0.org1.example.com | 00000030 b2 77 db bc bc 9f b5 b7 b2 42 30 82 2e d9 85 95 |.w.......B0.....| +peer1.org1.example.com | 00000010 ac 86 d1 f0 df d8 c4 5e 37 b4 48 68 63 e9 af c8 |.......^7.Hhc...| +peer1.org2.example.com | [13e2 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +orderer0.example.com | "2020-08-31 20:52:19.267 UTC [common.channelconfig] Validate -> DEBU 15ba Anchor peers for org Org3MSP are " +peer0.org1.example.com | 00000040 b9 ce 81 9e 49 97 68 |....I.h| +peer1.org1.example.com | [1322 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f b4 3e 41 e6 7c 91 f1 17 1c 5c 24 |0D. ..>A.|....\$| +peer1.org2.example.com | [13e3 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1476 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | "2020-08-31 20:52:19.268 UTC [common.channelconfig] validateMSP -> DEBU 15bb Setting up MSP for org Org3MSP" +peer0.org1.example.com | [1175 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eddc30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 2c 10 ae 88 1a d6 e9 79 11 87 10 c1 22 d6 13 58 |,......y...."..X| +peer1.org2.example.com | [13e4 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +orderer0.example.com | "2020-08-31 20:52:19.268 UTC [msp] newBccspMsp -> DEBU 15bc Creating BCCSP-based MSP instance" +peer0.org1.example.com | [1176 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eddc30 gate 1598907077562076200 evaluation succeeds +peer1.org1.example.com | 00000020 be a3 39 a8 02 20 66 19 59 38 de 24 6f 66 6d c0 |..9.. f.Y8.$ofm.| +peer1.org2.example.com | [13e5 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161fe0 gate 1598907085559572300 evaluation starts +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | "2020-08-31 20:52:19.268 UTC [msp] New -> DEBU 15bd Creating Cache-MSP instance" +peer0.org1.example.com | [1177 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000030 6b ae 90 a5 78 8b e0 dd 75 15 85 0c e9 5c 07 88 |k...x...u....\..| +peer1.org2.example.com | [13e6 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161fe0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +orderer0.example.com | "2020-08-31 20:52:19.268 UTC [msp] Setup -> DEBU 15be Setting up MSP instance Org3MSP" +peer0.org1.example.com | [1178 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000040 fe 1b d8 4c 7d f8 |...L}.| +peer1.org2.example.com | [13e7 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161fe0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +orderer0.example.com | "2020-08-31 20:52:19.268 UTC [msp.identity] newIdentity -> DEBU 15bf Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [1179 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1323 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [13e8 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161fe0 principal matched by identity 0 +peer0.org2.example.com | [1477 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [117a 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1324 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [13e9 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 95 4c 04 7e 5e 5c 63 59 88 95 4c e2 a8 b6 a2 |K.L.~^\cY..L....| +peer0.org2.example.com | [1478 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [117b 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1325 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | 00000010 ac 86 d1 f0 df d8 c4 5e 37 b4 48 68 63 e9 af c8 |.......^7.Hhc...| +peer0.org2.example.com | [1479 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [117c 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1326 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [13ea 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f b4 3e 41 e6 7c 91 f1 17 1c 5c 24 |0D. ..>A.|....\$| +peer0.org2.example.com | [147a 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | [117d 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 2c 10 ae 88 1a d6 e9 79 11 87 10 c1 22 d6 13 58 |,......y...."..X| +peer1.org1.example.com | [1327 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [147b 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [117e 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 be a3 39 a8 02 20 66 19 59 38 de 24 6f 66 6d c0 |..9.. f.Y8.$ofm.| +peer1.org1.example.com | [1328 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | [147c 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [117f 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 6b ae 90 a5 78 8b e0 dd 75 15 85 0c e9 5c 07 88 |k...x...u....\..| +peer1.org1.example.com | [1329 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | [147d 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1180 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 fe 1b d8 4c 7d f8 |...L}.| +peer1.org1.example.com | [132a 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +peer0.org2.example.com | [147e 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1181 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [13eb 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161fe0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [132b 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | [147f 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003387190 gate 1598907082234883600 evaluation starts +peer0.org1.example.com | [1182 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [13ec 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003161fe0 gate 1598907085559572300 evaluation succeeds +peer1.org1.example.com | [132c 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +peer0.org2.example.com | [1480 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003387190 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1183 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [13ed 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [132d 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | [1481 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003387190 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [13ee 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1184 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [132e 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +peer0.org2.example.com | [1482 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003387190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1185 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [13ef 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [132f 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +peer0.org2.example.com | [1483 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003387190 principal evaluation fails +peer1.org2.example.com | [13f0 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1330 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [1186 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1484 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003387190 gate 1598907082234883600 evaluation fails +peer1.org2.example.com | [13f1 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1331 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.268 UTC [common.channelconfig] NewStandardValues -> DEBU 15c0 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | [1187 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1485 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [13f2 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1332 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.268 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c1 Processing field: AnchorPeers" +peer0.org1.example.com | [1188 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1486 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [13f3 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1333 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.268 UTC [common.channelconfig] NewStandardValues -> DEBU 15c2 Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | [1189 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1487 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [13f4 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1334 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.268 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c3 Processing field: MSP" +peer0.org1.example.com | [118a 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec5530 gate 1598907077566026800 evaluation starts +peer0.org2.example.com | [1488 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003387700 gate 1598907082235958700 evaluation starts +peer1.org2.example.com | [13f5 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1335 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.268 UTC [common.channelconfig] Validate -> DEBU 15c4 Anchor peers for org Org1MSP are anchor_peers: " +peer0.org1.example.com | [118b 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec5530 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1489 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003387700 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [13f6 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1336 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.268 UTC [common.channelconfig] validateMSP -> DEBU 15c5 Setting up MSP for org Org1MSP" +peer0.org1.example.com | [118c 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec5530 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [148a 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003387700 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [13f7 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1337 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.268 UTC [msp] newBccspMsp -> DEBU 15c6 Creating BCCSP-based MSP instance" +peer0.org1.example.com | [118d 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec5530 principal matched by identity 0 +peer0.org2.example.com | [148b 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003387700 principal matched by identity 0 +peer1.org2.example.com | [13f8 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1338 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.268 UTC [msp] New -> DEBU 15c7 Creating Cache-MSP instance" +peer0.org1.example.com | [118e 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 a9 f7 2c a0 f6 b3 39 b4 40 60 70 02 0d 8d db |f..,...9.@`p....| +peer0.org2.example.com | [148c 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | [13f9 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1339 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-08-31 20:52:19.268 UTC [msp] Setup -> DEBU 15c8 Setting up MSP instance Org1MSP" +peer0.org1.example.com | 00000010 fa d7 ae 80 29 9c cd 1c 4a e0 65 7b 8e c0 ca 13 |....)...J.e{....| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [13fa 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [133a 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 ca e6 88 e9 1f 0d 72 fb 1c 13 83 e0 8f 83 b1 |.......r........| +orderer0.example.com | "2020-08-31 20:52:19.270 UTC [msp.identity] newIdentity -> DEBU 15c9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [118f 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 5b cf fe d5 c5 4b c6 f2 a2 15 |0E.!..[....K....| +peer0.org2.example.com | [148d 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | [13fb 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 57 fc 35 5c 16 19 54 69 8f 56 c2 9d 27 01 8d d0 |W.5\..Ti.V..'...| +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | 00000010 6b a2 72 5b 8b 94 46 8a 0a 7b 9d 5d 6f 89 e7 bf |k.r[..F..{.]o...| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | [13fc 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [133b 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd ac 23 c8 ff 53 ce 34 53 b2 93 |0E.!...#..S.4S..| +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | 00000020 8c cf 76 f6 7b 02 20 65 0e 52 94 55 59 f3 3e 78 |..v.{. e.R.UY.>x| +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | [13fd 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 79 9c 19 ec 7e 77 ef 6e 89 d5 14 b6 e1 5a ae d6 |y...~w.n.....Z..| +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | 00000030 26 ea 4a 41 5e 47 da 63 17 44 ed 6f 7d cc 6f 57 |&.JA^G.c.D.o}.oW| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | [13fe 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000020 34 7c 56 46 09 02 20 30 7c 31 0c 0b 85 09 f8 e6 |4|VF.. 0|1......| +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | 00000040 f0 81 92 96 a6 e0 6b |......k| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [13ff 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000030 18 47 58 fb 2e da be 0b 60 94 5b 70 d5 1e 4e d8 |.GX.....`.[p..N.| +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [1190 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec5530 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [148e 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003387700 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1400 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 01 53 b1 76 32 c0 87 |.S.v2..| +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | [1191 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec5530 gate 1598907077566026800 evaluation succeeds +peer0.org2.example.com | [148f 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003387700 gate 1598907082235958700 evaluation succeeds +peer1.org2.example.com | [1401 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [133c 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | [1192 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1490 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1402 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org1.example.com | [1193 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1491 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1403 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [133d 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 00 24 5c d4 1a 07 cc 43 23 5d ab |0D. J.$\....C#].| +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | [1194 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1492 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1404 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 b4 9b b7 a8 cf 8b 28 20 be d7 6a b9 07 bf 15 0f |......( ..j.....| +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org1.example.com | [1195 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1493 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1406 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 db bb 4a 77 02 20 21 07 e0 05 cf 36 83 02 62 f6 |..Jw. !....6..b.| +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | [1196 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1494 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | [1407 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | 00000030 b5 d9 1b 09 63 5a b0 d5 97 da 63 4e 84 e7 ad 84 |....cZ....cN....| +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org1.example.com | [1197 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [1409 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 2e e5 cc 59 9b 37 |...Y.7| +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org1.example.com | [1198 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1495 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | [140b 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [133e 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | [1199 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 32 c2 ff 63 90 50 fc 8a 02 30 ec 41 8a e2 12 |.2..c.P...0.A...| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | [1408 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [133f 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +orderer0.example.com | "2020-08-31 20:52:19.270 UTC [common.channelconfig] NewStandardValues -> DEBU 15ca Initializing protos for *channelconfig.ApplicationOrgProtos" +peer0.org1.example.com | 00000010 24 51 bd 90 29 cd 37 f0 49 62 07 c3 a4 db 69 1f |$Q..).7.Ib....i.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | [140c 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1340 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:19.270 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15cb Processing field: AnchorPeers" +peer0.org1.example.com | [119a 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d af 77 90 ed aa a9 66 05 e0 0f |0E.!...w....f...| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | [1405 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1341 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:19.270 UTC [common.channelconfig] NewStandardValues -> DEBU 15cc Initializing protos for *channelconfig.OrganizationProtos" +peer0.org1.example.com | 00000010 fb c7 a9 89 84 a4 47 54 18 d6 44 61 7a d4 2a 80 |......GT..Daz.*.| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [140d 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1342 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:19.270 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15cd Processing field: MSP" +peer0.org1.example.com | 00000020 18 27 f0 9e 74 02 20 22 29 d3 31 f0 eb ac af 9b |.'..t. ").1.....| +peer0.org2.example.com | [1496 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [140e 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1343 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.271 UTC [common.channelconfig] Validate -> DEBU 15ce Anchor peers for org Org2MSP are anchor_peers: " +peer0.org1.example.com | 00000030 e5 39 79 0a b9 f9 12 5e be 3b 52 d3 d5 c9 68 90 |.9y....^.;R...h.| +peer0.org2.example.com | [1497 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [140f 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1344 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.271 UTC [common.channelconfig] validateMSP -> DEBU 15cf Setting up MSP for org Org2MSP" +peer0.org1.example.com | 00000040 ee 6f fa 73 27 58 c7 |.o.s'X.| +peer0.org2.example.com | [1498 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1410 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312bcd0 gate 1598907085589126500 evaluation starts +peer1.org1.example.com | [1345 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.271 UTC [msp] newBccspMsp -> DEBU 15d0 Creating BCCSP-based MSP instance" +peer0.org1.example.com | [119b 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1499 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1411 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312bcd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1346 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +orderer0.example.com | "2020-08-31 20:52:19.271 UTC [msp] New -> DEBU 15d1 Creating Cache-MSP instance" +peer0.org1.example.com | [119c 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [149a 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1412 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312bcd0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1347 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.271 UTC [msp] Setup -> DEBU 15d2 Setting up MSP instance Org2MSP" +peer0.org1.example.com | [119d 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [149b 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1413 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312bcd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1348 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.271 UTC [msp.identity] newIdentity -> DEBU 15d3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [119e 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1414 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312bcd0 principal evaluation fails +peer0.org2.example.com | [149c 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1349 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [119f 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 7b 55 40 22 53 fb bd b2 ea 57 b6 c3 68 bf 11 |.{U@"S....W..h..| +peer1.org2.example.com | [1415 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00312bcd0 gate 1598907085589126500 evaluation fails +peer0.org2.example.com | [149d 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [134a 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | 00000010 b7 47 2f 6d 7f cd 9a 57 86 c2 3c 49 73 3d 5f d5 |.G/m...W.. DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [149e 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [134b 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [11a0 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 65 c2 3a e7 ad bd 89 c0 57 ec |0E.!..e.:.....W.| +peer1.org2.example.com | [1417 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [149f 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [134c 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | 00000010 3f 8c 8c db 68 8e 65 97 24 b6 db cb 05 11 40 b6 |?...h.e.$.....@.| +peer1.org2.example.com | [140a 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [14a0 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [134d 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [1418 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 ac c0 db 55 9c 02 20 25 da 0e f6 bb 23 97 81 1d |...U.. %....#...| +peer0.org2.example.com | [14a1 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033af240 gate 1598907082238664900 evaluation starts +peer0.org2.example.com | [14a2 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033af240 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | [141a 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000030 de 28 62 07 23 09 5e 9e b8 af 62 cc 86 15 b4 83 |.(b.#.^...b.....| +peer0.org2.example.com | [14a3 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033af240 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [134e 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | [141b 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aa300 gate 1598907085601161700 evaluation starts +peer0.org1.example.com | 00000040 4d e4 d5 c3 33 24 8f |M...3$.| +peer0.org2.example.com | [14a4 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033af240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [134f 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org2.example.com | [141c 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aa300 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [11a1 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [14a5 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033af240 principal evaluation fails +peer1.org1.example.com | [1350 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | [141d 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aa300 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [11a2 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14a6 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033af240 gate 1598907082238664900 evaluation fails +peer1.org1.example.com | [1351 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org2.example.com | [141e 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aa300 principal matched by identity 0 +peer0.org1.example.com | [11a3 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [14a7 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1352 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | [141f 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 ca e6 88 e9 1f 0d 72 fb 1c 13 83 e0 8f 83 b1 |.......r........| +peer0.org1.example.com | [11a4 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14a8 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1353 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | 00000010 57 fc 35 5c 16 19 54 69 8f 56 c2 9d 27 01 8d d0 |W.5\..Ti.V..'...| +peer0.org1.example.com | [11a5 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [14a9 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1354 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org2.example.com | [1420 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd ac 23 c8 ff 53 ce 34 53 b2 93 |0E.!...#..S.4S..| +peer0.org1.example.com | [11a6 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14aa 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033af7b0 gate 1598907082238956300 evaluation starts +peer1.org1.example.com | [1355 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org2.example.com | 00000010 79 9c 19 ec 7e 77 ef 6e 89 d5 14 b6 e1 5a ae d6 |y...~w.n.....Z..| +peer0.org1.example.com | [11a7 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [14ab 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033af7b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1356 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [msp] Setup -> DEBU 15d4 Setting up the MSP manager (4 msps)" +peer1.org2.example.com | 00000020 34 7c 56 46 09 02 20 30 7c 31 0c 0b 85 09 f8 e6 |4|VF.. 0|1......| +peer0.org1.example.com | [11a8 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 32 c2 ff 63 90 50 fc 8a 02 30 ec 41 8a e2 12 |.2..c.P...0.A...| +peer0.org2.example.com | [14ac 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033af7b0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1357 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [msp] Setup -> DEBU 15d5 MSP manager setup complete, setup 4 msps" +peer1.org2.example.com | 00000030 18 47 58 fb 2e da be 0b 60 94 5b 70 d5 1e 4e d8 |.GX.....`.[p..N.| +peer0.org1.example.com | 00000010 24 51 bd 90 29 cd 37 f0 49 62 07 c3 a4 db 69 1f |$Q..).7.Ib....i.| +peer0.org2.example.com | [14ad 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033af7b0 principal matched by identity 0 +peer1.org1.example.com | [1358 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15d6 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | 00000040 01 53 b1 76 32 c0 87 |.S.v2..| +peer0.org1.example.com | [11a9 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d af 77 90 ed aa a9 66 05 e0 0f |0E.!...w....f...| +peer0.org2.example.com | [14ae 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | [1359 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15d7 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [1419 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | 00000010 fb c7 a9 89 84 a4 47 54 18 d6 44 61 7a d4 2a 80 |......GT..Daz.*.| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [135a 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15d8 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [1421 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aa300 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000020 18 27 f0 9e 74 02 20 22 29 d3 31 f0 eb ac af 9b |.'..t. ").1.....| +peer0.org2.example.com | [14af 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | [135b 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15d9 Proposed new policy Readers for Channel/Orderer" +peer1.org2.example.com | [1422 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031aa300 gate 1598907085601161700 evaluation succeeds +peer0.org1.example.com | 00000030 e5 39 79 0a b9 f9 12 5e be 3b 52 d3 d5 c9 68 90 |.9y....^.;R...h.| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | [135c 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15da Proposed new policy Writers for Channel/Orderer" +peer1.org2.example.com | [1423 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 ee 6f fa 73 27 58 c7 |.o.s'X.| +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | [135d 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15db Proposed new policy Admins for Channel/Orderer" +peer1.org2.example.com | [1424 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11aa 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | [135e 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15dc Proposed new policy BlockValidation for Channel/Orderer" +peer1.org2.example.com | [1425 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [135f 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15dd Proposed new policy Endorsement for Channel/Application/Org3MSP" +peer1.org2.example.com | [1426 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [11ab 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 a6 6a 78 5c b3 e6 ac ad de 38 |0E.!...jx\.....8| +peer0.org2.example.com | [14b0 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033af7b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1360 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15de Proposed new policy Readers for Channel/Application/Org3MSP" +peer1.org2.example.com | [1427 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 03 16 76 64 53 ff b5 6f 16 00 a6 ea 01 f5 64 53 |..vdS..o......dS| +peer0.org2.example.com | [14b1 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033af7b0 gate 1598907082238956300 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15df Proposed new policy Writers for Channel/Application/Org3MSP" +peer1.org1.example.com | [1361 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1428 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000020 28 6a 39 88 6a 02 20 27 fe 88 8d fc c0 74 4e 7d |(j9.j. '.....tN}| +peer0.org2.example.com | [14b2 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15e0 Proposed new policy Admins for Channel/Application/Org3MSP" +peer1.org1.example.com | [1362 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [1429 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000030 15 7d 92 bf 45 ef f7 f2 b9 7d 99 91 16 89 4c 1e |.}..E....}....L.| +peer0.org2.example.com | [14b3 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15e1 Proposed new policy Readers for Channel/Application/Org1MSP" +peer1.org1.example.com | [1363 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [142a 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | 00000040 b9 d9 56 55 69 96 9c |..VUi..| +peer0.org2.example.com | [14b4 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15e2 Proposed new policy Writers for Channel/Application/Org1MSP" +peer1.org2.example.com | [142b 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [11ac 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [14b5 08-31 20:51:22.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1364 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15e3 Proposed new policy Admins for Channel/Application/Org1MSP" +peer1.org2.example.com | [142c 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [11ad 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [14b6 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1365 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15e4 Proposed new policy Readers for Channel/Application/Org2MSP" +peer1.org2.example.com | [142d 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [11ae 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14b7 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1366 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15e5 Proposed new policy Writers for Channel/Application/Org2MSP" +peer1.org2.example.com | [142e 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11af 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14b8 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1367 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15e6 Proposed new policy Admins for Channel/Application/Org2MSP" +peer1.org2.example.com | [142f 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11b0 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14b9 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1368 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15e7 Proposed new policy Admins for Channel/Application" +peer1.org2.example.com | [1430 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11b1 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14ba 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1369 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] GetPolicy -> DEBU 15e8 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | [11b2 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [1431 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [14bb 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [136a 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] GetPolicy -> DEBU 15e9 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | [11b3 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1432 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14bc 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [136b 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15ea Proposed new policy Endorsement for Channel/Application" +peer0.org1.example.com | [11b4 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1433 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14bd 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [136c 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.272 UTC [policies] GetPolicy -> DEBU 15eb Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +peer0.org1.example.com | [11b5 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1434 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14be 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c69b0 gate 1598907082246989300 evaluation starts +peer1.org1.example.com | [136d 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [policies] GetPolicy -> DEBU 15ec Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer0.org1.example.com | [11b6 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1435 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [14bf 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c69b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [136e 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [policies] NewManagerImpl -> DEBU 15ed Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org1.example.com | [11b7 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1436 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" > alive: +peer1.org1.example.com | [136f 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [14c0 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c69b0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [policies] NewManagerImpl -> DEBU 15ee Proposed new policy Readers for Channel/Application" +peer0.org1.example.com | [11b8 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1437 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1370 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [14c1 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c69b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [policies] NewManagerImpl -> DEBU 15ef Proposed new policy Writers for Channel/Application" +peer0.org1.example.com | [11b9 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1438 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1371 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [14c2 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c69b0 principal evaluation fails +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [policies] NewManagerImpl -> DEBU 15f0 Proposed new policy Readers for Channel" +peer0.org1.example.com | [11ba 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1439 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1372 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [14c3 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c69b0 gate 1598907082246989300 evaluation fails +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [policies] NewManagerImpl -> DEBU 15f1 Proposed new policy Writers for Channel" +peer0.org1.example.com | [11bb 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [143a 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1373 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [14c4 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [policies] NewManagerImpl -> DEBU 15f2 Proposed new policy Admins for Channel" +peer0.org1.example.com | [11bc 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [143b 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1374 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab2250 gate 1598907086000907200 evaluation starts +peer0.org2.example.com | [14c5 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15f3 Adding to config map: [Group] /Channel" +peer0.org1.example.com | [11bd 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [143c 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1375 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab2250 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [14c6 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15f4 Adding to config map: [Group] /Channel/Application" +peer1.org2.example.com | [143d 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [11be 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1376 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab2250 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [14c7 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6f20 gate 1598907082247948400 evaluation starts +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15f5 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer1.org2.example.com | [143e 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11bf 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1377 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab2250 principal matched by identity 0 +peer0.org2.example.com | [14c8 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6f20 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15f6 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer1.org2.example.com | [143f 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [11c0 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1378 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | [14c9 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6f20 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15f7 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer1.org2.example.com | [1440 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11c1 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [14ca 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6f20 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15f8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer1.org2.example.com | [1441 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [11c2 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1379 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | [14cb 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | [1442 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11c3 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15f9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [14cc 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | [1443 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11c4 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef7b90 gate 1598907077749966200 evaluation starts +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15fa Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15fb Adding to config map: [Group] /Channel/Application/Org3MSP" +peer1.org2.example.com | [1444 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11c5 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef7b90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15fc Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +peer1.org2.example.com | [1445 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | [11c6 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef7b90 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15fd Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer1.org2.example.com | [1446 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | [11c7 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef7b90 principal matched by identity 0 +peer1.org1.example.com | [137a 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab2250 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15fe Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [1447 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | [11c8 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | [137b 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab2250 gate 1598907086000907200 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15ff Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer1.org2.example.com | [1448 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [137c 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 1600 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +peer1.org2.example.com | [1449 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14cd 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6f20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [11c9 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | [137d 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 1601 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer1.org2.example.com | [144a 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14ce 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033c6f20 gate 1598907082247948400 evaluation succeeds +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | [137e 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 1602 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer1.org2.example.com | [144b 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14cf 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | [137f 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1603 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer1.org2.example.com | [144c 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [14d0 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1604 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer1.org1.example.com | [1380 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | [144d 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [14d1 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1605 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [144e 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14d2 08-31 20:51:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [11ca 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef7b90 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1606 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | [1381 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | [144f 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14d3 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | [11cb 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef7b90 gate 1598907077749966200 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1607 Adding to config map: [Value] /Channel/Application/ACLs" +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | [1450 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [11cc 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1608 Adding to config map: [Value] /Channel/Application/Capabilities" +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | [1451 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [14d4 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | [11cd 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1609 Adding to config map: [Policy] /Channel/Application/Writers" +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | [1452 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [11ce 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 160a Adding to config map: [Policy] /Channel/Application/Admins" +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | [1453 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [11cf 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 160b Adding to config map: [Policy] /Channel/Application/Endorsement" +peer1.org1.example.com | [1382 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | [1454 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [11d0 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 160c Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [1455 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 160d Adding to config map: [Policy] /Channel/Application/Readers" +peer1.org1.example.com | [1383 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | [14d5 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | [1456 08-31 20:51:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11d1 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 160e Adding to config map: [Group] /Channel/Orderer" +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [1457 08-31 20:51:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 160f Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | [14d6 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | [1458 08-31 20:51:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1610 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | [1459 08-31 20:51:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1611 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | [145b 08-31 20:51:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1612 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer1.org1.example.com | [1384 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | [145a 08-31 20:51:26.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [11d2 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1613 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer1.org1.example.com | [1385 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1386 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1387 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1388 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1389 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [138a 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [145c 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [138b 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [145d 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1614 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer1.org1.example.com | [138c 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acc230 gate 1598907086003902500 evaluation starts +peer0.org2.example.com | [14d7 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [145e 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11d3 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1615 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer1.org1.example.com | [138d 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acc230 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [14d8 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [145f 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1616 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer1.org1.example.com | [138e 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acc230 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [14d9 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | [1460 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1617 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer1.org1.example.com | [138f 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acc230 principal matched by identity 0 +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [1461 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +orderer0.example.com | "2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1618 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer1.org1.example.com | [1390 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [14da 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | [1462 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 1619 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | [1463 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [11d4 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 161a Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | [1464 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [11d5 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1391 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 161b Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | [1465 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [11d6 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 161c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [1466 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [11d7 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 161d Adding to config map: [Value] /Channel/OrdererAddresses" +peer1.org2.example.com | [1467 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [11d8 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [11d9 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | [1468 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [14db 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11da 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 161e Adding to config map: [Value] /Channel/Consortium" +peer1.org2.example.com | [146a 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [14dc 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11db 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 161f Adding to config map: [Value] /Channel/Capabilities" +peer1.org2.example.com | [146b 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f8250 gate 1598907086487588100 evaluation starts +peer1.org1.example.com | [1392 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acc230 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [11dc 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f43b70 gate 1598907077752146700 evaluation starts +peer0.org2.example.com | [14dd 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 1620 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer1.org2.example.com | [1469 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1393 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acc230 gate 1598907086003902500 evaluation succeeds +peer0.org1.example.com | [11dd 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f43b70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [14de 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 1621 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer1.org2.example.com | [146c 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f8250 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1394 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [11de 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f43b70 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [14df 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 1622 Adding to config map: [Policy] /Channel/Writers" +peer1.org2.example.com | [146d 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f8250 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1395 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [11df 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f43b70 principal matched by identity 0 +peer0.org2.example.com | [14e0 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 1623 Adding to config map: [Policy] /Channel/Admins" +peer1.org2.example.com | [146e 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f8250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1396 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [11e0 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [14e1 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [146f 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f8250 principal evaluation fails +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 1624 Adding to config map: [Policy] /Channel/Readers" +peer1.org1.example.com | [1397 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [14e2 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1470 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f8250 gate 1598907086487588100 evaluation fails +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [common.channelconfig] LogSanityChecks -> DEBU 1625 As expected, current configuration has policy '/Channel/Readers'" +peer1.org1.example.com | [1398 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [11e1 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | [14e3 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dd790 gate 1598907082258245500 evaluation starts +peer1.org2.example.com | [1471 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [common.channelconfig] LogSanityChecks -> DEBU 1626 As expected, current configuration has policy '/Channel/Writers'" +peer1.org1.example.com | [1399 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [14e4 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dd790 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1472 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [policies] Manager -> DEBU 1627 Manager Channel looking up path [Application]" +peer1.org1.example.com | [139a 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | [14e5 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dd790 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1473 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [policies] Manager -> DEBU 1628 Manager Channel has managers Application" +peer1.org1.example.com | [139b 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [14e6 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dd790 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1474 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f87c0 gate 1598907086489756300 evaluation starts +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [policies] Manager -> DEBU 1629 Manager Channel has managers Orderer" +peer1.org1.example.com | [139c 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [14e7 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dd790 principal evaluation fails +peer1.org2.example.com | [1475 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f87c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [139e 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [11e2 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f43b70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [14e8 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033dd790 gate 1598907082258245500 evaluation fails +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [policies] Manager -> DEBU 162a Manager Channel/Application looking up path []" +peer1.org2.example.com | [1476 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f87c0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [139f 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [11e3 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f43b70 gate 1598907077752146700 evaluation succeeds +peer0.org2.example.com | [14e9 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.275 UTC [policies] Manager -> DEBU 162b Manager Channel/Application has managers Org3MSP" +peer1.org2.example.com | [1477 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f87c0 principal matched by identity 0 +peer1.org1.example.com | [13a0 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [11e4 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [14ea 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.276 UTC [policies] Manager -> DEBU 162c Manager Channel/Application has managers Org1MSP" +peer1.org2.example.com | [1478 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | [13a1 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [11e5 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [14eb 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:19.276 UTC [policies] Manager -> DEBU 162d Manager Channel/Application has managers Org2MSP" +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [13a2 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [11e6 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [14ec 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ddd00 gate 1598907082259051100 evaluation starts +orderer0.example.com | "2020-08-31 20:52:19.276 UTC [common.channelconfig] LogSanityChecks -> DEBU 162e As expected, current configuration has policy '/Channel/Application/Readers'" +peer1.org2.example.com | [1479 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | [139d 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [11e7 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [14ed 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ddd00 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:19.276 UTC [common.channelconfig] LogSanityChecks -> DEBU 162f As expected, current configuration has policy '/Channel/Application/Writers'" +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | [13a3 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [11e8 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [14ee 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ddd00 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:19.276 UTC [common.channelconfig] LogSanityChecks -> DEBU 1630 As expected, current configuration has policy '/Channel/Application/Admins'" +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | [13a4 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acd680 gate 1598907086007210600 evaluation starts +peer0.org1.example.com | [11e9 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [14ef 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ddd00 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:19.276 UTC [policies] Manager -> DEBU 1631 Manager Channel looking up path [Orderer]" +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | [13a5 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acd680 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [11ea 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [14f0 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | "2020-08-31 20:52:19.276 UTC [policies] Manager -> DEBU 1632 Manager Channel has managers Orderer" +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [13a6 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acd680 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [11eb 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:52:19.276 UTC [policies] Manager -> DEBU 1633 Manager Channel has managers Application" +peer1.org2.example.com | [147a 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f87c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [13a7 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acd680 principal matched by identity 0 +peer0.org1.example.com | [11ec 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [14f1 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:52:19.276 UTC [policies] Manager -> DEBU 1634 Manager Channel/Orderer looking up path []" +peer1.org2.example.com | [147b 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031f87c0 gate 1598907086489756300 evaluation succeeds +peer1.org1.example.com | [13a8 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | [11ed 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | "2020-08-31 20:52:19.276 UTC [policies] Manager -> DEBU 1635 Manager Channel/Orderer has managers OrdererOrg" +peer1.org2.example.com | [147c 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [11ee 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | "2020-08-31 20:52:19.276 UTC [common.channelconfig] LogSanityChecks -> DEBU 1636 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer1.org2.example.com | [147d 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [13a9 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | [11ef 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | "2020-08-31 20:52:19.276 UTC [common.channelconfig] LogSanityChecks -> DEBU 1637 As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer1.org2.example.com | [147e 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | [11f0 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | "2020-08-31 20:52:19.276 UTC [common.channelconfig] LogSanityChecks -> DEBU 1638 As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer1.org2.example.com | [147f 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | [11f1 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [14f2 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ddd00 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:19.276 UTC [common.channelconfig] LogSanityChecks -> DEBU 1639 As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer1.org2.example.com | [1480 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | [11f2 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [14f3 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ddd00 gate 1598907082259051100 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:19.276 UTC [common.capabilities] Supported -> DEBU 163a Orderer capability V1_4_2 is supported and is enabled" +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [11f3 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [14f4 08-31 20:51:22.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.276 UTC [common.capabilities] Supported -> DEBU 163b Channel capability V1_4_3 is supported and is enabled" +peer1.org2.example.com | [1481 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | [13aa 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acd680 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [11f4 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5b0d0 gate 1598907077754765600 evaluation starts +peer0.org2.example.com | [14f5 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.276 UTC [msp] GetDefaultSigningIdentity -> DEBU 163c Obtaining default signing identity" +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | [13ab 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003acd680 gate 1598907086007210600 evaluation succeeds +peer0.org1.example.com | [11f5 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5b0d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [14f6 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.277 UTC [msp] GetDefaultSigningIdentity -> DEBU 163d Obtaining default signing identity" +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | [13ac 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [11f6 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5b0d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [14f7 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.277 UTC [msp.identity] Sign -> DEBU 163e Sign: plaintext: 0AEA060A1B08011A060883C6B5FA0522...71ACC91C0BEE2AD25C1A1043DA2744A3 " +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | [13ad 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [11f7 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5b0d0 principal matched by identity 0 +peer0.org2.example.com | [14f8 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +orderer0.example.com | "2020-08-31 20:52:19.277 UTC [msp.identity] Sign -> DEBU 163f Sign: digest: 7091492267D4215AC55DBAB653954A0EEEFD0A4B0BB3B039D04F7A032F68D72B " +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [13ae 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [11f8 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | "2020-08-31 20:52:19.279 UTC [policies] Evaluate -> DEBU 1640 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +peer1.org2.example.com | [1482 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13af 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [14f9 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +orderer0.example.com | "2020-08-31 20:52:19.279 UTC [policies] Evaluate -> DEBU 1641 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1483 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13b0 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [11f9 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | "2020-08-31 20:52:19.279 UTC [policies] Evaluate -> DEBU 1642 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +peer1.org2.example.com | [1484 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +orderer0.example.com | "2020-08-31 20:52:19.279 UTC [policies] Evaluate -> DEBU 1643 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1485 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [13b1 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | "2020-08-31 20:52:19.279 UTC [policies] Evaluate -> DEBU 1644 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +peer1.org2.example.com | [1486 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +orderer0.example.com | "2020-08-31 20:52:19.279 UTC [msp] DeserializeIdentity -> DEBU 1645 Obtaining identity" +peer1.org2.example.com | [1487 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | [14fa 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +orderer0.example.com | "2020-08-31 20:52:19.279 UTC [msp.identity] newIdentity -> DEBU 1646 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [1488 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | [14fc 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11fa 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5b0d0 principal evaluation succeeds for identity 0 +orderer0.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | [1489 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [14fb 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [11fb 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5b0d0 gate 1598907077754765600 evaluation succeeds +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [148a 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032140b0 gate 1598907086494852000 evaluation starts +peer0.org2.example.com | [14fd 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [13b2 08-31 20:51:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11fc 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | [148b 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032140b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [14ff 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13b3 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [11fd 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org2.example.com | [148c 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032140b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [14fe 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13b4 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [11fe 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | [148d 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032140b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1500 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [13b5 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [11ff 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org2.example.com | [148e 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032140b0 principal evaluation fails +peer0.org2.example.com | [1501 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [13b6 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1200 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org2.example.com | [148f 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032140b0 gate 1598907086494852000 evaluation fails +peer0.org2.example.com | [1502 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [13b7 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org2.example.com | [1490 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1503 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [13b8 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1201 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org2.example.com | [1491 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1504 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [13b9 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org2.example.com | [1492 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1505 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [13ba 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af0f70 gate 1598907086010875100 evaluation starts +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org2.example.com | [1493 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003214620 gate 1598907086496677900 evaluation starts +peer0.org2.example.com | [1506 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13bb 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af0f70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org2.example.com | [1494 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003214620 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1508 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [13bc 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af0f70 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org2.example.com | [1495 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003214620 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1509 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [13bd 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af0f70 principal matched by identity 0 +peer0.org1.example.com | [1202 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.280 UTC [cauthdsl] func1 -> DEBU 1647 0xc0011b5640 gate 1598907139280152900 evaluation starts" +peer0.org2.example.com | [150a 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1496 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003214620 principal matched by identity 0 +peer1.org1.example.com | [13be 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | [1203 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.280 UTC [cauthdsl] func2 -> DEBU 1648 0xc0011b5640 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [1507 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fb5f0 gate 1598907082266864900 evaluation starts +peer1.org2.example.com | [1497 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [1204 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:19.280 UTC [cauthdsl] func2 -> DEBU 1649 0xc0011b5640 processing identity 0 with bytes of fe10e0" +peer0.org2.example.com | [150b 08-31 20:51:22.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fb5f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [13bf 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | [1205 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.280 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 164a Checking if identity satisfies MEMBER role for OrdererMSP" +peer0.org2.example.com | [150c 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fb5f0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1498 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [1206 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.280 UTC [msp] Validate -> DEBU 164b MSP OrdererMSP validating identity" +peer0.org2.example.com | [150d 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fb5f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | [1207 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:19.280 UTC [msp] getCertificationChain -> DEBU 164c MSP OrdererMSP getting certification chain" +peer0.org2.example.com | [150e 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fb5f0 principal evaluation fails +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | [1208 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [cauthdsl] func2 -> DEBU 164d 0xc0011b5640 principal matched by identity 0" +peer0.org2.example.com | [150f 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fb5f0 gate 1598907082266864900 evaluation fails +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [1209 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [msp.identity] Verify -> DEBU 164e Verify: digest = 00000000 70 91 49 22 67 d4 21 5a c5 5d ba b6 53 95 4a 0e |p.I"g.!Z.]..S.J.| +peer0.org2.example.com | [1510 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [13c0 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af0f70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [120a 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f7c9c0 gate 1598907077756437600 evaluation starts +orderer0.example.com | 00000010 ee fd 0a 4b 0b b3 b0 39 d0 4f 7a 03 2f 68 d7 2b |...K...9.Oz./h.+|" +peer0.org2.example.com | [1511 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1499 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003214620 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [13c1 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af0f70 gate 1598907086010875100 evaluation succeeds +peer0.org1.example.com | [120b 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f7c9c0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [msp.identity] Verify -> DEBU 164f Verify: sig = 00000000 30 44 02 20 0b 0e 7b 4c 2d fb 5c 6a 92 7b 58 8b |0D. ..{L-.\j.{X.| +peer0.org2.example.com | [1512 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [149a 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003214620 gate 1598907086496677900 evaluation succeeds +peer1.org1.example.com | [13c2 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [120c 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f7c9c0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | 00000010 0a 94 e5 5d d9 f6 e0 78 df 56 82 b4 e5 6a e7 97 |...]...x.V...j..| +peer0.org2.example.com | [1513 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003410a00 gate 1598907082272437000 evaluation starts +peer1.org2.example.com | [149b 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [13c3 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | 00000020 4a d7 3d d0 02 20 37 8c 68 5f 50 c0 44 97 70 a1 |J.=.. 7.h_P.D.p.| +peer0.org1.example.com | [120d 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f7c9c0 principal matched by identity 0 +peer0.org2.example.com | [1514 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003410a00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [149c 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [13c4 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | 00000030 6d 73 fc 0e d0 ba 0e f6 ad 2a 7d 93 67 93 90 59 |ms.......*}.g..Y| +peer0.org1.example.com | [120e 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | [1515 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003410a00 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [149d 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [13c5 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | 00000040 46 c7 bb 03 af ad |F.....|" +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [1516 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003410a00 principal matched by identity 0 +peer1.org2.example.com | [149e 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [13c6 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [cauthdsl] func2 -> DEBU 1650 0xc0011b5640 principal evaluation succeeds for identity 0" +peer0.org1.example.com | [120f 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | [1517 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | [149f 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [cauthdsl] func1 -> DEBU 1651 0xc0011b5640 gate 1598907139280152900 evaluation succeeds" +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [13c7 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [policies] Evaluate -> DEBU 1652 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | [1518 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | [14a0 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [policies] Evaluate -> DEBU 1653 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [policies] Evaluate -> DEBU 1654 Signature set satisfies policy /Channel/Orderer/Writers" +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | [1210 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f7c9c0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [policies] Evaluate -> DEBU 1655 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [1211 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f7c9c0 gate 1598907077756437600 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [policies] Evaluate -> DEBU 1656 Signature set satisfies policy /Channel/Writers" +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [13c8 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1212 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [policies] Evaluate -> DEBU 1657 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +peer0.org2.example.com | [1519 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003410a00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [14a1 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13c9 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1213 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [orderer.common.msgprocessor] Apply -> DEBU 1658 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +peer0.org2.example.com | [151a 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003410a00 gate 1598907082272437000 evaluation succeeds +peer1.org2.example.com | [14a2 08-31 20:51:26.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [13ca 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | [1214 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [common.channelconfig] NewStandardValues -> DEBU 1659 Initializing protos for *channelconfig.ChannelProtos" +peer0.org2.example.com | [151b 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [14a3 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [1215 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165a Processing field: HashingAlgorithm" +peer0.org2.example.com | [151c 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [13cb 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | [1216 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165b Processing field: BlockDataHashingStructure" +peer0.org2.example.com | [151d 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [14a4 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165c Processing field: OrdererAddresses" +peer0.org2.example.com | [151e 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | [1217 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165d Processing field: Consortium" +peer0.org2.example.com | [151f 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165e Processing field: Capabilities" +peer0.org2.example.com | [1520 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [common.channelconfig] NewStandardValues -> DEBU 165f Initializing protos for *channelconfig.OrdererProtos" +peer0.org2.example.com | [1521 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [13cc 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +orderer0.example.com | "2020-08-31 20:52:19.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1660 Processing field: ConsensusType" +peer0.org2.example.com | [1522 08-31 20:51:22.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14a5 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13cd 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +orderer0.example.com | "2020-08-31 20:52:19.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1661 Processing field: BatchSize" +peer0.org2.example.com | [1523 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [14a6 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13ce 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1218 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1662 Processing field: BatchTimeout" +peer0.org2.example.com | [1524 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14a7 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [13cf 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [1219 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1663 Processing field: KafkaBrokers" +peer0.org2.example.com | [1525 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14a8 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [121a 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [13d0 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13d1 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1526 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [121b 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | [13d2 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:19.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1664 Processing field: ChannelRestrictions" +peer0.org2.example.com | [1527 08-31 20:51:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [14a9 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | [13d3 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1665 Processing field: Capabilities" +peer0.org2.example.com | [1528 08-31 20:51:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [14aa 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | [13d4 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.282 UTC [common.channelconfig] NewStandardValues -> DEBU 1666 Initializing protos for *channelconfig.OrdererOrgProtos" +peer0.org2.example.com | [1529 08-31 20:51:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org2.example.com | [14ab 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | [13d5 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1667 Processing field: Endpoints" +peer0.org2.example.com | [152a 08-31 20:51:22.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [14ac 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [13d6 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.282 UTC [common.channelconfig] NewStandardValues -> DEBU 1668 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org2.example.com | [14ad 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032427a0 gate 1598907086505468900 evaluation starts +peer0.org2.example.com | [152b 08-31 20:51:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [121c 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | [13d7 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:19.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1669 Processing field: MSP" +peer1.org2.example.com | [14ae 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032427a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [152c 08-31 20:51:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 82 79 68 0e 90 bd 83 76 13 c0 ae 5a 6c 73 e3 |e.yh....v...Zls.| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [13d8 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.282 UTC [common.channelconfig] validateMSP -> DEBU 166a Setting up MSP for org OrdererOrg" +peer1.org2.example.com | [14af 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032427a0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | 00000010 72 5e 16 22 0b 1f f0 66 37 b9 20 7c ad b6 ed ae |r^."...f7. |....| +peer0.org1.example.com | [121d 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | [13d9 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.282 UTC [msp] newBccspMsp -> DEBU 166b Creating BCCSP-based MSP instance" +peer1.org2.example.com | [14b0 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032427a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [152d 08-31 20:51:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 3e 35 c0 4e 2c 8c fa 2a cd fb |0E.!..>5.N,..*..| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | [13da 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:19.282 UTC [msp] New -> DEBU 166c Creating Cache-MSP instance" +peer1.org2.example.com | [14b1 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032427a0 principal evaluation fails +peer0.org2.example.com | 00000010 d8 49 00 4e c3 c3 59 ee 03 5c 1f ea 20 fe c9 a5 |.I.N..Y..\.. ...| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | [13db 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:19.282 UTC [msp] Setup -> DEBU 166d Setting up MSP instance OrdererMSP" +peer1.org2.example.com | [14b2 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032427a0 gate 1598907086505468900 evaluation fails +peer0.org2.example.com | 00000020 34 b1 37 8a cc 02 20 06 c9 66 83 2c 7c f4 b8 d5 |4.7... ..f.,|...| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | [13dc 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:19.282 UTC [msp.identity] newIdentity -> DEBU 166e Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [14b3 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000030 c4 d9 ac 62 33 4d c1 db 54 2d 05 3f a2 e2 ae 00 |...b3M..T-.?....| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [13dd 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12ab0 gate 1598907086023266300 evaluation starts +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | [14b4 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000040 3c 15 a0 c8 b3 eb 91 |<......| +peer0.org1.example.com | [121e 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13de 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12ab0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [14b5 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [152e 08-31 20:51:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [121f 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [13df 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12ab0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | [14b6 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242d10 gate 1598907086507307300 evaluation starts +peer0.org2.example.com | [152f 08-31 20:51:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1220 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [13e0 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12ab0 principal matched by identity 0 +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org2.example.com | [14b7 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242d10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1530 08-31 20:51:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1221 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [13e1 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | [14b8 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242d10 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1531 08-31 20:51:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org1.example.com | [1222 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | [14b9 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242d10 principal matched by identity 0 +peer0.org1.example.com | [1223 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [13e2 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org2.example.com | [14ba 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | [1532 08-31 20:51:24.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org1.example.com | [1224 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [1533 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1225 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | [14bb 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | [1534 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1226 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1260 gate 1598907077760295500 evaluation starts +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | [1535 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [1227 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1260 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | [1536 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1228 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1260 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [13e3 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12ab0 principal evaluation succeeds for identity 0 +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | [1537 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [1229 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1260 principal matched by identity 0 +peer1.org1.example.com | [13e4 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b12ab0 gate 1598907086023266300 evaluation succeeds +orderer0.example.com | nw== +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [1538 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [122a 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | [13e5 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org2.example.com | [14bc 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242d10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1539 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [13e6 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.283 UTC [common.channelconfig] NewStandardValues -> DEBU 166f Initializing protos for *channelconfig.ApplicationProtos" +peer1.org2.example.com | [14bd 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003242d10 gate 1598907086507307300 evaluation succeeds +peer0.org2.example.com | [153a 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [122b 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | [13e7 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1670 Processing field: ACLs" +peer1.org2.example.com | [14be 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [153b 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 78 b1 56 21 54 82 a3 15 9f 65 87 70 4e 71 ee |-x.V!T....e.pNq.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | [13e8 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1671 Processing field: Capabilities" +peer1.org2.example.com | [14bf 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000010 6e af 81 e5 06 61 13 20 3f bc 54 41 a3 6c be 75 |n....a. ?.TA.l.u| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | [13e9 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | "2020-08-31 20:52:19.283 UTC [common.channelconfig] NewStandardValues -> DEBU 1672 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer1.org2.example.com | [14c0 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [153c 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d3 7c e4 56 2b ee 75 a3 62 76 1a |0D. x.|.V+.u.bv.| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | "2020-08-31 20:52:19.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1673 Processing field: AnchorPeers" +peer1.org2.example.com | [14c1 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 69 cf fc d2 08 bc 7a 74 86 c5 04 e4 6d db 11 a7 |i.....zt....m...| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [13ea 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | "2020-08-31 20:52:19.283 UTC [common.channelconfig] NewStandardValues -> DEBU 1674 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org2.example.com | [14c2 08-31 20:51:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 76 7a ac 35 02 20 4a f3 65 b0 31 3a 0f 41 a1 22 |vz.5. J.e.1:.A."| +peer0.org1.example.com | [122c 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1260 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +orderer0.example.com | "2020-08-31 20:52:19.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1675 Processing field: MSP" +peer1.org2.example.com | [14c3 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 f9 b6 7b c1 e2 07 d5 b7 07 18 82 4a b3 4a 83 e0 |..{........J.J..| +peer0.org1.example.com | [122d 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1260 gate 1598907077760295500 evaluation succeeds +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +orderer0.example.com | "2020-08-31 20:52:19.283 UTC [common.channelconfig] Validate -> DEBU 1676 Anchor peers for org Org3MSP are " +peer1.org2.example.com | [14c4 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000040 d6 f4 9b 74 25 1b |...t%.| +peer0.org1.example.com | [122e 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +orderer0.example.com | "2020-08-31 20:52:19.283 UTC [common.channelconfig] validateMSP -> DEBU 1677 Setting up MSP for org Org3MSP" +peer1.org2.example.com | [14c5 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [153d 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org1.example.com | [122f 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +orderer0.example.com | "2020-08-31 20:52:19.283 UTC [msp] newBccspMsp -> DEBU 1678 Creating BCCSP-based MSP instance" +peer1.org2.example.com | [14c6 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org1.example.com | [1230 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [13eb 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.283 UTC [msp] New -> DEBU 1679 Creating Cache-MSP instance" +peer1.org2.example.com | [14c7 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [153e 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9a dd 3f de 80 c6 6e b9 db 57 4f |0E.!...?...n..WO| +peer0.org1.example.com | [1231 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [13ec 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.283 UTC [msp] Setup -> DEBU 167a Setting up MSP instance Org3MSP" +peer1.org2.example.com | [14c8 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 40 3c a9 20 d9 28 84 19 07 09 bf d5 b6 26 cb 6c |@<. .(.......&.l| +peer0.org1.example.com | [1232 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.283 UTC [msp.identity] newIdentity -> DEBU 167b Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [13ed 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [14c9 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000020 29 63 5e 29 b8 02 20 63 a4 66 0c d2 24 ed 72 8c |)c^).. c.f..$.r.| +peer0.org1.example.com | [1233 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [13ee 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [14ca 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243f10 gate 1598907086511753500 evaluation starts +peer0.org2.example.com | 00000030 81 b5 2c 4d 16 59 65 29 ba 01 2c e8 c1 a4 01 25 |..,M.Ye)..,....%| +peer0.org1.example.com | [1234 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [13ef 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [14cb 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243f10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000040 12 bd f5 ab f5 72 d9 |.....r.| +peer0.org1.example.com | [1235 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [13f0 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [153f 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [14cc 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243f10 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1236 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | [13f1 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1540 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [14cd 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1237 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [13f2 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1541 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [14ce 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243f10 principal evaluation fails +peer0.org1.example.com | [1238 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | [13f3 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b343a0 gate 1598907086027496600 evaluation starts +peer0.org2.example.com | [1542 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [14cf 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003243f10 gate 1598907086511753500 evaluation fails +peer0.org1.example.com | [1239 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | [13f4 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b343a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [14d0 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [14d1 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1543 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +orderer0.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +peer1.org1.example.com | [13f5 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b343a0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [14d2 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1544 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [123a 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba460 gate 1598907077764745000 evaluation starts +orderer0.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | [13f6 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b343a0 principal matched by identity 0 +peer1.org2.example.com | [14d3 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325c480 gate 1598907086513379700 evaluation starts +peer0.org2.example.com | [1545 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [123b 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba460 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +peer1.org1.example.com | [13f7 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | [14d4 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325c480 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1546 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [123c 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba460 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [14d5 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325c480 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1547 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [123d 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba460 principal matched by identity 0 +orderer0.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +peer1.org1.example.com | [13f8 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | [14d6 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325c480 principal matched by identity 0 +peer0.org2.example.com | [1548 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [123e 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | [14d7 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | [1549 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [154a 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [123f 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | "2020-08-31 20:52:19.284 UTC [common.channelconfig] NewStandardValues -> DEBU 167c Initializing protos for *channelconfig.ApplicationOrgProtos" +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | [14d8 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | [154b 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\334|\262l\314\326\301\004^!2g\334#\245\025\235\370," > +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +orderer0.example.com | "2020-08-31 20:52:19.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167d Processing field: AnchorPeers" +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | "2020-08-31 20:52:19.284 UTC [common.channelconfig] NewStandardValues -> DEBU 167e Initializing protos for *channelconfig.OrganizationProtos" +peer1.org1.example.com | [13f9 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b343a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [154c 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167f Processing field: MSP" +peer1.org1.example.com | [13fa 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b343a0 gate 1598907086027496600 evaluation succeeds +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [1240 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba460 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [154d 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.284 UTC [common.channelconfig] Validate -> DEBU 1680 Anchor peers for org Org1MSP are anchor_peers: " +peer1.org1.example.com | [13fb 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [14d9 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325c480 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1241 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba460 gate 1598907077764745000 evaluation succeeds +peer0.org2.example.com | [154e 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [13fc 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.284 UTC [common.channelconfig] validateMSP -> DEBU 1681 Setting up MSP for org Org1MSP" +peer1.org2.example.com | [14da 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325c480 gate 1598907086513379700 evaluation succeeds +peer0.org1.example.com | [1242 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [154f 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [13fd 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.284 UTC [msp] newBccspMsp -> DEBU 1682 Creating BCCSP-based MSP instance" +peer1.org2.example.com | [14db 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1243 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1550 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [13fe 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.284 UTC [msp] New -> DEBU 1683 Creating Cache-MSP instance" +peer1.org2.example.com | [14dc 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1244 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1551 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [13ff 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.284 UTC [msp] Setup -> DEBU 1684 Setting up MSP instance Org1MSP" +peer1.org2.example.com | [14dd 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1245 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1552 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 a3 41 c5 d2 d4 ab cc 1a c6 9f 72 79 14 fc ef |..A........ry...| +peer1.org1.example.com | [1400 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.284 UTC [msp.identity] newIdentity -> DEBU 1685 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [14de 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1246 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 86 15 2b 54 c2 39 73 0f a4 fa 82 3e 2d ea e4 f5 |..+T.9s....>-...| +peer1.org1.example.com | [1401 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [14df 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | [1247 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1553 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 97 fb 3d c9 61 8f 63 a5 f3 a4 0b |0D. F..=.a.c....| +peer1.org1.example.com | [1402 08-31 20:51:26.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [1248 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 e5 20 c6 b6 02 41 38 57 31 36 82 2b e7 bc 5a cb |. ...A8W16.+..Z.| +peer1.org1.example.com | [1403 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [14e0 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | [1249 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | 00000020 08 f4 62 b8 02 20 64 69 ae 76 ee 69 9b 5f 4e eb |..b.. di.v.i._N.| +peer1.org1.example.com | [1404 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000030 1f 1c 6b 75 83 b8 ba ae 78 fe 7c 67 c9 22 55 bb |..ku....x.|g."U.| +peer0.org1.example.com | [124a 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1405 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000040 10 fa 29 a1 75 51 |..).uQ| +peer0.org1.example.com | [124b 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1406 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [1554 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [124c 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1407 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [1555 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [124d 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1408 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org2.example.com | [14e1 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1556 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [124e 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1409 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | [14e2 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1557 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [124f 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [140a 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org2.example.com | [14e3 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1558 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1250 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [140b 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org2.example.com | [14e4 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [14e5 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1559 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [155a 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1251 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org2.example.com | [14e6 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [155b 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1252 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [140c 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org2.example.com | [14e7 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [155c 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1253 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [140d 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org2.example.com | [14e8 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [155d 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1254 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [140e 08-31 20:51:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.285 UTC [common.channelconfig] NewStandardValues -> DEBU 1686 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer1.org2.example.com | [14e9 08-31 20:51:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [155e 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1255 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [140f 08-31 20:51:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.285 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1687 Processing field: AnchorPeers" +peer1.org2.example.com | [14ea 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [155f 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1256 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1410 08-31 20:51:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 05 23 13 e7 f3 56 ff 39 43 ec 70 0d e9 aa e6 d5 |.#...V.9C.p.....| +orderer0.example.com | "2020-08-31 20:52:19.285 UTC [common.channelconfig] NewStandardValues -> DEBU 1688 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org2.example.com | [14eb 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1560 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1257 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 14 e9 fd 96 fd 6f f3 0e 01 a5 6c b5 7f 84 ef 14 |.....o....l.....| +orderer0.example.com | "2020-08-31 20:52:19.285 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1689 Processing field: MSP" +peer0.org2.example.com | [1561 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [14ec 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325dfc0 gate 1598907086520318000 evaluation starts +peer0.org1.example.com | [1258 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | [1411 08-31 20:51:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8c 2a fb 7f dd ac 8a 42 78 cf 7f |0E.!..*.....Bx..| +orderer0.example.com | "2020-08-31 20:52:19.285 UTC [common.channelconfig] Validate -> DEBU 168a Anchor peers for org Org2MSP are anchor_peers: " +peer1.org2.example.com | [14ed 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325dfc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1562 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1259 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 ab 46 e7 36 a3 6c 09 39 da cb 20 35 30 d8 70 39 |.F.6.l.9.. 50.p9| +orderer0.example.com | "2020-08-31 20:52:19.285 UTC [common.channelconfig] validateMSP -> DEBU 168b Setting up MSP for org Org2MSP" +peer1.org2.example.com | [14ee 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325dfc0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1563 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [125a 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 33 0d e5 7a e0 02 20 22 fb 8c 5e ba 68 9c 40 50 |3..z.. "..^.h.@P| +orderer0.example.com | "2020-08-31 20:52:19.285 UTC [msp] newBccspMsp -> DEBU 168c Creating BCCSP-based MSP instance" +peer1.org2.example.com | [14ef 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325dfc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1564 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [125b 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 17 4a b1 5d 5d 67 2b 81 ae bc 23 4f 17 9c f5 e3 |.J.]]g+...#O....| +orderer0.example.com | "2020-08-31 20:52:19.285 UTC [msp] New -> DEBU 168d Creating Cache-MSP instance" +peer1.org2.example.com | [14f0 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325dfc0 principal evaluation fails +peer0.org2.example.com | [1565 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [125c 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 16 e8 ac e9 fa 08 f2 |.......| +orderer0.example.com | "2020-08-31 20:52:19.285 UTC [msp] Setup -> DEBU 168e Setting up MSP instance Org2MSP" +peer1.org2.example.com | [14f1 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00325dfc0 gate 1598907086520318000 evaluation fails +peer0.org2.example.com | [1566 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [125d 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1412 08-31 20:51:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.286 UTC [msp.identity] newIdentity -> DEBU 168f Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [14f2 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1567 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [125e 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1413 08-31 20:51:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [14f3 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1568 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [125f 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1414 08-31 20:51:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [14f4 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1569 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1260 08-31 20:51:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +peer1.org1.example.com | [1415 08-31 20:51:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [14f5 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003294530 gate 1598907086522080000 evaluation starts +peer0.org2.example.com | [156a 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1261 08-31 20:51:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1416 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | [14f6 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003294530 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [156b 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1262 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1417 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [14f7 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003294530 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [156c 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1263 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1418 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | [14f8 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003294530 principal matched by identity 0 +peer0.org2.example.com | [156d 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1264 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1419 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | [14f9 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | [156e 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1265 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [141a 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [156f 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1266 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [141b 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | [14fa 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | [1570 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1267 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer1.org1.example.com | [141c 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | [1571 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1268 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer1.org1.example.com | [141d 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | [1572 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1269 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [141e 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | [1573 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [126a 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610051801 +peer1.org1.example.com | [141f 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [1574 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [126b 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5D4AA0FA5E6E5C391DBCD4ACB59731590AA17B1B08E5D2FED87DFAB641547323 +peer1.org1.example.com | [1420 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org2.example.com | [14fb 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003294530 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1575 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [126c 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer1.org1.example.com | [1421 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.287 UTC [msp] Setup -> DEBU 1690 Setting up the MSP manager (4 msps)" +peer1.org2.example.com | [14fc 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003294530 gate 1598907086522080000 evaluation succeeds +peer0.org2.example.com | [1576 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [126d 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1422 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.287 UTC [msp] Setup -> DEBU 1691 MSP manager setup complete, setup 4 msps" +peer1.org2.example.com | [14fd 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1577 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [126e 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1423 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 1692 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [14fe 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1578 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [126f 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1424 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 1693 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [14ff 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1579 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1270 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1425 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 1694 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [1500 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [157a 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1271 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1426 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 1695 Proposed new policy BlockValidation for Channel/Orderer" +peer1.org2.example.com | [1501 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [157b 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1272 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1427 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 1696 Proposed new policy Readers for Channel/Orderer" +peer1.org2.example.com | [1502 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [157c 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1273 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1428 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 1697 Proposed new policy Writers for Channel/Orderer" +peer1.org2.example.com | [1503 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1274 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [157d 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 1698 Proposed new policy Admins for Channel/Orderer" +peer1.org1.example.com | [1429 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1504 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1275 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [157e 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 1699 Proposed new policy Endorsement for Channel/Application/Org3MSP" +peer1.org1.example.com | [142a 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1505 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1276 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [157f 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 169a Proposed new policy Readers for Channel/Application/Org3MSP" +peer1.org1.example.com | [142b 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b766c0 gate 1598907089048257900 evaluation starts +peer1.org2.example.com | [1506 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1580 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1277 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 169b Proposed new policy Writers for Channel/Application/Org3MSP" +peer1.org1.example.com | [142c 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b766c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1507 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1581 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1278 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.288 UTC [policies] NewManagerImpl -> DEBU 169c Proposed new policy Admins for Channel/Application/Org3MSP" +peer1.org1.example.com | [142d 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b766c0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1508 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1582 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1279 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.288 UTC [policies] NewManagerImpl -> DEBU 169d Proposed new policy Readers for Channel/Application/Org1MSP" +peer1.org1.example.com | [142e 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b766c0 principal matched by identity 0 +peer1.org2.example.com | [1509 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003295730 gate 1598907086527250300 evaluation starts +peer0.org2.example.com | [1583 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034af090 gate 1598907085330863100 evaluation starts +peer0.org1.example.com | [127a 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-08-31 20:52:19.288 UTC [policies] NewManagerImpl -> DEBU 169e Proposed new policy Writers for Channel/Application/Org1MSP" +peer1.org1.example.com | [142f 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 f4 c4 ab 64 23 45 dc 18 92 58 28 0c 4c 34 74 |"...d#E...X(.L4t| +peer1.org2.example.com | [150a 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003295730 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1584 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034af090 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [127b 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.288 UTC [policies] NewManagerImpl -> DEBU 169f Proposed new policy Admins for Channel/Application/Org1MSP" +peer1.org1.example.com | 00000010 79 c7 7f 57 0f b8 7f 32 d5 d9 e7 51 2f 15 27 48 |y..W...2...Q/.'H| +peer1.org2.example.com | [150b 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003295730 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1585 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034af090 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [127c 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:19.288 UTC [policies] NewManagerImpl -> DEBU 16a0 Proposed new policy Writers for Channel/Application/Org2MSP" +peer1.org1.example.com | [1430 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 5c 24 30 37 87 8d a5 03 50 26 ce |0D. .\$07....P&.| +peer1.org2.example.com | [150c 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003295730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1586 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034af090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [127d 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.288 UTC [policies] NewManagerImpl -> DEBU 16a1 Proposed new policy Admins for Channel/Application/Org2MSP" +peer1.org1.example.com | 00000010 07 8d 52 a6 96 61 57 31 55 3d 02 7c 44 87 a4 3f |..R..aW1U=.|D..?| +peer1.org2.example.com | [150d 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003295730 principal evaluation fails +peer0.org2.example.com | [1587 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034af090 principal evaluation fails +peer0.org1.example.com | [127e 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.288 UTC [policies] NewManagerImpl -> DEBU 16a2 Proposed new policy Readers for Channel/Application/Org2MSP" +peer1.org1.example.com | 00000020 5f 58 b6 03 02 20 0f 46 f1 a2 01 af 47 40 2d 56 |_X... .F....G@-V| +peer1.org2.example.com | [150e 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003295730 gate 1598907086527250300 evaluation fails +peer0.org2.example.com | [1588 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034af090 gate 1598907085330863100 evaluation fails +peer0.org1.example.com | [127f 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:19.288 UTC [policies] NewManagerImpl -> DEBU 16a3 Proposed new policy Admins for Channel/Application" +peer1.org1.example.com | 00000030 7b 99 35 f1 a5 b0 45 ac 68 00 c3 c2 2a d5 71 ce |{.5...E.h...*.q.| +peer1.org2.example.com | [150f 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1589 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1280 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:19.288 UTC [policies] GetPolicy -> DEBU 16a4 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer1.org1.example.com | 00000040 51 95 21 29 db 9e |Q.!)..| +peer1.org2.example.com | [1510 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [158a 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1281 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:19.288 UTC [policies] GetPolicy -> DEBU 16a5 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +peer1.org1.example.com | [1431 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b766c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [158b 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1511 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1282 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040707f0 gate 1598907080042949100 evaluation starts +orderer0.example.com | "2020-08-31 20:52:19.288 UTC [policies] NewManagerImpl -> DEBU 16a6 Proposed new policy Endorsement for Channel/Application" +peer1.org1.example.com | [1432 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b766c0 gate 1598907089048257900 evaluation succeeds +peer0.org2.example.com | [158c 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034af600 gate 1598907085336070800 evaluation starts +peer1.org2.example.com | [1512 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1283 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040707f0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:19.289 UTC [policies] GetPolicy -> DEBU 16a7 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer1.org1.example.com | [1433 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [158d 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034af600 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1513 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1284 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040707f0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:19.289 UTC [policies] GetPolicy -> DEBU 16a8 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +peer1.org1.example.com | [1434 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [158e 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034af600 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1514 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [1285 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040707f0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:19.289 UTC [policies] NewManagerImpl -> DEBU 16a9 Proposed new policy LifecycleEndorsement for Channel/Application" +peer1.org1.example.com | [1435 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [158f 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034af600 principal matched by identity 0 +peer1.org2.example.com | [1516 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1286 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 4c 7a d8 1b 8a 9f d6 1e 22 8b c1 41 b1 fb 53 |BLz......"..A..S| +orderer0.example.com | "2020-08-31 20:52:19.289 UTC [policies] NewManagerImpl -> DEBU 16aa Proposed new policy Readers for Channel/Application" +peer1.org1.example.com | [1436 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1590 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d8 6c fb 8b b4 bb 1e 3d 37 36 65 ac 75 a1 ab |D.l.....=76e.u..| +peer1.org2.example.com | [1517 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 ad 8b c4 d9 af 7a da 60 9b 62 ca dc c4 20 cc 84 |.....z.`.b... ..| +orderer0.example.com | "2020-08-31 20:52:19.289 UTC [policies] NewManagerImpl -> DEBU 16ab Proposed new policy Writers for Channel/Application" +peer1.org1.example.com | [1437 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 d6 a9 39 2d c0 86 11 7a 78 b0 38 50 42 86 02 0c |..9-...zx.8PB...| +peer1.org2.example.com | [1518 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1287 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c f2 d8 98 c8 e6 fc b4 42 93 7a 69 |0D. L.......B.zi| +orderer0.example.com | "2020-08-31 20:52:19.289 UTC [policies] NewManagerImpl -> DEBU 16ac Proposed new policy Admins for Channel" +peer1.org1.example.com | [1438 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1591 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c cc 0d 20 6f 76 e1 8c d0 cb c7 |0E.!.... ov.....| +peer1.org2.example.com | [1515 08-31 20:51:26.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003295ca0 gate 1598907086528814400 evaluation starts +peer0.org1.example.com | 00000010 ed dc 18 ef 86 58 17 3f 0b 24 76 76 43 31 6d 31 |.....X.?.$vvC1m1| +orderer0.example.com | "2020-08-31 20:52:19.289 UTC [policies] NewManagerImpl -> DEBU 16ad Proposed new policy Readers for Channel" +peer1.org1.example.com | [1439 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000010 1b d5 69 4c 6d 69 9c 90 b7 33 ef e3 3e b6 ad 35 |..iLmi...3..>..5| +peer1.org2.example.com | [1519 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003295ca0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000020 b2 78 3f 90 02 20 4c 0f f7 d5 18 88 4b 6e 68 65 |.x?.. L.....Knhe| +orderer0.example.com | "2020-08-31 20:52:19.289 UTC [policies] NewManagerImpl -> DEBU 16ae Proposed new policy Writers for Channel" +peer1.org1.example.com | [143a 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000020 88 66 a7 0f c2 02 20 36 d5 b9 d9 13 ff 20 2c 0e |.f.... 6..... ,.| +peer1.org2.example.com | [151b 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003295ca0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000030 8f 04 04 a6 57 ab a8 28 71 11 18 e8 49 6f 7a 82 |....W..(q...Ioz.| +orderer0.example.com | "2020-08-31 20:52:19.289 UTC [common.configtx] addToMap -> DEBU 16af Adding to config map: [Group] /Channel" +peer1.org1.example.com | [143b 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | 00000030 d5 6c e0 aa 03 16 06 7e 75 b9 95 a8 7d b7 5a 26 |.l.....~u...}.Z&| +peer1.org2.example.com | [151c 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003295ca0 principal matched by identity 0 +peer0.org1.example.com | 00000040 bc 6c 6a d7 f4 92 |.lj...| +orderer0.example.com | "2020-08-31 20:52:19.289 UTC [common.configtx] addToMap -> DEBU 16b0 Adding to config map: [Group] /Channel/Orderer" +peer1.org1.example.com | [143c 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 16 85 87 b4 f2 37 4f |.....7O| +peer1.org2.example.com | [151d 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | [1288 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040707f0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:19.289 UTC [common.configtx] addToMap -> DEBU 16b1 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer1.org1.example.com | [143d 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1592 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034af600 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [1289 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040707f0 gate 1598907080042949100 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:19.289 UTC [common.configtx] addToMap -> DEBU 16b2 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer1.org1.example.com | [143e 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1593 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034af600 gate 1598907085336070800 evaluation succeeds +peer1.org2.example.com | [151e 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | [128a 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.289 UTC [common.configtx] addToMap -> DEBU 16b3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer1.org1.example.com | [143f 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [1594 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | [128b 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.289 UTC [common.configtx] addToMap -> DEBU 16b4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [1440 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1595 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | [128c 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16b5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer1.org1.example.com | [1441 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1596 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | [128d 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16b6 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer1.org1.example.com | [1442 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1597 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [128e 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16b7 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer1.org1.example.com | [1443 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1598 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [151a 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes +peer0.org1.example.com | [128f 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16b8 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer1.org1.example.com | [1444 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1599 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [151f 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1290 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16b9 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer1.org1.example.com | [1445 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [159a 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1520 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003295ca0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1291 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16ba Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer1.org1.example.com | [1446 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [159b 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1521 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003295ca0 gate 1598907086528814400 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16bb Adding to config map: [Policy] /Channel/Orderer/Admins" +peer0.org1.example.com | [1292 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [159c 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1447 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [1522 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16bc Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer0.org1.example.com | [1293 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [159d 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1448 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1523 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16bd Adding to config map: [Policy] /Channel/Orderer/Readers" +peer0.org1.example.com | [1294 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [159e 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1449 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1524 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16be Adding to config map: [Policy] /Channel/Orderer/Writers" +peer0.org1.example.com | [1295 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [159f 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [144a 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1525 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16bf Adding to config map: [Group] /Channel/Application" +peer0.org1.example.com | [1296 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15a0 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org1.example.com | [144c 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [1526 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +orderer0.example.com | "2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16c0 Adding to config map: [Group] /Channel/Application/Org3MSP" +peer0.org1.example.com | [1297 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15a1 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [144d 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +orderer0.example.com | "2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16c1 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +peer0.org1.example.com | [1298 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15a2 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [144f 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1527 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +orderer0.example.com | "2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16c2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer0.org1.example.com | [1299 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15a3 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [144b 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +orderer0.example.com | "2020-08-31 20:52:19.294 UTC [common.configtx] addToMap -> DEBU 16c3 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | [129a 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [15a4 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1451 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +orderer0.example.com | "2020-08-31 20:52:19.294 UTC [common.configtx] addToMap -> DEBU 16c4 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer0.org1.example.com | [129b 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [144e 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [15a5 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" > alive: alive:\334|\262l\314\326\301\004^!2g\334#\245\025\235\370," > +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +orderer0.example.com | "2020-08-31 20:52:19.297 UTC [common.configtx] addToMap -> DEBU 16c5 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +peer0.org1.example.com | [129c 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1452 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15a6 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +orderer0.example.com | "2020-08-31 20:52:19.297 UTC [common.configtx] addToMap -> DEBU 16c6 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer0.org1.example.com | [129d 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1450 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15a7 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1528 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 38 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.297 UTC [common.configtx] addToMap -> DEBU 16c7 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer0.org1.example.com | [129e 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1453 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [15a8 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1529 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | "2020-08-31 20:52:19.297 UTC [common.configtx] addToMap -> DEBU 16c8 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer0.org1.example.com | [12a0 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1454 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [15a9 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +orderer0.example.com | "2020-08-31 20:52:19.297 UTC [common.configtx] addToMap -> DEBU 16c9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer0.org1.example.com | [129f 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1455 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [15aa 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [152a 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | "2020-08-31 20:52:19.297 UTC [common.configtx] addToMap -> DEBU 16ca Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | [12a1 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1456 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15ab 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +orderer0.example.com | "2020-08-31 20:52:19.297 UTC [common.configtx] addToMap -> DEBU 16cb Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [12a2 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1457 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [15ac 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | "2020-08-31 20:52:19.297 UTC [common.configtx] addToMap -> DEBU 16cc Adding to config map: [Group] /Channel/Application/Org2MSP" +peer0.org1.example.com | [12a3 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1458 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [15ad 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +orderer0.example.com | "2020-08-31 20:52:19.297 UTC [common.configtx] addToMap -> DEBU 16cd Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer0.org1.example.com | [12a4 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1459 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [15ae 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +orderer0.example.com | "2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16ce Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer0.org1.example.com | [12a5 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [145a 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15af 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [152b 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16cf Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer0.org1.example.com | [12a6 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [145b 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [15b0 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [152c 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 38 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16d0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | [12a7 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [145c 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [15b1 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [152d 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 38 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16d1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | [12a8 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [145d 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15b2 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [152e 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16d2 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | [12a9 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [145e 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [15b3 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8820 gate 1598907085345458900 evaluation starts +peer1.org2.example.com | [152f 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16d3 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | [12aa 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [145f 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161021 +peer0.org2.example.com | [15b4 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8820 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1530 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16d4 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | [12ab 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [15b5 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8820 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1460 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A53DC953D45CCEA415C7671C7B3D793F8F66127B700E8C4ED83EC003F907BCFB +peer1.org2.example.com | [1531 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16d5 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | [12ac 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15b6 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1461 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1532 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16d6 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | [12ad 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [15b7 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8820 principal evaluation fails +peer1.org1.example.com | [1462 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1533 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16d7 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | [12ae 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15b8 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8820 gate 1598907085345458900 evaluation fails +peer1.org1.example.com | [1463 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | [1534 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16d8 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org2.example.com | [15b9 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1464 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:r\364w\023\306\254\330\223\256\215+VdF" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1535 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [12af 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.299 UTC [common.configtx] addToMap -> DEBU 16d9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer0.org2.example.com | [15ba 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1465 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1536 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12b0 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:52:19.299 UTC [common.configtx] addToMap -> DEBU 16da Adding to config map: [Value] /Channel/OrdererAddresses" +peer0.org2.example.com | [15bb 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1466 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1537 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [12b1 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 4d 1d dd ca 1c c9 e4 80 12 51 aa 7a a4 bb 5d |.M........Q.z..]| +orderer0.example.com | "2020-08-31 20:52:19.299 UTC [common.configtx] addToMap -> DEBU 16db Adding to config map: [Value] /Channel/Consortium" +peer0.org2.example.com | [15bc 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8d90 gate 1598907085349330800 evaluation starts +peer1.org1.example.com | [1467 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1538 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 86 b7 22 55 be 3d ab 3a 5e 77 7b 7e 19 ed 39 99 |.."U.=.:^w{~..9.| +orderer0.example.com | "2020-08-31 20:52:19.299 UTC [common.configtx] addToMap -> DEBU 16dc Adding to config map: [Value] /Channel/Capabilities" +peer1.org1.example.com | [1468 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [15bd 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8d90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1539 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [12b2 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 00 df cf e7 48 6a be 12 05 d9 fc 4a |0D. ....Hj.....J| +orderer0.example.com | "2020-08-31 20:52:19.299 UTC [common.configtx] addToMap -> DEBU 16dd Adding to config map: [Value] /Channel/HashingAlgorithm" +peer1.org1.example.com | [1469 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [15be 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8d90 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 c9 a2 be 74 56 35 0f 37 62 29 d8 d5 cd 85 13 7b |...tV5.7b).....{| +peer1.org2.example.com | [153a 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.299 UTC [common.configtx] addToMap -> DEBU 16de Adding to config map: [Policy] /Channel/Readers" +peer1.org1.example.com | [146a 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15bf 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8d90 principal matched by identity 0 +peer0.org1.example.com | 00000020 f1 e3 99 bd 02 20 67 02 25 88 aa 82 ba 0f 66 33 |..... g.%.....f3| +peer1.org2.example.com | [153b 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.299 UTC [common.configtx] addToMap -> DEBU 16df Adding to config map: [Policy] /Channel/Writers" +peer1.org1.example.com | [146b 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:r\364w\023\306\254\330\223\256\215+VdF" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [15c0 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 01 23 82 bf 60 b9 df a5 a4 87 79 a9 c0 93 8f |..#..`.....y....| +peer0.org1.example.com | 00000030 df a6 19 48 59 ac be 87 fa 94 8c 84 5b 9e 9e e9 |...HY.......[...| +peer1.org2.example.com | [153c 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.299 UTC [common.configtx] addToMap -> DEBU 16e0 Adding to config map: [Policy] /Channel/Admins" +peer1.org1.example.com | [146c 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 96 b1 1d bc 55 99 23 1b a1 68 c3 43 6d 81 5a c2 |....U.#..h.Cm.Z.| +peer0.org1.example.com | 00000040 a0 53 73 e1 0a 19 |.Ss...| +peer1.org2.example.com | [153d 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.300 UTC [orderer.consensus.etcdraft] propose -> INFO 16e1 Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 +peer1.org1.example.com | [146d 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [15c1 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 95 0a 7c 82 f3 8a 52 4f 41 85 |0E.!....|...ROA.| +peer0.org1.example.com | [12b3 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [153e 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.300 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 16e2 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +peer1.org1.example.com | [146e 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 07 e5 ae 36 59 aa ea 29 35 a5 e8 8c 74 b1 2a 72 |...6Y..)5...t.*r| +peer0.org1.example.com | [12b4 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [153f 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.304 UTC [orderer.consensus.etcdraft] 2 -> DEBU 16e3 Proposed block [6] to raft consensus" channel=businesschannel node=1 +peer1.org1.example.com | [146f 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 d4 44 6f 0a ce 02 20 59 64 55 00 21 05 6c 9f d0 |.Do... YdU.!.l..| +peer0.org1.example.com | [12b5 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1540 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.304 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 16e4 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:50968" +peer1.org1.example.com | [1470 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 a2 80 94 34 ce 87 24 fa 0f 23 98 7a b6 35 33 5c |...4..$..#.z.53\| +peer0.org1.example.com | [12b6 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1541 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.305 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16e5 Sending msg of 40278 bytes to 2 on channel businesschannel took 14.4µs" +peer1.org1.example.com | [1471 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 c5 9b c7 ec 3c e2 04 |....<..| +peer0.org1.example.com | [12b7 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1542 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.305 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16e6 Sending msg of 40278 bytes to 3 on channel businesschannel took 117.4µs" +peer1.org1.example.com | [1472 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [15c2 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8d90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [12b8 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1543 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16e7 Send of ConsensusRequest for channel businesschannel with payload of size 40278 to orderer2.example.com(orderer2.example.com:7050) took 272.7µs " +peer1.org1.example.com | [1473 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [15c3 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f8d90 gate 1598907085349330800 evaluation succeeds +peer0.org1.example.com | [12b9 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1544 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16e8 Send of ConsensusRequest for channel businesschannel with payload of size 40278 to orderer1.example.com(orderer1.example.com:7050) took 59.6µs " +peer1.org1.example.com | [1474 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 3d c9 53 d4 5c ce a4 15 c7 67 1c 7b 3d 79 3f |.=.S.\....g.{=y?| +peer0.org2.example.com | [15c4 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [12ba 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1545 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.312 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16e9 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | 00000010 8f 66 12 7b 70 0e 8c 4e d8 3e c0 03 f9 07 bc fb |.f.{p..N.>......| +peer0.org2.example.com | [15c5 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [12bb 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1546 08-31 20:51:29.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:52:19.312 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16ea Sending msg of 28 bytes to 2 on channel businesschannel took 14.4µs" +peer1.org1.example.com | [1475 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b4 9e 4e 9a fd 5d 98 e5 dd 2b |0E.!....N..]...+| +peer0.org2.example.com | [15c6 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [12bc 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1547 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161020 +orderer0.example.com | "2020-08-31 20:52:19.312 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16eb Sending msg of 28 bytes to 3 on channel businesschannel took 6.3µs" +peer1.org1.example.com | 00000010 b2 70 9a 63 1e 86 43 04 0e aa db 15 c3 6a 46 67 |.p.c..C......jFg| +peer0.org2.example.com | [15c7 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [12bd 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1548 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 22F4C4AB642345DC189258280C4C347479C77F570FB87F32D5D9E7512F152748 +orderer0.example.com | "2020-08-31 20:52:19.312 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16ec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.5µs " +peer1.org1.example.com | 00000020 5b 3b 73 67 9c 02 20 7c a1 34 d7 9f ec b4 0d b9 |[;sg.. |.4......| +peer0.org2.example.com | [15c8 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12be 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1549 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:52:19.312 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 16ed Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 +peer1.org1.example.com | 00000030 6f b7 6a 5b a2 db 7a d9 fd 8c 84 8b c6 b9 a5 8d |o.j[..z.........| +peer0.org2.example.com | [15c9 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" lastAliveTS: 1598907045315872200, 32 but got ts: inc_num:1598907045315872200 seq_num:31 +peer0.org1.example.com | [12bf 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [154a 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16ee Adding to config map: [Group] /Channel" +peer1.org1.example.com | 00000040 6f 71 81 be fc ea d6 |oq.....| +peer0.org2.example.com | [15ca 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12c0 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [154b 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16ef Adding to config map: [Group] /Channel/Application" +peer1.org1.example.com | [1476 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [15cb 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12c1 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [154c 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f0 Adding to config map: [Group] /Channel/Application/Org1MSP" +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [15cc 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12c2 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [154d 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f1 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer1.org1.example.com | [1477 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 09 47 16 09 f7 d5 d5 a3 b7 05 |0E.!...G........| +peer0.org2.example.com | [15cd 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12c3 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [154e 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f2 Adding to config map: [Value] /Channel/Application/ACLs" +peer1.org1.example.com | 00000010 be 49 d6 05 56 33 55 56 bc 99 2a cb ae ab e6 5e |.I..V3UV..*....^| +peer0.org2.example.com | [15ce 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [12c4 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f3 Adding to config map: [Value] /Channel/Application/Capabilities" +peer1.org2.example.com | [154f 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 15 2f 0f 0f 83 02 20 37 d9 db ad 52 f7 8c 22 e6 |./.... 7...R..".| +peer0.org2.example.com | [15cf 08-31 20:51:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12c5 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f4 Adding to config map: [Policy] /Channel/Application/Readers" +peer1.org2.example.com | [1550 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000030 74 f6 69 1a ca 72 4f d0 3e 72 f4 77 13 c6 ac d8 |t.i..rO.>r.w....| +peer0.org2.example.com | [15d0 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12c6 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f5 Adding to config map: [Policy] /Channel/Application/Writers" +peer1.org2.example.com | [1551 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 93 ae 8d 2b 56 64 46 |...+VdF| +peer0.org2.example.com | [15d1 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12c7 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f6 Adding to config map: [Policy] /Channel/Application/Admins" +peer1.org2.example.com | [1552 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15d2 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1478 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [12c8 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f7 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer1.org2.example.com | [1553 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [15d3 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1479 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [12c9 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f8 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer1.org2.example.com | [1554 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15d4 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [147a 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12ca 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f9 Adding to config map: [Group] /Channel" +peer1.org2.example.com | [1555 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [15d5 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [147b 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12cb 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16fa Adding to config map: [Group] /Channel/Application" +peer1.org2.example.com | [1556 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15d6 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [147c 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [12cc 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16fb Adding to config map: [Group] /Channel/Application/Org1MSP" +peer1.org2.example.com | [1557 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [15d7 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [147d 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [12cd 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16fc Adding to config map: [Group] /Channel/Application/Org2MSP" +peer1.org2.example.com | [1558 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [15d8 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [147e 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12ce 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16fd Adding to config map: [Group] /Channel/Application/Org3MSP" +peer1.org2.example.com | [1559 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15d9 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [147f 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [12cf 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16fe Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +peer1.org2.example.com | [155a 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [15da 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1480 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [12d0 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16ff Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +peer1.org2.example.com | [155b 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [15db 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1481 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 ca e6 88 e9 1f 0d 72 fb 1c 13 83 e0 8f 83 b1 |.......r........| +peer0.org1.example.com | [12d1 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 1700 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer1.org2.example.com | [155c 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 f4 c4 ab 64 23 45 dc 18 92 58 28 0c 4c 34 74 |"...d#E...X(.L4t| +peer0.org2.example.com | [15dc 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 57 fc 35 5c 16 19 54 69 8f 56 c2 9d 27 01 8d d0 |W.5\..Ti.V..'...| +peer0.org1.example.com | [12d2 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 1701 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | 00000010 79 c7 7f 57 0f b8 7f 32 d5 d9 e7 51 2f 15 27 48 |y..W...2...Q/.'H| +peer0.org2.example.com | [15dd 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1482 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd ac 23 c8 ff 53 ce 34 53 b2 93 |0E.!...#..S.4S..| +peer0.org1.example.com | [12d3 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 1702 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer1.org2.example.com | [155d 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 5c 24 30 37 87 8d a5 03 50 26 ce |0D. .\$07....P&.| +peer0.org2.example.com | [15de 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 79 9c 19 ec 7e 77 ef 6e 89 d5 14 b6 e1 5a ae d6 |y...~w.n.....Z..| +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 1703 Adding to config map: [Value] /Channel/Application/ACLs" +peer0.org1.example.com | [12d4 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 07 8d 52 a6 96 61 57 31 55 3d 02 7c 44 87 a4 3f |..R..aW1U=.|D..?| +peer0.org2.example.com | [15df 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 34 7c 56 46 09 02 20 30 7c 31 0c 0b 85 09 f8 e6 |4|VF.. 0|1......| +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 1704 Adding to config map: [Value] /Channel/Application/Capabilities" +peer0.org1.example.com | [12d5 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000020 5f 58 b6 03 02 20 0f 46 f1 a2 01 af 47 40 2d 56 |_X... .F....G@-V| +peer0.org2.example.com | [15e0 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000030 18 47 58 fb 2e da be 0b 60 94 5b 70 d5 1e 4e d8 |.GX.....`.[p..N.| +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 1705 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer0.org1.example.com | [12d6 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000030 7b 99 35 f1 a5 b0 45 ac 68 00 c3 c2 2a d5 71 ce |{.5...E.h...*.q.| +peer0.org2.example.com | [15e1 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 01 53 b1 76 32 c0 87 |.S.v2..| +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 1706 Adding to config map: [Policy] /Channel/Application/Readers" +peer0.org1.example.com | [12d7 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 51 95 21 29 db 9e |Q.!)..| +peer0.org2.example.com | [15e2 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1483 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 1707 Adding to config map: [Policy] /Channel/Application/Writers" +peer0.org1.example.com | [12d8 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [155e 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | [15e3 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1484 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 1708 Adding to config map: [Policy] /Channel/Application/Admins" +peer0.org1.example.com | [12d9 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [15e4 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [1485 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [common.configtx] addToMap -> DEBU 1709 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer0.org1.example.com | [12da 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1560 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 97 5e c9 d4 a4 ee 65 3f 12 91 44 |0D. r.^....e?..D| +peer0.org2.example.com | [15e5 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1486 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 3d c9 53 d4 5c ce a4 15 c7 67 1c 7b 3d 79 3f |.=.S.\....g.{=y?| +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [common.configtx] verifyDeltaSet -> DEBU 170a Processing change to key: [Group] /Channel/Application" +peer0.org1.example.com | [12db 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a3450 gate 1598907080471337000 evaluation starts +peer1.org2.example.com | 00000010 47 7f c4 41 34 e7 b3 e9 e3 7a 61 a0 7b 07 85 30 |G..A4....za.{..0| +peer0.org2.example.com | [15e6 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | 00000010 8f 66 12 7b 70 0e 8c 4e d8 3e c0 03 f9 07 bc fb |.f.{p..N.>......| +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [common.configtx] policyForItem -> DEBU 170b Getting policy for item Application with mod_policy Admins" +peer0.org1.example.com | [12dc 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a3450 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000020 16 95 73 63 02 20 1b 3a 54 b2 62 53 54 ce b5 11 |..sc. .:T.bST...| +peer0.org2.example.com | [15e7 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1487 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b4 9e 4e 9a fd 5d 98 e5 dd 2b |0E.!....N..]...+| +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [policies] Manager -> DEBU 170c Manager Channel looking up path []" +peer0.org1.example.com | [12dd 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a3450 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | 00000030 59 9c 63 f7 13 b3 09 fc b0 06 6c 46 77 81 49 1d |Y.c.......lFw.I.| +peer0.org2.example.com | [15e9 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 b2 70 9a 63 1e 86 43 04 0e aa db 15 c3 6a 46 67 |.p.c..C......jFg| +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [policies] Manager -> DEBU 170d Manager Channel has managers Orderer" +peer0.org1.example.com | [12de 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a3450 principal matched by identity 0 +peer1.org2.example.com | 00000040 16 3d ec 35 21 7d |.=.5!}| +peer0.org2.example.com | [15e8 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000020 5b 3b 73 67 9c 02 20 7c a1 34 d7 9f ec b4 0d b9 |[;sg.. |.4......| +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [policies] Manager -> DEBU 170e Manager Channel has managers Application" +peer0.org1.example.com | [12df 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 58 d4 ea 29 6a 97 0b 2d 01 c0 5f f5 74 8e f0 |.X..)j..-.._.t..| +peer1.org2.example.com | [1561 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [15eb 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 6f b7 6a 5b a2 db 7a d9 fd 8c 84 8b c6 b9 a5 8d |o.j[..z.........| +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [policies] Manager -> DEBU 170f Manager Channel looking up path [Application]" +peer0.org1.example.com | 00000010 0b 2f 60 7d 52 6e a7 2f 35 87 98 2f 22 2c 8b bb |./`}Rn./5../",..| +peer1.org2.example.com | [155f 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [15ec 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 6f 71 81 be fc ea d6 |oq.....| +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [policies] Manager -> DEBU 1710 Manager Channel has managers Orderer" +peer0.org1.example.com | [12e0 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 81 e4 aa 2b 18 37 8d c9 58 99 |0E.!.....+.7..X.| +peer1.org2.example.com | [1562 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [15ea 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1488 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [policies] Manager -> DEBU 1711 Manager Channel has managers Application" +peer0.org1.example.com | 00000010 d0 81 42 79 e1 e7 83 38 50 08 38 6a 45 ee 51 4a |..By...8P.8jE.QJ| +peer1.org2.example.com | [1563 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [15ed 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1489 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [policies] Manager -> DEBU 1712 Manager Channel/Application looking up path []" +peer0.org1.example.com | 00000020 39 53 9d 40 49 02 20 48 4e 0a db 1b 0a 41 f9 59 |9S.@I. HN....A.Y| +peer1.org2.example.com | [1564 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15ee 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [148a 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [policies] Manager -> DEBU 1713 Manager Channel/Application has managers Org1MSP" +peer0.org1.example.com | 00000030 9e 40 7e 3e dc 7c b2 6c cc d6 c1 04 5e 21 32 67 |.@~>.|.l....^!2g| +peer1.org2.example.com | [1565 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15f0 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [148b 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [policies] Manager -> DEBU 1714 Manager Channel/Application has managers Org2MSP" +peer0.org1.example.com | 00000040 dc 23 a5 15 9d f8 2c |.#....,| +peer1.org2.example.com | [1566 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [15ef 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [148c 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [policies] Evaluate -> DEBU 1715 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +peer0.org1.example.com | [12e1 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a3450 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1567 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [15f1 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816101C +peer1.org1.example.com | [148d 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [policies] Evaluate -> DEBU 1716 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [12e2 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a3450 gate 1598907080471337000 evaluation succeeds +peer1.org2.example.com | [1568 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [15f2 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C5348721BE85714E5A883D3B3B75EF2C905B495F8C7ED65FF8122823B5B96099 +peer1.org1.example.com | [148e 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [policies] Evaluate -> DEBU 1717 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +peer0.org1.example.com | [12e3 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [15f3 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1569 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [148f 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [cauthdsl] deduplicate -> WARN 1718 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +peer0.org1.example.com | [12e4 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [15f4 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [156a 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1490 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [cauthdsl] func1 -> DEBU 1719 0xc0010f97a0 gate 1598907139314689500 evaluation starts" +peer0.org1.example.com | [12e5 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [15f5 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [156b 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1491 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [cauthdsl] func2 -> DEBU 171a 0xc0010f97a0 signed by 0 principal evaluation starts (used [false false false])" +peer0.org1.example.com | [12e6 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [15f6 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [156c 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1492 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [cauthdsl] func2 -> DEBU 171b 0xc0010f97a0 processing identity 0 with bytes of fe10e0" +peer0.org1.example.com | [12e7 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [15f7 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [156d 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1493 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bcfba0 gate 1598907089347478000 evaluation starts +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [cauthdsl] func2 -> DEBU 171c 0xc0010f97a0 principal matched by identity 0" +peer0.org1.example.com | [12e8 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [15f8 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [156e 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1494 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bcfba0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [msp.identity] Verify -> DEBU 171d Verify: digest = 00000000 74 79 4d e9 a3 71 1d 24 0f fe ed 23 9d 11 9b 00 |tyM..q.$...#....| +peer0.org1.example.com | [12e9 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [15f9 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [156f 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1495 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bcfba0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | 00000010 3e 25 10 29 78 cb 07 bc 16 8a c0 53 e9 e3 ae 76 |>%.)x......S...v|" +peer0.org1.example.com | [12ea 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [15fa 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1570 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1496 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bcfba0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:19.314 UTC [msp.identity] Verify -> DEBU 171e Verify: sig = 00000000 30 45 02 21 00 ed 6e 97 55 ce e1 8f 4a 2e 44 e9 |0E.!..n.U...J.D.| +peer0.org1.example.com | [12eb 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [15fb 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1571 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332afc0 gate 1598907089077372300 evaluation starts +peer1.org1.example.com | [1497 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 f4 c4 ab 64 23 45 dc 18 92 58 28 0c 4c 34 74 |"...d#E...X(.L4t| +orderer0.example.com | 00000010 86 cc c7 d8 15 32 92 11 5c 0f ae 9c 24 1e e3 31 |.....2..\...$..1| +peer0.org1.example.com | [12ec 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [15fc 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1572 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332afc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 79 c7 7f 57 0f b8 7f 32 d5 d9 e7 51 2f 15 27 48 |y..W...2...Q/.'H| +orderer0.example.com | 00000020 b0 8c 3d 39 f2 02 20 6c 7f 82 68 b5 f7 a9 fc 04 |..=9.. l..h.....| +peer0.org2.example.com | [15fd 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [12ed 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1573 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332afc0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1498 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 5c 24 30 37 87 8d a5 03 50 26 ce |0D. .\$07....P&.| +orderer0.example.com | 00000030 9c c0 f7 ee 68 f9 99 1d 35 23 c7 b2 62 e6 51 30 |....h...5#..b.Q0| +peer0.org2.example.com | [15fe 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12ee 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1574 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332afc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000010 07 8d 52 a6 96 61 57 31 55 3d 02 7c 44 87 a4 3f |..R..aW1U=.|D..?| +orderer0.example.com | 00000040 4f f1 8e 15 f4 64 79 |O....dy|" +peer0.org2.example.com | [15ff 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12ef 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1575 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332afc0 principal evaluation fails +peer1.org1.example.com | 00000020 5f 58 b6 03 02 20 0f 46 f1 a2 01 af 47 40 2d 56 |_X... .F....G@-V| +orderer0.example.com | "2020-08-31 20:52:19.315 UTC [cauthdsl] func2 -> DEBU 171f 0xc0010f97a0 principal evaluation succeeds for identity 0" +peer0.org1.example.com | [12f0 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1576 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332afc0 gate 1598907089077372300 evaluation fails +peer1.org1.example.com | 00000030 7b 99 35 f1 a5 b0 45 ac 68 00 c3 c2 2a d5 71 ce |{.5...E.h...*.q.| +orderer0.example.com | "2020-08-31 20:52:19.315 UTC [cauthdsl] func1 -> DEBU 1720 0xc0010f97a0 gate 1598907139314689500 evaluation succeeds" +peer0.org1.example.com | [12f1 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1600 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1577 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000040 51 95 21 29 db 9e |Q.!)..| +orderer0.example.com | "2020-08-31 20:52:19.315 UTC [policies] Evaluate -> DEBU 1721 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | [12f2 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1601 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1578 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1499 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bcfba0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:19.315 UTC [policies] Evaluate -> DEBU 1722 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +peer0.org1.example.com | [12f3 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1602 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1579 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [149a 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bcfba0 gate 1598907089347478000 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:19.315 UTC [policies] Evaluate -> DEBU 1723 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +peer0.org1.example.com | [12f4 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [12f5 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1604 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [149b 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.315 UTC [cauthdsl] deduplicate -> WARN 1724 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +peer0.org1.example.com | [12f6 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [157a 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332b530 gate 1598907089078420500 evaluation starts +peer0.org2.example.com | [1603 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [149c 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.315 UTC [cauthdsl] func1 -> DEBU 1725 0xc0010f9d70 gate 1598907139315431400 evaluation starts" +peer0.org1.example.com | [12f7 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [157b 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332b530 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1605 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [149d 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.315 UTC [cauthdsl] func2 -> DEBU 1726 0xc0010f9d70 signed by 0 principal evaluation starts (used [false false false])" +peer0.org1.example.com | [12f8 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [157c 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332b530 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1606 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [149e 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.315 UTC [cauthdsl] func2 -> DEBU 1727 0xc0010f9d70 processing identity 0 with bytes of fe10e0" +peer0.org1.example.com | [12f9 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [157d 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332b530 principal matched by identity 0 +peer0.org2.example.com | [1607 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [149f 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.315 UTC [cauthdsl] func2 -> DEBU 1728 0xc0010f9d70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +peer0.org1.example.com | [12fa 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [157e 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d8 6c fb 8b b4 bb 1e 3d 37 36 65 ac 75 a1 ab |D.l.....=76e.u..| +peer0.org2.example.com | [1608 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14a0 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.315 UTC [cauthdsl] func2 -> DEBU 1729 0xc0010f9d70 processing identity 1 with bytes of fe10e0" +peer0.org1.example.com | [12fb 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | 00000010 d6 a9 39 2d c0 86 11 7a 78 b0 38 50 42 86 02 0c |..9-...zx.8PB...| +peer0.org2.example.com | [1609 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [14a1 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.315 UTC [cauthdsl] func2 -> DEBU 172a 0xc0010f9d70 principal matched by identity 1" +peer0.org1.example.com | [12fc 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [157f 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c cc 0d 20 6f 76 e1 8c d0 cb c7 |0E.!.... ov.....| +peer0.org2.example.com | [160a 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14a2 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.315 UTC [msp.identity] Verify -> DEBU 172b Verify: digest = 00000000 1c 16 ac 57 86 d3 c3 21 1e c6 7b f6 f4 33 15 53 |...W...!..{..3.S| +peer0.org1.example.com | [12fd 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | 00000010 1b d5 69 4c 6d 69 9c 90 b7 33 ef e3 3e b6 ad 35 |..iLmi...3..>..5| +peer0.org2.example.com | [160b 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [14a3 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | 00000010 51 0a 12 8c c9 dc af 08 54 64 1f 16 1c 10 79 1c |Q.......Td....y.|" +peer0.org1.example.com | [12fe 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 88 66 a7 0f c2 02 20 36 d5 b9 d9 13 ff 20 2c 0e |.f.... 6..... ,.| +peer0.org2.example.com | [160c 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816101D +peer1.org1.example.com | [14a5 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | "2020-08-31 20:52:19.315 UTC [msp.identity] Verify -> DEBU 172c Verify: sig = 00000000 30 45 02 21 00 fd 5d cb e8 72 66 8f d2 c7 ff a3 |0E.!..]..rf.....| +peer0.org1.example.com | [12ff 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 d5 6c e0 aa 03 16 06 7e 75 b9 95 a8 7d b7 5a 26 |.l.....~u...}.Z&| +peer0.org2.example.com | [160d 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 75A0918FC90D9AF364CB7356412AFDA4C723C580EC5E5B0828F666946525E108 +peer1.org1.example.com | [14a6 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000010 aa d3 dc 46 c5 bd 34 a5 d8 7d dc a8 35 2c d6 29 |...F..4..}..5,.)| +peer0.org1.example.com | [1300 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 16 85 87 b4 f2 37 4f |.....7O| +peer0.org2.example.com | [160e 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [14a4 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000020 07 b0 75 b1 d5 02 20 0a ef 18 c5 de bf be 2c 7c |..u... .......,|| +peer0.org1.example.com | [1301 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1580 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332b530 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [160f 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [14a7 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | 00000030 16 ea 9e 3a ba 4b 56 95 85 92 21 ee 94 17 ad 3b |...:.KV...!....;| +peer0.org1.example.com | [1302 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1581 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00332b530 gate 1598907089078420500 evaluation succeeds +peer0.org2.example.com | [1610 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org1.example.com | [14a8 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | 00000040 78 aa 13 9c c2 d4 33 |x.....3|" +peer0.org1.example.com | [1303 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1582 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1611 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14a9 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.315 UTC [cauthdsl] func2 -> DEBU 172d 0xc0010f9d70 principal evaluation succeeds for identity 1" +peer0.org1.example.com | [1304 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1583 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1612 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [14aa 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:19.315 UTC [cauthdsl] func1 -> DEBU 172e 0xc0010f9d70 gate 1598907139315431400 evaluation succeeds" +peer0.org1.example.com | [1305 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1584 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1613 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14ab 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:19.315 UTC [policies] Evaluate -> DEBU 172f Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | [1306 08-31 20:51:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1585 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1614 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [14ac 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [policies] Evaluate -> DEBU 1730 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +peer0.org1.example.com | [1307 08-31 20:51:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161019 +peer1.org2.example.com | [1586 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1615 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14ad 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b95840 gate 1598907089353472800 evaluation starts +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [policies] Evaluate -> DEBU 1731 Signature set satisfies policy /Channel/Application/Admins" +peer0.org1.example.com | [1308 08-31 20:51:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 139F1AA0036C05E9997DD13B72BF810935B9628E3CA39F7178CB17FD0252EFBB +peer1.org2.example.com | [1587 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1616 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [14ae 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b95840 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [policies] Evaluate -> DEBU 1732 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +peer0.org1.example.com | [1309 08-31 20:51:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1588 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1617 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [14af 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b95840 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] verifyDeltaSet -> DEBU 1733 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | [130a 08-31 20:51:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1589 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 a0 91 8f c9 0d 9a f3 64 cb 73 56 41 2a fd a4 |u.......d.sVA*..| +peer0.org2.example.com | [1618 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] verifyDeltaSet -> DEBU 1734 Processing change to key: [Group] /Channel/Application/Org3MSP" +peer1.org1.example.com | [14b0 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b95840 principal matched by identity 0 +peer0.org1.example.com | [130b 08-31 20:51:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org2.example.com | 00000010 c7 23 c5 80 ec 5e 5b 08 28 f6 66 94 65 25 e1 08 |.#...^[.(.f.e%..| +peer0.org2.example.com | [1619 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] verifyDeltaSet -> DEBU 1735 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +peer1.org1.example.com | [14b1 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 a0 91 8f c9 0d 9a f3 64 cb 73 56 41 2a fd a4 |u.......d.sVA*..| +peer0.org1.example.com | [130c 08-31 20:51:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [158a 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f e5 1a c4 4d 07 23 7a d3 a5 2a 6d |0D. ....M.#z..*m| +peer0.org2.example.com | [161a 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] verifyDeltaSet -> DEBU 1736 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer1.org1.example.com | 00000010 c7 23 c5 80 ec 5e 5b 08 28 f6 66 94 65 25 e1 08 |.#...^[.(.f.e%..| +peer0.org1.example.com | [130d 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 54 39 77 79 3c dd 18 bb da d5 1d 5a b7 96 d1 f6 |T9wy<......Z....| +peer0.org2.example.com | [161b 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] verifyDeltaSet -> DEBU 1737 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +peer1.org1.example.com | [14b2 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f e5 1a c4 4d 07 23 7a d3 a5 2a 6d |0D. ....M.#z..*m| +peer0.org1.example.com | [130e 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 58 ac 39 61 02 20 2e 9c ef 20 ce ea cd 18 31 0e |X.9a. ... ....1.| +peer0.org2.example.com | [161c 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] verifyDeltaSet -> DEBU 1738 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +peer1.org1.example.com | 00000010 54 39 77 79 3c dd 18 bb da d5 1d 5a b7 96 d1 f6 |T9wy<......Z....| +peer0.org1.example.com | [130f 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org2.example.com | 00000030 91 1b f5 29 b4 2a d7 16 7c 4b 6b a0 ec d5 98 a4 |...).*..|Kk.....| +peer0.org2.example.com | [161d 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 1739 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer1.org1.example.com | 00000020 58 ac 39 61 02 20 2e 9c ef 20 ce ea cd 18 31 0e |X.9a. ... ....1.| +peer0.org1.example.com | [1310 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 82 7c 41 43 5c 48 |.|AC\H| +peer0.org2.example.com | [161e 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 173a Setting policy for key Readers to policy: mod_policy:"Admins" " +peer1.org1.example.com | 00000030 91 1b f5 29 b4 2a d7 16 7c 4b 6b a0 ec d5 98 a4 |...).*..|Kk.....| +peer0.org1.example.com | [1311 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [158b 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 173b Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [161f 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | 00000040 82 7c 41 43 5c 48 |.|AC\H| +peer0.org1.example.com | [1312 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [158c 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 173c Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [1620 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 a0 91 8f c9 0d 9a f3 64 cb 73 56 41 2a fd a4 |u.......d.sVA*..| +peer1.org1.example.com | [14b3 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b95840 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1313 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [158d 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 173d Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org2.example.com | 00000010 c7 23 c5 80 ec 5e 5b 08 28 f6 66 94 65 25 e1 08 |.#...^[.(.f.e%..| +peer1.org1.example.com | [14b4 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b95840 gate 1598907089353472800 evaluation succeeds +peer0.org1.example.com | [1314 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [158e 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 f4 c4 ab 64 23 45 dc 18 92 58 28 0c 4c 34 74 |"...d#E...X(.L4t| +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 173e Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org2.example.com | [1621 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f e5 1a c4 4d 07 23 7a d3 a5 2a 6d |0D. ....M.#z..*m| +peer1.org1.example.com | [14b5 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1315 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 79 c7 7f 57 0f b8 7f 32 d5 d9 e7 51 2f 15 27 48 |y..W...2...Q/.'H| +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 173f Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org2.example.com | 00000010 54 39 77 79 3c dd 18 bb da d5 1d 5a b7 96 d1 f6 |T9wy<......Z....| +peer1.org1.example.com | [14b6 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [158f 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 5c 24 30 37 87 8d a5 03 50 26 ce |0D. .\$07....P&.| +peer0.org1.example.com | [1316 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 1740 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +peer0.org2.example.com | 00000020 58 ac 39 61 02 20 2e 9c ef 20 ce ea cd 18 31 0e |X.9a. ... ....1.| +peer1.org1.example.com | [14b7 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 07 8d 52 a6 96 61 57 31 55 3d 02 7c 44 87 a4 3f |..R..aW1U=.|D..?| +peer0.org1.example.com | [1317 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 1741 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org2.example.com | 00000030 91 1b f5 29 b4 2a d7 16 7c 4b 6b a0 ec d5 98 a4 |...).*..|Kk.....| +peer1.org1.example.com | [14b8 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000020 5f 58 b6 03 02 20 0f 46 f1 a2 01 af 47 40 2d 56 |_X... .F....G@-V| +peer0.org1.example.com | [1318 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 1742 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org2.example.com | 00000040 82 7c 41 43 5c 48 |.|AC\H| +peer1.org1.example.com | [14b9 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000030 7b 99 35 f1 a5 b0 45 ac 68 00 c3 c2 2a d5 71 ce |{.5...E.h...*.q.| +peer0.org1.example.com | [1319 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 1743 Setting policy for key Admins to " +peer0.org2.example.com | [1622 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org1.example.com | [14ba 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 51 95 21 29 db 9e |Q.!)..| +peer0.org1.example.com | [131a 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 1744 Setting policy for key Endorsement to " +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org1.example.com | [14bb 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1590 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [131b 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 1745 Setting policy for key LifecycleEndorsement to " +peer0.org2.example.com | [1623 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 ff 6b 08 07 9d 89 fe 0b fe 0c |0E.!...k........| +peer1.org1.example.com | [14bc 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 ca e6 88 e9 1f 0d 72 fb 1c 13 83 e0 8f 83 b1 |.......r........| +peer1.org2.example.com | [1591 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [131c 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 1746 Setting policy for key Readers to " +peer0.org2.example.com | 00000010 01 c1 10 aa be 77 74 8b 10 7a 40 9c e9 b9 f3 02 |.....wt..z@.....| +peer1.org1.example.com | 00000010 57 fc 35 5c 16 19 54 69 8f 56 c2 9d 27 01 8d d0 |W.5\..Ti.V..'...| +peer1.org2.example.com | [1592 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [131d 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 1747 Setting policy for key Writers to " +peer0.org2.example.com | 00000020 73 67 8a a5 cc 02 20 36 96 a7 ae 88 de 4a 02 81 |sg.... 6.....J..| +peer1.org1.example.com | [14bd 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd ac 23 c8 ff 53 ce 34 53 b2 93 |0E.!...#..S.4S..| +peer1.org2.example.com | [1593 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [131e 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 1748 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org2.example.com | 00000030 85 86 6c 0a 77 55 3d d8 dd 51 b9 6a 23 e2 8a b5 |..l.wU=..Q.j#...| +peer1.org1.example.com | 00000010 79 9c 19 ec 7e 77 ef 6e 89 d5 14 b6 e1 5a ae d6 |y...~w.n.....Z..| +peer1.org2.example.com | [1594 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [131f 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 1749 Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org2.example.com | 00000040 b0 3a df 98 d6 38 23 |.:...8#| +peer1.org1.example.com | 00000020 34 7c 56 46 09 02 20 30 7c 31 0c 0b 85 09 f8 e6 |4|VF.. 0|1......| +peer1.org2.example.com | [1595 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1320 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 174a Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [1624 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | 00000030 18 47 58 fb 2e da be 0b 60 94 5b 70 d5 1e 4e d8 |.GX.....`.[p..N.| +peer1.org2.example.com | [1596 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1321 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 174b Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org2.example.com | [1625 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | 00000040 01 53 b1 76 32 c0 87 |.S.v2..| +peer1.org2.example.com | [1597 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 f4 c4 ab 64 23 45 dc 18 92 58 28 0c 4c 34 74 |"...d#E...X(.L4t| +peer0.org1.example.com | [1322 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 174c Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +peer0.org2.example.com | [1627 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14be 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 79 c7 7f 57 0f b8 7f 32 d5 d9 e7 51 2f 15 27 48 |y..W...2...Q/.'H| +peer0.org1.example.com | [1323 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 174d Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [1626 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [14bf 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1598 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 5c 24 30 37 87 8d a5 03 50 26 ce |0D. .\$07....P&.| +peer0.org1.example.com | [1324 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 174e Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [1628 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14c0 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | 00000010 07 8d 52 a6 96 61 57 31 55 3d 02 7c 44 87 a4 3f |..R..aW1U=.|D..?| +peer0.org1.example.com | [1325 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 174f Setting policy for key Readers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [1629 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [14c1 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 3d c9 53 d4 5c ce a4 15 c7 67 1c 7b 3d 79 3f |.=.S.\....g.{=y?| +peer1.org2.example.com | 00000020 5f 58 b6 03 02 20 0f 46 f1 a2 01 af 47 40 2d 56 |_X... .F....G@-V| +peer0.org1.example.com | [1326 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 1750 Setting policy for key Writers to policy: mod_policy:"Admins" " +peer0.org2.example.com | [162b 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | 00000010 8f 66 12 7b 70 0e 8c 4e d8 3e c0 03 f9 07 bc fb |.f.{p..N.>......| +peer1.org2.example.com | 00000030 7b 99 35 f1 a5 b0 45 ac 68 00 c3 c2 2a d5 71 ce |{.5...E.h...*.q.| +peer0.org1.example.com | [1327 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 1751 Setting policy for key Admins to policy: mod_policy:"Admins" " +peer0.org2.example.com | [162c 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14c2 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b4 9e 4e 9a fd 5d 98 e5 dd 2b |0E.!....N..]...+| +peer1.org2.example.com | 00000040 51 95 21 29 db 9e |Q.!)..| +peer0.org1.example.com | [1328 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.channelconfig] NewStandardValues -> DEBU 1752 Initializing protos for *channelconfig.ChannelProtos" +peer0.org2.example.com | [162a 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 b2 70 9a 63 1e 86 43 04 0e aa db 15 c3 6a 46 67 |.p.c..C......jFg| +peer1.org2.example.com | [1599 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1329 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1753 Processing field: HashingAlgorithm" +peer0.org2.example.com | [162d 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 5b 3b 73 67 9c 02 20 7c a1 34 d7 9f ec b4 0d b9 |[;sg.. |.4......| +peer1.org2.example.com | [159a 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [132a 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1754 Processing field: BlockDataHashingStructure" +peer0.org2.example.com | [162e 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 6f b7 6a 5b a2 db 7a d9 fd 8c 84 8b c6 b9 a5 8d |o.j[..z.........| +peer1.org2.example.com | [159b 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [132b 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1755 Processing field: OrdererAddresses" +peer0.org2.example.com | [162f 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 6f 71 81 be fc ea d6 |oq.....| +peer1.org2.example.com | [159c 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [132c 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1756 Processing field: Consortium" +peer0.org2.example.com | [1630 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14c3 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [159d 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [132d 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1757 Processing field: Capabilities" +peer0.org2.example.com | [1631 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [14c4 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [159e 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [132e 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.channelconfig] NewStandardValues -> DEBU 1758 Initializing protos for *channelconfig.OrdererProtos" +peer0.org2.example.com | [1632 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [14c5 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [159f 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [132f 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1759 Processing field: ConsensusType" +peer0.org2.example.com | [1633 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [14c6 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15a0 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175a Processing field: BatchSize" +peer0.org1.example.com | [1330 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1635 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [14c7 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175b Processing field: BatchTimeout" +peer1.org2.example.com | [15a1 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1331 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004116250 gate 1598907081039443400 evaluation starts +peer0.org2.example.com | [1636 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [14c8 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175c Processing field: KafkaBrokers" +peer1.org2.example.com | [15a2 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1332 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004116250 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1634 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14c9 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175d Processing field: ChannelRestrictions" +peer1.org2.example.com | [15a3 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1333 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004116250 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1637 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [14ca 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175e Processing field: Capabilities" +peer1.org2.example.com | [15a4 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033685c0 gate 1598907089082244400 evaluation starts +peer0.org1.example.com | [1334 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004116250 principal matched by identity 0 +peer0.org2.example.com | [1639 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003579a90 gate 1598907085540487700 evaluation starts +peer1.org1.example.com | [14cb 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.channelconfig] NewStandardValues -> DEBU 175f Initializing protos for *channelconfig.OrdererOrgProtos" +peer1.org2.example.com | [15a5 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033685c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1335 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df de a9 43 65 43 25 6a a9 bb 70 39 02 4a c3 d1 |...CeC%j..p9.J..| +peer1.org1.example.com | [14cc 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [163a 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003579a90 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1760 Processing field: Endpoints" +peer1.org2.example.com | [15a6 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033685c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 91 a5 f0 a4 db 56 e5 75 fe af c3 2e 3a b6 9e 72 |.....V.u....:..r| +peer1.org1.example.com | [14cd 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [163b 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003579a90 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.channelconfig] NewStandardValues -> DEBU 1761 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org2.example.com | [15a7 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033685c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1336 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 a3 4c 3c b8 49 5b c9 1f 66 87 44 |0D. R.L<.I[..f.D| +peer1.org1.example.com | [14ce 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [163c 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003579a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1762 Processing field: MSP" +peer1.org2.example.com | [15a8 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033685c0 principal evaluation fails +peer0.org1.example.com | 00000010 c0 f8 5c 9d 06 ba d4 5e cc ac 06 f6 41 41 44 00 |..\....^....AAD.| +peer1.org1.example.com | [14cf 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [163d 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003579a90 principal evaluation fails +orderer0.example.com | "2020-08-31 20:52:19.317 UTC [common.channelconfig] validateMSP -> DEBU 1763 Setting up MSP for org OrdererOrg" +peer1.org2.example.com | [15a9 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033685c0 gate 1598907089082244400 evaluation fails +peer0.org1.example.com | 00000020 58 b4 5d ed 02 20 38 4f fb 61 35 b5 8a 69 7d 8a |X.].. 8O.a5..i}.| +peer1.org1.example.com | [14d0 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org2.example.com | [163e 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003579a90 gate 1598907085540487700 evaluation fails +orderer0.example.com | "2020-08-31 20:52:19.318 UTC [msp] newBccspMsp -> DEBU 1764 Creating BCCSP-based MSP instance" +peer1.org2.example.com | [15aa 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000030 c1 4e 97 95 22 c4 50 ea f5 c9 87 09 42 66 f8 90 |.N..".P.....Bf..| +peer1.org1.example.com | [14d1 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [163f 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.318 UTC [msp] New -> DEBU 1765 Creating Cache-MSP instance" +peer1.org2.example.com | [15ab 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000040 06 15 8a 5e 70 be |...^p.| +peer1.org1.example.com | [14d2 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1640 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.318 UTC [msp] Setup -> DEBU 1766 Setting up MSP instance OrdererMSP" +peer1.org2.example.com | [15ac 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1337 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004116250 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1641 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [14d3 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.318 UTC [msp.identity] newIdentity -> DEBU 1767 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [15ad 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368b30 gate 1598907089082497100 evaluation starts +peer0.org1.example.com | [1338 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004116250 gate 1598907081039443400 evaluation succeeds +peer0.org2.example.com | [1642 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ac000 gate 1598907085542147800 evaluation starts +peer1.org1.example.com | [14d4 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | [15ae 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368b30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1339 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1638 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14d5 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [15af 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368b30 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [133a 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1643 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ac000 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [14d6 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | [15b0 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368b30 principal matched by identity 0 +peer0.org1.example.com | [133b 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1644 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ac000 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [14d7 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org2.example.com | [15b1 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 ca e6 88 e9 1f 0d 72 fb 1c 13 83 e0 8f 83 b1 |.......r........| +peer0.org1.example.com | [133c 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1645 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14d8 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | 00000010 57 fc 35 5c 16 19 54 69 8f 56 c2 9d 27 01 8d d0 |W.5\..Ti.V..'...| +peer0.org1.example.com | [133d 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1646 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ac000 principal matched by identity 0 +peer1.org1.example.com | [14d9 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | [15b2 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd ac 23 c8 ff 53 ce 34 53 b2 93 |0E.!...#..S.4S..| +peer0.org1.example.com | [133e 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1647 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14da 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org2.example.com | 00000010 79 9c 19 ec 7e 77 ef 6e 89 d5 14 b6 e1 5a ae d6 |y...~w.n.....Z..| +peer0.org1.example.com | [133f 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1648 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [14db 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org2.example.com | 00000020 34 7c 56 46 09 02 20 30 7c 31 0c 0b 85 09 f8 e6 |4|VF.. 0|1......| +peer0.org1.example.com | [1340 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1649 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14dc 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org2.example.com | 00000030 18 47 58 fb 2e da be 0b 60 94 5b 70 d5 1e 4e d8 |.GX.....`.[p..N.| +peer0.org1.example.com | [1341 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [164a 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [14dd 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org2.example.com | 00000040 01 53 b1 76 32 c0 87 |.S.v2..| +peer0.org1.example.com | [1342 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [164b 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d8 6c fb 8b b4 bb 1e 3d 37 36 65 ac 75 a1 ab |D.l.....=76e.u..| +peer1.org1.example.com | [14de 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c14970 gate 1598907089520143100 evaluation starts +orderer0.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org2.example.com | [15b3 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368b30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1343 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 d6 a9 39 2d c0 86 11 7a 78 b0 38 50 42 86 02 0c |..9-...zx.8PB...| +peer1.org1.example.com | [14df 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c14970 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org2.example.com | [15b4 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003368b30 gate 1598907089082497100 evaluation succeeds +peer0.org1.example.com | [1344 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [164c 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c cc 0d 20 6f 76 e1 8c d0 cb c7 |0E.!.... ov.....| +peer1.org1.example.com | [14e0 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c14970 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | nw== +peer1.org2.example.com | [15b5 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1345 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | 00000010 1b d5 69 4c 6d 69 9c 90 b7 33 ef e3 3e b6 ad 35 |..iLmi...3..>..5| +peer1.org1.example.com | [14e1 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c14970 principal matched by identity 0 +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org2.example.com | [15b6 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1346 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 88 66 a7 0f c2 02 20 36 d5 b9 d9 13 ff 20 2c 0e |.f.... 6..... ,.| +peer1.org1.example.com | [14e2 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 44 e3 35 38 16 92 51 96 79 50 78 35 12 6b 97 |.D.58..Q.yPx5.k.| +orderer0.example.com | "2020-08-31 20:52:19.318 UTC [common.channelconfig] NewStandardValues -> DEBU 1768 Initializing protos for *channelconfig.ApplicationProtos" +peer1.org2.example.com | [15b7 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1347 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 d5 6c e0 aa 03 16 06 7e 75 b9 95 a8 7d b7 5a 26 |.l.....~u...}.Z&| +peer1.org1.example.com | 00000010 04 a2 7c 72 ff 35 9d 57 a3 4f db ff 36 34 fc 0a |..|r.5.W.O..64..| +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1769 Processing field: ACLs" +peer1.org2.example.com | [15b8 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1348 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 16 85 87 b4 f2 37 4f |.....7O| +peer1.org1.example.com | [14e3 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef de 13 18 e3 79 74 64 07 10 b0 |0E.!......ytd...| +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [common.channelconfig] initializeProtosStruct -> DEBU 176a Processing field: Capabilities" +peer1.org2.example.com | [15b9 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1349 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [164d 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ac000 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 99 82 b0 12 15 ce 05 96 11 6c c4 99 31 59 33 0e |.........l..1Y3.| +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [common.channelconfig] NewStandardValues -> DEBU 176b Initializing protos for *channelconfig.ApplicationOrgProtos" +peer1.org2.example.com | [15ba 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [134a 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [164e 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ac000 gate 1598907085542147800 evaluation succeeds +peer1.org1.example.com | 00000020 8c e5 d0 bf 8b 02 20 1b 48 9b 5c 88 9c 3c 02 38 |...... .H.\..<.8| +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [common.channelconfig] initializeProtosStruct -> DEBU 176c Processing field: AnchorPeers" +peer1.org2.example.com | [15bb 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [134b 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [164f 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000030 fc b2 8a db 39 ca 2e 1a 5b 89 6a 92 df a1 4c 92 |....9...[.j...L.| +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [common.channelconfig] NewStandardValues -> DEBU 176d Initializing protos for *channelconfig.OrganizationProtos" +peer1.org2.example.com | [15bc 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 a0 91 8f c9 0d 9a f3 64 cb 73 56 41 2a fd a4 |u.......d.sVA*..| +peer0.org1.example.com | [134c 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\334|\262l\314\326\301\004^!2g\334#\245\025\235\370," > alive: alive:\005\307\340" > +peer0.org2.example.com | [1650 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000040 6a 7e 5a 52 3c 85 a1 |j~ZR<..| +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [common.channelconfig] initializeProtosStruct -> DEBU 176e Processing field: MSP" +peer1.org2.example.com | 00000010 c7 23 c5 80 ec 5e 5b 08 28 f6 66 94 65 25 e1 08 |.#...^[.(.f.e%..| +peer0.org1.example.com | [134d 08-31 20:51:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1651 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [14e4 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c14970 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [common.channelconfig] Validate -> DEBU 176f Anchor peers for org Org3MSP are " +peer1.org2.example.com | [15bd 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f e5 1a c4 4d 07 23 7a d3 a5 2a 6d |0D. ....M.#z..*m| +peer0.org1.example.com | [134e 08-31 20:51:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1652 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [14e5 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c14970 gate 1598907089520143100 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [common.channelconfig] validateMSP -> DEBU 1770 Setting up MSP for org Org3MSP" +peer1.org2.example.com | 00000010 54 39 77 79 3c dd 18 bb da d5 1d 5a b7 96 d1 f6 |T9wy<......Z....| +peer0.org1.example.com | [134f 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [1653 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [14e6 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [msp] newBccspMsp -> DEBU 1771 Creating BCCSP-based MSP instance" +peer1.org2.example.com | 00000020 58 ac 39 61 02 20 2e 9c ef 20 ce ea cd 18 31 0e |X.9a. ... ....1.| +peer0.org1.example.com | [1350 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1654 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14e7 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000030 91 1b f5 29 b4 2a d7 16 7c 4b 6b a0 ec d5 98 a4 |...).*..|Kk.....| +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [msp] New -> DEBU 1772 Creating Cache-MSP instance" +peer0.org1.example.com | [1351 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1655 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [14e8 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000040 82 7c 41 43 5c 48 |.|AC\H| +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [msp] Setup -> DEBU 1773 Setting up MSP instance Org3MSP" +peer0.org1.example.com | [1352 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1656 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 a0 91 8f c9 0d 9a f3 64 cb 73 56 41 2a fd a4 |u.......d.sVA*..| +peer1.org1.example.com | [14e9 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [15be 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [msp.identity] newIdentity -> DEBU 1774 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [1353 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 c7 23 c5 80 ec 5e 5b 08 28 f6 66 94 65 25 e1 08 |.#...^[.(.f.e%..| +peer1.org1.example.com | [14ea 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [15bf 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [1354 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1657 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f e5 1a c4 4d 07 23 7a d3 a5 2a 6d |0D. ....M.#z..*m| +peer1.org1.example.com | [14eb 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [15c0 08-31 20:51:29.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [1355 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 94 f1 67 52 fd 9c dc e6 2b 61 ab 86 41 85 d1 |...gR....+a..A..| +peer0.org2.example.com | 00000010 54 39 77 79 3c dd 18 bb da d5 1d 5a b7 96 d1 f6 |T9wy<......Z....| +peer1.org2.example.com | [15c1 08-31 20:51:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [14ec 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | 00000010 cb 16 a3 f7 7d 4f 3b ba bd 8c 6b fb 15 b6 11 25 |....}O;...k....%| +peer0.org2.example.com | 00000020 58 ac 39 61 02 20 2e 9c ef 20 ce ea cd 18 31 0e |X.9a. ... ....1.| +peer1.org2.example.com | [15c2 08-31 20:51:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +orderer0.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | [14ed 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1356 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 cb 11 89 70 22 07 b7 9f 3b b0 |0E.!.....p"...;.| +peer0.org2.example.com | 00000030 91 1b f5 29 b4 2a d7 16 7c 4b 6b a0 ec d5 98 a4 |...).*..|Kk.....| +peer1.org2.example.com | [15c3 08-31 20:51:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [14ee 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | 00000010 64 aa d2 66 cb e9 ac 80 49 b6 df f2 f2 3d 7e 24 |d..f....I....=~$| +peer0.org2.example.com | 00000040 82 7c 41 43 5c 48 |.|AC\H| +peer1.org2.example.com | [15c4 08-31 20:51:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D981610071801 +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | [14ef 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 d6 a3 37 8e 22 02 20 5a 23 26 9b b5 f6 5c 25 cc |..7.". Z#&...\%.| +peer0.org2.example.com | [1658 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [15c5 08-31 20:51:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 289A7799A4FB92B5CD9695E349F56BD699BA0BC57DF6B6774B390347F57BFB35 +orderer0.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | [14f0 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 01 74 0e 34 c6 ce f4 6a 65 bc e0 56 e6 bc 46 48 |.t.4...je..V..FH| +peer0.org2.example.com | [1659 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [15c6 08-31 20:51:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +orderer0.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +peer1.org1.example.com | [14f1 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 39 32 11 6a dc 78 d8 |92.j.x.| +peer0.org2.example.com | [165a 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15c7 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | [14f2 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [1357 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [165b 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15c8 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +peer1.org1.example.com | [14f3 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [165c 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | [14f4 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1358 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 64 65 2e 7d d5 60 3b 32 e1 0a |0E.!..de.}.`;2..| +peer0.org2.example.com | [165d 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [15c9 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +peer1.org1.example.com | [14f5 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 f1 9c 8e 3f 35 3d cb 09 e4 0b 4e b4 f0 31 66 74 |...?5=....N..1ft| +peer0.org2.example.com | [165e 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 a0 91 8f c9 0d 9a f3 64 cb 73 56 41 2a fd a4 |u.......d.sVA*..| +peer1.org2.example.com | [15ca 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +peer1.org1.example.com | [14f6 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000020 4b 2f f2 b8 f0 02 20 6b 78 3c d4 bd 22 5a 4e 9e |K/.... kx<.."ZN.| +peer0.org2.example.com | 00000010 c7 23 c5 80 ec 5e 5b 08 28 f6 66 94 65 25 e1 08 |.#...^[.(.f.e%..| +peer1.org2.example.com | [15cb 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | [14f7 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | 00000030 52 38 8a 2d d9 7b 4c 5a 1b 37 02 a3 f3 c8 ec 7a |R8.-.{LZ.7.....z| +peer0.org2.example.com | [165f 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f e5 1a c4 4d 07 23 7a d3 a5 2a 6d |0D. ....M.#z..*m| +peer1.org2.example.com | [15cc 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [common.channelconfig] NewStandardValues -> DEBU 1775 Initializing protos for *channelconfig.ApplicationOrgProtos" +peer1.org1.example.com | [14f8 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 5c 83 ae 7d 5b 61 76 |\..}[av| +peer0.org2.example.com | 00000010 54 39 77 79 3c dd 18 bb da d5 1d 5a b7 96 d1 f6 |T9wy<......Z....| +peer1.org2.example.com | [15cd 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1776 Processing field: AnchorPeers" +peer1.org1.example.com | [14f9 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1359 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | 00000020 58 ac 39 61 02 20 2e 9c ef 20 ce ea cd 18 31 0e |X.9a. ... ....1.| +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [common.channelconfig] NewStandardValues -> DEBU 1777 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org2.example.com | [15ce 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [14fa 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [135a 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | 00000030 91 1b f5 29 b4 2a d7 16 7c 4b 6b a0 ec d5 98 a4 |...).*..|Kk.....| +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1778 Processing field: MSP" +peer1.org2.example.com | [15cf 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [14fb 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [135b 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000040 82 7c 41 43 5c 48 |.|AC\H| +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [common.channelconfig] Validate -> DEBU 1779 Anchor peers for org Org1MSP are anchor_peers: " +peer1.org2.example.com | [15d0 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [14fc 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [135c 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1660 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [common.channelconfig] validateMSP -> DEBU 177a Setting up MSP for org Org1MSP" +peer1.org2.example.com | [15d1 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [14fd 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [135d 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1661 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:19.319 UTC [msp] newBccspMsp -> DEBU 177b Creating BCCSP-based MSP instance" +peer1.org2.example.com | [15d2 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [14fe 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [135e 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1662 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.320 UTC [msp] New -> DEBU 177c Creating Cache-MSP instance" +peer1.org2.example.com | [15d3 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [14ff 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [135f 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1663 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-08-31 20:52:19.320 UTC [msp] Setup -> DEBU 177d Setting up MSP instance Org1MSP" +peer1.org2.example.com | [15d4 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1500 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [1360 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1664 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.320 UTC [msp.identity] newIdentity -> DEBU 177e Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [15d5 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1501 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1361 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [1665 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | [15d6 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1502 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [1362 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1666 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | [15d7 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1363 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1503 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1667 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1668 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | [15d8 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1364 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1504 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e a2 b3 d2 6f 0f 00 f3 8d 61 2f d7 76 5d 1e 76 |~...o....a/.v].v| +peer0.org2.example.com | [1669 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | [15d9 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [1365 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\005\307\340" > +peer1.org1.example.com | 00000010 e4 c1 1d 48 ca 30 34 a8 07 38 10 24 b8 e7 1c be |...H.04..8.$....| +peer0.org2.example.com | [166a 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | [15da 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1366 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [1505 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 ff c2 cc 3b ff 9d 47 d4 86 4d 78 |0D. P...;..G..Mx| +peer0.org2.example.com | [166b 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org2.example.com | [15db 08-31 20:51:29.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1367 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 7c dc 23 cf d9 25 91 2b 0a 97 78 ed a8 f5 6f 4b ||.#..%.+..x...oK| +peer0.org2.example.com | [166c 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org2.example.com | [15dc 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 5d f4 97 7a 02 20 4f 31 2a 25 d9 48 5d b9 d3 6d |]..z. O1*%.H]..m| +peer0.org1.example.com | [1368 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [166d 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358f170 gate 1598907085562503400 evaluation starts +orderer0.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org2.example.com | [15dd 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 b9 b2 7f 59 9b 4b 02 8f 1c 6a 6a 0f 80 d7 76 96 |...Y.K...jj...v.| +peer0.org1.example.com | [1369 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [166e 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358f170 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org2.example.com | [15de 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 7f 18 8f f4 23 38 |....#8| +peer0.org1.example.com | [136a 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [166f 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358f170 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org2.example.com | [15df 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1506 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | [136b 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1670 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358f170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org2.example.com | [15e0 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [136c 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1671 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358f170 principal evaluation fails +orderer0.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org2.example.com | [15e1 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1507 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 a7 2b 2f cb 3f e1 a0 92 90 52 9c |0D. E.+/.?....R.| +peer0.org1.example.com | [136d 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1672 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358f170 gate 1598907085562503400 evaluation fails +orderer0.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org2.example.com | [15e2 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 9b a4 fe e3 5e 4d dc eb 2c 15 83 42 1c 8a 65 b5 |....^M..,..B..e.| +peer0.org1.example.com | [136e 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1673 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org2.example.com | [15e3 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000020 bd 67 05 0d 02 20 45 11 d1 c7 24 b6 97 39 16 3d |.g... E...$..9.=| +peer0.org1.example.com | [136f 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1674 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.320 UTC [common.channelconfig] NewStandardValues -> DEBU 177f Initializing protos for *channelconfig.ApplicationOrgProtos" +peer1.org2.example.com | [15e4 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000030 c0 cc 89 e5 06 c8 4c f3 37 e8 eb 21 9d 64 f8 9f |......L.7..!.d..| +peer0.org1.example.com | [1370 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1675 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:19.321 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1780 Processing field: AnchorPeers" +peer1.org2.example.com | [15e5 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000040 67 b4 66 68 90 38 |g.fh.8| +peer0.org1.example.com | [1371 08-31 20:51:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org2.example.com | [1676 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358f6e0 gate 1598907085565890300 evaluation starts +orderer0.example.com | "2020-08-31 20:52:19.321 UTC [common.channelconfig] NewStandardValues -> DEBU 1781 Initializing protos for *channelconfig.OrganizationProtos" +peer1.org2.example.com | [15e6 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1508 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1372 08-31 20:51:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1677 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358f6e0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:19.321 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1782 Processing field: MSP" +peer1.org2.example.com | [15e7 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003381720 gate 1598907089329503900 evaluation starts +peer1.org1.example.com | [1509 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [1373 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1678 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358f6e0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:19.321 UTC [common.channelconfig] Validate -> DEBU 1783 Anchor peers for org Org2MSP are anchor_peers: " +peer1.org2.example.com | [15e8 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003381720 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [150a 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1374 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1679 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358f6e0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:19.321 UTC [common.channelconfig] validateMSP -> DEBU 1784 Setting up MSP for org Org2MSP" +peer1.org1.example.com | [150b 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [15e9 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003381720 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1375 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [167a 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 2c 0a bb e8 62 57 e5 1c 19 9f cc 51 e1 bd de |.,...bW.....Q...| +orderer0.example.com | "2020-08-31 20:52:19.321 UTC [msp] newBccspMsp -> DEBU 1785 Creating BCCSP-based MSP instance" +peer1.org1.example.com | [150c 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [15ea 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003381720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1376 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 f6 3d 7a a4 97 e4 33 aa cc 3a 8f 54 07 ea 74 2b |.=z...3..:.T..t+| +orderer0.example.com | "2020-08-31 20:52:19.321 UTC [msp] New -> DEBU 1786 Creating Cache-MSP instance" +peer1.org1.example.com | [150d 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15eb 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003381720 principal evaluation fails +peer0.org1.example.com | [1377 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [167b 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe 34 9c 55 9b 9b 7d a8 c5 8b 33 |0E.!..4.U..}...3| +orderer0.example.com | "2020-08-31 20:52:19.322 UTC [msp] Setup -> DEBU 1787 Setting up MSP instance Org2MSP" +peer1.org1.example.com | [150e 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15ec 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003381720 gate 1598907089329503900 evaluation fails +peer0.org1.example.com | [1378 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 7b 7f 35 92 85 b2 39 dc e2 de a5 3d f4 7f 7b 8f |{.5...9....=..{.| +orderer0.example.com | "2020-08-31 20:52:19.322 UTC [msp.identity] newIdentity -> DEBU 1788 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [150f 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15ed 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1379 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000020 de d6 7a fd 95 02 20 0a 8d d1 de 7a 04 47 e8 cd |..z... ....z.G..| +orderer0.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [1510 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [15ee 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [137a 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000030 45 fa d7 16 c6 0d f6 df be 09 17 89 c2 ae ef 58 |E..............X| +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [1511 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15ef 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [137b 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000040 84 b4 f1 55 a1 6f a8 |...U.o.| +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [1512 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15f0 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003381c90 gate 1598907089337202500 evaluation starts +peer0.org1.example.com | [137c 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [167c 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358f6e0 principal evaluation succeeds for identity 0 +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | [1513 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [15f1 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003381c90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [137d 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [167d 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00358f6e0 gate 1598907085565890300 evaluation succeeds +orderer0.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [1514 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [15f2 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003381c90 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [137e 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [167e 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | [1515 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [15f3 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003381c90 principal matched by identity 0 +peer0.org1.example.com | [137f 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415aca0 gate 1598907081489239200 evaluation starts +peer0.org2.example.com | [167f 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | [1516 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15f4 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 3d c9 53 d4 5c ce a4 15 c7 67 1c 7b 3d 79 3f |.=.S.\....g.{=y?| +peer0.org1.example.com | [1380 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415aca0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1680 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer1.org1.example.com | [1517 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 8f 66 12 7b 70 0e 8c 4e d8 3e c0 03 f9 07 bc fb |.f.{p..N.>......| +peer0.org1.example.com | [1381 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415aca0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1681 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | [1518 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [15f5 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b4 9e 4e 9a fd 5d 98 e5 dd 2b |0E.!....N..]...+| +peer0.org2.example.com | [1682 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1382 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415aca0 principal matched by identity 0 +orderer0.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer1.org1.example.com | [1519 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 b2 70 9a 63 1e 86 43 04 0e aa db 15 c3 6a 46 67 |.p.c..C......jFg| +peer0.org2.example.com | [1683 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1383 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 f6 e0 95 9d 1c 80 eb 6f 79 9d 8c c2 7a 8d de |........oy...z..| +orderer0.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer1.org1.example.com | [151a 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 5b 3b 73 67 9c 02 20 7c a1 34 d7 9f ec b4 0d b9 |[;sg.. |.4......| +peer0.org2.example.com | [1684 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 da 6f f9 1c c5 fd 67 d2 7d e2 fb 29 31 35 fb 13 |.o....g.}..)15..| +orderer0.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer1.org1.example.com | [151b 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 6f b7 6a 5b a2 db 7a d9 fd 8c 84 8b c6 b9 a5 8d |o.j[..z.........| +peer0.org2.example.com | [1685 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1384 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 d8 36 b5 43 13 f8 35 49 b2 51 b7 |0D. c.6.C..5I.Q.| +orderer0.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer1.org1.example.com | [151c 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 6f 71 81 be fc ea d6 |oq.....| +peer0.org2.example.com | [1686 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | 00000010 15 9d 4f d9 24 7e a7 1b 2e 89 03 83 43 2b 46 5c |..O.$~......C+F\| +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | [151d 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [15f6 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003381c90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1687 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 98 eb ea a7 02 20 24 28 40 8c 46 12 16 47 b9 d1 |..... $(@.F..G..| +orderer0.example.com | "2020-08-31 20:52:19.322 UTC [msp] Setup -> DEBU 1789 Setting up the MSP manager (4 msps)" +peer1.org1.example.com | [151e 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [15f7 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003381c90 gate 1598907089337202500 evaluation succeeds +peer0.org2.example.com | [1688 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000030 04 c1 0c b9 5d b5 94 a6 ff 22 8a f5 a4 d7 fe 80 |....]...."......| +orderer0.example.com | "2020-08-31 20:52:19.322 UTC [msp] Setup -> DEBU 178a MSP manager setup complete, setup 4 msps" +peer1.org1.example.com | [151f 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [15f8 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1689 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 09 37 12 fb 78 cf |.7..x.| +orderer0.example.com | "2020-08-31 20:52:19.322 UTC [policies] NewManagerImpl -> DEBU 178b Proposed new policy Endorsement for Channel/Application/Org3MSP" +peer1.org1.example.com | [1520 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15f9 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [168a 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1385 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415aca0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1521 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15fa 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.322 UTC [policies] NewManagerImpl -> DEBU 178c Proposed new policy Readers for Channel/Application/Org3MSP" +peer0.org2.example.com | [168b 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1386 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415aca0 gate 1598907081489239200 evaluation succeeds +peer1.org1.example.com | [1522 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [15fb 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.322 UTC [policies] NewManagerImpl -> DEBU 178d Proposed new policy Writers for Channel/Application/Org3MSP" +peer0.org2.example.com | [168c 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1387 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1523 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [15fc 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.322 UTC [policies] NewManagerImpl -> DEBU 178e Proposed new policy Admins for Channel/Application/Org3MSP" +peer0.org2.example.com | [168d 08-31 20:51:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1388 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1524 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [15fd 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2020-08-31 20:52:19.322 UTC [policies] NewManagerImpl -> DEBU 178f Proposed new policy Admins for Channel/Application/Org1MSP" +peer0.org2.example.com | [168e 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003602b60 gate 1598907085570155700 evaluation starts +peer0.org1.example.com | [1389 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1525 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [15fe 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 1790 Proposed new policy Readers for Channel/Application/Org1MSP" +peer0.org2.example.com | [168f 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003602b60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [138a 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1526 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [15ff 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 1791 Proposed new policy Writers for Channel/Application/Org1MSP" +peer0.org2.example.com | [1690 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003602b60 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [138b 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1527 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1600 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 1792 Proposed new policy Writers for Channel/Application/Org2MSP" +peer0.org2.example.com | [1691 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003602b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [138c 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1529 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1601 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 1793 Proposed new policy Admins for Channel/Application/Org2MSP" +peer0.org2.example.com | [1692 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003602b60 principal evaluation fails +peer0.org1.example.com | [138d 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1528 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1602 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 1794 Proposed new policy Readers for Channel/Application/Org2MSP" +peer0.org2.example.com | [1693 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003602b60 gate 1598907085570155700 evaluation fails +peer0.org1.example.com | [138e 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [152a 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1603 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 1795 Proposed new policy Admins for Channel/Application" +peer0.org2.example.com | [1694 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [138f 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [152b 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1604 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] GetPolicy -> DEBU 1796 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer0.org2.example.com | [1695 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1390 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [152c 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1605 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] GetPolicy -> DEBU 1797 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +peer0.org2.example.com | [1696 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1391 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [152d 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1606 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 1798 Proposed new policy Endorsement for Channel/Application" +peer0.org2.example.com | [1697 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036030d0 gate 1598907085571315300 evaluation starts +peer0.org1.example.com | [1392 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [152e 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1607 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] GetPolicy -> DEBU 1799 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +peer0.org2.example.com | [1698 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036030d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1393 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [152f 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1608 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] GetPolicy -> DEBU 179a Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +peer0.org2.example.com | [1699 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036030d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1394 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1530 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1609 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 179b Proposed new policy LifecycleEndorsement for Channel/Application" +peer0.org2.example.com | [169a 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036030d0 principal matched by identity 0 +peer0.org1.example.com | [1395 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1531 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [160a 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 179c Proposed new policy Readers for Channel/Application" +peer0.org2.example.com | [169b 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4b 95 4c 04 7e 5e 5c 63 59 88 95 4c e2 a8 b6 a2 |K.L.~^\cY..L....| +peer0.org1.example.com | [1396 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1532 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [160b 08-31 20:51:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 179d Proposed new policy Writers for Channel/Application" +peer0.org2.example.com | 00000010 ac 86 d1 f0 df d8 c4 5e 37 b4 48 68 63 e9 af c8 |.......^7.Hhc...| +peer0.org1.example.com | [1397 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1533 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 179e Proposed new policy Admins for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [160c 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [169c 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f b4 3e 41 e6 7c 91 f1 17 1c 5c 24 |0D. ..>A.|....\$| +peer0.org1.example.com | [1398 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\005\307\340" > +peer1.org1.example.com | [1534 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 179f Proposed new policy Readers for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [160d 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 2c 10 ae 88 1a d6 e9 79 11 87 10 c1 22 d6 13 58 |,......y...."..X| +peer0.org1.example.com | [1399 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1535 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 17a0 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +peer1.org2.example.com | [160e 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 be a3 39 a8 02 20 66 19 59 38 de 24 6f 66 6d c0 |..9.. f.Y8.$ofm.| +peer0.org1.example.com | [139a 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1536 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c64f40 gate 1598907090003103800 evaluation starts +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 17a1 Proposed new policy Admins for Channel/Orderer" +peer1.org2.example.com | [160f 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org2.example.com | 00000030 6b ae 90 a5 78 8b e0 dd 75 15 85 0c e9 5c 07 88 |k...x...u....\..| +peer0.org1.example.com | [139b 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [1537 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c64f40 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 17a2 Proposed new policy BlockValidation for Channel/Orderer" +peer1.org2.example.com | [1610 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 fe 1b d8 4c 7d f8 |...L}.| +peer0.org1.example.com | [139c 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1538 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c64f40 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 17a3 Proposed new policy Readers for Channel/Orderer" +peer1.org2.example.com | [1611 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [169d 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036030d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [139d 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [1539 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c64f40 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 17a4 Proposed new policy Writers for Channel/Orderer" +peer1.org2.example.com | [1612 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [169e 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036030d0 gate 1598907085571315300 evaluation succeeds +peer0.org1.example.com | [139e 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [153a 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 17a5 Proposed new policy Readers for Channel" +peer1.org2.example.com | [1613 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [169f 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [13a0 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 17a6 Proposed new policy Writers for Channel" +peer1.org2.example.com | [1614 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [16a0 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [139f 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [153b 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 17a7 Proposed new policy Admins for Channel" +peer1.org2.example.com | [1615 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [16a1 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [13a1 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | [1616 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 44 e3 35 38 16 92 51 96 79 50 78 35 12 6b 97 |.D.58..Q.yPx5.k.| +peer0.org2.example.com | [16a2 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | [13a2 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17a8 Adding to config map: [Group] /Channel" +peer1.org2.example.com | 00000010 04 a2 7c 72 ff 35 9d 57 a3 4f db ff 36 34 fc 0a |..|r.5.W.O..64..| +peer0.org2.example.com | [16a3 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | [13a3 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17a9 Adding to config map: [Group] /Channel/Orderer" +peer1.org2.example.com | [1617 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef de 13 18 e3 79 74 64 07 10 b0 |0E.!......ytd...| +peer0.org2.example.com | [16a5 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [13a4 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17aa Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +peer1.org2.example.com | 00000010 99 82 b0 12 15 ce 05 96 11 6c c4 99 31 59 33 0e |.........l..1Y3.| +peer0.org2.example.com | [16a6 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [153c 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c64f40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [13a5 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17ab Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +peer1.org2.example.com | 00000020 8c e5 d0 bf 8b 02 20 1b 48 9b 5c 88 9c 3c 02 38 |...... .H.\..<.8| +peer0.org2.example.com | [16a7 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [153d 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c64f40 gate 1598907090003103800 evaluation succeeds +peer0.org1.example.com | [13a7 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17ac Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +peer1.org2.example.com | 00000030 fc b2 8a db 39 ca 2e 1a 5b 89 6a 92 df a1 4c 92 |....9...[.j...L.| +peer0.org2.example.com | [16a8 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [153e 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [13a8 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17ad Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | 00000040 6a 7e 5a 52 3c 85 a1 |j~ZR<..| +peer0.org2.example.com | [16a9 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [153f 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [13a6 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17ae Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +peer1.org2.example.com | [1618 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | [16aa 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1540 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [13a9 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17af Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [16ab 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1541 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [13aa 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17b0 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +peer1.org2.example.com | [1619 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 a2 0d b0 2f 00 e5 77 59 ca 57 c5 |0D. E.../..wY.W.| +peer0.org2.example.com | [16a4 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1542 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | [13ab 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17b1 Adding to config map: [Value] /Channel/Orderer/Capabilities" +peer1.org2.example.com | 00000010 91 f3 cb 17 5c 2e 26 b7 32 7c fd d0 6d d8 dc 48 |....\.&.2|..m..H| +peer0.org2.example.com | [16ac 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [13ac 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17b2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +peer1.org2.example.com | 00000020 dd c3 9b 3f 02 20 7a dc fd 90 6d d2 72 e6 4f ad |...?. z...m.r.O.| +peer0.org2.example.com | [16ad 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1543 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | [13ad 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17b3 Adding to config map: [Value] /Channel/Orderer/BatchSize" +peer1.org2.example.com | 00000030 d5 30 8d 1d 54 24 4e e0 65 b2 a5 87 17 74 ce 90 |.0..T$N.e....t..| +peer0.org2.example.com | [16ae 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | [13ae 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17b4 Adding to config map: [Policy] /Channel/Orderer/Readers" +peer1.org2.example.com | 00000040 60 3f ec 5e 8d c3 |`?.^..| +peer0.org2.example.com | [16af 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | [13af 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17b5 Adding to config map: [Policy] /Channel/Orderer/Writers" +peer1.org2.example.com | [161a 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [16b1 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | [13b0 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17b6 Adding to config map: [Policy] /Channel/Orderer/Admins" +peer1.org2.example.com | [161b 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [16b2 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [13b1 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17b7 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +peer1.org2.example.com | [161c 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [16b3 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1544 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13b2 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17b8 Adding to config map: [Group] /Channel/Application" +peer1.org2.example.com | [161d 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1545 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16b4 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [13b3 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816101A +orderer0.example.com | "2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17b9 Adding to config map: [Group] /Channel/Application/Org3MSP" +peer1.org2.example.com | [161e 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1546 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [16b5 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [13b4 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1D2C0ABBE86257E51C199FCC51E1BDDEF63D7AA497E433AACC3A8F5407EA742B +orderer0.example.com | "2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17ba Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +peer1.org2.example.com | [161f 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1547 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [16b0 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [13b5 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17bb Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [1620 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1548 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [16b6 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [13b6 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17bc Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +peer1.org2.example.com | [1621 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1549 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [16b7 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [13b7 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +orderer0.example.com | "2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17bd Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +peer1.org1.example.com | [154a 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1622 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org2.example.com | [16b8 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003620a30 gate 1598907085596909900 evaluation starts +peer0.org1.example.com | [13b8 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17be Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +peer1.org1.example.com | [154b 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1623 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16b9 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003620a30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [13b9 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17bf Adding to config map: [Group] /Channel/Application/Org1MSP" +peer1.org1.example.com | [154c 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c86830 gate 1598907090007513600 evaluation starts +peer1.org2.example.com | [1624 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16ba 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003620a30 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [13ba 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17c0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +peer1.org1.example.com | [154d 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c86830 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1625 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [16bb 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003620a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [13bb 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17c1 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +peer1.org1.example.com | [154e 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c86830 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1626 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [16bc 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003620a30 principal evaluation fails +peer0.org1.example.com | [13bc 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17c2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +peer1.org1.example.com | [154f 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c86830 principal matched by identity 0 +peer1.org2.example.com | [1627 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [16bd 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003620a30 gate 1598907085596909900 evaluation fails +peer0.org1.example.com | [13bd 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17c3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | [1550 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | [1628 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [16be 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [13be 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17c4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [1629 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [16bf 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [13bf 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17c5 Adding to config map: [Group] /Channel/Application/Org2MSP" +peer1.org1.example.com | [1551 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | [162a 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [16c0 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [13c0 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17c6 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | [162b 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16c1 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003620fa0 gate 1598907085598931300 evaluation starts +peer0.org1.example.com | [13c1 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17c7 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | [162c 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16c2 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003620fa0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [13c2 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17c8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | [162d 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16c3 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003620fa0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [13c3 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17c9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [162e 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16c4 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003620fa0 principal matched by identity 0 +peer0.org1.example.com | [13c4 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17ca Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +peer1.org1.example.com | [1552 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c86830 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [162f 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16c5 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 ca e6 88 e9 1f 0d 72 fb 1c 13 83 e0 8f 83 b1 |.......r........| +peer0.org1.example.com | [13c5 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17cb Adding to config map: [Value] /Channel/Application/ACLs" +peer1.org1.example.com | [1553 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c86830 gate 1598907090007513600 evaluation succeeds +peer1.org2.example.com | [1630 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 57 fc 35 5c 16 19 54 69 8f 56 c2 9d 27 01 8d d0 |W.5\..Ti.V..'...| +peer0.org1.example.com | [13c6 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17cc Adding to config map: [Value] /Channel/Application/Capabilities" +peer1.org1.example.com | [1554 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1631 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [16c6 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd ac 23 c8 ff 53 ce 34 53 b2 93 |0E.!...#..S.4S..| +peer0.org1.example.com | [13c7 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17cd Adding to config map: [Policy] /Channel/Application/Readers" +peer1.org1.example.com | [1555 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1632 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 79 9c 19 ec 7e 77 ef 6e 89 d5 14 b6 e1 5a ae d6 |y...~w.n.....Z..| +peer0.org1.example.com | [13c8 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 2c 0a bb e8 62 57 e5 1c 19 9f cc 51 e1 bd de |.,...bW.....Q...| +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17ce Adding to config map: [Policy] /Channel/Application/Writers" +peer1.org1.example.com | [1556 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1633 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 34 7c 56 46 09 02 20 30 7c 31 0c 0b 85 09 f8 e6 |4|VF.. 0|1......| +peer0.org1.example.com | 00000010 f6 3d 7a a4 97 e4 33 aa cc 3a 8f 54 07 ea 74 2b |.=z...3..:.T..t+| +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17cf Adding to config map: [Policy] /Channel/Application/Admins" +peer1.org1.example.com | [1557 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1634 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 18 47 58 fb 2e da be 0b 60 94 5b 70 d5 1e 4e d8 |.GX.....`.[p..N.| +peer0.org1.example.com | [13c9 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe 34 9c 55 9b 9b 7d a8 c5 8b 33 |0E.!..4.U..}...3| +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17d0 Adding to config map: [Policy] /Channel/Application/Endorsement" +peer1.org1.example.com | [1558 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | [1635 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 01 53 b1 76 32 c0 87 |.S.v2..| +peer0.org1.example.com | 00000010 7b 7f 35 92 85 b2 39 dc e2 de a5 3d f4 7f 7b 8f |{.5...9....=..{.| +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17d1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [1636 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [16c7 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003620fa0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000020 de d6 7a fd 95 02 20 0a 8d d1 de 7a 04 47 e8 cd |..z... ....z.G..| +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17d2 Adding to config map: [Value] /Channel/Consortium" +peer1.org1.example.com | [1559 08-31 20:51:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | [1637 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16c8 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003620fa0 gate 1598907085598931300 evaluation succeeds +peer0.org1.example.com | 00000030 45 fa d7 16 c6 0d f6 df be 09 17 89 c2 ae ef 58 |E..............X| +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17d3 Adding to config map: [Value] /Channel/Capabilities" +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | [1638 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [16c9 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000040 84 b4 f1 55 a1 6f a8 |...U.o.| +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17d4 Adding to config map: [Value] /Channel/HashingAlgorithm" +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | [1639 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [16ca 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [13ca 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17d5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | [163a 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [16cb 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [13cb 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17d6 Adding to config map: [Value] /Channel/OrdererAddresses" +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [163b 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [16cc 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [13cc 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.deliver] Handle -> WARN 17d7 Error reading from 172.18.0.9:50966: rpc error: code = Canceled desc = context canceled" +peer1.org1.example.com | [155a 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [163c 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [16cd 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [13cd 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17d8 Adding to config map: [Policy] /Channel/Readers" +peer1.org1.example.com | [155b 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [163d 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [16ce 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [13ce 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [orderer.common.server] func1 -> DEBU 17d9 Closing Deliver stream" +peer1.org1.example.com | [155c 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [163e 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033edb50 gate 1598907089596289100 evaluation starts +peer0.org2.example.com | [16cf 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [13cf 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 94 f1 67 52 fd 9c dc e6 2b 61 ab 86 41 85 d1 |...gR....+a..A..| +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17da Adding to config map: [Policy] /Channel/Writers" +peer1.org1.example.com | [155d 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [163f 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033edb50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [16d0 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | 00000010 cb 16 a3 f7 7d 4f 3b ba bd 8c 6b fb 15 b6 11 25 |....}O;...k....%| +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [common.configtx] addToMap -> DEBU 17db Adding to config map: [Policy] /Channel/Admins" +peer1.org2.example.com | [1640 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033edb50 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [155e 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [16d1 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [13d0 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 cb 11 89 70 22 07 b7 9f 3b b0 |0E.!.....p"...;.| +orderer0.example.com | "2020-08-31 20:52:19.325 UTC [comm.grpc.server] 1 -> INFO 17dc streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50966 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=120.048ms +peer1.org2.example.com | [1641 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033edb50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [155f 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [16d2 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 64 aa d2 66 cb e9 ac 80 49 b6 df f2 f2 3d 7e 24 |d..f....I....=~$| +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [common.channelconfig] LogSanityChecks -> DEBU 17dd As expected, current configuration has policy '/Channel/Readers'" +peer1.org2.example.com | [1642 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033edb50 principal evaluation fails +peer1.org1.example.com | [1560 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [16d3 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 d6 a3 37 8e 22 02 20 5a 23 26 9b b5 f6 5c 25 cc |..7.". Z#&...\%.| +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [common.channelconfig] LogSanityChecks -> DEBU 17de As expected, current configuration has policy '/Channel/Writers'" +peer1.org2.example.com | [1643 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033edb50 gate 1598907089596289100 evaluation fails +peer1.org1.example.com | [1561 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [16d4 08-31 20:51:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 01 74 0e 34 c6 ce f4 6a 65 bc e0 56 e6 bc 46 48 |.t.4...je..V..FH| +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17df Manager Channel looking up path [Application]" +peer1.org2.example.com | [1644 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1562 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [16d6 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 39 32 11 6a dc 78 d8 |92.j.x.| +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [grpc] warningf -> DEBU 17e0 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:50968: read: connection reset by peer" +peer1.org2.example.com | [1645 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1563 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [16d9 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13d1 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [13d2 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17e1 Manager Channel has managers Orderer" +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17e2 Manager Channel has managers Application" +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17e3 Manager Channel/Application looking up path []" +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [orderer.common.broadcast] Handle -> WARN 17e4 Error reading from 172.18.0.9:50968: rpc error: code = Canceled desc = context canceled" +peer1.org2.example.com | [1646 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17e5 Manager Channel/Application has managers Org3MSP" +peer1.org1.example.com | [1564 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [16d7 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13d3 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1647 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034100c0 gate 1598907089597890900 evaluation starts +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [orderer.common.server] func1 -> DEBU 17e6 Closing Broadcast stream" +peer1.org1.example.com | [1565 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca4370 gate 1598907090013485600 evaluation starts +peer0.org2.example.com | [16d5 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org1.example.com | [13d4 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1648 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034100c0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17e7 Manager Channel/Application has managers Org1MSP" +peer1.org1.example.com | [1566 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca4370 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [16d8 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13d5 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1649 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034100c0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [comm.grpc.server] 1 -> INFO 17e8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:50968 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=107.4013ms +peer1.org1.example.com | [1567 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca4370 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [16da 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [13d6 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [164a 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034100c0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17e9 Manager Channel/Application has managers Org2MSP" +peer1.org1.example.com | [1568 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca4370 principal matched by identity 0 +peer0.org2.example.com | [16dd 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13d7 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [164b 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e a2 b3 d2 6f 0f 00 f3 8d 61 2f d7 76 5d 1e 76 |~...o....a/.v].v| +peer1.org1.example.com | [1569 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [common.channelconfig] LogSanityChecks -> DEBU 17ea As expected, current configuration has policy '/Channel/Application/Readers'" +peer0.org2.example.com | [16de 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [13d8 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000010 e4 c1 1d 48 ca 30 34 a8 07 38 10 24 b8 e7 1c be |...H.04..8.$....| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [common.channelconfig] LogSanityChecks -> DEBU 17eb As expected, current configuration has policy '/Channel/Application/Writers'" +peer0.org2.example.com | [16df 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13d9 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [164c 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 ff c2 cc 3b ff 9d 47 d4 86 4d 78 |0D. P...;..G..Mx| +peer1.org1.example.com | [156a 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [common.channelconfig] LogSanityChecks -> DEBU 17ec As expected, current configuration has policy '/Channel/Application/Admins'" +peer0.org2.example.com | [16dc 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13da 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000010 7c dc 23 cf d9 25 91 2b 0a 97 78 ed a8 f5 6f 4b ||.#..%.+..x...oK| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17ed Manager Channel looking up path [Orderer]" +peer0.org2.example.com | [16db 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13db 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b8970 gate 1598907081577330300 evaluation starts +peer1.org2.example.com | 00000020 5d f4 97 7a 02 20 4f 31 2a 25 d9 48 5d b9 d3 6d |]..z. O1*%.H]..m| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17ee Manager Channel has managers Application" +peer0.org2.example.com | [16e0 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13dc 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b8970 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000030 b9 b2 7f 59 9b 4b 02 8f 1c 6a 6a 0f 80 d7 76 96 |...Y.K...jj...v.| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17ef Manager Channel has managers Orderer" +peer0.org2.example.com | [16e2 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13dd 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b8970 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | 00000040 7f 18 8f f4 23 38 |....#8| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17f0 Manager Channel/Orderer looking up path []" +peer0.org2.example.com | [16e3 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13de 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b8970 principal matched by identity 0 +peer1.org2.example.com | [164d 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034100c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [156b 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca4370 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17f1 Manager Channel/Orderer has managers OrdererOrg" +peer0.org2.example.com | [16e4 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13df 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df de a9 43 65 43 25 6a a9 bb 70 39 02 4a c3 d1 |...CeC%j..p9.J..| +peer1.org2.example.com | [164e 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034100c0 gate 1598907089597890900 evaluation succeeds +peer1.org1.example.com | [156c 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca4370 gate 1598907090013485600 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [common.channelconfig] LogSanityChecks -> DEBU 17f2 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +peer0.org2.example.com | [16e5 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 91 a5 f0 a4 db 56 e5 75 fe af c3 2e 3a b6 9e 72 |.....V.u....:..r| +peer1.org2.example.com | [164f 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [156d 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [common.channelconfig] LogSanityChecks -> DEBU 17f3 As expected, current configuration has policy '/Channel/Orderer/Admins'" +peer0.org2.example.com | [16e6 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [13e0 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 a3 4c 3c b8 49 5b c9 1f 66 87 44 |0D. R.L<.I[..f.D| +peer1.org2.example.com | [1650 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [156f 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [common.channelconfig] LogSanityChecks -> DEBU 17f4 As expected, current configuration has policy '/Channel/Orderer/Writers'" +peer0.org2.example.com | [16e7 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 c0 f8 5c 9d 06 ba d4 5e cc ac 06 f6 41 41 44 00 |..\....^....AAD.| +peer1.org2.example.com | [1651 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1570 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [common.channelconfig] LogSanityChecks -> DEBU 17f5 As expected, current configuration has policy '/Channel/Orderer/Readers'" +peer0.org2.example.com | [16e1 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 58 b4 5d ed 02 20 38 4f fb 61 35 b5 8a 69 7d 8a |X.].. 8O.a5..i}.| +peer1.org2.example.com | [1652 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [156e 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [common.capabilities] Supported -> DEBU 17f6 Orderer capability V1_4_2 is supported and is enabled" +peer0.org2.example.com | [16e8 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | 00000030 c1 4e 97 95 22 c4 50 ea f5 c9 87 09 42 66 f8 90 |.N..".P.....Bf..| +peer1.org2.example.com | [1653 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1572 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [common.capabilities] Supported -> DEBU 17f7 Channel capability V1_4_3 is supported and is enabled" +peer0.org2.example.com | [16e9 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 06 15 8a 5e 70 be |...^p.| +peer1.org2.example.com | [1654 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1571 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [grpc] infof -> DEBU 17f8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | [16ec 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13e1 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b8970 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1655 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1574 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [orderer.common.server] func1 -> DEBU 17f9 Executing callback to update root CAs" +peer0.org2.example.com | [16eb 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [13e2 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b8970 gate 1598907081577330300 evaluation succeeds +peer1.org2.example.com | [1656 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1575 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [grpc] infof -> DEBU 17fa transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | [16ea 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13e3 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1657 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1576 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17fb updating root CAs for channel [businesschannel]" +peer0.org2.example.com | [16ed 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [13e4 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1658 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1577 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17fc adding app root CAs for MSP [Org1MSP]" +peer0.org2.example.com | [16ee 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" > alive: alive: alive: +peer0.org1.example.com | [13e5 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1659 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1573 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17fd adding app root CAs for MSP [Org2MSP]" +peer0.org2.example.com | [16ef 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [13e6 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [165a 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1578 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17fe Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [16f0 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13e7 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [165b 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [1579 08-31 20:51:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | "2020-08-31 20:52:19.326 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17ff adding orderer root CAs for MSP [OrdererMSP]" +peer0.org2.example.com | [16f1 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13e8 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [165c 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:52:19.327 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1800 adding app root CAs for MSP [Org3MSP]" +peer0.org2.example.com | [16f2 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [13e9 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [165d 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [157a 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:52:19.327 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1801 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [16f3 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13ea 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [165e 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | "2020-08-31 20:52:19.327 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1802 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +peer0.org2.example.com | [16f4 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13eb 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [165f 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | "2020-08-31 20:52:19.327 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1803 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.4µs " +peer0.org2.example.com | [16f5 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13ec 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | [1660 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +orderer0.example.com | "2020-08-31 20:52:19.327 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1804 [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 6" +peer0.org2.example.com | [16f6 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [13ed 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 2c 0a bb e8 62 57 e5 1c 19 9f cc 51 e1 bd de |.,...bW.....Q...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [1661 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.327 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1805 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 6" +peer0.org2.example.com | [16f7 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 f6 3d 7a a4 97 e4 33 aa cc 3a 8f 54 07 ea 74 2b |.=z...3..:.T..t+| +peer1.org1.example.com | [157b 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | [1662 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.327 UTC [msp] GetDefaultSigningIdentity -> DEBU 1806 Obtaining default signing identity" +peer0.org2.example.com | [16f8 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13ee 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe 34 9c 55 9b 9b 7d a8 c5 8b 33 |0E.!..4.U..}...3| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [1663 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.327 UTC [msp] GetDefaultSigningIdentity -> DEBU 1807 Obtaining default signing identity" +peer0.org2.example.com | [16f9 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 7b 7f 35 92 85 b2 39 dc e2 de a5 3d f4 7f 7b 8f |{.5...9....=..{.| +peer1.org1.example.com | [157c 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | [1664 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.327 UTC [msp.identity] Sign -> DEBU 1808 Sign: plaintext: 0A020806120B0A090A03010203100418...97167A35BC2EF596E841A44977FE0063 " +peer0.org2.example.com | [16fa 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 de d6 7a fd 95 02 20 0a 8d d1 de 7a 04 47 e8 cd |..z... ....z.G..| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | [1665 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.327 UTC [msp.identity] Sign -> DEBU 1809 Sign: digest: 4DE366B00743C9C1649D7F395138D479CEB4AAC9626E44526CECE2DE78BACD1F " +peer0.org2.example.com | [16fb 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 45 fa d7 16 c6 0d f6 df be 09 17 89 c2 ae ef 58 |E..............X| +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | [1666 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.330 UTC [fsblkstorage] indexBlock -> DEBU 180a Indexing block [blockNum=6, blockHash=[]byte{0xee, 0x50, 0x5e, 0x32, 0xbb, 0x9a, 0x52, 0xe4, 0xd5, 0xa5, 0xcd, 0xd8, 0x92, 0x7, 0xb9, 0x48, 0x99, 0xcf, 0x4a, 0x4f, 0xd4, 0x14, 0x2, 0xe7, 0xd3, 0xba, 0x81, 0x57, 0xfe, 0x38, 0x65, 0xd} txOffsets= +peer0.org2.example.com | [16fc 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 84 b4 f1 55 a1 6f a8 |...U.o.| +peer1.org2.example.com | [1667 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +orderer0.example.com | txId=7f1fe83799f527adf316dfcd38e1f157d571d6adfecc0451fce63bd20f6fd24b locPointer=offset=71, bytesLength=40147 +peer0.org2.example.com | [16fd 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [13ef 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1668 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +orderer0.example.com | ]" +peer0.org2.example.com | [16fe 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [13f0 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1669 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [157d 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.331 UTC [fsblkstorage] updateCheckpoint -> DEBU 180b Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138571], isChainEmpty=[false], lastBlockNumber=[6]" +peer0.org2.example.com | [16ff 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [13f1 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org2.example.com | [166a 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [157e 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.331 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 180c [channel: businesschannel] Wrote block [6]" +peer0.org2.example.com | [1700 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org2.example.com | [166b 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [157f 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.331 UTC [fsblkstorage] waitForBlock -> DEBU 180d Came out of wait. maxAvailaBlockNumber=[6]" +peer0.org1.example.com | [13f2 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 c6 79 15 a3 71 60 30 7c f8 19 |0E.!...y..q`0|..| +peer0.org2.example.com | [1701 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [166c 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1580 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:19.332 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 180e Remaining bytes=[41179], Going to peek [8] bytes" +peer0.org1.example.com | 00000010 49 d4 a7 d8 f6 25 cb 44 58 6a c4 c1 74 34 cf 41 |I....%.DXj..t4.A| +peer0.org2.example.com | [1702 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [166d 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1581 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.332 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 180f Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97392], bytesOffset=[97395]}" +peer0.org1.example.com | 00000020 8c d9 b1 6f 4d 02 20 59 0b 31 dd fa 3f d3 bd 94 |...oM. Y.1..?...| +peer0.org2.example.com | [1703 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [166e 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1582 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.332 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1810 blockbytes [41176] read from file [0]" +peer0.org1.example.com | 00000030 b9 cf f4 e0 79 4c b1 6f c5 c9 dc b7 29 e3 6f 1d |....yL.o....).o.| +peer0.org2.example.com | [1704 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [166f 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161021 +peer1.org1.example.com | [1583 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:19.332 UTC [policies] Evaluate -> DEBU 1811 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | 00000040 e1 8b af 4e f5 e9 44 |...N..D| +peer0.org2.example.com | [1705 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1670 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 20EFC56B5232B634B62CEDF02FE96F9BDA4B4F0CFB160ED210ADD3A91C3F49BA +peer1.org1.example.com | [1584 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:19.332 UTC [policies] Evaluate -> DEBU 1812 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [13f3 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1706 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1671 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1585 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:19.332 UTC [policies] Evaluate -> DEBU 1813 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | [13f4 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1707 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1672 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1586 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5040 gate 1598907090023578000 evaluation starts +orderer0.example.com | "2020-08-31 20:52:19.332 UTC [policies] Evaluate -> DEBU 1814 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [13f5 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1708 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1673 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +orderer0.example.com | "2020-08-31 20:52:19.334 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1815 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146µs " +peer0.org1.example.com | [13f6 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1709 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1674 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +orderer0.example.com | "2020-08-31 20:52:19.332 UTC [policies] Evaluate -> DEBU 1816 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer1.org1.example.com | [1587 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5040 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [13f7 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [170a 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1675 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.335 UTC [msp] DeserializeIdentity -> DEBU 1817 Obtaining identity" +peer1.org1.example.com | [1588 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5040 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [13f8 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [170b 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1676 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.335 UTC [msp.identity] newIdentity -> DEBU 1818 Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [1589 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5040 principal matched by identity 0 +peer0.org1.example.com | [13f9 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [170c 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1677 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [158a 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | [13fa 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [170d 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1678 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [13fb 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [170e 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1679 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [158b 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | [13fc 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [170f 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035cffd0 gate 1598907086232757000 evaluation starts +peer1.org2.example.com | [167a 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +orderer0.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | [13fd 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1710 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035cffd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [167b 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [13fe 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1711 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035cffd0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [167c 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +orderer0.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org1.example.com | [13ff 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1712 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035cffd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [167d 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +orderer0.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org1.example.com | [1400 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1713 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035cffd0 principal evaluation fails +peer1.org2.example.com | [167e 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [158c 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5040 principal evaluation succeeds for identity 0 +orderer0.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org1.example.com | [1401 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cd060 gate 1598907081580538500 evaluation starts +peer0.org2.example.com | [1714 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035cffd0 gate 1598907086232757000 evaluation fails +peer1.org2.example.com | [167f 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [158d 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc5040 gate 1598907090023578000 evaluation succeeds +orderer0.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | [1402 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cd060 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1715 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [158e 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1680 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org1.example.com | [1403 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cd060 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1716 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [158f 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1681 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org1.example.com | [1404 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cd060 principal matched by identity 0 +peer0.org2.example.com | [1717 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [1590 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1682 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org1.example.com | [1405 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 f6 e0 95 9d 1c 80 eb 6f 79 9d 8c c2 7a 8d de |........oy...z..| +peer0.org2.example.com | [1718 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c4540 gate 1598907086234088700 evaluation starts +peer1.org1.example.com | [1591 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1683 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | -----END CERTIFICATE-----" +peer0.org1.example.com | 00000010 da 6f f9 1c c5 fd 67 d2 7d e2 fb 29 31 35 fb 13 |.o....g.}..)15..| +peer0.org2.example.com | [1719 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c4540 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1592 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1684 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.336 UTC [cauthdsl] func1 -> DEBU 1819 0xc000385f10 gate 1598907139336002200 evaluation starts" +peer0.org1.example.com | [1406 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 d8 36 b5 43 13 f8 35 49 b2 51 b7 |0D. c.6.C..5I.Q.| +peer0.org2.example.com | [171a 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c4540 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1593 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1685 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.336 UTC [cauthdsl] func2 -> DEBU 181a 0xc000385f10 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | 00000010 15 9d 4f d9 24 7e a7 1b 2e 89 03 83 43 2b 46 5c |..O.$~......C+F\| +peer0.org2.example.com | [171b 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c4540 principal matched by identity 0 +peer1.org1.example.com | [1594 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | [1686 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.336 UTC [cauthdsl] func2 -> DEBU 181b 0xc000385f10 processing identity 0 with bytes of fe10e0" +peer0.org1.example.com | 00000020 98 eb ea a7 02 20 24 28 40 8c 46 12 16 47 b9 d1 |..... $(@.F..G..| +peer0.org2.example.com | [171c 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [1687 08-31 20:51:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.336 UTC [cauthdsl] func2 -> DEBU 181c 0xc000385f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +peer0.org1.example.com | 00000030 04 c1 0c b9 5d b5 94 a6 ff 22 8a f5 a4 d7 fe 80 |....]...."......| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [1595 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | [1688 08-31 20:51:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.336 UTC [cauthdsl] func2 -> DEBU 181d 0xc000385f10 principal evaluation fails" +peer0.org1.example.com | 00000040 09 37 12 fb 78 cf |.7..x.| +peer0.org2.example.com | [171d 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | [1689 08-31 20:51:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.336 UTC [cauthdsl] func1 -> DEBU 181e 0xc000385f10 gate 1598907139336002200 evaluation fails" +peer0.org1.example.com | [1407 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cd060 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | [168a 08-31 20:51:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +orderer0.example.com | "2020-08-31 20:52:19.336 UTC [policies] Evaluate -> DEBU 181f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | [1408 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cd060 gate 1598907081580538500 evaluation succeeds +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | [168b 08-31 20:51:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.336 UTC [policies] Evaluate -> DEBU 1820 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | [1409 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [168c 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1821 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [140a 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1596 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [168d 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:19.344 UTC [policies] Evaluate -> DEBU 1822 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org2.example.com | [171e 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c4540 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [140b 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1597 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [168e 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.344 UTC [cauthdsl] func1 -> DEBU 1823 0xc00124f0e0 gate 1598907139344639700 evaluation starts" +peer0.org2.example.com | [171f 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c4540 gate 1598907086234088700 evaluation succeeds +peer0.org1.example.com | [140c 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [168f 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1598 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:19.345 UTC [cauthdsl] func2 -> DEBU 1824 0xc00124f0e0 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [1720 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [140d 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1690 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1599 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.345 UTC [cauthdsl] func2 -> DEBU 1825 0xc00124f0e0 processing identity 0 with bytes of fe10e0" +peer0.org2.example.com | [1721 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [140e 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1691 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [159a 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.345 UTC [cauthdsl] func2 -> DEBU 1826 0xc00124f0e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +peer0.org2.example.com | [1722 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [140f 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1692 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [159b 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:19.345 UTC [cauthdsl] func2 -> DEBU 1827 0xc00124f0e0 principal evaluation fails" +peer0.org1.example.com | [1410 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 2c 0a bb e8 62 57 e5 1c 19 9f cc 51 e1 bd de |.,...bW.....Q...| +peer0.org2.example.com | [1723 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1693 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [159c 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:19.345 UTC [cauthdsl] func1 -> DEBU 1828 0xc00124f0e0 gate 1598907139344639700 evaluation fails" +peer0.org1.example.com | 00000010 f6 3d 7a a4 97 e4 33 aa cc 3a 8f 54 07 ea 74 2b |.=z...3..:.T..t+| +peer0.org2.example.com | [1724 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1694 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [159d 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:19.345 UTC [policies] Evaluate -> DEBU 1829 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [1411 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe 34 9c 55 9b 9b 7d a8 c5 8b 33 |0E.!..4.U..}...3| +peer0.org2.example.com | [1725 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1695 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [159e 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce0ad0 gate 1598907090029775800 evaluation starts +orderer0.example.com | "2020-08-31 20:52:19.345 UTC [policies] Evaluate -> DEBU 182a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | 00000010 7b 7f 35 92 85 b2 39 dc e2 de a5 3d f4 7f 7b 8f |{.5...9....=..{.| +peer0.org2.example.com | [1726 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1696 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [159f 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce0ad0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:19.345 UTC [policies] Evaluate -> DEBU 182b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org1.example.com | 00000020 de d6 7a fd 95 02 20 0a 8d d1 de 7a 04 47 e8 cd |..z... ....z.G..| +peer0.org2.example.com | [1727 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1697 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [15a0 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce0ad0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:19.345 UTC [cauthdsl] func1 -> DEBU 182c 0xc00124fa60 gate 1598907139345865500 evaluation starts" +peer0.org1.example.com | 00000030 45 fa d7 16 c6 0d f6 df be 09 17 89 c2 ae ef 58 |E..............X| +peer0.org2.example.com | [1728 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1698 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003455860 gate 1598907090321444000 evaluation starts +peer1.org1.example.com | [15a1 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce0ad0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:19.345 UTC [cauthdsl] func2 -> DEBU 182d 0xc00124fa60 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | 00000040 84 b4 f1 55 a1 6f a8 |...U.o.| +peer0.org2.example.com | [1729 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1699 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003455860 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [15a2 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | "2020-08-31 20:52:19.345 UTC [cauthdsl] func2 -> DEBU 182e 0xc00124fa60 processing identity 0 with bytes of fe10e0" +peer0.org1.example.com | [1412 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [172a 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [169a 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003455860 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +orderer0.example.com | "2020-08-31 20:52:19.345 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 182f Checking if identity satisfies MEMBER role for Org2MSP" +peer0.org1.example.com | [1413 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [172b 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [15a3 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | [169b 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003455860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:52:19.345 UTC [msp] Validate -> DEBU 1830 MSP Org2MSP validating identity" +peer0.org1.example.com | [1414 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [172c 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5740 gate 1598907086236750900 evaluation starts +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | [169c 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003455860 principal evaluation fails +orderer0.example.com | "2020-08-31 20:52:19.346 UTC [msp] getCertificationChain -> DEBU 1831 MSP Org2MSP getting certification chain" +peer0.org1.example.com | [1415 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [172d 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5740 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | [169d 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003455860 gate 1598907090321444000 evaluation fails +orderer0.example.com | "2020-08-31 20:52:19.346 UTC [cauthdsl] func2 -> DEBU 1832 0xc00124fa60 principal matched by identity 0" +peer0.org1.example.com | [1416 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 94 f1 67 52 fd 9c dc e6 2b 61 ab 86 41 85 d1 |...gR....+a..A..| +peer0.org2.example.com | [172e 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5740 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | [169e 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:19.346 UTC [msp.identity] Verify -> DEBU 1833 Verify: digest = 00000000 57 5b ee bb f7 e1 76 65 eb 70 21 da ba 1c a8 d0 |W[....ve.p!.....| +peer0.org1.example.com | 00000010 cb 16 a3 f7 7d 4f 3b ba bd 8c 6b fb 15 b6 11 25 |....}O;...k....%| +peer0.org2.example.com | [172f 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [169f 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | 00000010 80 fc e8 bc 62 7d 37 2d 90 ae e5 1a a5 f9 38 c9 |....b}7-......8.|" +peer0.org1.example.com | [1417 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 cb 11 89 70 22 07 b7 9f 3b b0 |0E.!.....p"...;.| +peer0.org2.example.com | [1730 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5740 principal evaluation fails +peer1.org1.example.com | [15a4 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce0ad0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [16a0 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:19.346 UTC [msp.identity] Verify -> DEBU 1834 Verify: sig = 00000000 30 44 02 20 6f 2a 9e 2e 15 ce b3 a9 88 a8 d3 ef |0D. o*..........| +peer0.org1.example.com | 00000010 64 aa d2 66 cb e9 ac 80 49 b6 df f2 f2 3d 7e 24 |d..f....I....=~$| +peer0.org2.example.com | [1731 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5740 gate 1598907086236750900 evaluation fails +peer1.org1.example.com | [15a5 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce0ad0 gate 1598907090029775800 evaluation succeeds +peer1.org2.example.com | [16a1 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003455dd0 gate 1598907090322398800 evaluation starts +orderer0.example.com | 00000010 61 ae 42 1f 51 86 ea d1 b4 ce 06 95 ae 6d 7f 5d |a.B.Q........m.]| +peer0.org1.example.com | 00000020 d6 a3 37 8e 22 02 20 5a 23 26 9b b5 f6 5c 25 cc |..7.". Z#&...\%.| +peer0.org2.example.com | [1732 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [15a6 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [16a2 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003455dd0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | 00000020 43 12 01 d0 02 20 02 e3 a8 43 f2 35 bf cf 62 43 |C.... ...C.5..bC| +peer0.org1.example.com | 00000030 01 74 0e 34 c6 ce f4 6a 65 bc e0 56 e6 bc 46 48 |.t.4...je..V..FH| +peer0.org2.example.com | [1733 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [15a7 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [16a3 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003455dd0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | 00000030 c7 53 f2 04 cf 6d a8 32 cd 64 e5 12 82 bd e4 58 |.S...m.2.d.....X| +peer0.org1.example.com | 00000040 39 32 11 6a dc 78 d8 |92.j.x.| +peer0.org2.example.com | [1734 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [15a8 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [16a4 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003455dd0 principal matched by identity 0 +orderer0.example.com | 00000040 48 7d bb cc 85 d0 |H}....|" +peer0.org1.example.com | [1418 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1735 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5cb0 gate 1598907086237749100 evaluation starts +peer1.org1.example.com | [15a9 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [16a5 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e cd ab ed 1a fc af ba 52 93 0a 47 92 bf 8c ce |........R..G....| +orderer0.example.com | "2020-08-31 20:52:19.346 UTC [cauthdsl] func2 -> DEBU 1835 0xc00124fa60 principal evaluation succeeds for identity 0" +peer0.org1.example.com | [1419 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1736 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5cb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [15aa 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 01 61 a6 a6 03 a3 47 c7 f5 1f b4 8e a5 18 0e 75 |.a....G........u| +orderer0.example.com | "2020-08-31 20:52:19.346 UTC [cauthdsl] func1 -> DEBU 1836 0xc00124fa60 gate 1598907139345865500 evaluation succeeds" +peer0.org1.example.com | [141a 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1737 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5cb0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [16a6 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 3a 28 c3 ba 72 b3 a2 51 bc 00 |0E.!..:(..r..Q..| +orderer0.example.com | "2020-08-31 20:52:19.346 UTC [policies] Evaluate -> DEBU 1837 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | [141b 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1738 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5cb0 principal matched by identity 0 +peer1.org1.example.com | [15ab 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 a3 86 3e d4 ef 98 31 9f 20 ab 5c 31 69 bf 31 45 |..>...1. .\1i.1E| +orderer0.example.com | "2020-08-31 20:52:19.346 UTC [policies] Evaluate -> DEBU 1838 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | [141c 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1739 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 d0 65 0d be 6f 02 20 64 ad 90 72 89 7d aa 3d e3 |.e..o. d..r.}.=.| +orderer0.example.com | "2020-08-31 20:52:19.346 UTC [policies] Evaluate -> DEBU 1839 Signature set satisfies policy /Channel/Application/Readers" +peer0.org1.example.com | [141d 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +orderer0.example.com | "2020-08-31 20:52:19.346 UTC [policies] Evaluate -> DEBU 183a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 b1 1c 6b 54 63 be 93 71 80 d8 42 e9 29 0d d4 94 |..kTc..q..B.)...| +peer0.org1.example.com | [141e 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.346 UTC [policies] Evaluate -> DEBU 183b Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | [173a 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 e2 03 56 08 f5 76 a0 |..V..v.| +peer0.org1.example.com | [141f 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.346 UTC [policies] Evaluate -> DEBU 183c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [16a7 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003455dd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1420 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.346 UTC [common.deliver] deliverBlocks -> DEBU 183d [channel: businesschannel] Delivering block [6] for (0xc000a09280) for 172.18.0.5:56650" +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | [15ac 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16a8 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003455dd0 gate 1598907090322398800 evaluation succeeds +peer0.org1.example.com | [1421 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.347 UTC [fsblkstorage] waitForBlock -> DEBU 183e Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | [15ad 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16a9 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1422 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.362 UTC [orderer.common.cluster.step] handleMessage -> DEBU 183f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [16aa 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [15ae 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1423 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:19.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1840 Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +peer0.org2.example.com | [173b 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5cb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [16ab 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [15af 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1424 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1841 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +peer0.org2.example.com | [173c 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5cb0 gate 1598907086237749100 evaluation succeeds +peer1.org2.example.com | [16ac 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [15b0 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1425 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:19.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1842 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 742µs " +peer0.org2.example.com | [173d 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [16ad 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15b1 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1426 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1843 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 371.5µs " +peer0.org2.example.com | [173e 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [16ae 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15b2 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1427 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1844 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [173f 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [16af 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [15b3 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1428 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:19.603 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1845 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1740 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [16b0 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [15b4 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfe3c0 gate 1598907090037012400 evaluation starts +peer0.org1.example.com | [1429 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:19.808 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1846 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [1741 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | [16b1 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [15b5 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfe3c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [142a 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.809 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1847 Sending msg of 28 bytes to 3 on channel testchainid took 439.8µs" +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [16b2 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [15b6 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfe3c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [142b 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:19.809 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1848 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.9µs " +peer0.org2.example.com | [1742 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | [16b3 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15b7 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfe3c0 principal matched by identity 0 +peer0.org1.example.com | [142c 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:20.096 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1849 Sending msg of 28 bytes to 2 on channel businesschannel took 23.2µs" +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | [16b4 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15b8 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | [142d 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:20.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 184a Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | [16b5 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [142e 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:20.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 184b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80µs " +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | [16b6 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15b9 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | [142f 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004197600 gate 1598907081753856100 evaluation starts +orderer0.example.com | "2020-08-31 20:52:20.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 184c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111µs " +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [16b7 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [1430 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004197600 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:20.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 184d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1743 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | [16b8 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | [1431 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004197600 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:20.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 184e Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [16b9 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | [1432 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004197600 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:20.305 UTC [orderer.common.cluster.step] handleMessage -> DEBU 184f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [1744 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | [16ba 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [1433 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | "2020-08-31 20:52:20.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1850 Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | [16bb 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15ba 08-31 20:51:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfe3c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +orderer0.example.com | "2020-08-31 20:52:20.307 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1851 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 808.7µs " +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | [16bc 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15bb 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfe3c0 gate 1598907090037012400 evaluation succeeds +peer0.org1.example.com | [1434 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | "2020-08-31 20:52:20.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1852 Sending msg of 28 bytes to 2 on channel businesschannel took 32.7µs" +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | [16bd 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15bc 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +orderer0.example.com | "2020-08-31 20:52:20.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1854 Sending msg of 28 bytes to 3 on channel businesschannel took 31.5µs" +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [16be 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15bd 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | "2020-08-31 20:52:20.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1853 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 258.2µs " +peer0.org2.example.com | [1745 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16bf 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [15be 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +orderer0.example.com | "2020-08-31 20:52:20.600 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1855 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1746 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [16c0 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15bf 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +orderer0.example.com | "2020-08-31 20:52:20.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1856 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6729ms " +peer0.org2.example.com | [1747 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | [16c1 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15c0 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1435 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004197600 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:20.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1857 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [16c2 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [15c1 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [1436 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004197600 gate 1598907081753856100 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:20.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1858 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [1748 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | [16c3 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15c2 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [1437 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:20.808 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1859 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | [16c4 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15c3 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1438 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:20.808 UTC [orderer.common.cluster.step] sendMessage -> DEBU 185a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.7µs " +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | [16c5 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15c4 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1439 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:21.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 185b Sending msg of 28 bytes to 2 on channel businesschannel took 17.6µs" +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | [16c6 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15c5 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [143a 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:21.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 185c Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [16c7 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15c6 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [143b 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | "2020-08-31 20:52:21.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 185d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.3µs " +peer0.org2.example.com | [1749 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16c8 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15c7 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:52:21.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 185e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 648.1µs " +peer0.org2.example.com | [174a 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16c9 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15c8 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [143c 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:52:21.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 185f Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [174b 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [16ca 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [15c9 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | "2020-08-31 20:52:21.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1860 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [174c 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [16cb 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15ca 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:21.307 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1861 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [174d 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [16cc 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | "2020-08-31 20:52:21.307 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1862 Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" +peer0.org2.example.com | [174e 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [16cd 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | [15cb 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [15cc 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:21.307 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1863 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.8µs " +peer0.org2.example.com | [174f 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [16ce 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16cf 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | "2020-08-31 20:52:21.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1864 Sending msg of 28 bytes to 2 on channel businesschannel took 77.7µs" +peer0.org2.example.com | [1750 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [16d0 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [143d 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15cd 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:21.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1865 Sending msg of 28 bytes to 3 on channel businesschannel took 24.1µs" +peer0.org2.example.com | [1751 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370e520 gate 1598907086246285800 evaluation starts +peer1.org2.example.com | [16d1 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 02 a8 09 99 42 10 8d ff 3a 85 67 e0 15 cf 13 |.....B...:.g....| +peer0.org1.example.com | [143e 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [15ce 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:21.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1866 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.5µs " +peer0.org2.example.com | [1752 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370e520 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 c1 55 6a bd ce 35 00 d7 ca dc c7 58 4b 35 11 55 |.Uj..5.....XK5.U| +peer0.org1.example.com | [143f 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [15cf 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca57b0 gate 1598907090053824500 evaluation starts +orderer0.example.com | "2020-08-31 20:52:21.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1867 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.5513ms " +peer0.org2.example.com | [1753 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370e520 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [16d2 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f b6 f2 75 ff 13 25 9b 7d d4 e1 f0 |0D. /..u..%.}...| +peer0.org1.example.com | [1440 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [15d0 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca57b0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:21.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1868 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1754 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370e520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | 00000010 a1 f1 83 08 50 a7 58 55 50 24 c1 7d b0 58 95 c4 |....P.XUP$.}.X..| +peer0.org1.example.com | [1441 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [15d1 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca57b0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:21.604 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1869 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1755 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370e520 principal evaluation fails +peer1.org2.example.com | 00000020 96 ce aa 9d 02 20 43 6d 1b 37 e6 58 ec d9 b1 18 |..... Cm.7.X....| +peer1.org1.example.com | [15d2 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca57b0 principal matched by identity 0 +peer0.org1.example.com | [1442 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:21.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 186a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [1756 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370e520 gate 1598907086246285800 evaluation fails +peer1.org2.example.com | 00000030 4c 77 a1 ea 51 96 0a 43 e0 9a 30 9d d2 27 55 16 |Lw..Q..C..0..'U.| +peer1.org1.example.com | [15d3 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 ef c5 6b 52 32 b6 34 b6 2c ed f0 2f e9 6f 9b | ..kR2.4.,../.o.| +peer0.org1.example.com | [1443 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1757 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:21.807 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 186b Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +peer1.org2.example.com | 00000040 16 db b7 33 68 13 |...3h.| +peer1.org1.example.com | 00000010 da 4b 4f 0c fb 16 0e d2 10 ad d3 a9 1c 3f 49 ba |.KO..........?I.| +peer0.org1.example.com | [1444 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1758 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:21.807 UTC [orderer.common.cluster.step] sendMessage -> DEBU 186c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.9µs " +peer1.org2.example.com | [16d3 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [15d4 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a ab d8 49 54 34 8c 63 5d 47 4e 8d |0D. Z..IT4.c]GN.| +peer0.org1.example.com | [1445 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004206ef0 gate 1598907081755327100 evaluation starts +peer0.org2.example.com | [1759 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:22.099 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 186d Sending msg of 28 bytes to 2 on channel businesschannel took 33.3µs" +peer1.org2.example.com | [16d4 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | 00000010 e3 7d eb 56 47 3a 43 25 7f db 6f d6 71 3e c1 64 |.}.VG:C%..o.q>.d| +peer0.org1.example.com | [1446 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004206ef0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [175a 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370ea90 gate 1598907086248034500 evaluation starts +orderer0.example.com | "2020-08-31 20:52:22.100 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 186e Sending msg of 28 bytes to 3 on channel businesschannel took 103.2µs" +peer1.org2.example.com | [16d5 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000020 f8 2d 64 48 02 20 65 1c 28 34 38 e1 96 bb af 9d |.-dH. e.(48.....| +peer0.org1.example.com | [1447 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004206ef0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [175b 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370ea90 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:22.100 UTC [orderer.common.cluster.step] sendMessage -> DEBU 186f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 398.9µs " +peer1.org2.example.com | [16d6 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | 00000030 ad 26 80 c8 d3 c3 39 ab b4 6c 2c c7 e6 72 86 83 |.&....9..l,..r..| +peer0.org1.example.com | [1448 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004206ef0 principal matched by identity 0 +peer0.org2.example.com | [175c 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370ea90 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:22.101 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1870 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 801.2µs " +peer1.org2.example.com | [16d7 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | 00000040 15 47 d2 5b 48 62 |.G.[Hb| +peer0.org1.example.com | [1449 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | [175d 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370ea90 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:22.103 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1871 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [16d8 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [15d5 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca57b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [175e 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | "2020-08-31 20:52:22.103 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1872 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [15d6 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca57b0 gate 1598907090053824500 evaluation succeeds +peer1.org2.example.com | [16da 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [144a 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:52:22.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1873 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [15d7 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [16d9 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | [175f 08-31 20:51:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:52:22.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1874 Sending msg of 28 bytes to 3 on channel testchainid took 19.5µs" +peer1.org1.example.com | [15d8 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [16db 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | "2020-08-31 20:52:22.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1875 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.1µs " +peer1.org1.example.com | [15d9 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [16dc 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | "2020-08-31 20:52:22.515 UTC [orderer.common.server] Deliver -> DEBU 1876 Starting new Deliver handler" +peer1.org1.example.com | [15da 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [16dd 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | "2020-08-31 20:52:22.515 UTC [common.deliver] Handle -> DEBU 1877 Starting new deliver loop for 172.18.0.9:50994" +peer1.org1.example.com | [15db 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16de 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [144b 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004206ef0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | "2020-08-31 20:52:22.515 UTC [common.deliver] Handle -> DEBU 1878 Attempting to read seek info message from 172.18.0.9:50994" +peer1.org1.example.com | [15dc 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [16df 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [144c 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004206ef0 gate 1598907081755327100 evaluation succeeds +peer0.org2.example.com | [1760 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370ea90 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:22.516 UTC [policies] Evaluate -> DEBU 1879 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org1.example.com | [15dd 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [16e2 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [144d 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1761 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00370ea90 gate 1598907086248034500 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:22.516 UTC [policies] Evaluate -> DEBU 187a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [15de 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [16e0 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [144e 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1762 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:22.516 UTC [policies] Evaluate -> DEBU 187b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer1.org1.example.com | [15df 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [16e3 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [144f 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1763 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:22.516 UTC [policies] Evaluate -> DEBU 187c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [15e0 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16e4 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1450 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1764 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:22.516 UTC [policies] Evaluate -> DEBU 187d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer1.org1.example.com | [15e1 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16e1 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1451 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | [1765 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:22.516 UTC [msp] DeserializeIdentity -> DEBU 187e Obtaining identity" +peer1.org1.example.com | [15e2 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16e6 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [1766 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +orderer0.example.com | "2020-08-31 20:52:22.516 UTC [msp.identity] newIdentity -> DEBU 187f Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [15e3 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16e7 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1452 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +orderer0.example.com | MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | [15e4 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16e8 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | [1767 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +orderer0.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | [15e5 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16e9 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +orderer0.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | [15e6 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +orderer0.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +peer1.org1.example.com | [15e7 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16ea 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +orderer0.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | [15e8 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [1453 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +orderer0.example.com | c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +peer1.org1.example.com | [15e9 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | [1454 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1768 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +peer1.org1.example.com | [15ea 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | [1455 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | [1769 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +peer1.org1.example.com | [15eb 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [176a 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +peer1.org1.example.com | [15ec 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16eb 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1456 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | [176b 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | 0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +peer1.org1.example.com | [15ed 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16ec 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | [176c 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | 1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P +peer1.org1.example.com | [15ee 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16ed 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | [176d 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | +8n2/IwosEtn+wHpdsRI +peer1.org1.example.com | [15ef 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [16ee 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | [176e 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | -----END CERTIFICATE-----" +peer1.org1.example.com | [15f0 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16ef 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [176f 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:22.517 UTC [cauthdsl] func1 -> DEBU 1880 0xc000e95e90 gate 1598907142517574900 evaluation starts" +peer1.org1.example.com | [15f1 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16f0 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1457 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | [1770 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003732380 gate 1598907086256602700 evaluation starts +orderer0.example.com | "2020-08-31 20:52:22.517 UTC [cauthdsl] func2 -> DEBU 1881 0xc000e95e90 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [15f2 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16f1 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [1771 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003732380 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:22.517 UTC [cauthdsl] func2 -> DEBU 1882 0xc000e95e90 processing identity 0 with bytes of fe10e0" +peer1.org1.example.com | [15f3 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16f2 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1458 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | [1772 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003732380 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:22.517 UTC [cauthdsl] func2 -> DEBU 1883 0xc000e95e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer1.org1.example.com | [15f4 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [16f3 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | [1773 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003732380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:52:22.517 UTC [cauthdsl] func2 -> DEBU 1884 0xc000e95e90 principal evaluation fails" +peer1.org1.example.com | [15f5 08-31 20:51:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16f4 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | [1774 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003732380 principal evaluation fails +orderer0.example.com | "2020-08-31 20:52:22.517 UTC [cauthdsl] func1 -> DEBU 1885 0xc000e95e90 gate 1598907142517574900 evaluation fails" +peer1.org1.example.com | [15f6 08-31 20:51:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [16f5 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [16f6 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1775 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003732380 gate 1598907086256602700 evaluation fails +orderer0.example.com | "2020-08-31 20:52:22.517 UTC [policies] Evaluate -> DEBU 1886 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer1.org1.example.com | [15f7 08-31 20:51:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | [16f7 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1776 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:22.517 UTC [policies] Evaluate -> DEBU 1887 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer1.org1.example.com | [15f8 08-31 20:51:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [16f8 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355e360 gate 1598907090500434500 evaluation starts +peer0.org2.example.com | [1777 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:22.517 UTC [policies] Evaluate -> DEBU 1888 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer1.org1.example.com | [15f9 08-31 20:51:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1459 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16f9 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355e360 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1778 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:22.517 UTC [cauthdsl] func1 -> DEBU 1889 0xc000e69280 gate 1598907142517977600 evaluation starts" +peer1.org1.example.com | [15fa 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [145a 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [16fa 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355e360 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1779 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037328f0 gate 1598907086258256200 evaluation starts +orderer0.example.com | "2020-08-31 20:52:22.518 UTC [cauthdsl] func2 -> DEBU 188a 0xc000e69280 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [15fb 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [145b 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [16fb 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355e360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [177a 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037328f0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:22.518 UTC [cauthdsl] func2 -> DEBU 188b 0xc000e69280 processing identity 0 with bytes of fe10e0" +peer1.org1.example.com | [15fc 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [145c 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [16fc 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355e360 principal evaluation fails +peer0.org2.example.com | [177b 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037328f0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:22.518 UTC [cauthdsl] func2 -> DEBU 188c 0xc000e69280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer1.org1.example.com | [15fd 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [145d 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [16fd 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355e360 gate 1598907090500434500 evaluation fails +peer0.org2.example.com | [177c 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037328f0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:22.518 UTC [cauthdsl] func2 -> DEBU 188d 0xc000e69280 principal evaluation fails" +peer1.org1.example.com | [15fe 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [145e 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [16fe 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [177d 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | "2020-08-31 20:52:22.518 UTC [cauthdsl] func1 -> DEBU 188e 0xc000e69280 gate 1598907142517977600 evaluation fails" +peer1.org1.example.com | [15ff 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [145f 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [16ff 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | "2020-08-31 20:52:22.518 UTC [policies] Evaluate -> DEBU 188f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | [1600 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1460 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1700 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [177e 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | "2020-08-31 20:52:22.518 UTC [policies] Evaluate -> DEBU 1890 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | [1601 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1461 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004232c80 gate 1598907081758949800 evaluation starts +peer1.org2.example.com | [1701 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +orderer0.example.com | "2020-08-31 20:52:22.518 UTC [policies] Evaluate -> DEBU 1891 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer1.org1.example.com | [1602 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161022 +peer0.org1.example.com | [1462 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004232c80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1702 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +orderer0.example.com | "2020-08-31 20:52:22.519 UTC [cauthdsl] func1 -> DEBU 1892 0xc000e69ae0 gate 1598907142518987300 evaluation starts" +peer1.org1.example.com | [1603 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1ECDABED1AFCAFBA52930A4792BF8CCE0161A6A603A347C7F51FB48EA5180E75 +peer0.org1.example.com | [1463 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004232c80 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1703 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355e8d0 gate 1598907090501994200 evaluation starts +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +orderer0.example.com | "2020-08-31 20:52:22.519 UTC [cauthdsl] func2 -> DEBU 1893 0xc000e69ae0 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [1604 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1464 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004232c80 principal matched by identity 0 +peer1.org2.example.com | [1704 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355e8d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +orderer0.example.com | "2020-08-31 20:52:22.519 UTC [cauthdsl] func2 -> DEBU 1894 0xc000e69ae0 processing identity 0 with bytes of fe10e0" +peer1.org1.example.com | [1605 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1465 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | [1705 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355e8d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [177f 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037328f0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:22.519 UTC [cauthdsl] func2 -> DEBU 1895 0xc000e69ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer1.org1.example.com | [1606 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [1706 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355e8d0 principal matched by identity 0 +peer0.org2.example.com | [1780 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037328f0 gate 1598907086258256200 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:22.519 UTC [cauthdsl] func2 -> DEBU 1896 0xc000e69ae0 principal evaluation fails" +peer1.org1.example.com | [1607 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [1466 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | [1707 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | [1781 08-31 20:51:26.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:22.519 UTC [cauthdsl] func1 -> DEBU 1897 0xc000e69ae0 gate 1598907142518987300 evaluation fails" +peer1.org1.example.com | [1608 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [1782 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1609 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:22.519 UTC [policies] Evaluate -> DEBU 1898 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | [1708 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | [1783 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [160a 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:22.519 UTC [policies] Evaluate -> DEBU 1899 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | [1784 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [160b 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:22.519 UTC [policies] func1 -> DEBU 189a Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | [1785 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [160c 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:22.519 UTC [policies] Evaluate -> DEBU 189b Signature set did not satisfy policy /Channel/Application/Readers" +peer0.org1.example.com | [1467 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004232c80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | [1786 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [160d 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:22.519 UTC [policies] Evaluate -> DEBU 189c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | [1468 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004232c80 gate 1598907081758949800 evaluation succeeds +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [1787 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [160e 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:22.519 UTC [policies] Evaluate -> DEBU 189d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org1.example.com | [1469 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [16e5 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1788 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [160f 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:22.519 UTC [policies] Evaluate -> DEBU 189e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [146a 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1709 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1789 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1610 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:22.519 UTC [policies] Evaluate -> DEBU 189f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | [146b 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [170a 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [178a 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1611 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:22.520 UTC [cauthdsl] func1 -> DEBU 18a0 0xc000e2c7f0 gate 1598907142520001300 evaluation starts" +peer0.org1.example.com | [146c 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [170b 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [178b 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1612 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:22.520 UTC [cauthdsl] func2 -> DEBU 18a1 0xc000e2c7f0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [146d 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [170d 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355e8d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [178c 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1613 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:22.520 UTC [cauthdsl] func2 -> DEBU 18a2 0xc000e2c7f0 processing identity 0 with bytes of fe10e0" +peer0.org1.example.com | [146e 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [170e 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355e8d0 gate 1598907090501994200 evaluation succeeds +peer0.org2.example.com | [178d 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1614 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:22.520 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 18a3 Checking if identity satisfies MEMBER role for OrdererMSP" +peer0.org1.example.com | [146f 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [170f 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [178e 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1615 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:22.520 UTC [msp] Validate -> DEBU 18a4 MSP OrdererMSP validating identity" +peer0.org1.example.com | [1471 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1710 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [178f 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1616 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:22.521 UTC [msp] getCertificationChain -> DEBU 18a5 MSP OrdererMSP getting certification chain" +peer0.org1.example.com | [1472 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1712 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1790 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003733d40 gate 1598907086264827200 evaluation starts +orderer0.example.com | "2020-08-31 20:52:22.521 UTC [cauthdsl] func2 -> DEBU 18a6 0xc000e2c7f0 principal matched by identity 0" +peer1.org1.example.com | [1617 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1473 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1713 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1791 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003733d40 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:22.521 UTC [msp.identity] Verify -> DEBU 18a7 Verify: digest = 00000000 98 89 f8 50 4b 43 3d fa a8 a4 e0 1e ab 2e 42 4b |...PKC=.......BK| +peer1.org1.example.com | [1619 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1474 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1714 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1792 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003733d40 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | 00000010 d6 f9 72 62 f6 11 6b 2f c7 a2 e4 f7 c6 d6 7a b7 |..rb..k/......z.|" +peer1.org1.example.com | [161a 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1470 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1715 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1793 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003733d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:52:22.521 UTC [msp.identity] Verify -> DEBU 18a8 Verify: sig = 00000000 30 44 02 20 0b 96 14 c3 87 7d c5 58 6e f5 9f e5 |0D. .....}.Xn...| +peer1.org1.example.com | [1618 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1475 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1716 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1794 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003733d40 principal evaluation fails +orderer0.example.com | 00000010 1d f0 79 39 2f 48 ee 9c 1c 2f 4a 30 cf 6e 7d 0a |..y9/H.../J0.n}.| +peer1.org1.example.com | [161b 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1476 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004233e90 gate 1598907081762766200 evaluation starts +peer1.org2.example.com | [1717 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1795 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003733d40 gate 1598907086264827200 evaluation fails +orderer0.example.com | 00000020 d5 2b da aa 02 20 79 d6 08 e8 9b de 47 b2 22 af |.+... y.....G.".| +peer1.org1.example.com | [161c 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1477 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004233e90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1796 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1718 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | 00000030 32 a0 3a 6d 67 41 c1 34 7f f2 4e 0f 10 f4 a8 e5 |2.:mgA.4..N.....| +peer1.org1.example.com | [161d 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1478 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004233e90 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1797 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1719 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | 00000040 ae 5e c2 96 be 20 |.^... |" +peer1.org1.example.com | [161e 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1479 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004233e90 principal matched by identity 0 +peer0.org2.example.com | [1798 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [171a 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:22.521 UTC [cauthdsl] func2 -> DEBU 18a9 0xc000e2c7f0 principal evaluation succeeds for identity 0" +peer1.org1.example.com | [161f 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [147a 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [1799 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037522b0 gate 1598907086266954700 evaluation starts +peer1.org2.example.com | [171b 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:22.521 UTC [cauthdsl] func1 -> DEBU 18aa 0xc000e2c7f0 gate 1598907142520001300 evaluation succeeds" +peer1.org1.example.com | [1620 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [179a 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037522b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [171c 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f15c0 gate 1598907090513209500 evaluation starts +orderer0.example.com | "2020-08-31 20:52:22.521 UTC [policies] Evaluate -> DEBU 18ab Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [1621 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d46ce0 gate 1598907090481944700 evaluation starts +peer0.org1.example.com | [147b 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | [179b 08-31 20:51:26.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037522b0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [171d 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f15c0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:22.522 UTC [policies] Evaluate -> DEBU 18ac == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [171e 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f15c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [179c 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037522b0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:22.522 UTC [policies] Evaluate -> DEBU 18ad Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org2.example.com | [171f 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f15c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1622 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d46ce0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | [179d 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | "2020-08-31 20:52:22.522 UTC [policies] Evaluate -> DEBU 18ae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org2.example.com | [1720 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f15c0 principal evaluation fails +peer1.org1.example.com | [1623 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d46ce0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:52:22.522 UTC [policies] Evaluate -> DEBU 18af Signature set satisfies policy /Channel/Readers" +peer1.org2.example.com | [1721 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f15c0 gate 1598907090513209500 evaluation fails +peer1.org1.example.com | [1624 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d46ce0 principal matched by identity 0 +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [179f 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:52:22.522 UTC [policies] Evaluate -> DEBU 18b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org2.example.com | [1722 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1625 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 02 a8 09 99 42 10 8d ff 3a 85 67 e0 15 cf 13 |.....B...:.g....| +peer0.org1.example.com | [147c 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004233e90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | "2020-08-31 20:52:22.522 UTC [common.deliver] deliverBlocks -> DEBU 18b1 [channel: businesschannel] Received seekInfo (0xc000d6ec80) start: > stop: > from 172.18.0.9:50994" +peer1.org2.example.com | [170c 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 c1 55 6a bd ce 35 00 d7 ca dc c7 58 4b 35 11 55 |.Uj..5.....XK5.U| +peer0.org1.example.com | [147d 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004233e90 gate 1598907081762766200 evaluation succeeds +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | "2020-08-31 20:52:22.522 UTC [fsblkstorage] Next -> DEBU 18b2 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer1.org2.example.com | [1711 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1626 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f b6 f2 75 ff 13 25 9b 7d d4 e1 f0 |0D. /..u..%.}...| +peer0.org1.example.com | [147e 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | "2020-08-31 20:52:22.522 UTC [fsblkstorage] newBlockfileStream -> DEBU 18b3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97392]" +peer1.org2.example.com | [1723 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 a1 f1 83 08 50 a7 58 55 50 24 c1 7d b0 58 95 c4 |....P.XUP$.}.X..| +peer0.org1.example.com | [147f 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | "2020-08-31 20:52:22.522 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18b4 Remaining bytes=[41179], Going to peek [8] bytes" +peer1.org2.example.com | [1724 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 96 ce aa 9d 02 20 43 6d 1b 37 e6 58 ec d9 b1 18 |..... Cm.7.X....| +peer0.org1.example.com | [1480 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [17a0 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037522b0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:22.522 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18b5 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97392], bytesOffset=[97395]}" +peer1.org2.example.com | [1725 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000030 4c 77 a1 ea 51 96 0a 43 e0 9a 30 9d d2 27 55 16 |Lw..Q..C..0..'U.| +peer0.org1.example.com | [1481 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [17a1 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037522b0 gate 1598907086266954700 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:22.522 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18b6 blockbytes [41176] read from file [0]" +peer1.org2.example.com | [1726 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355f100 gate 1598907090517613800 evaluation starts +peer1.org1.example.com | 00000040 16 db b7 33 68 13 |...3h.| +peer0.org1.example.com | [1482 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [179e 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:22.523 UTC [common.deliver] deliverBlocks -> DEBU 18b7 [channel: businesschannel] Delivering block [6] for (0xc000d6ec80) for 172.18.0.9:50994" +peer1.org2.example.com | [1727 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355f100 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1627 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d46ce0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1483 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [17a3 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:22.523 UTC [common.deliver] deliverBlocks -> DEBU 18b8 [channel: businesschannel] Done delivering to 172.18.0.9:50994 for (0xc000d6ec80)" +peer1.org2.example.com | [1728 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355f100 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1628 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d46ce0 gate 1598907090481944700 evaluation succeeds +peer0.org1.example.com | [1484 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17a2 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:22.523 UTC [common.deliver] Handle -> DEBU 18b9 Waiting for new SeekInfo from 172.18.0.9:50994" +peer1.org2.example.com | [1729 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355f100 principal matched by identity 0 +peer1.org1.example.com | [1629 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1485 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17a4 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:22.523 UTC [common.deliver] Handle -> DEBU 18ba Attempting to read seek info message from 172.18.0.9:50994" +peer1.org2.example.com | [172a 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | [162a 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1486 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17a5 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:22.523 UTC [fsblkstorage] waitForBlock -> DEBU 18bb Came out of wait. maxAvailaBlockNumber=[6]" +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [162b 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1487 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [17a6 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:22.523 UTC [fsblkstorage] waitForBlock -> DEBU 18bc Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +peer1.org2.example.com | [172b 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | [162c 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1488 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:22.528 UTC [common.deliver] Handle -> WARN 18bd Error reading from 172.18.0.9:50994: rpc error: code = Canceled desc = context canceled" +peer0.org2.example.com | [17a7 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | [162d 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1489 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:22.528 UTC [orderer.common.server] func1 -> DEBU 18be Closing Deliver stream" +peer0.org2.example.com | [17a8 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | [162e 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [148a 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:22.528 UTC [comm.grpc.server] 1 -> INFO 18bf streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50994 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.7273ms +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | [162f 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [148b 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:22.528 UTC [grpc] infof -> DEBU 18c0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | [17aa 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [1630 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [148c 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:22.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18c1 Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | [172c 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355f100 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1631 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [148d 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424f2e0 gate 1598907081766474800 evaluation starts +orderer0.example.com | "2020-08-31 20:52:22.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18c2 Sending msg of 28 bytes to 3 on channel businesschannel took 14.4µs" +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | [172d 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00355f100 gate 1598907090517613800 evaluation succeeds +peer1.org1.example.com | [1632 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [148e 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424f2e0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:22.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18c3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 247.7µs " +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | [172e 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1633 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [148f 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424f2e0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:22.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18c4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0131ms " +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [172f 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1634 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1490 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424f2e0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:22.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18c5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [17ab 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1730 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1635 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1491 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | [17ac 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:22.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18c6 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1731 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1636 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [17ad 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:22.658 UTC [orderer.common.server] Deliver -> DEBU 18c7 Starting new Deliver handler" +peer1.org2.example.com | [1732 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | [1637 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1492 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | [17ae 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:22.658 UTC [common.deliver] Handle -> DEBU 18c8 Starting new deliver loop for 172.18.0.9:50996" +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [1638 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | [17af 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:22.658 UTC [common.deliver] Handle -> DEBU 18c9 Attempting to read seek info message from 172.18.0.9:50996" +peer1.org2.example.com | [1733 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | [1639 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | [17b0 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:22.659 UTC [policies] Evaluate -> DEBU 18ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | [163a 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | [17b1 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:22.659 UTC [policies] Evaluate -> DEBU 18cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | [163b 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [17b2 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:22.659 UTC [policies] Evaluate -> DEBU 18cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | [163c 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1493 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424f2e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [17b3 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003753ba0 gate 1598907086274137300 evaluation starts +orderer0.example.com | "2020-08-31 20:52:22.659 UTC [policies] Evaluate -> DEBU 18cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [163d 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1494 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424f2e0 gate 1598907081766474800 evaluation succeeds +peer0.org2.example.com | [17a9 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:22.659 UTC [policies] Evaluate -> DEBU 18ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer1.org2.example.com | [1734 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [163e 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1495 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [17b4 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003753ba0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:22.659 UTC [cauthdsl] func1 -> DEBU 18cf 0xc001135e80 gate 1598907142659785300 evaluation starts" +peer1.org2.example.com | [1735 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [163f 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17b6 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003753ba0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:22.660 UTC [cauthdsl] func2 -> DEBU 18d0 0xc001135e80 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1736 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1640 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [17b5 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1496 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:22.660 UTC [cauthdsl] func2 -> DEBU 18d1 0xc001135e80 processing identity 0 with bytes of fe10e0" +peer1.org2.example.com | [1737 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1641 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17b7 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003753ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1497 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:22.660 UTC [cauthdsl] func2 -> DEBU 18d2 0xc001135e80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer1.org2.example.com | [1738 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1642 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [17b8 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003753ba0 principal evaluation fails +peer0.org1.example.com | [1498 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:22.660 UTC [cauthdsl] func2 -> DEBU 18d3 0xc001135e80 principal evaluation fails" +peer1.org1.example.com | [1643 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1739 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [17b9 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003753ba0 gate 1598907086274137300 evaluation fails +peer0.org1.example.com | [1499 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | "2020-08-31 20:52:22.660 UTC [cauthdsl] func1 -> DEBU 18d4 0xc001135e80 gate 1598907142659785300 evaluation fails" +peer1.org1.example.com | [1644 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [173a 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [17ba 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:52:22.660 UTC [policies] Evaluate -> DEBU 18d5 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer1.org1.example.com | [1645 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [173b 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [17bb 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [149a 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:52:22.660 UTC [policies] Evaluate -> DEBU 18d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer1.org1.example.com | [1646 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [173c 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [17bc 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | "2020-08-31 20:52:22.660 UTC [policies] Evaluate -> DEBU 18d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer1.org1.example.com | [1647 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [173d 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [17bd 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ca220 gate 1598907086275324600 evaluation starts +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | "2020-08-31 20:52:22.660 UTC [cauthdsl] func1 -> DEBU 18d8 0xc000d867c0 gate 1598907142660830000 evaluation starts" +peer1.org1.example.com | [1648 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [173e 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [17be 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ca220 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | "2020-08-31 20:52:22.660 UTC [cauthdsl] func2 -> DEBU 18d9 0xc000d867c0 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [164a 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [173f 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c2c40 gate 1598907090525440900 evaluation starts +peer0.org2.example.com | [17bf 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ca220 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | "2020-08-31 20:52:22.660 UTC [cauthdsl] func2 -> DEBU 18da 0xc000d867c0 processing identity 0 with bytes of fe10e0" +peer1.org1.example.com | [1649 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1740 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c2c40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [17c0 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ca220 principal matched by identity 0 +peer0.org1.example.com | [149b 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | "2020-08-31 20:52:22.660 UTC [cauthdsl] func2 -> DEBU 18db 0xc000d867c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer1.org1.example.com | [164b 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1741 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c2c40 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [17c1 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | "2020-08-31 20:52:22.660 UTC [cauthdsl] func2 -> DEBU 18dc 0xc000d867c0 principal evaluation fails" +peer1.org1.example.com | [164c 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1742 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c2c40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [149c 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | "2020-08-31 20:52:22.661 UTC [cauthdsl] func1 -> DEBU 18dd 0xc000d867c0 gate 1598907142660830000 evaluation fails" +peer1.org1.example.com | [164d 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1743 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c2c40 principal evaluation fails +peer0.org2.example.com | [17c2 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +orderer0.example.com | "2020-08-31 20:52:22.661 UTC [policies] Evaluate -> DEBU 18de Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | [164e 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1744 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c2c40 gate 1598907090525440900 evaluation fails +peer0.org2.example.com | [17c3 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +orderer0.example.com | "2020-08-31 20:52:22.661 UTC [policies] Evaluate -> DEBU 18df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer1.org1.example.com | [164f 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1745 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +orderer0.example.com | "2020-08-31 20:52:22.661 UTC [policies] Evaluate -> DEBU 18e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer1.org1.example.com | [1650 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1746 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +orderer0.example.com | "2020-08-31 20:52:22.661 UTC [cauthdsl] func1 -> DEBU 18e1 0xc000d87000 gate 1598907142661440500 evaluation starts" +peer1.org1.example.com | [1651 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1747 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | [149d 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:22.661 UTC [cauthdsl] func2 -> DEBU 18e2 0xc000d87000 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [1652 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1748 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c31b0 gate 1598907090527132800 evaluation starts +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [149e 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:22.661 UTC [cauthdsl] func2 -> DEBU 18e3 0xc000d87000 processing identity 0 with bytes of fe10e0" +peer1.org2.example.com | [1749 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c31b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1653 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17c4 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [149f 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:22.661 UTC [cauthdsl] func2 -> DEBU 18e4 0xc000d87000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer1.org2.example.com | [174a 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c31b0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1654 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [17c5 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ca220 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [14a0 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:22.661 UTC [cauthdsl] func2 -> DEBU 18e5 0xc000d87000 principal evaluation fails" +peer1.org2.example.com | [174b 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c31b0 principal matched by identity 0 +peer1.org1.example.com | [1655 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [17c7 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037ca220 gate 1598907086275324600 evaluation succeeds +peer0.org1.example.com | [14a1 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:22.661 UTC [cauthdsl] func1 -> DEBU 18e6 0xc000d87000 gate 1598907142661440500 evaluation fails" +peer1.org2.example.com | [174c 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | [1656 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 5c f3 f8 a5 fd d1 b8 dc 55 e7 a5 08 a7 96 dd |"\.......U......| +peer0.org2.example.com | [17c6 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14a2 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:22.661 UTC [policies] Evaluate -> DEBU 18e7 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | 00000010 c2 af 80 8d d4 06 86 45 03 b2 f9 b1 c2 d2 2e d7 |.......E........| +peer0.org1.example.com | [14a3 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [17c8 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:22.661 UTC [policies] Evaluate -> DEBU 18e8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [174d 08-31 20:51:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | [1657 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 7a d3 7e f5 26 2f 3f 93 7c 53 |0E.!..z.~.&/?.|S| +peer0.org1.example.com | [14a4 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [17c9 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:22.661 UTC [policies] func1 -> DEBU 18e9 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000010 77 8d 5f 61 b9 92 a5 ca 63 be d3 51 bd 76 2d f6 |w._a....c..Q.v-.| +peer0.org1.example.com | [14a5 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426b2c0 gate 1598907081771873700 evaluation starts +peer0.org2.example.com | [17ca 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:22.662 UTC [policies] Evaluate -> DEBU 18ea Signature set did not satisfy policy /Channel/Application/Readers" +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000020 b3 e1 2a fc bf 02 20 32 f0 79 d1 cb ff b1 78 2d |..*... 2.y....x-| +peer0.org1.example.com | [14a6 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426b2c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [17cb 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:22.662 UTC [policies] Evaluate -> DEBU 18eb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000030 7d c0 21 04 f6 31 a9 49 02 4a 17 28 1b c3 e5 b2 |}.!..1.I.J.(....| +peer0.org1.example.com | [14a7 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426b2c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [17cc 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +orderer0.example.com | "2020-08-31 20:52:22.662 UTC [policies] Evaluate -> DEBU 18ec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | 00000040 89 c0 f5 91 b6 a9 42 |......B| +peer0.org1.example.com | [14a8 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426b2c0 principal matched by identity 0 +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +orderer0.example.com | "2020-08-31 20:52:22.662 UTC [policies] Evaluate -> DEBU 18ed This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [174e 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c31b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1658 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [14a9 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [17cd 08-31 20:51:26.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +orderer0.example.com | "2020-08-31 20:52:22.662 UTC [policies] Evaluate -> DEBU 18ee == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org2.example.com | [174f 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035c31b0 gate 1598907090527132800 evaluation succeeds +peer1.org1.example.com | [1659 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | [1750 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [165a 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [14aa 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +orderer0.example.com | "2020-08-31 20:52:22.662 UTC [cauthdsl] func1 -> DEBU 18ef 0xc000d87cf0 gate 1598907142662796400 evaluation starts" +peer1.org2.example.com | [1751 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [165b 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +orderer0.example.com | "2020-08-31 20:52:22.662 UTC [cauthdsl] func2 -> DEBU 18f0 0xc000d87cf0 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1752 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [165c 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +orderer0.example.com | "2020-08-31 20:52:22.662 UTC [cauthdsl] func2 -> DEBU 18f1 0xc000d87cf0 processing identity 0 with bytes of fe10e0" +peer1.org2.example.com | [1753 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [165d 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [17ce 08-31 20:51:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:22.662 UTC [cauthdsl] func2 -> DEBU 18f2 0xc000d87cf0 principal matched by identity 0" +peer1.org2.example.com | [1754 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [165e 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [14ab 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426b2c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [17cf 08-31 20:51:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:22.663 UTC [msp.identity] Verify -> DEBU 18f3 Verify: digest = 00000000 ca ee 6a b5 1b 1a c4 aa 54 86 b7 46 3b 9b 87 60 |..j.....T..F;..`| +peer1.org2.example.com | [1755 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [165f 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14ac 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426b2c0 gate 1598907081771873700 evaluation succeeds +peer0.org2.example.com | [17d0 08-31 20:51:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1756 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1660 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14ad 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [17d1 08-31 20:51:26.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1757 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | 00000010 eb 6d c2 df 22 a8 6a 4c d9 78 a9 f2 f9 13 6d 45 |.m..".jL.x....mE|" +peer1.org1.example.com | [1661 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14af 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [17d2 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:22.663 UTC [msp.identity] Verify -> DEBU 18f4 Verify: sig = 00000000 30 45 02 21 00 d8 02 31 d5 0f e6 a4 19 50 87 3f |0E.!...1.....P.?| +peer1.org2.example.com | [1758 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1662 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17d3 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000010 f6 0d 8e 75 3b 31 26 01 ae 00 4b 2e 94 a7 07 16 |...u;1&...K.....| +peer1.org2.example.com | [175a 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1663 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [14b0 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [17d4 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000020 47 2b 33 58 db 02 20 0f 98 94 1c 77 b0 d8 a4 79 |G+3X.. ....w...y| +peer1.org2.example.com | [175b 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1664 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14b1 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [17d5 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000030 1a 3b 13 c8 15 e2 e4 9e 03 4a 97 ec f9 ba 70 ef |.;.......J....p.| +peer1.org2.example.com | [175c 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1665 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [14b2 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17d6 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes +orderer0.example.com | 00000040 d3 ef 6c c5 26 45 de |..l.&E.|" +peer1.org2.example.com | [175d 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fc3b0 gate 1598907090533800000 evaluation starts +peer1.org1.example.com | [1666 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [14ae 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17d7 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 32 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:22.663 UTC [cauthdsl] func2 -> DEBU 18f5 0xc000d87cf0 principal evaluation succeeds for identity 0" +peer1.org2.example.com | [175e 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fc3b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1667 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14b3 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17d8 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +orderer0.example.com | "2020-08-31 20:52:22.663 UTC [cauthdsl] func1 -> DEBU 18f6 0xc000d87cf0 gate 1598907142662796400 evaluation succeeds" +peer1.org2.example.com | [1759 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1668 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [14b4 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [17d9 08-31 20:51:26.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:22.663 UTC [policies] Evaluate -> DEBU 18f7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [175f 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fc3b0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1669 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14b5 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17da 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:22.663 UTC [policies] Evaluate -> DEBU 18f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [1761 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fc3b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [166a 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [14b6 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17db 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:22.663 UTC [policies] Evaluate -> DEBU 18f9 Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org2.example.com | [1762 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fc3b0 principal evaluation fails +peer1.org1.example.com | [166b 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [14b7 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [17dc 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org2.example.com | [1763 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035fc3b0 gate 1598907090533800000 evaluation fails +orderer0.example.com | "2020-08-31 20:52:22.663 UTC [policies] Evaluate -> DEBU 18fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org1.example.com | [166c 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14b8 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [17dd 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1760 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:22.664 UTC [policies] Evaluate -> DEBU 18fb Signature set satisfies policy /Channel/Readers" +peer1.org1.example.com | [166d 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [14b9 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17de 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [1765 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:22.664 UTC [policies] Evaluate -> DEBU 18fc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org1.example.com | [166e 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14ba 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [17df 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1766 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:22.664 UTC [common.deliver] deliverBlocks -> DEBU 18fd [channel: businesschannel] Received seekInfo (0xc000caf440) start: > stop: > from 172.18.0.9:50996" +peer1.org1.example.com | [166f 08-31 20:51:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [14bb 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [17e0 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [1767 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:22.664 UTC [fsblkstorage] Next -> DEBU 18fe Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer1.org1.example.com | [1670 08-31 20:51:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14bc 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [17e1 08-31 20:51:29.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1768 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:22.665 UTC [fsblkstorage] newBlockfileStream -> DEBU 18ff newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97392]" +peer1.org1.example.com | [1671 08-31 20:51:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [14bd 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [17e2 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 f4 c4 ab 64 23 45 dc 18 92 58 28 0c 4c 34 74 |"...d#E...X(.L4t| +peer1.org2.example.com | [1764 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:22.665 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1900 Remaining bytes=[41179], Going to peek [8] bytes" +peer1.org1.example.com | [1672 08-31 20:51:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [14be 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 79 c7 7f 57 0f b8 7f 32 d5 d9 e7 51 2f 15 27 48 |y..W...2...Q/.'H| +peer1.org2.example.com | [1769 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:22.665 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1901 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97392], bytesOffset=[97395]}" +peer0.org1.example.com | [14bf 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1673 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [17e3 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 5c 24 30 37 87 8d a5 03 50 26 ce |0D. .\$07....P&.| +peer1.org2.example.com | [176a 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:22.665 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1902 blockbytes [41176] read from file [0]" +peer0.org1.example.com | [14c0 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1674 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 07 8d 52 a6 96 61 57 31 55 3d 02 7c 44 87 a4 3f |..R..aW1U=.|D..?| +peer1.org2.example.com | [176b 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:22.665 UTC [common.deliver] deliverBlocks -> DEBU 1903 [channel: businesschannel] Delivering block [6] for (0xc000caf440) for 172.18.0.9:50996" +peer0.org1.example.com | [14c1 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1675 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 5f 58 b6 03 02 20 0f 46 f1 a2 01 af 47 40 2d 56 |_X... .F....G@-V| +peer1.org2.example.com | [176c 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:22.666 UTC [common.deliver] deliverBlocks -> DEBU 1904 [channel: businesschannel] Done delivering to 172.18.0.9:50996 for (0xc000caf440)" +peer0.org1.example.com | [14c2 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1676 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 7b 99 35 f1 a5 b0 45 ac 68 00 c3 c2 2a d5 71 ce |{.5...E.h...*.q.| +peer1.org2.example.com | [176d 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f1ff0 gate 1598907090539953300 evaluation starts +orderer0.example.com | "2020-08-31 20:52:22.666 UTC [common.deliver] Handle -> DEBU 1905 Waiting for new SeekInfo from 172.18.0.9:50996" +peer0.org1.example.com | [14c3 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | [1677 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 51 95 21 29 db 9e |Q.!)..| +peer1.org2.example.com | [176e 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f1ff0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:22.666 UTC [common.deliver] Handle -> DEBU 1906 Attempting to read seek info message from 172.18.0.9:50996" +peer0.org1.example.com | [14c4 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1678 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17e4 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | [176f 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f1ff0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:22.666 UTC [fsblkstorage] waitForBlock -> DEBU 1907 Came out of wait. maxAvailaBlockNumber=[6]" +peer0.org1.example.com | [14c5 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1679 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [1770 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f1ff0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:22.666 UTC [fsblkstorage] waitForBlock -> DEBU 1908 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +peer0.org1.example.com | [14c6 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [167a 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17e5 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 97 5e c9 d4 a4 ee 65 3f 12 91 44 |0D. r.^....e?..D| +peer1.org2.example.com | [1772 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | "2020-08-31 20:52:22.675 UTC [common.deliver] Handle -> WARN 1909 Error reading from 172.18.0.9:50996: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | [14c7 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [167b 08-31 20:51:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | 00000010 47 7f c4 41 34 e7 b3 e9 e3 7a 61 a0 7b 07 85 30 |G..A4....za.{..0| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:52:22.675 UTC [orderer.common.server] func1 -> DEBU 190a Closing Deliver stream" +peer0.org1.example.com | [14c8 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [167c 08-31 20:51:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 16 95 73 63 02 20 1b 3a 54 b2 62 53 54 ce b5 11 |..sc. .:T.bST...| +peer1.org2.example.com | [1771 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:22.675 UTC [comm.grpc.server] 1 -> INFO 190b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50996 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.1972ms +peer0.org1.example.com | [14c9 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [167d 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 59 9c 63 f7 13 b3 09 fc b0 06 6c 46 77 81 49 1d |Y.c.......lFw.I.| +peer1.org2.example.com | [1773 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:52:22.675 UTC [grpc] infof -> DEBU 190c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | [14ca 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [167e 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 16 3d ec 35 21 7d |.=.5!}| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | "2020-08-31 20:52:22.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 190d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [14cb 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [167f 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [17e6 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | "2020-08-31 20:52:22.805 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 190e Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +peer0.org1.example.com | [14cc 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1680 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [17e7 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | "2020-08-31 20:52:22.805 UTC [orderer.common.cluster.step] sendMessage -> DEBU 190f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.5µs " +peer0.org1.example.com | [14cd 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1681 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17e8 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | "2020-08-31 20:52:23.041 UTC [orderer.common.server] Deliver -> DEBU 1910 Starting new Deliver handler" +peer0.org1.example.com | [14ce 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1682 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [17e9 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1774 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f1ff0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:23.042 UTC [common.deliver] Handle -> DEBU 1911 Starting new deliver loop for 172.18.0.9:50998" +peer0.org1.example.com | [14cf 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1683 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [17ea 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1775 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034f1ff0 gate 1598907090539953300 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:23.042 UTC [common.deliver] Handle -> DEBU 1912 Attempting to read seek info message from 172.18.0.9:50998" +peer0.org1.example.com | [14d0 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1684 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [17eb 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1776 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:23.043 UTC [policies] Evaluate -> DEBU 1913 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | [14d1 08-31 20:51:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer1.org1.example.com | [1685 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [17ec 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1777 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:23.043 UTC [policies] Evaluate -> DEBU 1914 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [14d2 08-31 20:51:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer1.org1.example.com | [1686 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [17ed 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1778 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:23.043 UTC [policies] Evaluate -> DEBU 1915 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org1.example.com | [14d3 08-31 20:51:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1687 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [17ee 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org2.example.com | [1779 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:23.043 UTC [policies] Evaluate -> DEBU 1916 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [14d4 08-31 20:51:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610061801 +peer1.org1.example.com | [1688 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d678b0 gate 1598907093018340100 evaluation starts +peer0.org2.example.com | [17ef 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [177a 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +orderer0.example.com | "2020-08-31 20:52:23.043 UTC [policies] Evaluate -> DEBU 1917 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | [14d5 08-31 20:51:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3972E3552C57E9CE8000D9DD850FA1951AF6374F5021CEDA027F6B0F0CB73DCB +peer1.org1.example.com | [1689 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d678b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [17f0 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +orderer0.example.com | "2020-08-31 20:52:23.043 UTC [cauthdsl] func1 -> DEBU 1918 0xc0009a0ac0 gate 1598907143043680700 evaluation starts" +peer0.org1.example.com | [14d6 08-31 20:51:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer1.org1.example.com | [168a 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d678b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [17f1 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [177b 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +orderer0.example.com | "2020-08-31 20:52:23.043 UTC [cauthdsl] func2 -> DEBU 1919 0xc0009a0ac0 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [14d7 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [168b 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d678b0 principal matched by identity 0 +peer0.org2.example.com | [17f2 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +orderer0.example.com | "2020-08-31 20:52:23.043 UTC [cauthdsl] func2 -> DEBU 191a 0xc0009a0ac0 processing identity 0 with bytes of fe10e0" +peer0.org1.example.com | [14d8 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [168c 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 6b 8d 84 9c 5e 54 fd d2 47 1d 20 69 43 4d fe |.k...^T..G. iCM.| +peer0.org2.example.com | [17f3 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +orderer0.example.com | "2020-08-31 20:52:23.043 UTC [cauthdsl] func2 -> DEBU 191b 0xc0009a0ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer0.org1.example.com | [14d9 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 3f 62 5a 35 2f b7 98 f5 9f 3d 5c 78 23 88 16 ac |?bZ5/....=\x#...| +peer0.org2.example.com | [17f4 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +orderer0.example.com | "2020-08-31 20:52:23.044 UTC [cauthdsl] func2 -> DEBU 191c 0xc0009a0ac0 principal evaluation fails" +peer0.org1.example.com | [14da 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [168d 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 4f b9 fe ed 90 40 8a 5d 97 0f |0E.!..O....@.]..| +peer0.org2.example.com | [17f5 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +orderer0.example.com | "2020-08-31 20:52:23.044 UTC [cauthdsl] func1 -> DEBU 191d 0xc0009a0ac0 gate 1598907143043680700 evaluation fails" +peer0.org1.example.com | [14db 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | 00000010 e7 9f bb 16 f0 5c 78 9d 1f e1 3b 86 8f 6d fa 71 |.....\x...;..m.q| +peer0.org2.example.com | [17f6 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer1.org2.example.com | [177c 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | "2020-08-31 20:52:23.044 UTC [policies] Evaluate -> DEBU 191e Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | [14dc 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 2e df 67 7c 3f 02 20 1e b2 61 f8 d3 85 bc a8 47 |..g|?. ..a.....G| +peer0.org2.example.com | [17f7 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +orderer0.example.com | "2020-08-31 20:52:23.044 UTC [policies] Evaluate -> DEBU 191f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org1.example.com | [14dd 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000030 6f d8 27 5f 77 e4 c5 e9 7e 55 bf 24 04 8d 63 1b |o.'_w...~U.$..c.| +peer0.org2.example.com | [17f8 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [177d 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +orderer0.example.com | "2020-08-31 20:52:23.044 UTC [policies] Evaluate -> DEBU 1920 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org1.example.com | [14de 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 06 92 b3 98 47 ca 24 |....G.$| +peer0.org2.example.com | [17f9 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 9a 77 99 a4 fb 92 b5 cd 96 95 e3 49 f5 6b d6 |(.w.........I.k.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +orderer0.example.com | "2020-08-31 20:52:23.044 UTC [cauthdsl] func1 -> DEBU 1921 0xc0009a1440 gate 1598907143044842500 evaluation starts" +peer0.org1.example.com | [14df 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [168e 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d678b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 99 ba 0b c5 7d f6 b6 77 4b 39 03 47 f5 7b fb 35 |....}..wK9.G.{.5| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | "2020-08-31 20:52:23.044 UTC [cauthdsl] func2 -> DEBU 1922 0xc0009a1440 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [14e0 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [17fa 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6c 9b 20 f8 98 e5 85 41 77 70 9c e7 |0D. l. ....Awp..| +peer1.org1.example.com | [168f 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d678b0 gate 1598907093018340100 evaluation succeeds +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +orderer0.example.com | "2020-08-31 20:52:23.044 UTC [cauthdsl] func2 -> DEBU 1923 0xc0009a1440 processing identity 0 with bytes of fe10e0" +peer0.org1.example.com | [14e1 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 30 7b a1 83 76 92 b4 bd 27 ff ef 25 19 57 f7 58 |0{..v...'..%.W.X| +peer1.org1.example.com | [1690 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +orderer0.example.com | "2020-08-31 20:52:23.045 UTC [cauthdsl] func2 -> DEBU 1924 0xc0009a1440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer0.org1.example.com | [14e2 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 87 82 fa 56 02 20 4b 5e 0b 53 c9 56 b6 4d c1 79 |...V. K^.S.V.M.y| +peer0.org2.example.com | 00000030 b2 bc 09 c7 33 eb d5 18 b8 c6 fa 83 d5 25 38 7a |....3........%8z| +peer0.org2.example.com | 00000040 5c 8b 68 7e 1c da |\.h~..| +peer1.org1.example.com | [1691 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:23.045 UTC [cauthdsl] func2 -> DEBU 1925 0xc0009a1440 principal evaluation fails" +peer0.org1.example.com | [14e3 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17fb 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1692 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [177e 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:23.045 UTC [cauthdsl] func1 -> DEBU 1926 0xc0009a1440 gate 1598907143044842500 evaluation fails" +peer0.org1.example.com | [14e4 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17fc 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1693 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [177f 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:23.045 UTC [policies] Evaluate -> DEBU 1927 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [14e5 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17fd 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1694 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1780 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:23.045 UTC [policies] Evaluate -> DEBU 1928 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org1.example.com | [14e6 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17fe 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer1.org1.example.com | [1695 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2020-08-31 20:52:23.045 UTC [policies] Evaluate -> DEBU 1929 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer1.org2.example.com | [1781 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [14e7 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [17ff 08-31 20:51:29.28 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer1.org1.example.com | [1696 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:23.045 UTC [cauthdsl] func1 -> DEBU 192a 0xc0009a1df0 gate 1598907143045466800 evaluation starts" +peer1.org2.example.com | [1782 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14e8 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1800 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1697 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:23.045 UTC [cauthdsl] func2 -> DEBU 192b 0xc0009a1df0 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1783 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14e9 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1801 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1698 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:23.045 UTC [cauthdsl] func2 -> DEBU 192c 0xc0009a1df0 processing identity 0 with bytes of fe10e0" +peer1.org2.example.com | [1784 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14ea 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1802 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1699 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1785 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:23.045 UTC [cauthdsl] func2 -> DEBU 192d 0xc0009a1df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer0.org2.example.com | [1803 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14eb 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [169a 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1786 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:23.045 UTC [cauthdsl] func2 -> DEBU 192e 0xc0009a1df0 principal evaluation fails" +peer0.org2.example.com | [1804 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14ec 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [169b 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1787 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:23.045 UTC [cauthdsl] func1 -> DEBU 192f 0xc0009a1df0 gate 1598907143045466800 evaluation fails" +peer0.org2.example.com | [1805 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14ed 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [169c 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org2.example.com | [1788 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:23.046 UTC [policies] Evaluate -> DEBU 1930 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer0.org2.example.com | [1806 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14ee 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [169d 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1789 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:23.046 UTC [policies] Evaluate -> DEBU 1931 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer0.org2.example.com | [1807 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [14ef 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [169e 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [178a 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:23.046 UTC [policies] func1 -> DEBU 1932 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +peer0.org1.example.com | [14f0 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1808 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | [169f 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [178b 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003644910 gate 1598907090569706700 evaluation starts +orderer0.example.com | "2020-08-31 20:52:23.046 UTC [policies] Evaluate -> DEBU 1933 Signature set did not satisfy policy /Channel/Application/Readers" +peer0.org1.example.com | [14f1 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1809 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16a0 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [178c 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003644910 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:23.046 UTC [policies] Evaluate -> DEBU 1934 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer0.org1.example.com | [14f2 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [16a1 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\324\357\2301\237 \253\\1i\2771E\320e\r\276o\002 d\255\220r\211}\252=\343\261\034kTc\276\223q\200\330B\351)\r\324\224\342\003V\010\365v\240" > +peer1.org2.example.com | [178d 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003644910 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:23.046 UTC [policies] Evaluate -> DEBU 1935 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org1.example.com | [14f3 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [180a 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [16a2 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [178e 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003644910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:52:23.046 UTC [policies] Evaluate -> DEBU 1936 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [14f4 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [180b 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16a3 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16a4 08-31 20:51:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:23.046 UTC [policies] Evaluate -> DEBU 1937 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.046 UTC [cauthdsl] func1 -> DEBU 1938 0xc000468b20 gate 1598907143046711200 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.046 UTC [cauthdsl] func2 -> DEBU 1939 0xc000468b20 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [14f5 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [14f6 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [14f7 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cc560 gate 1598907085043903800 evaluation starts +peer1.org1.example.com | [16a5 08-31 20:51:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [16a6 08-31 20:51:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [16a7 08-31 20:51:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [16a8 08-31 20:51:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [16aa 08-31 20:51:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16a9 08-31 20:51:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [16ac 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [16ab 08-31 20:51:33.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [16ad 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16ae 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [16af 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16b0 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [16b1 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [16b2 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [16b3 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16b4 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [16b5 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [16b6 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16b7 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [16b8 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [16b9 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [16ba 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16bb 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [16bc 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161023 +peer1.org1.example.com | [16bd 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E438F703A3ECC8C5A053A1DA5DA5C9ACA1E96AD5E630D34D91A8D00BB977A2AA +peer1.org1.example.com | [16be 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [16bf 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [16c0 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [16c1 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:&,>\361\337_\206\356l\2308\303M\001,}\330\266$\213" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [16c2 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16c3 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:&,>\361\337_\206\356l\2308\303M\001,}\330\266$\213" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [16c4 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [180c 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [180d 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [180e 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [180f 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1810 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1811 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1812 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1813 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1814 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1815 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878170 gate 1598907089327535200 evaluation starts +peer0.org2.example.com | [1816 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878170 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1817 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878170 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1818 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1819 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878170 principal evaluation fails +peer0.org2.example.com | [181a 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003878170 gate 1598907089327535200 evaluation fails +peer0.org2.example.com | [181b 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [181c 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [181d 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [181e 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038786e0 gate 1598907089329830000 evaluation starts +peer0.org2.example.com | [181f 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038786e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1820 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038786e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1821 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038786e0 principal matched by identity 0 +peer0.org2.example.com | [1822 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 3d c9 53 d4 5c ce a4 15 c7 67 1c 7b 3d 79 3f |.=.S.\....g.{=y?| +peer0.org2.example.com | 00000010 8f 66 12 7b 70 0e 8c 4e d8 3e c0 03 f9 07 bc fb |.f.{p..N.>......| +peer0.org2.example.com | [1823 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b4 9e 4e 9a fd 5d 98 e5 dd 2b |0E.!....N..]...+| +peer0.org2.example.com | 00000010 b2 70 9a 63 1e 86 43 04 0e aa db 15 c3 6a 46 67 |.p.c..C......jFg| +peer0.org2.example.com | 00000020 5b 3b 73 67 9c 02 20 7c a1 34 d7 9f ec b4 0d b9 |[;sg.. |.4......| +peer0.org2.example.com | 00000030 6f b7 6a 5b a2 db 7a d9 fd 8c 84 8b c6 b9 a5 8d |o.j[..z.........| +peer0.org2.example.com | 00000040 6f 71 81 be fc ea d6 |oq.....| +peer0.org2.example.com | [1824 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038786e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1825 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038786e0 gate 1598907089329830000 evaluation succeeds +peer0.org2.example.com | [1826 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1827 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1828 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1829 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [182a 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [182b 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [182c 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [182d 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [182e 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [182f 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1830 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1831 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1832 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [1833 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1834 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1835 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1836 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1837 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [1838 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1839 08-31 20:51:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [183a 08-31 20:51:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [183b 08-31 20:51:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [183c 08-31 20:51:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [183d 08-31 20:51:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [183e 08-31 20:51:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [183f 08-31 20:51:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1840 08-31 20:51:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1841 08-31 20:51:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1842 08-31 20:51:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1843 08-31 20:51:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1844 08-31 20:51:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1845 08-31 20:51:29.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1846 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1847 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1848 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1849 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [184a 08-31 20:51:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [184b 08-31 20:51:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [184c 08-31 20:51:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [184d 08-31 20:51:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [184e 08-31 20:51:29.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [184f 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1850 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816101E +peer0.org2.example.com | [1851 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C444E335381692519679507835126B9704A27C72FF359D57A34FDBFF3634FC0A +peer0.org2.example.com | [1852 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1853 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1854 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1855 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1856 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1857 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1859 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [178f 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003644910 principal evaluation fails +peer1.org2.example.com | [1790 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003644910 gate 1598907090569706700 evaluation fails +peer1.org2.example.com | [1791 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1792 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1793 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1794 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003644e80 gate 1598907090571882000 evaluation starts +peer1.org2.example.com | [1795 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003644e80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1796 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003644e80 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1797 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003644e80 principal matched by identity 0 +peer1.org2.example.com | [1798 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [1799 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [179a 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003644e80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [179b 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003644e80 gate 1598907090571882000 evaluation succeeds +peer1.org2.example.com | [179c 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [179d 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [179e 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [179f 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [17a0 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [17a1 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [17a2 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17a3 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17a4 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [17a5 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [17a6 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [17a7 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [17a8 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [17a9 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [17aa 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003678770 gate 1598907090578607200 evaluation starts +peer1.org2.example.com | [17ab 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003678770 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [17ac 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003678770 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [17ad 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003678770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [17ae 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003678770 principal evaluation fails +peer1.org2.example.com | [17af 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003678770 gate 1598907090578607200 evaluation fails +peer1.org2.example.com | [17b0 08-31 20:51:30.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [17b1 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [17b2 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [17b3 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003678ce0 gate 1598907090580596100 evaluation starts +peer1.org2.example.com | [17b4 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003678ce0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [17b5 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003678ce0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [17b6 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003678ce0 principal matched by identity 0 +peer1.org2.example.com | [17b7 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [17b8 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [17b9 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003678ce0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [17ba 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003678ce0 gate 1598907090580596100 evaluation succeeds +peer1.org2.example.com | [17bb 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [17bc 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [17bd 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [17be 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [17bf 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [17c0 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [17c1 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17c2 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [17c3 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17c4 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [17c5 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [17c6 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17c7 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [17c8 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17c9 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [17ca 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [17cb 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17cc 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [14f8 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cc560 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [14f9 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cc560 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [14fa 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cc560 principal matched by identity 0 +peer0.org1.example.com | [14fb 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 78 b1 56 21 54 82 a3 15 9f 65 87 70 4e 71 ee |-x.V!T....e.pNq.| +peer0.org1.example.com | 00000010 6e af 81 e5 06 61 13 20 3f bc 54 41 a3 6c be 75 |n....a. ?.TA.l.u| +peer0.org1.example.com | [14fc 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d3 7c e4 56 2b ee 75 a3 62 76 1a |0D. x.|.V+.u.bv.| +peer0.org1.example.com | 00000010 69 cf fc d2 08 bc 7a 74 86 c5 04 e4 6d db 11 a7 |i.....zt....m...| +peer0.org1.example.com | 00000020 76 7a ac 35 02 20 4a f3 65 b0 31 3a 0f 41 a1 22 |vz.5. J.e.1:.A."| +peer0.org1.example.com | 00000030 f9 b6 7b c1 e2 07 d5 b7 07 18 82 4a b3 4a 83 e0 |..{........J.J..| +peer0.org1.example.com | 00000040 d6 f4 9b 74 25 1b |...t%.| +peer0.org1.example.com | [14fd 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cc560 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [14fe 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cc560 gate 1598907085043903800 evaluation succeeds +peer0.org1.example.com | [14ff 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1500 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1501 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1502 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1503 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:23.046 UTC [cauthdsl] func2 -> DEBU 193a 0xc000468b20 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.046 UTC [cauthdsl] func2 -> DEBU 193b 0xc000468b20 principal matched by identity 0" +orderer0.example.com | "2020-08-31 20:52:23.047 UTC [msp.identity] Verify -> DEBU 193c Verify: digest = 00000000 fb 3e 2b 07 d8 6d ab fe f2 fe 33 c9 03 19 1c bc |.>+..m....3.....| +orderer0.example.com | 00000010 be 67 05 9f 72 99 77 d8 e6 44 b4 d3 d9 d9 53 2c |.g..r.w..D....S,|" +orderer0.example.com | "2020-08-31 20:52:23.047 UTC [msp.identity] Verify -> DEBU 193d Verify: sig = 00000000 30 45 02 21 00 8d a1 08 1a 7f 4e 30 10 f0 69 f9 |0E.!......N0..i.| +orderer0.example.com | 00000010 5c 60 84 b1 fb 77 46 aa 35 fa cb 8f 4f 98 7d 55 |\`...wF.5...O.}U| +orderer0.example.com | 00000020 db f9 75 25 41 02 20 05 c1 67 83 5d ac 2c 7a 6b |..u%A. ..g.].,zk| +orderer0.example.com | 00000030 49 09 37 23 35 c4 2b ce 6b cb 19 50 9e 2a 8e 73 |I.7#5.+.k..P.*.s| +orderer0.example.com | 00000040 07 da e4 05 63 3b df |....c;.|" +orderer0.example.com | "2020-08-31 20:52:23.047 UTC [cauthdsl] func2 -> DEBU 193e 0xc000468b20 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-08-31 20:52:23.047 UTC [cauthdsl] func1 -> DEBU 193f 0xc000468b20 gate 1598907143046711200 evaluation succeeds" +orderer0.example.com | "2020-08-31 20:52:23.047 UTC [policies] Evaluate -> DEBU 1940 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:52:23.047 UTC [policies] Evaluate -> DEBU 1941 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:52:23.048 UTC [policies] Evaluate -> DEBU 1942 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:52:23.048 UTC [policies] Evaluate -> DEBU 1943 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:52:23.048 UTC [policies] Evaluate -> DEBU 1944 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-08-31 20:52:23.048 UTC [policies] Evaluate -> DEBU 1945 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-08-31 20:52:23.048 UTC [common.deliver] deliverBlocks -> DEBU 1946 [channel: businesschannel] Received seekInfo (0xc000d6f8c0) start: > stop: > from 172.18.0.9:50998" +orderer0.example.com | "2020-08-31 20:52:23.048 UTC [fsblkstorage] Next -> DEBU 1947 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-08-31 20:52:23.048 UTC [fsblkstorage] newBlockfileStream -> DEBU 1948 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97392]" +orderer0.example.com | "2020-08-31 20:52:23.049 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1949 Remaining bytes=[41179], Going to peek [8] bytes" +orderer0.example.com | "2020-08-31 20:52:23.049 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 194a Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97392], bytesOffset=[97395]}" +orderer0.example.com | "2020-08-31 20:52:23.049 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 194b blockbytes [41176] read from file [0]" +orderer0.example.com | "2020-08-31 20:52:23.049 UTC [common.deliver] deliverBlocks -> DEBU 194c [channel: businesschannel] Delivering block [6] for (0xc000d6f8c0) for 172.18.0.9:50998" +orderer0.example.com | "2020-08-31 20:52:23.049 UTC [common.deliver] deliverBlocks -> DEBU 194d [channel: businesschannel] Done delivering to 172.18.0.9:50998 for (0xc000d6f8c0)" +orderer0.example.com | "2020-08-31 20:52:23.050 UTC [common.deliver] Handle -> DEBU 194e Waiting for new SeekInfo from 172.18.0.9:50998" +orderer0.example.com | "2020-08-31 20:52:23.050 UTC [common.deliver] Handle -> DEBU 194f Attempting to read seek info message from 172.18.0.9:50998" +orderer0.example.com | "2020-08-31 20:52:23.050 UTC [fsblkstorage] waitForBlock -> DEBU 1950 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2020-08-31 20:52:23.050 UTC [fsblkstorage] waitForBlock -> DEBU 1951 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2020-08-31 20:52:23.054 UTC [common.deliver] Handle -> WARN 1952 Error reading from 172.18.0.9:50998: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-08-31 20:52:23.054 UTC [orderer.common.server] func1 -> DEBU 1953 Closing Deliver stream" +orderer0.example.com | "2020-08-31 20:52:23.054 UTC [comm.grpc.server] 1 -> INFO 1954 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50998 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.8181ms +orderer0.example.com | "2020-08-31 20:52:23.054 UTC [grpc] infof -> DEBU 1955 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-08-31 20:52:23.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1956 Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +orderer0.example.com | "2020-08-31 20:52:23.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1957 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +orderer0.example.com | "2020-08-31 20:52:23.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1958 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 342µs " +orderer0.example.com | "2020-08-31 20:52:23.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1959 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 458.4µs " +orderer0.example.com | "2020-08-31 20:52:23.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 195a Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1858 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [185a 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [185b 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [185c 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [185d 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [185e 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [185f 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1860 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1861 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1862 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1863 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1864 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1865 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1866 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1867 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1868 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1869 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [186a 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [186b 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4ef0 gate 1598907089531337900 evaluation starts +peer0.org2.example.com | [186c 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4ef0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [186d 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4ef0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [186e 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [17cd 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17ce 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [17cf 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [17d0 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [17d1 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [17d2 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [17d3 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [17d4 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [17d5 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac480 gate 1598907090589209100 evaluation starts +peer1.org2.example.com | [17d6 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac480 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [17d7 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac480 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [17d8 08-31 20:51:30.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [17d9 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac480 principal evaluation fails +peer1.org2.example.com | [17da 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac480 gate 1598907090589209100 evaluation fails +peer1.org2.example.com | [17db 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [17dc 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [17dd 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [17de 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac9f0 gate 1598907090591142800 evaluation starts +peer1.org2.example.com | [17df 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac9f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [17e0 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac9f0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [17e1 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac9f0 principal matched by identity 0 +peer1.org2.example.com | [17e2 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 5c f3 f8 a5 fd d1 b8 dc 55 e7 a5 08 a7 96 dd |"\.......U......| +peer1.org2.example.com | 00000010 c2 af 80 8d d4 06 86 45 03 b2 f9 b1 c2 d2 2e d7 |.......E........| +peer1.org2.example.com | [17e3 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 7a d3 7e f5 26 2f 3f 93 7c 53 |0E.!..z.~.&/?.|S| +peer1.org2.example.com | 00000010 77 8d 5f 61 b9 92 a5 ca 63 be d3 51 bd 76 2d f6 |w._a....c..Q.v-.| +peer1.org2.example.com | 00000020 b3 e1 2a fc bf 02 20 32 f0 79 d1 cb ff b1 78 2d |..*... 2.y....x-| +peer1.org2.example.com | 00000030 7d c0 21 04 f6 31 a9 49 02 4a 17 28 1b c3 e5 b2 |}.!..1.I.J.(....| +peer1.org2.example.com | 00000040 89 c0 f5 91 b6 a9 42 |......B| +peer1.org2.example.com | [17e4 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac9f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [17e5 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac9f0 gate 1598907090591142800 evaluation succeeds +peer1.org2.example.com | [17e6 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [17e7 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [17e8 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [17e9 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [17ea 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [17eb 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [17ec 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [17ed 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [17ee 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [17ef 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17f0 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17f1 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17f2 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [17f3 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17f5 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [17f4 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17f6 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [17f8 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17f7 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [17f9 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17fa 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17fb 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17fc 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17fd 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17fe 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [17ff 08-31 20:51:30.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1800 08-31 20:51:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1801 08-31 20:51:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1802 08-31 20:51:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1803 08-31 20:51:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1804 08-31 20:51:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1805 08-31 20:51:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1806 08-31 20:51:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1807 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [1504 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1505 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1506 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1507 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1508 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1509 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [150a 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [150b 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [150c 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [150d 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [150e 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [150f 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1510 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\005\307\340" > +peer0.org1.example.com | [1511 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1512 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1513 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1514 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1515 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1516 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1517 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1518 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1519 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [151a 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [151b 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [151c 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [151d 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291ab0 gate 1598907085054113300 evaluation starts +peer0.org1.example.com | [151e 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291ab0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [151f 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291ab0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1520 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291ab0 principal matched by identity 0 +peer0.org1.example.com | [1521 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 a3 41 c5 d2 d4 ab cc 1a c6 9f 72 79 14 fc ef |..A........ry...| +peer0.org1.example.com | 00000010 86 15 2b 54 c2 39 73 0f a4 fa 82 3e 2d ea e4 f5 |..+T.9s....>-...| +peer0.org1.example.com | [1522 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 97 fb 3d c9 61 8f 63 a5 f3 a4 0b |0D. F..=.a.c....| +peer0.org1.example.com | 00000010 e5 20 c6 b6 02 41 38 57 31 36 82 2b e7 bc 5a cb |. ...A8W16.+..Z.| +peer0.org1.example.com | 00000020 08 f4 62 b8 02 20 64 69 ae 76 ee 69 9b 5f 4e eb |..b.. di.v.i._N.| +peer0.org1.example.com | 00000030 1f 1c 6b 75 83 b8 ba ae 78 fe 7c 67 c9 22 55 bb |..ku....x.|g."U.| +peer0.org1.example.com | 00000040 10 fa 29 a1 75 51 |..).uQ| +peer0.org1.example.com | [1523 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291ab0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1524 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291ab0 gate 1598907085054113300 evaluation succeeds +peer0.org1.example.com | [1525 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1526 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1527 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1528 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1529 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [152a 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [152b 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [152c 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [152d 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [152e 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [152f 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1530 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1531 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1532 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1533 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1534 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1535 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1536 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1537 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1538 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1539 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [153a 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [153b 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [153c 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [153d 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [153e 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [153f 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1540 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1541 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1542 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1543 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1544 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1545 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1546 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1547 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1548 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1549 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [154a 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [154b 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [154c 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [154d 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [154e 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [154f 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1550 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [1551 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1552 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d8 6c fb 8b b4 bb 1e 3d 37 36 65 ac 75 a1 ab |D.l.....=76e.u..| +peer0.org1.example.com | 00000010 d6 a9 39 2d c0 86 11 7a 78 b0 38 50 42 86 02 0c |..9-...zx.8PB...| +peer0.org1.example.com | [1553 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c cc 0d 20 6f 76 e1 8c d0 cb c7 |0E.!.... ov.....| +peer0.org1.example.com | 00000010 1b d5 69 4c 6d 69 9c 90 b7 33 ef e3 3e b6 ad 35 |..iLmi...3..>..5| +peer0.org1.example.com | 00000020 88 66 a7 0f c2 02 20 36 d5 b9 d9 13 ff 20 2c 0e |.f.... 6..... ,.| +peer0.org1.example.com | 00000030 d5 6c e0 aa 03 16 06 7e 75 b9 95 a8 7d b7 5a 26 |.l.....~u...}.Z&| +peer0.org1.example.com | 00000040 16 85 87 b4 f2 37 4f |.....7O| +peer0.org1.example.com | [1554 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [1555 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 2b a5 fa 8a 29 5c da 9c e1 2d f4 |0D. D+...)\...-.| +orderer0.example.com | "2020-08-31 20:52:23.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 195b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:23.195 UTC [orderer.common.server] Deliver -> DEBU 195c Starting new Deliver handler" +orderer0.example.com | "2020-08-31 20:52:23.195 UTC [common.deliver] Handle -> DEBU 195d Starting new deliver loop for 172.18.0.9:51000" +orderer0.example.com | "2020-08-31 20:52:23.195 UTC [common.deliver] Handle -> DEBU 195e Attempting to read seek info message from 172.18.0.9:51000" +orderer0.example.com | "2020-08-31 20:52:23.196 UTC [policies] Evaluate -> DEBU 195f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.196 UTC [policies] Evaluate -> DEBU 1960 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:52:23.196 UTC [policies] Evaluate -> DEBU 1961 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.196 UTC [policies] Evaluate -> DEBU 1962 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:52:23.196 UTC [policies] Evaluate -> DEBU 1963 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.196 UTC [cauthdsl] func1 -> DEBU 1964 0xc0009e0ab0 gate 1598907143196854700 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.197 UTC [cauthdsl] func2 -> DEBU 1965 0xc0009e0ab0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.197 UTC [cauthdsl] func2 -> DEBU 1966 0xc0009e0ab0 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.197 UTC [cauthdsl] func2 -> DEBU 1967 0xc0009e0ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2020-08-31 20:52:23.197 UTC [cauthdsl] func2 -> DEBU 1968 0xc0009e0ab0 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.197 UTC [cauthdsl] func1 -> DEBU 1969 0xc0009e0ab0 gate 1598907143196854700 evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.197 UTC [policies] Evaluate -> DEBU 196a Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.197 UTC [policies] Evaluate -> DEBU 196b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.197 UTC [policies] Evaluate -> DEBU 196c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.197 UTC [cauthdsl] func1 -> DEBU 196d 0xc0009e1460 gate 1598907143197611900 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.197 UTC [cauthdsl] func2 -> DEBU 196e 0xc0009e1460 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.197 UTC [cauthdsl] func2 -> DEBU 196f 0xc0009e1460 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.197 UTC [cauthdsl] func2 -> DEBU 1970 0xc0009e1460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-08-31 20:52:23.198 UTC [cauthdsl] func2 -> DEBU 1971 0xc0009e1460 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.198 UTC [cauthdsl] func1 -> DEBU 1972 0xc0009e1460 gate 1598907143197611900 evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.198 UTC [policies] Evaluate -> DEBU 1973 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.198 UTC [policies] Evaluate -> DEBU 1974 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.198 UTC [policies] Evaluate -> DEBU 1975 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.198 UTC [cauthdsl] func1 -> DEBU 1976 0xc00098c010 gate 1598907143198782300 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.199 UTC [cauthdsl] func2 -> DEBU 1977 0xc00098c010 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.199 UTC [cauthdsl] func2 -> DEBU 1978 0xc00098c010 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.199 UTC [cauthdsl] func2 -> DEBU 1979 0xc00098c010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-08-31 20:52:23.199 UTC [cauthdsl] func2 -> DEBU 197a 0xc00098c010 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.199 UTC [cauthdsl] func1 -> DEBU 197b 0xc00098c010 gate 1598907143198782300 evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.199 UTC [policies] Evaluate -> DEBU 197c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.199 UTC [policies] Evaluate -> DEBU 197d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.199 UTC [policies] func1 -> DEBU 197e Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2020-08-31 20:52:23.199 UTC [policies] Evaluate -> DEBU 197f Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:52:23.200 UTC [policies] Evaluate -> DEBU 1980 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:52:23.200 UTC [policies] Evaluate -> DEBU 1981 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.200 UTC [policies] Evaluate -> DEBU 1982 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:52:23.200 UTC [policies] Evaluate -> DEBU 1983 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.200 UTC [cauthdsl] func1 -> DEBU 1984 0xc00098cd00 gate 1598907143200537000 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.200 UTC [cauthdsl] func2 -> DEBU 1985 0xc00098cd00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.200 UTC [cauthdsl] func2 -> DEBU 1986 0xc00098cd00 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.200 UTC [cauthdsl] func2 -> DEBU 1987 0xc00098cd00 principal matched by identity 0" +orderer0.example.com | "2020-08-31 20:52:23.200 UTC [msp.identity] Verify -> DEBU 1988 Verify: digest = 00000000 68 41 3f c1 ad 71 6d 9f 80 fa d2 39 4b 2c ce 5e |hA?..qm....9K,.^| +orderer0.example.com | 00000010 fe 72 e2 bd 34 b2 8b 8e fd 3d c5 36 4b f8 07 85 |.r..4....=.6K...|" +orderer0.example.com | "2020-08-31 20:52:23.201 UTC [msp.identity] Verify -> DEBU 1989 Verify: sig = 00000000 30 45 02 21 00 fe 95 ca 30 c1 aa f3 57 ac 30 8a |0E.!....0...W.0.| +orderer0.example.com | 00000010 2e 5d b7 86 a3 32 06 76 51 2b f3 ea 93 20 16 72 |.]...2.vQ+... .r| +orderer0.example.com | 00000020 c2 20 d9 54 67 02 20 7e a9 59 67 f1 30 e0 1a fc |. .Tg. ~.Yg.0...| +orderer0.example.com | 00000030 85 67 5b 9b 43 fb 1e 99 c3 b2 e2 77 17 9f 85 7d |.g[.C......w...}| +orderer0.example.com | 00000040 8a 6c c4 6d 5c d3 84 |.l.m\..|" +orderer0.example.com | "2020-08-31 20:52:23.201 UTC [cauthdsl] func2 -> DEBU 198a 0xc00098cd00 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-08-31 20:52:23.201 UTC [cauthdsl] func1 -> DEBU 198b 0xc00098cd00 gate 1598907143200537000 evaluation succeeds" +orderer0.example.com | "2020-08-31 20:52:23.201 UTC [policies] Evaluate -> DEBU 198c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:52:23.201 UTC [policies] Evaluate -> DEBU 198d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [16c5 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [16c6 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16c7 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [16c8 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16c9 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [16ca 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [16cb 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16cc 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [16cd 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [16ce 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16cf 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [16d0 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [16d1 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 38 f7 03 a3 ec c8 c5 a0 53 a1 da 5d a5 c9 ac |.8.......S..]...| +peer1.org1.example.com | 00000010 a1 e9 6a d5 e6 30 d3 4d 91 a8 d0 0b b9 77 a2 aa |..j..0.M.....w..| +peer1.org1.example.com | [16d2 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 c8 1b d1 fb 63 f4 f3 dd 45 18 eb |0D. .....c...E..| +peer1.org1.example.com | 00000010 06 98 a8 95 67 20 9c 17 b8 9d 9d 27 99 53 87 f4 |....g .....'.S..| +peer1.org1.example.com | 00000020 24 56 74 78 02 20 1d b3 30 63 83 e3 0b 49 db 56 |$Vtx. ..0c...I.V| +peer1.org1.example.com | 00000030 2f 0b da 29 a4 5d b7 e6 b7 34 08 b5 23 50 30 0c |/..).]...4..#P0.| +peer1.org1.example.com | 00000040 37 ca 78 54 76 bb |7.xTv.| +peer1.org1.example.com | [16d3 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [16d4 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 7a c0 ca f2 3b 7b e1 2f 19 e8 |0E.!..z...;{./..| +peer1.org1.example.com | 00000010 0b 00 d3 a4 29 45 b5 29 cd e4 ff 1c ec ac 03 01 |....)E.)........| +peer1.org1.example.com | 00000020 09 8a 05 ed 6d 02 20 2a e6 89 26 e1 27 92 05 eb |....m. *..&.'...| +peer1.org1.example.com | 00000030 f8 8a 3e 26 2c 3e f1 df 5f 86 ee 6c 98 38 c3 4d |..>&,>.._..l.8.M| +peer1.org1.example.com | 00000040 01 2c 7d d8 b6 24 8b |.,}..$.| +peer1.org1.example.com | [16d5 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [16d6 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [16d7 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16d8 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16d9 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [16da 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [16db 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16dc 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [16dd 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [16de 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [16df 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 38 f7 03 a3 ec c8 c5 a0 53 a1 da 5d a5 c9 ac |.8.......S..]...| +peer1.org1.example.com | 00000010 a1 e9 6a d5 e6 30 d3 4d 91 a8 d0 0b b9 77 a2 aa |..j..0.M.....w..| +peer0.org2.example.com | [186f 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4ef0 principal evaluation fails +peer0.org2.example.com | [1870 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f4ef0 gate 1598907089531337900 evaluation fails +peer0.org2.example.com | [1871 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1872 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1873 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1874 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f5460 gate 1598907089535125000 evaluation starts +peer0.org2.example.com | [1875 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f5460 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1876 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f5460 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1877 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f5460 principal matched by identity 0 +peer0.org2.example.com | [1878 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 ca e6 88 e9 1f 0d 72 fb 1c 13 83 e0 8f 83 b1 |.......r........| +peer0.org2.example.com | 00000010 57 fc 35 5c 16 19 54 69 8f 56 c2 9d 27 01 8d d0 |W.5\..Ti.V..'...| +peer0.org2.example.com | [1879 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd ac 23 c8 ff 53 ce 34 53 b2 93 |0E.!...#..S.4S..| +peer0.org2.example.com | 00000010 79 9c 19 ec 7e 77 ef 6e 89 d5 14 b6 e1 5a ae d6 |y...~w.n.....Z..| +peer0.org2.example.com | 00000020 34 7c 56 46 09 02 20 30 7c 31 0c 0b 85 09 f8 e6 |4|VF.. 0|1......| +peer0.org2.example.com | 00000030 18 47 58 fb 2e da be 0b 60 94 5b 70 d5 1e 4e d8 |.GX.....`.[p..N.| +peer0.org2.example.com | 00000040 01 53 b1 76 32 c0 87 |.S.v2..| +peer0.org2.example.com | [187a 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f5460 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [187b 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f5460 gate 1598907089535125000 evaluation succeeds +peer0.org2.example.com | [187c 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [187d 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [187e 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [187f 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1880 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1881 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1882 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1883 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [1884 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 44 e3 35 38 16 92 51 96 79 50 78 35 12 6b 97 |.D.58..Q.yPx5.k.| +peer0.org2.example.com | 00000010 04 a2 7c 72 ff 35 9d 57 a3 4f db ff 36 34 fc 0a |..|r.5.W.O..64..| +peer0.org2.example.com | [1885 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef de 13 18 e3 79 74 64 07 10 b0 |0E.!......ytd...| +peer0.org2.example.com | 00000010 99 82 b0 12 15 ce 05 96 11 6c c4 99 31 59 33 0e |.........l..1Y3.| +peer0.org2.example.com | 00000020 8c e5 d0 bf 8b 02 20 1b 48 9b 5c 88 9c 3c 02 38 |...... .H.\..<.8| +peer0.org2.example.com | 00000030 fc b2 8a db 39 ca 2e 1a 5b 89 6a 92 df a1 4c 92 |....9...[.j...L.| +peer0.org2.example.com | 00000040 6a 7e 5a 52 3c 85 a1 |j~ZR<..| +peer0.org2.example.com | [1886 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1887 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1888 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1889 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [188a 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 f4 c4 ab 64 23 45 dc 18 92 58 28 0c 4c 34 74 |"...d#E...X(.L4t| +peer0.org2.example.com | 00000010 79 c7 7f 57 0f b8 7f 32 d5 d9 e7 51 2f 15 27 48 |y..W...2...Q/.'H| +peer0.org2.example.com | [188b 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 5c 24 30 37 87 8d a5 03 50 26 ce |0D. .\$07....P&.| +peer0.org2.example.com | 00000010 07 8d 52 a6 96 61 57 31 55 3d 02 7c 44 87 a4 3f |..R..aW1U=.|D..?| +peer0.org2.example.com | 00000020 5f 58 b6 03 02 20 0f 46 f1 a2 01 af 47 40 2d 56 |_X... .F....G@-V| +peer0.org2.example.com | 00000030 7b 99 35 f1 a5 b0 45 ac 68 00 c3 c2 2a d5 71 ce |{.5...E.h...*.q.| +peer0.org2.example.com | 00000040 51 95 21 29 db 9e |Q.!)..| +peer0.org2.example.com | [188c 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [188d 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [188e 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [188f 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [1890 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1891 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1892 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1894 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1895 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1808 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1809 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [180a 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [180b 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [180d 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [180c 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [180e 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [180f 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1811 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1810 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1812 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1813 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1814 08-31 20:51:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1815 08-31 20:51:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1816 08-31 20:51:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1817 08-31 20:51:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1818 08-31 20:51:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1819 08-31 20:51:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [181a 08-31 20:51:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [181b 08-31 20:51:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [181c 08-31 20:51:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [181d 08-31 20:51:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [181e 08-31 20:51:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [181f 08-31 20:51:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161022 +peer1.org2.example.com | [1820 08-31 20:51:33.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D66B8D849C5E54FDD2471D2069434DFE3F625A352FB798F59F3D5C78238816AC +peer1.org2.example.com | [1821 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1822 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1823 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [1824 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1825 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1826 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1827 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1829 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [182a 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [182b 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [182c 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [182d 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1828 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [182e 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [182f 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1830 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1831 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1832 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1833 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1834 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 6b 8d 84 9c 5e 54 fd d2 47 1d 20 69 43 4d fe |.k...^T..G. iCM.| +peer1.org2.example.com | 00000010 3f 62 5a 35 2f b7 98 f5 9f 3d 5c 78 23 88 16 ac |?bZ5/....=\x#...| +peer1.org2.example.com | [1835 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 4f b9 fe ed 90 40 8a 5d 97 0f |0E.!..O....@.]..| +peer1.org2.example.com | 00000010 e7 9f bb 16 f0 5c 78 9d 1f e1 3b 86 8f 6d fa 71 |.....\x...;..m.q| +peer1.org2.example.com | 00000020 2e df 67 7c 3f 02 20 1e b2 61 f8 d3 85 bc a8 47 |..g|?. ..a.....G| +peer1.org2.example.com | 00000030 6f d8 27 5f 77 e4 c5 e9 7e 55 bf 24 04 8d 63 1b |o.'_w...~U.$..c.| +peer1.org2.example.com | 00000040 06 92 b3 98 47 ca 24 |....G.$| +peer1.org2.example.com | [1836 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [1837 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 21 a3 d5 b2 6e 64 cc ee c8 58 |0E.!..!...nd...X| +peer1.org2.example.com | 00000010 a9 7b 63 7d 12 da ad c6 94 93 2e c5 12 79 9a 6f |.{c}.........y.o| +peer1.org2.example.com | 00000020 5f ce cd 57 8e 02 20 69 c1 40 56 f5 92 19 ec 1f |_..W.. i.@V.....| +peer1.org2.example.com | 00000030 49 f9 2d 3c 7e 6e 27 40 72 7a 7d 7c b6 04 f5 d1 |I.-<~n'@rz}|....| +peer1.org2.example.com | 00000040 f9 14 53 a6 33 ff 41 |..S.3.A| +peer1.org2.example.com | [1838 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1839 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [183a 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [183b 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [183c 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [183d 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [183e 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [183f 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1840 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1841 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 6b 8d 84 9c 5e 54 fd d2 47 1d 20 69 43 4d fe |.k...^T..G. iCM.| +peer1.org2.example.com | 00000010 3f 62 5a 35 2f b7 98 f5 9f 3d 5c 78 23 88 16 ac |?bZ5/....=\x#...| +peer1.org2.example.com | [1842 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 4f b9 fe ed 90 40 8a 5d 97 0f |0E.!..O....@.]..| +peer1.org2.example.com | 00000010 e7 9f bb 16 f0 5c 78 9d 1f e1 3b 86 8f 6d fa 71 |.....\x...;..m.q| +peer1.org2.example.com | 00000020 2e df 67 7c 3f 02 20 1e b2 61 f8 d3 85 bc a8 47 |..g|?. ..a.....G| +peer1.org2.example.com | 00000030 6f d8 27 5f 77 e4 c5 e9 7e 55 bf 24 04 8d 63 1b |o.'_w...~U.$..c.| +peer1.org2.example.com | 00000040 06 92 b3 98 47 ca 24 |....G.$| +peer1.org2.example.com | [1843 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1844 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1845 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1846 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1847 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1848 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1849 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [184a 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [184b 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 6b 8d 84 9c 5e 54 fd d2 47 1d 20 69 43 4d fe |.k...^T..G. iCM.| +peer1.org2.example.com | 00000010 3f 62 5a 35 2f b7 98 f5 9f 3d 5c 78 23 88 16 ac |?bZ5/....=\x#...| +peer1.org2.example.com | [184c 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 4f b9 fe ed 90 40 8a 5d 97 0f |0E.!..O....@.]..| +peer1.org2.example.com | 00000010 e7 9f bb 16 f0 5c 78 9d 1f e1 3b 86 8f 6d fa 71 |.....\x...;..m.q| +peer1.org2.example.com | 00000020 2e df 67 7c 3f 02 20 1e b2 61 f8 d3 85 bc a8 47 |..g|?. ..a.....G| +peer1.org2.example.com | 00000030 6f d8 27 5f 77 e4 c5 e9 7e 55 bf 24 04 8d 63 1b |o.'_w...~U.$..c.| +peer1.org2.example.com | 00000040 06 92 b3 98 47 ca 24 |....G.$| +peer1.org2.example.com | [184d 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [184e 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [184f 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1850 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1851 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1852 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1853 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1854 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1855 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1856 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1857 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1858 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1859 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [185a 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [185b 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [185c 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [185d 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [185e 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [185f 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1860 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1861 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1862 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1863 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1864 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1865 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1866 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1867 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1868 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372bc50 gate 1598907093297626800 evaluation starts +peer1.org2.example.com | [1869 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372bc50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [186a 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372bc50 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [186b 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372bc50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [186c 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372bc50 principal evaluation fails +peer1.org2.example.com | [186d 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372bc50 gate 1598907093297626800 evaluation fails +peer1.org2.example.com | [186e 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [186f 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1870 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1871 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376a1c0 gate 1598907093299600300 evaluation starts +peer1.org2.example.com | [1872 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376a1c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1873 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376a1c0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1874 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376a1c0 principal matched by identity 0 +peer1.org2.example.com | [1875 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 38 f7 03 a3 ec c8 c5 a0 53 a1 da 5d a5 c9 ac |.8.......S..]...| +peer1.org2.example.com | 00000010 a1 e9 6a d5 e6 30 d3 4d 91 a8 d0 0b b9 77 a2 aa |..j..0.M.....w..| +peer1.org2.example.com | [1876 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 c8 1b d1 fb 63 f4 f3 dd 45 18 eb |0D. .....c...E..| +peer1.org2.example.com | 00000010 06 98 a8 95 67 20 9c 17 b8 9d 9d 27 99 53 87 f4 |....g .....'.S..| +peer1.org2.example.com | 00000020 24 56 74 78 02 20 1d b3 30 63 83 e3 0b 49 db 56 |$Vtx. ..0c...I.V| +peer1.org2.example.com | 00000030 2f 0b da 29 a4 5d b7 e6 b7 34 08 b5 23 50 30 0c |/..).]...4..#P0.| +peer1.org2.example.com | 00000040 37 ca 78 54 76 bb |7.xTv.| +peer1.org2.example.com | [1877 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376a1c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1878 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376a1c0 gate 1598907093299600300 evaluation succeeds +peer1.org2.example.com | [1879 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [187a 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [187b 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [187c 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [187d 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [187e 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [187f 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1880 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1881 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1882 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1883 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1884 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [1885 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1886 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1887 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1888 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1889 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\301d\370-dH\002 e\034(48\341\226\273\257\235\255&\200\310\323\3039\253\264l,\307\346r\206\203\025G\322[Hb" > +peer1.org1.example.com | [16e0 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 c8 1b d1 fb 63 f4 f3 dd 45 18 eb |0D. .....c...E..| +peer1.org1.example.com | 00000010 06 98 a8 95 67 20 9c 17 b8 9d 9d 27 99 53 87 f4 |....g .....'.S..| +peer1.org1.example.com | 00000020 24 56 74 78 02 20 1d b3 30 63 83 e3 0b 49 db 56 |$Vtx. ..0c...I.V| +peer1.org1.example.com | 00000030 2f 0b da 29 a4 5d b7 e6 b7 34 08 b5 23 50 30 0c |/..).]...4..#P0.| +peer1.org1.example.com | 00000040 37 ca 78 54 76 bb |7.xTv.| +peer1.org1.example.com | [16e1 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [16e2 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [16e3 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16e4 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16e5 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [16e6 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [16e7 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16e8 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 38 f7 03 a3 ec c8 c5 a0 53 a1 da 5d a5 c9 ac |.8.......S..]...| +peer1.org1.example.com | 00000010 a1 e9 6a d5 e6 30 d3 4d 91 a8 d0 0b b9 77 a2 aa |..j..0.M.....w..| +peer1.org1.example.com | [16e9 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 c8 1b d1 fb 63 f4 f3 dd 45 18 eb |0D. .....c...E..| +peer1.org1.example.com | 00000010 06 98 a8 95 67 20 9c 17 b8 9d 9d 27 99 53 87 f4 |....g .....'.S..| +peer1.org1.example.com | 00000020 24 56 74 78 02 20 1d b3 30 63 83 e3 0b 49 db 56 |$Vtx. ..0c...I.V| +peer1.org1.example.com | 00000030 2f 0b da 29 a4 5d b7 e6 b7 34 08 b5 23 50 30 0c |/..).]...4..#P0.| +peer1.org1.example.com | 00000040 37 ca 78 54 76 bb |7.xTv.| +peer1.org1.example.com | [16ea 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [16eb 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [16ec 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [16ed 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [16ee 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [16ef 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [16f0 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [16f1 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [16f2 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [16f3 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [16f4 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [16f5 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05f50 gate 1598907093318347000 evaluation starts +peer1.org1.example.com | [16f6 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05f50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [16f7 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05f50 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [16f8 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05f50 principal matched by identity 0 +peer1.org1.example.com | [16f9 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 6b 8d 84 9c 5e 54 fd d2 47 1d 20 69 43 4d fe |.k...^T..G. iCM.| +peer1.org1.example.com | 00000010 3f 62 5a 35 2f b7 98 f5 9f 3d 5c 78 23 88 16 ac |?bZ5/....=\x#...| +peer1.org1.example.com | [16fa 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 4f b9 fe ed 90 40 8a 5d 97 0f |0E.!..O....@.]..| +peer1.org1.example.com | 00000010 e7 9f bb 16 f0 5c 78 9d 1f e1 3b 86 8f 6d fa 71 |.....\x...;..m.q| +peer1.org1.example.com | 00000020 2e df 67 7c 3f 02 20 1e b2 61 f8 d3 85 bc a8 47 |..g|?. ..a.....G| +peer1.org1.example.com | 00000030 6f d8 27 5f 77 e4 c5 e9 7e 55 bf 24 04 8d 63 1b |o.'_w...~U.$..c.| +peer1.org1.example.com | 00000040 06 92 b3 98 47 ca 24 |....G.$| +peer1.org1.example.com | [16fb 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05f50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [16fc 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05f50 gate 1598907093318347000 evaluation succeeds +peer1.org1.example.com | [16fd 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [16fe 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [16ff 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1700 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1701 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1702 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1703 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1704 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1705 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1706 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1707 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1708 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1709 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [170a 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [170b 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [170c 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [170d 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [170e 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [170f 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1710 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1711 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1712 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1713 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1714 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1896 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1897 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1893 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 44 e3 35 38 16 92 51 96 79 50 78 35 12 6b 97 |.D.58..Q.yPx5.k.| +peer0.org2.example.com | 00000010 04 a2 7c 72 ff 35 9d 57 a3 4f db ff 36 34 fc 0a |..|r.5.W.O..64..| +peer0.org2.example.com | [1898 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef de 13 18 e3 79 74 64 07 10 b0 |0E.!......ytd...| +peer0.org2.example.com | 00000010 99 82 b0 12 15 ce 05 96 11 6c c4 99 31 59 33 0e |.........l..1Y3.| +peer0.org2.example.com | 00000020 8c e5 d0 bf 8b 02 20 1b 48 9b 5c 88 9c 3c 02 38 |...... .H.\..<.8| +peer0.org2.example.com | 00000030 fc b2 8a db 39 ca 2e 1a 5b 89 6a 92 df a1 4c 92 |....9...[.j...L.| +peer0.org2.example.com | 00000040 6a 7e 5a 52 3c 85 a1 |j~ZR<..| +peer0.org2.example.com | [1899 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [189b 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [189c 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [189d 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [189e 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [189f 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [189a 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [18a0 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 a2 0d b0 2f 00 e5 77 59 ca 57 c5 |0D. E.../..wY.W.| +peer0.org2.example.com | 00000010 91 f3 cb 17 5c 2e 26 b7 32 7c fd d0 6d d8 dc 48 |....\.&.2|..m..H| +peer0.org2.example.com | 00000020 dd c3 9b 3f 02 20 7a dc fd 90 6d d2 72 e6 4f ad |...?. z...m.r.O.| +peer0.org2.example.com | 00000030 d5 30 8d 1d 54 24 4e e0 65 b2 a5 87 17 74 ce 90 |.0..T$N.e....t..| +peer0.org2.example.com | 00000040 60 3f ec 5e 8d c3 |`?.^..| +peer0.org2.example.com | [18a1 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [18a2 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [18a3 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18a4 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18a5 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [18a6 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18a7 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [18a8 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18a9 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [18aa 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [18ab 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [18ac 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [18ad 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [18ae 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [18af 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039391f0 gate 1598907089558621200 evaluation starts +orderer0.example.com | "2020-08-31 20:52:23.201 UTC [policies] Evaluate -> DEBU 198e Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:52:23.201 UTC [policies] Evaluate -> DEBU 198f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:52:23.201 UTC [policies] Evaluate -> DEBU 1990 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-08-31 20:52:23.201 UTC [policies] Evaluate -> DEBU 1991 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-08-31 20:52:23.201 UTC [common.deliver] deliverBlocks -> DEBU 1992 [channel: businesschannel] Received seekInfo (0xc000da5b80) start: > stop: > from 172.18.0.9:51000" +orderer0.example.com | "2020-08-31 20:52:23.202 UTC [fsblkstorage] Next -> DEBU 1993 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-08-31 20:52:23.202 UTC [fsblkstorage] newBlockfileStream -> DEBU 1994 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97392]" +orderer0.example.com | "2020-08-31 20:52:23.202 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1995 Remaining bytes=[41179], Going to peek [8] bytes" +orderer0.example.com | "2020-08-31 20:52:23.202 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1996 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97392], bytesOffset=[97395]}" +orderer0.example.com | "2020-08-31 20:52:23.203 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1997 blockbytes [41176] read from file [0]" +orderer0.example.com | "2020-08-31 20:52:23.203 UTC [common.deliver] deliverBlocks -> DEBU 1998 [channel: businesschannel] Delivering block [6] for (0xc000da5b80) for 172.18.0.9:51000" +orderer0.example.com | "2020-08-31 20:52:23.203 UTC [common.deliver] deliverBlocks -> DEBU 1999 [channel: businesschannel] Done delivering to 172.18.0.9:51000 for (0xc000da5b80)" +orderer0.example.com | "2020-08-31 20:52:23.203 UTC [common.deliver] Handle -> DEBU 199a Waiting for new SeekInfo from 172.18.0.9:51000" +orderer0.example.com | "2020-08-31 20:52:23.203 UTC [common.deliver] Handle -> DEBU 199b Attempting to read seek info message from 172.18.0.9:51000" +orderer0.example.com | "2020-08-31 20:52:23.203 UTC [fsblkstorage] waitForBlock -> DEBU 199c Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2020-08-31 20:52:23.203 UTC [fsblkstorage] waitForBlock -> DEBU 199d Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2020-08-31 20:52:23.211 UTC [policies] Evaluate -> DEBU 199e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.211 UTC [policies] Evaluate -> DEBU 199f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:52:23.212 UTC [policies] Evaluate -> DEBU 19a0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.212 UTC [policies] Evaluate -> DEBU 19a1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:52:23.212 UTC [policies] Evaluate -> DEBU 19a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.212 UTC [cauthdsl] func1 -> DEBU 19a3 0xc000431cd0 gate 1598907143212581300 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.212 UTC [cauthdsl] func2 -> DEBU 19a4 0xc000431cd0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.212 UTC [cauthdsl] func2 -> DEBU 19a5 0xc000431cd0 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.213 UTC [cauthdsl] func2 -> DEBU 19a6 0xc000431cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2020-08-31 20:52:23.213 UTC [cauthdsl] func2 -> DEBU 19a7 0xc000431cd0 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.213 UTC [cauthdsl] func1 -> DEBU 19a8 0xc000431cd0 gate 1598907143212581300 evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.213 UTC [policies] Evaluate -> DEBU 19a9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.213 UTC [policies] Evaluate -> DEBU 19aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.213 UTC [policies] Evaluate -> DEBU 19ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.213 UTC [cauthdsl] func1 -> DEBU 19ac 0xc000958550 gate 1598907143213975800 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.214 UTC [cauthdsl] func2 -> DEBU 19ad 0xc000958550 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.214 UTC [cauthdsl] func2 -> DEBU 19ae 0xc000958550 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.214 UTC [cauthdsl] func2 -> DEBU 19af 0xc000958550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-08-31 20:52:23.214 UTC [cauthdsl] func2 -> DEBU 19b0 0xc000958550 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.214 UTC [cauthdsl] func1 -> DEBU 19b1 0xc000958550 gate 1598907143213975800 evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.214 UTC [policies] Evaluate -> DEBU 19b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.215 UTC [policies] Evaluate -> DEBU 19b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.215 UTC [policies] Evaluate -> DEBU 19b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.215 UTC [cauthdsl] func1 -> DEBU 19b5 0xc000958d90 gate 1598907143215455500 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.215 UTC [cauthdsl] func2 -> DEBU 19b6 0xc000958d90 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.215 UTC [cauthdsl] func2 -> DEBU 19b7 0xc000958d90 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.216 UTC [cauthdsl] func2 -> DEBU 19b8 0xc000958d90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-08-31 20:52:23.216 UTC [cauthdsl] func2 -> DEBU 19b9 0xc000958d90 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.216 UTC [cauthdsl] func1 -> DEBU 19ba 0xc000958d90 gate 1598907143215455500 evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.216 UTC [policies] Evaluate -> DEBU 19bb Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.217 UTC [policies] Evaluate -> DEBU 19bc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.217 UTC [policies] func1 -> DEBU 19bd Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2020-08-31 20:52:23.217 UTC [policies] Evaluate -> DEBU 19be Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:52:23.217 UTC [policies] Evaluate -> DEBU 19bf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:52:23.218 UTC [policies] Evaluate -> DEBU 19c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.218 UTC [policies] Evaluate -> DEBU 19c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:52:23.218 UTC [policies] Evaluate -> DEBU 19c2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.218 UTC [cauthdsl] func1 -> DEBU 19c3 0xc000959a80 gate 1598907143218569900 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.218 UTC [cauthdsl] func2 -> DEBU 19c4 0xc000959a80 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.218 UTC [cauthdsl] func2 -> DEBU 19c5 0xc000959a80 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.219 UTC [cauthdsl] func2 -> DEBU 19c6 0xc000959a80 principal matched by identity 0" +orderer0.example.com | "2020-08-31 20:52:23.219 UTC [msp.identity] Verify -> DEBU 19c7 Verify: digest = 00000000 85 32 2d ab 33 7e df dd c8 61 00 5b 74 e7 53 b2 |.2-.3~...a.[t.S.| +orderer0.example.com | 00000010 ae 8f af a3 f0 eb 6d 45 ee 26 01 e0 75 78 13 86 |......mE.&..ux..|" +orderer0.example.com | "2020-08-31 20:52:23.219 UTC [msp.identity] Verify -> DEBU 19c8 Verify: sig = 00000000 30 45 02 21 00 ed 87 0a 29 24 83 cc 01 d2 59 76 |0E.!....)$....Yv| +orderer0.example.com | 00000010 c3 7e 4f d3 4f af fd 9a fc 62 dd f5 55 1a 32 7f |.~O.O....b..U.2.| +orderer0.example.com | 00000020 74 9f 17 dd 82 02 20 51 77 2c 6b 78 18 d2 d3 3a |t..... Qw,kx...:| +orderer0.example.com | 00000030 7d 7d dd d7 d8 42 f9 7e 53 dc 04 57 2b 87 7a f5 |}}...B.~S..W+.z.| +orderer0.example.com | 00000040 37 21 00 cb 20 fe c3 |7!.. ..|" +orderer0.example.com | "2020-08-31 20:52:23.220 UTC [cauthdsl] func2 -> DEBU 19c9 0xc000959a80 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-08-31 20:52:23.220 UTC [cauthdsl] func1 -> DEBU 19ca 0xc000959a80 gate 1598907143218569900 evaluation succeeds" +orderer0.example.com | "2020-08-31 20:52:23.220 UTC [policies] Evaluate -> DEBU 19cb Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:52:23.220 UTC [policies] Evaluate -> DEBU 19cc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:52:23.220 UTC [policies] Evaluate -> DEBU 19cd Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:52:23.220 UTC [policies] Evaluate -> DEBU 19ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:52:23.221 UTC [policies] Evaluate -> DEBU 19cf Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-08-31 20:52:23.221 UTC [policies] Evaluate -> DEBU 19d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-08-31 20:52:23.221 UTC [common.deliver] deliverBlocks -> DEBU 19d1 [channel: businesschannel] Received seekInfo (0xc000a08000) start: > stop: > from 172.18.0.9:51000" +orderer0.example.com | "2020-08-31 20:52:23.221 UTC [fsblkstorage] Next -> DEBU 19d2 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-08-31 20:52:23.221 UTC [fsblkstorage] newBlockfileStream -> DEBU 19d3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97392]" +orderer0.example.com | "2020-08-31 20:52:23.222 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19d4 Remaining bytes=[41179], Going to peek [8] bytes" +orderer0.example.com | "2020-08-31 20:52:23.222 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19d5 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97392], bytesOffset=[97395]}" +orderer0.example.com | "2020-08-31 20:52:23.222 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19d6 blockbytes [41176] read from file [0]" +orderer0.example.com | "2020-08-31 20:52:23.222 UTC [common.deliver] deliverBlocks -> DEBU 19d7 [channel: businesschannel] Delivering block [6] for (0xc000a08000) for 172.18.0.9:51000" +orderer0.example.com | "2020-08-31 20:52:23.223 UTC [common.deliver] deliverBlocks -> DEBU 19d8 [channel: businesschannel] Done delivering to 172.18.0.9:51000 for (0xc000a08000)" +orderer0.example.com | "2020-08-31 20:52:23.223 UTC [fsblkstorage] waitForBlock -> DEBU 19d9 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2020-08-31 20:52:23.223 UTC [fsblkstorage] waitForBlock -> DEBU 19da Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2020-08-31 20:52:23.223 UTC [common.deliver] Handle -> DEBU 19db Waiting for new SeekInfo from 172.18.0.9:51000" +orderer0.example.com | "2020-08-31 20:52:23.224 UTC [common.deliver] Handle -> DEBU 19dc Attempting to read seek info message from 172.18.0.9:51000" +orderer0.example.com | "2020-08-31 20:52:23.230 UTC [grpc] infof -> DEBU 19dd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-08-31 20:52:23.230 UTC [common.deliver] Handle -> WARN 19de Error reading from 172.18.0.9:51000: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-08-31 20:52:23.230 UTC [orderer.common.server] func1 -> DEBU 19df Closing Deliver stream" +orderer0.example.com | "2020-08-31 20:52:23.230 UTC [comm.grpc.server] 1 -> INFO 19e0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51000 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.3532ms +orderer0.example.com | "2020-08-31 20:52:23.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:23.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e2 Sending msg of 28 bytes to 3 on channel testchainid took 8.8µs" +orderer0.example.com | "2020-08-31 20:52:23.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19e3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.8µs " +orderer0.example.com | "2020-08-31 20:52:23.369 UTC [orderer.common.server] Deliver -> DEBU 19e4 Starting new Deliver handler" +orderer0.example.com | "2020-08-31 20:52:23.369 UTC [common.deliver] Handle -> DEBU 19e5 Starting new deliver loop for 172.18.0.9:51002" +orderer0.example.com | "2020-08-31 20:52:23.369 UTC [common.deliver] Handle -> DEBU 19e6 Attempting to read seek info message from 172.18.0.9:51002" +orderer0.example.com | "2020-08-31 20:52:23.370 UTC [policies] Evaluate -> DEBU 19e7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.370 UTC [policies] Evaluate -> DEBU 19e8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:52:23.370 UTC [policies] Evaluate -> DEBU 19e9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.370 UTC [policies] Evaluate -> DEBU 19ea This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:52:23.370 UTC [policies] Evaluate -> DEBU 19eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.370 UTC [cauthdsl] func1 -> DEBU 19ec 0xc000376590 gate 1598907143370876800 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.371 UTC [cauthdsl] func2 -> DEBU 19ed 0xc000376590 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.371 UTC [cauthdsl] func2 -> DEBU 19ee 0xc000376590 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.371 UTC [cauthdsl] func2 -> DEBU 19ef 0xc000376590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2020-08-31 20:52:23.371 UTC [cauthdsl] func2 -> DEBU 19f0 0xc000376590 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.371 UTC [cauthdsl] func1 -> DEBU 19f1 0xc000376590 gate 1598907143370876800 evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.372 UTC [policies] Evaluate -> DEBU 19f2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.372 UTC [policies] Evaluate -> DEBU 19f3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.372 UTC [policies] Evaluate -> DEBU 19f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.372 UTC [cauthdsl] func1 -> DEBU 19f5 0xc000376f20 gate 1598907143372661800 evaluation starts" +peer1.org2.example.com | [188a 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [188b 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [188c 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [188d 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [188e 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [188f 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1890 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1891 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 20 53 3f 44 46 fb 35 f9 09 5a e3 ae 28 fa 4a 17 | S?DF.5..Z..(.J.| +peer0.org1.example.com | 00000020 f6 3d 4e a3 02 20 39 3c c5 dd bb ba d8 37 9f ac |.=N.. 9<.....7..| +peer0.org1.example.com | 00000030 5b d6 24 e2 83 7a f1 c6 ad a8 8e fa e6 9b 54 e7 |[.$..z........T.| +peer0.org1.example.com | 00000040 95 c9 b8 ed ac ba |......| +peer0.org1.example.com | [1556 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1557 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [18b0 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039391f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [18b1 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039391f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [18b2 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039391f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [18b3 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039391f0 principal evaluation fails +peer0.org2.example.com | [18b4 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039391f0 gate 1598907089558621200 evaluation fails +peer0.org2.example.com | [18b5 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [18b6 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [18b7 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [18b8 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003939760 gate 1598907089560802500 evaluation starts +peer0.org2.example.com | [18b9 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003939760 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [18ba 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003939760 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [18bb 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003939760 principal matched by identity 0 +peer0.org2.example.com | [18bc 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 3d c9 53 d4 5c ce a4 15 c7 67 1c 7b 3d 79 3f |.=.S.\....g.{=y?| +peer0.org2.example.com | 00000010 8f 66 12 7b 70 0e 8c 4e d8 3e c0 03 f9 07 bc fb |.f.{p..N.>......| +peer0.org2.example.com | [18bd 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b4 9e 4e 9a fd 5d 98 e5 dd 2b |0E.!....N..]...+| +peer0.org2.example.com | 00000010 b2 70 9a 63 1e 86 43 04 0e aa db 15 c3 6a 46 67 |.p.c..C......jFg| +peer0.org2.example.com | 00000020 5b 3b 73 67 9c 02 20 7c a1 34 d7 9f ec b4 0d b9 |[;sg.. |.4......| +peer0.org2.example.com | 00000030 6f b7 6a 5b a2 db 7a d9 fd 8c 84 8b c6 b9 a5 8d |o.j[..z.........| +peer0.org2.example.com | 00000040 6f 71 81 be fc ea d6 |oq.....| +peer0.org2.example.com | [18be 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003939760 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [18bf 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003939760 gate 1598907089560802500 evaluation succeeds +peer0.org2.example.com | [18c0 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [18c1 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [18c2 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [18c3 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [18c4 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [18c5 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18c6 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [18c7 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 44 e3 35 38 16 92 51 96 79 50 78 35 12 6b 97 |.D.58..Q.yPx5.k.| +peer0.org2.example.com | 00000010 04 a2 7c 72 ff 35 9d 57 a3 4f db ff 36 34 fc 0a |..|r.5.W.O..64..| +peer0.org2.example.com | [18c8 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef de 13 18 e3 79 74 64 07 10 b0 |0E.!......ytd...| +peer0.org2.example.com | 00000010 99 82 b0 12 15 ce 05 96 11 6c c4 99 31 59 33 0e |.........l..1Y3.| +peer0.org2.example.com | 00000020 8c e5 d0 bf 8b 02 20 1b 48 9b 5c 88 9c 3c 02 38 |...... .H.\..<.8| +peer0.org2.example.com | 00000030 fc b2 8a db 39 ca 2e 1a 5b 89 6a 92 df a1 4c 92 |....9...[.j...L.| +peer0.org2.example.com | 00000040 6a 7e 5a 52 3c 85 a1 |j~ZR<..| +peer0.org2.example.com | [18c9 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [18ca 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [18cb 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18cc 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [18cd 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 f4 c4 ab 64 23 45 dc 18 92 58 28 0c 4c 34 74 |"...d#E...X(.L4t| +peer0.org2.example.com | 00000010 79 c7 7f 57 0f b8 7f 32 d5 d9 e7 51 2f 15 27 48 |y..W...2...Q/.'H| +peer0.org2.example.com | [18ce 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 5c 24 30 37 87 8d a5 03 50 26 ce |0D. .\$07....P&.| +peer0.org2.example.com | 00000010 07 8d 52 a6 96 61 57 31 55 3d 02 7c 44 87 a4 3f |..R..aW1U=.|D..?| +peer0.org2.example.com | 00000020 5f 58 b6 03 02 20 0f 46 f1 a2 01 af 47 40 2d 56 |_X... .F....G@-V| +peer0.org2.example.com | 00000030 7b 99 35 f1 a5 b0 45 ac 68 00 c3 c2 2a d5 71 ce |{.5...E.h...*.q.| +peer0.org2.example.com | 00000040 51 95 21 29 db 9e |Q.!)..| +peer0.org2.example.com | [18cf 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [18d0 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18d1 08-31 20:51:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18d2 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [18d3 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:23.372 UTC [cauthdsl] func2 -> DEBU 19f6 0xc000376f20 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.372 UTC [cauthdsl] func2 -> DEBU 19f7 0xc000376f20 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.373 UTC [cauthdsl] func2 -> DEBU 19f8 0xc000376f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-08-31 20:52:23.373 UTC [cauthdsl] func2 -> DEBU 19f9 0xc000376f20 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.373 UTC [cauthdsl] func1 -> DEBU 19fa 0xc000376f20 gate 1598907143372661800 evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.373 UTC [policies] Evaluate -> DEBU 19fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.373 UTC [policies] Evaluate -> DEBU 19fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.374 UTC [policies] Evaluate -> DEBU 19fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.374 UTC [cauthdsl] func1 -> DEBU 19fe 0xc0003779f0 gate 1598907143374311300 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.374 UTC [cauthdsl] func2 -> DEBU 19ff 0xc0003779f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.374 UTC [cauthdsl] func2 -> DEBU 1a00 0xc0003779f0 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.374 UTC [cauthdsl] func2 -> DEBU 1a01 0xc0003779f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-08-31 20:52:23.374 UTC [cauthdsl] func2 -> DEBU 1a02 0xc0003779f0 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.375 UTC [cauthdsl] func1 -> DEBU 1a03 0xc0003779f0 gate 1598907143374311300 evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.375 UTC [policies] Evaluate -> DEBU 1a04 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.375 UTC [policies] Evaluate -> DEBU 1a05 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.375 UTC [policies] func1 -> DEBU 1a06 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +orderer0.example.com | "2020-08-31 20:52:23.375 UTC [policies] Evaluate -> DEBU 1a07 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:52:23.375 UTC [policies] Evaluate -> DEBU 1a08 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:52:23.376 UTC [policies] Evaluate -> DEBU 1a09 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.376 UTC [policies] Evaluate -> DEBU 1a0a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:52:23.376 UTC [policies] Evaluate -> DEBU 1a0b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.376 UTC [cauthdsl] func1 -> DEBU 1a0c 0xc0003689f0 gate 1598907143376500400 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.376 UTC [cauthdsl] func2 -> DEBU 1a0d 0xc0003689f0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.376 UTC [cauthdsl] func2 -> DEBU 1a0e 0xc0003689f0 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.377 UTC [cauthdsl] func2 -> DEBU 1a0f 0xc0003689f0 principal matched by identity 0" +orderer0.example.com | "2020-08-31 20:52:23.377 UTC [msp.identity] Verify -> DEBU 1a10 Verify: digest = 00000000 70 8a 93 ee fc 64 b4 7c f6 5f 91 3c 32 f8 ef c7 |p....d.|._.<2...| +orderer0.example.com | 00000010 9c 48 ab 86 65 f0 39 0b 8a 33 dc d0 e7 f3 55 20 |.H..e.9..3....U |" +orderer0.example.com | "2020-08-31 20:52:23.377 UTC [msp.identity] Verify -> DEBU 1a11 Verify: sig = 00000000 30 45 02 21 00 e4 d1 fb 9d 32 6c f9 f6 ab 7f bd |0E.!.....2l.....| +orderer0.example.com | 00000010 3f 76 cc 26 34 e0 95 86 72 09 ab 52 f5 74 9e 31 |?v.&4...r..R.t.1| +orderer0.example.com | 00000020 c6 30 de 3c 5e 02 20 5d 1f 40 1e ac e0 08 93 e0 |.0.<^. ].@......| +orderer0.example.com | 00000030 b6 a3 a5 d3 e1 e0 5c 1a 4f 07 d3 19 c1 17 78 1d |......\.O.....x.| +orderer0.example.com | 00000040 41 f1 3b 09 d0 f7 24 |A.;...$|" +orderer0.example.com | "2020-08-31 20:52:23.377 UTC [cauthdsl] func2 -> DEBU 1a12 0xc0003689f0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-08-31 20:52:23.377 UTC [cauthdsl] func1 -> DEBU 1a13 0xc0003689f0 gate 1598907143376500400 evaluation succeeds" +orderer0.example.com | "2020-08-31 20:52:23.378 UTC [policies] Evaluate -> DEBU 1a14 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:52:23.378 UTC [policies] Evaluate -> DEBU 1a15 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:52:23.378 UTC [policies] Evaluate -> DEBU 1a16 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:52:23.378 UTC [policies] Evaluate -> DEBU 1a17 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:52:23.378 UTC [policies] Evaluate -> DEBU 1a18 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-08-31 20:52:23.378 UTC [policies] Evaluate -> DEBU 1a19 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-08-31 20:52:23.378 UTC [common.deliver] deliverBlocks -> DEBU 1a1a [channel: businesschannel] Received seekInfo (0xc000a085c0) start: > stop: > from 172.18.0.9:51002" +peer0.org2.example.com | [18d4 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [18d5 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [18d6 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18d7 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [18d8 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [18d9 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [18da 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [18db 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [18dc 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [18dd 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003927530 gate 1598907089600463400 evaluation starts +peer0.org2.example.com | [18de 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003927530 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [18df 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003927530 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [18e0 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003927530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [18e1 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003927530 principal evaluation fails +peer0.org2.example.com | [18e2 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003927530 gate 1598907089600463400 evaluation fails +peer0.org2.example.com | [18e3 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [18e4 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [18e5 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [18e6 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003927aa0 gate 1598907089600778600 evaluation starts +peer0.org2.example.com | [18e7 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003927aa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [18e8 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003927aa0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [18e9 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003927aa0 principal matched by identity 0 +peer0.org2.example.com | [18ea 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e a2 b3 d2 6f 0f 00 f3 8d 61 2f d7 76 5d 1e 76 |~...o....a/.v].v| +peer0.org2.example.com | 00000010 e4 c1 1d 48 ca 30 34 a8 07 38 10 24 b8 e7 1c be |...H.04..8.$....| +peer0.org2.example.com | [18eb 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 ff c2 cc 3b ff 9d 47 d4 86 4d 78 |0D. P...;..G..Mx| +peer0.org2.example.com | 00000010 7c dc 23 cf d9 25 91 2b 0a 97 78 ed a8 f5 6f 4b ||.#..%.+..x...oK| +peer0.org2.example.com | 00000020 5d f4 97 7a 02 20 4f 31 2a 25 d9 48 5d b9 d3 6d |]..z. O1*%.H]..m| +peer1.org1.example.com | [1715 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1716 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1717 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1718 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1719 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [171a 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [171b 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e32ce0 gate 1598907093492329300 evaluation starts +peer1.org1.example.com | [171c 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e32ce0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [171d 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e32ce0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [171e 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e32ce0 principal matched by identity 0 +peer1.org1.example.com | [171f 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 b3 5c 42 54 25 30 be b4 7c 78 b0 29 0c aa |...\BT%0..|x.)..| +peer1.org1.example.com | 00000010 90 ce 7f 27 82 1e a3 94 11 f2 89 16 2f a4 cd 3c |...'......../..<| +peer1.org1.example.com | [1720 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 d3 29 2b 65 f1 14 85 3c 04 39 |0E.!...)+e...<.9| +peer1.org1.example.com | 00000010 e3 96 d4 c0 95 94 3b c7 9d bf 68 83 8d 46 4e ac |......;...h..FN.| +peer1.org1.example.com | 00000020 d8 3b 75 e3 90 02 20 0b e2 04 10 ce d3 d7 98 df |.;u... .........| +peer1.org1.example.com | 00000030 70 5c 55 cc c1 a8 89 82 51 0a 97 83 5a b9 c6 62 |p\U.....Q...Z..b| +peer1.org1.example.com | 00000040 a5 2a 5c 68 25 20 91 |.*\h% .| +peer1.org1.example.com | [1721 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e32ce0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1722 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e32ce0 gate 1598907093492329300 evaluation succeeds +peer1.org1.example.com | [1723 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1724 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1725 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1726 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1727 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1728 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1729 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [172a 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [172b 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [172c 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [172d 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [172e 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [172f 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [1730 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1731 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1732 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1733 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1734 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\324\357\2301\237 \253\\1i\2771E\320e\r\276o\002 d\255\220r\211}\252=\343\261\034kTc\276\223q\200\330B\351)\r\324\224\342\003V\010\365v\240" > +orderer0.example.com | "2020-08-31 20:52:23.379 UTC [fsblkstorage] Next -> DEBU 1a1b Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-08-31 20:52:23.379 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a1c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +orderer0.example.com | "2020-08-31 20:52:23.379 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a1d Remaining bytes=[138571], Going to peek [8] bytes" +orderer0.example.com | "2020-08-31 20:52:23.379 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a1e Returning blockbytes - length=[28472], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +orderer0.example.com | "2020-08-31 20:52:23.379 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a1f blockbytes [28472] read from file [0]" +orderer0.example.com | "2020-08-31 20:52:23.380 UTC [common.deliver] deliverBlocks -> DEBU 1a20 [channel: businesschannel] Delivering block [0] for (0xc000a085c0) for 172.18.0.9:51002" +orderer0.example.com | "2020-08-31 20:52:23.380 UTC [common.deliver] deliverBlocks -> DEBU 1a21 [channel: businesschannel] Done delivering to 172.18.0.9:51002 for (0xc000a085c0)" +orderer0.example.com | "2020-08-31 20:52:23.380 UTC [common.deliver] Handle -> DEBU 1a22 Waiting for new SeekInfo from 172.18.0.9:51002" +orderer0.example.com | "2020-08-31 20:52:23.380 UTC [common.deliver] Handle -> DEBU 1a23 Attempting to read seek info message from 172.18.0.9:51002" +orderer0.example.com | "2020-08-31 20:52:23.381 UTC [fsblkstorage] waitForBlock -> DEBU 1a24 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2020-08-31 20:52:23.381 UTC [fsblkstorage] waitForBlock -> DEBU 1a25 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2020-08-31 20:52:23.392 UTC [grpc] infof -> DEBU 1a26 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-08-31 20:52:23.394 UTC [common.deliver] Handle -> WARN 1a27 Error reading from 172.18.0.9:51002: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-08-31 20:52:23.394 UTC [orderer.common.server] func1 -> DEBU 1a28 Closing Deliver stream" +orderer0.example.com | "2020-08-31 20:52:23.396 UTC [comm.grpc.server] 1 -> INFO 1a29 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51002 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.522ms +orderer0.example.com | "2020-08-31 20:52:23.558 UTC [orderer.common.server] Deliver -> DEBU 1a2a Starting new Deliver handler" +orderer0.example.com | "2020-08-31 20:52:23.558 UTC [common.deliver] Handle -> DEBU 1a2b Starting new deliver loop for 172.18.0.9:51004" +orderer0.example.com | "2020-08-31 20:52:23.558 UTC [common.deliver] Handle -> DEBU 1a2c Attempting to read seek info message from 172.18.0.9:51004" +orderer0.example.com | "2020-08-31 20:52:23.559 UTC [policies] Evaluate -> DEBU 1a2d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.559 UTC [policies] Evaluate -> DEBU 1a2e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:52:23.559 UTC [policies] Evaluate -> DEBU 1a2f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.560 UTC [policies] Evaluate -> DEBU 1a30 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:52:23.560 UTC [policies] Evaluate -> DEBU 1a31 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.560 UTC [cauthdsl] func1 -> DEBU 1a32 0xc00004f930 gate 1598907143560161700 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.560 UTC [cauthdsl] func2 -> DEBU 1a33 0xc00004f930 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.560 UTC [cauthdsl] func2 -> DEBU 1a34 0xc00004f930 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.560 UTC [cauthdsl] func2 -> DEBU 1a35 0xc00004f930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2020-08-31 20:52:23.560 UTC [cauthdsl] func2 -> DEBU 1a36 0xc00004f930 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.560 UTC [cauthdsl] func1 -> DEBU 1a37 0xc00004f930 gate 1598907143560161700 evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.561 UTC [policies] Evaluate -> DEBU 1a38 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.561 UTC [policies] Evaluate -> DEBU 1a39 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.561 UTC [policies] Evaluate -> DEBU 1a3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.561 UTC [cauthdsl] func1 -> DEBU 1a3b 0xc000110ce0 gate 1598907143561501900 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.561 UTC [cauthdsl] func2 -> DEBU 1a3c 0xc000110ce0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.561 UTC [cauthdsl] func2 -> DEBU 1a3d 0xc000110ce0 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.562 UTC [cauthdsl] func2 -> DEBU 1a3e 0xc000110ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-08-31 20:52:23.562 UTC [cauthdsl] func2 -> DEBU 1a3f 0xc000110ce0 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.562 UTC [cauthdsl] func1 -> DEBU 1a40 0xc000110ce0 gate 1598907143561501900 evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.562 UTC [policies] Evaluate -> DEBU 1a41 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.562 UTC [policies] Evaluate -> DEBU 1a42 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.562 UTC [policies] Evaluate -> DEBU 1a43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.562 UTC [cauthdsl] func1 -> DEBU 1a44 0xc000111850 gate 1598907143562867800 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.562 UTC [cauthdsl] func2 -> DEBU 1a45 0xc000111850 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.563 UTC [cauthdsl] func2 -> DEBU 1a46 0xc000111850 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.563 UTC [cauthdsl] func2 -> DEBU 1a47 0xc000111850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-08-31 20:52:23.563 UTC [cauthdsl] func2 -> DEBU 1a48 0xc000111850 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.563 UTC [cauthdsl] func1 -> DEBU 1a49 0xc000111850 gate 1598907143562867800 evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.563 UTC [policies] Evaluate -> DEBU 1a4a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.563 UTC [policies] Evaluate -> DEBU 1a4b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.564 UTC [policies] func1 -> DEBU 1a4c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2020-08-31 20:52:23.564 UTC [policies] Evaluate -> DEBU 1a4d Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:52:23.564 UTC [policies] Evaluate -> DEBU 1a4e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:52:23.564 UTC [policies] Evaluate -> DEBU 1a4f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org2.example.com | [1892 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\346/4\206I\374R[\200B\005\300v\221\035p\244\364Z\222\340q\256m\275\3246x-\324" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [1893 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\346/4\206I\374R[\200B\005\300v\221\035p\244\364Z\222\340q\256m\275\3246x-\324" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [1894 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1895 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\346/4\206I\374R[\200B\005\300v\221\035p\244\364Z\222\340q\256m\275\3246x-\324" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [1896 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1897 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 b3 5c 42 54 25 30 be b4 7c 78 b0 29 0c aa |...\BT%0..|x.)..| +peer1.org2.example.com | 00000010 90 ce 7f 27 82 1e a3 94 11 f2 89 16 2f a4 cd 3c |...'......../..<| +peer1.org2.example.com | [1898 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 d3 29 2b 65 f1 14 85 3c 04 39 |0E.!...)+e...<.9| +peer1.org2.example.com | 00000010 e3 96 d4 c0 95 94 3b c7 9d bf 68 83 8d 46 4e ac |......;...h..FN.| +peer1.org2.example.com | 00000020 d8 3b 75 e3 90 02 20 0b e2 04 10 ce d3 d7 98 df |.;u... .........| +peer1.org2.example.com | 00000030 70 5c 55 cc c1 a8 89 82 51 0a 97 83 5a b9 c6 62 |p\U.....Q...Z..b| +peer1.org2.example.com | 00000040 a5 2a 5c 68 25 20 91 |.*\h% .| +peer1.org2.example.com | [1899 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [189a 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 7a 1a ab 73 e7 94 f8 e5 dd 90 |0E.!..z..s......| +peer1.org2.example.com | 00000010 7e f8 8c b6 fe 28 e9 74 78 22 b3 a4 37 37 c6 48 |~....(.tx"..77.H| +peer1.org2.example.com | 00000020 d5 9a 7a 10 d2 02 20 67 3e e6 2f 34 86 49 fc 52 |..z... g>./4.I.R| +peer1.org2.example.com | 00000030 5b 80 42 05 c0 76 91 1d 70 a4 f4 5a 92 e0 71 ae |[.B..v..p..Z..q.| +peer1.org2.example.com | 00000040 6d bd d4 36 78 2d d4 |m..6x-.| +peer1.org2.example.com | [189b 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [189c 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [189d 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [189e 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [189f 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [18a0 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18a1 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18a2 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18a3 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [18a4 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18a5 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18a6 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [18a7 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [18a8 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1558 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1559 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [155a 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [155b 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [155c 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [155d 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [155e 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [155f 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1560 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1561 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1562 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" secret_envelope: > alive:\005\307\340" > +peer0.org1.example.com | [1563 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [1564 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1565 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1566 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1567 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1568 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1569 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 01 23 82 bf 60 b9 df a5 a4 87 79 a9 c0 93 8f |..#..`.....y....| +peer0.org1.example.com | 00000010 96 b1 1d bc 55 99 23 1b a1 68 c3 43 6d 81 5a c2 |....U.#..h.Cm.Z.| +peer0.org1.example.com | [156a 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 95 0a 7c 82 f3 8a 52 4f 41 85 |0E.!....|...ROA.| +peer0.org1.example.com | 00000010 07 e5 ae 36 59 aa ea 29 35 a5 e8 8c 74 b1 2a 72 |...6Y..)5...t.*r| +peer0.org1.example.com | 00000020 d4 44 6f 0a ce 02 20 59 64 55 00 21 05 6c 9f d0 |.Do... YdU.!.l..| +peer0.org1.example.com | 00000030 a2 80 94 34 ce 87 24 fa 0f 23 98 7a b6 35 33 5c |...4..$..#.z.53\| +peer0.org1.example.com | 00000040 c5 9b c7 ec 3c e2 04 |....<..| +peer0.org1.example.com | [156b 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [156c 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" lastAliveTS: 1598907045315872200, 32 but got ts: inc_num:1598907045315872200 seq_num:31 +peer0.org1.example.com | [156d 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [156e 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [156f 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1570 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1571 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1572 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1573 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1735 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [1736 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1737 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1738 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1739 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [173a 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [173b 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [173c 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [173d 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [173e 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [173f 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1740 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1741 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 84 f7 ec dc 25 5f e8 3a ac cc 14 e7 20 63 7f |F....%_.:.... c.| +peer1.org1.example.com | 00000010 bf f4 7b dd eb bd 85 d7 f1 4b 2e 1b f2 07 66 c2 |..{......K....f.| +peer1.org1.example.com | [1742 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 42 ab 9c 92 48 18 a7 24 e9 47 |0E.!..B...H..$.G| +peer1.org1.example.com | 00000010 c6 37 fc ec 20 b0 30 09 e1 29 6e 6c c1 fb b3 88 |.7.. .0..)nl....| +peer1.org1.example.com | 00000020 95 81 0c 1c ad 02 20 1e 53 3a 70 63 5f f2 25 11 |...... .S:pc_.%.| +peer1.org1.example.com | 00000030 52 20 86 d3 eb 20 49 ed 11 15 64 ec 97 d7 43 f6 |R ... I...d...C.| +peer1.org1.example.com | 00000040 d3 a8 8d 04 6f dd b1 |....o..| +peer1.org1.example.com | [1743 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [1744 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 08 f2 9e 49 68 32 32 66 20 1a |0E.!.....Ih22f .| +peer1.org1.example.com | 00000010 bf 2f 46 9b c1 e4 6f d7 56 3f 86 35 a4 99 f7 e6 |./F...o.V?.5....| +peer1.org1.example.com | 00000020 09 a2 20 f2 88 02 20 74 61 0e 14 ca ba 9f f3 bf |.. ... ta.......| +peer1.org1.example.com | 00000030 02 12 c3 76 c6 9f ea a6 d7 c4 1a 9f a9 d6 7a d4 |...v..........z.| +peer1.org1.example.com | 00000040 cf ee 67 a6 16 d2 0b |..g....| +peer1.org1.example.com | [1745 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1746 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [1747 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1748 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1749 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [174a 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [174b 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [174c 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [174d 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [174e 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [174f 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1750 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1751 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\324\357\2301\237 \253\\1i\2771E\320e\r\276o\002 d\255\220r\211}\252=\343\261\034kTc\276\223q\200\330B\351)\r\324\224\342\003V\010\365v\240" > +peer1.org1.example.com | [1752 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [1753 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1754 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1755 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1756 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1757 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1758 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1759 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [175a 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [175b 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [175c 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [175d 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [175e 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [175f 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org1.example.com | [1760 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [1761 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [1762 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [1763 08-31 20:51:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 da 39 b9 d5 bd 5a 60 df 00 5f a9 ce 70 9d 7c d3 |.9...Z`.._..p.|.| +peer1.org1.example.com | 00000010 51 af 2d be c1 c1 fe 32 e1 ba 80 0d 0e 48 97 3b |Q.-....2.....H.;| +peer1.org1.example.com | [1764 08-31 20:51:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 b8 8c 3b 57 90 42 e6 a8 52 fd |0E.!....;W.B..R.| +peer1.org1.example.com | 00000010 d1 5d 7f 7f 59 34 47 d3 f3 e9 c7 88 24 04 5d 64 |.]..Y4G.....$.]d| +peer1.org1.example.com | 00000020 0f 1d fa dd 50 02 20 6f 91 67 ec 3b 54 40 cf 76 |....P. o.g.;T@.v| +peer1.org1.example.com | 00000030 e9 24 aa d2 72 ff 59 46 a7 80 74 e1 24 64 0c 64 |.$..r.YF..t.$d.d| +peer1.org1.example.com | 00000040 12 5c 6d f4 4a cd b6 |.\m.J..| +peer1.org1.example.com | [1765 08-31 20:51:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1766 08-31 20:51:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1767 08-31 20:51:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1768 08-31 20:51:33.77 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [1769 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:11080509220039814310 tag:EMPTY mem_req:\302\216S\276\256bY\002 \0215\226\376\354\221X\201\002\031\262Y\225\352\345I\331\351\215\362?\352\272\262\ti\027\310\256m\273c" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [176a 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:11080509220039814310 tag:EMPTY mem_req:\302\216S\276\256bY\002 \0215\226\376\354\221X\201\002\031\262Y\225\352\345I\331\351\215\362?\352\272\262\ti\027\310\256m\273c" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes +peer1.org1.example.com | [176b 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [176c 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 11080509220039814310, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes +peer1.org1.example.com | [176d 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 11080509220039814310, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes +peer1.org1.example.com | [176e 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [176f 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 11080509220039814310, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes +peer1.org1.example.com | [1770 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1771 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 38 f7 03 a3 ec c8 c5 a0 53 a1 da 5d a5 c9 ac |.8.......S..]...| +peer1.org1.example.com | 00000010 a1 e9 6a d5 e6 30 d3 4d 91 a8 d0 0b b9 77 a2 aa |..j..0.M.....w..| +peer1.org1.example.com | [1772 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 c8 1b d1 fb 63 f4 f3 dd 45 18 eb |0D. .....c...E..| +peer1.org1.example.com | 00000010 06 98 a8 95 67 20 9c 17 b8 9d 9d 27 99 53 87 f4 |....g .....'.S..| +peer1.org1.example.com | 00000020 24 56 74 78 02 20 1d b3 30 63 83 e3 0b 49 db 56 |$Vtx. ..0c...I.V| +peer1.org1.example.com | 00000030 2f 0b da 29 a4 5d b7 e6 b7 34 08 b5 23 50 30 0c |/..).]...4..#P0.| +peer1.org1.example.com | 00000040 37 ca 78 54 76 bb |7.xTv.| +peer1.org1.example.com | [1773 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [1774 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 7a c0 ca f2 3b 7b e1 2f 19 e8 |0E.!..z...;{./..| +peer1.org1.example.com | 00000010 0b 00 d3 a4 29 45 b5 29 cd e4 ff 1c ec ac 03 01 |....)E.)........| +peer1.org1.example.com | 00000020 09 8a 05 ed 6d 02 20 2a e6 89 26 e1 27 92 05 eb |....m. *..&.'...| +peer1.org1.example.com | 00000030 f8 8a 3e 26 2c 3e f1 df 5f 86 ee 6c 98 38 c3 4d |..>&,>.._..l.8.M| +peer1.org1.example.com | 00000040 01 2c 7d d8 b6 24 8b |.,}..$.| +peer1.org1.example.com | [1775 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1776 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1777 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1778 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1779 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [177a 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [177b 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [177c 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [177e 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [177d 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [177f 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1780 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1781 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1782 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1783 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1784 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1785 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1786 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1787 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1788 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1789 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [178a 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [178b 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [178c 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [178d 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea18e0 gate 1598907093967806600 evaluation starts +peer1.org1.example.com | [178e 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea18e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [178f 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea18e0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1790 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea18e0 principal matched by identity 0 +peer1.org1.example.com | [1791 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [1792 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [1793 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea18e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1794 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea18e0 gate 1598907093967806600 evaluation succeeds +peer1.org1.example.com | [1795 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1796 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1797 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1798 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1799 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [179a 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [179b 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [179c 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [179d 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [179e 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [179f 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [17a0 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [17a1 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [17a2 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [17a3 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [17a4 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [17a5 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebd8c0 gate 1598907093972665600 evaluation starts +peer1.org1.example.com | [17a6 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebd8c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [17a7 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebd8c0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [17a8 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebd8c0 principal matched by identity 0 +peer0.org2.example.com | 00000030 b9 b2 7f 59 9b 4b 02 8f 1c 6a 6a 0f 80 d7 76 96 |...Y.K...jj...v.| +peer0.org2.example.com | 00000040 7f 18 8f f4 23 38 |....#8| +peer0.org2.example.com | [18ec 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003927aa0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [18ed 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003927aa0 gate 1598907089600778600 evaluation succeeds +peer0.org2.example.com | [18ee 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [18ef 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [18f0 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [18f1 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [18f2 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [18f3 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [18f4 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [18f5 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [18f6 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [18f7 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18f8 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18f9 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [18fa 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [18fb 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18fc 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18fd 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [18fe 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [18ff 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [1900 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1901 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1902 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1903 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1904 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1905 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1906 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1907 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1908 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1909 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [190a 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [190b 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [190c 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [190d 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [190e 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [190f 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1910 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 ef c5 6b 52 32 b6 34 b6 2c ed f0 2f e9 6f 9b | ..kR2.4.,../.o.| +peer0.org2.example.com | 00000010 da 4b 4f 0c fb 16 0e d2 10 ad d3 a9 1c 3f 49 ba |.KO..........?I.| +peer0.org2.example.com | [1911 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a ab d8 49 54 34 8c 63 5d 47 4e 8d |0D. Z..IT4.c]GN.| +peer0.org2.example.com | 00000010 e3 7d eb 56 47 3a 43 25 7f db 6f d6 71 3e c1 64 |.}.VG:C%..o.q>.d| +peer0.org2.example.com | 00000020 f8 2d 64 48 02 20 65 1c 28 34 38 e1 96 bb af 9d |.-dH. e.(48.....| +peer0.org2.example.com | 00000030 ad 26 80 c8 d3 c3 39 ab b4 6c 2c c7 e6 72 86 83 |.&....9..l,..r..| +peer0.org2.example.com | 00000040 15 47 d2 5b 48 62 |.G.[Hb| +peer0.org2.example.com | [1912 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1913 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1914 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1915 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1916 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1917 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1918 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1919 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [191a 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [191b 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [191c 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [191d 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [191e 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [191f 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1920 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1921 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1922 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1923 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1924 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1925 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1926 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1927 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1928 08-31 20:51:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1929 08-31 20:51:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [192a 08-31 20:51:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [192b 08-31 20:51:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [192c 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [192d 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [192e 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [192f 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1931 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1930 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1932 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1933 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1934 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1935 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1936 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1937 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1938 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1939 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [193a 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [193b 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [193c 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [193d 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [193e 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [193f 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1e7a0 gate 1598907090232407300 evaluation starts +peer0.org2.example.com | [1940 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1e7a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1941 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1e7a0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1942 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1e7a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1943 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1e7a0 principal evaluation fails +peer0.org2.example.com | [1944 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1e7a0 gate 1598907090232407300 evaluation fails +peer0.org2.example.com | [1945 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1946 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1947 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1948 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1ed10 gate 1598907090233326100 evaluation starts +peer0.org2.example.com | [1949 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1ed10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [194a 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1ed10 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [194b 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1ed10 principal matched by identity 0 +peer0.org2.example.com | [194c 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [194d 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [194e 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1ed10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [194f 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a1ed10 gate 1598907090233326100 evaluation succeeds +peer0.org2.example.com | [1950 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1951 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1952 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1953 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1954 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [1955 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | "2020-08-31 20:52:23.564 UTC [policies] Evaluate -> DEBU 1a50 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:52:23.564 UTC [policies] Evaluate -> DEBU 1a51 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.564 UTC [cauthdsl] func1 -> DEBU 1a52 0xc00035e820 gate 1598907143564675700 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.565 UTC [cauthdsl] func2 -> DEBU 1a53 0xc00035e820 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.565 UTC [cauthdsl] func2 -> DEBU 1a54 0xc00035e820 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.565 UTC [cauthdsl] func2 -> DEBU 1a55 0xc00035e820 principal matched by identity 0" +orderer0.example.com | "2020-08-31 20:52:23.565 UTC [msp.identity] Verify -> DEBU 1a56 Verify: digest = 00000000 7c 90 27 c0 43 71 ee e3 20 08 3e 10 ad 1e 27 85 ||.'.Cq.. .>...'.| +orderer0.example.com | 00000010 4d 2d 99 0e 4c 13 28 ae 10 25 08 c2 85 91 3c dd |M-..L.(..%....<.|" +orderer0.example.com | "2020-08-31 20:52:23.565 UTC [msp.identity] Verify -> DEBU 1a57 Verify: sig = 00000000 30 44 02 20 08 00 4e 3c bf cd 0b 0b ee 05 0d 24 |0D. ..N<.......$| +orderer0.example.com | 00000010 84 52 64 d1 83 0a be 84 a1 75 28 3e 01 b6 28 fa |.Rd......u(>..(.| +orderer0.example.com | 00000020 35 aa 5e e7 02 20 34 35 79 fc ca 04 ea 51 5a 4f |5.^.. 45y....QZO| +orderer0.example.com | 00000030 1c e3 72 c5 a3 82 06 5f 60 85 23 06 8e 18 57 35 |..r...._`.#...W5| +orderer0.example.com | 00000040 e5 da 92 01 63 6d |....cm|" +orderer0.example.com | "2020-08-31 20:52:23.566 UTC [cauthdsl] func2 -> DEBU 1a58 0xc00035e820 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-08-31 20:52:23.566 UTC [cauthdsl] func1 -> DEBU 1a59 0xc00035e820 gate 1598907143564675700 evaluation succeeds" +orderer0.example.com | "2020-08-31 20:52:23.566 UTC [policies] Evaluate -> DEBU 1a5a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:52:23.566 UTC [policies] Evaluate -> DEBU 1a5b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:52:23.566 UTC [policies] Evaluate -> DEBU 1a5c Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:52:23.566 UTC [policies] Evaluate -> DEBU 1a5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:52:23.566 UTC [policies] Evaluate -> DEBU 1a5e Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-08-31 20:52:23.566 UTC [policies] Evaluate -> DEBU 1a5f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-08-31 20:52:23.566 UTC [common.deliver] deliverBlocks -> DEBU 1a60 [channel: businesschannel] Received seekInfo (0xc000a088c0) start: > stop: > from 172.18.0.9:51004" +orderer0.example.com | "2020-08-31 20:52:23.567 UTC [fsblkstorage] Next -> DEBU 1a61 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-08-31 20:52:23.567 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a62 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[28475]" +orderer0.example.com | "2020-08-31 20:52:23.567 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a63 Remaining bytes=[110096], Going to peek [8] bytes" +orderer0.example.com | "2020-08-31 20:52:23.567 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a64 Returning blockbytes - length=[28165], placementInfo={fileNum=[0], startOffset=[28475], bytesOffset=[28478]}" +orderer0.example.com | "2020-08-31 20:52:23.568 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a65 blockbytes [28165] read from file [0]" +orderer0.example.com | "2020-08-31 20:52:23.569 UTC [common.deliver] deliverBlocks -> DEBU 1a66 [channel: businesschannel] Delivering block [1] for (0xc000a088c0) for 172.18.0.9:51004" +orderer0.example.com | "2020-08-31 20:52:23.569 UTC [common.deliver] deliverBlocks -> DEBU 1a67 [channel: businesschannel] Done delivering to 172.18.0.9:51004 for (0xc000a088c0)" +orderer0.example.com | "2020-08-31 20:52:23.569 UTC [common.deliver] Handle -> DEBU 1a68 Waiting for new SeekInfo from 172.18.0.9:51004" +orderer0.example.com | "2020-08-31 20:52:23.570 UTC [common.deliver] Handle -> DEBU 1a69 Attempting to read seek info message from 172.18.0.9:51004" +orderer0.example.com | "2020-08-31 20:52:23.570 UTC [fsblkstorage] waitForBlock -> DEBU 1a6a Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2020-08-31 20:52:23.571 UTC [fsblkstorage] waitForBlock -> DEBU 1a6b Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2020-08-31 20:52:23.577 UTC [grpc] infof -> DEBU 1a6c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-08-31 20:52:23.577 UTC [common.deliver] Handle -> WARN 1a6d Error reading from 172.18.0.9:51004: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-08-31 20:52:23.577 UTC [orderer.common.server] func1 -> DEBU 1a6e Closing Deliver stream" +orderer0.example.com | "2020-08-31 20:52:23.577 UTC [comm.grpc.server] 1 -> INFO 1a6f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51004 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.5749ms +orderer0.example.com | "2020-08-31 20:52:23.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a70 Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +orderer0.example.com | "2020-08-31 20:52:23.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a71 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 151µs " +orderer0.example.com | "2020-08-31 20:52:23.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a72 Sending msg of 28 bytes to 3 on channel businesschannel took 10.4µs" +orderer0.example.com | "2020-08-31 20:52:23.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 439.7µs " +orderer0.example.com | "2020-08-31 20:52:23.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a74 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:23.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a75 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:23.740 UTC [orderer.common.server] Deliver -> DEBU 1a76 Starting new Deliver handler" +orderer0.example.com | "2020-08-31 20:52:23.740 UTC [common.deliver] Handle -> DEBU 1a77 Starting new deliver loop for 172.18.0.9:51006" +orderer0.example.com | "2020-08-31 20:52:23.741 UTC [common.deliver] Handle -> DEBU 1a78 Attempting to read seek info message from 172.18.0.9:51006" +orderer0.example.com | "2020-08-31 20:52:23.741 UTC [policies] Evaluate -> DEBU 1a79 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.741 UTC [policies] Evaluate -> DEBU 1a7a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:52:23.741 UTC [policies] Evaluate -> DEBU 1a7b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.741 UTC [policies] Evaluate -> DEBU 1a7c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:52:23.741 UTC [policies] Evaluate -> DEBU 1a7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org1.example.com | [1574 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1575 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1576 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1577 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1578 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1579 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [157a 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [157b 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [157c 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [157d 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [157e 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [157f 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1580 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1581 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1582 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1583 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1584 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1585 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1586 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1587 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1588 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1589 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [158a 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [158b 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [158c 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [158d 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [158e 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [158f 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1590 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1591 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1592 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1593 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18a9 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\346/4\206I\374R[\200B\005\300v\221\035p\244\364Z\222\340q\256m\275\3246x-\324" > > alive:\301d\370-dH\002 e\034(48\341\226\273\257\235\255&\200\310\323\3039\253\264l,\307\346r\206\203\025G\322[Hb" > +peer1.org2.example.com | [18aa 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [18ab 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [18ac 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18ad 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18ae 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18af 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18b0 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18b1 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18b2 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [18b3 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18b4 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [18b5 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18b6 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [18b7 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [18b8 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18b9 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [18ba 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [18bb 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [18bc 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [18bd 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [18be 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [18bf 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376bcf0 gate 1598907093574147000 evaluation starts +peer1.org2.example.com | [18c0 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376bcf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [18c1 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376bcf0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [18c2 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376bcf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [18c3 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376bcf0 principal evaluation fails +peer1.org2.example.com | [18c4 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00376bcf0 gate 1598907093574147000 evaluation fails +peer1.org2.example.com | [18c5 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:23.742 UTC [cauthdsl] func1 -> DEBU 1a7e 0xc000e775c0 gate 1598907143741943800 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.742 UTC [cauthdsl] func2 -> DEBU 1a7f 0xc000e775c0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.742 UTC [cauthdsl] func2 -> DEBU 1a80 0xc000e775c0 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.742 UTC [cauthdsl] func2 -> DEBU 1a81 0xc000e775c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2020-08-31 20:52:23.742 UTC [cauthdsl] func2 -> DEBU 1a82 0xc000e775c0 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.742 UTC [cauthdsl] func1 -> DEBU 1a83 0xc000e775c0 gate 1598907143741943800 evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.743 UTC [policies] Evaluate -> DEBU 1a84 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.743 UTC [policies] Evaluate -> DEBU 1a85 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.743 UTC [policies] Evaluate -> DEBU 1a86 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.743 UTC [cauthdsl] func1 -> DEBU 1a87 0xc000e77e00 gate 1598907143743536100 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.743 UTC [cauthdsl] func2 -> DEBU 1a88 0xc000e77e00 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.743 UTC [cauthdsl] func2 -> DEBU 1a89 0xc000e77e00 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.743 UTC [cauthdsl] func2 -> DEBU 1a8a 0xc000e77e00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-08-31 20:52:23.744 UTC [cauthdsl] func2 -> DEBU 1a8b 0xc000e77e00 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.744 UTC [cauthdsl] func1 -> DEBU 1a8c 0xc000e77e00 gate 1598907143743536100 evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.744 UTC [policies] Evaluate -> DEBU 1a8d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.744 UTC [policies] Evaluate -> DEBU 1a8e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.744 UTC [policies] Evaluate -> DEBU 1a8f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.744 UTC [cauthdsl] func1 -> DEBU 1a90 0xc00101a640 gate 1598907143744828100 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.745 UTC [cauthdsl] func2 -> DEBU 1a91 0xc00101a640 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.745 UTC [cauthdsl] func2 -> DEBU 1a92 0xc00101a640 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.745 UTC [cauthdsl] func2 -> DEBU 1a93 0xc00101a640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-08-31 20:52:23.745 UTC [cauthdsl] func2 -> DEBU 1a94 0xc00101a640 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.746 UTC [cauthdsl] func1 -> DEBU 1a95 0xc00101a640 gate 1598907143744828100 evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.746 UTC [policies] Evaluate -> DEBU 1a96 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.746 UTC [policies] Evaluate -> DEBU 1a97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.746 UTC [policies] func1 -> DEBU 1a98 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2020-08-31 20:52:23.747 UTC [policies] Evaluate -> DEBU 1a99 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:52:23.747 UTC [policies] Evaluate -> DEBU 1a9a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:52:23.747 UTC [policies] Evaluate -> DEBU 1a9b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.747 UTC [policies] Evaluate -> DEBU 1a9c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:52:23.747 UTC [policies] Evaluate -> DEBU 1a9d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.747 UTC [cauthdsl] func1 -> DEBU 1a9e 0xc00101b330 gate 1598907143747824900 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.747 UTC [cauthdsl] func2 -> DEBU 1a9f 0xc00101b330 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.748 UTC [cauthdsl] func2 -> DEBU 1aa0 0xc00101b330 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.748 UTC [cauthdsl] func2 -> DEBU 1aa1 0xc00101b330 principal matched by identity 0" +orderer0.example.com | "2020-08-31 20:52:23.748 UTC [msp.identity] Verify -> DEBU 1aa2 Verify: digest = 00000000 f9 57 77 5b 2d d8 c8 76 d4 f3 7f 88 25 43 30 f6 |.Ww[-..v....%C0.| +orderer0.example.com | 00000010 90 86 bb 55 fe 7e 66 e9 54 44 12 71 8c e0 9e 49 |...U.~f.TD.q...I|" +orderer0.example.com | "2020-08-31 20:52:23.748 UTC [msp.identity] Verify -> DEBU 1aa3 Verify: sig = 00000000 30 45 02 21 00 c0 2d af 37 32 82 1a 66 d7 04 72 |0E.!..-.72..f..r| +orderer0.example.com | 00000010 0a 41 f2 26 e1 e8 fb 6e e9 ab 0f 75 61 b0 f3 80 |.A.&...n...ua...| +orderer0.example.com | 00000020 9f d3 7a ad 9f 02 20 55 79 ab 6a bc c1 31 40 d2 |..z... Uy.j..1@.| +orderer0.example.com | 00000030 82 06 81 b2 8d 80 05 3f 98 77 4e c3 3b 23 5f cf |.......?.wN.;#_.| +orderer0.example.com | 00000040 7f f0 3c c6 15 1c 61 |..<...a|" +orderer0.example.com | "2020-08-31 20:52:23.749 UTC [cauthdsl] func2 -> DEBU 1aa4 0xc00101b330 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-08-31 20:52:23.749 UTC [cauthdsl] func1 -> DEBU 1aa5 0xc00101b330 gate 1598907143747824900 evaluation succeeds" +orderer0.example.com | "2020-08-31 20:52:23.749 UTC [policies] Evaluate -> DEBU 1aa6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:52:23.749 UTC [policies] Evaluate -> DEBU 1aa7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:52:23.749 UTC [policies] Evaluate -> DEBU 1aa8 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:52:23.749 UTC [policies] Evaluate -> DEBU 1aa9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:52:23.749 UTC [policies] Evaluate -> DEBU 1aaa Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-08-31 20:52:23.750 UTC [policies] Evaluate -> DEBU 1aab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-08-31 20:52:23.750 UTC [common.deliver] deliverBlocks -> DEBU 1aac [channel: businesschannel] Received seekInfo (0xc000a091c0) start: > stop: > from 172.18.0.9:51006" +orderer0.example.com | "2020-08-31 20:52:23.750 UTC [fsblkstorage] Next -> DEBU 1aad Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-08-31 20:52:23.750 UTC [fsblkstorage] newBlockfileStream -> DEBU 1aae newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[56643]" +orderer0.example.com | "2020-08-31 20:52:23.750 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1aaf Remaining bytes=[81928], Going to peek [8] bytes" +orderer0.example.com | "2020-08-31 20:52:23.751 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab0 Returning blockbytes - length=[28171], placementInfo={fileNum=[0], startOffset=[56643], bytesOffset=[56646]}" +orderer0.example.com | "2020-08-31 20:52:23.751 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab1 blockbytes [28171] read from file [0]" +orderer0.example.com | "2020-08-31 20:52:23.751 UTC [common.deliver] deliverBlocks -> DEBU 1ab2 [channel: businesschannel] Delivering block [2] for (0xc000a091c0) for 172.18.0.9:51006" +orderer0.example.com | "2020-08-31 20:52:23.751 UTC [common.deliver] deliverBlocks -> DEBU 1ab3 [channel: businesschannel] Done delivering to 172.18.0.9:51006 for (0xc000a091c0)" +orderer0.example.com | "2020-08-31 20:52:23.752 UTC [fsblkstorage] waitForBlock -> DEBU 1ab4 Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2020-08-31 20:52:23.752 UTC [fsblkstorage] waitForBlock -> DEBU 1ab5 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2020-08-31 20:52:23.752 UTC [common.deliver] Handle -> DEBU 1ab6 Waiting for new SeekInfo from 172.18.0.9:51006" +orderer0.example.com | "2020-08-31 20:52:23.753 UTC [common.deliver] Handle -> DEBU 1ab7 Attempting to read seek info message from 172.18.0.9:51006" +orderer0.example.com | "2020-08-31 20:52:23.760 UTC [grpc] infof -> DEBU 1ab8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-08-31 20:52:23.760 UTC [common.deliver] Handle -> WARN 1ab9 Error reading from 172.18.0.9:51006: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-08-31 20:52:23.760 UTC [orderer.common.server] func1 -> DEBU 1aba Closing Deliver stream" +orderer0.example.com | "2020-08-31 20:52:23.760 UTC [comm.grpc.server] 1 -> INFO 1abb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51006 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.9235ms +orderer0.example.com | "2020-08-31 20:52:23.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1abc Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:23.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1abd Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +orderer0.example.com | "2020-08-31 20:52:23.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1abe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.5µs " +orderer0.example.com | "2020-08-31 20:52:23.920 UTC [orderer.common.server] Deliver -> DEBU 1abf Starting new Deliver handler" +orderer0.example.com | "2020-08-31 20:52:23.921 UTC [common.deliver] Handle -> DEBU 1ac0 Starting new deliver loop for 172.18.0.9:51008" +orderer0.example.com | "2020-08-31 20:52:23.921 UTC [common.deliver] Handle -> DEBU 1ac1 Attempting to read seek info message from 172.18.0.9:51008" +orderer0.example.com | "2020-08-31 20:52:23.921 UTC [policies] Evaluate -> DEBU 1ac2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.921 UTC [policies] Evaluate -> DEBU 1ac3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:52:23.921 UTC [policies] Evaluate -> DEBU 1ac4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.922 UTC [policies] Evaluate -> DEBU 1ac5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:52:23.922 UTC [policies] Evaluate -> DEBU 1ac6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.922 UTC [cauthdsl] func1 -> DEBU 1ac7 0xc0010eba30 gate 1598907143922536500 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.922 UTC [cauthdsl] func2 -> DEBU 1ac8 0xc0010eba30 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.922 UTC [cauthdsl] func2 -> DEBU 1ac9 0xc0010eba30 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.922 UTC [cauthdsl] func2 -> DEBU 1aca 0xc0010eba30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +orderer0.example.com | "2020-08-31 20:52:23.923 UTC [cauthdsl] func2 -> DEBU 1acb 0xc0010eba30 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.923 UTC [cauthdsl] func1 -> DEBU 1acc 0xc0010eba30 gate 1598907143922536500 evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.923 UTC [policies] Evaluate -> DEBU 1acd Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.923 UTC [policies] Evaluate -> DEBU 1ace == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.923 UTC [policies] Evaluate -> DEBU 1acf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.923 UTC [cauthdsl] func1 -> DEBU 1ad0 0xc001106270 gate 1598907143923820000 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.923 UTC [cauthdsl] func2 -> DEBU 1ad1 0xc001106270 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.924 UTC [cauthdsl] func2 -> DEBU 1ad2 0xc001106270 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.924 UTC [cauthdsl] func2 -> DEBU 1ad3 0xc001106270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +orderer0.example.com | "2020-08-31 20:52:23.924 UTC [cauthdsl] func2 -> DEBU 1ad4 0xc001106270 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.924 UTC [cauthdsl] func1 -> DEBU 1ad5 0xc001106270 gate 1598907143923820000 evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.924 UTC [policies] Evaluate -> DEBU 1ad6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.924 UTC [policies] Evaluate -> DEBU 1ad7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.925 UTC [policies] Evaluate -> DEBU 1ad8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.925 UTC [cauthdsl] func1 -> DEBU 1ad9 0xc001106ab0 gate 1598907143925278900 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.925 UTC [cauthdsl] func2 -> DEBU 1ada 0xc001106ab0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.925 UTC [cauthdsl] func2 -> DEBU 1adb 0xc001106ab0 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.925 UTC [cauthdsl] func2 -> DEBU 1adc 0xc001106ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +orderer0.example.com | "2020-08-31 20:52:23.926 UTC [cauthdsl] func2 -> DEBU 1add 0xc001106ab0 principal evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.926 UTC [cauthdsl] func1 -> DEBU 1ade 0xc001106ab0 gate 1598907143925278900 evaluation fails" +orderer0.example.com | "2020-08-31 20:52:23.926 UTC [policies] Evaluate -> DEBU 1adf Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.926 UTC [policies] Evaluate -> DEBU 1ae0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +orderer0.example.com | "2020-08-31 20:52:23.926 UTC [policies] func1 -> DEBU 1ae1 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +orderer0.example.com | "2020-08-31 20:52:23.926 UTC [policies] Evaluate -> DEBU 1ae2 Signature set did not satisfy policy /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:52:23.926 UTC [policies] Evaluate -> DEBU 1ae3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +orderer0.example.com | "2020-08-31 20:52:23.926 UTC [policies] Evaluate -> DEBU 1ae4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.926 UTC [policies] Evaluate -> DEBU 1ae5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +orderer0.example.com | "2020-08-31 20:52:23.926 UTC [policies] Evaluate -> DEBU 1ae6 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +orderer0.example.com | "2020-08-31 20:52:23.927 UTC [cauthdsl] func1 -> DEBU 1ae7 0xc0011077a0 gate 1598907143927023800 evaluation starts" +orderer0.example.com | "2020-08-31 20:52:23.927 UTC [cauthdsl] func2 -> DEBU 1ae8 0xc0011077a0 signed by 0 principal evaluation starts (used [false])" +orderer0.example.com | "2020-08-31 20:52:23.927 UTC [cauthdsl] func2 -> DEBU 1ae9 0xc0011077a0 processing identity 0 with bytes of fe10e0" +orderer0.example.com | "2020-08-31 20:52:23.927 UTC [cauthdsl] func2 -> DEBU 1aea 0xc0011077a0 principal matched by identity 0" +orderer0.example.com | "2020-08-31 20:52:23.927 UTC [msp.identity] Verify -> DEBU 1aeb Verify: digest = 00000000 0c cb 5e 3f 86 69 5a 75 42 42 88 5e e1 4e e8 d2 |..^?.iZuBB.^.N..| +orderer0.example.com | 00000010 5e 02 8d 9f 11 da 10 53 df e6 fb 41 cb 72 3a 76 |^......S...A.r:v|" +orderer0.example.com | "2020-08-31 20:52:23.927 UTC [msp.identity] Verify -> DEBU 1aec Verify: sig = 00000000 30 44 02 20 29 8d 11 49 12 fb 66 d6 b2 e5 c4 2e |0D. )..I..f.....| +orderer0.example.com | 00000010 fb 28 2c af b8 97 a8 98 c9 cc ac 3e f2 12 27 72 |.(,........>..'r| +orderer0.example.com | 00000020 60 13 1c f5 02 20 5d 12 4d 28 2e 0e df 31 4d ed |`.... ].M(...1M.| +orderer0.example.com | 00000030 7d b1 ee 39 46 a3 5c f4 f7 8d 8b a7 6d e8 11 54 |}..9F.\.....m..T| +orderer0.example.com | 00000040 3f b2 6b cd 73 0b |?.k.s.|" +orderer0.example.com | "2020-08-31 20:52:23.928 UTC [cauthdsl] func2 -> DEBU 1aed 0xc0011077a0 principal evaluation succeeds for identity 0" +orderer0.example.com | "2020-08-31 20:52:23.928 UTC [cauthdsl] func1 -> DEBU 1aee 0xc0011077a0 gate 1598907143927023800 evaluation succeeds" +orderer0.example.com | "2020-08-31 20:52:23.928 UTC [policies] Evaluate -> DEBU 1aef Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:52:23.928 UTC [policies] Evaluate -> DEBU 1af0 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +orderer0.example.com | "2020-08-31 20:52:23.928 UTC [policies] Evaluate -> DEBU 1af1 Signature set satisfies policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:52:23.928 UTC [policies] Evaluate -> DEBU 1af2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +orderer0.example.com | "2020-08-31 20:52:23.928 UTC [policies] Evaluate -> DEBU 1af3 Signature set satisfies policy /Channel/Readers" +orderer0.example.com | "2020-08-31 20:52:23.929 UTC [policies] Evaluate -> DEBU 1af4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +orderer0.example.com | "2020-08-31 20:52:23.929 UTC [common.deliver] deliverBlocks -> DEBU 1af5 [channel: businesschannel] Received seekInfo (0xc000a09800) start: > stop: > from 172.18.0.9:51008" +orderer0.example.com | "2020-08-31 20:52:23.929 UTC [fsblkstorage] Next -> DEBU 1af6 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +orderer0.example.com | "2020-08-31 20:52:23.929 UTC [fsblkstorage] newBlockfileStream -> DEBU 1af7 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[84817]" +orderer0.example.com | "2020-08-31 20:52:23.929 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1af8 Remaining bytes=[53754], Going to peek [8] bytes" +orderer0.example.com | "2020-08-31 20:52:23.929 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1af9 Returning blockbytes - length=[4550], placementInfo={fileNum=[0], startOffset=[84817], bytesOffset=[84819]}" +orderer0.example.com | "2020-08-31 20:52:23.930 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afa blockbytes [4550] read from file [0]" +orderer0.example.com | "2020-08-31 20:52:23.930 UTC [common.deliver] deliverBlocks -> DEBU 1afb [channel: businesschannel] Delivering block [3] for (0xc000a09800) for 172.18.0.9:51008" +orderer0.example.com | "2020-08-31 20:52:23.930 UTC [common.deliver] deliverBlocks -> DEBU 1afc [channel: businesschannel] Done delivering to 172.18.0.9:51008 for (0xc000a09800)" +orderer0.example.com | "2020-08-31 20:52:23.930 UTC [common.deliver] Handle -> DEBU 1afd Waiting for new SeekInfo from 172.18.0.9:51008" +orderer0.example.com | "2020-08-31 20:52:23.930 UTC [common.deliver] Handle -> DEBU 1afe Attempting to read seek info message from 172.18.0.9:51008" +orderer0.example.com | "2020-08-31 20:52:23.930 UTC [fsblkstorage] waitForBlock -> DEBU 1aff Came out of wait. maxAvailaBlockNumber=[6]" +orderer0.example.com | "2020-08-31 20:52:23.931 UTC [fsblkstorage] waitForBlock -> DEBU 1b00 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +orderer0.example.com | "2020-08-31 20:52:23.937 UTC [common.deliver] Handle -> WARN 1b01 Error reading from 172.18.0.9:51008: rpc error: code = Canceled desc = context canceled" +orderer0.example.com | "2020-08-31 20:52:23.937 UTC [orderer.common.server] func1 -> DEBU 1b03 Closing Deliver stream" +orderer0.example.com | "2020-08-31 20:52:23.937 UTC [comm.grpc.server] 1 -> INFO 1b04 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51008 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.036ms +orderer0.example.com | "2020-08-31 20:52:23.937 UTC [grpc] infof -> DEBU 1b02 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +orderer0.example.com | "2020-08-31 20:52:24.081 UTC [orderer.common.server] Deliver -> DEBU 1b05 Starting new Deliver handler" +orderer0.example.com | "2020-08-31 20:52:24.081 UTC [common.deliver] Handle -> DEBU 1b06 Starting new deliver loop for 172.18.0.9:51010" +orderer0.example.com | "2020-08-31 20:52:24.081 UTC [common.deliver] Handle -> DEBU 1b07 Attempting to read seek info message from 172.18.0.9:51010" +orderer0.example.com | "2020-08-31 20:52:24.083 UTC [policies] Evaluate -> DEBU 1b08 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +orderer0.example.com | "2020-08-31 20:52:24.083 UTC [policies] Evaluate -> DEBU 1b09 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | [1594 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [18c6 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [17a9 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +orderer0.example.com | "2020-08-31 20:52:24.083 UTC [policies] Evaluate -> DEBU 1b0a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [1595 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [18c7 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +orderer0.example.com | "2020-08-31 20:52:24.083 UTC [policies] Evaluate -> DEBU 1b0b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [1956 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1596 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [18c8 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c8260 gate 1598907093575534600 evaluation starts +peer1.org1.example.com | [17aa 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [1957 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1597 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [18c9 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c8260 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +orderer0.example.com | "2020-08-31 20:52:24.083 UTC [policies] Evaluate -> DEBU 1b0c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer0.org2.example.com | [1958 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1598 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [18ca 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c8260 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +orderer0.example.com | "2020-08-31 20:52:24.084 UTC [cauthdsl] func1 -> DEBU 1b0d 0xc0011ca1c0 gate 1598907144084096300 evaluation starts" +peer0.org2.example.com | [1959 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1599 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [18cb 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c8260 principal matched by identity 0 +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +orderer0.example.com | "2020-08-31 20:52:24.084 UTC [cauthdsl] func2 -> DEBU 1b0e 0xc0011ca1c0 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [195a 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [159a 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329f10 gate 1598907085478703500 evaluation starts +peer1.org2.example.com | [18cc 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 84 f7 ec dc 25 5f e8 3a ac cc 14 e7 20 63 7f |F....%_.:.... c.| +peer1.org1.example.com | [17ab 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebd8c0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:24.084 UTC [cauthdsl] func2 -> DEBU 1b0f 0xc0011ca1c0 processing identity 0 with bytes of fe10e0" +peer0.org2.example.com | [195b 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [159b 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329f10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 bf f4 7b dd eb bd 85 d7 f1 4b 2e 1b f2 07 66 c2 |..{......K....f.| +peer1.org1.example.com | [17ac 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebd8c0 gate 1598907093972665600 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:24.084 UTC [cauthdsl] func2 -> DEBU 1b10 0xc0011ca1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer0.org2.example.com | [195c 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [159c 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329f10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [18cd 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 42 ab 9c 92 48 18 a7 24 e9 47 |0E.!..B...H..$.G| +peer1.org1.example.com | [17ad 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:24.084 UTC [cauthdsl] func2 -> DEBU 1b11 0xc0011ca1c0 principal evaluation fails" +peer0.org2.example.com | [195d 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000010 c6 37 fc ec 20 b0 30 09 e1 29 6e 6c c1 fb b3 88 |.7.. .0..)nl....| +orderer0.example.com | "2020-08-31 20:52:24.084 UTC [cauthdsl] func1 -> DEBU 1b12 0xc0011ca1c0 gate 1598907144084096300 evaluation fails" +peer0.org2.example.com | [195e 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a98600 gate 1598907090236008100 evaluation starts +peer0.org1.example.com | [159d 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329f10 principal matched by identity 0 +peer1.org2.example.com | 00000020 95 81 0c 1c ad 02 20 1e 53 3a 70 63 5f f2 25 11 |...... .S:pc_.%.| +peer1.org1.example.com | [17ae 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:24.085 UTC [policies] Evaluate -> DEBU 1b13 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer0.org2.example.com | [195f 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a98600 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [159e 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 34 87 21 be 85 71 4e 5a 88 3d 3b 3b 75 ef 2c |.4.!..qNZ.=;;u.,| +peer1.org2.example.com | 00000030 52 20 86 d3 eb 20 49 ed 11 15 64 ec 97 d7 43 f6 |R ... I...d...C.| +peer1.org1.example.com | [17af 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:24.085 UTC [policies] Evaluate -> DEBU 1b14 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer0.org2.example.com | [1960 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a98600 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 90 5b 49 5f 8c 7e d6 5f f8 12 28 23 b5 b9 60 99 |.[I_.~._..(#..`.| +peer1.org2.example.com | 00000040 d3 a8 8d 04 6f dd b1 |....o..| +peer1.org1.example.com | [17b0 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:24.085 UTC [policies] Evaluate -> DEBU 1b15 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer0.org2.example.com | [1961 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a98600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [159f 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 0c cb c2 a7 b7 57 f8 3d 0e d4 |0E.!.......W.=..| +peer1.org2.example.com | [18ce 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c8260 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [17b1 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.085 UTC [cauthdsl] func1 -> DEBU 1b16 0xc0011caa00 gate 1598907144085493500 evaluation starts" +peer0.org2.example.com | [1962 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a98600 principal evaluation fails +peer0.org1.example.com | 00000010 28 40 8f cb de 89 02 72 a2 df 9e 17 52 91 af 8b |(@.....r....R...| +peer1.org2.example.com | [18cf 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c8260 gate 1598907093575534600 evaluation succeeds +peer1.org1.example.com | [17b2 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.085 UTC [cauthdsl] func2 -> DEBU 1b17 0xc0011caa00 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [1963 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a98600 gate 1598907090236008100 evaluation fails +peer0.org1.example.com | 00000020 0d 55 d4 e1 66 02 20 02 b2 a6 44 60 3d 64 27 1c |.U..f. ...D`=d'.| +peer1.org2.example.com | [18d0 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [17b3 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.085 UTC [cauthdsl] func2 -> DEBU 1b18 0xc0011caa00 processing identity 0 with bytes of fe10e0" +peer0.org2.example.com | [1964 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000030 d7 4d 29 d0 26 64 5d 7c a1 f9 29 23 ae b3 c8 af |.M).&d]|..)#....| +peer1.org2.example.com | [18d1 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [17b4 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +orderer0.example.com | "2020-08-31 20:52:24.085 UTC [cauthdsl] func2 -> DEBU 1b19 0xc0011caa00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer0.org2.example.com | [1965 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000040 c5 2b 4f be 87 14 e0 |.+O....| +peer1.org2.example.com | [18d2 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +orderer0.example.com | "2020-08-31 20:52:24.086 UTC [cauthdsl] func2 -> DEBU 1b1a 0xc0011caa00 principal evaluation fails" +peer0.org2.example.com | [1966 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [15a0 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329f10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [18d3 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [17b5 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +orderer0.example.com | "2020-08-31 20:52:24.086 UTC [cauthdsl] func1 -> DEBU 1b1b 0xc0011caa00 gate 1598907144085493500 evaluation fails" +peer0.org2.example.com | [1967 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a98b70 gate 1598907090237198600 evaluation starts +peer0.org1.example.com | [15a1 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329f10 gate 1598907085478703500 evaluation succeeds +peer1.org2.example.com | [18d4 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +orderer0.example.com | "2020-08-31 20:52:24.086 UTC [policies] Evaluate -> DEBU 1b1c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer0.org2.example.com | [1968 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a98b70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [15a2 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [18d5 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +orderer0.example.com | "2020-08-31 20:52:24.086 UTC [policies] Evaluate -> DEBU 1b1d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer0.org2.example.com | [1969 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a98b70 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [15a3 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [18d6 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | "2020-08-31 20:52:24.086 UTC [policies] Evaluate -> DEBU 1b1e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer0.org2.example.com | [196a 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a98b70 principal matched by identity 0 +peer0.org1.example.com | [15a4 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [18d7 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | "2020-08-31 20:52:24.086 UTC [cauthdsl] func1 -> DEBU 1b1f 0xc0011cb240 gate 1598907144086826300 evaluation starts" +peer0.org2.example.com | [196b 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | [15a5 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [18d8 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [17b6 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.087 UTC [cauthdsl] func2 -> DEBU 1b20 0xc0011cb240 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [15a6 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [18d9 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17b7 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.087 UTC [cauthdsl] func2 -> DEBU 1b21 0xc0011cb240 processing identity 0 with bytes of fe10e0" +peer0.org2.example.com | [196c 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | [15a7 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [18da 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17b8 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:24.087 UTC [cauthdsl] func2 -> DEBU 1b22 0xc0011cb240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | [15a8 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [18db 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [17b9 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:24.087 UTC [cauthdsl] func2 -> DEBU 1b23 0xc0011cb240 principal evaluation fails" +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | [15a9 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [18dd 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.087 UTC [cauthdsl] func1 -> DEBU 1b24 0xc0011cb240 gate 1598907144086826300 evaluation fails" +peer1.org1.example.com | [17ba 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | [15aa 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [18de 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.088 UTC [policies] Evaluate -> DEBU 1b25 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org1.example.com | [17bb 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [15ab 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18df 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.088 UTC [policies] Evaluate -> DEBU 1b26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer1.org1.example.com | [17bc 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [196d 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a98b70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [15ac 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18e0 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:24.088 UTC [policies] func1 -> DEBU 1b27 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +peer1.org1.example.com | [17bd 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [196e 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a98b70 gate 1598907090237198600 evaluation succeeds +peer0.org1.example.com | [15ad 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18dc 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.088 UTC [policies] Evaluate -> DEBU 1b28 Signature set did not satisfy policy /Channel/Application/Readers" +peer1.org1.example.com | [17be 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edb460 gate 1598907093975803600 evaluation starts +peer0.org2.example.com | [196f 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [15ae 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [18e1 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\301d\370-dH\002 e\034(48\341\226\273\257\235\255&\200\310\323\3039\253\264l,\307\346r\206\203\025G\322[Hb" > +orderer0.example.com | "2020-08-31 20:52:24.088 UTC [policies] Evaluate -> DEBU 1b29 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer1.org1.example.com | [17bf 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edb460 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1970 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [15af 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [18e2 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.088 UTC [policies] Evaluate -> DEBU 1b2a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org1.example.com | [17c0 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edb460 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1971 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [15b0 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18e3 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.088 UTC [policies] Evaluate -> DEBU 1b2b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [17c1 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edb460 principal matched by identity 0 +peer0.org2.example.com | [1972 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [15b1 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [18e4 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.089 UTC [policies] Evaluate -> DEBU 1b2c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org1.example.com | [17c2 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [1973 08-31 20:51:30.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | [15b2 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [18e5 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.089 UTC [cauthdsl] func1 -> DEBU 1b2d 0xc0011cbf30 gate 1598907144089326400 evaluation starts" +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [15b3 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18e6 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.089 UTC [cauthdsl] func2 -> DEBU 1b2e 0xc0011cbf30 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [17c3 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | [1974 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | [15b4 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18e7 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.089 UTC [cauthdsl] func2 -> DEBU 1b2f 0xc0011cbf30 processing identity 0 with bytes of fe10e0" +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [15b5 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [18e8 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.089 UTC [cauthdsl] func2 -> DEBU 1b30 0xc0011cbf30 principal matched by identity 0" +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | [15b6 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.089 UTC [msp.identity] Verify -> DEBU 1b31 Verify: digest = 00000000 8b f8 34 72 49 dd 35 2d 09 df 3f 84 27 74 13 eb |..4rI.5-..?.'t..| +peer1.org2.example.com | [18e9 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | [15b7 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000010 34 a2 bb a0 b8 1e a5 1f e2 eb a2 45 51 8e d3 1c |4..........EQ...|" +peer1.org2.example.com | [18ea 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [15b8 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.090 UTC [msp.identity] Verify -> DEBU 1b32 Verify: sig = 00000000 30 44 02 20 23 c0 c8 28 25 03 cd b9 21 63 fc 98 |0D. #..(%...!c..| +peer1.org2.example.com | [18eb 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17c4 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edb460 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1975 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [15b9 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000010 5d d6 49 ba db c8 c0 c2 94 94 39 0b c0 b4 20 fb |].I.......9... .| +peer1.org2.example.com | [18ec 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17c5 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edb460 gate 1598907093975803600 evaluation succeeds +peer0.org2.example.com | [1976 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [15ba 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | 00000020 e6 ef 85 c9 02 20 0e be 23 e1 29 b3 12 a5 a8 27 |..... ..#.)....'| +peer1.org2.example.com | [18ed 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17c6 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1977 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | [15bb 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000030 c0 ff 13 3a 07 98 63 44 9e a7 3c 18 b2 ca 52 d7 |...:..cD..<...R.| +peer1.org2.example.com | [18ee 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17c7 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [15bc 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | 00000040 66 5a dc 1b 01 71 |fZ...q|" +peer1.org2.example.com | [18ef 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [17c8 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1978 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | [15bd 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:24.090 UTC [cauthdsl] func2 -> DEBU 1b33 0xc0011cbf30 principal evaluation succeeds for identity 0" +peer1.org2.example.com | [18f0 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [17c9 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | [15be 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.090 UTC [cauthdsl] func1 -> DEBU 1b34 0xc0011cbf30 gate 1598907144089326400 evaluation succeeds" +peer1.org2.example.com | [18f1 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17ca 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | [15bf 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:24.091 UTC [policies] Evaluate -> DEBU 1b35 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [18f2 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | [15c0 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.091 UTC [policies] Evaluate -> DEBU 1b36 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | [18f3 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17cb 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [15c1 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.091 UTC [policies] Evaluate -> DEBU 1b37 Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org2.example.com | [18f4 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | [1979 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15c2 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.091 UTC [policies] Evaluate -> DEBU 1b38 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org2.example.com | [18f5 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | [197a 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15c3 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.091 UTC [policies] Evaluate -> DEBU 1b39 Signature set satisfies policy /Channel/Readers" +peer1.org2.example.com | [18f6 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | [197b 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [15c4 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.091 UTC [policies] Evaluate -> DEBU 1b3a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org2.example.com | [18f7 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D981610081801 +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [197c 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [15c5 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | "2020-08-31 20:52:24.092 UTC [common.deliver] deliverBlocks -> DEBU 1b3b [channel: businesschannel] Received seekInfo (0xc000444180) start: > stop: > from 172.18.0.9:51010" +peer1.org2.example.com | [18f8 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 08EAF77EA689C3F466AD77374840E3C09E37994464C5A6CCD15B732752A55A75 +peer1.org1.example.com | [17cc 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [197d 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [15c6 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.092 UTC [fsblkstorage] Next -> DEBU 1b3c Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer1.org2.example.com | [18f9 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org1.example.com | [17cd 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [197e 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:24.092 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b3d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89369]" +peer0.org1.example.com | [15c7 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [18fa 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [17ce 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [197f 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:24.092 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b3e Remaining bytes=[49202], Going to peek [8] bytes" +peer0.org1.example.com | [15c8 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [18fb 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [17cf 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1980 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:24.093 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b3f Returning blockbytes - length=[4010], placementInfo={fileNum=[0], startOffset=[89369], bytesOffset=[89371]}" +peer0.org1.example.com | [15c9 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [18fc 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [17d0 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1981 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8cf0 gate 1598907090243768100 evaluation starts +orderer0.example.com | "2020-08-31 20:52:24.093 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b40 blockbytes [4010] read from file [0]" +peer0.org1.example.com | [15ca 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [18fd 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [17d1 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1982 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8cf0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:24.094 UTC [common.deliver] deliverBlocks -> DEBU 1b41 [channel: businesschannel] Delivering block [4] for (0xc000444180) for 172.18.0.9:51010" +peer0.org1.example.com | [15cb 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [18fe 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17d2 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1983 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8cf0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:24.095 UTC [common.deliver] deliverBlocks -> DEBU 1b42 [channel: businesschannel] Done delivering to 172.18.0.9:51010 for (0xc000444180)" +peer0.org1.example.com | [15cc 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [18ff 08-31 20:51:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17d3 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1984 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | "2020-08-31 20:52:24.095 UTC [common.deliver] Handle -> DEBU 1b43 Waiting for new SeekInfo from 172.18.0.9:51010" +peer0.org1.example.com | [15cd 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043885e0 gate 1598907085506402100 evaluation starts +peer1.org2.example.com | [1900 08-31 20:51:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17d4 08-31 20:51:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efed50 gate 1598907093979893800 evaluation starts +peer0.org2.example.com | [1985 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8cf0 principal evaluation fails +orderer0.example.com | "2020-08-31 20:52:24.095 UTC [common.deliver] Handle -> DEBU 1b44 Attempting to read seek info message from 172.18.0.9:51010" +peer0.org1.example.com | [15ce 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043885e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1901 08-31 20:51:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17d5 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efed50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1986 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac8cf0 gate 1598907090243768100 evaluation fails +orderer0.example.com | "2020-08-31 20:52:24.095 UTC [fsblkstorage] waitForBlock -> DEBU 1b45 Came out of wait. maxAvailaBlockNumber=[6]" +peer0.org1.example.com | [15cf 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043885e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1902 08-31 20:51:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17d6 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efed50 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1987 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:24.095 UTC [fsblkstorage] waitForBlock -> DEBU 1b46 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +peer0.org1.example.com | [15d0 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043885e0 principal matched by identity 0 +peer1.org2.example.com | [1903 08-31 20:51:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [17d7 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efed50 principal matched by identity 0 +peer0.org2.example.com | [1988 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [15d1 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 a0 91 8f c9 0d 9a f3 64 cb 73 56 41 2a fd a4 |u.......d.sVA*..| +orderer0.example.com | "2020-08-31 20:52:24.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b47 Sending msg of 28 bytes to 2 on channel businesschannel took 13.4µs" +peer1.org2.example.com | [1904 08-31 20:51:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17d8 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | [1989 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000010 c7 23 c5 80 ec 5e 5b 08 28 f6 66 94 65 25 e1 08 |.#...^[.(.f.e%..| +orderer0.example.com | "2020-08-31 20:52:24.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b48 Sending msg of 28 bytes to 3 on channel businesschannel took 6.6µs" +peer1.org2.example.com | [1905 08-31 20:51:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [198a 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac9260 gate 1598907090245048700 evaluation starts +peer0.org1.example.com | [15d2 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f e5 1a c4 4d 07 23 7a d3 a5 2a 6d |0D. ....M.#z..*m| +orderer0.example.com | "2020-08-31 20:52:24.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 141.5µs " +peer1.org2.example.com | [1906 08-31 20:51:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [17d9 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | [198b 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac9260 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 54 39 77 79 3c dd 18 bb da d5 1d 5a b7 96 d1 f6 |T9wy<......Z....| +orderer0.example.com | "2020-08-31 20:52:24.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0837ms " +peer1.org2.example.com | [1907 08-31 20:51:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [198c 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac9260 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 58 ac 39 61 02 20 2e 9c ef 20 ce ea cd 18 31 0e |X.9a. ... ....1.| +orderer0.example.com | "2020-08-31 20:52:24.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1908 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [198d 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac9260 principal matched by identity 0 +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000030 91 1b f5 29 b4 2a d7 16 7c 4b 6b a0 ec d5 98 a4 |...).*..|Kk.....| +orderer0.example.com | "2020-08-31 20:52:24.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4c Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [1909 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [198e 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000040 82 7c 41 43 5c 48 |.|AC\H| +orderer0.example.com | "2020-08-31 20:52:24.104 UTC [grpc] infof -> DEBU 1b4e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org2.example.com | [190a 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [15d3 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043885e0 principal evaluation succeeds for identity 0 +orderer0.example.com | "2020-08-31 20:52:24.104 UTC [common.deliver] Handle -> WARN 1b4d Error reading from 172.18.0.9:51010: rpc error: code = Canceled desc = context canceled" +peer1.org2.example.com | [190b 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [17da 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efed50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [198f 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | [15d4 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043885e0 gate 1598907085506402100 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:24.104 UTC [orderer.common.server] func1 -> DEBU 1b4f Closing Deliver stream" +peer1.org2.example.com | [190c 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17db 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003efed50 gate 1598907093979893800 evaluation succeeds +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | [15d5 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:24.104 UTC [comm.grpc.server] 1 -> INFO 1b50 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51010 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.1691ms +peer1.org2.example.com | [190d 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [17dc 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | [15d6 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:24.282 UTC [orderer.common.server] Deliver -> DEBU 1b51 Starting new Deliver handler" +peer1.org2.example.com | [190e 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17dd 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | [15d7 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:24.282 UTC [common.deliver] Handle -> DEBU 1b52 Starting new deliver loop for 172.18.0.9:51012" +peer1.org2.example.com | [190f 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [17de 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [15d8 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:24.282 UTC [common.deliver] Handle -> DEBU 1b53 Attempting to read seek info message from 172.18.0.9:51012" +peer1.org2.example.com | [1910 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [17df 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1990 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac9260 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [15d9 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.283 UTC [policies] Evaluate -> DEBU 1b54 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | [1911 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [17e0 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1991 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ac9260 gate 1598907090245048700 evaluation succeeds +peer0.org1.example.com | [15da 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-08-31 20:52:24.283 UTC [policies] Evaluate -> DEBU 1b55 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1912 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17e1 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1992 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [15db 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:24.283 UTC [policies] Evaluate -> DEBU 1b56 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer1.org2.example.com | [1913 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17e2 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1993 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [15dc 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:24.283 UTC [policies] Evaluate -> DEBU 1b57 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1914 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [17e3 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1994 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [15dd 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:24.284 UTC [policies] Evaluate -> DEBU 1b58 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer1.org2.example.com | [1915 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [17e4 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1995 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [15de 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.284 UTC [cauthdsl] func1 -> DEBU 1b59 0xc00127acc0 gate 1598907144284150400 evaluation starts" +peer1.org2.example.com | [1916 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [17e5 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1996 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | [15e0 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.284 UTC [cauthdsl] func2 -> DEBU 1b5a 0xc00127acc0 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1917 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [17e6 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [15e1 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.284 UTC [cauthdsl] func2 -> DEBU 1b5b 0xc00127acc0 processing identity 0 with bytes of fe10e0" +peer1.org2.example.com | [1918 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [17e7 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1997 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | [15df 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:24.285 UTC [cauthdsl] func2 -> DEBU 1b5c 0xc00127acc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer1.org2.example.com | [1919 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [17e8 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [15e3 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:24.285 UTC [cauthdsl] func2 -> DEBU 1b5d 0xc00127acc0 principal evaluation fails" +peer1.org2.example.com | [191a 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [17e9 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | [15e2 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +orderer0.example.com | "2020-08-31 20:52:24.285 UTC [cauthdsl] func1 -> DEBU 1b5e 0xc00127acc0 gate 1598907144284150400 evaluation fails" +peer1.org2.example.com | [191b 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [17ea 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | [15e5 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.285 UTC [policies] Evaluate -> DEBU 1b5f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [191c 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858820 gate 1598907094453171900 evaluation starts +peer1.org1.example.com | [17eb 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1e1a0 gate 1598907093986950600 evaluation starts +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [15e4 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:24.285 UTC [policies] Evaluate -> DEBU 1b60 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [191d 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858820 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [17ed 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1e1a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1998 08-31 20:51:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15e7 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.285 UTC [policies] Evaluate -> DEBU 1b61 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer1.org2.example.com | [191e 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858820 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [17ee 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1e1a0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1999 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [15e8 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.285 UTC [cauthdsl] func1 -> DEBU 1b62 0xc00127b500 gate 1598907144285748900 evaluation starts" +peer1.org2.example.com | [191f 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [17ef 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1e1a0 principal matched by identity 0 +peer0.org2.example.com | [199a 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [15ea 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:24.286 UTC [cauthdsl] func2 -> DEBU 1b63 0xc00127b500 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1920 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858820 principal evaluation fails +peer1.org1.example.com | [17f0 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [199b 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [15e6 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:24.286 UTC [cauthdsl] func2 -> DEBU 1b64 0xc00127b500 processing identity 0 with bytes of fe10e0" +peer1.org2.example.com | [1921 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858820 gate 1598907094453171900 evaluation fails +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [199c 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [15eb 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:24.286 UTC [cauthdsl] func2 -> DEBU 1b65 0xc00127b500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer1.org2.example.com | [1922 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [17f1 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | [199d 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [15ec 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:24.286 UTC [cauthdsl] func2 -> DEBU 1b66 0xc00127b500 principal evaluation fails" +peer1.org2.example.com | [1923 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [199e 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [15ed 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.286 UTC [cauthdsl] func1 -> DEBU 1b67 0xc00127b500 gate 1598907144285748900 evaluation fails" +peer1.org2.example.com | [1924 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | [199f 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [15ee 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.286 UTC [policies] Evaluate -> DEBU 1b68 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | [1925 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858d90 gate 1598907094454280600 evaluation starts +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [19a0 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aeeb50 gate 1598907090251382100 evaluation starts +peer0.org1.example.com | [15e9 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.286 UTC [policies] Evaluate -> DEBU 1b69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | [1926 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858d90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [19a1 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aeeb50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [15f0 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.286 UTC [policies] Evaluate -> DEBU 1b6a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer1.org2.example.com | [1927 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858d90 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [17f2 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1e1a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [19a2 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aeeb50 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [15f1 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.287 UTC [cauthdsl] func1 -> DEBU 1b6b 0xc00127bd40 gate 1598907144287332300 evaluation starts" +peer1.org2.example.com | [1928 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858d90 principal matched by identity 0 +peer1.org1.example.com | [17f3 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1e1a0 gate 1598907093986950600 evaluation succeeds +peer0.org2.example.com | [19a3 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aeeb50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [15f2 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.287 UTC [cauthdsl] func2 -> DEBU 1b6c 0xc00127bd40 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1929 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | [17f4 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [19a4 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aeeb50 principal evaluation fails +peer0.org1.example.com | [15f3 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [17f5 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [19a5 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aeeb50 gate 1598907090251382100 evaluation fails +peer0.org1.example.com | [15f4 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.287 UTC [cauthdsl] func2 -> DEBU 1b6d 0xc00127bd40 processing identity 0 with bytes of fe10e0" +peer1.org1.example.com | [17f6 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [19a6 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [15f5 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:24.287 UTC [cauthdsl] func2 -> DEBU 1b6e 0xc00127bd40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer1.org2.example.com | [192a 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | [19a7 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [15f6 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.287 UTC [cauthdsl] func2 -> DEBU 1b6f 0xc00127bd40 principal evaluation fails" +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | [17ec 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19a8 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [15f7 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.287 UTC [cauthdsl] func1 -> DEBU 1b70 0xc00127bd40 gate 1598907144287332300 evaluation fails" +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | [17f7 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [19a9 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aef0c0 gate 1598907090252398400 evaluation starts +peer0.org1.example.com | [15f8 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.287 UTC [policies] Evaluate -> DEBU 1b71 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | [17f8 08-31 20:51:33.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19aa 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aef0c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [15ef 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" > alive: alive: alive:\005\307\340" > +orderer0.example.com | "2020-08-31 20:52:24.288 UTC [policies] Evaluate -> DEBU 1b72 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [17f9 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | [19ab 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aef0c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [15f9 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.288 UTC [policies] func1 -> DEBU 1b73 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +peer1.org2.example.com | [192b 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858d90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [19ac 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aef0c0 principal matched by identity 0 +peer0.org1.example.com | [15fb 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.288 UTC [policies] Evaluate -> DEBU 1b74 Signature set did not satisfy policy /Channel/Application/Readers" +peer1.org2.example.com | [192c 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003858d90 gate 1598907094454280600 evaluation succeeds +peer1.org1.example.com | [17fa 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | [19ad 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | [15fa 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.288 UTC [policies] Evaluate -> DEBU 1b75 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer1.org2.example.com | [192d 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [15fc 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.288 UTC [policies] Evaluate -> DEBU 1b76 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org2.example.com | [192e 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [19ae 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | [15fd 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.288 UTC [policies] Evaluate -> DEBU 1b77 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [192f 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +orderer0.example.com | "2020-08-31 20:52:24.288 UTC [policies] Evaluate -> DEBU 1b78 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | [15fe 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1930 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +orderer0.example.com | "2020-08-31 20:52:24.288 UTC [cauthdsl] func1 -> DEBU 1b79 0xc0012b4a30 gate 1598907144288560100 evaluation starts" +peer0.org1.example.com | [15ff 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1931 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | [17fb 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +orderer0.example.com | "2020-08-31 20:52:24.288 UTC [cauthdsl] func2 -> DEBU 1b7a 0xc0012b4a30 signed by 0 principal evaluation starts (used [false])" +peer0.org1.example.com | [1600 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [17fc 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.288 UTC [cauthdsl] func2 -> DEBU 1b7b 0xc0012b4a30 processing identity 0 with bytes of fe10e0" +peer0.org1.example.com | [1601 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816101B +peer1.org2.example.com | [1932 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | [19af 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aef0c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [17fd 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.289 UTC [cauthdsl] func2 -> DEBU 1b7c 0xc0012b4a30 principal matched by identity 0" +peer0.org1.example.com | [1602 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4B954C047E5E5C635988954CE2A8B6A2AC86D1F0DFD8C45E37B4486863E9AFC8 +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [19b0 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aef0c0 gate 1598907090252398400 evaluation succeeds +peer1.org1.example.com | [17fe 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.289 UTC [msp.identity] Verify -> DEBU 1b7d Verify: digest = 00000000 29 a9 65 d8 4a 1f 7d e9 8c 2b 7f bf a2 be 21 18 |).e.J.}..+....!.| +peer0.org1.example.com | [1603 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | [19b1 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [17ff 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | 00000010 0e 2d 6e 75 24 6f 33 71 24 b8 87 78 d6 0f fb 83 |.-nu$o3q$..x....|" +peer0.org1.example.com | [1604 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [19b2 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1800 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:24.289 UTC [msp.identity] Verify -> DEBU 1b7e Verify: sig = 00000000 30 45 02 21 00 bd 59 9c 24 e6 0b 01 15 f2 d8 ac |0E.!..Y.$.......| +peer0.org1.example.com | [1605 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [19b3 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1801 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | 00000010 94 00 a3 43 0b 13 b6 f1 99 7f 2c 94 f8 b9 ac 08 |...C......,.....| +peer0.org1.example.com | [1606 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [1933 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19b4 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1802 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | 00000020 ea 3c 49 bc 90 02 20 2e 52 da 6c 53 9d b6 a2 6c |. DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1934 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19b5 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1803 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000030 81 00 b2 04 ae ea 1b 4b e2 4d 25 b7 6a f9 e7 44 |.......K.M%.j..D| +peer0.org1.example.com | [1608 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [19b6 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1935 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1804 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | 00000040 88 5c 95 0a 93 13 c7 |.\.....|" +peer0.org1.example.com | [1609 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19b7 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1936 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1805 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.289 UTC [cauthdsl] func2 -> DEBU 1b7f 0xc0012b4a30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | [160a 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19b8 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1937 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1806 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.290 UTC [cauthdsl] func1 -> DEBU 1b80 0xc0012b4a30 gate 1598907144288560100 evaluation succeeds" +peer0.org1.example.com | [160b 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org2.example.com | [19b9 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1938 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1807 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:24.290 UTC [policies] Evaluate -> DEBU 1b81 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org1.example.com | [160c 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19ba 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1939 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1808 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [19bb 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [193a 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1809 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1fb70 gate 1598907093993424700 evaluation starts +peer0.org1.example.com | [160d 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:24.290 UTC [policies] Evaluate -> DEBU 1b82 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [19bc 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [193b 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ba680 gate 1598907094456461900 evaluation starts +peer1.org1.example.com | [180a 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1fb70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [160e 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.290 UTC [policies] Evaluate -> DEBU 1b83 Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org2.example.com | [19bd 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [193c 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ba680 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [180b 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1fb70 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [160f 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:24.290 UTC [policies] Evaluate -> DEBU 1b84 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org2.example.com | [19be 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [193d 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ba680 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [180c 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1fb70 principal matched by identity 0 +peer0.org1.example.com | [1610 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.290 UTC [policies] Evaluate -> DEBU 1b85 Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | [19bf 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [193e 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ba680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [180d 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | [1611 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.290 UTC [policies] Evaluate -> DEBU 1b86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [19c0 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b16510 gate 1598907090255756900 evaluation starts +peer1.org2.example.com | [193f 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ba680 principal evaluation fails +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [1612 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.291 UTC [common.deliver] deliverBlocks -> DEBU 1b87 [channel: businesschannel] Received seekInfo (0xc0004448c0) start: > stop: > from 172.18.0.9:51012" +peer0.org2.example.com | [19c1 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b16510 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1940 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038ba680 gate 1598907094456461900 evaluation fails +peer1.org1.example.com | [180e 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | [1613 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.291 UTC [fsblkstorage] Next -> DEBU 1b88 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer0.org2.example.com | [19c2 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b16510 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1941 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [1614 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.291 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b89 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93381]" +peer0.org2.example.com | [19c3 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b16510 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1942 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | [1615 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1616 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.291 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b8a Remaining bytes=[45190], Going to peek [8] bytes" +peer1.org2.example.com | [1943 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | [1617 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.291 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b8b Returning blockbytes - length=[4009], placementInfo={fileNum=[0], startOffset=[93381], bytesOffset=[93383]}" +peer0.org2.example.com | [19c4 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b16510 principal evaluation fails +peer1.org2.example.com | [1944 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038babf0 gate 1598907094456955000 evaluation starts +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [1618 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:52:24.291 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b8c blockbytes [4009] read from file [0]" +peer0.org2.example.com | [19c5 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b16510 gate 1598907090255756900 evaluation fails +peer1.org2.example.com | [1945 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038babf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [180f 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [1619 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816101C +orderer0.example.com | "2020-08-31 20:52:24.291 UTC [common.deliver] deliverBlocks -> DEBU 1b8d [channel: businesschannel] Delivering block [5] for (0xc0004448c0) for 172.18.0.9:51012" +peer0.org2.example.com | [19c6 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1946 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038babf0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1810 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1fb70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [161a 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E5CAE688E91F0D72FB1C1383E08F83B157FC355C161954698F56C29D27018DD0 +orderer0.example.com | "2020-08-31 20:52:24.292 UTC [common.deliver] deliverBlocks -> DEBU 1b8e [channel: businesschannel] Done delivering to 172.18.0.9:51012 for (0xc0004448c0)" +peer0.org2.example.com | [19c7 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1947 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038babf0 principal matched by identity 0 +peer1.org1.example.com | [1811 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1fb70 gate 1598907093993424700 evaluation succeeds +peer0.org1.example.com | [161b 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:52:24.292 UTC [common.deliver] Handle -> DEBU 1b8f Waiting for new SeekInfo from 172.18.0.9:51012" +peer0.org2.example.com | [19c8 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1948 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | [1812 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [161c 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +orderer0.example.com | "2020-08-31 20:52:24.292 UTC [common.deliver] Handle -> DEBU 1b90 Attempting to read seek info message from 172.18.0.9:51012" +peer0.org2.example.com | [19c9 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b16a80 gate 1598907090256493100 evaluation starts +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [1813 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [161d 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +orderer0.example.com | "2020-08-31 20:52:24.292 UTC [fsblkstorage] waitForBlock -> DEBU 1b91 Came out of wait. maxAvailaBlockNumber=[6]" +peer0.org2.example.com | [19ca 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b16a80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1949 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | [1814 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [161e 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:24.292 UTC [fsblkstorage] waitForBlock -> DEBU 1b92 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | [1815 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [19cb 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b16a80 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [161f 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.298 UTC [grpc] infof -> DEBU 1b93 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | [1816 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | [19cc 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b16a80 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:24.298 UTC [common.deliver] Handle -> WARN 1b94 Error reading from 172.18.0.9:51012: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | [1620 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [19cd 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | "2020-08-31 20:52:24.298 UTC [orderer.common.server] func1 -> DEBU 1b95 Closing Deliver stream" +peer0.org1.example.com | [1621 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [1817 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | "2020-08-31 20:52:24.298 UTC [comm.grpc.server] 1 -> INFO 1b96 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51012 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.9316ms +peer0.org1.example.com | [1622 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [194a 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038babf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | [19ce 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | "2020-08-31 20:52:24.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b97 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [1623 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [194b 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038babf0 gate 1598907094456955000 evaluation succeeds +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +orderer0.example.com | "2020-08-31 20:52:24.307 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b98 Sending msg of 28 bytes to 3 on channel testchainid took 29.2µs" +peer0.org1.example.com | [1624 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1625 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [1627 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1628 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1626 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1629 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [162a 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [162b 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [162c 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [162d 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 ca e6 88 e9 1f 0d 72 fb 1c 13 83 e0 8f 83 b1 |.......r........| +peer0.org1.example.com | 00000010 57 fc 35 5c 16 19 54 69 8f 56 c2 9d 27 01 8d d0 |W.5\..Ti.V..'...| +peer0.org1.example.com | [162e 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd ac 23 c8 ff 53 ce 34 53 b2 93 |0E.!...#..S.4S..| +peer0.org1.example.com | 00000010 79 9c 19 ec 7e 77 ef 6e 89 d5 14 b6 e1 5a ae d6 |y...~w.n.....Z..| +peer0.org1.example.com | 00000020 34 7c 56 46 09 02 20 30 7c 31 0c 0b 85 09 f8 e6 |4|VF.. 0|1......| +peer0.org1.example.com | 00000030 18 47 58 fb 2e da be 0b 60 94 5b 70 d5 1e 4e d8 |.GX.....`.[p..N.| +peer0.org1.example.com | 00000040 01 53 b1 76 32 c0 87 |.S.v2..| +peer0.org1.example.com | [162f 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [1630 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 00 24 5c d4 1a 07 cc 43 23 5d ab |0D. J.$\....C#].| +peer0.org1.example.com | 00000010 b4 9b b7 a8 cf 8b 28 20 be d7 6a b9 07 bf 15 0f |......( ..j.....| +peer0.org1.example.com | 00000020 db bb 4a 77 02 20 21 07 e0 05 cf 36 83 02 62 f6 |..Jw. !....6..b.| +peer0.org1.example.com | 00000030 b5 d9 1b 09 63 5a b0 d5 97 da 63 4e 84 e7 ad 84 |....cZ....cN....| +peer0.org1.example.com | 00000040 2e e5 cc 59 9b 37 |...Y.7| +peer0.org1.example.com | [1631 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1632 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1633 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1634 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1635 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1636 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1637 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1638 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1639 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [163a 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [163b 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [163c 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [163d 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [163e 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [163f 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1640 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1641 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044060e0 gate 1598907085608961100 evaluation starts +peer0.org1.example.com | [1642 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044060e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1643 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044060e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1644 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044060e0 principal matched by identity 0 +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | [1645 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 a0 91 8f c9 0d 9a f3 64 cb 73 56 41 2a fd a4 |u.......d.sVA*..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [194c 08-31 20:51:34.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000010 c7 23 c5 80 ec 5e 5b 08 28 f6 66 94 65 25 e1 08 |.#...^[.(.f.e%..| +peer1.org2.example.com | [194d 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | [1818 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1646 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f e5 1a c4 4d 07 23 7a d3 a5 2a 6d |0D. ....M.#z..*m| +orderer0.example.com | "2020-08-31 20:52:24.308 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b99 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 588.8µs " +peer1.org2.example.com | [194e 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | 00000010 54 39 77 79 3c dd 18 bb da d5 1d 5a b7 96 d1 f6 |T9wy<......Z....| +peer1.org1.example.com | [1819 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.479 UTC [orderer.common.server] Deliver -> DEBU 1b9a Starting new Deliver handler" +peer1.org2.example.com | [194f 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [19cf 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b16a80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000020 58 ac 39 61 02 20 2e 9c ef 20 ce ea cd 18 31 0e |X.9a. ... ....1.| +peer1.org1.example.com | [181a 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.480 UTC [common.deliver] Handle -> DEBU 1b9b Starting new deliver loop for 172.18.0.9:51014" +peer1.org2.example.com | [1950 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | [19d0 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b16a80 gate 1598907090256493100 evaluation succeeds +peer0.org1.example.com | 00000030 91 1b f5 29 b4 2a d7 16 7c 4b 6b a0 ec d5 98 a4 |...).*..|Kk.....| +peer1.org1.example.com | [181b 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.480 UTC [common.deliver] Handle -> DEBU 1b9c Attempting to read seek info message from 172.18.0.9:51014" +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [19d1 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000040 82 7c 41 43 5c 48 |.|AC\H| +peer1.org1.example.com | [181c 08-31 20:51:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:270579457140118257 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:24.480 UTC [policies] Evaluate -> DEBU 1b9d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | [1951 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | [19d2 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1647 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044060e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [181d 08-31 20:51:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:270579457140118257 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.480 UTC [policies] Evaluate -> DEBU 1b9e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | [19d3 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1648 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044060e0 gate 1598907085608961100 evaluation succeeds +peer1.org1.example.com | [181e 08-31 20:51:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.480 UTC [policies] Evaluate -> DEBU 1b9f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | [19d4 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1649 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [181f 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 270579457140118257, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.481 UTC [policies] Evaluate -> DEBU 1ba0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | [19d5 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [164a 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1820 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 270579457140118257, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.481 UTC [policies] Evaluate -> DEBU 1ba1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [19d6 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [164b 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1821 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.481 UTC [cauthdsl] func1 -> DEBU 1ba2 0xc001384d00 gate 1598907144481531200 evaluation starts" +peer1.org2.example.com | [1952 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19d7 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [164c 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1822 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 270579457140118257, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.481 UTC [cauthdsl] func2 -> DEBU 1ba3 0xc001384d00 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1953 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [19d8 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [164d 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1823 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:52:24.481 UTC [cauthdsl] func2 -> DEBU 1ba4 0xc001384d00 processing identity 0 with bytes of fe10e0" +peer1.org2.example.com | [1954 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19d9 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [164e 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1824 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 38 f7 03 a3 ec c8 c5 a0 53 a1 da 5d a5 c9 ac |.8.......S..]...| +orderer0.example.com | "2020-08-31 20:52:24.482 UTC [cauthdsl] func2 -> DEBU 1ba5 0xc001384d00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +peer1.org2.example.com | [1955 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19da 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [164f 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | 00000010 a1 e9 6a d5 e6 30 d3 4d 91 a8 d0 0b b9 77 a2 aa |..j..0.M.....w..| +orderer0.example.com | "2020-08-31 20:52:24.482 UTC [cauthdsl] func2 -> DEBU 1ba6 0xc001384d00 principal evaluation fails" +peer1.org2.example.com | [1956 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19db 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1650 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 ca e6 88 e9 1f 0d 72 fb 1c 13 83 e0 8f 83 b1 |.......r........| +peer1.org1.example.com | [1825 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 c8 1b d1 fb 63 f4 f3 dd 45 18 eb |0D. .....c...E..| +orderer0.example.com | "2020-08-31 20:52:24.482 UTC [cauthdsl] func1 -> DEBU 1ba7 0xc001384d00 gate 1598907144481531200 evaluation fails" +peer1.org2.example.com | [1957 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [19dc 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 57 fc 35 5c 16 19 54 69 8f 56 c2 9d 27 01 8d d0 |W.5\..Ti.V..'...| +peer1.org1.example.com | 00000010 06 98 a8 95 67 20 9c 17 b8 9d 9d 27 99 53 87 f4 |....g .....'.S..| +orderer0.example.com | "2020-08-31 20:52:24.482 UTC [policies] Evaluate -> DEBU 1ba8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [1958 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [19dd 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b17c80 gate 1598907090259776600 evaluation starts +peer0.org1.example.com | [1651 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd ac 23 c8 ff 53 ce 34 53 b2 93 |0E.!...#..S.4S..| +peer1.org1.example.com | 00000020 24 56 74 78 02 20 1d b3 30 63 83 e3 0b 49 db 56 |$Vtx. ..0c...I.V| +orderer0.example.com | "2020-08-31 20:52:24.483 UTC [policies] Evaluate -> DEBU 1ba9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +peer1.org2.example.com | [1959 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [19de 08-31 20:51:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b17c80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 2f 0b da 29 a4 5d b7 e6 b7 34 08 b5 23 50 30 0c |/..).]...4..#P0.| +peer0.org1.example.com | 00000010 79 9c 19 ec 7e 77 ef 6e 89 d5 14 b6 e1 5a ae d6 |y...~w.n.....Z..| +orderer0.example.com | "2020-08-31 20:52:24.483 UTC [policies] Evaluate -> DEBU 1baa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +peer1.org2.example.com | [195a 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [19df 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b17c80 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000040 37 ca 78 54 76 bb |7.xTv.| +peer0.org1.example.com | 00000020 34 7c 56 46 09 02 20 30 7c 31 0c 0b 85 09 f8 e6 |4|VF.. 0|1......| +orderer0.example.com | "2020-08-31 20:52:24.483 UTC [cauthdsl] func1 -> DEBU 1bab 0xc001385540 gate 1598907144483476800 evaluation starts" +peer1.org2.example.com | [195b 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [19e0 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b17c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1826 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000030 18 47 58 fb 2e da be 0b 60 94 5b 70 d5 1e 4e d8 |.GX.....`.[p..N.| +orderer0.example.com | "2020-08-31 20:52:24.483 UTC [cauthdsl] func2 -> DEBU 1bac 0xc001385540 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [195c 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [19e1 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b17c80 principal evaluation fails +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | 00000040 01 53 b1 76 32 c0 87 |.S.v2..| +orderer0.example.com | "2020-08-31 20:52:24.483 UTC [cauthdsl] func2 -> DEBU 1bad 0xc001385540 processing identity 0 with bytes of fe10e0" +peer0.org2.example.com | [19e2 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b17c80 gate 1598907090259776600 evaluation fails +peer1.org1.example.com | [1827 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 7a c0 ca f2 3b 7b e1 2f 19 e8 |0E.!..z...;{./..| +peer0.org1.example.com | [1652 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:24.484 UTC [cauthdsl] func2 -> DEBU 1bae 0xc001385540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +peer1.org2.example.com | [195d 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [19e3 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 0b 00 d3 a4 29 45 b5 29 cd e4 ff 1c ec ac 03 01 |....)E.)........| +peer0.org1.example.com | [1653 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:24.484 UTC [cauthdsl] func2 -> DEBU 1baf 0xc001385540 principal evaluation fails" +peer1.org2.example.com | [195e 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f2730 gate 1598907094473932500 evaluation starts +peer0.org2.example.com | [19e4 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 09 8a 05 ed 6d 02 20 2a e6 89 26 e1 27 92 05 eb |....m. *..&.'...| +peer0.org1.example.com | [1654 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.484 UTC [cauthdsl] func1 -> DEBU 1bb0 0xc001385540 gate 1598907144483476800 evaluation fails" +peer1.org2.example.com | [195f 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f2730 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [19e5 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000030 f8 8a 3e 26 2c 3e f1 df 5f 86 ee 6c 98 38 c3 4d |..>&,>.._..l.8.M| +peer0.org1.example.com | [1655 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:52:24.484 UTC [policies] Evaluate -> DEBU 1bb1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | [1960 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f2730 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [19e6 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b661f0 gate 1598907090260832400 evaluation starts +peer1.org1.example.com | 00000040 01 2c 7d d8 b6 24 8b |.,}..$.| +peer0.org1.example.com | [1656 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d8 6c fb 8b b4 bb 1e 3d 37 36 65 ac 75 a1 ab |D.l.....=76e.u..| +orderer0.example.com | "2020-08-31 20:52:24.484 UTC [policies] Evaluate -> DEBU 1bb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +peer1.org2.example.com | [1961 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f2730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [19e7 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b661f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1828 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | 00000010 d6 a9 39 2d c0 86 11 7a 78 b0 38 50 42 86 02 0c |..9-...zx.8PB...| +orderer0.example.com | "2020-08-31 20:52:24.485 UTC [policies] Evaluate -> DEBU 1bb3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +peer1.org2.example.com | [1962 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f2730 principal evaluation fails +peer0.org2.example.com | [19e8 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b661f0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1829 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1657 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c cc 0d 20 6f 76 e1 8c d0 cb c7 |0E.!.... ov.....| +orderer0.example.com | "2020-08-31 20:52:24.491 UTC [cauthdsl] func1 -> DEBU 1bb4 0xc001385d80 gate 1598907144491747100 evaluation starts" +peer1.org2.example.com | [1963 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f2730 gate 1598907094473932500 evaluation fails +peer0.org2.example.com | [19e9 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b661f0 principal matched by identity 0 +peer1.org1.example.com | [182a 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 1b d5 69 4c 6d 69 9c 90 b7 33 ef e3 3e b6 ad 35 |..iLmi...3..>..5| +orderer0.example.com | "2020-08-31 20:52:24.492 UTC [cauthdsl] func2 -> DEBU 1bb5 0xc001385d80 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1964 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [19ea 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | [182b 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 88 66 a7 0f c2 02 20 36 d5 b9 d9 13 ff 20 2c 0e |.f.... 6..... ,.| +orderer0.example.com | "2020-08-31 20:52:24.492 UTC [cauthdsl] func2 -> DEBU 1bb6 0xc001385d80 processing identity 0 with bytes of fe10e0" +peer1.org2.example.com | [1965 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [182c 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 d5 6c e0 aa 03 16 06 7e 75 b9 95 a8 7d b7 5a 26 |.l.....~u...}.Z&| +orderer0.example.com | "2020-08-31 20:52:24.492 UTC [cauthdsl] func2 -> DEBU 1bb7 0xc001385d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +peer1.org2.example.com | [1966 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [19eb 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | [182d 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 16 85 87 b4 f2 37 4f |.....7O| +orderer0.example.com | "2020-08-31 20:52:24.492 UTC [cauthdsl] func2 -> DEBU 1bb8 0xc001385d80 principal evaluation fails" +peer1.org2.example.com | [1967 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f2ca0 gate 1598907094478431600 evaluation starts +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | [182e 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1658 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:24.492 UTC [cauthdsl] func1 -> DEBU 1bb9 0xc001385d80 gate 1598907144491747100 evaluation fails" +peer1.org2.example.com | [1968 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f2ca0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | [182f 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1659 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.492 UTC [policies] Evaluate -> DEBU 1bba Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [1969 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f2ca0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | [1830 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [165a 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.493 UTC [policies] Evaluate -> DEBU 1bbb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +peer1.org2.example.com | [196a 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f2ca0 principal matched by identity 0 +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [1831 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [165b 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.493 UTC [policies] func1 -> DEBU 1bbc Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +peer1.org2.example.com | [196b 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | [19ec 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b661f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1832 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [165c 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.493 UTC [policies] Evaluate -> DEBU 1bbd Signature set did not satisfy policy /Channel/Application/Readers" +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [1833 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19ed 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b661f0 gate 1598907090260832400 evaluation succeeds +peer0.org1.example.com | [165d 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.493 UTC [policies] Evaluate -> DEBU 1bbe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +peer1.org2.example.com | [196c 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | [1834 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19ee 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [165e 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.493 UTC [policies] Evaluate -> DEBU 1bbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | [1835 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19ef 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [165f 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:52:24.493 UTC [policies] Evaluate -> DEBU 1bc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | [1836 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [19f0 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1660 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d8 6c fb 8b b4 bb 1e 3d 37 36 65 ac 75 a1 ab |D.l.....=76e.u..| +orderer0.example.com | "2020-08-31 20:52:24.493 UTC [policies] Evaluate -> DEBU 1bc1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | [19f1 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1837 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 d6 a9 39 2d c0 86 11 7a 78 b0 38 50 42 86 02 0c |..9-...zx.8PB...| +orderer0.example.com | "2020-08-31 20:52:24.494 UTC [cauthdsl] func1 -> DEBU 1bc2 0xc001384c80 gate 1598907144494368500 evaluation starts" +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [19f2 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | [1838 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1661 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c cc 0d 20 6f 76 e1 8c d0 cb c7 |0E.!.... ov.....| +orderer0.example.com | "2020-08-31 20:52:24.494 UTC [cauthdsl] func2 -> DEBU 1bc3 0xc001384c80 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [196d 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f2ca0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [1839 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 1b d5 69 4c 6d 69 9c 90 b7 33 ef e3 3e b6 ad 35 |..iLmi...3..>..5| +orderer0.example.com | "2020-08-31 20:52:24.494 UTC [cauthdsl] func2 -> DEBU 1bc4 0xc001384c80 processing identity 0 with bytes of fe10e0" +peer1.org2.example.com | [196e 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f2ca0 gate 1598907094478431600 evaluation succeeds +peer0.org2.example.com | [19f3 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | [183a 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | 00000020 88 66 a7 0f c2 02 20 36 d5 b9 d9 13 ff 20 2c 0e |.f.... 6..... ,.| +orderer0.example.com | "2020-08-31 20:52:24.494 UTC [cauthdsl] func2 -> DEBU 1bc5 0xc001384c80 principal matched by identity 0" +peer1.org2.example.com | [196f 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | [183b 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 d5 6c e0 aa 03 16 06 7e 75 b9 95 a8 7d b7 5a 26 |.l.....~u...}.Z&| +orderer0.example.com | "2020-08-31 20:52:24.494 UTC [msp.identity] Verify -> DEBU 1bc6 Verify: digest = 00000000 73 b4 7f 7b 48 4a ab 35 c6 2a 01 a7 16 87 ac 7b |s..{HJ.5.*.....{| +peer1.org2.example.com | [1970 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | [183c 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000040 16 85 87 b4 f2 37 4f |.....7O| +orderer0.example.com | 00000010 d3 29 65 3a 6a f2 e2 85 b7 1e 06 eb 90 6c 60 32 |.)e:j........l`2|" +peer1.org2.example.com | [1971 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | [183d 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1662 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:24.494 UTC [msp.identity] Verify -> DEBU 1bc7 Verify: sig = 00000000 30 45 02 21 00 e6 b5 c6 4d 9e 3a 88 39 f3 9b fe |0E.!....M.:.9...| +peer1.org2.example.com | [1972 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [183e 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1663 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000010 28 3e 45 4f ab 07 02 84 2e d5 da 7d 9a 11 95 16 |(>EO.......}....| +peer1.org2.example.com | [1973 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [19f4 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | [183f 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1664 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | 00000020 d0 9d 0f 32 9c 02 20 1e dd d1 f9 67 a2 e7 34 ea |...2.. ....g..4.| +peer1.org2.example.com | [1974 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [1840 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1665 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 ca e6 88 e9 1f 0d 72 fb 1c 13 83 e0 8f 83 b1 |.......r........| +orderer0.example.com | 00000030 53 36 44 05 bb 33 f2 7b 56 87 77 b2 7c a3 a5 80 |S6D..3.{V.w.|...| +peer0.org2.example.com | [19f5 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | [1975 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1841 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 57 fc 35 5c 16 19 54 69 8f 56 c2 9d 27 01 8d d0 |W.5\..Ti.V..'...| +orderer0.example.com | 00000040 1b 7e 62 6d 7f e8 0f |.~bm...|" +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | [1976 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1842 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f781c0 gate 1598907095026890700 evaluation starts +peer0.org1.example.com | [1666 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd ac 23 c8 ff 53 ce 34 53 b2 93 |0E.!...#..S.4S..| +orderer0.example.com | "2020-08-31 20:52:24.495 UTC [cauthdsl] func2 -> DEBU 1bc8 0xc001384c80 principal evaluation succeeds for identity 0" +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | [1977 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1843 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f781c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 79 9c 19 ec 7e 77 ef 6e 89 d5 14 b6 e1 5a ae d6 |y...~w.n.....Z..| +orderer0.example.com | "2020-08-31 20:52:24.495 UTC [cauthdsl] func1 -> DEBU 1bc9 0xc001384c80 gate 1598907144494368500 evaluation succeeds" +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | [1978 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1844 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f781c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000020 34 7c 56 46 09 02 20 30 7c 31 0c 0b 85 09 f8 e6 |4|VF.. 0|1......| +orderer0.example.com | "2020-08-31 20:52:24.495 UTC [policies] Evaluate -> DEBU 1bca Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [1979 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1845 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f781c0 principal matched by identity 0 +peer0.org1.example.com | 00000030 18 47 58 fb 2e da be 0b 60 94 5b 70 d5 1e 4e d8 |.GX.....`.[p..N.| +orderer0.example.com | "2020-08-31 20:52:24.495 UTC [policies] Evaluate -> DEBU 1bcb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [19f6 08-31 20:51:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [197a 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1846 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 e3 df 1d 27 0f 55 03 7e 01 74 87 d8 0a fe 96 |5...'.U.~.t.....| +peer0.org1.example.com | 00000040 01 53 b1 76 32 c0 87 |.S.v2..| +orderer0.example.com | "2020-08-31 20:52:24.495 UTC [policies] Evaluate -> DEBU 1bcc Signature set satisfies policy /Channel/Orderer/Readers" +peer0.org2.example.com | [19f7 08-31 20:51:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [197b 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f3ea0 gate 1598907094483214100 evaluation starts +peer1.org1.example.com | 00000010 2e 95 46 dc 04 49 32 1c 78 38 93 a5 a0 97 29 f6 |..F..I2.x8....).| +peer0.org1.example.com | [1667 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:24.495 UTC [policies] Evaluate -> DEBU 1bcd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer0.org2.example.com | [19f8 08-31 20:51:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [197c 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f3ea0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1847 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 a9 9b 8a 91 6a 3e 56 6c 67 49 b3 |0D. .....j>VlgI.| +peer0.org1.example.com | [1668 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:24.495 UTC [policies] Evaluate -> DEBU 1bce Signature set satisfies policy /Channel/Readers" +peer0.org2.example.com | [19f9 08-31 20:51:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [197d 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f3ea0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000010 0d 69 fb cd 57 09 79 4e c5 1a 8d 7e fe 97 23 6c |.i..W.yN...~..#l| +peer0.org1.example.com | [1669 08-31 20:51:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.495 UTC [policies] Evaluate -> DEBU 1bcf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer0.org2.example.com | [19fa 08-31 20:51:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [197e 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f3ea0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000020 ae c6 ce 98 02 20 10 4c be d9 39 a2 eb 13 95 3b |..... .L..9....;| +peer0.org1.example.com | [166a 08-31 20:51:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.495 UTC [common.deliver] deliverBlocks -> DEBU 1bd0 [channel: businesschannel] Received seekInfo (0xc00093ff40) start: > stop: > from 172.18.0.9:51014" +peer0.org2.example.com | [19fb 08-31 20:51:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [197f 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f3ea0 principal evaluation fails +peer1.org1.example.com | 00000030 b3 50 90 2d bf 6d f4 f8 3c e4 50 c0 a6 34 2b 3c |.P.-.m..<.P..4+<| +peer0.org1.example.com | [166b 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.495 UTC [fsblkstorage] Next -> DEBU 1bd1 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +peer0.org2.example.com | [19fc 08-31 20:51:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1980 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f3ea0 gate 1598907094483214100 evaluation fails +peer1.org1.example.com | 00000040 d1 d9 a3 e4 03 bf |......| +peer0.org1.example.com | [166c 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.496 UTC [fsblkstorage] newBlockfileStream -> DEBU 1bd2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97392]" +peer0.org2.example.com | [19fd 08-31 20:51:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1981 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1848 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f781c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [166d 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +orderer0.example.com | "2020-08-31 20:52:24.496 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bd3 Remaining bytes=[41179], Going to peek [8] bytes" +peer0.org2.example.com | [19fe 08-31 20:51:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1982 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1849 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f781c0 gate 1598907095026890700 evaluation succeeds +peer0.org1.example.com | [166e 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.496 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bd4 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97392], bytesOffset=[97395]}" +peer0.org2.example.com | [19ff 08-31 20:51:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1983 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [184a 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1670 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.496 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bd5 blockbytes [41176] read from file [0]" +peer0.org2.example.com | [1a00 08-31 20:51:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1984 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003916410 gate 1598907094486688300 evaluation starts +peer1.org1.example.com | [184b 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:24.496 UTC [common.deliver] deliverBlocks -> DEBU 1bd6 [channel: businesschannel] Delivering block [6] for (0xc00093ff40) for 172.18.0.9:51014" +peer0.org1.example.com | [166f 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a01 08-31 20:51:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1985 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003916410 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [184c 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:24.496 UTC [common.deliver] deliverBlocks -> DEBU 1bd7 [channel: businesschannel] Done delivering to 172.18.0.9:51014 for (0xc00093ff40)" +peer0.org1.example.com | [1671 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a02 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1986 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003916410 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [184d 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:24.497 UTC [common.deliver] Handle -> DEBU 1bd8 Waiting for new SeekInfo from 172.18.0.9:51014" +peer0.org1.example.com | [1672 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a03 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1987 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003916410 principal matched by identity 0 +peer1.org1.example.com | [184e 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.497 UTC [common.deliver] Handle -> DEBU 1bd9 Attempting to read seek info message from 172.18.0.9:51014" +peer0.org1.example.com | [1673 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a04 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1988 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | [184f 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +orderer0.example.com | "2020-08-31 20:52:24.497 UTC [fsblkstorage] waitForBlock -> DEBU 1bda Came out of wait. maxAvailaBlockNumber=[6]" +peer0.org1.example.com | [1674 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a05 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [1850 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:24.497 UTC [fsblkstorage] waitForBlock -> DEBU 1bdb Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +peer0.org1.example.com | [1675 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a06 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1989 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | [1851 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1676 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.505 UTC [common.deliver] Handle -> WARN 1bdc Error reading from 172.18.0.9:51014: rpc error: code = Canceled desc = context canceled" +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | [1a07 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1677 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1852 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:24.505 UTC [orderer.common.server] func1 -> DEBU 1bdd Closing Deliver stream" +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | [1a08 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1678 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1853 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.506 UTC [grpc] infof -> DEBU 1bde transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | [1a09 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1679 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1854 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.505 UTC [comm.grpc.server] 1 -> INFO 1bdf streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51014 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.7422ms +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [1a0a 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [167b 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1855 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be0 Sending msg of 28 bytes to 2 on channel businesschannel took 33.6µs" +peer1.org2.example.com | [198a 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003916410 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1a0b 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [167c 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1856 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 449.6µs " +peer1.org2.example.com | [198b 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003916410 gate 1598907094486688300 evaluation succeeds +peer0.org2.example.com | [1a0c 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [167d 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1857 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be2 Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +peer1.org2.example.com | [198c 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a0d 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c1fd0 gate 1598907090319950800 evaluation starts +peer0.org1.example.com | [167e 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1858 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 392.8µs " +peer1.org2.example.com | [198d 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a0e 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c1fd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [167a 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1859 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1be4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [198e 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1a0f 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c1fd0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [167f 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [185a 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.600 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1be5 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org2.example.com | [198f 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1a10 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c1fd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1680 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c580 gate 1598907085754326900 evaluation starts +peer1.org1.example.com | [185b 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.669 UTC [orderer.common.server] Deliver -> DEBU 1be6 Starting new Deliver handler" +peer1.org2.example.com | [1990 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | [1a11 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c1fd0 principal evaluation fails +peer0.org1.example.com | [1681 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c580 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [185c 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.669 UTC [common.deliver] Handle -> DEBU 1be7 Starting new deliver loop for 172.18.0.9:51016" +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [1a12 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039c1fd0 gate 1598907090319950800 evaluation fails +peer0.org1.example.com | [1682 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c580 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [185d 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:24.669 UTC [common.deliver] Handle -> DEBU 1be8 Attempting to read seek info message from 172.18.0.9:51016" +peer1.org2.example.com | [1991 08-31 20:51:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | [1a13 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1683 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c580 principal matched by identity 0 +peer1.org1.example.com | [185f 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.671 UTC [policies] Evaluate -> DEBU 1be9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | [1a14 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1684 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | [1860 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.671 UTC [policies] Evaluate -> DEBU 1bea This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | [1a15 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [185e 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.671 UTC [policies] Evaluate -> DEBU 1beb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | [1a16 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bcc540 gate 1598907090323553500 evaluation starts +peer0.org1.example.com | [1685 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | [1861 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.671 UTC [policies] Evaluate -> DEBU 1bec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [1a17 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bcc540 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | [1862 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.671 UTC [policies] Evaluate -> DEBU 1bed == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org2.example.com | [1992 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [1a18 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | [1864 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.672 UTC [cauthdsl] func1 -> DEBU 1bee 0xc0012eda00 gate 1598907144672053400 evaluation starts" +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [1a19 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bcc540 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | [1865 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.672 UTC [cauthdsl] func2 -> DEBU 1bef 0xc0012eda00 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [1993 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | [1a1a 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bcc540 principal matched by identity 0 +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [1866 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.672 UTC [cauthdsl] func2 -> DEBU 1bf0 0xc0012eda00 processing identity 0 with bytes of fe10e0" +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [1a1b 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e cd ab ed 1a fc af ba 52 93 0a 47 92 bf 8c ce |........R..G....| +peer0.org1.example.com | [1686 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c580 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1863 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:24.672 UTC [cauthdsl] func2 -> DEBU 1bf1 0xc0012eda00 principal matched by identity 0" +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000010 01 61 a6 a6 03 a3 47 c7 f5 1f b4 8e a5 18 0e 75 |.a....G........u| +peer0.org1.example.com | [1687 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c580 gate 1598907085754326900 evaluation succeeds +peer1.org1.example.com | [1867 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.673 UTC [msp.identity] Verify -> DEBU 1bf2 Verify: digest = 00000000 d0 b5 6a 11 9d f9 47 cf 05 d0 3e e8 95 8b c4 84 |..j...G...>.....| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [1a1c 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 3a 28 c3 ba 72 b3 a2 51 bc 00 |0E.!..:(..r..Q..| +peer0.org1.example.com | [1688 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1868 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000010 34 f3 40 98 07 4e ab e3 b9 6d 9c 3d 91 65 30 82 |4.@..N...m.=.e0.|" +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | 00000010 a3 86 3e d4 ef 98 31 9f 20 ab 5c 31 69 bf 31 45 |..>...1. .\1i.1E| +peer0.org1.example.com | [1689 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1869 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.673 UTC [msp.identity] Verify -> DEBU 1bf3 Verify: sig = 00000000 30 44 02 20 01 f9 43 d6 4b a0 51 46 b7 db c2 fa |0D. ..C.K.QF....| +peer1.org2.example.com | [1994 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 d0 65 0d be 6f 02 20 64 ad 90 72 89 7d aa 3d e3 |.e..o. d..r.}.=.| +peer0.org1.example.com | [168a 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [186a 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | 00000010 23 bd a9 a3 6d 18 b8 fb 92 4b 3d c4 ca da c7 89 |#...m....K=.....| +peer1.org2.example.com | [1995 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 b1 1c 6b 54 63 be 93 71 80 d8 42 e9 29 0d d4 94 |..kTc..q..B.)...| +peer0.org1.example.com | [168b 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [186b 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000020 99 94 95 96 02 20 74 8c d4 dc 11 e8 73 17 6a e3 |..... t.....s.j.| +peer1.org2.example.com | [1996 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000040 e2 03 56 08 f5 76 a0 |..V..v.| +peer0.org1.example.com | [168c 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | [186c 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | 00000030 f3 b6 e0 14 4c a8 20 d8 51 8e 1e c1 1f 20 b0 66 |....L. .Q.... .f| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [1a1d 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bcc540 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [186d 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000040 96 3e 90 49 b1 e9 |.>.I..|" +peer1.org2.example.com | [1997 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | [1a1e 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bcc540 gate 1598907090323553500 evaluation succeeds +peer0.org1.example.com | [168d 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | [186e 08-31 20:51:35.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +orderer0.example.com | "2020-08-31 20:52:24.674 UTC [cauthdsl] func2 -> DEBU 1bf4 0xc0012eda00 principal evaluation succeeds for identity 0" +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | [1a1f 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | [186f 08-31 20:51:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:52:24.674 UTC [cauthdsl] func1 -> DEBU 1bf5 0xc0012eda00 gate 1598907144672053400 evaluation succeeds" +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | [1a20 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | [1870 08-31 20:51:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161024 +orderer0.example.com | "2020-08-31 20:52:24.674 UTC [policies] Evaluate -> DEBU 1bf6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | [1a21 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | [1871 08-31 20:51:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9E68E19F6ACF4B5194263DF3B496650E8318510D1E95218C2B87C230E0B77C36 +orderer0.example.com | "2020-08-31 20:52:24.674 UTC [policies] Evaluate -> DEBU 1bf7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [1a22 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [1872 08-31 20:51:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:52:24.674 UTC [policies] Evaluate -> DEBU 1bf8 Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org2.example.com | [1998 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a23 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1873 08-31 20:51:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [168e 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +orderer0.example.com | "2020-08-31 20:52:24.674 UTC [policies] Evaluate -> DEBU 1bf9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org2.example.com | [1999 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a24 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1874 08-31 20:51:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +orderer0.example.com | "2020-08-31 20:52:24.675 UTC [policies] Evaluate -> DEBU 1bfa Signature set satisfies policy /Channel/Readers" +peer1.org2.example.com | [199a 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1a25 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1875 08-31 20:51:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [168f 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | "2020-08-31 20:52:24.675 UTC [policies] Evaluate -> DEBU 1bfb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org2.example.com | [199b 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a26 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1876 08-31 20:51:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +orderer0.example.com | "2020-08-31 20:52:24.675 UTC [common.deliver] deliverBlocks -> DEBU 1bfc [channel: testchainid] Received seekInfo (0xc000dee600) start: > stop: > from 172.18.0.9:51016" +peer1.org2.example.com | [199c 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a27 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1877 08-31 20:51:35.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +orderer0.example.com | "2020-08-31 20:52:24.676 UTC [fsblkstorage] Next -> DEBU 1bfd Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer1.org2.example.com | [199d 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1a28 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1878 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +orderer0.example.com | "2020-08-31 20:52:24.676 UTC [fsblkstorage] newBlockfileStream -> DEBU 1bfe newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +peer1.org2.example.com | [199e 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1a29 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1879 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +orderer0.example.com | "2020-08-31 20:52:24.676 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bff Remaining bytes=[30411], Going to peek [8] bytes" +peer1.org2.example.com | [199f 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1a2a 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1690 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [187a 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:24.676 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c00 Returning blockbytes - length=[30408], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +peer1.org2.example.com | [19a0 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003944c80 gate 1598907094492807900 evaluation starts +peer0.org2.example.com | [1a2b 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1691 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [187b 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.677 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c01 blockbytes [30408] read from file [0]" +peer1.org2.example.com | [19a1 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003944c80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1a2c 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1692 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [187c 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.677 UTC [common.deliver] deliverBlocks -> DEBU 1c02 [channel: testchainid] Delivering block [1] for (0xc000dee600) for 172.18.0.9:51016" +peer1.org2.example.com | [19a2 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003944c80 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1a2d 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1693 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [187d 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:24.677 UTC [common.deliver] deliverBlocks -> DEBU 1c03 [channel: testchainid] Done delivering to 172.18.0.9:51016 for (0xc000dee600)" +peer1.org2.example.com | [19a3 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003944c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [1694 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a2e 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [187e 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.678 UTC [common.deliver] Handle -> DEBU 1c04 Waiting for new SeekInfo from 172.18.0.9:51016" +peer1.org2.example.com | [19a4 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003944c80 principal evaluation fails +peer0.org1.example.com | [1695 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1a2f 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [187f 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.678 UTC [common.deliver] Handle -> DEBU 1c05 Attempting to read seek info message from 172.18.0.9:51016" +peer1.org2.example.com | [19a5 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003944c80 gate 1598907094492807900 evaluation fails +peer0.org1.example.com | [1696 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1a30 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1880 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.684 UTC [common.deliver] Handle -> WARN 1c06 Error reading from 172.18.0.9:51016: rpc error: code = Canceled desc = context canceled" +peer1.org2.example.com | [19a6 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1697 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1a31 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1881 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.684 UTC [orderer.common.server] func1 -> DEBU 1c07 Closing Deliver stream" +peer1.org2.example.com | [19a7 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1698 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446c560 gate 1598907085759680700 evaluation starts +peer0.org2.example.com | [1a32 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1882 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.684 UTC [comm.grpc.server] 1 -> INFO 1c08 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51016 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.446ms +peer1.org2.example.com | [19a8 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [1699 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446c560 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1a33 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1883 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.684 UTC [grpc] infof -> DEBU 1c09 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org2.example.com | [19a9 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039451f0 gate 1598907094496004500 evaluation starts +peer0.org1.example.com | [169a 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446c560 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1a34 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1884 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.816 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c0a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [19aa 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039451f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [169b 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446c560 principal matched by identity 0 +peer0.org2.example.com | [1a35 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1885 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.816 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c0b Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs" +peer1.org2.example.com | [19ab 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039451f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [169c 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [1a36 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1886 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.817 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c0c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 356.5µs " +peer1.org2.example.com | [19ac 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039451f0 principal matched by identity 0 +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [1a37 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1887 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +orderer0.example.com | "2020-08-31 20:52:24.940 UTC [orderer.common.server] Deliver -> DEBU 1c0d Starting new Deliver handler" +peer1.org2.example.com | [19ad 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | [169d 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | [1a38 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1888 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.941 UTC [common.deliver] Handle -> DEBU 1c0e Starting new deliver loop for 172.18.0.9:51018" +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [1a39 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1889 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:24.941 UTC [common.deliver] Handle -> DEBU 1c0f Attempting to read seek info message from 172.18.0.9:51018" +peer1.org2.example.com | [19ae 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | [1a3a 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [188a 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:24.942 UTC [policies] Evaluate -> DEBU 1c10 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [1a3b 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [188b 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:24.942 UTC [policies] Evaluate -> DEBU 1c11 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [1a3c 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [188c 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:24.943 UTC [policies] Evaluate -> DEBU 1c12 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | [169e 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446c560 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1a3d 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [188d 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:24.943 UTC [policies] Evaluate -> DEBU 1c13 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [169f 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446c560 gate 1598907085759680700 evaluation succeeds +peer0.org2.example.com | [1a3e 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [188e 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:24.943 UTC [policies] Evaluate -> DEBU 1c14 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org2.example.com | [19af 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039451f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [16a0 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1a3f 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [188f 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbc6f0 gate 1598907095448686400 evaluation starts +orderer0.example.com | "2020-08-31 20:52:24.944 UTC [cauthdsl] func1 -> DEBU 1c15 0xc001232420 gate 1598907144944472600 evaluation starts" +peer1.org2.example.com | [19b0 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039451f0 gate 1598907094496004500 evaluation succeeds +peer0.org1.example.com | [16a1 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1a40 08-31 20:51:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1890 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbc6f0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:24.944 UTC [cauthdsl] func2 -> DEBU 1c16 0xc001232420 signed by 0 principal evaluation starts (used [false])" +peer1.org2.example.com | [19b1 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [16a2 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1a41 08-31 20:51:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816101F +peer1.org1.example.com | [1891 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbc6f0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:24.944 UTC [cauthdsl] func2 -> DEBU 1c17 0xc001232420 processing identity 0 with bytes of fe10e0" +peer1.org2.example.com | [19b2 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [16a3 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1a42 08-31 20:51:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A202A8099942108DFF3A8567E015CF13C1556ABDCE3500D7CADCC7584B351155 +peer1.org1.example.com | [1892 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbc6f0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:24.944 UTC [cauthdsl] func2 -> DEBU 1c18 0xc001232420 principal matched by identity 0" +peer1.org2.example.com | [19b3 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [16a4 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a43 08-31 20:51:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1893 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 24 6e 9e 14 7d e7 b2 c9 08 af 03 12 73 c3 09 |.$n..}.......s..| +orderer0.example.com | "2020-08-31 20:52:24.944 UTC [msp.identity] Verify -> DEBU 1c19 Verify: digest = 00000000 58 bc e0 61 9b ab 65 73 57 75 56 f8 67 00 bc 9b |X..a..esWuV.g...| +peer1.org2.example.com | [19b4 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [16a5 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a44 08-31 20:51:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | 00000010 df 45 1c 2a 6e 2f f1 cb 11 9b f8 40 fa dd bd 55 |.E.*n/.....@...U| +orderer0.example.com | 00000010 e6 2a 5e ae 8a 07 c8 11 87 77 fb 15 bf 83 4f 85 |.*^......w....O.|" +peer1.org2.example.com | [19b5 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16a6 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | [1a45 08-31 20:51:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +orderer0.example.com | "2020-08-31 20:52:24.945 UTC [msp.identity] Verify -> DEBU 1c1a Verify: sig = 00000000 30 45 02 21 00 c0 3e e0 9c 44 c8 8b 81 a2 5c ca |0E.!..>..D....\.| +peer1.org1.example.com | [1894 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 4d 48 5d ac 09 38 f7 9f 1b 6f 61 |0D. 0MH]..8...oa| +peer1.org2.example.com | [19b6 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [1a46 08-31 20:51:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +orderer0.example.com | 00000010 2b 93 92 2c 37 80 dd 63 31 5b 1f 08 03 f6 55 e2 |+..,7..c1[....U.| +peer1.org1.example.com | 00000010 c2 9e bf f7 85 a9 31 70 9e a5 87 ff 3c 66 70 06 |......1p.... DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | [19b7 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1a47 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000020 63 49 42 30 f9 02 20 22 a7 66 22 b6 e7 af 32 3c |cIB0.. ".f"...2<| +peer1.org1.example.com | 00000020 6d df a0 7c 02 20 46 c0 d7 c1 e9 9f 63 d2 fe a0 |m..|. F.....c...| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | [19b8 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a48 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000030 46 61 6f 2b c2 16 e6 f2 31 6c 56 33 87 31 9b c6 |Fao+....1lV3.1..| +peer1.org1.example.com | 00000030 66 80 64 e5 7c 76 02 fe 1d 55 a9 b6 73 4d 2b 12 |f.d.|v...U..sM+.| +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | [19b9 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a49 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | 00000040 b3 38 70 0a a7 45 91 |.8p..E.|" +peer1.org1.example.com | 00000040 4e a4 b0 1e ba 09 |N.....| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | [19ba 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1a4a 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:24.945 UTC [cauthdsl] func2 -> DEBU 1c1b 0xc001232420 principal evaluation succeeds for identity 0" +peer1.org1.example.com | [1895 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbc6f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [19bb 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1a4b 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:24.945 UTC [cauthdsl] func1 -> DEBU 1c1c 0xc001232420 gate 1598907144944472600 evaluation succeeds" +peer1.org1.example.com | [1896 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbc6f0 gate 1598907095448686400 evaluation succeeds +peer0.org1.example.com | [16a8 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | [19bc 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1a4c 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.945 UTC [policies] Evaluate -> DEBU 1c1d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [1897 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [19bd 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b03f0 gate 1598907094498425800 evaluation starts +peer0.org2.example.com | [1a4d 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:24.945 UTC [policies] Evaluate -> DEBU 1c1e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [1898 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [16a9 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | [19be 08-31 20:51:34.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b03f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1a4e 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.945 UTC [policies] Evaluate -> DEBU 1c1f Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org1.example.com | [1899 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | [19bf 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b03f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1a4f 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.946 UTC [policies] Evaluate -> DEBU 1c20 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org1.example.com | [189a 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | [19c0 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b03f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1a50 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.946 UTC [policies] Evaluate -> DEBU 1c21 Signature set satisfies policy /Channel/Readers" +peer1.org1.example.com | [189b 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [19c1 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b03f0 principal evaluation fails +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | [1a51 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:24.946 UTC [policies] Evaluate -> DEBU 1c22 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org1.example.com | [189c 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [19c2 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b03f0 gate 1598907094498425800 evaluation fails +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [1a52 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.946 UTC [common.deliver] deliverBlocks -> DEBU 1c23 [channel: testchainid] Received seekInfo (0xc000deec00) start: > stop: > from 172.18.0.9:51018" +peer1.org1.example.com | [189d 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [19c3 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [16aa 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a53 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.946 UTC [fsblkstorage] Next -> DEBU 1c24 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer1.org1.example.com | [189e 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [19c4 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [16ab 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a54 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.946 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c25 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +peer1.org1.example.com | [189f 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [19c5 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [16ac 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1a55 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.946 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c26 Remaining bytes=[30411], Going to peek [8] bytes" +peer1.org1.example.com | [18a0 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19c6 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b0960 gate 1598907094501033000 evaluation starts +peer0.org1.example.com | [16ad 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a56 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.947 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c27 Returning blockbytes - length=[30408], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +peer1.org1.example.com | [18a1 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19c7 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b0960 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [16ae 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:24.947 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c28 blockbytes [30408] read from file [0]" +peer0.org2.example.com | [1a57 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18a2 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19c8 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b0960 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [16af 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:24.947 UTC [common.deliver] deliverBlocks -> DEBU 1c29 [channel: testchainid] Delivering block [1] for (0xc000deec00) for 172.18.0.9:51018" +peer0.org2.example.com | [1a58 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [18a3 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19c9 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b0960 principal matched by identity 0 +peer0.org1.example.com | [16b0 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:24.947 UTC [common.deliver] deliverBlocks -> DEBU 1c2a [channel: testchainid] Done delivering to 172.18.0.9:51018 for (0xc000deec00)" +peer0.org2.example.com | [1a59 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [18a4 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19ca 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | [16b1 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:24.947 UTC [common.deliver] Handle -> DEBU 1c2b Waiting for new SeekInfo from 172.18.0.9:51018" +peer0.org2.example.com | [1a5a 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [18a5 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [16b2 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044846e0 gate 1598907085764937700 evaluation starts +orderer0.example.com | "2020-08-31 20:52:24.947 UTC [common.deliver] Handle -> DEBU 1c2c Attempting to read seek info message from 172.18.0.9:51018" +peer0.org2.example.com | [1a5b 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18a6 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16b3 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044846e0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:24.963 UTC [policies] Evaluate -> DEBU 1c2d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org2.example.com | [1a5c 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [18a7 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16b4 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044846e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [19cb 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +orderer0.example.com | "2020-08-31 20:52:24.963 UTC [policies] Evaluate -> DEBU 1c2e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org2.example.com | [1a5d 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18a8 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [16b5 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044846e0 principal matched by identity 0 +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | [1a5e 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:24.963 UTC [policies] Evaluate -> DEBU 1c2f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org1.example.com | [18aa 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16b6 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | [1a5f 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +orderer0.example.com | "2020-08-31 20:52:24.963 UTC [policies] Evaluate -> DEBU 1c30 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org1.example.com | [18a9 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | [1a60 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.963 UTC [policies] Evaluate -> DEBU 1c31 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer1.org1.example.com | [18ab 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [16b7 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [1a61 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:24.964 UTC [cauthdsl] func1 -> DEBU 1c32 0xc0012dfa30 gate 1598907144964099100 evaluation starts" +peer1.org1.example.com | [18ac 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | [19cc 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b0960 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1a62 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:24.964 UTC [cauthdsl] func2 -> DEBU 1c33 0xc0012dfa30 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [18ad 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | [19cd 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039b0960 gate 1598907094501033000 evaluation succeeds +peer0.org2.example.com | [1a63 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:24.964 UTC [cauthdsl] func2 -> DEBU 1c34 0xc0012dfa30 processing identity 0 with bytes of fe10e0" +peer1.org1.example.com | [18ae 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | [19ce 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a64 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:24.964 UTC [cauthdsl] func2 -> DEBU 1c35 0xc0012dfa30 principal matched by identity 0" +peer1.org1.example.com | [18af 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [19cf 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1a65 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:24.964 UTC [msp.identity] Verify -> DEBU 1c36 Verify: digest = 00000000 50 6d 7a 56 f1 2e 6d 00 31 29 76 ad b9 9c 30 78 |PmzV..m.1)v...0x| +peer1.org1.example.com | [18b0 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [16b8 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044846e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [19d0 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1a66 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | 00000010 54 50 19 5c a0 a7 71 f6 86 04 46 8a 43 aa 35 f2 |TP.\..q...F.C.5.|" +peer1.org1.example.com | [18b1 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16b9 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044846e0 gate 1598907085764937700 evaluation succeeds +peer1.org2.example.com | [19d1 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1a67 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0a970 gate 1598907090547419800 evaluation starts +orderer0.example.com | "2020-08-31 20:52:24.965 UTC [msp.identity] Verify -> DEBU 1c37 Verify: sig = 00000000 30 45 02 21 00 86 ff 3a 8f 3a 4f f6 40 f4 1e 39 |0E.!...:.:O.@..9| +peer1.org1.example.com | [18b2 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [16ba 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [19d2 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [1a68 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0a970 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | 00000010 06 66 59 f3 52 d7 2f 6f be 73 b4 bc 1d 47 80 9f |.fY.R./o.s...G..| +peer1.org1.example.com | [18b3 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [16bb 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [1a69 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0a970 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | 00000020 e2 38 d1 03 c8 02 20 5b fb c1 22 76 5d 57 53 9f |.8.... [.."v]WS.| +peer1.org1.example.com | [18b4 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16bc 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [19d3 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | [1a6a 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0a970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +orderer0.example.com | 00000030 85 c5 06 be b8 1e 4b fe 64 3d 39 0b a3 d2 2d b9 |......K.d=9...-.| +peer1.org1.example.com | [18b5 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [16bd 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [1a6b 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0a970 principal evaluation fails +orderer0.example.com | 00000040 b6 d2 f1 3f 68 3d 91 |...?h=.|" +peer1.org1.example.com | [18b6 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [16be 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | [1a6c 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0a970 gate 1598907090547419800 evaluation fails +orderer0.example.com | "2020-08-31 20:52:24.965 UTC [cauthdsl] func2 -> DEBU 1c38 0xc0012dfa30 principal evaluation succeeds for identity 0" +peer0.org1.example.com | [16bf 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18b7 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [1a6d 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:24.965 UTC [cauthdsl] func1 -> DEBU 1c39 0xc0012dfa30 gate 1598907144964099100 evaluation succeeds" +peer1.org1.example.com | [18b8 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16c0 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [1a6e 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:24.965 UTC [policies] Evaluate -> DEBU 1c3a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [18b9 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16c1 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [19d4 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a6f 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:24.965 UTC [policies] Evaluate -> DEBU 1c3b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [18ba 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [16c2 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [19d5 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a70 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0aee0 gate 1598907090549675600 evaluation starts +orderer0.example.com | "2020-08-31 20:52:24.966 UTC [policies] Evaluate -> DEBU 1c3c Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org1.example.com | [18bb 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [16c3 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [19d6 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a71 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0aee0 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:24.966 UTC [policies] Evaluate -> DEBU 1c3d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org1.example.com | [18bc 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16c4 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [19d7 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [1a72 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0aee0 processing identity 0 with bytes of 115a4b0 +orderer0.example.com | "2020-08-31 20:52:24.966 UTC [policies] Evaluate -> DEBU 1c3e Signature set satisfies policy /Channel/Readers" +peer1.org1.example.com | [18bd 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [16c5 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [19d8 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a73 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0aee0 principal matched by identity 0 +orderer0.example.com | "2020-08-31 20:52:24.966 UTC [policies] Evaluate -> DEBU 1c3f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org1.example.com | [18be 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [16c6 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044858e0 gate 1598907085770249900 evaluation starts +peer1.org2.example.com | [19d9 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:24.966 UTC [common.deliver] deliverBlocks -> DEBU 1c40 [channel: testchainid] Received seekInfo (0xc000e48740) start: > stop: > from 172.18.0.9:51018" +peer0.org2.example.com | [1a74 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 5c f3 f8 a5 fd d1 b8 dc 55 e7 a5 08 a7 96 dd |"\.......U......| +peer1.org1.example.com | [18bf 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad 78 a8 54 de ec 82 59 91 8d ff 70 43 22 79 32 |.x.T...Y...pC"y2| +peer1.org1.example.com | 00000010 b8 e3 0c 08 66 d6 08 3d 79 32 36 16 6f 13 b9 f0 |....f..=y26.o...| +peer1.org2.example.com | [19da 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:24.967 UTC [fsblkstorage] Next -> DEBU 1c41 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer0.org2.example.com | 00000010 c2 af 80 8d d4 06 86 45 03 b2 f9 b1 c2 d2 2e d7 |.......E........| +peer1.org1.example.com | [18c0 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 e5 65 32 0e 85 2c c1 f3 65 a7 |0E.!...e2..,..e.| +peer1.org2.example.com | [19db 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.967 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c42 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +peer0.org1.example.com | [16c7 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044858e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1a75 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 7a d3 7e f5 26 2f 3f 93 7c 53 |0E.!..z.~.&/?.|S| +peer1.org1.example.com | 00000010 7a b5 1b 76 be 93 18 09 c8 0b fd 86 47 63 3d 19 |z..v........Gc=.| +peer1.org2.example.com | [19dc 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.967 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c43 Remaining bytes=[53341], Going to peek [8] bytes" +peer0.org1.example.com | [16c8 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044858e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | 00000010 77 8d 5f 61 b9 92 a5 ca 63 be d3 51 bd 76 2d f6 |w._a....c..Q.v-.| +peer1.org1.example.com | 00000020 a1 57 4b 47 22 02 20 2f 2e 95 ad 65 8e 8a 68 18 |.WKG". /...e..h.| +peer1.org2.example.com | [19dd 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.968 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c44 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer0.org1.example.com | [16c9 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044858e0 principal matched by identity 0 +peer0.org2.example.com | 00000020 b3 e1 2a fc bf 02 20 32 f0 79 d1 cb ff b1 78 2d |..*... 2.y....x-| +peer1.org1.example.com | 00000030 bc 72 31 3b 3a 7e f1 33 9c f5 75 e7 56 b7 f3 4d |.r1;:~.3..u.V..M| +peer1.org2.example.com | [19de 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:24.968 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c45 blockbytes [22927] read from file [0]" +peer0.org1.example.com | [16ca 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000030 7d c0 21 04 f6 31 a9 49 02 4a 17 28 1b c3 e5 b2 |}.!..1.I.J.(....| +peer1.org1.example.com | 00000040 dc 1e a3 d7 65 d1 ff |....e..| +orderer0.example.com | "2020-08-31 20:52:24.968 UTC [common.deliver] deliverBlocks -> DEBU 1c46 [channel: testchainid] Delivering block [0] for (0xc000e48740) for 172.18.0.9:51018" +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | 00000040 89 c0 f5 91 b6 a9 42 |......B| +peer1.org2.example.com | [19df 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [18c1 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:24.969 UTC [common.deliver] deliverBlocks -> DEBU 1c47 [channel: testchainid] Done delivering to 172.18.0.9:51018 for (0xc000e48740)" +peer0.org1.example.com | [16cb 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | [1a76 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0aee0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [19e0 08-31 20:51:34.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18c2 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2020-08-31 20:52:24.969 UTC [common.deliver] Handle -> DEBU 1c48 Waiting for new SeekInfo from 172.18.0.9:51018" +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [1a77 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0aee0 gate 1598907090549675600 evaluation succeeds +peer1.org2.example.com | [19e1 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18c3 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:24.969 UTC [common.deliver] Handle -> DEBU 1c49 Attempting to read seek info message from 172.18.0.9:51018" +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | [1a78 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [19e2 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:14031637786944006989 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [18c4 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:24.976 UTC [common.deliver] Handle -> WARN 1c4a Error reading from 172.18.0.9:51018: rpc error: code = Canceled desc = context canceled" +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [1a79 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [19e3 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:14031637786944006989 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer1.org1.example.com | [18c5 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:24.978 UTC [orderer.common.server] func1 -> DEBU 1c4c Closing Deliver stream" +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [1a7a 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [19e4 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18c6 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.978 UTC [comm.grpc.server] 1 -> INFO 1c4d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51018 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=38.0964ms +peer0.org1.example.com | [16cc 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044858e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1a7b 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [19e5 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 14031637786944006989, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes +peer1.org1.example.com | [18c7 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:24.978 UTC [grpc] infof -> DEBU 1c4b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org1.example.com | [16cd 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044858e0 gate 1598907085770249900 evaluation succeeds +peer0.org2.example.com | [1a7c 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19e6 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18c8 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:25.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4e Sending msg of 28 bytes to 2 on channel businesschannel took 22.8µs" +peer0.org1.example.com | [16ce 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1a7d 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [19e7 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 14031637786944006989, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes +peer1.org1.example.com | [18c9 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:25.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4f Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +peer0.org1.example.com | [16cf 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1a7e 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [19e8 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [18ca 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:25.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.6µs " +peer0.org1.example.com | [16d0 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1a7f 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [19e9 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18cb 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:25.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.6657ms " +peer0.org1.example.com | [16d1 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1a80 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [19ea 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [18cc 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:25.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c52 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [16d2 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a81 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19eb 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [18cd 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:25.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c53 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [16d3 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a82 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19ec 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [18ce 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:25.201 UTC [orderer.common.server] Deliver -> DEBU 1c54 Starting new Deliver handler" +peer0.org1.example.com | [16d4 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a83 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [19ed 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [18cf 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:25.201 UTC [common.deliver] Handle -> DEBU 1c55 Starting new deliver loop for 172.18.0.9:51020" +peer0.org1.example.com | [16d5 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a84 08-31 20:51:30.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19ee 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [18d0 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:25.201 UTC [common.deliver] Handle -> DEBU 1c56 Attempting to read seek info message from 172.18.0.9:51020" +peer0.org1.example.com | [16d6 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a85 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19ef 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [18d1 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:25.201 UTC [policies] Evaluate -> DEBU 1c57 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer0.org1.example.com | [16d7 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1a86 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19f0 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a00120 gate 1598907094684516100 evaluation starts +peer1.org1.example.com | [18d2 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:25.201 UTC [policies] Evaluate -> DEBU 1c58 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [16d8 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a87 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19f1 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a00120 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [18d3 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:25.202 UTC [policies] Evaluate -> DEBU 1c59 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer0.org1.example.com | [16d9 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1a88 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19f2 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a00120 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [18d4 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:25.202 UTC [policies] Evaluate -> DEBU 1c5a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer0.org1.example.com | [16da 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1a89 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19f3 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a00120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [18d5 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:25.202 UTC [policies] Evaluate -> DEBU 1c5b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org1.example.com | [16db 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1a8a 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [19f4 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a00120 principal evaluation fails +peer1.org1.example.com | [18d6 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:25.202 UTC [cauthdsl] func1 -> DEBU 1c5c 0xc000d8e680 gate 1598907145202306400 evaluation starts" +peer0.org1.example.com | [16dc 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1a8b 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19f5 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a00120 gate 1598907094684516100 evaluation fails +orderer0.example.com | "2020-08-31 20:52:25.202 UTC [cauthdsl] func2 -> DEBU 1c5d 0xc000d8e680 signed by 0 principal evaluation starts (used [false])" +peer1.org1.example.com | [18d7 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16dd 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a2d30 gate 1598907085774473000 evaluation starts +peer0.org2.example.com | [1a8c 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [19f6 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:25.202 UTC [cauthdsl] func2 -> DEBU 1c5e 0xc000d8e680 processing identity 0 with bytes of fe10e0" +peer1.org1.example.com | [18d8 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [16de 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a2d30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1a8d 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [19f7 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:25.202 UTC [cauthdsl] func2 -> DEBU 1c5f 0xc000d8e680 principal matched by identity 0" +peer1.org1.example.com | [18d9 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16df 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a2d30 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1a8e 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19f8 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:25.202 UTC [msp.identity] Verify -> DEBU 1c60 Verify: digest = 00000000 85 03 31 8e 58 ec 5a fc 15 4f 1e 8d 8a 97 9a 95 |..1.X.Z..O......| +peer1.org1.example.com | [18da 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [16e0 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a2d30 principal matched by identity 0 +peer0.org2.example.com | [1a8f 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a90 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a91 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a92 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a93 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a94 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a95 08-31 20:51:30.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a96 08-31 20:51:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1a97 08-31 20:51:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a98 08-31 20:51:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [19f9 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a00690 gate 1598907094686267000 evaluation starts +orderer0.example.com | 00000010 b1 5e 06 a6 d0 7d f7 84 2c 6d 3a b4 f9 d6 5a 5d |.^...}..,m:...Z]|" +peer0.org1.example.com | [16e1 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | [19fa 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a00690 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [18db 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1a99 08-31 20:51:30.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:25.202 UTC [msp.identity] Verify -> DEBU 1c61 Verify: sig = 00000000 30 45 02 21 00 b1 41 8b 7a 58 b0 e4 ae 68 05 0c |0E.!..A.zX...h..| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [19fb 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a00690 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [18dc 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a9a 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | 00000010 91 fb 4d f2 04 17 6a 85 fb a0 09 4e c1 52 b5 58 |..M...j....N.R.X| +peer0.org1.example.com | [16e2 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | [18dd 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1a9b 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +orderer0.example.com | 00000020 01 04 7e e0 44 02 20 6c ac 0e a5 81 d5 d9 51 b3 |..~.D. l......Q.| +peer1.org2.example.com | [19fc 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a00690 principal matched by identity 0 +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | [18de 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a9c 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +orderer0.example.com | 00000030 d1 bc a6 99 93 b5 86 f5 29 c4 b9 0a a1 41 24 b7 |........)....A$.| +peer1.org2.example.com | [19fd 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 38 f7 03 a3 ec c8 c5 a0 53 a1 da 5d a5 c9 ac |.8.......S..]...| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | [18df 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a9d 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | 00000040 1e 5c 64 e3 dd e3 ad |.\d....|" +peer1.org2.example.com | 00000010 a1 e9 6a d5 e6 30 d3 4d 91 a8 d0 0b b9 77 a2 aa |..j..0.M.....w..| +peer1.org1.example.com | [18e0 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1a9e 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:25.203 UTC [cauthdsl] func2 -> DEBU 1c62 0xc000d8e680 principal evaluation succeeds for identity 0" +peer1.org2.example.com | [19fe 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 c8 1b d1 fb 63 f4 f3 dd 45 18 eb |0D. .....c...E..| +peer1.org1.example.com | [18e1 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [1a9f 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:25.203 UTC [cauthdsl] func1 -> DEBU 1c63 0xc000d8e680 gate 1598907145202306400 evaluation succeeds" +peer1.org2.example.com | 00000010 06 98 a8 95 67 20 9c 17 b8 9d 9d 27 99 53 87 f4 |....g .....'.S..| +peer1.org1.example.com | [18e2 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [1aa0 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:25.203 UTC [policies] Evaluate -> DEBU 1c64 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | 00000020 24 56 74 78 02 20 1d b3 30 63 83 e3 0b 49 db 56 |$Vtx. ..0c...I.V| +peer1.org1.example.com | [18e3 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [16e3 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a2d30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1aa1 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +orderer0.example.com | "2020-08-31 20:52:25.203 UTC [policies] Evaluate -> DEBU 1c65 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org2.example.com | 00000030 2f 0b da 29 a4 5d b7 e6 b7 34 08 b5 23 50 30 0c |/..).]...4..#P0.| +peer1.org1.example.com | [18e4 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [16e4 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a2d30 gate 1598907085774473000 evaluation succeeds +peer0.org2.example.com | [1aa2 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 6b 8d 84 9c 5e 54 fd d2 47 1d 20 69 43 4d fe |.k...^T..G. iCM.| +orderer0.example.com | "2020-08-31 20:52:25.203 UTC [policies] Evaluate -> DEBU 1c66 Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org2.example.com | 00000040 37 ca 78 54 76 bb |7.xTv.| +peer1.org1.example.com | [18e5 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16e5 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 3f 62 5a 35 2f b7 98 f5 9f 3d 5c 78 23 88 16 ac |?bZ5/....=\x#...| +orderer0.example.com | "2020-08-31 20:52:25.203 UTC [policies] Evaluate -> DEBU 1c67 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org2.example.com | [19ff 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a00690 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [18e6 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [16e6 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1aa3 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 4f b9 fe ed 90 40 8a 5d 97 0f |0E.!..O....@.]..| +orderer0.example.com | "2020-08-31 20:52:25.204 UTC [policies] Evaluate -> DEBU 1c68 Signature set satisfies policy /Channel/Readers" +peer1.org2.example.com | [1a00 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a00690 gate 1598907094686267000 evaluation succeeds +peer1.org1.example.com | [18e7 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16e7 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 e7 9f bb 16 f0 5c 78 9d 1f e1 3b 86 8f 6d fa 71 |.....\x...;..m.q| +orderer0.example.com | "2020-08-31 20:52:25.204 UTC [policies] Evaluate -> DEBU 1c69 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org2.example.com | [1a01 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [18e8 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [16e8 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000020 2e df 67 7c 3f 02 20 1e b2 61 f8 d3 85 bc a8 47 |..g|?. ..a.....G| +orderer0.example.com | "2020-08-31 20:52:25.204 UTC [common.deliver] deliverBlocks -> DEBU 1c6a [channel: testchainid] Received seekInfo (0xc000e48e00) start: > stop: > from 172.18.0.9:51020" +peer1.org2.example.com | [1a02 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [18e9 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [16e9 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000030 6f d8 27 5f 77 e4 c5 e9 7e 55 bf 24 04 8d 63 1b |o.'_w...~U.$..c.| +orderer0.example.com | "2020-08-31 20:52:25.204 UTC [fsblkstorage] Next -> DEBU 1c6b Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer1.org2.example.com | [1a03 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [18ea 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | 00000040 06 92 b3 98 47 ca 24 |....G.$| +orderer0.example.com | "2020-08-31 20:52:25.204 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c6c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +peer1.org2.example.com | [1a04 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [18eb 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [16ea 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | [1aa4 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +orderer0.example.com | "2020-08-31 20:52:25.205 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c6d Remaining bytes=[53341], Going to peek [8] bytes" +peer1.org2.example.com | [1a05 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [18ec 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +orderer0.example.com | "2020-08-31 20:52:25.205 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c6e Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +peer1.org2.example.com | [1a06 08-31 20:51:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18ed 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | [1aa5 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 21 a3 d5 b2 6e 64 cc ee c8 58 |0E.!..!...nd...X| +orderer0.example.com | "2020-08-31 20:52:25.205 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c6f blockbytes [22927] read from file [0]" +peer1.org2.example.com | [1a07 08-31 20:51:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [18ee 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000010 a9 7b 63 7d 12 da ad c6 94 93 2e c5 12 79 9a 6f |.{c}.........y.o| +orderer0.example.com | "2020-08-31 20:52:25.205 UTC [common.deliver] deliverBlocks -> DEBU 1c70 [channel: testchainid] Delivering block [0] for (0xc000e48e00) for 172.18.0.9:51020" +peer1.org2.example.com | [1a08 08-31 20:51:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 b3 5c 42 54 25 30 be b4 7c 78 b0 29 0c aa |...\BT%0..|x.)..| +peer1.org1.example.com | [18ef 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | 00000020 5f ce cd 57 8e 02 20 69 c1 40 56 f5 92 19 ec 1f |_..W.. i.@V.....| +orderer0.example.com | "2020-08-31 20:52:25.205 UTC [common.deliver] deliverBlocks -> DEBU 1c71 [channel: testchainid] Done delivering to 172.18.0.9:51020 for (0xc000e48e00)" +peer1.org2.example.com | 00000010 90 ce 7f 27 82 1e a3 94 11 f2 89 16 2f a4 cd 3c |...'......../..<| +peer1.org1.example.com | [18f0 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [16eb 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 49 f9 2d 3c 7e 6e 27 40 72 7a 7d 7c b6 04 f5 d1 |I.-<~n'@rz}|....| +orderer0.example.com | "2020-08-31 20:52:25.205 UTC [common.deliver] Handle -> DEBU 1c72 Waiting for new SeekInfo from 172.18.0.9:51020" +peer1.org2.example.com | [1a09 08-31 20:51:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 d3 29 2b 65 f1 14 85 3c 04 39 |0E.!...)+e...<.9| +peer1.org1.example.com | [18f1 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004014340 gate 1598907097028079900 evaluation starts +peer0.org1.example.com | [16ec 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 f9 14 53 a6 33 ff 41 |..S.3.A| +orderer0.example.com | "2020-08-31 20:52:25.206 UTC [common.deliver] Handle -> DEBU 1c73 Attempting to read seek info message from 172.18.0.9:51020" +peer1.org2.example.com | 00000010 e3 96 d4 c0 95 94 3b c7 9d bf 68 83 8d 46 4e ac |......;...h..FN.| +peer1.org1.example.com | [18f2 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004014340 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [16ed 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [1aa6 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:25.214 UTC [common.deliver] Handle -> WARN 1c74 Error reading from 172.18.0.9:51020: rpc error: code = Canceled desc = context canceled" +peer1.org2.example.com | 00000020 d8 3b 75 e3 90 02 20 0b e2 04 10 ce d3 d7 98 df |.;u... .........| +peer0.org1.example.com | [16ee 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18f3 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004014340 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1aa7 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +orderer0.example.com | "2020-08-31 20:52:25.214 UTC [orderer.common.server] func1 -> DEBU 1c75 Closing Deliver stream" +peer1.org2.example.com | 00000030 70 5c 55 cc c1 a8 89 82 51 0a 97 83 5a b9 c6 62 |p\U.....Q...Z..b| +peer0.org1.example.com | [16ef 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [18f4 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004014340 principal matched by identity 0 +peer0.org2.example.com | [1aa8 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:25.214 UTC [comm.grpc.server] 1 -> INFO 1c76 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51020 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.0493ms +peer1.org2.example.com | 00000040 a5 2a 5c 68 25 20 91 |.*\h% .| +peer0.org1.example.com | [16f0 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [18f5 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db a1 0a ad 45 ca e7 06 61 d1 7b dd bc 70 48 93 |....E...a.{..pH.| +peer0.org2.example.com | [1aa9 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:25.215 UTC [grpc] infof -> DEBU 1c77 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer1.org2.example.com | [1a0a 08-31 20:51:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [16f1 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 ac c2 56 d7 f0 1b 15 fb 3e 41 97 96 03 b1 89 27 |..V.....>A.....'| +peer0.org2.example.com | [1aaa 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | "2020-08-31 20:52:25.305 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c78 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org2.example.com | [1a0b 08-31 20:51:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16f2 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [18f6 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 d2 c1 83 d8 f9 44 42 c5 99 b6 |0E.!.......DB...| +peer0.org2.example.com | [1aab 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:25.307 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c79 Sending msg of 28 bytes to 3 on channel testchainid took 1.0498ms" +peer1.org2.example.com | [1a0c 08-31 20:51:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [16f3 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 02 bd 14 01 a5 d8 28 32 e8 19 e9 38 4d 49 90 40 |......(2...8MI.@| +peer0.org2.example.com | [1aac 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:25.308 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c7a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.9µs " +peer1.org2.example.com | [1a0d 08-31 20:51:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 6b 8d 84 9c 5e 54 fd d2 47 1d 20 69 43 4d fe |.k...^T..G. iCM.| +peer0.org1.example.com | [16f4 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 58 3b 4d c5 16 02 20 51 03 82 01 fc 09 e9 1e a6 |X;M... Q........| +peer0.org2.example.com | [1aad 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:25.589 UTC [orderer.common.server] Deliver -> DEBU 1c7b Starting new Deliver handler" +peer1.org2.example.com | 00000010 3f 62 5a 35 2f b7 98 f5 9f 3d 5c 78 23 88 16 ac |?bZ5/....=\x#...| +peer0.org1.example.com | [16f5 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000030 96 87 c3 cd a1 48 e1 e9 d5 c0 77 64 5f ed be e3 |.....H....wd_...| +peer0.org2.example.com | [1aae 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +orderer0.example.com | "2020-08-31 20:52:25.589 UTC [common.deliver] Handle -> DEBU 1c7c Starting new deliver loop for 172.18.0.9:51022" +peer1.org2.example.com | [1a0e 08-31 20:51:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 4f b9 fe ed 90 40 8a 5d 97 0f |0E.!..O....@.]..| +peer0.org1.example.com | [16f6 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000040 40 62 d3 e0 07 67 c5 |@b...g.| +peer0.org2.example.com | [1aaf 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:25.590 UTC [common.deliver] Handle -> DEBU 1c7d Attempting to read seek info message from 172.18.0.9:51022" +peer1.org2.example.com | 00000010 e7 9f bb 16 f0 5c 78 9d 1f e1 3b 86 8f 6d fa 71 |.....\x...;..m.q| +peer0.org1.example.com | [16f7 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [18f7 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004014340 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1ab0 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:25.590 UTC [policies] Evaluate -> DEBU 1c7e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +peer1.org2.example.com | 00000020 2e df 67 7c 3f 02 20 1e b2 61 f8 d3 85 bc a8 47 |..g|?. ..a.....G| +peer0.org1.example.com | [16f8 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [18f8 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004014340 gate 1598907097028079900 evaluation succeeds +peer0.org2.example.com | [1ab1 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:25.590 UTC [policies] Evaluate -> DEBU 1c7f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | 00000030 6f d8 27 5f 77 e4 c5 e9 7e 55 bf 24 04 8d 63 1b |o.'_w...~U.$..c.| +peer0.org1.example.com | [16f9 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [18f9 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1ab2 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:25.590 UTC [policies] Evaluate -> DEBU 1c80 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +peer1.org2.example.com | 00000040 06 92 b3 98 47 ca 24 |....G.$| +peer0.org1.example.com | [16fa 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [18fa 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1ab3 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:25.591 UTC [policies] Evaluate -> DEBU 1c81 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +peer1.org2.example.com | [1a0f 08-31 20:51:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [16fb 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cc620 gate 1598907085784540400 evaluation starts +peer1.org1.example.com | [18fb 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:25.591 UTC [policies] Evaluate -> DEBU 1c82 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +peer0.org2.example.com | [1ab4 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [1a10 08-31 20:51:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [16fc 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cc620 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [18fc 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +orderer0.example.com | "2020-08-31 20:52:25.591 UTC [cauthdsl] func1 -> DEBU 1c83 0xc000a99280 gate 1598907145591174500 evaluation starts" +peer0.org2.example.com | [1ab5 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a11 08-31 20:51:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16fd 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cc620 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [18fd 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +orderer0.example.com | "2020-08-31 20:52:25.591 UTC [cauthdsl] func2 -> DEBU 1c84 0xc000a99280 signed by 0 principal evaluation starts (used [false])" +peer0.org2.example.com | [1ab6 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a12 08-31 20:51:34.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [16fe 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cc620 principal matched by identity 0 +peer1.org1.example.com | [18fe 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +orderer0.example.com | "2020-08-31 20:52:25.591 UTC [cauthdsl] func2 -> DEBU 1c85 0xc000a99280 processing identity 0 with bytes of fe10e0" +peer0.org2.example.com | [1ab7 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a13 08-31 20:51:34.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [16ff 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | [18ff 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:25.591 UTC [cauthdsl] func2 -> DEBU 1c86 0xc000a99280 principal matched by identity 0" +peer0.org2.example.com | [1ab8 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a14 08-31 20:51:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [1900 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +orderer0.example.com | "2020-08-31 20:52:25.591 UTC [msp.identity] Verify -> DEBU 1c87 Verify: digest = 00000000 40 08 f0 00 f4 fb 95 e7 69 fd 1d 0c c5 c7 9e 12 |@.......i.......| +peer0.org2.example.com | [1ab9 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a15 08-31 20:51:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161023 +peer0.org1.example.com | [1700 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | [1901 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +orderer0.example.com | 00000010 26 ef 54 f9 c2 e5 38 3a 8a 5f 1c ea 9d e9 8a a5 |&.T...8:._......|" +peer0.org2.example.com | [1aba 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a16 08-31 20:51:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 35E3DF1D270F55037E017487D80AFE962E9546DC0449321C783893A5A09729F6 +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | [1902 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:25.591 UTC [msp.identity] Verify -> DEBU 1c88 Verify: sig = 00000000 30 45 02 21 00 90 e7 2d 1b 78 6c 85 8f 7b 9c 7e |0E.!...-.xl..{.~| +peer0.org2.example.com | [1abb 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a17 08-31 20:51:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1903 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +orderer0.example.com | 00000010 95 da 9e 89 76 f1 e5 ea 81 15 60 3b 87 9b 1c 8c |....v.....`;....| +peer0.org2.example.com | [1abc 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a18 08-31 20:51:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1904 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +orderer0.example.com | 00000020 80 31 90 de 79 02 20 41 2b 0b 8b ba fa 94 a5 1b |.1..y. A+.......| +peer0.org2.example.com | [1abd 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [1a19 08-31 20:51:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org1.example.com | [1905 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +orderer0.example.com | 00000030 d7 ed e5 c9 3f e4 df fc 65 44 11 bb 24 47 80 10 |....?...eD..$G..| +peer0.org2.example.com | [1abe 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a1a 08-31 20:51:35.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [1906 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1701 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cc620 principal evaluation succeeds for identity 0 +orderer0.example.com | 00000040 e0 f1 29 ce ad 3e 39 |..)..>9|" +peer0.org2.example.com | [1abf 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a1b 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1907 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1702 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cc620 gate 1598907085784540400 evaluation succeeds +orderer0.example.com | "2020-08-31 20:52:25.592 UTC [cauthdsl] func2 -> DEBU 1c89 0xc000a99280 principal evaluation succeeds for identity 0" +peer0.org2.example.com | [1ac0 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a1c 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1908 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1703 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:25.592 UTC [cauthdsl] func1 -> DEBU 1c8a 0xc000a99280 gate 1598907145591174500 evaluation succeeds" +peer0.org2.example.com | [1ac1 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a1d 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1909 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1704 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +orderer0.example.com | "2020-08-31 20:52:25.592 UTC [policies] Evaluate -> DEBU 1c8b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +peer0.org2.example.com | [1ac2 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [190a 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [1a1e 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1705 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1ac3 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:25.592 UTC [policies] Evaluate -> DEBU 1c8c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +peer1.org1.example.com | [190b 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a1f 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1706 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1ac4 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +orderer0.example.com | "2020-08-31 20:52:25.593 UTC [policies] Evaluate -> DEBU 1c8d Signature set satisfies policy /Channel/Orderer/Readers" +peer1.org1.example.com | [190c 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a20 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1707 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | [1ac5 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:25.593 UTC [policies] Evaluate -> DEBU 1c8e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +peer1.org1.example.com | [190d 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [1a21 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [1ac6 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +orderer0.example.com | "2020-08-31 20:52:25.593 UTC [policies] Evaluate -> DEBU 1c8f Signature set satisfies policy /Channel/Readers" +peer1.org1.example.com | [190e 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1a22 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1708 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | [1ac7 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +orderer0.example.com | "2020-08-31 20:52:25.593 UTC [policies] Evaluate -> DEBU 1c90 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +peer1.org1.example.com | [190f 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1a23 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | [1ac8 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +orderer0.example.com | "2020-08-31 20:52:25.593 UTC [common.deliver] deliverBlocks -> DEBU 1c91 [channel: testchainid] Received seekInfo (0xc000def400) start: > stop: > from 172.18.0.9:51022" +peer1.org1.example.com | [1910 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1a24 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | [1ac9 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +orderer0.example.com | "2020-08-31 20:52:25.594 UTC [fsblkstorage] Next -> DEBU 1c92 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +peer1.org1.example.com | [1911 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [1a26 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | [1aca 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6cc60 gate 1598907093292924700 evaluation starts +orderer0.example.com | "2020-08-31 20:52:25.594 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c93 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +peer1.org1.example.com | [1912 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1a25 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [1acb 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6cc60 signed by 0 principal evaluation starts (used [false]) +orderer0.example.com | "2020-08-31 20:52:25.594 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c94 Remaining bytes=[30411], Going to peek [8] bytes" +peer1.org2.example.com | [1a27 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1913 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1709 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:25.594 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c95 Returning blockbytes - length=[30408], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +peer0.org2.example.com | [1acc 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6cc60 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1a28 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1914 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [170a 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:25.594 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c96 blockbytes [30408] read from file [0]" +peer0.org2.example.com | [1acd 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6cc60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1a29 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1915 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [170b 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:25.594 UTC [common.deliver] deliverBlocks -> DEBU 1c97 [channel: testchainid] Delivering block [1] for (0xc000def400) for 172.18.0.9:51022" +peer0.org2.example.com | [1ace 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6cc60 principal evaluation fails +peer1.org2.example.com | [1a2a 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1917 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [170c 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:25.595 UTC [common.deliver] deliverBlocks -> DEBU 1c98 [channel: testchainid] Done delivering to 172.18.0.9:51022 for (0xc000def400)" +peer0.org2.example.com | [1acf 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6cc60 gate 1598907093292924700 evaluation fails +peer1.org2.example.com | [1a2b 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1916 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [170d 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:25.595 UTC [common.deliver] Handle -> DEBU 1c99 Waiting for new SeekInfo from 172.18.0.9:51022" +peer0.org2.example.com | [1ad0 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1a2c 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1918 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [170e 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:25.595 UTC [common.deliver] Handle -> DEBU 1c9a Attempting to read seek info message from 172.18.0.9:51022" +peer0.org2.example.com | [1ad1 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1a2d 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1919 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [170f 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:25.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c9b Sending msg of 28 bytes to 2 on channel businesschannel took 16.2µs" +peer0.org2.example.com | [1ad2 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1a2e 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [191b 08-31 20:51:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1710 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:25.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c9c Sending msg of 28 bytes to 3 on channel businesschannel took 7.3µs" +peer0.org2.example.com | [1ad3 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6d1d0 gate 1598907093300046100 evaluation starts +peer1.org2.example.com | [1a2f 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [191c 08-31 20:51:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1711 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:25.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.5µs " +peer0.org2.example.com | [1ad4 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6d1d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1a30 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [191d 08-31 20:51:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1712 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:25.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c9e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 192.9µs " +peer0.org2.example.com | [1ad5 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6d1d0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1a31 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [191a 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1713 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +orderer0.example.com | "2020-08-31 20:52:25.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c9f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1ad6 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6d1d0 principal matched by identity 0 +peer1.org2.example.com | [1a32 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [191e 08-31 20:51:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1714 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:25.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ca0 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1ad7 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 38 f7 03 a3 ec c8 c5 a0 53 a1 da 5d a5 c9 ac |.8.......S..]...| +peer1.org2.example.com | [1a33 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [191f 08-31 20:51:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1715 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:25.644 UTC [common.deliver] Handle -> WARN 1ca1 Error reading from 172.18.0.9:51022: rpc error: code = Canceled desc = context canceled" +peer0.org2.example.com | 00000010 a1 e9 6a d5 e6 30 d3 4d 91 a8 d0 0b b9 77 a2 aa |..j..0.M.....w..| +peer1.org2.example.com | [1a34 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a39610 gate 1598907095288355900 evaluation starts +peer1.org1.example.com | [1920 08-31 20:51:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1716 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:25.644 UTC [orderer.common.server] func1 -> DEBU 1ca2 Closing Deliver stream" +peer0.org2.example.com | [1ad8 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 c8 1b d1 fb 63 f4 f3 dd 45 18 eb |0D. .....c...E..| +peer1.org2.example.com | [1a35 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a39610 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1921 08-31 20:51:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1717 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:25.644 UTC [comm.grpc.server] 1 -> INFO 1ca3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51022 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=54.6806ms +peer0.org2.example.com | 00000010 06 98 a8 95 67 20 9c 17 b8 9d 9d 27 99 53 87 f4 |....g .....'.S..| +peer1.org2.example.com | [1a36 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a39610 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1922 08-31 20:51:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1718 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:25.644 UTC [grpc] infof -> DEBU 1ca4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +peer0.org2.example.com | 00000020 24 56 74 78 02 20 1d b3 30 63 83 e3 0b 49 db 56 |$Vtx. ..0c...I.V| +peer1.org2.example.com | [1a37 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a39610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [1923 08-31 20:51:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1719 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:25.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ca5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | 00000030 2f 0b da 29 a4 5d b7 e6 b7 34 08 b5 23 50 30 0c |/..).]...4..#P0.| +peer1.org1.example.com | [1924 08-31 20:51:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1a38 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a39610 principal evaluation fails +peer0.org1.example.com | [171a 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:25.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca6 Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" +peer0.org2.example.com | 00000040 37 ca 78 54 76 bb |7.xTv.| +peer1.org1.example.com | [1925 08-31 20:51:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161025 +peer1.org2.example.com | [1a39 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a39610 gate 1598907095288355900 evaluation fails +peer0.org1.example.com | [171b 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:25.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.9µs " +peer0.org2.example.com | [1ad9 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6d1d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1926 08-31 20:51:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E94DB1E564AB5D7D73B37798B1C02E87DC4E7CD3DC2120BE6E877844BAB24176 +peer1.org2.example.com | [1a3a 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [171c 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:26.096 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca8 Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +peer0.org2.example.com | [1ada 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c6d1d0 gate 1598907093300046100 evaluation succeeds +peer1.org1.example.com | [1927 08-31 20:51:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1a3b 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [171d 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:26.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca9 Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +peer0.org2.example.com | [1adb 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1928 08-31 20:51:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1a3c 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [171e 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:26.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1caa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.1µs " +peer0.org2.example.com | [1adc 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1a3d 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a39b80 gate 1598907095291894900 evaluation starts +peer1.org1.example.com | [1929 08-31 20:51:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | [171f 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:26.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 194.6µs " +peer0.org2.example.com | [1add 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1a3e 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a39b80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [192a 08-31 20:51:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1720 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:26.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cac Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1ade 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1a3f 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a39b80 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [192b 08-31 20:51:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1721 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +orderer0.example.com | "2020-08-31 20:52:26.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cad Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1adf 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1a40 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a39b80 principal matched by identity 0 +peer1.org1.example.com | [192c 08-31 20:51:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1722 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +orderer0.example.com | "2020-08-31 20:52:26.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cae Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [1ae0 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1a41 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 68 e1 9f 6a cf 4b 51 94 26 3d f3 b4 96 65 0e |.h..j.KQ.&=...e.| +peer1.org1.example.com | [192d 08-31 20:51:37.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1723 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +orderer0.example.com | "2020-08-31 20:52:26.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1caf Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +peer0.org2.example.com | [1ae1 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | 00000010 83 18 51 0d 1e 95 21 8c 2b 87 c2 30 e0 b7 7c 36 |..Q...!.+..0..|6| +peer1.org1.example.com | [192e 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1724 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610071801 +orderer0.example.com | "2020-08-31 20:52:26.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.3µs " +peer0.org2.example.com | [1ae2 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1a42 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e d6 c1 ed a6 6a 4d 7c 26 09 1f 1a |0D. .....jM|&...| +peer1.org1.example.com | [192f 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1725 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 052313E7F356FF3943EC700DE9AAE6D514E9FD96FD6FF30E01A56CB57F84EF14 +orderer0.example.com | "2020-08-31 20:52:26.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb1 Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +peer0.org2.example.com | [1ae3 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | 00000010 5d 34 72 e2 9e 77 a4 01 73 c6 f2 8d 2d 6d 0c cb |]4r..w..s...-m..| +peer1.org1.example.com | [1930 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1726 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +orderer0.example.com | "2020-08-31 20:52:26.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb2 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +peer0.org2.example.com | [1ae4 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 f5 a4 16 2b 02 20 66 ec 64 f0 96 5d af 46 e1 72 |...+. f.d..].F.r| +peer1.org1.example.com | [1931 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1727 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:26.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73µs " +peer0.org2.example.com | [1ae5 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 cf 93 fc 30 61 ec c3 64 cb 6b 6e 43 25 28 1b 0d |...0a..d.knC%(..| +peer1.org1.example.com | [1932 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1728 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:26.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 975.7µs " +peer0.org2.example.com | [1ae6 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 e9 d1 03 99 53 02 |....S.| +peer1.org1.example.com | [1933 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1729 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:26.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cb5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1ae7 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [1a43 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a39b80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1934 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [172a 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:26.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cb6 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org2.example.com | [1ae8 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a44 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a39b80 gate 1598907095291894900 evaluation succeeds +peer1.org1.example.com | [1935 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [172b 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +orderer0.example.com | "2020-08-31 20:52:26.809 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cb7 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org2.example.com | [1ae9 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a45 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1936 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [172c 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:26.809 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb8 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +peer0.org2.example.com | [1aea 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a46 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [1937 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [172d 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:26.809 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.5µs " +peer0.org2.example.com | [1aeb 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1a47 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1938 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +orderer0.example.com | "2020-08-31 20:52:27.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cba Sending msg of 28 bytes to 2 on channel businesschannel took 25.5µs" +peer0.org1.example.com | [172e 08-31 20:51:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [1aec 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a48 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1939 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +orderer0.example.com | "2020-08-31 20:52:27.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cbb Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +peer0.org1.example.com | [172f 08-31 20:51:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1aed 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a49 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [193a 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 4d b1 e5 64 ab 5d 7d 73 b3 77 98 b1 c0 2e 87 |.M..d.]}s.w.....| +orderer0.example.com | "2020-08-31 20:52:27.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.1µs " +peer0.org1.example.com | [1730 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1aee 08-31 20:51:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [1a4a 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | 00000010 dc 4e 7c d3 dc 21 20 be 6e 87 78 44 ba b2 41 76 |.N|..! .n.xD..Av| +orderer0.example.com | "2020-08-31 20:52:27.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cbd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 131.7µs " +peer0.org1.example.com | [1731 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a4b 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1aef 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [193b 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 65 31 6f 20 db 46 d8 e7 4c 79 |0E.!..e1o .F..Ly| +orderer0.example.com | "2020-08-31 20:52:27.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cbe Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1732 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a4c 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1af0 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000010 a2 db ea ac 1f 1d cc 90 dd e0 6d 70 f6 a0 c9 bd |..........mp....| +orderer0.example.com | "2020-08-31 20:52:27.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cbf Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1733 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a4d 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1af1 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | 00000020 f4 3a 59 bb 3c 02 20 42 04 8a ac e4 a8 9d d6 79 |.:Y.<. B.......y| +orderer0.example.com | "2020-08-31 20:52:27.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc0 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [1734 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a4e 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1af2 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000030 c1 7c de 43 b2 e5 dd aa 1c 9e 71 9a e0 8f 9d 72 |.|.C......q....r| +orderer0.example.com | "2020-08-31 20:52:27.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cc1 Sending msg of 28 bytes to 3 on channel testchainid took 22µs" +peer0.org1.example.com | [1735 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a4f 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1af3 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | 00000040 58 a1 ce a7 d4 b6 03 |X......| +orderer0.example.com | "2020-08-31 20:52:27.307 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.7µs " +peer0.org1.example.com | [1736 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a50 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1af4 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [193c 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +orderer0.example.com | "2020-08-31 20:52:27.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cc3 Sending msg of 28 bytes to 2 on channel businesschannel took 41.2µs" +peer0.org1.example.com | [1737 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a51 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +orderer0.example.com | "2020-08-31 20:52:27.599 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cc4 Sending msg of 28 bytes to 3 on channel businesschannel took 22.2µs" +peer0.org1.example.com | [1738 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1739 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [173a 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [173b 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [173c 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [173d 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [173e 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [173f 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1740 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1741 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1742 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1743 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1744 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1745 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1746 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1747 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044eb9d0 gate 1598907089057742900 evaluation starts +peer1.org2.example.com | [1a52 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1af5 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [1af7 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a53 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a54 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a55 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a56 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a57 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1a58 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a59 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a5a 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1a5b 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1a5c 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1a5e 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [193d 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b a5 f8 28 0b f2 9c 43 78 e1 a2 |0E.!....(...Cx..| +peer1.org2.example.com | [1a5f 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 85 22 96 b4 ad 5d df 46 ac 96 f9 d3 04 18 14 4c |."...].F.......L| +orderer0.example.com | "2020-08-31 20:52:27.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 211.2µs " +peer0.org2.example.com | [1af8 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 0b 07 70 3a f3 02 20 55 c8 f0 d3 9a 93 84 dd d9 |..p:.. U........| +peer1.org1.example.com | 00000030 07 82 37 54 7f db 62 f9 64 57 5b 5d d1 54 75 7b |..7T..b.dW[].Tu{| +peer0.org1.example.com | [1748 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044eb9d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1749 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044eb9d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [174a 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044eb9d0 principal matched by identity 0 +peer0.org1.example.com | [174b 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 f4 c4 ab 64 23 45 dc 18 92 58 28 0c 4c 34 74 |"...d#E...X(.L4t| +peer0.org1.example.com | 00000010 79 c7 7f 57 0f b8 7f 32 d5 d9 e7 51 2f 15 27 48 |y..W...2...Q/.'H| +peer0.org1.example.com | [174c 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 5c 24 30 37 87 8d a5 03 50 26 ce |0D. .\$07....P&.| +peer0.org1.example.com | 00000010 07 8d 52 a6 96 61 57 31 55 3d 02 7c 44 87 a4 3f |..R..aW1U=.|D..?| +peer0.org1.example.com | 00000020 5f 58 b6 03 02 20 0f 46 f1 a2 01 af 47 40 2d 56 |_X... .F....G@-V| +peer1.org1.example.com | 00000040 b5 50 08 be 15 2b f4 |.P...+.| +peer0.org1.example.com | 00000030 7b 99 35 f1 a5 b0 45 ac 68 00 c3 c2 2a d5 71 ce |{.5...E.h...*.q.| +peer1.org2.example.com | [1a60 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [193e 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1af9 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:27.599 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.9µs " +peer0.org1.example.com | 00000040 51 95 21 29 db 9e |Q.!)..| +peer1.org1.example.com | [193f 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1af6 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a61 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:27.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc7 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [174d 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044eb9d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1940 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1afa 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a5d 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:27.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc8 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [174e 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044eb9d0 gate 1598907089057742900 evaluation succeeds +peer1.org1.example.com | [1941 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1afb 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a62 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:27.807 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc9 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [174f 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1942 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1afc 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a63 08-31 20:51:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:27.808 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cca Sending msg of 28 bytes to 3 on channel testchainid took 19.9µs" +orderer0.example.com | "2020-08-31 20:52:27.810 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ccb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 123.6µs " +peer0.org1.example.com | [1750 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1afd 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:28.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ccc Sending msg of 28 bytes to 3 on channel businesschannel took 38.5µs" +peer0.org1.example.com | [1751 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1944 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1afe 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a64 08-31 20:51:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:28.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ccd Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" +peer0.org1.example.com | [1752 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1945 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1aff 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a65 08-31 20:51:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:28.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.7µs " +peer0.org1.example.com | [1753 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1946 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1b00 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a66 08-31 20:51:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:28.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ccf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2147ms " +peer0.org1.example.com | [1754 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1947 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 4d b1 e5 64 ab 5d 7d 73 b3 77 98 b1 c0 2e 87 |.M..d.]}s.w.....| +peer0.org2.example.com | [1b01 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b02 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1a67 08-31 20:51:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:28.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd0 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1755 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000010 dc 4e 7c d3 dc 21 20 be 6e 87 78 44 ba b2 41 76 |.N|..! .n.xD..Av| +peer0.org2.example.com | [1b03 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a68 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:28.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1756 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1943 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1948 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 65 31 6f 20 db 46 d8 e7 4c 79 |0E.!..e1o .F..Ly| +peer1.org1.example.com | 00000010 a2 db ea ac 1f 1d cc 90 dd e0 6d 70 f6 a0 c9 bd |..........mp....| +peer1.org1.example.com | 00000020 f4 3a 59 bb 3c 02 20 42 04 8a ac e4 a8 9d d6 79 |.:Y.<. B.......y| +peer0.org2.example.com | [1b04 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1757 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | 00000030 c1 7c de 43 b2 e5 dd aa 1c 9e 71 9a e0 8f 9d 72 |.|.C......q....r| +peer0.org2.example.com | [1b05 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161020 +peer1.org2.example.com | [1a69 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +orderer0.example.com | "2020-08-31 20:52:28.307 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer0.org1.example.com | [1758 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 58 a1 ce a7 d4 b6 03 |X......| +peer0.org2.example.com | [1b06 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D390B35C42542530BEB47C78B0290CAA90CE7F27821EA39411F289162FA4CD3C +peer1.org2.example.com | [1a6a 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:28.308 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd3 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +orderer0.example.com | "2020-08-31 20:52:28.309 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.8µs " +orderer0.example.com | "2020-08-31 20:52:28.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd5 Sending msg of 28 bytes to 2 on channel businesschannel took 57.3µs" +orderer0.example.com | "2020-08-31 20:52:28.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd6 Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +peer0.org1.example.com | [1759 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a6b 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1a6c 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1a6d 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 24 6e 9e 14 7d e7 b2 c9 08 af 03 12 73 c3 09 |.$n..}.......s..| +peer1.org2.example.com | 00000010 df 45 1c 2a 6e 2f f1 cb 11 9b f8 40 fa dd bd 55 |.E.*n/.....@...U| +orderer0.example.com | "2020-08-31 20:52:28.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 164.7µs " +peer0.org2.example.com | [1b07 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1a6e 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 4d 48 5d ac 09 38 f7 9f 1b 6f 61 |0D. 0MH]..8...oa| +peer1.org2.example.com | 00000010 c2 9e bf f7 85 a9 31 70 9e a5 87 ff 3c 66 70 06 |......1p.... DEBU 1cd8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.5µs " +orderer0.example.com | "2020-08-31 20:52:28.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd9 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [1949 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 66 80 64 e5 7c 76 02 fe 1d 55 a9 b6 73 4d 2b 12 |f.d.|v...U..sM+.| +peer0.org1.example.com | [175a 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +orderer0.example.com | "2020-08-31 20:52:28.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cda Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +peer1.org1.example.com | [194a 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b08 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | 00000040 4e a4 b0 1e ba 09 |N.....| +peer0.org1.example.com | [175b 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +orderer0.example.com | "2020-08-31 20:52:28.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cdb Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +peer1.org1.example.com | [194b 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b09 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1b0a 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b0b 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1b0c 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +orderer0.example.com | "2020-08-31 20:52:28.805 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cdc Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +orderer0.example.com | "2020-08-31 20:52:28.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cdd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.1µs " +orderer0.example.com | "2020-08-31 20:52:29.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cde Sending msg of 28 bytes to 2 on channel businesschannel took 40.9µs" +orderer0.example.com | "2020-08-31 20:52:29.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cdf Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +orderer0.example.com | "2020-08-31 20:52:29.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 333.3µs " +orderer0.example.com | "2020-08-31 20:52:29.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 210.7µs " +orderer0.example.com | "2020-08-31 20:52:29.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:29.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce3 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:29.305 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:29.305 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce5 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +orderer0.example.com | "2020-08-31 20:52:29.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.3µs " +orderer0.example.com | "2020-08-31 20:52:29.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce7 Sending msg of 28 bytes to 3 on channel businesschannel took 13.9µs" +orderer0.example.com | "2020-08-31 20:52:29.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce8 Sending msg of 28 bytes to 2 on channel businesschannel took 12.7µs" +orderer0.example.com | "2020-08-31 20:52:29.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 241.4µs " +orderer0.example.com | "2020-08-31 20:52:29.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 165.7µs " +orderer0.example.com | "2020-08-31 20:52:29.600 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cec Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:29.600 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ceb Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:29.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ced Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:29.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cee Sending msg of 28 bytes to 3 on channel testchainid took 595.8µs" +orderer0.example.com | "2020-08-31 20:52:29.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cef Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51µs " +orderer0.example.com | "2020-08-31 20:52:30.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf0 Sending msg of 28 bytes to 2 on channel businesschannel took 22.5µs" +orderer0.example.com | "2020-08-31 20:52:30.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf1 Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +orderer0.example.com | "2020-08-31 20:52:30.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 300.9µs " +orderer0.example.com | "2020-08-31 20:52:30.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 144.8µs " +orderer0.example.com | "2020-08-31 20:52:30.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf4 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:30.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:30.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:30.307 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf7 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +orderer0.example.com | "2020-08-31 20:52:30.307 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.1µs " +orderer0.example.com | "2020-08-31 20:52:30.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf9 Sending msg of 28 bytes to 3 on channel businesschannel took 44.3µs" +orderer0.example.com | "2020-08-31 20:52:30.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cfa Sending msg of 28 bytes to 2 on channel businesschannel took 12.8µs" +orderer0.example.com | "2020-08-31 20:52:30.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cfb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 84.8µs " +orderer0.example.com | "2020-08-31 20:52:30.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cfc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.7µs " +orderer0.example.com | "2020-08-31 20:52:30.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfd Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:30.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfe Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:30.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cff Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:30.807 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d00 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.5µs " +orderer0.example.com | "2020-08-31 20:52:30.807 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d01 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +orderer0.example.com | "2020-08-31 20:52:31.096 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d02 Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +orderer0.example.com | "2020-08-31 20:52:31.096 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d03 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +orderer0.example.com | "2020-08-31 20:52:31.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d04 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 360.6µs " +orderer0.example.com | "2020-08-31 20:52:31.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 259.4µs " +orderer0.example.com | "2020-08-31 20:52:31.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d06 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:31.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d07 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:31.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d08 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:31.307 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d09 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +orderer0.example.com | "2020-08-31 20:52:31.307 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d0a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.2µs " +orderer0.example.com | "2020-08-31 20:52:31.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d0b Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" +orderer0.example.com | "2020-08-31 20:52:31.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 274.6µs " +orderer0.example.com | "2020-08-31 20:52:31.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d0d Sending msg of 28 bytes to 2 on channel businesschannel took 12.8µs" +orderer0.example.com | "2020-08-31 20:52:31.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 824.7µs " +orderer0.example.com | "2020-08-31 20:52:31.564 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d0f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:31.565 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d10 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:31.773 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d11 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:31.774 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d12 Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +orderer0.example.com | "2020-08-31 20:52:31.774 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d13 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.8µs " +orderer0.example.com | "2020-08-31 20:52:32.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d14 Sending msg of 28 bytes to 2 on channel businesschannel took 22.6µs" +orderer0.example.com | "2020-08-31 20:52:32.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d15 Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +orderer0.example.com | "2020-08-31 20:52:32.062 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d16 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.6µs " +orderer0.example.com | "2020-08-31 20:52:32.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d17 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.6µs " +orderer0.example.com | "2020-08-31 20:52:32.064 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d18 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:32.064 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d19 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:32.271 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d1a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:32.271 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d1b Sending msg of 28 bytes to 3 on channel testchainid took 28.6µs" +orderer0.example.com | "2020-08-31 20:52:32.271 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d1c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.8µs " +orderer0.example.com | "2020-08-31 20:52:32.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d1d Sending msg of 28 bytes to 2 on channel businesschannel took 22.2µs" +orderer0.example.com | "2020-08-31 20:52:32.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d1e Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +orderer0.example.com | "2020-08-31 20:52:32.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d1f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.8µs " +orderer0.example.com | "2020-08-31 20:52:32.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d20 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.3µs " +orderer0.example.com | "2020-08-31 20:52:32.563 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d21 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:32.564 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d22 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:32.771 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d23 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:32.771 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d24 Sending msg of 28 bytes to 3 on channel testchainid took 9.6µs" +orderer0.example.com | "2020-08-31 20:52:32.771 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d25 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.4µs " +orderer0.example.com | "2020-08-31 20:52:33.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d26 Sending msg of 28 bytes to 2 on channel businesschannel took 50.6µs" +orderer0.example.com | "2020-08-31 20:52:33.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d27 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +orderer0.example.com | "2020-08-31 20:52:33.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d28 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 226.1µs " +orderer0.example.com | "2020-08-31 20:52:33.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 203µs " +orderer0.example.com | "2020-08-31 20:52:33.063 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d2a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:33.063 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d2b Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:33.271 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d2c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:33.272 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d2d Sending msg of 28 bytes to 3 on channel testchainid took 21.3µs" +orderer0.example.com | "2020-08-31 20:52:33.273 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d2e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 226.7µs " +orderer0.example.com | "2020-08-31 20:52:33.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d2f Sending msg of 28 bytes to 2 on channel businesschannel took 40µs" +orderer0.example.com | "2020-08-31 20:52:33.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d31 Sending msg of 28 bytes to 3 on channel businesschannel took 23.2µs" +orderer0.example.com | "2020-08-31 20:52:33.565 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 206.8µs " +orderer0.example.com | "2020-08-31 20:52:33.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d30 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 420.8µs " +orderer0.example.com | "2020-08-31 20:52:33.566 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d33 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:33.567 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d34 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:33.772 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d35 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:33.773 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d36 Sending msg of 28 bytes to 3 on channel testchainid took 722.9µs" +orderer0.example.com | "2020-08-31 20:52:33.773 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d37 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.2µs " +orderer0.example.com | "2020-08-31 20:52:34.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d38 Sending msg of 28 bytes to 2 on channel businesschannel took 150.7µs" +orderer0.example.com | "2020-08-31 20:52:34.063 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d39 Sending msg of 28 bytes to 3 on channel businesschannel took 13.2µs" +orderer0.example.com | "2020-08-31 20:52:34.064 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d3a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 713.1µs " +orderer0.example.com | "2020-08-31 20:52:34.065 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d3b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [175c 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [175d 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [175e 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [175f 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1760 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [1761 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1762 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" > alive: alive: alive:A\346|\221\361\027\034\\$,\020\256\210\032\326\351y\021\207\020\301\"\326\023X\276\2439\250\002 f\031Y8\336$ofm\300k\256\220\245x\213\340\335u\025\205\014\351\\\007\210\376\033\330L}\370" > +peer0.org1.example.com | [1763 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1764 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1765 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [1766 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a6f 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1a70 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1a71 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1a72 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1a73 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1a74 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a75 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a76 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a77 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a78 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a79 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a7a 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1a7b 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a7c 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1a7d 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [194c 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [194d 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [194e 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [194f 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1950 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1951 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 4d b1 e5 64 ab 5d 7d 73 b3 77 98 b1 c0 2e 87 |.M..d.]}s.w.....| +peer1.org1.example.com | 00000010 dc 4e 7c d3 dc 21 20 be 6e 87 78 44 ba b2 41 76 |.N|..! .n.xD..Av| +peer1.org1.example.com | [1952 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 65 31 6f 20 db 46 d8 e7 4c 79 |0E.!..e1o .F..Ly| +peer1.org1.example.com | 00000010 a2 db ea ac 1f 1d cc 90 dd e0 6d 70 f6 a0 c9 bd |..........mp....| +peer1.org1.example.com | 00000020 f4 3a 59 bb 3c 02 20 42 04 8a ac e4 a8 9d d6 79 |.:Y.<. B.......y| +peer1.org1.example.com | 00000030 c1 7c de 43 b2 e5 dd aa 1c 9e 71 9a e0 8f 9d 72 |.|.C......q....r| +peer1.org1.example.com | 00000040 58 a1 ce a7 d4 b6 03 |X......| +peer1.org1.example.com | [1953 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1954 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1955 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1956 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1957 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b0d 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1b0e 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b0f 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b10 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\346/4\206I\374R[\200B\005\300v\221\035p\244\364Z\222\340q\256m\275\3246x-\324" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1b11 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\346/4\206I\374R[\200B\005\300v\221\035p\244\364Z\222\340q\256m\275\3246x-\324" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b12 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b13 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b14 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b15 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b16 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b17 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b18 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1b19 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 b3 5c 42 54 25 30 be b4 7c 78 b0 29 0c aa |...\BT%0..|x.)..| +peer0.org2.example.com | 00000010 90 ce 7f 27 82 1e a3 94 11 f2 89 16 2f a4 cd 3c |...'......../..<| +peer0.org2.example.com | [1b1a 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 d3 29 2b 65 f1 14 85 3c 04 39 |0E.!...)+e...<.9| +peer0.org2.example.com | 00000010 e3 96 d4 c0 95 94 3b c7 9d bf 68 83 8d 46 4e ac |......;...h..FN.| +peer0.org2.example.com | 00000020 d8 3b 75 e3 90 02 20 0b e2 04 10 ce d3 d7 98 df |.;u... .........| +peer0.org2.example.com | 00000030 70 5c 55 cc c1 a8 89 82 51 0a 97 83 5a b9 c6 62 |p\U.....Q...Z..b| +peer0.org2.example.com | 00000040 a5 2a 5c 68 25 20 91 |.*\h% .| +peer0.org2.example.com | [1b1b 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [1b1c 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 7a 1a ab 73 e7 94 f8 e5 dd 90 |0E.!..z..s......| +peer0.org2.example.com | 00000010 7e f8 8c b6 fe 28 e9 74 78 22 b3 a4 37 37 c6 48 |~....(.tx"..77.H| +peer0.org2.example.com | 00000020 d5 9a 7a 10 d2 02 20 67 3e e6 2f 34 86 49 fc 52 |..z... g>./4.I.R| +peer0.org2.example.com | 00000030 5b 80 42 05 c0 76 91 1d 70 a4 f4 5a 92 e0 71 ae |[.B..v..p..Z..q.| +peer0.org2.example.com | 00000040 6d bd d4 36 78 2d d4 |m..6x-.| +peer0.org2.example.com | [1b1d 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1b1e 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1b1f 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b20 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b21 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b22 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b24 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b23 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b25 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1b26 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 b3 5c 42 54 25 30 be b4 7c 78 b0 29 0c aa |...\BT%0..|x.)..| +peer0.org2.example.com | 00000010 90 ce 7f 27 82 1e a3 94 11 f2 89 16 2f a4 cd 3c |...'......../..<| +peer0.org2.example.com | [1b27 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 d3 29 2b 65 f1 14 85 3c 04 39 |0E.!...)+e...<.9| +peer0.org2.example.com | 00000010 e3 96 d4 c0 95 94 3b c7 9d bf 68 83 8d 46 4e ac |......;...h..FN.| +peer0.org2.example.com | 00000020 d8 3b 75 e3 90 02 20 0b e2 04 10 ce d3 d7 98 df |.;u... .........| +peer0.org2.example.com | 00000030 70 5c 55 cc c1 a8 89 82 51 0a 97 83 5a b9 c6 62 |p\U.....Q...Z..b| +peer0.org2.example.com | 00000040 a5 2a 5c 68 25 20 91 |.*\h% .| +peer0.org2.example.com | [1b28 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b29 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b2a 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b2b 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1b2c 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 6b 8d 84 9c 5e 54 fd d2 47 1d 20 69 43 4d fe |.k...^T..G. iCM.| +peer0.org2.example.com | 00000010 3f 62 5a 35 2f b7 98 f5 9f 3d 5c 78 23 88 16 ac |?bZ5/....=\x#...| +peer0.org2.example.com | [1b2d 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 4f b9 fe ed 90 40 8a 5d 97 0f |0E.!..O....@.]..| +peer0.org2.example.com | 00000010 e7 9f bb 16 f0 5c 78 9d 1f e1 3b 86 8f 6d fa 71 |.....\x...;..m.q| +peer0.org2.example.com | 00000020 2e df 67 7c 3f 02 20 1e b2 61 f8 d3 85 bc a8 47 |..g|?. ..a.....G| +peer0.org2.example.com | 00000030 6f d8 27 5f 77 e4 c5 e9 7e 55 bf 24 04 8d 63 1b |o.'_w...~U.$..c.| +peer0.org2.example.com | 00000040 06 92 b3 98 47 ca 24 |....G.$| +peer0.org2.example.com | [1b2e 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b2f 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b30 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b31 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b32 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b33 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1b34 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b36 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1b35 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b37 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b38 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1b39 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b3a 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b3b 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1b3d 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1b3e 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1b3f 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1b40 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbfd50 gate 1598907093516954700 evaluation starts +peer0.org2.example.com | [1b3c 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b41 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b42 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b43 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b44 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [1b45 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b46 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbfd50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1b47 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbfd50 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1b48 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbfd50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1b49 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbfd50 principal evaluation fails +peer0.org2.example.com | [1b4a 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbfd50 gate 1598907093516954700 evaluation fails +peer0.org2.example.com | [1b4b 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1b4c 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1b4d 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1b4e 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce02c0 gate 1598907093523048100 evaluation starts +peer0.org2.example.com | [1b4f 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce02c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1b50 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce02c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1b51 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce02c0 principal matched by identity 0 +peer0.org2.example.com | [1b52 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 38 f7 03 a3 ec c8 c5 a0 53 a1 da 5d a5 c9 ac |.8.......S..]...| +peer0.org2.example.com | 00000010 a1 e9 6a d5 e6 30 d3 4d 91 a8 d0 0b b9 77 a2 aa |..j..0.M.....w..| +peer0.org2.example.com | [1b53 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 c8 1b d1 fb 63 f4 f3 dd 45 18 eb |0D. .....c...E..| +peer0.org2.example.com | 00000010 06 98 a8 95 67 20 9c 17 b8 9d 9d 27 99 53 87 f4 |....g .....'.S..| +peer0.org2.example.com | 00000020 24 56 74 78 02 20 1d b3 30 63 83 e3 0b 49 db 56 |$Vtx. ..0c...I.V| +peer0.org2.example.com | 00000030 2f 0b da 29 a4 5d b7 e6 b7 34 08 b5 23 50 30 0c |/..).]...4..#P0.| +peer0.org2.example.com | 00000040 37 ca 78 54 76 bb |7.xTv.| +peer0.org2.example.com | [1b54 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce02c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1b55 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ce02c0 gate 1598907093523048100 evaluation succeeds +peer0.org2.example.com | [1b56 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +orderer0.example.com | "2020-08-31 20:52:34.065 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0331ms " +orderer0.example.com | "2020-08-31 20:52:34.066 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d3d Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:34.273 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d3e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:34.273 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d3f Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" +orderer0.example.com | "2020-08-31 20:52:34.274 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d40 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.3µs " +orderer0.example.com | "2020-08-31 20:52:34.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d41 Sending msg of 28 bytes to 2 on channel businesschannel took 20.1µs" +orderer0.example.com | "2020-08-31 20:52:34.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d42 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 202.6µs " +orderer0.example.com | "2020-08-31 20:52:34.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d43 Sending msg of 28 bytes to 3 on channel businesschannel took 26.5µs" +orderer0.example.com | "2020-08-31 20:52:34.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.3µs " +orderer0.example.com | "2020-08-31 20:52:34.564 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d45 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +orderer0.example.com | "2020-08-31 20:52:34.565 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d46 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +peer0.org1.example.com | [1767 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:r\364w\023\306\254\330\223\256\215+VdF" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1768 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1769 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:r\364w\023\306\254\330\223\256\215+VdF" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [176a 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [176b 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 3d c9 53 d4 5c ce a4 15 c7 67 1c 7b 3d 79 3f |.=.S.\....g.{=y?| +peer0.org1.example.com | 00000010 8f 66 12 7b 70 0e 8c 4e d8 3e c0 03 f9 07 bc fb |.f.{p..N.>......| +peer0.org1.example.com | [176c 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b4 9e 4e 9a fd 5d 98 e5 dd 2b |0E.!....N..]...+| +peer0.org1.example.com | 00000010 b2 70 9a 63 1e 86 43 04 0e aa db 15 c3 6a 46 67 |.p.c..C......jFg| +peer0.org1.example.com | 00000020 5b 3b 73 67 9c 02 20 7c a1 34 d7 9f ec b4 0d b9 |[;sg.. |.4......| +peer0.org1.example.com | 00000030 6f b7 6a 5b a2 db 7a d9 fd 8c 84 8b c6 b9 a5 8d |o.j[..z.........| +peer0.org1.example.com | 00000040 6f 71 81 be fc ea d6 |oq.....| +peer0.org1.example.com | [176d 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [176e 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 09 47 16 09 f7 d5 d5 a3 b7 05 |0E.!...G........| +peer0.org1.example.com | 00000010 be 49 d6 05 56 33 55 56 bc 99 2a cb ae ab e6 5e |.I..V3UV..*....^| +peer0.org1.example.com | 00000020 15 2f 0f 0f 83 02 20 37 d9 db ad 52 f7 8c 22 e6 |./.... 7...R..".| +peer0.org1.example.com | 00000030 74 f6 69 1a ca 72 4f d0 3e 72 f4 77 13 c6 ac d8 |t.i..rO.>r.w....| +peer0.org1.example.com | 00000040 93 ae 8d 2b 56 64 46 |...+VdF| +peer0.org1.example.com | [176f 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1770 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [1771 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1772 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1773 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1774 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1775 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1776 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1777 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [1778 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1779 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [177a 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [177b 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [177c 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:r\364w\023\306\254\330\223\256\215+VdF" > > alive:A\346|\221\361\027\034\\$,\020\256\210\032\326\351y\021\207\020\301\"\326\023X\276\2439\250\002 f\031Y8\336$ofm\300k\256\220\245x\213\340\335u\025\205\014\351\\\007\210\376\033\330L}\370" > +peer0.org1.example.com | [177d 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a7e 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1a7f 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a80 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a81 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1a82 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1a83 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a84 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1a85 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1a86 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a87 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1a88 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a89 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a8a 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a8b 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1a8c 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1a8d 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1a8e 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1a8f 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1a90 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1a91 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1a92 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1a93 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1a94 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1a95 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02570 gate 1598907095522539400 evaluation starts +peer1.org2.example.com | [1a96 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02570 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1a97 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02570 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1958 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1959 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [195a 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [195b 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [195c 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [195d 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [195e 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004063e90 gate 1598907097330981100 evaluation starts +peer1.org1.example.com | [195f 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004063e90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1960 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004063e90 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1961 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004063e90 principal matched by identity 0 +peer1.org1.example.com | [1962 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db a1 0a ad 45 ca e7 06 61 d1 7b dd bc 70 48 93 |....E...a.{..pH.| +peer1.org1.example.com | 00000010 ac c2 56 d7 f0 1b 15 fb 3e 41 97 96 03 b1 89 27 |..V.....>A.....'| +peer1.org1.example.com | [1963 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 d2 c1 83 d8 f9 44 42 c5 99 b6 |0E.!.......DB...| +peer1.org1.example.com | 00000010 02 bd 14 01 a5 d8 28 32 e8 19 e9 38 4d 49 90 40 |......(2...8MI.@| +peer1.org1.example.com | 00000020 58 3b 4d c5 16 02 20 51 03 82 01 fc 09 e9 1e a6 |X;M... Q........| +peer1.org1.example.com | 00000030 96 87 c3 cd a1 48 e1 e9 d5 c0 77 64 5f ed be e3 |.....H....wd_...| +peer1.org1.example.com | 00000040 40 62 d3 e0 07 67 c5 |@b...g.| +peer1.org1.example.com | [1964 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004063e90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1965 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004063e90 gate 1598907097330981100 evaluation succeeds +peer1.org1.example.com | [1966 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1967 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1968 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1969 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [196a 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [196b 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [196c 08-31 20:51:37.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [196d 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [196e 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [196f 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1970 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1971 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1972 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1973 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1974 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1975 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1976 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [1977 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1978 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1979 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [197a 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [197b 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b57 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1b58 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1b59 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1b5a 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1b5b 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b5c 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1b5d 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 b3 5c 42 54 25 30 be b4 7c 78 b0 29 0c aa |...\BT%0..|x.)..| +peer0.org2.example.com | 00000010 90 ce 7f 27 82 1e a3 94 11 f2 89 16 2f a4 cd 3c |...'......../..<| +peer0.org2.example.com | [1b5e 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 d3 29 2b 65 f1 14 85 3c 04 39 |0E.!...)+e...<.9| +peer0.org2.example.com | 00000010 e3 96 d4 c0 95 94 3b c7 9d bf 68 83 8d 46 4e ac |......;...h..FN.| +peer0.org2.example.com | 00000020 d8 3b 75 e3 90 02 20 0b e2 04 10 ce d3 d7 98 df |.;u... .........| +peer0.org2.example.com | 00000030 70 5c 55 cc c1 a8 89 82 51 0a 97 83 5a b9 c6 62 |p\U.....Q...Z..b| +peer0.org2.example.com | 00000040 a5 2a 5c 68 25 20 91 |.*\h% .| +peer0.org2.example.com | [1b5f 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b60 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b61 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b62 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1b63 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 6b 8d 84 9c 5e 54 fd d2 47 1d 20 69 43 4d fe |.k...^T..G. iCM.| +peer0.org2.example.com | 00000010 3f 62 5a 35 2f b7 98 f5 9f 3d 5c 78 23 88 16 ac |?bZ5/....=\x#...| +peer0.org1.example.com | [177e 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [177f 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1780 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1781 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1782 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1783 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1784 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1785 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1786 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1787 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [1788 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1789 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [178a 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [178b 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [178c 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [178d 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [178e 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [178f 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1790 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1791 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1792 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1793 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1794 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1795 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455ad40 gate 1598907089517367500 evaluation starts +peer0.org1.example.com | [1796 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455ad40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1797 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455ad40 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1798 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455ad40 principal matched by identity 0 +peer1.org1.example.com | [197c 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [197d 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [197e 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [197f 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1980 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1981 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1982 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1983 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1984 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004045f00 gate 1598907097492366500 evaluation starts +peer1.org1.example.com | [1985 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004045f00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1986 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004045f00 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1987 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004045f00 principal matched by identity 0 +peer1.org1.example.com | [1988 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 3c 08 3d bc c6 89 79 ba 4a ac 99 82 f1 fa 4d |.<.=...y.J.....M| +peer1.org1.example.com | 00000010 0f a6 dd 71 2d 6b 0f d5 9b b2 82 ad 5e 80 da c8 |...q-k......^...| +peer1.org1.example.com | [1989 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 55 55 55 3f 7d 18 aa 53 15 e1 |0E.!..UUU?}..S..| +peer1.org1.example.com | 00000010 cc 53 46 31 e9 7c 18 3a 50 d2 cd d0 a0 44 0d fe |.SF1.|.:P....D..| +peer1.org1.example.com | 00000020 03 0f 29 76 0d 02 20 2f bd ba c1 eb 6b 9f 2d 86 |..)v.. /....k.-.| +peer1.org1.example.com | 00000030 a9 e4 eb 8f fc 4f 76 ee e0 64 f2 97 8f 9c 1a 3a |.....Ov..d.....:| +peer1.org1.example.com | 00000040 5e 1d 64 1d 25 85 81 |^.d.%..| +peer1.org1.example.com | [198a 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004045f00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [198b 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004045f00 gate 1598907097492366500 evaluation succeeds +peer1.org1.example.com | [198c 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [198d 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [198e 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [198f 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1990 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1991 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1992 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1993 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1994 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1995 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1996 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1997 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [1998 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b64 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 4f b9 fe ed 90 40 8a 5d 97 0f |0E.!..O....@.]..| +peer0.org2.example.com | 00000010 e7 9f bb 16 f0 5c 78 9d 1f e1 3b 86 8f 6d fa 71 |.....\x...;..m.q| +peer0.org2.example.com | 00000020 2e df 67 7c 3f 02 20 1e b2 61 f8 d3 85 bc a8 47 |..g|?. ..a.....G| +peer0.org2.example.com | 00000030 6f d8 27 5f 77 e4 c5 e9 7e 55 bf 24 04 8d 63 1b |o.'_w...~U.$..c.| +peer0.org2.example.com | 00000040 06 92 b3 98 47 ca 24 |....G.$| +peer0.org2.example.com | [1b65 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b66 08-31 20:51:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b67 08-31 20:51:33.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b68 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b69 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b6a 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b6b 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1b6c 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b6d 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1b6e 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1b6f 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1b70 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1b71 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1b72 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1b73 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5930 gate 1598907093568734100 evaluation starts +peer0.org2.example.com | [1b74 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5930 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1b75 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5930 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1b76 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1b77 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5930 principal evaluation fails +peer0.org2.example.com | [1b78 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5930 gate 1598907093568734100 evaluation fails +peer0.org2.example.com | [1b79 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1b7a 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1b7b 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1b7c 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5ea0 gate 1598907093578959400 evaluation starts +peer0.org2.example.com | [1b7d 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5ea0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1b7e 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5ea0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1b7f 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5ea0 principal matched by identity 0 +peer0.org2.example.com | [1b80 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 84 f7 ec dc 25 5f e8 3a ac cc 14 e7 20 63 7f |F....%_.:.... c.| +peer1.org2.example.com | [1a98 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1a99 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02570 principal evaluation fails +peer1.org2.example.com | [1a9a 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02570 gate 1598907095522539400 evaluation fails +peer1.org2.example.com | [1a9b 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1a9c 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1a9d 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1a9e 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02ae0 gate 1598907095526424900 evaluation starts +peer1.org2.example.com | [1a9f 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02ae0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1aa0 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02ae0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1aa1 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02ae0 principal matched by identity 0 +peer1.org2.example.com | [1aa2 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad 78 a8 54 de ec 82 59 91 8d ff 70 43 22 79 32 |.x.T...Y...pC"y2| +peer1.org2.example.com | 00000010 b8 e3 0c 08 66 d6 08 3d 79 32 36 16 6f 13 b9 f0 |....f..=y26.o...| +peer1.org2.example.com | [1aa3 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 e5 65 32 0e 85 2c c1 f3 65 a7 |0E.!...e2..,..e.| +peer1.org2.example.com | 00000010 7a b5 1b 76 be 93 18 09 c8 0b fd 86 47 63 3d 19 |z..v........Gc=.| +peer1.org2.example.com | 00000020 a1 57 4b 47 22 02 20 2f 2e 95 ad 65 8e 8a 68 18 |.WKG". /...e..h.| +peer1.org2.example.com | 00000030 bc 72 31 3b 3a 7e f1 33 9c f5 75 e7 56 b7 f3 4d |.r1;:~.3..u.V..M| +peer1.org2.example.com | 00000040 dc 1e a3 d7 65 d1 ff |....e..| +peer1.org2.example.com | [1aa4 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1aa5 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1aa6 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02ae0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1aa7 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b02ae0 gate 1598907095526424900 evaluation succeeds +peer1.org2.example.com | [1aa8 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1aa9 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1aaa 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1aab 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1aac 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1aad 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1aae 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1aaf 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1ab0 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1ab1 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ab2 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ab3 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ab4 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1ab5 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ab6 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ab7 08-31 20:51:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ab8 08-31 20:51:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ab9 08-31 20:51:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1aba 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1abb 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1abc 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1abd 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1abe 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1999 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [199a 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [199c 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [199d 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [199e 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [199b 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [199f 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19a0 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [19a1 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [19a2 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [19a3 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [19a4 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19a5 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [19a6 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [19a7 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19a8 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [19a9 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [19aa 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 c5 90 1c 23 89 b1 55 7b 43 26 4a b8 d6 70 5a |....#..U{C&J..pZ| +peer1.org1.example.com | 00000010 b6 28 a6 93 8d 2b 0a 0d 7c 58 e6 f0 72 7d e6 36 |.(...+..|X..r}.6| +peer1.org1.example.com | [19ab 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 37 11 34 5e 7c bc 37 64 82 1b 45 |0D. ,7.4^|.7d..E| +peer1.org1.example.com | 00000010 11 dc 71 6e 82 b7 d1 51 2a d8 d1 d9 47 36 94 5a |..qn...Q*...G6.Z| +peer1.org1.example.com | 00000020 67 d1 73 de 02 20 67 86 18 97 66 53 75 a1 da 19 |g.s.. g...fSu...| +peer1.org1.example.com | 00000030 61 5e 5c 2b f1 16 bc ab 13 78 7c c6 83 90 87 63 |a^\+.....x|....c| +peer1.org1.example.com | 00000040 41 01 da cb e5 e6 |A.....| +peer1.org1.example.com | [19ac 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [19ad 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 4f 11 48 ff 5b 23 51 29 3b 44 f7 |0D. .O.H.[#Q);D.| +peer1.org1.example.com | 00000010 b7 1a be d1 e9 02 db 39 fe 27 24 d9 24 1c b5 a2 |.......9.'$.$...| +peer0.org1.example.com | [1799 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 44 e3 35 38 16 92 51 96 79 50 78 35 12 6b 97 |.D.58..Q.yPx5.k.| +peer0.org1.example.com | 00000010 04 a2 7c 72 ff 35 9d 57 a3 4f db ff 36 34 fc 0a |..|r.5.W.O..64..| +peer0.org1.example.com | [179a 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef de 13 18 e3 79 74 64 07 10 b0 |0E.!......ytd...| +peer0.org1.example.com | 00000010 99 82 b0 12 15 ce 05 96 11 6c c4 99 31 59 33 0e |.........l..1Y3.| +peer0.org1.example.com | 00000020 8c e5 d0 bf 8b 02 20 1b 48 9b 5c 88 9c 3c 02 38 |...... .H.\..<.8| +peer0.org1.example.com | 00000030 fc b2 8a db 39 ca 2e 1a 5b 89 6a 92 df a1 4c 92 |....9...[.j...L.| +peer0.org1.example.com | 00000040 6a 7e 5a 52 3c 85 a1 |j~ZR<..| +peer0.org1.example.com | [179b 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455ad40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [179c 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455ad40 gate 1598907089517367500 evaluation succeeds +peer0.org1.example.com | [179d 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [179e 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [179f 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [17a0 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [17a1 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [17a2 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [17a3 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [17a4 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [17a5 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [17a6 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17a7 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17a8 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [17aa 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [17ac 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [17ad 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [17af 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [17b0 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [17b1 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [17ae 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [17b3 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [17b2 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17ab 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17b4 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17b5 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17b6 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17b7 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [17b8 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:A\346|\221\361\027\034\\$,\020\256\210\032\326\351y\021\207\020\301\"\326\023X\276\2439\250\002 f\031Y8\336$ofm\300k\256\220\245x\213\340\335u\025\205\014\351\\\007\210\376\033\330L}\370" > +peer0.org1.example.com | [17b9 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [17ba 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [17bc 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17a9 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17bb 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17bd 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [17be 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [17bf 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [17c0 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17c1 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [17c2 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [17c3 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17c4 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [17c5 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [17c6 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [17c7 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17c8 08-31 20:51:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [17c9 08-31 20:51:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816101D +peer0.org1.example.com | [17ca 08-31 20:51:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7EA2B3D26F0F00F38D612FD7765D1E76E4C11D48CA3034A807381024B8E71CBE +peer0.org1.example.com | [17cb 08-31 20:51:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [17cc 08-31 20:51:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [17cd 08-31 20:51:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [17ce 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [17cf 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17d0 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [17d1 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17d2 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [17d3 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [17d4 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [17d5 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17d6 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17d7 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [17d8 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17d9 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [17da 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [17db 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17dc 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [17dd 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [17de 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [17df 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [17e0 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [17e1 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [17e2 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [17e3 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [17e4 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [17e5 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d8b0 gate 1598907089604577100 evaluation starts +peer0.org1.example.com | [17e6 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d8b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [17e7 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d8b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [17e8 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d8b0 principal matched by identity 0 +peer0.org1.example.com | [17e9 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 44 e3 35 38 16 92 51 96 79 50 78 35 12 6b 97 |.D.58..Q.yPx5.k.| +peer0.org1.example.com | 00000010 04 a2 7c 72 ff 35 9d 57 a3 4f db ff 36 34 fc 0a |..|r.5.W.O..64..| +peer0.org1.example.com | [17ea 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef de 13 18 e3 79 74 64 07 10 b0 |0E.!......ytd...| +peer0.org1.example.com | 00000010 99 82 b0 12 15 ce 05 96 11 6c c4 99 31 59 33 0e |.........l..1Y3.| +peer0.org1.example.com | 00000020 8c e5 d0 bf 8b 02 20 1b 48 9b 5c 88 9c 3c 02 38 |...... .H.\..<.8| +peer0.org1.example.com | 00000030 fc b2 8a db 39 ca 2e 1a 5b 89 6a 92 df a1 4c 92 |....9...[.j...L.| +peer0.org1.example.com | 00000040 6a 7e 5a 52 3c 85 a1 |j~ZR<..| +peer0.org1.example.com | [17eb 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d8b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [17ec 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d8b0 gate 1598907089604577100 evaluation succeeds +peer0.org1.example.com | [17ed 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [17ee 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [17ef 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [17f0 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [17f1 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [17f2 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17f3 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [17f4 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e a2 b3 d2 6f 0f 00 f3 8d 61 2f d7 76 5d 1e 76 |~...o....a/.v].v| +peer0.org1.example.com | 00000010 e4 c1 1d 48 ca 30 34 a8 07 38 10 24 b8 e7 1c be |...H.04..8.$....| +peer0.org1.example.com | [17f5 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 ff c2 cc 3b ff 9d 47 d4 86 4d 78 |0D. P...;..G..Mx| +peer0.org1.example.com | 00000010 7c dc 23 cf d9 25 91 2b 0a 97 78 ed a8 f5 6f 4b ||.#..%.+..x...oK| +peer0.org1.example.com | 00000020 5d f4 97 7a 02 20 4f 31 2a 25 d9 48 5d b9 d3 6d |]..z. O1*%.H]..m| +peer0.org1.example.com | 00000030 b9 b2 7f 59 9b 4b 02 8f 1c 6a 6a 0f 80 d7 76 96 |...Y.K...jj...v.| +peer0.org1.example.com | 00000040 7f 18 8f f4 23 38 |....#8| +peer0.org1.example.com | [17f6 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [17f7 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [17f8 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17f9 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [17fa 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 3d c9 53 d4 5c ce a4 15 c7 67 1c 7b 3d 79 3f |.=.S.\....g.{=y?| +peer0.org1.example.com | 00000010 8f 66 12 7b 70 0e 8c 4e d8 3e c0 03 f9 07 bc fb |.f.{p..N.>......| +peer0.org1.example.com | [17fb 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b4 9e 4e 9a fd 5d 98 e5 dd 2b |0E.!....N..]...+| +peer0.org1.example.com | 00000010 b2 70 9a 63 1e 86 43 04 0e aa db 15 c3 6a 46 67 |.p.c..C......jFg| +peer0.org1.example.com | 00000020 5b 3b 73 67 9c 02 20 7c a1 34 d7 9f ec b4 0d b9 |[;sg.. |.4......| +peer0.org1.example.com | 00000030 6f b7 6a 5b a2 db 7a d9 fd 8c 84 8b c6 b9 a5 8d |o.j[..z.........| +peer0.org1.example.com | 00000040 6f 71 81 be fc ea d6 |oq.....| +peer0.org1.example.com | [17fc 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [17fd 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17fe 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [17ff 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [1800 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1801 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 bf f4 7b dd eb bd 85 d7 f1 4b 2e 1b f2 07 66 c2 |..{......K....f.| +peer0.org2.example.com | [1b81 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 42 ab 9c 92 48 18 a7 24 e9 47 |0E.!..B...H..$.G| +peer0.org2.example.com | 00000010 c6 37 fc ec 20 b0 30 09 e1 29 6e 6c c1 fb b3 88 |.7.. .0..)nl....| +peer0.org2.example.com | 00000020 95 81 0c 1c ad 02 20 1e 53 3a 70 63 5f f2 25 11 |...... .S:pc_.%.| +peer0.org2.example.com | 00000030 52 20 86 d3 eb 20 49 ed 11 15 64 ec 97 d7 43 f6 |R ... I...d...C.| +peer0.org2.example.com | 00000040 d3 a8 8d 04 6f dd b1 |....o..| +peer0.org2.example.com | [1b82 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5ea0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1b83 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ca5ea0 gate 1598907093578959400 evaluation succeeds +peer0.org2.example.com | [1b84 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1b85 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1b86 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1b87 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1b88 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1b89 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1b8a 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1b8b 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1b8c 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1b8d 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b8e 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b8f 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b90 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [1b91 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b92 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b93 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b94 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1b95 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b96 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b97 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [1b98 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b99 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b9a 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b9b 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b9c 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1b9d 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1b9e 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1b9f 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ba0 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ba1 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ba2 08-31 20:51:34.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ba3 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1abf 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1ac1 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1ac2 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ac3 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ac0 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ac4 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ac5 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1ac6 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ac7 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1ac8 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1ac9 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1aca 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1acb 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1acc 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [1acd 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1ace 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [1acf 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1ad0 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ad1 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ad2 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ad4 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ad3 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ad5 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ad6 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ad7 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ad8 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ad9 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ada 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1adb 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1adc 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1add 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ade 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1adf 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ae0 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ae1 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1ae2 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161024 +peer1.org2.example.com | [1ae3 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DBA10AAD45CAE70661D17BDDBC704893ACC256D7F01B15FB3E41979603B18927 +peer1.org2.example.com | [1ae4 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1ae5 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1ae6 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [1ae7 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1ae8 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ae9 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [1aeb 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1aea 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1aec 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1aed 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1aee 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1aef 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1af0 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1af1 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1af2 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1af3 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [1802 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1803 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1804 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e a2 b3 d2 6f 0f 00 f3 8d 61 2f d7 76 5d 1e 76 |~...o....a/.v].v| +peer0.org1.example.com | 00000010 e4 c1 1d 48 ca 30 34 a8 07 38 10 24 b8 e7 1c be |...H.04..8.$....| +peer0.org1.example.com | [1805 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1806 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 ff c2 cc 3b ff 9d 47 d4 86 4d 78 |0D. P...;..G..Mx| +peer0.org1.example.com | 00000010 7c dc 23 cf d9 25 91 2b 0a 97 78 ed a8 f5 6f 4b ||.#..%.+..x...oK| +peer0.org1.example.com | 00000020 5d f4 97 7a 02 20 4f 31 2a 25 d9 48 5d b9 d3 6d |]..z. O1*%.H]..m| +peer0.org1.example.com | 00000030 b9 b2 7f 59 9b 4b 02 8f 1c 6a 6a 0f 80 d7 76 96 |...Y.K...jj...v.| +peer0.org1.example.com | 00000040 7f 18 8f f4 23 38 |....#8| +peer0.org1.example.com | [1807 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [1808 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 a7 2b 2f cb 3f e1 a0 92 90 52 9c |0D. E.+/.?....R.| +peer0.org1.example.com | 00000010 9b a4 fe e3 5e 4d dc eb 2c 15 83 42 1c 8a 65 b5 |....^M..,..B..e.| +peer0.org1.example.com | 00000020 bd 67 05 0d 02 20 45 11 d1 c7 24 b6 97 39 16 3d |.g... E...$..9.=| +peer0.org1.example.com | 00000030 c0 cc 89 e5 06 c8 4c f3 37 e8 eb 21 9d 64 f8 9f |......L.7..!.d..| +peer0.org1.example.com | 00000040 67 b4 66 68 90 38 |g.fh.8| +peer0.org1.example.com | [1809 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [180a 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [180b 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [180c 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [180d 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [180e 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [180f 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1810 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e a2 b3 d2 6f 0f 00 f3 8d 61 2f d7 76 5d 1e 76 |~...o....a/.v].v| +peer0.org1.example.com | 00000010 e4 c1 1d 48 ca 30 34 a8 07 38 10 24 b8 e7 1c be |...H.04..8.$....| +peer0.org1.example.com | [1811 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 ff c2 cc 3b ff 9d 47 d4 86 4d 78 |0D. P...;..G..Mx| +peer0.org1.example.com | 00000010 7c dc 23 cf d9 25 91 2b 0a 97 78 ed a8 f5 6f 4b ||.#..%.+..x...oK| +peer0.org1.example.com | 00000020 5d f4 97 7a 02 20 4f 31 2a 25 d9 48 5d b9 d3 6d |]..z. O1*%.H]..m| +peer0.org1.example.com | 00000030 b9 b2 7f 59 9b 4b 02 8f 1c 6a 6a 0f 80 d7 76 96 |...Y.K...jj...v.| +peer0.org1.example.com | 00000040 7f 18 8f f4 23 38 |....#8| +peer0.org1.example.com | [1812 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1813 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1814 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1815 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1816 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 3d c9 53 d4 5c ce a4 15 c7 67 1c 7b 3d 79 3f |.=.S.\....g.{=y?| +peer0.org1.example.com | 00000010 8f 66 12 7b 70 0e 8c 4e d8 3e c0 03 f9 07 bc fb |.f.{p..N.>......| +peer0.org1.example.com | [1817 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b4 9e 4e 9a fd 5d 98 e5 dd 2b |0E.!....N..]...+| +peer0.org1.example.com | 00000010 b2 70 9a 63 1e 86 43 04 0e aa db 15 c3 6a 46 67 |.p.c..C......jFg| +peer0.org1.example.com | 00000020 5b 3b 73 67 9c 02 20 7c a1 34 d7 9f ec b4 0d b9 |[;sg.. |.4......| +peer0.org1.example.com | 00000030 6f b7 6a 5b a2 db 7a d9 fd 8c 84 8b c6 b9 a5 8d |o.j[..z.........| +peer0.org1.example.com | 00000040 6f 71 81 be fc ea d6 |oq.....| +peer0.org1.example.com | [1818 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1819 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [181a 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [181b 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ba4 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1ba5 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ba6 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ba7 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ba8 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ba9 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1baa 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1bab 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bac 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [1bad 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [1bae 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1baf 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bb0 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1bb1 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1bb2 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1bb3 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1bb4 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1bb5 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1bb6 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4c1a0 gate 1598907094198112500 evaluation starts +peer0.org2.example.com | [1bb7 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4c1a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1bb8 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4c1a0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1bb9 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4c1a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1bba 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4c1a0 principal evaluation fails +peer0.org2.example.com | [1bbb 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4c1a0 gate 1598907094198112500 evaluation fails +peer0.org2.example.com | [1bbc 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1bbd 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1bbe 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1bbf 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4c710 gate 1598907094200197900 evaluation starts +peer0.org2.example.com | [1bc0 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4c710 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1bc1 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4c710 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1bc2 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4c710 principal matched by identity 0 +peer0.org2.example.com | [1bc3 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [1bc4 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [1bc5 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4c710 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1bc6 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4c710 gate 1598907094200197900 evaluation succeeds +peer0.org2.example.com | [1bc7 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1bc8 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1bc9 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1bca 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1bcb 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [1bcc 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [1bcd 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bce 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bcf 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1bd0 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1bd1 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1bd2 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1bd3 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1bd4 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1bd5 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d64000 gate 1598907094206739100 evaluation starts +peer0.org2.example.com | [1bd6 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d64000 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1bd7 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d64000 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1bd8 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d64000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1bd9 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d64000 principal evaluation fails +peer0.org2.example.com | [1bda 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d64000 gate 1598907094206739100 evaluation fails +peer0.org2.example.com | [1bdb 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1bdc 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1bdd 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1bde 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d64570 gate 1598907094207959700 evaluation starts +peer0.org2.example.com | [1bdf 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d64570 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1be0 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d64570 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1be1 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d64570 principal matched by identity 0 +peer0.org2.example.com | [1be2 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [181c 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [181d 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [181e 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [181f 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1820 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1821 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1822 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2600 gate 1598907089618600100 evaluation starts +peer0.org1.example.com | [1823 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2600 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1824 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2600 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1825 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2600 principal matched by identity 0 +peer0.org1.example.com | [1826 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 f4 c4 ab 64 23 45 dc 18 92 58 28 0c 4c 34 74 |"...d#E...X(.L4t| +peer0.org1.example.com | 00000010 79 c7 7f 57 0f b8 7f 32 d5 d9 e7 51 2f 15 27 48 |y..W...2...Q/.'H| +peer0.org1.example.com | [1827 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 5c 24 30 37 87 8d a5 03 50 26 ce |0D. .\$07....P&.| +peer0.org1.example.com | 00000010 07 8d 52 a6 96 61 57 31 55 3d 02 7c 44 87 a4 3f |..R..aW1U=.|D..?| +peer0.org1.example.com | 00000020 5f 58 b6 03 02 20 0f 46 f1 a2 01 af 47 40 2d 56 |_X... .F....G@-V| +peer0.org1.example.com | 00000030 7b 99 35 f1 a5 b0 45 ac 68 00 c3 c2 2a d5 71 ce |{.5...E.h...*.q.| +peer0.org1.example.com | 00000040 51 95 21 29 db 9e |Q.!)..| +peer0.org1.example.com | [1828 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2600 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1829 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2600 gate 1598907089618600100 evaluation succeeds +peer0.org1.example.com | [182a 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [182b 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [182c 08-31 20:51:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [182d 08-31 20:51:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [182e 08-31 20:51:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [182f 08-31 20:51:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1830 08-31 20:51:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1831 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1832 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1833 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [1834 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1835 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1836 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1837 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1838 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1839 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [183a 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [183b 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [183c 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [183d 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [183e 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [183f 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [1840 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [1841 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1842 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 0a ad 7b ac 02 20 70 74 8b 9f d0 5b 25 91 0a dc |..{.. pt...[%...| +peer1.org1.example.com | 00000030 46 4e b2 3d 2f 65 db d3 ee 05 83 49 33 04 f1 4a |FN.=/e.....I3..J| +peer1.org1.example.com | 00000040 f5 bd 47 66 8f 2f |..Gf./| +peer1.org1.example.com | [19ae 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [19af 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [19b0 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [19b1 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [19b2 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [19b3 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19b4 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19b5 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19b6 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [19b7 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19b8 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19b9 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [19ba 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [19bb 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [19bc 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19bd 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [19be 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [19bf 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19c0 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19c1 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19c2 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [19c3 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [19c4 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [19c5 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [19c6 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19c7 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19c8 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19c9 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [19ca 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [19cb 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19cc 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [19cd 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19ce 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1af4 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1af5 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1af6 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1af7 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db a1 0a ad 45 ca e7 06 61 d1 7b dd bc 70 48 93 |....E...a.{..pH.| +peer1.org2.example.com | 00000010 ac c2 56 d7 f0 1b 15 fb 3e 41 97 96 03 b1 89 27 |..V.....>A.....'| +peer1.org2.example.com | [1af8 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 d2 c1 83 d8 f9 44 42 c5 99 b6 |0E.!.......DB...| +peer1.org2.example.com | 00000010 02 bd 14 01 a5 d8 28 32 e8 19 e9 38 4d 49 90 40 |......(2...8MI.@| +peer1.org2.example.com | 00000020 58 3b 4d c5 16 02 20 51 03 82 01 fc 09 e9 1e a6 |X;M... Q........| +peer1.org2.example.com | 00000030 96 87 c3 cd a1 48 e1 e9 d5 c0 77 64 5f ed be e3 |.....H....wd_...| +peer1.org2.example.com | 00000040 40 62 d3 e0 07 67 c5 |@b...g.| +peer1.org2.example.com | [1af9 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [1afa 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 13 41 2b 98 7d b3 56 7b 85 01 |0E.!...A+.}.V{..| +peer1.org2.example.com | 00000010 50 ac d7 0e f3 e6 55 cf 21 38 08 7b 2b 1f d3 9b |P.....U.!8.{+...| +peer1.org2.example.com | 00000020 a4 42 b4 06 99 02 20 05 88 e4 a2 cb af 1e e1 4c |.B.... ........L| +peer1.org2.example.com | 00000030 41 af 22 ba 8e a3 ee ac 72 81 c3 60 84 c3 ca c8 |A.".....r..`....| +peer1.org2.example.com | 00000040 03 59 7c f3 41 e8 87 |.Y|.A..| +peer1.org2.example.com | [1afb 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1afc 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1afd 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1afe 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1aff 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b00 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b01 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b03 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b02 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b04 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1b05 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db a1 0a ad 45 ca e7 06 61 d1 7b dd bc 70 48 93 |....E...a.{..pH.| +peer1.org2.example.com | 00000010 ac c2 56 d7 f0 1b 15 fb 3e 41 97 96 03 b1 89 27 |..V.....>A.....'| +peer1.org2.example.com | [1b06 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 d2 c1 83 d8 f9 44 42 c5 99 b6 |0E.!.......DB...| +peer1.org2.example.com | 00000010 02 bd 14 01 a5 d8 28 32 e8 19 e9 38 4d 49 90 40 |......(2...8MI.@| +peer1.org2.example.com | 00000020 58 3b 4d c5 16 02 20 51 03 82 01 fc 09 e9 1e a6 |X;M... Q........| +peer1.org2.example.com | 00000030 96 87 c3 cd a1 48 e1 e9 d5 c0 77 64 5f ed be e3 |.....H....wd_...| +peer1.org2.example.com | 00000040 40 62 d3 e0 07 67 c5 |@b...g.| +peer1.org2.example.com | [1b07 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1b08 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1b09 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b0a 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b0b 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b0c 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1b0d 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db a1 0a ad 45 ca e7 06 61 d1 7b dd bc 70 48 93 |....E...a.{..pH.| +peer1.org2.example.com | 00000010 ac c2 56 d7 f0 1b 15 fb 3e 41 97 96 03 b1 89 27 |..V.....>A.....'| +peer1.org2.example.com | [1b0e 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b0f 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 d2 c1 83 d8 f9 44 42 c5 99 b6 |0E.!.......DB...| +peer1.org2.example.com | 00000010 02 bd 14 01 a5 d8 28 32 e8 19 e9 38 4d 49 90 40 |......(2...8MI.@| +peer1.org2.example.com | 00000020 58 3b 4d c5 16 02 20 51 03 82 01 fc 09 e9 1e a6 |X;M... Q........| +peer1.org2.example.com | 00000030 96 87 c3 cd a1 48 e1 e9 d5 c0 77 64 5f ed be e3 |.....H....wd_...| +peer1.org2.example.com | 00000040 40 62 d3 e0 07 67 c5 |@b...g.| +peer1.org2.example.com | [1b10 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [19cf 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [19d0 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19d1 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19d2 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19d3 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [19d4 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [19d5 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [19d6 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [19d7 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [19d8 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [19d9 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f8920 gate 1598907097966060500 evaluation starts +peer1.org1.example.com | [19da 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f8920 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [19db 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f8920 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [19dc 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [19dd 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [19de 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f8920 principal matched by identity 0 +peer1.org1.example.com | [19df 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [19e0 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [19e1 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [19e2 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f8920 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [19e3 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f8920 gate 1598907097966060500 evaluation succeeds +peer1.org1.example.com | [19e4 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [19e5 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [19e6 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [19e7 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [19e8 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [19e9 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [19ea 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [19eb 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | [1b11 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1b12 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b13 08-31 20:51:37.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b14 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b15 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b16 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b17 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b18 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b19 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b1a 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b1b 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b1c 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b1d 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [1b1e 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b1f 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b20 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b21 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b22 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b23 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1b24 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b25 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1b26 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b27 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b28 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1b29 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1b2a 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1b2b 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8cfb0 gate 1598907097321252600 evaluation starts +peer0.org1.example.com | [1843 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1844 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1845 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1846 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1847 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1848 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1849 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460ca80 gate 1598907089756422300 evaluation starts +peer0.org1.example.com | [184a 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460ca80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [184b 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460ca80 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [184c 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460ca80 principal matched by identity 0 +peer0.org1.example.com | [184d 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [184e 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [184f 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460ca80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1850 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460ca80 gate 1598907089756422300 evaluation succeeds +peer0.org1.example.com | [1851 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1852 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1853 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1854 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1855 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1856 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [19ec 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19ed 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [19ee 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [19ef 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [19f0 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [19f1 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [19f2 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [19f3 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [19f4 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004120900 gate 1598907097973390900 evaluation starts +peer1.org1.example.com | [19f5 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004120900 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [19f6 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004120900 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [19f7 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004120900 principal matched by identity 0 +peer1.org1.example.com | [19f8 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [19f9 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [19fa 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004120900 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [19fb 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004120900 gate 1598907097973390900 evaluation succeeds +peer1.org1.example.com | [19fc 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [19fd 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [19fe 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [19ff 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a00 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a01 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a02 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [1a03 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [1a04 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a05 08-31 20:51:37.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1be3 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [1be4 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d64570 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1be5 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d64570 gate 1598907094207959700 evaluation succeeds +peer0.org2.example.com | [1be6 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1be7 08-31 20:51:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1be8 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1be9 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1bea 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1beb 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1bec 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bed 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bee 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1bef 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1bf0 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1bf1 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1bf2 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1bf3 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1bf4 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1bf5 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d659c0 gate 1598907094213097300 evaluation starts +peer0.org2.example.com | [1bf6 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d659c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1bf7 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d659c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1bf8 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d659c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1bf9 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d659c0 principal evaluation fails +peer0.org2.example.com | [1bfa 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d659c0 gate 1598907094213097300 evaluation fails +peer0.org2.example.com | [1bfb 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1bfc 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1bfd 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1bfe 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65f30 gate 1598907094214762200 evaluation starts +peer0.org2.example.com | [1bff 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65f30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c00 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65f30 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1c01 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65f30 principal matched by identity 0 +peer0.org2.example.com | [1c02 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [1c03 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [1c04 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65f30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1857 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1858 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1859 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [185a 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [185b 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [185c 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [185d 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460dc80 gate 1598907089760792800 evaluation starts +peer0.org1.example.com | [185e 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460dc80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [185f 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460dc80 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1860 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460dc80 principal matched by identity 0 +peer0.org1.example.com | [1861 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [1862 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [1863 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460dc80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1864 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460dc80 gate 1598907089760792800 evaluation succeeds +peer0.org1.example.com | [1865 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1866 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1867 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1868 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1869 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [186a 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [186b 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [186c 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [186d 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [186e 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [186f 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1870 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1871 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1872 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1873 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1874 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00462f0d0 gate 1598907089771986800 evaluation starts +peer0.org1.example.com | [1875 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00462f0d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1876 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00462f0d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1877 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00462f0d0 principal matched by identity 0 +peer0.org1.example.com | [1878 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [1879 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [1c05 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d65f30 gate 1598907094214762200 evaluation succeeds +peer0.org2.example.com | [1c06 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c07 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c08 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1c09 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1c0a 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [1c0b 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [1c0c 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c0d 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c0e 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1c0f 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c10 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c11 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1c12 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1c13 08-31 20:51:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1c14 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7d820 gate 1598907094219974300 evaluation starts +peer0.org2.example.com | [1c15 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7d820 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c16 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7d820 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1c17 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7d820 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1c18 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7d820 principal evaluation fails +peer0.org2.example.com | [1c19 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7d820 gate 1598907094219974300 evaluation fails +peer0.org2.example.com | [1c1a 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c1b 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c1c 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1c1d 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7dd90 gate 1598907094221566400 evaluation starts +peer0.org2.example.com | [1c1e 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7dd90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c1f 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7dd90 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1c20 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7dd90 principal matched by identity 0 +peer0.org2.example.com | [1c21 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [1c22 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [1c23 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7dd90 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1c24 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7dd90 gate 1598907094221566400 evaluation succeeds +peer0.org2.example.com | [1c25 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c26 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c27 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1c28 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1c29 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [1c2a 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [1c2b 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c2c 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c2d 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c2e 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c2f 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c30 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1c31 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c32 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c33 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1c34 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1c35 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1c36 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9b8d0 gate 1598907094226883700 evaluation starts +peer0.org2.example.com | [1c37 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9b8d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c38 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9b8d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1c39 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9b8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1c3a 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9b8d0 principal evaluation fails +peer0.org2.example.com | [1c3b 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9b8d0 gate 1598907094226883700 evaluation fails +peer0.org2.example.com | [1c3c 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c3d 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c3e 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1c3f 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9be40 gate 1598907094228228200 evaluation starts +peer0.org2.example.com | [1c40 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9be40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c41 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9be40 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1c42 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9be40 principal matched by identity 0 +peer0.org2.example.com | [1c43 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [1c44 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [1c45 08-31 20:51:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9be40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1b2c 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8cfb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b2d 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8cfb0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1b2e 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8cfb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1b2f 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8cfb0 principal evaluation fails +peer1.org2.example.com | [1b30 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8cfb0 gate 1598907097321252600 evaluation fails +peer1.org2.example.com | [1b31 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b32 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b33 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1b34 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8d520 gate 1598907097322081600 evaluation starts +peer1.org2.example.com | [1b35 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8d520 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b36 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8d520 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1b37 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8d520 principal matched by identity 0 +peer1.org2.example.com | [1b38 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 4d b1 e5 64 ab 5d 7d 73 b3 77 98 b1 c0 2e 87 |.M..d.]}s.w.....| +peer1.org2.example.com | 00000010 dc 4e 7c d3 dc 21 20 be 6e 87 78 44 ba b2 41 76 |.N|..! .n.xD..Av| +peer1.org2.example.com | [1b39 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 65 31 6f 20 db 46 d8 e7 4c 79 |0E.!..e1o .F..Ly| +peer1.org2.example.com | 00000010 a2 db ea ac 1f 1d cc 90 dd e0 6d 70 f6 a0 c9 bd |..........mp....| +peer1.org2.example.com | 00000020 f4 3a 59 bb 3c 02 20 42 04 8a ac e4 a8 9d d6 79 |.:Y.<. B.......y| +peer1.org2.example.com | 00000030 c1 7c de 43 b2 e5 dd aa 1c 9e 71 9a e0 8f 9d 72 |.|.C......q....r| +peer1.org2.example.com | 00000040 58 a1 ce a7 d4 b6 03 |X......| +peer1.org2.example.com | [1b3a 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8d520 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1b3b 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b8d520 gate 1598907097322081600 evaluation succeeds +peer1.org2.example.com | [1b3c 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1b3d 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1b3e 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1b3f 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1b40 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1b41 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1b42 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1b43 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1b44 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1b45 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b46 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b47 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b48 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [1b49 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b4a 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b4b 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b4c 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1b4d 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:VlgI\263\ri\373\315W\tyN\305\032\215~\376\227#l\256\306\316\230\002 \020L\276\3319\242\353\023\225;\263P\220-\277m\364\370<\344P\300\2464+<\321\331\243\344\003\277" > +peer0.org2.example.com | [1c46 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d9be40 gate 1598907094228228200 evaluation succeeds +peer0.org2.example.com | [1c47 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c48 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c49 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1c4a 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1c4b 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c4c 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c4d 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1c4e 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c4f 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c50 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1c51 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1c52 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1c53 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbb040 gate 1598907094233999500 evaluation starts +peer0.org2.example.com | [1c54 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbb040 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c55 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbb040 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1c56 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbb040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1c57 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbb040 principal evaluation fails +peer0.org2.example.com | [1c58 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbb040 gate 1598907094233999500 evaluation fails +peer0.org2.example.com | [1c59 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c5a 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c5b 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1c5c 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbb5b0 gate 1598907094235420500 evaluation starts +peer0.org2.example.com | [1c5d 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbb5b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c5e 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbb5b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1c5f 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbb5b0 principal matched by identity 0 +peer0.org2.example.com | [1c60 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [1c61 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [1c62 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbb5b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1c63 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dbb5b0 gate 1598907094235420500 evaluation succeeds +peer0.org2.example.com | [1c64 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c65 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1c66 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1c67 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1c68 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [1c69 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | [1a06 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1a07 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a08 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a09 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1a0a 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1a0b 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1a0c 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142390 gate 1598907097981108800 evaluation starts +peer1.org1.example.com | [1a0d 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142390 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1a0e 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142390 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1a0f 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142390 principal matched by identity 0 +peer1.org1.example.com | [1a10 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [1a11 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [1a12 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142390 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1a13 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004142390 gate 1598907097981108800 evaluation succeeds +peer1.org1.example.com | [1a14 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a15 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a16 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1a17 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a18 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [1a19 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [1a1a 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a1b 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a1c 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1a1d 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a1e 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a1f 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1a20 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1a21 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1a22 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004143c80 gate 1598907097987764800 evaluation starts +peer1.org1.example.com | [1a23 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004143c80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1a24 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004143c80 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1a25 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004143c80 principal matched by identity 0 +peer1.org1.example.com | [1a26 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [1a27 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [1a28 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004143c80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1a29 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004143c80 gate 1598907097987764800 evaluation succeeds +peer1.org1.example.com | [1a2a 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a2b 08-31 20:51:37.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a2c 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1a2d 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a2e 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a2f 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a30 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a31 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a32 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a33 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1a34 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a35 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a36 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a37 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1a38 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a39 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a3a 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1a3b 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a3c 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a3d 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a3e 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1a3f 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1a40 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1a41 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041570d0 gate 1598907097996414500 evaluation starts +peer1.org1.example.com | [1a42 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041570d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1a43 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041570d0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1a44 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a45 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041570d0 principal matched by identity 0 +peer1.org1.example.com | [1a46 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [1a47 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [1a48 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041570d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1a49 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041570d0 gate 1598907097996414500 evaluation succeeds +peer1.org1.example.com | [1a4a 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a4b 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a4c 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1a4d 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a4e 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [1a4f 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [1a50 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a51 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a52 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1a53 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a54 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a55 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1a56 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1a57 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1a58 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e9c0 gate 1598907098004331700 evaluation starts +peer1.org1.example.com | [1a59 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e9c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1a5a 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e9c0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1a5b 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e9c0 principal matched by identity 0 +peer1.org2.example.com | [1b4e 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b4f 08-31 20:51:37.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b50 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b51 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b52 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b53 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1b54 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b55 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b56 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b57 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b58 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b59 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1b5a 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 3c 08 3d bc c6 89 79 ba 4a ac 99 82 f1 fa 4d |.<.=...y.J.....M| +peer1.org2.example.com | 00000010 0f a6 dd 71 2d 6b 0f d5 9b b2 82 ad 5e 80 da c8 |...q-k......^...| +peer1.org2.example.com | [1b5b 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 55 55 55 3f 7d 18 aa 53 15 e1 |0E.!..UUU?}..S..| +peer1.org2.example.com | 00000010 cc 53 46 31 e9 7c 18 3a 50 d2 cd d0 a0 44 0d fe |.SF1.|.:P....D..| +peer1.org2.example.com | 00000020 03 0f 29 76 0d 02 20 2f bd ba c1 eb 6b 9f 2d 86 |..)v.. /....k.-.| +peer1.org2.example.com | 00000030 a9 e4 eb 8f fc 4f 76 ee e0 64 f2 97 8f 9c 1a 3a |.....Ov..d.....:| +peer1.org2.example.com | 00000040 5e 1d 64 1d 25 85 81 |^.d.%..| +peer1.org2.example.com | [1b5c 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [1b5d 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a ee c2 93 4a df eb 29 2a 7f 6d 74 |0D. :...J..)*.mt| +peer1.org2.example.com | 00000010 24 41 07 7c ff 67 17 8a 81 e1 6b c8 cb 42 58 e7 |$A.|.g....k..BX.| +peer1.org2.example.com | 00000020 19 77 51 97 02 20 1a 6f 4d 3b d8 4b 84 9b 08 97 |.wQ.. .oM;.K....| +peer1.org2.example.com | 00000030 97 b1 32 ed 5a 59 3a 82 a8 fa 4a e4 26 e5 22 b0 |..2.ZY:...J.&.".| +peer1.org2.example.com | 00000040 74 74 f8 03 60 73 |tt..`s| +peer1.org2.example.com | [1b5e 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1b5f 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [1b60 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1b61 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1b62 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1b63 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b64 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [187a 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00462f0d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [187b 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00462f0d0 gate 1598907089771986800 evaluation succeeds +peer0.org1.example.com | [187c 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [187d 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [187e 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [187f 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1880 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [1881 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [1882 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1883 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1884 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1885 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1886 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1887 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1888 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1889 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [188a 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464c9c0 gate 1598907089778916900 evaluation starts +peer0.org1.example.com | [188b 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464c9c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [188c 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464c9c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [188d 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464c9c0 principal matched by identity 0 +peer0.org1.example.com | [188e 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [1890 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [1891 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464c9c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1892 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464c9c0 gate 1598907089778916900 evaluation succeeds +peer0.org1.example.com | [188f 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1893 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1894 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1896 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1897 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1895 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1898 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1899 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [1c6a 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [1c6b 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [1c6c 08-31 20:51:34.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c6d 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c6e 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c6f 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1c70 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c71 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c72 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1c73 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c74 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c75 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c76 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c77 08-31 20:51:34.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c78 08-31 20:51:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [1c79 08-31 20:51:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 ea f7 7e a6 89 c3 f4 66 ad 77 37 48 40 e3 c0 |...~....f.w7H@..| +peer0.org2.example.com | 00000010 9e 37 99 44 64 c5 a6 cc d1 5b 73 27 52 a5 5a 75 |.7.Dd....[s'R.Zu| +peer0.org2.example.com | [1c7a 08-31 20:51:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 e5 87 51 c4 ce 2e 74 26 a5 df e4 |0D. $..Q...t&...| +peer0.org2.example.com | 00000010 aa ad 9a d9 9a 6b e4 4b fb 87 fe e8 2c 61 a3 56 |.....k.K....,a.V| +peer0.org2.example.com | 00000020 7e ab b7 b7 02 20 1d 15 df 69 a7 c5 30 58 6b cb |~.... ...i..0Xk.| +peer0.org2.example.com | 00000030 d9 7e 35 98 33 e2 99 9b fa d4 f7 05 61 91 6d 31 |.~5.3.......a.m1| +peer0.org2.example.com | 00000040 0c 7c 56 60 67 16 |.|V`g.| +peer0.org2.example.com | [1c7b 08-31 20:51:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c7c 08-31 20:51:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c7d 08-31 20:51:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c7e 08-31 20:51:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [1c7f 08-31 20:51:34.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [1c80 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c81 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:9094981273582956271 tag:EMPTY mem_req:\322\327\217\322\373\014SX+\002 `\022\355\361\274\256\226\021\311\312\037\325\240\003\257\374\235\177T\356\007S\276\210\th^\367\322\010\317\366" > > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1c82 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:9094981273582956271 tag:EMPTY mem_req:\322\327\217\322\373\014SX+\002 `\022\355\361\274\256\226\021\311\312\037\325\240\003\257\374\235\177T\356\007S\276\210\th^\367\322\010\317\366" > > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c83 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c84 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 9094981273582956271, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c85 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1c86 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 9094981273582956271, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer0.org2.example.com | [1c87 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1c88 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1c89 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1c8a 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c8b 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1c8c 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1c8d 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1c8e 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1c8f 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfea80 gate 1598907094444850100 evaluation starts +peer0.org2.example.com | [1c90 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfea80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c91 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfea80 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1c92 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfea80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1c93 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfea80 principal evaluation fails +peer0.org2.example.com | [1c94 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfea80 gate 1598907094444850100 evaluation fails +peer0.org2.example.com | [1c95 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c96 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1c97 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1c98 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfeff0 gate 1598907094445903100 evaluation starts +peer0.org2.example.com | [1c99 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfeff0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1c9a 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfeff0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1c9b 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfeff0 principal matched by identity 0 +peer0.org2.example.com | [1c9c 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 38 f7 03 a3 ec c8 c5 a0 53 a1 da 5d a5 c9 ac |.8.......S..]...| +peer0.org2.example.com | 00000010 a1 e9 6a d5 e6 30 d3 4d 91 a8 d0 0b b9 77 a2 aa |..j..0.M.....w..| +peer0.org2.example.com | [1c9d 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 c8 1b d1 fb 63 f4 f3 dd 45 18 eb |0D. .....c...E..| +peer0.org2.example.com | 00000010 06 98 a8 95 67 20 9c 17 b8 9d 9d 27 99 53 87 f4 |....g .....'.S..| +peer0.org2.example.com | 00000020 24 56 74 78 02 20 1d b3 30 63 83 e3 0b 49 db 56 |$Vtx. ..0c...I.V| +peer0.org2.example.com | 00000030 2f 0b da 29 a4 5d b7 e6 b7 34 08 b5 23 50 30 0c |/..).]...4..#P0.| +peer0.org2.example.com | 00000040 37 ca 78 54 76 bb |7.xTv.| +peer0.org2.example.com | [1c9e 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfeff0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1c9f 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dfeff0 gate 1598907094445903100 evaluation succeeds +peer0.org2.example.com | [1ca0 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1ca1 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1ca2 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1ca3 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1ca4 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1ca5 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ca6 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1ca7 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ca8 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ca9 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cab 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1caa 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 b3 5c 42 54 25 30 be b4 7c 78 b0 29 0c aa |...\BT%0..|x.)..| +peer0.org2.example.com | 00000010 90 ce 7f 27 82 1e a3 94 11 f2 89 16 2f a4 cd 3c |...'......../..<| +peer0.org2.example.com | [1cac 08-31 20:51:34.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 d3 29 2b 65 f1 14 85 3c 04 39 |0E.!...)+e...<.9| +peer0.org2.example.com | 00000010 e3 96 d4 c0 95 94 3b c7 9d bf 68 83 8d 46 4e ac |......;...h..FN.| +peer1.org1.example.com | [1a5c 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [1a5d 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | [1b65 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b66 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [1b67 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b68 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b69 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1b6a 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b6c 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b6b 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:VlgI\263\ri\373\315W\tyN\305\032\215~\376\227#l\256\306\316\230\002 \020L\276\3319\242\353\023\225;\263P\220-\277m\364\370<\344P\300\2464+<\321\331\243\344\003\277" > +peer1.org2.example.com | [1b6d 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b6e 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b6f 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b70 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b71 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b72 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b73 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b74 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b75 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [1b76 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b77 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b78 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b79 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1b7a 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1b7b 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1b7c 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1b7d 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b7e 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1b7f 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1b80 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1b81 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1b82 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c680e0 gate 1598907097586151400 evaluation starts +peer1.org2.example.com | [1b83 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c680e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b84 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c680e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1b85 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c680e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1b86 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c680e0 principal evaluation fails +peer1.org2.example.com | [1b87 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c680e0 gate 1598907097586151400 evaluation fails +peer1.org2.example.com | [1b88 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b89 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1b8a 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1b8b 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c68650 gate 1598907097586418400 evaluation starts +peer1.org2.example.com | [1b8c 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c68650 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1b8d 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c68650 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1b8e 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c68650 principal matched by identity 0 +peer1.org2.example.com | [1b8f 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 c5 90 1c 23 89 b1 55 7b 43 26 4a b8 d6 70 5a |....#..U{C&J..pZ| +peer1.org2.example.com | 00000010 b6 28 a6 93 8d 2b 0a 0d 7c 58 e6 f0 72 7d e6 36 |.(...+..|X..r}.6| +peer1.org2.example.com | [1b90 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 37 11 34 5e 7c bc 37 64 82 1b 45 |0D. ,7.4^|.7d..E| +peer1.org2.example.com | 00000010 11 dc 71 6e 82 b7 d1 51 2a d8 d1 d9 47 36 94 5a |..qn...Q*...G6.Z| +peer1.org2.example.com | 00000020 67 d1 73 de 02 20 67 86 18 97 66 53 75 a1 da 19 |g.s.. g...fSu...| +peer1.org2.example.com | 00000030 61 5e 5c 2b f1 16 bc ab 13 78 7c c6 83 90 87 63 |a^\+.....x|....c| +peer1.org2.example.com | 00000040 41 01 da cb e5 e6 |A.....| +peer1.org2.example.com | [1b91 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c68650 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1b92 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c68650 gate 1598907097586418400 evaluation succeeds +peer1.org2.example.com | [1b93 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1b94 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1b95 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1b96 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1b97 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1b98 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1b99 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1b9a 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1b9b 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1b9c 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b9d 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b9e 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1b9f 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [1ba0 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ba1 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ba2 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ba3 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [1a5e 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e9c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1a5f 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e9c0 gate 1598907098004331700 evaluation succeeds +peer1.org1.example.com | [1a60 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a61 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a62 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1a63 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a64 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [1a65 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [1a66 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a67 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a68 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a69 08-31 20:51:38.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a6a 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a6b 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a6c 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a6d 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a6e 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a6f 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a70 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1a71 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a72 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a73 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a74 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a75 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [1a76 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [1a77 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3e 87 1c 64 dc e9 a2 27 bc 0b 08 4e 76 0f db b9 |>..d...'...Nv...| +peer1.org1.example.com | 00000010 d9 80 86 af 80 2a b7 58 f7 54 19 b2 87 bd 4c 2d |.....*.X.T....L-| +peer1.org1.example.com | [1a78 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 6d c2 32 02 1d 9b b9 9d a5 ec 9d |0D. Am.2........| +peer1.org1.example.com | 00000010 03 a8 de d5 79 fe b3 f0 01 6f c8 cd 0b 8c 0f b0 |....y....o......| +peer1.org1.example.com | 00000020 09 2a 27 dd 02 20 7e fa 5a 60 9f eb 59 97 7f 16 |.*'.. ~.Z`..Y...| +peer1.org1.example.com | 00000030 fb fa 44 1c 48 0a a2 f7 5b ae 85 a5 56 b0 6f 70 |..D.H...[...V.op| +peer1.org1.example.com | 00000040 84 01 7a 44 e6 02 |..zD..| +peer1.org1.example.com | [1a79 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a7a 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a7b 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a7c 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [1a7d 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1a7e 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a7f 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1a80 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1a81 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ba4 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:VlgI\263\ri\373\315W\tyN\305\032\215~\376\227#l\256\306\316\230\002 \020L\276\3319\242\353\023\225;\263P\220-\277m\364\370<\344P\300\2464+<\321\331\243\344\003\277" > +peer1.org2.example.com | [1ba5 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ba6 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ba7 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ba8 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ba9 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1baa 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bab 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bac 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bad 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bae 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1baf 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bb0 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bb1 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bb2 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bb3 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bb4 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bb5 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bb6 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bb7 08-31 20:51:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bb8 08-31 20:51:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bb9 08-31 20:51:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bba 08-31 20:51:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1bbb 08-31 20:51:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bbc 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bbd 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bbe 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [1bbf 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bc0 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bc1 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bc2 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bc3 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bc4 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bc5 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bc6 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1bc7 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [1bc8 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [1bc9 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [189a 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [189c 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [189b 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [189d 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [189e 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [189f 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18a0 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18a1 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [18a2 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18a3 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18a4 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18a5 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [18a6 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [18a7 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [18a8 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [18a9 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [18aa 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [18ab 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004676500 gate 1598907089790346200 evaluation starts +peer0.org1.example.com | [18ac 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004676500 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [18ad 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004676500 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [18ae 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004676500 principal matched by identity 0 +peer0.org1.example.com | [18af 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [18b0 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [18b1 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004676500 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [18b2 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004676500 gate 1598907089790346200 evaluation succeeds +peer0.org1.example.com | [18b3 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [18b4 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [18b5 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [18b6 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [18b7 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [18b8 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [18b9 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [18ba 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [18bb 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18bc 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18bd 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [18be 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [18bf 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [18c0 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [18c1 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [18c2 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [18c3 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046944e0 gate 1598907089800244100 evaluation starts +peer0.org1.example.com | [18c4 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046944e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [18c5 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046944e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [18c6 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046944e0 principal matched by identity 0 +peer0.org1.example.com | [18c7 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [18c8 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [18c9 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046944e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [18ca 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046944e0 gate 1598907089800244100 evaluation succeeds +peer0.org1.example.com | [18cb 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [18cc 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [18cd 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [18ce 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [18cf 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18d0 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [18d1 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [18d2 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18d3 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [18d4 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18d5 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1a82 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1a84 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a85 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1a83 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1a86 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1a87 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1a88 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1a89 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1a8a 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d79f0 gate 1598907100032707700 evaluation starts +peer1.org1.example.com | [1a8b 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d79f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1a8c 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d79f0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1a8d 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d79f0 principal matched by identity 0 +peer1.org1.example.com | [1a8e 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 7d 67 74 97 c6 df f9 86 6f 84 a2 33 2a 87 87 |M}gt.....o..3*..| +peer1.org1.example.com | 00000010 08 a0 10 ee 46 b1 dc 81 63 a5 59 92 b1 4b e4 69 |....F...c.Y..K.i| +peer1.org1.example.com | [1a8f 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 96 49 6c 76 ad e9 2f e3 fb 97 |0E.!...Ilv../...| +peer1.org1.example.com | 00000010 b2 7c 15 39 77 ab d3 03 2f 3e b2 7a 2d 96 b1 a0 |.|.9w.../>.z-...| +peer1.org1.example.com | 00000020 cd a6 1c 1d 89 02 20 0f ad 0b a2 ee 1a 30 66 88 |...... ......0f.| +peer1.org1.example.com | 00000030 46 20 58 f3 53 f2 09 9a 2b 5a 26 4c 00 79 18 ce |F X.S...+Z&L.y..| +peer1.org1.example.com | 00000040 7f f2 be 5a 8a 9d c6 |...Z...| +peer1.org1.example.com | [1a90 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d79f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1a91 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d79f0 gate 1598907100032707700 evaluation succeeds +peer1.org1.example.com | [1a92 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a93 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1a94 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1a95 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1a96 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1a97 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1a98 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1a99 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1a9a 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1a9b 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a9c 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1a9d 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1bca 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1bcb 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1bcc 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1bcd 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1bce 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1bcf 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1bd0 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1bd1 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0d40 gate 1598907098452666300 evaluation starts +peer1.org2.example.com | [1bd2 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0d40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1bd3 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0d40 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1bd4 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1bd5 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0d40 principal evaluation fails +peer1.org2.example.com | [1bd6 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0d40 gate 1598907098452666300 evaluation fails +peer1.org2.example.com | [1bd7 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1bd8 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1bd9 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1bda 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb12b0 gate 1598907098452955700 evaluation starts +peer1.org2.example.com | [1bdb 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb12b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1bdc 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb12b0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1bdd 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb12b0 principal matched by identity 0 +peer1.org2.example.com | [1bde 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [1bdf 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [1be0 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb12b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1be1 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb12b0 gate 1598907098452955700 evaluation succeeds +peer1.org2.example.com | [1be2 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1be3 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1be4 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1be5 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1be6 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1be7 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1be8 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1be9 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1bea 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1beb 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1bec 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1bed 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1bee 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccc4b0 gate 1598907098453859200 evaluation starts +peer1.org2.example.com | [1bef 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccc4b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1bf0 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccc4b0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1bf1 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccc4b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1bf2 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccc4b0 principal evaluation fails +peer1.org2.example.com | [1bf3 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccc4b0 gate 1598907098453859200 evaluation fails +peer1.org2.example.com | [1bf4 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1bf5 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1bf6 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1bf7 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccca20 gate 1598907098454130500 evaluation starts +peer1.org2.example.com | [1bf8 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccca20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1bf9 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccca20 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1bfa 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccca20 principal matched by identity 0 +peer1.org2.example.com | [1bfb 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [1bfc 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [1bfd 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccca20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1bfe 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ccca20 gate 1598907098454130500 evaluation succeeds +peer1.org2.example.com | [1bff 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1c00 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1c01 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1c02 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1c03 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [1c04 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | [1a9e 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1a9f 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aa0 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aa1 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1aa2 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1aa3 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1aa4 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1aa5 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1aa6 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1aa7 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1aa8 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1aa9 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1aaa 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1aab 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1aac 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1aad 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aae 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aaf 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1ab0 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1ab1 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ab2 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1ab3 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ab4 08-31 20:51:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1ab5 08-31 20:51:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161026 +peer1.org1.example.com | [1ab6 08-31 20:51:40.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4AE1406BD4CFB4C30CE0543FFE703BBB47A31069290150D2ACED7475DFEC4D0C +peer1.org1.example.com | [1ab7 08-31 20:51:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1ab8 08-31 20:51:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1ab9 08-31 20:51:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1aba 08-31 20:51:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [1abb 08-31 20:51:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1abc 08-31 20:51:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1abd 08-31 20:51:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1abe 08-31 20:51:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1abf 08-31 20:51:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1ac0 08-31 20:51:40.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ac1 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1ac2 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ac3 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1ac4 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000020 d8 3b 75 e3 90 02 20 0b e2 04 10 ce d3 d7 98 df |.;u... .........| +peer0.org2.example.com | 00000030 70 5c 55 cc c1 a8 89 82 51 0a 97 83 5a b9 c6 62 |p\U.....Q...Z..b| +peer0.org2.example.com | 00000040 a5 2a 5c 68 25 20 91 |.*\h% .| +peer0.org2.example.com | [1cad 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1cae 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1caf 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cb0 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1cb1 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 6b 8d 84 9c 5e 54 fd d2 47 1d 20 69 43 4d fe |.k...^T..G. iCM.| +peer0.org2.example.com | 00000010 3f 62 5a 35 2f b7 98 f5 9f 3d 5c 78 23 88 16 ac |?bZ5/....=\x#...| +peer0.org2.example.com | [1cb2 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 4f b9 fe ed 90 40 8a 5d 97 0f |0E.!..O....@.]..| +peer0.org2.example.com | 00000010 e7 9f bb 16 f0 5c 78 9d 1f e1 3b 86 8f 6d fa 71 |.....\x...;..m.q| +peer0.org2.example.com | 00000020 2e df 67 7c 3f 02 20 1e b2 61 f8 d3 85 bc a8 47 |..g|?. ..a.....G| +peer0.org2.example.com | 00000030 6f d8 27 5f 77 e4 c5 e9 7e 55 bf 24 04 8d 63 1b |o.'_w...~U.$..c.| +peer0.org2.example.com | 00000040 06 92 b3 98 47 ca 24 |....G.$| +peer0.org2.example.com | [1cb3 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1cb4 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cb5 08-31 20:51:34.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cb6 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1cb7 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1cb8 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1cb9 08-31 20:51:34.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cba 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cbb 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cbc 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cbd 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1cbe 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 e3 df 1d 27 0f 55 03 7e 01 74 87 d8 0a fe 96 |5...'.U.~.t.....| +peer0.org2.example.com | 00000010 2e 95 46 dc 04 49 32 1c 78 38 93 a5 a0 97 29 f6 |..F..I2.x8....).| +peer0.org2.example.com | [1cbf 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 a9 9b 8a 91 6a 3e 56 6c 67 49 b3 |0D. .....j>VlgI.| +peer0.org2.example.com | 00000010 0d 69 fb cd 57 09 79 4e c5 1a 8d 7e fe 97 23 6c |.i..W.yN...~..#l| +peer0.org2.example.com | 00000020 ae c6 ce 98 02 20 10 4c be d9 39 a2 eb 13 95 3b |..... .L..9....;| +peer0.org2.example.com | 00000030 b3 50 90 2d bf 6d f4 f8 3c e4 50 c0 a6 34 2b 3c |.P.-.m..<.P..4+<| +peer0.org2.example.com | 00000040 d1 d9 a3 e4 03 bf |......| +peer0.org2.example.com | [1cc0 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cc1 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1cc2 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1cc3 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1cc4 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1cc5 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cc6 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cc7 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cc8 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cc9 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cca 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ccb 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1ccc 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1cce 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1ccf 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cd1 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cd3 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cd0 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cd2 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1cd4 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cd5 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ccd 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cd6 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cd7 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cd8 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cd9 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cda 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cdb 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1cdc 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cdd 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1cde 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1cdf 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1ce0 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ce1 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ce2 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1ce3 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1ce4 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1ce5 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e34fa0 gate 1598907095288797600 evaluation starts +peer0.org2.example.com | [1ce6 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e34fa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ce7 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e34fa0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1ce8 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e34fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1ce9 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e34fa0 principal evaluation fails +peer0.org2.example.com | [1cea 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e34fa0 gate 1598907095288797600 evaluation fails +peer0.org2.example.com | [1ceb 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1cec 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1ced 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1cee 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e35510 gate 1598907095292299500 evaluation starts +peer0.org2.example.com | [1cef 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e35510 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1cf0 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e35510 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1cf1 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e35510 principal matched by identity 0 +peer0.org2.example.com | [1cf2 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 68 e1 9f 6a cf 4b 51 94 26 3d f3 b4 96 65 0e |.h..j.KQ.&=...e.| +peer0.org2.example.com | 00000010 83 18 51 0d 1e 95 21 8c 2b 87 c2 30 e0 b7 7c 36 |..Q...!.+..0..|6| +peer0.org2.example.com | [1cf3 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e d6 c1 ed a6 6a 4d 7c 26 09 1f 1a |0D. .....jM|&...| +peer0.org2.example.com | 00000010 5d 34 72 e2 9e 77 a4 01 73 c6 f2 8d 2d 6d 0c cb |]4r..w..s...-m..| +peer0.org2.example.com | 00000020 f5 a4 16 2b 02 20 66 ec 64 f0 96 5d af 46 e1 72 |...+. f.d..].F.r| +peer0.org2.example.com | 00000030 cf 93 fc 30 61 ec c3 64 cb 6b 6e 43 25 28 1b 0d |...0a..d.knC%(..| +peer0.org2.example.com | 00000040 e9 d1 03 99 53 02 |....S.| +peer0.org2.example.com | [1cf4 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e35510 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1cf5 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e35510 gate 1598907095292299500 evaluation succeeds +peer0.org2.example.com | [1cf6 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1cf7 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1cf8 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1cf9 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1cfa 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1cfb 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1cfc 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1cfd 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1cfe 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1cff 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d00 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d01 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d02 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d03 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d04 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d05 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d06 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18d6 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18d7 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [18d8 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [18d9 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [18da 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18db 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [18dc 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [18dd 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18de 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [18df 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [18e0 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [18e1 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [18e2 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [18e3 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [18e4 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [18e5 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [18e6 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [18e7 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004695bd0 gate 1598907090047233800 evaluation starts +peer0.org1.example.com | [18e8 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004695bd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [18e9 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004695bd0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [18ea 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004695bd0 principal matched by identity 0 +peer0.org1.example.com | [18eb 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 ef c5 6b 52 32 b6 34 b6 2c ed f0 2f e9 6f 9b | ..kR2.4.,../.o.| +peer0.org1.example.com | 00000010 da 4b 4f 0c fb 16 0e d2 10 ad d3 a9 1c 3f 49 ba |.KO..........?I.| +peer0.org1.example.com | [18ec 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a ab d8 49 54 34 8c 63 5d 47 4e 8d |0D. Z..IT4.c]GN.| +peer0.org1.example.com | 00000010 e3 7d eb 56 47 3a 43 25 7f db 6f d6 71 3e c1 64 |.}.VG:C%..o.q>.d| +peer0.org1.example.com | 00000020 f8 2d 64 48 02 20 65 1c 28 34 38 e1 96 bb af 9d |.-dH. e.(48.....| +peer0.org1.example.com | 00000030 ad 26 80 c8 d3 c3 39 ab b4 6c 2c c7 e6 72 86 83 |.&....9..l,..r..| +peer0.org1.example.com | 00000040 15 47 d2 5b 48 62 |.G.[Hb| +peer0.org1.example.com | [18ed 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004695bd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [18ee 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004695bd0 gate 1598907090047233800 evaluation succeeds +peer0.org1.example.com | [18ef 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [18f0 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [18f1 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [18f2 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [18f3 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [18f4 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [18f5 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [18f6 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [18f7 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [18f8 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18f9 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18fa 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18fb 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [18fc 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [18fd 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [18fe 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [18ff 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1900 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1901 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1902 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1903 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1904 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1905 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1906 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1907 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1908 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1909 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [190a 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [190b 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [190d 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [190e 08-31 20:51:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [190c 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [190f 08-31 20:51:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1910 08-31 20:51:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1911 08-31 20:51:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1912 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1913 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1914 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1915 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1916 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1917 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1918 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1919 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [191a 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [191b 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [191c 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e cd ab ed 1a fc af ba 52 93 0a 47 92 bf 8c ce |........R..G....| +peer0.org1.example.com | 00000010 01 61 a6 a6 03 a3 47 c7 f5 1f b4 8e a5 18 0e 75 |.a....G........u| +peer0.org1.example.com | [191d 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 3a 28 c3 ba 72 b3 a2 51 bc 00 |0E.!..:(..r..Q..| +peer0.org1.example.com | 00000010 a3 86 3e d4 ef 98 31 9f 20 ab 5c 31 69 bf 31 45 |..>...1. .\1i.1E| +peer0.org1.example.com | 00000020 d0 65 0d be 6f 02 20 64 ad 90 72 89 7d aa 3d e3 |.e..o. d..r.}.=.| +peer0.org1.example.com | 00000030 b1 1c 6b 54 63 be 93 71 80 d8 42 e9 29 0d d4 94 |..kTc..q..B.)...| +peer0.org1.example.com | 00000040 e2 03 56 08 f5 76 a0 |..V..v.| +peer0.org1.example.com | [191e 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [191f 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1920 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1921 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1922 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1923 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1924 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1925 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1926 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1927 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1928 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1929 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [192a 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [192b 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [192c 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [192d 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [192e 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [192f 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1930 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1931 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1932 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1933 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1934 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1935 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1936 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1937 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1938 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1939 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [193a 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [193b 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [193c 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [193d 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [193e 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [193f 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1940 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1941 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1942 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1943 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1944 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1945 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1946 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f1280 gate 1598907090484768400 evaluation starts +peer0.org1.example.com | [1947 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f1280 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1948 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f1280 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1949 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f1280 principal matched by identity 0 +peer0.org1.example.com | [194a 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 02 a8 09 99 42 10 8d ff 3a 85 67 e0 15 cf 13 |.....B...:.g....| +peer0.org1.example.com | 00000010 c1 55 6a bd ce 35 00 d7 ca dc c7 58 4b 35 11 55 |.Uj..5.....XK5.U| +peer0.org1.example.com | [194b 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f b6 f2 75 ff 13 25 9b 7d d4 e1 f0 |0D. /..u..%.}...| +peer0.org1.example.com | 00000010 a1 f1 83 08 50 a7 58 55 50 24 c1 7d b0 58 95 c4 |....P.XUP$.}.X..| +peer0.org1.example.com | 00000020 96 ce aa 9d 02 20 43 6d 1b 37 e6 58 ec d9 b1 18 |..... Cm.7.X....| +peer0.org1.example.com | 00000030 4c 77 a1 ea 51 96 0a 43 e0 9a 30 9d d2 27 55 16 |Lw..Q..C..0..'U.| +peer0.org1.example.com | 00000040 16 db b7 33 68 13 |...3h.| +peer0.org1.example.com | [194c 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f1280 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [194d 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f1280 gate 1598907090484768400 evaluation succeeds +peer0.org1.example.com | [194e 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [194f 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1950 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1951 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1952 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1953 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1954 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1955 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1956 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1957 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1958 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1959 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [195a 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [195b 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [195c 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [195d 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ac5 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1ac6 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ac7 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ac8 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1ac9 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1aca 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1acb 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1acc 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1acd 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ace 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1acf 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ad0 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ad1 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1ad2 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1ad3 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1ad4 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e3320 gate 1598907100452888400 evaluation starts +peer1.org1.example.com | [1ad5 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e3320 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ad6 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e3320 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1ad7 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e3320 principal matched by identity 0 +peer1.org1.example.com | [1ad8 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 08 be 1a 2c d9 b5 c0 87 97 94 01 ef 54 9c f7 |....,........T..| +peer1.org1.example.com | 00000010 02 e3 0b 24 d8 d0 cd e6 e8 75 80 d7 0a 97 0c 3e |...$.....u.....>| +peer1.org1.example.com | [1ad9 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 a6 ce d8 49 0e 83 c3 2b 66 98 |0E.!.....I...+f.| +peer1.org1.example.com | 00000010 62 f4 32 46 4b 01 a4 da 89 81 4d ab 54 84 ef d2 |b.2FK.....M.T...| +peer1.org1.example.com | 00000020 ad 61 e4 ee 27 02 20 38 83 5a ce 83 bd 7b 41 f3 |.a..'. 8.Z...{A.| +peer1.org1.example.com | 00000030 47 2b 89 ad 80 4c 95 78 6a 6d 26 c9 6c 28 ad d9 |G+...L.xjm&.l(..| +peer1.org1.example.com | 00000040 5f c1 1c 4c e8 33 50 |_..L.3P| +peer1.org1.example.com | [1ada 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e3320 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1adb 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e3320 gate 1598907100452888400 evaluation succeeds +peer1.org1.example.com | [1adc 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1add 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ade 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1adf 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1ae0 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [1c05 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c06 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c07 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c08 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c09 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c0a 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1c0b 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c0c 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c0d 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1c0e 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1c0f 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1c10 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91160 gate 1598907098456327000 evaluation starts +peer1.org2.example.com | [1c11 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91160 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c12 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91160 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1c13 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1c14 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91160 principal evaluation fails +peer1.org2.example.com | [1c15 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91160 gate 1598907098456327000 evaluation fails +peer1.org2.example.com | [1c16 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c17 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c18 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1c19 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c916d0 gate 1598907098457238900 evaluation starts +peer1.org2.example.com | [1c1a 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c916d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c1b 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c916d0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1c1c 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c916d0 principal matched by identity 0 +peer1.org2.example.com | [1c1d 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [1c1e 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [1c1f 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c20 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c916d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1c21 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c916d0 gate 1598907098457238900 evaluation succeeds +peer1.org2.example.com | [1c22 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1c23 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [195e 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [195f 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1960 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1961 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1962 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1963 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1964 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1965 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1966 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1967 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1968 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1969 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [196a 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [196b 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [196c 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [196d 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [196e 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [196f 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1970 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1971 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1972 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1973 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1974 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1975 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1976 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1977 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1978 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816101E +peer0.org1.example.com | [1979 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 225CF3F8A5FDD1B8DC55E7A508A796DDC2AF808DD406864503B2F9B1C2D22ED7 +peer0.org1.example.com | [197a 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [197b 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [197c 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [197d 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [197e 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [197f 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1980 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1981 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1982 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1983 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1984 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1985 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1986 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1987 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1988 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1989 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [198a 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [198b 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [198c 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [198d 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [198e 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [198f 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1990 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1991 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1992 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1993 08-31 20:51:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1994 08-31 20:51:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [1995 08-31 20:51:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1996 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1997 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1998 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1999 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [199a 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1ae1 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1ae3 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1ae4 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1ae2 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1ae5 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1ae6 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ae7 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ae8 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ae9 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aea 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1aeb 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aec 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1aed 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1aee 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aef 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1af0 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1af1 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1af2 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1af3 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1af4 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1af5 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1af6 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1af7 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1af8 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1af9 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1afb 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1afc 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1afd 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1afa 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1afe 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1aff 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b00 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b01 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b02 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b03 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1c24 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1c25 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1c26 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [1c27 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [1c28 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c29 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c2a 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1c2b 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c2c 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c2d 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1c2e 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1c2f 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1c30 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf6fc0 gate 1598907098468322500 evaluation starts +peer1.org2.example.com | [1c31 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf6fc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c32 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf6fc0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1c33 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf6fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1c34 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf6fc0 principal evaluation fails +peer1.org2.example.com | [1c35 08-31 20:51:38.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf6fc0 gate 1598907098468322500 evaluation fails +peer1.org2.example.com | [1c36 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c37 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c38 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1c39 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf7530 gate 1598907098471089500 evaluation starts +peer1.org2.example.com | [1c3a 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf7530 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c3b 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf7530 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1c3c 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf7530 principal matched by identity 0 +peer1.org2.example.com | [1c3d 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [1c3e 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [1c3f 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf7530 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1c40 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf7530 gate 1598907098471089500 evaluation succeeds +peer1.org2.example.com | [1c41 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1c42 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1c43 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1d07 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d08 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1d09 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d0a 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d0b 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1d0c 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d0d 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d0e 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d0f 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d10 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d11 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d12 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d13 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d14 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d15 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d16 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d17 08-31 20:51:35.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d18 08-31 20:51:35.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [1d19 08-31 20:51:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1d1a 08-31 20:51:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161021 +peer0.org2.example.com | [1d1b 08-31 20:51:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7F246E9E147DE7B2C908AF031273C309DF451C2A6E2FF1CB119BF840FADDBD55 +peer0.org2.example.com | [1d1c 08-31 20:51:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1d1d 08-31 20:51:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1d1e 08-31 20:51:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1d1f 08-31 20:51:35.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [1d20 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d21 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d22 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d23 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1d24 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1d25 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d28 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1d26 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d2a 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d2b 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d29 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [199b 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [199c 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [199d 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [199e 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [199f 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [19a0 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [19a1 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [19a2 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004741bc0 gate 1598907093015670500 evaluation starts +peer0.org1.example.com | [19a3 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004741bc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [19a4 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004741bc0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [19a5 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004741bc0 principal matched by identity 0 +peer0.org1.example.com | [19a6 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 6b 8d 84 9c 5e 54 fd d2 47 1d 20 69 43 4d fe |.k...^T..G. iCM.| +peer0.org1.example.com | 00000010 3f 62 5a 35 2f b7 98 f5 9f 3d 5c 78 23 88 16 ac |?bZ5/....=\x#...| +peer0.org1.example.com | [19a7 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 4f b9 fe ed 90 40 8a 5d 97 0f |0E.!..O....@.]..| +peer0.org1.example.com | 00000010 e7 9f bb 16 f0 5c 78 9d 1f e1 3b 86 8f 6d fa 71 |.....\x...;..m.q| +peer0.org1.example.com | 00000020 2e df 67 7c 3f 02 20 1e b2 61 f8 d3 85 bc a8 47 |..g|?. ..a.....G| +peer0.org1.example.com | 00000030 6f d8 27 5f 77 e4 c5 e9 7e 55 bf 24 04 8d 63 1b |o.'_w...~U.$..c.| +peer0.org1.example.com | 00000040 06 92 b3 98 47 ca 24 |....G.$| +peer0.org1.example.com | [19a8 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004741bc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [19a9 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004741bc0 gate 1598907093015670500 evaluation succeeds +peer0.org1.example.com | [19aa 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [19ab 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [19ac 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [19ad 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [19ae 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [19af 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [19b0 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [19b1 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [19b2 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [19b3 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19b4 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19b5 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19b6 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [19b7 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19b8 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c44 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1c45 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [1c46 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [1c47 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c48 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c49 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c4a 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c4b 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c4c 08-31 20:51:38.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1c4d 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c4e 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c4f 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1c50 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1c51 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1c52 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d19070 gate 1598907098484665400 evaluation starts +peer1.org2.example.com | [1c53 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d19070 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c54 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d19070 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1c55 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d19070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1c56 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d19070 principal evaluation fails +peer1.org2.example.com | [1c57 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d19070 gate 1598907098484665400 evaluation fails +peer1.org2.example.com | [1c58 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c59 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c5a 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1c5b 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d195e0 gate 1598907098487782000 evaluation starts +peer1.org2.example.com | [1c5c 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d195e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c5d 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d195e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1c5e 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d195e0 principal matched by identity 0 +peer1.org2.example.com | [1c5f 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [1c60 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [1c61 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d195e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1c62 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d195e0 gate 1598907098487782000 evaluation succeeds +peer1.org2.example.com | [1c63 08-31 20:51:38.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1c64 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1c65 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1c66 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1c67 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c68 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c69 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1c6a 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c6b 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1c6c 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1c6d 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1c6e 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1c6f 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d347e0 gate 1598907098493020600 evaluation starts +peer1.org2.example.com | [1c70 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d347e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c71 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d347e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1c72 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d347e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1c73 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d347e0 principal evaluation fails +peer1.org2.example.com | [1c74 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d347e0 gate 1598907098493020600 evaluation fails +peer1.org2.example.com | [1c75 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c76 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1c77 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1c78 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34d50 gate 1598907098495834300 evaluation starts +peer1.org2.example.com | [1c79 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34d50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1c7a 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34d50 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1c7b 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34d50 principal matched by identity 0 +peer1.org2.example.com | [1c7c 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [1c7d 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [1c7e 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34d50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1c7f 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34d50 gate 1598907098495834300 evaluation succeeds +peer1.org2.example.com | [1c80 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1c81 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1c82 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1c83 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1c84 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [1c85 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [1c86 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [1c87 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [1c88 08-31 20:51:38.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c89 08-31 20:51:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c8a 08-31 20:51:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c8b 08-31 20:51:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1c8c 08-31 20:51:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c8d 08-31 20:51:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c8e 08-31 20:51:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1c8f 08-31 20:51:38.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c90 08-31 20:51:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c91 08-31 20:51:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c92 08-31 20:51:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c93 08-31 20:51:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1c94 08-31 20:51:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1c95 08-31 20:51:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [1c96 08-31 20:51:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [1c97 08-31 20:51:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1c98 08-31 20:51:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D981610091801 +peer1.org2.example.com | [1c99 08-31 20:51:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1656F2D2D82F8C9EF354DEE22FEF750CDD3F9D7F4796202F8AC2964191FE2598 +peer1.org2.example.com | [1c9a 08-31 20:51:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [1c9b 08-31 20:51:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c9c 08-31 20:51:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c9d 08-31 20:51:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c9e 08-31 20:51:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1c9f 08-31 20:51:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1ca0 08-31 20:51:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d27 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1d2c 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d2d 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d2e 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d2f 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d30 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1d31 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d32 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1d33 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d34 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d35 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1d36 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1d37 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1d38 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ca10 gate 1598907095523105200 evaluation starts +peer0.org2.example.com | [1d39 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ca10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1d3a 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ca10 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1d3b 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ca10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1d3c 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ca10 principal evaluation fails +peer0.org2.example.com | [1d3d 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8ca10 gate 1598907095523105200 evaluation fails +peer0.org2.example.com | [1d3e 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1d3f 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1d40 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1d42 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8cf80 gate 1598907095530301800 evaluation starts +peer0.org2.example.com | [1d43 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8cf80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1d44 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8cf80 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1d41 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d45 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8cf80 principal matched by identity 0 +peer0.org2.example.com | [1d46 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ad 78 a8 54 de ec 82 59 91 8d ff 70 43 22 79 32 |.x.T...Y...pC"y2| +peer0.org2.example.com | 00000010 b8 e3 0c 08 66 d6 08 3d 79 32 36 16 6f 13 b9 f0 |....f..=y26.o...| +peer0.org2.example.com | [1d47 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c2 e5 65 32 0e 85 2c c1 f3 65 a7 |0E.!...e2..,..e.| +peer0.org2.example.com | 00000010 7a b5 1b 76 be 93 18 09 c8 0b fd 86 47 63 3d 19 |z..v........Gc=.| +peer0.org2.example.com | 00000020 a1 57 4b 47 22 02 20 2f 2e 95 ad 65 8e 8a 68 18 |.WKG". /...e..h.| +peer0.org2.example.com | 00000030 bc 72 31 3b 3a 7e f1 33 9c f5 75 e7 56 b7 f3 4d |.r1;:~.3..u.V..M| +peer0.org2.example.com | 00000040 dc 1e a3 d7 65 d1 ff |....e..| +peer0.org2.example.com | [1d48 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8cf80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1b04 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bc 57 e5 6f b6 2e 8f a6 56 95 40 5d ea b8 4d |..W.o....V.@]..M| +peer1.org1.example.com | 00000010 a7 03 3f 7a cf 28 b5 43 0d 4c 68 75 b9 d9 18 c2 |..?z.(.C.Lhu....| +peer1.org1.example.com | [1b05 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 55 68 33 e5 31 57 2f ba 51 9b |0E.!..Uh3.1W/.Q.| +peer1.org1.example.com | 00000010 ed d1 f3 1a e9 c6 dd d7 81 c4 66 ff e2 85 16 6c |..........f....l| +peer1.org1.example.com | 00000020 58 7b 3f 8b 5e 02 20 6d a0 a4 eb 38 5b eb 15 2d |X{?.^. m...8[..-| +peer1.org1.example.com | 00000030 bf 8c eb d6 96 69 c6 a1 d3 af ee 91 e7 af ea 49 |.....i.........I| +peer1.org1.example.com | 00000040 1f 4f be 43 f8 7d c5 |.O.C.}.| +peer1.org1.example.com | [1b06 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b07 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1b08 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1b09 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1b0a 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1b0b 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b0c 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b0d 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b0e 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b0f 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b10 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b11 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1b12 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b13 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b14 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b15 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1b16 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b17 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b18 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b19 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b1a 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b1b 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b1c 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b1d 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b1e 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b1f 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b20 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b21 08-31 20:51:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b22 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b23 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b24 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b25 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b26 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b27 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b28 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b29 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [1b2a 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b2b 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b2c 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b2d 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b2e 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1b2f 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b30 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1b31 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1b32 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1b33 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1b34 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1b35 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1b36 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042356e0 gate 1598907101043620100 evaluation starts +peer1.org1.example.com | [1b37 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042356e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1b38 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042356e0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1b39 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042356e0 principal matched by identity 0 +peer1.org1.example.com | [1b3a 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef a0 d0 0f d5 8c b6 eb 36 4d af 12 a7 c3 89 3b |........6M.....;| +peer1.org1.example.com | 00000010 7d 82 e8 7f de 1f b2 da 14 18 48 82 58 48 51 5f |}.........H.XHQ_| +peer1.org1.example.com | [1b3b 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 c5 94 1a 88 b1 52 36 24 bc ae |0E.!.......R6$..| +peer1.org1.example.com | 00000010 b3 c7 b0 17 8a 81 ec e9 c1 f8 90 e6 30 64 de 41 |............0d.A| +peer1.org1.example.com | 00000020 a7 59 21 e7 e3 02 20 18 a5 c5 c5 03 be ed b6 82 |.Y!... .........| +peer1.org1.example.com | 00000030 f3 cf 18 ab 15 44 5c b3 9b bd 89 50 a7 13 d3 d1 |.....D\....P....| +peer1.org1.example.com | 00000040 b9 0f 00 91 aa f9 bd |.......| +peer1.org1.example.com | [1b3c 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042356e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1b3d 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042356e0 gate 1598907101043620100 evaluation succeeds +peer1.org1.example.com | [1b3e 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1b3f 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1b40 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1ca1 08-31 20:51:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ca2 08-31 20:51:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [1ca3 08-31 20:51:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ca4 08-31 20:51:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1ca5 08-31 20:51:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161025 +peer1.org2.example.com | [1ca6 08-31 20:51:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4D7D677497C6DFF9866F84A2332A878708A010EE46B1DC8163A55992B14BE469 +peer1.org2.example.com | [1ca7 08-31 20:51:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1ca8 08-31 20:51:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1ca9 08-31 20:51:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [1caa 08-31 20:51:40.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [1cab 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cac 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cad 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cae 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1caf 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cb0 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1cb1 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1d49 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e8cf80 gate 1598907095530301800 evaluation succeeds +peer0.org2.example.com | [1d4a 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1d4b 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1d4c 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1d4d 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1d4e 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d4f 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1d50 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1d51 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1d52 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1d53 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d54 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d55 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d56 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d57 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d58 08-31 20:51:35.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d59 08-31 20:51:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d5a 08-31 20:51:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d5b 08-31 20:51:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d5c 08-31 20:51:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d5d 08-31 20:51:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d5e 08-31 20:51:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d5f 08-31 20:51:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d60 08-31 20:51:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1d61 08-31 20:51:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d62 08-31 20:51:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1d63 08-31 20:51:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d65 08-31 20:51:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d64 08-31 20:51:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d66 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d67 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d68 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1d69 08-31 20:51:35.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d6a 08-31 20:51:35.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d6b 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d6c 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d6d 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1d6e 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19b9 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19ba 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [19bb 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [19bc 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19bd 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\324\357\2301\237 \253\\1i\2771E\320e\r\276o\002 d\255\220r\211}\252=\343\261\034kTc\276\223q\200\330B\351)\r\324\224\342\003V\010\365v\240" > alive: alive: alive: +peer0.org1.example.com | [19be 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [19bf 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [19c0 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [19c1 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19c2 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:&,>\361\337_\206\356l\2308\303M\001,}\330\266$\213" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [19c3 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19c4 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:&,>\361\337_\206\356l\2308\303M\001,}\330\266$\213" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [19c5 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [19c6 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 38 f7 03 a3 ec c8 c5 a0 53 a1 da 5d a5 c9 ac |.8.......S..]...| +peer0.org1.example.com | 00000010 a1 e9 6a d5 e6 30 d3 4d 91 a8 d0 0b b9 77 a2 aa |..j..0.M.....w..| +peer0.org1.example.com | [19c7 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 c8 1b d1 fb 63 f4 f3 dd 45 18 eb |0D. .....c...E..| +peer0.org1.example.com | 00000010 06 98 a8 95 67 20 9c 17 b8 9d 9d 27 99 53 87 f4 |....g .....'.S..| +peer0.org1.example.com | 00000020 24 56 74 78 02 20 1d b3 30 63 83 e3 0b 49 db 56 |$Vtx. ..0c...I.V| +peer0.org1.example.com | 00000030 2f 0b da 29 a4 5d b7 e6 b7 34 08 b5 23 50 30 0c |/..).]...4..#P0.| +peer0.org1.example.com | 00000040 37 ca 78 54 76 bb |7.xTv.| +peer0.org1.example.com | [19c8 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [19c9 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 7a c0 ca f2 3b 7b e1 2f 19 e8 |0E.!..z...;{./..| +peer0.org1.example.com | 00000010 0b 00 d3 a4 29 45 b5 29 cd e4 ff 1c ec ac 03 01 |....)E.)........| +peer0.org1.example.com | 00000020 09 8a 05 ed 6d 02 20 2a e6 89 26 e1 27 92 05 eb |....m. *..&.'...| +peer0.org1.example.com | 00000030 f8 8a 3e 26 2c 3e f1 df 5f 86 ee 6c 98 38 c3 4d |..>&,>.._..l.8.M| +peer1.org1.example.com | [1b41 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1b42 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b43 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1b44 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1b45 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1b46 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1b47 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b48 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b49 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b4a 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [1b4b 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b4c 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b4d 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b4e 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1b4f 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1cb2 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cb3 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cb4 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cb6 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cb5 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cb7 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cb8 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cb9 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cba 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cbb 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cbc 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1cbd 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cbe 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1cbf 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1cc0 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1cc1 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1cc2 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1cc3 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1cc4 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8a160 gate 1598907100298068800 evaluation starts +peer1.org2.example.com | [1cc5 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8a160 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1cc6 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8a160 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1cc7 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8a160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1cc8 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8a160 principal evaluation fails +peer1.org2.example.com | [1cc9 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8a160 gate 1598907100298068800 evaluation fails +peer1.org2.example.com | [1cca 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ccb 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ccc 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1ccd 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8a6d0 gate 1598907100300080600 evaluation starts +peer1.org2.example.com | [1cce 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8a6d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ccf 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8a6d0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1cd0 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8a6d0 principal matched by identity 0 +peer0.org2.example.com | [1d6f 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d70 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d71 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d72 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1d73 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db a1 0a ad 45 ca e7 06 61 d1 7b dd bc 70 48 93 |....E...a.{..pH.| +peer0.org2.example.com | 00000010 ac c2 56 d7 f0 1b 15 fb 3e 41 97 96 03 b1 89 27 |..V.....>A.....'| +peer0.org2.example.com | [1d74 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 d2 c1 83 d8 f9 44 42 c5 99 b6 |0E.!.......DB...| +peer0.org2.example.com | 00000010 02 bd 14 01 a5 d8 28 32 e8 19 e9 38 4d 49 90 40 |......(2...8MI.@| +peer0.org2.example.com | 00000020 58 3b 4d c5 16 02 20 51 03 82 01 fc 09 e9 1e a6 |X;M... Q........| +peer0.org2.example.com | 00000030 96 87 c3 cd a1 48 e1 e9 d5 c0 77 64 5f ed be e3 |.....H....wd_...| +peer0.org2.example.com | 00000040 40 62 d3 e0 07 67 c5 |@b...g.| +peer0.org2.example.com | [1d75 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [1d76 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 13 41 2b 98 7d b3 56 7b 85 01 |0E.!...A+.}.V{..| +peer0.org2.example.com | 00000010 50 ac d7 0e f3 e6 55 cf 21 38 08 7b 2b 1f d3 9b |P.....U.!8.{+...| +peer0.org2.example.com | 00000020 a4 42 b4 06 99 02 20 05 88 e4 a2 cb af 1e e1 4c |.B.... ........L| +peer0.org2.example.com | 00000030 41 af 22 ba 8e a3 ee ac 72 81 c3 60 84 c3 ca c8 |A.".....r..`....| +peer0.org2.example.com | 00000040 03 59 7c f3 41 e8 87 |.Y|.A..| +peer0.org2.example.com | [1d77 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [1d78 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [1d79 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1d7a 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1d7b 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1d7c 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d7d 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d7e 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d7f 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [1d80 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d81 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d82 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1d83 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [1d84 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d85 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d86 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d87 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d88 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d89 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d8a 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d8b 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d8c 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d8d 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d8e 08-31 20:51:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [1d8f 08-31 20:51:37.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d90 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d91 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1d92 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1d93 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1d94 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1d95 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1d96 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d97 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1d98 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1d99 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1d9a 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1d9b 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed6f30 gate 1598907097315711600 evaluation starts +peer0.org2.example.com | [1d9c 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed6f30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1d9d 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed6f30 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1d9e 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed6f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1d9f 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed6f30 principal evaluation fails +peer0.org2.example.com | [1da0 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed6f30 gate 1598907097315711600 evaluation fails +peer0.org2.example.com | [1da1 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1da2 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1da3 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1da4 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed74a0 gate 1598907097316558400 evaluation starts +peer0.org2.example.com | [1da5 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed74a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1b5f 08-31 20:51:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b61 08-31 20:51:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b62 08-31 20:51:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b63 08-31 20:51:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b64 08-31 20:51:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b60 08-31 20:51:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b65 08-31 20:51:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b66 08-31 20:51:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b67 08-31 20:51:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b68 08-31 20:51:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b69 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1b6a 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161027 +peer1.org1.example.com | [1b6b 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1F5F380E3ACD26B28499AEE04B2EBAF7AF1C33831DFBC0829C232573B82E0156 +peer1.org1.example.com | [1b6c 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1b6d 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1b6e 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1b6f 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b70 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1b71 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\232\346\342\300\374&\224_\030\t\002 c9F7{\262I\227\201z\233\317\013\343\320\221f\337\203}\211\361\315\213\320\203\264\344\231\226\367k" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1b72 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b74 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b73 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cd1 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a e1 40 6b d4 cf b4 c3 0c e0 54 3f fe 70 3b bb |J.@k......T?.p;.| +peer1.org2.example.com | 00000010 47 a3 10 69 29 01 50 d2 ac ed 74 75 df ec 4d 0c |G..i).P...tu..M.| +peer1.org2.example.com | [1cd2 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 59 90 7b bb ca 94 33 40 80 e0 e0 |0D. .Y.{...3@...| +peer1.org2.example.com | 00000010 34 da 7f 8d bc 17 22 cb 0f 9b 44 41 a3 2a 04 d4 |4....."...DA.*..| +peer1.org2.example.com | 00000020 ea 89 5c c7 02 20 70 7d c3 ff c5 be b2 29 8d a7 |..\.. p}.....)..| +peer1.org2.example.com | 00000030 1c f6 ed 56 24 b3 e8 4c f2 6d 49 90 11 65 72 97 |...V$..L.mI..er.| +peer1.org2.example.com | 00000040 23 6f cf 7b 34 3d |#o.{4=| +peer1.org2.example.com | [1cd3 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8a6d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1cd4 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d8a6d0 gate 1598907100300080600 evaluation succeeds +peer1.org2.example.com | [1cd5 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1cd6 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1cd7 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1cd8 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1cd9 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cda 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1cdb 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1cdc 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1cdd 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1cde 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cdf 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ce0 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ce1 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1ce2 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ce3 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1ce4 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ce5 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ce6 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ce7 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ce8 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ce9 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cea 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ceb 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cec 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1ced 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1cee 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1cef 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cf0 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cf1 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cf2 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cf3 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cf4 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cf5 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cf6 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1cf7 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cf8 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cf9 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cfa 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1cfb 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1cfc 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1cfd 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 08 be 1a 2c d9 b5 c0 87 97 94 01 ef 54 9c f7 |....,........T..| +peer1.org2.example.com | 00000010 02 e3 0b 24 d8 d0 cd e6 e8 75 80 d7 0a 97 0c 3e |...$.....u.....>| +peer1.org2.example.com | [1cfe 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 a6 ce d8 49 0e 83 c3 2b 66 98 |0E.!.....I...+f.| +peer1.org2.example.com | 00000010 62 f4 32 46 4b 01 a4 da 89 81 4d ab 54 84 ef d2 |b.2FK.....M.T...| +peer1.org2.example.com | 00000020 ad 61 e4 ee 27 02 20 38 83 5a ce 83 bd 7b 41 f3 |.a..'. 8.Z...{A.| +peer1.org2.example.com | 00000030 47 2b 89 ad 80 4c 95 78 6a 6d 26 c9 6c 28 ad d9 |G+...L.xjm&.l(..| +peer1.org2.example.com | 00000040 5f c1 1c 4c e8 33 50 |_..L.3P| +peer1.org2.example.com | [1cff 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d00 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1d01 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1d02 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1d03 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1d04 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d05 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d06 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d07 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d08 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d09 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d0a 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1d0b 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d0c 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d0d 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d0e 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1d0f 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d10 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d11 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d12 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d13 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d14 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d15 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d16 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d17 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d18 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d19 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d1a 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d1b 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d1c 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d1d 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1d1e 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d1f 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1d20 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d21 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1d22 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1d23 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1d24 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1d25 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db9810 gate 1598907100521005900 evaluation starts +peer1.org2.example.com | [1d26 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db9810 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1d27 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db9810 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1d28 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db9810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1d29 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db9810 principal evaluation fails +peer1.org2.example.com | [1d2a 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db9810 gate 1598907100521005900 evaluation fails +peer1.org2.example.com | [1d2b 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1d2c 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1d2d 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1d2e 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db9d80 gate 1598907100523156900 evaluation starts +peer1.org2.example.com | [1d2f 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db9d80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1d30 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db9d80 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1d31 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db9d80 principal matched by identity 0 +peer1.org2.example.com | [1d32 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bc 57 e5 6f b6 2e 8f a6 56 95 40 5d ea b8 4d |..W.o....V.@]..M| +peer1.org2.example.com | 00000010 a7 03 3f 7a cf 28 b5 43 0d 4c 68 75 b9 d9 18 c2 |..?z.(.C.Lhu....| +peer1.org2.example.com | [1d33 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 55 68 33 e5 31 57 2f ba 51 9b |0E.!..Uh3.1W/.Q.| +peer1.org2.example.com | 00000010 ed d1 f3 1a e9 c6 dd d7 81 c4 66 ff e2 85 16 6c |..........f....l| +peer1.org2.example.com | 00000020 58 7b 3f 8b 5e 02 20 6d a0 a4 eb 38 5b eb 15 2d |X{?.^. m...8[..-| +peer1.org2.example.com | 00000030 bf 8c eb d6 96 69 c6 a1 d3 af ee 91 e7 af ea 49 |.....i.........I| +peer1.org2.example.com | 00000040 1f 4f be 43 f8 7d c5 |.O.C.}.| +peer1.org2.example.com | [1d34 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db9d80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1d35 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db9d80 gate 1598907100523156900 evaluation succeeds +peer1.org2.example.com | [1d36 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1d37 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1d38 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1d39 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1d3a 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d3b 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1d3c 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1d3d 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d3f 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d3e 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1d40 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1d41 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d42 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d43 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d45 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d44 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d46 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d47 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d48 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d49 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d4a 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d4b 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d4c 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d4d 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d4e 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d4f 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d50 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d51 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d52 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [1d53 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d54 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d55 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | 00000040 01 2c 7d d8 b6 24 8b |.,}..$.| +peer0.org1.example.com | [19ca 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [19cb 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [19cc 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [19cd 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [19ce 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [19cf 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19d0 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19d1 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [19d2 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19d3 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19d4 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [19d5 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:&,>\361\337_\206\356l\2308\303M\001,}\330\266$\213" > > alive: +peer0.org1.example.com | [19d6 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [19d7 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19d8 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19d9 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [19da 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [19db 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [19dc 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19dd 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19de 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19df 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19e0 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19e1 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19e2 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [19e3 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [19e4 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [19e5 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [19e6 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b76 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1b75 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\232\346\342\300\374&\224_\030\t\002 c9F7{\262I\227\201z\233\317\013\343\320\221f\337\203}\211\361\315\213\320\203\264\344\231\226\367k" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b77 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b78 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b79 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b7a 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b7b 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b7c 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b7d 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b7e 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1b7f 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f 5f 38 0e 3a cd 26 b2 84 99 ae e0 4b 2e ba f7 |._8.:.&.....K...| +peer1.org1.example.com | 00000010 af 1c 33 83 1d fb c0 82 9c 23 25 73 b8 2e 01 56 |..3......#%s...V| +peer1.org1.example.com | [1b80 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 19 c6 ba fc ef 63 dd da 44 91 11 |0D. ......c..D..| +peer1.org1.example.com | 00000010 f4 81 f0 f6 e7 9d 38 b2 3a 03 7c 47 a1 03 71 4c |......8.:.|G..qL| +peer1.org1.example.com | 00000020 bf 96 cd ea 02 20 56 95 26 f5 41 44 36 e9 8f d6 |..... V.&.AD6...| +peer1.org1.example.com | 00000030 e1 0a ec 08 9d a4 60 b1 83 68 b7 36 0b 27 5e df |......`..h.6.'^.| +peer1.org1.example.com | 00000040 83 5c 3a 4d 55 d3 |.\:MU.| +peer1.org1.example.com | [1b81 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b82 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1b83 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b84 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1b85 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1b86 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1b87 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1b88 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1b89 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1b8a 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1b8b 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1b8c 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00429d1c0 gate 1598907101324042100 evaluation starts +peer1.org1.example.com | [1b8d 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00429d1c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1b8e 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00429d1c0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1b8f 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00429d1c0 principal matched by identity 0 +peer1.org1.example.com | [1b90 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef a0 d0 0f d5 8c b6 eb 36 4d af 12 a7 c3 89 3b |........6M.....;| +peer1.org1.example.com | 00000010 7d 82 e8 7f de 1f b2 da 14 18 48 82 58 48 51 5f |}.........H.XHQ_| +peer1.org1.example.com | [1b91 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 c5 94 1a 88 b1 52 36 24 bc ae |0E.!.......R6$..| +peer1.org1.example.com | 00000010 b3 c7 b0 17 8a 81 ec e9 c1 f8 90 e6 30 64 de 41 |............0d.A| +peer1.org1.example.com | 00000020 a7 59 21 e7 e3 02 20 18 a5 c5 c5 03 be ed b6 82 |.Y!... .........| +peer1.org1.example.com | 00000030 f3 cf 18 ab 15 44 5c b3 9b bd 89 50 a7 13 d3 d1 |.....D\....P....| +peer1.org1.example.com | 00000040 b9 0f 00 91 aa f9 bd |.......| +peer1.org1.example.com | [1b92 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00429d1c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1b93 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00429d1c0 gate 1598907101324042100 evaluation succeeds +peer1.org1.example.com | [1b94 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1b95 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1b96 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1b97 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1b98 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1b99 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b9a 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b9b 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b9c 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b9d 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1b9e 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1b9f 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1ba0 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ba1 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f 5f 38 0e 3a cd 26 b2 84 99 ae e0 4b 2e ba f7 |._8.:.&.....K...| +peer1.org1.example.com | 00000010 af 1c 33 83 1d fb c0 82 9c 23 25 73 b8 2e 01 56 |..3......#%s...V| +peer1.org1.example.com | [1ba2 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 19 c6 ba fc ef 63 dd da 44 91 11 |0D. ......c..D..| +peer1.org1.example.com | 00000010 f4 81 f0 f6 e7 9d 38 b2 3a 03 7c 47 a1 03 71 4c |......8.:.|G..qL| +peer1.org1.example.com | 00000020 bf 96 cd ea 02 20 56 95 26 f5 41 44 36 e9 8f d6 |..... V.&.AD6...| +peer1.org1.example.com | 00000030 e1 0a ec 08 9d a4 60 b1 83 68 b7 36 0b 27 5e df |......`..h.6.'^.| +peer1.org1.example.com | 00000040 83 5c 3a 4d 55 d3 |.\:MU.| +peer1.org1.example.com | [1ba3 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [1ba4 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d ad 3a 08 be 79 5d 40 d1 ae bc 57 |0D. ..:..y]@...W| +peer1.org1.example.com | 00000010 23 51 a7 95 3c 64 b4 d2 88 3e 9a e6 e2 c0 fc 26 |#Q.......&| +peer1.org1.example.com | 00000020 94 5f 18 09 02 20 63 39 46 37 7b b2 49 97 81 7a |._... c9F7{.I..z| +peer1.org2.example.com | [1d56 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d57 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d58 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d59 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d5a 08-31 20:51:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1d5b 08-31 20:51:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1d5c 08-31 20:51:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [1d5d 08-31 20:51:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1d5e 08-31 20:51:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [1d5f 08-31 20:51:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1d60 08-31 20:51:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d62 08-31 20:51:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d63 08-31 20:51:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d61 08-31 20:51:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d65 08-31 20:51:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d64 08-31 20:51:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d66 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d67 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d68 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d69 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d6a 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d6b 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d6c 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d6d 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d6e 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [19e7 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [19e8 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [19e9 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [19ea 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [19eb 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [19ec 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [19ed 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [19ee 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [19ef 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [19f0 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047858f0 gate 1598907093494390200 evaluation starts +peer0.org1.example.com | [19f1 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047858f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [19f2 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047858f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [19f3 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047858f0 principal matched by identity 0 +peer0.org1.example.com | [19f4 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 b3 5c 42 54 25 30 be b4 7c 78 b0 29 0c aa |...\BT%0..|x.)..| +peer0.org1.example.com | 00000010 90 ce 7f 27 82 1e a3 94 11 f2 89 16 2f a4 cd 3c |...'......../..<| +peer0.org1.example.com | [19f5 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 d3 29 2b 65 f1 14 85 3c 04 39 |0E.!...)+e...<.9| +peer0.org1.example.com | 00000010 e3 96 d4 c0 95 94 3b c7 9d bf 68 83 8d 46 4e ac |......;...h..FN.| +peer0.org1.example.com | 00000020 d8 3b 75 e3 90 02 20 0b e2 04 10 ce d3 d7 98 df |.;u... .........| +peer0.org1.example.com | 00000030 70 5c 55 cc c1 a8 89 82 51 0a 97 83 5a b9 c6 62 |p\U.....Q...Z..b| +peer0.org1.example.com | 00000040 a5 2a 5c 68 25 20 91 |.*\h% .| +peer0.org1.example.com | [19f6 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047858f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [19f7 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047858f0 gate 1598907093494390200 evaluation succeeds +peer0.org1.example.com | [19f8 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [19f9 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [19fa 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [19fb 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [19fc 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [19fd 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [19fe 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [19ff 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1a00 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1a01 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a02 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1da6 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed74a0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1da7 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed74a0 principal matched by identity 0 +peer0.org2.example.com | [1da8 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 4d b1 e5 64 ab 5d 7d 73 b3 77 98 b1 c0 2e 87 |.M..d.]}s.w.....| +peer0.org2.example.com | 00000010 dc 4e 7c d3 dc 21 20 be 6e 87 78 44 ba b2 41 76 |.N|..! .n.xD..Av| +peer0.org2.example.com | [1da9 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 65 31 6f 20 db 46 d8 e7 4c 79 |0E.!..e1o .F..Ly| +peer0.org2.example.com | 00000010 a2 db ea ac 1f 1d cc 90 dd e0 6d 70 f6 a0 c9 bd |..........mp....| +peer0.org2.example.com | 00000020 f4 3a 59 bb 3c 02 20 42 04 8a ac e4 a8 9d d6 79 |.:Y.<. B.......y| +peer0.org2.example.com | 00000030 c1 7c de 43 b2 e5 dd aa 1c 9e 71 9a e0 8f 9d 72 |.|.C......q....r| +peer0.org2.example.com | 00000040 58 a1 ce a7 d4 b6 03 |X......| +peer0.org2.example.com | [1daa 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed74a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1dab 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ed74a0 gate 1598907097316558400 evaluation succeeds +peer0.org2.example.com | [1dac 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1dad 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1dae 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1daf 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1db0 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1db1 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1db2 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1db3 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1db4 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1db5 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1db6 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1db7 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1db8 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [1db9 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dba 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dbb 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dbc 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1dbd 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [1dbe 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dbf 08-31 20:51:37.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dc0 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [1dc1 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1dc2 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [1dc3 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1dc4 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1dc5 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1dc6 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d6f 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d70 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d71 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1d72 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161026 +peer1.org2.example.com | [1d73 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EFA0D00FD58CB6EB364DAF12A7C3893B7D82E87FDE1FB2DA141848825848515F +peer1.org2.example.com | [1d74 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1d75 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1d76 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [1d77 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1d78 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d79 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1d7a 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d7b 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1d7c 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d7d 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d7e 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d7f 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d80 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d81 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d82 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d83 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d84 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d85 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1d86 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef a0 d0 0f d5 8c b6 eb 36 4d af 12 a7 c3 89 3b |........6M.....;| +peer1.org2.example.com | 00000010 7d 82 e8 7f de 1f b2 da 14 18 48 82 58 48 51 5f |}.........H.XHQ_| +peer1.org2.example.com | [1d87 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 c5 94 1a 88 b1 52 36 24 bc ae |0E.!.......R6$..| +peer1.org2.example.com | 00000010 b3 c7 b0 17 8a 81 ec e9 c1 f8 90 e6 30 64 de 41 |............0d.A| +peer1.org2.example.com | 00000020 a7 59 21 e7 e3 02 20 18 a5 c5 c5 03 be ed b6 82 |.Y!... .........| +peer1.org2.example.com | 00000030 f3 cf 18 ab 15 44 5c b3 9b bd 89 50 a7 13 d3 d1 |.....D\....P....| +peer1.org2.example.com | 00000040 b9 0f 00 91 aa f9 bd |.......| +peer0.org2.example.com | [1dc7 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dc8 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dc9 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dca 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dcb 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dcc 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dcd 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dce 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dcf 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dd0 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dd1 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dd2 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dd3 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [1dd4 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dd5 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1dd6 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161022 +peer0.org2.example.com | [1dd7 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FD3C083DBCC68979BA4AAC9982F1FA4D0FA6DD712D6B0FD59BB282AD5E80DAC8 +peer0.org2.example.com | [1dd8 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1dd9 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [1dda 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1ddb 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ddc 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1ddd 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1dde 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a03 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a04 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [1a05 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a06 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a07 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a08 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a09 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1a0a 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a0b 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a0c 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1a0d 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a0e 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [1a0f 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a10 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [1a11 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a12 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a13 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a14 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a15 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a16 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a17 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a18 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a19 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a1a 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a1b 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a1c 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ddf 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1de0 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [1de1 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1de2 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1de3 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1de4 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [1de5 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1de6 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [1de7 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [1de9 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1de8 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dea 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 3c 08 3d bc c6 89 79 ba 4a ac 99 82 f1 fa 4d |.<.=...y.J.....M| +peer0.org2.example.com | 00000010 0f a6 dd 71 2d 6b 0f d5 9b b2 82 ad 5e 80 da c8 |...q-k......^...| +peer0.org2.example.com | [1deb 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 55 55 55 3f 7d 18 aa 53 15 e1 |0E.!..UUU?}..S..| +peer0.org2.example.com | 00000010 cc 53 46 31 e9 7c 18 3a 50 d2 cd d0 a0 44 0d fe |.SF1.|.:P....D..| +peer0.org2.example.com | 00000020 03 0f 29 76 0d 02 20 2f bd ba c1 eb 6b 9f 2d 86 |..)v.. /....k.-.| +peer0.org2.example.com | 00000030 a9 e4 eb 8f fc 4f 76 ee e0 64 f2 97 8f 9c 1a 3a |.....Ov..d.....:| +peer0.org2.example.com | 00000040 5e 1d 64 1d 25 85 81 |^.d.%..| +peer0.org2.example.com | [1dec 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [1ded 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a ee c2 93 4a df eb 29 2a 7f 6d 74 |0D. :...J..)*.mt| +peer0.org2.example.com | 00000010 24 41 07 7c ff 67 17 8a 81 e1 6b c8 cb 42 58 e7 |$A.|.g....k..BX.| +peer0.org2.example.com | 00000020 19 77 51 97 02 20 1a 6f 4d 3b d8 4b 84 9b 08 97 |.wQ.. .oM;.K....| +peer0.org2.example.com | 00000030 97 b1 32 ed 5a 59 3a 82 a8 fa 4a e4 26 e5 22 b0 |..2.ZY:...J.&.".| +peer0.org2.example.com | 00000040 74 74 f8 03 60 73 |tt..`s| +peer0.org2.example.com | [1dee 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [1def 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [1df0 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1df1 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1df2 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1df3 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1df4 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [1df5 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1df6 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 3c 08 3d bc c6 89 79 ba 4a ac 99 82 f1 fa 4d |.<.=...y.J.....M| +peer0.org2.example.com | 00000010 0f a6 dd 71 2d 6b 0f d5 9b b2 82 ad 5e 80 da c8 |...q-k......^...| +peer0.org2.example.com | [1df7 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 55 55 55 3f 7d 18 aa 53 15 e1 |0E.!..UUU?}..S..| +peer0.org2.example.com | 00000010 cc 53 46 31 e9 7c 18 3a 50 d2 cd d0 a0 44 0d fe |.SF1.|.:P....D..| +peer0.org2.example.com | 00000020 03 0f 29 76 0d 02 20 2f bd ba c1 eb 6b 9f 2d 86 |..)v.. /....k.-.| +peer0.org2.example.com | 00000030 a9 e4 eb 8f fc 4f 76 ee e0 64 f2 97 8f 9c 1a 3a |.....Ov..d.....:| +peer0.org2.example.com | 00000040 5e 1d 64 1d 25 85 81 |^.d.%..| +peer0.org2.example.com | [1df8 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000030 9b cf 0b e3 d0 91 66 df 83 7d 89 f1 cd 8b d0 83 |......f..}......| +peer1.org1.example.com | 00000040 b4 e4 99 96 f7 6b |.....k| +peer1.org1.example.com | [1ba5 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1ba6 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1ba7 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ba8 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ba9 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bab 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1baa 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bac 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f 5f 38 0e 3a cd 26 b2 84 99 ae e0 4b 2e ba f7 |._8.:.&.....K...| +peer1.org1.example.com | 00000010 af 1c 33 83 1d fb c0 82 9c 23 25 73 b8 2e 01 56 |..3......#%s...V| +peer1.org1.example.com | [1bad 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 19 c6 ba fc ef 63 dd da 44 91 11 |0D. ......c..D..| +peer1.org1.example.com | 00000010 f4 81 f0 f6 e7 9d 38 b2 3a 03 7c 47 a1 03 71 4c |......8.:.|G..qL| +peer1.org1.example.com | 00000020 bf 96 cd ea 02 20 56 95 26 f5 41 44 36 e9 8f d6 |..... V.&.AD6...| +peer1.org1.example.com | 00000030 e1 0a ec 08 9d a4 60 b1 83 68 b7 36 0b 27 5e df |......`..h.6.'^.| +peer1.org1.example.com | 00000040 83 5c 3a 4d 55 d3 |.\:MU.| +peer1.org1.example.com | [1bae 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1baf 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1bb0 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bb1 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bb2 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bb3 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bb4 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bb5 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bb6 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bb7 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bb8 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bb9 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bba 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bbb 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [1bbc 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bbd 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\334\242K\221\363\267\335\373;\t|" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bbe 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\334\242K\221\363\267\335\373;\t|" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bbf 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bc0 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\334\242K\221\363\267\335\373;\t|" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bc1 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1bc2 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bc3 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1a1d 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a1e 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a1f 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a20 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a21 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a22 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a23 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1a24 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816101F +peer0.org1.example.com | [1a25 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4684F7ECDC255FE83AACCC14E720637FBFF47BDDEBBD85D7F14B2E1BF20766C2 +peer0.org1.example.com | [1a26 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1a27 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1a28 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1a29 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a2a 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a2c 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a2d 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a2b 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a2e 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a2f 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a30 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a31 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a32 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a33 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a34 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1a36 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 84 f7 ec dc 25 5f e8 3a ac cc 14 e7 20 63 7f |F....%_.:.... c.| +peer0.org1.example.com | 00000010 bf f4 7b dd eb bd 85 d7 f1 4b 2e 1b f2 07 66 c2 |..{......K....f.| +peer0.org1.example.com | [1a37 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 42 ab 9c 92 48 18 a7 24 e9 47 |0E.!..B...H..$.G| +peer0.org1.example.com | 00000010 c6 37 fc ec 20 b0 30 09 e1 29 6e 6c c1 fb b3 88 |.7.. .0..)nl....| +peer0.org1.example.com | 00000020 95 81 0c 1c ad 02 20 1e 53 3a 70 63 5f f2 25 11 |...... .S:pc_.%.| +peer0.org1.example.com | 00000030 52 20 86 d3 eb 20 49 ed 11 15 64 ec 97 d7 43 f6 |R ... I...d...C.| +peer0.org1.example.com | 00000040 d3 a8 8d 04 6f dd b1 |....o..| +peer0.org1.example.com | [1a35 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1a38 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [1a3a 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 08 f2 9e 49 68 32 32 66 20 1a |0E.!.....Ih22f .| +peer0.org1.example.com | 00000010 bf 2f 46 9b c1 e4 6f d7 56 3f 86 35 a4 99 f7 e6 |./F...o.V?.5....| +peer0.org1.example.com | 00000020 09 a2 20 f2 88 02 20 74 61 0e 14 ca ba 9f f3 bf |.. ... ta.......| +peer0.org1.example.com | 00000030 02 12 c3 76 c6 9f ea a6 d7 c4 1a 9f a9 d6 7a d4 |...v..........z.| +peer0.org1.example.com | 00000040 cf ee 67 a6 16 d2 0b |..g....| +peer0.org1.example.com | [1a39 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a3b 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a3c 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1a3d 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1a3e 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a3f 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a40 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a41 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a42 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a43 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a44 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1a45 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a46 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1a47 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1df9 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1dfa 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1dfb 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1dfc 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db a1 0a ad 45 ca e7 06 61 d1 7b dd bc 70 48 93 |....E...a.{..pH.| +peer0.org2.example.com | 00000010 ac c2 56 d7 f0 1b 15 fb 3e 41 97 96 03 b1 89 27 |..V.....>A.....'| +peer0.org2.example.com | [1dfd 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 d2 c1 83 d8 f9 44 42 c5 99 b6 |0E.!.......DB...| +peer0.org2.example.com | 00000010 02 bd 14 01 a5 d8 28 32 e8 19 e9 38 4d 49 90 40 |......(2...8MI.@| +peer0.org2.example.com | 00000020 58 3b 4d c5 16 02 20 51 03 82 01 fc 09 e9 1e a6 |X;M... Q........| +peer0.org2.example.com | 00000030 96 87 c3 cd a1 48 e1 e9 d5 c0 77 64 5f ed be e3 |.....H....wd_...| +peer0.org2.example.com | 00000040 40 62 d3 e0 07 67 c5 |@b...g.| +peer0.org2.example.com | [1dfe 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1dff 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e00 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e01 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e02 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e03 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e04 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e05 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e06 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e07 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e08 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e09 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e0a 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e0b 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [1e0c 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e0d 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e0e 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1e0f 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e10 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1e11 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e12 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e13 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1e14 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1e15 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1e16 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b440 gate 1598907097526886000 evaluation starts +peer0.org2.example.com | [1e17 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b440 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1e18 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b440 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1e19 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1e1a 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b440 principal evaluation fails +peer0.org2.example.com | [1e1b 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b440 gate 1598907097526886000 evaluation fails +peer0.org2.example.com | [1e1c 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1e1d 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1e1e 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1e1f 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b9b0 gate 1598907097527834700 evaluation starts +peer0.org2.example.com | [1e20 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b9b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1e21 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b9b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1e22 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b9b0 principal matched by identity 0 +peer0.org2.example.com | [1e23 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 4d b1 e5 64 ab 5d 7d 73 b3 77 98 b1 c0 2e 87 |.M..d.]}s.w.....| +peer0.org2.example.com | 00000010 dc 4e 7c d3 dc 21 20 be 6e 87 78 44 ba b2 41 76 |.N|..! .n.xD..Av| +peer0.org2.example.com | [1e24 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 65 31 6f 20 db 46 d8 e7 4c 79 |0E.!..e1o .F..Ly| +peer0.org2.example.com | 00000010 a2 db ea ac 1f 1d cc 90 dd e0 6d 70 f6 a0 c9 bd |..........mp....| +peer0.org2.example.com | 00000020 f4 3a 59 bb 3c 02 20 42 04 8a ac e4 a8 9d d6 79 |.:Y.<. B.......y| +peer0.org2.example.com | 00000030 c1 7c de 43 b2 e5 dd aa 1c 9e 71 9a e0 8f 9d 72 |.|.C......q....r| +peer0.org2.example.com | 00000040 58 a1 ce a7 d4 b6 03 |X......| +peer0.org2.example.com | [1e25 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b9b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1e26 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4b9b0 gate 1598907097527834700 evaluation succeeds +peer0.org2.example.com | [1e27 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1e28 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1e29 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1e2a 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1e2b 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e2c 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e2d 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [1e2e 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 3c 08 3d bc c6 89 79 ba 4a ac 99 82 f1 fa 4d |.<.=...y.J.....M| +peer0.org2.example.com | 00000010 0f a6 dd 71 2d 6b 0f d5 9b b2 82 ad 5e 80 da c8 |...q-k......^...| +peer0.org2.example.com | [1e2f 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 55 55 55 3f 7d 18 aa 53 15 e1 |0E.!..UUU?}..S..| +peer0.org2.example.com | 00000010 cc 53 46 31 e9 7c 18 3a 50 d2 cd d0 a0 44 0d fe |.SF1.|.:P....D..| +peer0.org2.example.com | 00000020 03 0f 29 76 0d 02 20 2f bd ba c1 eb 6b 9f 2d 86 |..)v.. /....k.-.| +peer0.org2.example.com | 00000030 a9 e4 eb 8f fc 4f 76 ee e0 64 f2 97 8f 9c 1a 3a |.....Ov..d.....:| +peer0.org2.example.com | 00000040 5e 1d 64 1d 25 85 81 |^.d.%..| +peer0.org2.example.com | [1e30 08-31 20:51:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e31 08-31 20:51:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e32 08-31 20:51:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e33 08-31 20:51:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1e34 08-31 20:51:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db a1 0a ad 45 ca e7 06 61 d1 7b dd bc 70 48 93 |....E...a.{..pH.| +peer0.org2.example.com | 00000010 ac c2 56 d7 f0 1b 15 fb 3e 41 97 96 03 b1 89 27 |..V.....>A.....'| +peer0.org2.example.com | [1e35 08-31 20:51:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 d2 c1 83 d8 f9 44 42 c5 99 b6 |0E.!.......DB...| +peer0.org2.example.com | 00000010 02 bd 14 01 a5 d8 28 32 e8 19 e9 38 4d 49 90 40 |......(2...8MI.@| +peer0.org2.example.com | 00000020 58 3b 4d c5 16 02 20 51 03 82 01 fc 09 e9 1e a6 |X;M... Q........| +peer0.org2.example.com | 00000030 96 87 c3 cd a1 48 e1 e9 d5 c0 77 64 5f ed be e3 |.....H....wd_...| +peer0.org2.example.com | 00000040 40 62 d3 e0 07 67 c5 |@b...g.| +peer0.org2.example.com | [1e36 08-31 20:51:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1e37 08-31 20:51:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e38 08-31 20:51:37.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e39 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e3a 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a48 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a49 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1a4a 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1a4b 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1a4c 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047db380 gate 1598907093584325400 evaluation starts +peer0.org1.example.com | [1a4d 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047db380 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1a4e 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047db380 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1a4f 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047db380 principal matched by identity 0 +peer0.org1.example.com | [1a50 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 b3 5c 42 54 25 30 be b4 7c 78 b0 29 0c aa |...\BT%0..|x.)..| +peer0.org1.example.com | 00000010 90 ce 7f 27 82 1e a3 94 11 f2 89 16 2f a4 cd 3c |...'......../..<| +peer0.org1.example.com | [1a51 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 d3 29 2b 65 f1 14 85 3c 04 39 |0E.!...)+e...<.9| +peer0.org1.example.com | 00000010 e3 96 d4 c0 95 94 3b c7 9d bf 68 83 8d 46 4e ac |......;...h..FN.| +peer0.org1.example.com | 00000020 d8 3b 75 e3 90 02 20 0b e2 04 10 ce d3 d7 98 df |.;u... .........| +peer0.org1.example.com | 00000030 70 5c 55 cc c1 a8 89 82 51 0a 97 83 5a b9 c6 62 |p\U.....Q...Z..b| +peer0.org1.example.com | 00000040 a5 2a 5c 68 25 20 91 |.*\h% .| +peer0.org1.example.com | [1a52 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047db380 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1a53 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047db380 gate 1598907093584325400 evaluation succeeds +peer0.org1.example.com | [1a54 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a55 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a56 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1a57 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1a58 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1a59 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a5a 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1a5b 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 84 f7 ec dc 25 5f e8 3a ac cc 14 e7 20 63 7f |F....%_.:.... c.| +peer0.org1.example.com | 00000010 bf f4 7b dd eb bd 85 d7 f1 4b 2e 1b f2 07 66 c2 |..{......K....f.| +peer0.org1.example.com | [1a5c 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 42 ab 9c 92 48 18 a7 24 e9 47 |0E.!..B...H..$.G| +peer0.org1.example.com | 00000010 c6 37 fc ec 20 b0 30 09 e1 29 6e 6c c1 fb b3 88 |.7.. .0..)nl....| +peer0.org1.example.com | 00000020 95 81 0c 1c ad 02 20 1e 53 3a 70 63 5f f2 25 11 |...... .S:pc_.%.| +peer0.org1.example.com | 00000030 52 20 86 d3 eb 20 49 ed 11 15 64 ec 97 d7 43 f6 |R ... I...d...C.| +peer0.org1.example.com | 00000040 d3 a8 8d 04 6f dd b1 |....o..| +peer0.org1.example.com | [1a5d 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1a5e 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1a5f 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a60 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1a61 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 38 f7 03 a3 ec c8 c5 a0 53 a1 da 5d a5 c9 ac |.8.......S..]...| +peer0.org1.example.com | 00000010 a1 e9 6a d5 e6 30 d3 4d 91 a8 d0 0b b9 77 a2 aa |..j..0.M.....w..| +peer0.org1.example.com | [1a62 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 c8 1b d1 fb 63 f4 f3 dd 45 18 eb |0D. .....c...E..| +peer0.org1.example.com | 00000010 06 98 a8 95 67 20 9c 17 b8 9d 9d 27 99 53 87 f4 |....g .....'.S..| +peer0.org1.example.com | 00000020 24 56 74 78 02 20 1d b3 30 63 83 e3 0b 49 db 56 |$Vtx. ..0c...I.V| +peer0.org1.example.com | 00000030 2f 0b da 29 a4 5d b7 e6 b7 34 08 b5 23 50 30 0c |/..).]...4..#P0.| +peer0.org1.example.com | 00000040 37 ca 78 54 76 bb |7.xTv.| +peer0.org1.example.com | [1a63 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1a64 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a65 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a66 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a67 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a68 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a69 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a6a 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1a6b 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 84 f7 ec dc 25 5f e8 3a ac cc 14 e7 20 63 7f |F....%_.:.... c.| +peer0.org1.example.com | 00000010 bf f4 7b dd eb bd 85 d7 f1 4b 2e 1b f2 07 66 c2 |..{......K....f.| +peer0.org1.example.com | [1a6c 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 42 ab 9c 92 48 18 a7 24 e9 47 |0E.!..B...H..$.G| +peer0.org1.example.com | 00000010 c6 37 fc ec 20 b0 30 09 e1 29 6e 6c c1 fb b3 88 |.7.. .0..)nl....| +peer0.org1.example.com | 00000020 95 81 0c 1c ad 02 20 1e 53 3a 70 63 5f f2 25 11 |...... .S:pc_.%.| +peer0.org1.example.com | 00000030 52 20 86 d3 eb 20 49 ed 11 15 64 ec 97 d7 43 f6 |R ... I...d...C.| +peer0.org1.example.com | 00000040 d3 a8 8d 04 6f dd b1 |....o..| +peer0.org1.example.com | [1a6d 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1a6e 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1a6f 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a70 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1a71 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 38 f7 03 a3 ec c8 c5 a0 53 a1 da 5d a5 c9 ac |.8.......S..]...| +peer0.org1.example.com | 00000010 a1 e9 6a d5 e6 30 d3 4d 91 a8 d0 0b b9 77 a2 aa |..j..0.M.....w..| +peer0.org1.example.com | [1a72 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 c8 1b d1 fb 63 f4 f3 dd 45 18 eb |0D. .....c...E..| +peer0.org1.example.com | 00000010 06 98 a8 95 67 20 9c 17 b8 9d 9d 27 99 53 87 f4 |....g .....'.S..| +peer0.org1.example.com | 00000020 24 56 74 78 02 20 1d b3 30 63 83 e3 0b 49 db 56 |$Vtx. ..0c...I.V| +peer0.org1.example.com | 00000030 2f 0b da 29 a4 5d b7 e6 b7 34 08 b5 23 50 30 0c |/..).]...4..#P0.| +peer0.org1.example.com | 00000040 37 ca 78 54 76 bb |7.xTv.| +peer0.org1.example.com | [1a73 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1a74 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a75 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1a76 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a77 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1a78 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a79 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a7a 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1a7b 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1a7c 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1a7d 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482ef70 gate 1598907093596947600 evaluation starts +peer0.org1.example.com | [1a7e 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482ef70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1a7f 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482ef70 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1a80 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482ef70 principal matched by identity 0 +peer0.org1.example.com | [1a81 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 6b 8d 84 9c 5e 54 fd d2 47 1d 20 69 43 4d fe |.k...^T..G. iCM.| +peer0.org1.example.com | 00000010 3f 62 5a 35 2f b7 98 f5 9f 3d 5c 78 23 88 16 ac |?bZ5/....=\x#...| +peer0.org1.example.com | [1a82 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 4f b9 fe ed 90 40 8a 5d 97 0f |0E.!..O....@.]..| +peer0.org1.example.com | 00000010 e7 9f bb 16 f0 5c 78 9d 1f e1 3b 86 8f 6d fa 71 |.....\x...;..m.q| +peer0.org1.example.com | 00000020 2e df 67 7c 3f 02 20 1e b2 61 f8 d3 85 bc a8 47 |..g|?. ..a.....G| +peer0.org1.example.com | 00000030 6f d8 27 5f 77 e4 c5 e9 7e 55 bf 24 04 8d 63 1b |o.'_w...~U.$..c.| +peer0.org1.example.com | 00000040 06 92 b3 98 47 ca 24 |....G.$| +peer0.org1.example.com | [1a83 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482ef70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1a84 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482ef70 gate 1598907093596947600 evaluation succeeds +peer0.org1.example.com | [1a85 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a86 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1a87 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1a88 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1a89 08-31 20:51:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1a8a 08-31 20:51:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a8b 08-31 20:51:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a8c 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a8d 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a8e 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [1a8f 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a91 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a90 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a93 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a92 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a94 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1a95 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a96 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a97 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a98 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1a99 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a9a 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1a9b 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1a9c 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a9d 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1a9e 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1a9f 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1aa0 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1aa1 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004854590 gate 1598907093720843300 evaluation starts +peer0.org1.example.com | [1aa2 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004854590 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1aa3 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004854590 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1aa4 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004854590 principal matched by identity 0 +peer0.org1.example.com | [1aa5 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [1aa6 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [1aa7 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004854590 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1aa8 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004854590 gate 1598907093720843300 evaluation succeeds +peer0.org1.example.com | [1aa9 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1aaa 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1aab 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1aac 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1aad 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [1aae 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [1aaf 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [1ab0 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [1ab1 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ab2 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ab3 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1ab4 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ab5 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ab6 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1ab7 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1ab8 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1ab9 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004872570 gate 1598907093729206500 evaluation starts +peer0.org1.example.com | [1aba 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004872570 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1abb 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004872570 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1abc 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004872570 principal matched by identity 0 +peer0.org1.example.com | [1abd 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [1abe 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [1abf 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004872570 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1ac0 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004872570 gate 1598907093729206500 evaluation succeeds +peer0.org1.example.com | [1ac1 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ac2 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ac3 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1ac4 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1bc4 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1bc5 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1bc6 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1bc7 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1bc8 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1bc9 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d8890 gate 1598907101493241100 evaluation starts +peer1.org1.example.com | [1bca 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d8890 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1bcb 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d8890 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1bcc 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d8890 principal matched by identity 0 +peer1.org1.example.com | [1bcd 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 8d 52 50 7b d2 bd 2a 77 dd a7 3e 56 c3 8d 92 |..RP{..*w..>V...| +peer1.org1.example.com | 00000010 ef 2f 0b 8f 57 79 79 89 ec e1 2d 1d c5 12 2a a2 |./..Wyy...-...*.| +peer1.org1.example.com | [1bce 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 a2 27 cf ab c8 68 2b 25 85 10 a2 |0D. c.'...h+%...| +peer1.org1.example.com | 00000010 30 65 e5 f6 dc a4 65 9c 6d d8 94 de 82 83 c6 08 |0e....e.m.......| +peer1.org1.example.com | 00000020 80 f3 d4 49 02 20 55 e1 01 85 32 08 d0 36 d5 87 |...I. U...2..6..| +peer1.org1.example.com | 00000030 08 54 28 98 11 1d 4b 5f c1 38 3e dc a2 4b 91 f3 |.T(...K_.8>..K..| +peer1.org1.example.com | 00000040 b7 dd fb 3b 09 7c |...;.|| +peer1.org1.example.com | [1bcf 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d8890 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1bd0 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d8890 gate 1598907101493241100 evaluation succeeds +peer1.org1.example.com | [1bd1 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1bd2 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1bd3 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1bd4 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1bd5 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1bd6 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1bd7 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1bd8 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1bd9 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1bda 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bdb 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bdc 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bdd 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [1bde 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bdf 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1be0 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1be1 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1be2 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\334\242K\221\363\267\335\373;\t|" > alive: alive: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e3c 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1e3d 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e3e 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1e3f 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e40 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e41 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1e42 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1e43 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1e44 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2cde0 gate 1598907097579544300 evaluation starts +peer0.org2.example.com | [1e45 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2cde0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1e46 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2cde0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1e47 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2cde0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1e48 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2cde0 principal evaluation fails +peer0.org2.example.com | [1e49 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2cde0 gate 1598907097579544300 evaluation fails +peer0.org2.example.com | [1e4a 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1e4b 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1e4c 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1e4d 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2d350 gate 1598907097582032900 evaluation starts +peer0.org2.example.com | [1e4e 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2d350 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1e4f 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2d350 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1e50 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2d350 principal matched by identity 0 +peer0.org2.example.com | [1e51 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 c5 90 1c 23 89 b1 55 7b 43 26 4a b8 d6 70 5a |....#..U{C&J..pZ| +peer0.org2.example.com | 00000010 b6 28 a6 93 8d 2b 0a 0d 7c 58 e6 f0 72 7d e6 36 |.(...+..|X..r}.6| +peer0.org2.example.com | [1e52 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 37 11 34 5e 7c bc 37 64 82 1b 45 |0D. ,7.4^|.7d..E| +peer0.org2.example.com | 00000010 11 dc 71 6e 82 b7 d1 51 2a d8 d1 d9 47 36 94 5a |..qn...Q*...G6.Z| +peer0.org2.example.com | 00000020 67 d1 73 de 02 20 67 86 18 97 66 53 75 a1 da 19 |g.s.. g...fSu...| +peer0.org2.example.com | 00000030 61 5e 5c 2b f1 16 bc ab 13 78 7c c6 83 90 87 63 |a^\+.....x|....c| +peer0.org2.example.com | 00000040 41 01 da cb e5 e6 |A.....| +peer0.org2.example.com | [1e53 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2d350 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1e54 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2d350 gate 1598907097582032900 evaluation succeeds +peer0.org2.example.com | [1e55 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1e56 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1e57 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1e58 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1e59 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1e5a 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1e5b 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1e5c 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1e5d 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1e5e 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e5f 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e60 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e61 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [1e62 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e63 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e64 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e65 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1e66 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [1e67 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e68 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e69 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e6a 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e6b 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e6c 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e6d 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e6e 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e6f 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e70 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e71 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e72 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e73 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e74 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e75 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [1e76 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e77 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e78 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e79 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e7a 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e7b 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1e7c 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1e7d 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [1e7e 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [1e7f 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e80 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1e81 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1e82 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e83 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1e84 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1e85 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1e86 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1e87 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f8ffa0 gate 1598907098196943400 evaluation starts +peer0.org2.example.com | [1e88 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f8ffa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1e89 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f8ffa0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1e8a 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f8ffa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1e8b 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f8ffa0 principal evaluation fails +peer0.org2.example.com | [1e8c 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f8ffa0 gate 1598907098196943400 evaluation fails +peer0.org2.example.com | [1e8d 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1e8e 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1e8f 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1e90 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc2510 gate 1598907098197970200 evaluation starts +peer0.org2.example.com | [1e91 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc2510 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1e92 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc2510 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1e93 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc2510 principal matched by identity 0 +peer0.org2.example.com | [1e94 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [1e95 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [1e96 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc2510 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1e97 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc2510 gate 1598907098197970200 evaluation succeeds +peer0.org2.example.com | [1e98 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1e99 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1e9a 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1e9b 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1e9c 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [1e9d 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [1e9e 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1d88 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d89 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d8a 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d8b 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d8c 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d8d 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d8e 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d8f 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d90 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1d91 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef a0 d0 0f d5 8c b6 eb 36 4d af 12 a7 c3 89 3b |........6M.....;| +peer1.org2.example.com | 00000010 7d 82 e8 7f de 1f b2 da 14 18 48 82 58 48 51 5f |}.........H.XHQ_| +peer1.org2.example.com | [1d92 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 c5 94 1a 88 b1 52 36 24 bc ae |0E.!.......R6$..| +peer1.org2.example.com | 00000010 b3 c7 b0 17 8a 81 ec e9 c1 f8 90 e6 30 64 de 41 |............0d.A| +peer1.org2.example.com | 00000020 a7 59 21 e7 e3 02 20 18 a5 c5 c5 03 be ed b6 82 |.Y!... .........| +peer1.org2.example.com | 00000030 f3 cf 18 ab 15 44 5c b3 9b bd 89 50 a7 13 d3 d1 |.....D\....P....| +peer1.org2.example.com | 00000040 b9 0f 00 91 aa f9 bd |.......| +peer1.org2.example.com | [1d93 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d94 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1d95 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d96 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d97 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d98 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d99 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1d9a 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1d9b 08-31 20:51:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1d9c 08-31 20:51:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef a0 d0 0f d5 8c b6 eb 36 4d af 12 a7 c3 89 3b |........6M.....;| +peer1.org2.example.com | 00000010 7d 82 e8 7f de 1f b2 da 14 18 48 82 58 48 51 5f |}.........H.XHQ_| +peer1.org2.example.com | [1d9d 08-31 20:51:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 c5 94 1a 88 b1 52 36 24 bc ae |0E.!.......R6$..| +peer1.org2.example.com | 00000010 b3 c7 b0 17 8a 81 ec e9 c1 f8 90 e6 30 64 de 41 |............0d.A| +peer1.org2.example.com | 00000020 a7 59 21 e7 e3 02 20 18 a5 c5 c5 03 be ed b6 82 |.Y!... .........| +peer1.org2.example.com | 00000030 f3 cf 18 ab 15 44 5c b3 9b bd 89 50 a7 13 d3 d1 |.....D\....P....| +peer1.org2.example.com | 00000040 b9 0f 00 91 aa f9 bd |.......| +peer1.org2.example.com | [1d9e 08-31 20:51:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [1d9f 08-31 20:51:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 d3 90 01 9c d3 96 db db 87 2b 6d |0D. H.........+m| +peer1.org2.example.com | 00000010 0f a9 f0 84 c7 ad 78 93 4a 7b 83 64 28 f2 5f 68 |......x.J{.d(._h| +peer1.org2.example.com | 00000020 ca 6f 69 d1 02 20 46 e0 23 e4 2a 58 79 c9 f8 09 |.oi.. F.#.*Xy...| +peer1.org2.example.com | 00000030 4f 75 95 be 64 7c 5b f9 91 c7 46 88 79 f1 41 41 |Ou..d|[...F.y.AA| +peer1.org2.example.com | 00000040 a0 90 85 b8 2b 1f |....+.| +peer1.org2.example.com | [1da0 08-31 20:51:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1da1 08-31 20:51:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1da2 08-31 20:51:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1da3 08-31 20:51:41.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1da4 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1da5 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1da6 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1da7 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1da8 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1be5 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1be6 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1be7 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1be8 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1be9 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bea 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1beb 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bec 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bed 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [1bee 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1bef 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 eb 45 ca 97 60 4a 9c c3 ed 09 62 33 43 76 98 |7.E..`J....b3Cv.| +peer1.org1.example.com | 00000010 31 69 8e 7c bd a6 46 fe 97 cd 2a 0d b9 8d 2d e2 |1i.|..F...*...-.| +peer1.org1.example.com | [1bf0 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab f4 bc e5 60 7e 5d 7a 40 a1 77 |0E.!.....`~]z@.w| +peer1.org1.example.com | 00000010 72 25 07 1a aa 90 d0 13 67 09 8c 41 0c 0b 44 db |r%......g..A..D.| +peer1.org1.example.com | 00000020 0e b0 a6 ea c0 02 20 75 18 74 45 d7 ef 3c 5a 29 |...... u.tE.. DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [1bf2 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 a9 a0 5a 2c 52 a9 ff 6a 6c af |0E.!....Z,R..jl.| +peer1.org1.example.com | 00000010 26 de 8e 2f f5 d3 12 45 07 06 2c f8 ab a3 09 9f |&../...E..,.....| +peer1.org1.example.com | 00000020 35 08 e0 bb 4b 02 20 18 64 58 e8 c2 a7 2c 0d 0b |5...K. .dX...,..| +peer1.org1.example.com | 00000030 75 0b 0f 7e 3c 6a 97 5c c4 3a 96 a2 73 59 4d a2 |u..~ DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1bf4 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [1bf5 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1bf6 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1bf7 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1bf8 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bf9 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bfa 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1bfb 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [1bfc 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bfd 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ac5 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ac6 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ac7 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [1ac8 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [1ac9 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [1aca 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [1acb 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1acc 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1acd 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1ace 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1acf 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ad0 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1ad1 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1ad2 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1ad3 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c6f0 gate 1598907093736100300 evaluation starts +peer0.org1.example.com | [1ad4 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c6f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ad5 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c6f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1ad6 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c6f0 principal matched by identity 0 +peer0.org1.example.com | [1ad7 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [1ad8 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [1ad9 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c6f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1ada 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c6f0 gate 1598907093736100300 evaluation succeeds +peer0.org1.example.com | [1adb 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1adc 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1add 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1ade 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1adf 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ae0 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ae1 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1ae2 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ae3 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ae4 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1ae5 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1ae6 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1ae7 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488d8f0 gate 1598907093741284000 evaluation starts +peer0.org1.example.com | [1ae8 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488d8f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ae9 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488d8f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1aea 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488d8f0 principal matched by identity 0 +peer0.org1.example.com | [1aeb 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [1aec 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [1aed 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488d8f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1aee 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488d8f0 gate 1598907093741284000 evaluation succeeds +peer0.org1.example.com | [1aef 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1af0 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1af1 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1af2 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1af3 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1af4 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1af5 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1af6 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1af7 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1af8 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1af9 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1afa 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1afb 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1afc 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1afd 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1afe 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a6d40 gate 1598907093748593100 evaluation starts +peer0.org1.example.com | [1aff 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a6d40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1b00 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a6d40 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1b01 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a6d40 principal matched by identity 0 +peer0.org1.example.com | [1b02 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [1b03 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [1b04 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a6d40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1b05 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a6d40 gate 1598907093748593100 evaluation succeeds +peer0.org1.example.com | [1b06 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b07 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b08 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1b0a 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b09 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1b0b 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b0c 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1b0d 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [1b0f 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [1b10 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b11 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b0e 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1da9 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1daa 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1dab 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1dac 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1dad 08-31 20:51:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [1dae 08-31 20:51:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1daf 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1db0 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1db1 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1db2 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1db3 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1db4 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1db5 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1db6 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1db7 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1db8 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1db9 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1dba 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1dbb 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5a020 gate 1598907101313612400 evaluation starts +peer1.org2.example.com | [1dbc 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5a020 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1dbd 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5a020 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1dbe 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5a020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1dbf 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5a020 principal evaluation fails +peer1.org2.example.com | [1dc0 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5a020 gate 1598907101313612400 evaluation fails +peer1.org2.example.com | [1dc1 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1dc2 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1dc3 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1dc4 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5a590 gate 1598907101320758100 evaluation starts +peer0.org2.example.com | [1e9f 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ea0 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1ea1 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ea2 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ea3 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1ea4 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1ea5 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1ea6 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3e00 gate 1598907098202722600 evaluation starts +peer0.org2.example.com | [1ea7 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3e00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ea8 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3e00 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1ea9 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3e00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1eaa 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3e00 principal evaluation fails +peer0.org2.example.com | [1eab 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3e00 gate 1598907098202722600 evaluation fails +peer0.org2.example.com | [1eac 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1ead 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1eae 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1eaf 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe2370 gate 1598907098204279500 evaluation starts +peer0.org2.example.com | [1eb0 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe2370 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1eb1 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe2370 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1eb2 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe2370 principal matched by identity 0 +peer0.org2.example.com | [1eb3 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [1eb4 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [1eb5 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe2370 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1eb6 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe2370 gate 1598907098204279500 evaluation succeeds +peer0.org2.example.com | [1eb7 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1eb8 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1eb9 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1eba 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1ebb 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ebc 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1ebd 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1bfe 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1bff 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c03 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c04 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c05 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c06 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c07 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c08 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c09 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c0a 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1c0b 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c0c 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c0d 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c0e 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [1c0f 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c10 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c11 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c12 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c13 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c14 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c15 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [1c16 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [1c17 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c18 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c19 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1c1a 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c1b 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c1c 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1c1d 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1c1e 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1c1f 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004334e90 gate 1598907101966568900 evaluation starts +peer1.org1.example.com | [1c20 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004334e90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c21 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004334e90 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1c22 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004334e90 principal matched by identity 0 +peer1.org1.example.com | [1c23 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [1c24 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [1c25 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004334e90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1c26 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004334e90 gate 1598907101966568900 evaluation succeeds +peer1.org1.example.com | [1c27 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c28 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c29 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1c2a 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1c2b 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [1c2c 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [1c2d 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c2e 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c2f 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1c30 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c31 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c32 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1c33 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1c34 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1c35 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004354780 gate 1598907101970650500 evaluation starts +peer1.org1.example.com | [1c36 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004354780 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c37 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004354780 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1c38 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004354780 principal matched by identity 0 +peer1.org1.example.com | [1c39 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [1c3a 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [1c3b 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004354780 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1c3c 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004354780 gate 1598907101970650500 evaluation succeeds +peer1.org1.example.com | [1c3d 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c3e 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c3f 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1c40 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1c41 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c42 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c43 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c44 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c45 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c47 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c46 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c48 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b12 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1b13 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b14 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b16 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1b17 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1b18 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1b19 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cc630 gate 1598907093753575600 evaluation starts +peer0.org1.example.com | [1b1a 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cc630 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1b1b 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cc630 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1b15 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b1c 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cc630 principal matched by identity 0 +peer0.org1.example.com | [1b1e 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [1b1f 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [1b20 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cc630 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1b21 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cc630 gate 1598907093753575600 evaluation succeeds +peer0.org1.example.com | [1b22 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b23 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b24 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1b1d 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b25 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1b26 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b27 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b28 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [1b29 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [1b2a 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b2b 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b2c 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b2d 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b2e 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [1b2f 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [1b30 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1b31 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610081801 +peer0.org1.example.com | [1b32 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DA39B9D5BD5A60DF005FA9CE709D7CD351AF2DBEC1C1FE32E1BA800D0E48973B +peer0.org1.example.com | [1b33 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [1b34 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b35 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b36 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b37 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1dc5 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5a590 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1dc6 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5a590 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1dc7 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5a590 principal matched by identity 0 +peer1.org2.example.com | [1dc8 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f 5f 38 0e 3a cd 26 b2 84 99 ae e0 4b 2e ba f7 |._8.:.&.....K...| +peer1.org2.example.com | 00000010 af 1c 33 83 1d fb c0 82 9c 23 25 73 b8 2e 01 56 |..3......#%s...V| +peer1.org2.example.com | [1dc9 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 19 c6 ba fc ef 63 dd da 44 91 11 |0D. ......c..D..| +peer1.org2.example.com | 00000010 f4 81 f0 f6 e7 9d 38 b2 3a 03 7c 47 a1 03 71 4c |......8.:.|G..qL| +peer1.org2.example.com | 00000020 bf 96 cd ea 02 20 56 95 26 f5 41 44 36 e9 8f d6 |..... V.&.AD6...| +peer1.org2.example.com | 00000030 e1 0a ec 08 9d a4 60 b1 83 68 b7 36 0b 27 5e df |......`..h.6.'^.| +peer1.org2.example.com | 00000040 83 5c 3a 4d 55 d3 |.\:MU.| +peer1.org2.example.com | [1dca 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5a590 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1dcb 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e5a590 gate 1598907101320758100 evaluation succeeds +peer1.org2.example.com | [1dcc 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1dcd 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1dce 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1dcf 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1dd0 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1dd1 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [1dd2 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1dd3 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1dd4 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [1dd5 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1dd6 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1dd7 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1dd8 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [1dd9 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1dda 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ddb 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ddc 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1ddd 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\262z-\226\261\240\315\246\034\035\211\002 \017\255\013\242\356\0320f\210F X\363S\362\t\232+Z&L\000y\030\316\177\362\276Z\212\235\306" > +peer1.org2.example.com | [1dde 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ddf 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1de0 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1de1 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1de2 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1de3 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1de4 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1de5 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\334\242K\221\363\267\335\373;\t|" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1de6 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\334\242K\221\363\267\335\373;\t|" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1de7 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1de8 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\334\242K\221\363\267\335\373;\t|" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [1de9 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1dea 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 8d 52 50 7b d2 bd 2a 77 dd a7 3e 56 c3 8d 92 |..RP{..*w..>V...| +peer1.org2.example.com | 00000010 ef 2f 0b 8f 57 79 79 89 ec e1 2d 1d c5 12 2a a2 |./..Wyy...-...*.| +peer1.org2.example.com | [1deb 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 a2 27 cf ab c8 68 2b 25 85 10 a2 |0D. c.'...h+%...| +peer1.org2.example.com | 00000010 30 65 e5 f6 dc a4 65 9c 6d d8 94 de 82 83 c6 08 |0e....e.m.......| +peer1.org2.example.com | 00000020 80 f3 d4 49 02 20 55 e1 01 85 32 08 d0 36 d5 87 |...I. U...2..6..| +peer1.org2.example.com | 00000030 08 54 28 98 11 1d 4b 5f c1 38 3e dc a2 4b 91 f3 |.T(...K_.8>..K..| +peer1.org2.example.com | 00000040 b7 dd fb 3b 09 7c |...;.|| +peer1.org2.example.com | [1dec 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [1ded 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d7 d5 65 6f 8e ca f4 91 9a 70 |0E.!....eo.....p| +peer1.org2.example.com | 00000010 21 d7 aa 31 94 ff 74 eb ad 8a 25 1f bd 92 ae 73 |!..1..t...%....s| +peer1.org2.example.com | 00000020 f9 c3 7b 4b bd 02 20 07 4e bf e8 53 00 b3 68 a1 |..{K.. .N..S..h.| +peer1.org2.example.com | 00000030 85 56 17 a5 36 c9 f8 dc 78 5a 87 f2 b1 fe d1 d4 |.V..6...xZ......| +peer1.org2.example.com | 00000040 97 ac 27 2b 4a 1d 55 |..'+J.U| +peer1.org2.example.com | [1dee 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [1def 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [1df0 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1df1 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1df2 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1df3 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1df4 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1df5 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c49 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1c4a 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c4b 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c4c 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1c4d 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1c4e 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1c4f 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004355ce0 gate 1598907101974841500 evaluation starts +peer1.org1.example.com | [1c50 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004355ce0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c51 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004355ce0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1c52 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004355ce0 principal matched by identity 0 +peer1.org1.example.com | [1c53 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [1c54 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [1c55 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004355ce0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1c56 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004355ce0 gate 1598907101974841500 evaluation succeeds +peer1.org1.example.com | [1c57 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c58 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c59 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1c5a 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1c5b 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [1c5c 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [1c5d 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [1c5e 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [1c5f 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c60 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c61 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1c62 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c63 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c64 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1c65 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1c66 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1c67 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00436fcc0 gate 1598907101980928600 evaluation starts +peer1.org1.example.com | [1c68 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00436fcc0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c69 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00436fcc0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1c6a 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00436fcc0 principal matched by identity 0 +peer1.org1.example.com | [1c6b 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [1c6c 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [1c6d 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00436fcc0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1c6e 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00436fcc0 gate 1598907101980928600 evaluation succeeds +peer1.org1.example.com | [1c6f 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c70 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c71 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1c72 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1c73 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1c74 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1c75 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c76 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c77 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c78 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1c79 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c7a 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c7b 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1c7c 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1c7d 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1c7e 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438d110 gate 1598907101984731400 evaluation starts +peer1.org1.example.com | [1c7f 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438d110 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c80 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438d110 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1c81 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438d110 principal matched by identity 0 +peer1.org1.example.com | [1c82 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [1c83 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [1c84 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438d110 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1c85 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00438d110 gate 1598907101984731400 evaluation succeeds +peer1.org1.example.com | [1c86 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c87 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c88 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1c89 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1c8a 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [1c8b 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [1c8c 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c8d 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1c8e 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1c8f 08-31 20:51:41.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c90 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1c91 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1c92 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1c93 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1c94 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a8a00 gate 1598907101990867400 evaluation starts +peer1.org1.example.com | [1c95 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a8a00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1c96 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a8a00 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1c97 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a8a00 principal matched by identity 0 +peer1.org1.example.com | [1c98 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [1c99 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [1c9a 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a8a00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1c9b 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043a8a00 gate 1598907101990867400 evaluation succeeds +peer1.org1.example.com | [1c9c 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c9d 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1c9e 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1c9f 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1ca0 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [1ca1 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [1ca2 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ca3 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ca4 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ca5 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1ca6 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ca7 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ca8 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1ca9 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1caa 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cab 08-31 20:51:42.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1df6 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [1df7 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1df8 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1df9 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1dfa 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\334\242K\221\363\267\335\373;\t|" secret_envelope: > alive:\262z-\226\261\240\315\246\034\035\211\002 \017\255\013\242\356\0320f\210F X\363S\362\t\232+Z&L\000y\030\316\177\362\276Z\212\235\306" > +peer1.org2.example.com | [1dfb 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [1dfc 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1dfd 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1dfe 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1dff 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e00 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e01 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e02 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e03 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e04 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e05 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [1e06 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e07 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e08 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e09 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e0a 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1e0b 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e0c 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1e0d 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ebe 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ebf 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ec0 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1ec1 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ec2 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ec3 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1ec4 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1ec5 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1ec6 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe37c0 gate 1598907098209066000 evaluation starts +peer0.org2.example.com | [1ec7 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe37c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ec8 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe37c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1ec9 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe37c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1eca 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe37c0 principal evaluation fails +peer0.org2.example.com | [1ecb 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe37c0 gate 1598907098209066000 evaluation fails +peer0.org2.example.com | [1ecc 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1ecd 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1ece 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1ecf 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe3d30 gate 1598907098210501700 evaluation starts +peer0.org2.example.com | [1ed0 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe3d30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ed1 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe3d30 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1ed2 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe3d30 principal matched by identity 0 +peer0.org2.example.com | [1ed3 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [1ed4 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [1ed5 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe3d30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1ed6 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe3d30 gate 1598907098210501700 evaluation succeeds +peer0.org2.example.com | [1ed7 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1ed8 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1ed9 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1eda 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1edb 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1edc 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1edd 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1ede 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1edf 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1ee0 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1ee1 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1ee2 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1ee3 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffcf30 gate 1598907098215833400 evaluation starts +peer0.org2.example.com | [1ee4 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffcf30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1ee5 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffcf30 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1ee6 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffcf30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1ee7 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffcf30 principal evaluation fails +peer0.org2.example.com | [1ee8 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffcf30 gate 1598907098215833400 evaluation fails +peer0.org2.example.com | [1ee9 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1eea 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1eeb 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1eec 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffd4a0 gate 1598907098217054700 evaluation starts +peer0.org2.example.com | [1eed 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffd4a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1eee 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffd4a0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1eef 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffd4a0 principal matched by identity 0 +peer0.org2.example.com | [1ef0 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [1ef1 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [1ef2 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffd4a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1ef3 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffd4a0 gate 1598907098217054700 evaluation succeeds +peer0.org2.example.com | [1ef4 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1ef5 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1ef6 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1ef7 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1ef8 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [1ef9 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [1b38 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1b39 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b3a 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b3b 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [1b3c 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b3d 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:11080509220039814310 tag:EMPTY mem_req:\302\216S\276\256bY\002 \0215\226\376\354\221X\201\002\031\262Y\225\352\345I\331\351\215\362?\352\272\262\ti\027\310\256m\273c" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b3e 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b3f 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:11080509220039814310 tag:EMPTY mem_req:\302\216S\276\256bY\002 \0215\226\376\354\221X\201\002\031\262Y\225\352\345I\331\351\215\362?\352\272\262\ti\027\310\256m\273c" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b40 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1b41 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 51 92 e1 81 19 3b bc 95 bd de 3e d0 c2 91 97 |9Q....;....>....| +peer0.org1.example.com | 00000010 f4 77 46 a2 d5 6a 83 a5 81 8a 7c 24 a2 23 2a a0 |.wF..j....|$.#*.| +peer0.org1.example.com | [1b42 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 36 a9 b5 76 7a a8 39 ff df c5 89 |0D. `6..vz.9....| +peer0.org1.example.com | 00000010 cc 47 6a 2c ad 46 e5 73 ab a5 1a 44 3e c2 8e 53 |.Gj,.F.s...D>..S| +peer0.org1.example.com | 00000020 be ae 62 59 02 20 11 35 96 fe ec 91 58 81 02 19 |..bY. .5....X...| +peer0.org1.example.com | 00000030 b2 59 95 ea e5 49 d9 e9 8d f2 3f ea ba b2 09 69 |.Y...I....?....i| +peer0.org1.example.com | 00000040 17 c8 ae 6d bb 63 |...m.c| +peer0.org1.example.com | [1b43 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [1b44 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b3 61 b5 6f ee 48 23 84 ef 7b |0E.!...a.o.H#..{| +peer0.org1.example.com | 00000010 c9 ab 19 96 09 a1 fe fc 35 b8 ef 3a 97 a7 91 56 |........5..:...V| +peer0.org1.example.com | 00000020 ae 5a 64 eb d9 02 20 12 e8 e5 db 05 71 aa 8f 98 |.Zd... .....q...| +peer0.org1.example.com | 00000030 81 79 76 41 2b 83 fe e2 76 6c 11 af 2c ff 23 9e |.yvA+...vl..,.#.| +peer0.org1.example.com | 00000040 3b b3 07 0c e4 ae 3f |;.....?| +peer0.org1.example.com | [1b45 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b46 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [1b47 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b48 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b49 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 11080509220039814310, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b4a 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 11080509220039814310, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b4c 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b4b 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:&,>\361\337_\206\356l\2308\303M\001,}\330\266$\213" > > alive: +peer0.org1.example.com | [1b4d 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b4e 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b4f 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b50 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b51 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e0e 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e0f 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1e10 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1e11 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1e12 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eaa7d0 gate 1598907101583753800 evaluation starts +peer1.org2.example.com | [1e13 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eaa7d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e14 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eaa7d0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1e15 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eaa7d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1e16 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eaa7d0 principal evaluation fails +peer1.org2.example.com | [1e17 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eaa7d0 gate 1598907101583753800 evaluation fails +peer1.org2.example.com | [1e18 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e19 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e1a 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1e1b 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eaad40 gate 1598907101584930600 evaluation starts +peer1.org2.example.com | [1e1c 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eaad40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e1d 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eaad40 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1e1e 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eaad40 principal matched by identity 0 +peer1.org2.example.com | [1e1f 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 eb 45 ca 97 60 4a 9c c3 ed 09 62 33 43 76 98 |7.E..`J....b3Cv.| +peer1.org2.example.com | 00000010 31 69 8e 7c bd a6 46 fe 97 cd 2a 0d b9 8d 2d e2 |1i.|..F...*...-.| +peer1.org2.example.com | [1e20 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab f4 bc e5 60 7e 5d 7a 40 a1 77 |0E.!.....`~]z@.w| +peer1.org2.example.com | 00000010 72 25 07 1a aa 90 d0 13 67 09 8c 41 0c 0b 44 db |r%......g..A..D.| +peer1.org2.example.com | 00000020 0e b0 a6 ea c0 02 20 75 18 74 45 d7 ef 3c 5a 29 |...... u.tE.. DEBU 0xc003eaad40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1e22 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eaad40 gate 1598907101584930600 evaluation succeeds +peer1.org2.example.com | [1e23 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e24 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e25 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1e26 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1e27 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1e28 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [1e29 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [1e2a 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [1e2b 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [1e2c 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e2d 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e2e 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e2f 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [1e30 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e31 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e32 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e33 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1e34 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e35 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cac 08-31 20:51:42.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cad 08-31 20:51:42.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cae 08-31 20:51:42.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1caf 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cb0 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cb1 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cb2 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cb3 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cb4 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cb5 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cb6 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cb7 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cb8 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cb9 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cba 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [1cbb 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org1.example.com | [1cbc 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [1cbd 08-31 20:51:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [1cbe 08-31 20:51:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [1cbf 08-31 20:51:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 a6 a9 fb 15 8e d2 60 02 03 3d 42 54 b6 09 74 |.......`..=BT..t| +peer1.org1.example.com | 00000010 4d d5 55 31 e1 2d 8f 40 08 32 75 74 b7 35 37 da |M.U1.-.@.2ut.57.| +peer1.org1.example.com | [1cc0 08-31 20:51:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 dd 21 c5 55 9d b8 44 4a 78 9d 18 |0D. &.!.U..DJx..| +peer1.org1.example.com | 00000010 ff 7c 44 b2 fd e7 95 9c 6a 29 ac 99 17 a5 e3 c7 |.|D.....j)......| +peer1.org1.example.com | 00000020 e9 64 be 31 02 20 6c 4f 35 30 70 b4 d0 db e9 f5 |.d.1. lO50p.....| +peer1.org1.example.com | 00000030 89 80 03 98 fb 2b 5d 85 c8 b8 d5 5e be 62 c3 46 |.....+]....^.b.F| +peer1.org1.example.com | 00000040 66 7b df 10 8c e3 |f{....| +peer1.org1.example.com | [1cc1 08-31 20:51:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cc2 08-31 20:51:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cc3 08-31 20:51:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cc4 08-31 20:51:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [1cc5 08-31 20:51:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cc6 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1cc7 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cc8 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cc9 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cca 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ccb 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ccc 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ccd 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [1cce 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ccf 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1cd0 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cd1 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1cd2 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1cd3 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cd4 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1cd5 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1cd6 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1cd7 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1cd8 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1cd9 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1cda 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e8ba0 gate 1598907105018782000 evaluation starts +peer1.org1.example.com | [1cdb 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e8ba0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1cdc 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e8ba0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1cdd 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e8ba0 principal matched by identity 0 +peer1.org1.example.com | [1cde 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 00 5e 32 f1 4e 63 4a 59 bf 46 8f 12 89 5e 9c |..^2.NcJY.F...^.| +peer1.org1.example.com | 00000010 f8 46 db ee 1d b4 2b 09 bc 0f 30 d5 87 9a 6f fd |.F....+...0...o.| +peer1.org1.example.com | [1cdf 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a cf 17 e8 00 29 88 f4 17 92 b9 48 |0D. .....).....H| +peer1.org1.example.com | 00000010 d6 11 14 84 87 62 8a c9 1e 7c 52 fa aa 10 b1 12 |.....b...|R.....| +peer1.org1.example.com | 00000020 21 1f 8d b1 02 20 4f 16 05 64 35 27 b8 38 99 b3 |!.... O..d5'.8..| +peer1.org1.example.com | 00000030 01 78 cb c9 27 d3 45 12 b0 0c c5 60 35 3b 9b 0e |.x..'.E....`5;..| +peer1.org1.example.com | 00000040 0d 8a 22 30 43 52 |.."0CR| +peer1.org1.example.com | [1ce0 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e8ba0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1ce1 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e8ba0 gate 1598907105018782000 evaluation succeeds +peer1.org1.example.com | [1ce2 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ce3 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ce4 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1ce5 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1ce6 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1ce7 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1ce8 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1ce9 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1cea 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1ceb 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cec 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ced 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cee 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cef 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1cf0 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cf1 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cf2 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cf3 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cf4 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cf5 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1cf6 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cf7 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1cf8 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1cf9 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1cfa 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cfb 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1cfc 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cfd 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1cfe 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1cff 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d00 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d01 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d02 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d03 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d04 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1d05 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b52 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b53 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [1b54 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b55 08-31 20:51:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:270579457140118257 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b56 08-31 20:51:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b57 08-31 20:51:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:270579457140118257 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b58 08-31 20:51:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1b59 08-31 20:51:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 a3 c6 ca c4 cc 18 ce 24 c3 1e 75 a7 13 3d 4b |........$..u..=K| +peer0.org1.example.com | 00000010 b4 1a be b9 83 40 08 c8 90 ad 9d a8 42 de 89 71 |.....@......B..q| +peer0.org1.example.com | [1b5a 08-31 20:51:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 2a b2 90 d2 c8 c5 b4 94 1d ea |0E.!..*.........| +peer0.org1.example.com | 00000010 12 3d ec e0 16 1c 4a f5 b6 fd 26 51 33 6e 48 4f |.=....J...&Q3nHO| +peer0.org1.example.com | 00000020 4e 73 ac 8d c1 02 20 12 1c 60 c9 8f e7 08 24 e1 |Ns.... ..`....$.| +peer0.org1.example.com | 00000030 26 29 22 88 01 7f 7a 26 27 d3 b1 19 b4 9f 54 14 |&)"...z&'.....T.| +peer0.org1.example.com | 00000040 11 84 8f 0e 46 3f 1f |....F?.| +peer0.org1.example.com | [1b5b 08-31 20:51:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [1b5c 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 b2 fc d5 9d e3 db 5f cd 7d b7 |0E.!........_.}.| +peer0.org1.example.com | 00000010 4f 9a bd 90 4e e3 c0 58 26 40 e6 a6 6e e9 6b f9 |O...N..X&@..n.k.| +peer0.org1.example.com | 00000020 c3 f4 5d c1 6c 02 20 6f 20 97 19 b0 68 5c 50 6d |..].l. o ...h\Pm| +peer0.org1.example.com | 00000030 99 da bb 5e 10 70 75 85 fa 5b 15 85 38 18 0a db |...^.pu..[..8...| +peer0.org1.example.com | 00000040 cc df d9 9c bc 31 fe |.....1.| +peer0.org1.example.com | [1b5d 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b5e 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [1b5f 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b60 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b61 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 270579457140118257, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b62 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:&,>\361\337_\206\356l\2308\303M\001,}\330\266$\213" > > alive: +peer0.org1.example.com | [1b63 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 270579457140118257, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b64 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b65 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b66 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b67 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b68 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b69 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b6a 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e36 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\334\242K\221\363\267\335\373;\t|" > alive: alive: alive:\262z-\226\261\240\315\246\034\035\211\002 \017\255\013\242\356\0320f\210F X\363S\362\t\232+Z&L\000y\030\316\177\362\276Z\212\235\306" > +peer1.org2.example.com | [1e37 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e38 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e39 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e3a 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e3b 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e3c 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e3d 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e3e 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e3f 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e40 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e41 08-31 20:51:41.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e42 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e43 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e44 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e45 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e46 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e47 08-31 20:51:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e48 08-31 20:51:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e49 08-31 20:51:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e4a 08-31 20:51:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [1e4b 08-31 20:51:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e4c 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e4d 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e4e 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [1e4f 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e50 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e51 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e52 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e53 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e54 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e55 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e57 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e58 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e59 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b6b 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:9094981273582956271 tag:EMPTY mem_req:\322\327\217\322\373\014SX+\002 `\022\355\361\274\256\226\021\311\312\037\325\240\003\257\374\235\177T\356\007S\276\210\th^\367\322\010\317\366" > > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b6c 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: nonce:9094981273582956271 tag:EMPTY mem_req:\322\327\217\322\373\014SX+\002 `\022\355\361\274\256\226\021\311\312\037\325\240\003\257\374\235\177T\356\007S\276\210\th^\367\322\010\317\366" > > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b6d 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b6e 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:9094981273582956271 tag:EMPTY mem_req:\322\327\217\322\373\014SX+\002 `\022\355\361\274\256\226\021\311\312\037\325\240\003\257\374\235\177T\356\007S\276\210\th^\367\322\010\317\366" > > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b6f 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1b70 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b71 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1b72 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b73 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b74 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1b75 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1b76 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1b77 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492edd0 gate 1598907094439652900 evaluation starts +peer0.org1.example.com | [1b78 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492edd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1b79 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492edd0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1b7a 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492edd0 principal matched by identity 0 +peer0.org1.example.com | [1b7b 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 06 fe f8 db b4 d7 7f 1b 2a ce d8 a8 3a 1e 5e |a........*...:.^| +peer0.org1.example.com | 00000010 3a fa 98 74 01 5a 87 27 5f a8 e4 a0 84 7b b7 ec |:..t.Z.'_....{..| +peer0.org1.example.com | [1b7c 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 04 af cc 95 ac 59 5e 55 d0 68 6e |0D. `.....Y^U.hn| +peer0.org1.example.com | 00000010 5c ba dd a6 62 d7 5a 70 d6 66 3e d2 d7 8f d2 fb |\...b.Zp.f>.....| +peer0.org1.example.com | 00000020 0c 53 58 2b 02 20 60 12 ed f1 bc ae 96 11 c9 ca |.SX+. `.........| +peer0.org1.example.com | 00000030 1f d5 a0 03 af fc 9d 7f 54 ee 07 53 be 88 09 68 |........T..S...h| +peer0.org1.example.com | 00000040 5e f7 d2 08 cf f6 |^.....| +peer0.org1.example.com | [1b7d 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492edd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1b7e 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492edd0 gate 1598907094439652900 evaluation succeeds +peer0.org1.example.com | [1b7f 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b80 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1b81 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1b82 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1b83 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b84 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [1b85 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b86 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b87 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d06 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1d07 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d08 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d09 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1d0a 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1efa 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [1efb 08-31 20:51:38.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [1efc 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1efd 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [1efe 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1eff 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f00 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f01 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1f02 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f03 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f04 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1f05 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1f06 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1f07 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040156d0 gate 1598907098222228700 evaluation starts +peer0.org2.example.com | [1f08 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040156d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1f09 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040156d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1f0a 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040156d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1f0b 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040156d0 principal evaluation fails +peer0.org2.example.com | [1f0c 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040156d0 gate 1598907098222228700 evaluation fails +peer0.org2.example.com | [1f0d 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1f0e 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1f0f 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1f10 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004015c40 gate 1598907098223553300 evaluation starts +peer0.org2.example.com | [1f11 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004015c40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1f12 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004015c40 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1f13 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004015c40 principal matched by identity 0 +peer0.org2.example.com | [1f14 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [1f15 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [1f16 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004015c40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1f17 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004015c40 gate 1598907098223553300 evaluation succeeds +peer0.org2.example.com | [1f18 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1f19 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [1b88 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 9094981273582956271, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1b89 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1b8a 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9094981273582956271, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b8b 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b8c 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b8d 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b8e 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b8f 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b90 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1b91 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b92 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:14031637786944006989 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b93 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:14031637786944006989 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b94 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1b95 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:14031637786944006989 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [1b96 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1b97 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f1a 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1f1b 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1f1c 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [1f1d 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [1f1e 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f1f 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f20 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1f21 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f22 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f23 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1f24 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1f25 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1f26 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004037530 gate 1598907098229123100 evaluation starts +peer0.org2.example.com | [1f27 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004037530 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1f28 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004037530 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1f29 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004037530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1f2a 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004037530 principal evaluation fails +peer0.org2.example.com | [1f2b 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004037530 gate 1598907098229123100 evaluation fails +peer0.org2.example.com | [1f2c 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1f2d 08-31 20:51:38.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1f2e 08-31 20:51:38.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1f2f 08-31 20:51:38.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004037aa0 gate 1598907098230557500 evaluation starts +peer0.org2.example.com | [1f30 08-31 20:51:38.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004037aa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1f31 08-31 20:51:38.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004037aa0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1f32 08-31 20:51:38.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004037aa0 principal matched by identity 0 +peer0.org2.example.com | [1f33 08-31 20:51:38.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [1f34 08-31 20:51:38.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [1f35 08-31 20:51:38.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004037aa0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1f36 08-31 20:51:38.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004037aa0 gate 1598907098230557500 evaluation succeeds +peer0.org2.example.com | [1f37 08-31 20:51:38.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1f38 08-31 20:51:38.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1f39 08-31 20:51:38.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1f3a 08-31 20:51:38.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1b98 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1b99 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b9a 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1b9b 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1b9c 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1b9d 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1b9e 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049664d0 gate 1598907094676786100 evaluation starts +peer0.org1.example.com | [1b9f 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049664d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1ba0 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049664d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1ba1 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049664d0 principal matched by identity 0 +peer0.org1.example.com | [1ba2 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 66 fd 9c c9 b8 d9 32 a5 2b 55 1b 0e 4b 55 ee |.f.....2.+U..KU.| +peer0.org1.example.com | 00000010 ae 75 42 51 6d ff ad 4d f6 ea 73 a8 19 99 e8 9e |.uBQm..M..s.....| +peer0.org1.example.com | [1ba3 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c b1 7b 15 b4 de 75 18 d5 54 84 50 |0D. ..{...u..T.P| +peer0.org1.example.com | 00000010 95 fd ed 9a 20 e9 44 98 92 74 4b 8d 04 98 29 30 |.... .D..tK...)0| +peer0.org1.example.com | 00000020 c8 11 0c 77 02 20 16 5f 7d 7d 70 bb ed b4 7a d1 |...w. ._}}p...z.| +peer0.org1.example.com | 00000030 8f 51 d7 a5 cd 39 ff bc 44 d3 bf a8 f3 5f 55 55 |.Q...9..D...._UU| +peer0.org1.example.com | 00000040 ee 2f 6a 72 8b 69 |./jr.i| +peer0.org1.example.com | [1ba4 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049664d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1ba5 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049664d0 gate 1598907094676786100 evaluation succeeds +peer0.org1.example.com | [1ba6 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ba7 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ba8 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1ba9 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1baa 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bab 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [1bac 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bad 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bae 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1baf 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 14031637786944006989, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1bb0 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1bb1 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 14031637786944006989, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes +peer0.org1.example.com | [1bb2 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bb3 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1bb4 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1bb5 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bb6 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1bb7 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1bb8 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d0b 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1d0c 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cdea0 gate 1598907105050049500 evaluation starts +peer1.org1.example.com | [1d0d 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cdea0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1d0e 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cdea0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1d0f 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cdea0 principal matched by identity 0 +peer1.org1.example.com | [1d10 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 45 06 e0 3d 9c 66 bc 90 53 b2 a5 53 47 0c 30 |.E..=.f..S..SG.0| +peer1.org1.example.com | 00000010 60 e5 a7 b0 a8 36 c4 ee b1 84 4a f2 05 1e 53 eb |`....6....J...S.| +peer1.org1.example.com | [1d11 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 87 1d 29 5e 79 f2 7f 60 bc 9c c4 |0D. V..)^y..`...| +peer1.org1.example.com | 00000010 b7 35 c2 46 5c 8a 97 3e b8 93 24 9d dc c6 0b 16 |.5.F\..>..$.....| +peer1.org1.example.com | 00000020 f8 1f ef 3f 02 20 07 e9 b8 33 0f 23 cc 21 d3 98 |...?. ...3.#.!..| +peer1.org1.example.com | 00000030 9e 12 53 11 24 1d c1 d9 3b 7e eb e5 22 6f 74 cb |..S.$...;~.."ot.| +peer1.org1.example.com | 00000040 80 5e 69 15 de 32 |.^i..2| +peer1.org1.example.com | [1d12 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cdea0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1d13 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cdea0 gate 1598907105050049500 evaluation succeeds +peer1.org1.example.com | [1d14 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1d15 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1d16 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1d17 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1d18 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d19 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1d1a 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1d1b 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1d1c 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1d1d 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d1e 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d1f 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d20 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [1d21 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d22 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d23 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d24 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1d25 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\334\242K\221\363\267\335\373;\t|" > alive:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > alive: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d29 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1bb9 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1bba 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1bbb 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1bbc 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1bbd 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1bbe 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1bbf 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495f360 gate 1598907095021532200 evaluation starts +peer0.org1.example.com | [1bc0 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495f360 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1bc1 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495f360 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1bc2 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495f360 principal matched by identity 0 +peer0.org1.example.com | [1bc3 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 e3 df 1d 27 0f 55 03 7e 01 74 87 d8 0a fe 96 |5...'.U.~.t.....| +peer0.org1.example.com | 00000010 2e 95 46 dc 04 49 32 1c 78 38 93 a5 a0 97 29 f6 |..F..I2.x8....).| +peer0.org1.example.com | [1bc4 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 a9 9b 8a 91 6a 3e 56 6c 67 49 b3 |0D. .....j>VlgI.| +peer0.org1.example.com | 00000010 0d 69 fb cd 57 09 79 4e c5 1a 8d 7e fe 97 23 6c |.i..W.yN...~..#l| +peer0.org1.example.com | 00000020 ae c6 ce 98 02 20 10 4c be d9 39 a2 eb 13 95 3b |..... .L..9....;| +peer0.org1.example.com | 00000030 b3 50 90 2d bf 6d f4 f8 3c e4 50 c0 a6 34 2b 3c |.P.-.m..<.P..4+<| +peer0.org1.example.com | 00000040 d1 d9 a3 e4 03 bf |......| +peer0.org1.example.com | [1bc5 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495f360 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1bc6 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495f360 gate 1598907095021532200 evaluation succeeds +peer0.org1.example.com | [1bc7 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1bc8 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1bc9 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1bca 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1bcb 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1bcc 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1bcd 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1bce 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1bcf 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1bd0 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bd1 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bd2 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bd3 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1bd4 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1bd5 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bd6 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1bd7 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bd8 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bd9 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bda 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1bdc 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bdb 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bdd 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1bde 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bdf 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1be0 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1be1 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1be2 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1be3 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1be5 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1be4 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1be6 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1be7 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1be8 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1be9 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bea 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1beb 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bec 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1bed 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1bee 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 68 e1 9f 6a cf 4b 51 94 26 3d f3 b4 96 65 0e |.h..j.KQ.&=...e.| +peer0.org1.example.com | 00000010 83 18 51 0d 1e 95 21 8c 2b 87 c2 30 e0 b7 7c 36 |..Q...!.+..0..|6| +peer0.org1.example.com | [1bef 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e d6 c1 ed a6 6a 4d 7c 26 09 1f 1a |0D. .....jM|&...| +peer0.org1.example.com | 00000010 5d 34 72 e2 9e 77 a4 01 73 c6 f2 8d 2d 6d 0c cb |]4r..w..s...-m..| +peer0.org1.example.com | 00000020 f5 a4 16 2b 02 20 66 ec 64 f0 96 5d af 46 e1 72 |...+. f.d..].F.r| +peer0.org1.example.com | 00000030 cf 93 fc 30 61 ec c3 64 cb 6b 6e 43 25 28 1b 0d |...0a..d.knC%(..| +peer0.org1.example.com | 00000040 e9 d1 03 99 53 02 |....S.| +peer0.org1.example.com | [1bf0 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1bf1 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1bf2 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1bf3 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1bf4 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1bf5 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bf6 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bf7 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1bf8 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bf9 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bfa 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bfb 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1bfc 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1bfd 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1bfe 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1bff 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c00 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c01 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c02 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c03 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c04 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c05 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c06 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c07 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c08 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c09 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c0a 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c0b 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c0c 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c0d 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c0e 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c0f 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c10 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1c11 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c12 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1c13 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1c14 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1c15 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1c16 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1c17 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1c18 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c6b30 gate 1598907095448051500 evaluation starts +peer0.org1.example.com | [1c19 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c6b30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1c1a 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c6b30 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1c1b 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c6b30 principal matched by identity 0 +peer0.org1.example.com | [1c1c 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 24 6e 9e 14 7d e7 b2 c9 08 af 03 12 73 c3 09 |.$n..}.......s..| +peer0.org1.example.com | 00000010 df 45 1c 2a 6e 2f f1 cb 11 9b f8 40 fa dd bd 55 |.E.*n/.....@...U| +peer0.org1.example.com | [1c1d 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 4d 48 5d ac 09 38 f7 9f 1b 6f 61 |0D. 0MH]..8...oa| +peer0.org1.example.com | 00000010 c2 9e bf f7 85 a9 31 70 9e a5 87 ff 3c 66 70 06 |......1p.... DEBU 0xc0049c6b30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1c1f 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c6b30 gate 1598907095448051500 evaluation succeeds +peer0.org1.example.com | [1c20 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1c21 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1c22 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1c23 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1c25 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c26 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1c24 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c27 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1c28 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c29 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1c2a 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1c2b 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c2c 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c2d 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c2e 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c2f 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c30 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c31 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c32 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c33 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c34 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c35 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c36 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c37 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c38 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1c3a 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c3b 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c39 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c3c 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1c3d 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c3e 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c3f 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c40 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c41 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1c42 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c43 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [1c44 08-31 20:51:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1c45 08-31 20:51:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161020 +peer0.org1.example.com | [1c46 08-31 20:51:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AD78A854DEEC8259918DFF7043227932B8E30C0866D6083D793236166F13B9F0 +peer0.org1.example.com | [1c47 08-31 20:51:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1c48 08-31 20:51:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1c49 08-31 20:51:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1c4a 08-31 20:51:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [1c4b 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c4c 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c4d 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f3b 08-31 20:51:38.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [1f3c 08-31 20:51:38.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [1f3d 08-31 20:51:38.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f3e 08-31 20:51:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f3f 08-31 20:51:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f40 08-31 20:51:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [1f41 08-31 20:51:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f42 08-31 20:51:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f43 08-31 20:51:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [1f44 08-31 20:51:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f45 08-31 20:51:38.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f46 08-31 20:51:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f47 08-31 20:51:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f48 08-31 20:51:38.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f49 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f4a 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f4b 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f4c 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f4d 08-31 20:51:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f4e 08-31 20:51:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [1f4f 08-31 20:51:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [1f50 08-31 20:51:38.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f51 08-31 20:51:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [1f52 08-31 20:51:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [1f53 08-31 20:51:39.24 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [1f54 08-31 20:51:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f55 08-31 20:51:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 56 f2 d2 d8 2f 8c 9e f3 54 de e2 2f ef 75 0c |.V.../...T../.u.| +peer0.org2.example.com | 00000010 dd 3f 9d 7f 47 96 20 2f 8a c2 96 41 91 fe 25 98 |.?..G. /...A..%.| +peer0.org2.example.com | [1f56 08-31 20:51:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 21 9f 78 a7 18 21 5f a5 06 e8 |0E.!..!.x..!_...| +peer0.org2.example.com | 00000010 9a 69 b8 96 59 34 d1 b8 d6 ae 51 35 5d 45 12 6b |.i..Y4....Q5]E.k| +peer0.org2.example.com | 00000020 6c eb 97 7d b0 02 20 54 cd 09 cf 06 ee 7d f9 da |l..}.. T.....}..| +peer0.org2.example.com | 00000030 fa c5 2f f8 a6 b0 16 b6 c5 d9 8c ae 27 0c 8c 34 |../.........'..4| +peer0.org2.example.com | 00000040 54 22 77 be cd 0e 30 |T"w...0| +peer0.org2.example.com | [1f57 08-31 20:51:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f58 08-31 20:51:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f59 08-31 20:51:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f5a 08-31 20:51:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [1f5b 08-31 20:51:39.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [1f5c 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f5d 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f5e 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f5f 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [1f60 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 7d 67 74 97 c6 df f9 86 6f 84 a2 33 2a 87 87 |M}gt.....o..3*..| +peer0.org2.example.com | 00000010 08 a0 10 ee 46 b1 dc 81 63 a5 59 92 b1 4b e4 69 |....F...c.Y..K.i| +peer0.org2.example.com | [1f61 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 96 49 6c 76 ad e9 2f e3 fb 97 |0E.!...Ilv../...| +peer1.org2.example.com | [1e5a 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1e56 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e5b 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e5c 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e5d 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1e5e 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1e5f 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1e60 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea1590 gate 1598907102450652800 evaluation starts +peer1.org2.example.com | [1e61 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea1590 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e62 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea1590 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1e63 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea1590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1e64 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea1590 principal evaluation fails +peer1.org2.example.com | [1e65 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea1590 gate 1598907102450652800 evaluation fails +peer1.org2.example.com | [1e66 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e67 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e68 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1e69 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea1b00 gate 1598907102451592300 evaluation starts +peer1.org2.example.com | [1e6a 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea1b00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e6b 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea1b00 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1e6c 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea1b00 principal matched by identity 0 +peer1.org2.example.com | [1e6d 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [1e6e 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [1e6f 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea1b00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1e70 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ea1b00 gate 1598907102451592300 evaluation succeeds +peer1.org2.example.com | [1e71 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e72 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e73 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1e74 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1e75 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [1e76 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [1e77 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e78 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e79 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1e7a 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e7b 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e7c 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1e7d 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1e7e 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1e7f 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f053f0 gate 1598907102455753900 evaluation starts +peer1.org2.example.com | [1e80 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f053f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e81 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f053f0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1e82 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f053f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1e83 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f053f0 principal evaluation fails +peer1.org2.example.com | [1e84 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f053f0 gate 1598907102455753900 evaluation fails +peer1.org2.example.com | [1e85 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e86 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1e87 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1e88 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f05960 gate 1598907102458771300 evaluation starts +peer1.org2.example.com | [1e89 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f05960 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1e8a 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f05960 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1e8b 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f05960 principal matched by identity 0 +peer1.org2.example.com | [1e8c 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [1e8d 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [1e8e 08-31 20:51:42.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f05960 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1e8f 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f05960 gate 1598907102458771300 evaluation succeeds +peer1.org2.example.com | [1e90 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e91 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1e92 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1e93 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1e94 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e95 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [1c4e 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1c4f 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1c50 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c51 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c52 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c53 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [1d2a 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d2b 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d2c 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d2d 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [1d2e 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1d2f 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [1d30 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1d31 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1d32 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1d33 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d34 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d35 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d37 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d36 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d38 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d39 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d3b 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d3a 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1d3c 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d3d 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d3f 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d3e 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161028 +peer1.org1.example.com | [1d40 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 97342B8C86009F4FD6C544C76A58392FF49AD06E2D4B7D9CAD4FE19BE1076401 +peer1.org1.example.com | [1d42 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1d43 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1d44 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1d45 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [1d41 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d47 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d46 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d48 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d49 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 b2 7c 15 39 77 ab d3 03 2f 3e b2 7a 2d 96 b1 a0 |.|.9w.../>.z-...| +peer0.org2.example.com | 00000020 cd a6 1c 1d 89 02 20 0f ad 0b a2 ee 1a 30 66 88 |...... ......0f.| +peer0.org2.example.com | 00000030 46 20 58 f3 53 f2 09 9a 2b 5a 26 4c 00 79 18 ce |F X.S...+Z&L.y..| +peer0.org2.example.com | 00000040 7f f2 be 5a 8a 9d c6 |...Z...| +peer0.org2.example.com | [1f62 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f63 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1f64 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1f65 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1f66 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1f67 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f68 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f69 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f6a 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f6b 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f6c 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f6d 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1f6e 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f6f 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f70 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f71 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1f72 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f73 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f74 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f75 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f76 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f77 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f78 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f79 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f7a 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1f7b 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f7c 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f7d 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1f7e 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f7f 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [1f80 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1f81 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1f82 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f83 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1f84 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1f85 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1f86 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [1f87 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407d860 gate 1598907100298640500 evaluation starts +peer0.org2.example.com | [1f88 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407d860 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1f89 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407d860 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1f8a 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407d860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1f8b 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407d860 principal evaluation fails +peer0.org2.example.com | [1f8c 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407d860 gate 1598907100298640500 evaluation fails +peer0.org2.example.com | [1f8d 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1f8e 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1f8f 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1f90 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407ddd0 gate 1598907100305850300 evaluation starts +peer0.org2.example.com | [1f91 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407ddd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1f92 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407ddd0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1f93 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f94 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407ddd0 principal matched by identity 0 +peer0.org2.example.com | [1f95 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a e1 40 6b d4 cf b4 c3 0c e0 54 3f fe 70 3b bb |J.@k......T?.p;.| +peer0.org2.example.com | 00000010 47 a3 10 69 29 01 50 d2 ac ed 74 75 df ec 4d 0c |G..i).P...tu..M.| +peer0.org2.example.com | [1f96 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 59 90 7b bb ca 94 33 40 80 e0 e0 |0D. .Y.{...3@...| +peer0.org2.example.com | 00000010 34 da 7f 8d bc 17 22 cb 0f 9b 44 41 a3 2a 04 d4 |4....."...DA.*..| +peer0.org2.example.com | 00000020 ea 89 5c c7 02 20 70 7d c3 ff c5 be b2 29 8d a7 |..\.. p}.....)..| +peer0.org2.example.com | 00000030 1c f6 ed 56 24 b3 e8 4c f2 6d 49 90 11 65 72 97 |...V$..L.mI..er.| +peer0.org2.example.com | 00000040 23 6f cf 7b 34 3d |#o.{4=| +peer0.org2.example.com | [1f97 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407ddd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1f98 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00407ddd0 gate 1598907100305850300 evaluation succeeds +peer0.org2.example.com | [1f99 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1f9a 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1f9b 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1f9c 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1f9d 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1f9e 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [1f9f 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1fa0 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1fa1 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [1fa2 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fa3 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fa4 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fa5 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1fa7 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fa6 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fa8 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fa9 08-31 20:51:40.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1faa 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fac 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1fad 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fab 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fae 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1faf 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fb0 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fb1 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fb2 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1fb3 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1fb5 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fb4 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fb6 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fb7 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [1fb8 08-31 20:51:40.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [1fb9 08-31 20:51:40.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fba 08-31 20:51:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1fbb 08-31 20:51:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161023 +peer0.org2.example.com | [1fbc 08-31 20:51:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F008BE1A2CD9B5C087979401EF549CF702E30B24D8D0CDE6E87580D70A970C3E +peer0.org2.example.com | [1fbd 08-31 20:51:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [1fbe 08-31 20:51:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1e96 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [1e97 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1e98 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1e99 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [1e9a 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [1e9b 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c54 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c55 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c56 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c57 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c58 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c59 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c5a 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c5b 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c5c 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c5d 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c5e 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c5f 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c60 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c61 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [1c62 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c63 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c64 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c65 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c66 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c67 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1c68 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c69 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1c6a 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1c6b 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1c6c 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1c6d 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1c6e 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1c6f 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a28650 gate 1598907097020124200 evaluation starts +peer0.org1.example.com | [1c70 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a28650 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1c71 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a28650 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1c72 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a28650 principal matched by identity 0 +peer0.org1.example.com | [1c73 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db a1 0a ad 45 ca e7 06 61 d1 7b dd bc 70 48 93 |....E...a.{..pH.| +peer0.org1.example.com | 00000010 ac c2 56 d7 f0 1b 15 fb 3e 41 97 96 03 b1 89 27 |..V.....>A.....'| +peer0.org1.example.com | [1c74 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 d2 c1 83 d8 f9 44 42 c5 99 b6 |0E.!.......DB...| +peer0.org1.example.com | 00000010 02 bd 14 01 a5 d8 28 32 e8 19 e9 38 4d 49 90 40 |......(2...8MI.@| +peer0.org1.example.com | 00000020 58 3b 4d c5 16 02 20 51 03 82 01 fc 09 e9 1e a6 |X;M... Q........| +peer0.org1.example.com | 00000030 96 87 c3 cd a1 48 e1 e9 d5 c0 77 64 5f ed be e3 |.....H....wd_...| +peer0.org1.example.com | 00000040 40 62 d3 e0 07 67 c5 |@b...g.| +peer0.org1.example.com | [1c75 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a28650 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1c76 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a28650 gate 1598907097020124200 evaluation succeeds +peer0.org1.example.com | [1c77 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1c78 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1c79 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1c7a 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1c7b 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1c7c 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1c7d 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1c7e 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1c7f 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1c80 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c81 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c82 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c83 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [1c84 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c85 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c86 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1c87 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1c88 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1c89 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c8a 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c8b 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c8c 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c8d 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [1c8e 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c8f 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c90 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c91 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1c92 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1c93 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 4d b1 e5 64 ab 5d 7d 73 b3 77 98 b1 c0 2e 87 |.M..d.]}s.w.....| +peer0.org1.example.com | 00000010 dc 4e 7c d3 dc 21 20 be 6e 87 78 44 ba b2 41 76 |.N|..! .n.xD..Av| +peer0.org1.example.com | [1c94 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 65 31 6f 20 db 46 d8 e7 4c 79 |0E.!..e1o .F..Ly| +peer0.org1.example.com | 00000010 a2 db ea ac 1f 1d cc 90 dd e0 6d 70 f6 a0 c9 bd |..........mp....| +peer0.org1.example.com | 00000020 f4 3a 59 bb 3c 02 20 42 04 8a ac e4 a8 9d d6 79 |.:Y.<. B.......y| +peer0.org1.example.com | 00000030 c1 7c de 43 b2 e5 dd aa 1c 9e 71 9a e0 8f 9d 72 |.|.C......q....r| +peer0.org1.example.com | 00000040 58 a1 ce a7 d4 b6 03 |X......| +peer0.org1.example.com | [1c95 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [1c96 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b a5 f8 28 0b f2 9c 43 78 e1 a2 |0E.!....(...Cx..| +peer0.org1.example.com | 00000010 85 22 96 b4 ad 5d df 46 ac 96 f9 d3 04 18 14 4c |."...].F.......L| +peer0.org1.example.com | 00000020 0b 07 70 3a f3 02 20 55 c8 f0 d3 9a 93 84 dd d9 |..p:.. U........| +peer0.org1.example.com | 00000030 07 82 37 54 7f db 62 f9 64 57 5b 5d d1 54 75 7b |..7T..b.dW[].Tu{| +peer0.org1.example.com | 00000040 b5 50 08 be 15 2b f4 |.P...+.| +peer0.org1.example.com | [1c97 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1c98 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [1c99 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1c9a 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1c9b 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1c9c 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c9d 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c9e 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1c9f 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [1ca0 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ca1 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ca2 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1ca3 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [1ca4 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ca5 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ca6 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ca7 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ca8 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ca9 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1caa 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cab 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cac 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cad 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cae 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1caf 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [1cb0 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cb1 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cb2 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cb3 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cb4 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cb5 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1cb6 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cb7 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1cb8 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1cb9 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1cba 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1cbb 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1cbc 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1cbd 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a68e40 gate 1598907097492117600 evaluation starts +peer0.org1.example.com | [1cbe 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a68e40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1cbf 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a68e40 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1cc0 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a68e40 principal matched by identity 0 +peer0.org1.example.com | [1cc1 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 3c 08 3d bc c6 89 79 ba 4a ac 99 82 f1 fa 4d |.<.=...y.J.....M| +peer0.org1.example.com | 00000010 0f a6 dd 71 2d 6b 0f d5 9b b2 82 ad 5e 80 da c8 |...q-k......^...| +peer0.org1.example.com | [1cc2 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 55 55 55 3f 7d 18 aa 53 15 e1 |0E.!..UUU?}..S..| +peer0.org1.example.com | 00000010 cc 53 46 31 e9 7c 18 3a 50 d2 cd d0 a0 44 0d fe |.SF1.|.:P....D..| +peer0.org1.example.com | 00000020 03 0f 29 76 0d 02 20 2f bd ba c1 eb 6b 9f 2d 86 |..)v.. /....k.-.| +peer0.org1.example.com | 00000030 a9 e4 eb 8f fc 4f 76 ee e0 64 f2 97 8f 9c 1a 3a |.....Ov..d.....:| +peer0.org1.example.com | 00000040 5e 1d 64 1d 25 85 81 |^.d.%..| +peer0.org1.example.com | [1cc3 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a68e40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1cc4 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a68e40 gate 1598907097492117600 evaluation succeeds +peer0.org1.example.com | [1cc5 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1cc6 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1cc7 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1cc8 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1cc9 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1cca 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1ccb 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1ccc 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1fbf 08-31 20:51:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [1fc0 08-31 20:51:40.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [1fc1 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fc2 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fc3 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fc4 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1fc5 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fc6 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1fc7 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1fc8 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1fc9 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fca 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1fcb 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fcc 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1fcd 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fce 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1fcf 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fd0 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1fd1 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [1fd2 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fd3 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [1fd4 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1fd5 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [1fd6 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [1fd7 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [1fd8 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1e9c 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1e9d 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1e9e 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1e9f 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1ea0 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1ea1 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1ea2 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1ea3 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1dae0 gate 1598907102466180400 evaluation starts +peer1.org2.example.com | [1ea4 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1dae0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ea5 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1dae0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1ea6 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1dae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1ea7 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1dae0 principal evaluation fails +peer1.org2.example.com | [1ea8 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1dae0 gate 1598907102466180400 evaluation fails +peer1.org2.example.com | [1ea9 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1eaa 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1eab 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1eac 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f34050 gate 1598907102469884600 evaluation starts +peer1.org2.example.com | [1ead 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f34050 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1eae 08-31 20:51:42.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f34050 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1eaf 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f34050 principal matched by identity 0 +peer1.org2.example.com | [1eb0 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [1eb1 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [1eb2 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f34050 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1eb3 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f34050 gate 1598907102469884600 evaluation succeeds +peer1.org2.example.com | [1eb4 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1eb5 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1eb6 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1eb7 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1eb8 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1eb9 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1eba 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1ebb 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1ebc 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1ebd 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1ebe 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1ebf 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1ec0 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f35250 gate 1598907102472882800 evaluation starts +peer1.org2.example.com | [1ec1 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f35250 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ec2 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f35250 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1ec3 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f35250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1ec4 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f35250 principal evaluation fails +peer1.org2.example.com | [1ec5 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f35250 gate 1598907102472882800 evaluation fails +peer1.org2.example.com | [1ec6 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ec7 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ec8 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1ec9 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f357c0 gate 1598907102475485600 evaluation starts +peer1.org2.example.com | [1eca 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f357c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ecb 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f357c0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1ecc 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f357c0 principal matched by identity 0 +peer1.org2.example.com | [1ecd 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [1ece 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [1ecf 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f357c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1ed0 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f357c0 gate 1598907102475485600 evaluation succeeds +peer1.org2.example.com | [1ed1 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1ed2 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1ed3 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1ed4 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1ed5 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [1ed6 08-31 20:51:42.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [1ed7 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1ed8 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [1ed9 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1eda 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1edb 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ccd 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1cce 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ccf 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cd0 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cd1 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [1cd2 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cd3 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cd4 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cd5 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1cd6 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [1cd7 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1cd8 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [1cd9 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1cda 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1cdd 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1cde 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ce1 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cdf 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ce3 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1fd9 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d3580 gate 1598907100515890100 evaluation starts +peer0.org2.example.com | [1fda 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d3580 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1fdb 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d3580 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1fdc 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d3580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [1fdd 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d3580 principal evaluation fails +peer0.org2.example.com | [1fde 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d3580 gate 1598907100515890100 evaluation fails +peer0.org2.example.com | [1fdf 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1fe0 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [1fe1 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [1fe2 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d3af0 gate 1598907100518324600 evaluation starts +peer0.org2.example.com | [1fe3 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d3af0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [1fe4 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d3af0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [1fe5 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d3af0 principal matched by identity 0 +peer0.org2.example.com | [1fe6 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be bc 57 e5 6f b6 2e 8f a6 56 95 40 5d ea b8 4d |..W.o....V.@]..M| +peer0.org2.example.com | 00000010 a7 03 3f 7a cf 28 b5 43 0d 4c 68 75 b9 d9 18 c2 |..?z.(.C.Lhu....| +peer0.org2.example.com | [1fe7 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 55 68 33 e5 31 57 2f ba 51 9b |0E.!..Uh3.1W/.Q.| +peer0.org2.example.com | 00000010 ed d1 f3 1a e9 c6 dd d7 81 c4 66 ff e2 85 16 6c |..........f....l| +peer0.org2.example.com | 00000020 58 7b 3f 8b 5e 02 20 6d a0 a4 eb 38 5b eb 15 2d |X{?.^. m...8[..-| +peer0.org2.example.com | 00000030 bf 8c eb d6 96 69 c6 a1 d3 af ee 91 e7 af ea 49 |.....i.........I| +peer0.org2.example.com | 00000040 1f 4f be 43 f8 7d c5 |.O.C.}.| +peer0.org2.example.com | [1fe8 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d3af0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [1fe9 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040d3af0 gate 1598907100518324600 evaluation succeeds +peer0.org2.example.com | [1fea 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1feb 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [1fec 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [1fed 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [1fee 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [1fef 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [1ff0 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [1ff1 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [1ff2 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [1ff3 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ff4 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ff5 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ff6 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ff7 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ff8 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ff9 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ffa 08-31 20:51:40.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ffb 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1edc 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1edd 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1ede 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1edf 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1ee0 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1ee1 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1ee2 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f59300 gate 1598907102481894300 evaluation starts +peer1.org2.example.com | [1ee3 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f59300 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ee4 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f59300 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1ee5 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f59300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1ee6 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f59300 principal evaluation fails +peer1.org2.example.com | [1ee7 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f59300 gate 1598907102481894300 evaluation fails +peer1.org2.example.com | [1ee8 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ee9 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1eea 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1eeb 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f59870 gate 1598907102482665800 evaluation starts +peer1.org2.example.com | [1eec 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f59870 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1eed 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f59870 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1eee 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f59870 principal matched by identity 0 +peer1.org2.example.com | [1eef 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [1ef0 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [1ef1 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f59870 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1ef2 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f59870 gate 1598907102482665800 evaluation succeeds +peer1.org2.example.com | [1ef3 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1ef4 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1ef5 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1ef6 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1ef7 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1ef8 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cdc 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ce4 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ce0 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ce5 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cdb 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [1ce2 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ce6 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ce7 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ce8 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ce9 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cea 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ceb 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cec 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ced 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cee 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cef 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d4a 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d4b 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d4c 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d4d 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d4e 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1d4f 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1d50 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d52 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d53 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d51 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d54 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d55 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1d56 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d57 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d58 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1d59 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161029 +peer1.org1.example.com | [1d5a 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EF865190AD7039604BA4CE69BC9DC69B92897C96FF00063E22F3BA2C28D2D080 +peer1.org1.example.com | [1d5b 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1d5c 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1d5d 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1d5e 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:T-\006" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1d5f 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d60 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:T-\006" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1d61 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d62 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:T-\006" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1d63 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:T-\006" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d64 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [1ffc 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [1ffd 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1ffe 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [1fff 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2000 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2001 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2002 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2003 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2004 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2005 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2006 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2007 08-31 20:51:40.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2008 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2009 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [200a 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [200b 08-31 20:51:40.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [200c 08-31 20:51:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [200d 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [200e 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [200f 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2010 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2011 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2012 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2013 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2014 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef a0 d0 0f d5 8c b6 eb 36 4d af 12 a7 c3 89 3b |........6M.....;| +peer0.org2.example.com | 00000010 7d 82 e8 7f de 1f b2 da 14 18 48 82 58 48 51 5f |}.........H.XHQ_| +peer0.org2.example.com | [2015 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 c5 94 1a 88 b1 52 36 24 bc ae |0E.!.......R6$..| +peer0.org2.example.com | 00000010 b3 c7 b0 17 8a 81 ec e9 c1 f8 90 e6 30 64 de 41 |............0d.A| +peer0.org2.example.com | 00000020 a7 59 21 e7 e3 02 20 18 a5 c5 c5 03 be ed b6 82 |.Y!... .........| +peer0.org2.example.com | 00000030 f3 cf 18 ab 15 44 5c b3 9b bd 89 50 a7 13 d3 d1 |.....D\....P....| +peer0.org2.example.com | 00000040 b9 0f 00 91 aa f9 bd |.......| +peer0.org2.example.com | [2016 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [2017 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 d3 90 01 9c d3 96 db db 87 2b 6d |0D. H.........+m| +peer1.org2.example.com | [1ef9 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1efa 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1efb 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1efc 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1efd 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1efe 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1eff 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f70a70 gate 1598907102485787900 evaluation starts +peer1.org2.example.com | [1f00 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f70a70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1f01 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f70a70 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1f02 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f70a70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1f03 08-31 20:51:42.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f70a70 principal evaluation fails +peer1.org2.example.com | [1f04 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f70a70 gate 1598907102485787900 evaluation fails +peer1.org2.example.com | [1f05 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1f06 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1f07 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1f08 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f70fe0 gate 1598907102490865800 evaluation starts +peer1.org2.example.com | [1f09 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f70fe0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1f0a 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f70fe0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1f0b 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f70fe0 principal matched by identity 0 +peer1.org2.example.com | [1f0c 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [1f0d 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [1f0e 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f70fe0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1f0f 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f70fe0 gate 1598907102490865800 evaluation succeeds +peer1.org2.example.com | [1f10 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1f11 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1f12 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1f13 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1f14 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [1f15 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [1f16 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [1f17 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [1f18 08-31 20:51:42.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f19 08-31 20:51:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f1a 08-31 20:51:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f1b 08-31 20:51:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1f1c 08-31 20:51:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f1d 08-31 20:51:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f1e 08-31 20:51:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f1f 08-31 20:51:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f20 08-31 20:51:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f21 08-31 20:51:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 0f a9 f0 84 c7 ad 78 93 4a 7b 83 64 28 f2 5f 68 |......x.J{.d(._h| +peer0.org2.example.com | 00000020 ca 6f 69 d1 02 20 46 e0 23 e4 2a 58 79 c9 f8 09 |.oi.. F.#.*Xy...| +peer0.org2.example.com | 00000030 4f 75 95 be 64 7c 5b f9 91 c7 46 88 79 f1 41 41 |Ou..d|[...F.y.AA| +peer0.org2.example.com | 00000040 a0 90 85 b8 2b 1f |....+.| +peer0.org2.example.com | [2018 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2019 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [201a 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [201b 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [201c 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [201d 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [201e 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [201f 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2020 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [2021 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2022 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2023 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2024 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [2025 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [2026 08-31 20:51:41.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2027 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2028 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2029 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [202a 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [202b 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [202c 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [202d 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [202e 08-31 20:51:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [202f 08-31 20:51:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [2030 08-31 20:51:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2031 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2032 08-31 20:51:41.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2033 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2034 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2035 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cf0 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1cf1 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161021 +peer0.org1.example.com | [1cf2 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E8C5901C2389B1557B43264AB8D6705AB628A6938D2B0A0D7C58E6F0727DE636 +peer0.org1.example.com | [1cf3 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1cf4 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1cf5 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1cf6 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1cf7 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cf9 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1cfa 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1cfc 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1cfd 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cf8 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [1cfb 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d00 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cfe 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1cff 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d01 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d02 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d03 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d04 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d05 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1d06 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 c5 90 1c 23 89 b1 55 7b 43 26 4a b8 d6 70 5a |....#..U{C&J..pZ| +peer0.org1.example.com | 00000010 b6 28 a6 93 8d 2b 0a 0d 7c 58 e6 f0 72 7d e6 36 |.(...+..|X..r}.6| +peer0.org1.example.com | [1d07 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 37 11 34 5e 7c bc 37 64 82 1b 45 |0D. ,7.4^|.7d..E| +peer0.org1.example.com | 00000010 11 dc 71 6e 82 b7 d1 51 2a d8 d1 d9 47 36 94 5a |..qn...Q*...G6.Z| +peer0.org1.example.com | 00000020 67 d1 73 de 02 20 67 86 18 97 66 53 75 a1 da 19 |g.s.. g...fSu...| +peer0.org1.example.com | 00000030 61 5e 5c 2b f1 16 bc ab 13 78 7c c6 83 90 87 63 |a^\+.....x|....c| +peer0.org1.example.com | 00000040 41 01 da cb e5 e6 |A.....| +peer0.org1.example.com | [1d08 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1d09 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2036 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2037 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2038 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2039 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [203a 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [203b 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [203c 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004146220 gate 1598907101311918200 evaluation starts +peer0.org2.example.com | [203d 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004146220 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [203e 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004146220 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [203f 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004146220 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2040 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004146220 principal evaluation fails +peer0.org2.example.com | [2041 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004146220 gate 1598907101311918200 evaluation fails +peer0.org2.example.com | [2042 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2043 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2044 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2045 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004146790 gate 1598907101314561300 evaluation starts +peer0.org2.example.com | [2046 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004146790 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2047 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004146790 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2048 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004146790 principal matched by identity 0 +peer0.org2.example.com | [2049 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f 5f 38 0e 3a cd 26 b2 84 99 ae e0 4b 2e ba f7 |._8.:.&.....K...| +peer0.org2.example.com | 00000010 af 1c 33 83 1d fb c0 82 9c 23 25 73 b8 2e 01 56 |..3......#%s...V| +peer0.org2.example.com | [204a 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 19 c6 ba fc ef 63 dd da 44 91 11 |0D. ......c..D..| +peer0.org2.example.com | 00000010 f4 81 f0 f6 e7 9d 38 b2 3a 03 7c 47 a1 03 71 4c |......8.:.|G..qL| +peer0.org2.example.com | 00000020 bf 96 cd ea 02 20 56 95 26 f5 41 44 36 e9 8f d6 |..... V.&.AD6...| +peer0.org2.example.com | 00000030 e1 0a ec 08 9d a4 60 b1 83 68 b7 36 0b 27 5e df |......`..h.6.'^.| +peer0.org2.example.com | 00000040 83 5c 3a 4d 55 d3 |.\:MU.| +peer0.org2.example.com | [204b 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004146790 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [204c 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004146790 gate 1598907101314561300 evaluation succeeds +peer0.org2.example.com | [204d 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [204e 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [204f 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2050 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2051 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2052 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2053 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2054 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2055 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2056 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2057 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2058 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2059 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [205a 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [205b 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [205c 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [205d 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [205e 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [205f 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [2060 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2061 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [2062 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2063 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [2064 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2065 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [2066 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2067 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2068 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2069 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [206b 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [206a 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [206d 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [206c 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [206e 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [206f 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2070 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2071 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2072 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2073 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2074 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2075 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2076 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2077 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161024 +peer0.org2.example.com | [2078 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F38D52507BD2BD2A77DDA73E56C38D92EF2F0B8F57797989ECE12D1DC5122AA2 +peer0.org2.example.com | [2079 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [207a 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [207b 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [207c 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [207d 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\334\242K\221\363\267\335\373;\t|" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [207e 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\334\242K\221\363\267\335\373;\t|" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [207f 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2080 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2081 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\334\242K\221\363\267\335\373;\t|" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2082 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\334\242K\221\363\267\335\373;\t|" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2083 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2084 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\334\242K\221\363\267\335\373;\t|" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2085 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\334\242K\221\363\267\335\373;\t|" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2086 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2087 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d0a 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d0b 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1d0c 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 4d b1 e5 64 ab 5d 7d 73 b3 77 98 b1 c0 2e 87 |.M..d.]}s.w.....| +peer0.org1.example.com | 00000010 dc 4e 7c d3 dc 21 20 be 6e 87 78 44 ba b2 41 76 |.N|..! .n.xD..Av| +peer0.org1.example.com | [1d0d 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 65 31 6f 20 db 46 d8 e7 4c 79 |0E.!..e1o .F..Ly| +peer0.org1.example.com | 00000010 a2 db ea ac 1f 1d cc 90 dd e0 6d 70 f6 a0 c9 bd |..........mp....| +peer0.org1.example.com | 00000020 f4 3a 59 bb 3c 02 20 42 04 8a ac e4 a8 9d d6 79 |.:Y.<. B.......y| +peer0.org1.example.com | 00000030 c1 7c de 43 b2 e5 dd aa 1c 9e 71 9a e0 8f 9d 72 |.|.C......q....r| +peer0.org1.example.com | 00000040 58 a1 ce a7 d4 b6 03 |X......| +peer0.org1.example.com | [1d0e 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1d0f 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d10 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1d11 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d12 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1d13 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d14 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d15 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1d16 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1d17 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1d18 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad0850 gate 1598907097591780700 evaluation starts +peer0.org1.example.com | [1d19 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad0850 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1d1a 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad0850 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1d1b 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad0850 principal matched by identity 0 +peer0.org1.example.com | [1d1c 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db a1 0a ad 45 ca e7 06 61 d1 7b dd bc 70 48 93 |....E...a.{..pH.| +peer0.org1.example.com | 00000010 ac c2 56 d7 f0 1b 15 fb 3e 41 97 96 03 b1 89 27 |..V.....>A.....'| +peer0.org1.example.com | [1d1d 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 d2 c1 83 d8 f9 44 42 c5 99 b6 |0E.!.......DB...| +peer0.org1.example.com | 00000010 02 bd 14 01 a5 d8 28 32 e8 19 e9 38 4d 49 90 40 |......(2...8MI.@| +peer0.org1.example.com | 00000020 58 3b 4d c5 16 02 20 51 03 82 01 fc 09 e9 1e a6 |X;M... Q........| +peer0.org1.example.com | 00000030 96 87 c3 cd a1 48 e1 e9 d5 c0 77 64 5f ed be e3 |.....H....wd_...| +peer0.org1.example.com | 00000040 40 62 d3 e0 07 67 c5 |@b...g.| +peer0.org1.example.com | [1d1e 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad0850 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1d1f 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad0850 gate 1598907097591780700 evaluation succeeds +peer0.org1.example.com | [1d20 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d21 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d22 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1d23 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1d24 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1d25 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d26 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d65 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:T-\006" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d66 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d67 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:T-\006" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d68 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d69 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d6a 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d6b 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d6c 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1d6d 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1d6e 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1d6f 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d70 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d71 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1d72 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1d73 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1d74 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004482a10 gate 1598907105322244200 evaluation starts +peer1.org1.example.com | [1d75 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004482a10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1d76 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004482a10 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1d77 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004482a10 principal matched by identity 0 +peer1.org1.example.com | [1d78 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 8d 52 50 7b d2 bd 2a 77 dd a7 3e 56 c3 8d 92 |..RP{..*w..>V...| +peer1.org1.example.com | 00000010 ef 2f 0b 8f 57 79 79 89 ec e1 2d 1d c5 12 2a a2 |./..Wyy...-...*.| +peer1.org1.example.com | [1d79 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 a2 27 cf ab c8 68 2b 25 85 10 a2 |0D. c.'...h+%...| +peer1.org1.example.com | 00000010 30 65 e5 f6 dc a4 65 9c 6d d8 94 de 82 83 c6 08 |0e....e.m.......| +peer1.org1.example.com | 00000020 80 f3 d4 49 02 20 55 e1 01 85 32 08 d0 36 d5 87 |...I. U...2..6..| +peer1.org1.example.com | 00000030 08 54 28 98 11 1d 4b 5f c1 38 3e dc a2 4b 91 f3 |.T(...K_.8>..K..| +peer1.org1.example.com | 00000040 b7 dd fb 3b 09 7c |...;.|| +peer1.org1.example.com | [1d7a 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004482a10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1d7b 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004482a10 gate 1598907105322244200 evaluation succeeds +peer1.org1.example.com | [1d7c 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1d7d 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1d7e 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1d7f 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1f22 08-31 20:51:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f23 08-31 20:51:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f24 08-31 20:51:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f25 08-31 20:51:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [1f26 08-31 20:51:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [1f27 08-31 20:51:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1f28 08-31 20:51:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D9816100A1801 +peer1.org2.example.com | [1f29 08-31 20:51:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2F1E19CA91221A92F251AEC8BEE007CA49C7DE1C49F3E7F6EC955F62E15A4ABA +peer1.org2.example.com | [1f2a 08-31 20:51:44.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [1f2b 08-31 20:51:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f2c 08-31 20:51:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f2d 08-31 20:51:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f2e 08-31 20:51:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f2f 08-31 20:51:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1f30 08-31 20:51:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f31 08-31 20:51:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f32 08-31 20:51:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [1f33 08-31 20:51:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f34 08-31 20:51:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [1f35 08-31 20:51:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f36 08-31 20:51:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [1f37 08-31 20:51:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f38 08-31 20:51:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [1f39 08-31 20:51:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f3a 08-31 20:51:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f3b 08-31 20:51:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f3c 08-31 20:51:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f3d 08-31 20:51:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f3e 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f3f 08-31 20:51:44.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f40 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f41 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f42 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f43 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f44 08-31 20:51:44.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2088 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2089 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [208a 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [208b 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [208c 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [208d 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [208e 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [208f 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2090 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2091 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2092 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004167b50 gate 1598907101501649300 evaluation starts +peer0.org2.example.com | [2093 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004167b50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2094 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004167b50 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2095 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004167b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2096 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004167b50 principal evaluation fails +peer0.org2.example.com | [2097 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004167b50 gate 1598907101501649300 evaluation fails +peer0.org2.example.com | [2098 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2099 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [209a 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [209b 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [209c 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041920c0 gate 1598907101502913000 evaluation starts +peer0.org2.example.com | [209d 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041920c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [209e 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041920c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [209f 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041920c0 principal matched by identity 0 +peer0.org2.example.com | [20a0 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f 5f 38 0e 3a cd 26 b2 84 99 ae e0 4b 2e ba f7 |._8.:.&.....K...| +peer0.org2.example.com | 00000010 af 1c 33 83 1d fb c0 82 9c 23 25 73 b8 2e 01 56 |..3......#%s...V| +peer0.org2.example.com | [20a1 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 19 c6 ba fc ef 63 dd da 44 91 11 |0D. ......c..D..| +peer0.org2.example.com | 00000010 f4 81 f0 f6 e7 9d 38 b2 3a 03 7c 47 a1 03 71 4c |......8.:.|G..qL| +peer0.org2.example.com | 00000020 bf 96 cd ea 02 20 56 95 26 f5 41 44 36 e9 8f d6 |..... V.&.AD6...| +peer0.org2.example.com | 00000030 e1 0a ec 08 9d a4 60 b1 83 68 b7 36 0b 27 5e df |......`..h.6.'^.| +peer0.org2.example.com | 00000040 83 5c 3a 4d 55 d3 |.\:MU.| +peer0.org2.example.com | [20a2 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041920c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [20a3 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041920c0 gate 1598907101502913000 evaluation succeeds +peer0.org2.example.com | [20a4 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [20a5 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [20a6 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [20a7 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [20a8 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [20a9 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20aa 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [20ab 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 8d 52 50 7b d2 bd 2a 77 dd a7 3e 56 c3 8d 92 |..RP{..*w..>V...| +peer0.org2.example.com | 00000010 ef 2f 0b 8f 57 79 79 89 ec e1 2d 1d c5 12 2a a2 |./..Wyy...-...*.| +peer0.org2.example.com | [20ac 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 a2 27 cf ab c8 68 2b 25 85 10 a2 |0D. c.'...h+%...| +peer0.org2.example.com | 00000010 30 65 e5 f6 dc a4 65 9c 6d d8 94 de 82 83 c6 08 |0e....e.m.......| +peer0.org2.example.com | 00000020 80 f3 d4 49 02 20 55 e1 01 85 32 08 d0 36 d5 87 |...I. U...2..6..| +peer0.org2.example.com | 00000030 08 54 28 98 11 1d 4b 5f c1 38 3e dc a2 4b 91 f3 |.T(...K_.8>..K..| +peer0.org2.example.com | 00000040 b7 dd fb 3b 09 7c |...;.|| +peer0.org2.example.com | [20ad 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [20ae 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [20af 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20b0 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [20b1 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef a0 d0 0f d5 8c b6 eb 36 4d af 12 a7 c3 89 3b |........6M.....;| +peer0.org2.example.com | 00000010 7d 82 e8 7f de 1f b2 da 14 18 48 82 58 48 51 5f |}.........H.XHQ_| +peer0.org2.example.com | [20b2 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 c5 94 1a 88 b1 52 36 24 bc ae |0E.!.......R6$..| +peer0.org2.example.com | 00000010 b3 c7 b0 17 8a 81 ec e9 c1 f8 90 e6 30 64 de 41 |............0d.A| +peer0.org2.example.com | 00000020 a7 59 21 e7 e3 02 20 18 a5 c5 c5 03 be ed b6 82 |.Y!... .........| +peer0.org2.example.com | 00000030 f3 cf 18 ab 15 44 5c b3 9b bd 89 50 a7 13 d3 d1 |.....D\....P....| +peer0.org2.example.com | 00000040 b9 0f 00 91 aa f9 bd |.......| +peer0.org2.example.com | [20b3 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [20b4 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20b5 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20b6 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [20b7 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [20b8 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20b9 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 8d 52 50 7b d2 bd 2a 77 dd a7 3e 56 c3 8d 92 |..RP{..*w..>V...| +peer0.org1.example.com | [1d27 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d28 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d29 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d2a 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1d2b 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 c5 90 1c 23 89 b1 55 7b 43 26 4a b8 d6 70 5a |....#..U{C&J..pZ| +peer0.org1.example.com | 00000010 b6 28 a6 93 8d 2b 0a 0d 7c 58 e6 f0 72 7d e6 36 |.(...+..|X..r}.6| +peer0.org1.example.com | [1d2c 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 37 11 34 5e 7c bc 37 64 82 1b 45 |0D. ,7.4^|.7d..E| +peer0.org1.example.com | 00000010 11 dc 71 6e 82 b7 d1 51 2a d8 d1 d9 47 36 94 5a |..qn...Q*...G6.Z| +peer0.org1.example.com | 00000020 67 d1 73 de 02 20 67 86 18 97 66 53 75 a1 da 19 |g.s.. g...fSu...| +peer0.org1.example.com | 00000030 61 5e 5c 2b f1 16 bc ab 13 78 7c c6 83 90 87 63 |a^\+.....x|....c| +peer0.org1.example.com | 00000040 41 01 da cb e5 e6 |A.....| +peer0.org1.example.com | [1d2d 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [1d2e 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 4f 11 48 ff 5b 23 51 29 3b 44 f7 |0D. .O.H.[#Q);D.| +peer0.org1.example.com | 00000010 b7 1a be d1 e9 02 db 39 fe 27 24 d9 24 1c b5 a2 |.......9.'$.$...| +peer0.org1.example.com | 00000020 0a ad 7b ac 02 20 70 74 8b 9f d0 5b 25 91 0a dc |..{.. pt...[%...| +peer0.org1.example.com | 00000030 46 4e b2 3d 2f 65 db d3 ee 05 83 49 33 04 f1 4a |FN.=/e.....I3..J| +peer0.org1.example.com | 00000040 f5 bd 47 66 8f 2f |..Gf./| +peer0.org1.example.com | [1d30 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1d2f 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d31 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d32 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1d33 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d34 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d35 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d36 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1d37 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d38 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1d39 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1d80 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d81 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d82 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1d83 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 eb 45 ca 97 60 4a 9c c3 ed 09 62 33 43 76 98 |7.E..`J....b3Cv.| +peer1.org1.example.com | 00000010 31 69 8e 7c bd a6 46 fe 97 cd 2a 0d b9 8d 2d e2 |1i.|..F...*...-.| +peer1.org1.example.com | [1d84 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab f4 bc e5 60 7e 5d 7a 40 a1 77 |0E.!.....`~]z@.w| +peer1.org1.example.com | 00000010 72 25 07 1a aa 90 d0 13 67 09 8c 41 0c 0b 44 db |r%......g..A..D.| +peer1.org1.example.com | 00000020 0e b0 a6 ea c0 02 20 75 18 74 45 d7 ef 3c 5a 29 |...... u.tE.. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1d86 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d87 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1d88 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 86 51 90 ad 70 39 60 4b a4 ce 69 bc 9d c6 9b |..Q..p9`K..i....| +peer1.org1.example.com | 00000010 92 89 7c 96 ff 00 06 3e 22 f3 ba 2c 28 d2 d0 80 |..|....>"..,(...| +peer1.org1.example.com | [1d89 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 4d 3b 6d 79 7e 60 c6 00 9e e3 a2 |0D. .M;my~`.....| +peer1.org1.example.com | 00000010 c1 52 21 aa 00 cf 02 e4 e2 9a dc c7 3d ae c4 ca |.R!.........=...| +peer1.org1.example.com | 00000020 c6 ca 5e 8f 02 20 45 ee 63 2b 12 6c 2f 55 f7 9b |..^.. E.c+.l/U..| +peer1.org1.example.com | 00000030 42 59 0d 6f e6 76 a7 61 35 5f 65 35 45 20 a6 e9 |BY.o.v.a5_e5E ..| +peer1.org1.example.com | 00000040 2c 3d 3e 54 2d 06 |,=>T-.| +peer1.org1.example.com | [1d8a 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d8b 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1d8c 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d8d 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d8e 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d8f 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d90 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d91 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d92 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1d93 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 86 51 90 ad 70 39 60 4b a4 ce 69 bc 9d c6 9b |..Q..p9`K..i....| +peer1.org1.example.com | 00000010 92 89 7c 96 ff 00 06 3e 22 f3 ba 2c 28 d2 d0 80 |..|....>"..,(...| +peer1.org1.example.com | [1d94 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 4d 3b 6d 79 7e 60 c6 00 9e e3 a2 |0D. .M;my~`.....| +peer1.org1.example.com | 00000010 c1 52 21 aa 00 cf 02 e4 e2 9a dc c7 3d ae c4 ca |.R!.........=...| +peer1.org1.example.com | 00000020 c6 ca 5e 8f 02 20 45 ee 63 2b 12 6c 2f 55 f7 9b |..^.. E.c+.l/U..| +peer1.org1.example.com | 00000030 42 59 0d 6f e6 76 a7 61 35 5f 65 35 45 20 a6 e9 |BY.o.v.a5_e5E ..| +peer1.org1.example.com | 00000040 2c 3d 3e 54 2d 06 |,=>T-.| +peer1.org1.example.com | [1d95 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [1d96 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 74 8e c6 be 2b 4b 62 59 df a9 |0E.!..t...+KbY..| +peer1.org1.example.com | 00000010 c8 b8 a9 6b 31 e5 e0 08 03 8b a3 9d 7f 26 8c 0f |...k1........&..| +peer1.org1.example.com | 00000020 3c 9c 03 87 dd 02 20 5f cb 47 1d 09 9f 23 2d 99 |<..... _.G...#-.| +peer1.org1.example.com | 00000030 9a 24 5e 22 7a e5 c6 ab ac 6b d3 51 68 58 eb 79 |.$^"z....k.QhX.y| +peer1.org1.example.com | 00000040 4c 6d 48 b5 94 7e 92 |LmH..~.| +peer1.org1.example.com | [1d97 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1d98 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1d99 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d9a 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d9b 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d9c 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d9d 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1d9e 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [1d9f 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1da0 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 eb 45 ca 97 60 4a 9c c3 ed 09 62 33 43 76 98 |7.E..`J....b3Cv.| +peer1.org1.example.com | 00000010 31 69 8e 7c bd a6 46 fe 97 cd 2a 0d b9 8d 2d e2 |1i.|..F...*...-.| +peer1.org1.example.com | [1da1 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab f4 bc e5 60 7e 5d 7a 40 a1 77 |0E.!.....`~]z@.w| +peer1.org1.example.com | 00000010 72 25 07 1a aa 90 d0 13 67 09 8c 41 0c 0b 44 db |r%......g..A..D.| +peer1.org1.example.com | 00000020 0e b0 a6 ea c0 02 20 75 18 74 45 d7 ef 3c 5a 29 |...... u.tE.. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1da3 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1da4 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1da5 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 86 51 90 ad 70 39 60 4b a4 ce 69 bc 9d c6 9b |..Q..p9`K..i....| +peer1.org1.example.com | 00000010 92 89 7c 96 ff 00 06 3e 22 f3 ba 2c 28 d2 d0 80 |..|....>"..,(...| +peer1.org1.example.com | [1da6 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 4d 3b 6d 79 7e 60 c6 00 9e e3 a2 |0D. .M;my~`.....| +peer1.org1.example.com | 00000010 c1 52 21 aa 00 cf 02 e4 e2 9a dc c7 3d ae c4 ca |.R!.........=...| +peer1.org1.example.com | 00000020 c6 ca 5e 8f 02 20 45 ee 63 2b 12 6c 2f 55 f7 9b |..^.. E.c+.l/U..| +peer1.org1.example.com | 00000030 42 59 0d 6f e6 76 a7 61 35 5f 65 35 45 20 a6 e9 |BY.o.v.a5_e5E ..| +peer1.org1.example.com | 00000040 2c 3d 3e 54 2d 06 |,=>T-.| +peer1.org1.example.com | [1da7 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1da8 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1da9 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1daa 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1dab 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dac 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1dad 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1dae 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1daf 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1db0 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1db1 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1db2 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c5280 gate 1598907105331809500 evaluation starts +peer1.org1.example.com | [1db3 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c5280 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1db4 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c5280 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1db5 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c5280 principal matched by identity 0 +peer1.org1.example.com | [1db6 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 45 06 e0 3d 9c 66 bc 90 53 b2 a5 53 47 0c 30 |.E..=.f..S..SG.0| +peer1.org1.example.com | 00000010 60 e5 a7 b0 a8 36 c4 ee b1 84 4a f2 05 1e 53 eb |`....6....J...S.| +peer1.org1.example.com | [1db7 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 87 1d 29 5e 79 f2 7f 60 bc 9c c4 |0D. V..)^y..`...| +peer1.org2.example.com | [1f45 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f46 08-31 20:51:44.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f47 08-31 20:51:44.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f48 08-31 20:51:44.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f49 08-31 20:51:44.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f4a 08-31 20:51:44.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f4b 08-31 20:51:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1f4c 08-31 20:51:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161027 +peer1.org2.example.com | [1f4d 08-31 20:51:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A7005E32F14E634A59BF468F12895E9CF846DBEE1DB42B09BC0F30D5879A6FFD +peer1.org2.example.com | [1f4e 08-31 20:51:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1f4f 08-31 20:51:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1f50 08-31 20:51:45.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [1f51 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [1f52 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f53 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f54 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f55 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1f56 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1f57 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1f58 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f59 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f5b 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [1f5a 08-31 20:51:45.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1f5c 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f5d 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1f5e 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f5f 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1f60 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161028 +peer1.org2.example.com | [1f61 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 154506E03D9C66BC9053B2A553470C3060E5A7B0A836C4EEB1844AF2051E53EB +peer1.org2.example.com | [1f62 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [1f63 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [1f64 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [1f65 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f66 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f67 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f69 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f68 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f6c 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f6b 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [1f6a 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f6d 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f6e 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f6f 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f70 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f71 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f72 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [1f73 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1f74 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1f75 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1f76 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1f77 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1f78 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1f79 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1f7a 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3690 gate 1598907105055898600 evaluation starts +peer1.org2.example.com | [1f7b 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3690 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1f7c 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3690 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1f7d 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1f7e 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3690 principal evaluation fails +peer1.org2.example.com | [1f7f 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3690 gate 1598907105055898600 evaluation fails +peer1.org2.example.com | [1f80 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1f81 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1f82 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1f83 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3c00 gate 1598907105056169900 evaluation starts +peer1.org2.example.com | [1f84 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3c00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1f85 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3c00 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1f86 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3c00 principal matched by identity 0 +peer1.org2.example.com | [1f87 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 eb 45 ca 97 60 4a 9c c3 ed 09 62 33 43 76 98 |7.E..`J....b3Cv.| +peer1.org2.example.com | 00000010 31 69 8e 7c bd a6 46 fe 97 cd 2a 0d b9 8d 2d e2 |1i.|..F...*...-.| +peer1.org2.example.com | [1f88 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab f4 bc e5 60 7e 5d 7a 40 a1 77 |0E.!.....`~]z@.w| +peer1.org2.example.com | 00000010 72 25 07 1a aa 90 d0 13 67 09 8c 41 0c 0b 44 db |r%......g..A..D.| +peer1.org2.example.com | 00000020 0e b0 a6 ea c0 02 20 75 18 74 45 d7 ef 3c 5a 29 |...... u.tE.. DEBU 0xc003fc3c00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1f8a 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fc3c00 gate 1598907105056169900 evaluation succeeds +peer1.org2.example.com | [1f8b 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1f8c 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1f8d 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1f8e 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1f8f 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [1f90 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f91 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1f92 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 8d 52 50 7b d2 bd 2a 77 dd a7 3e 56 c3 8d 92 |..RP{..*w..>V...| +peer1.org2.example.com | 00000010 ef 2f 0b 8f 57 79 79 89 ec e1 2d 1d c5 12 2a a2 |./..Wyy...-...*.| +peer1.org2.example.com | [1f93 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 a2 27 cf ab c8 68 2b 25 85 10 a2 |0D. c.'...h+%...| +peer1.org2.example.com | 00000010 30 65 e5 f6 dc a4 65 9c 6d d8 94 de 82 83 c6 08 |0e....e.m.......| +peer1.org2.example.com | 00000020 80 f3 d4 49 02 20 55 e1 01 85 32 08 d0 36 d5 87 |...I. U...2..6..| +peer1.org2.example.com | 00000030 08 54 28 98 11 1d 4b 5f c1 38 3e dc a2 4b 91 f3 |.T(...K_.8>..K..| +peer1.org2.example.com | 00000040 b7 dd fb 3b 09 7c |...;.|| +peer1.org2.example.com | [1f94 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1f95 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f96 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1f97 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 45 06 e0 3d 9c 66 bc 90 53 b2 a5 53 47 0c 30 |.E..=.f..S..SG.0| +peer1.org2.example.com | 00000010 60 e5 a7 b0 a8 36 c4 ee b1 84 4a f2 05 1e 53 eb |`....6....J...S.| +peer1.org2.example.com | [1f98 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 87 1d 29 5e 79 f2 7f 60 bc 9c c4 |0D. V..)^y..`...| +peer1.org2.example.com | 00000010 b7 35 c2 46 5c 8a 97 3e b8 93 24 9d dc c6 0b 16 |.5.F\..>..$.....| +peer1.org2.example.com | 00000020 f8 1f ef 3f 02 20 07 e9 b8 33 0f 23 cc 21 d3 98 |...?. ...3.#.!..| +peer1.org2.example.com | 00000030 9e 12 53 11 24 1d c1 d9 3b 7e eb e5 22 6f 74 cb |..S.$...;~.."ot.| +peer1.org2.example.com | 00000040 80 5e 69 15 de 32 |.^i..2| +peer1.org2.example.com | [1f99 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1f9a 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1f9b 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f9c 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1f9d 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f9e 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1f9f 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 b7 35 c2 46 5c 8a 97 3e b8 93 24 9d dc c6 0b 16 |.5.F\..>..$.....| +peer1.org1.example.com | 00000020 f8 1f ef 3f 02 20 07 e9 b8 33 0f 23 cc 21 d3 98 |...?. ...3.#.!..| +peer1.org1.example.com | 00000030 9e 12 53 11 24 1d c1 d9 3b 7e eb e5 22 6f 74 cb |..S.$...;~.."ot.| +peer1.org1.example.com | 00000040 80 5e 69 15 de 32 |.^i..2| +peer1.org1.example.com | [1db8 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c5280 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1db9 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c5280 gate 1598907105331809500 evaluation succeeds +peer1.org1.example.com | [1dba 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1dbb 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1dbc 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1dbd 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1dbe 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1dbf 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dc0 08-31 20:51:45.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dc1 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1dc2 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1dc3 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1dc4 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dc5 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dc6 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dc7 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dc8 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dc9 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dca 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [1dcb 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dcc 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1dcd 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1dce 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dcf 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1dd0 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1dd1 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dd2 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1dd3 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1dd4 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 ef 2f 0b 8f 57 79 79 89 ec e1 2d 1d c5 12 2a a2 |./..Wyy...-...*.| +peer0.org2.example.com | [20bb 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 a2 27 cf ab c8 68 2b 25 85 10 a2 |0D. c.'...h+%...| +peer0.org2.example.com | 00000010 30 65 e5 f6 dc a4 65 9c 6d d8 94 de 82 83 c6 08 |0e....e.m.......| +peer0.org2.example.com | 00000020 80 f3 d4 49 02 20 55 e1 01 85 32 08 d0 36 d5 87 |...I. U...2..6..| +peer0.org2.example.com | 00000030 08 54 28 98 11 1d 4b 5f c1 38 3e dc a2 4b 91 f3 |.T(...K_.8>..K..| +peer0.org2.example.com | 00000040 b7 dd fb 3b 09 7c |...;.|| +peer0.org2.example.com | [20bc 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [20bd 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [20be 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20bf 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [20c0 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef a0 d0 0f d5 8c b6 eb 36 4d af 12 a7 c3 89 3b |........6M.....;| +peer0.org2.example.com | 00000010 7d 82 e8 7f de 1f b2 da 14 18 48 82 58 48 51 5f |}.........H.XHQ_| +peer0.org2.example.com | [20c1 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 c5 94 1a 88 b1 52 36 24 bc ae |0E.!.......R6$..| +peer0.org2.example.com | 00000010 b3 c7 b0 17 8a 81 ec e9 c1 f8 90 e6 30 64 de 41 |............0d.A| +peer0.org2.example.com | 00000020 a7 59 21 e7 e3 02 20 18 a5 c5 c5 03 be ed b6 82 |.Y!... .........| +peer0.org2.example.com | 00000030 f3 cf 18 ab 15 44 5c b3 9b bd 89 50 a7 13 d3 d1 |.....D\....P....| +peer0.org2.example.com | 00000040 b9 0f 00 91 aa f9 bd |.......| +peer0.org2.example.com | [20ba 08-31 20:51:41.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [20c2 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [20c3 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20c4 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20c5 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [20c6 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [20c7 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20c8 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 8d 52 50 7b d2 bd 2a 77 dd a7 3e 56 c3 8d 92 |..RP{..*w..>V...| +peer0.org2.example.com | 00000010 ef 2f 0b 8f 57 79 79 89 ec e1 2d 1d c5 12 2a a2 |./..Wyy...-...*.| +peer0.org2.example.com | [20c9 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 a2 27 cf ab c8 68 2b 25 85 10 a2 |0D. c.'...h+%...| +peer0.org2.example.com | 00000010 30 65 e5 f6 dc a4 65 9c 6d d8 94 de 82 83 c6 08 |0e....e.m.......| +peer0.org2.example.com | 00000020 80 f3 d4 49 02 20 55 e1 01 85 32 08 d0 36 d5 87 |...I. U...2..6..| +peer0.org2.example.com | 00000030 08 54 28 98 11 1d 4b 5f c1 38 3e dc a2 4b 91 f3 |.T(...K_.8>..K..| +peer0.org2.example.com | 00000040 b7 dd fb 3b 09 7c |...;.|| +peer0.org2.example.com | [20ca 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [20cb 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [20cc 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20cd 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20cf 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20ce 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [20d0 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 d7 d5 65 6f 8e ca f4 91 9a 70 |0E.!....eo.....p| +peer0.org2.example.com | 00000010 21 d7 aa 31 94 ff 74 eb ad 8a 25 1f bd 92 ae 73 |!..1..t...%....s| +peer0.org2.example.com | 00000020 f9 c3 7b 4b bd 02 20 07 4e bf e8 53 00 b3 68 a1 |..{K.. .N..S..h.| +peer0.org2.example.com | 00000030 85 56 17 a5 36 c9 f8 dc 78 5a 87 f2 b1 fe d1 d4 |.V..6...xZ......| +peer0.org2.example.com | 00000040 97 ac 27 2b 4a 1d 55 |..'+J.U| +peer0.org2.example.com | [20d1 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20d2 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20d4 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20d5 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [20d3 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [20d6 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [20d7 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20d8 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20d9 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20da 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [20db 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [20dc 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [20dd 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [20de 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fa0 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [1fa1 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1fa2 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 45 06 e0 3d 9c 66 bc 90 53 b2 a5 53 47 0c 30 |.E..=.f..S..SG.0| +peer1.org2.example.com | 00000010 60 e5 a7 b0 a8 36 c4 ee b1 84 4a f2 05 1e 53 eb |`....6....J...S.| +peer1.org2.example.com | [1fa3 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 87 1d 29 5e 79 f2 7f 60 bc 9c c4 |0D. V..)^y..`...| +peer1.org2.example.com | 00000010 b7 35 c2 46 5c 8a 97 3e b8 93 24 9d dc c6 0b 16 |.5.F\..>..$.....| +peer1.org2.example.com | 00000020 f8 1f ef 3f 02 20 07 e9 b8 33 0f 23 cc 21 d3 98 |...?. ...3.#.!..| +peer1.org2.example.com | 00000030 9e 12 53 11 24 1d c1 d9 3b 7e eb e5 22 6f 74 cb |..S.$...;~.."ot.| +peer1.org2.example.com | 00000040 80 5e 69 15 de 32 |.^i..2| +peer1.org2.example.com | [1fa4 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [1fa5 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 03 b0 bb 60 39 cf e6 ee 10 a5 1f |0D. ....`9......| +peer1.org2.example.com | 00000010 c2 5e fc a9 ef 49 c6 e8 0d 71 29 a7 41 8f 37 ab |.^...I...q).A.7.| +peer1.org2.example.com | 00000020 06 81 3b 26 02 20 2f 42 a2 b7 69 2f b2 d4 d6 bb |..;&. /B..i/....| +peer1.org2.example.com | 00000030 7f 8e 31 00 3c a2 28 c3 17 47 15 85 84 9e 61 a6 |..1.<.(..G....a.| +peer1.org2.example.com | 00000040 27 40 ef 01 ee 44 |'@...D| +peer1.org2.example.com | [1fa6 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1fa7 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [1fa8 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fa9 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1faa 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [1fab 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fac 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1fad 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fae 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [1faf 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1fb0 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fb1 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1fb2 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1fb3 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1fb4 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1fb5 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1fb6 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1fb7 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400f990 gate 1598907105074231700 evaluation starts +peer1.org2.example.com | [1fb8 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400f990 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1fb9 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400f990 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1fba 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400f990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1fbb 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400f990 principal evaluation fails +peer1.org2.example.com | [1fbc 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400f990 gate 1598907105074231700 evaluation fails +peer1.org2.example.com | [1fbd 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1fbe 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1fbf 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1fc0 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400ff00 gate 1598907105075723500 evaluation starts +peer1.org2.example.com | [1fc1 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400ff00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1fc2 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400ff00 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1fc3 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400ff00 principal matched by identity 0 +peer1.org2.example.com | [1fc4 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f 5f 38 0e 3a cd 26 b2 84 99 ae e0 4b 2e ba f7 |._8.:.&.....K...| +peer1.org2.example.com | 00000010 af 1c 33 83 1d fb c0 82 9c 23 25 73 b8 2e 01 56 |..3......#%s...V| +peer1.org2.example.com | [1fc5 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 19 c6 ba fc ef 63 dd da 44 91 11 |0D. ......c..D..| +peer1.org2.example.com | 00000010 f4 81 f0 f6 e7 9d 38 b2 3a 03 7c 47 a1 03 71 4c |......8.:.|G..qL| +peer1.org2.example.com | 00000020 bf 96 cd ea 02 20 56 95 26 f5 41 44 36 e9 8f d6 |..... V.&.AD6...| +peer1.org2.example.com | 00000030 e1 0a ec 08 9d a4 60 b1 83 68 b7 36 0b 27 5e df |......`..h.6.'^.| +peer1.org2.example.com | 00000040 83 5c 3a 4d 55 d3 |.\:MU.| +peer1.org2.example.com | [1fc6 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400ff00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [1fc7 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00400ff00 gate 1598907105075723500 evaluation succeeds +peer1.org2.example.com | [1fc8 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1fc9 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [1fca 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [1fcb 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [1fcc 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1fcd 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fce 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [1fcf 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 8d 52 50 7b d2 bd 2a 77 dd a7 3e 56 c3 8d 92 |..RP{..*w..>V...| +peer1.org2.example.com | 00000010 ef 2f 0b 8f 57 79 79 89 ec e1 2d 1d c5 12 2a a2 |./..Wyy...-...*.| +peer1.org2.example.com | [1fd0 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 a2 27 cf ab c8 68 2b 25 85 10 a2 |0D. c.'...h+%...| +peer1.org2.example.com | 00000010 30 65 e5 f6 dc a4 65 9c 6d d8 94 de 82 83 c6 08 |0e....e.m.......| +peer1.org2.example.com | 00000020 80 f3 d4 49 02 20 55 e1 01 85 32 08 d0 36 d5 87 |...I. U...2..6..| +peer1.org2.example.com | 00000030 08 54 28 98 11 1d 4b 5f c1 38 3e dc a2 4b 91 f3 |.T(...K_.8>..K..| +peer1.org2.example.com | 00000040 b7 dd fb 3b 09 7c |...;.|| +peer1.org2.example.com | [1fd1 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1fd2 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fd3 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [1fd4 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 45 06 e0 3d 9c 66 bc 90 53 b2 a5 53 47 0c 30 |.E..=.f..S..SG.0| +peer1.org2.example.com | 00000010 60 e5 a7 b0 a8 36 c4 ee b1 84 4a f2 05 1e 53 eb |`....6....J...S.| +peer1.org2.example.com | [1fd5 08-31 20:51:45.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 87 1d 29 5e 79 f2 7f 60 bc 9c c4 |0D. V..)^y..`...| +peer1.org2.example.com | 00000010 b7 35 c2 46 5c 8a 97 3e b8 93 24 9d dc c6 0b 16 |.5.F\..>..$.....| +peer1.org2.example.com | 00000020 f8 1f ef 3f 02 20 07 e9 b8 33 0f 23 cc 21 d3 98 |...?. ...3.#.!..| +peer1.org2.example.com | 00000030 9e 12 53 11 24 1d c1 d9 3b 7e eb e5 22 6f 74 cb |..S.$...;~.."ot.| +peer1.org2.example.com | 00000040 80 5e 69 15 de 32 |.^i..2| +peer1.org2.example.com | [1fd6 08-31 20:51:45.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1fd7 08-31 20:51:45.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1fd8 08-31 20:51:45.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fd9 08-31 20:51:45.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fda 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1fdb 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1fdc 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [1fdd 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [20df 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [20e0 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [20e1 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [20e2 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [20e3 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [20e4 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [20e5 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416fb70 gate 1598907101591497300 evaluation starts +peer0.org2.example.com | [20e6 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416fb70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [20e7 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416fb70 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [20e8 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416fb70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [20e9 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416fb70 principal evaluation fails +peer0.org2.example.com | [20ea 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00416fb70 gate 1598907101591497300 evaluation fails +peer0.org2.example.com | [20eb 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [20ec 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [20ed 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [20ee 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e20e0 gate 1598907101591772600 evaluation starts +peer0.org2.example.com | [20ef 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e20e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [20f0 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e20e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [20f1 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e20e0 principal matched by identity 0 +peer0.org2.example.com | [20f2 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 eb 45 ca 97 60 4a 9c c3 ed 09 62 33 43 76 98 |7.E..`J....b3Cv.| +peer0.org2.example.com | 00000010 31 69 8e 7c bd a6 46 fe 97 cd 2a 0d b9 8d 2d e2 |1i.|..F...*...-.| +peer0.org2.example.com | [20f3 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab f4 bc e5 60 7e 5d 7a 40 a1 77 |0E.!.....`~]z@.w| +peer0.org2.example.com | 00000010 72 25 07 1a aa 90 d0 13 67 09 8c 41 0c 0b 44 db |r%......g..A..D.| +peer0.org2.example.com | 00000020 0e b0 a6 ea c0 02 20 75 18 74 45 d7 ef 3c 5a 29 |...... u.tE.. DEBU 0xc0041e20e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [20f5 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e20e0 gate 1598907101591772600 evaluation succeeds +peer0.org2.example.com | [20f6 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [20f7 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [20f8 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [20f9 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [20fa 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [20fb 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [20fc 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [20fd 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [20fe 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [20ff 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2100 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2101 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2102 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [2103 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2104 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2105 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2106 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2107 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [2108 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2109 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [210a 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [210b 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [210c 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [210d 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [210e 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [210f 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2110 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2111 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2112 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2113 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2114 08-31 20:51:42.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2115 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2116 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [2117 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2118 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2119 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [211a 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [211b 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [211c 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [211d 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [211e 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [211f 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2120 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2121 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2122 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2123 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2124 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2125 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2126 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2127 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cd9d0 gate 1598907102197169300 evaluation starts +peer0.org2.example.com | [2128 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cd9d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2129 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cd9d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [212a 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cd9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [212b 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cd9d0 principal evaluation fails +peer0.org2.example.com | [212c 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cd9d0 gate 1598907102197169300 evaluation fails +peer0.org2.example.com | [212d 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [212e 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [212f 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2130 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cdf40 gate 1598907102198134900 evaluation starts +peer0.org2.example.com | [2131 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cdf40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2132 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cdf40 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2133 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cdf40 principal matched by identity 0 +peer0.org2.example.com | [2134 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [2135 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [2136 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cdf40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2137 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cdf40 gate 1598907102198134900 evaluation succeeds +peer0.org2.example.com | [2138 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2139 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [213a 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [213b 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [213c 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [1dd5 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1dd6 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1dd7 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1dd8 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e1130 gate 1598907105446124700 evaluation starts +peer1.org1.example.com | [1dd9 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e1130 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1dda 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e1130 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1ddb 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e1130 principal matched by identity 0 +peer1.org1.example.com | [1ddc 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa fe 02 df ac 8e 5b 38 f0 d3 c6 dc 8c 90 06 64 |......[8.......d| +peer1.org1.example.com | 00000010 7e 48 02 36 2b 57 9c c3 9f 16 46 01 5d 89 cc c4 |~H.6+W....F.]...| +peer1.org1.example.com | [1ddd 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a e3 1a ae 03 7f c1 a2 c4 2c 71 53 |0D. :........,qS| +peer1.org1.example.com | 00000010 a0 3f 52 95 f2 81 8a 14 a0 71 8a 8b ed 13 d1 9e |.?R......q......| +peer1.org1.example.com | 00000020 9c 5d 3b 9a 02 20 35 39 df a2 92 f6 90 5c 4f 26 |.];.. 59.....\O&| +peer1.org1.example.com | 00000030 23 ca bb 19 03 6f f9 d6 fc 4e d7 07 11 69 7d 0a |#....o...N...i}.| +peer1.org1.example.com | 00000040 0f dc 03 bf 09 6f |.....o| +peer1.org1.example.com | [1dde 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e1130 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1ddf 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e1130 gate 1598907105446124700 evaluation succeeds +peer1.org1.example.com | [1de0 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1de1 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1de2 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1de3 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1de4 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1de5 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1de6 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1de7 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1de8 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1de9 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dea 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1deb 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dec 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ded 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1dee 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1def 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1df0 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1df1 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1df2 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1df3 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1df4 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1df5 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1df6 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1df7 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1df8 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1df9 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dfa 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1d3a 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d3b 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1d3c 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1d3d 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1d3e 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ae7660 gate 1598907097598537900 evaluation starts +peer0.org1.example.com | [1d3f 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ae7660 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1d40 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ae7660 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1d41 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ae7660 principal matched by identity 0 +peer0.org1.example.com | [1d42 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 3c 08 3d bc c6 89 79 ba 4a ac 99 82 f1 fa 4d |.<.=...y.J.....M| +peer0.org1.example.com | 00000010 0f a6 dd 71 2d 6b 0f d5 9b b2 82 ad 5e 80 da c8 |...q-k......^...| +peer0.org1.example.com | [1d43 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 55 55 55 3f 7d 18 aa 53 15 e1 |0E.!..UUU?}..S..| +peer0.org1.example.com | 00000010 cc 53 46 31 e9 7c 18 3a 50 d2 cd d0 a0 44 0d fe |.SF1.|.:P....D..| +peer0.org1.example.com | 00000020 03 0f 29 76 0d 02 20 2f bd ba c1 eb 6b 9f 2d 86 |..)v.. /....k.-.| +peer0.org1.example.com | 00000030 a9 e4 eb 8f fc 4f 76 ee e0 64 f2 97 8f 9c 1a 3a |.....Ov..d.....:| +peer0.org1.example.com | 00000040 5e 1d 64 1d 25 85 81 |^.d.%..| +peer0.org1.example.com | [1d44 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ae7660 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1d45 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ae7660 gate 1598907097598537900 evaluation succeeds +peer0.org1.example.com | [1d46 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d47 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d48 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1d49 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1d4a 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1d4b 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d4c 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d4d 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1d4e 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 c5 90 1c 23 89 b1 55 7b 43 26 4a b8 d6 70 5a |....#..U{C&J..pZ| +peer0.org1.example.com | 00000010 b6 28 a6 93 8d 2b 0a 0d 7c 58 e6 f0 72 7d e6 36 |.(...+..|X..r}.6| +peer0.org1.example.com | [1d4f 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 37 11 34 5e 7c bc 37 64 82 1b 45 |0D. ,7.4^|.7d..E| +peer0.org1.example.com | 00000010 11 dc 71 6e 82 b7 d1 51 2a d8 d1 d9 47 36 94 5a |..qn...Q*...G6.Z| +peer0.org1.example.com | 00000020 67 d1 73 de 02 20 67 86 18 97 66 53 75 a1 da 19 |g.s.. g...fSu...| +peer0.org1.example.com | 00000030 61 5e 5c 2b f1 16 bc ab 13 78 7c c6 83 90 87 63 |a^\+.....x|....c| +peer0.org1.example.com | 00000040 41 01 da cb e5 e6 |A.....| +peer0.org1.example.com | [1d50 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1d51 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1d52 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d53 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1d54 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 4d b1 e5 64 ab 5d 7d 73 b3 77 98 b1 c0 2e 87 |.M..d.]}s.w.....| +peer0.org1.example.com | 00000010 dc 4e 7c d3 dc 21 20 be 6e 87 78 44 ba b2 41 76 |.N|..! .n.xD..Av| +peer0.org1.example.com | [1d55 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 65 31 6f 20 db 46 d8 e7 4c 79 |0E.!..e1o .F..Ly| +peer0.org1.example.com | 00000010 a2 db ea ac 1f 1d cc 90 dd e0 6d 70 f6 a0 c9 bd |..........mp....| +peer0.org1.example.com | 00000020 f4 3a 59 bb 3c 02 20 42 04 8a ac e4 a8 9d d6 79 |.:Y.<. B.......y| +peer0.org1.example.com | 00000030 c1 7c de 43 b2 e5 dd aa 1c 9e 71 9a e0 8f 9d 72 |.|.C......q....r| +peer0.org1.example.com | 00000040 58 a1 ce a7 d4 b6 03 |X......| +peer0.org1.example.com | [1d56 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1d57 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d58 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d59 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d5a 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d5b 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [1d5c 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d5d 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d5e 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [213d 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [213e 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [213f 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fde 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fdf 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fe0 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fe1 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fe2 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1fe3 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [1fe4 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fe5 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1fe6 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1fe7 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [1fe8 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [1fe9 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [1fea 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [1feb 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [1fec 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1fed 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [1fee 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [1fef 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [1ff0 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [1ff1 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a420 gate 1598907105294108200 evaluation starts +peer1.org2.example.com | [1ff2 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a420 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ff3 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a420 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1ff4 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [1ff5 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a420 principal evaluation fails +peer1.org2.example.com | [1ff6 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a420 gate 1598907105294108200 evaluation fails +peer1.org2.example.com | [1ff7 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ff8 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [1ff9 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [1ffa 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a990 gate 1598907105294825900 evaluation starts +peer1.org2.example.com | [1ffb 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a990 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [1ffc 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a990 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [1ffd 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a990 principal matched by identity 0 +peer1.org2.example.com | [1ffe 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 34 2b 8c 86 00 9f 4f d6 c5 44 c7 6a 58 39 2f |.4+....O..D.jX9/| +peer1.org2.example.com | 00000010 f4 9a d0 6e 2d 4b 7d 9c ad 4f e1 9b e1 07 64 01 |...n-K}..O....d.| +peer1.org1.example.com | [1dfb 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1dfc 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dfd 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1dfe 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1dff 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e00 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e01 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e02 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e03 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e04 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e05 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e06 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e07 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1e08 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e09 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1e0a 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e0b 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e0c 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1e0d 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1e0e 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1e0f 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450b160 gate 1598907105505404800 evaluation starts +peer1.org1.example.com | [1e10 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450b160 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1e11 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450b160 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1e12 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450b160 principal matched by identity 0 +peer0.org1.example.com | [1d5f 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d60 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d61 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d62 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d63 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [1d64 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [1d65 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d66 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [1d67 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d68 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [1d69 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d6a 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d6b 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1d6c 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d6d 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d6e 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1d6f 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1d70 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1d71 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30270 gate 1598907097723057200 evaluation starts +peer0.org1.example.com | [1d72 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30270 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1d73 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30270 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1d74 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30270 principal matched by identity 0 +peer0.org1.example.com | [1d75 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [1d76 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [1d77 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30270 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1d78 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30270 gate 1598907097723057200 evaluation succeeds +peer0.org1.example.com | [1d79 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d7a 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d7b 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1d7c 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1d7d 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d7e 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d7f 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1d80 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d81 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d82 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1d83 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1d84 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1d85 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b31470 gate 1598907097727299000 evaluation starts +peer0.org1.example.com | [1d86 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b31470 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1d87 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b31470 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1d88 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b31470 principal matched by identity 0 +peer0.org1.example.com | [1d89 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [1d8a 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [1d8b 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b31470 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1d8c 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b31470 gate 1598907097727299000 evaluation succeeds +peer0.org1.example.com | [1d8d 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d8e 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1d8f 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1d90 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1d91 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1d92 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1d93 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d94 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d95 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1d96 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1d97 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d98 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1d99 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1d9a 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1d9b 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1d9c 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b528c0 gate 1598907097733120100 evaluation starts +peer0.org1.example.com | [1d9d 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b528c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1d9e 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b528c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1d9f 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b528c0 principal matched by identity 0 +peer0.org1.example.com | [1da0 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [1fff 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 89 a0 2c 30 68 ba 18 58 fe aa bf |0D. k..,0h..X...| +peer1.org2.example.com | 00000010 dd 82 fd 0b 62 9d cf f0 4f 4a 41 89 2f 92 df df |....b...OJA./...| +peer1.org2.example.com | 00000020 b6 fe 05 b9 02 20 71 5b 28 f1 3f 80 5d 50 f1 75 |..... q[(.?.]P.u| +peer1.org2.example.com | 00000030 24 4e de ff f0 5a 21 f5 68 0e 3b 01 2f ab 21 b1 |$N...Z!.h.;./.!.| +peer1.org2.example.com | 00000040 2a ce 67 76 aa 82 |*.gv..| +peer1.org2.example.com | [2000 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a990 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2001 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a990 gate 1598907105294825900 evaluation succeeds +peer1.org2.example.com | [2002 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2003 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2004 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2005 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2006 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2007 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2008 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2009 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [200a 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [200b 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [200c 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [200d 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [200e 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [200f 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2010 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2011 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2012 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2013 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2014 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2015 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2016 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2017 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2018 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2019 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [201a 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [201b 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [201c 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [201d 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [201e 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [201f 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2020 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2021 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2022 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e13 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 01 f2 a8 1a fe 38 30 2f 92 2c 1f e6 ec cf d6 |".....80/.,.....| +peer1.org1.example.com | 00000010 40 94 76 c2 fa 5b 56 3c 39 87 5c 94 dd 39 1a 76 |@.v..[V<9.\..9.v| +peer1.org1.example.com | [1e14 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 9c 20 56 6e 86 9d 70 90 c4 13 d6 |0D. 5. Vn..p....| +peer1.org1.example.com | 00000010 ce ad df 3d e2 b0 cc bb cf fe 7c 09 f9 8a b1 31 |...=......|....1| +peer1.org1.example.com | 00000020 b9 8d 40 50 02 20 4b fb 92 04 ec 2f ec 3b 1e 52 |..@P. K..../.;.R| +peer1.org1.example.com | 00000030 94 89 4a 5d 1a 09 b8 5a e4 69 1b 24 1c 7b 91 2d |..J]...Z.i.$.{.-| +peer1.org1.example.com | 00000040 be 9e 68 21 12 b8 |..h!..| +peer1.org1.example.com | [1e15 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450b160 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1e16 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00450b160 gate 1598907105505404800 evaluation succeeds +peer1.org1.example.com | [1e17 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e18 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e19 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1e1a 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1e1b 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e1c 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1e1d 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1e1e 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1e1f 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1e20 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e21 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e22 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e23 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [1e24 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e25 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e26 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e27 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1e28 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > alive: +peer1.org1.example.com | [1e29 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e2a 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e2b 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e2c 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e2d 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e2e 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1e2f 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e30 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2140 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2141 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2142 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2143 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2144 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2145 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2146 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421d830 gate 1598907102201156000 evaluation starts +peer0.org2.example.com | [2147 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421d830 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2148 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421d830 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2149 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421d830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [214a 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421d830 principal evaluation fails +peer0.org2.example.com | [214b 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421d830 gate 1598907102201156000 evaluation fails +peer0.org2.example.com | [214c 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [214d 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [214e 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [214f 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421dda0 gate 1598907102202329200 evaluation starts +peer0.org2.example.com | [2150 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421dda0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2151 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421dda0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2152 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421dda0 principal matched by identity 0 +peer0.org2.example.com | [2153 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [2154 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [2155 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421dda0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2156 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00421dda0 gate 1598907102202329200 evaluation succeeds +peer0.org2.example.com | [2157 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2158 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2159 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [215a 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [215b 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [215c 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [215d 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [215e 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [215f 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2160 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2161 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2023 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2024 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2025 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:T-\006" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2026 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:T-\006" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2027 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2028 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:T-\006" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2029 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [202a 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [202b 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [202c 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [202d 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [202e 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [202f 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2030 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2031 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004074a60 gate 1598907105312962300 evaluation starts +peer1.org2.example.com | [2032 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004074a60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2033 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004074a60 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2034 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004074a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2035 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004074a60 principal evaluation fails +peer1.org2.example.com | [2036 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004074a60 gate 1598907105312962300 evaluation fails +peer1.org2.example.com | [2037 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2038 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2039 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [203a 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004074fd0 gate 1598907105314300400 evaluation starts +peer1.org2.example.com | [203b 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004074fd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [203c 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004074fd0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [203d 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004074fd0 principal matched by identity 0 +peer1.org2.example.com | [203e 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 86 51 90 ad 70 39 60 4b a4 ce 69 bc 9d c6 9b |..Q..p9`K..i....| +peer1.org2.example.com | 00000010 92 89 7c 96 ff 00 06 3e 22 f3 ba 2c 28 d2 d0 80 |..|....>"..,(...| +peer1.org2.example.com | [203f 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 4d 3b 6d 79 7e 60 c6 00 9e e3 a2 |0D. .M;my~`.....| +peer1.org2.example.com | 00000010 c1 52 21 aa 00 cf 02 e4 e2 9a dc c7 3d ae c4 ca |.R!.........=...| +peer1.org2.example.com | 00000020 c6 ca 5e 8f 02 20 45 ee 63 2b 12 6c 2f 55 f7 9b |..^.. E.c+.l/U..| +peer1.org2.example.com | 00000030 42 59 0d 6f e6 76 a7 61 35 5f 65 35 45 20 a6 e9 |BY.o.v.a5_e5E ..| +peer1.org2.example.com | 00000040 2c 3d 3e 54 2d 06 |,=>T-.| +peer1.org2.example.com | [2040 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004074fd0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2041 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004074fd0 gate 1598907105314300400 evaluation succeeds +peer1.org2.example.com | [2042 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2043 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2044 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2045 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2046 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2047 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2048 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2049 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [204a 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [204b 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [204c 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [204d 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [204e 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [204f 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2050 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2051 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2052 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2053 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\334\242K\221\363\267\335\373;\t|" > alive: alive:T-\006" > alive: +peer1.org2.example.com | [2054 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2055 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2056 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2057 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2058 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2059 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [205a 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [205b 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1da1 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [1da2 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b528c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1da3 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b528c0 gate 1598907097733120100 evaluation succeeds +peer0.org1.example.com | [1da4 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1da5 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1da6 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1da7 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1da8 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [1da9 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [1daa 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [1dab 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [1dac 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dad 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2162 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2163 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2164 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2165 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2166 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2167 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2168 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423d8e0 gate 1598907102209720800 evaluation starts +peer0.org2.example.com | [2169 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423d8e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [216a 08-31 20:51:42.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423d8e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [216b 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423d8e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [216c 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423d8e0 principal evaluation fails +peer0.org2.example.com | [216d 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423d8e0 gate 1598907102209720800 evaluation fails +peer0.org2.example.com | [216e 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [216f 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2170 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2171 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423de50 gate 1598907102210621500 evaluation starts +peer0.org2.example.com | [2172 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423de50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2173 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423de50 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2174 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423de50 principal matched by identity 0 +peer0.org2.example.com | [2175 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [2176 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [2177 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423de50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2178 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00423de50 gate 1598907102210621500 evaluation succeeds +peer0.org2.example.com | [2179 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [217a 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [217b 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [217c 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [217d 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [217e 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [217f 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2180 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2181 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2182 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2183 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2184 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2185 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004263050 gate 1598907102213646600 evaluation starts +peer0.org2.example.com | [2186 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004263050 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2187 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004263050 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2188 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004263050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2189 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004263050 principal evaluation fails +peer0.org2.example.com | [218a 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004263050 gate 1598907102213646600 evaluation fails +peer0.org2.example.com | [218b 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [218c 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [218d 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [218e 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042635c0 gate 1598907102218419400 evaluation starts +peer0.org2.example.com | [218f 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042635c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2190 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042635c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2191 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042635c0 principal matched by identity 0 +peer0.org2.example.com | [2192 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [2193 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [2194 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042635c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2195 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042635c0 gate 1598907102218419400 evaluation succeeds +peer0.org2.example.com | [2196 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2197 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2198 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2199 08-31 20:51:42.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [219a 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [219b 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [219c 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [219d 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [219e 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [219f 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [21a0 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [21a1 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [21a2 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21a3 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21a4 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [21a5 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [21a6 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [21a7 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [21a8 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [21a9 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1e31 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e32 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e33 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e34 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1e35 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 2c 22 88 84 87 bc 2f d0 86 39 c1 2f d5 e6 8f |.,"..../..9./...| +peer1.org1.example.com | 00000010 5c c5 fc 29 99 64 93 1e cf 55 9a fe 97 fd 20 e3 |\..).d...U.... .| +peer1.org1.example.com | [1e36 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 9b 20 7f fd 09 a8 86 b8 23 5a 9b |0D. .. ......#Z.| +peer1.org1.example.com | 00000010 2c ba 4b ca ec 2b 6e 64 a3 8f 1a 7b 5b 25 60 1b |,.K..+nd...{[%`.| +peer1.org1.example.com | 00000020 82 e8 cf ee 02 20 54 56 07 e8 ae c1 b2 f5 f1 f2 |..... TV........| +peer1.org1.example.com | 00000030 0d 82 e2 38 d4 95 04 c5 d3 94 e2 48 d5 98 22 17 |...8.......H..".| +peer1.org1.example.com | 00000040 d8 69 da dc 89 f4 |.i....| +peer1.org1.example.com | [1e37 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e38 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [1e39 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1e3a 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1e3b 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [1e3c 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e3d 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e3e 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e3f 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e40 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e41 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e42 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1e43 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e44 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [1e45 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e46 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e47 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e48 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e49 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e4a 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e4b 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e4c 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e4d 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e4e 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e4f 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [205c 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [205d 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [205e 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [205f 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2060 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa fe 02 df ac 8e 5b 38 f0 d3 c6 dc 8c 90 06 64 |......[8.......d| +peer1.org2.example.com | 00000010 7e 48 02 36 2b 57 9c c3 9f 16 46 01 5d 89 cc c4 |~H.6+W....F.]...| +peer1.org2.example.com | [2061 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a e3 1a ae 03 7f c1 a2 c4 2c 71 53 |0D. :........,qS| +peer1.org2.example.com | 00000010 a0 3f 52 95 f2 81 8a 14 a0 71 8a 8b ed 13 d1 9e |.?R......q......| +peer1.org2.example.com | 00000020 9c 5d 3b 9a 02 20 35 39 df a2 92 f6 90 5c 4f 26 |.];.. 59.....\O&| +peer1.org2.example.com | 00000030 23 ca bb 19 03 6f f9 d6 fc 4e d7 07 11 69 7d 0a |#....o...N...i}.| +peer1.org2.example.com | 00000040 0f dc 03 bf 09 6f |.....o| +peer1.org2.example.com | [2062 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2063 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2064 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2065 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2066 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2067 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2068 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2069 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [206a 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [206b 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [206c 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [206d 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [206e 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [206f 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2070 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2071 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2072 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2073 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2074 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2075 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2076 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2077 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2078 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1dae 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1daf 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1db0 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1db1 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1db2 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1db3 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1db4 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6a8a0 gate 1598907097744095500 evaluation starts +peer0.org1.example.com | [1db5 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6a8a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1db6 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6a8a0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1db7 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6a8a0 principal matched by identity 0 +peer0.org1.example.com | [1db8 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [1db9 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [1dba 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6a8a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1dbb 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6a8a0 gate 1598907097744095500 evaluation succeeds +peer0.org1.example.com | [1dbc 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1dbd 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1dbe 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1dbf 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1dc0 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dc1 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dc2 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dc3 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dc4 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dc5 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1dc6 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1dc7 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1dc8 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1dc9 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1dca 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1dcb 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6bcf0 gate 1598907097751901200 evaluation starts +peer0.org1.example.com | [1dcc 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6bcf0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1dcd 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6bcf0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1dce 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6bcf0 principal matched by identity 0 +peer0.org1.example.com | [1dcf 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [2079 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [207a 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [207b 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [207c 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [207d 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [207e 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [207f 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2080 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2081 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2082 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 01 f2 a8 1a fe 38 30 2f 92 2c 1f e6 ec cf d6 |".....80/.,.....| +peer1.org2.example.com | 00000010 40 94 76 c2 fa 5b 56 3c 39 87 5c 94 dd 39 1a 76 |@.v..[V<9.\..9.v| +peer1.org2.example.com | [2083 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 9c 20 56 6e 86 9d 70 90 c4 13 d6 |0D. 5. Vn..p....| +peer1.org2.example.com | 00000010 ce ad df 3d e2 b0 cc bb cf fe 7c 09 f9 8a b1 31 |...=......|....1| +peer1.org2.example.com | 00000020 b9 8d 40 50 02 20 4b fb 92 04 ec 2f ec 3b 1e 52 |..@P. K..../.;.R| +peer1.org2.example.com | 00000030 94 89 4a 5d 1a 09 b8 5a e4 69 1b 24 1c 7b 91 2d |..J]...Z.i.$.{.-| +peer1.org2.example.com | 00000040 be 9e 68 21 12 b8 |..h!..| +peer1.org2.example.com | [2084 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [2085 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 90 32 28 25 08 69 f0 77 2d de |0E.!...2(%.i.w-.| +peer1.org2.example.com | 00000010 c4 35 6e a0 66 2e 7c 8d 9a 41 d5 d6 c6 d2 86 73 |.5n.f.|..A.....s| +peer1.org2.example.com | 00000020 69 9d f5 0f 8b 02 20 6a 74 de c0 35 19 a8 83 91 |i..... jt..5....| +peer1.org2.example.com | 00000030 9f 11 2d 08 e1 45 b1 37 18 6f 48 58 03 12 14 58 |..-..E.7.oHX...X| +peer1.org2.example.com | 00000040 b5 3a 17 1d c4 e3 5f |.:...._| +peer1.org2.example.com | [2086 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2087 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [2088 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2089 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [208a 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [208b 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [208c 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [208d 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [208e 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [208f 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2090 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21aa 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004275e30 gate 1598907102223135100 evaluation starts +peer0.org2.example.com | [21ab 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004275e30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [21ac 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004275e30 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [21ad 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004275e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [21ae 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004275e30 principal evaluation fails +peer0.org2.example.com | [21af 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004275e30 gate 1598907102223135100 evaluation fails +peer0.org2.example.com | [21b0 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [21b1 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [21b2 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [21b3 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042943a0 gate 1598907102227400200 evaluation starts +peer0.org2.example.com | [21b4 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042943a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [21b5 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042943a0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [21b6 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042943a0 principal matched by identity 0 +peer0.org2.example.com | [21b7 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [21b8 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [21b9 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042943a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [21ba 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042943a0 gate 1598907102227400200 evaluation succeeds +peer0.org2.example.com | [21bb 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [21bc 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [21bd 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [21be 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [21bf 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [21c0 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [21c1 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21c2 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e50 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e52 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1e51 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e53 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e f6 c9 58 d0 fe 08 f5 24 ca 0e c3 c1 e4 5d a3 |N..X....$.....].| +peer1.org1.example.com | 00000010 96 ab 65 9c e2 45 0b 51 c9 e8 39 b0 a3 05 fa 0f |..e..E.Q..9.....| +peer1.org1.example.com | [1e54 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 8e c8 4f 6a 51 b2 20 05 07 49 f0 |0D. u..OjQ. ..I.| +peer1.org1.example.com | 00000010 e2 7c 00 d5 f8 fa 7b fa 96 fe 1f 0c 3a 9a 55 39 |.|....{.....:.U9| +peer1.org1.example.com | 00000020 96 51 b1 5c 02 20 27 5b 08 bb 01 54 3a 27 0c 38 |.Q.\. '[...T:'.8| +peer1.org1.example.com | 00000030 1d 3a db 7f 80 c9 96 03 3c ee ec 81 91 22 3e 56 |.:......<....">V| +peer1.org1.example.com | 00000040 f8 84 21 6c a3 be |..!l..| +peer1.org1.example.com | [1e55 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e56 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [1e57 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 4c 8b 9d 35 e2 df 5b 11 d0 11 2b |0D. .L..5..[...+| +peer1.org1.example.com | 00000010 58 73 fb c9 a9 ef e4 61 71 26 15 fe 29 f8 aa 5d |Xs.....aq&..)..]| +peer1.org1.example.com | 00000020 0d df c5 7b 02 20 02 a3 4e 47 2f 39 64 75 21 3f |...{. ..NG/9du!?| +peer1.org1.example.com | 00000030 32 3f af 2d 49 b0 8e 08 74 05 9c ce 24 8a 90 c3 |2?.-I...t...$...| +peer1.org1.example.com | 00000040 5b d8 e3 9e df 15 |[.....| +peer1.org1.example.com | [1e58 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [1e59 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [1e5a 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1e5b 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1e5c 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1e5d 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e5e 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e5f 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e60 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1e61 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e62 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e63 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [1e64 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e65 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e66 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1e67 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e68 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e69 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:V\370\204!l\243\276" secret_envelope: > alive: +peer1.org1.example.com | [1e6a 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e6b 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e6c 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e6d 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e6e 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e6f 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e70 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e71 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e72 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [1e73 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e74 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e75 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e76 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [1e77 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e79 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e7a 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e7b 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e78 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e7c 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1e7d 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e7e 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e7f 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e80 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e81 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [21c3 08-31 20:51:42.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [21c4 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [21c5 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [21c6 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [21c7 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [21c8 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [21c9 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004295c90 gate 1598907102230364200 evaluation starts +peer0.org2.example.com | [21ca 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004295c90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [21cb 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004295c90 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [21cc 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004295c90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [21cd 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004295c90 principal evaluation fails +peer0.org2.example.com | [21ce 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004295c90 gate 1598907102230364200 evaluation fails +peer0.org2.example.com | [21cf 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [21d0 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [21d1 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [21d2 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ac200 gate 1598907102231329700 evaluation starts +peer0.org2.example.com | [21d3 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ac200 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [21d4 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ac200 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [21d5 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ac200 principal matched by identity 0 +peer0.org2.example.com | [21d6 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [21d7 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [21d8 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ac200 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [21d9 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ac200 gate 1598907102231329700 evaluation succeeds +peer0.org2.example.com | [21da 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [21db 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [21dc 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [21dd 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [21de 08-31 20:51:42.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21df 08-31 20:51:42.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21e0 08-31 20:51:42.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21e1 08-31 20:51:42.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [21e2 08-31 20:51:42.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21e3 08-31 20:51:42.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21e4 08-31 20:51:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [21e5 08-31 20:51:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [21e6 08-31 20:51:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21e7 08-31 20:51:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [21e8 08-31 20:51:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [21e9 08-31 20:51:42.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21ea 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [21eb 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dd0 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [1dd1 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6bcf0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1dd2 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6bcf0 gate 1598907097751901200 evaluation succeeds +peer0.org1.example.com | [1dd3 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1dd4 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1dd5 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1dd6 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1dd7 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [1dd8 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [1dd9 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dda 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ddb 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1ddc 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1dde 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ddf 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1ddd 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1de0 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1de1 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1de2 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1de3 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1de5 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1de6 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b895e0 gate 1598907097759897500 evaluation starts +peer0.org1.example.com | [1de4 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1de7 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b895e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1de9 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b895e0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1e83 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e84 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e82 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e85 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1e86 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1e87 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1e88 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453fe40 gate 1598907105974701700 evaluation starts +peer1.org1.example.com | [1e89 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453fe40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1e8a 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453fe40 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1e8b 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453fe40 principal matched by identity 0 +peer1.org1.example.com | [1e8c 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [1e8e 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [1e8d 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1e8f 08-31 20:51:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453fe40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1e90 08-31 20:51:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00453fe40 gate 1598907105974701700 evaluation succeeds +peer1.org1.example.com | [1e91 08-31 20:51:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e92 08-31 20:51:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1e93 08-31 20:51:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1e94 08-31 20:51:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1e95 08-31 20:51:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [1e96 08-31 20:51:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [1e97 08-31 20:51:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e98 08-31 20:51:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1e99 08-31 20:51:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1e9a 08-31 20:51:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e9b 08-31 20:51:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1e9c 08-31 20:51:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1e9d 08-31 20:51:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1e9e 08-31 20:51:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1e9f 08-31 20:51:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004599740 gate 1598907105989232900 evaluation starts +peer1.org1.example.com | [1ea0 08-31 20:51:45.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004599740 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ea1 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004599740 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1ea2 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004599740 principal matched by identity 0 +peer1.org1.example.com | [1ea3 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [1ea4 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [1ea5 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004599740 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1ea6 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004599740 gate 1598907105989232900 evaluation succeeds +peer1.org1.example.com | [1ea7 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ea8 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ea9 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1eaa 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1eab 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [1eac 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [1ead 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1eae 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1eaf 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1eb0 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1eb1 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1eb2 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1eb3 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1eb4 08-31 20:51:45.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1eb5 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1eb6 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1eb7 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1eb8 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [1eb9 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1eba 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ebb 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1ebc 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2091 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2092 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [2093 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [2094 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2095 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2096 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2098 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2097 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2099 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [209a 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [209b 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [209c 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [209d 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [209e 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [209f 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [20a0 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [20a1 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e6090 gate 1598907105539809400 evaluation starts +peer1.org2.example.com | [20a2 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e6090 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [20a3 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e6090 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [20a4 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e6090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [20a5 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e6090 principal evaluation fails +peer1.org2.example.com | [20a6 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e6090 gate 1598907105539809400 evaluation fails +peer1.org2.example.com | [20a7 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [20a8 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [20a9 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [20aa 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e6600 gate 1598907105541016100 evaluation starts +peer0.org1.example.com | [1dea 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b895e0 principal matched by identity 0 +peer0.org1.example.com | [1deb 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [1dec 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [1ded 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b895e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1dee 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b895e0 gate 1598907097759897500 evaluation succeeds +peer0.org1.example.com | [1de8 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1def 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1df0 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1df1 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1df2 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1df3 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [1df4 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [1df5 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1df6 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [1df7 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1df8 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1df9 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dfa 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dfb 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1dfc 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dfd 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1dfe 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1dff 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e00 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e01 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [1e02 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e03 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e04 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e05 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e06 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e07 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e08 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e09 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e0a 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e0b 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e0c 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21ec 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21ed 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21ee 08-31 20:51:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [21ef 08-31 20:51:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [21f0 08-31 20:51:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [21f1 08-31 20:51:42.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21f2 08-31 20:51:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [21f3 08-31 20:51:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f 1e 19 ca 91 22 1a 92 f2 51 ae c8 be e0 07 ca |/...."...Q......| +peer0.org2.example.com | 00000010 49 c7 de 1c 49 f3 e7 f6 ec 95 5f 62 e1 5a 4a ba |I...I....._b.ZJ.| +peer0.org2.example.com | [21f4 08-31 20:51:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 61 47 49 de 03 c0 f7 30 ef e1 14 75 |0D. aGI....0...u| +peer0.org2.example.com | 00000010 ac e8 1b 0f 99 50 e0 17 bd 44 6e 0f 2d d4 03 77 |.....P...Dn.-..w| +peer0.org2.example.com | 00000020 32 5c 98 ba 02 20 00 a5 45 cb 02 16 38 f6 f9 e8 |2\... ..E...8...| +peer0.org2.example.com | 00000030 7e a1 30 62 9f 4b a7 e5 ce 5e 81 e9 d7 59 4a 3a |~.0b.K...^...YJ:| +peer0.org2.example.com | 00000040 bb 01 b4 88 59 17 |....Y.| +peer0.org2.example.com | [21f5 08-31 20:51:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21f6 08-31 20:51:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21f7 08-31 20:51:44.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [21f8 08-31 20:51:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [21f9 08-31 20:51:44.26 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [21fa 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [21fb 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [21fc 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [21fd 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [21fe 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [21ff 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2200 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2201 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2202 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 00 5e 32 f1 4e 63 4a 59 bf 46 8f 12 89 5e 9c |..^2.NcJY.F...^.| +peer0.org2.example.com | 00000010 f8 46 db ee 1d b4 2b 09 bc 0f 30 d5 87 9a 6f fd |.F....+...0...o.| +peer0.org2.example.com | [2203 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a cf 17 e8 00 29 88 f4 17 92 b9 48 |0D. .....).....H| +peer0.org2.example.com | 00000010 d6 11 14 84 87 62 8a c9 1e 7c 52 fa aa 10 b1 12 |.....b...|R.....| +peer0.org2.example.com | 00000020 21 1f 8d b1 02 20 4f 16 05 64 35 27 b8 38 99 b3 |!.... O..d5'.8..| +peer0.org2.example.com | 00000030 01 78 cb c9 27 d3 45 12 b0 0c c5 60 35 3b 9b 0e |.x..'.E....`5;..| +peer0.org2.example.com | 00000040 0d 8a 22 30 43 52 |.."0CR| +peer0.org2.example.com | [2204 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2205 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2206 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2207 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2208 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2209 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [220a 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [220b 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [220c 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ebd 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ebe 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1ebf 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1ec0 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1ec1 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ad280 gate 1598907106009015000 evaluation starts +peer1.org1.example.com | [1ec2 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ad280 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ec3 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ad280 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1ec4 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ad280 principal matched by identity 0 +peer1.org1.example.com | [1ec5 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [1ec6 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [1ec7 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ad280 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1ec8 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ad280 gate 1598907106009015000 evaluation succeeds +peer1.org1.example.com | [1ec9 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1eca 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ecb 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1ecc 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1ecd 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [1ece 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [1ecf 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [1ed0 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [1ed1 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ed2 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1ed3 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1ed4 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ed5 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1ed6 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1ed7 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1ed8 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1ed9 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9260 gate 1598907106018104600 evaluation starts +peer1.org2.example.com | [20ab 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e6600 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [20ac 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e6600 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [20ad 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e6600 principal matched by identity 0 +peer1.org2.example.com | [20ae 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 2c 22 88 84 87 bc 2f d0 86 39 c1 2f d5 e6 8f |.,"..../..9./...| +peer1.org2.example.com | 00000010 5c c5 fc 29 99 64 93 1e cf 55 9a fe 97 fd 20 e3 |\..).d...U.... .| +peer1.org2.example.com | [20af 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [20b0 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 9b 20 7f fd 09 a8 86 b8 23 5a 9b |0D. .. ......#Z.| +peer1.org2.example.com | 00000010 2c ba 4b ca ec 2b 6e 64 a3 8f 1a 7b 5b 25 60 1b |,.K..+nd...{[%`.| +peer1.org2.example.com | 00000020 82 e8 cf ee 02 20 54 56 07 e8 ae c1 b2 f5 f1 f2 |..... TV........| +peer1.org2.example.com | 00000030 0d 82 e2 38 d4 95 04 c5 d3 94 e2 48 d5 98 22 17 |...8.......H..".| +peer1.org2.example.com | 00000040 d8 69 da dc 89 f4 |.i....| +peer1.org2.example.com | [20b1 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20b2 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e6600 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [20b3 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040e6600 gate 1598907105541016100 evaluation succeeds +peer1.org2.example.com | [20b5 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [20b4 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20b6 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20b7 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20b8 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20b9 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20ba 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [20bb 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20bc 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [20bd 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [20be 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [20bf 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20c0 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [20c1 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [20c2 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [20c3 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [20c4 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20c5 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20c6 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20c7 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20c8 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20c9 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20ca 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20cb 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20cc 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20cd 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20ce 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [20cf 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20d0 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [20d1 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20d2 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20d3 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20d4 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20d5 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20d6 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20d7 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20d8 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20d9 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20da 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20db 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20dc 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20dd 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [20de 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20df 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [20e0 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [20e1 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [20e2 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [20e3 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [20e4 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [20e5 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [20e6 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [20e7 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [20e8 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [20e9 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [20ea 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412e630 gate 1598907105600312600 evaluation starts +peer1.org2.example.com | [20eb 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412e630 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [20ec 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412e630 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [20ed 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412e630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [220d 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [220e 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [220f 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2210 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2211 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2212 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2213 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2214 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2215 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2216 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2217 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2218 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2219 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [221a 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [221b 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [221c 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [221d 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [221e 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [221f 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2220 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [2221 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2222 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 45 06 e0 3d 9c 66 bc 90 53 b2 a5 53 47 0c 30 |.E..=.f..S..SG.0| +peer0.org2.example.com | 00000010 60 e5 a7 b0 a8 36 c4 ee b1 84 4a f2 05 1e 53 eb |`....6....J...S.| +peer0.org2.example.com | [2223 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 87 1d 29 5e 79 f2 7f 60 bc 9c c4 |0D. V..)^y..`...| +peer0.org2.example.com | 00000010 b7 35 c2 46 5c 8a 97 3e b8 93 24 9d dc c6 0b 16 |.5.F\..>..$.....| +peer0.org2.example.com | 00000020 f8 1f ef 3f 02 20 07 e9 b8 33 0f 23 cc 21 d3 98 |...?. ...3.#.!..| +peer0.org2.example.com | 00000030 9e 12 53 11 24 1d c1 d9 3b 7e eb e5 22 6f 74 cb |..S.$...;~.."ot.| +peer0.org2.example.com | 00000040 80 5e 69 15 de 32 |.^i..2| +peer0.org2.example.com | [2224 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [2225 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 18 03 b0 bb 60 39 cf e6 ee 10 a5 1f |0D. ....`9......| +peer0.org2.example.com | 00000010 c2 5e fc a9 ef 49 c6 e8 0d 71 29 a7 41 8f 37 ab |.^...I...q).A.7.| +peer0.org2.example.com | 00000020 06 81 3b 26 02 20 2f 42 a2 b7 69 2f b2 d4 d6 bb |..;&. /B..i/....| +peer0.org2.example.com | 00000030 7f 8e 31 00 3c a2 28 c3 17 47 15 85 84 9e 61 a6 |..1.<.(..G....a.| +peer0.org2.example.com | 00000040 27 40 ef 01 ee 44 |'@...D| +peer0.org2.example.com | [2226 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2227 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [2228 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2229 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [222a 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [222b 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [222c 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [222d 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [222e 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [222f 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2230 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2231 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2232 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" secret_envelope: > alive: +peer0.org2.example.com | [2233 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [2234 08-31 20:51:45.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2235 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2236 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2237 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2238 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2239 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [223a 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [223b 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [223c 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [223d 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [223e 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [223f 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2240 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2241 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2242 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2243 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2244 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2245 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2246 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2247 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2248 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2249 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [224a 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432a030 gate 1598907105291096900 evaluation starts +peer0.org2.example.com | [224b 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432a030 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [224c 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432a030 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [224d 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432a030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [224e 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432a030 principal evaluation fails +peer0.org2.example.com | [224f 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432a030 gate 1598907105291096900 evaluation fails +peer0.org2.example.com | [2250 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2251 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2252 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2253 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432a5a0 gate 1598907105291385200 evaluation starts +peer0.org2.example.com | [2254 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432a5a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2255 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432a5a0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2256 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432a5a0 principal matched by identity 0 +peer0.org2.example.com | [2257 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 34 2b 8c 86 00 9f 4f d6 c5 44 c7 6a 58 39 2f |.4+....O..D.jX9/| +peer0.org2.example.com | 00000010 f4 9a d0 6e 2d 4b 7d 9c ad 4f e1 9b e1 07 64 01 |...n-K}..O....d.| +peer0.org2.example.com | [2258 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 89 a0 2c 30 68 ba 18 58 fe aa bf |0D. k..,0h..X...| +peer0.org2.example.com | 00000010 dd 82 fd 0b 62 9d cf f0 4f 4a 41 89 2f 92 df df |....b...OJA./...| +peer0.org2.example.com | 00000020 b6 fe 05 b9 02 20 71 5b 28 f1 3f 80 5d 50 f1 75 |..... q[(.?.]P.u| +peer0.org2.example.com | 00000030 24 4e de ff f0 5a 21 f5 68 0e 3b 01 2f ab 21 b1 |$N...Z!.h.;./.!.| +peer0.org2.example.com | 00000040 2a ce 67 76 aa 82 |*.gv..| +peer0.org2.example.com | [2259 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432a5a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [225a 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432a5a0 gate 1598907105291385200 evaluation succeeds +peer0.org2.example.com | [225b 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [225c 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [225d 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [225e 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [225f 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2260 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2261 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2262 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2263 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2264 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2265 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2266 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2267 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2268 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2269 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [226a 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [226b 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [226c 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [226d 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [226e 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [226f 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2270 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2271 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2272 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2273 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2274 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2275 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2276 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2277 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2278 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2279 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e0d 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e0e 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e0f 08-31 20:51:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [1e10 08-31 20:51:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [1e11 08-31 20:51:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [20ee 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412e630 principal evaluation fails +peer1.org2.example.com | [20ef 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412e630 gate 1598907105600312600 evaluation fails +peer1.org2.example.com | [20f0 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [20f1 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [20f2 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [20f3 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412eba0 gate 1598907105602507400 evaluation starts +peer1.org2.example.com | [20f4 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412eba0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [20f5 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412eba0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [20f6 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412eba0 principal matched by identity 0 +peer1.org2.example.com | [20f7 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e f6 c9 58 d0 fe 08 f5 24 ca 0e c3 c1 e4 5d a3 |N..X....$.....].| +peer1.org2.example.com | 00000010 96 ab 65 9c e2 45 0b 51 c9 e8 39 b0 a3 05 fa 0f |..e..E.Q..9.....| +peer1.org2.example.com | [20f8 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 8e c8 4f 6a 51 b2 20 05 07 49 f0 |0D. u..OjQ. ..I.| +peer1.org2.example.com | 00000010 e2 7c 00 d5 f8 fa 7b fa 96 fe 1f 0c 3a 9a 55 39 |.|....{.....:.U9| +peer1.org2.example.com | 00000020 96 51 b1 5c 02 20 27 5b 08 bb 01 54 3a 27 0c 38 |.Q.\. '[...T:'.8| +peer1.org2.example.com | 00000030 1d 3a db 7f 80 c9 96 03 3c ee ec 81 91 22 3e 56 |.:......<....">V| +peer1.org2.example.com | 00000040 f8 84 21 6c a3 be |..!l..| +peer1.org2.example.com | [20f9 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412eba0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [20fa 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412eba0 gate 1598907105602507400 evaluation succeeds +peer1.org2.example.com | [20fb 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [20fc 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [20fd 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [20fe 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [20ff 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2100 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2101 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2102 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2103 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2104 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2105 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2106 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [2107 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2108 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2109 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [210a 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [210b 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:T-\006" > alive: alive:V\370\204!l\243\276" > alive: +peer1.org2.example.com | [210c 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [210d 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [210e 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [210f 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1eda 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9260 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1edb 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9260 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1edc 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9260 principal matched by identity 0 +peer1.org1.example.com | [1edd 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [1ede 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [1edf 08-31 20:51:46.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9260 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1ee0 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d9260 gate 1598907106018104600 evaluation succeeds +peer1.org1.example.com | [1ee1 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ee2 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ee3 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1ee4 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1ee5 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1ee6 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [1ee7 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [1ee8 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [1ee9 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1eea 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1eeb 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1eec 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1eed 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1eee 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1eef 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1ef0 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1ef1 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045facf0 gate 1598907106023661700 evaluation starts +peer1.org1.example.com | [1ef2 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045facf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ef3 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045facf0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1ef4 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045facf0 principal matched by identity 0 +peer1.org1.example.com | [1ef5 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [1ef6 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [1ef7 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045facf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1ef8 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045facf0 gate 1598907106023661700 evaluation succeeds +peer1.org1.example.com | [1ef9 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1efa 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1efb 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1efc 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1efd 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [1efe 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [1eff 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f00 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f01 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1f02 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1f03 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1f04 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1f05 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1f06 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1f07 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046165e0 gate 1598907106024894400 evaluation starts +peer1.org1.example.com | [1f08 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046165e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1f09 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046165e0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1f0a 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046165e0 principal matched by identity 0 +peer1.org1.example.com | [1f0b 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [1f0c 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [1f0d 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046165e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1f0e 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046165e0 gate 1598907106024894400 evaluation succeeds +peer1.org1.example.com | [1f0f 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f10 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f11 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1f12 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1f13 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f14 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f15 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f16 08-31 20:51:46.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2110 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2111 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2112 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2113 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2114 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2115 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2116 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2117 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2118 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2119 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [211a 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [211b 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [211c 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [211d 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [211e 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [211f 08-31 20:51:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2120 08-31 20:51:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2121 08-31 20:51:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2122 08-31 20:51:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [2123 08-31 20:51:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2124 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2125 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2126 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [2127 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2128 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2129 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [212c 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [212a 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [212b 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [212d 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [212e 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2130 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2131 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [212f 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2132 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [2133 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2134 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2135 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2136 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2137 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2138 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [227a 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [227b 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [227c 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [227d 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:T-\006" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [227e 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [227f 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:T-\006" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2280 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2281 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2282 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2283 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2284 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2285 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2286 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2287 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2288 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432bfe0 gate 1598907105319043000 evaluation starts +peer0.org2.example.com | [2289 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432bfe0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [228a 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432bfe0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [228b 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432bfe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [228c 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432bfe0 principal evaluation fails +peer0.org2.example.com | [228d 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00432bfe0 gate 1598907105319043000 evaluation fails +peer0.org2.example.com | [228e 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [228f 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2290 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2291 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435e550 gate 1598907105323125100 evaluation starts +peer0.org2.example.com | [2292 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435e550 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2293 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435e550 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2294 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435e550 principal matched by identity 0 +peer0.org2.example.com | [2295 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 86 51 90 ad 70 39 60 4b a4 ce 69 bc 9d c6 9b |..Q..p9`K..i....| +peer0.org2.example.com | 00000010 92 89 7c 96 ff 00 06 3e 22 f3 ba 2c 28 d2 d0 80 |..|....>"..,(...| +peer0.org2.example.com | [2296 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 4d 3b 6d 79 7e 60 c6 00 9e e3 a2 |0D. .M;my~`.....| +peer0.org2.example.com | 00000010 c1 52 21 aa 00 cf 02 e4 e2 9a dc c7 3d ae c4 ca |.R!.........=...| +peer0.org2.example.com | 00000020 c6 ca 5e 8f 02 20 45 ee 63 2b 12 6c 2f 55 f7 9b |..^.. E.c+.l/U..| +peer0.org2.example.com | 00000030 42 59 0d 6f e6 76 a7 61 35 5f 65 35 45 20 a6 e9 |BY.o.v.a5_e5E ..| +peer0.org2.example.com | 00000040 2c 3d 3e 54 2d 06 |,=>T-.| +peer0.org2.example.com | [2297 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435e550 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2298 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00435e550 gate 1598907105323125100 evaluation succeeds +peer0.org2.example.com | [2299 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [229a 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [229b 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [229c 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [229d 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [229e 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [229f 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [22a0 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [22a1 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [22a2 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22a3 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22a4 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22a5 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [22a6 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22a7 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22a8 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22a9 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [22aa 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:T-\006" > alive:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > alive: +peer0.org2.example.com | [22ab 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [22ac 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22ad 08-31 20:51:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [22ae 08-31 20:51:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [22af 08-31 20:51:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [22b0 08-31 20:51:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [22b1 08-31 20:51:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [22b2 08-31 20:51:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [22b3 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [22b4 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22b5 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [22b6 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22b7 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [22b8 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22b9 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [22ba 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [22bb 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22bc 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [22bd 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [22be 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22bf 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [22c0 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161025 +peer0.org2.example.com | [22c1 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AAFE02DFAC8E5B38F0D3C6DC8C9006647E4802362B579CC39F1646015D89CCC4 +peer0.org2.example.com | [22c2 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [22c3 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [22c4 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [22c5 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1e12 08-31 20:51:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610091801 +peer0.org1.example.com | [1e13 08-31 20:51:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3E871C64DCE9A227BC0B084E760FDBB9D98086AF802AB758F75419B287BD4C2D +peer0.org1.example.com | [1e14 08-31 20:51:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [1e15 08-31 20:51:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e16 08-31 20:51:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e17 08-31 20:51:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e18 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e19 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1e1a 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e1b 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e1c 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e1d 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e1e 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e1f 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e20 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e21 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e22 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1e23 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e24 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1e25 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e26 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e27 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1e28 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1e29 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1e2a 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bd8e00 gate 1598907100023336700 evaluation starts +peer0.org1.example.com | [1e2b 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bd8e00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1e2c 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bd8e00 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1e2d 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bd8e00 principal matched by identity 0 +peer0.org1.example.com | [1e2e 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 7d 67 74 97 c6 df f9 86 6f 84 a2 33 2a 87 87 |M}gt.....o..3*..| +peer0.org1.example.com | 00000010 08 a0 10 ee 46 b1 dc 81 63 a5 59 92 b1 4b e4 69 |....F...c.Y..K.i| +peer0.org1.example.com | [1e2f 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 96 49 6c 76 ad e9 2f e3 fb 97 |0E.!...Ilv../...| +peer0.org1.example.com | 00000010 b2 7c 15 39 77 ab d3 03 2f 3e b2 7a 2d 96 b1 a0 |.|.9w.../>.z-...| +peer0.org1.example.com | 00000020 cd a6 1c 1d 89 02 20 0f ad 0b a2 ee 1a 30 66 88 |...... ......0f.| +peer0.org1.example.com | 00000030 46 20 58 f3 53 f2 09 9a 2b 5a 26 4c 00 79 18 ce |F X.S...+Z&L.y..| +peer0.org1.example.com | 00000040 7f f2 be 5a 8a 9d c6 |...Z...| +peer1.org1.example.com | [1f17 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f18 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f19 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f1a 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f1b 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f1c 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f1d 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f1e 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f1f 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f20 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f21 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f22 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [1f23 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [1f24 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2b e9 28 56 2d 5a 2e 5e e6 15 8f d2 26 5a e2 8e |+.(V-Z.^....&Z..| +peer1.org1.example.com | 00000010 0d 9e 77 ff f2 44 74 2b 35 0c d0 2d ed 5d f7 b0 |..w..Dt+5..-.]..| +peer1.org1.example.com | [1f25 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 93 15 62 86 c8 d4 0d 3b e7 52 11 |0D. ...b....;.R.| +peer1.org1.example.com | 00000010 1f 0a b9 23 48 27 62 3b 64 6e 86 fb f9 a5 70 09 |...#H'b;dn....p.| +peer1.org1.example.com | 00000020 7d 78 2e d4 02 20 55 0b f1 5c b4 4d 80 3f 3d f3 |}x... U..\.M.?=.| +peer1.org1.example.com | 00000030 4e e3 a0 1a 0d 1e b8 b5 68 67 b5 39 ba 52 a6 45 |N.......hg.9.R.E| +peer1.org1.example.com | 00000040 ec 95 ce a5 58 0b |....X.| +peer1.org1.example.com | [1f26 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f27 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f28 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f29 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [1f2a 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f2b 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f2c 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f2d 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f2e 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f2f 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f30 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f31 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f32 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [1f33 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f34 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f35 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f36 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f37 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1f38 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f39 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1f3a 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1f3b 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1f3c 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1f3d 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1f3e 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1f3f 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004652940 gate 1598907109065151700 evaluation starts +peer1.org1.example.com | [1f40 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004652940 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1f41 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004652940 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1f42 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004652940 principal matched by identity 0 +peer1.org1.example.com | [1f43 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 81 8a 58 31 78 c0 66 1a e1 b8 c8 6f 59 ee a7 |...X1x.f....oY..| +peer1.org1.example.com | 00000010 98 7e 6d 00 a7 1c 52 e5 f9 51 65 50 33 33 39 b3 |.~m...R..QeP339.| +peer1.org1.example.com | [1f44 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d8 b0 ee dd 6f 61 1b b4 e3 cf |0E.!......oa....| +peer1.org1.example.com | 00000010 b2 4a 6d 5f b8 7b 34 5b 5f fa b2 4c 25 4c fe 0e |.Jm_.{4[_..L%L..| +peer1.org1.example.com | 00000020 10 60 cf 0d ac 02 20 4a 6c 54 28 40 f3 26 2c cc |.`.... JlT(@.&,.| +peer1.org1.example.com | 00000030 a4 02 dc 4c ad 76 f2 71 6b 11 64 d5 5e c1 39 f4 |...L.v.qk.d.^.9.| +peer1.org1.example.com | 00000040 84 66 1b 38 4d ee 50 |.f.8M.P| +peer1.org1.example.com | [1f45 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004652940 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1f46 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004652940 gate 1598907109065151700 evaluation succeeds +peer1.org1.example.com | [1f47 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f48 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f49 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1f4a 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1f4b 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1f4c 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [1f4d 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [1f4e 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [1f4f 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [1f50 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f51 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f52 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f53 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [1f54 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f55 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f56 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f57 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [22c6 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [22c7 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22c8 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22c9 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22ca 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org2.example.com | [22cc 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22cd 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [22ce 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22cf 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [22d0 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [22d1 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22cb 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [22d2 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [22d3 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22d4 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [22d5 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22d6 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [22d7 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161026 +peer0.org2.example.com | [22d8 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2201F2A81AFE38302F922C1FE6ECCFD6409476C2FA5B563C39875C94DD391A76 +peer0.org2.example.com | [22d9 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [22da 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [22db 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [22dc 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22dd 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [22de 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22df 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [22e0 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22e1 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [22e2 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2139 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411df10 gate 1598907106453531900 evaluation starts +peer1.org2.example.com | [213a 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411df10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [213b 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411df10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [213c 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411df10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [213d 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411df10 principal evaluation fails +peer1.org2.example.com | [213e 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00411df10 gate 1598907106453531900 evaluation fails +peer1.org2.example.com | [213f 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2140 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2141 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2142 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417a480 gate 1598907106454242000 evaluation starts +peer1.org2.example.com | [2143 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417a480 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2144 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417a480 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2145 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417a480 principal matched by identity 0 +peer1.org2.example.com | [2146 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [2147 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [2148 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417a480 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2149 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417a480 gate 1598907106454242000 evaluation succeeds +peer1.org2.example.com | [214a 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [214b 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [214c 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [214d 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [214e 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [214f 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2150 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2151 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2152 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2153 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2154 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2155 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2156 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417b680 gate 1598907106456208800 evaluation starts +peer1.org2.example.com | [2157 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417b680 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2158 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417b680 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2159 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417b680 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [215a 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417b680 principal evaluation fails +peer1.org2.example.com | [215b 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417b680 gate 1598907106456208800 evaluation fails +peer1.org2.example.com | [215c 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [215d 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [215e 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [215f 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417bbf0 gate 1598907106457221900 evaluation starts +peer1.org2.example.com | [2160 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417bbf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2161 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417bbf0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2162 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417bbf0 principal matched by identity 0 +peer1.org2.example.com | [2163 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [2164 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [2165 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417bbf0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2166 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417bbf0 gate 1598907106457221900 evaluation succeeds +peer1.org2.example.com | [2167 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2168 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2169 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [216a 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [216b 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [216c 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [216d 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [216e 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [216f 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2170 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [2171 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2172 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2173 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22e3 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [22e4 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22e5 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [22e6 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22e7 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [22e8 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22e9 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [22ea 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [22eb 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [22ec 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 01 f2 a8 1a fe 38 30 2f 92 2c 1f e6 ec cf d6 |".....80/.,.....| +peer0.org2.example.com | 00000010 40 94 76 c2 fa 5b 56 3c 39 87 5c 94 dd 39 1a 76 |@.v..[V<9.\..9.v| +peer0.org2.example.com | [22ed 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 9c 20 56 6e 86 9d 70 90 c4 13 d6 |0D. 5. Vn..p....| +peer0.org2.example.com | 00000010 ce ad df 3d e2 b0 cc bb cf fe 7c 09 f9 8a b1 31 |...=......|....1| +peer0.org2.example.com | 00000020 b9 8d 40 50 02 20 4b fb 92 04 ec 2f ec 3b 1e 52 |..@P. K..../.;.R| +peer0.org2.example.com | 00000030 94 89 4a 5d 1a 09 b8 5a e4 69 1b 24 1c 7b 91 2d |..J]...Z.i.$.{.-| +peer0.org2.example.com | 00000040 be 9e 68 21 12 b8 |..h!..| +peer0.org2.example.com | [22ee 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [22ef 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 90 32 28 25 08 69 f0 77 2d de |0E.!...2(%.i.w-.| +peer0.org2.example.com | 00000010 c4 35 6e a0 66 2e 7c 8d 9a 41 d5 d6 c6 d2 86 73 |.5n.f.|..A.....s| +peer0.org2.example.com | 00000020 69 9d f5 0f 8b 02 20 6a 74 de c0 35 19 a8 83 91 |i..... jt..5....| +peer0.org2.example.com | 00000030 9f 11 2d 08 e1 45 b1 37 18 6f 48 58 03 12 14 58 |..-..E.7.oHX...X| +peer0.org2.example.com | 00000040 b5 3a 17 1d c4 e3 5f |.:...._| +peer0.org2.example.com | [22f0 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [22f1 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [22f2 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22f3 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22f4 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [22f5 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [22f6 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [22f7 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22f8 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f58 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:V\370\204!l\243\276" > alive: alive: alive: +peer1.org1.example.com | [1f59 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f5a 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f5b 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [1f5c 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f5d 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [1f5e 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f5f 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [1f60 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f61 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f62 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f63 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f64 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f65 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f66 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f67 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f68 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f69 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f6a 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f6b 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f6c 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f6d 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f6e 08-31 20:51:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2174 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2175 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2176 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2177 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2178 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2179 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [217a 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004193e20 gate 1598907106459695800 evaluation starts +peer1.org2.example.com | [217b 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004193e20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [217c 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004193e20 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [217d 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004193e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [217e 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004193e20 principal evaluation fails +peer1.org2.example.com | [217f 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004193e20 gate 1598907106459695800 evaluation fails +peer1.org2.example.com | [2180 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2181 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2182 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2183 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2390 gate 1598907106459972900 evaluation starts +peer1.org2.example.com | [2184 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2390 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2185 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2390 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2186 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2390 principal matched by identity 0 +peer1.org2.example.com | [2187 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [2188 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [2189 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2390 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [218a 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b2390 gate 1598907106459972900 evaluation succeeds +peer1.org2.example.com | [218b 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [218c 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [218d 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [218e 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [218f 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [2190 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [2191 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2192 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [22f9 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [22fa 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [22fb 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [22fc 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [22fd 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [22fe 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [22ff 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bd1f0 gate 1598907105527037900 evaluation starts +peer0.org2.example.com | [2300 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bd1f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2301 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bd1f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2302 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bd1f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2303 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bd1f0 principal evaluation fails +peer0.org2.example.com | [2304 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bd1f0 gate 1598907105527037900 evaluation fails +peer0.org2.example.com | [2305 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2306 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2307 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2308 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bd760 gate 1598907105529584600 evaluation starts +peer0.org2.example.com | [2309 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bd760 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [230a 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bd760 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [230b 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bd760 principal matched by identity 0 +peer0.org2.example.com | [230c 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 eb 45 ca 97 60 4a 9c c3 ed 09 62 33 43 76 98 |7.E..`J....b3Cv.| +peer0.org2.example.com | 00000010 31 69 8e 7c bd a6 46 fe 97 cd 2a 0d b9 8d 2d e2 |1i.|..F...*...-.| +peer0.org2.example.com | [230d 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab f4 bc e5 60 7e 5d 7a 40 a1 77 |0E.!.....`~]z@.w| +peer0.org2.example.com | 00000010 72 25 07 1a aa 90 d0 13 67 09 8c 41 0c 0b 44 db |r%......g..A..D.| +peer0.org2.example.com | 00000020 0e b0 a6 ea c0 02 20 75 18 74 45 d7 ef 3c 5a 29 |...... u.tE.. DEBU 0xc0043bd760 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [230f 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bd760 gate 1598907105529584600 evaluation succeeds +peer0.org2.example.com | [2310 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2311 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2312 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2313 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2314 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2315 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2316 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2317 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 01 f2 a8 1a fe 38 30 2f 92 2c 1f e6 ec cf d6 |".....80/.,.....| +peer0.org2.example.com | 00000010 40 94 76 c2 fa 5b 56 3c 39 87 5c 94 dd 39 1a 76 |@.v..[V<9.\..9.v| +peer0.org2.example.com | [2318 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 9c 20 56 6e 86 9d 70 90 c4 13 d6 |0D. 5. Vn..p....| +peer0.org2.example.com | 00000010 ce ad df 3d e2 b0 cc bb cf fe 7c 09 f9 8a b1 31 |...=......|....1| +peer0.org2.example.com | 00000020 b9 8d 40 50 02 20 4b fb 92 04 ec 2f ec 3b 1e 52 |..@P. K..../.;.R| +peer0.org2.example.com | 00000030 94 89 4a 5d 1a 09 b8 5a e4 69 1b 24 1c 7b 91 2d |..J]...Z.i.$.{.-| +peer0.org2.example.com | 00000040 be 9e 68 21 12 b8 |..h!..| +peer0.org2.example.com | [2319 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [231a 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [231b 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [231c 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [231d 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 45 06 e0 3d 9c 66 bc 90 53 b2 a5 53 47 0c 30 |.E..=.f..S..SG.0| +peer0.org2.example.com | 00000010 60 e5 a7 b0 a8 36 c4 ee b1 84 4a f2 05 1e 53 eb |`....6....J...S.| +peer0.org2.example.com | [231e 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 87 1d 29 5e 79 f2 7f 60 bc 9c c4 |0D. V..)^y..`...| +peer0.org2.example.com | 00000010 b7 35 c2 46 5c 8a 97 3e b8 93 24 9d dc c6 0b 16 |.5.F\..>..$.....| +peer0.org2.example.com | 00000020 f8 1f ef 3f 02 20 07 e9 b8 33 0f 23 cc 21 d3 98 |...?. ...3.#.!..| +peer0.org2.example.com | 00000030 9e 12 53 11 24 1d c1 d9 3b 7e eb e5 22 6f 74 cb |..S.$...;~.."ot.| +peer0.org2.example.com | 00000040 80 5e 69 15 de 32 |.^i..2| +peer0.org2.example.com | [231f 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2320 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2321 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2322 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2323 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2324 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2325 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2326 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2327 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2328 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2329 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [232a 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [232b 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d7e70 gate 1598907105551790700 evaluation starts +peer0.org2.example.com | [232c 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d7e70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [232d 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d7e70 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [232e 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d7e70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [232f 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d7e70 principal evaluation fails +peer0.org2.example.com | [2330 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d7e70 gate 1598907105551790700 evaluation fails +peer0.org2.example.com | [2331 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2332 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2333 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2334 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f23e0 gate 1598907105552069000 evaluation starts +peer0.org2.example.com | [2335 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f23e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2336 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f23e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2337 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f23e0 principal matched by identity 0 +peer0.org2.example.com | [2338 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 86 51 90 ad 70 39 60 4b a4 ce 69 bc 9d c6 9b |..Q..p9`K..i....| +peer0.org2.example.com | 00000010 92 89 7c 96 ff 00 06 3e 22 f3 ba 2c 28 d2 d0 80 |..|....>"..,(...| +peer0.org2.example.com | [2339 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 4d 3b 6d 79 7e 60 c6 00 9e e3 a2 |0D. .M;my~`.....| +peer0.org2.example.com | 00000010 c1 52 21 aa 00 cf 02 e4 e2 9a dc c7 3d ae c4 ca |.R!.........=...| +peer0.org2.example.com | 00000020 c6 ca 5e 8f 02 20 45 ee 63 2b 12 6c 2f 55 f7 9b |..^.. E.c+.l/U..| +peer0.org2.example.com | 00000030 42 59 0d 6f e6 76 a7 61 35 5f 65 35 45 20 a6 e9 |BY.o.v.a5_e5E ..| +peer0.org2.example.com | 00000040 2c 3d 3e 54 2d 06 |,=>T-.| +peer0.org2.example.com | [233a 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f23e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [233b 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f23e0 gate 1598907105552069000 evaluation succeeds +peer0.org2.example.com | [233c 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [233d 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [233e 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1f6f 08-31 20:51:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f70 08-31 20:51:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f71 08-31 20:51:49.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f72 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1f73 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D9816102A +peer1.org1.example.com | [1f74 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8BE1AD291879AB406AE98E72AAE7F382C5747F2DD19D8BD12131F7E5454AF1BC +peer1.org1.example.com | [1f75 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [1f76 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [1f77 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [1f78 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f79 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f7a 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f7b 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f7c 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [1f7d 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f7e 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f7f 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f80 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f81 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f82 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f83 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f84 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f85 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [1f86 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1e30 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bd8e00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1e31 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bd8e00 gate 1598907100023336700 evaluation succeeds +peer0.org1.example.com | [1e32 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e33 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e34 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1e35 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1e36 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e37 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e38 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e39 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1e3a 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1e3b 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1e3c 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1e3d 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e3e 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e3f 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e40 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e41 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e42 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e43 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e44 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e45 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e46 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e47 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e48 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e49 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1e4a 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e4b 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e4c 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1e4d 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e4e 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e4f 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e50 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e51 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e52 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e53 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e54 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2193 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2194 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2195 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2196 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2197 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2198 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2199 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3c80 gate 1598907106461132500 evaluation starts +peer1.org2.example.com | [219a 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3c80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [219b 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3c80 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [219c 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [219d 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3c80 principal evaluation fails +peer1.org2.example.com | [219e 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b3c80 gate 1598907106461132500 evaluation fails +peer1.org2.example.com | [219f 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [21a0 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [21a1 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [21a2 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c81f0 gate 1598907106461396000 evaluation starts +peer1.org2.example.com | [21a3 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c81f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [21a4 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c81f0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [21a5 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c81f0 principal matched by identity 0 +peer1.org2.example.com | [21a6 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [21a7 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [21a8 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c81f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [21a9 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041c81f0 gate 1598907106461396000 evaluation succeeds +peer1.org2.example.com | [21aa 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [21ab 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [21ac 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [21ad 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [21ae 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [21af 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [21b0 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21b1 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [21b2 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [21b3 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [21b4 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21b5 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21b6 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [21b7 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [21b8 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [21b9 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [21ba 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [21bb 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [21bc 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e2370 gate 1598907106466004900 evaluation starts +peer1.org2.example.com | [21bd 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e2370 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [21be 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e2370 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [21bf 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e2370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [21c0 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e2370 principal evaluation fails +peer1.org2.example.com | [21c1 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e2370 gate 1598907106466004900 evaluation fails +peer1.org2.example.com | [21c2 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [21c3 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [21c4 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [21c5 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e28e0 gate 1598907106467619600 evaluation starts +peer1.org2.example.com | [21c6 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e28e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [21c7 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e28e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [21c8 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e28e0 principal matched by identity 0 +peer1.org2.example.com | [21c9 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [21ca 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [21cb 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e28e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [21cc 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e28e0 gate 1598907106467619600 evaluation succeeds +peer1.org2.example.com | [21cd 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [21ce 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [21cf 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [21d0 08-31 20:51:46.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [21d1 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21d2 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f87 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1f88 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1f89 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1f8a 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1f8b 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1f8c 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1f8d 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1f8e 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690af0 gate 1598907109316406500 evaluation starts +peer1.org1.example.com | [1f8f 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690af0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1f90 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690af0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1f91 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690af0 principal matched by identity 0 +peer1.org1.example.com | [1f92 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 01 f2 a8 1a fe 38 30 2f 92 2c 1f e6 ec cf d6 |".....80/.,.....| +peer1.org1.example.com | 00000010 40 94 76 c2 fa 5b 56 3c 39 87 5c 94 dd 39 1a 76 |@.v..[V<9.\..9.v| +peer1.org1.example.com | [1f93 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 9c 20 56 6e 86 9d 70 90 c4 13 d6 |0D. 5. Vn..p....| +peer1.org1.example.com | 00000010 ce ad df 3d e2 b0 cc bb cf fe 7c 09 f9 8a b1 31 |...=......|....1| +peer1.org1.example.com | 00000020 b9 8d 40 50 02 20 4b fb 92 04 ec 2f ec 3b 1e 52 |..@P. K..../.;.R| +peer1.org1.example.com | 00000030 94 89 4a 5d 1a 09 b8 5a e4 69 1b 24 1c 7b 91 2d |..J]...Z.i.$.{.-| +peer1.org1.example.com | 00000040 be 9e 68 21 12 b8 |..h!..| +peer1.org1.example.com | [1f94 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690af0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1f95 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004690af0 gate 1598907109316406500 evaluation succeeds +peer1.org1.example.com | [1f96 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f97 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1f98 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1f99 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1f9a 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1f9b 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1f9c 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1f9d 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e f6 c9 58 d0 fe 08 f5 24 ca 0e c3 c1 e4 5d a3 |N..X....$.....].| +peer1.org1.example.com | 00000010 96 ab 65 9c e2 45 0b 51 c9 e8 39 b0 a3 05 fa 0f |..e..E.Q..9.....| +peer1.org1.example.com | [1f9e 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 8e c8 4f 6a 51 b2 20 05 07 49 f0 |0D. u..OjQ. ..I.| +peer1.org1.example.com | 00000010 e2 7c 00 d5 f8 fa 7b fa 96 fe 1f 0c 3a 9a 55 39 |.|....{.....:.U9| +peer1.org1.example.com | 00000020 96 51 b1 5c 02 20 27 5b 08 bb 01 54 3a 27 0c 38 |.Q.\. '[...T:'.8| +peer1.org1.example.com | 00000030 1d 3a db 7f 80 c9 96 03 3c ee ec 81 91 22 3e 56 |.:......<....">V| +peer1.org1.example.com | 00000040 f8 84 21 6c a3 be |..!l..| +peer1.org1.example.com | [1f9f 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1fa0 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fa1 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1fa2 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e1 ad 29 18 79 ab 40 6a e9 8e 72 aa e7 f3 82 |...).y.@j..r....| +peer1.org1.example.com | 00000010 c5 74 7f 2d d1 9d 8b d1 21 31 f7 e5 45 4a f1 bc |.t.-....!1..EJ..| +peer1.org2.example.com | [21d3 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [21d4 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [21d5 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [21d6 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [21d7 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [21d8 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [21d9 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e3ae0 gate 1598907106471544600 evaluation starts +peer1.org2.example.com | [21da 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e3ae0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [21db 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e3ae0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [21dc 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e3ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [21dd 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e3ae0 principal evaluation fails +peer1.org2.example.com | [21de 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041e3ae0 gate 1598907106471544600 evaluation fails +peer1.org2.example.com | [21df 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [21e0 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [21e1 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [21e2 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004200050 gate 1598907106472888000 evaluation starts +peer1.org2.example.com | [21e3 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004200050 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [21e4 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004200050 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [21e5 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004200050 principal matched by identity 0 +peer1.org2.example.com | [21e6 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [21e7 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [21e8 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004200050 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [21e9 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004200050 gate 1598907106472888000 evaluation succeeds +peer1.org2.example.com | [21ea 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [21eb 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [21ec 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [21ed 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [21ee 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [21ef 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [21f0 08-31 20:51:46.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21f1 08-31 20:51:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21f2 08-31 20:51:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21f3 08-31 20:51:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [21f4 08-31 20:51:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21f5 08-31 20:51:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [21f6 08-31 20:51:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [21f7 08-31 20:51:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [21f8 08-31 20:51:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21f9 08-31 20:51:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [21fa 08-31 20:51:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [21fb 08-31 20:51:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [21fc 08-31 20:51:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [21fd 08-31 20:51:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [21fe 08-31 20:51:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [21ff 08-31 20:51:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [2200 08-31 20:51:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2201 08-31 20:51:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [2202 08-31 20:51:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2203 08-31 20:51:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2204 08-31 20:51:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2205 08-31 20:51:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2206 08-31 20:51:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2207 08-31 20:51:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2208 08-31 20:51:48.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2209 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [220a 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [220b 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [220c 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [220d 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [220e 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [220f 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2210 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2211 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2212 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2213 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2214 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2215 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161029 +peer1.org2.example.com | [2216 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 95818A583178C0661AE1B8C86F59EEA7987E6D00A71C52E5F9516550333339B3 +peer1.org2.example.com | [2217 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2218 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [233f 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2340 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2341 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2342 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2343 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 01 f2 a8 1a fe 38 30 2f 92 2c 1f e6 ec cf d6 |".....80/.,.....| +peer0.org2.example.com | 00000010 40 94 76 c2 fa 5b 56 3c 39 87 5c 94 dd 39 1a 76 |@.v..[V<9.\..9.v| +peer0.org2.example.com | [2344 08-31 20:51:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 9c 20 56 6e 86 9d 70 90 c4 13 d6 |0D. 5. Vn..p....| +peer0.org2.example.com | 00000010 ce ad df 3d e2 b0 cc bb cf fe 7c 09 f9 8a b1 31 |...=......|....1| +peer0.org2.example.com | 00000020 b9 8d 40 50 02 20 4b fb 92 04 ec 2f ec 3b 1e 52 |..@P. K..../.;.R| +peer0.org2.example.com | 00000030 94 89 4a 5d 1a 09 b8 5a e4 69 1b 24 1c 7b 91 2d |..J]...Z.i.$.{.-| +peer0.org2.example.com | 00000040 be 9e 68 21 12 b8 |..h!..| +peer0.org2.example.com | [2345 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2346 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2347 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2348 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2349 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [234a 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [234b 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [234c 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [234d 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [234e 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [234f 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2350 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2351 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2352 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2353 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2354 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2355 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 45 06 e0 3d 9c 66 bc 90 53 b2 a5 53 47 0c 30 |.E..=.f..S..SG.0| +peer0.org2.example.com | 00000010 60 e5 a7 b0 a8 36 c4 ee b1 84 4a f2 05 1e 53 eb |`....6....J...S.| +peer0.org2.example.com | [2356 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 87 1d 29 5e 79 f2 7f 60 bc 9c c4 |0D. V..)^y..`...| +peer0.org2.example.com | 00000010 b7 35 c2 46 5c 8a 97 3e b8 93 24 9d dc c6 0b 16 |.5.F\..>..$.....| +peer0.org2.example.com | 00000020 f8 1f ef 3f 02 20 07 e9 b8 33 0f 23 cc 21 d3 98 |...?. ...3.#.!..| +peer0.org2.example.com | 00000030 9e 12 53 11 24 1d c1 d9 3b 7e eb e5 22 6f 74 cb |..S.$...;~.."ot.| +peer0.org2.example.com | 00000040 80 5e 69 15 de 32 |.^i..2| +peer0.org2.example.com | [2357 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2358 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2359 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [235a 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [235b 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [235c 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fa3 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 cc 45 75 d1 90 0d ae 8f b3 b9 00 |0D. '.Eu........| +peer1.org1.example.com | 00000010 eb 7a bf d7 c1 d2 9b aa 08 e6 29 54 aa d1 49 a6 |.z........)T..I.| +peer1.org1.example.com | 00000020 45 28 ed cb 02 20 42 99 45 f1 b0 c4 5c 25 51 a1 |E(... B.E...\%Q.| +peer1.org1.example.com | 00000030 6c 01 8d a7 37 8c e3 55 09 ee 7d 91 68 d1 f1 f9 |l...7..U..}.h...| +peer1.org1.example.com | 00000040 b9 a7 ad c3 90 cd |......| +peer1.org1.example.com | [1fa4 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1fa5 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1fa6 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fa7 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fa8 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fa9 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1faa 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fab 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fac 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1fad 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e1 ad 29 18 79 ab 40 6a e9 8e 72 aa e7 f3 82 |...).y.@j..r....| +peer1.org1.example.com | 00000010 c5 74 7f 2d d1 9d 8b d1 21 31 f7 e5 45 4a f1 bc |.t.-....!1..EJ..| +peer1.org1.example.com | [1fae 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 cc 45 75 d1 90 0d ae 8f b3 b9 00 |0D. '.Eu........| +peer1.org1.example.com | 00000010 eb 7a bf d7 c1 d2 9b aa 08 e6 29 54 aa d1 49 a6 |.z........)T..I.| +peer1.org1.example.com | 00000020 45 28 ed cb 02 20 42 99 45 f1 b0 c4 5c 25 51 a1 |E(... B.E...\%Q.| +peer1.org1.example.com | 00000030 6c 01 8d a7 37 8c e3 55 09 ee 7d 91 68 d1 f1 f9 |l...7..U..}.h...| +peer1.org1.example.com | 00000040 b9 a7 ad c3 90 cd |......| +peer1.org1.example.com | [1faf 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1fb0 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1fb1 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fb2 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [1fb3 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fb4 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1fb5 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1fb6 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1fb7 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1fb8 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1fb9 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1fba 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046778e0 gate 1598907109319913600 evaluation starts +peer1.org1.example.com | [1fbb 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046778e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1fbc 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046778e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [235d 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [235e 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [235f 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2360 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2361 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2362 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2363 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004418ab0 gate 1598907105567691000 evaluation starts +peer0.org2.example.com | [2364 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004418ab0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2365 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004418ab0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2366 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004418ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2367 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004418ab0 principal evaluation fails +peer0.org2.example.com | [2368 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004418ab0 gate 1598907105567691000 evaluation fails +peer0.org2.example.com | [2369 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [236a 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [236b 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [236c 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004419020 gate 1598907105568646500 evaluation starts +peer0.org2.example.com | [236d 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004419020 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [236e 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004419020 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [236f 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004419020 principal matched by identity 0 +peer0.org2.example.com | [2370 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b0 2c 22 88 84 87 bc 2f d0 86 39 c1 2f d5 e6 8f |.,"..../..9./...| +peer0.org2.example.com | 00000010 5c c5 fc 29 99 64 93 1e cf 55 9a fe 97 fd 20 e3 |\..).d...U.... .| +peer0.org2.example.com | [2371 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0a 9b 20 7f fd 09 a8 86 b8 23 5a 9b |0D. .. ......#Z.| +peer0.org2.example.com | 00000010 2c ba 4b ca ec 2b 6e 64 a3 8f 1a 7b 5b 25 60 1b |,.K..+nd...{[%`.| +peer0.org2.example.com | 00000020 82 e8 cf ee 02 20 54 56 07 e8 ae c1 b2 f5 f1 f2 |..... TV........| +peer0.org2.example.com | 00000030 0d 82 e2 38 d4 95 04 c5 d3 94 e2 48 d5 98 22 17 |...8.......H..".| +peer0.org2.example.com | 00000040 d8 69 da dc 89 f4 |.i....| +peer0.org2.example.com | [2372 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004419020 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2373 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004419020 gate 1598907105568646500 evaluation succeeds +peer0.org2.example.com | [2374 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2375 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2376 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2377 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2378 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2379 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [237a 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [237b 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [237c 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [237d 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [237e 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [237f 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2380 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2381 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2219 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [221a 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [221b 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [221c 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [221d 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [221e 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [221f 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2220 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2221 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [2222 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2223 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2224 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2225 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2226 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2227 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2228 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2229 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [222a 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [222b 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [222c 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2382 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2384 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2383 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2385 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2386 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2387 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2388 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2389 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [238a 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [238b 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [238c 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [238d 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [238e 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [238f 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2390 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2391 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2392 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2393 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2394 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2395 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2396 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2397 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2398 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2399 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [239a 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [239b 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [239c 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [239d 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [239e 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [239f 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [23a0 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [23a1 08-31 20:51:45.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [23a2 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044355b0 gate 1598907105610671100 evaluation starts +peer0.org2.example.com | [23a3 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044355b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [23a4 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044355b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [23a5 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044355b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [23a6 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044355b0 principal evaluation fails +peer0.org2.example.com | [23a7 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044355b0 gate 1598907105610671100 evaluation fails +peer0.org2.example.com | [23a8 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [23a9 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [23aa 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [23ab 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004435b20 gate 1598907105611909400 evaluation starts +peer0.org2.example.com | [23ac 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004435b20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [23ad 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004435b20 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [23ae 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004435b20 principal matched by identity 0 +peer0.org2.example.com | [23af 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e f6 c9 58 d0 fe 08 f5 24 ca 0e c3 c1 e4 5d a3 |N..X....$.....].| +peer0.org2.example.com | 00000010 96 ab 65 9c e2 45 0b 51 c9 e8 39 b0 a3 05 fa 0f |..e..E.Q..9.....| +peer0.org2.example.com | [23b0 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 8e c8 4f 6a 51 b2 20 05 07 49 f0 |0D. u..OjQ. ..I.| +peer0.org2.example.com | 00000010 e2 7c 00 d5 f8 fa 7b fa 96 fe 1f 0c 3a 9a 55 39 |.|....{.....:.U9| +peer0.org2.example.com | 00000020 96 51 b1 5c 02 20 27 5b 08 bb 01 54 3a 27 0c 38 |.Q.\. '[...T:'.8| +peer0.org2.example.com | 00000030 1d 3a db 7f 80 c9 96 03 3c ee ec 81 91 22 3e 56 |.:......<....">V| +peer0.org2.example.com | 00000040 f8 84 21 6c a3 be |..!l..| +peer0.org2.example.com | [23b1 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004435b20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [23b2 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004435b20 gate 1598907105611909400 evaluation succeeds +peer0.org2.example.com | [23b3 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [23b4 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [23b5 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [23b6 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [23b7 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [23b8 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [23b9 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [23ba 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [23bb 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [23bc 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23bd 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23be 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23bf 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [23c0 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23c1 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23c2 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23c3 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [23c4 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [23c5 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [222d 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [222e 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [222f 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2230 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2231 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2232 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2233 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004246150 gate 1598907109082826100 evaluation starts +peer1.org2.example.com | [2234 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004246150 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2235 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004246150 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2236 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004246150 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2237 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004246150 principal evaluation fails +peer1.org2.example.com | [2238 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004246150 gate 1598907109082826100 evaluation fails +peer1.org2.example.com | [2239 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [223a 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [223b 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [223c 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042466c0 gate 1598907109084326900 evaluation starts +peer1.org2.example.com | [223d 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042466c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [223e 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042466c0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [223f 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042466c0 principal matched by identity 0 +peer1.org2.example.com | [2240 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e f6 c9 58 d0 fe 08 f5 24 ca 0e c3 c1 e4 5d a3 |N..X....$.....].| +peer1.org2.example.com | 00000010 96 ab 65 9c e2 45 0b 51 c9 e8 39 b0 a3 05 fa 0f |..e..E.Q..9.....| +peer1.org2.example.com | [2241 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 8e c8 4f 6a 51 b2 20 05 07 49 f0 |0D. u..OjQ. ..I.| +peer1.org2.example.com | 00000010 e2 7c 00 d5 f8 fa 7b fa 96 fe 1f 0c 3a 9a 55 39 |.|....{.....:.U9| +peer1.org2.example.com | 00000020 96 51 b1 5c 02 20 27 5b 08 bb 01 54 3a 27 0c 38 |.Q.\. '[...T:'.8| +peer1.org2.example.com | 00000030 1d 3a db 7f 80 c9 96 03 3c ee ec 81 91 22 3e 56 |.:......<....">V| +peer1.org2.example.com | 00000040 f8 84 21 6c a3 be |..!l..| +peer1.org2.example.com | [2242 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042466c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2243 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042466c0 gate 1598907109084326900 evaluation succeeds +peer1.org2.example.com | [2244 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2245 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2246 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2247 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2248 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2249 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [224a 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [224b 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 01 f2 a8 1a fe 38 30 2f 92 2c 1f e6 ec cf d6 |".....80/.,.....| +peer1.org2.example.com | 00000010 40 94 76 c2 fa 5b 56 3c 39 87 5c 94 dd 39 1a 76 |@.v..[V<9.\..9.v| +peer1.org2.example.com | [224c 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 9c 20 56 6e 86 9d 70 90 c4 13 d6 |0D. 5. Vn..p....| +peer1.org2.example.com | 00000010 ce ad df 3d e2 b0 cc bb cf fe 7c 09 f9 8a b1 31 |...=......|....1| +peer1.org2.example.com | 00000020 b9 8d 40 50 02 20 4b fb 92 04 ec 2f ec 3b 1e 52 |..@P. K..../.;.R| +peer1.org2.example.com | 00000030 94 89 4a 5d 1a 09 b8 5a e4 69 1b 24 1c 7b 91 2d |..J]...Z.i.$.{.-| +peer1.org2.example.com | 00000040 be 9e 68 21 12 b8 |..h!..| +peer1.org2.example.com | [224d 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [224e 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fbd 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046778e0 principal matched by identity 0 +peer1.org1.example.com | [1fbe 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 81 8a 58 31 78 c0 66 1a e1 b8 c8 6f 59 ee a7 |...X1x.f....oY..| +peer1.org1.example.com | 00000010 98 7e 6d 00 a7 1c 52 e5 f9 51 65 50 33 33 39 b3 |.~m...R..QeP339.| +peer1.org1.example.com | [1fbf 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d8 b0 ee dd 6f 61 1b b4 e3 cf |0E.!......oa....| +peer1.org1.example.com | 00000010 b2 4a 6d 5f b8 7b 34 5b 5f fa b2 4c 25 4c fe 0e |.Jm_.{4[_..L%L..| +peer1.org1.example.com | 00000020 10 60 cf 0d ac 02 20 4a 6c 54 28 40 f3 26 2c cc |.`.... JlT(@.&,.| +peer1.org1.example.com | 00000030 a4 02 dc 4c ad 76 f2 71 6b 11 64 d5 5e c1 39 f4 |...L.v.qk.d.^.9.| +peer1.org1.example.com | 00000040 84 66 1b 38 4d ee 50 |.f.8M.P| +peer1.org1.example.com | [1fc0 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046778e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1fc1 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046778e0 gate 1598907109319913600 evaluation succeeds +peer1.org1.example.com | [1fc2 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1fc3 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1fc4 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1fc5 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1fc6 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [1fc7 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fc8 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [1fc9 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e f6 c9 58 d0 fe 08 f5 24 ca 0e c3 c1 e4 5d a3 |N..X....$.....].| +peer1.org1.example.com | 00000010 96 ab 65 9c e2 45 0b 51 c9 e8 39 b0 a3 05 fa 0f |..e..E.Q..9.....| +peer1.org1.example.com | [1fca 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 8e c8 4f 6a 51 b2 20 05 07 49 f0 |0D. u..OjQ. ..I.| +peer1.org1.example.com | 00000010 e2 7c 00 d5 f8 fa 7b fa 96 fe 1f 0c 3a 9a 55 39 |.|....{.....:.U9| +peer1.org1.example.com | 00000020 96 51 b1 5c 02 20 27 5b 08 bb 01 54 3a 27 0c 38 |.Q.\. '[...T:'.8| +peer1.org1.example.com | 00000030 1d 3a db 7f 80 c9 96 03 3c ee ec 81 91 22 3e 56 |.:......<....">V| +peer1.org1.example.com | 00000040 f8 84 21 6c a3 be |..!l..| +peer1.org1.example.com | [1fcb 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1fcc 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fcd 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fce 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fcf 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fd0 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fd1 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fd2 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [1fd3 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e1 ad 29 18 79 ab 40 6a e9 8e 72 aa e7 f3 82 |...).y.@j..r....| +peer1.org1.example.com | 00000010 c5 74 7f 2d d1 9d 8b d1 21 31 f7 e5 45 4a f1 bc |.t.-....!1..EJ..| +peer1.org1.example.com | [1fd4 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 cc 45 75 d1 90 0d ae 8f b3 b9 00 |0D. '.Eu........| +peer1.org1.example.com | 00000010 eb 7a bf d7 c1 d2 9b aa 08 e6 29 54 aa d1 49 a6 |.z........)T..I.| +peer1.org1.example.com | 00000020 45 28 ed cb 02 20 42 99 45 f1 b0 c4 5c 25 51 a1 |E(... B.E...\%Q.| +peer1.org1.example.com | 00000030 6c 01 8d a7 37 8c e3 55 09 ee 7d 91 68 d1 f1 f9 |l...7..U..}.h...| +peer1.org1.example.com | 00000040 b9 a7 ad c3 90 cd |......| +peer1.org1.example.com | [1fd5 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [1fd6 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 99 14 1e e3 48 5d 73 92 96 81 |0E.!......H]s...| +peer1.org1.example.com | 00000010 59 be 9b 17 b3 67 0b 82 9f cf 18 a8 e9 11 39 c5 |Y....g........9.| +peer1.org1.example.com | 00000020 d8 a5 7e a2 cc 02 20 13 f2 b6 22 cc 22 4a a7 e1 |..~... ..."."J..| +peer1.org1.example.com | 00000030 1a 2e ba 68 8e 3a d5 f4 87 9f 83 35 b3 ca 05 b6 |...h.:.....5....| +peer1.org1.example.com | 00000040 15 2d 56 60 73 a4 9d |.-V`s..| +peer1.org1.example.com | [1fd7 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1fd8 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [1fd9 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fda 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fdb 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fdc 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fdd 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [224f 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2250 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 81 8a 58 31 78 c0 66 1a e1 b8 c8 6f 59 ee a7 |...X1x.f....oY..| +peer1.org2.example.com | 00000010 98 7e 6d 00 a7 1c 52 e5 f9 51 65 50 33 33 39 b3 |.~m...R..QeP339.| +peer1.org2.example.com | [2251 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d8 b0 ee dd 6f 61 1b b4 e3 cf |0E.!......oa....| +peer1.org2.example.com | 00000010 b2 4a 6d 5f b8 7b 34 5b 5f fa b2 4c 25 4c fe 0e |.Jm_.{4[_..L%L..| +peer1.org2.example.com | 00000020 10 60 cf 0d ac 02 20 4a 6c 54 28 40 f3 26 2c cc |.`.... JlT(@.&,.| +peer1.org2.example.com | 00000030 a4 02 dc 4c ad 76 f2 71 6b 11 64 d5 5e c1 39 f4 |...L.v.qk.d.^.9.| +peer1.org2.example.com | 00000040 84 66 1b 38 4d ee 50 |.f.8M.P| +peer1.org2.example.com | [2252 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2253 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2254 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2255 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2256 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [2257 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2258 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2259 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [225a 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 81 8a 58 31 78 c0 66 1a e1 b8 c8 6f 59 ee a7 |...X1x.f....oY..| +peer1.org2.example.com | 00000010 98 7e 6d 00 a7 1c 52 e5 f9 51 65 50 33 33 39 b3 |.~m...R..QeP339.| +peer1.org2.example.com | [225b 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d8 b0 ee dd 6f 61 1b b4 e3 cf |0E.!......oa....| +peer1.org2.example.com | 00000010 b2 4a 6d 5f b8 7b 34 5b 5f fa b2 4c 25 4c fe 0e |.Jm_.{4[_..L%L..| +peer1.org2.example.com | 00000020 10 60 cf 0d ac 02 20 4a 6c 54 28 40 f3 26 2c cc |.`.... JlT(@.&,.| +peer1.org2.example.com | 00000030 a4 02 dc 4c ad 76 f2 71 6b 11 64 d5 5e c1 39 f4 |...L.v.qk.d.^.9.| +peer1.org2.example.com | 00000040 84 66 1b 38 4d ee 50 |.f.8M.P| +peer1.org2.example.com | [225c 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [225d 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 a6 e4 74 d4 41 75 69 56 e9 ca |0E.!....t.AuiV..| +peer1.org2.example.com | 00000010 78 d2 8c 8a 6e 88 41 cf 1d 2c 6f 09 a9 fd 95 89 |x...n.A..,o.....| +peer1.org2.example.com | 00000020 87 fa 45 15 52 02 20 6d b2 7a a1 5a dd 4d 19 32 |..E.R. m.z.Z.M.2| +peer1.org2.example.com | 00000030 ac 1b 98 31 b6 5f bd 90 9d 76 a9 6a c2 f4 d3 63 |...1._...v.j...c| +peer1.org2.example.com | 00000040 57 3b 4e ee 26 13 b2 |W;N.&..| +peer1.org2.example.com | [225e 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [225f 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [2260 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2261 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2262 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2263 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2264 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2265 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2266 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2267 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2268 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2269 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [226a 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [226b 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [226c 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004274000 gate 1598907109093055500 evaluation starts +peer1.org2.example.com | [226d 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004274000 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [226e 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004274000 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [226f 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004274000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2270 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004274000 principal evaluation fails +peer1.org2.example.com | [2271 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004274000 gate 1598907109093055500 evaluation fails +peer1.org2.example.com | [2272 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2273 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2274 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2275 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004274570 gate 1598907109093426500 evaluation starts +peer1.org2.example.com | [2276 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004274570 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2277 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004274570 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2278 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004274570 principal matched by identity 0 +peer1.org2.example.com | [2279 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 86 51 90 ad 70 39 60 4b a4 ce 69 bc 9d c6 9b |..Q..p9`K..i....| +peer1.org2.example.com | 00000010 92 89 7c 96 ff 00 06 3e 22 f3 ba 2c 28 d2 d0 80 |..|....>"..,(...| +peer1.org2.example.com | [227a 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 4d 3b 6d 79 7e 60 c6 00 9e e3 a2 |0D. .M;my~`.....| +peer1.org2.example.com | 00000010 c1 52 21 aa 00 cf 02 e4 e2 9a dc c7 3d ae c4 ca |.R!.........=...| +peer1.org2.example.com | 00000020 c6 ca 5e 8f 02 20 45 ee 63 2b 12 6c 2f 55 f7 9b |..^.. E.c+.l/U..| +peer1.org2.example.com | 00000030 42 59 0d 6f e6 76 a7 61 35 5f 65 35 45 20 a6 e9 |BY.o.v.a5_e5E ..| +peer1.org2.example.com | 00000040 2c 3d 3e 54 2d 06 |,=>T-.| +peer1.org2.example.com | [227b 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004274570 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [227c 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004274570 gate 1598907109093426500 evaluation succeeds +peer1.org2.example.com | [227d 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [227e 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [227f 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2280 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2281 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2282 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2283 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2284 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 01 f2 a8 1a fe 38 30 2f 92 2c 1f e6 ec cf d6 |".....80/.,.....| +peer1.org2.example.com | 00000010 40 94 76 c2 fa 5b 56 3c 39 87 5c 94 dd 39 1a 76 |@.v..[V<9.\..9.v| +peer1.org2.example.com | [2285 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 9c 20 56 6e 86 9d 70 90 c4 13 d6 |0D. 5. Vn..p....| +peer1.org2.example.com | 00000010 ce ad df 3d e2 b0 cc bb cf fe 7c 09 f9 8a b1 31 |...=......|....1| +peer1.org2.example.com | 00000020 b9 8d 40 50 02 20 4b fb 92 04 ec 2f ec 3b 1e 52 |..@P. K..../.;.R| +peer1.org2.example.com | 00000030 94 89 4a 5d 1a 09 b8 5a e4 69 1b 24 1c 7b 91 2d |..J]...Z.i.$.{.-| +peer1.org2.example.com | 00000040 be 9e 68 21 12 b8 |..h!..| +peer1.org2.example.com | [2286 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2287 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2288 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2289 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 81 8a 58 31 78 c0 66 1a e1 b8 c8 6f 59 ee a7 |...X1x.f....oY..| +peer1.org2.example.com | 00000010 98 7e 6d 00 a7 1c 52 e5 f9 51 65 50 33 33 39 b3 |.~m...R..QeP339.| +peer1.org2.example.com | [228a 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d8 b0 ee dd 6f 61 1b b4 e3 cf |0E.!......oa....| +peer1.org2.example.com | 00000010 b2 4a 6d 5f b8 7b 34 5b 5f fa b2 4c 25 4c fe 0e |.Jm_.{4[_..L%L..| +peer1.org2.example.com | 00000020 10 60 cf 0d ac 02 20 4a 6c 54 28 40 f3 26 2c cc |.`.... JlT(@.&,.| +peer1.org2.example.com | 00000030 a4 02 dc 4c ad 76 f2 71 6b 11 64 d5 5e c1 39 f4 |...L.v.qk.d.^.9.| +peer1.org2.example.com | 00000040 84 66 1b 38 4d ee 50 |.f.8M.P| +peer1.org2.example.com | [228b 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [228c 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [228d 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [228e 08-31 20:51:49.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [228f 08-31 20:51:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [2290 08-31 20:51:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [2291 08-31 20:51:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2292 08-31 20:51:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D9816100B1801 +peer1.org2.example.com | [2293 08-31 20:51:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3720BB95D4124C132017BA7BB34FE0A3AF1773A839DC0146864BDC4C6F264B1B +peer1.org2.example.com | [2294 08-31 20:51:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [2295 08-31 20:51:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2296 08-31 20:51:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2297 08-31 20:51:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2298 08-31 20:51:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2299 08-31 20:51:49.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [229a 08-31 20:51:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [229b 08-31 20:51:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [229c 08-31 20:51:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [229d 08-31 20:51:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [229e 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [229f 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [22a0 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [22a1 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22a2 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22a3 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22a4 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22a5 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22a6 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22a7 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [22a8 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22a9 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [22aa 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [22ab 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22ac 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [22ad 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [22ae 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e55 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e56 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e57 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e58 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1e59 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a e1 40 6b d4 cf b4 c3 0c e0 54 3f fe 70 3b bb |J.@k......T?.p;.| +peer0.org1.example.com | 00000010 47 a3 10 69 29 01 50 d2 ac ed 74 75 df ec 4d 0c |G..i).P...tu..M.| +peer0.org1.example.com | [1e5a 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 59 90 7b bb ca 94 33 40 80 e0 e0 |0D. .Y.{...3@...| +peer0.org1.example.com | 00000010 34 da 7f 8d bc 17 22 cb 0f 9b 44 41 a3 2a 04 d4 |4....."...DA.*..| +peer0.org1.example.com | 00000020 ea 89 5c c7 02 20 70 7d c3 ff c5 be b2 29 8d a7 |..\.. p}.....)..| +peer0.org1.example.com | 00000030 1c f6 ed 56 24 b3 e8 4c f2 6d 49 90 11 65 72 97 |...V$..L.mI..er.| +peer0.org1.example.com | 00000040 23 6f cf 7b 34 3d |#o.{4=| +peer0.org1.example.com | [1e5b 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e5c 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1e5d 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1e5e 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1e5f 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1e60 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e61 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e62 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e63 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e64 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e65 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e66 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1e67 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e68 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1e69 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e6a 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e6b 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e6c 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e6d 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e6e 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e6f 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e70 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e71 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e72 08-31 20:51:40.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e73 08-31 20:51:40.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e74 08-31 20:51:40.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e75 08-31 20:51:40.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1e76 08-31 20:51:40.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e77 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e78 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e79 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e7a 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e7b 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1e7c 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e7d 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1e7e 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e7f 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1e80 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1e81 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1e82 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1e83 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c22dc0 gate 1598907100454286800 evaluation starts +peer0.org1.example.com | [1e84 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c22dc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1e85 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c22dc0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1e86 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c22dc0 principal matched by identity 0 +peer0.org1.example.com | [1e87 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 08 be 1a 2c d9 b5 c0 87 97 94 01 ef 54 9c f7 |....,........T..| +peer0.org1.example.com | 00000010 02 e3 0b 24 d8 d0 cd e6 e8 75 80 d7 0a 97 0c 3e |...$.....u.....>| +peer0.org1.example.com | [1e88 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 a6 ce d8 49 0e 83 c3 2b 66 98 |0E.!.....I...+f.| +peer0.org1.example.com | 00000010 62 f4 32 46 4b 01 a4 da 89 81 4d ab 54 84 ef d2 |b.2FK.....M.T...| +peer0.org1.example.com | 00000020 ad 61 e4 ee 27 02 20 38 83 5a ce 83 bd 7b 41 f3 |.a..'. 8.Z...{A.| +peer0.org1.example.com | 00000030 47 2b 89 ad 80 4c 95 78 6a 6d 26 c9 6c 28 ad d9 |G+...L.xjm&.l(..| +peer0.org1.example.com | 00000040 5f c1 1c 4c e8 33 50 |_..L.3P| +peer0.org1.example.com | [1e89 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c22dc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1e8a 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c22dc0 gate 1598907100454286800 evaluation succeeds +peer0.org1.example.com | [1e8b 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e8c 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1e8d 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1e8e 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [22af 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [22b0 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [22b1 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [22b2 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [22b3 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [22b4 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [22b5 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00428f8c0 gate 1598907109313440900 evaluation starts +peer1.org2.example.com | [22b6 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00428f8c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [22b7 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00428f8c0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [22b8 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00428f8c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [22b9 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00428f8c0 principal evaluation fails +peer1.org2.example.com | [22ba 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00428f8c0 gate 1598907109313440900 evaluation fails +peer1.org2.example.com | [22bb 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [22bc 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [22bd 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [22be 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00428fe30 gate 1598907109313931400 evaluation starts +peer1.org2.example.com | [22bf 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00428fe30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [22c0 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00428fe30 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [22c1 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00428fe30 principal matched by identity 0 +peer1.org2.example.com | [22c2 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e1 ad 29 18 79 ab 40 6a e9 8e 72 aa e7 f3 82 |...).y.@j..r....| +peer1.org2.example.com | 00000010 c5 74 7f 2d d1 9d 8b d1 21 31 f7 e5 45 4a f1 bc |.t.-....!1..EJ..| +peer1.org2.example.com | [22c3 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 cc 45 75 d1 90 0d ae 8f b3 b9 00 |0D. '.Eu........| +peer1.org2.example.com | 00000010 eb 7a bf d7 c1 d2 9b aa 08 e6 29 54 aa d1 49 a6 |.z........)T..I.| +peer1.org2.example.com | 00000020 45 28 ed cb 02 20 42 99 45 f1 b0 c4 5c 25 51 a1 |E(... B.E...\%Q.| +peer1.org2.example.com | 00000030 6c 01 8d a7 37 8c e3 55 09 ee 7d 91 68 d1 f1 f9 |l...7..U..}.h...| +peer1.org2.example.com | 00000040 b9 a7 ad c3 90 cd |......| +peer1.org2.example.com | [22c4 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00428fe30 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [22c5 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00428fe30 gate 1598907109313931400 evaluation succeeds +peer1.org2.example.com | [22c6 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [22c7 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [22c8 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [22c9 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [22ca 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [22cb 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [22cc 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [22cd 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [22ce 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [22cf 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22d0 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22d1 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22d2 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [22d3 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22d4 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fde 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fdf 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fe0 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fe1 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fe2 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fe3 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fe4 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [1fe5 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fe6 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fe7 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fe8 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [1fe9 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [1fea 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [1feb 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [1fec 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [1fed 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1fee 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [1fef 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [1ff0 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [1ff1 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [1ff2 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a7400 gate 1598907109510935400 evaluation starts +peer1.org1.example.com | [1ff3 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a7400 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [1ff4 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a7400 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [1ff5 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a7400 principal matched by identity 0 +peer1.org1.example.com | [1ff6 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d 58 de 29 3e 89 57 1e 44 8a f7 fb 53 91 ab 73 |]X.)>.W.D...S..s| +peer1.org1.example.com | 00000010 32 3e 69 99 79 39 d4 ef 41 34 e8 2c 5d 92 5c a4 |2>i.y9..A4.,].\.| +peer1.org1.example.com | [1ff7 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 f8 55 a0 2b 98 7e 58 e5 5c 40 2e |0D. 4.U.+.~X.\@.| +peer1.org1.example.com | 00000010 50 fe 7c d2 67 3e 14 14 2e a5 16 3c 90 40 d9 07 |P.|.g>.....<.@..| +peer1.org1.example.com | 00000020 3f 9f b1 93 02 20 36 2b 3b 7d ab 73 f8 23 89 74 |?.... 6+;}.s.#.t| +peer1.org1.example.com | 00000030 9b d6 f2 88 bc 63 45 b0 8e 0f 16 db 35 57 42 35 |.....cE.....5WB5| +peer1.org1.example.com | 00000040 f3 3d cc 8c 1f c9 |.=....| +peer1.org1.example.com | [1ff8 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a7400 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [1ff9 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a7400 gate 1598907109510935400 evaluation succeeds +peer1.org1.example.com | [1ffa 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ffb 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [1ffc 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [1ffd 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [1ffe 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [1fff 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2000 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2001 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2002 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2003 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2004 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2005 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2006 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [2007 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2008 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2009 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [200a 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [200b 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:V\370\204!l\243\276" > alive:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" > alive: alive: +peer1.org1.example.com | [200c 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [200d 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [200e 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [200f 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2010 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2011 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [2012 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2013 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [2014 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [2015 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2016 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [2017 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [2018 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 80 0a f6 aa fb bd b3 18 ae 59 a2 30 78 61 c6 |..........Y.0xa.| +peer1.org1.example.com | 00000010 7c 1e 7d 03 c7 16 a0 7b a4 98 72 54 3f ad e9 e2 ||.}....{..rT?...| +peer1.org1.example.com | [2019 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 7e 5a 07 d9 fb df 7e 8d ef 75 |0E.!..~Z....~..u| +peer1.org1.example.com | 00000010 91 40 9e cb a0 79 92 ac 54 36 64 4e 02 a8 1b 60 |.@...y..T6dN...`| +peer1.org1.example.com | 00000020 f8 0d 64 95 c3 02 20 1a 00 42 49 20 68 2c cd 66 |..d... ..BI h,.f| +peer1.org1.example.com | 00000030 b3 96 bd ba a8 a7 82 1e aa 97 ea f8 5e 1f 45 d7 |............^.E.| +peer1.org1.example.com | 00000040 65 ef e7 0f 4e 88 1f |e...N..| +peer1.org1.example.com | [201a 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [201b 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 aa 01 b3 f2 e0 f4 89 7a 81 71 |0E.!.........z.q| +peer1.org1.example.com | 00000010 7d 1e de 8f 40 ae ac 2e 5b 2d c8 28 10 00 6e 93 |}...@...[-.(..n.| +peer1.org1.example.com | 00000020 86 42 e4 11 05 02 20 45 d0 6f 2e cb c9 32 c1 30 |.B.... E.o...2.0| +peer1.org1.example.com | 00000030 a3 58 4b 40 7c 56 cd 1b 7f f8 e6 4d 87 e3 1d b0 |.XK@|V.....M....| +peer1.org1.example.com | 00000040 81 b9 af 1c 67 bd 8c |....g..| +peer1.org1.example.com | [201c 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [201d 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [201e 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [201f 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2020 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2021 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2022 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2023 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2024 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [2025 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2026 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2027 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2028 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [2029 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [202a 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [202b 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [202c 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [202d 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [202e 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [202f 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2030 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2031 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2032 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2033 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [2034 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2035 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2036 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2037 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [2038 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [203b 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2039 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [203c 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [203a 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [203d 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [203f 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [203e 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [2040 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2041 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2042 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2043 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2044 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2045 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2046 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2047 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2048 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2049 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004723960 gate 1598907109968247200 evaluation starts +peer1.org1.example.com | [204a 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004723960 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [204b 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004723960 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [204c 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004723960 principal matched by identity 0 +peer1.org1.example.com | [204d 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [204e 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [204f 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004723960 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2050 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004723960 gate 1598907109968247200 evaluation succeeds +peer1.org1.example.com | [2051 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2052 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2053 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2054 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2055 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [2056 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [2057 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2058 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2059 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [205a 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [205b 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [205c 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [205d 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [205e 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [205f 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004755250 gate 1598907109970652200 evaluation starts +peer1.org1.example.com | [2060 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004755250 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2061 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004755250 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2062 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004755250 principal matched by identity 0 +peer1.org1.example.com | [2063 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [2064 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [2065 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004755250 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2066 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004755250 gate 1598907109970652200 evaluation succeeds +peer1.org1.example.com | [2067 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2068 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2069 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [206a 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [23c6 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:V\370\204!l\243\276" > alive:T-\006" > alive:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > alive: +peer0.org2.example.com | [23c7 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [23c8 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23c9 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23ca 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23cb 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23cc 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [23cd 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23ce 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23cf 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23d0 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23d1 08-31 20:51:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23d2 08-31 20:51:46.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23d3 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [23d4 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [23d5 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23d6 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [23d7 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23d8 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [23d9 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [23da 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [23db 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23dc 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23dd 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23de 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [23df 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [23e0 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [23e1 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [23e2 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [23e3 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [23e4 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448c320 gate 1598907106197382400 evaluation starts +peer0.org2.example.com | [23e5 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448c320 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [23e6 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448c320 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [23e7 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448c320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [23e8 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448c320 principal evaluation fails +peer0.org2.example.com | [23e9 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448c320 gate 1598907106197382400 evaluation fails +peer0.org2.example.com | [23ea 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [23eb 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [23ec 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [23ed 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448c890 gate 1598907106198204300 evaluation starts +peer0.org2.example.com | [23ee 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448c890 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [23ef 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448c890 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [23f0 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448c890 principal matched by identity 0 +peer0.org2.example.com | [23f1 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [23f2 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [23f3 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448c890 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [23f4 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448c890 gate 1598907106198204300 evaluation succeeds +peer0.org2.example.com | [23f5 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [23f6 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [23f7 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [23f8 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [23f9 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23fa 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [23fb 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [23fc 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [23fd 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [23fe 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [23ff 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2400 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2401 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448da90 gate 1598907106200665300 evaluation starts +peer0.org2.example.com | [2402 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448da90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2403 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448da90 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2404 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448da90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [206b 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [206c 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [206d 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [206e 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [206f 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2070 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2071 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2072 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2073 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2074 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2075 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2076 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2077 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2078 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477ad90 gate 1598907109982860300 evaluation starts +peer1.org1.example.com | [2079 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477ad90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [207a 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477ad90 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [207b 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477ad90 principal matched by identity 0 +peer1.org1.example.com | [207c 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [207d 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [207e 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477ad90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [207f 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477ad90 gate 1598907109982860300 evaluation succeeds +peer1.org1.example.com | [2080 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2081 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2082 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2083 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2084 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [2085 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [2086 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [2087 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [2088 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2089 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [208a 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [208b 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [208c 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [208d 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [208e 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [208f 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2090 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004794d70 gate 1598907109984371000 evaluation starts +peer1.org1.example.com | [2091 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004794d70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2092 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004794d70 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2093 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004794d70 principal matched by identity 0 +peer1.org1.example.com | [2094 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [2095 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [2096 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [2097 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004794d70 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2098 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004794d70 gate 1598907109984371000 evaluation succeeds +peer1.org1.example.com | [2099 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [209a 08-31 20:51:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [209b 08-31 20:51:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [209c 08-31 20:51:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [209d 08-31 20:51:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [209e 08-31 20:51:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [209f 08-31 20:51:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [20a0 08-31 20:51:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [20a1 08-31 20:51:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20a2 08-31 20:51:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20a3 08-31 20:51:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [20a4 08-31 20:51:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [20a5 08-31 20:51:49.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [20a6 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [20a7 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [20a8 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [20a9 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bc800 gate 1598907110000633600 evaluation starts +peer1.org1.example.com | [20aa 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bc800 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [20ab 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bc800 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [20ac 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bc800 principal matched by identity 0 +peer1.org1.example.com | [20ad 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [20ae 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [20af 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bc800 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [20b0 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047bc800 gate 1598907110000633600 evaluation succeeds +peer1.org1.example.com | [20b1 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [20b2 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [20b3 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [20b4 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [20b5 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [20b6 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [20b7 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20b8 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20b9 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20ba 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20bb 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [20bc 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [20bd 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20bf 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20c0 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [20c1 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [20c2 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20be 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [20c3 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [20c4 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [20c5 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [20c6 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [20c7 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047dc0f0 gate 1598907110005789400 evaluation starts +peer1.org1.example.com | [20c8 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047dc0f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [20c9 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047dc0f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2405 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448da90 principal evaluation fails +peer0.org2.example.com | [2406 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448da90 gate 1598907106200665300 evaluation fails +peer0.org2.example.com | [2407 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2408 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2409 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [240a 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a4000 gate 1598907106201173700 evaluation starts +peer0.org2.example.com | [240b 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a4000 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [240c 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a4000 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [240d 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a4000 principal matched by identity 0 +peer0.org2.example.com | [240e 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [240f 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [2410 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a4000 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2411 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a4000 gate 1598907106201173700 evaluation succeeds +peer0.org2.example.com | [2412 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2413 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2414 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2415 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2416 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [2417 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [2418 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [2419 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [241a 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [241b 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [241c 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [241d 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [241e 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [241f 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22d5 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22d6 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [22d7 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:V\370\204!l\243\276" > alive: alive: +peer1.org2.example.com | [22d8 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [22d9 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22da 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [22db 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [22dc 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [22dd 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [22de 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22df 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [22e0 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [22e1 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22e2 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [22e3 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [22e4 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d 58 de 29 3e 89 57 1e 44 8a f7 fb 53 91 ab 73 |]X.)>.W.D...S..s| +peer1.org2.example.com | 00000010 32 3e 69 99 79 39 d4 ef 41 34 e8 2c 5d 92 5c a4 |2>i.y9..A4.,].\.| +peer1.org2.example.com | [22e5 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 f8 55 a0 2b 98 7e 58 e5 5c 40 2e |0D. 4.U.+.~X.\@.| +peer1.org2.example.com | 00000010 50 fe 7c d2 67 3e 14 14 2e a5 16 3c 90 40 d9 07 |P.|.g>.....<.@..| +peer1.org2.example.com | 00000020 3f 9f b1 93 02 20 36 2b 3b 7d ab 73 f8 23 89 74 |?.... 6+;}.s.#.t| +peer1.org2.example.com | 00000030 9b d6 f2 88 bc 63 45 b0 8e 0f 16 db 35 57 42 35 |.....cE.....5WB5| +peer1.org2.example.com | 00000040 f3 3d cc 8c 1f c9 |.=....| +peer1.org2.example.com | [22e6 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [22e7 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 6a 4e bf 01 b4 e5 08 56 01 ed 16 |0D. vjN.....V...| +peer1.org2.example.com | 00000010 12 4a 64 45 e0 0d 54 52 51 89 8c e9 c1 d8 34 1a |.JdE..TRQ.....4.| +peer1.org1.example.com | [20ca 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047dc0f0 principal matched by identity 0 +peer1.org1.example.com | [20cb 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [20cc 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [20cd 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047dc0f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [20ce 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047dc0f0 gate 1598907110005789400 evaluation succeeds +peer1.org1.example.com | [20cf 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [20d0 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [20d1 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [20d2 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [20d3 08-31 20:51:50.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20d4 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [20d5 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [20d6 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [20d7 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20d8 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [20d9 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [20da 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20db 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [20dc 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [20dd 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [20de 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20df 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [20e0 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [20e1 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [20e2 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [20e3 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [20e4 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [20e5 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ea950 gate 1598907110037723800 evaluation starts +peer1.org1.example.com | [20e6 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ea950 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [20e7 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ea950 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [20e8 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ea950 principal matched by identity 0 +peer1.org1.example.com | [20e9 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7a 61 cd e7 ff d3 e4 b7 be b6 86 08 ad e3 97 ee |za..............| +peer1.org1.example.com | 00000010 e3 3e 66 14 fb c0 ad 4e 8c c9 e3 30 32 02 cc cf |.>f....N...02...| +peer1.org1.example.com | [20ea 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd 5f 4e e2 29 37 5a 41 a1 48 71 |0E.!.._N.)7ZA.Hq| +peer1.org1.example.com | 00000010 88 17 37 03 dc b5 58 2d 3b 38 d3 c8 b5 97 48 1a |..7...X-;8....H.| +peer1.org1.example.com | 00000020 25 ed c9 3f 71 02 20 4c ef 68 36 b5 a1 d4 d6 03 |%..?q. L.h6.....| +peer1.org1.example.com | 00000030 83 11 cb 13 9d 7f 4f b1 52 e3 04 a9 cb f0 9a 27 |......O.R......'| +peer1.org1.example.com | 00000040 e8 51 53 9a c6 82 28 |.QS...(| +peer1.org1.example.com | [20eb 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ea950 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [20ec 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ea950 gate 1598907110037723800 evaluation succeeds +peer1.org1.example.com | [20ed 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [20ee 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [20ef 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [20f0 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [20f1 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [20f2 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [20f3 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [20f4 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [20f5 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [20f6 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20f7 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20f8 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20f9 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [20fa 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20fb 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [20fc 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20fd 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20fe 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [20ff 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2100 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2101 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2102 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2103 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2104 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2105 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2106 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2107 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2108 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2109 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [210a 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [210b 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [210c 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [210d 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [210e 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [210f 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2110 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2111 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2112 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2113 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2114 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2115 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2116 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D9816102B +peer1.org1.example.com | [2117 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4218DD8DC06EE2A3257A13C83FA940CE127BF22FCD44ABF958255861FCC7D141 +peer1.org1.example.com | [2118 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2119 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [211a 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [211b 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [211c 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [211d 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [211e 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [211f 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2120 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2121 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2122 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2123 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2124 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 27 c1 e1 54 02 20 59 16 f4 82 6a 9f 37 c3 5e 53 |'..T. Y...j.7.^S| +peer1.org2.example.com | 00000030 88 e4 bb 7d f4 c2 9d cb db cb 9e d0 67 69 05 eb |...}........gi..| +peer1.org2.example.com | 00000040 d0 d0 04 46 dd 93 |...F..| +peer1.org2.example.com | [22e8 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [22e9 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [22ea 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [22eb 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [22ec 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [22ed 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22ee 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22ef 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22f0 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [22f1 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22f2 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22f3 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [22f4 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" secret_envelope: > alive: +peer1.org2.example.com | [22f5 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org2.example.com | [22f6 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [22f7 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [22f8 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [22f9 08-31 20:51:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22fa 08-31 20:51:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22fb 08-31 20:51:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22fc 08-31 20:51:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22fd 08-31 20:51:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22fe 08-31 20:51:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [22ff 08-31 20:51:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [2300 08-31 20:51:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2301 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2302 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2303 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2304 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2305 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2306 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2307 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2308 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2309 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [230a 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [230b 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [230c 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fe300 gate 1598907109604333500 evaluation starts +peer1.org2.example.com | [230d 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fe300 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [230e 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fe300 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [230f 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fe300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2310 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fe300 principal evaluation fails +peer1.org2.example.com | [2311 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fe300 gate 1598907109604333500 evaluation fails +peer1.org2.example.com | [2312 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2313 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2314 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2315 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fe870 gate 1598907109604927800 evaluation starts +peer1.org2.example.com | [2316 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fe870 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2317 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fe870 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2318 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fe870 principal matched by identity 0 +peer1.org2.example.com | [2319 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 80 0a f6 aa fb bd b3 18 ae 59 a2 30 78 61 c6 |..........Y.0xa.| +peer1.org2.example.com | 00000010 7c 1e 7d 03 c7 16 a0 7b a4 98 72 54 3f ad e9 e2 ||.}....{..rT?...| +peer1.org2.example.com | [231a 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 7e 5a 07 d9 fb df 7e 8d ef 75 |0E.!..~Z....~..u| +peer1.org2.example.com | 00000010 91 40 9e cb a0 79 92 ac 54 36 64 4e 02 a8 1b 60 |.@...y..T6dN...`| +peer1.org2.example.com | 00000020 f8 0d 64 95 c3 02 20 1a 00 42 49 20 68 2c cd 66 |..d... ..BI h,.f| +peer1.org2.example.com | 00000030 b3 96 bd ba a8 a7 82 1e aa 97 ea f8 5e 1f 45 d7 |............^.E.| +peer1.org2.example.com | 00000040 65 ef e7 0f 4e 88 1f |e...N..| +peer1.org2.example.com | [231b 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fe870 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [231c 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042fe870 gate 1598907109604927800 evaluation succeeds +peer1.org2.example.com | [231d 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [231e 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [231f 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2320 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2321 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2322 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2323 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2324 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2325 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2326 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2327 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2328 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2329 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [232a 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [232b 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [232c 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [232d 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [232e 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" > alive: +peer1.org2.example.com | [232f 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2330 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2331 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2332 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2333 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2334 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2335 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2336 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2337 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2338 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2339 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [233a 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [233b 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [233c 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [233d 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D9816102A +peer1.org2.example.com | [233e 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7A61CDE7FFD3E4B7BEB68608ADE397EEE33E6614FBC0AD4E8CC9E3303202CCCF +peer1.org2.example.com | [233f 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2340 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2341 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [2342 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [2343 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2344 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2345 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2346 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2348 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2349 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [234b 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2347 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [234a 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [234c 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [234e 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [234d 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [234f 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2350 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2351 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2352 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2353 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2354 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2355 08-31 20:51:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2356 08-31 20:51:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2357 08-31 20:51:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2358 08-31 20:51:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [2359 08-31 20:51:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [235a 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [235b 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [235c 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [235d 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [235e 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [235f 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2360 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2361 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2362 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2363 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2364 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2365 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2366 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004325e30 gate 1598907110289609500 evaluation starts +peer1.org2.example.com | [2367 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004325e30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2368 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004325e30 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2369 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004325e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [236a 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004325e30 principal evaluation fails +peer1.org2.example.com | [236b 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004325e30 gate 1598907110289609500 evaluation fails +peer1.org2.example.com | [236c 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [236d 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [236e 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [236f 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043563a0 gate 1598907110289870000 evaluation starts +peer1.org2.example.com | [2370 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043563a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2371 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043563a0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2372 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043563a0 principal matched by identity 0 +peer1.org2.example.com | [2373 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 18 dd 8d c0 6e e2 a3 25 7a 13 c8 3f a9 40 ce |B....n..%z..?.@.| +peer1.org2.example.com | 00000010 12 7b f2 2f cd 44 ab f9 58 25 58 61 fc c7 d1 41 |.{./.D..X%Xa...A| +peer1.org2.example.com | [2374 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 24 2b e4 77 40 b0 5e bf 20 9c 49 |0D. F$+.w@.^. .I| +peer1.org2.example.com | 00000010 3e cc 09 eb 17 b3 c5 ef 28 fb 8f c6 8c eb dc 52 |>.......(......R| +peer1.org2.example.com | 00000020 9f b7 b3 8c 02 20 5f 9c 9a 99 59 b5 a5 4a 61 c3 |..... _...Y..Ja.| +peer1.org2.example.com | 00000030 ba c5 68 4b 57 80 c3 d0 c8 ce 35 fc 35 82 29 2b |..hKW.....5.5.)+| +peer1.org2.example.com | 00000040 e8 6f 02 c0 c7 35 |.o...5| +peer1.org2.example.com | [2375 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043563a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2376 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043563a0 gate 1598907110289870000 evaluation succeeds +peer1.org2.example.com | [2377 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2378 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2379 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [237a 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2125 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2126 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2127 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2128 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2129 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [212a 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [212b 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [212c 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [212d 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [212e 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [212f 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2130 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2131 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2132 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2133 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2134 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2135 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2136 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2137 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2138 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2139 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [213a 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004807840 gate 1598907110459747000 evaluation starts +peer1.org1.example.com | [213b 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004807840 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [213c 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004807840 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [213d 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004807840 principal matched by identity 0 +peer1.org1.example.com | [213e 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b d7 f9 e6 15 ef a0 e3 cb ea ba b8 0b 8d f8 21 |...............!| +peer1.org1.example.com | 00000010 5b 0c 17 c6 f9 f3 2a 85 b2 02 00 f5 df eb d4 d3 |[.....*.........| +peer1.org1.example.com | [213f 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea f3 db c0 3c df a8 ae b8 ca 39 |0E.!.....<.....9| +peer1.org1.example.com | 00000010 1a d8 21 e2 95 2e 93 27 d5 8f ed b5 0c e5 47 69 |..!....'......Gi| +peer1.org1.example.com | 00000020 4f 0a af 71 77 02 20 03 78 de 82 f1 d1 78 7c 8b |O..qw. .x....x|.| +peer1.org1.example.com | 00000030 a7 b1 56 b3 a9 e6 ef be 5d 24 89 d2 a0 8f 87 9b |..V.....]$......| +peer1.org1.example.com | 00000040 bc ca 48 4c a1 34 c7 |..HL.4.| +peer1.org1.example.com | [2140 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004807840 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2141 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004807840 gate 1598907110459747000 evaluation succeeds +peer1.org1.example.com | [2142 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2143 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2144 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2145 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2146 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2147 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2148 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2149 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [214a 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [214b 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [214c 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [214d 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [214e 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [214f 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2150 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2151 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2152 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2153 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2154 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2155 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2156 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2157 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2158 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2159 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [215a 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [215b 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [215c 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [215d 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [215e 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [215f 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2160 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2161 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2162 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2163 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2164 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [237b 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [237c 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [237d 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [237e 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [237f 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2380 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2381 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2382 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2383 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2384 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2385 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2386 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2387 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2388 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2389 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [238a 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [238b 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [238c 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [238d 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [238e 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2165 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2166 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2167 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2168 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2169 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [216a 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 80 ee 8e 7a 30 15 ca 52 72 79 81 c8 3f 87 f1 |....z0..Rry..?..| +peer1.org1.example.com | 00000010 11 86 d9 fc e2 72 ce 6d 4e 23 e0 7d b8 51 be d4 |.....r.mN#.}.Q..| +peer1.org1.example.com | [216b 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 fb 1c d5 c5 80 fc e4 98 ad f9 |0E.!............| +peer1.org1.example.com | 00000010 9d 06 10 59 f6 f4 8f 43 df 37 66 82 05 f8 a3 8b |...Y...C.7f.....| +peer1.org1.example.com | 00000020 48 74 0d a7 85 02 20 69 bc 99 f2 a8 77 26 92 61 |Ht.... i....w&.a| +peer1.org1.example.com | 00000030 68 de dc 5e bb 78 ea 97 c6 f0 73 b4 e3 bf d2 ee |h..^.x....s.....| +peer1.org1.example.com | 00000040 af ec 89 45 41 8c 8d |...EA..| +peer1.org1.example.com | [216c 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [216d 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [216e 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [216f 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2170 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2171 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2172 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2173 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2174 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2175 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2176 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2177 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2178 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2179 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [217a 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [217b 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [217c 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [217d 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [217e 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [217f 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2180 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2181 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2182 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2183 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2184 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [238f 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2390 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2391 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2392 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2393 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2394 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2395 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2396 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2397 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2398 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2399 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [239a 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [239b 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [239c 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [239d 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [239e 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [239f 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [23a0 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23a1 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [23a2 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23a3 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [23a4 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [23a5 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23a6 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23a7 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23a8 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [23a9 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [23aa 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [23ab 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [23ac 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [23ad 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [23ae 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [23af 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345570 gate 1598907110455027000 evaluation starts +peer1.org2.example.com | [23b0 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345570 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [23b1 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345570 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [23b2 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [23b3 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345570 principal evaluation fails +peer1.org2.example.com | [23b4 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345570 gate 1598907110455027000 evaluation fails +peer1.org2.example.com | [23b5 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [23b6 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [23b7 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [23b8 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345ae0 gate 1598907110455352400 evaluation starts +peer1.org2.example.com | [23b9 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345ae0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [23ba 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345ae0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [23bb 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345ae0 principal matched by identity 0 +peer1.org2.example.com | [23bc 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [23bd 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [1e8f 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e90 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e91 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e92 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1e93 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1e94 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1e95 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1e96 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e97 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e98 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e99 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e9a 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1e9b 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1e9c 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e9d 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e9e 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1e9f 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ea0 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ea1 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ea2 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ea3 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1ea4 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ea6 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1ea5 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ea7 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ea8 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ea9 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1eaa 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1eab 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1eac 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ead 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1eae 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [23be 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345ae0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [23bf 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004345ae0 gate 1598907110455352400 evaluation succeeds +peer1.org2.example.com | [23c0 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [23c1 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [23c2 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [23c3 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [23c4 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23c5 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23c6 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [23c7 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [23c8 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [23c9 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [23ca 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [23cb 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [23cc 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439cce0 gate 1598907110456336300 evaluation starts +peer1.org2.example.com | [23cd 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439cce0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2420 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2421 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2422 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2423 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2424 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2425 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2426 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c4870 gate 1598907106202993100 evaluation starts +peer0.org2.example.com | [2427 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c4870 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2428 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c4870 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2429 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c4870 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [242a 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c4870 principal evaluation fails +peer0.org2.example.com | [242b 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c4870 gate 1598907106202993100 evaluation fails +peer0.org2.example.com | [242c 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [242d 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [242e 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [242f 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c4de0 gate 1598907106203258500 evaluation starts +peer0.org2.example.com | [2430 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c4de0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2431 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c4de0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2432 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c4de0 principal matched by identity 0 +peer0.org2.example.com | [2433 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | [2185 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2186 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2187 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2188 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2189 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [218a 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [218b 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [218c 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [218d 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [218e 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [218f 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [2190 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2191 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:)b\021/\226\350\330T\177" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2192 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2193 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:)b\021/\226\350\330T\177" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2194 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2195 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2196 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2197 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2198 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2199 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [219a 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [219b 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [219c 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487ed10 gate 1598907113090884800 evaluation starts +peer1.org1.example.com | [219d 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487ed10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [219e 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487ed10 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [219f 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487ed10 principal matched by identity 0 +peer1.org1.example.com | [21a0 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c aa a5 5a 6c 4e f5 3d 4f b2 61 f4 2a 5b 12 81 |...ZlN.=O.a.*[..| +peer1.org1.example.com | 00000010 cb 7e 57 55 cd aa 59 d5 f2 c9 38 c9 21 b6 d5 fe |.~WU..Y...8.!...| +peer1.org1.example.com | [21a1 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 67 b2 ff a9 ff 61 ec 7b a5 ba 8d |0D. )b.| +peer1.org1.example.com | 00000040 2f 96 e8 d8 54 7f |/...T.| +peer1.org1.example.com | [21a2 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487ed10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [21a3 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00487ed10 gate 1598907113090884800 evaluation succeeds +peer1.org1.example.com | [21a4 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [21a5 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [21a6 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [21a7 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [21a8 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [21a9 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [21aa 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [21ab 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [21ac 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [21ad 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21ae 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21af 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21b0 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [21b1 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21b2 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21b3 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21b4 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [21b5 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [21b6 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21b7 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:)b\021/\226\350\330T\177" > alive:\314\t\353\027\263\305\357(\373\217\306\214\353\334R\237\267\263\214\002 _\234\232\231Y\265\245Ja\303\272\305hKW\200\303\320\310\3165\3745\202)+\350o\002\300\3075" > +peer0.org1.example.com | [1eaf 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161022 +peer0.org1.example.com | [1eb0 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BEBC57E56FB62E8FA65695405DEAB84DA7033F7ACF28B5430D4C6875B9D918C2 +peer0.org1.example.com | [1eb1 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1eb2 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1eb3 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1eb4 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [1eb5 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1eb6 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1eb7 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org1.example.com | [1eb8 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1eba 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1eb9 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1ebb 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ebc 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ebd 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ebe 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [1ebf 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ec0 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ec1 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ec2 08-31 20:51:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ec3 08-31 20:51:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ec4 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ec5 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ec6 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ec7 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ec8 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ec9 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1eca 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ecb 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [1ecc 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ecd 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ece 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ecf 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ed0 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ed1 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1ed2 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ed3 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1ed4 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ed5 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ed6 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1ed7 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1ed8 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1ed9 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78740 gate 1598907101030936500 evaluation starts +peer0.org1.example.com | [1eda 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78740 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1edb 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78740 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1edc 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78740 principal matched by identity 0 +peer0.org1.example.com | [1edd 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef a0 d0 0f d5 8c b6 eb 36 4d af 12 a7 c3 89 3b |........6M.....;| +peer0.org1.example.com | 00000010 7d 82 e8 7f de 1f b2 da 14 18 48 82 58 48 51 5f |}.........H.XHQ_| +peer0.org1.example.com | [1ede 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 c5 94 1a 88 b1 52 36 24 bc ae |0E.!.......R6$..| +peer0.org1.example.com | 00000010 b3 c7 b0 17 8a 81 ec e9 c1 f8 90 e6 30 64 de 41 |............0d.A| +peer0.org1.example.com | 00000020 a7 59 21 e7 e3 02 20 18 a5 c5 c5 03 be ed b6 82 |.Y!... .........| +peer0.org1.example.com | 00000030 f3 cf 18 ab 15 44 5c b3 9b bd 89 50 a7 13 d3 d1 |.....D\....P....| +peer0.org1.example.com | 00000040 b9 0f 00 91 aa f9 bd |.......| +peer0.org1.example.com | [1edf 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78740 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1ee0 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78740 gate 1598907101030936500 evaluation succeeds +peer0.org1.example.com | [1ee1 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ee2 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ee3 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1ee4 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1ee5 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1ee6 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [1ee7 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1ee8 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1ee9 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1eea 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1eeb 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1eec 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1eed 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [1eee 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1eef 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ef0 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ef1 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1ef2 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ef3 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ef4 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [2434 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [2435 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c4de0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2436 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c4de0 gate 1598907106203258500 evaluation succeeds +peer0.org2.example.com | [2437 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2438 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2439 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [243a 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [243b 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [243c 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [243d 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [243e 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [243f 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1ef5 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ef6 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ef7 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [1ef8 08-31 20:51:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ef9 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\232\346\342\300\374&\224_\030\t\002 c9F7{\262I\227\201z\233\317\013\343\320\221f\337\203}\211\361\315\213\320\203\264\344\231\226\367k" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [1efa 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1efb 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\232\346\342\300\374&\224_\030\t\002 c9F7{\262I\227\201z\233\317\013\343\320\221f\337\203}\211\361\315\213\320\203\264\344\231\226\367k" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [1efc 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1efd 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f 5f 38 0e 3a cd 26 b2 84 99 ae e0 4b 2e ba f7 |._8.:.&.....K...| +peer0.org1.example.com | 00000010 af 1c 33 83 1d fb c0 82 9c 23 25 73 b8 2e 01 56 |..3......#%s...V| +peer0.org1.example.com | [1efe 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 19 c6 ba fc ef 63 dd da 44 91 11 |0D. ......c..D..| +peer0.org1.example.com | 00000010 f4 81 f0 f6 e7 9d 38 b2 3a 03 7c 47 a1 03 71 4c |......8.:.|G..qL| +peer0.org1.example.com | 00000020 bf 96 cd ea 02 20 56 95 26 f5 41 44 36 e9 8f d6 |..... V.&.AD6...| +peer0.org1.example.com | 00000030 e1 0a ec 08 9d a4 60 b1 83 68 b7 36 0b 27 5e df |......`..h.6.'^.| +peer0.org1.example.com | 00000040 83 5c 3a 4d 55 d3 |.\:MU.| +peer0.org1.example.com | [1eff 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [1f00 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d ad 3a 08 be 79 5d 40 d1 ae bc 57 |0D. ..:..y]@...W| +peer0.org1.example.com | 00000010 23 51 a7 95 3c 64 b4 d2 88 3e 9a e6 e2 c0 fc 26 |#Q.......&| +peer0.org1.example.com | 00000020 94 5f 18 09 02 20 63 39 46 37 7b b2 49 97 81 7a |._... c9F7{.I..z| +peer0.org1.example.com | 00000030 9b cf 0b e3 d0 91 66 df 83 7d 89 f1 cd 8b d0 83 |......f..}......| +peer0.org1.example.com | 00000040 b4 e4 99 96 f7 6b |.....k| +peer0.org1.example.com | [1f01 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [1f02 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [1f03 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1f04 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1f05 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [1f06 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f07 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f08 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f09 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [1f0a 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f0b 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f0c 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1f0d 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\232\346\342\300\374&\224_\030\t\002 c9F7{\262I\227\201z\233\317\013\343\320\221f\337\203}\211\361\315\213\320\203\264\344\231\226\367k" > > alive: +peer0.org1.example.com | [1f0e 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f0f 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f10 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f11 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f12 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f13 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f14 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f15 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f16 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f17 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f18 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f19 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [1f1a 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f1b 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\334\242K\221\363\267\335\373;\t|" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f1c 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\334\242K\221\363\267\335\373;\t|" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f1d 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2440 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2441 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2442 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2443 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2444 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2445 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e06d0 gate 1598907106205197300 evaluation starts +peer0.org2.example.com | [2446 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e06d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2447 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e06d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2448 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e06d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2449 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e06d0 principal evaluation fails +peer0.org2.example.com | [244a 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e06d0 gate 1598907106205197300 evaluation fails +peer0.org2.example.com | [244b 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [244c 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [244d 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [244e 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e0c40 gate 1598907106206065400 evaluation starts +peer0.org2.example.com | [244f 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e0c40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2450 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e0c40 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2451 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e0c40 principal matched by identity 0 +peer0.org2.example.com | [2452 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [2453 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [2454 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e0c40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2455 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e0c40 gate 1598907106206065400 evaluation succeeds +peer0.org2.example.com | [2456 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2457 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2458 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2459 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [245a 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [245b 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [245c 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [245d 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [245e 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [245f 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2460 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2461 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2462 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2463 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2464 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [23ce 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439cce0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [23cf 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [23d0 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439cce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [23d1 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439cce0 principal evaluation fails +peer1.org2.example.com | [23d2 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439cce0 gate 1598907110456336300 evaluation fails +peer1.org2.example.com | [23d3 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [23d4 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [23d5 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [23d6 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439d250 gate 1598907110462364200 evaluation starts +peer1.org2.example.com | [23d7 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439d250 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [23d8 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439d250 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [23d9 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439d250 principal matched by identity 0 +peer1.org2.example.com | [23da 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [23db 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [23dc 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439d250 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [23dd 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439d250 gate 1598907110462364200 evaluation succeeds +peer1.org2.example.com | [23de 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [23df 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [23e0 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [23e1 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [23e2 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [23e3 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [23e4 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [23e5 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [23e6 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [23e7 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [23e8 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [23e9 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [23ea 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23eb 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f1e 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\334\242K\221\363\267\335\373;\t|" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f1f 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1f20 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f21 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1f22 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f23 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f24 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1f25 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1f26 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1f27 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb53b0 gate 1598907101492682000 evaluation starts +peer0.org1.example.com | [1f28 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb53b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1f29 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb53b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1f2a 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb53b0 principal matched by identity 0 +peer0.org1.example.com | [1f2b 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 8d 52 50 7b d2 bd 2a 77 dd a7 3e 56 c3 8d 92 |..RP{..*w..>V...| +peer0.org1.example.com | 00000010 ef 2f 0b 8f 57 79 79 89 ec e1 2d 1d c5 12 2a a2 |./..Wyy...-...*.| +peer0.org1.example.com | [1f2c 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 a2 27 cf ab c8 68 2b 25 85 10 a2 |0D. c.'...h+%...| +peer0.org1.example.com | 00000010 30 65 e5 f6 dc a4 65 9c 6d d8 94 de 82 83 c6 08 |0e....e.m.......| +peer0.org1.example.com | 00000020 80 f3 d4 49 02 20 55 e1 01 85 32 08 d0 36 d5 87 |...I. U...2..6..| +peer0.org1.example.com | 00000030 08 54 28 98 11 1d 4b 5f c1 38 3e dc a2 4b 91 f3 |.T(...K_.8>..K..| +peer0.org1.example.com | 00000040 b7 dd fb 3b 09 7c |...;.|| +peer0.org1.example.com | [1f2d 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb53b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1f2e 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb53b0 gate 1598907101492682000 evaluation succeeds +peer0.org1.example.com | [1f2f 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f30 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f31 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1f32 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1f33 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1f34 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [1f35 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [1f36 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [1f37 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [1f38 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f39 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f3a 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f3b 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [1f3c 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f3d 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f3e 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f3f 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1f40 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\334\242K\221\363\267\335\373;\t|" > alive: alive: +peer0.org1.example.com | [1f41 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f42 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f43 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [1f44 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1f45 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [1f46 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2465 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fc090 gate 1598907106209768600 evaluation starts +peer0.org2.example.com | [2466 08-31 20:51:46.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fc090 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2467 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fc090 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2468 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fc090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2469 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fc090 principal evaluation fails +peer0.org2.example.com | [246a 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fc090 gate 1598907106209768600 evaluation fails +peer0.org2.example.com | [246b 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [246c 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [246d 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [246e 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fc600 gate 1598907106210762600 evaluation starts +peer0.org2.example.com | [246f 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fc600 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2470 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fc600 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2471 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fc600 principal matched by identity 0 +peer0.org2.example.com | [2472 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [2473 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [2474 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fc600 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2475 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fc600 gate 1598907106210762600 evaluation succeeds +peer0.org2.example.com | [2476 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2477 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2478 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2479 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [247a 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [247b 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [247c 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [247d 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [247e 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [247f 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2480 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2481 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2482 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2483 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2484 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fdef0 gate 1598907106212761000 evaluation starts +peer0.org1.example.com | [1f47 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f49 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f48 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [1f4a 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1f4c 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f4d 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f4b 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f4f 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f4e 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f50 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f51 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f52 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f53 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f54 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f55 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21b8 08-31 20:51:53.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [21b9 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [21ba 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [21bb 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [21bc 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [21bd 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [21be 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [21bf 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21c0 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [21c1 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2485 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fdef0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2486 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fdef0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2487 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fdef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2488 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fdef0 principal evaluation fails +peer0.org2.example.com | [2489 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044fdef0 gate 1598907106212761000 evaluation fails +peer0.org2.example.com | [248a 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [248b 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [248c 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [248d 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004518460 gate 1598907106213029400 evaluation starts +peer0.org2.example.com | [248e 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004518460 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [248f 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004518460 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2490 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004518460 principal matched by identity 0 +peer0.org2.example.com | [2491 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [2492 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [2493 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004518460 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2494 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004518460 gate 1598907106213029400 evaluation succeeds +peer0.org2.example.com | [2495 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2496 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2497 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2498 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2499 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [249a 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [249b 08-31 20:51:46.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [249c 08-31 20:51:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [249d 08-31 20:51:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [249e 08-31 20:51:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [249f 08-31 20:51:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24a0 08-31 20:51:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24a1 08-31 20:51:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [24a2 08-31 20:51:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [24a3 08-31 20:51:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24a4 08-31 20:51:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [24a5 08-31 20:51:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [24a6 08-31 20:51:46.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24a7 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [24a8 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24a9 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24aa 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24ab 08-31 20:51:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [24ac 08-31 20:51:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [24ad 08-31 20:51:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [24ae 08-31 20:51:46.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21c2 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [21c3 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21c4 08-31 20:51:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [21c6 08-31 20:51:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [21c8 08-31 20:51:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21c7 08-31 20:51:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [21c5 08-31 20:51:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [21c9 08-31 20:51:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [21ca 08-31 20:51:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [21cb 08-31 20:51:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21cc 08-31 20:51:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [21cd 08-31 20:51:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [21ce 08-31 20:51:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21cf 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [21d0 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D9816102C +peer1.org1.example.com | [21d1 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 12F324D088AD43070312E3C5301B19D184D156DF118B081C719D70841EA11BAF +peer1.org1.example.com | [21d2 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [21d3 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [21d4 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [21d5 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [21d6 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [21d7 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [23ec 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [23ed 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [23ee 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [23ef 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [23f0 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [23f1 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [23f2 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bfac0 gate 1598907110464297500 evaluation starts +peer1.org2.example.com | [23f3 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bfac0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [23f4 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bfac0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [23f5 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bfac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [23f6 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bfac0 principal evaluation fails +peer1.org2.example.com | [23f7 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bfac0 gate 1598907110464297500 evaluation fails +peer1.org2.example.com | [23f8 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [23f9 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [23fa 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [23fb 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dc030 gate 1598907110469160800 evaluation starts +peer1.org2.example.com | [23fc 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dc030 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [23fd 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dc030 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [23fe 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dc030 principal matched by identity 0 +peer1.org2.example.com | [23ff 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [2400 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [2401 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2402 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dc030 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2403 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dc030 gate 1598907110469160800 evaluation succeeds +peer1.org2.example.com | [2404 08-31 20:51:50.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2405 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2406 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2407 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2408 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2409 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [240a 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [240b 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [240c 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [240d 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [240e 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [240f 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2410 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dd230 gate 1598907110471742500 evaluation starts +peer1.org2.example.com | [2411 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dd230 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2412 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dd230 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2413 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dd230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2414 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dd230 principal evaluation fails +peer1.org2.example.com | [2415 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dd230 gate 1598907110471742500 evaluation fails +peer1.org2.example.com | [2416 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2417 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2418 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2419 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dd7a0 gate 1598907110471995300 evaluation starts +peer1.org2.example.com | [241a 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dd7a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [241b 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dd7a0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [241c 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dd7a0 principal matched by identity 0 +peer1.org2.example.com | [241d 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [241e 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [241f 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dd7a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2420 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043dd7a0 gate 1598907110471995300 evaluation succeeds +peer1.org2.example.com | [2421 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2422 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2423 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2424 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2425 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [2426 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [2427 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2428 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2429 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [242a 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [242b 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [242c 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [242d 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b d7 f9 e6 15 ef a0 e3 cb ea ba b8 0b 8d f8 21 |...............!| +peer1.org2.example.com | 00000010 5b 0c 17 c6 f9 f3 2a 85 b2 02 00 f5 df eb d4 d3 |[.....*.........| +peer1.org2.example.com | [242e 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea f3 db c0 3c df a8 ae b8 ca 39 |0E.!.....<.....9| +peer1.org2.example.com | 00000010 1a d8 21 e2 95 2e 93 27 d5 8f ed b5 0c e5 47 69 |..!....'......Gi| +peer1.org2.example.com | 00000020 4f 0a af 71 77 02 20 03 78 de 82 f1 d1 78 7c 8b |O..qw. .x....x|.| +peer1.org2.example.com | 00000030 a7 b1 56 b3 a9 e6 ef be 5d 24 89 d2 a0 8f 87 9b |..V.....]$......| +peer1.org2.example.com | 00000040 bc ca 48 4c a1 34 c7 |..HL.4.| +peer1.org2.example.com | [242f 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2430 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2431 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2432 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2433 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2434 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2435 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2436 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2437 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2438 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2439 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [243a 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [243b 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [243c 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [243d 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [243e 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [243f 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2440 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2441 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2442 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2443 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2444 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2445 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2446 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2447 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2448 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2449 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [244a 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004416450 gate 1598907110490497800 evaluation starts +peer1.org2.example.com | [244b 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004416450 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [244c 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004416450 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1f56 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f57 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f58 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f59 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f5a 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1f5b 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161023 +peer0.org1.example.com | [1f5c 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 37EB45CA97604A9CC3ED09623343769831698E7CBDA646FE97CD2A0DB98D2DE2 +peer0.org1.example.com | [1f5d 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [1f5e 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [1f5f 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [1f60 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1f61 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f62 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f63 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1f64 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f65 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f67 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1f68 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f66 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f69 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f6a 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f6b 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f6c 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f6d 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f6e 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f6f 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [1f70 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1f71 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1f72 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f73 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1f74 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1f75 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1f76 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1f77 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d16320 gate 1598907101591529600 evaluation starts +peer0.org1.example.com | [1f78 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d16320 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1f79 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d16320 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1f7a 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d16320 principal matched by identity 0 +peer0.org1.example.com | [1f7b 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 8d 52 50 7b d2 bd 2a 77 dd a7 3e 56 c3 8d 92 |..RP{..*w..>V...| +peer0.org1.example.com | 00000010 ef 2f 0b 8f 57 79 79 89 ec e1 2d 1d c5 12 2a a2 |./..Wyy...-...*.| +peer0.org1.example.com | [1f7c 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 a2 27 cf ab c8 68 2b 25 85 10 a2 |0D. c.'...h+%...| +peer0.org1.example.com | 00000010 30 65 e5 f6 dc a4 65 9c 6d d8 94 de 82 83 c6 08 |0e....e.m.......| +peer0.org1.example.com | 00000020 80 f3 d4 49 02 20 55 e1 01 85 32 08 d0 36 d5 87 |...I. U...2..6..| +peer0.org1.example.com | 00000030 08 54 28 98 11 1d 4b 5f c1 38 3e dc a2 4b 91 f3 |.T(...K_.8>..K..| +peer0.org1.example.com | 00000040 b7 dd fb 3b 09 7c |...;.|| +peer0.org1.example.com | [1f7d 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d16320 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1f7e 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d16320 gate 1598907101591529600 evaluation succeeds +peer0.org1.example.com | [1f7f 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f80 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1f81 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1f82 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1f83 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1f84 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21d8 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [21d9 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [21da 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [21db 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21dc 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [21de 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21dd 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [21df 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [21e0 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21e1 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [21e2 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21e3 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [21e4 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [21e5 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 f3 24 d0 88 ad 43 07 03 12 e3 c5 30 1b 19 d1 |..$...C.....0...| +peer1.org1.example.com | 00000010 84 d1 56 df 11 8b 08 1c 71 9d 70 84 1e a1 1b af |..V.....q.p.....| +peer1.org1.example.com | [21e6 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 60 fd b0 91 5a 9b 66 62 0b 56 |0E.!..`...Z.fb.V| +peer1.org1.example.com | 00000010 e0 3a 51 e4 10 99 41 d7 ba 6a 21 d9 e6 f7 d8 a0 |.:Q...A..j!.....| +peer1.org1.example.com | 00000020 ed 1b 9b b9 41 02 20 35 4b ce d5 03 3a f2 93 b1 |....A. 5K...:...| +peer1.org1.example.com | 00000030 1c bb 3e 6a cb a6 91 c0 22 77 7a bd 90 b5 ca bc |..>j...."wz.....| +peer1.org1.example.com | 00000040 7f bd 8a 24 ee e7 20 |...$.. | +peer1.org1.example.com | [21e7 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [21e8 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f c7 68 2f 2f 78 c0 db dd 53 12 fc |0D. o.h//x...S..| +peer1.org1.example.com | 00000010 80 76 c6 7f b6 c8 cc 51 ae 66 4f 4c 0f b4 86 86 |.v.....Q.fOL....| +peer1.org1.example.com | 00000020 b9 15 e4 d7 02 20 22 81 92 ec 3b 98 e1 64 92 f9 |..... "...;..d..| +peer1.org1.example.com | 00000030 82 cf d0 6e a9 85 53 27 8c e1 7a dd 27 f1 d0 fd |...n..S'..z.'...| +peer1.org1.example.com | 00000040 16 ba 8c d4 25 d1 |....%.| +peer1.org1.example.com | [21e9 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [21ea 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [21eb 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21ec 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21ed 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [21ee 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21ef 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [21f0 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [24af 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [24b0 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [24b1 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [24b2 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24b3 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [24b4 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24b5 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [24b6 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [24b7 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 81 8a 58 31 78 c0 66 1a e1 b8 c8 6f 59 ee a7 |...X1x.f....oY..| +peer0.org2.example.com | 00000010 98 7e 6d 00 a7 1c 52 e5 f9 51 65 50 33 33 39 b3 |.~m...R..QeP339.| +peer0.org2.example.com | [24b8 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d8 b0 ee dd 6f 61 1b b4 e3 cf |0E.!......oa....| +peer0.org2.example.com | 00000010 b2 4a 6d 5f b8 7b 34 5b 5f fa b2 4c 25 4c fe 0e |.Jm_.{4[_..L%L..| +peer0.org2.example.com | 00000020 10 60 cf 0d ac 02 20 4a 6c 54 28 40 f3 26 2c cc |.`.... JlT(@.&,.| +peer0.org2.example.com | 00000030 a4 02 dc 4c ad 76 f2 71 6b 11 64 d5 5e c1 39 f4 |...L.v.qk.d.^.9.| +peer0.org2.example.com | 00000040 84 66 1b 38 4d ee 50 |.f.8M.P| +peer0.org2.example.com | [24b9 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [24ba 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 a6 e4 74 d4 41 75 69 56 e9 ca |0E.!....t.AuiV..| +peer0.org2.example.com | 00000010 78 d2 8c 8a 6e 88 41 cf 1d 2c 6f 09 a9 fd 95 89 |x...n.A..,o.....| +peer0.org2.example.com | 00000020 87 fa 45 15 52 02 20 6d b2 7a a1 5a dd 4d 19 32 |..E.R. m.z.Z.M.2| +peer0.org2.example.com | 00000030 ac 1b 98 31 b6 5f bd 90 9d 76 a9 6a c2 f4 d3 63 |...1._...v.j...c| +peer0.org2.example.com | 00000040 57 3b 4e ee 26 13 b2 |W;N.&..| +peer0.org2.example.com | [24bb 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [24bc 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [24bd 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [24be 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [24bf 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [24c0 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24c1 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24c2 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24c3 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [24c4 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24c5 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24c6 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [1f85 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1f86 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 eb 45 ca 97 60 4a 9c c3 ed 09 62 33 43 76 98 |7.E..`J....b3Cv.| +peer0.org1.example.com | 00000010 31 69 8e 7c bd a6 46 fe 97 cd 2a 0d b9 8d 2d e2 |1i.|..F...*...-.| +peer0.org1.example.com | [1f87 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab f4 bc e5 60 7e 5d 7a 40 a1 77 |0E.!.....`~]z@.w| +peer0.org1.example.com | 00000010 72 25 07 1a aa 90 d0 13 67 09 8c 41 0c 0b 44 db |r%......g..A..D.| +peer0.org1.example.com | 00000020 0e b0 a6 ea c0 02 20 75 18 74 45 d7 ef 3c 5a 29 |...... u.tE.. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1f89 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1f8a 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f8b 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1f8c 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f 5f 38 0e 3a cd 26 b2 84 99 ae e0 4b 2e ba f7 |._8.:.&.....K...| +peer0.org1.example.com | 00000010 af 1c 33 83 1d fb c0 82 9c 23 25 73 b8 2e 01 56 |..3......#%s...V| +peer0.org1.example.com | [1f8d 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 19 c6 ba fc ef 63 dd da 44 91 11 |0D. ......c..D..| +peer0.org1.example.com | 00000010 f4 81 f0 f6 e7 9d 38 b2 3a 03 7c 47 a1 03 71 4c |......8.:.|G..qL| +peer0.org1.example.com | 00000020 bf 96 cd ea 02 20 56 95 26 f5 41 44 36 e9 8f d6 |..... V.&.AD6...| +peer0.org1.example.com | 00000030 e1 0a ec 08 9d a4 60 b1 83 68 b7 36 0b 27 5e df |......`..h.6.'^.| +peer0.org1.example.com | 00000040 83 5c 3a 4d 55 d3 |.\:MU.| +peer0.org1.example.com | [1f8e 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1f8f 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f90 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f91 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f92 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f93 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f94 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1f95 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 eb 45 ca 97 60 4a 9c c3 ed 09 62 33 43 76 98 |7.E..`J....b3Cv.| +peer0.org1.example.com | 00000010 31 69 8e 7c bd a6 46 fe 97 cd 2a 0d b9 8d 2d e2 |1i.|..F...*...-.| +peer0.org1.example.com | [1f96 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab f4 bc e5 60 7e 5d 7a 40 a1 77 |0E.!.....`~]z@.w| +peer0.org1.example.com | 00000010 72 25 07 1a aa 90 d0 13 67 09 8c 41 0c 0b 44 db |r%......g..A..D.| +peer0.org1.example.com | 00000020 0e b0 a6 ea c0 02 20 75 18 74 45 d7 ef 3c 5a 29 |...... u.tE.. DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [1f98 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 a9 a0 5a 2c 52 a9 ff 6a 6c af |0E.!....Z,R..jl.| +peer0.org1.example.com | 00000010 26 de 8e 2f f5 d3 12 45 07 06 2c f8 ab a3 09 9f |&../...E..,.....| +peer0.org1.example.com | 00000020 35 08 e0 bb 4b 02 20 18 64 58 e8 c2 a7 2c 0d 0b |5...K. .dX...,..| +peer0.org1.example.com | 00000030 75 0b 0f 7e 3c 6a 97 5c c4 3a 96 a2 73 59 4d a2 |u..~ DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1f9a 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [1f9b 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f9c 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1f9d 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f9e 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1f9f 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fa0 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fa1 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [1fa2 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 eb 45 ca 97 60 4a 9c c3 ed 09 62 33 43 76 98 |7.E..`J....b3Cv.| +peer0.org1.example.com | 00000010 31 69 8e 7c bd a6 46 fe 97 cd 2a 0d b9 8d 2d e2 |1i.|..F...*...-.| +peer0.org1.example.com | [1fa3 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab f4 bc e5 60 7e 5d 7a 40 a1 77 |0E.!.....`~]z@.w| +peer0.org1.example.com | 00000010 72 25 07 1a aa 90 d0 13 67 09 8c 41 0c 0b 44 db |r%......g..A..D.| +peer0.org1.example.com | 00000020 0e b0 a6 ea c0 02 20 75 18 74 45 d7 ef 3c 5a 29 |...... u.tE.. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1fa5 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1fa6 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fa7 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [1fa8 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f 5f 38 0e 3a cd 26 b2 84 99 ae e0 4b 2e ba f7 |._8.:.&.....K...| +peer0.org1.example.com | 00000010 af 1c 33 83 1d fb c0 82 9c 23 25 73 b8 2e 01 56 |..3......#%s...V| +peer0.org1.example.com | [1fa9 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 19 c6 ba fc ef 63 dd da 44 91 11 |0D. ......c..D..| +peer0.org1.example.com | 00000010 f4 81 f0 f6 e7 9d 38 b2 3a 03 7c 47 a1 03 71 4c |......8.:.|G..qL| +peer0.org1.example.com | 00000020 bf 96 cd ea 02 20 56 95 26 f5 41 44 36 e9 8f d6 |..... V.&.AD6...| +peer0.org1.example.com | 00000030 e1 0a ec 08 9d a4 60 b1 83 68 b7 36 0b 27 5e df |......`..h.6.'^.| +peer0.org1.example.com | 00000040 83 5c 3a 4d 55 d3 |.\:MU.| +peer0.org1.example.com | [1faa 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [1fab 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fac 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [1fad 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fae 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1faf 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1fb0 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1fb1 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1fb2 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1fb3 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1fb4 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d4d140 gate 1598907101608064200 evaluation starts +peer0.org1.example.com | [1fb5 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d4d140 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1fb6 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d4d140 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1fb7 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d4d140 principal matched by identity 0 +peer0.org1.example.com | [1fb8 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef a0 d0 0f d5 8c b6 eb 36 4d af 12 a7 c3 89 3b |........6M.....;| +peer0.org1.example.com | 00000010 7d 82 e8 7f de 1f b2 da 14 18 48 82 58 48 51 5f |}.........H.XHQ_| +peer0.org1.example.com | [1fb9 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 c5 94 1a 88 b1 52 36 24 bc ae |0E.!.......R6$..| +peer0.org1.example.com | 00000010 b3 c7 b0 17 8a 81 ec e9 c1 f8 90 e6 30 64 de 41 |............0d.A| +peer0.org1.example.com | 00000020 a7 59 21 e7 e3 02 20 18 a5 c5 c5 03 be ed b6 82 |.Y!... .........| +peer0.org1.example.com | 00000030 f3 cf 18 ab 15 44 5c b3 9b bd 89 50 a7 13 d3 d1 |.....D\....P....| +peer0.org1.example.com | 00000040 b9 0f 00 91 aa f9 bd |.......| +peer0.org1.example.com | [1fba 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d4d140 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1fbb 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d4d140 gate 1598907101608064200 evaluation succeeds +peer0.org2.example.com | [24c7 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [24c8 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [24c9 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24ca 08-31 20:51:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [24cb 08-31 20:51:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 20 bb 95 d4 12 4c 13 20 17 ba 7b b3 4f e0 a3 |7 ....L. ..{.O..| +peer0.org2.example.com | 00000010 af 17 73 a8 39 dc 01 46 86 4b dc 4c 6f 26 4b 1b |..s.9..F.K.Lo&K.| +peer0.org2.example.com | [24cc 08-31 20:51:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 e8 d2 54 64 93 06 e9 2c dd f7 02 |0D. D..Td...,...| +peer0.org2.example.com | 00000010 42 cd 9c f4 63 62 b7 64 de ab 37 aa d7 34 e1 9e |B...cb.d..7..4..| +peer0.org2.example.com | 00000020 61 26 50 ed 02 20 6c f6 bd 45 e4 e7 45 7b 29 dc |a&P.. l..E..E{).| +peer0.org2.example.com | 00000030 aa 19 75 6d 81 40 b9 ef 96 25 51 97 59 e9 01 03 |..um.@...%Q.Y...| +peer0.org2.example.com | 00000040 e7 e2 ff 64 dc 7f |...d..| +peer0.org2.example.com | [24cd 08-31 20:51:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24ce 08-31 20:51:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24cf 08-31 20:51:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24d0 08-31 20:51:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [24d1 08-31 20:51:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [24d2 08-31 20:51:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [24d3 08-31 20:51:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [24d4 08-31 20:51:49.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [24d5 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [24d6 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [24d7 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24d8 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24d9 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24da 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24db 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24dc 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [24dd 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [24de 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24df 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [24e0 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [24e1 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [24e2 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [24e3 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [244d 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004416450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [244e 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004416450 principal evaluation fails +peer1.org2.example.com | [244f 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004416450 gate 1598907110490497800 evaluation fails +peer1.org2.example.com | [2450 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2451 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2452 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2453 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2454 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2455 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044169c0 gate 1598907110490878000 evaluation starts +peer1.org2.example.com | [2456 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044169c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2457 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2458 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2459 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044169c0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [245a 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044169c0 principal matched by identity 0 +peer1.org2.example.com | [245b 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [245c 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [245d 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044169c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [245e 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044169c0 gate 1598907110490878000 evaluation succeeds +peer1.org2.example.com | [245f 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2460 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2461 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2462 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2463 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [2464 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [2465 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2466 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2467 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2468 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2469 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [246a 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [21f1 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [21f2 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [21f3 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 f3 24 d0 88 ad 43 07 03 12 e3 c5 30 1b 19 d1 |..$...C.....0...| +peer1.org1.example.com | 00000010 84 d1 56 df 11 8b 08 1c 71 9d 70 84 1e a1 1b af |..V.....q.p.....| +peer1.org1.example.com | [21f4 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 60 fd b0 91 5a 9b 66 62 0b 56 |0E.!..`...Z.fb.V| +peer1.org1.example.com | 00000010 e0 3a 51 e4 10 99 41 d7 ba 6a 21 d9 e6 f7 d8 a0 |.:Q...A..j!.....| +peer1.org1.example.com | 00000020 ed 1b 9b b9 41 02 20 35 4b ce d5 03 3a f2 93 b1 |....A. 5K...:...| +peer1.org1.example.com | 00000030 1c bb 3e 6a cb a6 91 c0 22 77 7a bd 90 b5 ca bc |..>j...."wz.....| +peer1.org1.example.com | 00000040 7f bd 8a 24 ee e7 20 |...$.. | +peer1.org1.example.com | [21f5 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [21f6 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [21f7 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21f8 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21f9 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [21fa 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [21fb 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 f3 24 d0 88 ad 43 07 03 12 e3 c5 30 1b 19 d1 |..$...C.....0...| +peer1.org1.example.com | 00000010 84 d1 56 df 11 8b 08 1c 71 9d 70 84 1e a1 1b af |..V.....q.p.....| +peer1.org1.example.com | [21fc 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 60 fd b0 91 5a 9b 66 62 0b 56 |0E.!..`...Z.fb.V| +peer1.org1.example.com | 00000010 e0 3a 51 e4 10 99 41 d7 ba 6a 21 d9 e6 f7 d8 a0 |.:Q...A..j!.....| +peer1.org1.example.com | 00000020 ed 1b 9b b9 41 02 20 35 4b ce d5 03 3a f2 93 b1 |....A. 5K...:...| +peer1.org1.example.com | 00000030 1c bb 3e 6a cb a6 91 c0 22 77 7a bd 90 b5 ca bc |..>j...."wz.....| +peer1.org1.example.com | 00000040 7f bd 8a 24 ee e7 20 |...$.. | +peer1.org1.example.com | [21fd 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [21fe 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [21ff 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2200 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2201 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2202 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2203 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2204 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2205 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2206 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2207 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2208 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2209 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fc530 gate 1598907113335114800 evaluation starts +peer0.org1.example.com | [1fbc 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1fbd 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1fbe 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1fbf 08-31 20:51:41.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1fc0 08-31 20:51:41.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [1fc1 08-31 20:51:41.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fc2 08-31 20:51:41.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fc3 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fc4 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fc5 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [1fc6 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fc7 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fc8 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fc9 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fca 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fcb 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1fcc 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1fcd 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [1fce 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [1fcf 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [1fd0 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [1fd1 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fd2 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fd3 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1fd4 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1fd5 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1fd6 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1fd7 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [24e4 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [24e5 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [24e6 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [24e7 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [24e8 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [24e9 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [24ea 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004578a80 gate 1598907109313467900 evaluation starts +peer0.org2.example.com | [24eb 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004578a80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [24ec 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004578a80 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [24ed 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004578a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [24ee 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004578a80 principal evaluation fails +peer0.org2.example.com | [24ef 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004578a80 gate 1598907109313467900 evaluation fails +peer0.org2.example.com | [24f0 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [24f1 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [24f2 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [24f3 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004578ff0 gate 1598907109313809600 evaluation starts +peer0.org2.example.com | [24f4 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004578ff0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [24f5 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004578ff0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [24f6 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004578ff0 principal matched by identity 0 +peer0.org2.example.com | [24f7 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e1 ad 29 18 79 ab 40 6a e9 8e 72 aa e7 f3 82 |...).y.@j..r....| +peer0.org2.example.com | 00000010 c5 74 7f 2d d1 9d 8b d1 21 31 f7 e5 45 4a f1 bc |.t.-....!1..EJ..| +peer0.org2.example.com | [24f8 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 cc 45 75 d1 90 0d ae 8f b3 b9 00 |0D. '.Eu........| +peer0.org2.example.com | 00000010 eb 7a bf d7 c1 d2 9b aa 08 e6 29 54 aa d1 49 a6 |.z........)T..I.| +peer0.org2.example.com | 00000020 45 28 ed cb 02 20 42 99 45 f1 b0 c4 5c 25 51 a1 |E(... B.E...\%Q.| +peer0.org2.example.com | 00000030 6c 01 8d a7 37 8c e3 55 09 ee 7d 91 68 d1 f1 f9 |l...7..U..}.h...| +peer0.org2.example.com | 00000040 b9 a7 ad c3 90 cd |......| +peer0.org2.example.com | [24f9 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004578ff0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [24fa 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004578ff0 gate 1598907109313809600 evaluation succeeds +peer0.org2.example.com | [24fb 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [24fc 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [24fd 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [24fe 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [24ff 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2500 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2501 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2502 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2503 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2504 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2505 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2506 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2507 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [2508 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2509 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [250a 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [250b 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [250c 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:V\370\204!l\243\276" > alive: +peer0.org2.example.com | [250d 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [250e 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [250f 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [2510 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2511 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [2512 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2513 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [2514 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2515 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2516 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2517 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2518 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2519 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [251a 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [251b 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [251c 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [251d 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [251e 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [251f 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2520 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [220a 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fc530 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [220b 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fc530 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [220c 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fc530 principal matched by identity 0 +peer1.org1.example.com | [220d 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c aa a5 5a 6c 4e f5 3d 4f b2 61 f4 2a 5b 12 81 |...ZlN.=O.a.*[..| +peer1.org1.example.com | 00000010 cb 7e 57 55 cd aa 59 d5 f2 c9 38 c9 21 b6 d5 fe |.~WU..Y...8.!...| +peer1.org1.example.com | [220e 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 67 b2 ff a9 ff 61 ec 7b a5 ba 8d |0D. )b.| +peer1.org1.example.com | 00000040 2f 96 e8 d8 54 7f |/...T.| +peer1.org1.example.com | [220f 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fc530 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2210 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048fc530 gate 1598907113335114800 evaluation succeeds +peer1.org1.example.com | [2211 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2212 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2213 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2214 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2215 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2216 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2217 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2218 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2219 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [221a 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [221b 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [221c 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [221d 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [221e 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [221f 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2220 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2221 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [2222 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2223 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2224 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2225 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2226 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2227 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2228 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [246b 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [246c 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [246d 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443e100 gate 1598907110495736300 evaluation starts +peer1.org2.example.com | [246e 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443e100 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [246f 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443e100 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2470 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443e100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2471 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443e100 principal evaluation fails +peer1.org2.example.com | [2472 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443e100 gate 1598907110495736300 evaluation fails +peer1.org2.example.com | [2473 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2474 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2475 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2476 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443e670 gate 1598907110495999900 evaluation starts +peer1.org2.example.com | [2477 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443e670 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2478 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443e670 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2479 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443e670 principal matched by identity 0 +peer1.org2.example.com | [247a 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [247b 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [247c 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443e670 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [247d 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443e670 gate 1598907110495999900 evaluation succeeds +peer1.org2.example.com | [247e 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [247f 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2480 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2481 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2482 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [2483 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [2484 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2485 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2486 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2487 08-31 20:51:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2488 08-31 20:51:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2489 08-31 20:51:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [248a 08-31 20:51:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [248b 08-31 20:51:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [248c 08-31 20:51:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [248d 08-31 20:51:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [248e 08-31 20:51:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [248f 08-31 20:51:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2490 08-31 20:51:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2491 08-31 20:51:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2492 08-31 20:51:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2493 08-31 20:51:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2494 08-31 20:51:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2495 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2496 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2497 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2498 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2499 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [249a 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [249b 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [249c 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [249d 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [249e 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [249f 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [24a0 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004417f90 gate 1598907110548387700 evaluation starts +peer1.org2.example.com | [24a1 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004417f90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [24a2 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004417f90 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [24a3 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004417f90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [24a4 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004417f90 principal evaluation fails +peer1.org2.example.com | [24a5 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004417f90 gate 1598907110548387700 evaluation fails +peer1.org2.example.com | [24a6 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [24a7 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [24a8 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [24a9 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445c500 gate 1598907110551685900 evaluation starts +peer1.org2.example.com | [24aa 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445c500 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [24ab 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445c500 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [24ac 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445c500 principal matched by identity 0 +peer1.org2.example.com | [24ad 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 80 ee 8e 7a 30 15 ca 52 72 79 81 c8 3f 87 f1 |....z0..Rry..?..| +peer1.org2.example.com | 00000010 11 86 d9 fc e2 72 ce 6d 4e 23 e0 7d b8 51 be d4 |.....r.mN#.}.Q..| +peer1.org2.example.com | [24ae 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 fb 1c d5 c5 80 fc e4 98 ad f9 |0E.!............| +peer1.org2.example.com | 00000010 9d 06 10 59 f6 f4 8f 43 df 37 66 82 05 f8 a3 8b |...Y...C.7f.....| +peer1.org2.example.com | 00000020 48 74 0d a7 85 02 20 69 bc 99 f2 a8 77 26 92 61 |Ht.... i....w&.a| +peer1.org2.example.com | 00000030 68 de dc 5e bb 78 ea 97 c6 f0 73 b4 e3 bf d2 ee |h..^.x....s.....| +peer1.org2.example.com | 00000040 af ec 89 45 41 8c 8d |...EA..| +peer1.org2.example.com | [24af 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445c500 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [24b0 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00445c500 gate 1598907110551685900 evaluation succeeds +peer1.org2.example.com | [24b1 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [24b2 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [24b3 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [24b4 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [24b5 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24b6 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [24b7 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [24b8 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [24b9 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [24ba 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24bb 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24bc 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24bd 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24be 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24bf 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24c0 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24c1 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24c2 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24c3 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24c4 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24c5 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24c6 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24c7 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [24c8 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24c9 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24ca 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24cb 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [24cc 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24cd 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24ce 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24cf 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24d0 08-31 20:51:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24d1 08-31 20:51:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24d2 08-31 20:51:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24d3 08-31 20:51:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [24d4 08-31 20:51:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24d5 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [24d6 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [24d7 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [24d9 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2229 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [222a 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [222b 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [222c 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [222d 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [222e 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [222f 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dd240 gate 1598907113532805300 evaluation starts +peer1.org1.example.com | [2230 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dd240 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2231 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dd240 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2232 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dd240 principal matched by identity 0 +peer1.org1.example.com | [2233 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 25 ef a4 57 76 c6 2c a0 ca 69 20 fd 35 fd 3d |5%..Wv.,..i .5.=| +peer1.org1.example.com | 00000010 bb a2 d6 4e af a3 21 78 39 46 88 fe 26 f6 e9 13 |...N..!x9F..&...| +peer1.org1.example.com | [2234 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 75 86 1e ea b0 26 fd 6f 71 10 |0E.!..u....&.oq.| +peer1.org1.example.com | 00000010 de 47 71 6a 39 e5 36 95 47 56 f7 27 5c 34 8c 5b |.Gqj9.6.GV.'\4.[| +peer1.org1.example.com | 00000020 36 34 ea 45 75 02 20 11 fd a8 8f 1a 32 ab 10 77 |64.Eu. .....2..w| +peer1.org1.example.com | 00000030 5e 18 50 0a c8 a7 9e 69 67 4f 0b 9d df b8 99 16 |^.P....igO......| +peer1.org1.example.com | 00000040 56 9e 51 af 23 b4 97 |V.Q.#..| +peer1.org1.example.com | [2235 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dd240 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2236 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048dd240 gate 1598907113532805300 evaluation succeeds +peer1.org1.example.com | [2237 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2238 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2239 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [223a 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [223b 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [223c 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [223d 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [223e 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [223f 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2240 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2241 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2242 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [2243 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2244 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2245 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2246 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2521 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2522 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2523 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2524 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2525 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161027 +peer0.org2.example.com | [2526 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5D58DE293E89571E448AF7FB5391AB73323E69997939D4EF4134E82C5D925CA4 +peer0.org2.example.com | [2527 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2528 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2529 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [252a 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [252b 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [252c 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [252d 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [252e 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [252f 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [2530 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2531 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2532 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2533 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2534 08-31 20:51:49.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2535 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [2536 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2537 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [2538 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2539 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d 58 de 29 3e 89 57 1e 44 8a f7 fb 53 91 ab 73 |]X.)>.W.D...S..s| +peer0.org1.example.com | [1fd8 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1fd9 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6b800 gate 1598907101718840400 evaluation starts +peer0.org1.example.com | [1fda 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6b800 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1fdb 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6b800 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1fdc 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6b800 principal matched by identity 0 +peer0.org1.example.com | [1fdd 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [1fde 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [1fdf 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6b800 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1fe0 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6b800 gate 1598907101718840400 evaluation succeeds +peer0.org1.example.com | [1fe1 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1fe2 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1fe3 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1fe4 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1fe5 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fe6 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fe7 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [1fe8 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1fe9 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1fea 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [1feb 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [1fec 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [1fed 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d84a00 gate 1598907101722029200 evaluation starts +peer0.org1.example.com | [1fee 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d84a00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [1fef 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d84a00 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [1ff0 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d84a00 principal matched by identity 0 +peer0.org1.example.com | [1ff1 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [1ff2 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [1ff3 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d84a00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [1ff4 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d84a00 gate 1598907101722029200 evaluation succeeds +peer0.org1.example.com | [1ff5 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ff6 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ff8 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [1ff9 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [1ffa 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [1ffb 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [1ffc 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [1ffd 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1ffe 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [1fff 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2000 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2001 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [1ff7 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [2002 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2003 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2004 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2005 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2006 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d85e50 gate 1598907101729622900 evaluation starts +peer0.org1.example.com | [2007 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d85e50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2008 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d85e50 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2009 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d85e50 principal matched by identity 0 +peer0.org1.example.com | [200a 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [200b 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [200c 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d85e50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [200d 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d85e50 gate 1598907101729622900 evaluation succeeds +peer0.org1.example.com | [200e 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [200f 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2010 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2011 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2012 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [2013 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [2014 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2015 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 32 3e 69 99 79 39 d4 ef 41 34 e8 2c 5d 92 5c a4 |2>i.y9..A4.,].\.| +peer0.org2.example.com | [253a 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 f8 55 a0 2b 98 7e 58 e5 5c 40 2e |0D. 4.U.+.~X.\@.| +peer0.org2.example.com | 00000010 50 fe 7c d2 67 3e 14 14 2e a5 16 3c 90 40 d9 07 |P.|.g>.....<.@..| +peer0.org2.example.com | 00000020 3f 9f b1 93 02 20 36 2b 3b 7d ab 73 f8 23 89 74 |?.... 6+;}.s.#.t| +peer0.org2.example.com | 00000030 9b d6 f2 88 bc 63 45 b0 8e 0f 16 db 35 57 42 35 |.....cE.....5WB5| +peer0.org2.example.com | 00000040 f3 3d cc 8c 1f c9 |.=....| +peer0.org2.example.com | [253b 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [253c 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 6a 4e bf 01 b4 e5 08 56 01 ed 16 |0D. vjN.....V...| +peer0.org2.example.com | 00000010 12 4a 64 45 e0 0d 54 52 51 89 8c e9 c1 d8 34 1a |.JdE..TRQ.....4.| +peer0.org2.example.com | 00000020 27 c1 e1 54 02 20 59 16 f4 82 6a 9f 37 c3 5e 53 |'..T. Y...j.7.^S| +peer0.org2.example.com | 00000030 88 e4 bb 7d f4 c2 9d cb db cb 9e d0 67 69 05 eb |...}........gi..| +peer0.org2.example.com | 00000040 d0 d0 04 46 dd 93 |...F..| +peer0.org2.example.com | [253d 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [253e 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [253f 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2540 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2541 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2542 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2543 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2544 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2545 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2546 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2547 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2548 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2549 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [254a 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [254b 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [254c 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c5d10 gate 1598907109523677300 evaluation starts +peer0.org2.example.com | [254d 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c5d10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [254e 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c5d10 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [254f 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c5d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2550 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c5d10 principal evaluation fails +peer0.org2.example.com | [2551 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c5d10 gate 1598907109523677300 evaluation fails +peer0.org2.example.com | [2552 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2553 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2554 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2555 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4280 gate 1598907109524046200 evaluation starts +peer0.org2.example.com | [2556 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4280 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2557 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4280 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2558 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4280 principal matched by identity 0 +peer0.org2.example.com | [2559 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e1 ad 29 18 79 ab 40 6a e9 8e 72 aa e7 f3 82 |...).y.@j..r....| +peer0.org2.example.com | 00000010 c5 74 7f 2d d1 9d 8b d1 21 31 f7 e5 45 4a f1 bc |.t.-....!1..EJ..| +peer0.org2.example.com | [255a 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 cc 45 75 d1 90 0d ae 8f b3 b9 00 |0D. '.Eu........| +peer0.org2.example.com | 00000010 eb 7a bf d7 c1 d2 9b aa 08 e6 29 54 aa d1 49 a6 |.z........)T..I.| +peer0.org2.example.com | 00000020 45 28 ed cb 02 20 42 99 45 f1 b0 c4 5c 25 51 a1 |E(... B.E...\%Q.| +peer0.org2.example.com | 00000030 6c 01 8d a7 37 8c e3 55 09 ee 7d 91 68 d1 f1 f9 |l...7..U..}.h...| +peer0.org2.example.com | 00000040 b9 a7 ad c3 90 cd |......| +peer0.org2.example.com | [255b 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4280 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [255c 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e4280 gate 1598907109524046200 evaluation succeeds +peer0.org2.example.com | [255d 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [255e 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [255f 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2560 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2561 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2562 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2563 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2564 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d 58 de 29 3e 89 57 1e 44 8a f7 fb 53 91 ab 73 |]X.)>.W.D...S..s| +peer0.org2.example.com | 00000010 32 3e 69 99 79 39 d4 ef 41 34 e8 2c 5d 92 5c a4 |2>i.y9..A4.,].\.| +peer0.org2.example.com | [2565 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 f8 55 a0 2b 98 7e 58 e5 5c 40 2e |0D. 4.U.+.~X.\@.| +peer0.org2.example.com | 00000010 50 fe 7c d2 67 3e 14 14 2e a5 16 3c 90 40 d9 07 |P.|.g>.....<.@..| +peer0.org2.example.com | 00000020 3f 9f b1 93 02 20 36 2b 3b 7d ab 73 f8 23 89 74 |?.... 6+;}.s.#.t| +peer0.org2.example.com | 00000030 9b d6 f2 88 bc 63 45 b0 8e 0f 16 db 35 57 42 35 |.....cE.....5WB5| +peer0.org2.example.com | 00000040 f3 3d cc 8c 1f c9 |.=....| +peer0.org2.example.com | [2566 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2567 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2568 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2569 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [256a 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 81 8a 58 31 78 c0 66 1a e1 b8 c8 6f 59 ee a7 |...X1x.f....oY..| +peer0.org2.example.com | 00000010 98 7e 6d 00 a7 1c 52 e5 f9 51 65 50 33 33 39 b3 |.~m...R..QeP339.| +peer0.org2.example.com | [256b 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d8 b0 ee dd 6f 61 1b b4 e3 cf |0E.!......oa....| +peer0.org2.example.com | 00000010 b2 4a 6d 5f b8 7b 34 5b 5f fa b2 4c 25 4c fe 0e |.Jm_.{4[_..L%L..| +peer0.org2.example.com | 00000020 10 60 cf 0d ac 02 20 4a 6c 54 28 40 f3 26 2c cc |.`.... JlT(@.&,.| +peer0.org2.example.com | 00000030 a4 02 dc 4c ad 76 f2 71 6b 11 64 d5 5e c1 39 f4 |...L.v.qk.d.^.9.| +peer0.org2.example.com | 00000040 84 66 1b 38 4d ee 50 |.f.8M.P| +peer0.org2.example.com | [256c 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [256d 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [256e 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [256f 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2570 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2571 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2572 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2573 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2016 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2017 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2018 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2019 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [201a 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [201b 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [201c 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9740 gate 1598907101733666700 evaluation starts +peer0.org1.example.com | [201d 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9740 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [201e 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9740 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [201f 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9740 principal matched by identity 0 +peer0.org1.example.com | [2020 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [2021 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [2022 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9740 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2023 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9740 gate 1598907101733666700 evaluation succeeds +peer0.org1.example.com | [2024 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2025 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2026 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2027 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2028 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [2029 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [202a 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [202b 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [202c 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [202d 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [202e 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [202f 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2030 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2031 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2032 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2033 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2034 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2035 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc5280 gate 1598907101741346200 evaluation starts +peer0.org1.example.com | [2036 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc5280 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2037 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc5280 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2038 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc5280 principal matched by identity 0 +peer0.org1.example.com | [2039 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [203a 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [203b 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc5280 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [203c 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc5280 gate 1598907101741346200 evaluation succeeds +peer0.org1.example.com | [203d 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [203e 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [203f 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2040 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2041 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [2042 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [2043 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [2044 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [2045 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2046 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2047 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2247 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:)b\021/\226\350\330T\177" > alive:\314\t\353\027\263\305\357(\373\217\306\214\353\334R\237\267\263\214\002 _\234\232\231Y\265\245Ja\303\272\305hKW\200\303\320\310\3165\3745\202)+\350o\002\300\3075" > +peer1.org1.example.com | [2248 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2249 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [224a 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [224b 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [224c 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [224d 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [224e 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [224f 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2250 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [2251 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [2252 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2253 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [2254 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [2255 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 57 7c 95 e3 e5 d9 b8 52 4a d7 5b 1b 7f 2a ca |GW|.....RJ.[..*.| +peer1.org1.example.com | 00000010 57 36 ea e0 32 de b5 6d ac 33 3f 9a f0 32 c8 7a |W6..2..m.3?..2.z| +peer1.org1.example.com | [2256 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 98 06 f9 87 d9 60 5f 06 9e 17 1a |0D. c.....`_....| +peer1.org1.example.com | 00000010 03 1d 48 68 b2 76 ec 51 36 72 75 cb e0 2c b5 a7 |..Hh.v.Q6ru..,..| +peer1.org1.example.com | 00000020 59 f1 2f 50 02 20 00 ff 95 08 39 9c bc f8 e9 15 |Y./P. ....9.....| +peer1.org1.example.com | 00000030 a6 53 67 72 e9 b6 df 11 56 90 e8 92 32 40 4f 45 |.Sgr....V...2@OE| +peer1.org1.example.com | 00000040 62 28 71 bf 24 e7 |b(q.$.| +peer1.org1.example.com | [2257 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [2258 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 13 b5 d3 7a 97 35 f8 c3 86 a1 1d |0D. ....z.5.....| +peer1.org1.example.com | 00000010 b7 c2 65 d0 5f 2d 86 64 b3 99 56 db 75 e4 4b b3 |..e._-.d..V.u.K.| +peer1.org1.example.com | 00000020 c8 e0 fb 6e 02 20 7d d9 48 1f 82 c4 39 84 52 34 |...n. }.H...9.R4| +peer1.org1.example.com | 00000030 8f a8 33 ba c8 c6 a3 7c c2 60 5e b7 0e 35 ab fa |..3....|.`^..5..| +peer1.org1.example.com | 00000040 31 6e ed 11 e4 55 |1n...U| +peer1.org1.example.com | [2259 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [225a 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [225b 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [225c 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [225d 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [225e 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [225f 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2260 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2261 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [2262 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2263 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2264 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2265 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [2266 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2267 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\314\t\353\027\263\305\357(\373\217\306\214\353\334R\237\267\263\214\002 _\234\232\231Y\265\245Ja\303\272\305hKW\200\303\320\310\3165\3745\202)+\350o\002\300\3075" > +peer1.org1.example.com | [2268 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2269 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [226a 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [226b 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [226c 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [226d 08-31 20:51:53.76 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [226e 08-31 20:51:53.76 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org1.example.com | [226f 08-31 20:51:53.76 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [2270 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [2271 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [2272 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 15 e7 66 fe be c2 60 25 b3 98 82 9f 21 c3 e2 |...f...`%....!..| +peer1.org1.example.com | 00000010 6a 58 69 4f 87 ba 15 3b 53 17 c1 f7 a8 b9 49 37 |jXiO...;S.....I7| +peer1.org1.example.com | [2273 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 6c 4d e3 b8 a8 c5 69 17 b0 bd ac |0D. XlM....i....| +peer1.org1.example.com | 00000010 a8 b2 af 89 ea ab 6a 52 36 4f af 65 cb 67 47 1d |......jR6O.e.gG.| +peer1.org1.example.com | 00000020 12 f6 16 89 02 20 61 73 61 c7 67 8f e0 70 93 58 |..... asa.g..p.X| +peer1.org1.example.com | 00000030 33 90 a7 1c 85 78 e6 a6 6f 4f 5a ca 8d 37 65 bb |3....x..oOZ..7e.| +peer1.org1.example.com | 00000040 09 76 2b 96 6b 18 |.v+.k.| +peer1.org1.example.com | [2274 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2275 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2276 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2277 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [2278 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2279 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [227a 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [227b 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [227c 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [227d 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [227e 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [227f 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [2048 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2049 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [204a 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [204b 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [204c 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [204d 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de5260 gate 1598907101749013300 evaluation starts +peer0.org1.example.com | [204e 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de5260 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [204f 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de5260 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2050 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de5260 principal matched by identity 0 +peer0.org1.example.com | [2051 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [2052 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [2053 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de5260 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2054 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de5260 gate 1598907101749013300 evaluation succeeds +peer0.org1.example.com | [2055 08-31 20:51:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2056 08-31 20:51:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2057 08-31 20:51:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2058 08-31 20:51:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2059 08-31 20:51:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [205a 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [205b 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [205c 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [205d 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [205e 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [205f 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2060 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2061 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2062 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [2063 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [2064 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2065 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2066 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2067 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2068 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2069 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [206a 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [206b 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [206c 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [206d 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [206e 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [206f 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2070 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2071 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2072 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2073 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2074 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2280 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2281 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2282 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2283 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2284 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2285 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2286 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [2287 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [2288 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2289 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [228a 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [228b 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [228c 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [228d 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [228e 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [228f 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2290 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2291 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497c070 gate 1598907113973849000 evaluation starts +peer1.org1.example.com | [2292 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497c070 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2293 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497c070 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2294 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497c070 principal matched by identity 0 +peer1.org1.example.com | [2295 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [2296 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [2297 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497c070 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2298 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497c070 gate 1598907113973849000 evaluation succeeds +peer1.org1.example.com | [2299 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [229a 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [229b 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [229c 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [229d 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [229e 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [229f 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [22a0 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22a1 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22a2 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [22a3 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [22a4 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [22a5 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [22a6 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [22a7 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [22a8 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497d960 gate 1598907113979234600 evaluation starts +peer1.org1.example.com | [22a9 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497d960 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [22aa 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497d960 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [22ab 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497d960 principal matched by identity 0 +peer1.org1.example.com | [22ac 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [22ad 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [22ae 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497d960 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [22af 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00497d960 gate 1598907113979234600 evaluation succeeds +peer1.org1.example.com | [22b0 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [22b1 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [22b2 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [22b3 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [22b4 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [22b5 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [22b6 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22b7 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [22b8 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22b9 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22ba 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2075 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2076 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2077 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2078 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2079 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [207a 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [207b 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [207c 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D9816100A1801 +peer0.org1.example.com | [207d 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E4A6A9FB158ED26002033D4254B609744DD55531E12D8F4008327574B73537DA +peer0.org1.example.com | [207e 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [207f 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2080 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2081 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2082 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2083 08-31 20:51:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2084 08-31 20:51:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2085 08-31 20:51:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2086 08-31 20:51:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [2087 08-31 20:51:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2088 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2089 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [208a 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [208b 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [208c 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [208d 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [208e 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [208f 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2090 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2091 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [2092 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2093 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2094 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2095 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2096 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2097 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2098 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22bb 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [22bc 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [22bd 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [22be 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [22bf 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [22c0 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [22c1 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00499f4a0 gate 1598907113983119600 evaluation starts +peer1.org1.example.com | [22c2 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00499f4a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [22c3 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00499f4a0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [22c4 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00499f4a0 principal matched by identity 0 +peer1.org1.example.com | [22c5 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [22c6 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [22c7 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00499f4a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [22c8 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00499f4a0 gate 1598907113983119600 evaluation succeeds +peer1.org1.example.com | [22c9 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [22ca 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [22cb 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [22cc 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [22cd 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [22ce 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [22cf 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [22d0 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [22d1 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22d2 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2574 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2575 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2576 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2577 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2578 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2579 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [257a 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045feb50 gate 1598907109529027800 evaluation starts +peer0.org2.example.com | [257b 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045feb50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [257c 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045feb50 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [257d 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045feb50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [257e 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045feb50 principal evaluation fails +peer0.org2.example.com | [257f 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045feb50 gate 1598907109529027800 evaluation fails +peer0.org2.example.com | [2580 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2581 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2582 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2583 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff0c0 gate 1598907109529394000 evaluation starts +peer0.org2.example.com | [2584 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff0c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2585 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff0c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2586 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff0c0 principal matched by identity 0 +peer0.org2.example.com | [2587 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e f6 c9 58 d0 fe 08 f5 24 ca 0e c3 c1 e4 5d a3 |N..X....$.....].| +peer0.org2.example.com | 00000010 96 ab 65 9c e2 45 0b 51 c9 e8 39 b0 a3 05 fa 0f |..e..E.Q..9.....| +peer0.org2.example.com | [2588 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 8e c8 4f 6a 51 b2 20 05 07 49 f0 |0D. u..OjQ. ..I.| +peer0.org2.example.com | 00000010 e2 7c 00 d5 f8 fa 7b fa 96 fe 1f 0c 3a 9a 55 39 |.|....{.....:.U9| +peer0.org2.example.com | 00000020 96 51 b1 5c 02 20 27 5b 08 bb 01 54 3a 27 0c 38 |.Q.\. '[...T:'.8| +peer0.org2.example.com | 00000030 1d 3a db 7f 80 c9 96 03 3c ee ec 81 91 22 3e 56 |.:......<....">V| +peer0.org2.example.com | 00000040 f8 84 21 6c a3 be |..!l..| +peer0.org2.example.com | [2589 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff0c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [258a 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ff0c0 gate 1598907109529394000 evaluation succeeds +peer0.org2.example.com | [258b 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [258c 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [258d 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [258e 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [258f 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2590 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2591 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2592 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d 58 de 29 3e 89 57 1e 44 8a f7 fb 53 91 ab 73 |]X.)>.W.D...S..s| +peer0.org2.example.com | 00000010 32 3e 69 99 79 39 d4 ef 41 34 e8 2c 5d 92 5c a4 |2>i.y9..A4.,].\.| +peer0.org2.example.com | [2593 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 f8 55 a0 2b 98 7e 58 e5 5c 40 2e |0D. 4.U.+.~X.\@.| +peer0.org2.example.com | 00000010 50 fe 7c d2 67 3e 14 14 2e a5 16 3c 90 40 d9 07 |P.|.g>.....<.@..| +peer0.org2.example.com | 00000020 3f 9f b1 93 02 20 36 2b 3b 7d ab 73 f8 23 89 74 |?.... 6+;}.s.#.t| +peer0.org2.example.com | 00000030 9b d6 f2 88 bc 63 45 b0 8e 0f 16 db 35 57 42 35 |.....cE.....5WB5| +peer0.org2.example.com | 00000040 f3 3d cc 8c 1f c9 |.=....| +peer0.org2.example.com | [2594 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2595 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2596 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22d3 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [22d4 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [22d5 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [22d6 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [22d7 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [22d8 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [22d9 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c3480 gate 1598907113987886000 evaluation starts +peer1.org1.example.com | [22da 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c3480 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [22db 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c3480 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [22dc 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c3480 principal matched by identity 0 +peer1.org1.example.com | [22dd 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [22de 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [22df 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c3480 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [22e0 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c3480 gate 1598907113987886000 evaluation succeeds +peer1.org1.example.com | [22e1 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [22e2 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [22e3 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [22e4 08-31 20:51:53.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [22e5 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [22e6 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [22e7 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [22e8 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [22e9 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22ea 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2099 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [209a 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [209b 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [209c 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [209d 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [209f 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [20a0 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e214f0 gate 1598907105033699700 evaluation starts +peer0.org1.example.com | [20a1 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e214f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [209e 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [20a2 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e214f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [20a4 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e214f0 principal matched by identity 0 +peer0.org1.example.com | [20a5 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 00 5e 32 f1 4e 63 4a 59 bf 46 8f 12 89 5e 9c |..^2.NcJY.F...^.| +peer0.org1.example.com | 00000010 f8 46 db ee 1d b4 2b 09 bc 0f 30 d5 87 9a 6f fd |.F....+...0...o.| +peer0.org1.example.com | [20a6 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a cf 17 e8 00 29 88 f4 17 92 b9 48 |0D. .....).....H| +peer0.org1.example.com | 00000010 d6 11 14 84 87 62 8a c9 1e 7c 52 fa aa 10 b1 12 |.....b...|R.....| +peer0.org1.example.com | 00000020 21 1f 8d b1 02 20 4f 16 05 64 35 27 b8 38 99 b3 |!.... O..d5'.8..| +peer0.org1.example.com | 00000030 01 78 cb c9 27 d3 45 12 b0 0c c5 60 35 3b 9b 0e |.x..'.E....`5;..| +peer0.org1.example.com | 00000040 0d 8a 22 30 43 52 |.."0CR| +peer0.org1.example.com | [20a7 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e214f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [20a8 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e214f0 gate 1598907105033699700 evaluation succeeds +peer0.org1.example.com | [20a9 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20aa 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20ab 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [20ac 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [20ad 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [20ae 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [20af 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [20b0 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [20b1 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [20b2 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20b3 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20b4 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20a3 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [20b5 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20b6 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [20b7 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20b8 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [20b9 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20ba 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2597 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2598 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2599 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [259a 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [259b 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [259c 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [259d 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [259e 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [259f 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25a0 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [25a1 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25a2 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 81 8a 58 31 78 c0 66 1a e1 b8 c8 6f 59 ee a7 |...X1x.f....oY..| +peer0.org2.example.com | 00000010 98 7e 6d 00 a7 1c 52 e5 f9 51 65 50 33 33 39 b3 |.~m...R..QeP339.| +peer0.org2.example.com | [25a3 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d8 b0 ee dd 6f 61 1b b4 e3 cf |0E.!......oa....| +peer0.org2.example.com | 00000010 b2 4a 6d 5f b8 7b 34 5b 5f fa b2 4c 25 4c fe 0e |.Jm_.{4[_..L%L..| +peer0.org2.example.com | 00000020 10 60 cf 0d ac 02 20 4a 6c 54 28 40 f3 26 2c cc |.`.... JlT(@.&,.| +peer0.org2.example.com | 00000030 a4 02 dc 4c ad 76 f2 71 6b 11 64 d5 5e c1 39 f4 |...L.v.qk.d.^.9.| +peer0.org2.example.com | 00000040 84 66 1b 38 4d ee 50 |.f.8M.P| +peer0.org2.example.com | [25a4 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [25a5 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25a6 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25a7 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [25a8 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25a9 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [25aa 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [25ab 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25ac 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [25ad 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25ae 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [25af 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [25b0 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [25b1 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [25b2 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004619930 gate 1598907109612902900 evaluation starts +peer0.org2.example.com | [25b3 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004619930 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [25b4 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004619930 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [25b5 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004619930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [25b6 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004619930 principal evaluation fails +peer0.org2.example.com | [25b7 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004619930 gate 1598907109612902900 evaluation fails +peer0.org2.example.com | [25b8 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [25b9 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [25ba 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [25bb 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004619ea0 gate 1598907109613267500 evaluation starts +peer0.org2.example.com | [25bc 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004619ea0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [25bd 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004619ea0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [25be 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004619ea0 principal matched by identity 0 +peer0.org2.example.com | [25bf 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 80 0a f6 aa fb bd b3 18 ae 59 a2 30 78 61 c6 |..........Y.0xa.| +peer0.org2.example.com | 00000010 7c 1e 7d 03 c7 16 a0 7b a4 98 72 54 3f ad e9 e2 ||.}....{..rT?...| +peer0.org2.example.com | [25c0 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 7e 5a 07 d9 fb df 7e 8d ef 75 |0E.!..~Z....~..u| +peer0.org2.example.com | 00000010 91 40 9e cb a0 79 92 ac 54 36 64 4e 02 a8 1b 60 |.@...y..T6dN...`| +peer0.org2.example.com | 00000020 f8 0d 64 95 c3 02 20 1a 00 42 49 20 68 2c cd 66 |..d... ..BI h,.f| +peer0.org2.example.com | 00000030 b3 96 bd ba a8 a7 82 1e aa 97 ea f8 5e 1f 45 d7 |............^.E.| +peer0.org2.example.com | 00000040 65 ef e7 0f 4e 88 1f |e...N..| +peer0.org2.example.com | [25c1 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004619ea0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [25c2 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004619ea0 gate 1598907109613267500 evaluation succeeds +peer0.org2.example.com | [25c3 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [25c4 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [25c5 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [25c6 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [25c7 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [25c8 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [25c9 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [25ca 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [25cb 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [25cc 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25cd 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25ce 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25cf 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [25d0 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25d1 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25d2 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25d3 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [25d4 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [25d5 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [25d6 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25d7 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [25d8 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25d9 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25da 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25db 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25dc 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [25dd 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25de 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25df 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25e0 08-31 20:51:49.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25e1 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [25e2 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25e3 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [25e4 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [25e5 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7a 61 cd e7 ff d3 e4 b7 be b6 86 08 ad e3 97 ee |za..............| +peer0.org2.example.com | 00000010 e3 3e 66 14 fb c0 ad 4e 8c c9 e3 30 32 02 cc cf |.>f....N...02...| +peer0.org2.example.com | [25e6 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd 5f 4e e2 29 37 5a 41 a1 48 71 |0E.!.._N.)7ZA.Hq| +peer0.org2.example.com | 00000010 88 17 37 03 dc b5 58 2d 3b 38 d3 c8 b5 97 48 1a |..7...X-;8....H.| +peer0.org2.example.com | 00000020 25 ed c9 3f 71 02 20 4c ef 68 36 b5 a1 d4 d6 03 |%..?q. L.h6.....| +peer0.org2.example.com | 00000030 83 11 cb 13 9d 7f 4f b1 52 e3 04 a9 cb f0 9a 27 |......O.R......'| +peer0.org2.example.com | 00000040 e8 51 53 9a c6 82 28 |.QS...(| +peer0.org2.example.com | [25e7 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [25e8 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [25e9 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [25ea 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [25eb 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [25ec 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25ed 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25ee 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25ef 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25f0 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25f1 08-31 20:51:50.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25f2 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [25f3 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [25f4 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [25f5 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [25f6 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25f7 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [25f8 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25f9 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [25fa 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25fb 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [25fc 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25fd 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [25fe 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [25ff 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2600 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2601 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2602 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2603 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [2604 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2605 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2606 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2607 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2608 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2609 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24da 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [24db 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [24d8 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [260a 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [24dc 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [24de 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24df 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [22eb 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [22ec 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [22ed 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [22ee 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [22ef 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [22f0 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [22f1 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dcf10 gate 1598907113993202800 evaluation starts +peer1.org1.example.com | [22f2 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dcf10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [22f3 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dcf10 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [22f4 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dcf10 principal matched by identity 0 +peer1.org1.example.com | [22f5 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [22f6 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [22f7 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dcf10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [22f8 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049dcf10 gate 1598907113993202800 evaluation succeeds +peer1.org1.example.com | [22f9 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [22fa 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [22fb 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [24e0 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24e1 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [260b 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | [24e2 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [260c 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | [24e3 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [24e4 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24dd 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24e5 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [24e6 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [24e7 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [24e8 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24e9 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [24ea 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [24eb 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24ec 08-31 20:51:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [24ed 08-31 20:51:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D9816102B +peer1.org2.example.com | [24ee 08-31 20:51:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9CAAA55A6C4EF53D4FB261F42A5B1281CB7E5755CDAA59D5F2C938C921B6D5FE +peer1.org2.example.com | [24ef 08-31 20:51:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [24f0 08-31 20:51:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [24f1 08-31 20:51:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [260d 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [260e 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [22fc 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [22fd 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [22fe 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [22ff 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2300 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2301 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2302 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2303 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2304 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2305 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2306 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2307 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fe800 gate 1598907113997880700 evaluation starts +peer1.org1.example.com | [2308 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fe800 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [20bb 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20bc 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20bd 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20be 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20bf 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20c0 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20c1 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20c2 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [20c3 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20c4 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20c5 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [20c6 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [20c7 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20c8 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [20c9 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20ca 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [20cb 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [20cc 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20cd 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [20ce 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [20cf 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [24f2 08-31 20:51:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:)b\021/\226\350\330T\177" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [24f3 08-31 20:51:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:)b\021/\226\350\330T\177" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [24f4 08-31 20:51:53.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24f5 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [24f6 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [24f7 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [24f8 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [24f9 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [24fa 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c aa a5 5a 6c 4e f5 3d 4f b2 61 f4 2a 5b 12 81 |...ZlN.=O.a.*[..| +peer1.org2.example.com | 00000010 cb 7e 57 55 cd aa 59 d5 f2 c9 38 c9 21 b6 d5 fe |.~WU..Y...8.!...| +peer1.org2.example.com | [24fb 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 67 b2 ff a9 ff 61 ec 7b a5 ba 8d |0D. )b.| +peer1.org2.example.com | 00000040 2f 96 e8 d8 54 7f |/...T.| +peer1.org2.example.com | [24fc 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [24fd 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 c8 df 7e 0c 5b 6e d3 c8 5b 81 27 |0D. G..~.[n..[.'| +peer1.org2.example.com | 00000010 80 b6 f0 68 6a 1a 97 88 bf 73 70 fb ff 2a a3 0b |...hj....sp..*..| +peer1.org2.example.com | 00000020 0c 0d 71 06 02 20 14 6a f5 7f 79 83 ba 33 d8 4d |..q.. .j..y..3.M| +peer1.org2.example.com | 00000030 9c 52 88 f2 d8 e4 8e 18 65 e1 69 93 23 ae b8 a1 |.R......e.i.#...| +peer1.org2.example.com | 00000040 af f5 e6 6b bd 55 |...k.U| +peer1.org2.example.com | [24fe 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [24ff 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2500 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2501 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2502 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2503 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:)b\021/\226\350\330T\177" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2504 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2505 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:)b\021/\226\350\330T\177" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2507 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:)b\021/\226\350\330T\177" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2508 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2506 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:)b\021/\226\350\330T\177" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [260f 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2610 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2611 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2612 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2613 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2614 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2615 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004673da0 gate 1598907110197956100 evaluation starts +peer0.org2.example.com | [2616 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004673da0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2617 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004673da0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2618 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004673da0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2619 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004673da0 principal evaluation fails +peer0.org2.example.com | [261a 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004673da0 gate 1598907110197956100 evaluation fails +peer0.org2.example.com | [261b 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [261c 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [261d 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [261e 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469a310 gate 1598907110199111700 evaluation starts +peer0.org2.example.com | [261f 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469a310 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2620 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469a310 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2621 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469a310 principal matched by identity 0 +peer0.org2.example.com | [2622 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [2623 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [2624 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469a310 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2625 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469a310 gate 1598907110199111700 evaluation succeeds +peer0.org2.example.com | [2626 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2627 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2628 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2629 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [262a 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [262b 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [262c 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [262d 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2309 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fe800 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [230a 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fe800 principal matched by identity 0 +peer1.org1.example.com | [230b 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [230c 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [230d 08-31 20:51:53.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fe800 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [230e 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049fe800 gate 1598907113997880700 evaluation succeeds +peer1.org1.example.com | [230f 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2310 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2311 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2312 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2313 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2314 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2315 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2316 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2317 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2318 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2319 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [231a 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [231b 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [231c 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [231d 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [231e 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [231f 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2320 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2321 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2322 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2323 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2324 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2325 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2326 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2327 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2328 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2329 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [232a 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [232b 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [232c 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [232d 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [232e 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [232f 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2509 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [250a 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [250b 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [250c 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [250d 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [250e 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [250f 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2510 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c aa a5 5a 6c 4e f5 3d 4f b2 61 f4 2a 5b 12 81 |...ZlN.=O.a.*[..| +peer1.org2.example.com | 00000010 cb 7e 57 55 cd aa 59 d5 f2 c9 38 c9 21 b6 d5 fe |.~WU..Y...8.!...| +peer1.org2.example.com | [2511 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 67 b2 ff a9 ff 61 ec 7b a5 ba 8d |0D. )b.| +peer1.org2.example.com | 00000040 2f 96 e8 d8 54 7f |/...T.| +peer1.org2.example.com | [2512 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2513 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2514 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2515 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2516 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2517 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2518 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2519 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c aa a5 5a 6c 4e f5 3d 4f b2 61 f4 2a 5b 12 81 |...ZlN.=O.a.*[..| +peer1.org2.example.com | 00000010 cb 7e 57 55 cd aa 59 d5 f2 c9 38 c9 21 b6 d5 fe |.~WU..Y...8.!...| +peer1.org2.example.com | [251a 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 67 b2 ff a9 ff 61 ec 7b a5 ba 8d |0D. )b.| +peer1.org2.example.com | 00000040 2f 96 e8 d8 54 7f |/...T.| +peer1.org2.example.com | [251b 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [251c 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [251d 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [251e 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [251f 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2520 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2521 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2522 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2523 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2524 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2525 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2526 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2527 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2528 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [2529 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [252a 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [20d0 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [20d1 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [20d2 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [20d3 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [20d4 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [20d5 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [20d6 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e6e5f0 gate 1598907105067159800 evaluation starts +peer0.org1.example.com | [20d7 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e6e5f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [20d8 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e6e5f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [20d9 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e6e5f0 principal matched by identity 0 +peer0.org1.example.com | [20da 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 45 06 e0 3d 9c 66 bc 90 53 b2 a5 53 47 0c 30 |.E..=.f..S..SG.0| +peer0.org1.example.com | 00000010 60 e5 a7 b0 a8 36 c4 ee b1 84 4a f2 05 1e 53 eb |`....6....J...S.| +peer0.org1.example.com | [20db 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 87 1d 29 5e 79 f2 7f 60 bc 9c c4 |0D. V..)^y..`...| +peer0.org1.example.com | 00000010 b7 35 c2 46 5c 8a 97 3e b8 93 24 9d dc c6 0b 16 |.5.F\..>..$.....| +peer0.org1.example.com | 00000020 f8 1f ef 3f 02 20 07 e9 b8 33 0f 23 cc 21 d3 98 |...?. ...3.#.!..| +peer0.org1.example.com | 00000030 9e 12 53 11 24 1d c1 d9 3b 7e eb e5 22 6f 74 cb |..S.$...;~.."ot.| +peer0.org1.example.com | 00000040 80 5e 69 15 de 32 |.^i..2| +peer0.org1.example.com | [20dc 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e6e5f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [20dd 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e6e5f0 gate 1598907105067159800 evaluation succeeds +peer0.org1.example.com | [20de 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20df 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [20e0 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [20e1 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [20e2 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [20e3 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [20e4 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [20e5 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [20e6 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [20e7 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20e8 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20e9 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20ea 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [20eb 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20ec 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20ed 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [20ee 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [20ef 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [20f0 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [252b 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [252c 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [252d 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [252e 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [252f 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2530 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2531 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2532 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2533 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2534 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2535 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2536 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b1a00 gate 1598907113323982500 evaluation starts +peer1.org2.example.com | [2537 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b1a00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2538 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b1a00 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2539 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b1a00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [253a 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b1a00 principal evaluation fails +peer1.org2.example.com | [253b 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b1a00 gate 1598907113323982500 evaluation fails +peer1.org2.example.com | [253c 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [253d 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [253e 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [253f 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b1f70 gate 1598907113325817900 evaluation starts +peer1.org2.example.com | [2540 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b1f70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2541 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b1f70 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2542 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b1f70 principal matched by identity 0 +peer1.org2.example.com | [2543 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 f3 24 d0 88 ad 43 07 03 12 e3 c5 30 1b 19 d1 |..$...C.....0...| +peer1.org2.example.com | 00000010 84 d1 56 df 11 8b 08 1c 71 9d 70 84 1e a1 1b af |..V.....q.p.....| +peer1.org2.example.com | [2544 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 60 fd b0 91 5a 9b 66 62 0b 56 |0E.!..`...Z.fb.V| +peer1.org2.example.com | 00000010 e0 3a 51 e4 10 99 41 d7 ba 6a 21 d9 e6 f7 d8 a0 |.:Q...A..j!.....| +peer1.org2.example.com | 00000020 ed 1b 9b b9 41 02 20 35 4b ce d5 03 3a f2 93 b1 |....A. 5K...:...| +peer1.org2.example.com | 00000030 1c bb 3e 6a cb a6 91 c0 22 77 7a bd 90 b5 ca bc |..>j...."wz.....| +peer1.org2.example.com | 00000040 7f bd 8a 24 ee e7 20 |...$.. | +peer1.org2.example.com | [2545 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b1f70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2546 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044b1f70 gate 1598907113325817900 evaluation succeeds +peer1.org2.example.com | [2547 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2548 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [262e 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [262f 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2630 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2631 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2632 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2633 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2634 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469bc00 gate 1598907110201736400 evaluation starts +peer0.org2.example.com | [2635 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469bc00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2636 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469bc00 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2637 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469bc00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2638 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469bc00 principal evaluation fails +peer0.org2.example.com | [2639 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469bc00 gate 1598907110201736400 evaluation fails +peer0.org2.example.com | [263a 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [263b 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [263c 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [263d 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b2170 gate 1598907110202009100 evaluation starts +peer0.org2.example.com | [263e 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b2170 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [263f 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b2170 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2640 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b2170 principal matched by identity 0 +peer0.org2.example.com | [2641 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [2642 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [2643 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b2170 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2644 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b2170 gate 1598907110202009100 evaluation succeeds +peer0.org2.example.com | [2645 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2646 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2647 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2648 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2649 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [264a 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [264b 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [264c 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [264d 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [264e 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [264f 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2650 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2651 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2652 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2653 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2654 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b35c0 gate 1598907110202985400 evaluation starts +peer0.org2.example.com | [2655 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b35c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2656 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b35c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2657 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b35c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2658 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b35c0 principal evaluation fails +peer0.org2.example.com | [2659 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b35c0 gate 1598907110202985400 evaluation fails +peer0.org2.example.com | [265a 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [265b 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [265c 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [265d 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3b30 gate 1598907110203244900 evaluation starts +peer0.org2.example.com | [265e 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3b30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [265f 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3b30 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2660 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3b30 principal matched by identity 0 +peer0.org2.example.com | [2661 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [2662 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [2663 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3b30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2664 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046b3b30 gate 1598907110203244900 evaluation succeeds +peer0.org2.example.com | [2665 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2666 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2667 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2668 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2669 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [266a 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [266b 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [266c 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [266d 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [266e 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [266f 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2670 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2671 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ced30 gate 1598907110207579500 evaluation starts +peer0.org2.example.com | [2672 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ced30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2673 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ced30 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2674 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ced30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2675 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ced30 principal evaluation fails +peer0.org2.example.com | [2676 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ced30 gate 1598907110207579500 evaluation fails +peer0.org2.example.com | [2677 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2678 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2679 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [267a 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cf2a0 gate 1598907110208567700 evaluation starts +peer0.org2.example.com | [267b 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cf2a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [267c 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cf2a0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [267d 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cf2a0 principal matched by identity 0 +peer0.org2.example.com | [267e 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [267f 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [2680 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cf2a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2681 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046cf2a0 gate 1598907110208567700 evaluation succeeds +peer0.org2.example.com | [2682 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2683 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2684 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2685 08-31 20:51:50.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2686 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [2687 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [2688 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [2689 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [268a 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [268b 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [268c 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [268d 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [268e 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2549 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [254a 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [254b 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [254c 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [254d 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [254e 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [254f 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2550 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2551 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2552 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2553 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [2554 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2555 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2556 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2557 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2558 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " > alive: alive: alive: +peer1.org2.example.com | [2559 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [255a 08-31 20:51:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [255b 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [255c 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [255d 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [255e 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [255f 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2560 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [20f1 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\334\242K\221\363\267\335\373;\t|" > alive:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > alive: +peer0.org1.example.com | [20f2 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [20f3 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [20f4 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [20f5 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20f6 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [20f7 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [20f8 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [20f9 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [20fa 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 34 2b 8c 86 00 9f 4f d6 c5 44 c7 6a 58 39 2f |.4+....O..D.jX9/| +peer0.org1.example.com | 00000010 f4 9a d0 6e 2d 4b 7d 9c ad 4f e1 9b e1 07 64 01 |...n-K}..O....d.| +peer0.org1.example.com | [20fb 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 89 a0 2c 30 68 ba 18 58 fe aa bf |0D. k..,0h..X...| +peer0.org1.example.com | 00000010 dd 82 fd 0b 62 9d cf f0 4f 4a 41 89 2f 92 df df |....b...OJA./...| +peer0.org1.example.com | 00000020 b6 fe 05 b9 02 20 71 5b 28 f1 3f 80 5d 50 f1 75 |..... q[(.?.]P.u| +peer0.org1.example.com | 00000030 24 4e de ff f0 5a 21 f5 68 0e 3b 01 2f ab 21 b1 |$N...Z!.h.;./.!.| +peer0.org1.example.com | 00000040 2a ce 67 76 aa 82 |*.gv..| +peer0.org1.example.com | [20fc 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [20fd 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [20fe 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [20ff 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2100 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2101 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2102 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2103 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2104 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2105 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2106 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2107 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2108 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2109 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [210a 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [210b 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [210c 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [210d 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2330 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2331 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2332 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2333 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2334 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2335 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2336 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004965510 gate 1598907115023759300 evaluation starts +peer1.org1.example.com | [2337 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004965510 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2338 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004965510 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2339 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004965510 principal matched by identity 0 +peer1.org1.example.com | [233a 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 c8 32 ef fe 9a 69 05 20 ae d9 27 8e 0f 69 47 |..2...i. ..'..iG| +peer1.org1.example.com | 00000010 02 5f b9 cd c5 2b a7 49 61 f7 24 bb fa 48 e0 ad |._...+.Ia.$..H..| +peer1.org1.example.com | [233b 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 37 74 52 30 80 40 0d 28 5c 4f 8a |0D. v7tR0.@.(\O.| +peer1.org1.example.com | 00000010 bd 5f 9c 26 41 ce 57 85 0b 28 62 5d 9a 38 b4 bc |._.&A.W..(b].8..| +peer1.org1.example.com | 00000020 1c 16 c8 51 02 20 3a 42 cd 07 18 b2 55 13 62 45 |...Q. :B....U.bE| +peer1.org1.example.com | 00000030 b3 0e e1 df 64 36 46 51 b8 1e 1c 57 29 7a 15 34 |....d6FQ...W)z.4| +peer1.org1.example.com | 00000040 b4 90 4c 49 0a 58 |..LI.X| +peer1.org1.example.com | [233c 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004965510 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [233d 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004965510 gate 1598907115023759300 evaluation succeeds +peer1.org1.example.com | [233e 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [233f 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2340 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2341 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2342 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2343 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2344 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2345 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2346 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2347 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2348 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2349 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [234a 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [234b 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [234c 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [234d 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [234e 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [234f 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2350 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2561 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [2562 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2563 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [2564 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2565 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 25 ef a4 57 76 c6 2c a0 ca 69 20 fd 35 fd 3d |5%..Wv.,..i .5.=| +peer1.org2.example.com | 00000010 bb a2 d6 4e af a3 21 78 39 46 88 fe 26 f6 e9 13 |...N..!x9F..&...| +peer1.org2.example.com | [2566 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 75 86 1e ea b0 26 fd 6f 71 10 |0E.!..u....&.oq.| +peer1.org2.example.com | 00000010 de 47 71 6a 39 e5 36 95 47 56 f7 27 5c 34 8c 5b |.Gqj9.6.GV.'\4.[| +peer1.org2.example.com | 00000020 36 34 ea 45 75 02 20 11 fd a8 8f 1a 32 ab 10 77 |64.Eu. .....2..w| +peer1.org2.example.com | 00000030 5e 18 50 0a c8 a7 9e 69 67 4f 0b 9d df b8 99 16 |^.P....igO......| +peer1.org2.example.com | 00000040 56 9e 51 af 23 b4 97 |V.Q.#..| +peer1.org2.example.com | [2567 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [2568 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 d3 19 31 4f 60 39 2f 78 7e fc |0E.!....1O`9/x~.| +peer1.org2.example.com | 00000010 4e ae 91 77 aa c5 a1 58 b4 f5 6a a5 bc b6 96 06 |N..w...X..j.....| +peer1.org2.example.com | 00000020 f4 97 6a 25 ba 02 20 2b 17 15 87 b0 f6 d2 1d cf |..j%.. +........| +peer1.org2.example.com | 00000030 f2 88 2a 3a 60 47 27 8f ff 25 76 59 46 f7 53 22 |..*:`G'..%vYF.S"| +peer1.org2.example.com | 00000040 f2 c3 a1 ac 8f 4a 9b |.....J.| +peer1.org2.example.com | [2569 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [256a 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [256b 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [256c 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [256d 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [256e 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [256f 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2570 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2571 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [2572 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2573 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2574 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2575 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [2576 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [2577 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2578 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2579 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [257a 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [257b 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [257c 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2351 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2352 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2353 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2354 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2355 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2356 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2357 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2358 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2359 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [235a 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [235b 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [235c 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [235d 08-31 20:51:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [235e 08-31 20:51:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [235f 08-31 20:51:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2360 08-31 20:51:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2361 08-31 20:51:55.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2362 08-31 20:51:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2363 08-31 20:51:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D9816102D +peer1.org1.example.com | [2364 08-31 20:51:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0CE09D52A9D6999FC0D3B5FC72615B2FFD9BA9A2914D62CA747A7ACD4DE9CEAC +peer1.org1.example.com | [2365 08-31 20:51:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2366 08-31 20:51:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2367 08-31 20:51:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [2368 08-31 20:51:55.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [2369 08-31 20:51:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [236a 08-31 20:51:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [236b 08-31 20:51:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [236c 08-31 20:51:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [236d 08-31 20:51:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [236e 08-31 20:51:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [236f 08-31 20:51:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2370 08-31 20:51:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2371 08-31 20:51:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2372 08-31 20:51:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2373 08-31 20:51:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2374 08-31 20:51:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2375 08-31 20:51:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2376 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2377 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2378 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2379 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [237a 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [237b 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [237c 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [237d 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [237e 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [237f 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2380 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2381 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2382 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a35ec0 gate 1598907115455836600 evaluation starts +peer1.org1.example.com | [2383 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a35ec0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2384 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a35ec0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2385 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a35ec0 principal matched by identity 0 +peer1.org1.example.com | [2386 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 77 44 48 28 c9 7a 8c 15 b4 95 05 73 94 af 1c fa |wDH(.z.....s....| +peer1.org1.example.com | 00000010 52 b0 8e 96 e0 be 46 87 b6 ca a3 92 82 67 b3 cc |R.....F......g..| +peer1.org1.example.com | [2387 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 e7 cf c8 3f 2c 21 aa c4 62 9f |0E.!.....?,!..b.| +peer1.org1.example.com | 00000010 49 7c cf 61 b1 50 5d 9e e7 5a ee ab 14 5e 7b 59 |I|.a.P]..Z...^{Y| +peer1.org1.example.com | 00000020 65 63 40 3b 50 02 20 11 fd 26 3b ae e6 a2 7d 72 |ec@;P. ..&;...}r| +peer1.org1.example.com | 00000030 89 0f 22 76 26 ed 1b 89 d9 9a 80 ea d4 57 ab 2a |.."v&........W.*| +peer1.org1.example.com | 00000040 55 a6 da 90 08 08 7c |U.....|| +peer1.org1.example.com | [2388 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a35ec0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2389 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a35ec0 gate 1598907115455836600 evaluation succeeds +peer1.org1.example.com | [238a 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [238b 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [238c 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [257d 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [257e 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [257f 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2580 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [2581 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2582 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2583 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2584 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2585 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2586 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2587 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2588 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2589 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [258a 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [258b 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [258c 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [258d 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004540000 gate 1598907113618088100 evaluation starts +peer1.org2.example.com | [258e 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004540000 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [258f 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004540000 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2590 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004540000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2591 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004540000 principal evaluation fails +peer1.org2.example.com | [2592 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004540000 gate 1598907113618088100 evaluation fails +peer1.org2.example.com | [2593 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2594 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2595 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2596 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004540570 gate 1598907113621582300 evaluation starts +peer1.org2.example.com | [2597 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004540570 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2598 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004540570 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2599 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004540570 principal matched by identity 0 +peer1.org2.example.com | [259a 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 57 7c 95 e3 e5 d9 b8 52 4a d7 5b 1b 7f 2a ca |GW|.....RJ.[..*.| +peer1.org2.example.com | 00000010 57 36 ea e0 32 de b5 6d ac 33 3f 9a f0 32 c8 7a |W6..2..m.3?..2.z| +peer1.org2.example.com | [259b 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 98 06 f9 87 d9 60 5f 06 9e 17 1a |0D. c.....`_....| +peer1.org2.example.com | 00000010 03 1d 48 68 b2 76 ec 51 36 72 75 cb e0 2c b5 a7 |..Hh.v.Q6ru..,..| +peer1.org2.example.com | 00000020 59 f1 2f 50 02 20 00 ff 95 08 39 9c bc f8 e9 15 |Y./P. ....9.....| +peer1.org2.example.com | 00000030 a6 53 67 72 e9 b6 df 11 56 90 e8 92 32 40 4f 45 |.Sgr....V...2@OE| +peer1.org2.example.com | 00000040 62 28 71 bf 24 e7 |b(q.$.| +peer1.org2.example.com | [259c 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004540570 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [259d 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004540570 gate 1598907113621582300 evaluation succeeds +peer1.org2.example.com | [259e 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [259f 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [25a0 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [25a1 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [25a2 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [25a3 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [25a4 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [25a5 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [25a6 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [25a7 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25a8 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25a9 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25aa 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [25ab 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25ac 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25ad 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25ae 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [25af 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " > alive: alive: alive: +peer1.org2.example.com | [25b0 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [25b1 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25b2 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [25b3 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25b4 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25b5 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25b6 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25b7 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [25b8 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [25b9 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [268f 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2690 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2691 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2692 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2693 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2694 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2695 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f34d0 gate 1598907110211270800 evaluation starts +peer0.org2.example.com | [2696 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f34d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2697 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f34d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2698 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f34d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2699 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f34d0 principal evaluation fails +peer0.org2.example.com | [269a 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f34d0 gate 1598907110211270800 evaluation fails +peer0.org2.example.com | [269b 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [269c 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [269d 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [269e 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f3a40 gate 1598907110212682400 evaluation starts +peer0.org2.example.com | [269f 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f3a40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [26a0 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f3a40 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [26a1 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f3a40 principal matched by identity 0 +peer0.org2.example.com | [26a2 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [26a3 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [26a4 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f3a40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [26a5 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f3a40 gate 1598907110212682400 evaluation succeeds +peer0.org2.example.com | [26a6 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [26a7 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [26a8 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [26a9 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [26aa 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [26ab 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [26ac 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26ad 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26ae 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [26af 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [26b0 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [26b1 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [26b2 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [26b3 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [26b4 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470d330 gate 1598907110216447300 evaluation starts +peer0.org2.example.com | [26b5 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470d330 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [26b6 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470d330 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [26b7 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470d330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [26b8 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470d330 principal evaluation fails +peer0.org2.example.com | [26b9 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470d330 gate 1598907110216447300 evaluation fails +peer0.org2.example.com | [26ba 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [26bb 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [26bc 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [26bd 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470d8a0 gate 1598907110217984600 evaluation starts +peer0.org2.example.com | [26be 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470d8a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [26bf 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470d8a0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [26c0 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470d8a0 principal matched by identity 0 +peer0.org2.example.com | [26c1 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [26c2 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [26c3 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470d8a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [26c4 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00470d8a0 gate 1598907110217984600 evaluation succeeds +peer0.org2.example.com | [26c5 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [26c6 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [26c7 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [26c8 08-31 20:51:50.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [26c9 08-31 20:51:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | [238d 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [238e 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [238f 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2390 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2391 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2392 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2393 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2394 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2395 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2396 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2397 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2398 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2399 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [239a 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [239b 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [239c 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [239d 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [239e 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [239f 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23a0 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23a1 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23a2 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23a3 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23a4 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23a5 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [23a6 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23a7 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23a8 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [23a9 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [23aa 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23ab 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [23ac 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23ad 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [23ae 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [23af 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23b0 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [23b1 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [23b2 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 dd 37 3a ac 4d 6d 59 03 6c 4c 70 04 0c af 2a |%.7:.MmY.lLp...*| +peer1.org1.example.com | 00000010 a2 cc cb ba 0c 5f f5 ad 3c 01 17 87 a9 00 34 05 |....._..<.....4.| +peer1.org1.example.com | [23b3 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f 19 5d 6e 8b cb 5c d7 46 4d 87 6b |0D. _.]n..\.FM.k| +peer1.org1.example.com | 00000010 41 20 ed dc aa f1 16 ef 17 93 cf 52 a5 bd 33 0e |A .........R..3.| +peer1.org1.example.com | 00000020 4c ed 99 d2 02 20 0b 94 3b 93 6f 42 3c a1 fc 25 |L.... ..;.oB<..%| +peer1.org1.example.com | 00000030 c7 d0 e4 0c 7f 28 ee 4d 45 4a 7e 7c 91 7d 0a 02 |.....(.MEJ~|.}..| +peer1.org1.example.com | 00000040 45 97 d2 ce 77 bb |E...w.| +peer1.org1.example.com | [23b4 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [23b5 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [23b6 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [23b7 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [23b8 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [23b9 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23ba 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23bb 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23bc 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [23bd 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [23be 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23bf 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [23c0 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23c1 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23c2 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23c3 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23c4 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [23c5 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23c6 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [23c7 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [23c8 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23c9 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [23ca 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23cb 08-31 20:51:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [23cc 08-31 20:51:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23cd 08-31 20:51:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [23ce 08-31 20:51:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [210e 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [210f 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2110 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2111 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2112 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2113 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2114 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2115 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2116 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2117 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2118 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:T-\006" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [2119 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [211a 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:T-\006" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [211b 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [211c 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 86 51 90 ad 70 39 60 4b a4 ce 69 bc 9d c6 9b |..Q..p9`K..i....| +peer0.org1.example.com | 00000010 92 89 7c 96 ff 00 06 3e 22 f3 ba 2c 28 d2 d0 80 |..|....>"..,(...| +peer0.org1.example.com | [211d 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 4d 3b 6d 79 7e 60 c6 00 9e e3 a2 |0D. .M;my~`.....| +peer0.org1.example.com | 00000010 c1 52 21 aa 00 cf 02 e4 e2 9a dc c7 3d ae c4 ca |.R!.........=...| +peer0.org1.example.com | 00000020 c6 ca 5e 8f 02 20 45 ee 63 2b 12 6c 2f 55 f7 9b |..^.. E.c+.l/U..| +peer0.org1.example.com | 00000030 42 59 0d 6f e6 76 a7 61 35 5f 65 35 45 20 a6 e9 |BY.o.v.a5_e5E ..| +peer0.org1.example.com | 00000040 2c 3d 3e 54 2d 06 |,=>T-.| +peer0.org1.example.com | [211e 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [211f 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 74 8e c6 be 2b 4b 62 59 df a9 |0E.!..t...+KbY..| +peer0.org1.example.com | 00000010 c8 b8 a9 6b 31 e5 e0 08 03 8b a3 9d 7f 26 8c 0f |...k1........&..| +peer0.org1.example.com | 00000020 3c 9c 03 87 dd 02 20 5f cb 47 1d 09 9f 23 2d 99 |<..... _.G...#-.| +peer0.org1.example.com | 00000030 9a 24 5e 22 7a e5 c6 ab ac 6b d3 51 68 58 eb 79 |.$^"z....k.QhX.y| +peer0.org1.example.com | 00000040 4c 6d 48 b5 94 7e 92 |LmH..~.| +peer0.org1.example.com | [2120 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2121 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [2122 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2123 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2124 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2125 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25ba 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25bb 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25bc 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25bd 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [25be 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [25bf 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25c0 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25c1 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25c2 08-31 20:51:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [25c3 08-31 20:51:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [25c4 08-31 20:51:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [25c5 08-31 20:51:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D9816100C1801 +peer1.org2.example.com | [25c6 08-31 20:51:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BEA6EF5A6C6161A31894DD862D1A59088C3563DC98F3F904C1EB708B4BEFABAC +peer1.org2.example.com | [25c7 08-31 20:51:54.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [25c8 08-31 20:51:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [25c9 08-31 20:51:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [25ca 08-31 20:51:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [25cb 08-31 20:51:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [25cc 08-31 20:51:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25cd 08-31 20:51:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25ce 08-31 20:51:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25cf 08-31 20:51:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25d0 08-31 20:51:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25d1 08-31 20:51:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [25d2 08-31 20:51:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25d3 08-31 20:51:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25d4 08-31 20:51:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [25d5 08-31 20:51:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25d6 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25d7 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25d8 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [25d9 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [25da 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25db 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [25dc 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25dd 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [25de 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [25df 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [25e0 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [25e1 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25e2 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25e3 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [26ca 08-31 20:51:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [26cb 08-31 20:51:50.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26cc 08-31 20:51:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26cd 08-31 20:51:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26ce 08-31 20:51:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [26cf 08-31 20:51:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26d0 08-31 20:51:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26d1 08-31 20:51:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [26d2 08-31 20:51:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [26d3 08-31 20:51:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26d4 08-31 20:51:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [26d5 08-31 20:51:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [23cf 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [23d0 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [23d1 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23d2 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23d3 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23d4 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23d5 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23d6 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23d7 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [23d8 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23d9 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [23da 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23db 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [23dc 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [23dd 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23de 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [23df 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [23e0 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [23e1 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [23e2 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [23e3 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [23e4 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abe4b0 gate 1598907117089712900 evaluation starts +peer1.org1.example.com | [23e5 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abe4b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [23e6 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abe4b0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [23e7 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abe4b0 principal matched by identity 0 +peer1.org1.example.com | [23e8 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 82 19 b7 35 14 1a b4 75 5e 2d 23 8c 90 9d 66 |....5...u^-#...f| +peer1.org1.example.com | 00000010 a7 f8 43 2c 0d cb 12 68 89 9e 50 10 9c 6e 54 0b |..C,...h..P..nT.| +peer1.org1.example.com | [23e9 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 7b b0 97 a6 f0 53 6a 3c 08 79 be |0D. s{....Sj<.y.| +peer1.org1.example.com | 00000010 39 82 04 0d 36 ee cd b4 91 dc 92 d3 4c 29 fe 90 |9...6.......L)..| +peer1.org1.example.com | 00000020 42 71 d4 40 02 20 7a 9d 60 11 4e 87 9e 1b 2e ef |Bq.@. z.`.N.....| +peer1.org1.example.com | 00000030 5b 01 77 10 24 49 6d 4b b2 f3 d3 3a 6e 52 9b f7 |[.w.$ImK...:nR..| +peer1.org1.example.com | 00000040 40 0c 97 d8 27 4b |@...'K| +peer1.org1.example.com | [23ea 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abe4b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2126 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2127 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2128 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [2129 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [212a 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [212b 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [212c 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [212d 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [212e 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:T-\006" secret_envelope: > alive: +peer0.org1.example.com | [212f 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2130 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2131 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2132 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2133 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2134 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2135 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2136 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2137 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2138 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [2139 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [213a 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [213b 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [213c 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [213d 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [213e 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [25e4 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [25e5 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [25e6 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [25e7 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [25e8 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [25e9 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [25ea 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458cd90 gate 1598907114449100300 evaluation starts +peer1.org2.example.com | [25eb 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458cd90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [25ec 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458cd90 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [25ed 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458cd90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [25ee 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458cd90 principal evaluation fails +peer1.org2.example.com | [25ef 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458cd90 gate 1598907114449100300 evaluation fails +peer1.org2.example.com | [25f0 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [25f1 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [25f2 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [25f3 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d300 gate 1598907114449691000 evaluation starts +peer1.org2.example.com | [25f4 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d300 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [25f5 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d300 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [25f6 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d300 principal matched by identity 0 +peer1.org2.example.com | [25f7 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [25f8 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [25f9 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d300 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [25fa 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d300 gate 1598907114449691000 evaluation succeeds +peer1.org2.example.com | [25fb 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [25fc 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [25fd 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [25fe 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [25ff 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2600 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [2601 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [213f 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2140 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2141 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2142 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2143 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2144 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2145 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed1400 gate 1598907105448335700 evaluation starts +peer0.org1.example.com | [2146 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed1400 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2147 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed1400 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2148 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed1400 principal matched by identity 0 +peer0.org1.example.com | [2149 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa fe 02 df ac 8e 5b 38 f0 d3 c6 dc 8c 90 06 64 |......[8.......d| +peer0.org1.example.com | 00000010 7e 48 02 36 2b 57 9c c3 9f 16 46 01 5d 89 cc c4 |~H.6+W....F.]...| +peer0.org1.example.com | [214a 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a e3 1a ae 03 7f c1 a2 c4 2c 71 53 |0D. :........,qS| +peer0.org1.example.com | 00000010 a0 3f 52 95 f2 81 8a 14 a0 71 8a 8b ed 13 d1 9e |.?R......q......| +peer0.org1.example.com | 00000020 9c 5d 3b 9a 02 20 35 39 df a2 92 f6 90 5c 4f 26 |.];.. 59.....\O&| +peer0.org1.example.com | 00000030 23 ca bb 19 03 6f f9 d6 fc 4e d7 07 11 69 7d 0a |#....o...N...i}.| +peer0.org1.example.com | 00000040 0f dc 03 bf 09 6f |.....o| +peer0.org1.example.com | [214b 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed1400 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [214c 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed1400 gate 1598907105448335700 evaluation succeeds +peer0.org1.example.com | [214d 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [214e 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [214f 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2150 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2151 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2152 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2153 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2154 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2155 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2156 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2157 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2158 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2159 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [215a 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [215b 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [215c 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [215d 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [215e 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [215f 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2160 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2161 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2162 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2163 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2164 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2165 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2166 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2167 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26d6 08-31 20:51:50.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26d7 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [26d8 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26d9 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [26da 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [26db 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [26dc 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [26dd 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [26de 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [26df 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [26e0 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [26e1 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [26e2 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047296a0 gate 1598907110289558800 evaluation starts +peer0.org2.example.com | [26e3 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047296a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [26e4 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047296a0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [26e5 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047296a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [26e6 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047296a0 principal evaluation fails +peer0.org2.example.com | [26e7 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047296a0 gate 1598907110289558800 evaluation fails +peer0.org2.example.com | [26e8 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [26e9 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [26ea 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [26eb 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004729c10 gate 1598907110289828700 evaluation starts +peer0.org2.example.com | [26ec 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004729c10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [26ed 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004729c10 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [26ee 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004729c10 principal matched by identity 0 +peer0.org2.example.com | [26ef 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 18 dd 8d c0 6e e2 a3 25 7a 13 c8 3f a9 40 ce |B....n..%z..?.@.| +peer0.org2.example.com | 00000010 12 7b f2 2f cd 44 ab f9 58 25 58 61 fc c7 d1 41 |.{./.D..X%Xa...A| +peer0.org2.example.com | [26f0 08-31 20:51:50.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 24 2b e4 77 40 b0 5e bf 20 9c 49 |0D. F$+.w@.^. .I| +peer0.org2.example.com | 00000010 3e cc 09 eb 17 b3 c5 ef 28 fb 8f c6 8c eb dc 52 |>.......(......R| +peer0.org2.example.com | 00000020 9f b7 b3 8c 02 20 5f 9c 9a 99 59 b5 a5 4a 61 c3 |..... _...Y..Ja.| +peer0.org2.example.com | 00000030 ba c5 68 4b 57 80 c3 d0 c8 ce 35 fc 35 82 29 2b |..hKW.....5.5.)+| +peer0.org2.example.com | 00000040 e8 6f 02 c0 c7 35 |.o...5| +peer0.org2.example.com | [26f1 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004729c10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [26f2 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004729c10 gate 1598907110289828700 evaluation succeeds +peer0.org2.example.com | [26f3 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [26f4 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [26f5 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [26f6 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [26f7 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [26f8 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [26f9 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [26fa 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [26fb 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [26fc 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26fd 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26fe 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [26ff 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2700 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2701 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2702 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2703 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2704 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2705 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2706 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2707 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2708 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2709 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [23eb 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abe4b0 gate 1598907117089712900 evaluation succeeds +peer1.org1.example.com | [23ec 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [23ed 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [23ee 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [23ef 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [23f0 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [23f1 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [23f2 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [23f3 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [23f4 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [23f5 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23f6 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23f7 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [23f8 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [23f9 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23fa 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23fb 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [23fc 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [23fd 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [23fe 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [23ff 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2400 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [2401 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2402 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2403 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2405 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [2404 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2407 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2406 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2408 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2409 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [240a 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [240b 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [270a 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [270b 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [270c 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [270d 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [270e 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [270f 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2710 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2711 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2712 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2713 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2714 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2715 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2716 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161028 +peer0.org2.example.com | [2717 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1BD7F9E615EFA0E3CBEABAB80B8DF8215B0C17C6F9F32A85B20200F5DFEBD4D3 +peer0.org2.example.com | [2718 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2719 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [271a 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [271b 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [271c 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [271d 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2602 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2603 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2604 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2605 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2606 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2607 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2608 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ac500 gate 1598907114452847300 evaluation starts +peer1.org2.example.com | [2609 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ac500 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [260a 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ac500 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [260b 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ac500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [260c 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ac500 principal evaluation fails +peer1.org2.example.com | [260d 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045ac500 gate 1598907114452847300 evaluation fails +peer1.org2.example.com | [260e 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [260f 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2610 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2611 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045aca70 gate 1598907114453103200 evaluation starts +peer1.org2.example.com | [2612 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045aca70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2613 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045aca70 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2614 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045aca70 principal matched by identity 0 +peer1.org2.example.com | [2615 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [2616 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [2617 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045aca70 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2618 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045aca70 gate 1598907114453103200 evaluation succeeds +peer1.org2.example.com | [2619 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [261a 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [261b 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [261c 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [261d 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [261e 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [261f 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [2620 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [2621 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2622 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [2623 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2624 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2625 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2626 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2627 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2628 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2629 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [262a 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [262b 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [262c 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c0ca0 gate 1598907114463689200 evaluation starts +peer1.org2.example.com | [262d 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c0ca0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [262e 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c0ca0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [262f 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c0ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2630 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c0ca0 principal evaluation fails +peer1.org2.example.com | [2631 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c0ca0 gate 1598907114463689200 evaluation fails +peer1.org2.example.com | [2632 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2633 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2634 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2635 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c1210 gate 1598907114466770300 evaluation starts +peer1.org2.example.com | [2636 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c1210 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2637 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c1210 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2638 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c1210 principal matched by identity 0 +peer1.org2.example.com | [2639 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [263a 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [263b 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c1210 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [263c 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045c1210 gate 1598907114466770300 evaluation succeeds +peer1.org2.example.com | [263d 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [263e 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [263f 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2640 08-31 20:51:54.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2641 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [2642 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [2643 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2644 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2645 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2646 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2647 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2648 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2649 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [264a 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [264b 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2b00 gate 1598907114474045200 evaluation starts +peer1.org2.example.com | [264c 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2b00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [264d 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2b00 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [264e 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2b00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [264f 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2b00 principal evaluation fails +peer1.org2.example.com | [2650 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2b00 gate 1598907114474045200 evaluation fails +peer1.org2.example.com | [2651 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2652 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2653 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2654 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3070 gate 1598907114477433300 evaluation starts +peer1.org2.example.com | [2655 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3070 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2656 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3070 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2657 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3070 principal matched by identity 0 +peer1.org2.example.com | [2658 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [2659 08-31 20:51:54.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [265a 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3070 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [265b 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e3070 gate 1598907114477433300 evaluation succeeds +peer1.org2.example.com | [265c 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [265d 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [265e 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [265f 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2660 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [2661 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [2662 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2663 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [2664 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [2665 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [2666 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2667 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [240c 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [240d 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [240e 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [240f 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2410 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2411 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2412 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2413 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2414 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2415 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2416 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2417 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2418 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D9816102E +peer1.org1.example.com | [2419 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DD4B69754BADD9AEC0565CF37D588272135BA2CBE963BA7BEF62BB14584274FE +peer1.org1.example.com | [241a 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [241b 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [241c 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [241d 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [241e 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [241f 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\342\022`\377\r\013C\365\235<\253w\20629\355:T\t\003\377\343]\033\233\372\336\374Wa\002 \"}\010\266\363\247Vu7\205\216\201\177\021\374?=\216\367k\326\250\215\255q\231\024u\364\021,\362" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2420 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2423 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2424 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2425 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2421 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\342\022`\377\r\013C\365\235<\253w\20629\355:T\t\003\377\343]\033\233\372\336\374Wa\002 \"}\010\266\363\247Vu7\205\216\201\177\021\374?=\216\367k\326\250\215\255q\231\024u\364\021,\362" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [2426 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2422 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2427 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2428 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [2429 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [242a 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [242b 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [242c 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [242d 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 4b 69 75 4b ad d9 ae c0 56 5c f3 7d 58 82 72 |.KiuK....V\.}X.r| +peer1.org1.example.com | 00000010 13 5b a2 cb e9 63 ba 7b ef 62 bb 14 58 42 74 fe |.[...c.{.b..XBt.| +peer1.org1.example.com | [242e 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 00 5a 2d 8c 2e 35 13 26 0f a2 |0E.!...Z-..5.&..| +peer1.org1.example.com | 00000010 d9 56 a6 42 fd 09 6e fc e5 0d a2 ca e1 f9 85 3b |.V.B..n........;| +peer1.org1.example.com | 00000020 77 03 0a b8 29 02 20 2f 5a 54 73 bb 4e 1d f4 b9 |w...). /ZTs.N...| +peer1.org1.example.com | 00000030 f6 b8 ba 99 24 05 24 b1 56 88 9d f9 1c 66 1f 92 |....$.$.V....f..| +peer1.org1.example.com | 00000040 2b 90 ed 4b 23 73 bd |+..K#s.| +peer1.org1.example.com | [242f 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [2430 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 3e e2 12 60 ff 0d 0b 43 f5 9d |0E.!..>..`...C..| +peer1.org1.example.com | 00000010 3c ab 77 86 32 39 ed 3a 54 09 03 ff e3 5d 1b 9b |<.w.29.:T....]..| +peer1.org1.example.com | 00000020 fa de fc 57 61 02 20 22 7d 08 b6 f3 a7 56 75 37 |...Wa. "}....Vu7| +peer1.org1.example.com | 00000030 85 8e 81 7f 11 fc 3f 3d 8e f7 6b d6 a8 8d ad 71 |......?=..k....q| +peer1.org1.example.com | 00000040 99 14 75 f4 11 2c f2 |..u..,.| +peer1.org1.example.com | [2431 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2432 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2433 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2434 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2435 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2436 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2437 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2439 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2438 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [243a 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [243b 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 4b 69 75 4b ad d9 ae c0 56 5c f3 7d 58 82 72 |.KiuK....V\.}X.r| +peer1.org1.example.com | 00000010 13 5b a2 cb e9 63 ba 7b ef 62 bb 14 58 42 74 fe |.[...c.{.b..XBt.| +peer1.org1.example.com | [243c 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 00 5a 2d 8c 2e 35 13 26 0f a2 |0E.!...Z-..5.&..| +peer1.org1.example.com | 00000010 d9 56 a6 42 fd 09 6e fc e5 0d a2 ca e1 f9 85 3b |.V.B..n........;| +peer1.org1.example.com | 00000020 77 03 0a b8 29 02 20 2f 5a 54 73 bb 4e 1d f4 b9 |w...). /ZTs.N...| +peer1.org1.example.com | 00000030 f6 b8 ba 99 24 05 24 b1 56 88 9d f9 1c 66 1f 92 |....$.$.V....f..| +peer1.org1.example.com | 00000040 2b 90 ed 4b 23 73 bd |+..K#s.| +peer1.org1.example.com | [243d 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [243e 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [243f 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2440 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2441 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2442 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2443 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 4b 69 75 4b ad d9 ae c0 56 5c f3 7d 58 82 72 |.KiuK....V\.}X.r| +peer1.org1.example.com | 00000010 13 5b a2 cb e9 63 ba 7b ef 62 bb 14 58 42 74 fe |.[...c.{.b..XBt.| +peer1.org1.example.com | [2444 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 00 5a 2d 8c 2e 35 13 26 0f a2 |0E.!...Z-..5.&..| +peer1.org1.example.com | 00000010 d9 56 a6 42 fd 09 6e fc e5 0d a2 ca e1 f9 85 3b |.V.B..n........;| +peer1.org1.example.com | 00000020 77 03 0a b8 29 02 20 2f 5a 54 73 bb 4e 1d f4 b9 |w...). /ZTs.N...| +peer1.org1.example.com | 00000030 f6 b8 ba 99 24 05 24 b1 56 88 9d f9 1c 66 1f 92 |....$.$.V....f..| +peer1.org1.example.com | 00000040 2b 90 ed 4b 23 73 bd |+..K#s.| +peer1.org1.example.com | [2445 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2446 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2447 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2448 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2449 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [244a 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2668 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2669 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [266a 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [266b 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [266c 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [266d 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [266e 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fb1f0 gate 1598907114485742000 evaluation starts +peer1.org2.example.com | [266f 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fb1f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2670 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fb1f0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2671 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fb1f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2672 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fb1f0 principal evaluation fails +peer1.org2.example.com | [2673 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fb1f0 gate 1598907114485742000 evaluation fails +peer1.org2.example.com | [2674 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2675 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2676 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2677 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fb760 gate 1598907114486918100 evaluation starts +peer1.org2.example.com | [2678 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fb760 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2679 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fb760 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [267a 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fb760 principal matched by identity 0 +peer1.org2.example.com | [267b 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [267c 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [267d 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fb760 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [267e 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045fb760 gate 1598907114486918100 evaluation succeeds +peer1.org2.example.com | [267f 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2680 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2681 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2682 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2683 08-31 20:51:54.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2684 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2685 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2686 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2687 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2688 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2689 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [268a 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [268b 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614960 gate 1598907114491752700 evaluation starts +peer1.org2.example.com | [268c 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614960 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [268d 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614960 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [268e 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [268f 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614960 principal evaluation fails +peer1.org2.example.com | [2690 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614960 gate 1598907114491752700 evaluation fails +peer1.org2.example.com | [2691 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2692 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2693 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2694 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614ed0 gate 1598907114492165800 evaluation starts +peer1.org2.example.com | [2695 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614ed0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2696 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614ed0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2697 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614ed0 principal matched by identity 0 +peer1.org2.example.com | [2698 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [2699 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [269a 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614ed0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [269b 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004614ed0 gate 1598907114492165800 evaluation succeeds +peer1.org2.example.com | [269c 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [269d 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [269e 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [269f 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [26a0 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [26a1 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [26a2 08-31 20:51:54.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26a3 08-31 20:51:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26a4 08-31 20:51:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26a5 08-31 20:51:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [26a6 08-31 20:51:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26a7 08-31 20:51:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26a8 08-31 20:51:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [26a9 08-31 20:51:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [26aa 08-31 20:51:54.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26ab 08-31 20:51:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [26ac 08-31 20:51:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [26ad 08-31 20:51:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [26ae 08-31 20:51:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26af 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [26b0 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D9816102C +peer1.org2.example.com | [26b1 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A3C832EFFE9A690520AED9278E0F6947025FB9CDC52BA74961F724BBFA48E0AD +peer1.org2.example.com | [26b2 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [26b3 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [26b4 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [26b5 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [26b6 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26b7 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26b8 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26b9 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [26ba 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26bb 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [26bc 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [26bd 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [26be 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26bf 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [26c0 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26c1 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [26c2 08-31 20:51:55.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26c3 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [26c4 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [26c6 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [26c7 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [26c8 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [271e 08-31 20:51:50.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [271f 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2720 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2721 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2722 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2723 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2724 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2725 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2726 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2727 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2728 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2729 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [272a 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [272b 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [272c 08-31 20:51:50.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [272d 08-31 20:51:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [272e 08-31 20:51:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [272f 08-31 20:51:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [2730 08-31 20:51:50.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2731 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2732 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2733 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2734 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2735 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [244b 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [244c 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [244d 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [244e 08-31 20:51:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [244f 08-31 20:51:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2450 08-31 20:51:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b36050 gate 1598907117330124700 evaluation starts +peer1.org1.example.com | [2451 08-31 20:51:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b36050 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2452 08-31 20:51:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b36050 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2453 08-31 20:51:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b36050 principal matched by identity 0 +peer1.org1.example.com | [2454 08-31 20:51:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 82 19 b7 35 14 1a b4 75 5e 2d 23 8c 90 9d 66 |....5...u^-#...f| +peer1.org1.example.com | 00000010 a7 f8 43 2c 0d cb 12 68 89 9e 50 10 9c 6e 54 0b |..C,...h..P..nT.| +peer1.org1.example.com | [2455 08-31 20:51:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 7b b0 97 a6 f0 53 6a 3c 08 79 be |0D. s{....Sj<.y.| +peer1.org1.example.com | 00000010 39 82 04 0d 36 ee cd b4 91 dc 92 d3 4c 29 fe 90 |9...6.......L)..| +peer1.org1.example.com | 00000020 42 71 d4 40 02 20 7a 9d 60 11 4e 87 9e 1b 2e ef |Bq.@. z.`.N.....| +peer1.org1.example.com | 00000030 5b 01 77 10 24 49 6d 4b b2 f3 d3 3a 6e 52 9b f7 |[.w.$ImK...:nR..| +peer1.org1.example.com | 00000040 40 0c 97 d8 27 4b |@...'K| +peer1.org1.example.com | [2456 08-31 20:51:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b36050 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2457 08-31 20:51:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b36050 gate 1598907117330124700 evaluation succeeds +peer1.org1.example.com | [2458 08-31 20:51:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2459 08-31 20:51:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [245a 08-31 20:51:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [245b 08-31 20:51:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [245c 08-31 20:51:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [245d 08-31 20:51:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [245e 08-31 20:51:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [245f 08-31 20:51:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2460 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2461 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2462 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2463 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2464 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2465 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2466 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2467 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2468 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2469 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [246a 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [246b 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [246c 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [246d 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [246e 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [246f 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2470 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26c9 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [26ca 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [26cb 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [26cc 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [26cd 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [26ce 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [26cf 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004635d20 gate 1598907115311884500 evaluation starts +peer1.org2.example.com | [26d0 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004635d20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [26d1 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004635d20 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [26d2 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004635d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [26d3 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004635d20 principal evaluation fails +peer1.org2.example.com | [26d4 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004635d20 gate 1598907115311884500 evaluation fails +peer1.org2.example.com | [26d5 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [26d6 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [26d7 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [26d8 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465c290 gate 1598907115312250800 evaluation starts +peer1.org2.example.com | [26d9 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465c290 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [26da 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465c290 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [26db 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465c290 principal matched by identity 0 +peer1.org2.example.com | [26dc 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c e0 9d 52 a9 d6 99 9f c0 d3 b5 fc 72 61 5b 2f |...R........ra[/| +peer1.org2.example.com | 00000010 fd 9b a9 a2 91 4d 62 ca 74 7a 7a cd 4d e9 ce ac |.....Mb.tzz.M...| +peer1.org2.example.com | [26dd 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 d9 08 57 cc 6a e0 dc 50 64 5a |0E.!....W.j..PdZ| +peer1.org2.example.com | 00000010 5f f9 e8 62 02 02 00 b8 27 89 cd 47 b2 e7 d1 01 |_..b....'..G....| +peer1.org2.example.com | 00000020 32 c0 25 97 91 02 20 0c ff a9 87 17 dc e4 53 56 |2.%... .......SV| +peer1.org2.example.com | 00000030 67 82 d4 ed 0e 69 90 6b 2f 35 bd 73 32 94 99 c7 |g....i.k/5.s2...| +peer1.org2.example.com | 00000040 15 2d 57 e0 5a 92 40 |.-W.Z.@| +peer1.org2.example.com | [26de 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465c290 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [26df 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00465c290 gate 1598907115312250800 evaluation succeeds +peer1.org2.example.com | [26e0 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [26e1 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [26e2 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [26e3 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [26e4 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [26e5 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [26e6 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [26e7 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [26e8 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [26e9 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26ea 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26eb 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26c5 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26ec 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26ed 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26ee 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26ef 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26f0 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26f1 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26f2 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [26f3 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2168 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2169 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [216a 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [216b 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [216c 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [216d 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [216e 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [216f 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2170 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2171 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2172 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2173 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2174 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2175 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2176 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2177 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2178 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2179 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [217a 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [217b 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [217c 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef3610 gate 1598907105501034000 evaluation starts +peer0.org1.example.com | [217d 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef3610 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [217e 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef3610 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [217f 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef3610 principal matched by identity 0 +peer0.org1.example.com | [2180 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 01 f2 a8 1a fe 38 30 2f 92 2c 1f e6 ec cf d6 |".....80/.,.....| +peer0.org1.example.com | 00000010 40 94 76 c2 fa 5b 56 3c 39 87 5c 94 dd 39 1a 76 |@.v..[V<9.\..9.v| +peer0.org1.example.com | [2181 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 9c 20 56 6e 86 9d 70 90 c4 13 d6 |0D. 5. Vn..p....| +peer0.org1.example.com | 00000010 ce ad df 3d e2 b0 cc bb cf fe 7c 09 f9 8a b1 31 |...=......|....1| +peer0.org1.example.com | 00000020 b9 8d 40 50 02 20 4b fb 92 04 ec 2f ec 3b 1e 52 |..@P. K..../.;.R| +peer0.org1.example.com | 00000030 94 89 4a 5d 1a 09 b8 5a e4 69 1b 24 1c 7b 91 2d |..J]...Z.i.$.{.-| +peer0.org1.example.com | 00000040 be 9e 68 21 12 b8 |..h!..| +peer0.org1.example.com | [2182 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef3610 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2183 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef3610 gate 1598907105501034000 evaluation succeeds +peer0.org1.example.com | [2184 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2185 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2186 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2187 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2188 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2189 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [218a 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [218b 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [218c 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [218d 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [218e 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [218f 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2190 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [2191 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2192 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2193 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2194 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2195 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2196 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:T-\006" > alive: alive:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > alive: +peer0.org1.example.com | [2197 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [219a 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2198 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [219b 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2199 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [219c 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161024 +peer0.org1.example.com | [219d 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B02C22888487BC2FD08639C12FD5E68F5CC5FC299964931ECF559AFE97FD20E3 +peer0.org1.example.com | [219e 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2471 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2472 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2473 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2474 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2475 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2476 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2477 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b19730 gate 1598907117521595500 evaluation starts +peer1.org1.example.com | [2478 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b19730 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2479 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b19730 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [247a 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b19730 principal matched by identity 0 +peer1.org1.example.com | [247b 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 95 58 59 84 9d 85 53 3a 08 e7 42 d4 42 4e dc |..XY...S:..B.BN.| +peer1.org1.example.com | 00000010 e7 60 1a 2a 99 59 8b a6 77 7a 03 e3 01 91 67 21 |.`.*.Y..wz....g!| +peer1.org1.example.com | [247c 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 33 09 e9 75 72 52 c7 87 68 8e |0E.!..3..urR..h.| +peer1.org1.example.com | 00000010 f6 30 18 ec 2e a6 f0 ab 2f b7 f7 47 f9 05 b2 d5 |.0....../..G....| +peer1.org1.example.com | 00000020 fe 05 9d 54 8f 02 20 7d c0 8b f9 59 8d fd dd cd |...T.. }...Y....| +peer1.org1.example.com | 00000030 4e 65 c0 2c c8 0f c6 17 11 70 e1 05 3f 18 21 24 |Ne.,.....p..?.!$| +peer1.org1.example.com | 00000040 df ab ad 6f e0 b1 11 |...o...| +peer1.org1.example.com | [247d 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b19730 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [247e 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b19730 gate 1598907117521595500 evaluation succeeds +peer1.org1.example.com | [247f 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2480 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2481 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2482 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2483 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2484 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2485 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2486 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2487 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2488 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2489 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [248a 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [248b 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [248c 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [248d 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [248e 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [248f 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [26f4 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [26f5 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [26f6 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [26f7 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26f8 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [26f9 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26fa 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [26fb 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26fc 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [26fd 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [26fe 08-31 20:51:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [26ff 08-31 20:51:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2700 08-31 20:51:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2701 08-31 20:51:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2702 08-31 20:51:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2703 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2704 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2705 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2706 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2707 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2708 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 77 44 48 28 c9 7a 8c 15 b4 95 05 73 94 af 1c fa |wDH(.z.....s....| +peer1.org2.example.com | 00000010 52 b0 8e 96 e0 be 46 87 b6 ca a3 92 82 67 b3 cc |R.....F......g..| +peer1.org2.example.com | [2709 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 e7 cf c8 3f 2c 21 aa c4 62 9f |0E.!.....?,!..b.| +peer1.org2.example.com | 00000010 49 7c cf 61 b1 50 5d 9e e7 5a ee ab 14 5e 7b 59 |I|.a.P]..Z...^{Y| +peer1.org2.example.com | 00000020 65 63 40 3b 50 02 20 11 fd 26 3b ae e6 a2 7d 72 |ec@;P. ..&;...}r| +peer1.org2.example.com | 00000030 89 0f 22 76 26 ed 1b 89 d9 9a 80 ea d4 57 ab 2a |.."v&........W.*| +peer1.org2.example.com | 00000040 55 a6 da 90 08 08 7c |U.....|| +peer1.org2.example.com | [270a 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [270b 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [270c 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [270d 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [270e 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2736 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2737 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2738 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2739 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [273a 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [273b 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [273c 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474dee0 gate 1598907110536812200 evaluation starts +peer0.org2.example.com | [273d 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474dee0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [273e 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474dee0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [273f 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474dee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2740 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474dee0 principal evaluation fails +peer0.org2.example.com | [2741 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00474dee0 gate 1598907110536812200 evaluation fails +peer0.org2.example.com | [2742 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2743 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2744 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2745 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478c450 gate 1598907110537227300 evaluation starts +peer0.org2.example.com | [2746 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478c450 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2747 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478c450 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2748 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478c450 principal matched by identity 0 +peer0.org2.example.com | [2749 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 80 ee 8e 7a 30 15 ca 52 72 79 81 c8 3f 87 f1 |....z0..Rry..?..| +peer0.org2.example.com | 00000010 11 86 d9 fc e2 72 ce 6d 4e 23 e0 7d b8 51 be d4 |.....r.mN#.}.Q..| +peer0.org2.example.com | [274a 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d6 fb 1c d5 c5 80 fc e4 98 ad f9 |0E.!............| +peer0.org2.example.com | 00000010 9d 06 10 59 f6 f4 8f 43 df 37 66 82 05 f8 a3 8b |...Y...C.7f.....| +peer0.org2.example.com | 00000020 48 74 0d a7 85 02 20 69 bc 99 f2 a8 77 26 92 61 |Ht.... i....w&.a| +peer0.org2.example.com | 00000030 68 de dc 5e bb 78 ea 97 c6 f0 73 b4 e3 bf d2 ee |h..^.x....s.....| +peer0.org2.example.com | 00000040 af ec 89 45 41 8c 8d |...EA..| +peer0.org2.example.com | [274b 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478c450 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [274c 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00478c450 gate 1598907110537227300 evaluation succeeds +peer0.org2.example.com | [274d 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [274e 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [274f 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2750 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2751 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2752 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2753 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2754 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2755 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2756 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2757 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2758 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2759 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [275a 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [275b 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [275c 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [219f 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [21a0 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [21a1 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [21a2 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [21a4 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [21a5 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [21a7 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [21a3 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [21a6 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [21a8 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21a9 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21aa 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21ab 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21ac 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21ad 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [21ae 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21b0 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [21b1 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [21b2 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [21b3 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21b4 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21b5 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [21b6 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21b7 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21b8 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21b9 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21af 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [21ba 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21bb 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [21bc 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [21bd 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [21be 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21bf 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21c0 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [21c1 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [21c2 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [21c3 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21c4 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [21c5 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161025 +peer0.org1.example.com | [21c6 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4EF6C958D0FE08F524CA0EC3C1E45DA396AB659CE2450B51C9E839B0A305FA0F +peer0.org1.example.com | [21c7 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [21c8 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [21c9 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [21ca 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [21cb 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21cc 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [21cd 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21ce 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [21cf 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21d0 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [21d1 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21d2 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [21d3 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [270f 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2710 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2711 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2712 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2713 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2714 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2715 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2716 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2717 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2718 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2719 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [271a 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [271b 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [271c 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [271d 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [271e 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [271f 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2720 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2721 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2722 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2723 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2724 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2725 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2726 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2727 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2728 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [275d 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [275e 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [275f 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2760 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2761 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2762 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2763 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2764 08-31 20:51:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2765 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2766 08-31 20:51:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2767 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2768 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2769 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [276a 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [276b 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [276c 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [276d 08-31 20:51:50.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [276e 08-31 20:51:50.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [276f 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2770 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2771 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [2772 08-31 20:51:52.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2773 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:)b\021/\226\350\330T\177" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [2774 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2775 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:)b\021/\226\350\330T\177" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [2776 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2777 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c aa a5 5a 6c 4e f5 3d 4f b2 61 f4 2a 5b 12 81 |...ZlN.=O.a.*[..| +peer0.org2.example.com | 00000010 cb 7e 57 55 cd aa 59 d5 f2 c9 38 c9 21 b6 d5 fe |.~WU..Y...8.!...| +peer0.org2.example.com | [2778 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 67 b2 ff a9 ff 61 ec 7b a5 ba 8d |0D. )b.| +peer0.org2.example.com | 00000040 2f 96 e8 d8 54 7f |/...T.| +peer1.org1.example.com | [2490 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2491 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2492 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [2493 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2494 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2495 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2496 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [2497 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2498 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [2499 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [249a 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [249b 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [249c 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [249d 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 1b 21 a6 69 8d d8 de e1 40 b2 59 44 7d 93 b2 |..!.i....@.YD}..| +peer1.org1.example.com | 00000010 4e f5 f5 41 dd fd b8 c0 37 20 57 ae 33 b8 50 ed |N..A....7 W.3.P.| +peer1.org1.example.com | [249e 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 17 39 ee e4 bb 52 28 6b 8b 5e |0E.!...9...R(k.^| +peer1.org1.example.com | 00000010 8a b8 eb 99 1f e1 27 3f 0b 4c b6 79 c5 78 87 bb |......'?.L.y.x..| +peer1.org1.example.com | 00000020 50 be b3 a5 ad 02 20 5d ff 0e 7f 36 86 89 6b f8 |P..... ]...6..k.| +peer1.org1.example.com | 00000030 d9 70 3e 99 c3 d8 0a 3f bd 7c d7 c8 26 b7 a4 d8 |.p>....?.|..&...| +peer1.org1.example.com | 00000040 28 fb d4 3b 5a 92 4b |(..;Z.K| +peer1.org1.example.com | [249f 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [24a0 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 41 1d e3 06 bc 96 67 09 11 f7 |0E.!..A.....g...| +peer1.org1.example.com | 00000010 2b 59 9a 90 11 fd 5d a7 07 b5 73 d8 81 9c bd e2 |+Y....]...s.....| +peer1.org1.example.com | 00000020 c4 c9 6c ca e1 02 20 0f 23 2c 87 ed 67 d7 05 22 |..l... .#,..g.."| +peer1.org1.example.com | 00000030 0b 64 c2 5c a8 56 53 c9 3f 4b 63 eb 55 43 e7 b7 |.d.\.VS.?Kc.UC..| +peer1.org1.example.com | 00000040 e9 80 50 1d 78 6e af |..P.xn.| +peer1.org1.example.com | [24a1 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [24a2 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [24a3 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [24a4 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [24a5 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [24a6 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24a7 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24a8 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24a9 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [24aa 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24ab 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24ac 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [24ad 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" secret_envelope: > alive: +peer1.org1.example.com | [24ae 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [24af 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24b0 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [24b1 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [24b2 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24b3 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24b4 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24b5 08-31 20:51:57.84 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [24b6 08-31 20:51:57.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [24b7 08-31 20:51:57.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [24b8 08-31 20:51:57.84 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [24b9 08-31 20:51:57.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21d4 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2729 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2779 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | [24ba 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21d5 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org2.example.com | [272a 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [24bb 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21d6 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21d7 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org2.example.com | [272b 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [24bc 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [24bd 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [24be 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [272c 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [24bf 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [24c0 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21d8 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org1.example.com | [24c1 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [21d9 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [272d 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [277a 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 c8 df 7e 0c 5b 6e d3 c8 5b 81 27 |0D. G..~.[n..[.'| +peer1.org1.example.com | [24c2 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21da 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [272e 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000010 80 b6 f0 68 6a 1a 97 88 bf 73 70 fb ff 2a a3 0b |...hj....sp..*..| +peer1.org1.example.com | [24c3 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [21db 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e f6 c9 58 d0 fe 08 f5 24 ca 0e c3 c1 e4 5d a3 |N..X....$.....].| +peer1.org2.example.com | [272f 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004689c00 gate 1598907115533763100 evaluation starts +peer0.org2.example.com | 00000020 0c 0d 71 06 02 20 14 6a f5 7f 79 83 ba 33 d8 4d |..q.. .j..y..3.M| +peer1.org1.example.com | [24c4 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 96 ab 65 9c e2 45 0b 51 c9 e8 39 b0 a3 05 fa 0f |..e..E.Q..9.....| +peer1.org2.example.com | [2730 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004689c00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000030 9c 52 88 f2 d8 e4 8e 18 65 e1 69 93 23 ae b8 a1 |.R......e.i.#...| +peer1.org1.example.com | [24c5 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | [2731 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004689c00 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | 00000040 af f5 e6 6b bd 55 |...k.U| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [21dc 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 8e c8 4f 6a 51 b2 20 05 07 49 f0 |0D. u..OjQ. ..I.| +peer1.org2.example.com | [2732 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004689c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [277b 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [24c6 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 e2 7c 00 d5 f8 fa 7b fa 96 fe 1f 0c 3a 9a 55 39 |.|....{.....:.U9| +peer1.org2.example.com | [2733 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004689c00 principal evaluation fails +peer0.org2.example.com | [277c 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 96 51 b1 5c 02 20 27 5b 08 bb 01 54 3a 27 0c 38 |.Q.\. '[...T:'.8| +peer0.org1.example.com | 00000030 1d 3a db 7f 80 c9 96 03 3c ee ec 81 91 22 3e 56 |.:......<....">V| +peer0.org2.example.com | [277d 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000040 f8 84 21 6c a3 be |..!l..| +peer0.org1.example.com | [21dd 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | [21de 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [277e 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2734 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004689c00 gate 1598907115533763100 evaluation fails +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [24c7 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [277f 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2735 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [21df 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 4c 8b 9d 35 e2 df 5b 11 d0 11 2b |0D. .L..5..[...+| +peer1.org1.example.com | [24c8 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2780 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2736 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 58 73 fb c9 a9 ef e4 61 71 26 15 fe 29 f8 aa 5d |Xs.....aq&..)..]| +peer1.org1.example.com | [24c9 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2781 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2737 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000020 0d df c5 7b 02 20 02 a3 4e 47 2f 39 64 75 21 3f |...{. ..NG/9du!?| +peer1.org1.example.com | [24ca 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2782 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2738 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ae170 gate 1598907115534181600 evaluation starts +peer0.org1.example.com | 00000030 32 3f af 2d 49 b0 8e 08 74 05 9c ce 24 8a 90 c3 |2?.-I...t...$...| +peer1.org1.example.com | [24cb 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2783 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org2.example.com | [2739 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ae170 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000040 5b d8 e3 9e df 15 |[.....| +peer1.org1.example.com | [24cc 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2784 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [273a 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ae170 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [21e0 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [24cd 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2785 08-31 20:51:53.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [273b 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ae170 principal matched by identity 0 +peer0.org1.example.com | [21e1 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [24ce 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2786 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [273c 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 dd 37 3a ac 4d 6d 59 03 6c 4c 70 04 0c af 2a |%.7:.MmY.lLp...*| +peer0.org2.example.com | [2787 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:)b\021/\226\350\330T\177" secret_envelope: > alive: +peer1.org2.example.com | 00000010 a2 cc cb ba 0c 5f f5 ad 3c 01 17 87 a9 00 34 05 |....._..<.....4.| +peer0.org1.example.com | [21e2 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24cf 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb2610 gate 1598907117965581800 evaluation starts +peer0.org2.example.com | [2788 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [273d 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f 19 5d 6e 8b cb 5c d7 46 4d 87 6b |0D. _.]n..\.FM.k| +peer0.org1.example.com | [21e3 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24d0 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb2610 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2789 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 41 20 ed dc aa f1 16 ef 17 93 cf 52 a5 bd 33 0e |A .........R..3.| +peer0.org1.example.com | [21e4 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [24d1 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb2610 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [278a 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 4c ed 99 d2 02 20 0b 94 3b 93 6f 42 3c a1 fc 25 |L.... ..;.oB<..%| +peer0.org1.example.com | [21e5 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [24d2 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb2610 principal matched by identity 0 +peer0.org2.example.com | [278b 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 c7 d0 e4 0c 7f 28 ee 4d 45 4a 7e 7c 91 7d 0a 02 |.....(.MEJ~|.}..| +peer0.org1.example.com | [21e6 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e f6 c9 58 d0 fe 08 f5 24 ca 0e c3 c1 e4 5d a3 |N..X....$.....].| +peer1.org1.example.com | [24d3 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [278c 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 45 97 d2 ce 77 bb |E...w.| +peer0.org1.example.com | 00000010 96 ab 65 9c e2 45 0b 51 c9 e8 39 b0 a3 05 fa 0f |..e..E.Q..9.....| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [278d 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [273e 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ae170 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [21e7 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 8e c8 4f 6a 51 b2 20 05 07 49 f0 |0D. u..OjQ. ..I.| +peer1.org1.example.com | [24d4 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | [278e 08-31 20:51:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [273f 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046ae170 gate 1598907115534181600 evaluation succeeds +peer0.org1.example.com | 00000010 e2 7c 00 d5 f8 fa 7b fa 96 fe 1f 0c 3a 9a 55 39 |.|....{.....:.U9| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [278f 08-31 20:51:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2740 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000020 96 51 b1 5c 02 20 27 5b 08 bb 01 54 3a 27 0c 38 |.Q.\. '[...T:'.8| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | [2790 08-31 20:51:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2741 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000030 1d 3a db 7f 80 c9 96 03 3c ee ec 81 91 22 3e 56 |.:......<....">V| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [2791 08-31 20:51:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2742 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000040 f8 84 21 6c a3 be |..!l..| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [2792 08-31 20:51:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [2743 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [21e8 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24d5 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb2610 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2793 08-31 20:51:53.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2744 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [21e9 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24d6 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb2610 gate 1598907117965581800 evaluation succeeds +peer0.org2.example.com | [2794 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2745 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [21ea 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24d7 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2795 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2746 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [21eb 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [24d8 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2796 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2747 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [21ec 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24d9 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2797 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2748 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [21ee 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [24da 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2798 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2749 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21ed 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 86 51 90 ad 70 39 60 4b a4 ce 69 bc 9d c6 9b |..Q..p9`K..i....| +peer1.org1.example.com | [24db 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | [2799 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [274a 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 92 89 7c 96 ff 00 06 3e 22 f3 ba 2c 28 d2 d0 80 |..|....>"..,(...| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [279a 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [274b 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [21ef 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 4d 3b 6d 79 7e 60 c6 00 9e e3 a2 |0D. .M;my~`.....| +peer1.org1.example.com | [24dd 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | [279b 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [274c 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 c1 52 21 aa 00 cf 02 e4 e2 9a dc c7 3d ae c4 ca |.R!.........=...| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | [279c 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [274d 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 c6 ca 5e 8f 02 20 45 ee 63 2b 12 6c 2f 55 f7 9b |..^.. E.c+.l/U..| +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | [279d 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [274e 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 42 59 0d 6f e6 76 a7 61 35 5f 65 35 45 20 a6 e9 |BY.o.v.a5_e5E ..| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | [279e 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [274f 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 2c 3d 3e 54 2d 06 |,=>T-.| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [279f 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047dedb0 gate 1598907113320039200 evaluation starts +peer1.org2.example.com | [2750 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21f0 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [24de 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27a0 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047dedb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2751 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21f1 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24dc 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [27a1 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047dedb0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [27a2 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047dedb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [24df 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21f2 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [27a3 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047dedb0 principal evaluation fails +peer1.org2.example.com | [2752 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21f3 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27a4 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047dedb0 gate 1598907113320039200 evaluation fails +peer1.org1.example.com | [24e0 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2753 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [21f4 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [27a5 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [24e1 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [21f5 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2754 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [27a6 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [24e2 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [21f6 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2755 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27a7 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [24e3 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [21f7 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2756 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [27a8 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047df320 gate 1598907113321606000 evaluation starts +peer1.org1.example.com | [24e4 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [21f8 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2757 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [27a9 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047df320 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [24e5 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [21f9 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2758 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27aa 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047df320 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [24e6 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb3f00 gate 1598907117972037000 evaluation starts +peer0.org1.example.com | [21fa 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f09180 gate 1598907105631568400 evaluation starts +peer1.org2.example.com | [2759 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [27ab 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047df320 principal matched by identity 0 +peer1.org1.example.com | [24e7 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb3f00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [21fb 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f09180 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [275a 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27ac 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 f3 24 d0 88 ad 43 07 03 12 e3 c5 30 1b 19 d1 |..$...C.....0...| +peer1.org1.example.com | [24e8 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb3f00 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [21fc 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f09180 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [275b 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | 00000010 84 d1 56 df 11 8b 08 1c 71 9d 70 84 1e a1 1b af |..V.....q.p.....| +peer1.org1.example.com | [24e9 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb3f00 principal matched by identity 0 +peer0.org1.example.com | [21fd 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f09180 principal matched by identity 0 +peer1.org2.example.com | [275c 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [27ad 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 60 fd b0 91 5a 9b 66 62 0b 56 |0E.!..`...Z.fb.V| +peer1.org1.example.com | [24ea 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | [21fe 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 45 06 e0 3d 9c 66 bc 90 53 b2 a5 53 47 0c 30 |.E..=.f..S..SG.0| +peer1.org2.example.com | [275d 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 e0 3a 51 e4 10 99 41 d7 ba 6a 21 d9 e6 f7 d8 a0 |.:Q...A..j!.....| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | 00000010 60 e5 a7 b0 a8 36 c4 ee b1 84 4a f2 05 1e 53 eb |`....6....J...S.| +peer1.org2.example.com | [275e 08-31 20:51:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000020 ed 1b 9b b9 41 02 20 35 4b ce d5 03 3a f2 93 b1 |....A. 5K...:...| +peer1.org1.example.com | [24eb 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | [21ff 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 87 1d 29 5e 79 f2 7f 60 bc 9c c4 |0D. V..)^y..`...| +peer1.org2.example.com | [275f 08-31 20:51:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000030 1c bb 3e 6a cb a6 91 c0 22 77 7a bd 90 b5 ca bc |..>j...."wz.....| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000010 b7 35 c2 46 5c 8a 97 3e b8 93 24 9d dc c6 0b 16 |.5.F\..>..$.....| +peer1.org2.example.com | [2760 08-31 20:51:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 7f bd 8a 24 ee e7 20 |...$.. | +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000020 f8 1f ef 3f 02 20 07 e9 b8 33 0f 23 cc 21 d3 98 |...?. ...3.#.!..| +peer1.org2.example.com | [2761 08-31 20:51:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [27ae 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047df320 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000030 9e 12 53 11 24 1d c1 d9 3b 7e eb e5 22 6f 74 cb |..S.$...;~.."ot.| +peer1.org2.example.com | [2762 08-31 20:51:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27af 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047df320 gate 1598907113321606000 evaluation succeeds +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | 00000040 80 5e 69 15 de 32 |.^i..2| +peer1.org2.example.com | [2763 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [27b0 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [24ec 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb3f00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2200 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f09180 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2764 08-31 20:51:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27b1 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [24ed 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bb3f00 gate 1598907117972037000 evaluation succeeds +peer0.org1.example.com | [2201 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f09180 gate 1598907105631568400 evaluation succeeds +peer1.org2.example.com | [2765 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [27b2 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [24ee 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2202 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2766 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [27b3 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [24ef 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2203 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2767 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [27b4 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [24f0 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2204 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2768 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [27b5 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [24f1 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2205 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2769 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [24f2 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27b6 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2206 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2207 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [276a 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [27b7 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2208 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [276b 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [276c 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27b8 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [27b9 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [276d 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [276e 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [276f 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2770 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2771 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2772 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2773 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [24f3 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [24f4 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24f5 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24f6 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [24f7 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [24f8 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [24f9 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [24fa 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [24fb 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [24fc 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [24fd 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcb350 gate 1598907117976055700 evaluation starts +peer1.org1.example.com | [24fe 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcb350 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [24ff 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcb350 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2500 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcb350 principal matched by identity 0 +peer1.org1.example.com | [2501 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [2502 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [2503 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcb350 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2504 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bcb350 gate 1598907117976055700 evaluation succeeds +peer1.org1.example.com | [2505 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2506 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2507 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2508 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2509 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [250a 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [250b 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [250c 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [250d 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [250e 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [250f 08-31 20:51:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2510 08-31 20:51:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2209 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [220b 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [220a 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [220c 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 86 51 90 ad 70 39 60 4b a4 ce 69 bc 9d c6 9b |..Q..p9`K..i....| +peer0.org1.example.com | 00000010 92 89 7c 96 ff 00 06 3e 22 f3 ba 2c 28 d2 d0 80 |..|....>"..,(...| +peer0.org1.example.com | [220d 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 4d 3b 6d 79 7e 60 c6 00 9e e3 a2 |0D. .M;my~`.....| +peer0.org1.example.com | 00000010 c1 52 21 aa 00 cf 02 e4 e2 9a dc c7 3d ae c4 ca |.R!.........=...| +peer0.org1.example.com | 00000020 c6 ca 5e 8f 02 20 45 ee 63 2b 12 6c 2f 55 f7 9b |..^.. E.c+.l/U..| +peer0.org1.example.com | 00000030 42 59 0d 6f e6 76 a7 61 35 5f 65 35 45 20 a6 e9 |BY.o.v.a5_e5E ..| +peer0.org1.example.com | 00000040 2c 3d 3e 54 2d 06 |,=>T-.| +peer0.org1.example.com | [220e 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2511 08-31 20:51:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2512 08-31 20:51:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2513 08-31 20:51:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2514 08-31 20:51:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +peer1.org1.example.com | [2515 08-31 20:51:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +peer1.org1.example.com | [2516 08-31 20:51:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +peer1.org1.example.com | [2517 08-31 20:51:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2518 08-31 20:51:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004beb330 gate 1598907117982282400 evaluation starts +peer1.org1.example.com | [2519 08-31 20:51:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004beb330 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [251a 08-31 20:51:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004beb330 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [251b 08-31 20:51:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004beb330 principal matched by identity 0 +peer1.org1.example.com | [251c 08-31 20:51:57.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [251d 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [251e 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004beb330 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [251f 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004beb330 gate 1598907117982282400 evaluation succeeds +peer1.org1.example.com | [2520 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2521 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2522 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2523 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2524 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2525 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [2526 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2527 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2528 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2529 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [252a 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [252b 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [252c 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [252d 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [252e 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [252f 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0a780 gate 1598907117997860700 evaluation starts +peer1.org1.example.com | [2530 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0a780 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2531 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0a780 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2532 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0a780 principal matched by identity 0 +peer1.org1.example.com | [2533 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | [2774 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2775 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2776 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2777 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2778 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2779 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [277a 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [277b 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [277c 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [277d 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D9816102D +peer1.org2.example.com | [277e 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 838219B735141AB4755E2D238C909D66A7F8432C0DCB1268899E50109C6E540B +peer1.org2.example.com | [277f 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2780 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2781 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [2782 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\356@\324\272" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2783 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2784 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2785 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2786 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\356@\324\272" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2787 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2788 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27ba 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27bb 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27bc 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [27bd 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27be 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27bf 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27c0 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [27c1 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " > alive:)b\021/\226\350\330T\177" > alive: +peer0.org2.example.com | [27c2 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [27c3 08-31 20:51:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27c4 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [27c5 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [27c6 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [27c7 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [27c8 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [27ca 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [27c9 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [27cb 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [27cc 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27cd 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27ce 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [27cf 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27d0 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [27d1 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [27d2 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [2534 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [2535 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0a780 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2536 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c0a780 gate 1598907117997860700 evaluation succeeds +peer1.org1.example.com | [2537 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2538 08-31 20:51:57.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2539 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [253a 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [253b 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [253c 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [253d 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [253e 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [253f 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2540 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2541 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2542 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2543 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2544 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2545 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1e070 gate 1598907118004392700 evaluation starts +peer1.org1.example.com | [2546 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1e070 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2547 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1e070 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2548 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1e070 principal matched by identity 0 +peer1.org1.example.com | [2549 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [254a 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [254b 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1e070 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [254c 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c1e070 gate 1598907118004392700 evaluation succeeds +peer1.org1.example.com | [254d 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [254e 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [254f 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2550 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2551 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2552 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27d3 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [27d4 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [27d5 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27d6 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [27d7 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [27d8 08-31 20:51:53.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27d9 08-31 20:51:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [27da 08-31 20:51:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161029 +peer0.org2.example.com | [27db 08-31 20:51:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3525EFA45776C62CA0CA6920FD35FD3DBBA2D64EAFA32178394688FE26F6E913 +peer0.org2.example.com | [27dc 08-31 20:51:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [27dd 08-31 20:51:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [27de 08-31 20:51:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [27df 08-31 20:51:53.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27e0 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [27e1 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27e2 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [27e3 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [27e4 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [27e5 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27e6 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [27e7 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27e8 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2789 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [278a 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [278b 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [278c 08-31 20:51:57.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [278d 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [278e 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [278f 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2790 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2791 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 82 19 b7 35 14 1a b4 75 5e 2d 23 8c 90 9d 66 |....5...u^-#...f| +peer1.org2.example.com | 00000010 a7 f8 43 2c 0d cb 12 68 89 9e 50 10 9c 6e 54 0b |..C,...h..P..nT.| +peer1.org2.example.com | [2792 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 7b b0 97 a6 f0 53 6a 3c 08 79 be |0D. s{....Sj<.y.| +peer1.org2.example.com | 00000010 39 82 04 0d 36 ee cd b4 91 dc 92 d3 4c 29 fe 90 |9...6.......L)..| +peer1.org2.example.com | 00000020 42 71 d4 40 02 20 7a 9d 60 11 4e 87 9e 1b 2e ef |Bq.@. z.`.N.....| +peer1.org2.example.com | 00000030 5b 01 77 10 24 49 6d 4b b2 f3 d3 3a 6e 52 9b f7 |[.w.$ImK...:nR..| +peer1.org2.example.com | 00000040 40 0c 97 d8 27 4b |@...'K| +peer1.org2.example.com | [2793 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2794 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2795 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2796 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2797 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [2798 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [2799 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [279a 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [279b 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [279c 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 82 19 b7 35 14 1a b4 75 5e 2d 23 8c 90 9d 66 |....5...u^-#...f| +peer1.org2.example.com | 00000010 a7 f8 43 2c 0d cb 12 68 89 9e 50 10 9c 6e 54 0b |..C,...h..P..nT.| +peer1.org2.example.com | [279d 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 7b b0 97 a6 f0 53 6a 3c 08 79 be |0D. s{....Sj<.y.| +peer1.org2.example.com | 00000010 39 82 04 0d 36 ee cd b4 91 dc 92 d3 4c 29 fe 90 |9...6.......L)..| +peer1.org2.example.com | 00000020 42 71 d4 40 02 20 7a 9d 60 11 4e 87 9e 1b 2e ef |Bq.@. z.`.N.....| +peer1.org2.example.com | 00000030 5b 01 77 10 24 49 6d 4b b2 f3 d3 3a 6e 52 9b f7 |[.w.$ImK...:nR..| +peer1.org2.example.com | 00000040 40 0c 97 d8 27 4b |@...'K| +peer1.org2.example.com | [279e 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [279f 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 76 65 3b 46 e7 13 99 16 7d e6 |0E.!..ve;F....}.| +peer1.org2.example.com | 00000010 e9 8b d3 1f 7d 62 40 97 c9 99 6f 7a 56 e4 4a 1a |....}b@...ozV.J.| +peer1.org2.example.com | 00000020 59 70 2e 43 cc 02 20 76 03 b0 aa b1 03 4a a6 43 |Yp.C.. v.....J.C| +peer1.org2.example.com | 00000030 11 f5 c9 a6 69 cc f1 89 43 11 d7 8b d3 d8 15 50 |....i...C......P| +peer1.org2.example.com | 00000040 23 d1 3e ee 40 d4 ba |#.>.@..| +peer1.org2.example.com | [27a0 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [27a1 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [27a2 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27a3 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27a4 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [27ea 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27e9 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [27eb 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27ec 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [27ed 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [27ee 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [27ef 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 25 ef a4 57 76 c6 2c a0 ca 69 20 fd 35 fd 3d |5%..Wv.,..i .5.=| +peer0.org2.example.com | 00000010 bb a2 d6 4e af a3 21 78 39 46 88 fe 26 f6 e9 13 |...N..!x9F..&...| +peer0.org2.example.com | [27f0 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 75 86 1e ea b0 26 fd 6f 71 10 |0E.!..u....&.oq.| +peer0.org2.example.com | 00000010 de 47 71 6a 39 e5 36 95 47 56 f7 27 5c 34 8c 5b |.Gqj9.6.GV.'\4.[| +peer0.org2.example.com | 00000020 36 34 ea 45 75 02 20 11 fd a8 8f 1a 32 ab 10 77 |64.Eu. .....2..w| +peer0.org2.example.com | 00000030 5e 18 50 0a c8 a7 9e 69 67 4f 0b 9d df b8 99 16 |^.P....igO......| +peer0.org2.example.com | 00000040 56 9e 51 af 23 b4 97 |V.Q.#..| +peer0.org2.example.com | [27f1 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [27f2 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 d3 19 31 4f 60 39 2f 78 7e fc |0E.!....1O`9/x~.| +peer0.org2.example.com | 00000010 4e ae 91 77 aa c5 a1 58 b4 f5 6a a5 bc b6 96 06 |N..w...X..j.....| +peer0.org2.example.com | 00000020 f4 97 6a 25 ba 02 20 2b 17 15 87 b0 f6 d2 1d cf |..j%.. +........| +peer0.org2.example.com | 00000030 f2 88 2a 3a 60 47 27 8f ff 25 76 59 46 f7 53 22 |..*:`G'..%vYF.S"| +peer0.org2.example.com | 00000040 f2 c3 a1 ac 8f 4a 9b |.....J.| +peer0.org2.example.com | [27f3 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [27f4 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [27f5 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27f6 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27f7 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [27f8 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [27f9 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [27fa 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [27fb 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27fc 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [27fd 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [27fe 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [27ff 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2800 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2801 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [220f 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2210 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2211 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2212 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2213 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2214 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2215 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2216 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2217 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2218 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9290 gate 1598907105640396000 evaluation starts +peer0.org1.example.com | [2219 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9290 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [221a 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9290 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [221b 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9290 principal matched by identity 0 +peer0.org1.example.com | [221c 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 01 f2 a8 1a fe 38 30 2f 92 2c 1f e6 ec cf d6 |".....80/.,.....| +peer0.org1.example.com | 00000010 40 94 76 c2 fa 5b 56 3c 39 87 5c 94 dd 39 1a 76 |@.v..[V<9.\..9.v| +peer0.org1.example.com | [221d 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 9c 20 56 6e 86 9d 70 90 c4 13 d6 |0D. 5. Vn..p....| +peer0.org1.example.com | 00000010 ce ad df 3d e2 b0 cc bb cf fe 7c 09 f9 8a b1 31 |...=......|....1| +peer0.org1.example.com | 00000020 b9 8d 40 50 02 20 4b fb 92 04 ec 2f ec 3b 1e 52 |..@P. K..../.;.R| +peer0.org1.example.com | 00000030 94 89 4a 5d 1a 09 b8 5a e4 69 1b 24 1c 7b 91 2d |..J]...Z.i.$.{.-| +peer0.org1.example.com | 00000040 be 9e 68 21 12 b8 |..h!..| +peer0.org1.example.com | [221e 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9290 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [221f 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9290 gate 1598907105640396000 evaluation succeeds +peer0.org1.example.com | [2220 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2221 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2222 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2223 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2224 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2225 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2226 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2227 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e f6 c9 58 d0 fe 08 f5 24 ca 0e c3 c1 e4 5d a3 |N..X....$.....].| +peer0.org1.example.com | 00000010 96 ab 65 9c e2 45 0b 51 c9 e8 39 b0 a3 05 fa 0f |..e..E.Q..9.....| +peer0.org1.example.com | [2228 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 8e c8 4f 6a 51 b2 20 05 07 49 f0 |0D. u..OjQ. ..I.| +peer0.org1.example.com | 00000010 e2 7c 00 d5 f8 fa 7b fa 96 fe 1f 0c 3a 9a 55 39 |.|....{.....:.U9| +peer0.org1.example.com | 00000020 96 51 b1 5c 02 20 27 5b 08 bb 01 54 3a 27 0c 38 |.Q.\. '[...T:'.8| +peer0.org1.example.com | 00000030 1d 3a db 7f 80 c9 96 03 3c ee ec 81 91 22 3e 56 |.:......<....">V| +peer0.org1.example.com | 00000040 f8 84 21 6c a3 be |..!l..| +peer0.org1.example.com | [2229 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [222a 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [222b 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [222c 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [222d 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [222e 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [222f 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [2230 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2231 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2232 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2233 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2234 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2235 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2236 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [2237 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [2238 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [2239 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [223a 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [223b 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [223c 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [223d 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [223f 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2240 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2241 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2242 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2243 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2244 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e60d0 gate 1598907105719248000 evaluation starts +peer0.org1.example.com | [2245 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e60d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2246 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e60d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2247 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e60d0 principal matched by identity 0 +peer0.org1.example.com | [2248 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | [2802 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004837e20 gate 1598907113545693900 evaluation starts +peer0.org2.example.com | [2803 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004837e20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2804 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004837e20 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2805 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004837e20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2806 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004837e20 principal evaluation fails +peer0.org2.example.com | [2807 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004837e20 gate 1598907113545693900 evaluation fails +peer0.org2.example.com | [2808 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2809 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [280a 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [280b 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004856390 gate 1598907113545992800 evaluation starts +peer0.org2.example.com | [280c 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004856390 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [280d 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004856390 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [280e 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004856390 principal matched by identity 0 +peer0.org2.example.com | [280f 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 f3 24 d0 88 ad 43 07 03 12 e3 c5 30 1b 19 d1 |..$...C.....0...| +peer0.org2.example.com | 00000010 84 d1 56 df 11 8b 08 1c 71 9d 70 84 1e a1 1b af |..V.....q.p.....| +peer0.org2.example.com | [2810 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 60 fd b0 91 5a 9b 66 62 0b 56 |0E.!..`...Z.fb.V| +peer0.org2.example.com | 00000010 e0 3a 51 e4 10 99 41 d7 ba 6a 21 d9 e6 f7 d8 a0 |.:Q...A..j!.....| +peer0.org2.example.com | 00000020 ed 1b 9b b9 41 02 20 35 4b ce d5 03 3a f2 93 b1 |....A. 5K...:...| +peer0.org2.example.com | 00000030 1c bb 3e 6a cb a6 91 c0 22 77 7a bd 90 b5 ca bc |..>j...."wz.....| +peer0.org2.example.com | 00000040 7f bd 8a 24 ee e7 20 |...$.. | +peer0.org2.example.com | [2811 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004856390 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2812 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004856390 gate 1598907113545992800 evaluation succeeds +peer0.org2.example.com | [2813 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2814 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2815 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2816 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2817 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2818 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2819 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [281a 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 25 ef a4 57 76 c6 2c a0 ca 69 20 fd 35 fd 3d |5%..Wv.,..i .5.=| +peer0.org2.example.com | 00000010 bb a2 d6 4e af a3 21 78 39 46 88 fe 26 f6 e9 13 |...N..!x9F..&...| +peer0.org2.example.com | [281b 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 75 86 1e ea b0 26 fd 6f 71 10 |0E.!..u....&.oq.| +peer0.org2.example.com | 00000010 de 47 71 6a 39 e5 36 95 47 56 f7 27 5c 34 8c 5b |.Gqj9.6.GV.'\4.[| +peer0.org2.example.com | 00000020 36 34 ea 45 75 02 20 11 fd a8 8f 1a 32 ab 10 77 |64.Eu. .....2..w| +peer0.org2.example.com | 00000030 5e 18 50 0a c8 a7 9e 69 67 4f 0b 9d df b8 99 16 |^.P....igO......| +peer0.org2.example.com | 00000040 56 9e 51 af 23 b4 97 |V.Q.#..| +peer0.org2.example.com | [281c 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [281d 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [281e 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [281f 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2820 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c aa a5 5a 6c 4e f5 3d 4f b2 61 f4 2a 5b 12 81 |...ZlN.=O.a.*[..| +peer0.org2.example.com | 00000010 cb 7e 57 55 cd aa 59 d5 f2 c9 38 c9 21 b6 d5 fe |.~WU..Y...8.!...| +peer0.org2.example.com | [2821 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 67 b2 ff a9 ff 61 ec 7b a5 ba 8d |0D. )b.| +peer0.org2.example.com | 00000040 2f 96 e8 d8 54 7f |/...T.| +peer0.org2.example.com | [2822 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2823 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2824 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2825 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2826 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2827 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2828 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2829 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [282a 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [282b 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [282c 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [282d 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [282e 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [282f 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [2830 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2831 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2832 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 25 ef a4 57 76 c6 2c a0 ca 69 20 fd 35 fd 3d |5%..Wv.,..i .5.=| +peer0.org2.example.com | 00000010 bb a2 d6 4e af a3 21 78 39 46 88 fe 26 f6 e9 13 |...N..!x9F..&...| +peer0.org2.example.com | [2833 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 75 86 1e ea b0 26 fd 6f 71 10 |0E.!..u....&.oq.| +peer0.org2.example.com | 00000010 de 47 71 6a 39 e5 36 95 47 56 f7 27 5c 34 8c 5b |.Gqj9.6.GV.'\4.[| +peer0.org2.example.com | 00000020 36 34 ea 45 75 02 20 11 fd a8 8f 1a 32 ab 10 77 |64.Eu. .....2..w| +peer0.org2.example.com | 00000030 5e 18 50 0a c8 a7 9e 69 67 4f 0b 9d df b8 99 16 |^.P....igO......| +peer0.org2.example.com | 00000040 56 9e 51 af 23 b4 97 |V.Q.#..| +peer0.org2.example.com | [2834 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2835 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2836 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2837 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2838 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c aa a5 5a 6c 4e f5 3d 4f b2 61 f4 2a 5b 12 81 |...ZlN.=O.a.*[..| +peer0.org2.example.com | 00000010 cb 7e 57 55 cd aa 59 d5 f2 c9 38 c9 21 b6 d5 fe |.~WU..Y...8.!...| +peer0.org2.example.com | [2839 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 67 b2 ff a9 ff 61 ec 7b a5 ba 8d |0D. )b.| +peer0.org2.example.com | 00000040 2f 96 e8 d8 54 7f |/...T.| +peer0.org2.example.com | [283a 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [283b 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [283c 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [283d 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [283e 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [283f 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [2840 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2841 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2553 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2554 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2555 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2556 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2557 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2558 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2559 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [255a 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [255b 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [255c 08-31 20:51:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [255d 08-31 20:51:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [255e 08-31 20:51:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [255f 08-31 20:51:58.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2560 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2561 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2562 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2563 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2564 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2565 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2566 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2567 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2568 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2569 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [256a 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [256b 08-31 20:51:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [256c 08-31 20:51:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [256d 08-31 20:51:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 65 56 2a 3d b5 c8 e1 8a 83 76 15 b0 59 3c 06 26 |eV*=.....v..Y<.&| +peer1.org1.example.com | 00000010 c3 34 70 d2 15 63 86 6a 26 7e 58 6f a9 af 61 21 |.4p..c.j&~Xo..a!| +peer1.org1.example.com | [256e 08-31 20:51:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 c7 86 a8 14 a0 70 c5 0a ce 3b f7 |0D. 7.....p...;.| +peer1.org1.example.com | 00000010 9c f4 9e 5a 23 81 68 a3 5d 8b c5 b9 ee b0 fd 40 |...Z#.h.]......@| +peer1.org1.example.com | 00000020 eb f7 dc 5a 02 20 10 0b 55 4a 40 8e f7 b2 fd 6e |...Z. ..UJ@....n| +peer1.org1.example.com | 00000030 76 6e f8 cb 8e 07 12 13 7b ac 86 0d ed b3 f6 78 |vn......{......x| +peer1.org1.example.com | 00000040 6e 80 28 50 12 e1 |n.(P..| +peer1.org1.example.com | [256f 08-31 20:51:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2570 08-31 20:51:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2571 08-31 20:51:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2572 08-31 20:51:58.78 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [2573 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4560 bytes, seq: 3}, Envelope: 4590 bytes, Signature: 0 bytes +peer1.org1.example.com | [2574 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4560 bytes, seq: 3}, Envelope: 4590 bytes, Signature: 0 bytes +peer1.org1.example.com | [2575 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2576 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2577 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org1.example.com | [2578 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2579 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [27a5 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [27a6 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27a7 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [27a8 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [27a9 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 82 19 b7 35 14 1a b4 75 5e 2d 23 8c 90 9d 66 |....5...u^-#...f| +peer1.org2.example.com | 00000010 a7 f8 43 2c 0d cb 12 68 89 9e 50 10 9c 6e 54 0b |..C,...h..P..nT.| +peer1.org2.example.com | [27aa 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 7b b0 97 a6 f0 53 6a 3c 08 79 be |0D. s{....Sj<.y.| +peer1.org2.example.com | 00000010 39 82 04 0d 36 ee cd b4 91 dc 92 d3 4c 29 fe 90 |9...6.......L)..| +peer1.org2.example.com | 00000020 42 71 d4 40 02 20 7a 9d 60 11 4e 87 9e 1b 2e ef |Bq.@. z.`.N.....| +peer1.org2.example.com | 00000030 5b 01 77 10 24 49 6d 4b b2 f3 d3 3a 6e 52 9b f7 |[.w.$ImK...:nR..| +peer1.org2.example.com | 00000040 40 0c 97 d8 27 4b |@...'K| +peer1.org2.example.com | [27ab 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [27ac 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [27ad 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27ae 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27af 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [27b0 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [27b1 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [27b2 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27b3 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27b4 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27b5 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27b6 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27b7 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27b8 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [27b9 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27ba 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [27bb 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [27bc 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27bd 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [27be 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [27bf 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27c0 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [27c1 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [27c2 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [27c3 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [27c4 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [27c5 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [27c6 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004730af0 gate 1598907117321865900 evaluation starts +peer1.org2.example.com | [27c7 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004730af0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [27c8 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004730af0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [27c9 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004730af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [27ca 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004730af0 principal evaluation fails +peer1.org2.example.com | [27cb 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004730af0 gate 1598907117321865900 evaluation fails +peer1.org2.example.com | [27cc 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [27cd 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [27ce 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [27cf 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004731060 gate 1598907117322143100 evaluation starts +peer1.org2.example.com | [27d0 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004731060 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [27d1 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004731060 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [27d2 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004731060 principal matched by identity 0 +peer1.org2.example.com | [27d3 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 4b 69 75 4b ad d9 ae c0 56 5c f3 7d 58 82 72 |.KiuK....V\.}X.r| +peer1.org2.example.com | 00000010 13 5b a2 cb e9 63 ba 7b ef 62 bb 14 58 42 74 fe |.[...c.{.b..XBt.| +peer1.org2.example.com | [27d4 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 00 5a 2d 8c 2e 35 13 26 0f a2 |0E.!...Z-..5.&..| +peer1.org2.example.com | 00000010 d9 56 a6 42 fd 09 6e fc e5 0d a2 ca e1 f9 85 3b |.V.B..n........;| +peer1.org2.example.com | 00000020 77 03 0a b8 29 02 20 2f 5a 54 73 bb 4e 1d f4 b9 |w...). /ZTs.N...| +peer1.org2.example.com | 00000030 f6 b8 ba 99 24 05 24 b1 56 88 9d f9 1c 66 1f 92 |....$.$.V....f..| +peer1.org2.example.com | 00000040 2b 90 ed 4b 23 73 bd |+..K#s.| +peer1.org2.example.com | [27d5 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004731060 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [27d6 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004731060 gate 1598907117322143100 evaluation succeeds +peer1.org2.example.com | [27d7 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [27d8 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [27d9 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [27da 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [27db 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [27dc 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [27dd 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [27de 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [27df 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [27e0 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27e1 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27e2 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27e3 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [27e4 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27e5 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27e6 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27e7 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [27e8 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [27e9 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27ea 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [27eb 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [27ec 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [27ed 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [27ee 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [27ef 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27f0 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [27f1 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [27f2 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27f3 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [27f4 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [27f5 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 95 58 59 84 9d 85 53 3a 08 e7 42 d4 42 4e dc |..XY...S:..B.BN.| +peer1.org2.example.com | 00000010 e7 60 1a 2a 99 59 8b a6 77 7a 03 e3 01 91 67 21 |.`.*.Y..wz....g!| +peer1.org2.example.com | [27f6 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 33 09 e9 75 72 52 c7 87 68 8e |0E.!..3..urR..h.| +peer1.org2.example.com | 00000010 f6 30 18 ec 2e a6 f0 ab 2f b7 f7 47 f9 05 b2 d5 |.0....../..G....| +peer1.org2.example.com | 00000020 fe 05 9d 54 8f 02 20 7d c0 8b f9 59 8d fd dd cd |...T.. }...Y....| +peer1.org2.example.com | 00000030 4e 65 c0 2c c8 0f c6 17 11 70 e1 05 3f 18 21 24 |Ne.,.....p..?.!$| +peer1.org2.example.com | 00000040 df ab ad 6f e0 b1 11 |...o...| +peer1.org2.example.com | [27f7 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [27f8 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 79 56 c1 ea 2b f5 a5 ee 72 a1 |0E.!..yV..+...r.| +peer1.org2.example.com | 00000010 ae fe cc 04 2f 41 6e 29 02 f8 67 7f 0d 2b c4 4b |..../An)..g..+.K| +peer1.org2.example.com | 00000020 9e 02 4f 26 cb 02 20 6b ad 61 69 bc 88 5f 5f d6 |..O&.. k.ai..__.| +peer1.org2.example.com | 00000030 1e 42 0b 0e 24 20 93 61 9e 01 17 de 0c b2 d3 a5 |.B..$ .a........| +peer1.org2.example.com | 00000040 c3 4a d4 81 7d 39 e4 |.J..}9.| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [2249 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [224a 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e60d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [224b 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e60d0 gate 1598907105719248000 evaluation succeeds +peer0.org1.example.com | [224c 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [224d 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [224e 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [224f 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2250 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2251 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2252 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2253 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2254 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2255 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2256 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2257 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2258 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e7610 gate 1598907105721411300 evaluation starts +peer0.org1.example.com | [2259 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e7610 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [225a 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e7610 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [225b 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e7610 principal matched by identity 0 +peer0.org1.example.com | [225c 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [225d 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [225e 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e7610 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [225f 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e7610 gate 1598907105721411300 evaluation succeeds +peer0.org1.example.com | [2260 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2261 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2262 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2263 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2264 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [223e 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [2265 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [2266 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2267 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2268 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [27f9 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [27fa 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | [27fb 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [27fc 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [27fd 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [27fe 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [27ff 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2800 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2801 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [2802 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2803 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2804 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2805 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [2806 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2807 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [2808 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2809 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [280a 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [280b 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [280c 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [280d 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [280e 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [280f 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2810 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [2811 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2812 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2813 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2814 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2815 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2816 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2269 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [226a 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [226b 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [226c 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [226d 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [226e 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [226f 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032decc0 gate 1598907105723806200 evaluation starts +peer0.org1.example.com | [2270 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032decc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2271 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032decc0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2272 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032decc0 principal matched by identity 0 +peer0.org1.example.com | [2273 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [2274 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [2275 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032decc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2276 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032decc0 gate 1598907105723806200 evaluation succeeds +peer0.org1.example.com | [2277 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2278 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2279 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [227a 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [227b 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [227c 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [227d 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [227e 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [227f 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2280 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [257a 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [257b 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICHjCCAcWgAwIBAgIQUak2hDd8j2SLaQNMbXpZRDAKBggqhkjOPQQDAjBpMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer1.org1.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer1.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer1.org1.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUu +peer1.org1.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET8B7vvN/rxdMqWGK+yqvj2vj +peer1.org1.example.com | zcoh0PNOTfowTjKzggxnGNjm57Tabe8mSEp3J79IN+Z0BUjlRX7ePe1Y9MnQP6NN +peer1.org1.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer1.org1.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +peer1.org1.example.com | MQtqMO2tIswbOnZ/EyE1ZgEdzPAma23Urf8qNS+mD/ACICsZIm7LFxHSrXc9AD5h +peer1.org1.example.com | WFUnXFrrWMedpv6WCUtVYuZy +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [257c 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c488a0 gate 1598907119642920900 evaluation starts +peer1.org1.example.com | [257d 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c488a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [257e 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c488a0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [257f 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer1.org1.example.com | [2580 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [2581 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org1.example.com | [2582 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c488a0 principal matched by identity 0 +peer1.org1.example.com | [2583 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 6f d7 71 07 9c f1 8d b4 ca 12 b3 86 b4 ae 99 |.o.q............| +peer1.org1.example.com | 00000010 f2 9e ec e8 be df 8d 65 1a aa ac 78 b5 1d 35 cb |.......e...x..5.| +peer1.org1.example.com | [2584 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 00 9c cc bd fb 05 17 8a df 3a d7 bd |0D. .........:..| +peer1.org1.example.com | 00000010 94 1f fb 58 60 b1 0d 38 96 cf 63 f7 99 59 68 d8 |...X`..8..c..Yh.| +peer1.org1.example.com | 00000020 e4 f5 91 55 02 20 3a b4 c2 15 fb bf a9 12 45 df |...U. :.......E.| +peer1.org1.example.com | 00000030 e2 06 33 33 87 d6 d9 12 7d f5 53 d3 15 e2 f4 a2 |..33....}.S.....| +peer1.org1.example.com | 00000040 24 8f eb fd 52 bb |$...R.| +peer1.org1.example.com | [2585 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c488a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2586 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c488a0 gate 1598907119642920900 evaluation succeeds +peer1.org1.example.com | [2587 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [2588 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [2589 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [258a 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [258b 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4560 bytes, seq: 3}, Envelope: 4590 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [258c 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +peer1.org1.example.com | [258d 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [258e 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer1.org1.example.com | [258f 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer1.org1.example.com | [2590 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org1.example.com | [2591 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +peer1.org1.example.com | [2592 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +peer1.org1.example.com | [2593 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer1.org1.example.com | [2594 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +peer1.org1.example.com | [2595 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +peer1.org1.example.com | [2596 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org1.example.com | [2597 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc004a1bbc0 env 0xc004c1cc30 txn 0 +peer1.org1.example.com | [2598 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004c1cc30 +peer1.org1.example.com | [2599 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\275\305\265\372\005\020\330\242\350\273\001\"\017businesschannel*@d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030V\355\313\252\261:\202\005\2106Z\035\206\003\300n\302A\335 \223\315\362\315" +peer1.org1.example.com | [259a 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [259b 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [259c 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [259d 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [259e 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | [2281 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2282 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [2283 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2284 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2285 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2286 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2287 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2288 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0ca0 gate 1598907105726808200 evaluation starts +peer0.org1.example.com | [2289 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0ca0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [228a 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0ca0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [228b 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0ca0 principal matched by identity 0 +peer0.org1.example.com | [228c 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [228d 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [228e 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0ca0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [228f 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0ca0 gate 1598907105726808200 evaluation succeeds +peer0.org1.example.com | [2290 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2291 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2292 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2293 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2294 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2295 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [2296 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2297 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2298 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2299 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2842 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2843 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2844 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2845 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2846 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2847 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2848 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486dff0 gate 1598907113617458300 evaluation starts +peer0.org2.example.com | [2849 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486dff0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [284a 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486dff0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [284b 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486dff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [284c 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486dff0 principal evaluation fails +peer0.org2.example.com | [284d 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00486dff0 gate 1598907113617458300 evaluation fails +peer0.org2.example.com | [284e 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [284f 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2850 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2851 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004892560 gate 1598907113623681000 evaluation starts +peer0.org2.example.com | [2852 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004892560 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2853 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004892560 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2854 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004892560 principal matched by identity 0 +peer0.org2.example.com | [2855 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 57 7c 95 e3 e5 d9 b8 52 4a d7 5b 1b 7f 2a ca |GW|.....RJ.[..*.| +peer0.org2.example.com | 00000010 57 36 ea e0 32 de b5 6d ac 33 3f 9a f0 32 c8 7a |W6..2..m.3?..2.z| +peer0.org2.example.com | [2856 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 98 06 f9 87 d9 60 5f 06 9e 17 1a |0D. c.....`_....| +peer0.org2.example.com | 00000010 03 1d 48 68 b2 76 ec 51 36 72 75 cb e0 2c b5 a7 |..Hh.v.Q6ru..,..| +peer0.org2.example.com | 00000020 59 f1 2f 50 02 20 00 ff 95 08 39 9c bc f8 e9 15 |Y./P. ....9.....| +peer0.org2.example.com | 00000030 a6 53 67 72 e9 b6 df 11 56 90 e8 92 32 40 4f 45 |.Sgr....V...2@OE| +peer0.org2.example.com | 00000040 62 28 71 bf 24 e7 |b(q.$.| +peer0.org2.example.com | [2857 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004892560 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2858 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004892560 gate 1598907113623681000 evaluation succeeds +peer0.org2.example.com | [2859 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [285a 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [285b 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [285c 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [285d 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [285e 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [285f 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2860 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2861 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2862 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2863 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2864 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2865 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [2866 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2867 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2868 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2869 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2817 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2818 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2819 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [281a 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [281b 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [281c 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [281d 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004786690 gate 1598907117616127900 evaluation starts +peer1.org2.example.com | [281e 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004786690 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [281f 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004786690 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2820 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004786690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2821 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004786690 principal evaluation fails +peer1.org2.example.com | [2822 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004786690 gate 1598907117616127900 evaluation fails +peer1.org2.example.com | [2823 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2824 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2825 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2826 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004786c00 gate 1598907117616519800 evaluation starts +peer1.org2.example.com | [2827 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004786c00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2828 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004786c00 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2829 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004786c00 principal matched by identity 0 +peer1.org2.example.com | [282a 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 1b 21 a6 69 8d d8 de e1 40 b2 59 44 7d 93 b2 |..!.i....@.YD}..| +peer1.org2.example.com | 00000010 4e f5 f5 41 dd fd b8 c0 37 20 57 ae 33 b8 50 ed |N..A....7 W.3.P.| +peer1.org2.example.com | [282b 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 17 39 ee e4 bb 52 28 6b 8b 5e |0E.!...9...R(k.^| +peer1.org2.example.com | 00000010 8a b8 eb 99 1f e1 27 3f 0b 4c b6 79 c5 78 87 bb |......'?.L.y.x..| +peer1.org2.example.com | 00000020 50 be b3 a5 ad 02 20 5d ff 0e 7f 36 86 89 6b f8 |P..... ]...6..k.| +peer1.org2.example.com | 00000030 d9 70 3e 99 c3 d8 0a 3f bd 7c d7 c8 26 b7 a4 d8 |.p>....?.|..&...| +peer1.org2.example.com | 00000040 28 fb d4 3b 5a 92 4b |(..;Z.K| +peer1.org2.example.com | [282c 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004786c00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [282d 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004786c00 gate 1598907117616519800 evaluation succeeds +peer1.org2.example.com | [282e 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [282f 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2830 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2831 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2832 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2833 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2834 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2835 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2836 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2837 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2838 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2839 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [283a 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [283b 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [283c 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [283d 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [283e 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [283f 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" > alive: alive: +peer1.org2.example.com | [2840 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [2841 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2842 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2843 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2844 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2845 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2846 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2847 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2848 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2849 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [284a 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [284b 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [284c 08-31 20:51:57.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [284d 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [284e 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [284f 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2850 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2851 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2852 08-31 20:51:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2853 08-31 20:51:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2854 08-31 20:51:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2855 08-31 20:51:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [2856 08-31 20:51:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2857 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2858 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2859 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [285a 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [285b 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [259f 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [25a0 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [25a1 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25a2 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25a3 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25a4 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25a5 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25a6 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [25a7 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [25a8 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [25a9 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 e7 93 52 4d 20 48 5f 66 91 8b fc cc 39 18 f3 |...RM H_f....9..| +peer1.org1.example.com | 00000010 ab 30 31 6f 86 19 f3 33 c1 37 13 23 32 7f d5 15 |.01o...3.7.#2...| +peer1.org1.example.com | [25aa 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 2c 62 ac cb 2a ec 5a fd 13 e7 |0E.!..,b..*.Z...| +peer1.org1.example.com | 00000010 37 92 88 81 15 e1 12 b2 64 18 04 1a 42 b8 ea 7e |7.......d...B..~| +peer1.org1.example.com | 00000020 09 25 0c b1 3f 02 20 73 43 54 f1 e5 d4 0d 2e 2e |.%..?. sCT......| +peer1.org1.example.com | 00000030 08 f9 2b df dd 4b cf cb ee a4 66 5c 1c 4d 8f 79 |..+..K....f\.M.y| +peer1.org1.example.com | 00000040 73 ba e7 6f 4b 96 21 |s..oK.!| +peer1.org1.example.com | [25ab 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [25ac 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc004cb0000, header channel_header:"\010\003\032\014\010\275\305\265\372\005\020\330\242\350\273\001\"\017businesschannel*@d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030V\355\313\252\261:\202\005\2106Z\035\206\003\300n\302A\335 \223\315\362\315" +peer1.org1.example.com | [25ad 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer1.org1.example.com | [25ae 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer1.org1.example.com | [25af 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer1.org1.example.com | [25b0 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org1.example.com | [25b1 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] +peer1.org1.example.com | [25b2 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer1.org1.example.com | [25b3 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc004caa000 +peer1.org1.example.com | [25b4 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +peer1.org1.example.com | [25b5 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [d05d0719-80d7-4d4f-baa2-f3fe53191465] +peer1.org1.example.com | [25b6 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d05d0719-80d7-4d4f-baa2-f3fe53191465] +peer1.org1.example.com | [25b7 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c48690 gate 1598907119679863100 evaluation starts +peer1.org1.example.com | [25b8 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c48690 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [25b9 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c48690 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [25ba 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c48690 principal matched by identity 0 +peer1.org1.example.com | [25bb 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af eb 7f a3 db 22 e8 0d 9a d4 d1 20 96 0f 3c a1 |....."..... ..<.| +peer1.org1.example.com | 00000010 6d 3c b5 6c 57 73 9b 9f 14 94 e8 bb e2 63 0f 70 |m<.lWs.......c.p| +peer1.org1.example.com | [25bc 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 9e de 14 79 6b bb 35 05 3c 5e 10 |0D. ....yk.5.<^.| +peer1.org1.example.com | 00000010 a4 a7 85 1b 9d 1a cd 2f 44 6a f8 e7 d1 d9 09 57 |......./Dj.....W| +peer1.org1.example.com | 00000020 86 77 95 7f 02 20 58 40 5c 3a 8a 19 c9 55 67 dc |.w... X@\:...Ug.| +peer1.org1.example.com | 00000030 08 c2 c0 81 54 ed 1d 24 ff 27 23 be f1 bd 82 74 |....T..$.'#....t| +peer1.org1.example.com | 00000040 b6 99 5b 8b f1 bd |..[...| +peer1.org1.example.com | [25bd 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c48690 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [25be 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c48690 signed by 1 principal evaluation starts (used [true]) +peer1.org1.example.com | [25bf 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c48690 skipping identity 0 because it has already been used +peer1.org1.example.com | [25c0 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c48690 principal evaluation fails +peer1.org1.example.com | [25c1 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c48690 gate 1598907119679863100 evaluation succeeds +peer1.org1.example.com | [25c2 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +peer0.org2.example.com | [286a 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " > alive:)b\021/\226\350\330T\177" > alive: alive: +peer0.org2.example.com | [286b 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [286c 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [286d 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [286e 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [286f 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2870 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2871 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2872 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2873 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2874 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2875 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2876 08-31 20:51:53.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2877 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2878 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2879 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [287a 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [287b 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [287c 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [287d 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [287e 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [287f 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2880 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [2881 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [2882 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [2883 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2884 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [229a 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [229b 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [229c 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [229d 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [229e 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [229f 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003264110 gate 1598907105727851600 evaluation starts +peer0.org1.example.com | [22a0 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003264110 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [22a1 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003264110 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [22a2 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003264110 principal matched by identity 0 +peer0.org1.example.com | [22a3 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [22a4 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [22a5 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003264110 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [22a6 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003264110 gate 1598907105727851600 evaluation succeeds +peer0.org1.example.com | [22a7 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [22a8 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [22a9 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [22aa 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [22ab 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [22ac 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [22ad 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22ae 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22af 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [22b0 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [22b1 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [22b2 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [22b3 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [22b4 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [22b5 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265a30 gate 1598907105729276700 evaluation starts +peer0.org1.example.com | [22b6 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265a30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [22b7 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265a30 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [22b8 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265a30 principal matched by identity 0 +peer0.org1.example.com | [22b9 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [25c3 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer1.org1.example.com | [25c4 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer1.org1.example.com | [25c5 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +peer1.org1.example.com | [25c6 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +peer1.org1.example.com | [25c7 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [c406951f-3d32-4201-9611-8216031596c5] +peer1.org1.example.com | [25c8 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [25c9 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c406951f-3d32-4201-9611-8216031596c5] +peer1.org1.example.com | [25ca 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +peer1.org1.example.com | [25cb 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [0c95f4fd-7f9a-4d2f-913b-a838e0f8298a] +peer1.org1.example.com | [25cc 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org1.example.com | [25cd 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [0c95f4fd-7f9a-4d2f-913b-a838e0f8298a] +peer1.org1.example.com | [25ce 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004de2f0 gate 1598907119682037800 evaluation starts +peer1.org1.example.com | [25cf 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004de2f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [25d0 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004de2f0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [25d1 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer1.org1.example.com | [25d2 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer1.org1.example.com | [25d3 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [25d4 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [25d5 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org1.example.com | [25d6 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [25d7 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004de2f0 principal matched by identity 0 +peer1.org1.example.com | [25d8 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 e7 93 52 4d 20 48 5f 66 91 8b fc cc 39 18 f3 |...RM H_f....9..| +peer1.org1.example.com | 00000010 ab 30 31 6f 86 19 f3 33 c1 37 13 23 32 7f d5 15 |.01o...3.7.#2...| +peer1.org1.example.com | [25d9 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 2c 62 ac cb 2a ec 5a fd 13 e7 |0E.!..,b..*.Z...| +peer1.org1.example.com | 00000010 37 92 88 81 15 e1 12 b2 64 18 04 1a 42 b8 ea 7e |7.......d...B..~| +peer1.org1.example.com | 00000020 09 25 0c b1 3f 02 20 73 43 54 f1 e5 d4 0d 2e 2e |.%..?. sCT......| +peer1.org1.example.com | 00000030 08 f9 2b df dd 4b cf cb ee a4 66 5c 1c 4d 8f 79 |..+..K....f\.M.y| +peer1.org1.example.com | 00000040 73 ba e7 6f 4b 96 21 |s..oK.!| +peer1.org1.example.com | [25da 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004de2f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [25db 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004de2f0 signed by 1 principal evaluation starts (used [true]) +peer1.org1.example.com | [25dc 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004de2f0 skipping identity 0 because it has already been used +peer1.org1.example.com | [25dd 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004de2f0 principal evaluation fails +peer1.org1.example.com | [25de 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004de2f0 gate 1598907119682037800 evaluation succeeds +peer1.org1.example.com | [25df 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +peer1.org1.example.com | [25e0 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a appears to be valid +peer1.org1.example.com | [25e1 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc004caa000 +peer1.org1.example.com | [25e2 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc004a1bbc0 env 0xc004c1cc30 txn 0 +peer1.org1.example.com | [25e3 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | [25e4 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 28ms +peer1.org1.example.com | [25e5 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org1.example.com | [25e6 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | [25e7 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +peer1.org1.example.com | [25e8 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [25e9 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [25ea 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [25eb 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +peer1.org1.example.com | [25ec 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [25ed 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer1.org1.example.com | [25ee 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [25ef 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +peer1.org1.example.com | [25f0 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] marked as valid by state validator +peer1.org1.example.com | [25f1 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00354e400), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00354e440), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc00354e480)} +peer1.org1.example.com | [25f2 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [25f3 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [25f4 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [25f5 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc0035dcaa0)}} +peer1.org1.example.com | [25f6 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +peer1.org1.example.com | [25f7 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org1.example.com | [25f8 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer1.org1.example.com | [25f9 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer1.org1.example.com | [25fa 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +peer1.org1.example.com | [25fb 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer1.org1.example.com | [25fc 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +peer1.org1.example.com | [25fd 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [25fe 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{Org1MSP {[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 86 55 55 54 110 52 72 121 77 106 104 56 53 74 78 83 53 49 103 84 50 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 65 68 78 102 66 47 108 56 79 74 113 49 10 89 50 65 114 110 84 82 43 74 114 97 65 97 67 49 53 43 84 81 68 79 51 114 109 99 80 43 53 112 122 106 72 43 77 80 69 77 109 105 110 80 48 53 111 47 121 81 50 48 56 109 117 119 113 107 120 100 84 90 100 108 118 72 90 10 107 109 73 73 52 52 104 101 43 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 110 98 111 104 114 104 56 113 100 119 49 50 88 83 118 43 68 68 71 85 79 98 89 56 110 67 98 66 72 43 97 55 108 79 113 83 68 111 88 65 48 122 99 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 80 103 118 111 81 111 79 69 43 49 115 85 114 69 120 47 120 70 115 47 122 107 70 106 103 82 53 79 87 119 117 74 112 105 120 54 75 57 56 110 70 115 122 65 105 65 51 66 80 98 110 10 88 101 112 122 72 86 82 119 103 73 69 84 109 121 66 87 85 101 81 88 73 101 107 89 72 105 48 51 83 120 113 88 109 99 107 50 77 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 68 2 32 115 125 69 110 135 186 134 81 70 222 192 15 161 31 127 90 135 217 216 79 19 47 35 111 91 219 54 98 104 189 189 231 2 32 123 69 142 217 53 74 14 54 222 70 29 179 7 13 179 229 13 203 248 26 170 61 3 208 222 119 68 187 39 214 140 246]} 0x151a150}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002ac0f00 0xc002a9c840 {{0 0} 0 0 0 0} {false}})]} +peer1.org1.example.com | [25ff 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org1.example.com | [2600 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc0000bc0e0})} +peer1.org1.example.com | [2601 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +peer1.org1.example.com | [2602 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +peer1.org1.example.com | [2603 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +peer1.org1.example.com | [2604 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +peer1.org1.example.com | [2605 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0x62, 0xc8, 0x94, 0xe0, 0x8d, 0xe8, 0xc7, 0x50, 0xec, 0x14, 0xce, 0xf7, 0xf6, 0x41, 0xb9, 0x45, 0x45, 0x74, 0xf1, 0x40, 0xf4, 0xb9, 0x19, 0x48, 0x1a, 0x35, 0x67, 0xf7, 0x3c, 0xf, 0xe3, 0xf2} txOffsets= +peer1.org1.example.com | txId=d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a locPointer=offset=70, bytesLength=3520 +peer1.org1.example.com | ] +peer1.org1.example.com | [2606 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84950, bytesLength=3520] for tx ID: [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] to txid-index +peer1.org1.example.com | [2607 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84950, bytesLength=3520] for tx number:[0] ID: [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] to blockNumTranNum index +peer1.org1.example.com | [2608 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89462], isChainEmpty=[false], lastBlockNumber=[3] +peer1.org1.example.com | [2609 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +peer1.org1.example.com | [260a 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +peer1.org1.example.com | [260b 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +peer1.org1.example.com | [260c 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [260d 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [260e 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [260f 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [2610 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +peer1.org1.example.com | [2611 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org1.example.com | [2612 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org1.example.com | [2613 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [2614 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +peer1.org1.example.com | [2615 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +peer1.org1.example.com | [2616 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +peer1.org1.example.com | [2617 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [2618 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +peer1.org1.example.com | [2619 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +peer1.org1.example.com | [261a 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [4493ea3f-7071-467e-99bb-759ee6a22b11] +peer1.org1.example.com | [261b 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +peer1.org1.example.com | [261c 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [261d 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +peer1.org1.example.com | [261e 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [4493ea3f-7071-467e-99bb-759ee6a22b11] +peer1.org1.example.com | [261f 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +peer1.org1.example.com | [2620 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2621 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408D8CA91B5F7AF9D9816...08031A0C0A0565787030321203312E30 +peer1.org1.example.com | [2622 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EEBC9AA8B9A19A03BAF0DDACC9965144471BEA0D3BF59121699548475077DB99 +peer1.org1.example.com | [2623 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer1.org1.example.com | [2624 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +peer1.org1.example.com | [2625 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 26ms (state_validation=1ms block_and_pvtdata_commit=12ms state_commit=7ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +peer1.org1.example.com | [2626 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2627 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408D8CA91B5F7AF9D9816...08041A0C0A0565787030321203312E30 +peer1.org1.example.com | [2628 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0CB3C951461C394436C1185927011F0995F634090F127EF6FFB5D7AFB06755DC +peer1.org1.example.com | [2629 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +peer1.org1.example.com | [262a 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [262b 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [262c 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [262d 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [262e 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [262f 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2630 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2631 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2632 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2633 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2634 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2635 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e5a0 gate 1598907120030204700 evaluation starts +peer1.org1.example.com | [2636 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e5a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2637 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e5a0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2638 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e5a0 principal matched by identity 0 +peer1.org1.example.com | [2639 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 4a 59 80 bf f6 e9 23 49 e1 8b 23 95 c6 f2 df |.JY....#I..#....| +peer1.org1.example.com | 00000010 5a ca db 3c 6a ed 08 ab 3b 3c 88 f7 07 06 a1 f1 |Z.. DEBU Verify: sig = 00000000 30 45 02 21 00 ab cb 40 e8 42 ee 4e 0c f8 8a 6a |0E.!...@.B.N...j| +peer1.org1.example.com | 00000010 dd 71 e2 81 d1 85 f4 2f d0 f5 0d f4 51 72 d2 9b |.q...../....Qr..| +peer1.org1.example.com | 00000020 ce a7 b1 81 a3 02 20 0d a2 9c 0a a2 6d 1f 0b 7c |...... .....m..|| +peer1.org1.example.com | 00000030 48 c3 20 ab 22 14 8d ef 09 aa 62 5e 64 74 cc e2 |H. .".....b^dt..| +peer1.org1.example.com | 00000040 8d ce db f4 c1 a1 7d |......}| +peer1.org1.example.com | [263b 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e5a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [263c 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00360e5a0 gate 1598907120030204700 evaluation succeeds +peer1.org1.example.com | [263d 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [263e 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [263f 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2640 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2641 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2642 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2643 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2644 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2645 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2646 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2647 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2885 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2886 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [285c 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2887 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [22ba 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | [2648 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2649 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [264a 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [264b 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [264c 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2888 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | [264d 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [285d 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2889 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | [264e 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [264f 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [285e 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | [288a 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [285f 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [288b 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4ae0 gate 1598907114196098100 evaluation starts +peer0.org2.example.com | [288c 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4ae0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [288d 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4ae0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2860 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [288e 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [22bb 08-31 20:51:45.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265a30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2650 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2861 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [288f 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4ae0 principal evaluation fails +peer0.org1.example.com | [22bc 08-31 20:51:45.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265a30 gate 1598907105729276700 evaluation succeeds +peer1.org1.example.com | [2651 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2862 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2890 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d4ae0 gate 1598907114196098100 evaluation fails +peer0.org2.example.com | [2891 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [22bd 08-31 20:51:45.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2863 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2864 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2892 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2893 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2652 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2894 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d5050 gate 1598907114196513700 evaluation starts +peer0.org1.example.com | [22be 08-31 20:51:45.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2653 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2865 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2866 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22bf 08-31 20:51:45.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2654 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2655 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2867 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2656 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2868 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [2895 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d5050 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2657 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22c0 08-31 20:51:45.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2869 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2896 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d5050 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2658 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22c1 08-31 20:51:45.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | [286a 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2897 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d5050 principal matched by identity 0 +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [286b 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477c9e0 gate 1598907118453415700 evaluation starts +peer0.org2.example.com | [2898 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | [2659 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [22c2 08-31 20:51:45.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | [286c 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477c9e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org1.example.com | [265a 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | [286d 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477c9e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2899 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org1.example.com | [265b 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [265c 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [265d 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | [22c3 08-31 20:51:45.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [286e 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477c9e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org1.example.com | [265e 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22c4 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [286f 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477c9e0 principal evaluation fails +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org1.example.com | [265f 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [22c5 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2870 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477c9e0 gate 1598907118453415700 evaluation fails +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org1.example.com | [2660 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22c6 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [22c7 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22c8 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2661 08-31 20:52:00.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [22c9 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2871 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [289a 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d5050 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [289b 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048d5050 gate 1598907114196513700 evaluation succeeds +peer0.org1.example.com | [22ca 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2872 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [289c 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [22cb 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2662 08-31 20:52:00.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2873 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [289d 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2663 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D9816102F +peer1.org2.example.com | [2874 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [289e 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [22cc 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [2664 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CBA9E59D181AF94F642E97BD6D8B9A141CCD9393B8EFCEF5705DD84342D79241 +peer1.org2.example.com | [2875 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477cf50 gate 1598907118456604200 evaluation starts +peer0.org2.example.com | [289f 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [22cd 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org1.example.com | [2665 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2876 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477cf50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28a0 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | [22ce 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2666 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2877 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477cf50 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [22cf 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2667 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | [2878 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477cf50 principal matched by identity 0 +peer0.org2.example.com | [28a1 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | [22d0 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2668 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [2879 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [22d1 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2669 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | [22d2 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [266a 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [287a 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | [22d3 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [266b 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [22d4 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [266c 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | [28a2 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22d5 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | [266d 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | [28a3 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22d6 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [266e 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [22d7 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [28a4 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [266f 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [287b 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477cf50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [22d8 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [28a5 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2670 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [287c 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00477cf50 gate 1598907118456604200 evaluation succeeds +peer0.org1.example.com | [22d9 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28a6 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2671 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [287d 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [22da 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28a7 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2672 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [287e 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [22db 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28a8 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2673 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22dc 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [287f 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [28a9 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2674 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [22dd 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2880 08-31 20:51:58.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [28aa 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f4940 gate 1598907114202683600 evaluation starts +peer1.org1.example.com | [2675 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22de 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2881 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [28ab 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f4940 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2676 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [22df 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [28ac 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f4940 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2677 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [22e0 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2882 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | [28ad 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f4940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [22e1 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [28ae 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f4940 principal evaluation fails +peer1.org1.example.com | [2678 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [22e2 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | [28af 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f4940 gate 1598907114202683600 evaluation fails +peer1.org1.example.com | [2679 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [22e3 08-31 20:51:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [28b0 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [267a 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [22e4 08-31 20:51:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [28b1 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [267b 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22e5 08-31 20:51:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2883 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28b2 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [267c 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [22e6 08-31 20:51:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D9816100B1801 +peer1.org2.example.com | [2884 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28b3 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f4eb0 gate 1598907114203256700 evaluation starts +peer1.org1.example.com | [267d 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [22e7 08-31 20:51:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2BE928562D5A2E5EE6158FD2265AE28E0D9E77FFF244742B350CD02DED5DF7B0 +peer1.org2.example.com | [2885 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [28b4 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f4eb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28b5 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f4eb0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [28b6 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f4eb0 principal matched by identity 0 +peer1.org1.example.com | [267e 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2886 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [28b7 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | [267f 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [22e8 08-31 20:51:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer1.org2.example.com | [2887 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [2680 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [22e9 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2888 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [28b8 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | [2681 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [22ea 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22eb 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [22ec 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2682 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035796d0 gate 1598907120464202500 evaluation starts +peer0.org1.example.com | [22ed 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [22ee 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2683 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035796d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2889 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2684 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035796d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | [288a 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [22ef 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2685 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035796d0 principal matched by identity 0 +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | [288b 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6840 gate 1598907118462420700 evaluation starts +peer0.org1.example.com | [22f0 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [2686 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 5d 4f ff 4a 19 f7 f0 ef 39 07 3b 45 81 3a 23 |.]O.J....9.;E.:#| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | [288c 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6840 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [22f1 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 f8 71 e5 47 35 7e 57 86 69 08 d4 d9 31 6b a7 fb |.q.G5~W.i...1k..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [288d 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6840 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [22f2 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2687 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 b4 db d3 29 b5 df 6e ed 88 09 27 |0D. ....)..n...'| +peer0.org2.example.com | [28b9 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f4eb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [288e 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6840 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [22f3 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 ad d1 96 85 b4 8c 4c 6e 48 60 ee ad 21 ef da 1d |......LnH`..!...| +peer0.org2.example.com | [28ba 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048f4eb0 gate 1598907114203256700 evaluation succeeds +peer1.org2.example.com | [288f 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6840 principal evaluation fails +peer0.org1.example.com | [22f4 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 82 96 92 b0 02 20 68 8f 6f 51 48 f8 35 4d b0 ca |..... h.oQH.5M..| +peer0.org2.example.com | [28bb 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2890 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6840 gate 1598907118462420700 evaluation fails +peer0.org1.example.com | [22f5 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 a7 31 97 0b 58 9c 91 42 0c 61 db b7 8b 26 ae de |.1..X..B.a...&..| +peer0.org2.example.com | [28bc 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2891 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [22f6 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 3b 1a dd b7 2b df |;...+.| +peer0.org2.example.com | [28bd 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2892 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [22f7 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28be 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2688 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035796d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2893 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [22f8 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28bf 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2689 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035796d0 gate 1598907120464202500 evaluation succeeds +peer1.org2.example.com | [2894 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6db0 gate 1598907118464369900 evaluation starts +peer0.org1.example.com | [22f9 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28c0 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [268a 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2895 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6db0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [22fa 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28c1 08-31 20:51:54.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [268b 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2896 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6db0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [22fb 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [28c2 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [268c 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2897 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6db0 principal matched by identity 0 +peer0.org1.example.com | [22fc 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [28c3 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [268d 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2898 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | [22fd 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [28c4 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [268e 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [22fe 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [268f 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [28c5 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2899 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +peer0.org1.example.com | [22ff 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2690 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [28c6 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [289a 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +peer1.org2.example.com | [289c 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +peer0.org1.example.com | [2300 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [28c7 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [289b 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [289d 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6db0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [289e 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e6db0 gate 1598907118464369900 evaluation succeeds +peer0.org1.example.com | [2301 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2302 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28c8 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [28c9 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [28ca 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004914300 gate 1598907114213958100 evaluation starts +peer0.org2.example.com | [28cb 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004914300 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28cc 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004914300 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [28cd 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004914300 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [28ce 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004914300 principal evaluation fails +peer0.org2.example.com | [28cf 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004914300 gate 1598907114213958100 evaluation fails +peer0.org2.example.com | [28d0 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [28d1 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [28d2 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [28d3 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004914870 gate 1598907114215440900 evaluation starts +peer0.org2.example.com | [28d4 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004914870 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28d5 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004914870 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [28d6 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004914870 principal matched by identity 0 +peer0.org2.example.com | [28d7 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [28d8 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [28d9 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004914870 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [28da 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004914870 gate 1598907114215440900 evaluation succeeds +peer0.org2.example.com | [28db 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [28dc 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [28dd 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [28de 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [28df 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [28e0 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [28e1 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28e2 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [28e3 08-31 20:51:54.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [28e4 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [28e5 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2691 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2692 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2693 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2694 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2695 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2696 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2697 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2698 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2699 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [269a 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [269b 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [269c 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [269d 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [269e 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [269f 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26a0 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26a1 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26a2 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [26a3 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26a4 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26a5 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [26a6 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [26a7 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26a8 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [26a9 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26aa 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [26ab 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26ac 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [289f 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [28a0 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [28a1 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [28a2 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [28a3 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [28a4 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [28a5 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28a6 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [28a7 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [28a8 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [28a9 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28aa 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28ab 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [28ac 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [28ad 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [28ae 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [28af 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [28b0 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [28b1 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ffac0 gate 1598907118468712100 evaluation starts +peer1.org2.example.com | [28b2 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ffac0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [28b3 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ffac0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [28b4 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ffac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [28b5 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ffac0 principal evaluation fails +peer1.org2.example.com | [28b6 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047ffac0 gate 1598907118468712100 evaluation fails +peer1.org2.example.com | [28b7 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [28b8 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [28b9 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [28ba 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481c030 gate 1598907118469417600 evaluation starts +peer1.org2.example.com | [28bb 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481c030 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [28bc 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481c030 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [28bd 08-31 20:51:58.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481c030 principal matched by identity 0 +peer1.org2.example.com | [28be 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | [26ad 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26ae 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [26af 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [26b0 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26b1 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [26b2 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [26b3 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 b4 6d 50 2b c3 1a 96 c3 6c 69 c2 41 53 7b 0d |..mP+....li.AS{.| +peer1.org1.example.com | 00000010 d3 4e a4 98 7a 84 ad 19 75 cc 5c 94 ee a5 8c 8a |.N..z...u.\.....| +peer1.org1.example.com | [26b4 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 78 56 22 ef 6d 80 90 fd dd 32 2e |0D. .xV".m....2.| +peer1.org1.example.com | 00000010 b5 15 fe 6e 77 9f 90 37 54 3d 24 24 c1 ce 86 a3 |...nw..7T=$$....| +peer1.org1.example.com | 00000020 19 8e f1 92 02 20 17 fb 1f f3 fc ed c8 0f 2b 92 |..... ........+.| +peer1.org1.example.com | 00000030 d9 e8 2a e7 95 ca 83 66 8f 5c 3f 80 51 64 21 25 |..*....f.\?.Qd!%| +peer1.org1.example.com | 00000040 3b 7f fe 9a 20 bc |;... .| +peer1.org1.example.com | [26b5 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [26b6 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [26b7 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [26b8 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [26b9 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [26ba 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26bb 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26bc 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26bd 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26be 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26bf 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26c0 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [26c1 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26c2 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [26c4 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26c3 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [26c5 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [26c6 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26c7 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [26c8 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [26c9 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26ca 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [26cb 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2303 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2304 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2305 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2306 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2307 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2308 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2309 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227ad0 gate 1598907109071890000 evaluation starts +peer0.org1.example.com | [230a 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227ad0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [230b 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227ad0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [230c 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227ad0 principal matched by identity 0 +peer0.org1.example.com | [230d 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 81 8a 58 31 78 c0 66 1a e1 b8 c8 6f 59 ee a7 |...X1x.f....oY..| +peer0.org1.example.com | 00000010 98 7e 6d 00 a7 1c 52 e5 f9 51 65 50 33 33 39 b3 |.~m...R..QeP339.| +peer0.org1.example.com | [230e 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d8 b0 ee dd 6f 61 1b b4 e3 cf |0E.!......oa....| +peer0.org1.example.com | 00000010 b2 4a 6d 5f b8 7b 34 5b 5f fa b2 4c 25 4c fe 0e |.Jm_.{4[_..L%L..| +peer0.org1.example.com | 00000020 10 60 cf 0d ac 02 20 4a 6c 54 28 40 f3 26 2c cc |.`.... JlT(@.&,.| +peer0.org1.example.com | 00000030 a4 02 dc 4c ad 76 f2 71 6b 11 64 d5 5e c1 39 f4 |...L.v.qk.d.^.9.| +peer0.org1.example.com | 00000040 84 66 1b 38 4d ee 50 |.f.8M.P| +peer0.org1.example.com | [230f 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227ad0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2310 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227ad0 gate 1598907109071890000 evaluation succeeds +peer0.org1.example.com | [2311 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2312 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2313 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2314 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2315 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2316 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2317 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2318 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2319 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [231a 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [231b 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [231c 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [231d 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [231e 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [231f 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2320 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2321 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2322 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:T-\006" > alive: alive: alive: +peer0.org1.example.com | [2323 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2324 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2325 08-31 20:51:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Build output is # examples/chaincode/go/chaincode_example02 +peer0.org1.example.com | /tmp/go-link-922081282/000001.o: In function `pluginOpen': +peer0.org1.example.com | /workdir/go/src/plugin/plugin_dlopen.go:19: warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-922081282/000021.o: In function `mygetgrouplist': +peer0.org1.example.com | /workdir/go/src/os/user/getgrouplist_unix.go:16: warning: Using 'getgrouplist' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-922081282/000020.o: In function `mygetgrgid_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:38: warning: Using 'getgrgid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-922081282/000020.o: In function `mygetgrnam_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:43: warning: Using 'getgrnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-922081282/000020.o: In function `mygetpwnam_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:33: warning: Using 'getpwnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-922081282/000020.o: In function `mygetpwuid_r': +peer0.org1.example.com | /workdir/go/src/os/user/cgo_lookup_unix.go:28: warning: Using 'getpwuid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | /tmp/go-link-922081282/000006.o: In function `_cgo_26061493d47f_C2func_getaddrinfo': +peer0.org1.example.com | /tmp/go-build/cgo-gcc-prolog:58: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +peer0.org1.example.com | [2326 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2327 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2328 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [2329 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [232a 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [232b 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [232c 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [232d 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [232e 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e1 ad 29 18 79 ab 40 6a e9 8e 72 aa e7 f3 82 |...).y.@j..r....| +peer0.org1.example.com | 00000010 c5 74 7f 2d d1 9d 8b d1 21 31 f7 e5 45 4a f1 bc |.t.-....!1..EJ..| +peer0.org1.example.com | [232f 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 cc 45 75 d1 90 0d ae 8f b3 b9 00 |0D. '.Eu........| +peer0.org1.example.com | 00000010 eb 7a bf d7 c1 d2 9b aa 08 e6 29 54 aa d1 49 a6 |.z........)T..I.| +peer0.org1.example.com | 00000020 45 28 ed cb 02 20 42 99 45 f1 b0 c4 5c 25 51 a1 |E(... B.E...\%Q.| +peer0.org1.example.com | 00000030 6c 01 8d a7 37 8c e3 55 09 ee 7d 91 68 d1 f1 f9 |l...7..U..}.h...| +peer0.org1.example.com | 00000040 b9 a7 ad c3 90 cd |......| +peer0.org1.example.com | [2330 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [2331 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 99 14 1e e3 48 5d 73 92 96 81 |0E.!......H]s...| +peer0.org1.example.com | 00000010 59 be 9b 17 b3 67 0b 82 9f cf 18 a8 e9 11 39 c5 |Y....g........9.| +peer0.org1.example.com | 00000020 d8 a5 7e a2 cc 02 20 13 f2 b6 22 cc 22 4a a7 e1 |..~... ..."."J..| +peer0.org1.example.com | 00000030 1a 2e ba 68 8e 3a d5 f4 87 9f 83 35 b3 ca 05 b6 |...h.:.....5....| +peer0.org1.example.com | 00000040 15 2d 56 60 73 a4 9d |.-V`s..| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [28bf 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [28c0 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481c030 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [28c1 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481c030 gate 1598907118469417600 evaluation succeeds +peer1.org2.example.com | [28c2 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [28c3 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [28c4 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [28c5 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [28c6 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28c7 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28c8 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [28c9 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [28ca 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [28cb 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [28cc 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [28cd 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [28ce 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481d230 gate 1598907118471758800 evaluation starts +peer1.org2.example.com | [28cf 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481d230 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [28d0 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481d230 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [28d1 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481d230 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [28d2 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481d230 principal evaluation fails +peer1.org2.example.com | [28d3 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481d230 gate 1598907118471758800 evaluation fails +peer1.org2.example.com | [28d4 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [28d5 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [28d6 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [28d7 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481d7a0 gate 1598907118472647000 evaluation starts +peer1.org2.example.com | [28d8 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481d7a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [28d9 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481d7a0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [28da 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481d7a0 principal matched by identity 0 +peer1.org2.example.com | [28db 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [28dc 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [28dd 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481d7a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [28de 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00481d7a0 gate 1598907118472647000 evaluation succeeds +peer1.org2.example.com | [28df 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [28e0 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [28e1 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [28e2 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [28e3 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [28e4 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [28e5 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [28e6 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [28e7 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28e8 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28e9 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [28ea 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [28eb 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [28ec 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [28ed 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [28ee 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [28ef 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [28f0 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483f2e0 gate 1598907118475263300 evaluation starts +peer1.org2.example.com | [28f1 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483f2e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [28f2 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483f2e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [28f3 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483f2e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [28f4 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483f2e0 principal evaluation fails +peer1.org2.example.com | [28f5 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483f2e0 gate 1598907118475263300 evaluation fails +peer1.org2.example.com | [28f6 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [28f7 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [28f8 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [28f9 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483f850 gate 1598907118476045200 evaluation starts +peer1.org2.example.com | [28fa 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483f850 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [28fb 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483f850 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [28fc 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483f850 principal matched by identity 0 +peer1.org2.example.com | [28fd 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [28fe 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [28ff 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483f850 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2900 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483f850 gate 1598907118476045200 evaluation succeeds +peer0.org2.example.com | [28e6 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [28e7 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [28e8 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [28e9 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492a160 gate 1598907114220826500 evaluation starts +peer0.org2.example.com | [28ea 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492a160 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28eb 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492a160 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [28ec 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492a160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [28ed 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492a160 principal evaluation fails +peer0.org2.example.com | [28ee 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492a160 gate 1598907114220826500 evaluation fails +peer0.org2.example.com | [28ef 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [28f0 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [28f1 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [28f2 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492a6d0 gate 1598907114223039500 evaluation starts +peer0.org2.example.com | [28f3 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492a6d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [28f4 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492a6d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [28f5 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492a6d0 principal matched by identity 0 +peer0.org2.example.com | [28f6 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [28f7 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [28f8 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492a6d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [28f9 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492a6d0 gate 1598907114223039500 evaluation succeeds +peer0.org2.example.com | [28fa 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [28fb 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [28fc 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [28fd 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [28fe 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [28ff 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [2900 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2901 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [2902 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2903 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2904 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2905 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2906 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2907 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2908 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2909 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [290a 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [290b 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004948210 gate 1598907114225079200 evaluation starts +peer0.org2.example.com | [290c 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004948210 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [290d 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004948210 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [290e 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004948210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [290f 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004948210 principal evaluation fails +peer0.org2.example.com | [2910 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004948210 gate 1598907114225079200 evaluation fails +peer0.org2.example.com | [2911 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2912 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2913 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2914 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004948780 gate 1598907114225329500 evaluation starts +peer0.org2.example.com | [2915 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004948780 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2916 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004948780 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2917 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004948780 principal matched by identity 0 +peer0.org2.example.com | [2918 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [2919 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [291a 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004948780 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [291b 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004948780 gate 1598907114225329500 evaluation succeeds +peer0.org2.example.com | [291c 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [291d 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [291e 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [291f 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2920 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2921 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2922 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2923 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2924 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2925 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2926 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2927 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2928 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004949980 gate 1598907114226230600 evaluation starts +peer0.org2.example.com | [2929 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004949980 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2901 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2902 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2903 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2904 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2905 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2906 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2907 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2908 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2909 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [290a 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [290b 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [290c 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [290d 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004856a50 gate 1598907118478005600 evaluation starts +peer1.org2.example.com | [290e 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004856a50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [290f 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004856a50 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2910 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004856a50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2911 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004856a50 principal evaluation fails +peer1.org2.example.com | [2912 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004856a50 gate 1598907118478005600 evaluation fails +peer1.org2.example.com | [2913 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2914 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2915 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2916 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004856fc0 gate 1598907118478805200 evaluation starts +peer1.org2.example.com | [2917 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004856fc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2918 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004856fc0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2919 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004856fc0 principal matched by identity 0 +peer1.org2.example.com | [291a 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [291b 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [291c 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004856fc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [291d 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004856fc0 gate 1598907118478805200 evaluation succeeds +peer1.org2.example.com | [291e 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [291f 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2920 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2921 08-31 20:51:58.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2922 08-31 20:51:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [2923 08-31 20:51:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [2924 08-31 20:51:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [2925 08-31 20:51:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [2926 08-31 20:51:58.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2927 08-31 20:51:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2928 08-31 20:51:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2929 08-31 20:51:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [292a 08-31 20:51:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [292b 08-31 20:51:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [292c 08-31 20:51:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [292d 08-31 20:51:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [292e 08-31 20:51:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [292f 08-31 20:51:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [2930 08-31 20:51:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [2931 08-31 20:51:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [2932 08-31 20:51:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2933 08-31 20:51:59.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [2934 08-31 20:51:59.24 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [2935 08-31 20:51:59.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2936 08-31 20:51:59.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D9816100D1801 +peer1.org2.example.com | [2937 08-31 20:51:59.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EC9441CF50FE1BB8EEEACF3E652B0716E4B532A2D5E41B7A24428F863DE992BE +peer1.org2.example.com | [2938 08-31 20:51:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [2939 08-31 20:51:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [293a 08-31 20:51:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [293b 08-31 20:51:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [293c 08-31 20:51:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [293d 08-31 20:51:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [293e 08-31 20:51:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [293f 08-31 20:51:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [2940 08-31 20:51:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2941 08-31 20:51:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2942 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2943 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2944 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org2.example.com | [2945 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2946 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org2.example.com | [2947 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2948 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org2.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org2.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org2.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org2.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org2.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org2.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org2.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [2949 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e7950 gate 1598907119596171100 evaluation starts +peer1.org2.example.com | [294a 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e7950 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [294b 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e7950 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [294c 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer0.org2.example.com | [292a 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004949980 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [292b 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004949980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [292c 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004949980 principal evaluation fails +peer0.org2.example.com | [292d 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004949980 gate 1598907114226230600 evaluation fails +peer0.org2.example.com | [292e 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [292f 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2930 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2931 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004949ef0 gate 1598907114226485700 evaluation starts +peer0.org2.example.com | [2932 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004949ef0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2933 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004949ef0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2934 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004949ef0 principal matched by identity 0 +peer0.org2.example.com | [2935 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [2936 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [2937 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004949ef0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2938 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004949ef0 gate 1598907114226485700 evaluation succeeds +peer0.org2.example.com | [2939 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [293a 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [293b 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [293c 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [293d 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [293e 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [293f 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [2940 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [2941 08-31 20:51:54.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2942 08-31 20:51:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2943 08-31 20:51:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2944 08-31 20:51:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [2945 08-31 20:51:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2946 08-31 20:51:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2947 08-31 20:51:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2948 08-31 20:51:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2949 08-31 20:51:54.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [294a 08-31 20:51:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [294b 08-31 20:51:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [294c 08-31 20:51:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [294d 08-31 20:51:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [294e 08-31 20:51:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 be a6 ef 5a 6c 61 61 a3 18 94 dd 86 2d 1a 59 08 |...Zlaa.....-.Y.| +peer0.org2.example.com | 00000010 8c 35 63 dc 98 f3 f9 04 c1 eb 70 8b 4b ef ab ac |.5c.......p.K...| +peer0.org2.example.com | [294f 08-31 20:51:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 91 dc 45 ca 52 2c 6b 83 1f 8f 96 |0D. "..E.R,k....| +peer0.org2.example.com | 00000010 22 cb 05 cd 2b c6 d8 ef b6 e0 9f 0a c2 f7 cf 56 |"...+..........V| +peer0.org2.example.com | 00000020 17 91 dc 6b 02 20 25 48 7b 32 af 04 e3 fe c4 3d |...k. %H{2.....=| +peer0.org2.example.com | 00000030 16 2c 37 1c d6 51 a2 2b 76 ed 46 8b 7b 70 d0 49 |.,7..Q.+v.F.{p.I| +peer0.org2.example.com | 00000040 55 d5 16 49 cb 5a |U..I.Z| +peer0.org2.example.com | [2950 08-31 20:51:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2951 08-31 20:51:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2952 08-31 20:51:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2332 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2333 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [2334 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2335 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2336 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2337 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2338 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2339 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [233a 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [233b 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [233c 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [233d 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [233e 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [233f 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [2340 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2341 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2342 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2343 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2344 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2345 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2346 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2347 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2348 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2349 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [234a 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [234b 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [234c 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [234d 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [234e 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [234f 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2350 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [26cc 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [26cd 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26ce 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [26cf 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26d0 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [26d1 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [26d2 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26d3 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26d4 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26d5 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26d6 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26d7 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26d8 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [26d9 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26da 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [26db 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26dc 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [26dd 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [26de 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26df 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [26e0 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [26e1 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [26e2 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [26e3 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [26e4 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [26e5 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ee6a0 gate 1598907121103977600 evaluation starts +peer1.org1.example.com | [26e6 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ee6a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [26e7 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ee6a0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [26e8 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ee6a0 principal matched by identity 0 +peer1.org1.example.com | [26e9 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 5b 37 f3 59 2a 3d 1c 8c 82 f6 83 f7 e7 f3 1e |=[7.Y*=.........| +peer1.org1.example.com | 00000010 f4 28 26 0f 02 53 00 aa 05 07 d0 da 3f 7a 06 41 |.(&..S......?z.A| +peer1.org1.example.com | [26ea 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de ee 1b dc b7 1a e2 1b 53 7f 16 |0E.!.........S..| +peer1.org1.example.com | 00000010 a3 38 34 24 60 fd 7a 03 5c 53 7f 2a ef 00 95 34 |.84$`.z.\S.*...4| +peer1.org1.example.com | 00000020 46 26 d9 e2 46 02 20 6c 4a a0 18 ef 6f 2c 50 d4 |F&..F. lJ...o,P.| +peer1.org1.example.com | 00000030 d4 66 95 9f 6e 41 79 68 aa 6e dc b2 5f c9 cf df |.f..nAyh.n.._...| +peer1.org1.example.com | 00000040 4d 02 bb 49 8f 8c 3c |M..I..<| +peer1.org1.example.com | [26eb 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ee6a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [26ec 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034ee6a0 gate 1598907121103977600 evaluation succeeds +peer1.org1.example.com | [26ed 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [26ee 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [26ef 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [26f0 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [26f1 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [26f2 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [26f3 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [26f4 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [26f5 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [26f6 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26f7 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [26f8 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [26f9 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26fa 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26fb 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [26fc 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [26fd 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [26fe 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [26ff 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2700 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2701 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2702 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2703 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [2704 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2705 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [2707 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2708 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2709 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2351 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2352 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2353 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2354 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2355 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2356 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2357 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2358 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1750 gate 1598907109521391400 evaluation starts +peer0.org1.example.com | [2359 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1750 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [235a 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1750 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [235b 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1750 principal matched by identity 0 +peer0.org1.example.com | [235c 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d 58 de 29 3e 89 57 1e 44 8a f7 fb 53 91 ab 73 |]X.)>.W.D...S..s| +peer0.org1.example.com | 00000010 32 3e 69 99 79 39 d4 ef 41 34 e8 2c 5d 92 5c a4 |2>i.y9..A4.,].\.| +peer0.org1.example.com | [235d 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 f8 55 a0 2b 98 7e 58 e5 5c 40 2e |0D. 4.U.+.~X.\@.| +peer0.org1.example.com | 00000010 50 fe 7c d2 67 3e 14 14 2e a5 16 3c 90 40 d9 07 |P.|.g>.....<.@..| +peer0.org1.example.com | 00000020 3f 9f b1 93 02 20 36 2b 3b 7d ab 73 f8 23 89 74 |?.... 6+;}.s.#.t| +peer0.org1.example.com | 00000030 9b d6 f2 88 bc 63 45 b0 8e 0f 16 db 35 57 42 35 |.....cE.....5WB5| +peer0.org1.example.com | 00000040 f3 3d cc 8c 1f c9 |.=....| +peer0.org1.example.com | [235e 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1750 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [235f 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1750 gate 1598907109521391400 evaluation succeeds +peer0.org1.example.com | [2360 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2361 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2362 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2363 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2364 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2365 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2366 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2367 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2368 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2369 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [236a 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [236b 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [236c 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [236d 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2953 08-31 20:51:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [2954 08-31 20:51:54.26 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [2955 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2956 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2957 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2958 08-31 20:51:54.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2959 08-31 20:51:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [295a 08-31 20:51:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [295b 08-31 20:51:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [295c 08-31 20:51:54.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [295d 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [295e 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [295f 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2960 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2961 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 c8 32 ef fe 9a 69 05 20 ae d9 27 8e 0f 69 47 |..2...i. ..'..iG| +peer0.org2.example.com | 00000010 02 5f b9 cd c5 2b a7 49 61 f7 24 bb fa 48 e0 ad |._...+.Ia.$..H..| +peer0.org2.example.com | [2962 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 37 74 52 30 80 40 0d 28 5c 4f 8a |0D. v7tR0.@.(\O.| +peer0.org2.example.com | 00000010 bd 5f 9c 26 41 ce 57 85 0b 28 62 5d 9a 38 b4 bc |._.&A.W..(b].8..| +peer0.org2.example.com | 00000020 1c 16 c8 51 02 20 3a 42 cd 07 18 b2 55 13 62 45 |...Q. :B....U.bE| +peer0.org2.example.com | 00000030 b3 0e e1 df 64 36 46 51 b8 1e 1c 57 29 7a 15 34 |....d6FQ...W)z.4| +peer0.org2.example.com | 00000040 b4 90 4c 49 0a 58 |..LI.X| +peer0.org2.example.com | [2963 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2964 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2965 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2966 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2967 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2968 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2969 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [296a 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [296b 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [296c 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [296d 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [296e 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [296f 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2970 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2971 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2972 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [270a 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2706 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [270b 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [270c 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [270d 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [270e 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [270f 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2710 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2711 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2712 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2713 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2714 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2715 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2716 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2717 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2718 08-31 20:52:01.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2719 08-31 20:52:01.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161030 +peer1.org1.example.com | [271a 08-31 20:52:01.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C0F89BE4723412AF1E59646F0D8AC16090DF35E3F03073F61BF0AB1C65D517E0 +peer1.org1.example.com | [271b 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [271c 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [271d 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [271e 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [271f 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [294d 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org2.example.com | [294e 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org2.example.com | [294f 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e7950 principal matched by identity 0 +peer1.org2.example.com | [2950 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 6b 67 d9 8c 66 9e 2f 87 63 ea 18 1b 5e 98 9e |.kg..f./.c...^..| +peer1.org2.example.com | 00000010 51 0c 15 26 e7 86 a4 c9 39 f9 00 9c c2 41 0d 02 |Q..&....9....A..| +peer1.org2.example.com | [2951 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 73 92 8d 2d fc 78 e6 5d bd b4 |0E.!..s..-.x.]..| +peer1.org2.example.com | 00000010 b0 a3 e5 4d 7e a9 70 ca 35 40 20 41 2c f6 40 91 |...M~.p.5@ A,.@.| +peer1.org2.example.com | 00000020 c1 b5 67 70 26 02 20 74 f6 e5 46 82 34 46 51 52 |..gp&. t..F.4FQR| +peer1.org2.example.com | 00000030 67 bb 2e 9e 02 40 6e 94 d6 39 3e c3 88 8b 66 73 |g....@n..9>...fs| +peer1.org2.example.com | 00000040 d5 76 7a 3b 7b 49 25 |.vz;{I%| +peer1.org2.example.com | [2952 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e7950 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2953 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047e7950 gate 1598907119596171100 evaluation succeeds +peer1.org2.example.com | [2954 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2955 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2956 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2957 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2958 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer1.org2.example.com | [2959 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer1.org2.example.com | [295a 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [295b 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [3], peers number [3] +peer1.org2.example.com | [295c 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4565 bytes, seq: 3}, Envelope: 4595 bytes, Signature: 0 bytes to the block puller +peer1.org2.example.com | [295d 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +peer1.org2.example.com | [295e 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +peer1.org2.example.com | [295f 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +peer1.org2.example.com | [2960 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer1.org2.example.com | [2961 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +peer1.org2.example.com | [2962 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +peer1.org2.example.com | [2963 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [2964 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003aa7c40 env 0xc0047dd310 txn 0 +peer1.org2.example.com | [2965 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0047dd310 +peer1.org2.example.com | [2966 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\275\305\265\372\005\020\330\242\350\273\001\"\017businesschannel*@d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030V\355\313\252\261:\202\005\2106Z\035\206\003\300n\302A\335 \223\315\362\315" +peer1.org2.example.com | [2967 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [2968 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [2969 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [296a 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [296b 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org2.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org2.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org2.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org2.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [296c 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org2.example.com | [296d 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [296e 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [296f 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [2970 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 e7 93 52 4d 20 48 5f 66 91 8b fc cc 39 18 f3 |...RM H_f....9..| +peer1.org2.example.com | 00000010 ab 30 31 6f 86 19 f3 33 c1 37 13 23 32 7f d5 15 |.01o...3.7.#2...| +peer1.org2.example.com | [2971 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 2c 62 ac cb 2a ec 5a fd 13 e7 |0E.!..,b..*.Z...| +peer1.org2.example.com | 00000010 37 92 88 81 15 e1 12 b2 64 18 04 1a 42 b8 ea 7e |7.......d...B..~| +peer1.org2.example.com | 00000020 09 25 0c b1 3f 02 20 73 43 54 f1 e5 d4 0d 2e 2e |.%..?. sCT......| +peer1.org2.example.com | 00000030 08 f9 2b df dd 4b cf cb ee a4 66 5c 1c 4d 8f 79 |..+..K....f\.M.y| +peer1.org2.example.com | 00000040 73 ba e7 6f 4b 96 21 |s..oK.!| +peer1.org2.example.com | [2972 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2973 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2974 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2975 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2976 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4565 bytes, seq: 3}, Envelope: 4595 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2977 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2978 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2979 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4565 bytes, seq: 3}, Envelope: 4595 bytes, Signature: 0 bytes +peer1.org2.example.com | [297a 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [297b 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [297c 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0047ef500, header channel_header:"\010\003\032\014\010\275\305\265\372\005\020\330\242\350\273\001\"\017businesschannel*@d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030V\355\313\252\261:\202\005\2106Z\035\206\003\300n\302A\335 \223\315\362\315" +peer1.org2.example.com | [297d 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer1.org2.example.com | [297e 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer1.org2.example.com | [297f 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer1.org2.example.com | [2980 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org2.example.com | [2981 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] +peer1.org2.example.com | [2982 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer1.org2.example.com | [2983 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc0048a1000 +peer1.org2.example.com | [2984 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +peer1.org2.example.com | [2985 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [b1194ad7-2cd9-49f7-aca7-0650ef107d72] +peer1.org2.example.com | [2986 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b1194ad7-2cd9-49f7-aca7-0650ef107d72] +peer1.org2.example.com | [2987 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048badf0 gate 1598907119643959200 evaluation starts +peer1.org2.example.com | [2988 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048badf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2989 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048badf0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [298a 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048badf0 principal matched by identity 0 +peer1.org2.example.com | [298b 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af eb 7f a3 db 22 e8 0d 9a d4 d1 20 96 0f 3c a1 |....."..... ..<.| +peer1.org2.example.com | 00000010 6d 3c b5 6c 57 73 9b 9f 14 94 e8 bb e2 63 0f 70 |m<.lWs.......c.p| +peer1.org2.example.com | [298c 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 9e de 14 79 6b bb 35 05 3c 5e 10 |0D. ....yk.5.<^.| +peer1.org2.example.com | 00000010 a4 a7 85 1b 9d 1a cd 2f 44 6a f8 e7 d1 d9 09 57 |......./Dj.....W| +peer1.org2.example.com | 00000020 86 77 95 7f 02 20 58 40 5c 3a 8a 19 c9 55 67 dc |.w... X@\:...Ug.| +peer1.org2.example.com | 00000030 08 c2 c0 81 54 ed 1d 24 ff 27 23 be f1 bd 82 74 |....T..$.'#....t| +peer1.org2.example.com | 00000040 b6 99 5b 8b f1 bd |..[...| +peer1.org2.example.com | [298d 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048badf0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [298e 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048badf0 signed by 1 principal evaluation starts (used [true]) +peer1.org2.example.com | [298f 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048badf0 skipping identity 0 because it has already been used +peer1.org2.example.com | [2990 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048badf0 principal evaluation fails +peer1.org2.example.com | [2991 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048badf0 gate 1598907119643959200 evaluation succeeds +peer1.org2.example.com | [2992 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +peer1.org2.example.com | [2993 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer1.org2.example.com | [2994 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer1.org2.example.com | [2995 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +peer1.org2.example.com | [2996 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +peer1.org2.example.com | [2997 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [fa8ceaa0-e4a6-4aa9-8a1e-cf1e0b9271c9] +peer1.org2.example.com | [2998 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [2999 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [fa8ceaa0-e4a6-4aa9-8a1e-cf1e0b9271c9] +peer1.org2.example.com | [299a 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +peer1.org2.example.com | [299b 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [ac465663-1f8d-4ace-bcc9-789fc32561c2] +peer1.org2.example.com | [299c 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org2.example.com | [299d 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ac465663-1f8d-4ace-bcc9-789fc32561c2] +peer1.org2.example.com | [299e 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ee7e0 gate 1598907119668884900 evaluation starts +peer1.org2.example.com | [299f 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ee7e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [29a0 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ee7e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [29a1 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer1.org2.example.com | [29a2 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer1.org2.example.com | [29a3 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [29a4 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [29a5 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org2.example.com | [29a6 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | [29a7 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ee7e0 principal matched by identity 0 +peer1.org2.example.com | [29a8 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 e7 93 52 4d 20 48 5f 66 91 8b fc cc 39 18 f3 |...RM H_f....9..| +peer1.org2.example.com | 00000010 ab 30 31 6f 86 19 f3 33 c1 37 13 23 32 7f d5 15 |.01o...3.7.#2...| +peer1.org2.example.com | [29a9 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 2c 62 ac cb 2a ec 5a fd 13 e7 |0E.!..,b..*.Z...| +peer1.org2.example.com | 00000010 37 92 88 81 15 e1 12 b2 64 18 04 1a 42 b8 ea 7e |7.......d...B..~| +peer1.org2.example.com | 00000020 09 25 0c b1 3f 02 20 73 43 54 f1 e5 d4 0d 2e 2e |.%..?. sCT......| +peer1.org2.example.com | 00000030 08 f9 2b df dd 4b cf cb ee a4 66 5c 1c 4d 8f 79 |..+..K....f\.M.y| +peer1.org2.example.com | 00000040 73 ba e7 6f 4b 96 21 |s..oK.!| +peer1.org2.example.com | [29aa 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ee7e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [29ab 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ee7e0 signed by 1 principal evaluation starts (used [true]) +peer1.org2.example.com | [29ac 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ee7e0 skipping identity 0 because it has already been used +peer1.org2.example.com | [29ad 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ee7e0 principal evaluation fails +peer1.org2.example.com | [29ae 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ee7e0 gate 1598907119668884900 evaluation succeeds +peer1.org2.example.com | [29af 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +peer1.org2.example.com | [29b0 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a appears to be valid +peer1.org2.example.com | [29b1 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc0048a1000 +peer1.org2.example.com | [29b2 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003aa7c40 env 0xc0047dd310 txn 0 +peer1.org2.example.com | [29b3 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [29b4 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 76ms +peer1.org2.example.com | [29b5 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [29b6 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [29b7 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +peer1.org2.example.com | [29b8 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [29b9 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [29ba 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [29bb 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +peer1.org2.example.com | [29bc 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [29bd 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer1.org2.example.com | [29be 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [29bf 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +peer1.org2.example.com | [29c0 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] marked as valid by state validator +peer1.org2.example.com | [29c1 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0046edb80), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0046edbc0), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc0046edc00)} +peer1.org2.example.com | [29c2 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | [29c3 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | [29c4 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | [29c5 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc0049160a0)}} +peer1.org2.example.com | [29c6 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +peer1.org2.example.com | [29c7 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org2.example.com | [29c8 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer1.org2.example.com | [29c9 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer0.org1.example.com | [236e 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [236f 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2370 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2371 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" > alive: alive: +peer0.org1.example.com | [2372 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [2373 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2374 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [2375 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2376 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2377 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2378 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [2379 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [237a 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [237b 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [237c 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [237d 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [237e 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [237f 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2380 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2381 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2382 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2383 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2384 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2385 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2720 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [2721 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2723 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2724 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2725 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2726 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2722 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2727 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2728 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2729 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [272a 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [272b 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [272c 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [272e 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [272f 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 f8 9b e4 72 34 12 af 1e 59 64 6f 0d 8a c1 60 |....r4...Ydo...`| +peer1.org1.example.com | 00000010 90 df 35 e3 f0 30 73 f6 1b f0 ab 1c 65 d5 17 e0 |..5..0s.....e...| +peer1.org1.example.com | [2730 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 52 69 8a 68 62 3a 2f 6e 03 e8 |0E.!..Ri.hb:/n..| +peer1.org1.example.com | 00000010 4c 2e 14 0b f5 82 38 bb e3 47 31 24 d1 ef a4 35 |L.....8..G1$...5| +peer1.org1.example.com | 00000020 d6 2f 24 69 da 02 20 68 de cb 59 e9 9d a8 cd 04 |./$i.. h..Y.....| +peer1.org1.example.com | 00000030 fa 70 d6 f6 14 21 7c 03 a6 83 99 8d 03 f9 e2 09 |.p...!|.........| +peer1.org1.example.com | 00000040 cc ff 9c a0 c7 ef 71 |......q| +peer1.org1.example.com | [2731 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [2732 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 e2 b0 83 f3 4e 66 83 d3 26 df |0E.!......Nf..&.| +peer1.org1.example.com | 00000010 e5 a1 c0 e1 27 7e 73 09 31 37 5c b8 ca 52 4e 5a |....'~s.17\..RNZ| +peer1.org1.example.com | 00000020 72 c3 c1 14 12 02 20 11 3b 2b c5 bb 8a 3d b2 5a |r..... .;+...=.Z| +peer1.org1.example.com | 00000030 f3 ca 50 78 c8 11 43 08 2b 70 3b e6 cc e8 38 62 |..Px..C.+p;...8b| +peer1.org1.example.com | 00000040 73 66 d1 4d 25 49 17 |sf.M%I.| +peer1.org1.example.com | [2733 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2734 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2735 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2736 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [272d 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2737 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2738 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2973 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2974 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2975 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2976 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2977 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2978 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2979 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [297b 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [297c 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [297a 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [297d 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [297e 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [297f 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2980 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2981 08-31 20:51:55.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2982 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2983 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2984 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2985 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2986 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2987 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2988 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b0af0 gate 1598907115321168200 evaluation starts +peer0.org2.example.com | [2989 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b0af0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [298a 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b0af0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [298b 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b0af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [298c 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b0af0 principal evaluation fails +peer0.org2.example.com | [298d 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b0af0 gate 1598907115321168200 evaluation fails +peer1.org2.example.com | [29ca 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +peer1.org2.example.com | [29cb 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer1.org2.example.com | [29cc 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +peer1.org2.example.com | [29cd 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [29ce 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{Org2MSP {[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 75 47 48 75 66 88 106 53 54 48 88 50 52 104 73 76 107 50 57 115 51 68 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 97 100 106 84 100 70 104 47 53 100 55 65 10 110 56 48 120 68 68 114 104 114 53 103 109 83 115 119 47 55 82 105 68 114 68 83 84 72 109 103 71 113 55 72 90 78 120 89 89 53 82 85 109 71 102 111 43 118 83 73 43 121 55 77 85 98 73 103 113 103 114 90 105 97 106 80 50 10 122 43 52 55 116 74 84 43 104 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 75 102 97 84 82 51 49 121 113 83 90 111 112 89 55 114 80 101 118 118 86 52 67 122 53 81 113 85 116 73 79 67 81 65 65 90 115 75 110 82 86 84 48 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 102 84 70 55 51 101 57 100 122 81 43 98 72 116 49 87 86 105 54 43 84 65 97 115 109 113 81 68 52 79 85 103 100 105 121 70 117 77 52 108 116 99 81 67 73 66 120 67 73 119 122 43 10 51 120 73 103 115 51 115 121 99 97 47 86 101 122 101 57 121 118 76 48 77 111 81 57 82 101 112 115 67 97 51 86 103 118 117 118 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 68 2 32 59 218 193 24 60 215 156 120 120 121 145 143 132 28 121 15 169 69 157 5 154 184 155 59 245 94 65 217 103 38 97 1 2 32 63 162 199 123 102 37 235 220 15 26 198 167 10 161 77 72 76 133 197 113 171 187 196 11 109 88 153 54 60 245 30 188]} 0x151a150}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0027f0510 0xc0026c16e0 {{0 0} 0 0 0 0} {false}})]} +peer1.org2.example.com | [29cf 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org2.example.com | [29d0 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc00001a520})} +peer1.org2.example.com | [29d1 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +peer1.org2.example.com | [29d2 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +peer1.org2.example.com | [29d3 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +peer1.org2.example.com | [29d4 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +peer1.org2.example.com | [29d5 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0x62, 0xc8, 0x94, 0xe0, 0x8d, 0xe8, 0xc7, 0x50, 0xec, 0x14, 0xce, 0xf7, 0xf6, 0x41, 0xb9, 0x45, 0x45, 0x74, 0xf1, 0x40, 0xf4, 0xb9, 0x19, 0x48, 0x1a, 0x35, 0x67, 0xf7, 0x3c, 0xf, 0xe3, 0xf2} txOffsets= +peer1.org2.example.com | txId=d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a locPointer=offset=70, bytesLength=3520 +peer1.org2.example.com | ] +peer1.org2.example.com | [29d6 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84958, bytesLength=3520] for tx ID: [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] to txid-index +peer1.org2.example.com | [29d7 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84958, bytesLength=3520] for tx number:[0] ID: [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] to blockNumTranNum index +peer1.org2.example.com | [29d8 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89475], isChainEmpty=[false], lastBlockNumber=[3] +peer1.org2.example.com | [29d9 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +peer1.org2.example.com | [29da 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +peer1.org2.example.com | [29db 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +peer1.org2.example.com | [29dc 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [29dd 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [29de 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [29df 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [29e0 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +peer1.org2.example.com | [29e1 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org2.example.com | [29e2 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org2.example.com | [29e3 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [29e5 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [1a770e93-2c96-4fb4-8730-7462d5692005] +peer1.org2.example.com | [29e6 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +peer1.org2.example.com | [29e7 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [29e8 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +peer1.org2.example.com | [29e9 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1a770e93-2c96-4fb4-8730-7462d5692005] +peer1.org2.example.com | [29ea 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +peer1.org2.example.com | [29eb 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [29ec 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408B8BB829CF9AF9D9816...08031A0C0A0565787030321203312E30 +peer1.org2.example.com | [29ed 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 29BDB10FD7C906F855EBAC7D168E5517ED9DB432B332FE3B181715C0A36AD742 +peer1.org2.example.com | [29ee 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer1.org2.example.com | [29ef 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [29f0 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +peer1.org2.example.com | [29f1 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +peer1.org2.example.com | [29e4 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +peer1.org2.example.com | [29f2 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +peer1.org2.example.com | [29f3 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +peer1.org2.example.com | [29f4 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +peer1.org2.example.com | [29f5 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 31ms (state_validation=1ms block_and_pvtdata_commit=21ms state_commit=4ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +peer1.org2.example.com | [29f6 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [29f7 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408B8BB829CF9AF9D9816...08041A0C0A0565787030321203312E30 +peer1.org2.example.com | [29f8 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AB56BFE65F4B48ED153C93F622E0C2B09CF3B2DCB5CFB3A2859F349E72C4C9C6 +peer1.org2.example.com | [29f9 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +peer1.org2.example.com | [29fa 08-31 20:51:59.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org2.example.com | [29fb 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [29fc 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D9816102E +peer1.org2.example.com | [29fd 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8D4A5980BFF6E92349E18B2395C6F2DF5ACADB3C6AED08AB3B3C88F70706A1F1 +peer1.org2.example.com | [29fe 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [29ff 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2a00 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [2a01 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [2a02 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a03 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a04 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a05 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2a06 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a07 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2a08 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2a09 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a0a 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a0b 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a0c 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a0d 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a0e 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a0f 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2386 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2387 08-31 20:51:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2388 08-31 20:51:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2389 08-31 20:51:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [238a 08-31 20:51:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [238b 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [238c 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161026 +peer0.org1.example.com | [238d 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D3800AF6AAFBBDB318AE59A2307861C67C1E7D03C716A07BA49872543FADE9E2 +peer0.org1.example.com | [238e 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [238f 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2390 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [2391 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2392 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2393 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2394 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2395 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2396 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [2397 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2398 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2399 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [239a 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [239b 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [239c 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [239d 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [239e 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [239f 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [23a0 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 80 0a f6 aa fb bd b3 18 ae 59 a2 30 78 61 c6 |..........Y.0xa.| +peer0.org1.example.com | 00000010 7c 1e 7d 03 c7 16 a0 7b a4 98 72 54 3f ad e9 e2 ||.}....{..rT?...| +peer0.org1.example.com | [23a1 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 7e 5a 07 d9 fb df 7e 8d ef 75 |0E.!..~Z....~..u| +peer0.org1.example.com | 00000010 91 40 9e cb a0 79 92 ac 54 36 64 4e 02 a8 1b 60 |.@...y..T6dN...`| +peer0.org1.example.com | 00000020 f8 0d 64 95 c3 02 20 1a 00 42 49 20 68 2c cd 66 |..d... ..BI h,.f| +peer0.org1.example.com | 00000030 b3 96 bd ba a8 a7 82 1e aa 97 ea f8 5e 1f 45 d7 |............^.E.| +peer0.org1.example.com | 00000040 65 ef e7 0f 4e 88 1f |e...N..| +peer0.org1.example.com | [23a2 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [23a3 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 aa 01 b3 f2 e0 f4 89 7a 81 71 |0E.!.........z.q| +peer0.org1.example.com | 00000010 7d 1e de 8f 40 ae ac 2e 5b 2d c8 28 10 00 6e 93 |}...@...[-.(..n.| +peer0.org1.example.com | 00000020 86 42 e4 11 05 02 20 45 d0 6f 2e cb c9 32 c1 30 |.B.... E.o...2.0| +peer0.org1.example.com | 00000030 a3 58 4b 40 7c 56 cd 1b 7f f8 e6 4d 87 e3 1d b0 |.XK@|V.....M....| +peer0.org1.example.com | 00000040 81 b9 af 1c 67 bd 8c |....g..| +peer0.org1.example.com | [23a4 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [23a5 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [23a6 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23a7 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23a8 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [23a9 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [23aa 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23ab 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [23ac 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [23ad 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 80 0a f6 aa fb bd b3 18 ae 59 a2 30 78 61 c6 |..........Y.0xa.| +peer0.org1.example.com | 00000010 7c 1e 7d 03 c7 16 a0 7b a4 98 72 54 3f ad e9 e2 ||.}....{..rT?...| +peer0.org1.example.com | [23ae 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 7e 5a 07 d9 fb df 7e 8d ef 75 |0E.!..~Z....~..u| +peer0.org1.example.com | 00000010 91 40 9e cb a0 79 92 ac 54 36 64 4e 02 a8 1b 60 |.@...y..T6dN...`| +peer0.org1.example.com | 00000020 f8 0d 64 95 c3 02 20 1a 00 42 49 20 68 2c cd 66 |..d... ..BI h,.f| +peer0.org1.example.com | 00000030 b3 96 bd ba a8 a7 82 1e aa 97 ea f8 5e 1f 45 d7 |............^.E.| +peer0.org1.example.com | 00000040 65 ef e7 0f 4e 88 1f |e...N..| +peer0.org1.example.com | [23af 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [23b0 08-31 20:51:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [23b1 08-31 20:51:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23b3 08-31 20:51:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [23b4 08-31 20:51:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e1 ad 29 18 79 ab 40 6a e9 8e 72 aa e7 f3 82 |...).y.@j..r....| +peer0.org1.example.com | 00000010 c5 74 7f 2d d1 9d 8b d1 21 31 f7 e5 45 4a f1 bc |.t.-....!1..EJ..| +peer0.org1.example.com | [23b5 08-31 20:51:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 cc 45 75 d1 90 0d ae 8f b3 b9 00 |0D. '.Eu........| +peer0.org1.example.com | 00000010 eb 7a bf d7 c1 d2 9b aa 08 e6 29 54 aa d1 49 a6 |.z........)T..I.| +peer0.org1.example.com | 00000020 45 28 ed cb 02 20 42 99 45 f1 b0 c4 5c 25 51 a1 |E(... B.E...\%Q.| +peer0.org1.example.com | 00000030 6c 01 8d a7 37 8c e3 55 09 ee 7d 91 68 d1 f1 f9 |l...7..U..}.h...| +peer0.org1.example.com | 00000040 b9 a7 ad c3 90 cd |......| +peer0.org1.example.com | [23b6 08-31 20:51:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [23b7 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23b8 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [23b9 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23ba 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [23bb 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [23bc 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [23b2 08-31 20:51:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [23bd 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [23be 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [23bf 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [23c0 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [23c1 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 gate 1598907109634480700 evaluation starts +peer0.org1.example.com | [23c2 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [23c3 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [23c4 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 principal matched by identity 0 +peer0.org1.example.com | [23c5 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d 58 de 29 3e 89 57 1e 44 8a f7 fb 53 91 ab 73 |]X.)>.W.D...S..s| +peer0.org1.example.com | 00000010 32 3e 69 99 79 39 d4 ef 41 34 e8 2c 5d 92 5c a4 |2>i.y9..A4.,].\.| +peer0.org1.example.com | [23c6 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 f8 55 a0 2b 98 7e 58 e5 5c 40 2e |0D. 4.U.+.~X.\@.| +peer0.org1.example.com | 00000010 50 fe 7c d2 67 3e 14 14 2e a5 16 3c 90 40 d9 07 |P.|.g>.....<.@..| +peer0.org1.example.com | 00000020 3f 9f b1 93 02 20 36 2b 3b 7d ab 73 f8 23 89 74 |?.... 6+;}.s.#.t| +peer0.org1.example.com | 00000030 9b d6 f2 88 bc 63 45 b0 8e 0f 16 db 35 57 42 35 |.....cE.....5WB5| +peer0.org1.example.com | 00000040 f3 3d cc 8c 1f c9 |.=....| +peer0.org1.example.com | [23c7 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [23c8 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 gate 1598907109634480700 evaluation succeeds +peer0.org1.example.com | [23c9 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [23ca 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [23cb 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [23cc 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [23cd 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [23ce 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23cf 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a10 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a11 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a12 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a13 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2a14 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a15 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2a16 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2a17 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2a18 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2a19 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2a1a 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2a1b 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961770 gate 1598907120310018500 evaluation starts +peer1.org2.example.com | [2a1c 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961770 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2a1d 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961770 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2a1e 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2a1f 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961770 principal evaluation fails +peer1.org2.example.com | [2a20 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a21 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a22 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004961770 gate 1598907120310018500 evaluation fails +peer1.org2.example.com | [2a23 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2a24 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2a25 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2a26 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495a570 gate 1598907120312958400 evaluation starts +peer1.org2.example.com | [2a27 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495a570 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2a28 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495a570 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2a29 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495a570 principal matched by identity 0 +peer1.org2.example.com | [2a2a 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb a9 e5 9d 18 1a f9 4f 64 2e 97 bd 6d 8b 9a 14 |.......Od...m...| +peer1.org2.example.com | 00000010 1c cd 93 93 b8 ef ce f5 70 5d d8 43 42 d7 92 41 |........p].CB..A| +peer1.org2.example.com | [2a2b 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb ac 70 4b 10 24 5c 54 64 f0 ff |0E.!...pK.$\Td..| +peer1.org2.example.com | 00000010 f8 51 bb a2 78 d4 97 29 15 da e8 c8 5a a3 ba 4c |.Q..x..)....Z..L| +peer1.org2.example.com | 00000020 73 1c f3 07 33 02 20 69 f5 a7 f1 70 42 00 28 fe |s...3. i...pB.(.| +peer1.org2.example.com | 00000030 ad 0d bf a9 c5 4f 53 eb 33 df ee 95 00 95 f6 a1 |.....OS.3.......| +peer1.org2.example.com | 00000040 c0 09 7e 8f ad e2 9b |..~....| +peer1.org1.example.com | [2739 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [273a 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 f8 9b e4 72 34 12 af 1e 59 64 6f 0d 8a c1 60 |....r4...Ydo...`| +peer1.org1.example.com | 00000010 90 df 35 e3 f0 30 73 f6 1b f0 ab 1c 65 d5 17 e0 |..5..0s.....e...| +peer1.org1.example.com | [273b 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 52 69 8a 68 62 3a 2f 6e 03 e8 |0E.!..Ri.hb:/n..| +peer1.org1.example.com | 00000010 4c 2e 14 0b f5 82 38 bb e3 47 31 24 d1 ef a4 35 |L.....8..G1$...5| +peer1.org1.example.com | 00000020 d6 2f 24 69 da 02 20 68 de cb 59 e9 9d a8 cd 04 |./$i.. h..Y.....| +peer1.org1.example.com | 00000030 fa 70 d6 f6 14 21 7c 03 a6 83 99 8d 03 f9 e2 09 |.p...!|.........| +peer1.org1.example.com | 00000040 cc ff 9c a0 c7 ef 71 |......q| +peer1.org1.example.com | [273c 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [273d 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [273e 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [273f 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2740 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2741 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2742 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2743 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2744 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2745 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2746 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2747 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a9530 gate 1598907121346867600 evaluation starts +peer1.org1.example.com | [2748 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a9530 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2749 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a9530 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [274a 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a9530 principal matched by identity 0 +peer1.org1.example.com | [274b 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 5b 37 f3 59 2a 3d 1c 8c 82 f6 83 f7 e7 f3 1e |=[7.Y*=.........| +peer1.org1.example.com | 00000010 f4 28 26 0f 02 53 00 aa 05 07 d0 da 3f 7a 06 41 |.(&..S......?z.A| +peer1.org1.example.com | [274c 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de ee 1b dc b7 1a e2 1b 53 7f 16 |0E.!.........S..| +peer1.org1.example.com | 00000010 a3 38 34 24 60 fd 7a 03 5c 53 7f 2a ef 00 95 34 |.84$`.z.\S.*...4| +peer1.org1.example.com | 00000020 46 26 d9 e2 46 02 20 6c 4a a0 18 ef 6f 2c 50 d4 |F&..F. lJ...o,P.| +peer1.org1.example.com | 00000030 d4 66 95 9f 6e 41 79 68 aa 6e dc b2 5f c9 cf df |.f..nAyh.n.._...| +peer1.org1.example.com | 00000040 4d 02 bb 49 8f 8c 3c |M..I..<| +peer1.org1.example.com | [274d 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a9530 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [274e 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a9530 gate 1598907121346867600 evaluation succeeds +peer1.org1.example.com | [274f 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2750 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2751 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2752 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2753 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2754 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23d0 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [23d1 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23d2 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [23d3 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 80 0a f6 aa fb bd b3 18 ae 59 a2 30 78 61 c6 |..........Y.0xa.| +peer0.org1.example.com | 00000010 7c 1e 7d 03 c7 16 a0 7b a4 98 72 54 3f ad e9 e2 ||.}....{..rT?...| +peer0.org1.example.com | [23d4 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 7e 5a 07 d9 fb df 7e 8d ef 75 |0E.!..~Z....~..u| +peer0.org1.example.com | 00000010 91 40 9e cb a0 79 92 ac 54 36 64 4e 02 a8 1b 60 |.@...y..T6dN...`| +peer0.org1.example.com | 00000020 f8 0d 64 95 c3 02 20 1a 00 42 49 20 68 2c cd 66 |..d... ..BI h,.f| +peer0.org1.example.com | 00000030 b3 96 bd ba a8 a7 82 1e aa 97 ea f8 5e 1f 45 d7 |............^.E.| +peer0.org1.example.com | 00000040 65 ef e7 0f 4e 88 1f |e...N..| +peer0.org1.example.com | [23d5 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [23d6 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [23d7 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23d8 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [23d9 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e1 ad 29 18 79 ab 40 6a e9 8e 72 aa e7 f3 82 |...).y.@j..r....| +peer0.org1.example.com | 00000010 c5 74 7f 2d d1 9d 8b d1 21 31 f7 e5 45 4a f1 bc |.t.-....!1..EJ..| +peer0.org1.example.com | [23da 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 cc 45 75 d1 90 0d ae 8f b3 b9 00 |0D. '.Eu........| +peer0.org1.example.com | 00000010 eb 7a bf d7 c1 d2 9b aa 08 e6 29 54 aa d1 49 a6 |.z........)T..I.| +peer0.org1.example.com | 00000020 45 28 ed cb 02 20 42 99 45 f1 b0 c4 5c 25 51 a1 |E(... B.E...\%Q.| +peer0.org1.example.com | 00000030 6c 01 8d a7 37 8c e3 55 09 ee 7d 91 68 d1 f1 f9 |l...7..U..}.h...| +peer0.org1.example.com | 00000040 b9 a7 ad c3 90 cd |......| +peer0.org1.example.com | [23db 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [23dc 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23dd 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [23de 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23df 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [23e0 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [23e1 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [23e2 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [23e3 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [23e4 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [23e5 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0410 gate 1598907109645201400 evaluation starts +peer0.org1.example.com | [23e6 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0410 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [23e7 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0410 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [23e8 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0410 principal matched by identity 0 +peer0.org1.example.com | [23e9 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 81 8a 58 31 78 c0 66 1a e1 b8 c8 6f 59 ee a7 |...X1x.f....oY..| +peer0.org1.example.com | 00000010 98 7e 6d 00 a7 1c 52 e5 f9 51 65 50 33 33 39 b3 |.~m...R..QeP339.| +peer0.org1.example.com | [23ea 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d8 b0 ee dd 6f 61 1b b4 e3 cf |0E.!......oa....| +peer1.org1.example.com | [2755 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2756 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2757 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2758 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2759 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [275a 08-31 20:52:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [275b 08-31 20:52:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 f8 9b e4 72 34 12 af 1e 59 64 6f 0d 8a c1 60 |....r4...Ydo...`| +peer1.org1.example.com | 00000010 90 df 35 e3 f0 30 73 f6 1b f0 ab 1c 65 d5 17 e0 |..5..0s.....e...| +peer1.org1.example.com | [275c 08-31 20:52:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 52 69 8a 68 62 3a 2f 6e 03 e8 |0E.!..Ri.hb:/n..| +peer1.org1.example.com | 00000010 4c 2e 14 0b f5 82 38 bb e3 47 31 24 d1 ef a4 35 |L.....8..G1$...5| +peer1.org1.example.com | 00000020 d6 2f 24 69 da 02 20 68 de cb 59 e9 9d a8 cd 04 |./$i.. h..Y.....| +peer1.org1.example.com | 00000030 fa 70 d6 f6 14 21 7c 03 a6 83 99 8d 03 f9 e2 09 |.p...!|.........| +peer1.org1.example.com | 00000040 cc ff 9c a0 c7 ef 71 |......q| +peer1.org1.example.com | [275d 08-31 20:52:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [275e 08-31 20:52:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [275f 08-31 20:52:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2760 08-31 20:52:01.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2761 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2762 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2763 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2764 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2765 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2766 08-31 20:52:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2767 08-31 20:52:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2768 08-31 20:52:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2769 08-31 20:52:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [276a 08-31 20:52:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [276b 08-31 20:52:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [276c 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [276d 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [276e 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [276f 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2770 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2771 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2772 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2773 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2774 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2775 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2776 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2777 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2778 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fb380 gate 1598907121498733900 evaluation starts +peer1.org1.example.com | [2779 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fb380 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [277a 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fb380 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [277b 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fb380 principal matched by identity 0 +peer1.org1.example.com | [277c 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 e2 6c 42 f2 a8 e2 3f 70 70 87 06 55 06 f1 1c |..lB...?pp..U...| +peer1.org1.example.com | 00000010 0d d9 f7 7e a8 3b 92 34 16 5f fe d2 69 f8 7c a6 |...~.;.4._..i.|.| +peer1.org1.example.com | [277d 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 d3 ec 39 b0 40 f0 97 91 21 35 |0E.!....9.@...!5| +peer1.org1.example.com | 00000010 7d 64 7f f8 31 b9 cd 11 e8 6d 70 50 41 d5 f3 58 |}d..1....mpPA..X| +peer1.org1.example.com | 00000020 7e 04 66 4a a2 02 20 2a b7 16 58 02 a4 c6 82 b9 |~.fJ.. *..X.....| +peer1.org1.example.com | 00000030 a0 eb 2f 01 26 3d 0f 66 2e 59 14 44 9c a3 ad bf |../.&=.f.Y.D....| +peer1.org1.example.com | 00000040 a0 8f b9 51 b3 d2 b5 |...Q...| +peer1.org1.example.com | [277e 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fb380 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [277f 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033fb380 gate 1598907121498733900 evaluation succeeds +peer1.org1.example.com | [2780 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2781 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2782 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2783 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2784 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2785 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2786 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2787 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2788 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2789 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [278a 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [278b 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [278c 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [278d 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [278e 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [278f 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2790 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2a2c 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495a570 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2a2d 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495a570 gate 1598907120312958400 evaluation succeeds +peer1.org2.example.com | [2a2e 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2a2f 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2a30 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2a31 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2a32 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a33 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2a34 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2a35 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2a36 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2a37 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a38 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a39 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a3a 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a3b 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a3c 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a3d 08-31 20:52:00.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a3e 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a3f 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a40 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a41 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a42 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a43 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a44 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a45 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a46 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a47 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a48 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2a49 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a4a 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2a4b 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a4c 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [298e 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [298f 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2990 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2991 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b1060 gate 1598907115322821900 evaluation starts +peer0.org2.example.com | [2992 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b1060 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2993 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b1060 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2994 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b1060 principal matched by identity 0 +peer0.org2.example.com | [2995 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c e0 9d 52 a9 d6 99 9f c0 d3 b5 fc 72 61 5b 2f |...R........ra[/| +peer0.org2.example.com | 00000010 fd 9b a9 a2 91 4d 62 ca 74 7a 7a cd 4d e9 ce ac |.....Mb.tzz.M...| +peer0.org2.example.com | [2996 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 d9 08 57 cc 6a e0 dc 50 64 5a |0E.!....W.j..PdZ| +peer0.org2.example.com | 00000010 5f f9 e8 62 02 02 00 b8 27 89 cd 47 b2 e7 d1 01 |_..b....'..G....| +peer0.org2.example.com | 00000020 32 c0 25 97 91 02 20 0c ff a9 87 17 dc e4 53 56 |2.%... .......SV| +peer0.org2.example.com | 00000030 67 82 d4 ed 0e 69 90 6b 2f 35 bd 73 32 94 99 c7 |g....i.k/5.s2...| +peer0.org2.example.com | 00000040 15 2d 57 e0 5a 92 40 |.-W.Z.@| +peer0.org2.example.com | [2997 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b1060 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2998 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049b1060 gate 1598907115322821900 evaluation succeeds +peer0.org2.example.com | [2999 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [299a 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [299b 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [299c 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [299d 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [299e 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [299f 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [29a0 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [29a1 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [29a2 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29a3 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29a4 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29a5 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [29a6 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29a7 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [29a8 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29a9 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [29aa 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29ab 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [29ac 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29ad 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29ae 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29af 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29b0 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [29b1 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2791 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [2a4d 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 b2 4a 6d 5f b8 7b 34 5b 5f fa b2 4c 25 4c fe 0e |.Jm_.{4[_..L%L..| +peer0.org2.example.com | [29b2 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2792 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a4e 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 10 60 cf 0d ac 02 20 4a 6c 54 28 40 f3 26 2c cc |.`.... JlT(@.&,.| +peer0.org2.example.com | [29b3 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2793 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a4f 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 a4 02 dc 4c ad 76 f2 71 6b 11 64 d5 5e c1 39 f4 |...L.v.qk.d.^.9.| +peer0.org2.example.com | [29b4 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2794 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a50 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000040 84 66 1b 38 4d ee 50 |.f.8M.P| +peer0.org2.example.com | [29b5 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2795 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a51 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23eb 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0410 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2796 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [29b6 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2a52 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [23ec 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0410 gate 1598907109645201400 evaluation succeeds +peer1.org1.example.com | [2797 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [29b7 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a53 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [23ed 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2798 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29b8 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a54 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 5d 4f ff 4a 19 f7 f0 ef 39 07 3b 45 81 3a 23 |.]O.J....9.;E.:#| +peer0.org1.example.com | [23ee 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2799 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [29b9 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 f8 71 e5 47 35 7e 57 86 69 08 d4 d9 31 6b a7 fb |.q.G5~W.i...1k..| +peer0.org1.example.com | [23ef 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [279a 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [29ba 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a55 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 b4 db d3 29 b5 df 6e ed 88 09 27 |0D. ....)..n...'| +peer0.org1.example.com | [23f0 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [279b 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [29bb 08-31 20:51:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000010 ad d1 96 85 b4 8c 4c 6e 48 60 ee ad 21 ef da 1d |......LnH`..!...| +peer0.org1.example.com | [23f1 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [279c 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [29bc 08-31 20:51:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816102A +peer1.org2.example.com | 00000020 82 96 92 b0 02 20 68 8f 6f 51 48 f8 35 4d b0 ca |..... h.oQH.5M..| +peer0.org1.example.com | [23f2 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [279d 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [29bd 08-31 20:51:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 77444828C97A8C15B495057394AF1CFA52B08E96E0BE4687B6CAA3928267B3CC +peer1.org2.example.com | 00000030 a7 31 97 0b 58 9c 91 42 0c 61 db b7 8b 26 ae de |.1..X..B.a...&..| +peer0.org1.example.com | [23f3 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [279e 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 67 45 e2 b2 b6 dd cb c6 17 26 f9 c3 80 4c 61 |(gE.......&...La| +peer0.org2.example.com | [29be 08-31 20:51:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000040 3b 1a dd b7 2b df |;...+.| +peer0.org1.example.com | [23f4 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 78 f0 6f f2 46 3e df cf 0a d1 3d 63 21 71 82 b9 |x.o.F>....=c!q..| +peer0.org2.example.com | [29bf 08-31 20:51:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2a56 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [23f5 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [279f 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 37 c0 99 e0 4d 4b c6 43 5c 1b |0E.!..7...MK.C\.| +peer0.org2.example.com | [29c0 08-31 20:51:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [2a57 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [23f6 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | 00000010 f3 b5 30 5a 1c 66 ae 7e 3e c5 02 08 de 6f f5 78 |..0Z.f.~>....o.x| +peer0.org2.example.com | [29c1 08-31 20:51:55.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [2a58 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [23f7 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 4b 9b f5 c9 d8 02 20 70 bf 4b 5b b4 32 61 8a c6 |K..... p.K[.2a..| +peer0.org2.example.com | [29c2 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a59 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [23f8 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 d0 f7 4f 42 86 38 6b 84 df 24 71 aa 70 44 01 49 |..OB.8k..$q.pD.I| +peer0.org2.example.com | [29c3 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a5a 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [23f9 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 8f 8c c8 d7 43 97 51 |....C.Q| +peer0.org2.example.com | [29c4 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2a5b 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23fa 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27a0 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [29c5 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a5c 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23fb 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | [29c6 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2a5d 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [23fd 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27a1 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 69 1f e4 ae cc 59 74 ab f5 21 3a |0D. zi....Yt..!:| +peer0.org2.example.com | [29c7 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2a5e 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23fc 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 ab 85 04 2f 4c 15 74 4e 36 ee 48 91 f6 27 0d e8 |.../L.tN6.H..'..| +peer0.org2.example.com | [29c9 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2a5f 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23fe 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 9a 18 53 a8 02 20 0b dd df 7d cf 08 d1 c3 d7 ac |..S.. ...}......| +peer0.org2.example.com | [29c8 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a60 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [23ff 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 2e f4 70 ea 00 bc bd c9 19 39 ff 22 5c 1c b3 54 |..p......9."\..T| +peer0.org2.example.com | [29ca 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a61 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2400 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 11 58 e0 54 16 31 |.X.T.1| +peer0.org2.example.com | [29cb 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a62 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2401 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27a2 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [29cc 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a63 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2402 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [27a3 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [29cd 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2a64 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2403 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [27a4 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [29ce 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a65 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2404 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29cf 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27a5 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2a66 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2405 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [29d0 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27a6 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2a67 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2406 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [29d1 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27a7 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a68 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2407 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [29d2 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [27a8 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a69 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2408 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1be0 gate 1598907109740396400 evaluation starts +peer0.org2.example.com | [29d3 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27a9 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a6a 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2409 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1be0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [27aa 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [29d4 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2a6b 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27ab 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [240a 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1be0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [29d5 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2a6c 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27ac 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [240b 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1be0 principal matched by identity 0 +peer0.org2.example.com | [29d6 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2a6d 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27ad 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [240c 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [29d7 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2a6e 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27ae 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [29d8 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2a6f 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27af 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [240d 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | [29d9 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2a70 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27b0 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" secret_envelope: > alive: +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [29da 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e3630 gate 1598907115530907400 evaluation starts +peer1.org2.example.com | [2a71 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27b1 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | [29db 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e3630 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2a72 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27b2 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [29dc 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e3630 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2a73 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27b3 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [29dd 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e3630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2a74 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [27b4 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [240e 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1be0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [29de 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e3630 principal evaluation fails +peer1.org2.example.com | [2a75 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27b5 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [240f 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1be0 gate 1598907109740396400 evaluation succeeds +peer0.org2.example.com | [29df 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e3630 gate 1598907115530907400 evaluation fails +peer1.org2.example.com | [2a76 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [27b6 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2410 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [29e0 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2a77 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [27b7 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2411 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [29e1 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2a78 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [27b8 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org1.example.com | [2412 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [29e2 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org1.example.com | [2413 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [29e3 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e3ba0 gate 1598907115531297400 evaluation starts +peer0.org1.example.com | [2414 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | [29e4 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e3ba0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [27b9 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer1.org2.example.com | [2a79 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [29e5 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e3ba0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer1.org2.example.com | [2a7a 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2415 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | [29e6 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e3ba0 principal matched by identity 0 +peer1.org1.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer1.org2.example.com | [2a7b 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | [29e7 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 dd 37 3a ac 4d 6d 59 03 6c 4c 70 04 0c af 2a |%.7:.MmY.lLp...*| +peer1.org1.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer1.org2.example.com | [2a7c 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | 00000010 a2 cc cb ba 0c 5f f5 ad 3c 01 17 87 a9 00 34 05 |....._..<.....4.| +peer1.org1.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer1.org2.example.com | [2a7d 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | [29e8 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f 19 5d 6e 8b cb 5c d7 46 4d 87 6b |0D. _.]n..\.FM.k| +peer1.org1.example.com | [27ba 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2a7e 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c88a0 gate 1598907120550087300 evaluation starts +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | 00000010 41 20 ed dc aa f1 16 ef 17 93 cf 52 a5 bd 33 0e |A .........R..3.| +peer1.org1.example.com | [27bb 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2a7f 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c88a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2416 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 4c ed 99 d2 02 20 0b 94 3b 93 6f 42 3c a1 fc 25 |L.... ..;.oB<..%| +peer1.org1.example.com | [27bc 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2a80 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c88a0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2417 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 c7 d0 e4 0c 7f 28 ee 4d 45 4a 7e 7c 91 7d 0a 02 |.....(.MEJ~|.}..| +peer1.org1.example.com | [27bd 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2a81 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c88a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2418 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000040 45 97 d2 ce 77 bb |E...w.| +peer1.org1.example.com | [27be 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2a82 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c88a0 principal evaluation fails +peer0.org1.example.com | [2419 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29e9 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e3ba0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [27bf 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331ca40 gate 1598907121702708100 evaluation starts +peer1.org2.example.com | [2a83 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c88a0 gate 1598907120550087300 evaluation fails +peer0.org1.example.com | [241a 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [29ea 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049e3ba0 gate 1598907115531297400 evaluation succeeds +peer1.org1.example.com | [27c0 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331ca40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2a84 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [241b 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [29eb 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [27c1 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331ca40 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2a85 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [241c 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [29ec 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [27c2 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331ca40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [241d 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2a86 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [29ed 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [27c3 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331ca40 principal evaluation fails +peer0.org1.example.com | [241e 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032df510 gate 1598907109746357800 evaluation starts +peer1.org2.example.com | [2a87 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c8e10 gate 1598907120554549000 evaluation starts +peer0.org2.example.com | [29ee 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [27c4 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331ca40 gate 1598907121702708100 evaluation fails +peer0.org1.example.com | [241f 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032df510 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2a88 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c8e10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [29ef 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27c5 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2420 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032df510 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2a89 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c8e10 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [29f0 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [27c6 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2421 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032df510 principal matched by identity 0 +peer1.org2.example.com | [2a8a 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c8e10 principal matched by identity 0 +peer0.org2.example.com | [29f1 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [27c7 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2422 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | [29f2 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [27c8 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331cfb0 gate 1598907121702967200 evaluation starts +peer1.org2.example.com | [2a8b 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 b4 6d 50 2b c3 1a 96 c3 6c 69 c2 41 53 7b 0d |..mP+....li.AS{.| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [29f3 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [27c9 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331cfb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 d3 4e a4 98 7a 84 ad 19 75 cc 5c 94 ee a5 8c 8a |.N..z...u.\.....| +peer0.org1.example.com | [2423 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | [29f4 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27ca 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331cfb0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2a8c 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 78 56 22 ef 6d 80 90 fd dd 32 2e |0D. .xV".m....2.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | [29f5 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27cb 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331cfb0 principal matched by identity 0 +peer1.org2.example.com | 00000010 b5 15 fe 6e 77 9f 90 37 54 3d 24 24 c1 ce 86 a3 |...nw..7T=$$....| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | [29f6 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27cc 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer1.org2.example.com | 00000020 19 8e f1 92 02 20 17 fb 1f f3 fc ed c8 0f 2b 92 |..... ........+.| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | [29f7 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer1.org2.example.com | 00000030 d9 e8 2a e7 95 ca 83 66 8f 5c 3f 80 51 64 21 25 |..*....f.\?.Qd!%| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [29f8 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27cd 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer1.org2.example.com | 00000040 3b 7f fe 9a 20 bc |;... .| +peer0.org1.example.com | [2424 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032df510 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [29f9 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer1.org2.example.com | [2a8d 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c8e10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2425 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032df510 gate 1598907109746357800 evaluation succeeds +peer0.org2.example.com | [29fa 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer1.org2.example.com | [2a8e 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c8e10 gate 1598907120554549000 evaluation succeeds +peer0.org1.example.com | [2426 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [29fb 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer1.org2.example.com | [2a8f 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2427 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [29fc 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer1.org2.example.com | [2a90 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2428 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [29fd 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27ce 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331cfb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2a91 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2429 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [27cf 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00331cfb0 gate 1598907121702967200 evaluation succeeds +peer0.org2.example.com | [29fe 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2a92 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [242a 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | [27d0 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [29ff 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27d1 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [2a00 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2a01 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27d2 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [242b 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | [2a02 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27d3 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | [2a03 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27d4 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | [2a93 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a04 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27d5 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | [2a94 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2a05 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27d6 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [2a95 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2a06 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27d7 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org1.example.com | [242c 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2a96 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2a07 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27d8 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [242d 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [2a97 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2a08 08-31 20:51:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27d9 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [242e 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | [2a98 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a09 08-31 20:51:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27da 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [2a99 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a0a 08-31 20:51:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27db 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [242f 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | [2a9a 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a0b 08-31 20:51:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [27dc 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | [2a9b 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a0c 08-31 20:51:55.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27dd 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | [2a9c 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a0d 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [27de 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | [2a9d 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a0e 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [27df 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [2a9e 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a0f 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org1.example.com | [2430 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | [2a9f 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a10 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [27e0 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [2aa0 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a11 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\356@\324\272" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer0.org1.example.com | [2431 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | [2aa1 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a12 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | [2aa2 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a13 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\356@\324\272" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | [2aa3 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a14 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | [2aa4 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a15 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 82 19 b7 35 14 1a b4 75 5e 2d 23 8c 90 9d 66 |....5...u^-#...f| +peer1.org1.example.com | [27e1 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [2aa5 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 a7 f8 43 2c 0d cb 12 68 89 9e 50 10 9c 6e 54 0b |..C,...h..P..nT.| +peer1.org1.example.com | [27e2 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2432 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2aa6 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a16 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 7b b0 97 a6 f0 53 6a 3c 08 79 be |0D. s{....Sj<.y.| +peer1.org1.example.com | [27e3 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2433 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2aa7 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 39 82 04 0d 36 ee cd b4 91 dc 92 d3 4c 29 fe 90 |9...6.......L)..| +peer1.org1.example.com | [27e4 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2434 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2aa8 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 42 71 d4 40 02 20 7a 9d 60 11 4e 87 9e 1b 2e ef |Bq.@. z.`.N.....| +peer1.org1.example.com | [27e5 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org1.example.com | [2435 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2aa9 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | 00000030 5b 01 77 10 24 49 6d 4b b2 f3 d3 3a 6e 52 9b f7 |[.w.$ImK...:nR..| +peer1.org1.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org1.example.com | [2436 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2aaa 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000040 40 0c 97 d8 27 4b |@...'K| +peer1.org1.example.com | [27e6 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer0.org1.example.com | [2437 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2aab 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a17 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer0.org1.example.com | [2438 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2aac 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org1.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer0.org1.example.com | [2439 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2aad 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a18 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cb 76 65 3b 46 e7 13 99 16 7d e6 |0E.!..ve;F....}.| +peer1.org1.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer0.org1.example.com | [243a 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003302300 gate 1598907109759350600 evaluation starts +peer0.org2.example.com | 00000010 e9 8b d3 1f 7d 62 40 97 c9 99 6f 7a 56 e4 4a 1a |....}b@...ozV.J.| +peer1.org2.example.com | [2aae 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer0.org1.example.com | [243b 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003302300 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2aaf 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000020 59 70 2e 43 cc 02 20 76 03 b0 aa b1 03 4a a6 43 |Yp.C.. v.....J.C| +peer1.org1.example.com | [27e7 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [243c 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003302300 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2ab0 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 11 f5 c9 a6 69 cc f1 89 43 11 d7 8b d3 d8 15 50 |....i...C......P| +peer1.org1.example.com | [27e8 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [243d 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003302300 principal matched by identity 0 +peer1.org2.example.com | [2ab1 08-31 20:52:00.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | 00000040 23 d1 3e ee 40 d4 ba |#.>.@..| +peer0.org1.example.com | [243e 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | [27e9 08-31 20:52:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ab2 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2a19 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [27ea 08-31 20:52:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ab3 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [2a1a 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [243f 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org1.example.com | [27eb 08-31 20:52:01.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ab4 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a1b 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org1.example.com | [27ec 08-31 20:52:01.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 1] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [2ab6 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a1c 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | [27ed 08-31 20:52:01.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ab5 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2a1d 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | [27ee 08-31 20:52:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ab7 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [2a1e 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [27ef 08-31 20:52:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ab8 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2a1f 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2440 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003302300 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [27f0 08-31 20:52:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [2ab9 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a20 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2441 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003302300 gate 1598907109759350600 evaluation succeeds +peer1.org1.example.com | [27f1 08-31 20:52:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2aba 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a21 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [2442 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [27f4 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2abb 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a22 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2443 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [27f5 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2abc 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a23 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2444 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [27f6 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2abd 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a24 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2445 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [27f3 08-31 20:52:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2abe 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a25 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\356@\324\272" > > alive: +peer0.org1.example.com | [2446 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27f2 08-31 20:52:01.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2abf 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a26 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [2447 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [27f7 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer1.org2.example.com | [2ac0 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a27 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2448 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [27f9 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ac1 08-31 20:52:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a28 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2449 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [27fa 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ac2 08-31 20:52:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a29 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [244a 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [27fb 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ac3 08-31 20:52:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a2a 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [244b 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [27fd 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ac4 08-31 20:52:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a2b 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [244c 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [27fc 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ac5 08-31 20:52:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a2c 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [244d 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [27f8 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a2d 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ac6 08-31 20:52:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [244e 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003303500 gate 1598907109765220500 evaluation starts +peer1.org1.example.com | [27fe 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a2e 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ac7 08-31 20:52:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [244f 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003303500 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2800 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a2f 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ac8 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2450 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003303500 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [27ff 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2a30 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [2ac9 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D9816102F +peer0.org1.example.com | [2451 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003303500 principal matched by identity 0 +peer1.org1.example.com | [2801 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a31 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2aca 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3D5B37F3592A3D1C8C82F683F7E7F31EF428260F025300AA0507D0DA3F7A0641 +peer0.org1.example.com | [2452 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org1.example.com | [2802 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 753 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a32 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2acb 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [2803 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 753 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a33 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2acc 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2453 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | [2804 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a34 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2acd 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | [2805 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | [2a35 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2ace 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\\\375Zl\345~\347\254\220.\205\3664M\006\230\321C\002 \0018\233\324>\2749\257\234D\004]\354\213\342?\204S\244T\212\337,\217$\322\364$\"\350\257\257" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [2a36 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2acf 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | [2806 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | [2ad0 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2a37 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [2ad1 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | [2a38 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2454 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003303500 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2ad2 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | [2a39 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2455 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003303500 gate 1598907109765220500 evaluation succeeds +peer1.org2.example.com | [2ad3 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | [2a3a 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2456 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2ad4 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [2a3b 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2457 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2ad5 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\\\375Zl\345~\347\254\220.\205\3664M\006\230\321C\002 \0018\233\324>\2749\257\234D\004]\354\213\342?\204S\244T\212\337,\217$\322\364$\"\350\257\257" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [2807 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a3c 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2458 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2ad6 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2808 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a3d 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a27710 gate 1598907117319830100 evaluation starts +peer0.org1.example.com | [2459 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2ad7 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2809 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2a3e 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a27710 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2ad8 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [245a 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [280a 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a3f 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a27710 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2ad9 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [245b 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [280b 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a40 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a27710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2ada 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [245c 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org1.example.com | [280c 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2a41 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a27710 principal evaluation fails +peer1.org2.example.com | [2adc 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [245d 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [280d 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2a42 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a27710 gate 1598907117319830100 evaluation fails +peer1.org2.example.com | [2adb 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [245e 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [280e 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2a43 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2add 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [245f 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [280f 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003280ed0 gate 1598907121950671800 evaluation starts +peer0.org2.example.com | [2a44 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2ade 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2460 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2810 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003280ed0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a45 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2adf 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2461 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2811 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003280ed0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2a46 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a27c80 gate 1598907117320093200 evaluation starts +peer1.org2.example.com | [2ae0 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 5b 37 f3 59 2a 3d 1c 8c 82 f6 83 f7 e7 f3 1e |=[7.Y*=.........| +peer0.org1.example.com | [2462 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2812 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003280ed0 principal matched by identity 0 +peer0.org2.example.com | [2a47 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a27c80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 f4 28 26 0f 02 53 00 aa 05 07 d0 da 3f 7a 06 41 |.(&..S......?z.A| +peer0.org1.example.com | [2463 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2813 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [2a48 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a27c80 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2ae1 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de ee 1b dc b7 1a e2 1b 53 7f 16 |0E.!.........S..| +peer0.org1.example.com | [2464 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [2a49 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a27c80 principal matched by identity 0 +peer1.org2.example.com | 00000010 a3 38 34 24 60 fd 7a 03 5c 53 7f 2a ef 00 95 34 |.84$`.z.\S.*...4| +peer0.org1.example.com | [2465 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2814 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | [2a4a 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 4b 69 75 4b ad d9 ae c0 56 5c f3 7d 58 82 72 |.KiuK....V\.}X.r| +peer1.org2.example.com | 00000020 46 26 d9 e2 46 02 20 6c 4a a0 18 ef 6f 2c 50 d4 |F&..F. lJ...o,P.| +peer0.org1.example.com | [2466 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b8ba0 gate 1598907109771682100 evaluation starts +peer1.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | 00000010 13 5b a2 cb e9 63 ba 7b ef 62 bb 14 58 42 74 fe |.[...c.{.b..XBt.| +peer1.org2.example.com | 00000030 d4 66 95 9f 6e 41 79 68 aa 6e dc b2 5f c9 cf df |.f..nAyh.n.._...| +peer0.org1.example.com | [2467 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b8ba0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | [2a4b 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 00 5a 2d 8c 2e 35 13 26 0f a2 |0E.!...Z-..5.&..| +peer0.org1.example.com | [2468 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b8ba0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | 00000040 4d 02 bb 49 8f 8c 3c |M..I..<| +peer1.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | 00000010 d9 56 a6 42 fd 09 6e fc e5 0d a2 ca e1 f9 85 3b |.V.B..n........;| +peer0.org1.example.com | [2469 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b8ba0 principal matched by identity 0 +peer1.org2.example.com | [2ae2 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | 00000020 77 03 0a b8 29 02 20 2f 5a 54 73 bb 4e 1d f4 b9 |w...). /ZTs.N...| +peer0.org1.example.com | [246a 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | [2ae3 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2815 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003280ed0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000030 f6 b8 ba 99 24 05 24 b1 56 88 9d f9 1c 66 1f 92 |....$.$.V....f..| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [2ae4 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2816 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003280ed0 gate 1598907121950671800 evaluation succeeds +peer0.org2.example.com | 00000040 2b 90 ed 4b 23 73 bd |+..K#s.| +peer0.org1.example.com | [246b 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | [2ae5 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2817 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a4c 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a27c80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | [2ae6 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2818 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a4d 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a27c80 gate 1598907117320093200 evaluation succeeds +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | [2ae8 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2819 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2a4e 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | [2ae9 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 5b 37 f3 59 2a 3d 1c 8c 82 f6 83 f7 e7 f3 1e |=[7.Y*=.........| +peer1.org1.example.com | [281a 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2a4f 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | 00000010 f4 28 26 0f 02 53 00 aa 05 07 d0 da 3f 7a 06 41 |.(&..S......?z.A| +peer1.org1.example.com | [281b 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [246c 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b8ba0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2a50 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2aea 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de ee 1b dc b7 1a e2 1b 53 7f 16 |0E.!.........S..| +peer1.org1.example.com | [281c 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [246d 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b8ba0 gate 1598907109771682100 evaluation succeeds +peer0.org2.example.com | [2a51 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 a3 38 34 24 60 fd 7a 03 5c 53 7f 2a ef 00 95 34 |.84$`.z.\S.*...4| +peer1.org1.example.com | [281d 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [246e 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a52 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 46 26 d9 e2 46 02 20 6c 4a a0 18 ef 6f 2c 50 d4 |F&..F. lJ...o,P.| +peer1.org1.example.com | [281e 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [246f 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a53 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | 00000030 d4 66 95 9f 6e 41 79 68 aa 6e dc b2 5f c9 cf df |.f..nAyh.n.._...| +peer1.org1.example.com | [281f 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2470 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2a54 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | 00000040 4d 02 bb 49 8f 8c 3c |M..I..<| +peer1.org1.example.com | [2820 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2471 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2a55 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2ae7 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2821 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2472 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | [2a56 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2aeb 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2822 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [2a57 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2aed 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2823 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032360e0 gate 1598907121958671600 evaluation starts +peer0.org1.example.com | [2473 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | [2a58 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2aee 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2824 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032360e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | [2a59 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2aec 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [2825 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032360e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | [2a5a 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [2aef 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2826 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | [2a5b 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2af0 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [2827 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032360e0 principal matched by identity 0 +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [2a5c 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2af1 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2828 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer0.org1.example.com | [2474 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | [2a5d 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2af2 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [2a5e 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2af3 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 5b 37 f3 59 2a 3d 1c 8c 82 f6 83 f7 e7 f3 1e |=[7.Y*=.........| +peer1.org1.example.com | [2829 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer0.org1.example.com | [2475 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | [2a5f 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | 00000010 f4 28 26 0f 02 53 00 aa 05 07 d0 da 3f 7a 06 41 |.(&..S......?z.A| +peer1.org1.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | [2a60 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2af4 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de ee 1b dc b7 1a e2 1b 53 7f 16 |0E.!.........S..| +peer1.org1.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | [2a61 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 a3 38 34 24 60 fd 7a 03 5c 53 7f 2a ef 00 95 34 |.84$`.z.\S.*...4| +peer1.org1.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | [2a62 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | 00000020 46 26 d9 e2 46 02 20 6c 4a a0 18 ef 6f 2c 50 d4 |F&..F. lJ...o,P.| +peer1.org1.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [2a63 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000030 d4 66 95 9f 6e 41 79 68 aa 6e dc b2 5f c9 cf df |.f..nAyh.n.._...| +peer1.org1.example.com | [282a 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032360e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2476 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a64 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | 00000040 4d 02 bb 49 8f 8c 3c |M..I..<| +peer1.org1.example.com | [282b 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032360e0 gate 1598907121958671600 evaluation succeeds +peer0.org1.example.com | [2477 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a65 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2af5 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | [282c 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a66 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [2478 08-31 20:51:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org1.example.com | [282d 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a67 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2479 08-31 20:51:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2af6 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 95 19 97 79 8f 0e 74 08 ee 05 bf |0D. u...y..t....| +peer1.org1.example.com | [282e 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2a68 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [247a 08-31 20:51:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 fa 3e 5c fd 5a 6c e5 7e e7 ac 90 2e 85 f6 34 4d |.>\.Zl.~......4M| +peer1.org1.example.com | [282f 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2a69 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [247b 08-31 20:51:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000020 06 98 d1 43 02 20 01 38 9b d4 3e bc 39 af 9c 44 |...C. .8..>.9..D| +peer1.org1.example.com | [2830 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a6a 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [247c 08-31 20:51:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000030 04 5d ec 8b e2 3f 84 53 a4 54 8a df 2c 8f 24 d2 |.]...?.S.T..,.$.| +peer1.org1.example.com | [2831 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a6b 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [247d 08-31 20:51:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000040 f4 24 22 e8 af af |.$"...| +peer1.org1.example.com | [2832 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2a6c 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [247e 08-31 20:51:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330cc20 gate 1598907109789810900 evaluation starts +peer1.org2.example.com | [2af7 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [2833 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2a6d 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [247f 08-31 20:51:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330cc20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2af8 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [2834 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2a6e 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2480 08-31 20:51:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330cc20 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2af9 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2835 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2482 08-31 20:51:49.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330cc20 principal matched by identity 0 +peer0.org2.example.com | [2a6f 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2afa 08-31 20:52:01.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2836 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003236c20 gate 1598907121966703800 evaluation starts +peer0.org1.example.com | [2483 08-31 20:51:49.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [2a70 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2afb 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2837 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003236c20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [2a71 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2afc 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2838 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003236c20 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2484 08-31 20:51:49.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | [2a72 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2afd 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2839 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003236c20 principal matched by identity 0 +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [2a73 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2afe 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [283a 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | [2a74 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2aff 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [2a75 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b00 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [283b 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [2a76 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b01 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer0.org1.example.com | [2485 08-31 20:51:49.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330cc20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2a77 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2b02 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer0.org1.example.com | [2486 08-31 20:51:49.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330cc20 gate 1598907109789810900 evaluation succeeds +peer0.org2.example.com | [2a78 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816102B +peer1.org2.example.com | [2b03 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer0.org1.example.com | [2481 08-31 20:51:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a79 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C4955859849D85533A08E742D4424EDCE7601A2A99598BA6777A03E301916721 +peer1.org2.example.com | [2b04 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer0.org1.example.com | [2488 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a7a 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2b05 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [283c 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003236c20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2489 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [2a7b 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2b06 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [283d 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003236c20 gate 1598907121966703800 evaluation succeeds +peer0.org1.example.com | [248a 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a7c 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [2b07 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [283e 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [248b 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2a7d 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2b08 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [283f 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [248c 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2a7e 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b09 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2840 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [248d 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a7f 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2b0a 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2841 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [248e 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a80 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b0b 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2842 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org1.example.com | [2487 08-31 20:51:49.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a81 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2b0c 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org1.example.com | [248f 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2a82 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b0d 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2843 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer0.org1.example.com | [2490 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2a83 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b0e 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer0.org1.example.com | [2491 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2b0f 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2a84 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer0.org1.example.com | [2492 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b10 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2a85 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer0.org1.example.com | [2493 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b11 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2a86 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer0.org1.example.com | [2494 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b12 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4ce60 gate 1598907121337054000 evaluation starts +peer0.org2.example.com | [2a87 08-31 20:51:57.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2844 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2495 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b13 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4ce60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2a88 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [2845 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 753 bytes, Signature: 0 bytes +peer0.org1.example.com | [2496 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b14 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4ce60 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2a89 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2846 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2497 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b15 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4ce60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2a8a 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [2847 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2498 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b16 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4ce60 principal evaluation fails +peer0.org2.example.com | [2a8b 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2848 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2499 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b17 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4ce60 gate 1598907121337054000 evaluation fails +peer0.org2.example.com | [2a8c 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 95 58 59 84 9d 85 53 3a 08 e7 42 d4 42 4e dc |..XY...S:..B.BN.| +peer1.org1.example.com | [2849 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2b18 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [249a 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 e7 60 1a 2a 99 59 8b a6 77 7a 03 e3 01 91 67 21 |.`.*.Y..wz....g!| +peer1.org1.example.com | [284b 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b19 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [249b 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2a8d 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 33 09 e9 75 72 52 c7 87 68 8e |0E.!..3..urR..h.| +peer1.org1.example.com | [284c 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b1a 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [249c 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | 00000010 f6 30 18 ec 2e a6 f0 ab 2f b7 f7 47 f9 05 b2 d5 |.0....../..G....| +peer1.org1.example.com | [284d 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2b1b 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4d3d0 gate 1598907121337427000 evaluation starts +peer0.org1.example.com | [249d 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 fe 05 9d 54 8f 02 20 7d c0 8b f9 59 8d fd dd cd |...T.. }...Y....| +peer1.org1.example.com | [284e 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2b1c 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4d3d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [249e 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000030 4e 65 c0 2c c8 0f c6 17 11 70 e1 05 3f 18 21 24 |Ne.,.....p..?.!$| +peer1.org1.example.com | [284a 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b1d 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4d3d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [249f 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000040 df ab ad 6f e0 b1 11 |...o...| +peer1.org1.example.com | [284f 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2b1e 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4d3d0 principal matched by identity 0 +peer0.org1.example.com | [24a0 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2a8e 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org1.example.com | [2850 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fb0c0 gate 1598907121976046100 evaluation starts +peer0.org1.example.com | [24a1 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2b1f 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 f8 9b e4 72 34 12 af 1e 59 64 6f 0d 8a c1 60 |....r4...Ydo...`| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org1.example.com | [2851 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fb0c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [24a2 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | 00000010 90 df 35 e3 f0 30 73 f6 1b f0 ab 1c 65 d5 17 e0 |..5..0s.....e...| +peer0.org2.example.com | [2a8f 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cd 79 56 c1 ea 2b f5 a5 ee 72 a1 |0E.!..yV..+...r.| +peer1.org1.example.com | [2852 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fb0c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [24a3 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b20 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 52 69 8a 68 62 3a 2f 6e 03 e8 |0E.!..Ri.hb:/n..| +peer0.org2.example.com | 00000010 ae fe cc 04 2f 41 6e 29 02 f8 67 7f 0d 2b c4 4b |..../An)..g..+.K| +peer1.org1.example.com | [2853 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fb0c0 principal matched by identity 0 +peer0.org1.example.com | [24a4 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 4c 2e 14 0b f5 82 38 bb e3 47 31 24 d1 ef a4 35 |L.....8..G1$...5| +peer0.org2.example.com | 00000020 9e 02 4f 26 cb 02 20 6b ad 61 69 bc 88 5f 5f d6 |..O&.. k.ai..__.| +peer1.org1.example.com | [2854 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | [24a5 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 d6 2f 24 69 da 02 20 68 de cb 59 e9 9d a8 cd 04 |./$i.. h..Y.....| +peer0.org2.example.com | 00000030 1e 42 0b 0e 24 20 93 61 9e 01 17 de 0c b2 d3 a5 |.B..$ .a........| +peer1.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [24a6 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000030 fa 70 d6 f6 14 21 7c 03 a6 83 99 8d 03 f9 e2 09 |.p...!|.........| +peer0.org2.example.com | 00000040 c3 4a d4 81 7d 39 e4 |.J..}9.| +peer1.org1.example.com | [2855 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | [24a7 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000040 cc ff 9c a0 c7 ef 71 |......q| +peer0.org2.example.com | [2a90 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [24a8 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2b21 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4d3d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2a91 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | [24a9 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2b22 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a4d3d0 gate 1598907121337427000 evaluation succeeds +peer0.org2.example.com | [2a92 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | [24aa 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198bc0 gate 1598907110033719700 evaluation starts +peer1.org2.example.com | [2b23 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a93 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [24ab 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198bc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b24 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2a94 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2856 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fb0c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [24ac 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198bc0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2b25 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2a95 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2857 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fb0c0 gate 1598907121976046100 evaluation succeeds +peer0.org1.example.com | [24ad 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198bc0 principal matched by identity 0 +peer1.org2.example.com | [2b26 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2a96 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2858 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [24ae 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7a 61 cd e7 ff d3 e4 b7 be b6 86 08 ad e3 97 ee |za..............| +peer1.org2.example.com | [2b27 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2a97 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2859 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 e3 3e 66 14 fb c0 ad 4e 8c c9 e3 30 32 02 cc cf |.>f....N...02...| +peer1.org2.example.com | [2b28 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2a98 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [285a 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [24af 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd 5f 4e e2 29 37 5a 41 a1 48 71 |0E.!.._N.)7ZA.Hq| +peer1.org2.example.com | [2b29 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2a99 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [285b 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 88 17 37 03 dc b5 58 2d 3b 38 d3 c8 b5 97 48 1a |..7...X-;8....H.| +peer1.org2.example.com | [2b2a 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [285c 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | [2a9a 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000020 25 ed c9 3f 71 02 20 4c ef 68 36 b5 a1 d4 d6 03 |%..?q. L.h6.....| +peer1.org2.example.com | [2b2b 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [2a9b 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000030 83 11 cb 13 9d 7f 4f b1 52 e3 04 a9 cb f0 9a 27 |......O.R......'| +peer1.org2.example.com | [2b2c 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [285d 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | [2a9c 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 e8 51 53 9a c6 82 28 |.QS...(| +peer1.org2.example.com | [2b2d 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org2.example.com | [2a9d 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [24b0 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198bc0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2b2e 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org2.example.com | [2a9e 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [24b1 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198bc0 gate 1598907110033719700 evaluation succeeds +peer1.org2.example.com | [2b2f 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org2.example.com | [2a9f 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [24b2 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b30 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org2.example.com | [2aa0 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa7050 gate 1598907117538219000 evaluation starts +peer0.org1.example.com | [24b3 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b31 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [285e 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2aa1 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa7050 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [24b4 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2b32 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [285f 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2aa2 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa7050 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [24b5 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2b33 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [2860 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2aa3 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa7050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [24b6 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2b34 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2861 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2aa4 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa7050 principal evaluation fails +peer0.org1.example.com | [24b7 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2b35 08-31 20:52:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2862 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2aa5 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa7050 gate 1598907117538219000 evaluation fails +peer0.org1.example.com | [24b8 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2b36 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2863 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2aa6 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [24b9 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2b37 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2864 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2aa7 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [24ba 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2b38 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2865 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2aa8 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [24bb 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b39 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2866 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032129f0 gate 1598907121977230700 evaluation starts +peer0.org2.example.com | [2aa9 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa75c0 gate 1598907117539140900 evaluation starts +peer0.org1.example.com | [24bc 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b3a 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [2867 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032129f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2aaa 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa75c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [24bd 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b3b 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2868 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032129f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2aab 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa75c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [24be 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2869 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032129f0 principal matched by identity 0 +peer1.org2.example.com | [2b3c 08-31 20:52:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\210r\202\351\020\3114\250\035" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2aac 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa75c0 principal matched by identity 0 +peer0.org1.example.com | [24bf 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [286a 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +peer1.org2.example.com | [2b3d 08-31 20:52:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\210r\202\351\020\3114\250\035" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2aad 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 4b 69 75 4b ad d9 ae c0 56 5c f3 7d 58 82 72 |.KiuK....V\.}X.r| +peer0.org1.example.com | [24c0 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +peer1.org2.example.com | [2b3e 08-31 20:52:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 13 5b a2 cb e9 63 ba 7b ef 62 bb 14 58 42 74 fe |.[...c.{.b..XBt.| +peer0.org1.example.com | [24c1 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [286b 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +peer1.org2.example.com | [2b3f 08-31 20:52:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\210r\202\351\020\3114\250\035" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2aae 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 00 5a 2d 8c 2e 35 13 26 0f a2 |0E.!...Z-..5.&..| +peer0.org1.example.com | [24c2 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +peer1.org2.example.com | [2b40 08-31 20:52:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | 00000010 d9 56 a6 42 fd 09 6e fc e5 0d a2 ca e1 f9 85 3b |.V.B..n........;| +peer0.org1.example.com | [24c3 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +peer1.org2.example.com | [2b41 08-31 20:52:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 e2 6c 42 f2 a8 e2 3f 70 70 87 06 55 06 f1 1c |..lB...?pp..U...| +peer0.org2.example.com | 00000020 77 03 0a b8 29 02 20 2f 5a 54 73 bb 4e 1d f4 b9 |w...). /ZTs.N...| +peer0.org1.example.com | [24c4 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +peer1.org2.example.com | 00000010 0d d9 f7 7e a8 3b 92 34 16 5f fe d2 69 f8 7c a6 |...~.;.4._..i.|.| +peer0.org2.example.com | 00000030 f6 b8 ba 99 24 05 24 b1 56 88 9d f9 1c 66 1f 92 |....$.$.V....f..| +peer0.org1.example.com | [24c5 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | 00000040 95 10 dc 3c 55 b0 |... DEBU Verify: sig = 00000000 30 45 02 21 00 f2 d3 ec 39 b0 40 f0 97 91 21 35 |0E.!....9.@...!5| +peer0.org2.example.com | 00000040 2b 90 ed 4b 23 73 bd |+..K#s.| +peer0.org1.example.com | [24c6 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [286c 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032129f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 7d 64 7f f8 31 b9 cd 11 e8 6d 70 50 41 d5 f3 58 |}d..1....mpPA..X| +peer0.org2.example.com | [2aaf 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa75c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [24c7 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [286d 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032129f0 gate 1598907121977230700 evaluation succeeds +peer1.org2.example.com | 00000020 7e 04 66 4a a2 02 20 2a b7 16 58 02 a4 c6 82 b9 |~.fJ.. *..X.....| +peer0.org2.example.com | [2ab0 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aa75c0 gate 1598907117539140900 evaluation succeeds +peer0.org1.example.com | [24c8 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [286e 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000030 a0 eb 2f 01 26 3d 0f 66 2e 59 14 44 9c a3 ad bf |../.&=.f.Y.D....| +peer0.org2.example.com | [2ab1 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [24c9 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [286f 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000040 a0 8f b9 51 b3 d2 b5 |...Q...| +peer0.org2.example.com | [2ab2 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [24ca 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2870 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2b43 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | [2ab3 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [24cb 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2871 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [2ab4 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [24cc 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2872 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b44 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 8b aa d0 7a ff cf df 52 91 c3 7a |0D. ....z...R..z| +peer0.org2.example.com | [2ab5 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24cd 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2873 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 43 d9 08 eb 62 27 37 b5 e7 1b e8 da 70 33 56 1b |C...b'7.....p3V.| +peer0.org2.example.com | [2ab6 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24ce 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2874 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 16 c9 de 85 02 20 40 88 c5 ad 8a d4 a0 80 63 a8 |..... @.......c.| +peer0.org2.example.com | [2ab7 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [24cf 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2875 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000030 e8 0e 57 28 dd 85 b3 1a 9c 12 58 b6 3e 88 72 82 |..W(......X.>.r.| +peer0.org2.example.com | [2ab8 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 95 58 59 84 9d 85 53 3a 08 e7 42 d4 42 4e dc |..XY...S:..B.BN.| +peer0.org1.example.com | [24d0 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2876 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000040 e9 10 c9 34 a8 1d |...4..| +peer0.org2.example.com | 00000010 e7 60 1a 2a 99 59 8b a6 77 7a 03 e3 01 91 67 21 |.`.*.Y..wz....g!| +peer0.org1.example.com | [24d1 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2877 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2b45 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2ab9 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 33 09 e9 75 72 52 c7 87 68 8e |0E.!..3..urR..h.| +peer0.org1.example.com | [24d2 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2878 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213530 gate 1598907121977901500 evaluation starts +peer1.org2.example.com | [2b46 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | 00000010 f6 30 18 ec 2e a6 f0 ab 2f b7 f7 47 f9 05 b2 d5 |.0....../..G....| +peer0.org1.example.com | [24d3 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2879 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213530 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b47 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | 00000020 fe 05 9d 54 8f 02 20 7d c0 8b f9 59 8d fd dd cd |...T.. }...Y....| +peer0.org1.example.com | [24d4 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [287a 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213530 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2b48 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | 00000030 4e 65 c0 2c c8 0f c6 17 11 70 e1 05 3f 18 21 24 |Ne.,.....p..?.!$| +peer0.org1.example.com | [24d5 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [287b 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213530 principal matched by identity 0 +peer1.org2.example.com | [2b49 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | 00000040 df ab ad 6f e0 b1 11 |...o...| +peer0.org1.example.com | [24d6 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [287c 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +peer1.org2.example.com | [2b4a 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2aba 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24d7 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +peer1.org2.example.com | [2b4b 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2abb 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24d8 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [287d 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +peer1.org2.example.com | [2b4c 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2abc 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24d9 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +peer1.org2.example.com | [2b4d 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org2.example.com | [2abd 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [24da 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +peer1.org2.example.com | [2b4e 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2abe 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 82 19 b7 35 14 1a b4 75 5e 2d 23 8c 90 9d 66 |....5...u^-#...f| +peer1.org1.example.com | 00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +peer0.org1.example.com | [24db 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b4f 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 a7 f8 43 2c 0d cb 12 68 89 9e 50 10 9c 6e 54 0b |..C,...h..P..nT.| +peer1.org1.example.com | 00000040 95 10 dc 3c 55 b0 |... DEBU Exiting +peer1.org2.example.com | [2b50 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2abf 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 7b b0 97 a6 f0 53 6a 3c 08 79 be |0D. s{....Sj<.y.| +peer1.org1.example.com | [287e 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213530 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [24dd 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 39 82 04 0d 36 ee cd b4 91 dc 92 d3 4c 29 fe 90 |9...6.......L)..| +peer1.org2.example.com | [2b51 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\210r\202\351\020\3114\250\035" > > alive: +peer1.org1.example.com | [287f 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003213530 gate 1598907121977901500 evaluation succeeds +peer0.org1.example.com | [24de 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | 00000020 42 71 d4 40 02 20 7a 9d 60 11 4e 87 9e 1b 2e ef |Bq.@. z.`.N.....| +peer1.org2.example.com | [2b52 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [2880 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [24df 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 18 dd 8d c0 6e e2 a3 25 7a 13 c8 3f a9 40 ce |B....n..%z..?.@.| +peer0.org2.example.com | 00000030 5b 01 77 10 24 49 6d 4b b2 f3 d3 3a 6e 52 9b f7 |[.w.$ImK...:nR..| +peer1.org2.example.com | [2b53 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2881 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 12 7b f2 2f cd 44 ab f9 58 25 58 61 fc c7 d1 41 |.{./.D..X%Xa...A| +peer0.org2.example.com | 00000040 40 0c 97 d8 27 4b |@...'K| +peer1.org2.example.com | [2b54 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2882 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [24e0 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 24 2b e4 77 40 b0 5e bf 20 9c 49 |0D. F$+.w@.^. .I| +peer1.org2.example.com | [2b55 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ac0 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2883 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 3e cc 09 eb 17 b3 c5 ef 28 fb 8f c6 8c eb dc 52 |>.......(......R| +peer1.org2.example.com | [2b56 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ac1 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2884 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org1.example.com | 00000020 9f b7 b3 8c 02 20 5f 9c 9a 99 59 b5 a5 4a 61 c3 |..... _...Y..Ja.| +peer1.org2.example.com | [2b57 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ac2 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org1.example.com | 00000030 ba c5 68 4b 57 80 c3 d0 c8 ce 35 fc 35 82 29 2b |..hKW.....5.5.)+| +peer1.org2.example.com | [2b58 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ac3 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2885 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer0.org1.example.com | 00000040 e8 6f 02 c0 c7 35 |.o...5| +peer1.org2.example.com | [2b59 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ac4 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer0.org1.example.com | [24e1 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b5a 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ac5 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer0.org1.example.com | [24e2 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2b5b 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ac6 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 95 58 59 84 9d 85 53 3a 08 e7 42 d4 42 4e dc |..XY...S:..B.BN.| +peer1.org1.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer0.org1.example.com | [24e3 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2b5c 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | 00000010 e7 60 1a 2a 99 59 8b a6 77 7a 03 e3 01 91 67 21 |.`.*.Y..wz....g!| +peer1.org1.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer0.org1.example.com | [24e4 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2b5d 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ac7 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 33 09 e9 75 72 52 c7 87 68 8e |0E.!..3..urR..h.| +peer1.org1.example.com | [2886 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24e5 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2b5e 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 f6 30 18 ec 2e a6 f0 ab 2f b7 f7 47 f9 05 b2 d5 |.0....../..G....| +peer0.org1.example.com | [24e6 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2887 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer1.org2.example.com | [2b5f 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 fe 05 9d 54 8f 02 20 7d c0 8b f9 59 8d fd dd cd |...T.. }...Y....| +peer0.org1.example.com | [24e7 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2888 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer1.org2.example.com | [2b60 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 4e 65 c0 2c c8 0f c6 17 11 70 e1 05 3f 18 21 24 |Ne.,.....p..?.!$| +peer0.org1.example.com | [24e8 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer1.org2.example.com | [2b61 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | 00000040 df ab ad 6f e0 b1 11 |...o...| +peer0.org1.example.com | [24e9 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2889 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer1.org2.example.com | [2b62 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [24ea 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer1.org2.example.com | [2b63 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2ac8 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24eb 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer1.org2.example.com | [2b64 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2ac9 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [24ec 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer1.org2.example.com | [2b65 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2aca 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24ed 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer1.org2.example.com | [2b66 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2acb 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [24ee 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [288a 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b67 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2acc 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 82 19 b7 35 14 1a b4 75 5e 2d 23 8c 90 9d 66 |....5...u^-#...f| +peer0.org1.example.com | [24ef 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [288b 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b68 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000010 a7 f8 43 2c 0d cb 12 68 89 9e 50 10 9c 6e 54 0b |..C,...h..P..nT.| +peer0.org1.example.com | [24f0 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [288d 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2b69 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a9aad0 gate 1598907121590792900 evaluation starts +peer0.org2.example.com | [2acd 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 7b b0 97 a6 f0 53 6a 3c 08 79 be |0D. s{....Sj<.y.| +peer0.org1.example.com | [24f1 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [288e 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b6a 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a9aad0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 39 82 04 0d 36 ee cd b4 91 dc 92 d3 4c 29 fe 90 |9...6.......L)..| +peer0.org1.example.com | [24f2 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [288f 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b6b 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a9aad0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | 00000020 42 71 d4 40 02 20 7a 9d 60 11 4e 87 9e 1b 2e ef |Bq.@. z.`.N.....| +peer0.org1.example.com | [24f3 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [288c 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2b6c 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a9aad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | 00000030 5b 01 77 10 24 49 6d 4b b2 f3 d3 3a 6e 52 9b f7 |[.w.$ImK...:nR..| +peer0.org1.example.com | [24f4 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2890 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2b6d 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a9aad0 principal evaluation fails +peer0.org1.example.com | [24f5 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2891 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | 00000040 40 0c 97 d8 27 4b |@...'K| +peer0.org1.example.com | [24f6 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b6e 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a9aad0 gate 1598907121590792900 evaluation fails +peer1.org1.example.com | [2892 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ace 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [24f7 08-31 20:51:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b6f 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2893 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2acf 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24f8 08-31 20:51:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b70 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2894 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2ad0 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24f9 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b71 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2895 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ad1 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [24fa 08-31 20:51:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2b72 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a9b040 gate 1598907121592756200 evaluation starts +peer0.org2.example.com | [2ad2 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [24fb 08-31 20:51:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b73 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a9b040 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ad3 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2896 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [24fc 08-31 20:51:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2b74 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a9b040 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2ad4 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2897 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes +peer0.org1.example.com | [24fd 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2b75 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a9b040 principal matched by identity 0 +peer0.org2.example.com | [2ad5 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2898 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [24fe 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2b76 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 67 45 e2 b2 b6 dd cb c6 17 26 f9 c3 80 4c 61 |(gE.......&...La| +peer0.org2.example.com | [2ad6 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2899 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [24ff 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 78 f0 6f f2 46 3e df cf 0a d1 3d 63 21 71 82 b9 |x.o.F>....=c!q..| +peer0.org2.example.com | [2ad7 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [289a 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ed810 gate 1598907121989957600 evaluation starts +peer0.org1.example.com | [2500 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2b77 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 37 c0 99 e0 4d 4b c6 43 5c 1b |0E.!..7...MK.C\.| +peer0.org2.example.com | [2ad8 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [289b 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ed810 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2501 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | 00000010 f3 b5 30 5a 1c 66 ae 7e 3e c5 02 08 de 6f f5 78 |..0Z.f.~>....o.x| +peer0.org2.example.com | [2ad9 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [289c 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ed810 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2502 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 4b 9b f5 c9 d8 02 20 70 bf 4b 5b b4 32 61 8a c6 |K..... p.K[.2a..| +peer0.org2.example.com | [2ada 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [289d 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ed810 principal matched by identity 0 +peer0.org1.example.com | [2503 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000030 d0 f7 4f 42 86 38 6b 84 df 24 71 aa 70 44 01 49 |..OB.8k..$q.pD.I| +peer0.org2.example.com | [2adb 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [289e 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer0.org1.example.com | [2504 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 8f 8c c8 d7 43 97 51 |....C.Q| +peer0.org2.example.com | [2adc 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer0.org1.example.com | [2505 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2b78 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a9b040 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2add 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [289f 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer0.org1.example.com | [2506 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2b79 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a9b040 gate 1598907121592756200 evaluation succeeds +peer0.org2.example.com | [2ade 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer0.org1.example.com | [2507 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2b7a 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2adf 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer0.org1.example.com | [2508 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2b7b 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer0.org2.example.com | [2ae0 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2509 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ca83a0 gate 1598907110471947700 evaluation starts +peer1.org2.example.com | [2b7c 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer0.org2.example.com | [2ae1 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [250a 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ca83a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2b7d 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [28a0 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ed810 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2ae2 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [250b 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ca83a0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2b7e 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28a1 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ed810 gate 1598907121989957600 evaluation succeeds +peer0.org2.example.com | [2ae3 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [250c 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ca83a0 principal matched by identity 0 +peer1.org2.example.com | [2b7f 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [28a2 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ae4 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [250d 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b d7 f9 e6 15 ef a0 e3 cb ea ba b8 0b 8d f8 21 |...............!| +peer1.org2.example.com | [2b80 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [28a3 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ae5 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 5b 0c 17 c6 f9 f3 2a 85 b2 02 00 f5 df eb d4 d3 |[.....*.........| +peer1.org2.example.com | [2b81 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [28a4 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2ae6 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af19b0 gate 1598907117616988500 evaluation starts +peer0.org1.example.com | [250e 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea f3 db c0 3c df a8 ae b8 ca 39 |0E.!.....<.....9| +peer1.org2.example.com | [2b82 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [28a5 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2ae7 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af19b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 1a d8 21 e2 95 2e 93 27 d5 8f ed b5 0c e5 47 69 |..!....'......Gi| +peer1.org2.example.com | [2b83 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28a6 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ae8 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af19b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000020 4f 0a af 71 77 02 20 03 78 de 82 f1 d1 78 7c 8b |O..qw. .x....x|.| +peer1.org2.example.com | [2b84 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28a7 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ae9 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af19b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000030 a7 b1 56 b3 a9 e6 ef be 5d 24 89 d2 a0 8f 87 9b |..V.....]$......| +peer1.org2.example.com | [2b85 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28a8 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2aea 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af19b0 principal evaluation fails +peer0.org1.example.com | 00000040 bc ca 48 4c a1 34 c7 |..HL.4.| +peer1.org2.example.com | [2b86 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [28a9 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2aeb 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af19b0 gate 1598907117616988500 evaluation fails +peer0.org1.example.com | [250f 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ca83a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2b87 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28aa 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2aec 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2510 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ca83a0 gate 1598907110471947700 evaluation succeeds +peer1.org2.example.com | [2b88 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28ab 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2aed 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2511 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b89 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28ac 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2aee 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2512 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2b8a 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [28ad 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2aef 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af1f20 gate 1598907117617357000 evaluation starts +peer0.org1.example.com | [2513 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2b8b 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" > alive: alive: alive: +peer1.org1.example.com | [28ae 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003156a20 gate 1598907121992575100 evaluation starts +peer0.org2.example.com | [2af0 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af1f20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2514 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2b8c 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [28af 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003156a20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2af1 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af1f20 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2b8d 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2515 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28b0 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003156a20 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2af2 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af1f20 principal matched by identity 0 +peer1.org2.example.com | [2b8e 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2516 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [28b1 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003156a20 principal matched by identity 0 +peer0.org2.example.com | [2af3 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 1b 21 a6 69 8d d8 de e1 40 b2 59 44 7d 93 b2 |..!.i....@.YD}..| +peer1.org2.example.com | [2b8f 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2517 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [28b2 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +peer0.org2.example.com | 00000010 4e f5 f5 41 dd fd b8 c0 37 20 57 ae 33 b8 50 ed |N..A....7 W.3.P.| +peer1.org2.example.com | [2b90 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2518 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | 00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +peer0.org2.example.com | [2af4 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 17 39 ee e4 bb 52 28 6b 8b 5e |0E.!...9...R(k.^| +peer1.org2.example.com | [2b91 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2519 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [28b3 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +peer0.org2.example.com | 00000010 8a b8 eb 99 1f e1 27 3f 0b 4c b6 79 c5 78 87 bb |......'?.L.y.x..| +peer1.org2.example.com | [2b92 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [251a 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +peer0.org2.example.com | 00000020 50 be b3 a5 ad 02 20 5d ff 0e 7f 36 86 89 6b f8 |P..... ]...6..k.| +peer1.org2.example.com | [2b93 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [251b 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +peer0.org2.example.com | 00000030 d9 70 3e 99 c3 d8 0a 3f bd 7c d7 c8 26 b7 a4 d8 |.p>....?.|..&...| +peer1.org2.example.com | [2b94 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [251c 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +peer0.org2.example.com | 00000040 28 fb d4 3b 5a 92 4b |(..;Z.K| +peer1.org2.example.com | [2b95 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [251d 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 95 10 dc 3c 55 b0 |... DEBU 0xc004af1f20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2b96 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [251e 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [28b4 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003156a20 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2af6 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004af1f20 gate 1598907117617357000 evaluation succeeds +peer1.org2.example.com | [2b97 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [251f 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28b5 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003156a20 gate 1598907121992575100 evaluation succeeds +peer0.org2.example.com | [2af7 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b98 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2520 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28b6 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2af8 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2b99 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2521 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28b7 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2af9 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2b9a 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2522 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28b8 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2afa 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2b9b 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a736a0 gate 1598907121702546800 evaluation starts +peer0.org1.example.com | [2523 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28b9 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2afb 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2b9c 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a736a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2524 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28ba 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer0.org2.example.com | [2afc 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2b9d 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a736a0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2525 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer0.org2.example.com | [2afd 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2b9e 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a736a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2526 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28bb 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer0.org2.example.com | [2afe 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2b9f 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a736a0 principal evaluation fails +peer0.org1.example.com | [2527 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer1.org2.example.com | [2ba0 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a736a0 gate 1598907121702546800 evaluation fails +peer0.org2.example.com | [2aff 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2528 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer1.org2.example.com | [2ba1 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2b00 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2529 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer1.org2.example.com | [2ba2 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2b01 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [252a 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer1.org2.example.com | [2ba3 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2b02 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [252b 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28bc 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ba4 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a73c10 gate 1598907121704523400 evaluation starts +peer0.org2.example.com | [2b03 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org1.example.com | [252c 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [28bd 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ba5 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a73c10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b04 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [252d 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28be 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 42 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ba6 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a73c10 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2b05 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [252e 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28bf 08-31 20:52:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ba7 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a73c10 principal matched by identity 0 +peer0.org2.example.com | [2b06 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [252f 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28c0 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ba8 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org2.example.com | [2b07 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2530 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer1.org1.example.com | [28c1 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b08 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" > alive: alive: alive: +peer0.org1.example.com | [2531 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ba9 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer1.org1.example.com | [28c2 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b09 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2532 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer1.org1.example.com | [28c3 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b0a 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2533 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer1.org1.example.com | [28c4 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b0b 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2534 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer1.org1.example.com | [28c5 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b0c 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2535 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer1.org1.example.com | [28c6 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b0d 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2536 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2baa 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a73c10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [28c7 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b0e 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2537 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bab 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a73c10 gate 1598907121704523400 evaluation succeeds +peer1.org1.example.com | [28c8 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b0f 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bac 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2538 08-31 20:51:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [28c9 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2b10 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2bad 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2539 08-31 20:51:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28ca 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b11 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bae 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [253a 08-31 20:51:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [28cb 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b12 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2baf 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [253b 08-31 20:51:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161027 +peer1.org1.example.com | [28cc 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2b13 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bb0 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [253c 08-31 20:51:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE80EE8E7A3015CA52727981C83F87F11186D9FCE272CE6D4E23E07DB851BED4 +peer1.org1.example.com | [28cd 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2b14 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bb1 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [253d 08-31 20:51:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [28ce 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2b15 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bb2 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [253e 08-31 20:51:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [28cf 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227b80 gate 1598907122186650000 evaluation starts +peer0.org2.example.com | [2b16 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [253f 08-31 20:51:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org2.example.com | [2bb3 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [28d0 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227b80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b17 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [2540 08-31 20:51:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [2bb4 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [28d1 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227b80 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2b18 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2541 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bb5 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [28d2 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227b80 principal matched by identity 0 +peer0.org2.example.com | [2b19 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2542 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bb6 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [28d3 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer0.org2.example.com | [2b1a 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2543 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bb7 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad8800 gate 1598907121710209800 evaluation starts +peer1.org1.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer0.org2.example.com | [2b1b 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2544 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2bb8 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad8800 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [28d4 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer0.org2.example.com | [2b1c 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2545 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2bb9 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad8800 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer0.org2.example.com | [2b1d 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2546 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bba 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad8800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer0.org2.example.com | [2b1e 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [2547 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2bbb 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad8800 principal evaluation fails +peer1.org1.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer0.org2.example.com | [2b1f 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2548 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2bbc 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad8800 gate 1598907121710209800 evaluation fails +peer1.org1.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer0.org2.example.com | [2b20 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2549 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bbd 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [28d5 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227b80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2b21 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [254a 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2bbe 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [28d6 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227b80 gate 1598907122186650000 evaluation succeeds +peer0.org1.example.com | [254b 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b22 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2bbf 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [28d7 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [254c 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2b23 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2bc0 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad8d70 gate 1598907121713408200 evaluation starts +peer1.org1.example.com | [28d8 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [254d 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b24 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2bc1 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad8d70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [28d9 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [254e 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b25 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2bc2 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad8d70 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [28da 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [254f 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b26 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2bc3 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad8d70 principal matched by identity 0 +peer1.org1.example.com | [28db 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2550 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b27 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2bc4 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer1.org1.example.com | [28dc 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2551 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b28 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aafd10 gate 1598907118199592200 evaluation starts +peer1.org2.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org1.example.com | [2552 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28dd 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b29 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aafd10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2bc5 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer0.org1.example.com | [2553 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28de 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b2a 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aafd10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer0.org1.example.com | [2554 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28df 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2b2b 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aafd10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer0.org1.example.com | [2555 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28e0 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b2c 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aafd10 principal evaluation fails +peer1.org2.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer0.org1.example.com | [2556 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28e1 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b2d 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004aafd10 gate 1598907118199592200 evaluation fails +peer1.org2.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer0.org1.example.com | [2557 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [28e2 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2b2e 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2bc6 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad8d70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2558 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28e3 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2b2f 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2bc7 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad8d70 gate 1598907121713408200 evaluation succeeds +peer0.org1.example.com | [2559 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:)b\021/\226\350\330T\177" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [28e4 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2b30 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2bc8 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [255a 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:)b\021/\226\350\330T\177" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [28e5 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d1ef30 gate 1598907122193362500 evaluation starts +peer0.org2.example.com | [2b31 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b48280 gate 1598907118200685500 evaluation starts +peer1.org2.example.com | [2bc9 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [255b 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28e6 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d1ef30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b32 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b48280 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2bca 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [255c 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:)b\021/\226\350\330T\177" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [28e7 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d1ef30 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2b33 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b48280 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2bcb 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [255d 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [28e8 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d1ef30 principal matched by identity 0 +peer0.org2.example.com | [2b34 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b48280 principal matched by identity 0 +peer1.org2.example.com | [2bcc 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28e9 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer0.org1.example.com | [255e 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b35 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | [2bcd 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer0.org1.example.com | [255f 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | [2bce 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28ea 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer0.org1.example.com | [2560 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b36 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | [2bcf 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org1.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer0.org1.example.com | [2561 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | [2bd0 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer0.org1.example.com | [2562 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | [2bd1 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer0.org1.example.com | [2563 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | [2bd2 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer0.org1.example.com | [2564 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [2bd3 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [28eb 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d1ef30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2565 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d30c0 gate 1598907113094289700 evaluation starts +peer0.org2.example.com | [2b37 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b48280 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2bd4 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [28ec 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d1ef30 gate 1598907122193362500 evaluation succeeds +peer0.org1.example.com | [2566 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d30c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b38 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b48280 gate 1598907118200685500 evaluation succeeds +peer1.org1.example.com | [28ed 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2bd5 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2567 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d30c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2b39 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [28ee 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2bd6 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2568 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d30c0 principal matched by identity 0 +peer0.org2.example.com | [2b3a 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [28ef 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2bd7 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2569 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c aa a5 5a 6c 4e f5 3d 4f b2 61 f4 2a 5b 12 81 |...ZlN.=O.a.*[..| +peer0.org2.example.com | [2b3b 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [28f0 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2bd8 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 cb 7e 57 55 cd aa 59 d5 f2 c9 38 c9 21 b6 d5 fe |.~WU..Y...8.!...| +peer0.org2.example.com | [2b3c 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [28f1 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2bd9 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [256a 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 67 b2 ff a9 ff 61 ec 7b a5 ba 8d |0D. DEBU Obtaining identity +peer1.org1.example.com | [28f2 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2bda 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 ae b7 e1 c9 77 b5 d3 f2 1b 98 25 d2 70 15 92 aa |....w.....%.p...| +peer0.org2.example.com | [2b3e 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [28f3 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2bdb 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 cf 3f 49 2e 02 20 7e 66 a3 7f 73 1e 70 7b 22 35 |.?I.. ~f..s.p{"5| +peer1.org1.example.com | [28f4 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b3f 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2bdc 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000030 49 5e 98 0c 2b 81 dd 4e ce 7b f9 68 3e 29 62 11 |I^..+..N.{.h>)b.| +peer1.org1.example.com | [28f5 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b40 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2bdd 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000040 2f 96 e8 d8 54 7f |/...T.| +peer1.org1.example.com | [28f6 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b41 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2bde 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [256b 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d30c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [28f7 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b42 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2bdf 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b007a0 gate 1598907121723460300 evaluation starts +peer0.org1.example.com | [256c 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d30c0 gate 1598907113094289700 evaluation succeeds +peer1.org1.example.com | [28f8 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b43 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2be0 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b007a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [256d 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [28f9 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b44 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2be1 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b007a0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [256e 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2b45 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b56cb0 gate 1598907118204214700 evaluation starts +peer1.org1.example.com | [28fa 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2be2 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b007a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [256f 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2b46 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b56cb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [28fb 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2be3 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b007a0 principal evaluation fails +peer0.org1.example.com | [2570 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2b47 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b56cb0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [28fc 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2be4 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b007a0 gate 1598907121723460300 evaluation fails +peer0.org1.example.com | [2571 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2b48 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b56cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [28fd 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2be5 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2572 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2b49 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b56cb0 principal evaluation fails +peer1.org1.example.com | [28fe 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2be6 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2573 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2b4a 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b56cb0 gate 1598907118204214700 evaluation fails +peer1.org1.example.com | [28ff 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2be7 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2574 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2b4b 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2900 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cf67d0 gate 1598907122428334300 evaluation starts +peer1.org2.example.com | [2be8 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00d10 gate 1598907121723731700 evaluation starts +peer0.org1.example.com | [2575 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2b4c 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2901 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cf67d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2be9 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00d10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2576 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b4d 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2902 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cf67d0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2bea 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00d10 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2577 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b4e 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b57220 gate 1598907118205093100 evaluation starts +peer1.org1.example.com | [2903 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cf67d0 principal matched by identity 0 +peer1.org2.example.com | [2beb 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00d10 principal matched by identity 0 +peer0.org1.example.com | [2578 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b4f 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b57220 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2904 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +peer1.org2.example.com | [2bec 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org1.example.com | [2579 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [2b50 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b57220 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org1.example.com | [257a 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b51 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b57220 principal matched by identity 0 +peer1.org1.example.com | 00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +peer1.org2.example.com | [2bed 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer0.org1.example.com | [257b 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b52 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | [2905 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +peer1.org2.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [257c 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +peer1.org2.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer0.org2.example.com | [2b53 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | [257d 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +peer1.org2.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | [257e 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:)b\021/\226\350\330T\177" > alive:\314\t\353\027\263\305\357(\373\217\306\214\353\334R\237\267\263\214\002 _\234\232\231Y\265\245Ja\303\272\305hKW\200\303\320\310\3165\3745\202)+\350o\002\300\3075" > alive: alive: +peer1.org1.example.com | 00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +peer1.org2.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | [257f 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 95 10 dc 3c 55 b0 |... DEBU 0xc004b00d10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | [2580 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2906 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cf67d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2bef 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b00d10 gate 1598907121723731700 evaluation succeeds +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [2581 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2907 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002cf67d0 gate 1598907122428334300 evaluation succeeds +peer1.org2.example.com | [2bf0 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2b54 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b57220 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2582 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2908 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2bf1 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2b55 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b57220 gate 1598907118205093100 evaluation succeeds +peer0.org1.example.com | [2583 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org1.example.com | [2909 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2bf2 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2b56 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2584 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [290a 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2bf3 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2b57 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2585 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [290b 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2b58 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2bf4 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2586 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [290c 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b59 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2bf5 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2587 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [290d 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b5a 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | [2bf6 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2588 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [290e 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4021 bytes, seq: 4}, Envelope: 4051 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [2bf7 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2589 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 f3 24 d0 88 ad 43 07 03 12 e3 c5 30 1b 19 d1 |..$...C.....0...| +peer1.org1.example.com | [290f 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4021 bytes, seq: 4}, Envelope: 4051 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b5b 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | [2bf8 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 84 d1 56 df 11 8b 08 1c 71 9d 70 84 1e a1 1b af |..V.....q.p.....| +peer1.org1.example.com | [2910 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | [2bf9 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [258a 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 60 fd b0 91 5a 9b 66 62 0b 56 |0E.!..`...Z.fb.V| +peer1.org1.example.com | [2911 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | [2bfa 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 e0 3a 51 e4 10 99 41 d7 ba 6a 21 d9 e6 f7 d8 a0 |.:Q...A..j!.....| +peer1.org1.example.com | [2912 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | [2bfb 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 ed 1b 9b b9 41 02 20 35 4b ce d5 03 3a f2 93 b1 |....A. 5K...:...| +peer1.org1.example.com | [2913 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [2bfc 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000030 1c bb 3e 6a cb a6 91 c0 22 77 7a bd 90 b5 ca bc |..>j...."wz.....| +peer1.org1.example.com | [2914 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [2b5c 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | [2bfd 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000040 7f bd 8a 24 ee e7 20 |...$.. | +peer1.org1.example.com | [2915 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d2a6b0 gate 1598907122457639600 evaluation starts +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [2bfe 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [258b 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | [2916 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d2a6b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b5d 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | [2bff 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abb200 gate 1598907121735740300 evaluation starts +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [2917 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d2a6b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | [2c00 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abb200 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [258c 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f c7 68 2f 2f 78 c0 db dd 53 12 fc |0D. o.h//x...S..| +peer1.org1.example.com | [2918 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d2a6b0 principal matched by identity 0 +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | [2c01 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abb200 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 80 76 c6 7f b6 c8 cc 51 ae 66 4f 4c 0f b4 86 86 |.v.....Q.fOL....| +peer1.org1.example.com | [2919 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 57 82 7c 99 56 4d b0 0d 98 c4 b7 3a 1b 64 2e |\W.|.VM.....:.d.| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | [2c02 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abb200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000020 b9 15 e4 d7 02 20 22 81 92 ec 3b 98 e1 64 92 f9 |..... "...;..d..| +peer1.org1.example.com | 00000010 95 f3 97 e3 ee 1e f0 5e e5 b8 b8 71 94 6c a7 5f |.......^...q.l._| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [2c03 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abb200 principal evaluation fails +peer0.org1.example.com | 00000030 82 cf d0 6e a9 85 53 27 8c e1 7a dd 27 f1 d0 fd |...n..S'..z.'...| +peer1.org1.example.com | [291a 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e 87 15 e0 00 30 28 5e ff 32 4b d1 |0D. ^....0(^.2K.| +peer0.org2.example.com | [2b5e 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c04 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abb200 gate 1598907121735740300 evaluation fails +peer0.org1.example.com | 00000040 16 ba 8c d4 25 d1 |....%.| +peer1.org1.example.com | 00000010 94 29 83 39 a6 b4 28 0d f1 a3 52 1f ce 3a cb a0 |.).9..(...R..:..| +peer0.org2.example.com | [2b5f 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c05 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [258d 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | 00000020 77 98 25 ec 02 20 1c 42 af 3d d4 28 56 75 01 b9 |w.%.. .B.=.(Vu..| +peer0.org2.example.com | [2b60 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | [2c06 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [258e 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | 00000030 2a 07 1b 15 77 67 97 e5 81 ad a6 52 66 12 72 36 |*...wg.....Rf.r6| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [2c07 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [258f 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000040 aa c0 42 33 fb 79 |..B3.y| +peer0.org2.example.com | [2b61 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | [2c08 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abb770 gate 1598907121736508600 evaluation starts +peer0.org1.example.com | [2590 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [291b 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d2a6b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | [2c09 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abb770 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2591 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [291c 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d2a6b0 gate 1598907122457639600 evaluation succeeds +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | [2c0a 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abb770 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2592 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | [291d 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org2.example.com | [2c0b 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abb770 principal matched by identity 0 +peer0.org1.example.com | [2593 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [291e 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [2c0c 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org1.example.com | [2594 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b62 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org1.example.com | [2595 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [2b63 08-31 20:51:58.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [291f 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2c0d 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer0.org1.example.com | [2596 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b64 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2920 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer0.org1.example.com | [2597 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b65 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2921 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4021 bytes, seq: 4}, Envelope: 4051 bytes, Signature: 0 bytes to the block puller +peer1.org2.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer0.org1.example.com | [2598 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2b66 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2922 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +peer1.org2.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer0.org1.example.com | [2599 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " secret_envelope: > alive: +peer0.org2.example.com | [2b67 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2923 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer0.org1.example.com | [259a 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b68 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2924 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer1.org2.example.com | [2c0e 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abb770 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [259b 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b69 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2c0f 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004abb770 gate 1598907121736508600 evaluation succeeds +peer0.org1.example.com | [259c 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b6a 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6da90 gate 1598907118210717500 evaluation starts +peer1.org2.example.com | [2c10 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2925 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer0.org1.example.com | [259d 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b6b 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6da90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2c11 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2926 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [259e 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b6c 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6da90 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2c12 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2927 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +peer0.org1.example.com | [259f 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b6d 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6da90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2c13 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2928 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +peer0.org1.example.com | [25a0 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b6e 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6da90 principal evaluation fails +peer1.org2.example.com | [2c14 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2929 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer0.org1.example.com | [25a1 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b6f 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6da90 gate 1598907118210717500 evaluation fails +peer1.org2.example.com | [2c15 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [292a 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +peer0.org1.example.com | [25a2 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b70 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2c16 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [292b 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +peer0.org1.example.com | [25a3 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b71 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2c17 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [292c 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [25a4 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b72 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2c18 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [292d 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0035fca80 env 0xc002c5c190 txn 0 +peer0.org1.example.com | [25a5 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org2.example.com | [2b73 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b86000 gate 1598907118212000300 evaluation starts +peer1.org2.example.com | [2c19 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [292e 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002c5c190 +peer0.org1.example.com | [25a6 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2b74 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b86000 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2c1a 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [292f 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\360\305\265\372\005\020\214\243\205\302\001\"\017businesschannel*@a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\027\010\177\221psw\030\236\237*T\302`\367\254+Q\2323-$v\360" +peer0.org1.example.com | [25a7 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b75 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b86000 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2c1b 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2930 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [25a8 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [2b76 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b86000 principal matched by identity 0 +peer1.org2.example.com | [2c1c 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2931 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [2b77 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | [25a9 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c1d 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2932 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [25aa 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c1e 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2933 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org2.example.com | [2b78 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | [25ab 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2c1f 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2934 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | [25ac 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c20 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2935 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 36 4f 61 9a cb be 2c 0e 7c f3 d3 0a ae 63 b0 |.6Oa...,.|....c.| +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | [25ad 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2c21 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000010 cb df 45 66 c7 92 ad 14 79 e7 5b 4f 81 2e ae 1c |..Ef....y.[O....| +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | [25ae 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c22 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2936 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b 6a 46 c8 38 65 ff 3e 84 0d 72 0a |0D. +jF.8e.>..r.| +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [25af 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2c23 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 1b 71 b6 da 55 29 15 fa 20 ed 85 cd e5 54 13 8e |.q..U).. ....T..| +peer0.org2.example.com | [2b79 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b86000 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [25b0 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2c24 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30660 gate 1598907121946649100 evaluation starts +peer1.org1.example.com | 00000020 73 d7 49 c1 02 20 55 36 0c 7d d4 d5 f6 0a a0 75 |s.I.. U6.}.....u| +peer0.org2.example.com | [2b7a 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b86000 gate 1598907118212000300 evaluation succeeds +peer0.org1.example.com | [25b1 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2c25 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30660 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 26 3b e5 cd d5 60 48 c1 e0 09 21 1b f6 c1 c2 bb |&;...`H...!.....| +peer0.org2.example.com | [2b7b 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [25b2 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2c26 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30660 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000040 35 e0 49 3f d9 2c |5.I?.,| +peer0.org2.example.com | [2b7c 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [25b3 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bd6f10 gate 1598907113518211100 evaluation starts +peer1.org2.example.com | [2c27 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2937 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [2b7d 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [25b4 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bd6f10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2c28 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30660 principal evaluation fails +peer1.org1.example.com | [2938 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc00002b000, header channel_header:"\010\003\032\014\010\360\305\265\372\005\020\214\243\205\302\001\"\017businesschannel*@a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\027\010\177\221psw\030\236\237*T\302`\367\254+Q\2323-$v\360" +peer0.org2.example.com | [2b7e 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [25b5 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bd6f10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2c29 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30660 gate 1598907121946649100 evaluation fails +peer1.org1.example.com | [2939 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org2.example.com | [2b7f 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | [25b6 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bd6f10 principal matched by identity 0 +peer1.org2.example.com | [2c2a 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [293a 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [25b7 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 25 ef a4 57 76 c6 2c a0 ca 69 20 fd 35 fd 3d |5%..Wv.,..i .5.=| +peer1.org2.example.com | [2c2b 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [293b 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org2.example.com | [2b80 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 bb a2 d6 4e af a3 21 78 39 46 88 fe 26 f6 e9 13 |...N..!x9F..&...| +peer1.org2.example.com | [2c2c 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [293c 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | [25b8 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 75 86 1e ea b0 26 fd 6f 71 10 |0E.!..u....&.oq.| +peer1.org2.example.com | [2c2d 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30bd0 gate 1598907121949919600 evaluation starts +peer1.org1.example.com | [293d 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000010 de 47 71 6a 39 e5 36 95 47 56 f7 27 5c 34 8c 5b |.Gqj9.6.GV.'\4.[| +peer1.org1.example.com | [293e 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer1.org2.example.com | [2c2e 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30bd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000020 36 34 ea 45 75 02 20 11 fd a8 8f 1a 32 ab 10 77 |64.Eu. .....2..w| +peer1.org1.example.com | [293f 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc002658400 +peer1.org2.example.com | [2c2f 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30bd0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | 00000030 5e 18 50 0a c8 a7 9e 69 67 4f 0b 9d df b8 99 16 |^.P....igO......| +peer1.org1.example.com | [2940 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [db024d0c-f290-42f7-985a-2d64bcbcd652] +peer0.org1.example.com | 00000040 56 9e 51 af 23 b4 97 |V.Q.#..| +peer0.org2.example.com | [2b81 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2941 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org2.example.com | [2c30 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30bd0 principal matched by identity 0 +peer0.org1.example.com | [25b9 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bd6f10 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2b82 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2942 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [db024d0c-f290-42f7-985a-2d64bcbcd652] +peer1.org2.example.com | [2c31 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer0.org1.example.com | [25ba 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bd6f10 gate 1598907113518211100 evaluation succeeds +peer1.org1.example.com | [2943 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +peer0.org2.example.com | [2b83 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer0.org1.example.com | [25bb 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2b84 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2944 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [566bae53-5d76-4b6e-943e-ee33bcb489f7] +peer1.org2.example.com | [2c32 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer0.org1.example.com | [25bc 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2b85 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2945 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [566bae53-5d76-4b6e-943e-ee33bcb489f7] +peer1.org2.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer0.org1.example.com | [25bd 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2b87 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2946 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6c7c0 gate 1598907122463609400 evaluation starts +peer1.org2.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer0.org1.example.com | [25be 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2b86 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +peer1.org1.example.com | [2947 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6c7c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer0.org1.example.com | [25bf 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2b88 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +peer1.org1.example.com | [2948 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6c7c0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer0.org1.example.com | [25c0 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2b89 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +peer1.org1.example.com | [2949 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6c7c0 principal matched by identity 0 +peer1.org2.example.com | [2c33 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30bd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [25c1 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2b8a 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [294a 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c d1 4f 8e 83 45 bc 08 e9 72 bf 23 62 2d 37 ed |..O..E...r.#b-7.| +peer1.org2.example.com | [2c34 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30bd0 gate 1598907121949919600 evaluation succeeds +peer0.org1.example.com | [25c2 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2b8b 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 c8 e0 4d 7a a2 57 f9 4d 8a ba ef 95 bb 58 8c 53 |..Mz.W.M.....X.S| +peer1.org2.example.com | [2c35 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2b8c 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b878f0 gate 1598907118216027000 evaluation starts +peer0.org1.example.com | [25c3 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [294b 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 06 0c 41 8e ee ef 15 ef 93 13 |0E.!....A.......| +peer1.org2.example.com | [2c36 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2b8d 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b878f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [25c4 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 7c 65 7d 52 64 ed d7 c8 0e 65 27 49 00 5b 7d 28 ||e}Rd....e'I.[}(| +peer1.org2.example.com | [2c37 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2b8e 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b878f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [25c5 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 0e f5 f9 19 61 02 20 40 2b bc 92 d7 d4 6d cf c9 |....a. @+....m..| +peer1.org2.example.com | [2c38 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2b8f 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b878f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [25c6 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 d6 0e 22 a0 7e f6 ca 0f b1 46 b6 f5 ff a4 df 94 |..".~....F......| +peer1.org2.example.com | [2c39 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b90 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b878f0 principal evaluation fails +peer0.org1.example.com | [25c7 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | 00000040 74 af d9 d4 da 20 6d |t.... m| +peer1.org2.example.com | [2c3a 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2b91 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b878f0 gate 1598907118216027000 evaluation fails +peer0.org1.example.com | [25c8 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [294c 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6c7c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2c3b 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b92 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25c9 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [294d 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6c7c0 signed by 1 principal evaluation starts (used [true]) +peer1.org2.example.com | [2c3c 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2b93 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25ca 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [294e 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6c7c0 skipping identity 0 because it has already been used +peer1.org2.example.com | [2c3d 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2b94 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [25cb 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [294f 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6c7c0 principal evaluation fails +peer1.org2.example.com | [2c3e 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2b95 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b87e60 gate 1598907118217090400 evaluation starts +peer0.org1.example.com | [25cc 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c3f 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2b96 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b87e60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [25cd 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2950 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c6c7c0 gate 1598907122463609400 evaluation succeeds +peer1.org2.example.com | [2c40 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b317c0 gate 1598907121956020900 evaluation starts +peer0.org2.example.com | [2b97 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b87e60 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [25ce 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " > alive: alive:)b\021/\226\350\330T\177" > alive: +peer1.org1.example.com | [2951 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [38eb3d8e-f9c7-4790-8ea9-b448a2a20a9e] +peer1.org2.example.com | [2c41 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b317c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b98 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b87e60 principal matched by identity 0 +peer0.org1.example.com | [25cf 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [2952 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [38eb3d8e-f9c7-4790-8ea9-b448a2a20a9e] +peer1.org2.example.com | [2c42 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b317c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2b99 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | [25d0 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2953 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +peer1.org2.example.com | [2c43 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b317c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [25d1 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [2954 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d appears to be valid +peer1.org2.example.com | [2c44 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b317c0 principal evaluation fails +peer0.org2.example.com | [2b9a 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | [25d2 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2955 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc002658400 +peer1.org2.example.com | [2c45 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b317c0 gate 1598907121956020900 evaluation fails +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | [25d3 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [2956 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0035fca80 env 0xc002c5c190 txn 0 +peer1.org2.example.com | [2c46 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | [25d4 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2957 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [2c47 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | [25d5 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2958 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 5ms +peer1.org2.example.com | [2c48 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [25d6 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2959 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [2c49 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b31d30 gate 1598907121956785000 evaluation starts +peer0.org2.example.com | [2b9b 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b87e60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [25d7 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [295a 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [2c4a 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b31d30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2b9c 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b87e60 gate 1598907118217090400 evaluation succeeds +peer0.org1.example.com | [25d8 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [295b 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +peer1.org2.example.com | [2c4b 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b31d30 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2b9d 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [25d9 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [295c 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [2c4c 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b31d30 principal matched by identity 0 +peer0.org2.example.com | [2b9e 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [25da 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [295d 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [2c4d 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer0.org2.example.com | [2b9f 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [25db 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [295e 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer0.org2.example.com | [2ba0 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [25dc 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [295f 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +peer1.org2.example.com | [2c4e 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer0.org2.example.com | [2ba1 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [25dd 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2960 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer0.org2.example.com | [2ba2 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [25de 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2961 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer1.org2.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer0.org2.example.com | [2ba3 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2962 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [25df 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer0.org2.example.com | [2ba4 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2963 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [25e0 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer1.org1.example.com | [2964 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org2.example.com | [2ba5 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [25e1 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c4f 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b31d30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2965 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [2ba6 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [25e2 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c50 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b31d30 gate 1598907121956785000 evaluation succeeds +peer1.org1.example.com | [2966 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [2ba7 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25e3 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c51 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2967 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [2ba8 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [25e4 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c52 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2968 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] marked as valid by state validator +peer0.org2.example.com | [2ba9 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [25e5 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c53 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2969 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0035fda40), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc0035fda80)} +peer0.org2.example.com | [2baa 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [25e6 08-31 20:51:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2c54 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [296a 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [2bab 08-31 20:51:58.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [25e7 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161028 +peer1.org2.example.com | [2c55 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [296b 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [2bac 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba52b0 gate 1598907118220132700 evaluation starts +peer0.org1.example.com | [25e8 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 47577C95E3E5D9B8524AD75B1B7F2ACA5736EAE032DEB56DAC333F9AF032C87A +peer1.org2.example.com | [2c56 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [296c 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [2bad 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba52b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [25e9 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2c57 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [296d 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +peer0.org2.example.com | [2bae 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba52b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [25ea 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2c58 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org1.example.com | [296e 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +peer0.org2.example.com | [2baf 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba52b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [25eb 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org2.example.com | [2c59 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [296f 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +peer0.org2.example.com | [2bb0 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba52b0 principal evaluation fails +peer0.org1.example.com | [25ec 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2c5a 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2970 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bb1 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba52b0 gate 1598907118220132700 evaluation fails +peer0.org1.example.com | [25ed 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2971 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c5b 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bb2 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25ef 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2972 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c5c 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bb3 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25ee 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [2973 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c5d 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bb4 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [25f0 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2974 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c5e 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bb5 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba5820 gate 1598907118221535100 evaluation starts +peer0.org1.example.com | [25f1 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2975 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c5f 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bb6 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba5820 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [25f2 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2976 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +peer1.org2.example.com | [2c60 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bb7 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba5820 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [25f3 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2977 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0x81, 0x47, 0x7e, 0x41, 0x1c, 0xad, 0xf5, 0x8b, 0x36, 0x32, 0x94, 0x83, 0x50, 0xc2, 0x29, 0x32, 0xda, 0xd5, 0xc, 0x74, 0xc8, 0x4a, 0xac, 0xd3, 0xc3, 0x82, 0x1e, 0x87, 0x25, 0x9, 0x5, 0x17} txOffsets= +peer1.org2.example.com | [2c61 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bb8 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba5820 principal matched by identity 0 +peer0.org1.example.com | [25f4 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | txId=a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d locPointer=offset=70, bytesLength=2981 +peer1.org2.example.com | [2c62 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2bb9 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org1.example.com | ] +peer0.org1.example.com | [25f5 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c63 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | [2bba 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | [25f6 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2978 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89532, bytesLength=2981] for tx ID: [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] to txid-index +peer1.org2.example.com | [2c64 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | [25f7 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [2979 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89532, bytesLength=2981] for tx number:[0] ID: [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] to blockNumTranNum index +peer1.org2.example.com | [2c65 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | [25f8 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [297a 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93505], isChainEmpty=[false], lastBlockNumber=[4] +peer1.org2.example.com | [2c66 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | [25f9 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [297b 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +peer1.org2.example.com | [2c67 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [25fa 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [297c 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +peer1.org2.example.com | [2c68 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b55780 gate 1598907121965251500 evaluation starts +peer0.org2.example.com | [2bbb 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba5820 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [25fb 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 57 7c 95 e3 e5 d9 b8 52 4a d7 5b 1b 7f 2a ca |GW|.....RJ.[..*.| +peer1.org1.example.com | [297d 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +peer1.org2.example.com | [2c69 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b55780 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2bbc 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba5820 gate 1598907118221535100 evaluation succeeds +peer0.org1.example.com | 00000010 57 36 ea e0 32 de b5 6d ac 33 3f 9a f0 32 c8 7a |W6..2..m.3?..2.z| +peer1.org1.example.com | [297e 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [2c6a 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b55780 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2bbd 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [25fc 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 98 06 f9 87 d9 60 5f 06 9e 17 1a |0D. c.....`_....| +peer1.org1.example.com | [297f 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [2c6b 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b55780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2bbe 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 03 1d 48 68 b2 76 ec 51 36 72 75 cb e0 2c b5 a7 |..Hh.v.Q6ru..,..| +peer1.org1.example.com | [2980 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org2.example.com | [2c6c 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b55780 principal evaluation fails +peer0.org2.example.com | [2bbf 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000020 59 f1 2f 50 02 20 00 ff 95 08 39 9c bc f8 e9 15 |Y./P. ....9.....| +peer1.org1.example.com | [2981 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org2.example.com | [2c6d 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b55780 gate 1598907121965251500 evaluation fails +peer0.org2.example.com | [2bc0 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 a6 53 67 72 e9 b6 df 11 56 90 e8 92 32 40 4f 45 |.Sgr....V...2@OE| +peer1.org1.example.com | [2982 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org2.example.com | [2c6e 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2bc1 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000040 62 28 71 bf 24 e7 |b(q.$.| +peer1.org1.example.com | [2983 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org2.example.com | [2c6f 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [25fd 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org1.example.com | [2984 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org2.example.com | [2c70 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | [2bc2 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | [2985 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +peer1.org2.example.com | [2c71 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b55cf0 gate 1598907121966391700 evaluation starts +peer0.org1.example.com | [25fe 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 13 b5 d3 7a 97 35 f8 c3 86 a1 1d |0D. ....z.5.....| +peer0.org2.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org1.example.com | [2986 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [2c72 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b55cf0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 b7 c2 65 d0 5f 2d 86 64 b3 99 56 db 75 e4 4b b3 |..e._-.d..V.u.K.| +peer0.org2.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org1.example.com | [2987 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +peer1.org2.example.com | [2c73 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b55cf0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000020 c8 e0 fb 6e 02 20 7d d9 48 1f 82 c4 39 84 52 34 |...n. }.H...9.R4| +peer0.org2.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org1.example.com | [2988 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +peer1.org2.example.com | [2c74 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b55cf0 principal matched by identity 0 +peer0.org1.example.com | 00000030 8f a8 33 ba c8 c6 a3 7c c2 60 5e b7 0e 35 ab fa |..3....|.`^..5..| +peer0.org2.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org1.example.com | [2989 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +peer1.org2.example.com | [2c75 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer0.org1.example.com | 00000040 31 6e ed 11 e4 55 |1n...U| +peer0.org2.example.com | [2bc3 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [298a 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +peer1.org2.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer0.org1.example.com | [25ff 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2bc4 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [298b 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +peer1.org2.example.com | [2c76 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer0.org1.example.com | [2600 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [2bc5 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [298c 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 26ms (state_validation=0ms block_and_pvtdata_commit=18ms state_commit=4ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +peer1.org2.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer0.org1.example.com | [2601 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bc6 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [298d 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer0.org1.example.com | [2602 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bc7 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [298e 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408D8CA91B5F7AF9D9816...08051A0C0A0565787030321203312E30 +peer1.org2.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer0.org1.example.com | [2603 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [2bc8 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [298f 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5AD084AB40D9B4BF2B6DF3EA7F4BC1BFF86322D5C39BB7899819184F122D7DDF +peer1.org2.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer0.org1.example.com | [2604 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [2bc9 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2990 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +peer1.org2.example.com | [2c77 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b55cf0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2605 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bca 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2991 08-31 20:52:03.73 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org2.example.com | [2c78 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b55cf0 gate 1598907121966391700 evaluation succeeds +peer0.org1.example.com | [2606 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [2bcb 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc5110 gate 1598907118226426200 evaluation starts +peer1.org1.example.com | [2992 08-31 20:52:03.73 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org2.example.com | [2c79 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2607 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2bcc 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc5110 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2993 08-31 20:52:03.73 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org2.example.com | [2c7a 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2608 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 f3 24 d0 88 ad 43 07 03 12 e3 c5 30 1b 19 d1 |..$...C.....0...| +peer0.org2.example.com | [2bcd 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc5110 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2994 08-31 20:52:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c7b 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000010 84 d1 56 df 11 8b 08 1c 71 9d 70 84 1e a1 1b af |..V.....q.p.....| +peer0.org2.example.com | [2bce 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc5110 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2995 08-31 20:52:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [2c7c 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2609 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 60 fd b0 91 5a 9b 66 62 0b 56 |0E.!..`...Z.fb.V| +peer0.org2.example.com | [2bcf 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc5110 principal evaluation fails +peer1.org1.example.com | [2996 08-31 20:52:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b6 38 d0 92 e6 39 e4 f8 3d ba ce 3a 1c ce 7a f8 |.8...9..=..:..z.| +peer1.org2.example.com | [2c7d 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 e0 3a 51 e4 10 99 41 d7 ba 6a 21 d9 e6 f7 d8 a0 |.:Q...A..j!.....| +peer0.org2.example.com | [2bd0 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc5110 gate 1598907118226426200 evaluation fails +peer1.org1.example.com | 00000010 7d f2 f7 23 49 bd fc 5f 50 1d 8b bc d1 7d 8f be |}..#I.._P....}..| +peer1.org2.example.com | [2c7e 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 ed 1b 9b b9 41 02 20 35 4b ce d5 03 3a f2 93 b1 |....A. 5K...:...| +peer0.org2.example.com | [2bd1 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2997 08-31 20:52:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 cc 83 77 88 a1 d4 62 af d2 3b fa |0D. s..w...b..;.| +peer1.org2.example.com | [2c7f 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 1c bb 3e 6a cb a6 91 c0 22 77 7a bd 90 b5 ca bc |..>j...."wz.....| +peer0.org2.example.com | [2bd2 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 a6 92 19 f5 51 41 1d 50 b6 98 a7 a2 cb 84 8b cb |....QA.P........| +peer1.org2.example.com | [2c80 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 7f bd 8a 24 ee e7 20 |...$.. | +peer0.org2.example.com | [2bd3 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000020 dc 74 a6 80 02 20 14 47 de 5a fd 63 ba ab 31 e7 |.t... .G.Z.c..1.| +peer1.org2.example.com | [2c81 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [260a 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2bd4 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc5680 gate 1598907118227628100 evaluation starts +peer1.org1.example.com | 00000030 2e 5a 01 ec 07 b3 cf 01 39 2d e0 f0 85 c7 ac d4 |.Z......9-......| +peer1.org2.example.com | [2c82 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [260b 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bd5 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc5680 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000040 55 f6 59 4f f4 a9 |U.YO..| +peer1.org2.example.com | [2c83 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [260c 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2bd6 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc5680 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2998 08-31 20:52:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c84 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [260d 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bd7 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc5680 principal matched by identity 0 +peer1.org1.example.com | [2999 08-31 20:52:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c85 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer0.org1.example.com | [260e 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2bd8 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | [299a 08-31 20:52:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer0.org1.example.com | [260f 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [299b 08-31 20:52:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org2.example.com | [2c86 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer0.org1.example.com | [2610 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2bd9 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | [299c 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer0.org1.example.com | [2611 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | [299d 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer0.org1.example.com | [2612 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | [299e 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer0.org1.example.com | [2613 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | [299f 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer0.org1.example.com | [2614 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49890 gate 1598907113641711300 evaluation starts +peer0.org2.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [29a0 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2615 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49890 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2bda 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc5680 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2c87 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [29a1 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2616 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49890 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2bdb 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc5680 gate 1598907118227628100 evaluation succeeds +peer1.org2.example.com | [2c88 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [29a2 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2617 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49890 principal matched by identity 0 +peer0.org2.example.com | [2bdc 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2c89 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [29a3 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2618 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 25 ef a4 57 76 c6 2c a0 ca 69 20 fd 35 fd 3d |5%..Wv.,..i .5.=| +peer0.org2.example.com | [2bdd 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2c8a 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [29a4 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | 00000010 bb a2 d6 4e af a3 21 78 39 46 88 fe 26 f6 e9 13 |...N..!x9F..&...| +peer0.org2.example.com | [2bde 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2c8b 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [29a5 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2619 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 75 86 1e ea b0 26 fd 6f 71 10 |0E.!..u....&.oq.| +peer0.org2.example.com | [2bdf 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2c8c 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b71440 gate 1598907122181092400 evaluation starts +peer1.org1.example.com | [29a6 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4021 bytes, seq: 5}, Envelope: 4051 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 de 47 71 6a 39 e5 36 95 47 56 f7 27 5c 34 8c 5b |.Gqj9.6.GV.'\4.[| +peer0.org2.example.com | [2be0 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | [2c8d 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b71440 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [29a7 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4021 bytes, seq: 5}, Envelope: 4051 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 36 34 ea 45 75 02 20 11 fd a8 8f 1a 32 ab 10 77 |64.Eu. .....2..w| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [2c8e 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b71440 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [29a8 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000030 5e 18 50 0a c8 a7 9e 69 67 4f 0b 9d df b8 99 16 |^.P....igO......| +peer0.org2.example.com | [2be1 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | [2c8f 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b71440 principal matched by identity 0 +peer1.org1.example.com | [29a9 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 56 9e 51 af 23 b4 97 |V.Q.#..| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | [2c90 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer1.org1.example.com | [29aa 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [261a 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49890 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer1.org1.example.com | [29ab 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [261c 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | [2c91 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer1.org1.example.com | [29ac 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [261d 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer1.org1.example.com | [29ad 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bf7820 gate 1598907125019365600 evaluation starts +peer0.org1.example.com | [261b 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49890 gate 1598907113641711300 evaluation succeeds +peer0.org2.example.com | [2be2 08-31 20:51:58.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer1.org1.example.com | [29ae 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bf7820 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [261e 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2be3 08-31 20:51:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer1.org1.example.com | [29af 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bf7820 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [261f 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2be4 08-31 20:51:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer1.org1.example.com | [29b0 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bf7820 principal matched by identity 0 +peer0.org1.example.com | [2620 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2be5 08-31 20:51:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [2c92 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b71440 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [29b1 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 d8 f5 0f 48 65 c8 f4 0c cd 0e 2e 8f ad 75 8f |....He........u.| +peer0.org1.example.com | [2621 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2be6 08-31 20:51:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c93 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b71440 gate 1598907122181092400 evaluation succeeds +peer1.org1.example.com | 00000010 ab 85 7b f4 d3 8b 3b 99 75 1d a4 43 c3 f9 55 94 |..{...;.u..C..U.| +peer0.org1.example.com | [2622 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2be7 08-31 20:51:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c94 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [29b2 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 8e 3b ef a4 f2 de 25 6b ad 88 |0E.!...;....%k..| +peer0.org1.example.com | [2623 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2be8 08-31 20:51:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2c95 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 74 2e 8c b8 4d 18 ee 72 ed 27 2d a4 49 8a db 08 |t...M..r.'-.I...| +peer0.org1.example.com | [2624 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2be9 08-31 20:51:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c96 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 de 88 c3 21 7f 02 20 2b 42 c2 70 ca 56 7a 28 40 |...!.. +B.p.Vz(@| +peer0.org1.example.com | [2625 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 57 7c 95 e3 e5 d9 b8 52 4a d7 5b 1b 7f 2a ca |GW|.....RJ.[..*.| +peer0.org2.example.com | [2bea 08-31 20:51:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c97 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 7f 0d 90 23 8e 19 ae 18 e2 85 e9 57 ac 12 83 ce |...#.......W....| +peer0.org1.example.com | 00000010 57 36 ea e0 32 de b5 6d ac 33 3f 9a f0 32 c8 7a |W6..2..m.3?..2.z| +peer0.org2.example.com | [2beb 08-31 20:51:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c98 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 cc 76 ef 31 10 24 d4 |.v.1.$.| +peer0.org1.example.com | [2626 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 98 06 f9 87 d9 60 5f 06 9e 17 1a |0D. c.....`_....| +peer0.org2.example.com | [2bec 08-31 20:51:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c99 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29b3 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bf7820 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 03 1d 48 68 b2 76 ec 51 36 72 75 cb e0 2c b5 a7 |..Hh.v.Q6ru..,..| +peer0.org2.example.com | [2bed 08-31 20:51:58.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2c9a 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29b4 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bf7820 gate 1598907125019365600 evaluation succeeds +peer0.org1.example.com | 00000020 59 f1 2f 50 02 20 00 ff 95 08 39 9c bc f8 e9 15 |Y./P. ....9.....| +peer0.org2.example.com | [2bee 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2c9b 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org1.example.com | [29b5 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | 00000030 a6 53 67 72 e9 b6 df 11 56 90 e8 92 32 40 4f 45 |.Sgr....V...2@OE| +peer0.org2.example.com | [2bef 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c9c 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29b6 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | 00000040 62 28 71 bf 24 e7 |b(q.$.| +peer0.org2.example.com | [2bf0 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2c9d 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29b7 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [2627 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bf1 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29b8 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [2c9e 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2628 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2bf2 08-31 20:51:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [29b9 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4021 bytes, seq: 5}, Envelope: 4051 bytes, Signature: 0 bytes to the block puller +peer1.org2.example.com | [2c9f 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2629 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bf3 08-31 20:51:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [29ba 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +peer1.org2.example.com | [2ca0 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [262a 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bf4 08-31 20:51:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [29bb 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ca1 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [262b 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2bf5 08-31 20:51:58.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29bc 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer1.org2.example.com | [2ca2 08-31 20:52:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [262c 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2bf6 08-31 20:51:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer1.org1.example.com | [29bd 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer1.org2.example.com | [2ca3 08-31 20:52:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [262d 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bf7 08-31 20:51:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer1.org1.example.com | [29be 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org2.example.com | [2ca4 08-31 20:52:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [262e 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 f3 24 d0 88 ad 43 07 03 12 e3 c5 30 1b 19 d1 |..$...C.....0...| +peer0.org2.example.com | [2bf8 08-31 20:51:59.25 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer1.org1.example.com | [29bf 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +peer1.org2.example.com | [2ca5 08-31 20:52:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | 00000010 84 d1 56 df 11 8b 08 1c 71 9d 70 84 1e a1 1b af |..V.....q.p.....| +peer0.org2.example.com | [2bf9 08-31 20:51:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [29c0 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +peer1.org2.example.com | [2ca6 08-31 20:52:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [262f 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 60 fd b0 91 5a 9b 66 62 0b 56 |0E.!..`...Z.fb.V| +peer0.org2.example.com | [2bfa 08-31 20:51:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec 94 41 cf 50 fe 1b b8 ee ea cf 3e 65 2b 07 16 |..A.P......>e+..| +peer1.org1.example.com | [29c1 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer1.org2.example.com | [2ca7 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 e0 3a 51 e4 10 99 41 d7 ba 6a 21 d9 e6 f7 d8 a0 |.:Q...A..j!.....| +peer0.org2.example.com | 00000010 e4 b5 32 a2 d5 e4 1b 7a 24 42 8f 86 3d e9 92 be |..2....z$B..=...| +peer1.org1.example.com | [29c2 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +peer1.org2.example.com | [2ca8 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 ed 1b 9b b9 41 02 20 35 4b ce d5 03 3a f2 93 b1 |....A. 5K...:...| +peer0.org2.example.com | [2bfb 08-31 20:51:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e 60 e8 7f 1e 75 f2 78 ec 7c b8 cc |0D. .`...u.x.|..| +peer1.org1.example.com | [29c3 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +peer1.org2.example.com | [2ca9 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | 00000010 f3 72 0a d6 97 e5 fb 6f 38 2a 14 39 9b c1 1a 3e |.r.....o8*.9...>| +peer0.org1.example.com | 00000030 1c bb 3e 6a cb a6 91 c0 22 77 7a bd 90 b5 ca bc |..>j...."wz.....| +peer1.org1.example.com | [29c4 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [2caa 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 38 a9 e2 ef 02 20 69 e3 ca 9e dc 11 3e 23 e7 38 |8.... i.....>#.8| +peer0.org1.example.com | 00000040 7f bd 8a 24 ee e7 20 |...$.. | +peer1.org1.example.com | [29c5 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc003348100 env 0xc002b5a960 txn 0 +peer1.org2.example.com | [2cab 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 54 a4 5c 33 7b 46 a8 21 1e 1d 9f 91 4c 12 29 32 |T.\3{F.!....L.)2| +peer0.org1.example.com | [2630 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [29c6 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc002b5a960 +peer1.org2.example.com | [2cad 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 20 48 ad 5e 49 70 | H.^Ip| +peer0.org1.example.com | [2631 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29c7 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\362\305\265\372\005\020\330\366\336\310\003\"\017businesschannel*@ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y\nZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r\nuN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE\nyIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV\nHSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO\nPQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030}\357\315\302\232\007\257\034BQH\017\351&]\"\010\252\276J\270\353\250@" +peer1.org2.example.com | [2cae 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bfc 08-31 20:51:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2632 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [29c8 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [2cac 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2bfd 08-31 20:51:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2633 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29c9 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [2caf 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2bfe 08-31 20:51:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2634 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [29ca 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [2cb0 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2bff 08-31 20:51:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org1.example.com | [2635 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [29cb 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cb1 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c00 08-31 20:51:59.26 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org1.example.com | [2636 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [29cc 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [2cb2 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer0.org2.example.com | [2c01 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4565 bytes, seq: 3}, Envelope: 4595 bytes, Signature: 0 bytes +peer0.org1.example.com | [2637 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | [2cb3 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c02 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2638 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [2cb4 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c03 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2639 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | [2cb5 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2c04 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [263a 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d8100 gate 1598907113652445000 evaluation starts +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | [2cb6 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c05 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [263b 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d8100 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | [2cb7 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2c06 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [263c 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d8100 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | [2cb8 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c07 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [263d 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d8100 principal matched by identity 0 +peer1.org2.example.com | [2cb9 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org2.example.com | [2c08 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [263e 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c aa a5 5a 6c 4e f5 3d 4f b2 61 f4 2a 5b 12 81 |...ZlN.=O.a.*[..| +peer1.org2.example.com | [2cba 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org2.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | 00000010 cb 7e 57 55 cd aa 59 d5 f2 c9 38 c9 21 b6 d5 fe |.~WU..Y...8.!...| +peer1.org2.example.com | [2cbb 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer1.org1.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | [263f 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 67 b2 ff a9 ff 61 ec 7b a5 ba 8d |0D. DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer1.org1.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | 00000010 ae b7 e1 c9 77 b5 d3 f2 1b 98 25 d2 70 15 92 aa |....w.....%.p...| +peer1.org2.example.com | [2cbd 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer1.org1.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer0.org1.example.com | 00000020 cf 3f 49 2e 02 20 7e 66 a3 7f 73 1e 70 7b 22 35 |.?I.. ~f..s.p{"5| +peer1.org2.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer1.org1.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | 00000030 49 5e 98 0c 2b 81 dd 4e ce 7b f9 68 3e 29 62 11 |I^..+..N.{.h>)b.| +peer1.org2.example.com | [2cbe 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer0.org1.example.com | 00000040 2f 96 e8 d8 54 7f |/...T.| +peer1.org2.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer1.org1.example.com | [29cd 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer0.org1.example.com | [2640 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d8100 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer1.org1.example.com | [29ce 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer0.org1.example.com | [2641 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d8100 gate 1598907113652445000 evaluation succeeds +peer1.org2.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer1.org1.example.com | [29cf 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org1.example.com | [2642 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer1.org1.example.com | [29d0 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org1.example.com | [2643 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2644 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2cbf 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer0.org1.example.com | [2645 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [29d1 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 35 37 a9 79 33 a2 e5 2b 9c 00 24 05 6e 93 3f |`57.y3..+..$.n.?| +peer1.org2.example.com | [2cc0 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org1.example.com | [2646 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 8d d7 90 73 0d 35 87 ae 3b dd 80 ca fa 0e 01 84 |...s.5..;.......| +peer1.org2.example.com | [2cc1 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [2647 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [29d2 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c 1e 88 5b 8d 81 cf 0e a2 2f d3 11 |0D. |..[...../..| +peer1.org2.example.com | [2cc2 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c09 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c16440 gate 1598907119620670900 evaluation starts +peer0.org1.example.com | [2648 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | 00000010 a4 a8 f1 b3 5c 74 52 c0 c6 9d 67 23 3f e7 8d d0 |....\tR...g#?...| +peer1.org2.example.com | [2cc3 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c0a 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c16440 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2649 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 57 7c 95 e3 e5 d9 b8 52 4a d7 5b 1b 7f 2a ca |GW|.....RJ.[..*.| +peer1.org1.example.com | 00000020 de 36 b3 af 02 20 14 7b 59 42 5f fc de 82 a4 91 |.6... .{YB_.....| +peer1.org2.example.com | [2cc4 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2c0b 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c16440 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 57 36 ea e0 32 de b5 6d ac 33 3f 9a f0 32 c8 7a |W6..2..m.3?..2.z| +peer1.org1.example.com | 00000030 9e 10 21 3b 91 48 0d fa dd 17 37 33 ab 68 b1 3b |..!;.H....73.h.;| +peer1.org2.example.com | [2cc5 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2c0c 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer0.org1.example.com | [264a 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 98 06 f9 87 d9 60 5f 06 9e 17 1a |0D. c.....`_....| +peer1.org1.example.com | 00000040 92 ff b4 50 2d 54 |...P-T| +peer1.org2.example.com | [2cc6 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2c0d 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | 00000010 03 1d 48 68 b2 76 ec 51 36 72 75 cb e0 2c b5 a7 |..Hh.v.Q6ru..,..| +peer1.org1.example.com | [29d3 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [2cc7 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc0560 gate 1598907122434768400 evaluation starts +peer0.org2.example.com | [2c0e 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org1.example.com | 00000020 59 f1 2f 50 02 20 00 ff 95 08 39 9c bc f8 e9 15 |Y./P. ....9.....| +peer1.org1.example.com | [29d4 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0026e7000, header channel_header:"\010\003\032\014\010\362\305\265\372\005\020\330\366\336\310\003\"\017businesschannel*@ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y\nZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r\nuN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE\nyIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV\nHSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO\nPQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030}\357\315\302\232\007\257\034BQH\017\351&]\"\010\252\276J\270\353\250@" +peer1.org2.example.com | [2cc8 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer0.org2.example.com | [2c0f 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c16440 principal matched by identity 0 +peer0.org1.example.com | 00000030 a6 53 67 72 e9 b6 df 11 56 90 e8 92 32 40 4f 45 |.Sgr....V...2@OE| +peer1.org1.example.com | [29d5 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer1.org2.example.com | [2cc9 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc0560 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c10 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 81 6b 67 d9 8c 66 9e 2f 87 63 ea 18 1b 5e 98 9e |.kg..f./.c...^..| +peer0.org1.example.com | 00000040 62 28 71 bf 24 e7 |b(q.$.| +peer1.org1.example.com | [29d6 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer1.org2.example.com | [2cca 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc0560 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | 00000010 51 0c 15 26 e7 86 a4 c9 39 f9 00 9c c2 41 0d 02 |Q..&....9....A..| +peer1.org1.example.com | [29d7 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [264b 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ccb 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc0560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2c11 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ff 73 92 8d 2d fc 78 e6 5d bd b4 |0E.!..s..-.x.]..| +peer1.org1.example.com | [29d8 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [264c 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [264d 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ccc 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc0560 principal evaluation fails +peer1.org1.example.com | [29d9 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] +peer0.org1.example.com | [264e 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ccd 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc0560 gate 1598907122434768400 evaluation fails +peer0.org2.example.com | 00000010 b0 a3 e5 4d 7e a9 70 ca 35 40 20 41 2c f6 40 91 |...M~.p.5@ A,.@.| +peer1.org1.example.com | [29da 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org1.example.com | [264f 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2cce 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000020 c1 b5 67 70 26 02 20 74 f6 e5 46 82 34 46 51 52 |..gp&. t..F.4FQR| +peer1.org1.example.com | [29db 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc0026e1c00 +peer0.org1.example.com | [2650 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ccf 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000030 67 bb 2e 9e 02 40 6e 94 d6 39 3e c3 88 8b 66 73 |g....@n..9>...fs| +peer1.org1.example.com | [29dc 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [b89cbe7a-4e15-4dba-8308-d2c1a8efe4f2] +peer0.org1.example.com | [2651 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [2cd0 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000040 d5 76 7a 3b 7b 49 25 |.vz;{I%| +peer1.org1.example.com | [29dd 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2652 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2cd1 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc0be0 gate 1598907122440093600 evaluation starts +peer0.org2.example.com | [2c12 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c16440 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [29de 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b89cbe7a-4e15-4dba-8308-d2c1a8efe4f2] +peer0.org1.example.com | [2653 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cd2 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc0be0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c13 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c16440 gate 1598907119620670900 evaluation succeeds +peer1.org1.example.com | [29df 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +peer0.org1.example.com | [2654 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2cd3 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc0be0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2c14 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [29e0 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2655 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2cd4 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc0be0 principal matched by identity 0 +peer0.org2.example.com | [2c15 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [29e1 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [003ca90d-2094-4604-b7b2-1cc93ba3d490] +peer0.org1.example.com | [2656 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2cd5 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org2.example.com | [2c16 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [29e2 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2657 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org2.example.com | [2c17 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [29e3 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [003ca90d-2094-4604-b7b2-1cc93ba3d490] +peer0.org1.example.com | [2658 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [2cd6 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer0.org2.example.com | [2c18 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4565 bytes, seq: 3}, Envelope: 4595 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [29e4 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2659 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [2c19 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +peer1.org1.example.com | [29e5 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b124c0 gate 1598907125027553600 evaluation starts +peer0.org1.example.com | [265a 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer0.org2.example.com | [2c1a 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer1.org1.example.com | [29e6 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [265b 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer0.org2.example.com | [2c1b 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer1.org1.example.com | [29e7 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b124c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [265c 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer0.org2.example.com | [2c1c 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org1.example.com | [29e8 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b124c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [265d 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer0.org2.example.com | [2c1d 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +peer1.org1.example.com | [29e9 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b124c0 principal matched by identity 0 +peer0.org1.example.com | [265e 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2cd7 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc0be0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2c1e 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +peer1.org1.example.com | [29ea 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [265f 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2cd8 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc0be0 gate 1598907122440093600 evaluation succeeds +peer0.org2.example.com | [2c1f 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer1.org1.example.com | [29eb 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 46 7a 9a 54 5b d8 01 be 17 f9 fb 54 65 9b c2 |.Fz.T[......Te..| +peer0.org1.example.com | [2660 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2cd9 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c20 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +peer1.org1.example.com | 00000010 6a 2d 25 20 2a 18 aa f1 b2 e3 b9 47 db 8e ab 25 |j-% *......G...%| +peer0.org1.example.com | [2661 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2cda 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c21 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +peer1.org1.example.com | [29ec 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 02 52 70 3b fc a7 0c 50 fb f7 a0 |0D. ;.Rp;...P...| +peer0.org1.example.com | [2662 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2cdb 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2c22 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org1.example.com | 00000010 bc e1 53 83 eb c9 a5 d8 aa 9b 1b 5b 91 4c a8 2d |..S........[.L.-| +peer0.org1.example.com | [2663 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002952800 gate 1598907113725670400 evaluation starts +peer1.org2.example.com | [2cdc 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2c23 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc004b52040 env 0xc004ab6c80 txn 0 +peer1.org1.example.com | 00000020 61 25 a5 ec 02 20 21 e1 95 52 28 ef ca c0 87 1b |a%... !..R(.....| +peer0.org1.example.com | [2664 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002952800 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2cdd 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c24 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004ab6c80 +peer1.org1.example.com | 00000030 c4 b9 39 15 3e 7c 4e e2 b1 b4 5b 4f d7 2e 24 8d |..9.>|N...[O..$.| +peer0.org1.example.com | [2665 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002952800 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2cde 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c25 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\275\305\265\372\005\020\330\242\350\273\001\"\017businesschannel*@d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030V\355\313\252\261:\202\005\2106Z\035\206\003\300n\302A\335 \223\315\362\315" +peer1.org1.example.com | 00000040 9f 7f eb 94 e9 29 |.....)| +peer0.org1.example.com | [2666 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002952800 principal matched by identity 0 +peer0.org2.example.com | [2c26 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [2cdf 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [29ed 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2667 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | [2c27 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [2ce0 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [29ee 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b124c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [2c28 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [29ef 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b124c0 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [2668 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | [2c29 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [29f0 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b124c0 skipping identity 0 because it has already been used +peer1.org2.example.com | [2ce1 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | [2c2a 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [29f1 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b124c0 principal evaluation fails +peer1.org2.example.com | [2ce2 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [29f2 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b124c0 gate 1598907125027553600 evaluation succeeds +peer1.org2.example.com | [2ce3 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [29f3 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [75bb3e42-a250-49ea-bd20-76fde269e336] +peer1.org2.example.com | [2ce4 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [29f4 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [75bb3e42-a250-49ea-bd20-76fde269e336] +peer1.org2.example.com | [2ce5 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc1de0 gate 1598907122443747700 evaluation starts +peer0.org1.example.com | [2669 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002952800 principal evaluation succeeds for identity 0 +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | [29f5 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +peer1.org2.example.com | [2ce6 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc1de0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [266a 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002952800 gate 1598907113725670400 evaluation succeeds +peer0.org2.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [29f6 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b appears to be valid +peer1.org2.example.com | [2ce7 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc1de0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [266b 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | [29f7 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc0026e1c00 +peer1.org2.example.com | [2ce8 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc1de0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [266c 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org1.example.com | [29f8 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc003348100 env 0xc002b5a960 txn 0 +peer1.org2.example.com | [2ce9 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc1de0 principal evaluation fails +peer0.org1.example.com | [266d 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org1.example.com | [29f9 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [2cea 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bc1de0 gate 1598907122443747700 evaluation fails +peer0.org1.example.com | [266e 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | [29fa 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 6ms +peer1.org2.example.com | [2ceb 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [266f 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | [29fb 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [2cec 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org2.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org1.example.com | [29fc 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [2ced 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2670 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org2.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer1.org1.example.com | [29fd 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +peer1.org2.example.com | [2cef 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [29fe 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [2cf0 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org2.example.com | [2c2b 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [29ff 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [2cf1 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org2.example.com | [2c2c 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [2a00 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [2cf2 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org2.example.com | [2c2d 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [2a01 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +peer1.org2.example.com | [2cf3 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba46c0 gate 1598907122445076700 evaluation starts +peer0.org1.example.com | [2671 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org2.example.com | [2c2e 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [2a02 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [2cf4 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba46c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org2.example.com | [2c2f 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 e7 93 52 4d 20 48 5f 66 91 8b fc cc 39 18 f3 |...RM H_f....9..| +peer1.org1.example.com | [2a03 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer1.org2.example.com | [2cf5 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba46c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2672 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | 00000010 ab 30 31 6f 86 19 f3 33 c1 37 13 23 32 7f d5 15 |.01o...3.7.#2...| +peer1.org1.example.com | [2a04 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer1.org2.example.com | [2cf6 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba46c0 principal matched by identity 0 +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | [2a05 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org2.example.com | [2c30 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 2c 62 ac cb 2a ec 5a fd 13 e7 |0E.!..,b..*.Z...| +peer1.org2.example.com | [2cf7 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 cf 8a 13 2d 96 af 0d a3 43 9a c7 8a fa fc 99 |....-....C......| +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org1.example.com | [2a06 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org2.example.com | 00000010 37 92 88 81 15 e1 12 b2 64 18 04 1a 42 b8 ea 7e |7.......d...B..~| +peer1.org2.example.com | 00000010 34 7b 05 a5 a5 40 07 bd 54 03 0c 04 9a 78 67 f8 |4{...@..T....xg.| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org1.example.com | [2a07 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org2.example.com | 00000020 09 25 0c b1 3f 02 20 73 43 54 f1 e5 d4 0d 2e 2e |.%..?. sCT......| +peer1.org2.example.com | [2cf8 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 a1 4c 0a 67 7e 1a d0 31 5a a1 66 |0D. &.L.g~..1Z.f| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org1.example.com | [2a08 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | 00000030 08 f9 2b df dd 4b cf cb ee a4 66 5c 1c 4d 8f 79 |..+..K....f\.M.y| +peer0.org1.example.com | [2673 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a09 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | 00000040 73 ba e7 6f 4b 96 21 |s..oK.!| +peer0.org1.example.com | [2674 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 eb 04 3b cb 2c 86 f3 5d e6 13 60 e9 33 0b a5 2c |..;.,..]..`.3..,| +peer1.org1.example.com | [2a0a 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] marked as valid by state validator +peer0.org2.example.com | [2c31 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2675 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000020 e6 fd 46 1d 02 20 64 ad 46 15 a1 70 53 87 e7 4b |..F.. d.F..pS..K| +peer1.org1.example.com | [2a0b 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0033491c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc003349200)} +peer0.org2.example.com | [2c32 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0049fb500, header channel_header:"\010\003\032\014\010\275\305\265\372\005\020\330\242\350\273\001\"\017businesschannel*@d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030V\355\313\252\261:\202\005\2106Z\035\206\003\300n\302A\335 \223\315\362\315" +peer0.org1.example.com | [2676 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000030 62 ef ac ea 5b 6e 6c af 6d e6 7e ef 41 94 6a d0 |b...[nl.m.~.A.j.| +peer1.org1.example.com | [2a0c 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [2c33 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org1.example.com | [2677 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 8c ff 4e a6 27 3b |..N.';| +peer1.org1.example.com | [2a0d 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [2c34 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org1.example.com | [2678 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2cf9 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba46c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2cfa 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba46c0 gate 1598907122445076700 evaluation succeeds +peer0.org2.example.com | [2c35 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [2679 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2cfb 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [2a0e 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [2c36 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [267a 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2cfc 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [2a0f 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +peer0.org2.example.com | [2c37 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] +peer0.org1.example.com | [267b 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e840 gate 1598907113727204500 evaluation starts +peer1.org2.example.com | [2cfd 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [2a10 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +peer0.org2.example.com | [2c38 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org1.example.com | [267c 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e840 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2cfe 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [2a11 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +peer0.org2.example.com | [2c39 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc004c34000 +peer0.org1.example.com | [267d 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e840 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2cee 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2a12 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2c3a 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +peer0.org1.example.com | [267e 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e840 principal matched by identity 0 +peer1.org2.example.com | [2cff 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer1.org1.example.com | [2a13 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c3b 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [267f 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | [2d00 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer1.org1.example.com | [2a14 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2c3c 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [2d01 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org1.example.com | [2a15 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2c3d 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2680 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | [2d02 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [4], peers number [3] +peer1.org1.example.com | [2a16 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c3e 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | [2d03 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4025 bytes, seq: 4}, Envelope: 4055 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [2a17 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2c3f 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | [2d04 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +peer1.org1.example.com | [2a18 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c40 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | [2d06 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +peer1.org1.example.com | [2a19 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c41 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [2d05 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bda350 gate 1598907122445764800 evaluation starts +peer1.org1.example.com | [2a1a 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2c42 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [1e19a69e-907f-4fae-b1d5-f7057e2f316e] +peer0.org1.example.com | [2681 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e840 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2d07 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +peer1.org1.example.com | [2a1b 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2c43 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1e19a69e-907f-4fae-b1d5-f7057e2f316e] +peer0.org1.example.com | [2682 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e840 gate 1598907113727204500 evaluation succeeds +peer1.org2.example.com | [2d09 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer1.org1.example.com | [2a1c 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2c44 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c42900 gate 1598907119639241200 evaluation starts +peer0.org1.example.com | [2683 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d08 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bda350 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2a1d 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029be3d0 gate 1598907125033276500 evaluation starts +peer0.org2.example.com | [2c45 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c42900 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2684 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d0a 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bda350 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2a1e 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029be3d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c46 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c42900 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2685 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2d0c 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bda350 principal matched by identity 0 +peer1.org1.example.com | [2a1f 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029be3d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2c47 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c42900 principal matched by identity 0 +peer0.org1.example.com | [2686 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2d0d 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer1.org1.example.com | [2a20 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029be3d0 principal matched by identity 0 +peer0.org2.example.com | [2c48 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af eb 7f a3 db 22 e8 0d 9a d4 d1 20 96 0f 3c a1 |....."..... ..<.| +peer0.org1.example.com | [2687 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer1.org1.example.com | [2a21 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f c6 c4 e1 15 cf cc 1c 60 63 d0 7b a3 8e 99 33 |O.......`c.{...3| +peer0.org2.example.com | 00000010 6d 3c b5 6c 57 73 9b 9f 14 94 e8 bb e2 63 0f 70 |m<.lWs.......c.p| +peer0.org1.example.com | [2688 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d0e 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer1.org1.example.com | 00000010 d1 2e f8 33 b8 58 69 18 fb 93 4e 34 6e 55 52 13 |...3.Xi...N4nUR.| +peer0.org2.example.com | [2c49 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 9e de 14 79 6b bb 35 05 3c 5e 10 |0D. ....yk.5.<^.| +peer0.org1.example.com | [2689 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer1.org1.example.com | [2a22 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 ca 6b f5 11 7c d3 ad ea a2 91 |0E.!...k..|.....| +peer0.org2.example.com | 00000010 a4 a7 85 1b 9d 1a cd 2f 44 6a f8 e7 d1 d9 09 57 |......./Dj.....W| +peer0.org1.example.com | [268a 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer1.org1.example.com | 00000010 c5 90 bd 9a 4f 50 b0 6d e6 39 cc a1 5d 23 8c b6 |....OP.m.9..]#..| +peer0.org2.example.com | 00000020 86 77 95 7f 02 20 58 40 5c 3a 8a 19 c9 55 67 dc |.w... X@\:...Ug.| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org2.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer1.org1.example.com | 00000020 8d 6b 62 36 c8 02 20 5c f5 1f f7 c0 ab 13 da c4 |.kb6.. \........| +peer0.org2.example.com | 00000030 08 c2 c0 81 54 ed 1d 24 ff 27 23 be f1 bd 82 74 |....T..$.'#....t| +peer0.org1.example.com | [268b 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org2.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer1.org1.example.com | 00000030 71 d6 00 98 84 08 89 a8 9c d0 7f bf 7e 91 03 6c |q...........~..l| +peer0.org2.example.com | 00000040 b6 99 5b 8b f1 bd |..[...| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | [2d0f 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bda350 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000040 9d 77 b0 d8 73 84 be |.w..s..| +peer0.org2.example.com | [2c4a 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c42900 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | [2d10 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bda350 gate 1598907122445764800 evaluation succeeds +peer1.org1.example.com | [2a23 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029be3d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2c4b 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c42900 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | [2d11 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2a24 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029be3d0 gate 1598907125033276500 evaluation succeeds +peer0.org2.example.com | [2c4c 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c42900 skipping identity 0 because it has already been used +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [2d12 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2a25 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c4d 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c42900 principal evaluation fails +peer0.org1.example.com | [268c 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | [2d13 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2a26 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2c4e 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c42900 gate 1598907119639241200 evaluation succeeds +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [2d14 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2a27 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2c4f 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +peer0.org1.example.com | [268d 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | [2d15 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +peer1.org1.example.com | [2a28 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2c50 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer0.org2.example.com | [2c51 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer1.org2.example.com | 00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +peer1.org1.example.com | [2a29 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2c52 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +peer0.org2.example.com | [2c53 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +peer0.org2.example.com | [2c54 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [92ca842e-5468-453e-81ef-6c2c0e3f3966] +peer0.org2.example.com | [2c55 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [2c56 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [92ca842e-5468-453e-81ef-6c2c0e3f3966] +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | [2d16 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +peer1.org1.example.com | [2a2a 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2c57 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | 00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +peer1.org1.example.com | [2a2b 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2c58 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [f5cc23f7-31ff-4e60-8d87-e690d8cbdb8d] +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | 00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +peer1.org1.example.com | [2a2c 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2c59 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | 00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +peer1.org1.example.com | [2a2d 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2c5a 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f5cc23f7-31ff-4e60-8d87-e690d8cbdb8d] +peer0.org1.example.com | [268e 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [268f 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2a2e 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a2f 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2690 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2a30 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 95 10 dc 3c 55 b0 |... DEBU Exiting +peer0.org1.example.com | [2691 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a31 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +peer1.org2.example.com | [2d18 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer0.org2.example.com | [2c5b 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43850 gate 1598907119668657900 evaluation starts +peer0.org1.example.com | [2692 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a32 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d19 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c5c 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43850 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2693 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2a33 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d1a 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c5d 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43850 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2694 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2d1b 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c5e 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +peer0.org1.example.com | [2695 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2d1c 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2a34 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c5f 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +peer0.org1.example.com | [2696 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002878a50 gate 1598907113733917100 evaluation starts +peer1.org2.example.com | [2d1d 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a35 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c60 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [2697 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002878a50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d1e 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2a36 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2698 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002878a50 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2d1f 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2a37 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2699 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002878a50 principal matched by identity 0 +peer1.org2.example.com | [2d20 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2a38 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c61 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [2c62 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +peer1.org2.example.com | [2d21 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2a39 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2c63 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [269a 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | [2d22 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bdbe90 gate 1598907122459972500 evaluation starts +peer1.org1.example.com | [2a3a 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c64 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43850 principal matched by identity 0 +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [2d23 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bdbe90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2a3b 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2c65 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 e7 93 52 4d 20 48 5f 66 91 8b fc cc 39 18 f3 |...RM H_f....9..| +peer0.org1.example.com | [269b 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | [2d24 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bdbe90 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2a3c 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 ab 30 31 6f 86 19 f3 33 c1 37 13 23 32 7f d5 15 |.01o...3.7.#2...| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | [2d25 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bdbe90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2a3d 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c66 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 2c 62 ac cb 2a ec 5a fd 13 e7 |0E.!..,b..*.Z...| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | [2d26 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bdbe90 principal evaluation fails +peer1.org1.example.com | [2a3e 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 37 92 88 81 15 e1 12 b2 64 18 04 1a 42 b8 ea 7e |7.......d...B..~| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | [2d27 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bdbe90 gate 1598907122459972500 evaluation fails +peer1.org1.example.com | [2a3f 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 09 25 0c b1 3f 02 20 73 43 54 f1 e5 d4 0d 2e 2e |.%..?. sCT......| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [2d28 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a40 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0xdc, 0x42, 0xca, 0x8d, 0x6b, 0x16, 0xf2, 0x93, 0x4, 0x29, 0x62, 0xf1, 0xe4, 0x9, 0xe8, 0xbf, 0x83, 0x51, 0xc9, 0xc7, 0x8b, 0xc4, 0x6, 0xa4, 0xd3, 0x7b, 0x3d, 0x42, 0xb5, 0xa5, 0x4, 0x73} txOffsets= +peer0.org2.example.com | 00000030 08 f9 2b df dd 4b cf cb ee a4 66 5c 1c 4d 8f 79 |..+..K....f\.M.y| +peer0.org1.example.com | [269c 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002878a50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2d29 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | txId=ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b locPointer=offset=70, bytesLength=2980 +peer0.org2.example.com | 00000040 73 ba e7 6f 4b 96 21 |s..oK.!| +peer0.org1.example.com | [269d 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002878a50 gate 1598907113733917100 evaluation succeeds +peer1.org2.example.com | [2d2a 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | ] +peer0.org2.example.com | [2c67 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43850 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [269e 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d2b 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c08400 gate 1598907122461155700 evaluation starts +peer0.org2.example.com | [2c68 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43850 signed by 1 principal evaluation starts (used [true]) +peer1.org1.example.com | [2a41 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93575, bytesLength=2980] for tx ID: [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] to txid-index +peer0.org1.example.com | [269f 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d2c 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c08400 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c69 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43850 skipping identity 0 because it has already been used +peer1.org1.example.com | [2a42 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93575, bytesLength=2980] for tx number:[0] ID: [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] to blockNumTranNum index +peer0.org1.example.com | [26a0 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2d2d 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c08400 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2c6a 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43850 principal evaluation fails +peer1.org1.example.com | [2a43 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97548], isChainEmpty=[false], lastBlockNumber=[5] +peer0.org1.example.com | [26a1 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2d2e 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c08400 principal matched by identity 0 +peer0.org2.example.com | [2c6b 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43850 gate 1598907119668657900 evaluation succeeds +peer1.org1.example.com | [2a44 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +peer0.org1.example.com | [26a2 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d2f 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer0.org2.example.com | [2c6c 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +peer1.org1.example.com | [2a45 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +peer0.org1.example.com | [26a3 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer0.org2.example.com | [2c6d 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a appears to be valid +peer1.org1.example.com | [2a46 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +peer0.org1.example.com | [26a4 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2d30 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer0.org2.example.com | [2c6e 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc004c34000 +peer1.org1.example.com | [2a47 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [26a5 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer0.org2.example.com | [2c6f 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc004b52040 env 0xc004ab6c80 txn 0 +peer1.org1.example.com | [2a48 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [26a6 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer0.org2.example.com | [2c70 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | [2a49 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [26a7 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer0.org2.example.com | [2c71 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 54ms +peer1.org1.example.com | [2a4a 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [26a8 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer0.org2.example.com | [2c72 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org1.example.com | [2a4b 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [26a9 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2d31 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c08400 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2c73 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | [2a4c 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org1.example.com | [26aa 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002879c60 gate 1598907113734743800 evaluation starts +peer1.org2.example.com | [2d32 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c08400 gate 1598907122461155700 evaluation succeeds +peer0.org2.example.com | [2c74 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +peer1.org1.example.com | [2a4d 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org1.example.com | [26ab 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002879c60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d33 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c75 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [2a4e 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [26ac 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002879c60 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2d34 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2c76 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [2a50 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [26ad 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002879c60 principal matched by identity 0 +peer1.org2.example.com | [2d35 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2c77 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [2a51 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +peer0.org1.example.com | [26ae 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | [2d36 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2c78 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +peer1.org1.example.com | [2a52 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [2d37 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c79 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [2a53 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +peer0.org1.example.com | [26af 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | [2d38 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c7a 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer1.org1.example.com | [2a54 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | [2d39 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2c7b 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [2a55 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | [2d3a 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c7c 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +peer1.org1.example.com | [2a4f 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | [2d3b 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c7d 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] marked as valid by state validator +peer1.org1.example.com | [2a56 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [2d3c 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2a57 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +peer0.org2.example.com | [2c7e 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc004bc2bc0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc004bc2c00), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc004bc2c40)} +peer0.org1.example.com | [26b0 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002879c60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2d3d 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2a58 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +peer0.org2.example.com | [2c7f 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [26b1 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002879c60 gate 1598907113734743800 evaluation succeeds +peer1.org2.example.com | [2d3e 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2a59 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +peer0.org2.example.com | [2c80 08-31 20:51:59.68 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [26b2 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d3f 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c09600 gate 1598907122465842200 evaluation starts +peer1.org1.example.com | [2a5a 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 42ms (state_validation=0ms block_and_pvtdata_commit=24ms state_commit=15ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +peer0.org2.example.com | [2c81 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [26b3 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2d40 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c09600 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2a5b 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2c82 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc004bebe00)}} +peer0.org1.example.com | [26b4 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2d41 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c09600 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2a5c 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408D8CA91B5F7AF9D9816...08061A0C0A0565787030321203312E30 +peer0.org2.example.com | [2c83 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +peer0.org1.example.com | [26b5 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2d42 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c09600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2a5d 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7FA0E8D904BEE76E69F7F65EB6E538597148B78DB182ABCB5F356BD7ABA1CE18 +peer0.org2.example.com | [2c84 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org1.example.com | [26b6 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d43 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c09600 principal evaluation fails +peer1.org1.example.com | [2a5e 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +peer0.org2.example.com | [2c85 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer0.org1.example.com | [26b7 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d44 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c09600 gate 1598907122465842200 evaluation fails +peer1.org1.example.com | [2a5f 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2c86 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer0.org1.example.com | [26b8 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d0b 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +peer1.org1.example.com | [2a60 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2c87 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +peer0.org1.example.com | [26b9 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d45 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +peer1.org1.example.com | [2a61 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2c88 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer0.org1.example.com | [26ba 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d46 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [2c89 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +peer1.org1.example.com | [2a62 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2d47 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26bb 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2c8a 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [2a63 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d48 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26bc 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c8b 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{Org2MSP {[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 77 114 85 53 109 108 114 103 84 49 82 104 120 79 108 113 83 65 121 80 83 99 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 70 102 72 121 75 118 101 70 56 113 81 10 52 54 73 90 51 80 88 97 97 57 49 118 101 113 83 111 97 99 98 86 119 52 69 80 106 120 111 47 118 43 70 105 86 50 50 108 101 86 114 86 80 98 88 47 109 82 86 104 69 52 86 67 78 51 69 122 113 49 109 112 43 66 79 81 10 83 80 110 55 109 77 86 43 74 50 50 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 67 110 50 107 48 100 57 99 113 107 109 97 75 87 79 54 122 51 114 55 49 101 65 115 43 85 75 108 76 83 68 103 107 65 65 71 98 67 112 48 86 85 57 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 66 115 112 70 108 117 53 110 90 88 109 49 83 112 49 70 85 72 69 47 89 111 108 57 68 117 102 85 104 115 54 79 109 76 102 82 75 117 83 83 119 121 106 65 105 65 97 88 107 87 87 10 104 98 89 77 116 53 73 103 68 97 77 51 83 70 86 47 107 54 49 71 77 120 84 112 75 68 103 90 71 71 117 103 72 78 68 68 108 103 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 209 249 96 165 255 148 172 137 87 113 137 203 84 50 150 236 233 15 57 176 145 169 87 178 241 182 108 236 189 132 124 207 2 32 23 118 151 205 102 151 12 224 234 165 232 18 168 69 249 76 154 172 173 96 228 242 19 254 39 200 25 65 181 173 87 3]} 0x151a150}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc002786f30 0xc0026777a0 {{0 0} 0 0 0 0} {false}})]} +peer1.org1.example.com | [2a64 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d49 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26bd 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c8c 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer1.org1.example.com | [2a65 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d4a 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26be 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2c8d 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc0001ec0a0})} +peer1.org1.example.com | [2a66 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d4b 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4025 bytes, seq: 4}, Envelope: 4055 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [26bf 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2c8e 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +peer1.org1.example.com | [2a67 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2d4c 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26c0 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2c8f 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +peer1.org1.example.com | [2a68 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26c1 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282b0d0 gate 1598907113735591000 evaluation starts +peer1.org2.example.com | [2d4d 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2c90 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +peer1.org1.example.com | [2a69 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [26c2 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282b0d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d4e 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4025 bytes, seq: 4}, Envelope: 4055 bytes, Signature: 0 bytes +peer0.org2.example.com | [2c91 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +peer1.org1.example.com | [2a6a 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [26c3 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282b0d0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2d4f 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2a6b 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2c92 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0x62, 0xc8, 0x94, 0xe0, 0x8d, 0xe8, 0xc7, 0x50, 0xec, 0x14, 0xce, 0xf7, 0xf6, 0x41, 0xb9, 0x45, 0x45, 0x74, 0xf1, 0x40, 0xf4, 0xb9, 0x19, 0x48, 0x1a, 0x35, 0x67, 0xf7, 0x3c, 0xf, 0xe3, 0xf2} txOffsets= +peer0.org1.example.com | [26c4 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282b0d0 principal matched by identity 0 +peer1.org2.example.com | [2d51 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a6c 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | txId=d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a locPointer=offset=70, bytesLength=3520 +peer0.org1.example.com | [26c5 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer1.org2.example.com | [2d52 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a6d 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | ] +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer1.org2.example.com | [2d53 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2a6e 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2c93 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84957, bytesLength=3520] for tx ID: [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] to txid-index +peer0.org1.example.com | [26c6 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org2.example.com | [2d54 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba5df0 gate 1598907122467858900 evaluation starts +peer1.org1.example.com | [2a6f 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d3560 gate 1598907125086356000 evaluation starts +peer0.org2.example.com | [2c94 08-31 20:51:59.69 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84957, bytesLength=3520] for tx number:[0] ID: [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] to blockNumTranNum index +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer1.org2.example.com | [2d55 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba5df0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2a70 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d3560 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2c95 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89474], isChainEmpty=[false], lastBlockNumber=[3] +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer1.org2.example.com | [2d56 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba5df0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2a71 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d3560 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2c96 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer1.org2.example.com | [2d57 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba5df0 principal matched by identity 0 +peer1.org1.example.com | [2a72 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d3560 principal matched by identity 0 +peer0.org2.example.com | [2c97 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [2d58 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer1.org1.example.com | [2a73 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e 74 70 5f 69 da ef 58 05 f1 9d 10 2e d6 70 |..tp_i..X......p| +peer0.org2.example.com | [2c98 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +peer0.org1.example.com | [26c7 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282b0d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer1.org1.example.com | 00000010 3a de 14 88 17 ee d0 42 51 d5 a6 46 8d f5 8c 3d |:......BQ..F...=| +peer0.org2.example.com | [2c99 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [26c8 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282b0d0 gate 1598907113735591000 evaluation succeeds +peer1.org2.example.com | [2d59 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer1.org1.example.com | [2a74 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a c0 56 b6 72 65 1b f5 d5 29 c0 a2 |0D. *.V.re...)..| +peer0.org2.example.com | [2c9a 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [26c9 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer1.org1.example.com | 00000010 58 56 5c 65 a7 0b 2c 94 80 c5 ce 83 ac be f6 54 |XV\e..,........T| +peer0.org2.example.com | [2c9b 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [26ca 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer1.org1.example.com | 00000020 2f 31 e3 48 02 20 5b 2a ae cd 07 ba a2 8e 32 f3 |/1.H. [*......2.| +peer0.org2.example.com | [2c9c 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [26cb 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer1.org1.example.com | 00000030 dd 1c 0d 2d 4b c6 ed e9 22 79 c7 aa 01 3d 20 6f |...-K..."y...= o| +peer0.org2.example.com | [2c9d 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org1.example.com | [26cc 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer1.org1.example.com | 00000040 8b 81 64 ef ec 80 |..d...| +peer0.org2.example.com | [2c9e 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org1.example.com | [26cd 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | [2d50 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc004931400 env 0xc004c0a640 txn 0 +peer1.org1.example.com | [2a75 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d3560 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2c9f 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [2d5b 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004c0a640 +peer1.org1.example.com | [2a76 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d3560 gate 1598907125086356000 evaluation succeeds +peer0.org2.example.com | [2ca0 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [26ce 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | [2d5a 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba5df0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2a77 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ca1 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [238c1b0a-f1ee-422b-8088-4d3db42dd8c9] +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | [2d5c 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ba5df0 gate 1598907122467858900 evaluation succeeds +peer1.org1.example.com | [2a78 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ca2 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | [2d5d 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2a79 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2ca3 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | [2d5e 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2a7a 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2ca4 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | [2d5f 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2a7b 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2ca5 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [238c1b0a-f1ee-422b-8088-4d3db42dd8c9] +peer0.org1.example.com | [26cf 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d60 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2a7c 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2ca6 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +peer0.org1.example.com | [26d0 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d61 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\360\305\265\372\005\020\214\243\205\302\001\"\017businesschannel*@a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\027\010\177\221psw\030\236\237*T\302`\367\254+Q\2323-$v\360" +peer1.org1.example.com | [2a7d 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2ca7 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [26d1 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2d62 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [2a7e 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2ca8 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408B0BECFA2F8AF9D9816...08031A0C0A0565787030321203312E30 +peer0.org1.example.com | [26d2 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d63 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [2a7f 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2ca9 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FABF8B06E39C3571EF383F21F854371C0CFCE0685EEA1872AD923441C8424F7 +peer0.org1.example.com | [26d3 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2d64 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [2a80 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2caa 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer0.org1.example.com | [26d4 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2d65 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [2a81 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cab 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +peer0.org1.example.com | [26d5 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2d66 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [2a82 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cac 08-31 20:51:59.70 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [26d6 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2d67 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 36 4f 61 9a cb be 2c 0e 7c f3 d3 0a ae 63 b0 |.6Oa...,.|....c.| +peer1.org1.example.com | [2a83 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [2cad 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +peer0.org1.example.com | [26d7 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027829d0 gate 1598907113739898200 evaluation starts +peer1.org2.example.com | 00000010 cb df 45 66 c7 92 ad 14 79 e7 5b 4f 81 2e ae 1c |..Ef....y.[O....| +peer1.org1.example.com | [2a84 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cae 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +peer0.org1.example.com | [26d8 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027829d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2d68 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b 6a 46 c8 38 65 ff 3e 84 0d 72 0a |0D. +jF.8e.>..r.| +peer1.org1.example.com | [2a85 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2caf 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +peer0.org1.example.com | [26d9 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027829d0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | 00000010 1b 71 b6 da 55 29 15 fa 20 ed 85 cd e5 54 13 8e |.q..U).. ....T..| +peer1.org1.example.com | [2a86 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cb0 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +peer1.org2.example.com | 00000020 73 d7 49 c1 02 20 55 36 0c 7d d4 d5 f6 0a a0 75 |s.I.. U6.}.....u| +peer0.org1.example.com | [26da 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027829d0 principal matched by identity 0 +peer1.org1.example.com | [2a87 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2cb1 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +peer1.org2.example.com | 00000030 26 3b e5 cd d5 60 48 c1 e0 09 21 1b f6 c1 c2 bb |&;...`H...!.....| +peer0.org1.example.com | [26db 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org1.example.com | [2a88 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" > alive: +peer0.org2.example.com | [2cb2 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 32ms (state_validation=9ms block_and_pvtdata_commit=10ms state_commit=6ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +peer0.org2.example.com | [2cb3 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org1.example.com | [2a89 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [2cb4 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408B0BECFA2F8AF9D9816...08041A0C0A0565787030321203312E30 +peer0.org1.example.com | [26dc 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | 00000040 35 e0 49 3f d9 2c |5.I?.,| +peer1.org1.example.com | [2a8a 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cb5 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 04BFBF42D600CC11F8B6752F5C1CBCD70AA3CEEB311BEA535A742979AE159A87 +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | [2d69 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [2a8b 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [2cb6 08-31 20:51:59.71 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | [2a8c 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2d6a 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0038a7000, header channel_header:"\010\003\032\014\010\360\305\265\372\005\020\214\243\205\302\001\"\017businesschannel*@a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\027\010\177\221psw\030\236\237*T\302`\367\254+Q\2323-$v\360" +peer0.org2.example.com | [2cb7 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | [2a8d 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2d6b 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org2.example.com | [2cb8 08-31 20:52:00.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [2a8e 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2d6c 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org2.example.com | [2cb9 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [26dd 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027829d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2a8f 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [2d6d 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org2.example.com | [2cba 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [26de 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027829d0 gate 1598907113739898200 evaluation succeeds +peer1.org1.example.com | [2a90 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2d6e 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [2cbb 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 4a 59 80 bf f6 e9 23 49 e1 8b 23 95 c6 f2 df |.JY....#I..#....| +peer0.org1.example.com | [26df 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a91 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d6f 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] +peer0.org2.example.com | 00000010 5a ca db 3c 6a ed 08 ab 3b 3c 88 f7 07 06 a1 f1 |Z.. DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2a92 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d70 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org2.example.com | [2cbc 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab cb 40 e8 42 ee 4e 0c f8 8a 6a |0E.!...@.B.N...j| +peer0.org1.example.com | [26e1 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2a93 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d71 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc0002f6800 +peer0.org2.example.com | 00000010 dd 71 e2 81 d1 85 f4 2f d0 f5 0d f4 51 72 d2 9b |.q...../....Qr..| +peer0.org1.example.com | [26e2 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2a94 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d72 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [72e3ec5e-4b28-4e83-b62d-75dee3a24f31] +peer0.org2.example.com | 00000020 ce a7 b1 81 a3 02 20 0d a2 9c 0a a2 6d 1f 0b 7c |...... .....m..|| +peer0.org1.example.com | [26e3 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org1.example.com | [2a95 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d73 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | 00000030 48 c3 20 ab 22 14 8d ef 09 aa 62 5e 64 74 cc e2 |H. .".....b^dt..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer1.org1.example.com | [2a96 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d74 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [72e3ec5e-4b28-4e83-b62d-75dee3a24f31] +peer0.org2.example.com | 00000040 8d ce db f4 c1 a1 7d |......}| +peer0.org1.example.com | [26e4 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer1.org1.example.com | [2a97 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d75 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +peer0.org2.example.com | [2cbd 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org1.example.com | [2a98 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d76 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [caf93a38-8036-46a5-a20a-692093e4b78c] +peer0.org2.example.com | [2cbe 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | [2d77 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [caf93a38-8036-46a5-a20a-692093e4b78c] +peer1.org1.example.com | [2a99 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2cbf 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | [2d78 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3ec00 gate 1598907122479514000 evaluation starts +peer1.org1.example.com | [2a9a 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cc0 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [2d79 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3ec00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2a9b 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2cc1 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [26e5 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d7a 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3ec00 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2a9c 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2cc2 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26e6 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer1.org2.example.com | [2d7b 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3ec00 principal matched by identity 0 +peer1.org1.example.com | [2a9d 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [2cc3 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26e7 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer1.org2.example.com | [2d7c 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c d1 4f 8e 83 45 bc 08 e9 72 bf 23 62 2d 37 ed |..O..E...r.#b-7.| +peer1.org1.example.com | [2a9e 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cc4 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26e8 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000010 c8 e0 4d 7a a2 57 f9 4d 8a ba ef 95 bb 58 8c 53 |..Mz.W.M.....X.S| +peer1.org1.example.com | [2a9f 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2cc5 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26e9 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D9816100C1801 +peer1.org2.example.com | [2d7d 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 06 0c 41 8e ee ef 15 ef 93 13 |0E.!....A.......| +peer1.org1.example.com | [2aa0 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161031 +peer0.org2.example.com | [2cc6 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26ea 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EF15E766FEBEC26025B398829F21C3E26A58694F87BA153B5317C1F7A8B94937 +peer1.org2.example.com | 00000010 7c 65 7d 52 64 ed d7 c8 0e 65 27 49 00 5b 7d 28 ||e}Rd....e'I.[}(| +peer1.org1.example.com | [2aa1 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F6E5E9A6FB05578BD38E51F768A57E34B676B412BE3BBF819239F326088E3DF9 +peer0.org2.example.com | [2cc7 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26eb 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer1.org2.example.com | 00000020 0e f5 f9 19 61 02 20 40 2b bc 92 d7 d4 6d cf c9 |....a. @+....m..| +peer1.org1.example.com | [2aa2 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2cc8 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [26ec 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 d6 0e 22 a0 7e f6 ca 0f b1 46 b6 f5 ff a4 df 94 |..".~....F......| +peer1.org1.example.com | [2aa3 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2cc9 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [26ed 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 74 af d9 d4 da 20 6d |t.... m| +peer1.org1.example.com | [2aa4 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org2.example.com | [2cca 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [26ee 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d7e 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3ec00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2aa5 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [2ccb 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [26ef 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d7f 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3ec00 signed by 1 principal evaluation starts (used [true]) +peer1.org1.example.com | [2aa6 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ccc 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26f0 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2d80 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3ec00 skipping identity 0 because it has already been used +peer1.org1.example.com | [2aa7 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ccd 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [26f1 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d81 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3ec00 principal evaluation fails +peer1.org1.example.com | [2aa8 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cce 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26f2 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d82 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c3ec00 gate 1598907122479514000 evaluation succeeds +peer1.org1.example.com | [2aa9 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ccf 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [26f3 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [2d83 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [68d32f61-186f-46dc-8468-d722b53db27c] +peer1.org1.example.com | [2aaa 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cd0 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26f4 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d85 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [68d32f61-186f-46dc-8468-d722b53db27c] +peer1.org1.example.com | [2aab 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2cd1 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [26f5 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d86 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +peer1.org1.example.com | [2aac 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cd2 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26f6 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d84 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer1.org1.example.com | [2aad 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2cd3 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [26f7 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer1.org1.example.com | [2aae 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cd4 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26f8 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d87 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer1.org1.example.com | [2aaf 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2cd5 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [26f9 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer1.org1.example.com | [2ab0 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2cd6 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26fa 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer1.org1.example.com | [2ab1 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cd7 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [26fb 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer1.org1.example.com | [2ab2 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2cd8 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [26fc 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer1.org1.example.com | [2ab3 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cd9 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [26fd 08-31 20:51:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d88 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d appears to be valid +peer1.org1.example.com | [2ab4 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [26fe 08-31 20:51:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org2.example.com | [2cda 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2d89 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc0002f6800 +peer1.org1.example.com | [2ab5 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ab6 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [26ff 08-31 20:51:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d8a 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc004931400 env 0xc004c0a640 txn 0 +peer0.org1.example.com | [2700 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2cdb 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ab7 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161032 +peer1.org2.example.com | [2d8b 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [2701 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cdc 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2ab8 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AF10078FE42B022D3EFC4748D68F49ADF2D841EABD9965159384FBF23E698D88 +peer1.org2.example.com | [2d8c 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +peer0.org1.example.com | [2702 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cdd 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2ab9 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +peer0.org1.example.com | [2703 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cde 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2aba 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2d8d 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +peer0.org1.example.com | [2704 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2cdf 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2abb 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | 00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +peer0.org1.example.com | [2705 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ce0 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2abc 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" secret_envelope:*\013\311\005\177A\351\327t" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +peer0.org1.example.com | [2706 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [2ce1 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2abe 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" secret_envelope:*\013\311\005\177A\351\327t" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +peer0.org1.example.com | [2707 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ce2 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ce4b70 gate 1598907120299185600 evaluation starts +peer1.org1.example.com | [2abf 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 95 10 dc 3c 55 b0 |... DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ce3 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ce4b70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2abd 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d8e 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 17ms +peer0.org1.example.com | [2709 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ce4 08-31 20:52:00.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ce4b70 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2ac0 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2d8f 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [270a 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ce5 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ce4b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2ac1 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d90 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [270b 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ce6 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ce4b70 principal evaluation fails +peer1.org1.example.com | [2ac2 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d91 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +peer0.org1.example.com | [270c 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ce7 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ce4b70 gate 1598907120299185600 evaluation fails +peer1.org1.example.com | [2ac3 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d92 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [270d 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ce8 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ac4 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2d93 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [270e 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ce9 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ac5 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [270f 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [2d94 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [2cea 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2ac6 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2710 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d95 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +peer0.org2.example.com | [2ceb 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ce50e0 gate 1598907120303332500 evaluation starts +peer1.org1.example.com | [2ac7 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [2711 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d96 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [2cec 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ce50e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2ac8 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [2712 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d97 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org2.example.com | [2ced 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ce50e0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2ac9 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2713 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d98 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org2.example.com | [2cee 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ce50e0 principal matched by identity 0 +peer1.org1.example.com | [2aca 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [2714 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2d99 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [2cef 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb a9 e5 9d 18 1a f9 4f 64 2e 97 bd 6d 8b 9a 14 |.......Od...m...| +peer1.org1.example.com | [2acb 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2715 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2d9a 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org2.example.com | 00000010 1c cd 93 93 b8 ef ce f5 70 5d d8 43 42 d7 92 41 |........p].CB..A| +peer1.org1.example.com | [2acc 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 10 07 8f e4 2b 02 2d 3e fc 47 48 d6 8f 49 ad |.....+.->.GH..I.| +peer0.org1.example.com | [2716 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2d9c 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2cf0 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb ac 70 4b 10 24 5c 54 64 f0 ff |0E.!...pK.$\Td..| +peer1.org1.example.com | 00000010 f2 d8 41 ea bd 99 65 15 93 84 fb f2 3e 69 8d 88 |..A...e.....>i..| +peer0.org1.example.com | [2717 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2d9b 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | 00000010 f8 51 bb a2 78 d4 97 29 15 da e8 c8 5a a3 ba 4c |.Q..x..)....Z..L| +peer1.org1.example.com | [2acd 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 ee 06 3e b8 e0 d4 82 23 2c 60 aa |0D. C..>....#,`.| +peer0.org1.example.com | [2718 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2d9d 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | 00000020 73 1c f3 07 33 02 20 69 f5 a7 f1 70 42 00 28 fe |s...3. i...pB.(.| +peer1.org1.example.com | 00000010 9d e7 9e 39 08 8f b3 1f 87 55 47 87 62 d9 88 a3 |...9.....UG.b...| +peer0.org1.example.com | [2719 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2d9e 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | 00000030 ad 0d bf a9 c5 4f 53 eb 33 df ee 95 00 95 f6 a1 |.....OS.3.......| +peer1.org1.example.com | 00000020 5f 1f ee 65 02 20 1d 6c fd 2c 4b 23 d7 eb bc 62 |_..e. .l.,K#...b| +peer0.org1.example.com | [271a 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2d9f 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] marked as valid by state validator +peer0.org2.example.com | 00000040 c0 09 7e 8f ad e2 9b |..~....| +peer1.org1.example.com | 00000030 be 76 b0 77 85 48 ce da cd 6f d0 2b 60 ab bc 00 |.v.w.H...o.+`...| +peer0.org1.example.com | [271b 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2da0 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc004ba3540), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc004ba3580)} +peer0.org2.example.com | [2cf1 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ce50e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000040 5c 73 bc 0e 0d 58 |\s...X| +peer0.org1.example.com | [271c 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2da1 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [2cf2 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ce50e0 gate 1598907120303332500 evaluation succeeds +peer1.org1.example.com | [2ace 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | [271d 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2da2 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [2cf3 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [271e 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2da3 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [2cf4 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2acf 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 77 51 d2 f7 b4 ec 1e c3 49 1e 33 |0D. HwQ......I.3| +peer0.org1.example.com | [271f 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2da4 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +peer0.org2.example.com | [2cf5 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 de 2c b1 b1 7a f1 1b ff 39 12 8b 6e a4 d2 a7 0a |.,..z...9..n....| +peer0.org1.example.com | [2720 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ca710 gate 1598907115021303700 evaluation starts +peer1.org2.example.com | [2da5 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +peer0.org2.example.com | [2cf6 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 8d 45 52 d3 02 20 1d 73 59 b9 0c 86 8a 0b 28 e1 |.ER.. .sY.....(.| +peer0.org1.example.com | [2721 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ca710 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2da6 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +peer0.org2.example.com | [2cf7 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000030 2d f2 2e 52 bc 7a 23 10 ba e6 8a 68 3e 2a 0b c9 |-..R.z#....h>*..| +peer0.org1.example.com | [2722 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ca710 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2da7 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer0.org2.example.com | [2cf8 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | 00000040 05 7f 41 e9 d7 74 |..A..t| +peer0.org1.example.com | [2723 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ca710 principal matched by identity 0 +peer1.org2.example.com | [2da8 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2cf9 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2724 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 c8 32 ef fe 9a 69 05 20 ae d9 27 8e 0f 69 47 |..2...i. ..'..iG| +peer1.org1.example.com | [2ad0 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2da9 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ad1 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2daa 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 02 5f b9 cd c5 2b a7 49 61 f7 24 bb fa 48 e0 ad |._...+.Ia.$..H..| +peer0.org2.example.com | [2cfa 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2ad2 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2dab 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2725 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 37 74 52 30 80 40 0d 28 5c 4f 8a |0D. v7tR0.@.(\O.| +peer0.org2.example.com | [2cfb 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2ad3 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2dac 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 bd 5f 9c 26 41 ce 57 85 0b 28 62 5d 9a 38 b4 bc |._.&A.W..(b].8..| +peer0.org2.example.com | [2cfc 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ad4 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [2dad 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 1c 16 c8 51 02 20 3a 42 cd 07 18 b2 55 13 62 45 |...Q. :B....U.bE| +peer0.org2.example.com | [2cfd 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ad5 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2dae 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000030 b3 0e e1 df 64 36 46 51 b8 1e 1c 57 29 7a 15 34 |....d6FQ...W)z.4| +peer0.org2.example.com | [2cfe 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ad6 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2daf 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000040 b4 90 4c 49 0a 58 |..LI.X| +peer0.org2.example.com | [2cff 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ad7 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [2db0 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2726 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ca710 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2d00 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ad8 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [2db1 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8a020 gate 1598907122493196500 evaluation starts +peer0.org1.example.com | [2727 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ca710 gate 1598907115021303700 evaluation succeeds +peer0.org2.example.com | [2d01 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ad9 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2db2 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8a020 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2728 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2d02 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ada 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2db3 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8a020 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2729 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2d03 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2adb 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2db4 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8a020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [272a 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2d04 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2adc 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2db5 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8a020 principal evaluation fails +peer0.org1.example.com | [272b 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2d05 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2add 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2db6 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8a020 gate 1598907122493196500 evaluation fails +peer0.org1.example.com | [272c 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2d06 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ade 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2db7 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [272d 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2d07 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2adf 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2db8 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [272e 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2d08 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [2ae0 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2db9 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [272f 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2d09 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2ae1 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c5f20 gate 1598907125340723400 evaluation starts +peer1.org2.example.com | [2dba 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8a590 gate 1598907122493582400 evaluation starts +peer0.org1.example.com | [2730 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2d0a 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ae2 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c5f20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2731 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2dbb 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8a590 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2d0b 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2ae3 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c5f20 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2732 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2dbc 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8a590 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2d0c 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ae4 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c5f20 principal matched by identity 0 +peer0.org1.example.com | [2733 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2dbd 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8a590 principal matched by identity 0 +peer0.org2.example.com | [2d0d 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2ae5 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 e2 6c 42 f2 a8 e2 3f 70 70 87 06 55 06 f1 1c |..lB...?pp..U...| +peer0.org1.example.com | [2734 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2dbe 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org2.example.com | [2d0e 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 0d d9 f7 7e a8 3b 92 34 16 5f fe d2 69 f8 7c a6 |...~.;.4._..i.|.| +peer0.org1.example.com | [2735 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org2.example.com | [2d0f 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2ae6 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 d3 ec 39 b0 40 f0 97 91 21 35 |0E.!....9.@...!5| +peer0.org1.example.com | [2736 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2dbf 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +peer0.org2.example.com | [2d10 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 7d 64 7f f8 31 b9 cd 11 e8 6d 70 50 41 d5 f3 58 |}d..1....mpPA..X| +peer0.org1.example.com | [2737 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2dc0 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0x81, 0x47, 0x7e, 0x41, 0x1c, 0xad, 0xf5, 0x8b, 0x36, 0x32, 0x94, 0x83, 0x50, 0xc2, 0x29, 0x32, 0xda, 0xd5, 0xc, 0x74, 0xc8, 0x4a, 0xac, 0xd3, 0xc3, 0x82, 0x1e, 0x87, 0x25, 0x9, 0x5, 0x17} txOffsets= +peer0.org2.example.com | [2d11 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000020 7e 04 66 4a a2 02 20 2a b7 16 58 02 a4 c6 82 b9 |~.fJ.. *..X.....| +peer0.org1.example.com | [2738 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | txId=a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d locPointer=offset=70, bytesLength=2981 +peer0.org2.example.com | [2d12 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 a0 eb 2f 01 26 3d 0f 66 2e 59 14 44 9c a3 ad bf |../.&=.f.Y.D....| +peer0.org1.example.com | [2739 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | ] +peer0.org2.example.com | [2d13 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000040 a0 8f b9 51 b3 d2 b5 |...Q...| +peer0.org1.example.com | [273a 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dc1 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89545, bytesLength=2981] for tx ID: [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] to txid-index +peer0.org2.example.com | [2d14 08-31 20:52:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ae7 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c5f20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [273b 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dc2 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89545, bytesLength=2981] for tx number:[0] ID: [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] to blockNumTranNum index +peer0.org2.example.com | [2d15 08-31 20:52:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org1.example.com | [2ae8 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027c5f20 gate 1598907125340723400 evaluation succeeds +peer0.org1.example.com | [273c 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dc3 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer0.org2.example.com | [2d16 08-31 20:52:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2ae9 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [273d 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer0.org2.example.com | [2d17 08-31 20:52:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816102C +peer1.org1.example.com | [2aea 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [273e 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer0.org2.example.com | [2d18 08-31 20:52:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F55D4FFF4A19F7F0EF39073B45813A23F871E547357E57866908D4D9316BA7FB +peer1.org1.example.com | [2aeb 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [273f 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer0.org2.example.com | [2d19 08-31 20:52:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2aec 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2740 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer0.org2.example.com | [2d1a 08-31 20:52:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2741 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2aed 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2dc4 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8a590 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2d1b 08-31 20:52:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | [2742 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2aee 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2dc5 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c8a590 gate 1598907122493582400 evaluation succeeds +peer0.org2.example.com | [2d1c 08-31 20:52:00.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [2743 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2aef 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2dc6 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2d1d 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2744 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2af0 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 67 45 e2 b2 b6 dd cb c6 17 26 f9 c3 80 4c 61 |(gE.......&...La| +peer1.org2.example.com | [2dc7 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2d1e 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2745 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 78 f0 6f f2 46 3e df cf 0a d1 3d 63 21 71 82 b9 |x.o.F>....=c!q..| +peer1.org2.example.com | [2dc8 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2d1f 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2746 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2af1 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 37 c0 99 e0 4d 4b c6 43 5c 1b |0E.!..7...MK.C\.| +peer1.org2.example.com | [2dc9 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2d20 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2747 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 f3 b5 30 5a 1c 66 ae 7e 3e c5 02 08 de 6f f5 78 |..0Z.f.~>....o.x| +peer1.org2.example.com | [2dca 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer0.org2.example.com | [2d21 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2748 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 4b 9b f5 c9 d8 02 20 70 bf 4b 5b b4 32 61 8a c6 |K..... p.K[.2a..| +peer1.org2.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer0.org2.example.com | [2d22 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 d0 f7 4f 42 86 38 6b 84 df 24 71 aa 70 44 01 49 |..OB.8k..$q.pD.I| +peer0.org1.example.com | [2749 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2dcb 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer0.org2.example.com | [2d24 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | 00000040 8f 8c c8 d7 43 97 51 |....C.Q| +peer0.org1.example.com | [274a 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer0.org2.example.com | [2d25 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2af2 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [274b 08-31 20:51:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer0.org2.example.com | [2d27 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2af3 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [274c 08-31 20:51:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer1.org2.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer1.org2.example.com | [2dcc 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dce 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dcf 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2dd0 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dd1 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dd2 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2dd3 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [2dd4 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2dcd 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +peer1.org2.example.com | 00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +peer1.org2.example.com | [2dd5 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +peer1.org2.example.com | 00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +peer1.org2.example.com | 00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +peer1.org2.example.com | 00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +peer1.org2.example.com | 00000040 95 10 dc 3c 55 b0 |... DEBU Obtaining identity +peer1.org2.example.com | [2dd7 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2dd8 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2dd9 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2dda 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2ddb 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2ddc 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2ddd 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2dde 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c73ca0 gate 1598907122498755400 evaluation starts +peer1.org2.example.com | [2ddf 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c73ca0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2de0 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c73ca0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2de1 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c73ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2de2 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c73ca0 principal evaluation fails +peer1.org2.example.com | [2de3 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c73ca0 gate 1598907122498755400 evaluation fails +peer1.org2.example.com | [2de4 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93522], isChainEmpty=[false], lastBlockNumber=[4] +peer1.org2.example.com | [2de5 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +peer1.org2.example.com | [2de6 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2de7 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2de8 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2de9 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb4210 gate 1598907122500684100 evaluation starts +peer1.org2.example.com | [2dea 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb4210 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2deb 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb4210 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2dec 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb4210 principal matched by identity 0 +peer1.org2.example.com | [2ded 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer1.org2.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer1.org2.example.com | [2dee 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer1.org2.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer1.org2.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer1.org2.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer1.org2.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer1.org2.example.com | [2def 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb4210 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2df0 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb4210 gate 1598907122500684100 evaluation succeeds +peer1.org2.example.com | [2df1 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2d26 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2d28 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d23 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2d29 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d2a 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2d2b 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d2c 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2d2d 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2df2 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2d2e 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 5d 4f ff 4a 19 f7 f0 ef 39 07 3b 45 81 3a 23 |.]O.J....9.;E.:#| +peer1.org2.example.com | [2df3 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [274d 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2af4 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | 00000010 f8 71 e5 47 35 7e 57 86 69 08 d4 d9 31 6b a7 fb |.q.G5~W.i...1k..| +peer1.org2.example.com | [2df4 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [274e 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2af5 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 10 07 8f e4 2b 02 2d 3e fc 47 48 d6 8f 49 ad |.....+.->.GH..I.| +peer0.org2.example.com | [2d2f 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 b4 db d3 29 b5 df 6e ed 88 09 27 |0D. ....)..n...'| +peer1.org2.example.com | [2df5 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [274f 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c e0 9d 52 a9 d6 99 9f c0 d3 b5 fc 72 61 5b 2f |...R........ra[/| +peer1.org1.example.com | 00000010 f2 d8 41 ea bd 99 65 15 93 84 fb f2 3e 69 8d 88 |..A...e.....>i..| +peer0.org2.example.com | 00000010 ad d1 96 85 b4 8c 4c 6e 48 60 ee ad 21 ef da 1d |......LnH`..!...| +peer1.org2.example.com | [2df6 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 46 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 fd 9b a9 a2 91 4d 62 ca 74 7a 7a cd 4d e9 ce ac |.....Mb.tzz.M...| +peer1.org1.example.com | [2af6 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 ee 06 3e b8 e0 d4 82 23 2c 60 aa |0D. C..>....#,`.| +peer0.org2.example.com | 00000020 82 96 92 b0 02 20 68 8f 6f 51 48 f8 35 4d b0 ca |..... h.oQH.5M..| +peer1.org2.example.com | [2df7 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 46 bytes, Signature: 0 bytes +peer0.org1.example.com | [2750 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 d9 08 57 cc 6a e0 dc 50 64 5a |0E.!....W.j..PdZ| +peer1.org1.example.com | 00000010 9d e7 9e 39 08 8f b3 1f 87 55 47 87 62 d9 88 a3 |...9.....UG.b...| +peer0.org2.example.com | 00000030 a7 31 97 0b 58 9c 91 42 0c 61 db b7 8b 26 ae de |.1..X..B.a...&..| +peer1.org2.example.com | [2df8 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 46 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 5f f9 e8 62 02 02 00 b8 27 89 cd 47 b2 e7 d1 01 |_..b....'..G....| +peer1.org1.example.com | 00000020 5f 1f ee 65 02 20 1d 6c fd 2c 4b 23 d7 eb bc 62 |_..e. .l.,K#...b| +peer0.org2.example.com | 00000040 3b 1a dd b7 2b df |;...+.| +peer1.org2.example.com | [2df9 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 32 c0 25 97 91 02 20 0c ff a9 87 17 dc e4 53 56 |2.%... .......SV| +peer1.org1.example.com | 00000030 be 76 b0 77 85 48 ce da cd 6f d0 2b 60 ab bc 00 |.v.w.H...o.+`...| +peer0.org2.example.com | [2d30 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2dfa 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +peer0.org1.example.com | 00000030 67 82 d4 ed 0e 69 90 6b 2f 35 bd 73 32 94 99 c7 |g....i.k/5.s2...| +peer1.org1.example.com | 00000040 5c 73 bc 0e 0d 58 |\s...X| +peer0.org2.example.com | [2d31 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2dfb 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +peer0.org1.example.com | 00000040 15 2d 57 e0 5a 92 40 |.-W.Z.@| +peer0.org2.example.com | [2d32 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2dfc 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [2751 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2af7 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2d33 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2dfd 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [2752 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2af8 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2d34 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2dfe 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [2753 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2af9 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d35 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2dff 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [2754 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2afa 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d36 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2755 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2e00 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org1.example.com | [2afb 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [2d37 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2756 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e01 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org1.example.com | [2afc 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [2d38 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2757 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e02 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [2afd 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2758 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d39 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e03 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +peer1.org1.example.com | [2afe 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 67 45 e2 b2 b6 dd cb c6 17 26 f9 c3 80 4c 61 |(gE.......&...La| +peer0.org1.example.com | [2759 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d3a 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e04 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +peer1.org1.example.com | 00000010 78 f0 6f f2 46 3e df cf 0a d1 3d 63 21 71 82 b9 |x.o.F>....=c!q..| +peer0.org1.example.com | [275a 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d3b 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2e05 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | [2aff 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 37 c0 99 e0 4d 4b c6 43 5c 1b |0E.!..7...MK.C\.| +peer0.org1.example.com | [275b 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d3c 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2e06 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +peer1.org1.example.com | 00000010 f3 b5 30 5a 1c 66 ae 7e 3e c5 02 08 de 6f f5 78 |..0Z.f.~>....o.x| +peer0.org1.example.com | [275c 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2d3d 08-31 20:52:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2e07 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +peer1.org1.example.com | 00000020 4b 9b f5 c9 d8 02 20 70 bf 4b 5b b4 32 61 8a c6 |K..... p.K[.2a..| +peer0.org1.example.com | [275d 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d3e 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0be80 gate 1598907120550286400 evaluation starts +peer1.org2.example.com | [2e08 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +peer1.org1.example.com | 00000030 d0 f7 4f 42 86 38 6b 84 df 24 71 aa 70 44 01 49 |..OB.8k..$q.pD.I| +peer0.org1.example.com | [275e 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2d3f 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0be80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2e09 08-31 20:52:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +peer1.org1.example.com | 00000040 8f 8c c8 d7 43 97 51 |....C.Q| +peer0.org1.example.com | [275f 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d40 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0be80 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2e0a 08-31 20:52:02.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 23ms (state_validation=4ms block_and_pvtdata_commit=11ms state_commit=6ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +peer1.org1.example.com | [2b00 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2760 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d41 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0be80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2e0b 08-31 20:52:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2b01 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2761 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d42 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0be80 principal evaluation fails +peer1.org2.example.com | [2e0c 08-31 20:52:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408B8BB829CF9AF9D9816...08051A0C0A0565787030321203312E30 +peer1.org1.example.com | [2b02 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2762 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d43 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0be80 gate 1598907120550286400 evaluation fails +peer1.org2.example.com | [2e0d 08-31 20:52:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4096332C818D0B7479B4F9BFB6F9B2E911DFEFEAA4DEE0DD14311C224FF7702E +peer1.org1.example.com | [2b03 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 10 07 8f e4 2b 02 2d 3e fc 47 48 d6 8f 49 ad |.....+.->.GH..I.| +peer0.org1.example.com | [2763 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d44 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2e0e 08-31 20:52:02.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +peer1.org1.example.com | 00000010 f2 d8 41 ea bd 99 65 15 93 84 fb f2 3e 69 8d 88 |..A...e.....>i..| +peer0.org1.example.com | [2764 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d45 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2e0f 08-31 20:52:04.21 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org1.example.com | [2b04 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 ee 06 3e b8 e0 d4 82 23 2c 60 aa |0D. C..>....#,`.| +peer0.org1.example.com | [2765 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d46 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2e10 08-31 20:52:04.21 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org1.example.com | 00000010 9d e7 9e 39 08 8f b3 1f 87 55 47 87 62 d9 88 a3 |...9.....UG.b...| +peer0.org1.example.com | [2766 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d47 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d483f0 gate 1598907120553348300 evaluation starts +peer1.org2.example.com | [2e11 08-31 20:52:04.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000020 5f 1f ee 65 02 20 1d 6c fd 2c 4b 23 d7 eb bc 62 |_..e. .l.,K#...b| +peer0.org1.example.com | [2767 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d48 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d483f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2e12 08-31 20:52:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D9816100E1801 +peer1.org1.example.com | 00000030 be 76 b0 77 85 48 ce da cd 6f d0 2b 60 ab bc 00 |.v.w.H...o.+`...| +peer0.org1.example.com | [2768 08-31 20:51:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d49 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d483f0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2e13 08-31 20:52:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A86FB6FDB8C6924BC0EC8F5DB085A0C1EC766EB4B184CD55F9E8B773B8E18245 +peer1.org1.example.com | 00000040 5c 73 bc 0e 0d 58 |\s...X| +peer0.org1.example.com | [2769 08-31 20:51:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d4a 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d483f0 principal matched by identity 0 +peer1.org2.example.com | [2e14 08-31 20:52:04.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org1.example.com | [2b05 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [276a 08-31 20:51:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d4b 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 b4 6d 50 2b c3 1a 96 c3 6c 69 c2 41 53 7b 0d |..mP+....li.AS{.| +peer1.org2.example.com | [2e15 08-31 20:52:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b06 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [276b 08-31 20:51:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 d3 4e a4 98 7a 84 ad 19 75 cc 5c 94 ee a5 8c 8a |.N..z...u.\.....| +peer1.org2.example.com | [2e16 08-31 20:52:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b07 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [276c 08-31 20:51:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d4c 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 78 56 22 ef 6d 80 90 fd dd 32 2e |0D. .xV".m....2.| +peer1.org2.example.com | [2e17 08-31 20:52:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b08 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [276d 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 b5 15 fe 6e 77 9f 90 37 54 3d 24 24 c1 ce 86 a3 |...nw..7T=$$....| +peer1.org2.example.com | [2e18 08-31 20:52:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b09 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [276e 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 19 8e f1 92 02 20 17 fb 1f f3 fc ed c8 0f 2b 92 |..... ........+.| +peer1.org2.example.com | [2e19 08-31 20:52:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [276f 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b0a 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000030 d9 e8 2a e7 95 ca 83 66 8f 5c 3f 80 51 64 21 25 |..*....f.\?.Qd!%| +peer1.org2.example.com | [2e1a 08-31 20:52:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2770 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2b0b 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000040 3b 7f fe 9a 20 bc |;... .| +peer1.org2.example.com | [2e1b 08-31 20:52:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2771 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2b0c 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2d4d 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d483f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2e1c 08-31 20:52:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [2772 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b0d 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2d4e 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d483f0 gate 1598907120553348300 evaluation succeeds +peer1.org2.example.com | [2e1d 08-31 20:52:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2773 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2b0e 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2d4f 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2e1e 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [2774 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b0f 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2d50 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2e1f 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2775 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b10 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002705c30 gate 1598907125349879900 evaluation starts +peer0.org2.example.com | [2d51 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2e20 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [2776 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2b11 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002705c30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2d52 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2e22 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2777 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2b12 08-31 20:52:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002705c30 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2d53 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e23 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2778 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2b13 08-31 20:52:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002705c30 principal matched by identity 0 +peer0.org2.example.com | [2d54 08-31 20:52:00.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2e25 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2779 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f490 gate 1598907115455768600 evaluation starts +peer1.org1.example.com | [2b14 08-31 20:52:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e 74 70 5f 69 da ef 58 05 f1 9d 10 2e d6 70 |..tp_i..X......p| +peer0.org2.example.com | [2d55 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2e21 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [277a 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f490 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 3a de 14 88 17 ee d0 42 51 d5 a6 46 8d f5 8c 3d |:......BQ..F...=| +peer0.org2.example.com | [2d56 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2e24 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [277b 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f490 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2b15 08-31 20:52:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a c0 56 b6 72 65 1b f5 d5 29 c0 a2 |0D. *.V.re...)..| +peer0.org2.example.com | [2d57 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2e26 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [277c 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f490 principal matched by identity 0 +peer1.org1.example.com | 00000010 58 56 5c 65 a7 0b 2c 94 80 c5 ce 83 ac be f6 54 |XV\e..,........T| +peer0.org2.example.com | [2d58 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e27 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [277d 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 77 44 48 28 c9 7a 8c 15 b4 95 05 73 94 af 1c fa |wDH(.z.....s....| +peer1.org1.example.com | 00000020 2f 31 e3 48 02 20 5b 2a ae cd 07 ba a2 8e 32 f3 |/1.H. [*......2.| +peer0.org2.example.com | [2d59 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e28 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 52 b0 8e 96 e0 be 46 87 b6 ca a3 92 82 67 b3 cc |R.....F......g..| +peer1.org1.example.com | 00000030 dd 1c 0d 2d 4b c6 ed e9 22 79 c7 aa 01 3d 20 6f |...-K..."y...= o| +peer0.org2.example.com | [2d5a 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e29 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [277e 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 e7 cf c8 3f 2c 21 aa c4 62 9f |0E.!.....?,!..b.| +peer1.org1.example.com | 00000040 8b 81 64 ef ec 80 |..d...| +peer0.org2.example.com | [2d5b 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e2a 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 49 7c cf 61 b1 50 5d 9e e7 5a ee ab 14 5e 7b 59 |I|.a.P]..Z...^{Y| +peer1.org1.example.com | [2b16 08-31 20:52:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002705c30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2d5c 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e2b 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b17 08-31 20:52:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002705c30 gate 1598907125349879900 evaluation succeeds +peer0.org1.example.com | 00000020 65 63 40 3b 50 02 20 11 fd 26 3b ae e6 a2 7d 72 |ec@;P. ..&;...}r| +peer0.org2.example.com | [2d5d 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e2c 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b18 08-31 20:52:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000030 89 0f 22 76 26 ed 1b 89 d9 9a 80 ea d4 57 ab 2a |.."v&........W.*| +peer0.org2.example.com | [2d5e 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e2d 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b19 08-31 20:52:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000040 55 a6 da 90 08 08 7c |U.....|| +peer0.org2.example.com | [2d5f 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e2e 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b1a 08-31 20:52:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [277f 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f490 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2d60 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e2f 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b1b 08-31 20:52:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2780 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f490 gate 1598907115455768600 evaluation succeeds +peer0.org2.example.com | [2d61 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e30 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b1c 08-31 20:52:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2781 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2d62 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e31 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b1d 08-31 20:52:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2782 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2d63 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e32 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b1e 08-31 20:52:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2783 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2d64 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2e33 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b1f 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2784 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2d65 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e34 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b20 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2785 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2e35 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2d66 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b21 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2786 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2e36 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161030 +peer0.org2.example.com | [2d68 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2b22 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2787 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2e37 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4FC6C4E115CFCC1C6063D07BA38E9933D12EF833B8586918FB934E346E555213 +peer0.org2.example.com | [2d67 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b23 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2788 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2e38 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [2d69 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b24 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2789 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2e39 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [2d6a 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b25 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [278a 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e3a 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | [2d6b 08-31 20:52:00.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b26 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [278b 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e3b 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [2d6c 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b27 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [278c 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e3c 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2d6d 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b28 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [278d 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e3d 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2d6e 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b29 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [278e 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e3e 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [2d6f 08-31 20:52:00.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b2a 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [278f 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e3f 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2d70 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b2b 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2790 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e40 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [2d71 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b2c 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2791 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e41 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cecd50 gate 1598907125024278400 evaluation starts +peer0.org2.example.com | [2d72 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [2b2d 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2792 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e42 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cecd50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2d73 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b2e 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2793 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [2e43 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cecd50 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2d74 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\\\375Zl\345~\347\254\220.\205\3664M\006\230\321C\002 \0018\233\324>\2749\257\234D\004]\354\213\342?\204S\244T\212\337,\217$\322\364$\"\350\257\257" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b2f 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2794 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e44 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cecd50 principal matched by identity 0 +peer0.org2.example.com | [2d75 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b31 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2795 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e45 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 48 27 e4 d8 2b b3 06 52 c4 70 a9 e6 2b e4 e0 |.H'..+..R.p..+..| +peer0.org2.example.com | [2d76 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\\\375Zl\345~\347\254\220.\205\3664M\006\230\321C\002 \0018\233\324>\2749\257\234D\004]\354\213\342?\204S\244T\212\337,\217$\322\364$\"\350\257\257" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b30 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2796 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | 00000010 14 8d 7e 75 58 c6 4e 89 e9 4d 5a bc c9 bc 39 6a |..~uX.N..MZ...9j| +peer0.org2.example.com | [2d77 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2b32 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2797 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2e46 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 c9 5e 7d 51 23 49 7b 1c a9 ab d8 |0D. b.^}Q#I{....| +peer0.org2.example.com | [2d78 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 5b 37 f3 59 2a 3d 1c 8c 82 f6 83 f7 e7 f3 1e |=[7.Y*=.........| +peer1.org1.example.com | [2b33 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2798 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 0a 3a f2 e2 aa a2 4d 2d 1f 74 74 a1 49 c8 fe 33 |.:....M-.tt.I..3| +peer0.org2.example.com | 00000010 f4 28 26 0f 02 53 00 aa 05 07 d0 da 3f 7a 06 41 |.(&..S......?z.A| +peer1.org1.example.com | [2b34 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2799 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 1c d9 01 11 02 20 25 9d b1 95 8b 6f 9b f9 5e d6 |..... %....o..^.| +peer0.org2.example.com | [2d79 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de ee 1b dc b7 1a e2 1b 53 7f 16 |0E.!.........S..| +peer1.org1.example.com | [2b35 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [279a 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 e8 4c f6 fa 9d a4 08 79 56 36 c1 e6 6e 88 d7 7f |.L.....yV6..n...| +peer0.org2.example.com | 00000010 a3 38 34 24 60 fd 7a 03 5c 53 7f 2a ef 00 95 34 |.84$`.z.\S.*...4| +peer1.org1.example.com | [2b36 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [279b 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 83 3d ed 5d df 0a |.=.]..| +peer0.org2.example.com | 00000020 46 26 d9 e2 46 02 20 6c 4a a0 18 ef 6f 2c 50 d4 |F&..F. lJ...o,P.| +peer1.org1.example.com | [2b37 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [279c 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e47 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cecd50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000030 d4 66 95 9f 6e 41 79 68 aa 6e dc b2 5f c9 cf df |.f..nAyh.n.._...| +peer1.org1.example.com | [2b38 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026a6420 gate 1598907125444998200 evaluation starts +peer0.org1.example.com | [279d 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2e48 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cecd50 gate 1598907125024278400 evaluation succeeds +peer0.org2.example.com | 00000040 4d 02 bb 49 8f 8c 3c |M..I..<| +peer1.org1.example.com | [2b39 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026a6420 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [279e 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e49 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [2d7a 08-31 20:52:01.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | [2b3a 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026a6420 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [279f 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [2e4a 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [2b3b 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026a6420 principal matched by identity 0 +peer0.org1.example.com | [27a0 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2d7b 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 95 19 97 79 8f 0e 74 08 ee 05 bf |0D. u...y..t....| +peer1.org2.example.com | [2e4b 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [2b3c 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 3f 53 55 af 41 40 b7 82 ca 7c 32 ff b8 ce 68 |.?SU.A@...|2...h| +peer0.org1.example.com | [27a1 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 fa 3e 5c fd 5a 6c e5 7e e7 ac 90 2e 85 f6 34 4d |.>\.Zl.~......4M| +peer1.org2.example.com | [2e4c 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | 00000010 a0 98 99 06 03 79 e7 70 7e b8 92 8a 48 f0 61 0f |.....y.p~...H.a.| +peer0.org1.example.com | [27a2 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 06 98 d1 43 02 20 01 38 9b d4 3e bc 39 af 9c 44 |...C. .8..>.9..D| +peer1.org2.example.com | [2e4d 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b3d 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 63 a9 d0 da c0 f3 7c df 1c 0a e6 |0D. .c.....|....| +peer0.org1.example.com | [27a3 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 04 5d ec 8b e2 3f 84 53 a4 54 8a df 2c 8f 24 d2 |.]...?.S.T..,.$.| +peer1.org2.example.com | [2e4e 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer1.org1.example.com | 00000010 2d 8f 30 9d fe 80 91 12 60 de c7 9e 6e e4 e3 0d |-.0.....`...n...| +peer0.org1.example.com | [27a4 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | 00000040 f4 24 22 e8 af af |.$"...| +peer1.org2.example.com | [2e4f 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer1.org1.example.com | 00000020 70 8f 44 d2 02 20 03 f0 52 44 15 4e 3f 59 be 57 |p.D.. ..RD.N?Y.W| +peer0.org1.example.com | [27a5 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161029 +peer0.org2.example.com | [2d7c 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2e50 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org1.example.com | 00000030 21 15 2d 79 db bb 32 86 b8 86 ef 10 c0 c1 43 07 |!.-y..2.......C.| +peer0.org1.example.com | [27a6 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 25DD373AAC4D6D59036C4C70040CAF2AA2CCCBBA0C5FF5AD3C011787A9003405 +peer0.org2.example.com | [2d7d 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [2e51 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [5], peers number [3] +peer1.org1.example.com | 00000040 58 64 34 c7 d0 61 |Xd4..a| +peer0.org1.example.com | [27a7 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2e52 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4024 bytes, seq: 5}, Envelope: 4054 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [2d7e 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2d7f 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2d80 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2d81 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b3e 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026a6420 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2d82 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27a8 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2e53 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +peer1.org1.example.com | [2b3f 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026a6420 gate 1598907125444998200 evaluation succeeds +peer0.org2.example.com | [2d83 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [27a9 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org2.example.com | [2e54 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +peer1.org1.example.com | [2b40 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2d84 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27aa 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [2e55 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +peer1.org1.example.com | [2b41 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2d85 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27ab 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e56 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer1.org1.example.com | [2b42 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2d86 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [27ac 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e57 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +peer1.org1.example.com | [2b43 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2d87 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\\\375Zl\345~\347\254\220.\205\3664M\006\230\321C\002 \0018\233\324>\2749\257\234D\004]\354\213\342?\204S\244T\212\337,\217$\322\364$\"\350\257\257" > > alive: +peer0.org1.example.com | [27ad 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e58 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +peer1.org1.example.com | [2b44 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2d88 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [27ae 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2e59 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org1.example.com | [2b45 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2d89 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27af 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e5a 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc004cfc140 env 0xc004c6f9a0 txn 0 +peer1.org1.example.com | [2b46 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2d8a 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27b0 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2e5b 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004c6f9a0 +peer1.org1.example.com | [2b47 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2d8b 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [27b1 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2e5c 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\362\305\265\372\005\020\330\366\336\310\003\"\017businesschannel*@ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030}\357\315\302\232\007\257\034BQH\017\351&]\"\010\252\276J\270\353\250@" +peer1.org1.example.com | [2b48 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [27b2 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e5d 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [2b49 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d8c 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [27b3 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b4a 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d8d 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e5e 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [27b4 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b4b 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e5f 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [27b5 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b4c 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2d8e 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e60 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [27b6 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b4d 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d8f 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e61 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [27b7 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b4e 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d90 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | [27b8 08-31 20:51:56.97 UTC] [%{longpkg}] %{callpath} -> DEBU Created image: dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 +peer1.org1.example.com | [2b4f 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2d91 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | [27b9 08-31 20:51:56.97 UTC] [%{longpkg}] %{callpath} -> DEBU create container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer1.org1.example.com | [2b50 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d92 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | [27ba 08-31 20:51:56.97 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +peer1.org1.example.com | [2b51 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d93 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | [27bb 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b52 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2d94 08-31 20:52:01.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | [27bc 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b53 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d95 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org1.example.com | [27bd 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b54 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2d96 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org1.example.com | [27be 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b55 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d97 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org1.example.com | [27bf 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b56 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d98 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org1.example.com | [27c0 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b57 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d99 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org1.example.com | [27c1 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b58 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org2.example.com | [2d9a 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [27c2 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b59 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org2.example.com | [2d9b 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27c3 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b5a 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [2d9c 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [27c4 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [2b5b 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e62 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d9d 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [27c5 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b5c 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2e63 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2d9e 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [27c6 08-31 20:51:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU created container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +peer1.org1.example.com | [2b5d 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e64 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2d9f 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [27c7 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b5e 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e66 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2da0 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9a860 gate 1598907121330695800 evaluation starts +peer0.org1.example.com | [27c8 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b5f 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e67 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2da1 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9a860 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [27c9 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b60 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e68 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [2da2 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9a860 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [27ca 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b61 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e65 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [2da3 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9a860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [27cb 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2b62 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e69 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [2da4 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9a860 principal evaluation fails +peer0.org1.example.com | [27cc 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b63 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e6a 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2da5 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9a860 gate 1598907121330695800 evaluation fails +peer0.org1.example.com | [27cd 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2b64 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e6b 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2da6 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [27ce 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b65 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2e6c 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2da7 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [27cf 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2b66 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e6d 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2da8 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [27d0 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2b67 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2da9 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9add0 gate 1598907121331791700 evaluation starts +peer1.org2.example.com | [2e6e 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [27d1 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2b68 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2e6f 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [27d2 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2b69 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2daa 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9add0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2e70 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [27d3 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263bce0 gate 1598907117093455200 evaluation starts +peer1.org1.example.com | [2b6a 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2dab 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9add0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2e71 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [27d4 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263bce0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2b6b 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2dac 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9add0 principal matched by identity 0 +peer1.org2.example.com | [2e72 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 35 37 a9 79 33 a2 e5 2b 9c 00 24 05 6e 93 3f |`57.y3..+..$.n.?| +peer0.org1.example.com | [27d5 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263bce0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2b6c 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2dad 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 f8 9b e4 72 34 12 af 1e 59 64 6f 0d 8a c1 60 |....r4...Ydo...`| +peer1.org2.example.com | 00000010 8d d7 90 73 0d 35 87 ae 3b dd 80 ca fa 0e 01 84 |...s.5..;.......| +peer0.org1.example.com | [27d6 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263bce0 principal matched by identity 0 +peer1.org1.example.com | [2b6d 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026981a0 gate 1598907125491053900 evaluation starts +peer0.org2.example.com | 00000010 90 df 35 e3 f0 30 73 f6 1b f0 ab 1c 65 d5 17 e0 |..5..0s.....e...| +peer1.org2.example.com | [2e73 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c 1e 88 5b 8d 81 cf 0e a2 2f d3 11 |0D. |..[...../..| +peer0.org1.example.com | [27d7 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 82 19 b7 35 14 1a b4 75 5e 2d 23 8c 90 9d 66 |....5...u^-#...f| +peer1.org1.example.com | [2b6e 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026981a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2dae 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 52 69 8a 68 62 3a 2f 6e 03 e8 |0E.!..Ri.hb:/n..| +peer1.org2.example.com | 00000010 a4 a8 f1 b3 5c 74 52 c0 c6 9d 67 23 3f e7 8d d0 |....\tR...g#?...| +peer0.org1.example.com | 00000010 a7 f8 43 2c 0d cb 12 68 89 9e 50 10 9c 6e 54 0b |..C,...h..P..nT.| +peer1.org1.example.com | [2b6f 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026981a0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | 00000010 4c 2e 14 0b f5 82 38 bb e3 47 31 24 d1 ef a4 35 |L.....8..G1$...5| +peer1.org2.example.com | 00000020 de 36 b3 af 02 20 14 7b 59 42 5f fc de 82 a4 91 |.6... .{YB_.....| +peer0.org1.example.com | [27d8 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 7b b0 97 a6 f0 53 6a 3c 08 79 be |0D. s{....Sj<.y.| +peer1.org1.example.com | [2b70 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026981a0 principal matched by identity 0 +peer0.org2.example.com | 00000020 d6 2f 24 69 da 02 20 68 de cb 59 e9 9d a8 cd 04 |./$i.. h..Y.....| +peer1.org2.example.com | 00000030 9e 10 21 3b 91 48 0d fa dd 17 37 33 ab 68 b1 3b |..!;.H....73.h.;| +peer0.org1.example.com | 00000010 39 82 04 0d 36 ee cd b4 91 dc 92 d3 4c 29 fe 90 |9...6.......L)..| +peer1.org1.example.com | [2b71 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f bf 80 35 88 b4 5b e6 9f 32 d4 41 b7 09 ed 0f |o..5..[..2.A....| +peer0.org2.example.com | 00000030 fa 70 d6 f6 14 21 7c 03 a6 83 99 8d 03 f9 e2 09 |.p...!|.........| +peer1.org2.example.com | 00000040 92 ff b4 50 2d 54 |...P-T| +peer0.org1.example.com | 00000020 42 71 d4 40 02 20 7a 9d 60 11 4e 87 9e 1b 2e ef |Bq.@. z.`.N.....| +peer1.org1.example.com | 00000010 34 d7 bd f8 6b 0e 06 76 63 fa 7a 7c a3 3e 80 3a |4...k..vc.z|.>.:| +peer0.org2.example.com | 00000040 cc ff 9c a0 c7 ef 71 |......q| +peer1.org2.example.com | [2e74 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | 00000030 5b 01 77 10 24 49 6d 4b b2 f3 d3 3a 6e 52 9b f7 |[.w.$ImK...:nR..| +peer1.org1.example.com | [2b72 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fa 65 3f 1e 10 70 c0 a9 4e 51 b4 |0D. U.e?..p..NQ.| +peer0.org2.example.com | [2daf 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9add0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2e75 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc004cc5800, header channel_header:"\010\003\032\014\010\362\305\265\372\005\020\330\366\336\310\003\"\017businesschannel*@ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030}\357\315\302\232\007\257\034BQH\017\351&]\"\010\252\276J\270\353\250@" +peer0.org1.example.com | 00000040 40 0c 97 d8 27 4b |@...'K| +peer1.org1.example.com | 00000010 f3 2c 93 90 53 d0 9b d0 7f 62 a7 f1 0c ef 07 c6 |.,..S....b......| +peer0.org2.example.com | [2db0 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d9add0 gate 1598907121331791700 evaluation succeeds +peer1.org2.example.com | [2e76 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org1.example.com | [27d9 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263bce0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000020 a9 50 fc c6 02 20 18 c8 87 be b7 06 63 1b 8d 96 |.P... ......c...| +peer0.org2.example.com | [2db1 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2e77 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org1.example.com | [27da 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263bce0 gate 1598907117093455200 evaluation succeeds +peer1.org1.example.com | 00000030 82 62 c7 68 41 b0 2c f4 c0 09 14 96 16 92 01 a0 |.b.hA.,.........| +peer0.org2.example.com | [2db2 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2e78 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [27db 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000040 71 35 0c 02 1b 23 |q5...#| +peer0.org2.example.com | [2db3 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2e79 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [27dc 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2b73 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026981a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2db4 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [27dd 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2b74 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026981a0 gate 1598907125491053900 evaluation succeeds +peer0.org2.example.com | [2db5 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [27de 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2b75 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2db6 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [2e7a 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] +peer0.org1.example.com | [27df 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2b76 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2db7 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2e7b 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org1.example.com | [27e0 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2b77 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2db8 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2e7c 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc004cc9c00 +peer0.org1.example.com | [27e1 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2b78 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2db9 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2e7d 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [f06c8dbb-13f7-48da-8aaa-0c2ab4f6cf6e] +peer0.org1.example.com | [27e2 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2b79 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2dba 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e7e 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [27e3 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2b7a 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [2dbb 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e7f 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f06c8dbb-13f7-48da-8aaa-0c2ab4f6cf6e] +peer0.org1.example.com | [27e4 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b7b 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2dbc 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e80 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +peer0.org1.example.com | [27e5 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b7c 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2dbd 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [2e81 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [6df1e7d0-051f-4063-a65a-34b857c60d7b] +peer0.org1.example.com | [27e6 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b7d 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2dbe 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e82 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [6df1e7d0-051f-4063-a65a-34b857c60d7b] +peer0.org1.example.com | [27e7 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [2b7e 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dbf 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e83 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d364d0 gate 1598907125050335700 evaluation starts +peer0.org1.example.com | [27e8 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b7f 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dc0 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2e84 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d364d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [27e9 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b80 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dc1 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2e85 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d364d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [27ea 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b81 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org2.example.com | [2dc2 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [2e86 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d364d0 principal matched by identity 0 +peer0.org1.example.com | [27eb 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2b82 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2dc3 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e87 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 46 7a 9a 54 5b d8 01 be 17 f9 fb 54 65 9b c2 |.Fz.T[......Te..| +peer0.org1.example.com | [27ec 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [2b83 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2dc4 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 6a 2d 25 20 2a 18 aa f1 b2 e3 b9 47 db 8e ab 25 |j-% *......G...%| +peer0.org1.example.com | [27ed 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b84 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2dc5 08-31 20:52:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [2e88 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 02 52 70 3b fc a7 0c 50 fb f7 a0 |0D. ;.Rp;...P...| +peer0.org1.example.com | [27ee 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dc6 08-31 20:52:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2b85 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000010 bc e1 53 83 eb c9 a5 d8 aa 9b 1b 5b 91 4c a8 2d |..S........[.L.-| +peer0.org1.example.com | [27ef 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2dc7 08-31 20:52:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [2b86 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" > alive: alive: alive: +peer1.org2.example.com | 00000020 61 25 a5 ec 02 20 21 e1 95 52 28 ef ca c0 87 1b |a%... !..R(.....| +peer0.org1.example.com | [27f0 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [2dc8 08-31 20:52:01.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2b87 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 c4 b9 39 15 3e 7c 4e e2 b1 b4 5b 4f d7 2e 24 8d |..9.>|N...[O..$.| +peer0.org1.example.com | [27f1 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [2dc9 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [2b88 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 9f 7f eb 94 e9 29 |.....)| +peer0.org1.example.com | [27f2 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dcb 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b89 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e89 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d364d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [27f3 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\342\022`\377\r\013C\365\235<\253w\20629\355:T\t\003\377\343]\033\233\372\336\374Wa\002 \"}\010\266\363\247Vu7\205\216\201\177\021\374?=\216\367k\326\250\215\255q\231\024u\364\021,\362" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [2dcc 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b8a 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e8a 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d364d0 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [27f4 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dca 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b8b 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e8b 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d364d0 skipping identity 0 because it has already been used +peer0.org1.example.com | [27f5 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\342\022`\377\r\013C\365\235<\253w\20629\355:T\t\003\377\343]\033\233\372\336\374Wa\002 \"}\010\266\363\247Vu7\205\216\201\177\021\374?=\216\367k\326\250\215\255q\231\024u\364\021,\362" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [2dcd 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b8c 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e8c 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d364d0 principal evaluation fails +peer0.org1.example.com | [27f6 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [2dce 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2b8d 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2e8d 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d364d0 gate 1598907125050335700 evaluation succeeds +peer0.org1.example.com | [27f7 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 4b 69 75 4b ad d9 ae c0 56 5c f3 7d 58 82 72 |.KiuK....V\.}X.r| +peer0.org2.example.com | [2dcf 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b8e 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c e1 4c 4c 55 4e e3 2a fa a7 5f 9a ca 30 55 d9 |\.LLUN.*.._..0U.| +peer1.org2.example.com | [2e8e 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [96856cae-cacd-41d1-a2c0-6212bf832bc2] +peer0.org1.example.com | 00000010 13 5b a2 cb e9 63 ba 7b ef 62 bb 14 58 42 74 fe |.[...c.{.b..XBt.| +peer0.org2.example.com | [2dd0 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 b1 55 79 03 4e b2 a0 d3 b8 90 24 86 cb ca 59 db |.Uy.N.....$...Y.| +peer1.org2.example.com | [2e8f 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [96856cae-cacd-41d1-a2c0-6212bf832bc2] +peer0.org1.example.com | [27f8 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 00 5a 2d 8c 2e 35 13 26 0f a2 |0E.!...Z-..5.&..| +peer0.org2.example.com | [2dd1 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b8f 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 e1 9a 6a e4 17 d5 2f 69 d6 b8 09 |0D. 3..j.../i...| +peer1.org2.example.com | [2e90 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +peer0.org1.example.com | 00000010 d9 56 a6 42 fd 09 6e fc e5 0d a2 ca e1 f9 85 3b |.V.B..n........;| +peer0.org2.example.com | [2dd2 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 f0 d5 1e f6 8e 9d 86 f1 e3 0d 75 07 c8 e2 d1 30 |..........u....0| +peer1.org2.example.com | [2e91 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b appears to be valid +peer0.org1.example.com | 00000020 77 03 0a b8 29 02 20 2f 5a 54 73 bb 4e 1d f4 b9 |w...). /ZTs.N...| +peer0.org2.example.com | [2dd3 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 d4 81 0e 59 02 20 44 ba 45 91 9d f4 90 d6 02 8d |...Y. D.E.......| +peer1.org2.example.com | [2e92 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc004cc9c00 +peer0.org1.example.com | 00000030 f6 b8 ba 99 24 05 24 b1 56 88 9d f9 1c 66 1f 92 |....$.$.V....f..| +peer0.org2.example.com | [2dd4 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 c4 82 41 61 1c c5 bb 0f e6 4e a0 75 e8 59 62 cb |..Aa.....N.u.Yb.| +peer1.org2.example.com | [2e93 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc004cfc140 env 0xc004c6f9a0 txn 0 +peer0.org1.example.com | 00000040 2b 90 ed 4b 23 73 bd |+..K#s.| +peer0.org2.example.com | [2dd5 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 ce 99 d2 a5 c2 82 |......| +peer1.org2.example.com | [2e94 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [27f9 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [2dd6 08-31 20:52:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b90 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2e95 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 31ms +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [2dd7 08-31 20:52:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2b91 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2e96 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [27fa 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 3e e2 12 60 ff 0d 0b 43 f5 9d |0E.!..>..`...C..| +peer1.org1.example.com | [2b92 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2dd8 08-31 20:52:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2e97 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | 00000010 3c ab 77 86 32 39 ed 3a 54 09 03 ff e3 5d 1b 9b |<.w.29.:T....]..| +peer1.org1.example.com | [2b93 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2dd9 08-31 20:52:01.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2e98 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +peer0.org1.example.com | 00000020 fa de fc 57 61 02 20 22 7d 08 b6 f3 a7 56 75 37 |...Wa. "}....Vu7| +peer1.org1.example.com | [2b94 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2dda 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2e99 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | 00000030 85 8e 81 7f 11 fc 3f 3d 8e f7 6b d6 a8 8d ad 71 |......?=..k....q| +peer1.org1.example.com | [2b95 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ddb 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816102D +peer1.org2.example.com | [2e9a 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | 00000040 99 14 75 f4 11 2c f2 |..u..,.| +peer1.org1.example.com | [2b96 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ddc 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F8E26C42F2A8E23F707087065506F11C0DD9F77EA83B9234165FFED269F87CA6 +peer1.org2.example.com | [2e9b 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [27fb 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2b97 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ddd 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [2e9c 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +peer0.org1.example.com | [27fc 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [2b98 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2dde 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [2e9f 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [27fd 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2b99 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ddf 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | [2ea0 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org1.example.com | [27fe 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2b9a 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2de0 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\210r\202\351\020\3114\250\035" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2e9d 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [27ff 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2b9b 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2de1 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ea1 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161031 +peer0.org1.example.com | [2800 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b9c 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2de2 08-31 20:52:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\210r\202\351\020\3114\250\035" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ea2 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 829E74705F69DAEF5805F19D102ED6703ADE148817EED04251D5A6468DF58C3D +peer0.org1.example.com | [2801 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2b9d 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [2de3 08-31 20:52:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ea3 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2802 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [2de4 08-31 20:52:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2b9e 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ea4 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2803 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2de5 08-31 20:52:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2b9f 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ea5 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org1.example.com | [2804 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2de6 08-31 20:52:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2ba0 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ea6 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2805 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2de7 08-31 20:52:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ba1 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ea7 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2806 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\342\022`\377\r\013C\365\235<\253w\20629\355:T\t\003\377\343]\033\233\372\336\374Wa\002 \"}\010\266\363\247Vu7\205\216\201\177\021\374?=\216\367k\326\250\215\255q\231\024u\364\021,\362" > > alive: +peer0.org2.example.com | [2de8 08-31 20:52:01.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ba2 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ea8 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [2807 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [2de9 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ba3 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ea9 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org1.example.com | [2808 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2dea 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ba4 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2eaa 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org1.example.com | [2809 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2deb 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ba5 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [2eab 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org1.example.com | [280a 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2dec 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ba6 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2eac 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [280b 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ded 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ba7 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ead 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [280c 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2dee 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2ba8 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2eae 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] marked as valid by state validator +peer0.org1.example.com | [280d 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2def 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 e2 6c 42 f2 a8 e2 3f 70 70 87 06 55 06 f1 1c |..lB...?pp..U...| +peer1.org1.example.com | [2ba9 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2eaf 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc004d428c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc004d42900)} +peer0.org1.example.com | [280e 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 0d d9 f7 7e a8 3b 92 34 16 5f fe d2 69 f8 7c a6 |...~.;.4._..i.|.| +peer1.org1.example.com | [2baa 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2eb0 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [280f 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2df0 08-31 20:52:01.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 d3 ec 39 b0 40 f0 97 91 21 35 |0E.!....9.@...!5| +peer1.org1.example.com | [2bab 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2eb1 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [2810 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 7d 64 7f f8 31 b9 cd 11 e8 6d 70 50 41 d5 f3 58 |}d..1....mpPA..X| +peer1.org1.example.com | [2bac 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2eb2 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [2811 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 7e 04 66 4a a2 02 20 2a b7 16 58 02 a4 c6 82 b9 |~.fJ.. *..X.....| +peer1.org1.example.com | [2bad 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2eb3 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +peer0.org1.example.com | [2812 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 a0 eb 2f 01 26 3d 0f 66 2e 59 14 44 9c a3 ad bf |../.&=.f.Y.D....| +peer1.org1.example.com | [2bae 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2eb4 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +peer0.org1.example.com | [2813 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org2.example.com | 00000040 a0 8f b9 51 b3 d2 b5 |...Q...| +peer1.org1.example.com | [2baf 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2eb5 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +peer0.org1.example.com | [2814 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bb0 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:C\010" secret_envelope:q/\205\240;\014\002 O\263\261\343\310\266r<_\026L\250\033~&\233\n\243\226Y\024S\026\221I\250'7\354\306\000\251" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [2df1 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | [2eb6 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2815 08-31 20:51:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Started container dev-peer0.org1.example.com-exp02-1.0 +peer1.org1.example.com | [2bb1 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:C\010" secret_envelope:q/\205\240;\014\002 O\263\261\343\310\266r<_\026L\250\033~&\233\n\243\226Y\024S\026\221I\250'7\354\306\000\251" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [2eb7 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2816 08-31 20:51:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(exp02-1.0) +peer1.org1.example.com | [2bb2 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2df2 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 8b aa d0 7a ff cf df 52 91 c3 7a |0D. ....z...R..z| +peer1.org2.example.com | [2eb8 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\027zr\322\256\002 [\367\327\267\361Bk\217\311\362\264\333l&o\370\345\363\n\316\001Q>\206\346\002M\310\037\245]\230" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2817 08-31 20:51:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(exp02-1.0) lock +peer1.org1.example.com | [2bb3 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:C\010" secret_envelope:q/\205\240;\014\002 O\263\261\343\310\266r<_\026L\250\033~&\233\n\243\226Y\024S\026\221I\250'7\354\306\000\251" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 43 d9 08 eb 62 27 37 b5 e7 1b e8 da 70 33 56 1b |C...b'7.....p3V.| +peer1.org2.example.com | [2eb9 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\027zr\322\256\002 [\367\327\267\361Bk\217\311\362\264\333l&o\370\345\363\n\316\001Q>\206\346\002M\310\037\245]\230" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [2818 08-31 20:51:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU got container (exp02-1.0) lock +peer1.org1.example.com | [2bb4 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | 00000020 16 c9 de 85 02 20 40 88 c5 ad 8a d4 a0 80 63 a8 |..... @.......c.| +peer1.org2.example.com | [2eba 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2819 08-31 20:51:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(exp02-1.0) +peer1.org1.example.com | [2bb5 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 32 a5 08 5b 5d 36 89 0c 4a 22 07 f8 c0 bb af |.2..[]6..J".....| +peer0.org2.example.com | 00000030 e8 0e 57 28 dd 85 b3 1a 9c 12 58 b6 3e 88 72 82 |..W(......X.>.r.| +peer1.org2.example.com | [2ebb 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +peer0.org1.example.com | [281a 08-31 20:51:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode exp02:1.0 's authentication is authorized +peer1.org1.example.com | 00000010 81 5e c6 35 d5 0c 8f f9 28 5b 93 d5 1d 82 31 47 |.^.5....([....1G| +peer0.org2.example.com | 00000040 e9 10 c9 34 a8 1d |...4..| +peer1.org2.example.com | [2e9e 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [281b 08-31 20:51:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +peer1.org1.example.com | [2bb6 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 20 4b 9b 56 37 47 b1 a7 58 68 4a |0D. m K.V7G..XhJ| +peer0.org2.example.com | [2df3 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2ebc 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [281c 08-31 20:51:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +peer1.org1.example.com | 00000010 2c a7 0e f2 23 b6 f7 9c c2 4f 95 09 80 b0 47 a0 |,...#....O....G.| +peer0.org2.example.com | [2df4 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [2ebd 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [281d 08-31 20:51:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode exp02:1.0 +peer1.org1.example.com | 00000020 ca d7 85 94 02 20 27 8e 25 2e 24 47 56 b3 2a 69 |..... '.%.$GV.*i| +peer0.org2.example.com | [2df5 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ebe 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [281e 08-31 20:51:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"exp02:1.0" , sending back REGISTERED +peer1.org1.example.com | 00000030 9d 97 17 a3 9e f6 07 c2 c3 cb a1 47 2f c5 b7 e2 |...........G/...| +peer0.org2.example.com | [2df6 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ebf 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4024 bytes, seq: 5}, Envelope: 4054 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [281f 08-31 20:51:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"exp02:1.0" +peer1.org1.example.com | 00000040 b6 71 55 3e 43 08 |.qU>C.| +peer0.org2.example.com | [2df7 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ec0 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2820 08-31 20:51:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"exp02:1.0" +peer1.org1.example.com | [2bb7 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [2df8 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [2ec1 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ec2 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4024 bytes, seq: 5}, Envelope: 4054 bytes, Signature: 0 bytes +peer0.org1.example.com | [2821 08-31 20:51:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"exp02:1.0" +peer0.org2.example.com | [2df9 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2ec3 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2822 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | [2dfa 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2ec4 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2823 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [2bb8 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 b1 7a 89 d9 8f 68 24 b0 8b 6d |0E.!...z...h$..m| +peer0.org2.example.com | [2dfb 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2ec5 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2824 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer1.org1.example.com | 00000010 25 2f 64 84 35 a7 70 19 b8 ee e2 06 8a a0 3e 71 |%/d.5.p.......>q| +peer0.org2.example.com | [2dfc 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2ec6 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [2825 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] handling PUT_STATE from chaincode +peer1.org1.example.com | 00000020 2f 85 a0 3b 0c 02 20 4f b3 b1 e3 c8 b6 72 3c 5f |/..;.. O.....r<_| +peer0.org2.example.com | [2dfd 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2ec7 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2826 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Completed PUT_STATE. Sending RESPONSE +peer1.org1.example.com | 00000030 16 4c a8 1b 7e 26 9b 0a a3 96 59 14 53 16 91 49 |.L..~&....Y.S..I| +peer0.org2.example.com | [2dfe 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2ec8 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0xdc, 0x42, 0xca, 0x8d, 0x6b, 0x16, 0xf2, 0x93, 0x4, 0x29, 0x62, 0xf1, 0xe4, 0x9, 0xe8, 0xbf, 0x83, 0x51, 0xc9, 0xc7, 0x8b, 0xc4, 0x6, 0xa4, 0xd3, 0x7b, 0x3d, 0x42, 0xb5, 0xa5, 0x4, 0x73} txOffsets= +peer0.org1.example.com | [2827 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer1.org1.example.com | 00000040 a8 27 37 ec c6 00 a9 |.'7....| +peer0.org2.example.com | [2dff 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | txId=ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b locPointer=offset=70, bytesLength=2980 +peer0.org1.example.com | [2828 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] handling PUT_STATE from chaincode +peer1.org1.example.com | [2bb9 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [2e00 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | ] +peer0.org1.example.com | [2829 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Completed PUT_STATE. Sending RESPONSE +peer1.org1.example.com | [2bba 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [2e01 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df8670 gate 1598907121505780000 evaluation starts +peer1.org2.example.com | [2ec9 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93592, bytesLength=2980] for tx ID: [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] to txid-index +peer0.org1.example.com | [282a 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [2bbb 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2e02 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df8670 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2eca 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93592, bytesLength=2980] for tx number:[0] ID: [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] to blockNumTranNum index +peer0.org1.example.com | [282b 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] notifying Txid:d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a, channelID:businesschannel +peer1.org1.example.com | [2bbc 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2e03 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df8670 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2ecb 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [282c 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [2bbd 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2e04 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df8670 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2ecc 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97568], isChainEmpty=[false], lastBlockNumber=[5] +peer0.org1.example.com | [282d 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][d0697242] Exit chaincode: name:"lscc" (48140ms) +peer1.org1.example.com | [2bbe 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e05 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df8670 principal evaluation fails +peer1.org2.example.com | [2ece 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +peer0.org1.example.com | [282e 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | [2bbf 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e06 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df8670 gate 1598907121505780000 evaluation fails +peer1.org2.example.com | [2ecd 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [282f 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] +peer1.org1.example.com | [2bc0 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e07 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2ecf 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2830 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d0697242] Exit +peer1.org1.example.com | [2bc1 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [2e08 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2ed0 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2831 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d0697242] Entry chaincode: name:"lscc" +peer1.org1.example.com | [2bc2 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e09 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2ed1 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2832 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d0697242] escc for chaincode name:"lscc" is escc +peer1.org1.example.com | [2bc3 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e0a 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df8be0 gate 1598907121506766800 evaluation starts +peer1.org2.example.com | [2ed2 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 e2 6c 42 f2 a8 e2 3f 70 70 87 06 55 06 f1 1c |..lB...?pp..U...| +peer0.org1.example.com | [2833 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a, chaincode: lscc} +peer1.org1.example.com | [2bc4 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2e0b 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df8be0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000010 0d d9 f7 7e a8 3b 92 34 16 5f fe d2 69 f8 7c a6 |...~.;.4._..i.|.| +peer0.org1.example.com | [2834 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20C19CA11B4D20AEF4AF6611CB0F74...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [2bc5 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:C\010" secret_envelope:q/\205\240;\014\002 O\263\261\343\310\266r<_\026L\250\033~&\233\n\243\226Y\024S\026\221I\250'7\354\306\000\251" > > alive: +peer0.org2.example.com | [2e0c 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df8be0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2835 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AFEB7FA3DB22E80D9AD4D120960F3CA16D3CB56C57739B9F1494E8BBE2630F70 +peer0.org2.example.com | [2e0d 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df8be0 principal matched by identity 0 +peer1.org2.example.com | [2ed3 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 d3 ec 39 b0 40 f0 97 91 21 35 |0E.!....9.@...!5| +peer0.org1.example.com | [2836 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a, chaincode: lscc} +peer1.org1.example.com | [2bc6 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e0e 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 f8 9b e4 72 34 12 af 1e 59 64 6f 0d 8a c1 60 |....r4...Ydo...`| +peer1.org2.example.com | 00000010 7d 64 7f f8 31 b9 cd 11 e8 6d 70 50 41 d5 f3 58 |}d..1....mpPA..X| +peer0.org1.example.com | [2837 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d0697242] Exit +peer1.org1.example.com | [2bc7 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 90 df 35 e3 f0 30 73 f6 1b f0 ab 1c 65 d5 17 e0 |..5..0s.....e...| +peer1.org2.example.com | 00000020 7e 04 66 4a a2 02 20 2a b7 16 58 02 a4 c6 82 b9 |~.fJ.. *..X.....| +peer0.org1.example.com | [2838 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] +peer1.org1.example.com | [2bc8 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e0f 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 52 69 8a 68 62 3a 2f 6e 03 e8 |0E.!..Ri.hb:/n..| +peer1.org2.example.com | 00000030 a0 eb 2f 01 26 3d 0f 66 2e 59 14 44 9c a3 ad bf |../.&=.f.Y.D....| +peer0.org1.example.com | [2839 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36780 +peer1.org1.example.com | [2bc9 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 4c 2e 14 0b f5 82 38 bb e3 47 31 24 d1 ef a4 35 |L.....8..G1$...5| +peer1.org2.example.com | 00000040 a0 8f b9 51 b3 d2 b5 |...Q...| +peer0.org1.example.com | [283a 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36780 grpc.code=OK grpc.call_duration=48.1469173s +peer1.org1.example.com | [2bca 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 d6 2f 24 69 da 02 20 68 de cb 59 e9 9d a8 cd 04 |./$i.. h..Y.....| +peer1.org2.example.com | [2ed5 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [283b 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2bcb 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 fa 70 d6 f6 14 21 7c 03 a6 83 99 8d 03 f9 e2 09 |.p...!|.........| +peer1.org2.example.com | [2ed6 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [283c 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2bcc 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 cc ff 9c a0 c7 ef 71 |......q| +peer1.org2.example.com | [2ed7 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [283d 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bcd 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2e10 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df8be0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2ed8 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e 74 70 5f 69 da ef 58 05 f1 9d 10 2e d6 70 |..tp_i..X......p| +peer0.org1.example.com | [283e 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2bce 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2e11 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 3a de 14 88 17 ee d0 42 51 d5 a6 46 8d f5 8c 3d |:......BQ..F...=| +peer0.org1.example.com | [283f 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2e12 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004df8be0 gate 1598907121506766800 evaluation succeeds +peer1.org2.example.com | [2ed9 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a c0 56 b6 72 65 1b f5 d5 29 c0 a2 |0D. *.V.re...)..| +peer1.org1.example.com | [2bcf 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org1.example.com | [2840 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e13 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 58 56 5c 65 a7 0b 2c 94 80 c5 ce 83 ac be f6 54 |XV\e..,........T| +peer1.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [2e14 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2841 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000020 2f 31 e3 48 02 20 5b 2a ae cd 07 ba a2 8e 32 f3 |/1.H. [*......2.| +peer1.org1.example.com | [2bd0 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | [2e15 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2842 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000030 dd 1c 0d 2d 4b c6 ed e9 22 79 c7 aa 01 3d 20 6f |...-K..."y...= o| +peer1.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | [2e16 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2843 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 8b 81 64 ef ec 80 |..d...| +peer1.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | [2e17 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2844 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2eda 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2e18 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org1.example.com | [2845 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2edb 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2e19 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org1.example.com | [2846 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2edc 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e1a 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2bd1 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2847 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9060 gate 1598907117530135900 evaluation starts +peer1.org2.example.com | [2edd 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e1b 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 e2 6c 42 f2 a8 e2 3f 70 70 87 06 55 06 f1 1c |..lB...?pp..U...| +peer1.org1.example.com | [2bd2 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2848 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9060 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2ed4 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +peer0.org2.example.com | 00000010 0d d9 f7 7e a8 3b 92 34 16 5f fe d2 69 f8 7c a6 |...~.;.4._..i.|.| +peer1.org1.example.com | [2bd3 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2849 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9060 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2e1c 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 d3 ec 39 b0 40 f0 97 91 21 35 |0E.!....9.@...!5| +peer1.org2.example.com | [2ede 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [2bd4 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [284a 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9060 principal matched by identity 0 +peer0.org2.example.com | 00000010 7d 64 7f f8 31 b9 cd 11 e8 6d 70 50 41 d5 f3 58 |}d..1....mpPA..X| +peer1.org2.example.com | [2edf 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +peer1.org1.example.com | [2bd5 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [284b 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 95 58 59 84 9d 85 53 3a 08 e7 42 d4 42 4e dc |..XY...S:..B.BN.| +peer0.org2.example.com | 00000020 7e 04 66 4a a2 02 20 2a b7 16 58 02 a4 c6 82 b9 |~.fJ.. *..X.....| +peer1.org2.example.com | [2ee0 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org1.example.com | [2bd6 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002618370 gate 1598907125689459500 evaluation starts +peer0.org1.example.com | 00000010 e7 60 1a 2a 99 59 8b a6 77 7a 03 e3 01 91 67 21 |.`.*.Y..wz....g!| +peer0.org2.example.com | 00000030 a0 eb 2f 01 26 3d 0f 66 2e 59 14 44 9c a3 ad bf |../.&=.f.Y.D....| +peer1.org2.example.com | [2ee1 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org1.example.com | [2bd7 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002618370 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [284c 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 33 09 e9 75 72 52 c7 87 68 8e |0E.!..3..urR..h.| +peer0.org2.example.com | 00000040 a0 8f b9 51 b3 d2 b5 |...Q...| +peer1.org2.example.com | [2ee2 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer1.org1.example.com | [2bd8 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002618370 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 f6 30 18 ec 2e a6 f0 ab 2f b7 f7 47 f9 05 b2 d5 |.0....../..G....| +peer0.org2.example.com | [2e1d 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ee3 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer1.org1.example.com | [2bd9 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002618370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000020 fe 05 9d 54 8f 02 20 7d c0 8b f9 59 8d fd dd cd |...T.. }...Y....| +peer0.org2.example.com | [2e1e 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2ee4 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2bda 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002618370 principal evaluation fails +peer0.org1.example.com | 00000030 4e 65 c0 2c c8 0f c6 17 11 70 e1 05 3f 18 21 24 |Ne.,.....p..?.!$| +peer0.org2.example.com | [2e1f 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ee5 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org1.example.com | [2bdb 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002618370 gate 1598907125689459500 evaluation fails +peer0.org1.example.com | 00000040 df ab ad 6f e0 b1 11 |...o...| +peer0.org2.example.com | [2e20 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2ee6 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer1.org1.example.com | [2bdc 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [284d 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9060 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2e21 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 5b 37 f3 59 2a 3d 1c 8c 82 f6 83 f7 e7 f3 1e |=[7.Y*=.........| +peer1.org2.example.com | [2ee7 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2bdd 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [284e 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9060 gate 1598907117530135900 evaluation succeeds +peer0.org2.example.com | 00000010 f4 28 26 0f 02 53 00 aa 05 07 d0 da 3f 7a 06 41 |.(&..S......?z.A| +peer1.org2.example.com | [2ee8 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2bde 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [284f 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2e22 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de ee 1b dc b7 1a e2 1b 53 7f 16 |0E.!.........S..| +peer1.org2.example.com | [2ee9 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2bdf 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002618930 gate 1598907125689728800 evaluation starts +peer0.org1.example.com | [2850 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 a3 38 34 24 60 fd 7a 03 5c 53 7f 2a ef 00 95 34 |.84$`.z.\S.*...4| +peer1.org1.example.com | [2be0 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002618930 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2851 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000020 46 26 d9 e2 46 02 20 6c 4a a0 18 ef 6f 2c 50 d4 |F&..F. lJ...o,P.| +peer1.org2.example.com | [2eea 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2be1 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002618930 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2852 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000030 d4 66 95 9f 6e 41 79 68 aa 6e dc b2 5f c9 cf df |.f..nAyh.n.._...| +peer1.org2.example.com | [2eec 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer1.org1.example.com | [2be2 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002618930 principal matched by identity 0 +peer0.org1.example.com | [2853 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000040 4d 02 bb 49 8f 8c 3c |M..I..<| +peer1.org2.example.com | [2eed 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +peer1.org1.example.com | [2be3 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org1.example.com | [2854 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [2e23 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2eeb 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org1.example.com | [2855 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2e24 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2eee 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2be4 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org1.example.com | [2856 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2e25 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ef1 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dac5a0 gate 1598907125109453200 evaluation starts +peer1.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org1.example.com | [2857 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [2e26 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [2eef 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +peer1.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org1.example.com | [2858 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e27 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [2ef2 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +peer1.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org1.example.com | [2859 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e28 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2ef0 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org1.example.com | [285a 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e29 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 e2 6c 42 f2 a8 e2 3f 70 70 87 06 55 06 f1 1c |..lB...?pp..U...| +peer1.org2.example.com | [2ef3 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dac5a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2be5 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002618930 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [285b 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org2.example.com | 00000010 0d d9 f7 7e a8 3b 92 34 16 5f fe d2 69 f8 7c a6 |...~.;.4._..i.|.| +peer1.org2.example.com | [2ef4 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dac5a0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2be6 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002618930 gate 1598907125689728800 evaluation succeeds +peer0.org1.example.com | [285c 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e2a 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 d3 ec 39 b0 40 f0 97 91 21 35 |0E.!....9.@...!5| +peer1.org2.example.com | [2ef5 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dac5a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2be7 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [285d 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 7d 64 7f f8 31 b9 cd 11 e8 6d 70 50 41 d5 f3 58 |}d..1....mpPA..X| +peer1.org2.example.com | [2ef6 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +peer1.org1.example.com | [2be8 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [285e 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 7e 04 66 4a a2 02 20 2a b7 16 58 02 a4 c6 82 b9 |~.fJ.. *..X.....| +peer1.org2.example.com | [2ef8 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dac5a0 principal evaluation fails +peer1.org1.example.com | [2be9 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [285f 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000030 a0 eb 2f 01 26 3d 0f 66 2e 59 14 44 9c a3 ad bf |../.&=.f.Y.D....| +peer1.org2.example.com | [2ef7 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +peer1.org1.example.com | [2bea 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000040 a0 8f b9 51 b3 d2 b5 |...Q...| +peer0.org1.example.com | [2860 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [2ef9 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dac5a0 gate 1598907125109453200 evaluation fails +peer1.org1.example.com | [2beb 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e2b 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2861 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [2efa 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2bec 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e2c 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2862 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2efb 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2bed 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [2e2d 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2863 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [2efc 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2bee 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e2e 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2864 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2efd 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dacb10 gate 1598907125113751900 evaluation starts +peer1.org1.example.com | [2bef 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e2f 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2865 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [2efe 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dacb10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2bf0 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2e30 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2866 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2eff 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dacb10 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2bf1 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e31 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2867 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [2f00 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +peer1.org1.example.com | [2bf2 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2e32 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2868 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [2f01 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 52ms (state_validation=8ms block_and_pvtdata_commit=33ms state_commit=5ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +peer1.org1.example.com | [2bf3 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e33 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 5b 37 f3 59 2a 3d 1c 8c 82 f6 83 f7 e7 f3 1e |=[7.Y*=.........| +peer0.org1.example.com | [2869 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f02 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2bf4 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 f4 28 26 0f 02 53 00 aa 05 07 d0 da 3f 7a 06 41 |.(&..S......?z.A| +peer0.org1.example.com | [286a 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f03 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408B8BB829CF9AF9D9816...08061A0C0A0565787030321203312E30 +peer1.org1.example.com | [2bf5 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [2e34 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de ee 1b dc b7 1a e2 1b 53 7f 16 |0E.!.........S..| +peer0.org1.example.com | [286b 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f04 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F5FF6EC36FD146A24CE708BA4FD322A96429C94A7C34B89CC61A7DBA8D8CB9EE +peer1.org1.example.com | [2bf6 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | 00000010 a3 38 34 24 60 fd 7a 03 5c 53 7f 2a ef 00 95 34 |.84$`.z.\S.*...4| +peer0.org1.example.com | [286c 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f05 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dacb10 principal matched by identity 0 +peer1.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | 00000020 46 26 d9 e2 46 02 20 6c 4a a0 18 ef 6f 2c 50 d4 |F&..F. lJ...o,P.| +peer0.org1.example.com | [286d 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f07 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +peer1.org1.example.com | [2bf7 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | 00000030 d4 66 95 9f 6e 41 79 68 aa 6e dc b2 5f c9 cf df |.f..nAyh.n.._...| +peer0.org1.example.com | [286e 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f06 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 67 45 e2 b2 b6 dd cb c6 17 26 f9 c3 80 4c 61 |(gE.......&...La| +peer1.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | 00000040 4d 02 bb 49 8f 8c 3c |M..I..<| +peer0.org1.example.com | [286f 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 78 f0 6f f2 46 3e df cf 0a d1 3d 63 21 71 82 b9 |x.o.F>....=c!q..| +peer1.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | [2e35 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2870 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f08 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 37 c0 99 e0 4d 4b c6 43 5c 1b |0E.!..7...MK.C\.| +peer1.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org2.example.com | [2e36 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2871 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 f3 b5 30 5a 1c 66 ae 7e 3e c5 02 08 de 6f f5 78 |..0Z.f.~>....o.x| +peer1.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org2.example.com | [2e37 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2872 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 4b 9b f5 c9 d8 02 20 70 bf 4b 5b b4 32 61 8a c6 |K..... p.K[.2a..| +peer1.org1.example.com | [2bf8 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e38 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2873 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 d0 f7 4f 42 86 38 6b 84 df 24 71 aa 70 44 01 49 |..OB.8k..$q.pD.I| +peer1.org1.example.com | [2bf9 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e39 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2874 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 8f 8c c8 d7 43 97 51 |....C.Q| +peer1.org1.example.com | [2bfa 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e3a 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2875 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f09 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dacb10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2bfb 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e3b 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2876 08-31 20:51:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f0a 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dacb10 gate 1598907125113751900 evaluation succeeds +peer1.org1.example.com | [2bfc 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e3c 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [2877 08-31 20:51:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f0b 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [2bfd 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [2e3d 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f0c 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2878 08-31 20:51:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2bfe 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e3e 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f0d 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2879 08-31 20:51:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2bff 08-31 20:52:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e3f 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f0e 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [287a 08-31 20:51:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [2c00 08-31 20:52:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e40 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f0f 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [287b 08-31 20:51:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [2c01 08-31 20:52:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [2e41 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2f10 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [287c 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2c02 08-31 20:52:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e42 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f11 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [287d 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816102A +peer1.org1.example.com | [2c04 08-31 20:52:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e43 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2f12 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [287e 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DD1B21A6698DD8DEE140B259447D93B24EF5F541DDFDB8C0372057AE33B850ED +peer1.org1.example.com | [2c05 08-31 20:52:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e44 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2f13 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [287f 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2c06 08-31 20:52:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e45 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2f14 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2880 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2c03 08-31 20:52:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e46 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2f15 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2881 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | [2c07 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e47 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2f16 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2882 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2c08 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e48 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2f17 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2883 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c09 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2e49 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e36470 gate 1598907121604546900 evaluation starts +peer1.org2.example.com | [2f18 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2884 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2c0a 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer1.org2.example.com | [2f19 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2e4a 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e36470 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2885 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c0b 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f1a 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2e4b 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e36470 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2886 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c0c 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f1b 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2e4c 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e36470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2887 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c0d 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2f1c 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd0280 gate 1598907125123148200 evaluation starts +peer0.org2.example.com | [2e4d 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e36470 principal evaluation fails +peer0.org1.example.com | [2888 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2c0e 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f1d 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd0280 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2e4e 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e36470 gate 1598907121604546900 evaluation fails +peer0.org1.example.com | [2889 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c0f 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2f1e 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd0280 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2e4f 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [288a 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c10 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f1f 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd0280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2e50 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [288b 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c11 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [2f20 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd0280 principal evaluation fails +peer0.org2.example.com | [2e51 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [288c 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c12 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f21 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd0280 gate 1598907125123148200 evaluation fails +peer0.org2.example.com | [2e52 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e369e0 gate 1598907121606092700 evaluation starts +peer0.org1.example.com | [288d 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c13 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f22 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2e53 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e369e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [288e 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c15 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f23 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2e54 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e369e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [288f 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c14 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f24 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2e55 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e369e0 principal matched by identity 0 +peer0.org1.example.com | [2890 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c16 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f25 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd07f0 gate 1598907125125335700 evaluation starts +peer0.org2.example.com | [2e56 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 67 45 e2 b2 b6 dd cb c6 17 26 f9 c3 80 4c 61 |(gE.......&...La| +peer0.org1.example.com | [2891 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2c17 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer1.org2.example.com | [2f26 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd07f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 78 f0 6f f2 46 3e df cf 0a d1 3d 63 21 71 82 b9 |x.o.F>....=c!q..| +peer0.org1.example.com | [2892 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer1.org2.example.com | [2f27 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd07f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2e57 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 37 c0 99 e0 4d 4b c6 43 5c 1b |0E.!..7...MK.C\.| +peer0.org1.example.com | [2893 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2c18 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer1.org2.example.com | [2f28 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd07f0 principal matched by identity 0 +peer0.org2.example.com | 00000010 f3 b5 30 5a 1c 66 ae 7e 3e c5 02 08 de 6f f5 78 |..0Z.f.~>....o.x| +peer0.org1.example.com | [2894 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer1.org2.example.com | [2f29 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 f8 9b e4 72 34 12 af 1e 59 64 6f 0d 8a c1 60 |....r4...Ydo...`| +peer0.org2.example.com | 00000020 4b 9b f5 c9 d8 02 20 70 bf 4b 5b b4 32 61 8a c6 |K..... p.K[.2a..| +peer0.org1.example.com | [2895 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer1.org2.example.com | 00000010 90 df 35 e3 f0 30 73 f6 1b f0 ab 1c 65 d5 17 e0 |..5..0s.....e...| +peer0.org2.example.com | 00000030 d0 f7 4f 42 86 38 6b 84 df 24 71 aa 70 44 01 49 |..OB.8k..$q.pD.I| +peer0.org1.example.com | [2896 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer1.org2.example.com | [2f2a 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 52 69 8a 68 62 3a 2f 6e 03 e8 |0E.!..Ri.hb:/n..| +peer0.org2.example.com | 00000040 8f 8c c8 d7 43 97 51 |....C.Q| +peer0.org1.example.com | [2897 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer1.org2.example.com | 00000010 4c 2e 14 0b f5 82 38 bb e3 47 31 24 d1 ef a4 35 |L.....8..G1$...5| +peer0.org2.example.com | [2e58 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e369e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2898 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2c19 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 d6 2f 24 69 da 02 20 68 de cb 59 e9 9d a8 cd 04 |./$i.. h..Y.....| +peer0.org2.example.com | [2e59 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e369e0 gate 1598907121606092700 evaluation succeeds +peer0.org1.example.com | [2899 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f6860 gate 1598907117620324200 evaluation starts +peer1.org1.example.com | [2c1a 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 fa 70 d6 f6 14 21 7c 03 a6 83 99 8d 03 f9 e2 09 |.p...!|.........| +peer0.org2.example.com | [2e5a 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [289a 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f6860 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2c1b 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000040 cc ff 9c a0 c7 ef 71 |......q| +peer0.org2.example.com | [2e5b 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [289b 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c1c 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2f2b 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd07f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2e5c 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [289c 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f6860 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2c1d 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2f2c 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dd07f0 gate 1598907125125335700 evaluation succeeds +peer0.org2.example.com | [2e5d 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [289d 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f6860 principal matched by identity 0 +peer1.org1.example.com | [2c1e 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2f2d 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2e5e 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [289e 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c1f 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2f2e 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2e5f 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [289f 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 95 58 59 84 9d 85 53 3a 08 e7 42 d4 42 4e dc |..XY...S:..B.BN.| +peer1.org1.example.com | [2c20 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2f2f 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2e60 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | 00000010 e7 60 1a 2a 99 59 8b a6 77 7a 03 e3 01 91 67 21 |.`.*.Y..wz....g!| +peer1.org1.example.com | [2c21 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025eb4b0 gate 1598907125943204400 evaluation starts +peer1.org2.example.com | [2f30 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2e61 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [28a0 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 33 09 e9 75 72 52 c7 87 68 8e |0E.!..3..urR..h.| +peer1.org1.example.com | [2c22 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025eb4b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2f31 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2e62 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | 00000010 f6 30 18 ec 2e a6 f0 ab 2f b7 f7 47 f9 05 b2 d5 |.0....../..G....| +peer1.org1.example.com | [2c23 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025eb4b0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2f32 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e63 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 fe 05 9d 54 8f 02 20 7d c0 8b f9 59 8d fd dd cd |...T.. }...Y....| +peer1.org1.example.com | [2c24 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025eb4b0 principal matched by identity 0 +peer1.org2.example.com | [2f33 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2e64 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 4e 65 c0 2c c8 0f c6 17 11 70 e1 05 3f 18 21 24 |Ne.,.....p..?.!$| +peer1.org1.example.com | [2c25 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer1.org2.example.com | [2f34 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 e2 6c 42 f2 a8 e2 3f 70 70 87 06 55 06 f1 1c |..lB...?pp..U...| +peer0.org2.example.com | [2e65 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 df ab ad 6f e0 b1 11 |...o...| +peer1.org1.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer1.org2.example.com | 00000010 0d d9 f7 7e a8 3b 92 34 16 5f fe d2 69 f8 7c a6 |...~.;.4._..i.|.| +peer0.org2.example.com | [2e66 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org1.example.com | [28a1 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f6860 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2c26 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer1.org2.example.com | [2f35 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e67 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28a2 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f6860 gate 1598907117620324200 evaluation succeeds +peer1.org1.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer1.org2.example.com | [2f37 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 d3 ec 39 b0 40 f0 97 91 21 35 |0E.!....9.@...!5| +peer0.org2.example.com | [2e68 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28a3 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer1.org2.example.com | 00000010 7d 64 7f f8 31 b9 cd 11 e8 6d 70 50 41 d5 f3 58 |}d..1....mpPA..X| +peer0.org2.example.com | [2e69 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28a4 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer1.org2.example.com | 00000020 7e 04 66 4a a2 02 20 2a b7 16 58 02 a4 c6 82 b9 |~.fJ.. *..X.....| +peer0.org2.example.com | [2e6a 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [28a5 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer1.org2.example.com | 00000030 a0 eb 2f 01 26 3d 0f 66 2e 59 14 44 9c a3 ad bf |../.&=.f.Y.D....| +peer0.org2.example.com | [2e6b 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [28a6 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2c27 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025eb4b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000040 a0 8f b9 51 b3 d2 b5 |...Q...| +peer0.org2.example.com | [2e6c 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28a7 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2c28 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025eb4b0 gate 1598907125943204400 evaluation succeeds +peer1.org2.example.com | [2f36 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e6d 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" > alive: alive: alive: +peer0.org1.example.com | [28a8 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c29 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2f38 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [2e6e 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [28a9 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [2c2a 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2f39 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e6f 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28aa 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 1b 21 a6 69 8d d8 de e1 40 b2 59 44 7d 93 b2 |..!.i....@.YD}..| +peer1.org1.example.com | [2c2b 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2f3a 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [2e70 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 4e f5 f5 41 dd fd b8 c0 37 20 57 ae 33 b8 50 ed |N..A....7 W.3.P.| +peer1.org1.example.com | [2c2c 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2f3b 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e 74 70 5f 69 da ef 58 05 f1 9d 10 2e d6 70 |..tp_i..X......p| +peer0.org2.example.com | [2e71 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28ab 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 17 39 ee e4 bb 52 28 6b 8b 5e |0E.!...9...R(k.^| +peer1.org1.example.com | [2c2d 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 3a de 14 88 17 ee d0 42 51 d5 a6 46 8d f5 8c 3d |:......BQ..F...=| +peer0.org2.example.com | [2e72 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 8a b8 eb 99 1f e1 27 3f 0b 4c b6 79 c5 78 87 bb |......'?.L.y.x..| +peer1.org1.example.com | [2c2e 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f3c 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a c0 56 b6 72 65 1b f5 d5 29 c0 a2 |0D. *.V.re...)..| +peer0.org2.example.com | [2e73 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000020 50 be b3 a5 ad 02 20 5d ff 0e 7f 36 86 89 6b f8 |P..... ]...6..k.| +peer1.org1.example.com | [2c2f 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 58 56 5c 65 a7 0b 2c 94 80 c5 ce 83 ac be f6 54 |XV\e..,........T| +peer0.org2.example.com | [2e74 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 d9 70 3e 99 c3 d8 0a 3f bd 7c d7 c8 26 b7 a4 d8 |.p>....?.|..&...| +peer1.org2.example.com | 00000020 2f 31 e3 48 02 20 5b 2a ae cd 07 ba a2 8e 32 f3 |/1.H. [*......2.| +peer1.org1.example.com | [2c30 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e75 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000040 28 fb d4 3b 5a 92 4b |(..;Z.K| +peer1.org2.example.com | 00000030 dd 1c 0d 2d 4b c6 ed e9 22 79 c7 aa 01 3d 20 6f |...-K..."y...= o| +peer1.org1.example.com | [2c31 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2e76 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [28ac 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 8b 81 64 ef ec 80 |..d...| +peer1.org1.example.com | [2c32 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2e77 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [28ad 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [2f3d 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c33 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2e78 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [28ae 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f3e 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c34 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2e79 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [28af 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2f3f 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c35 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025e86f0 gate 1598907125962990800 evaluation starts +peer0.org2.example.com | [2e7a 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [28b0 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 4b 69 75 4b ad d9 ae c0 56 5c f3 7d 58 82 72 |.KiuK....V\.}X.r| +peer1.org2.example.com | [2f40 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c36 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025e86f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2e7b 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e62940 gate 1598907121700579300 evaluation starts +peer0.org1.example.com | 00000010 13 5b a2 cb e9 63 ba 7b ef 62 bb 14 58 42 74 fe |.[...c.{.b..XBt.| +peer1.org2.example.com | [2f41 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c37 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025e86f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2e7c 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e62940 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [28b1 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 00 5a 2d 8c 2e 35 13 26 0f a2 |0E.!...Z-..5.&..| +peer1.org2.example.com | [2f42 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2c38 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025e86f0 principal matched by identity 0 +peer0.org2.example.com | [2e7d 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e62940 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 d9 56 a6 42 fd 09 6e fc e5 0d a2 ca e1 f9 85 3b |.V.B..n........;| +peer1.org2.example.com | [2f43 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c39 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org2.example.com | [2e7e 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e62940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000020 77 03 0a b8 29 02 20 2f 5a 54 73 bb 4e 1d f4 b9 |w...). /ZTs.N...| +peer1.org2.example.com | [2f44 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e 74 70 5f 69 da ef 58 05 f1 9d 10 2e d6 70 |..tp_i..X......p| +peer1.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org2.example.com | [2e7f 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e62940 principal evaluation fails +peer0.org1.example.com | 00000030 f6 b8 ba 99 24 05 24 b1 56 88 9d f9 1c 66 1f 92 |....$.$.V....f..| +peer1.org2.example.com | 00000010 3a de 14 88 17 ee d0 42 51 d5 a6 46 8d f5 8c 3d |:......BQ..F...=| +peer1.org1.example.com | [2c3a 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org2.example.com | [2e80 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e62940 gate 1598907121700579300 evaluation fails +peer0.org1.example.com | 00000040 2b 90 ed 4b 23 73 bd |+..K#s.| +peer1.org2.example.com | [2f45 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a c0 56 b6 72 65 1b f5 d5 29 c0 a2 |0D. *.V.re...)..| +peer1.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org2.example.com | [2e81 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [28b2 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 58 56 5c 65 a7 0b 2c 94 80 c5 ce 83 ac be f6 54 |XV\e..,........T| +peer1.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org1.example.com | [28b3 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 2f 31 e3 48 02 20 5b 2a ae cd 07 ba a2 8e 32 f3 |/1.H. [*......2.| +peer1.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org2.example.com | [2e82 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [28b4 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 dd 1c 0d 2d 4b c6 ed e9 22 79 c7 aa 01 3d 20 6f |...-K..."y...= o| +peer1.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org2.example.com | [2e83 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [28b5 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 8b 81 64 ef ec 80 |..d...| +peer1.org1.example.com | [2c3b 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025e86f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2e84 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e62eb0 gate 1598907121703081500 evaluation starts +peer0.org1.example.com | [28b6 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [2f46 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | [2c3c 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025e86f0 gate 1598907125962990800 evaluation succeeds +peer0.org2.example.com | [2e85 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e62eb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [28b7 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 1b 21 a6 69 8d d8 de e1 40 b2 59 44 7d 93 b2 |..!.i....@.YD}..| +peer1.org1.example.com | [2c3d 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [2e86 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e62eb0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 4e f5 f5 41 dd fd b8 c0 37 20 57 ae 33 b8 50 ed |N..A....7 W.3.P.| +peer1.org1.example.com | [2c3e 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2f47 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c ad f9 81 21 2a bd df e8 b5 e8 2e |0D. <...!*......| +peer0.org2.example.com | [2e87 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e62eb0 principal matched by identity 0 +peer0.org1.example.com | [28b8 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 17 39 ee e4 bb 52 28 6b 8b 5e |0E.!...9...R(k.^| +peer1.org1.example.com | [2c3f 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 e9 83 cc ae 23 3c ce 10 36 34 e9 b1 68 a3 3e 17 |....#<..64..h.>.| +peer0.org2.example.com | [2e88 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org1.example.com | 00000010 8a b8 eb 99 1f e1 27 3f 0b 4c b6 79 c5 78 87 bb |......'?.L.y.x..| +peer1.org1.example.com | [2c40 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000020 7a 72 d2 ae 02 20 5b f7 d7 b7 f1 42 6b 8f c9 f2 |zr... [....Bk...| +peer0.org2.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org1.example.com | 00000020 50 be b3 a5 ad 02 20 5d ff 0e 7f 36 86 89 6b f8 |P..... ]...6..k.| +peer1.org1.example.com | [2c41 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 b4 db 6c 26 6f f8 e5 f3 0a ce 01 51 3e 86 e6 02 |..l&o......Q>...| +peer0.org2.example.com | [2e89 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer0.org1.example.com | 00000030 d9 70 3e 99 c3 d8 0a 3f bd 7c d7 c8 26 b7 a4 d8 |.p>....?.|..&...| +peer1.org1.example.com | [2c42 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 4d c8 1f a5 5d 98 |M...].| +peer0.org2.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer0.org1.example.com | 00000040 28 fb d4 3b 5a 92 4b |(..;Z.K| +peer1.org1.example.com | [2c43 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2f48 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer0.org1.example.com | [28b9 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | [2c44 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2f49 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [2c45 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2f4a 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer0.org1.example.com | [28ba 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 41 1d e3 06 bc 96 67 09 11 f7 |0E.!..A.....g...| +peer1.org1.example.com | [2c46 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2f4b 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2e8a 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e62eb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 2b 59 9a 90 11 fd 5d a7 07 b5 73 d8 81 9c bd e2 |+Y....]...s.....| +peer1.org1.example.com | [2c47 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025e92f0 gate 1598907125969476200 evaluation starts +peer1.org2.example.com | [2f4c 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e8b 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e62eb0 gate 1598907121703081500 evaluation succeeds +peer0.org1.example.com | 00000020 c4 c9 6c ca e1 02 20 0f 23 2c 87 ed 67 d7 05 22 |..l... .#,..g.."| +peer1.org1.example.com | [2c48 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025e92f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2f4d 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [2e8c 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000030 0b 64 c2 5c a8 56 53 c9 3f 4b 63 eb 55 43 e7 b7 |.d.\.VS.?Kc.UC..| +peer1.org1.example.com | [2c49 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025e92f0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2f4e 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 e9 80 50 1d 78 6e af |..P.xn.| +peer1.org1.example.com | [2c4a 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025e92f0 principal matched by identity 0 +peer0.org2.example.com | [2e8d 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2f4f 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28bb 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2c4b 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org2.example.com | [2e8e 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2f50 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28bc 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org2.example.com | [2e8f 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2f51 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28bd 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c4c 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org2.example.com | [2e90 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f52 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28be 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org2.example.com | [2e91 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f53 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28bf 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org2.example.com | [2e92 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2f54 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28c0 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org2.example.com | [2e93 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2f55 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [28c1 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org2.example.com | [2e94 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2f56 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28c2 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c4d 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025e92f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2e95 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2f57 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [28c3 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [2c4e 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025e92f0 gate 1598907125969476200 evaluation succeeds +peer0.org2.example.com | [2e96 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2f58 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [28c4 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 1b 21 a6 69 8d d8 de e1 40 b2 59 44 7d 93 b2 |..!.i....@.YD}..| +peer1.org1.example.com | [2c4f 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2e97 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e63aa0 gate 1598907121712605600 evaluation starts +peer1.org2.example.com | [2f59 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 4e f5 f5 41 dd fd b8 c0 37 20 57 ae 33 b8 50 ed |N..A....7 W.3.P.| +peer1.org1.example.com | [2c50 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2e98 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e63aa0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2f5a 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [28c5 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 17 39 ee e4 bb 52 28 6b 8b 5e |0E.!...9...R(k.^| +peer1.org1.example.com | [2c51 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2e99 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e63aa0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2f5b 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | 00000010 8a b8 eb 99 1f e1 27 3f 0b 4c b6 79 c5 78 87 bb |......'?.L.y.x..| +peer1.org1.example.com | [2c52 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2e9a 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e63aa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2f5c 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 50 be b3 a5 ad 02 20 5d ff 0e 7f 36 86 89 6b f8 |P..... ]...6..k.| +peer1.org1.example.com | [2c53 08-31 20:52:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | [2e9b 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e63aa0 principal evaluation fails +peer1.org2.example.com | [2f5d 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000030 d9 70 3e 99 c3 d8 0a 3f bd 7c d7 c8 26 b7 a4 d8 |.p>....?.|..&...| +peer1.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [2e9c 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e63aa0 gate 1598907121712605600 evaluation fails +peer1.org2.example.com | [2f5e 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000040 28 fb d4 3b 5a 92 4b |(..;Z.K| +peer1.org1.example.com | [2c54 08-31 20:52:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | [2e9d 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2f5f 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [28c6 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org2.example.com | [2f60 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2e9e 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [28c7 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org2.example.com | [2f61 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2e9f 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [28c8 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org2.example.com | [2f62 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2ea0 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e80010 gate 1598907121716105800 evaluation starts +peer1.org1.example.com | [2c55 08-31 20:52:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f63 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2ea1 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e80010 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [28c9 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2c56 08-31 20:52:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c57 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | [2ea2 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e80010 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [28ca 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 4b 69 75 4b ad d9 ae c0 56 5c f3 7d 58 82 72 |.KiuK....V\.}X.r| +peer1.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org2.example.com | [2f64 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e18000 gate 1598907125290030200 evaluation starts +peer0.org2.example.com | [2ea3 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e80010 principal matched by identity 0 +peer0.org1.example.com | 00000010 13 5b a2 cb e9 63 ba 7b ef 62 bb 14 58 42 74 fe |.[...c.{.b..XBt.| +peer1.org1.example.com | [2c58 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org2.example.com | [2f65 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e18000 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ea4 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org1.example.com | [28cb 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 00 5a 2d 8c 2e 35 13 26 0f a2 |0E.!...Z-..5.&..| +peer1.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org2.example.com | [2f66 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e18000 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org1.example.com | 00000010 d9 56 a6 42 fd 09 6e fc e5 0d a2 ca e1 f9 85 3b |.V.B..n........;| +peer0.org1.example.com | 00000020 77 03 0a b8 29 02 20 2f 5a 54 73 bb 4e 1d f4 b9 |w...). /ZTs.N...| +peer1.org2.example.com | [2f67 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e18000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org1.example.com | 00000030 f6 b8 ba 99 24 05 24 b1 56 88 9d f9 1c 66 1f 92 |....$.$.V....f..| +peer1.org2.example.com | [2f68 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e18000 principal evaluation fails +peer0.org2.example.com | [2ea5 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer1.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org1.example.com | 00000040 2b 90 ed 4b 23 73 bd |+..K#s.| +peer0.org1.example.com | [28cc 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer1.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org1.example.com | [28cd 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f69 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e18000 gate 1598907125290030200 evaluation fails +peer0.org2.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer1.org1.example.com | [2c59 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org1.example.com | [28ce 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [2f6a 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2f6b 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2f6c 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [28cf 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f6d 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e18570 gate 1598907125303955600 evaluation starts +peer0.org1.example.com | [28d0 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org2.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer1.org2.example.com | [2f6e 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e18570 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [28d1 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2c5a 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org2.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer1.org2.example.com | [2f6f 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e18570 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [28d2 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org2.example.com | [2ea6 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e80010 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2f70 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e18570 principal matched by identity 0 +peer0.org1.example.com | [28d3 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org2.example.com | [2ea7 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e80010 gate 1598907121716105800 evaluation succeeds +peer1.org2.example.com | [2f71 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 e5 e9 a6 fb 05 57 8b d3 8e 51 f7 68 a5 7e 34 |......W...Q.h.~4| +peer0.org1.example.com | [28d4 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org2.example.com | [2ea8 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 b6 76 b4 12 be 3b bf 81 92 39 f3 26 08 8e 3d f9 |.v...;...9.&..=.| +peer0.org1.example.com | [28d5 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org2.example.com | [2ea9 08-31 20:52:01.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2eaa 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2eab 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2eac 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ead 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2eae 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f72 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 bc 8b 48 51 d1 a7 f4 4e 90 17 b0 |0D. $..HQ...N...| +peer1.org2.example.com | 00000010 99 35 8b 1a f5 b3 d0 ea df 36 6c 2a ac 9b 9a c6 |.5.......6l*....| +peer1.org2.example.com | 00000020 75 1b 64 53 02 20 56 08 1f 62 ca c4 b4 51 85 eb |u.dS. V..b...Q..| +peer1.org2.example.com | 00000030 70 95 38 d7 bd ce c4 65 f6 21 5c 79 f5 17 7e 57 |p.8....e.!\y..~W| +peer1.org2.example.com | 00000040 55 69 e5 10 d3 6b |Ui...k| +peer1.org2.example.com | [2f73 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e18570 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2f74 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e18570 gate 1598907125303955600 evaluation succeeds +peer1.org2.example.com | [2f75 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2f76 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2f77 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2f78 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2f79 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f7a 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2f7b 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2f7c 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2f7d 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [2f7e 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f7f 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f80 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f81 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f82 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f83 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f84 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f85 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f86 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f87 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f88 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f89 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f8a 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2f8b 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f8c 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f8d 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2f8e 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f8f 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f90 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f91 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f92 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f93 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f94 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f95 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2f96 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f97 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f98 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f99 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2f9a 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [2f9b 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [2f9c 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2f9d 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2f9e 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2f9f 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2fa0 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2fa1 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2fa2 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2fa3 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3aee0 gate 1598907125330406800 evaluation starts +peer1.org2.example.com | [2fa4 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3aee0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2fa5 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3aee0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2fa6 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3aee0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [2fa7 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3aee0 principal evaluation fails +peer1.org2.example.com | [2fa8 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3aee0 gate 1598907125330406800 evaluation fails +peer1.org2.example.com | [2fa9 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2faa 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [2fab 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [2fac 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3b450 gate 1598907125330736100 evaluation starts +peer1.org2.example.com | [2fad 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3b450 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2fae 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3b450 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2faf 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3b450 principal matched by identity 0 +peer1.org2.example.com | [2fb0 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 10 07 8f e4 2b 02 2d 3e fc 47 48 d6 8f 49 ad |.....+.->.GH..I.| +peer1.org2.example.com | 00000010 f2 d8 41 ea bd 99 65 15 93 84 fb f2 3e 69 8d 88 |..A...e.....>i..| +peer1.org2.example.com | [2fb1 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 ee 06 3e b8 e0 d4 82 23 2c 60 aa |0D. C..>....#,`.| +peer1.org2.example.com | 00000010 9d e7 9e 39 08 8f b3 1f 87 55 47 87 62 d9 88 a3 |...9.....UG.b...| +peer1.org2.example.com | 00000020 5f 1f ee 65 02 20 1d 6c fd 2c 4b 23 d7 eb bc 62 |_..e. .l.,K#...b| +peer1.org2.example.com | 00000030 be 76 b0 77 85 48 ce da cd 6f d0 2b 60 ab bc 00 |.v.w.H...o.+`...| +peer1.org2.example.com | 00000040 5c 73 bc 0e 0d 58 |\s...X| +peer1.org2.example.com | [2fb2 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3b450 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [2fb3 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e3b450 gate 1598907125330736100 evaluation succeeds +peer1.org2.example.com | [2fb4 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2fb5 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [2fb6 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [2fb7 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [2fb8 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2fb9 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [2fba 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [2fbb 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [2fbc 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [2fbd 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fbe 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fbf 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fc0 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [2fc1 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fc2 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fc3 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fc4 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2eaf 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2eb0 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2eb1 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2eb2 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2eb3 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2eb4 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2eb5 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e812c0 gate 1598907121726054000 evaluation starts +peer0.org2.example.com | [2eb6 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e812c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2eb7 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e812c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2eb8 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e812c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2eb9 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e812c0 principal evaluation fails +peer0.org2.example.com | [2eba 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e812c0 gate 1598907121726054000 evaluation fails +peer0.org2.example.com | [2ebb 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ebc 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ebd 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2ebe 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e81830 gate 1598907121729065500 evaluation starts +peer0.org2.example.com | [2ebf 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e81830 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ec0 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e81830 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2ec1 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e81830 principal matched by identity 0 +peer0.org2.example.com | [2ec2 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ec3 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ec4 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org2.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org2.example.com | [2ec5 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer0.org2.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer0.org2.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer0.org2.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer0.org2.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer0.org2.example.com | [2ec6 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org2.example.com | [2ec7 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ec8 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ec9 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2eca 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ecb 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e81830 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2ecc 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e81830 gate 1598907121729065500 evaluation succeeds +peer0.org2.example.com | [2ecd 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2ece 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2ecf 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ed0 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2ed1 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2ed2 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2ed3 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ed4 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ed5 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2ed6 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28d6 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030d9e0 gate 1598907117623861400 evaluation starts +peer0.org1.example.com | [28d7 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030d9e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [28d8 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030d9e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [28d9 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030d9e0 principal matched by identity 0 +peer0.org1.example.com | [28da 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 82 19 b7 35 14 1a b4 75 5e 2d 23 8c 90 9d 66 |....5...u^-#...f| +peer0.org1.example.com | 00000010 a7 f8 43 2c 0d cb 12 68 89 9e 50 10 9c 6e 54 0b |..C,...h..P..nT.| +peer0.org1.example.com | [28db 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 7b b0 97 a6 f0 53 6a 3c 08 79 be |0D. s{....Sj<.y.| +peer0.org1.example.com | 00000010 39 82 04 0d 36 ee cd b4 91 dc 92 d3 4c 29 fe 90 |9...6.......L)..| +peer0.org1.example.com | 00000020 42 71 d4 40 02 20 7a 9d 60 11 4e 87 9e 1b 2e ef |Bq.@. z.`.N.....| +peer0.org1.example.com | 00000030 5b 01 77 10 24 49 6d 4b b2 f3 d3 3a 6e 52 9b f7 |[.w.$ImK...:nR..| +peer0.org1.example.com | 00000040 40 0c 97 d8 27 4b |@...'K| +peer0.org1.example.com | [28dc 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030d9e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [28dd 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030d9e0 gate 1598907117623861400 evaluation succeeds +peer0.org1.example.com | [28de 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [28df 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [28e0 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [28e1 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [28e2 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [28e3 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28e4 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28e5 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28e6 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28e7 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [28e8 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [28e9 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28ea 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [28eb 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28ec 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [28ed 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [28ee 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [28ef 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [28f0 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [28f1 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [28f2 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [28f3 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28f4 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [28f5 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [28f6 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [28f7 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [28f8 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [28f9 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [28fa 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [28fb 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cb110 gate 1598907117720118700 evaluation starts +peer0.org1.example.com | [28fc 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cb110 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [28fd 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cb110 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [28fe 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cb110 principal matched by identity 0 +peer0.org1.example.com | [28ff 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [2900 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org1.example.com | [2c5b 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c5c 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ed7 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2fc5 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" > alive:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" > alive: +peer1.org2.example.com | [2fc6 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fc7 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c5d 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [2fc8 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c5e 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c5f 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ed8 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2fc9 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fca 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fcb 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org2.example.com | [2ed9 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2eda 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2edb 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2edc 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2fcc 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fcd 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2edd 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea6b80 gate 1598907121741558000 evaluation starts +peer1.org1.example.com | [2c60 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2c61 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [2fce 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org1.example.com | [2c62 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fcf 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ede 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea6b80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org1.example.com | [2c63 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c64 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c65 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c66 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [2fd0 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2c67 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2fd1 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [2edf 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea6b80 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2901 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cb110 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2c68 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2fd2 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 3f 53 55 af 41 40 b7 82 ca 7c 32 ff b8 ce 68 |.?SU.A@...|2...h| +peer0.org2.example.com | [2ee0 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea6b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2902 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cb110 gate 1598907117720118700 evaluation succeeds +peer1.org1.example.com | [2c69 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000010 a0 98 99 06 03 79 e7 70 7e b8 92 8a 48 f0 61 0f |.....y.p~...H.a.| +peer0.org2.example.com | [2ee1 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea6b80 principal evaluation fails +peer0.org1.example.com | [2903 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2c6a 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2fd3 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 63 a9 d0 da c0 f3 7c df 1c 0a e6 |0D. .c.....|....| +peer0.org2.example.com | [2ee2 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea6b80 gate 1598907121741558000 evaluation fails +peer0.org1.example.com | [2904 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2c6b 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000010 2d 8f 30 9d fe 80 91 12 60 de c7 9e 6e e4 e3 0d |-.0.....`...n...| +peer0.org2.example.com | [2ee3 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2905 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2c6c 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002595fb0 gate 1598907126011524800 evaluation starts +peer1.org2.example.com | 00000020 70 8f 44 d2 02 20 03 f0 52 44 15 4e 3f 59 be 57 |p.D.. ..RD.N?Y.W| +peer0.org2.example.com | [2ee4 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2906 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2c6d 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002595fb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | 00000030 21 15 2d 79 db bb 32 86 b8 86 ef 10 c0 c1 43 07 |!.-y..2.......C.| +peer0.org2.example.com | [2ee5 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2ee6 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea70f0 gate 1598907121743982900 evaluation starts +peer0.org1.example.com | [2907 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 58 64 34 c7 d0 61 |Xd4..a| +peer0.org2.example.com | [2ee7 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea70f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2908 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c6e 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002595fb0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2fd4 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2fd5 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2909 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [290b 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2c6f 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002595fb0 principal matched by identity 0 +peer1.org1.example.com | [2c70 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org2.example.com | [2ee8 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea70f0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org2.example.com | [2fd6 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2ee9 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea70f0 principal matched by identity 0 +peer0.org1.example.com | [290c 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [290d 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [290e 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2c71 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org1.example.com | [290f 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org2.example.com | [2fd7 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2eea 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org1.example.com | [2910 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027c470 gate 1598907117724536400 evaluation starts +peer1.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org2.example.com | [2fd8 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org1.example.com | [2911 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027c470 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [2c72 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002595fb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2c73 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002595fb0 gate 1598907126011524800 evaluation succeeds +peer1.org1.example.com | [2c74 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2c75 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2c76 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2c77 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2c78 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c79 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2c7a 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [2fd9 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fda 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fdb 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2c7b 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [2fdc 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2eeb 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer0.org1.example.com | [2912 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027c470 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2c7c 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2fdd 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fde 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fdf 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2fe0 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [2fe1 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [2fe2 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2fe3 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fe4 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2fe5 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fe6 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2fe7 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fe8 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [2fe9 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [2fea 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer1.org2.example.com | [2feb 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2913 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027c470 principal matched by identity 0 +peer0.org2.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer1.org1.example.com | [2c7d 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2fec 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2914 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer1.org1.example.com | [2c7e 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ecaf0 gate 1598907126015291800 evaluation starts +peer1.org2.example.com | [2fed 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer1.org1.example.com | [2c7f 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ecaf0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2fee 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2915 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer1.org1.example.com | [2c80 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ecaf0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2fef 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [2eec 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea70f0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2c81 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ecaf0 principal matched by identity 0 +peer1.org2.example.com | [2ff0 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | [2eed 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ea70f0 gate 1598907121743982900 evaluation succeeds +peer1.org1.example.com | [2c82 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org2.example.com | [2ff1 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [2eee 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [2c83 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org2.example.com | [2ff2 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org2.example.com | [2eef 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org2.example.com | [2ff3 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2916 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027c470 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2ef0 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org2.example.com | [2ff4 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f bf 80 35 88 b4 5b e6 9f 32 d4 41 b7 09 ed 0f |o..5..[..2.A....| +peer0.org1.example.com | [2917 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027c470 gate 1598907117724536400 evaluation succeeds +peer0.org2.example.com | [2ef1 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org2.example.com | 00000010 34 d7 bd f8 6b 0e 06 76 63 fa 7a 7c a3 3e 80 3a |4...k..vc.z|.>.:| +peer0.org1.example.com | [2918 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ef2 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org2.example.com | [2ff5 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fa 65 3f 1e 10 70 c0 a9 4e 51 b4 |0D. U.e?..p..NQ.| +peer0.org1.example.com | [2919 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ef3 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2c84 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ecaf0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 f3 2c 93 90 53 d0 9b d0 7f 62 a7 f1 0c ef 07 c6 |.,..S....b......| +peer0.org1.example.com | [291a 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2ef4 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c85 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ecaf0 gate 1598907126015291800 evaluation succeeds +peer1.org2.example.com | 00000020 a9 50 fc c6 02 20 18 c8 87 be b7 06 63 1b 8d 96 |.P... ......c...| +peer0.org1.example.com | [291b 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2ef5 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c86 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000030 82 62 c7 68 41 b0 2c f4 c0 09 14 96 16 92 01 a0 |.b.hA.,.........| +peer0.org1.example.com | [291c 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2ef6 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2c87 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [290a 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ef7 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 71 35 0c 02 1b 23 |q5...#| +peer1.org1.example.com | [2c88 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [291d 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org2.example.com | [2ef8 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [2ff6 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org1.example.com | [2c89 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [291e 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2ef9 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [2ff7 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 6d 54 6b 54 5b 80 21 4e d6 7e a7 |0D. bmTkT[.!N.~.| +peer1.org1.example.com | [2c8a 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2efa 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 53 92 9e 51 44 f2 9f 8b 77 ff de a1 72 81 b0 db |S..QD...w...r...| +peer1.org1.example.com | [2c8b 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [291f 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2efb 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 f2 65 16 cf 02 20 24 f9 2d be aa a4 4d 26 4f 48 |.e... $.-...M&OH| +peer1.org1.example.com | [2c8c 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2920 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000030 4f ba f0 75 07 a5 f1 3a 8a 2f bf 99 97 0a f6 2d |O..u...:./.....-| +peer1.org1.example.com | [2c8d 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2efc 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2921 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2c8e 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2c8f 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2efd 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2922 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2c90 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2efe 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000040 0a 77 0f 25 32 d7 |.w.%2.| +peer0.org1.example.com | [2923 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2eff 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2ff8 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [2924 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2f00 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8780 gate 1598907121939708800 evaluation starts +peer1.org1.example.com | [2c91 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2925 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [2ff9 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [2f01 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8780 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2c92 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ede90 gate 1598907126018938400 evaluation starts +peer0.org1.example.com | [2926 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [2ffa 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [2f02 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8780 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2c93 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ede90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2927 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027d930 gate 1598907117725432400 evaluation starts +peer1.org2.example.com | [2ffb 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [2f03 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8780 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2c94 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ede90 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2928 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027d930 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [2ffc 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [2f04 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8780 principal evaluation fails +peer1.org1.example.com | [2c95 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ede90 principal matched by identity 0 +peer0.org1.example.com | [2929 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027d930 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [2ffd 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f05 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8780 gate 1598907121939708800 evaluation fails +peer1.org1.example.com | [2c96 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org1.example.com | [292a 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027d930 principal matched by identity 0 +peer1.org2.example.com | [2ffe 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f06 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org1.example.com | [292b 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer1.org2.example.com | [2fff 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f07 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2c97 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer1.org2.example.com | [3000 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org2.example.com | [2f08 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org1.example.com | [292c 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer1.org2.example.com | [3001 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f09 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8cf0 gate 1598907121943817400 evaluation starts +peer1.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer1.org2.example.com | [3002 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f0a 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8cf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer1.org2.example.com | [3003 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [2f0b 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8cf0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer1.org2.example.com | [3004 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [2f0c 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8cf0 principal matched by identity 0 +peer1.org1.example.com | [2c98 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ede90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer1.org2.example.com | [3005 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f0d 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer1.org1.example.com | [2c99 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0024ede90 gate 1598907126018938400 evaluation succeeds +peer0.org1.example.com | [292d 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027d930 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3006 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer1.org1.example.com | [2c9a 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [292e 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027d930 gate 1598907117725432400 evaluation succeeds +peer1.org2.example.com | [3007 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f0e 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer1.org1.example.com | [2c9b 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [292f 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3008 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer1.org1.example.com | [2c9c 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2930 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3009 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer1.org1.example.com | [2c9d 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2931 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [300a 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer1.org1.example.com | [2c9e 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2932 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [300b 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer1.org1.example.com | [2c9f 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [2933 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | [300c 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2f0f 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8cf0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2ca0 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [300d 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f10 08-31 20:52:01.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec8cf0 gate 1598907121943817400 evaluation succeeds +peer1.org1.example.com | [2ca1 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer0.org1.example.com | [2934 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | [300e 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f11 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer1.org1.example.com | [2ca2 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer1.org1.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer1.org1.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer1.org1.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer1.org1.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer0.org2.example.com | [2f12 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f13 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2f14 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2f15 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f16 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f17 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f18 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f19 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2f1a 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2f1b 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2f1c 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec98e0 gate 1598907121954290500 evaluation starts +peer0.org2.example.com | [2f1d 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec98e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [300f 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3010 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3011 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3012 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eac9f0 gate 1598907125509482300 evaluation starts +peer1.org2.example.com | [3013 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eac9f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3014 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eac9f0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3015 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eac9f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3016 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eac9f0 principal evaluation fails +peer1.org2.example.com | [3017 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eac9f0 gate 1598907125509482300 evaluation fails +peer1.org2.example.com | [3018 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3019 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [301a 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [301b 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eacf60 gate 1598907125509764200 evaluation starts +peer1.org2.example.com | [301c 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eacf60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [301d 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eacf60 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [301e 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eacf60 principal matched by identity 0 +peer1.org2.example.com | [301f 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c e1 4c 4c 55 4e e3 2a fa a7 5f 9a ca 30 55 d9 |\.LLUN.*.._..0U.| +peer1.org2.example.com | 00000010 b1 55 79 03 4e b2 a0 d3 b8 90 24 86 cb ca 59 db |.Uy.N.....$...Y.| +peer1.org2.example.com | [3020 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 e1 9a 6a e4 17 d5 2f 69 d6 b8 09 |0D. 3..j.../i...| +peer1.org2.example.com | 00000010 f0 d5 1e f6 8e 9d 86 f1 e3 0d 75 07 c8 e2 d1 30 |..........u....0| +peer1.org2.example.com | 00000020 d4 81 0e 59 02 20 44 ba 45 91 9d f4 90 d6 02 8d |...Y. D.E.......| +peer1.org2.example.com | 00000030 c4 82 41 61 1c c5 bb 0f e6 4e a0 75 e8 59 62 cb |..Aa.....N.u.Yb.| +peer1.org2.example.com | 00000040 ce 99 d2 a5 c2 82 |......| +peer1.org2.example.com | [3021 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eacf60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3022 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eacf60 gate 1598907125509764200 evaluation succeeds +peer1.org2.example.com | [3023 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3024 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3025 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3026 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3027 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3028 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3029 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [302a 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [302b 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [302c 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [302d 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [302e 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [302f 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3030 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3031 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3032 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3033 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3034 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3035 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3036 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3037 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3038 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3039 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [303a 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [303b 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [303c 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [303d 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [303e 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [303f 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3040 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3041 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3042 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3043 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3044 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3045 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3046 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3047 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3048 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3049 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [304a 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [304b 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [304c 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [304d 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [304e 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [304f 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3050 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3051 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:C\010" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3052 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3053 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:C\010" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3054 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3055 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f1e 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec98e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2f1f 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec98e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2f20 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec98e0 principal evaluation fails +peer0.org2.example.com | [2f21 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec98e0 gate 1598907121954290500 evaluation fails +peer0.org2.example.com | [2f22 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f23 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f24 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2f25 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec9e50 gate 1598907121954640200 evaluation starts +peer0.org2.example.com | [2f26 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec9e50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f27 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec9e50 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2f28 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec9e50 principal matched by identity 0 +peer0.org2.example.com | [2f29 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer0.org2.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer0.org2.example.com | [2f2a 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer0.org2.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer0.org2.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer0.org2.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer0.org2.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer0.org2.example.com | [2f2b 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec9e50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2f2c 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec9e50 gate 1598907121954640200 evaluation succeeds +peer0.org2.example.com | [2f2d 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f2e 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f2f 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2f30 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2f31 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f32 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f33 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f34 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2f35 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f36 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f37 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2f38 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2f39 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2f3a 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3120 gate 1598907121960598300 evaluation starts +peer0.org2.example.com | [2f3b 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3120 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f3c 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3120 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2f3d 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [2ca3 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ca4 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ca5 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2ca6 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2ca7 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2ca8 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2ca9 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2caa 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2cab 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004dd9d0 gate 1598907126021288200 evaluation starts +peer1.org1.example.com | [2cac 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004dd9d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2cad 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004dd9d0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2cae 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004dd9d0 principal matched by identity 0 +peer1.org1.example.com | [2caf 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +peer1.org1.example.com | 00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +peer1.org1.example.com | [2cb0 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +peer1.org1.example.com | 00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +peer1.org1.example.com | 00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +peer1.org1.example.com | 00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +peer1.org1.example.com | 00000040 95 10 dc 3c 55 b0 |... DEBU 0xc0004dd9d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2cb2 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004dd9d0 gate 1598907126021288200 evaluation succeeds +peer1.org1.example.com | [2cb3 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2cb4 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2cb5 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2cb6 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2cb7 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cb8 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cb9 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2cba 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2cbb 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2cbc 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2cbd 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2cbe 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2cbf 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d4e80 gate 1598907126024958600 evaluation starts +peer1.org1.example.com | [2cc0 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d4e80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2cc1 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d4e80 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2cc2 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d4e80 principal matched by identity 0 +peer1.org1.example.com | [2cc3 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [2cc4 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [2cc5 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d4e80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2cc6 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004d4e80 gate 1598907126024958600 evaluation succeeds +peer1.org1.example.com | [2cc7 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2cc8 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2cc9 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2cca 08-31 20:52:06.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2ccb 08-31 20:52:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org1.example.com | [2ccc 08-31 20:52:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org1.example.com | [2ccd 08-31 20:52:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cce 08-31 20:52:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ccf 08-31 20:52:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cd0 08-31 20:52:06.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cd1 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cd2 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2cd3 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cd4 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cd5 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cd6 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cd7 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [2935 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [2936 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [2937 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2938 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f3e 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3120 principal evaluation fails +peer0.org2.example.com | [2f3f 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3120 gate 1598907121960598300 evaluation fails +peer0.org2.example.com | [2f40 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f41 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f42 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2f43 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3690 gate 1598907121960955700 evaluation starts +peer0.org2.example.com | [2f44 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3690 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f45 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3690 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2f46 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3690 principal matched by identity 0 +peer0.org2.example.com | [2f47 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer0.org2.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer0.org2.example.com | [2f48 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer0.org2.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer0.org2.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer0.org2.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer0.org2.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer0.org2.example.com | [2f49 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3690 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2f4a 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ee3690 gate 1598907121960955700 evaluation succeeds +peer0.org2.example.com | [2f4b 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f4c 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f4d 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2f4e 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2f4f 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f50 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f51 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f52 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org2.example.com | [2f53 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f54 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f55 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f56 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f57 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f58 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f59 08-31 20:52:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f5a 08-31 20:52:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f5b 08-31 20:52:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [2f5c 08-31 20:52:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f5d 08-31 20:52:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f5e 08-31 20:52:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f5f 08-31 20:52:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f60 08-31 20:52:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f61 08-31 20:52:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f62 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer0.org2.example.com | [2f63 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f64 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f65 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cd8 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2cd9 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cda 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2cdb 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2cdc 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2cdd 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2cde 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2cdf 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2ce0 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002587080 gate 1598907126169342700 evaluation starts +peer1.org1.example.com | [2ce1 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002587080 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2ce2 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002587080 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2ce3 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002587080 principal matched by identity 0 +peer1.org1.example.com | [2ce4 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [2ce5 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [2ce6 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002587080 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2ce7 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002587080 gate 1598907126169342700 evaluation succeeds +peer1.org1.example.com | [2ce8 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ce9 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2cea 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2ceb 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2cec 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ced 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2cee 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [2cef 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2cf0 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2cf1 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2cf2 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2cf3 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2cf4 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2cf5 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2cf6 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c4f00 gate 1598907126183362400 evaluation starts +peer1.org1.example.com | [2cf7 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c4f00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2cf8 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c4f00 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2cf9 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c4f00 principal matched by identity 0 +peer1.org1.example.com | [2cfa 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [2cfb 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [2cfc 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c4f00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2cfd 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004c4f00 gate 1598907126183362400 evaluation succeeds +peer1.org1.example.com | [2cfe 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2cff 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d00 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2d01 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2d02 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d03 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d04 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d05 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d06 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d07 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d08 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d09 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [2d0a 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d0b 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2d0c 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d0d 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d0e 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2d0f 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2d10 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2d11 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a0680 gate 1598907126429470600 evaluation starts +peer1.org1.example.com | [2d12 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a0680 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2d13 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a0680 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2d14 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a0680 principal matched by identity 0 +peer1.org1.example.com | [2d15 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org1.example.com | [2d16 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org1.example.com | [2d17 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a0680 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2d18 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a0680 gate 1598907126429470600 evaluation succeeds +peer1.org1.example.com | [2d19 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d1a 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d1b 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2d1c 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2d1d 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d1e 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d1f 08-31 20:52:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [2d20 08-31 20:52:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [2d21 08-31 20:52:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 e4 fa ae 42 f9 1c 8b 22 f7 e9 b1 d1 2b 60 ba |G...B..."....+`.| +peer1.org1.example.com | 00000010 bb f9 0b a0 53 8c 28 12 4f 4f 28 ed 07 2d 6c f5 |....S.(.OO(..-l.| +peer1.org1.example.com | [2d22 08-31 20:52:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 87 bc f6 0d 1a b2 12 23 16 a5 ef |0E.!........#...| +peer1.org1.example.com | 00000010 d3 8f b6 e5 b3 15 91 0e 73 9e 63 74 3a 58 69 b0 |........s.ct:Xi.| +peer1.org1.example.com | 00000020 54 91 f3 d6 f4 02 20 3f 86 a8 97 f6 8b bd 69 8e |T..... ?......i.| +peer1.org1.example.com | 00000030 21 71 63 98 ad b3 21 ce 52 7a eb b1 a2 56 33 da |!qc...!.Rz...V3.| +peer1.org1.example.com | 00000040 2b 55 cb 92 71 4e b8 |+U..qN.| +peer1.org1.example.com | [2d23 08-31 20:52:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d24 08-31 20:52:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d25 08-31 20:52:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d26 08-31 20:52:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [2d27 08-31 20:52:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d28 08-31 20:52:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d29 08-31 20:52:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d2a 08-31 20:52:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d2b 08-31 20:52:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d2c 08-31 20:52:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d2d 08-31 20:52:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d2e 08-31 20:52:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d2f 08-31 20:52:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [2d30 08-31 20:52:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f66 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2f67 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f68 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f69 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2f6a 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2f6b 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2f6c 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f01200 gate 1598907122167187300 evaluation starts +peer0.org2.example.com | [2f6d 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f01200 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f6e 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f01200 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2f6f 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f01200 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2f70 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f01200 principal evaluation fails +peer0.org2.example.com | [2f71 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f01200 gate 1598907122167187300 evaluation fails +peer0.org2.example.com | [2f72 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f73 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f74 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2f75 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f01770 gate 1598907122168530200 evaluation starts +peer0.org2.example.com | [2f76 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f01770 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f77 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f01770 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2f78 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f01770 principal matched by identity 0 +peer0.org2.example.com | [2f79 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org2.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org2.example.com | [2f7a 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f7b 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f7c 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer0.org2.example.com | [2f7d 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer0.org2.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer0.org2.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer0.org2.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer0.org2.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer0.org2.example.com | [2f7f 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f01770 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2f81 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f01770 gate 1598907122168530200 evaluation succeeds +peer0.org2.example.com | [2f82 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f84 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2f85 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2f86 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2f87 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer0.org2.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer0.org2.example.com | [2f89 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer0.org2.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer0.org2.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer0.org2.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer0.org2.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer1.org2.example.com | [3056 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3057 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3058 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3059 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [305a 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [305b 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [305c 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ecb2a0 gate 1598907125589152200 evaluation starts +peer1.org2.example.com | [305d 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ecb2a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [305e 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ecb2a0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [305f 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ecb2a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3060 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ecb2a0 principal evaluation fails +peer1.org2.example.com | [3061 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ecb2a0 gate 1598907125589152200 evaluation fails +peer1.org2.example.com | [3062 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3063 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3064 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3065 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ecb810 gate 1598907125589609600 evaluation starts +peer1.org2.example.com | [3066 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ecb810 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3067 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ecb810 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3068 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ecb810 principal matched by identity 0 +peer1.org2.example.com | [3069 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 32 a5 08 5b 5d 36 89 0c 4a 22 07 f8 c0 bb af |.2..[]6..J".....| +peer1.org2.example.com | 00000010 81 5e c6 35 d5 0c 8f f9 28 5b 93 d5 1d 82 31 47 |.^.5....([....1G| +peer1.org2.example.com | [306a 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 20 4b 9b 56 37 47 b1 a7 58 68 4a |0D. m K.V7G..XhJ| +peer1.org2.example.com | 00000010 2c a7 0e f2 23 b6 f7 9c c2 4f 95 09 80 b0 47 a0 |,...#....O....G.| +peer1.org2.example.com | 00000020 ca d7 85 94 02 20 27 8e 25 2e 24 47 56 b3 2a 69 |..... '.%.$GV.*i| +peer1.org2.example.com | 00000030 9d 97 17 a3 9e f6 07 c2 c3 cb a1 47 2f c5 b7 e2 |...........G/...| +peer1.org2.example.com | 00000040 b6 71 55 3e 43 08 |.qU>C.| +peer1.org2.example.com | [306b 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ecb810 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [306c 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ecb810 gate 1598907125589609600 evaluation succeeds +peer1.org2.example.com | [306d 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [306e 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [306f 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3070 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3071 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3072 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3073 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3074 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3075 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3076 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3077 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3078 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3079 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [307a 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [307b 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [307c 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [307d 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2d31 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d32 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d33 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d34 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2d35 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d36 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2d37 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d38 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2d39 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2d3a 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2d3b 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2d3c 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000386f40 gate 1598907129091014200 evaluation starts +peer1.org1.example.com | [2d3d 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000386f40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2d3e 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000386f40 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2d3f 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000386f40 principal matched by identity 0 +peer1.org1.example.com | [2d40 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 cb 52 a0 a2 f6 de b7 15 19 d2 31 4d 82 0d 79 |..R........1M..y| +peer1.org1.example.com | 00000010 99 e7 0c 97 22 b0 e1 d0 79 bf 2d 9f 60 8f 9d cb |...."...y.-.`...| +peer1.org1.example.com | [2d41 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 6d df 71 b4 35 38 08 9f e7 a0 |0E.!..m.q.58....| +peer1.org1.example.com | 00000010 de 81 34 e7 e9 91 39 0b f5 91 c5 d9 cc 09 34 16 |..4...9.......4.| +peer1.org1.example.com | 00000020 c7 cc 75 05 d6 02 20 3b d3 12 d9 a9 6f 2e 45 83 |..u... ;....o.E.| +peer1.org1.example.com | 00000030 75 66 75 c2 b4 c0 85 4e f5 0f 4b 08 00 0f aa 65 |ufu....N..K....e| +peer1.org1.example.com | 00000040 f5 c9 e8 c5 e9 88 8c |.......| +peer1.org1.example.com | [2d42 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000386f40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2d43 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000386f40 gate 1598907129091014200 evaluation succeeds +peer1.org1.example.com | [2d44 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d45 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2d46 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2f80 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f8a 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f7e 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f8b 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2f83 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f8c 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f88 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [2f8d 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2f8e 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +peer0.org2.example.com | 00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +peer0.org2.example.com | [2f8f 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +peer0.org2.example.com | 00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +peer0.org2.example.com | 00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +peer0.org2.example.com | 00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +peer0.org2.example.com | 00000040 95 10 dc 3c 55 b0 |... DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f91 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2f92 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2f93 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2f94 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2f95 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f32fe0 gate 1598907122182086800 evaluation starts +peer0.org2.example.com | [2f96 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f32fe0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2f97 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f32fe0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2f98 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f32fe0 principal matched by identity 0 +peer0.org2.example.com | [2f99 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +peer0.org2.example.com | 00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +peer0.org2.example.com | [2f9a 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +peer0.org2.example.com | 00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +peer0.org2.example.com | 00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +peer0.org2.example.com | 00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +peer0.org2.example.com | 00000040 95 10 dc 3c 55 b0 |... DEBU 0xc004f32fe0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2f9c 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f32fe0 gate 1598907122182086800 evaluation succeeds +peer0.org2.example.com | [2f9d 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f9e 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2f9f 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2fa0 08-31 20:52:02.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2fa1 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fa2 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fa3 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2fa4 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2fa5 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2fa6 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2fa7 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2fa8 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2fa9 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f501e0 gate 1598907122193321100 evaluation starts +peer0.org2.example.com | [2faa 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f501e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2fab 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f501e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2fac 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f501e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2fad 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f501e0 principal evaluation fails +peer0.org2.example.com | [2fae 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f501e0 gate 1598907122193321100 evaluation fails +peer0.org2.example.com | [2faf 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2fb0 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2fb1 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2fb2 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f50750 gate 1598907122193593100 evaluation starts +peer0.org2.example.com | [2fb3 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f50750 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2fb4 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f50750 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2fb5 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f50750 principal matched by identity 0 +peer0.org2.example.com | [2fb6 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer0.org2.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer0.org2.example.com | [2fb7 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer0.org2.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer0.org2.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer0.org2.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer0.org2.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer0.org2.example.com | [2fb8 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f50750 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2fb9 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f50750 gate 1598907122193593100 evaluation succeeds +peer0.org2.example.com | [2fba 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2fbb 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2fbc 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2fbd 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2fbe 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fbf 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 766 bytes, Signature: 0 bytes +peer0.org2.example.com | [2fc0 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org2.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org2.example.com | [2fc1 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org2.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org2.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org2.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org2.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org2.example.com | [2fc2 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +peer0.org1.example.com | [2939 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [293a 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [293b 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [293c 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [293d 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [293e 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [293f 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000519ef0 gate 1598907117727970100 evaluation starts +peer0.org1.example.com | [2940 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000519ef0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2941 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000519ef0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2942 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000519ef0 principal matched by identity 0 +peer0.org1.example.com | [2943 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [2944 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [2945 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [2946 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000519ef0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2947 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000519ef0 gate 1598907117727970100 evaluation succeeds +peer0.org1.example.com | [2948 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2949 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [294a 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [294b 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [294c 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [294d 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +peer0.org1.example.com | [294e 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [294f 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2950 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2951 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2952 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2953 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2954 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2955 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2956 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2957 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ef70 gate 1598907117731020600 evaluation starts +peer0.org1.example.com | [2958 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ef70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2959 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ef70 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [295a 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ef70 principal matched by identity 0 +peer1.org2.example.com | [307e 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:C\010" > alive:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" > alive: +peer1.org2.example.com | [307f 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3080 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3081 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3082 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3083 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3084 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3085 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3086 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3087 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3088 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3089 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [308a 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [308b 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [308c 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [308d 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [308e 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1a290 gate 1598907125686346000 evaluation starts +peer1.org2.example.com | [308f 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1a290 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3090 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1a290 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3091 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1a290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3092 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1a290 principal evaluation fails +peer1.org2.example.com | [3093 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1a290 gate 1598907125686346000 evaluation fails +peer1.org2.example.com | [3094 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3095 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3096 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [2d47 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2d48 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2d49 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [2d4a 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2d4b 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2d4c 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2d4d 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d4e 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d4f 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d50 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [2d51 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d52 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d53 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d54 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2d55 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:C\010" > alive: alive: alive: +peer1.org1.example.com | [2d56 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d57 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d58 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2d59 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2d5a 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [2d5b 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d5d 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d5c 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2d5e 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [2d5f 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2d60 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d61 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d62 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d63 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d64 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +peer0.org2.example.com | [2fc3 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +peer0.org2.example.com | 00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +peer0.org2.example.com | 00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +peer0.org2.example.com | 00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +peer0.org2.example.com | 00000040 95 10 dc 3c 55 b0 |... DEBU Obtaining identity +peer0.org2.example.com | [2fc5 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [295b 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [295c 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [295d 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ef70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [295e 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ef70 gate 1598907117731020600 evaluation succeeds +peer0.org1.example.com | [295f 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2960 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2961 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2962 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2963 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [2964 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [2965 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2966 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2967 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2968 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2969 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [296a 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [296b 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [296c 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [296d 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027fd10 gate 1598907117737946300 evaluation starts +peer0.org1.example.com | [296e 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027fd10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [296f 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027fd10 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2970 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027fd10 principal matched by identity 0 +peer0.org1.example.com | [2971 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [2972 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [2973 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +peer0.org1.example.com | [2974 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +peer0.org1.example.com | [2975 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +peer0.org1.example.com | [2976 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027fd10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2977 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027fd10 gate 1598907117737946300 evaluation succeeds +peer0.org1.example.com | [2978 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2979 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [297a 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [297b 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [297c 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [297d 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [297e 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [297f 08-31 20:51:57.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2980 08-31 20:51:57.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2981 08-31 20:51:57.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2982 08-31 20:51:57.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2983 08-31 20:51:57.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2984 08-31 20:51:57.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2985 08-31 20:51:57.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2986 08-31 20:51:57.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2987 08-31 20:51:57.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [2988 08-31 20:51:57.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +peer0.org1.example.com | [2989 08-31 20:51:57.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [298a 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36836 +peer0.org1.example.com | [298b 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002654230 +peer0.org1.example.com | [298c 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [298d 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [298e 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [298f 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [2990 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2991 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 4a 4c 41 71 76 81 f2 de 55 2e 8e 07 25 40 65 |EJLAqv...U...%@e| +peer0.org1.example.com | 00000010 d0 79 0b 18 53 e3 2e f2 94 58 f4 ea 4f 27 4c f8 |.y..S....X..O'L.| +peer0.org1.example.com | [2992 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 a5 de b9 b2 21 bc b4 45 63 53 |0E.!......!..EcS| +peer0.org1.example.com | 00000010 2e 3c f5 b2 b7 c7 8c b8 2c 99 38 e3 6c 22 96 e5 |.<......,.8.l"..| +peer0.org1.example.com | 00000020 e0 c9 af 2d 49 02 20 4a 4b d1 f7 e5 3c 09 a4 d0 |...-I. JK...<...| +peer0.org1.example.com | 00000030 d5 81 6f ee 1d 00 07 03 54 27 58 85 97 c9 1f 0b |..o.....T'X.....| +peer0.org1.example.com | 00000040 2b 7e 37 73 59 53 2c |+~7sYS,| +peer0.org1.example.com | [2993 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [3097 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1a800 gate 1598907125686637800 evaluation starts +peer1.org2.example.com | [3098 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1a800 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3099 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1a800 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [309a 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1a800 principal matched by identity 0 +peer1.org2.example.com | [309b 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org2.example.com | [309c 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org2.example.com | [309d 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1a800 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [309e 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1a800 gate 1598907125686637800 evaluation succeeds +peer1.org2.example.com | [309f 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [30a0 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [30a1 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [30a2 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [30a3 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30a4 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30a5 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [30a6 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [30a7 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [30a8 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [30a9 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [30aa 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b3f0 gate 1598907125687511000 evaluation starts +peer1.org2.example.com | [30ab 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b3f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [30ac 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b3f0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [30ad 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b3f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [30ae 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b3f0 principal evaluation fails +peer1.org2.example.com | [30af 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b3f0 gate 1598907125687511000 evaluation fails +peer1.org2.example.com | [30b0 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [30b1 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [30b2 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [30b3 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b960 gate 1598907125687791300 evaluation starts +peer1.org2.example.com | [30b4 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b960 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [30b5 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b960 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [30b6 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b960 principal matched by identity 0 +peer1.org2.example.com | [30b7 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org2.example.com | [30b8 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org2.example.com | [30b9 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b960 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [30ba 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f1b960 gate 1598907125687791300 evaluation succeeds +peer1.org2.example.com | [30bb 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [30bc 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [30bd 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [30be 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [30bf 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30c0 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30c1 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30c2 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org2.example.com | [30c3 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30c4 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30c5 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [30c6 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30c7 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [30c8 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30c9 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [30ca 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [30cb 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [30cc 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30cd 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [30ce 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [30cf 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [30d0 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [30d1 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [30d2 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [30d3 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef7810 gate 1598907125698687100 evaluation starts +peer1.org2.example.com | [30d4 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef7810 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [30d5 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef7810 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [30d6 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef7810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [30d7 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef7810 principal evaluation fails +peer1.org2.example.com | [30d8 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef7810 gate 1598907125698687100 evaluation fails +peer1.org2.example.com | [30d9 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [30da 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [30db 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [30dc 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef7d80 gate 1598907125698949400 evaluation starts +peer1.org2.example.com | [30dd 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef7d80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [30de 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef7d80 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [30df 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef7d80 principal matched by identity 0 +peer1.org2.example.com | [30e0 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org1.example.com | [2d65 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d66 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d67 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d68 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d69 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d6a 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d6b 08-31 20:52:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d6c 08-31 20:52:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d6d 08-31 20:52:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d6e 08-31 20:52:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d6f 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2d70 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161033 +peer1.org1.example.com | [2d71 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 02F025BEB1A9B8A24CEE74BA535A73BDCC26D30349C0EA6C60022EA5ACBF56BC +peer1.org1.example.com | [2d72 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2d73 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2d74 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [2d75 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d76 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2d77 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d78 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2d79 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2d7a 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d7b 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d7c 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d7d 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d7e 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d7f 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d80 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d81 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d82 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d83 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d84 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2d85 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 f0 25 be b1 a9 b8 a2 4c ee 74 ba 53 5a 73 bd |..%.....L.t.SZs.| +peer1.org1.example.com | 00000010 cc 26 d3 03 49 c0 ea 6c 60 02 2e a5 ac bf 56 bc |.&..I..l`.....V.| +peer1.org1.example.com | [2d86 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 34 95 95 dd 93 d5 d3 09 4e 7c |0E.!..4.......N|| +peer1.org1.example.com | 00000010 47 80 d0 dd 35 b9 ad cd b7 f1 8e dd 28 0e 8f f9 |G...5.......(...| +peer1.org1.example.com | 00000020 07 17 f4 9b be 02 20 0f 5b 32 cb a3 4a 81 47 ec |...... .[2..J.G.| +peer1.org1.example.com | 00000030 4d fd ed 3d 64 4e c2 92 14 e4 4c ef 74 e3 1e 0d |M..=dN....L.t...| +peer1.org1.example.com | 00000040 ba 5a 6a 99 92 7c 40 |.Zj..|@| +peer1.org1.example.com | [2d87 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [2d88 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 7d 3f 58 5c 72 9b 8a 36 d7 7a 80 |0D. }?X\r..6.z.| +peer1.org1.example.com | 00000010 60 29 24 e5 fd 4f ba 42 38 6f c6 71 b4 40 0d fd |`)$..O.B8o.q.@..| +peer1.org1.example.com | 00000020 bd 40 88 03 02 20 0f 22 fd 57 aa 0c 70 98 da 05 |.@... .".W..p...| +peer1.org1.example.com | 00000030 08 3b 9e 34 fb e7 7e 0d dc b2 b2 ca 11 0b cc c6 |.;.4..~.........| +peer1.org1.example.com | 00000040 e0 a2 e7 5e c8 a9 |...^..| +peer1.org1.example.com | [2d89 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [2d8a 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [2d8b 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d8c 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d8d 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d8e 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d8f 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d90 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2d91 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [2d92 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 32 a5 08 5b 5d 36 89 0c 4a 22 07 f8 c0 bb af |.2..[]6..J".....| +peer1.org1.example.com | 00000010 81 5e c6 35 d5 0c 8f f9 28 5b 93 d5 1d 82 31 47 |.^.5....([....1G| +peer1.org1.example.com | [2d93 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 20 4b 9b 56 37 47 b1 a7 58 68 4a |0D. m K.V7G..XhJ| +peer1.org1.example.com | 00000010 2c a7 0e f2 23 b6 f7 9c c2 4f 95 09 80 b0 47 a0 |,...#....O....G.| +peer1.org2.example.com | [30e1 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org2.example.com | [30e2 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef7d80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [30e3 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef7d80 gate 1598907125698949400 evaluation succeeds +peer1.org2.example.com | [30e4 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [30e5 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [30e6 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [30e7 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [30e8 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [30e9 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [30ea 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [30eb 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [30ec 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [30ed 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [30ee 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [30ef 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [30f0 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [30f1 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f51020 gate 1598907125699941500 evaluation starts +peer1.org2.example.com | [30f2 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f51020 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [30f3 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f51020 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [30f4 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f51020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [30f5 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f51020 principal evaluation fails +peer1.org2.example.com | [30f6 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f51020 gate 1598907125699941500 evaluation fails +peer1.org2.example.com | [30f7 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [30f8 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [30f9 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [30fa 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f51590 gate 1598907125705057300 evaluation starts +peer1.org2.example.com | [30fb 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f51590 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [30fc 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f51590 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [30fd 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f51590 principal matched by identity 0 +peer1.org2.example.com | [30fe 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org2.example.com | [30ff 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org2.example.com | [3100 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f51590 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3101 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f51590 gate 1598907125705057300 evaluation succeeds +peer1.org2.example.com | [3102 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3103 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3104 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3105 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3106 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3107 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3108 08-31 20:52:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3109 08-31 20:52:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [310a 08-31 20:52:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [310b 08-31 20:52:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [310c 08-31 20:52:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [310d 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [310e 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [310f 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3110 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3111 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3112 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3113 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3114 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3115 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3116 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3117 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6ce10 gate 1598907125938914100 evaluation starts +peer1.org2.example.com | [3118 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6ce10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3119 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6ce10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [311a 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6ce10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [311b 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6ce10 principal evaluation fails +peer1.org2.example.com | [311c 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6ce10 gate 1598907125938914100 evaluation fails +peer1.org2.example.com | [311d 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [311e 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [311f 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000020 ca d7 85 94 02 20 27 8e 25 2e 24 47 56 b3 2a 69 |..... '.%.$GV.*i| +peer1.org1.example.com | 00000030 9d 97 17 a3 9e f6 07 c2 c3 cb a1 47 2f c5 b7 e2 |...........G/...| +peer1.org1.example.com | 00000040 b6 71 55 3e 43 08 |.qU>C.| +peer0.org2.example.com | [2fc6 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2fc7 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2fc8 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2fc9 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2fca 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2fcb 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2fcc 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6a8d0 gate 1598907122200629900 evaluation starts +peer0.org2.example.com | [2fcd 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6a8d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2fce 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6a8d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2fcf 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6a8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2fd0 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6a8d0 principal evaluation fails +peer0.org2.example.com | [2fd1 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6a8d0 gate 1598907122200629900 evaluation fails +peer0.org2.example.com | [2fd2 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2fd3 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2fd4 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2fd5 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6ae40 gate 1598907122202367300 evaluation starts +peer0.org2.example.com | [2fd6 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6ae40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2fd7 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6ae40 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2fd8 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6ae40 principal matched by identity 0 +peer0.org2.example.com | [2fd9 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org2.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org2.example.com | [2fda 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer0.org2.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer0.org2.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer0.org2.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer0.org2.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer0.org2.example.com | [2fdb 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6ae40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2fdc 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6ae40 gate 1598907122202367300 evaluation succeeds +peer0.org2.example.com | [2fdd 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2fde 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2fdf 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2fe0 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2fe1 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [2fe2 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3120 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6d380 gate 1598907125939406000 evaluation starts +peer1.org2.example.com | [3121 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6d380 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3122 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6d380 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3123 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6d380 principal matched by identity 0 +peer1.org2.example.com | [3124 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org2.example.com | [3125 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org2.example.com | [3126 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6d380 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3127 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6d380 gate 1598907125939406000 evaluation succeeds +peer1.org2.example.com | [3128 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3129 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [312a 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [312b 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [312c 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [312d 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [312e 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [312f 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3130 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3131 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3132 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3133 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6df70 gate 1598907125941843300 evaluation starts +peer1.org2.example.com | [3134 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6df70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3135 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6df70 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3136 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6df70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3137 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6df70 principal evaluation fails +peer1.org2.example.com | [3138 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f6df70 gate 1598907125941843300 evaluation fails +peer1.org2.example.com | [3139 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [313a 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [313b 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [313c 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f864e0 gate 1598907125942557100 evaluation starts +peer1.org2.example.com | [313d 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f864e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [313e 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f864e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [313f 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f864e0 principal matched by identity 0 +peer1.org2.example.com | [3140 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org2.example.com | [3141 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org2.example.com | [3142 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f864e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3143 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f864e0 gate 1598907125942557100 evaluation succeeds +peer1.org2.example.com | [3144 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3145 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3146 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3147 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3148 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3149 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [314a 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [314b 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org2.example.com | [314c 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [314d 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2994 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000159180, header 0xc002654640 +peer0.org1.example.com | [2995 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [2996 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][026b9efc] processing txid: 026b9efc38f04af4bf9b73d889ae9f9074f1b1d5e8e40e00c49af84dadf552c9 +peer0.org1.example.com | [2997 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [026b9efc38f04af4bf9b73d889ae9f9074f1b1d5e8e40e00c49af84dadf552c9] +peer0.org1.example.com | [2998 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [2999 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [299a 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [299b 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [299c 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer0.org1.example.com | [299d 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a82c0 gate 1598907117952004700 evaluation starts +peer0.org1.example.com | [299e 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a82c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [299f 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a82c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [29a0 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a82c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [29a1 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a82c0 principal evaluation fails +peer0.org1.example.com | [29a2 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a82c0 gate 1598907117952004700 evaluation fails +peer0.org1.example.com | [29a3 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [29a4 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [29a5 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [29a6 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a8890 gate 1598907117952352600 evaluation starts +peer0.org1.example.com | [29a7 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a8890 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2fe3 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [2fe4 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2fe5 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [2fe6 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [2fe7 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [2fe8 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [2fe9 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f80040 gate 1598907122205305800 evaluation starts +peer0.org2.example.com | [2fea 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f80040 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2feb 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f80040 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2fec 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f80040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [2fed 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f80040 principal evaluation fails +peer0.org2.example.com | [2fee 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f80040 gate 1598907122205305800 evaluation fails +peer0.org2.example.com | [2fef 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ff0 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [2ff1 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [2ff2 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f805b0 gate 1598907122206455400 evaluation starts +peer0.org2.example.com | [2ff3 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f805b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [2ff4 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f805b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [2ff5 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f805b0 principal matched by identity 0 +peer0.org2.example.com | [2ff6 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer0.org2.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer0.org2.example.com | [2ff7 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer0.org2.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer0.org2.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer0.org2.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer0.org2.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer0.org2.example.com | [2ff8 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f805b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [2ff9 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f805b0 gate 1598907122206455400 evaluation succeeds +peer0.org2.example.com | [2ffa 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2ffb 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [2ffc 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [2ffd 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [2ffe 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [2fff 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer0.org2.example.com | [3000 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3001 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3002 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3003 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3004 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3005 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3006 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3007 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3008 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3009 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f81a00 gate 1598907122209636700 evaluation starts +peer0.org2.example.com | [300a 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f81a00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [300b 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f81a00 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [300c 08-31 20:52:02.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f81a00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [300d 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f81a00 principal evaluation fails +peer0.org2.example.com | [300e 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f81a00 gate 1598907122209636700 evaluation fails +peer0.org2.example.com | [300f 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3010 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3011 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3012 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f81f70 gate 1598907122210508500 evaluation starts +peer0.org2.example.com | [3013 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f81f70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3014 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f81f70 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3015 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f81f70 principal matched by identity 0 +peer0.org2.example.com | [3016 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer0.org2.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer0.org2.example.com | [3017 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer0.org2.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer0.org2.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer0.org2.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer1.org1.example.com | [2d94 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2d95 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d96 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2d97 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 f0 25 be b1 a9 b8 a2 4c ee 74 ba 53 5a 73 bd |..%.....L.t.SZs.| +peer1.org2.example.com | [314e 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 cc 26 d3 03 49 c0 ea 6c 60 02 2e a5 ac bf 56 bc |.&..I..l`.....V.| +peer0.org1.example.com | [29a8 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a8890 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [314f 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d98 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 34 95 95 dd 93 d5 d3 09 4e 7c |0E.!..4.......N|| +peer0.org1.example.com | [29a9 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer1.org2.example.com | [3150 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000010 47 80 d0 dd 35 b9 ad cd b7 f1 8e dd 28 0e 8f f9 |G...5.......(...| +peer0.org1.example.com | [29aa 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [3018 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f81f70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [29ab 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [29ac 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a8890 principal matched by identity 0 +peer0.org1.example.com | [29ad 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 4a 4c 41 71 76 81 f2 de 55 2e 8e 07 25 40 65 |EJLAqv...U...%@e| +peer0.org1.example.com | 00000010 d0 79 0b 18 53 e3 2e f2 94 58 f4 ea 4f 27 4c f8 |.y..S....X..O'L.| +peer1.org2.example.com | [3151 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3152 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3153 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3154 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3155 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000020 07 17 f4 9b be 02 20 0f 5b 32 cb a3 4a 81 47 ec |...... .[2..J.G.| +peer1.org2.example.com | [3156 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [29ae 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 a5 de b9 b2 21 bc b4 45 63 53 |0E.!......!..EcS| +peer0.org1.example.com | 00000010 2e 3c f5 b2 b7 c7 8c b8 2c 99 38 e3 6c 22 96 e5 |.<......,.8.l"..| +peer1.org1.example.com | 00000030 4d fd ed 3d 64 4e c2 92 14 e4 4c ef 74 e3 1e 0d |M..=dN....L.t...| +peer1.org1.example.com | 00000040 ba 5a 6a 99 92 7c 40 |.Zj..|@| +peer1.org2.example.com | [3157 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3158 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3159 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [315a 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [315b 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f37460 gate 1598907126004724900 evaluation starts +peer1.org2.example.com | [315c 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f37460 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [315d 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f37460 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [315e 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f37460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [315f 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f37460 principal evaluation fails +peer1.org2.example.com | [3160 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f37460 gate 1598907126004724900 evaluation fails +peer1.org2.example.com | [3161 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3162 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3163 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3164 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f379d0 gate 1598907126008871800 evaluation starts +peer1.org2.example.com | [3165 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f379d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3166 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f379d0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3167 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f379d0 principal matched by identity 0 +peer1.org2.example.com | [3168 08-31 20:52:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org2.example.com | [3169 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org2.example.com | [316a 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f379d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [316b 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f379d0 gate 1598907126008871800 evaluation succeeds +peer1.org2.example.com | [316c 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [316d 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [316e 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [316f 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3170 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3171 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3172 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3173 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3174 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3175 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3176 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3177 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3178 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org2.example.com | [3179 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org2.example.com | [317a 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [317b 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [317c 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [317d 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [317e 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [317f 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc4280 gate 1598907126174439100 evaluation starts +peer1.org2.example.com | [3180 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc4280 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3181 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc4280 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3182 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc4280 principal matched by identity 0 +peer1.org2.example.com | [3183 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org2.example.com | [3184 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org2.example.com | [3185 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc4280 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3186 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc4280 gate 1598907126174439100 evaluation succeeds +peer1.org2.example.com | [3187 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3188 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3189 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [318a 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [318b 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [318c 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [318d 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [318e 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org2.example.com | [318f 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3192 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 e0 c9 af 2d 49 02 20 4a 4b d1 f7 e5 3c 09 a4 d0 |...-I. JK...<...| +peer0.org1.example.com | 00000030 d5 81 6f ee 1d 00 07 03 54 27 58 85 97 c9 1f 0b |..o.....T'X.....| +peer0.org1.example.com | 00000040 2b 7e 37 73 59 53 2c |+~7sYS,| +peer0.org1.example.com | [29af 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a8890 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [29b0 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a8890 gate 1598907117952352600 evaluation succeeds +peer0.org1.example.com | [29b1 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [29b2 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [29b3 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [29b4 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [29b5 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [29b6 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [026b9efc38f04af4bf9b73d889ae9f9074f1b1d5e8e40e00c49af84dadf552c9] +peer0.org1.example.com | [29b7 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][026b9efc] Entry chaincode: name:"exp02" +peer0.org1.example.com | [29b8 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [29b9 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][026b9efc] Exit +peer0.org1.example.com | [29ba 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [026b9efc38f04af4bf9b73d889ae9f9074f1b1d5e8e40e00c49af84dadf552c9] +peer0.org1.example.com | [29bb 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36836 +peer0.org1.example.com | [29bc 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36836 grpc.code=OK grpc.call_duration=3.0569ms +peer0.org1.example.com | [29bd 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [29be 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:36836: read: connection reset by peer +peer0.org1.example.com | [29bf 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [29c0 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [29c1 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29c2 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29c3 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [29c4 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [29c5 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [29c6 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [29c7 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [29c8 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [29c9 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [29ca 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29cb 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29cc 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29cd 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [29ce 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [29cf 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [29d0 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29d1 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29d2 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29d3 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [29d4 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [29d5 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [29d6 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [29d7 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D9816100D1801 +peer1.org2.example.com | [3190 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3191 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3194 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3193 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3195 08-31 20:52:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3196 08-31 20:52:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3197 08-31 20:52:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3198 08-31 20:52:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [3199 08-31 20:52:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [319a 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [319b 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [319c 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [319d 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [319e 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [319f 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [31a0 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31a1 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [31a2 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31a3 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31a4 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31a5 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer1.org2.example.com | [31a6 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31a7 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31a8 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [31a9 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31aa 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [31ab 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31ac 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [31ad 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31ae 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [31af 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31b0 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31b1 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [31b2 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [31b3 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d99 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2d9a 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2d9b 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2d9c 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2d9d 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2d9e 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2d9f 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2da0 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2da1 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2da2 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2da3 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2da4 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a7b60 gate 1598907129344605100 evaluation starts +peer1.org1.example.com | [2da5 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a7b60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2da6 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a7b60 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2da7 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a7b60 principal matched by identity 0 +peer1.org1.example.com | [2da8 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 cb 52 a0 a2 f6 de b7 15 19 d2 31 4d 82 0d 79 |..R........1M..y| +peer1.org1.example.com | 00000010 99 e7 0c 97 22 b0 e1 d0 79 bf 2d 9f 60 8f 9d cb |...."...y.-.`...| +peer1.org1.example.com | [2da9 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 6d df 71 b4 35 38 08 9f e7 a0 |0E.!..m.q.58....| +peer1.org1.example.com | 00000010 de 81 34 e7 e9 91 39 0b f5 91 c5 d9 cc 09 34 16 |..4...9.......4.| +peer1.org1.example.com | 00000020 c7 cc 75 05 d6 02 20 3b d3 12 d9 a9 6f 2e 45 83 |..u... ;....o.E.| +peer1.org1.example.com | 00000030 75 66 75 c2 b4 c0 85 4e f5 0f 4b 08 00 0f aa 65 |ufu....N..K....e| +peer1.org1.example.com | 00000040 f5 c9 e8 c5 e9 88 8c |.......| +peer1.org1.example.com | [2daa 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a7b60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2dab 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a7b60 gate 1598907129344605100 evaluation succeeds +peer1.org1.example.com | [2dac 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2dad 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2dae 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2daf 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2db0 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2db1 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2db2 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2db3 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2db4 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2db5 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [2db6 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2db7 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2db8 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2db9 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2dba 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2dbb 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2dbc 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2dbd 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2dbe 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004454b0 gate 1598907129347828400 evaluation starts +peer1.org1.example.com | [2dbf 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004454b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2dc0 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004454b0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2dc1 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004454b0 principal matched by identity 0 +peer1.org1.example.com | [2dc2 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f bf 80 35 88 b4 5b e6 9f 32 d4 41 b7 09 ed 0f |o..5..[..2.A....| +peer1.org1.example.com | 00000010 34 d7 bd f8 6b 0e 06 76 63 fa 7a 7c a3 3e 80 3a |4...k..vc.z|.>.:| +peer1.org1.example.com | [2dc3 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fa 65 3f 1e 10 70 c0 a9 4e 51 b4 |0D. U.e?..p..NQ.| +peer1.org1.example.com | 00000010 f3 2c 93 90 53 d0 9b d0 7f 62 a7 f1 0c ef 07 c6 |.,..S....b......| +peer1.org1.example.com | 00000020 a9 50 fc c6 02 20 18 c8 87 be b7 06 63 1b 8d 96 |.P... ......c...| +peer1.org1.example.com | 00000030 82 62 c7 68 41 b0 2c f4 c0 09 14 96 16 92 01 a0 |.b.hA.,.........| +peer1.org1.example.com | 00000040 71 35 0c 02 1b 23 |q5...#| +peer1.org1.example.com | [2dc4 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004454b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2dc5 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004454b0 gate 1598907129347828400 evaluation succeeds +peer1.org1.example.com | [2dc6 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2dc7 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2dc8 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2dc9 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2dca 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2dcb 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dcc 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [3019 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f81f70 gate 1598907122210508500 evaluation succeeds +peer0.org2.example.com | [301a 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [301b 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [301c 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [301d 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [301e 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [301f 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3020 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3021 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3022 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3023 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3024 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3025 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3026 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fa7170 gate 1598907122213462000 evaluation starts +peer0.org2.example.com | [3027 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fa7170 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3028 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fa7170 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3029 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fa7170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [302a 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fa7170 principal evaluation fails +peer0.org2.example.com | [302b 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fa7170 gate 1598907122213462000 evaluation fails +peer0.org2.example.com | [302c 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [302d 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [302e 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [302f 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fa76e0 gate 1598907122214668900 evaluation starts +peer0.org2.example.com | [3030 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fa76e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3031 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fa76e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3032 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fa76e0 principal matched by identity 0 +peer0.org2.example.com | [3033 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org2.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org2.example.com | [3034 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer0.org2.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer0.org2.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer0.org2.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer0.org2.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer0.org2.example.com | [3035 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fa76e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3036 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fa76e0 gate 1598907122214668900 evaluation succeeds +peer0.org2.example.com | [3037 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3038 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3039 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [303a 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [303b 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer0.org2.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer0.org2.example.com | [303c 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer0.org2.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer0.org2.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer0.org2.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer0.org2.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer0.org2.example.com | [303d 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +peer0.org2.example.com | 00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +peer0.org2.example.com | [303e 08-31 20:52:02.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +peer0.org2.example.com | 00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +peer0.org2.example.com | 00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +peer0.org2.example.com | 00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +peer0.org2.example.com | 00000040 95 10 dc 3c 55 b0 |... DEBU Exiting +peer0.org2.example.com | [3040 08-31 20:52:02.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3041 08-31 20:52:02.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3042 08-31 20:52:02.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3043 08-31 20:52:02.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3044 08-31 20:52:02.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3045 08-31 20:52:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3046 08-31 20:52:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [3047 08-31 20:52:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3048 08-31 20:52:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 43 bytes, Signature: 0 bytes +peer0.org2.example.com | [3049 08-31 20:52:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 43 bytes, Signature: 0 bytes +peer0.org2.example.com | [304a 08-31 20:52:02.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [304b 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [304c 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [304d 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [304e 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [304f 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3050 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +peer0.org2.example.com | 00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +peer0.org2.example.com | [3051 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +peer0.org2.example.com | 00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +peer0.org2.example.com | 00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +peer0.org2.example.com | 00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +peer0.org2.example.com | 00000040 95 10 dc 3c 55 b0 |... DEBU Exiting +peer0.org2.example.com | [3053 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4025 bytes, seq: 4}, Envelope: 4055 bytes, Signature: 0 bytes +peer0.org2.example.com | [3054 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3055 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3056 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [3057 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3058 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [3059 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc93d0 gate 1598907122469021200 evaluation starts +peer0.org2.example.com | [305a 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc93d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [305b 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc93d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [305c 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc93d0 principal matched by identity 0 +peer0.org2.example.com | [305d 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 cf 8a 13 2d 96 af 0d a3 43 9a c7 8a fa fc 99 |....-....C......| +peer0.org2.example.com | 00000010 34 7b 05 a5 a5 40 07 bd 54 03 0c 04 9a 78 67 f8 |4{...@..T....xg.| +peer0.org2.example.com | [305e 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 a1 4c 0a 67 7e 1a d0 31 5a a1 66 |0D. &.L.g~..1Z.f| +peer0.org2.example.com | 00000010 eb 04 3b cb 2c 86 f3 5d e6 13 60 e9 33 0b a5 2c |..;.,..]..`.3..,| +peer0.org1.example.com | [29d8 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 65562A3DB5C8E18A837615B0593C0626C33470D21563866A267E586FA9AF6121 +peer0.org1.example.com | [29d9 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [29da 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29db 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29dc 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29dd 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29de 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [29df 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29e0 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29e1 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [29e2 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [29e3 08-31 20:51:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [29e4 08-31 20:51:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [29e5 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [29e6 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [29e7 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [29e8 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [29e9 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICHjCCAcWgAwIBAgIQUak2hDd8j2SLaQNMbXpZRDAKBggqhkjOPQQDAjBpMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +peer0.org1.example.com | bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +peer0.org1.example.com | BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +peer0.org1.example.com | Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUu +peer0.org1.example.com | Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET8B7vvN/rxdMqWGK+yqvj2vj +peer0.org1.example.com | zcoh0PNOTfowTjKzggxnGNjm57Tabe8mSEp3J79IN+Z0BUjlRX7ePe1Y9MnQP6NN +peer0.org1.example.com | MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +peer0.org1.example.com | SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +peer0.org1.example.com | MQtqMO2tIswbOnZ/EyE1ZgEdzPAma23Urf8qNS+mD/ACICsZIm7LFxHSrXc9AD5h +peer0.org1.example.com | WFUnXFrrWMedpv6WCUtVYuZy +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [29ea 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003080e0 gate 1598907119581979100 evaluation starts +peer0.org1.example.com | [29eb 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003080e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [29ec 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003080e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [29ed 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +peer0.org1.example.com | [29ee 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [29ef 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org1.example.com | [29f0 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003080e0 principal matched by identity 0 +peer0.org1.example.com | [29f1 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 6f d7 71 07 9c f1 8d b4 ca 12 b3 86 b4 ae 99 |.o.q............| +peer0.org1.example.com | 00000010 f2 9e ec e8 be df 8d 65 1a aa ac 78 b5 1d 35 cb |.......e...x..5.| +peer0.org1.example.com | [29f2 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 00 9c cc bd fb 05 17 8a df 3a d7 bd |0D. .........:..| +peer0.org1.example.com | 00000010 94 1f fb 58 60 b1 0d 38 96 cf 63 f7 99 59 68 d8 |...X`..8..c..Yh.| +peer0.org1.example.com | 00000020 e4 f5 91 55 02 20 3a b4 c2 15 fb bf a9 12 45 df |...U. :.......E.| +peer0.org1.example.com | 00000030 e2 06 33 33 87 d6 d9 12 7d f5 53 d3 15 e2 f4 a2 |..33....}.S.....| +peer0.org1.example.com | 00000040 24 8f eb fd 52 bb |$...R.| +peer0.org1.example.com | [29f3 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003080e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [29f4 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003080e0 gate 1598907119581979100 evaluation succeeds +peer0.org1.example.com | [29f5 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [29f6 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [29f7 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [29f8 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org2.example.com | [31b4 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [31b5 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [31b6 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [31b7 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [31b8 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [31b9 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [31ba 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ff6d10 gate 1598907126427236900 evaluation starts +peer1.org2.example.com | [31bb 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ff6d10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [31bc 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ff6d10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [31bd 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ff6d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [31be 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ff6d10 principal evaluation fails +peer1.org2.example.com | [31bf 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ff6d10 gate 1598907126427236900 evaluation fails +peer1.org2.example.com | [31c0 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [31c1 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [31c2 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [31c3 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ff7280 gate 1598907126427803900 evaluation starts +peer1.org2.example.com | [31c4 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ff7280 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [31c5 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ff7280 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [31c6 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ff7280 principal matched by identity 0 +peer1.org2.example.com | [31c7 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org2.example.com | [31c8 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org2.example.com | [31c9 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ff7280 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [31ca 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ff7280 gate 1598907126427803900 evaluation succeeds +peer1.org2.example.com | [31cb 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [31cc 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [31cd 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [31ce 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [31cf 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31d0 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2dcd 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 32 a5 08 5b 5d 36 89 0c 4a 22 07 f8 c0 bb af |.2..[]6..J".....| +peer1.org1.example.com | 00000010 81 5e c6 35 d5 0c 8f f9 28 5b 93 d5 1d 82 31 47 |.^.5....([....1G| +peer1.org1.example.com | [2dce 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 20 4b 9b 56 37 47 b1 a7 58 68 4a |0D. m K.V7G..XhJ| +peer1.org1.example.com | 00000010 2c a7 0e f2 23 b6 f7 9c c2 4f 95 09 80 b0 47 a0 |,...#....O....G.| +peer1.org1.example.com | 00000020 ca d7 85 94 02 20 27 8e 25 2e 24 47 56 b3 2a 69 |..... '.%.$GV.*i| +peer0.org2.example.com | 00000020 e6 fd 46 1d 02 20 64 ad 46 15 a1 70 53 87 e7 4b |..F.. d.F..pS..K| +peer0.org2.example.com | 00000030 62 ef ac ea 5b 6e 6c af 6d e6 7e ef 41 94 6a d0 |b...[nl.m.~.A.j.| +peer0.org2.example.com | 00000040 8c ff 4e a6 27 3b |..N.';| +peer0.org2.example.com | [305f 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc93d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3060 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc93d0 gate 1598907122469021200 evaluation succeeds +peer0.org2.example.com | [3061 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [3062 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [3063 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [3064 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [3065 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4025 bytes, seq: 4}, Envelope: 4055 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [3066 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +peer0.org2.example.com | [3067 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3068 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org2.example.com | [3069 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer0.org2.example.com | [306a 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [306b 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +peer0.org2.example.com | [306c 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +peer0.org2.example.com | [306d 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer0.org2.example.com | [306e 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +peer0.org2.example.com | [306f 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +peer0.org2.example.com | [3070 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [3071 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc004de1340 env 0xc004fc69b0 txn 0 +peer0.org2.example.com | [3072 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004fc69b0 +peer0.org2.example.com | [3073 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\360\305\265\372\005\020\214\243\205\302\001\"\017businesschannel*@a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\027\010\177\221psw\030\236\237*T\302`\367\254+Q\2323-$v\360" +peer0.org2.example.com | [3074 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [3075 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [3076 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [3077 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org2.example.com | [3078 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [3079 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 36 4f 61 9a cb be 2c 0e 7c f3 d3 0a ae 63 b0 |.6Oa...,.|....c.| +peer0.org2.example.com | 00000010 cb df 45 66 c7 92 ad 14 79 e7 5b 4f 81 2e ae 1c |..Ef....y.[O....| +peer0.org2.example.com | [307a 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b 6a 46 c8 38 65 ff 3e 84 0d 72 0a |0D. +jF.8e.>..r.| +peer0.org2.example.com | 00000010 1b 71 b6 da 55 29 15 fa 20 ed 85 cd e5 54 13 8e |.q..U).. ....T..| +peer0.org2.example.com | 00000020 73 d7 49 c1 02 20 55 36 0c 7d d4 d5 f6 0a a0 75 |s.I.. U6.}.....u| +peer0.org2.example.com | 00000030 26 3b e5 cd d5 60 48 c1 e0 09 21 1b f6 c1 c2 bb |&;...`H...!.....| +peer0.org2.example.com | 00000040 35 e0 49 3f d9 2c |5.I?.,| +peer0.org1.example.com | [29f9 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer0.org1.example.com | [29fa 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +peer0.org1.example.com | [29fb 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [29fc 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [3], peers number [3] +peer0.org1.example.com | [29fd 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4560 bytes, seq: 3}, Envelope: 4590 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [29fe 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +peer0.org1.example.com | [29ff 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +peer0.org1.example.com | [2a00 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +peer0.org1.example.com | [2a01 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +peer0.org1.example.com | [2a02 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +peer0.org1.example.com | [2a03 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +peer0.org1.example.com | [2a04 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [2a05 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002bb59c0 env 0xc0025d8000 txn 0 +peer0.org1.example.com | [2a06 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0025d8000 +peer0.org1.example.com | [2a07 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\275\305\265\372\005\020\330\242\350\273\001\"\017businesschannel*@d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030V\355\313\252\261:\202\005\2106Z\035\206\003\300n\302A\335 \223\315\362\315" +peer0.org1.example.com | [2a08 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2a09 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2a0a 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2a0b 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [2a0c 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2a0d 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 e7 93 52 4d 20 48 5f 66 91 8b fc cc 39 18 f3 |...RM H_f....9..| +peer0.org1.example.com | 00000010 ab 30 31 6f 86 19 f3 33 c1 37 13 23 32 7f d5 15 |.01o...3.7.#2...| +peer0.org1.example.com | [2a0e 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 2c 62 ac cb 2a ec 5a fd 13 e7 |0E.!..,b..*.Z...| +peer0.org1.example.com | 00000010 37 92 88 81 15 e1 12 b2 64 18 04 1a 42 b8 ea 7e |7.......d...B..~| +peer0.org1.example.com | 00000020 09 25 0c b1 3f 02 20 73 43 54 f1 e5 d4 0d 2e 2e |.%..?. sCT......| +peer0.org1.example.com | 00000030 08 f9 2b df dd 4b cf cb ee a4 66 5c 1c 4d 8f 79 |..+..K....f\.M.y| +peer0.org1.example.com | 00000040 73 ba e7 6f 4b 96 21 |s..oK.!| +peer0.org1.example.com | [2a0f 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2a10 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc002a10a80, header channel_header:"\010\003\032\014\010\275\305\265\372\005\020\330\242\350\273\001\"\017businesschannel*@d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030V\355\313\252\261:\202\005\2106Z\035\206\003\300n\302A\335 \223\315\362\315" +peer0.org1.example.com | [2a11 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer1.org2.example.com | [31d1 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [31d2 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [31d3 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [31d4 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [31d5 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [31d6 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [31d7 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501a480 gate 1598907126432692000 evaluation starts +peer1.org2.example.com | [31d8 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501a480 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [31d9 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501a480 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [31da 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501a480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [31db 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501a480 principal evaluation fails +peer1.org2.example.com | [31dc 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501a480 gate 1598907126432692000 evaluation fails +peer1.org2.example.com | [31dd 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [31de 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [31df 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [31e0 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501a9f0 gate 1598907126434754000 evaluation starts +peer1.org2.example.com | [31e1 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501a9f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [31e2 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501a9f0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [31e3 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501a9f0 principal matched by identity 0 +peer1.org2.example.com | [31e4 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org2.example.com | [31e5 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org2.example.com | [31e6 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501a9f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [31e7 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501a9f0 gate 1598907126434754000 evaluation succeeds +peer1.org2.example.com | [31e8 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [31e9 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [31ea 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [31eb 08-31 20:52:06.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [31ec 08-31 20:52:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org2.example.com | [31ed 08-31 20:52:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org2.example.com | [31ee 08-31 20:52:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org2.example.com | [31ef 08-31 20:52:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org2.example.com | [31f0 08-31 20:52:06.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [31f1 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [31f2 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31f3 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [31f4 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [307b 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [307c 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc004ffc800, header channel_header:"\010\003\032\014\010\360\305\265\372\005\020\214\243\205\302\001\"\017businesschannel*@a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\027\010\177\221psw\030\236\237*T\302`\367\254+Q\2323-$v\360" +peer0.org2.example.com | [307d 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org2.example.com | [307e 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org2.example.com | [307f 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org2.example.com | [3080 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [3081 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] +peer0.org2.example.com | [3082 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org2.example.com | [3083 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc004ff6400 +peer0.org2.example.com | [3084 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [8e0bc036-7279-4c93-ac20-d59890228688] +peer0.org2.example.com | [3085 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [3086 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [8e0bc036-7279-4c93-ac20-d59890228688] +peer0.org2.example.com | [3088 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3089 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [308a 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [308b 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [308c 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [308d 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3087 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +peer0.org2.example.com | [308e 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [08a9dd9e-9bc6-46bb-9a53-3c7e7c5891b8] +peer0.org2.example.com | [308f 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [08a9dd9e-9bc6-46bb-9a53-3c7e7c5891b8] +peer0.org2.example.com | [3090 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005003440 gate 1598907122476394500 evaluation starts +peer0.org2.example.com | [3091 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005003440 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3092 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005003440 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3093 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005003440 principal matched by identity 0 +peer0.org2.example.com | [3094 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c d1 4f 8e 83 45 bc 08 e9 72 bf 23 62 2d 37 ed |..O..E...r.#b-7.| +peer0.org2.example.com | 00000010 c8 e0 4d 7a a2 57 f9 4d 8a ba ef 95 bb 58 8c 53 |..Mz.W.M.....X.S| +peer0.org2.example.com | [3095 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 06 0c 41 8e ee ef 15 ef 93 13 |0E.!....A.......| +peer0.org2.example.com | 00000010 7c 65 7d 52 64 ed d7 c8 0e 65 27 49 00 5b 7d 28 ||e}Rd....e'I.[}(| +peer0.org2.example.com | 00000020 0e f5 f9 19 61 02 20 40 2b bc 92 d7 d4 6d cf c9 |....a. @+....m..| +peer0.org2.example.com | 00000030 d6 0e 22 a0 7e f6 ca 0f b1 46 b6 f5 ff a4 df 94 |..".~....F......| +peer0.org2.example.com | 00000040 74 af d9 d4 da 20 6d |t.... m| +peer0.org2.example.com | [3096 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005003440 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3097 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005003440 signed by 1 principal evaluation starts (used [true]) +peer0.org2.example.com | [3098 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005003440 skipping identity 0 because it has already been used +peer0.org2.example.com | [3099 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005003440 principal evaluation fails +peer0.org2.example.com | [309a 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005003440 gate 1598907122476394500 evaluation succeeds +peer0.org2.example.com | [309b 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [22d92f0c-dbd3-4283-9be5-9deb5966f7dc] +peer0.org2.example.com | [309c 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [22d92f0c-dbd3-4283-9be5-9deb5966f7dc] +peer0.org2.example.com | [309d 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +peer0.org2.example.com | [309e 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d appears to be valid +peer0.org2.example.com | [309f 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc004ff6400 +peer0.org2.example.com | [30a0 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc004de1340 env 0xc004fc69b0 txn 0 +peer0.org2.example.com | [30a1 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [30a2 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 14ms +peer0.org2.example.com | [30a3 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [30a4 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [30a5 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +peer0.org2.example.com | [30a6 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [30a7 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [30a8 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [30a9 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +peer1.org2.example.com | [31f5 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [31f6 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [31f7 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [31f8 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [31f9 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [31fa 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [31fb 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005046c30 gate 1598907126454352100 evaluation starts +peer1.org2.example.com | [31fc 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005046c30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [31fd 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005046c30 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [31fe 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005046c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [31ff 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005046c30 principal evaluation fails +peer1.org2.example.com | [3200 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005046c30 gate 1598907126454352100 evaluation fails +peer1.org2.example.com | [3201 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3202 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3203 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3204 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050471a0 gate 1598907126455499700 evaluation starts +peer1.org2.example.com | [3205 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050471a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3206 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050471a0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3207 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050471a0 principal matched by identity 0 +peer1.org2.example.com | [3208 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org2.example.com | [3209 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org2.example.com | [320a 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050471a0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [320b 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050471a0 gate 1598907126455499700 evaluation succeeds +peer1.org2.example.com | [320c 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [320d 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [320e 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [320f 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3210 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3211 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 9d 97 17 a3 9e f6 07 c2 c3 cb a1 47 2f c5 b7 e2 |...........G/...| +peer1.org1.example.com | 00000040 b6 71 55 3e 43 08 |.qU>C.| +peer1.org1.example.com | [2dcf 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2dd0 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dd1 08-31 20:52:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2dd2 08-31 20:52:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 f0 25 be b1 a9 b8 a2 4c ee 74 ba 53 5a 73 bd |..%.....L.t.SZs.| +peer1.org1.example.com | 00000010 cc 26 d3 03 49 c0 ea 6c 60 02 2e a5 ac bf 56 bc |.&..I..l`.....V.| +peer1.org1.example.com | [2dd3 08-31 20:52:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 34 95 95 dd 93 d5 d3 09 4e 7c |0E.!..4.......N|| +peer1.org1.example.com | 00000010 47 80 d0 dd 35 b9 ad cd b7 f1 8e dd 28 0e 8f f9 |G...5.......(...| +peer1.org1.example.com | 00000020 07 17 f4 9b be 02 20 0f 5b 32 cb a3 4a 81 47 ec |...... .[2..J.G.| +peer1.org1.example.com | 00000030 4d fd ed 3d 64 4e c2 92 14 e4 4c ef 74 e3 1e 0d |M..=dN....L.t...| +peer1.org1.example.com | 00000040 ba 5a 6a 99 92 7c 40 |.Zj..|@| +peer1.org1.example.com | [2dd4 08-31 20:52:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2dd5 08-31 20:52:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2dd6 08-31 20:52:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dd7 08-31 20:52:09.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2dd8 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dd9 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2dda 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ddb 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ddc 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ddd 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2dde 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ddf 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2de0 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2de1 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [2de2 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2de3 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2de4 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2de5 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2de6 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2de7 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2de8 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30aa 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [30ab 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org2.example.com | [30ac 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org2.example.com | [30ad 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [30ae 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org2.example.com | [30af 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [30b0 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [30b1 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [30b2 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] marked as valid by state validator +peer0.org2.example.com | [30b3 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc005042300), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc005042340)} +peer0.org2.example.com | [30b4 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [30b5 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [30b6 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [30b7 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +peer0.org2.example.com | [30b8 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +peer0.org2.example.com | [30b9 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +peer0.org2.example.com | [30ba 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +peer0.org2.example.com | [30bb 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0x81, 0x47, 0x7e, 0x41, 0x1c, 0xad, 0xf5, 0x8b, 0x36, 0x32, 0x94, 0x83, 0x50, 0xc2, 0x29, 0x32, 0xda, 0xd5, 0xc, 0x74, 0xc8, 0x4a, 0xac, 0xd3, 0xc3, 0x82, 0x1e, 0x87, 0x25, 0x9, 0x5, 0x17} txOffsets= +peer0.org2.example.com | txId=a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d locPointer=offset=70, bytesLength=2981 +peer0.org2.example.com | ] +peer0.org2.example.com | [30bc 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89544, bytesLength=2981] for tx ID: [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] to txid-index +peer0.org2.example.com | [30bd 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89544, bytesLength=2981] for tx number:[0] ID: [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] to blockNumTranNum index +peer0.org2.example.com | [30be 08-31 20:52:02.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [30bf 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [30c0 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [30c1 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30c2 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93521], isChainEmpty=[false], lastBlockNumber=[4] +peer0.org2.example.com | [30c3 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +peer0.org2.example.com | [30c4 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +peer0.org2.example.com | [30c5 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +peer0.org2.example.com | [30c6 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [30c7 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [30c8 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [30c9 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [30ca 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org2.example.com | [30cb 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org2.example.com | [30cc 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [30cd 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [30ce 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +peer0.org2.example.com | [30cf 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +peer0.org2.example.com | [30d0 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +peer0.org2.example.com | [30d1 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +peer0.org2.example.com | [30d2 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +peer0.org2.example.com | [30d3 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +peer0.org2.example.com | [30d4 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 20ms (state_validation=5ms block_and_pvtdata_commit=9ms state_commit=3ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +peer0.org2.example.com | [30d5 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [30d6 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408B0BECFA2F8AF9D9816...08051A0C0A0565787030321203312E30 +peer0.org2.example.com | [30d7 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C03DCB4DD42A6892AC40205F60FF6AD20C34985D71872BF1D7E9CC8A1AB257D5 +peer0.org2.example.com | [30d8 08-31 20:52:02.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +peer1.org2.example.com | [3212 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3213 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3214 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3215 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3216 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3217 08-31 20:52:06.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3218 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050603a0 gate 1598907126460025600 evaluation starts +peer1.org2.example.com | [3219 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050603a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [321a 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050603a0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [321b 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050603a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [321c 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050603a0 principal evaluation fails +peer1.org2.example.com | [321d 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050603a0 gate 1598907126460025600 evaluation fails +peer1.org2.example.com | [321e 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [321f 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3220 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3221 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005060910 gate 1598907126461864600 evaluation starts +peer1.org2.example.com | [3222 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005060910 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3223 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005060910 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3224 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005060910 principal matched by identity 0 +peer1.org2.example.com | [3225 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org2.example.com | [3226 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org2.example.com | [3227 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005060910 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3228 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005060910 gate 1598907126461864600 evaluation succeeds +peer1.org2.example.com | [3229 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [322a 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [322b 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [322c 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [322d 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org2.example.com | [322e 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org2.example.com | [322f 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org2.example.com | [3230 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org2.example.com | [3231 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3232 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3233 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org2.example.com | [3234 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [2de9 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2dea 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2deb 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2dec 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2ded 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2dee 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2def 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ec970 gate 1598907129495290800 evaluation starts +peer1.org1.example.com | [2df0 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ec970 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2df1 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ec970 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2df2 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ec970 principal matched by identity 0 +peer1.org1.example.com | [2df3 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 64 4f 9f 3f 47 05 95 4c 76 9b 7e 67 42 75 e2 |kdO.?G..Lv.~gBu.| +peer1.org1.example.com | 00000010 18 b4 8b c8 5e 17 a9 b1 0c 4a 23 68 e1 a1 3c 58 |....^....J#h.. DEBU Verify: sig = 00000000 30 44 02 20 0f 51 8f 83 be 9f 3f ee c6 d8 d0 2e |0D. .Q....?.....| +peer1.org1.example.com | 00000010 37 b6 9d b1 c0 ae 81 b6 32 9b 15 fc a0 5a bc bd |7.......2....Z..| +peer1.org1.example.com | 00000020 d1 74 8d f6 02 20 22 77 6b 3e 04 16 45 93 9c 46 |.t... "wk>..E..F| +peer1.org1.example.com | 00000030 3c 2a 4e 79 3f 5f 8d ba 44 48 69 96 13 68 d3 b8 |<*Ny?_..DHi..h..| +peer1.org1.example.com | 00000040 f0 df e3 34 7a ba |...4z.| +peer1.org1.example.com | [2df5 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ec970 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2df6 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003ec970 gate 1598907129495290800 evaluation succeeds +peer1.org1.example.com | [2df7 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2df8 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2df9 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2dfa 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2dfb 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2dfc 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2dfd 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2dfe 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2dff 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2e00 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e01 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e02 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e03 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [2e04 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e05 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e06 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e07 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2e08 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e09 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e0a 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" > alive: alive:C\010" > alive: +peer1.org1.example.com | [2e0b 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e0c 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e0d 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e0e 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [2e0f 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e10 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:[\333\034\315" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e11 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:[\333\034\315" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e12 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e13 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:[\333\034\315" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e14 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [2e15 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 06 4f 12 2f cf 24 26 df 51 68 23 1a b6 c5 5a |..O./.$&.Qh#...Z| +peer1.org1.example.com | 00000010 08 10 ed ed 81 50 a6 97 35 12 b4 68 cc 9d 22 d7 |.....P..5..h..".| +peer1.org1.example.com | [2e16 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 45 bc 61 d7 d7 cf 88 66 0b 98 16 |0D. pE.a....f...| +peer1.org1.example.com | 00000010 c0 92 8e 80 c2 1b 41 50 4d f4 ef b2 8e dd d8 49 |......APM......I| +peer1.org1.example.com | 00000020 26 4b c2 46 02 20 76 75 57 5d 83 f8 b2 a2 e4 e3 |&K.F. vuW]......| +peer1.org1.example.com | 00000030 ae f4 cb ca de 0f c0 1d 93 bc fe d7 68 e9 04 cc |............h...| +peer1.org1.example.com | 00000040 c7 2f 8b 38 64 c7 |./.8d.| +peer1.org2.example.com | [3235 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3236 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3237 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3238 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3239 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [323a 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [323b 08-31 20:52:06.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [323c 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [323d 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fb31b0 gate 1598907126470526100 evaluation starts +peer1.org2.example.com | [323e 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fb31b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [323f 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fb31b0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3240 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fb31b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3241 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fb31b0 principal evaluation fails +peer1.org2.example.com | [3242 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fb31b0 gate 1598907126470526100 evaluation fails +peer1.org2.example.com | [3243 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3244 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3245 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3246 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fb3720 gate 1598907126471479900 evaluation starts +peer1.org2.example.com | [3247 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fb3720 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3248 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fb3720 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3249 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fb3720 principal matched by identity 0 +peer1.org2.example.com | [324a 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org2.example.com | [324b 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org2.example.com | [324c 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fb3720 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [324d 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fb3720 gate 1598907126471479900 evaluation succeeds +peer1.org2.example.com | [324e 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [324f 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3250 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3251 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3252 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3253 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a12 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org1.example.com | [2a13 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [2a14 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [2a15 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] +peer0.org1.example.com | [2a16 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org1.example.com | [2a17 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc002a13000 +peer0.org1.example.com | [2a18 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +peer0.org1.example.com | [2a19 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [26e9379f-70d7-47af-93a2-f8c9670aa57b] +peer0.org1.example.com | [2a1a 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [26e9379f-70d7-47af-93a2-f8c9670aa57b] +peer0.org1.example.com | [2a1b 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a1c 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [2a1d 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bab00 gate 1598907119593247100 evaluation starts +peer0.org1.example.com | [2a1e 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bab00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2a1f 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bab00 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2a20 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [2a21 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [2a22 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [2a23 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bab00 principal matched by identity 0 +peer0.org1.example.com | [2a24 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af eb 7f a3 db 22 e8 0d 9a d4 d1 20 96 0f 3c a1 |....."..... ..<.| +peer0.org1.example.com | 00000010 6d 3c b5 6c 57 73 9b 9f 14 94 e8 bb e2 63 0f 70 |m<.lWs.......c.p| +peer0.org1.example.com | [2a25 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 9e de 14 79 6b bb 35 05 3c 5e 10 |0D. ....yk.5.<^.| +peer0.org1.example.com | 00000010 a4 a7 85 1b 9d 1a cd 2f 44 6a f8 e7 d1 d9 09 57 |......./Dj.....W| +peer0.org1.example.com | 00000020 86 77 95 7f 02 20 58 40 5c 3a 8a 19 c9 55 67 dc |.w... X@\:...Ug.| +peer0.org1.example.com | 00000030 08 c2 c0 81 54 ed 1d 24 ff 27 23 be f1 bd 82 74 |....T..$.'#....t| +peer0.org1.example.com | 00000040 b6 99 5b 8b f1 bd |..[...| +peer0.org1.example.com | [2a26 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bab00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2a27 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bab00 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [2a28 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bab00 skipping identity 0 because it has already been used +peer0.org1.example.com | [2a29 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bab00 principal evaluation fails +peer0.org1.example.com | [2a2a 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bab00 gate 1598907119593247100 evaluation succeeds +peer0.org1.example.com | [2a2b 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +peer0.org1.example.com | [2a2c 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer0.org1.example.com | [2a2d 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +peer0.org1.example.com | [2a2e 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +peer0.org1.example.com | [2a30 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +peer0.org1.example.com | [2a31 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [1961a69a-af6b-4377-bb35-1304ce0e0cd2] +peer0.org1.example.com | [2a2f 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a32 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2a34 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1961a69a-af6b-4377-bb35-1304ce0e0cd2] +peer0.org1.example.com | [2a35 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +peer0.org1.example.com | [2a36 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [affc5732-4938-4c57-8bad-8407ffe71a12] +peer0.org1.example.com | [2a37 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org1.example.com | [2a38 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [affc5732-4938-4c57-8bad-8407ffe71a12] +peer0.org1.example.com | [2a39 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e3330 gate 1598907119604936400 evaluation starts +peer0.org1.example.com | [2a3a 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e3330 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2a3b 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e3330 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2a3c 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e3330 principal matched by identity 0 +peer0.org1.example.com | [2a3d 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 e7 93 52 4d 20 48 5f 66 91 8b fc cc 39 18 f3 |...RM H_f....9..| +peer0.org1.example.com | 00000010 ab 30 31 6f 86 19 f3 33 c1 37 13 23 32 7f d5 15 |.01o...3.7.#2...| +peer0.org1.example.com | [2a3e 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 2c 62 ac cb 2a ec 5a fd 13 e7 |0E.!..,b..*.Z...| +peer0.org1.example.com | 00000010 37 92 88 81 15 e1 12 b2 64 18 04 1a 42 b8 ea 7e |7.......d...B..~| +peer0.org1.example.com | 00000020 09 25 0c b1 3f 02 20 73 43 54 f1 e5 d4 0d 2e 2e |.%..?. sCT......| +peer0.org1.example.com | 00000030 08 f9 2b df dd 4b cf cb ee a4 66 5c 1c 4d 8f 79 |..+..K....f\.M.y| +peer0.org1.example.com | 00000040 73 ba e7 6f 4b 96 21 |s..oK.!| +peer0.org1.example.com | [2a3f 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e3330 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2a40 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e3330 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [2a41 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e3330 skipping identity 0 because it has already been used +peer0.org1.example.com | [2a42 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e3330 principal evaluation fails +peer0.org1.example.com | [2a43 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e3330 gate 1598907119604936400 evaluation succeeds +peer0.org1.example.com | [2a44 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +peer0.org1.example.com | [2a45 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a appears to be valid +peer0.org1.example.com | [2a46 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc002a13000 +peer0.org2.example.com | [30d9 08-31 20:52:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [30da 08-31 20:52:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a8 6f b6 fd b8 c6 92 4b c0 ec 8f 5d b0 85 a0 c1 |.o.....K...]....| +peer0.org2.example.com | 00000010 ec 76 6e b4 b1 84 cd 55 f9 e8 b7 73 b8 e1 82 45 |.vn....U...s...E| +peer0.org2.example.com | [30db 08-31 20:52:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db d2 72 64 b0 00 d5 20 be e1 0a |0E.!...rd... ...| +peer0.org2.example.com | 00000010 90 57 0e c1 6a 89 fd 6c f1 4a 88 fa 43 59 6a 23 |.W..j..l.J..CYj#| +peer0.org2.example.com | 00000020 96 96 82 50 16 02 20 04 21 e0 f3 a3 73 1d dc 3d |...P.. .!...s..=| +peer0.org2.example.com | 00000030 2d dd 08 fd ec e5 8e 87 96 c7 f6 4f 93 ac c9 48 |-..........O...H| +peer0.org2.example.com | 00000040 a9 bf c5 8c 4c 3a cf |....L:.| +peer0.org2.example.com | [30dc 08-31 20:52:04.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30dd 08-31 20:52:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30de 08-31 20:52:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30df 08-31 20:52:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [30e0 08-31 20:52:04.24 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [30e1 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [30e2 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [30e3 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [30e4 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30e5 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [30e6 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30e7 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [30e8 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [30e9 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f c6 c4 e1 15 cf cc 1c 60 63 d0 7b a3 8e 99 33 |O.......`c.{...3| +peer0.org2.example.com | 00000010 d1 2e f8 33 b8 58 69 18 fb 93 4e 34 6e 55 52 13 |...3.Xi...N4nUR.| +peer0.org2.example.com | [30ea 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 ca 6b f5 11 7c d3 ad ea a2 91 |0E.!...k..|.....| +peer0.org2.example.com | 00000010 c5 90 bd 9a 4f 50 b0 6d e6 39 cc a1 5d 23 8c b6 |....OP.m.9..]#..| +peer0.org2.example.com | 00000020 8d 6b 62 36 c8 02 20 5c f5 1f f7 c0 ab 13 da c4 |.kb6.. \........| +peer0.org2.example.com | 00000030 71 d6 00 98 84 08 89 a8 9c d0 7f bf 7e 91 03 6c |q...........~..l| +peer0.org2.example.com | 00000040 9d 77 b0 d8 73 84 be |.w..s..| +peer0.org2.example.com | [30eb 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [30ec 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [30ed 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [30ee 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [30ef 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [30f0 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30f1 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30f2 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30f3 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [30f5 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30f6 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [30f7 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30f4 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e17 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [2e18 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 d4 22 31 18 03 fb 8d fd d8 17 |0E.!..."1.......| +peer1.org1.example.com | 00000010 b8 50 28 72 db 1d 38 8f 39 d0 4a 8a 80 a1 47 aa |.P(r..8.9.J...G.| +peer1.org1.example.com | 00000020 9f b8 e0 7b eb 02 20 05 aa 79 3c b6 9c 2c 85 19 |...{.. ..y<..,..| +peer1.org1.example.com | 00000030 a0 fb c3 d4 61 81 65 ca d2 0d 29 3c a3 32 93 ed |....a.e...)<.2..| +peer1.org1.example.com | 00000040 22 f5 3e 5b db 1c cd |".>[...| +peer1.org1.example.com | [2e19 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [2e1a 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [2e1b 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2e1c 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2e1d 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2e1e 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e1f 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e20 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e21 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [2e22 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e23 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e24 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2e25 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:[\333\034\315" > > alive: +peer1.org1.example.com | [2e26 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e27 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e28 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e29 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e2a 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e2b 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e2c 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e2d 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e2e 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e2f 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e30 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [2e31 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e32 08-31 20:52:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e33 08-31 20:52:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e34 08-31 20:52:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [2e35 08-31 20:52:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e37 08-31 20:52:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30f8 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30f9 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30fa 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [30fb 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [30fc 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [30fd 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [30fe 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [30ff 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3100 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3101 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3102 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3103 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3104 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3105 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\027zr\322\256\002 [\367\327\267\361Bk\217\311\362\264\333l&o\370\345\363\n\316\001Q>\206\346\002M\310\037\245]\230" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [3106 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3107 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4024 bytes, seq: 5}, Envelope: 4054 bytes, Signature: 0 bytes +peer0.org2.example.com | [3108 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3109 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [310a 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [310b 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [310c 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [310d 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005062a40 gate 1598907125079769900 evaluation starts +peer0.org2.example.com | [310e 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005062a40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [310f 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005062a40 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3110 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005062a40 principal matched by identity 0 +peer0.org2.example.com | [3111 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e0 48 27 e4 d8 2b b3 06 52 c4 70 a9 e6 2b e4 e0 |.H'..+..R.p..+..| +peer0.org2.example.com | 00000010 14 8d 7e 75 58 c6 4e 89 e9 4d 5a bc c9 bc 39 6a |..~uX.N..MZ...9j| +peer0.org2.example.com | [3112 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\027zr\322\256\002 [\367\327\267\361Bk\217\311\362\264\333l&o\370\345\363\n\316\001Q>\206\346\002M\310\037\245]\230" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [3113 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 c9 5e 7d 51 23 49 7b 1c a9 ab d8 |0D. b.^}Q#I{....| +peer0.org2.example.com | 00000010 0a 3a f2 e2 aa a2 4d 2d 1f 74 74 a1 49 c8 fe 33 |.:....M-.tt.I..3| +peer0.org2.example.com | 00000020 1c d9 01 11 02 20 25 9d b1 95 8b 6f 9b f9 5e d6 |..... %....o..^.| +peer1.org2.example.com | [3254 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3255 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3256 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3257 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3258 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3259 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [325a 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000158d20 gate 1598907126475718900 evaluation starts +peer1.org2.example.com | [325b 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000158d20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [325c 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000158d20 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [325d 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000158d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [325e 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000158d20 principal evaluation fails +peer1.org2.example.com | [325f 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000158d20 gate 1598907126475718900 evaluation fails +peer1.org2.example.com | [3260 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3261 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3262 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3263 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001593b0 gate 1598907126476429000 evaluation starts +peer1.org2.example.com | [3264 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001593b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3265 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001593b0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3266 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001593b0 principal matched by identity 0 +peer1.org2.example.com | [3267 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org2.example.com | [3268 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org2.example.com | [3269 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001593b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [326a 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0001593b0 gate 1598907126476429000 evaluation succeeds +peer1.org2.example.com | [326b 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [326c 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [326d 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [326e 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [326f 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org2.example.com | [3270 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org2.example.com | [3271 08-31 20:52:06.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3272 08-31 20:52:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3273 08-31 20:52:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3274 08-31 20:52:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3275 08-31 20:52:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3276 08-31 20:52:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a47 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002bb59c0 env 0xc0025d8000 txn 0 +peer0.org1.example.com | [2a48 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [2a49 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 15ms +peer0.org1.example.com | [2a4a 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [2a4b 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [2a4c 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +peer0.org1.example.com | [2a4d 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [2a4e 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [2a4f 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [2a50 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +peer0.org1.example.com | [2a51 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [2a52 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org1.example.com | [2a53 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2a54 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +peer0.org1.example.com | [2a55 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] marked as valid by state validator +peer0.org1.example.com | [2a56 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00294e9c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00294ea00), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc00294ea40)} +peer0.org1.example.com | [2a57 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [2a58 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [2a59 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [2a5a 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc00045ab40)}} +peer0.org1.example.com | [2a5b 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +peer0.org1.example.com | [2a5c 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org1.example.com | [2a5d 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer0.org1.example.com | [2a5e 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +peer0.org1.example.com | [2a5f 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +peer0.org1.example.com | [2a60 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +peer0.org1.example.com | [2a61 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +peer0.org1.example.com | [2a62 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2a63 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{Org1MSP {[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 76 106 80 76 72 86 83 114 120 66 108 57 51 88 84 65 106 67 68 97 89 65 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 71 107 103 76 50 121 65 76 107 104 55 10 98 117 68 121 84 105 67 66 122 52 120 84 82 98 78 66 67 65 103 87 110 110 105 74 56 76 119 89 113 111 86 89 98 97 78 66 102 98 84 51 90 73 106 104 115 107 105 50 69 70 57 100 110 121 117 110 85 68 108 119 85 99 47 102 10 86 88 81 121 49 80 122 53 86 55 101 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 74 50 54 73 97 52 102 75 110 99 78 100 108 48 114 47 103 119 120 108 68 109 50 80 74 119 109 119 82 47 109 117 53 84 113 107 103 54 70 119 78 77 51 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 67 115 66 82 84 100 76 105 105 102 69 86 65 85 117 117 101 113 52 100 81 114 55 98 81 49 43 88 120 70 112 101 87 86 72 51 49 69 99 84 110 43 107 65 105 66 86 98 119 68 120 10 80 103 109 75 77 83 88 118 56 118 49 47 108 72 117 120 86 52 87 80 77 99 53 102 86 48 110 85 83 53 89 115 73 106 83 54 108 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 150 87 14 97 128 123 16 201 80 180 78 36 71 122 168 150 145 114 206 77 55 33 127 7 49 91 44 98 167 255 29 178 2 32 80 215 11 116 58 88 133 87 240 72 4 251 228 83 187 104 243 110 3 245 115 107 120 26 92 46 50 115 251 203 7 144]} 0x151a150}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0029e1e30 0xc0029cb200 {{0 0} 0 0 0 0} {false}})]} +peer0.org1.example.com | [2a64 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +peer0.org1.example.com | [2a65 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc000100280})} +peer0.org1.example.com | [2a66 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +peer0.org1.example.com | [2a67 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +peer0.org1.example.com | [2a68 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +peer0.org1.example.com | [2a33 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a69 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a6a 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +peer0.org1.example.com | [2a6b 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a6c 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4560 bytes, seq: 3}, Envelope: 4590 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2a6d 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a6e 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a6f 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4560 bytes, seq: 3}, Envelope: 4590 bytes, Signature: 0 bytes +peer0.org1.example.com | [2a70 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a71 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0x62, 0xc8, 0x94, 0xe0, 0x8d, 0xe8, 0xc7, 0x50, 0xec, 0x14, 0xce, 0xf7, 0xf6, 0x41, 0xb9, 0x45, 0x45, 0x74, 0xf1, 0x40, 0xf4, 0xb9, 0x19, 0x48, 0x1a, 0x35, 0x67, 0xf7, 0x3c, 0xf, 0xe3, 0xf2} txOffsets= +peer0.org1.example.com | txId=d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a locPointer=offset=70, bytesLength=3520 +peer0.org1.example.com | ] +peer0.org1.example.com | [2a72 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84950, bytesLength=3520] for tx ID: [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] to txid-index +peer0.org1.example.com | [2a73 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84950, bytesLength=3520] for tx number:[0] ID: [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] to blockNumTranNum index +peer0.org1.example.com | [2a74 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89462], isChainEmpty=[false], lastBlockNumber=[3] +peer0.org1.example.com | [2a75 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +peer0.org1.example.com | [2a76 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +peer0.org1.example.com | [2a77 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +peer0.org1.example.com | [2a78 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [2a79 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [2a7a 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [2a7b 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [2a7c 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer1.org1.example.com | [2e38 08-31 20:52:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e39 08-31 20:52:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e36 08-31 20:52:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e3a 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e3b 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e3c 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e3d 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e3e 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e3f 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e40 08-31 20:52:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e41 08-31 20:52:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2e42 08-31 20:52:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e43 08-31 20:52:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e44 08-31 20:52:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2e45 08-31 20:52:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2e46 08-31 20:52:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2e47 08-31 20:52:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038e4d0 gate 1598907129945138700 evaluation starts +peer1.org1.example.com | [2e48 08-31 20:52:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038e4d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2e49 08-31 20:52:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038e4d0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2e4a 08-31 20:52:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038e4d0 principal matched by identity 0 +peer1.org1.example.com | [2e4b 08-31 20:52:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org1.example.com | [2e4c 08-31 20:52:09.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org1.example.com | [2e4d 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038e4d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2e4e 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00038e4d0 gate 1598907129945138700 evaluation succeeds +peer1.org1.example.com | [2e4f 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e50 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e51 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2e52 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2e53 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org1.example.com | [2e54 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org2.example.com | 00000030 e8 4c f6 fa 9d a4 08 79 56 36 c1 e6 6e 88 d7 7f |.L.....yV6..n...| +peer0.org2.example.com | 00000040 83 3d ed 5d df 0a |.=.]..| +peer0.org2.example.com | [3114 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005062a40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3115 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005062a40 gate 1598907125079769900 evaluation succeeds +peer0.org2.example.com | [3116 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [3117 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [3118 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [3119 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [311a 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4024 bytes, seq: 5}, Envelope: 4054 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [311b 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +peer0.org2.example.com | [311c 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [311d 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org2.example.com | [311e 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer0.org2.example.com | [311f 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [3120 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +peer0.org2.example.com | [3121 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +peer0.org2.example.com | [3122 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer0.org2.example.com | [3123 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +peer0.org2.example.com | [3124 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +peer0.org2.example.com | [3125 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [3126 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00394c280 env 0xc003b64460 txn 0 +peer0.org2.example.com | [3127 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc003b64460 +peer0.org2.example.com | [3128 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\362\305\265\372\005\020\330\366\336\310\003\"\017businesschannel*@ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030}\357\315\302\232\007\257\034BQH\017\351&]\"\010\252\276J\270\353\250@" +peer0.org2.example.com | [3129 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [312a 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [312b 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [312c 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [312d 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [312e 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [312f 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [3130 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [3131 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [3132 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 35 37 a9 79 33 a2 e5 2b 9c 00 24 05 6e 93 3f |`57.y3..+..$.n.?| +peer0.org2.example.com | 00000010 8d d7 90 73 0d 35 87 ae 3b dd 80 ca fa 0e 01 84 |...s.5..;.......| +peer0.org2.example.com | [3133 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c 1e 88 5b 8d 81 cf 0e a2 2f d3 11 |0D. |..[...../..| +peer0.org2.example.com | 00000010 a4 a8 f1 b3 5c 74 52 c0 c6 9d 67 23 3f e7 8d d0 |....\tR...g#?...| +peer0.org2.example.com | 00000020 de 36 b3 af 02 20 14 7b 59 42 5f fc de 82 a4 91 |.6... .{YB_.....| +peer0.org2.example.com | 00000030 9e 10 21 3b 91 48 0d fa dd 17 37 33 ab 68 b1 3b |..!;.H....73.h.;| +peer0.org2.example.com | 00000040 92 ff b4 50 2d 54 |...P-T| +peer0.org2.example.com | [3134 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [2e55 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org1.example.com | [2e56 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org1.example.com | [2e57 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e58 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e59 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2e5a 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e5b 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e5c 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2e5d 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2e5e 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2e5f 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034eb00 gate 1598907129958211800 evaluation starts +peer1.org1.example.com | [2e60 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034eb00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2e61 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034eb00 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2e62 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034eb00 principal matched by identity 0 +peer1.org1.example.com | [2e63 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [2e64 08-31 20:52:09.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [2e65 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034eb00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2e66 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00034eb00 gate 1598907129958211800 evaluation succeeds +peer1.org1.example.com | [2e67 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e68 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e69 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2e6a 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2e6b 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e6c 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e6d 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org1.example.com | [2e6e 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org1.example.com | [2e6f 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org1.example.com | [2e70 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org1.example.com | [2a7d 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org1.example.com | [2a7e 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +peer0.org1.example.com | [2a7f 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [2a80 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +peer0.org1.example.com | [2a81 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [6d21f743-a096-4708-a7ee-6f3453af394c] +peer0.org1.example.com | [2a83 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +peer0.org1.example.com | [2a84 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2a85 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +peer0.org2.example.com | [3135 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0029e9800, header channel_header:"\010\003\032\014\010\362\305\265\372\005\020\330\366\336\310\003\"\017businesschannel*@ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y\nZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r\nuN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE\nyIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV\nHSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO\nPQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030}\357\315\302\232\007\257\034BQH\017\351&]\"\010\252\276J\270\353\250@" +peer0.org2.example.com | [3136 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org2.example.com | [3137 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org2.example.com | [3138 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org2.example.com | [3139 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [313a 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] +peer0.org2.example.com | [313b 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org2.example.com | [313c 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc0003eb000 +peer0.org2.example.com | [313d 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [f39880c0-0bc0-4747-9a82-2e94bebbd232] +peer0.org2.example.com | [313e 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [313f 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f39880c0-0bc0-4747-9a82-2e94bebbd232] +peer0.org2.example.com | [3140 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +peer0.org2.example.com | [3141 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [03a1b195-8f9b-4fb1-8c3a-c5c5ba8d3aa1] +peer0.org2.example.com | [3142 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [03a1b195-8f9b-4fb1-8c3a-c5c5ba8d3aa1] +peer0.org2.example.com | [3143 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6d560 gate 1598907125089548000 evaluation starts +peer0.org2.example.com | [3144 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6d560 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3145 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6d560 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3146 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6d560 principal matched by identity 0 +peer0.org2.example.com | [3148 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [314a 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [314b 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3149 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 46 7a 9a 54 5b d8 01 be 17 f9 fb 54 65 9b c2 |.Fz.T[......Te..| +peer0.org2.example.com | 00000010 6a 2d 25 20 2a 18 aa f1 b2 e3 b9 47 db 8e ab 25 |j-% *......G...%| +peer0.org2.example.com | [314d 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 02 52 70 3b fc a7 0c 50 fb f7 a0 |0D. ;.Rp;...P...| +peer0.org2.example.com | 00000010 bc e1 53 83 eb c9 a5 d8 aa 9b 1b 5b 91 4c a8 2d |..S........[.L.-| +peer0.org2.example.com | 00000020 61 25 a5 ec 02 20 21 e1 95 52 28 ef ca c0 87 1b |a%... !..R(.....| +peer0.org2.example.com | 00000030 c4 b9 39 15 3e 7c 4e e2 b1 b4 5b 4f d7 2e 24 8d |..9.>|N...[O..$.| +peer0.org2.example.com | 00000040 9f 7f eb 94 e9 29 |.....)| +peer0.org2.example.com | [314e 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6d560 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [314c 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3147 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [314f 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6d560 signed by 1 principal evaluation starts (used [true]) +peer0.org2.example.com | [3150 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3152 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3151 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6d560 skipping identity 0 because it has already been used +peer0.org2.example.com | [3153 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6d560 principal evaluation fails +peer0.org2.example.com | [3154 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b6d560 gate 1598907125089548000 evaluation succeeds +peer0.org2.example.com | [3155 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [7c5e2154-b83a-4b68-8015-8eb968612148] +peer0.org2.example.com | [3156 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [7c5e2154-b83a-4b68-8015-8eb968612148] +peer0.org2.example.com | [3157 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +peer0.org2.example.com | [3158 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b appears to be valid +peer0.org2.example.com | [3159 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc0003eb000 +peer0.org2.example.com | [315a 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00394c280 env 0xc003b64460 txn 0 +peer0.org2.example.com | [315b 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [315c 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 17ms +peer0.org2.example.com | [315d 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [315e 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [3160 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e 74 70 5f 69 da ef 58 05 f1 9d 10 2e d6 70 |..tp_i..X......p| +peer0.org2.example.com | 00000010 3a de 14 88 17 ee d0 42 51 d5 a6 46 8d f5 8c 3d |:......BQ..F...=| +peer0.org2.example.com | [315f 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +peer1.org2.example.com | [3277 08-31 20:52:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3278 08-31 20:52:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3279 08-31 20:52:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [327a 08-31 20:52:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [327b 08-31 20:52:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [327c 08-31 20:52:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [327d 08-31 20:52:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [327e 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [327f 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3280 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [3281 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3282 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3283 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3284 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [3286 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3287 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3288 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3285 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3289 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [328a 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [328b 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [328c 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [328d 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [328e 08-31 20:52:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3290 08-31 20:52:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3291 08-31 20:52:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [328f 08-31 20:52:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3292 08-31 20:52:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3293 08-31 20:52:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3294 08-31 20:52:08.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3295 08-31 20:52:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3296 08-31 20:52:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161032 +peer1.org2.example.com | [3297 08-31 20:52:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 98CB52A0A2F6DEB71519D2314D820D7999E70C9722B0E1D079BF2D9F608F9DCB +peer1.org2.example.com | [3298 08-31 20:52:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3299 08-31 20:52:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [329a 08-31 20:52:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [329b 08-31 20:52:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [329c 08-31 20:52:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [329d 08-31 20:52:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [329e 08-31 20:52:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [329f 08-31 20:52:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [32a0 08-31 20:52:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [32a1 08-31 20:52:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32a2 08-31 20:52:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [32a3 08-31 20:52:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32a4 08-31 20:52:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [32a5 08-31 20:52:09.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32a6 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [32a7 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32a8 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [32a9 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org1.example.com | [2e71 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e72 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e73 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2e74 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e75 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e76 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2e77 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2e78 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2e79 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003114c0 gate 1598907129966319800 evaluation starts +peer1.org1.example.com | [2e7a 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003114c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2e7b 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003114c0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2e7c 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003114c0 principal matched by identity 0 +peer1.org1.example.com | [2e7d 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [2e7e 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [2e7f 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003114c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2e80 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003114c0 gate 1598907129966319800 evaluation succeeds +peer1.org1.example.com | [2e81 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e82 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e83 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2e84 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2e85 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e86 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3162 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [3163 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [3164 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [3161 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a c0 56 b6 72 65 1b f5 d5 29 c0 a2 |0D. *.V.re...)..| +peer0.org2.example.com | 00000010 58 56 5c 65 a7 0b 2c 94 80 c5 ce 83 ac be f6 54 |XV\e..,........T| +peer0.org2.example.com | 00000020 2f 31 e3 48 02 20 5b 2a ae cd 07 ba a2 8e 32 f3 |/1.H. [*......2.| +peer0.org2.example.com | 00000030 dd 1c 0d 2d 4b c6 ed e9 22 79 c7 aa 01 3d 20 6f |...-K..."y...= o| +peer0.org2.example.com | 00000040 8b 81 64 ef ec 80 |..d...| +peer0.org2.example.com | [3165 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +peer0.org2.example.com | [3166 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [3167 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org2.example.com | [3168 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [3169 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c ad f9 81 21 2a bd df e8 b5 e8 2e |0D. <...!*......| +peer0.org2.example.com | 00000010 e9 83 cc ae 23 3c ce 10 36 34 e9 b1 68 a3 3e 17 |....#<..64..h.>.| +peer0.org2.example.com | 00000020 7a 72 d2 ae 02 20 5b f7 d7 b7 f1 42 6b 8f c9 f2 |zr... [....Bk...| +peer0.org2.example.com | 00000030 b4 db 6c 26 6f f8 e5 f3 0a ce 01 51 3e 86 e6 02 |..l&o......Q>...| +peer0.org2.example.com | 00000040 4d c8 1f a5 5d 98 |M...].| +peer0.org2.example.com | [316a 08-31 20:52:05.10 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org2.example.com | [316b 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org2.example.com | [316c 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org2.example.com | [316d 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org2.example.com | [316e 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [3170 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org2.example.com | [3171 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] marked as valid by state validator +peer0.org2.example.com | [316f 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [3172 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00394d240), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00394d280)} +peer0.org2.example.com | [3173 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [3174 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3175 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3176 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3178 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3179 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3177 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [317a 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [317c 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [317e 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +peer0.org2.example.com | [317f 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +peer0.org2.example.com | [3180 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +peer0.org2.example.com | [317d 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [317b 08-31 20:52:05.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3181 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +peer0.org2.example.com | [3182 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3183 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0xdc, 0x42, 0xca, 0x8d, 0x6b, 0x16, 0xf2, 0x93, 0x4, 0x29, 0x62, 0xf1, 0xe4, 0x9, 0xe8, 0xbf, 0x83, 0x51, 0xc9, 0xc7, 0x8b, 0xc4, 0x6, 0xa4, 0xd3, 0x7b, 0x3d, 0x42, 0xb5, 0xa5, 0x4, 0x73} txOffsets= +peer0.org2.example.com | txId=ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b locPointer=offset=70, bytesLength=2980 +peer0.org2.example.com | ] +peer0.org2.example.com | [3184 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93591, bytesLength=2980] for tx ID: [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] to txid-index +peer0.org2.example.com | [3186 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3187 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3185 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93591, bytesLength=2980] for tx number:[0] ID: [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] to blockNumTranNum index +peer0.org2.example.com | [3188 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\027zr\322\256\002 [\367\327\267\361Bk\217\311\362\264\333l&o\370\345\363\n\316\001Q>\206\346\002M\310\037\245]\230" > > alive: +peer0.org2.example.com | [3189 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [318b 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [318a 08-31 20:52:05.12 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97567], isChainEmpty=[false], lastBlockNumber=[5] +peer0.org2.example.com | [318c 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +peer0.org2.example.com | [318d 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +peer0.org2.example.com | [318e 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +peer0.org2.example.com | [318f 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [3190 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [3191 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [3192 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [3193 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org2.example.com | [3194 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org2.example.com | [3195 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [3196 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +peer0.org2.example.com | [3197 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +peer0.org2.example.com | [3199 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +peer0.org2.example.com | [3198 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [319a 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +peer0.org2.example.com | [319b 08-31 20:52:05.13 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +peer0.org2.example.com | [319c 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +peer0.org2.example.com | [319d 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 38ms (state_validation=17ms block_and_pvtdata_commit=14ms state_commit=4ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +peer0.org2.example.com | [319e 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [319f 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408B0BECFA2F8AF9D9816...08061A0C0A0565787030321203312E30 +peer0.org2.example.com | [31a0 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 228229A8AFFA96585C879B681C815FEC03A3238466B1C4019D75D5B480A81D17 +peer0.org2.example.com | [31a1 08-31 20:52:05.14 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +peer0.org2.example.com | [31a2 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [31a3 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [31a4 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31a5 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31a6 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31a7 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31a8 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31a9 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31aa 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [31ab 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31ac 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [31ad 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31ae 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [31af 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [31b0 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31b1 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [31b2 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [31b3 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [31b4 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [31b5 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [31b6 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [31b7 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95330 gate 1598907125273604800 evaluation starts +peer0.org2.example.com | [31b8 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95330 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [31b9 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95330 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [31ba 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95330 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [31bb 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95330 principal evaluation fails +peer0.org2.example.com | [31bc 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a95330 gate 1598907125273604800 evaluation fails +peer0.org2.example.com | [31bd 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [31be 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [31bf 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [31c0 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [31c1 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a958a0 gate 1598907125276423200 evaluation starts +peer0.org2.example.com | [31c2 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a958a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [31c3 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a958a0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [31c4 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a958a0 principal matched by identity 0 +peer0.org2.example.com | [31c5 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 e5 e9 a6 fb 05 57 8b d3 8e 51 f7 68 a5 7e 34 |......W...Q.h.~4| +peer0.org2.example.com | 00000010 b6 76 b4 12 be 3b bf 81 92 39 f3 26 08 8e 3d f9 |.v...;...9.&..=.| +peer0.org2.example.com | [31c6 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 bc 8b 48 51 d1 a7 f4 4e 90 17 b0 |0D. $..HQ...N...| +peer0.org2.example.com | 00000010 99 35 8b 1a f5 b3 d0 ea df 36 6c 2a ac 9b 9a c6 |.5.......6l*....| +peer0.org2.example.com | 00000020 75 1b 64 53 02 20 56 08 1f 62 ca c4 b4 51 85 eb |u.dS. V..b...Q..| +peer0.org2.example.com | 00000030 70 95 38 d7 bd ce c4 65 f6 21 5c 79 f5 17 7e 57 |p.8....e.!\y..~W| +peer0.org2.example.com | 00000040 55 69 e5 10 d3 6b |Ui...k| +peer0.org2.example.com | [31c7 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a958a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [31c8 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a958a0 gate 1598907125276423200 evaluation succeeds +peer0.org2.example.com | [31c9 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [31ca 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [31cb 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [31cc 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [31cd 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2e87 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2e88 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e89 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2e8a 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2e8b 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2e8c 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2e8d 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fc30 gate 1598907129969534700 evaluation starts +peer1.org1.example.com | [2e8e 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fc30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2e8f 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fc30 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2e90 08-31 20:52:09.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fc30 principal matched by identity 0 +peer1.org1.example.com | [2e91 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org1.example.com | [2e92 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org1.example.com | [2e93 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fc30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2e94 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004fc30 gate 1598907129969534700 evaluation succeeds +peer1.org1.example.com | [2e95 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e96 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2e97 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2e98 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2e99 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2e9a 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [2e9b 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e9c 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e9d 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2e9e 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2e9f 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2ea0 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2ea1 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2ea2 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2ea3 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2ea4 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c53170 gate 1598907129977567800 evaluation starts +peer1.org1.example.com | [2ea5 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c53170 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2ea6 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c53170 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2ea7 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c53170 principal matched by identity 0 +peer1.org1.example.com | [2ea8 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [2ea9 08-31 20:52:09.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [2eaa 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c53170 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2eab 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c53170 gate 1598907129977567800 evaluation succeeds +peer1.org1.example.com | [2eac 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ead 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2eae 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2eaf 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2eb0 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org1.example.com | [2eb1 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org1.example.com | [2eb2 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org1.example.com | [2eb3 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org1.example.com | [2eb4 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2eb5 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2eb6 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2eb7 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2eb8 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2eb9 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2eba 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2ebb 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2ebc 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004965170 gate 1598907129987662000 evaluation starts +peer1.org1.example.com | [2ebd 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004965170 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2ebe 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004965170 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [32aa 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a86 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [6d21f743-a096-4708-a7ee-6f3453af394c] +peer0.org1.example.com | [2a87 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +peer0.org1.example.com | [2a88 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2a89 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8CFEFBEF6AF9D9816...08031A0C0A0565787030321203312E30 +peer0.org1.example.com | [2a8a 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 205D2DFEB7491BA0238A6C476E3CDA946094DC80544D737047B2D8D30B82FE7C +peer0.org1.example.com | [2a8b 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +peer0.org1.example.com | [2a82 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +peer0.org1.example.com | [2a8c 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +peer0.org1.example.com | [2a8d 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [2a8e 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +peer0.org1.example.com | [2a8f 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +peer0.org1.example.com | [2a90 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +peer0.org1.example.com | [2a91 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 68ms (state_validation=8ms block_and_pvtdata_commit=47ms state_commit=10ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +peer0.org1.example.com | [2a92 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2a93 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8CFEFBEF6AF9D9816...08041A0C0A0565787030321203312E30 +peer0.org1.example.com | [2a94 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5846ADD5566DADCEE4200C83787F6835BC31CEDC61FA087CEA35A061DEB0DB4F +peer0.org1.example.com | [2a95 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +peer0.org1.example.com | [2a96 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2a97 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2a98 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2a99 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2a9a 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2a9b 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2a9c 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2a9d 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a9e 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2a9f 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2aa0 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2aa1 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2aa2 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003358e10 gate 1598907120028098300 evaluation starts +peer0.org1.example.com | [2aa3 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003358e10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2aa4 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003358e10 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2aa5 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003358e10 principal matched by identity 0 +peer0.org1.example.com | [2aa6 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 4a 59 80 bf f6 e9 23 49 e1 8b 23 95 c6 f2 df |.JY....#I..#....| +peer0.org1.example.com | 00000010 5a ca db 3c 6a ed 08 ab 3b 3c 88 f7 07 06 a1 f1 |Z.. DEBU Verify: sig = 00000000 30 45 02 21 00 ab cb 40 e8 42 ee 4e 0c f8 8a 6a |0E.!...@.B.N...j| +peer0.org1.example.com | 00000010 dd 71 e2 81 d1 85 f4 2f d0 f5 0d f4 51 72 d2 9b |.q...../....Qr..| +peer0.org1.example.com | 00000020 ce a7 b1 81 a3 02 20 0d a2 9c 0a a2 6d 1f 0b 7c |...... .....m..|| +peer0.org1.example.com | 00000030 48 c3 20 ab 22 14 8d ef 09 aa 62 5e 64 74 cc e2 |H. .".....b^dt..| +peer0.org1.example.com | 00000040 8d ce db f4 c1 a1 7d |......}| +peer0.org1.example.com | [2aa8 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003358e10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2aa9 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003358e10 gate 1598907120028098300 evaluation succeeds +peer0.org1.example.com | [2aaa 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2aab 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2aac 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2aad 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2aae 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2aaf 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2ab0 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2ab1 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2ab2 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2ab3 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ab4 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ab5 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ab6 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2ab7 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2ab8 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ab9 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2aba 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2abb 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2abc 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2abd 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2abe 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2abf 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ac0 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ac1 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ac2 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2ac3 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ac4 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2ac5 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2ac6 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ac7 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2ac8 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31ce 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [31cf 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [31d0 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [31d1 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [31d2 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31d3 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31d4 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31d5 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31d6 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [31d7 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [31d8 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31d9 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31da 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [31db 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [31dc 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31dd 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [31df 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [31de 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31e0 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31e1 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31e2 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31e3 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31e4 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31e5 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31e6 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [31e7 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [31e8 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [32ab 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [32ac 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [32ad 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [32ae 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [32af 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [32b0 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [32b1 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1e5b0 gate 1598907129103803400 evaluation starts +peer1.org2.example.com | [32b2 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [32b3 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [32b4 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1e5b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [32b5 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1e5b0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [32b6 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1e5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [32b7 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1e5b0 principal evaluation fails +peer1.org2.example.com | [32b8 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1e5b0 gate 1598907129103803400 evaluation fails +peer1.org2.example.com | [32ba 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [32bb 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [32b9 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [32bc 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [32bd 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1eb20 gate 1598907129110455000 evaluation starts +peer1.org2.example.com | [32be 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1eb20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [32bf 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1eb20 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [32c0 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1eb20 principal matched by identity 0 +peer1.org2.example.com | [32c1 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 10 07 8f e4 2b 02 2d 3e fc 47 48 d6 8f 49 ad |.....+.->.GH..I.| +peer1.org2.example.com | 00000010 f2 d8 41 ea bd 99 65 15 93 84 fb f2 3e 69 8d 88 |..A...e.....>i..| +peer1.org2.example.com | [32c2 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 ee 06 3e b8 e0 d4 82 23 2c 60 aa |0D. C..>....#,`.| +peer1.org2.example.com | 00000010 9d e7 9e 39 08 8f b3 1f 87 55 47 87 62 d9 88 a3 |...9.....UG.b...| +peer1.org2.example.com | 00000020 5f 1f ee 65 02 20 1d 6c fd 2c 4b 23 d7 eb bc 62 |_..e. .l.,K#...b| +peer1.org2.example.com | 00000030 be 76 b0 77 85 48 ce da cd 6f d0 2b 60 ab bc 00 |.v.w.H...o.+`...| +peer1.org2.example.com | 00000040 5c 73 bc 0e 0d 58 |\s...X| +peer1.org2.example.com | [32c3 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1eb20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [32c4 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b1eb20 gate 1598907129110455000 evaluation succeeds +peer1.org2.example.com | [32c5 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [32c6 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [32c7 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [32c8 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [32c9 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [32ca 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32cb 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [32cc 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f bf 80 35 88 b4 5b e6 9f 32 d4 41 b7 09 ed 0f |o..5..[..2.A....| +peer1.org2.example.com | 00000010 34 d7 bd f8 6b 0e 06 76 63 fa 7a 7c a3 3e 80 3a |4...k..vc.z|.>.:| +peer1.org2.example.com | [32cd 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fa 65 3f 1e 10 70 c0 a9 4e 51 b4 |0D. U.e?..p..NQ.| +peer1.org2.example.com | 00000010 f3 2c 93 90 53 d0 9b d0 7f 62 a7 f1 0c ef 07 c6 |.,..S....b......| +peer1.org2.example.com | 00000020 a9 50 fc c6 02 20 18 c8 87 be b7 06 63 1b 8d 96 |.P... ......c...| +peer0.org1.example.com | [2ac9 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2aca 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2acb 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2acc 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2acd 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36840 +peer0.org1.example.com | [2ace 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00045b5e0 +peer0.org1.example.com | [2acf 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2ad0 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2ad1 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2ad2 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [2ad3 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2ad4 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 73 5d 58 bd c8 fd eb 48 4b 97 44 fd 00 99 f3 |vs]X....HK.D....| +peer0.org1.example.com | 00000010 e2 96 78 6d eb 27 38 e2 c5 03 b3 b1 4c a6 d3 e2 |..xm.'8.....L...| +peer0.org1.example.com | [2ad5 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d1 8c 5c 35 42 b6 00 4e 3d d1 f1 |0D. 3..\5B..N=..| +peer0.org1.example.com | 00000010 e1 b4 d0 a5 56 8d 7b b7 4a 81 b1 9d 40 0e 1c bc |....V.{.J...@...| +peer0.org1.example.com | 00000020 5c 3d 9e c1 02 20 66 41 10 38 5f f4 7e 7a 42 75 |\=... fA.8_.~zBu| +peer0.org1.example.com | 00000030 b2 63 47 82 7d c5 47 a4 06 94 37 77 e9 6d ee 09 |.cG.}.G...7w.m..| +peer0.org1.example.com | 00000040 44 07 3f 1d e1 3a |D.?..:| +peer0.org1.example.com | [2ad6 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2ad7 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00015e690, header 0xc00045b9f0 +peer0.org1.example.com | [2ad8 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [2ad9 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9a544a6a] processing txid: 9a544a6a63926b96506078a36f26878d5183bf12097cfaae612843d06e9ddc12 +peer0.org1.example.com | [2ada 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [9a544a6a63926b96506078a36f26878d5183bf12097cfaae612843d06e9ddc12] +peer0.org1.example.com | [2adb 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [2adc 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [2add 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [2ade 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2adf 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer0.org1.example.com | [2ae0 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003279f40 gate 1598907120191759500 evaluation starts +peer0.org1.example.com | [2ae1 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003279f40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2ae2 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003279f40 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2ae3 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003279f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2ae4 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003279f40 principal evaluation fails +peer0.org1.example.com | [2ae5 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003279f40 gate 1598907120191759500 evaluation fails +peer0.org1.example.com | [2ae6 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [2ae7 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [2ae8 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [2ae9 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034804b0 gate 1598907120195078100 evaluation starts +peer0.org1.example.com | [2aea 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034804b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2aeb 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034804b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2aec 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034804b0 principal matched by identity 0 +peer0.org1.example.com | [2aed 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 73 5d 58 bd c8 fd eb 48 4b 97 44 fd 00 99 f3 |vs]X....HK.D....| +peer0.org1.example.com | 00000010 e2 96 78 6d eb 27 38 e2 c5 03 b3 b1 4c a6 d3 e2 |..xm.'8.....L...| +peer0.org1.example.com | [2aee 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d1 8c 5c 35 42 b6 00 4e 3d d1 f1 |0D. 3..\5B..N=..| +peer0.org1.example.com | 00000010 e1 b4 d0 a5 56 8d 7b b7 4a 81 b1 9d 40 0e 1c bc |....V.{.J...@...| +peer0.org1.example.com | 00000020 5c 3d 9e c1 02 20 66 41 10 38 5f f4 7e 7a 42 75 |\=... fA.8_.~zBu| +peer0.org1.example.com | 00000030 b2 63 47 82 7d c5 47 a4 06 94 37 77 e9 6d ee 09 |.cG.}.G...7w.m..| +peer0.org1.example.com | 00000040 44 07 3f 1d e1 3a |D.?..:| +peer0.org1.example.com | [2aef 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034804b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2af0 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034804b0 gate 1598907120195078100 evaluation succeeds +peer0.org1.example.com | [2af1 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2af2 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2af3 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [2af4 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [2af5 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2af6 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [9a544a6a63926b96506078a36f26878d5183bf12097cfaae612843d06e9ddc12] +peer0.org1.example.com | [2af7 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9a544a6a] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2af8 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [2ebf 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004965170 principal matched by identity 0 +peer1.org1.example.com | [2ec0 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org2.example.com | 00000030 82 62 c7 68 41 b0 2c f4 c0 09 14 96 16 92 01 a0 |.b.hA.,.........| +peer1.org2.example.com | 00000040 71 35 0c 02 1b 23 |q5...#| +peer1.org2.example.com | [32ce 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [32cf 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32d0 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [32d1 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 cb 52 a0 a2 f6 de b7 15 19 d2 31 4d 82 0d 79 |..R........1M..y| +peer1.org2.example.com | 00000010 99 e7 0c 97 22 b0 e1 d0 79 bf 2d 9f 60 8f 9d cb |...."...y.-.`...| +peer1.org2.example.com | [32d2 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 6d df 71 b4 35 38 08 9f e7 a0 |0E.!..m.q.58....| +peer1.org2.example.com | 00000010 de 81 34 e7 e9 91 39 0b f5 91 c5 d9 cc 09 34 16 |..4...9.......4.| +peer1.org2.example.com | 00000020 c7 cc 75 05 d6 02 20 3b d3 12 d9 a9 6f 2e 45 83 |..u... ;....o.E.| +peer1.org2.example.com | 00000030 75 66 75 c2 b4 c0 85 4e f5 0f 4b 08 00 0f aa 65 |ufu....N..K....e| +peer1.org2.example.com | 00000040 f5 c9 e8 c5 e9 88 8c |.......| +peer1.org2.example.com | [32d3 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [32d4 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [32d5 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32d6 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32d7 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [32d9 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [32d8 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32da 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [32db 08-31 20:52:09.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32dc 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [31e9 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [31ea 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31eb 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [31ec 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [31ed 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [31ef 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [31f0 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [31f1 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [31ee 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [31f2 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a753a0 gate 1598907125325544800 evaluation starts +peer0.org2.example.com | [31f3 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a753a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [31f4 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a753a0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [31f5 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a753a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [31f6 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a753a0 principal evaluation fails +peer0.org2.example.com | [31f7 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a753a0 gate 1598907125325544800 evaluation fails +peer0.org2.example.com | [31f8 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [31f9 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [31fa 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [31fb 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75930 gate 1598907125327477700 evaluation starts +peer0.org2.example.com | [31fc 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75930 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [31fd 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75930 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [31fe 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75930 principal matched by identity 0 +peer0.org2.example.com | [31ff 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 10 07 8f e4 2b 02 2d 3e fc 47 48 d6 8f 49 ad |.....+.->.GH..I.| +peer0.org2.example.com | 00000010 f2 d8 41 ea bd 99 65 15 93 84 fb f2 3e 69 8d 88 |..A...e.....>i..| +peer0.org2.example.com | [3200 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 ee 06 3e b8 e0 d4 82 23 2c 60 aa |0D. C..>....#,`.| +peer0.org2.example.com | 00000010 9d e7 9e 39 08 8f b3 1f 87 55 47 87 62 d9 88 a3 |...9.....UG.b...| +peer0.org2.example.com | 00000020 5f 1f ee 65 02 20 1d 6c fd 2c 4b 23 d7 eb bc 62 |_..e. .l.,K#...b| +peer0.org2.example.com | 00000030 be 76 b0 77 85 48 ce da cd 6f d0 2b 60 ab bc 00 |.v.w.H...o.+`...| +peer0.org2.example.com | 00000040 5c 73 bc 0e 0d 58 |\s...X| +peer0.org2.example.com | [3201 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75930 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3202 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a75930 gate 1598907125327477700 evaluation succeeds +peer0.org2.example.com | [3203 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3204 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3205 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3206 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3207 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3208 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3209 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [320a 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [320b 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [320c 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [320d 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [320e 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3210 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3212 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [320f 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [3211 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3213 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3214 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3215 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3216 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3217 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3218 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3219 08-31 20:52:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" > alive:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" > alive: alive: +peer0.org2.example.com | [321a 08-31 20:52:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [321b 08-31 20:52:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [321c 08-31 20:52:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [321d 08-31 20:52:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [321e 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [321f 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3220 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3221 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3222 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3223 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3224 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3225 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3226 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3227 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3228 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3229 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [322a 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816102E +peer0.org2.example.com | [322b 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 893F5355AF4140B782CA7C32FFB8CE68A09899060379E7707EB8928A48F0610F +peer0.org2.example.com | [322c 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [322d 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [322e 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [322f 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [3230 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3231 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3232 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3233 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3234 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3235 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3236 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3237 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3238 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3239 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [323a 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [323b 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [323c 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [323d 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [323e 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [323f 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3240 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3241 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3242 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3243 08-31 20:52:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3244 08-31 20:52:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816102F +peer0.org2.example.com | [3245 08-31 20:52:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6FBF803588B45BE69F32D441B709ED0F34D7BDF86B0E067663FA7A7CA33E803A +peer0.org2.example.com | [3246 08-31 20:52:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3247 08-31 20:52:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3248 08-31 20:52:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3249 08-31 20:52:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [32dd 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [32de 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [32df 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [32e0 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [32e1 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [32e2 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab9390 gate 1598907129121650700 evaluation starts +peer1.org2.example.com | [32e3 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab9390 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [32e4 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab9390 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [32e5 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab9390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [32e6 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab9390 principal evaluation fails +peer1.org2.example.com | [32e7 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab9390 gate 1598907129121650700 evaluation fails +peer1.org2.example.com | [32e8 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [32e9 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [32ea 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [32eb 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab9920 gate 1598907129123629200 evaluation starts +peer1.org2.example.com | [32ec 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab9920 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [32ed 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab9920 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [32ee 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab9920 principal matched by identity 0 +peer1.org2.example.com | [32ef 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 32 a5 08 5b 5d 36 89 0c 4a 22 07 f8 c0 bb af |.2..[]6..J".....| +peer1.org2.example.com | 00000010 81 5e c6 35 d5 0c 8f f9 28 5b 93 d5 1d 82 31 47 |.^.5....([....1G| +peer1.org2.example.com | [32f0 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 20 4b 9b 56 37 47 b1 a7 58 68 4a |0D. m K.V7G..XhJ| +peer1.org2.example.com | 00000010 2c a7 0e f2 23 b6 f7 9c c2 4f 95 09 80 b0 47 a0 |,...#....O....G.| +peer1.org2.example.com | 00000020 ca d7 85 94 02 20 27 8e 25 2e 24 47 56 b3 2a 69 |..... '.%.$GV.*i| +peer1.org2.example.com | 00000030 9d 97 17 a3 9e f6 07 c2 c3 cb a1 47 2f c5 b7 e2 |...........G/...| +peer1.org2.example.com | 00000040 b6 71 55 3e 43 08 |.qU>C.| +peer1.org2.example.com | [32f1 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab9920 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [32f2 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab9920 gate 1598907129123629200 evaluation succeeds +peer1.org2.example.com | [32f3 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [32f4 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [32f5 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [32f6 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [32f7 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [32f8 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32f9 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [32fa 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f bf 80 35 88 b4 5b e6 9f 32 d4 41 b7 09 ed 0f |o..5..[..2.A....| +peer1.org2.example.com | 00000010 34 d7 bd f8 6b 0e 06 76 63 fa 7a 7c a3 3e 80 3a |4...k..vc.z|.>.:| +peer1.org2.example.com | [32fb 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fa 65 3f 1e 10 70 c0 a9 4e 51 b4 |0D. U.e?..p..NQ.| +peer1.org2.example.com | 00000010 f3 2c 93 90 53 d0 9b d0 7f 62 a7 f1 0c ef 07 c6 |.,..S....b......| +peer1.org2.example.com | 00000020 a9 50 fc c6 02 20 18 c8 87 be b7 06 63 1b 8d 96 |.P... ......c...| +peer1.org2.example.com | 00000030 82 62 c7 68 41 b0 2c f4 c0 09 14 96 16 92 01 a0 |.b.hA.,.........| +peer1.org2.example.com | 00000040 71 35 0c 02 1b 23 |q5...#| +peer1.org2.example.com | [32fc 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [32fd 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [32fe 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [32ff 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 cb 52 a0 a2 f6 de b7 15 19 d2 31 4d 82 0d 79 |..R........1M..y| +peer1.org2.example.com | 00000010 99 e7 0c 97 22 b0 e1 d0 79 bf 2d 9f 60 8f 9d cb |...."...y.-.`...| +peer1.org2.example.com | [3300 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 6d df 71 b4 35 38 08 9f e7 a0 |0E.!..m.q.58....| +peer1.org2.example.com | 00000010 de 81 34 e7 e9 91 39 0b f5 91 c5 d9 cc 09 34 16 |..4...9.......4.| +peer1.org2.example.com | 00000020 c7 cc 75 05 d6 02 20 3b d3 12 d9 a9 6f 2e 45 83 |..u... ;....o.E.| +peer1.org2.example.com | 00000030 75 66 75 c2 b4 c0 85 4e f5 0f 4b 08 00 0f aa 65 |ufu....N..K....e| +peer1.org2.example.com | 00000040 f5 c9 e8 c5 e9 88 8c |.......| +peer1.org2.example.com | [3301 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3302 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3303 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2af9 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [2afa 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9a544a6a] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2afb 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2afc 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [9a544a6a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [2afd 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [9a544a6a] handling GET_STATE from chaincode +peer0.org1.example.com | [2afe 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [9a544a6a] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [2aff 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [2b00 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [9a544a6a] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [2b01 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [9a544a6a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2b02 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [9a544a6a] notifying Txid:9a544a6a63926b96506078a36f26878d5183bf12097cfaae612843d06e9ddc12, channelID:businesschannel +peer0.org1.example.com | [2b03 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2b04 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9a544a6a] Exit chaincode: name:"exp02" (3ms) +peer0.org1.example.com | [2b05 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2b06 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [9a544a6a63926b96506078a36f26878d5183bf12097cfaae612843d06e9ddc12] +peer0.org1.example.com | [2b07 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9a544a6a] Exit +peer0.org1.example.com | [2b08 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9a544a6a] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2b09 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9a544a6a] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [2b0a 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 9a544a6a63926b96506078a36f26878d5183bf12097cfaae612843d06e9ddc12, chaincode: exp02} +peer0.org1.example.com | [2b0b 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20A0F8A6FFFFA98EA11AE7D1A48694...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2b0c 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1BBAE54D7DE48A5E9F4A7F0DEB0948ABF022A40185FC540A5A39A48AFB6FC993 +peer0.org1.example.com | [2b0d 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 9a544a6a63926b96506078a36f26878d5183bf12097cfaae612843d06e9ddc12, chaincode: exp02} +peer0.org1.example.com | [2b0e 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9a544a6a] Exit +peer0.org1.example.com | [2b0f 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [9a544a6a63926b96506078a36f26878d5183bf12097cfaae612843d06e9ddc12] +peer0.org1.example.com | [2b10 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36840 +peer0.org1.example.com | [2b11 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36840 grpc.code=OK grpc.call_duration=22.1574ms +peer0.org1.example.com | [2b12 08-31 20:52:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2b13 08-31 20:52:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2b14 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b15 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b16 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b17 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2b18 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb a9 e5 9d 18 1a f9 4f 64 2e 97 bd 6d 8b 9a 14 |.......Od...m...| +peer0.org1.example.com | 00000010 1c cd 93 93 b8 ef ce f5 70 5d d8 43 42 d7 92 41 |........p].CB..A| +peer0.org1.example.com | [2b19 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb ac 70 4b 10 24 5c 54 64 f0 ff |0E.!...pK.$\Td..| +peer0.org1.example.com | 00000010 f8 51 bb a2 78 d4 97 29 15 da e8 c8 5a a3 ba 4c |.Q..x..)....Z..L| +peer0.org1.example.com | 00000020 73 1c f3 07 33 02 20 69 f5 a7 f1 70 42 00 28 fe |s...3. i...pB.(.| +peer0.org1.example.com | 00000030 ad 0d bf a9 c5 4f 53 eb 33 df ee 95 00 95 f6 a1 |.....OS.3.......| +peer0.org1.example.com | 00000040 c0 09 7e 8f ad e2 9b |..~....| +peer0.org1.example.com | [2b1a 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b1b 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2b1c 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2b1d 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2b1e 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2b1f 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b20 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b21 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b22 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b23 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b24 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b25 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2b26 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b27 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [2b28 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b29 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b2a 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b2b 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b2c 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b2d 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b2e 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b2f 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b30 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b31 08-31 20:52:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b32 08-31 20:52:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b33 08-31 20:52:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b34 08-31 20:52:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2b35 08-31 20:52:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b36 08-31 20:52:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36844 +peer0.org1.example.com | [2b37 08-31 20:52:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc000409180 +peer0.org1.example.com | [2b38 08-31 20:52:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2b39 08-31 20:52:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2b3a 08-31 20:52:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2b3b 08-31 20:52:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [2b3c 08-31 20:52:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2b3d 08-31 20:52:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 41 cd e0 84 3b 02 2e 99 fa db 78 ec b1 0c 97 |.A...;.....x....| +peer0.org1.example.com | 00000010 32 2e b2 64 17 57 6b 57 28 52 ba 81 87 d5 33 ea |2..d.WkW(R....3.| +peer0.org1.example.com | [2b3e 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 4f 46 5d 64 d4 4f 08 00 15 66 |0E.!..OF]d.O...f| +peer0.org1.example.com | 00000010 14 32 a4 bd 21 7e fd f4 65 4c d7 a5 51 50 c8 5e |.2..!~..eL..QP.^| +peer0.org1.example.com | 00000020 10 30 f8 a3 fa 02 20 33 67 7c d1 57 54 4d 24 44 |.0.... 3g|.WTM$D| +peer0.org1.example.com | 00000030 a9 4f f0 c8 3a c6 1f e3 12 52 3e 32 32 9a 3d d7 |.O..:....R>22.=.| +peer0.org1.example.com | 00000040 b3 0d e9 d4 77 ba 6e |....w.n| +peer0.org1.example.com | [2b3f 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2b40 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001d4c40, header 0xc000409590 +peer0.org1.example.com | [2b41 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [2b42 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a1550261] processing txid: a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d +peer0.org1.example.com | [2b43 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] +peer0.org1.example.com | [2b44 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [2b45 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [2b46 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [2b47 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2b48 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer0.org1.example.com | [2b49 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e14b0 gate 1598907120413146500 evaluation starts +peer1.org2.example.com | [3304 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3305 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [3306 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3307 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3308 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 cb 52 a0 a2 f6 de b7 15 19 d2 31 4d 82 0d 79 |..R........1M..y| +peer1.org2.example.com | 00000010 99 e7 0c 97 22 b0 e1 d0 79 bf 2d 9f 60 8f 9d cb |...."...y.-.`...| +peer1.org2.example.com | [3309 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 6d df 71 b4 35 38 08 9f e7 a0 |0E.!..m.q.58....| +peer1.org2.example.com | 00000010 de 81 34 e7 e9 91 39 0b f5 91 c5 d9 cc 09 34 16 |..4...9.......4.| +peer1.org2.example.com | 00000020 c7 cc 75 05 d6 02 20 3b d3 12 d9 a9 6f 2e 45 83 |..u... ;....o.E.| +peer1.org2.example.com | 00000030 75 66 75 c2 b4 c0 85 4e f5 0f 4b 08 00 0f aa 65 |ufu....N..K....e| +peer1.org2.example.com | 00000040 f5 c9 e8 c5 e9 88 8c |.......| +peer1.org2.example.com | [330a 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [330b 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 54 b8 80 f2 8f e3 0a be b8 af |0E.!..T.........| +peer1.org2.example.com | 00000010 9d d4 a3 8e 0a b5 4b 11 67 ca 85 9b a5 d4 25 9d |......K.g.....%.| +peer1.org2.example.com | 00000020 e7 8f be 8d 9c 02 20 70 73 4d 32 90 0b 3d 0a 3c |...... psM2..=.<| +peer1.org2.example.com | 00000030 4c 51 2d 73 ed cd 30 8e c7 32 f8 a4 a6 11 ff 5b |LQ-s..0..2.....[| +peer1.org2.example.com | 00000040 55 ee 7c eb 2a 91 1b |U.|.*..| +peer1.org2.example.com | [330c 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [330d 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [330e 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [330f 08-31 20:52:09.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3310 08-31 20:52:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [3311 08-31 20:52:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [3312 08-31 20:52:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3313 08-31 20:52:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D9816100F1801 +peer1.org2.example.com | [3314 08-31 20:52:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 554A3C20C0BFD3FA61359D9806752CD5201D23A2BCC723D2F43E3C316158FB60 +peer1.org2.example.com | [3315 08-31 20:52:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [3316 08-31 20:52:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3317 08-31 20:52:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3318 08-31 20:52:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3319 08-31 20:52:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [331a 08-31 20:52:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [331b 08-31 20:52:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [331d 08-31 20:52:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [331c 08-31 20:52:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [331e 08-31 20:52:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [331f 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3320 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3321 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3322 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3323 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3324 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3325 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3326 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3327 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3328 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [3329 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [332a 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ec1 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org1.example.com | [2ec2 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ec3 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ec5 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2ec6 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ec7 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ec8 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2ec4 08-31 20:52:09.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004965170 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2eca 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004965170 gate 1598907129987662000 evaluation succeeds +peer1.org1.example.com | [2ecb 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ec9 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ecc 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ecd 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ece 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2ecf 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2ed0 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ed1 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ed2 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ed3 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [2ed4 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ed5 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2ed6 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ed7 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2ed8 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2ed9 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2eda 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2edb 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2edc 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2edd 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2ede 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2b4a 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e14b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2b4b 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e14b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2b4c 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e14b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2b4d 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e14b0 principal evaluation fails +peer0.org1.example.com | [2b4e 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e14b0 gate 1598907120413146500 evaluation fails +peer0.org1.example.com | [2b4f 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [2b50 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [2b51 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [2b52 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e1a20 gate 1598907120415610500 evaluation starts +peer0.org1.example.com | [2b53 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e1a20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2b54 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e1a20 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2b55 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e1a20 principal matched by identity 0 +peer0.org1.example.com | [2b56 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 41 cd e0 84 3b 02 2e 99 fa db 78 ec b1 0c 97 |.A...;.....x....| +peer0.org1.example.com | 00000010 32 2e b2 64 17 57 6b 57 28 52 ba 81 87 d5 33 ea |2..d.WkW(R....3.| +peer0.org1.example.com | [2b57 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 4f 46 5d 64 d4 4f 08 00 15 66 |0E.!..OF]d.O...f| +peer0.org1.example.com | 00000010 14 32 a4 bd 21 7e fd f4 65 4c d7 a5 51 50 c8 5e |.2..!~..eL..QP.^| +peer0.org1.example.com | 00000020 10 30 f8 a3 fa 02 20 33 67 7c d1 57 54 4d 24 44 |.0.... 3g|.WTM$D| +peer0.org1.example.com | 00000030 a9 4f f0 c8 3a c6 1f e3 12 52 3e 32 32 9a 3d d7 |.O..:....R>22.=.| +peer0.org1.example.com | 00000040 b3 0d e9 d4 77 ba 6e |....w.n| +peer0.org1.example.com | [2b58 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e1a20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2b59 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e1a20 gate 1598907120415610500 evaluation succeeds +peer0.org1.example.com | [2b5a 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2b5b 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2b5c 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [2b5d 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [2b5e 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2b5f 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] +peer0.org1.example.com | [2b60 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a1550261] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2b61 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2b62 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [2b63 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][a1550261] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2b64 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2b65 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [2b66 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] handling GET_STATE from chaincode +peer0.org1.example.com | [2b67 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [2b68 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [2b69 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [2b6a 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [2b6b 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] handling GET_STATE from chaincode +peer0.org1.example.com | [2b6c 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] getting state for chaincode exp02, key b, channel businesschannel +peer0.org1.example.com | [2b6d 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org1.example.com | [2b6e 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [2b6f 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org1.example.com | [2b70 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] handling PUT_STATE from chaincode +peer0.org1.example.com | [2b71 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] Completed PUT_STATE. Sending RESPONSE +peer0.org1.example.com | [2b72 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org1.example.com | [2b73 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] handling PUT_STATE from chaincode +peer0.org1.example.com | [2b74 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] Completed PUT_STATE. Sending RESPONSE +peer0.org1.example.com | [2b75 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2b76 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] notifying Txid:a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d, channelID:businesschannel +peer0.org1.example.com | [2b77 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2b78 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][a1550261] Exit chaincode: name:"exp02" (4ms) +peer0.org1.example.com | [2b79 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2b7a 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] +peer0.org1.example.com | [2b7b 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a1550261] Exit +peer0.org1.example.com | [2b7c 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a1550261] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2b7d 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a1550261] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [2b7e 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d, chaincode: exp02} +peer0.org1.example.com | [2b7f 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20728A436653456C1F2BC550D3CB71...455254494649434154452D2D2D2D2D0A +peer0.org2.example.com | [324a 08-31 20:52:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [324b 08-31 20:52:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [324c 08-31 20:52:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [324d 08-31 20:52:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [324e 08-31 20:52:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [324f 08-31 20:52:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [3250 08-31 20:52:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3251 08-31 20:52:05.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3252 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3253 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3254 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3255 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3256 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3257 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [3258 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [3259 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2edf 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2ee0 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bdf80 gate 1598907130029345800 evaluation starts +peer1.org1.example.com | [2ee1 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bdf80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2ee2 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bdf80 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2ee3 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bdf80 principal matched by identity 0 +peer1.org1.example.com | [2ee4 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4c 7c 08 a4 94 c3 b5 ea c7 0d 64 6c e7 c3 24 df |L|........dl..$.| +peer1.org1.example.com | 00000010 99 6e 10 6e 61 e2 62 d3 ec e1 85 fb 8c 50 fe 89 |.n.na.b......P..| +peer1.org1.example.com | [2ee5 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 49 7e 45 3d 5c 74 87 d9 bc 0c 1a |0D. ,I~E=\t.....| +peer1.org1.example.com | 00000010 13 ee 79 12 62 a4 ea 93 c8 0a ae e4 5b 81 b8 2f |..y.b.......[../| +peer1.org1.example.com | 00000020 b7 55 c1 07 02 20 75 cd 01 55 b3 bf e4 c5 06 34 |.U... u..U.....4| +peer1.org1.example.com | 00000030 bd 38 fd cb 52 48 08 b6 06 0d b6 a4 84 b0 9f 8d |.8..RH..........| +peer1.org1.example.com | 00000040 4e eb 2b a1 90 cc |N.+...| +peer1.org1.example.com | [2ee6 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bdf80 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2ee7 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bdf80 gate 1598907130029345800 evaluation succeeds +peer1.org1.example.com | [2ee9 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2eea 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2eeb 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2eec 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2eed 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2eee 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2eef 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2ef0 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2ef1 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2ef2 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ef3 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ef4 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ee8 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2ef5 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2ef7 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ef6 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ef8 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2ef9 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2efa 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2efb 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2efc 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2efd 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2efe 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2eff 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f00 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2f01 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f02 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [332b 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [332c 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [332d 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [332e 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [332f 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3330 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3331 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3332 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3333 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3334 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3335 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3336 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a69d60 gate 1598907129329953600 evaluation starts +peer1.org2.example.com | [3337 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a69d60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3338 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a69d60 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3339 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a69d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [333a 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a69d60 principal evaluation fails +peer1.org2.example.com | [333b 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a69d60 gate 1598907129329953600 evaluation fails +peer1.org2.example.com | [333c 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [333d 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [333e 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [333f 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f2300 gate 1598907129333543600 evaluation starts +peer1.org2.example.com | [3340 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f2300 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3341 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f2300 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3342 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f2300 principal matched by identity 0 +peer1.org2.example.com | [3343 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 f0 25 be b1 a9 b8 a2 4c ee 74 ba 53 5a 73 bd |..%.....L.t.SZs.| +peer1.org2.example.com | 00000010 cc 26 d3 03 49 c0 ea 6c 60 02 2e a5 ac bf 56 bc |.&..I..l`.....V.| +peer1.org2.example.com | [3344 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 34 95 95 dd 93 d5 d3 09 4e 7c |0E.!..4.......N|| +peer1.org2.example.com | 00000010 47 80 d0 dd 35 b9 ad cd b7 f1 8e dd 28 0e 8f f9 |G...5.......(...| +peer1.org2.example.com | 00000020 07 17 f4 9b be 02 20 0f 5b 32 cb a3 4a 81 47 ec |...... .[2..J.G.| +peer1.org2.example.com | 00000030 4d fd ed 3d 64 4e c2 92 14 e4 4c ef 74 e3 1e 0d |M..=dN....L.t...| +peer1.org2.example.com | 00000040 ba 5a 6a 99 92 7c 40 |.Zj..|@| +peer1.org2.example.com | [3345 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f2300 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3346 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f2300 gate 1598907129333543600 evaluation succeeds +peer1.org2.example.com | [3347 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3348 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3349 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [334a 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [334b 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [334c 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [334d 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [334e 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [334f 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3350 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3351 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3352 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3353 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [3354 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3355 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3356 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3357 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3358 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:C\010" > alive: alive: +peer1.org2.example.com | [3359 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [335a 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [335b 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [335c 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [335d 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [335e 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [335f 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3360 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [325a 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [325b 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [325c 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [325d 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [325e 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [325f 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3260 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038db210 gate 1598907125495340300 evaluation starts +peer0.org2.example.com | [3261 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038db210 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3262 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038db210 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3263 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038db210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3264 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038db210 principal evaluation fails +peer0.org2.example.com | [3265 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038db210 gate 1598907125495340300 evaluation fails +peer0.org2.example.com | [3266 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3267 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3268 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3269 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038db8b0 gate 1598907125495631600 evaluation starts +peer0.org2.example.com | [326a 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038db8b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [326b 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038db8b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [326c 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038db8b0 principal matched by identity 0 +peer0.org2.example.com | [326d 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 67 45 e2 b2 b6 dd cb c6 17 26 f9 c3 80 4c 61 |(gE.......&...La| +peer0.org2.example.com | 00000010 78 f0 6f f2 46 3e df cf 0a d1 3d 63 21 71 82 b9 |x.o.F>....=c!q..| +peer0.org2.example.com | [326e 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 37 c0 99 e0 4d 4b c6 43 5c 1b |0E.!..7...MK.C\.| +peer0.org2.example.com | 00000010 f3 b5 30 5a 1c 66 ae 7e 3e c5 02 08 de 6f f5 78 |..0Z.f.~>....o.x| +peer0.org2.example.com | 00000020 4b 9b f5 c9 d8 02 20 70 bf 4b 5b b4 32 61 8a c6 |K..... p.K[.2a..| +peer0.org2.example.com | 00000030 d0 f7 4f 42 86 38 6b 84 df 24 71 aa 70 44 01 49 |..OB.8k..$q.pD.I| +peer0.org2.example.com | 00000040 8f 8c c8 d7 43 97 51 |....C.Q| +peer0.org2.example.com | [326f 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038db8b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3270 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038db8b0 gate 1598907125495631600 evaluation succeeds +peer0.org2.example.com | [3271 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3272 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3273 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3274 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3275 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3276 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3277 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3278 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f bf 80 35 88 b4 5b e6 9f 32 d4 41 b7 09 ed 0f |o..5..[..2.A....| +peer0.org2.example.com | 00000010 34 d7 bd f8 6b 0e 06 76 63 fa 7a 7c a3 3e 80 3a |4...k..vc.z|.>.:| +peer0.org2.example.com | [3279 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fa 65 3f 1e 10 70 c0 a9 4e 51 b4 |0D. U.e?..p..NQ.| +peer0.org2.example.com | 00000010 f3 2c 93 90 53 d0 9b d0 7f 62 a7 f1 0c ef 07 c6 |.,..S....b......| +peer0.org2.example.com | 00000020 a9 50 fc c6 02 20 18 c8 87 be b7 06 63 1b 8d 96 |.P... ......c...| +peer0.org2.example.com | 00000030 82 62 c7 68 41 b0 2c f4 c0 09 14 96 16 92 01 a0 |.b.hA.,.........| +peer0.org2.example.com | 00000040 71 35 0c 02 1b 23 |q5...#| +peer0.org2.example.com | [327a 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [327b 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [327c 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [327d 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [327e 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e 74 70 5f 69 da ef 58 05 f1 9d 10 2e d6 70 |..tp_i..X......p| +peer0.org2.example.com | 00000010 3a de 14 88 17 ee d0 42 51 d5 a6 46 8d f5 8c 3d |:......BQ..F...=| +peer0.org2.example.com | [327f 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a c0 56 b6 72 65 1b f5 d5 29 c0 a2 |0D. *.V.re...)..| +peer0.org2.example.com | 00000010 58 56 5c 65 a7 0b 2c 94 80 c5 ce 83 ac be f6 54 |XV\e..,........T| +peer0.org2.example.com | 00000020 2f 31 e3 48 02 20 5b 2a ae cd 07 ba a2 8e 32 f3 |/1.H. [*......2.| +peer0.org2.example.com | 00000030 dd 1c 0d 2d 4b c6 ed e9 22 79 c7 aa 01 3d 20 6f |...-K..."y...= o| +peer0.org2.example.com | 00000040 8b 81 64 ef ec 80 |..d...| +peer0.org1.example.com | [2b80 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0CD14F8E8345BC08E972BF23622D37EDC8E04D7AA257F94D8ABAEF95BB588C53 +peer0.org1.example.com | [2b81 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d, chaincode: exp02} +peer0.org1.example.com | [2b82 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a1550261] Exit +peer0.org1.example.com | [2b83 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] +peer0.org1.example.com | [2b84 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36844 +peer0.org1.example.com | [2b85 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36844 grpc.code=OK grpc.call_duration=18.1187ms +peer0.org1.example.com | [2b86 08-31 20:52:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2b87 08-31 20:52:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2b88 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2b89 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2b8a 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b8b 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2b8c 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2b8d 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2b8e 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2b8f 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b90 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2b91 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2b92 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2b93 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2b94 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614680 gate 1598907120459673700 evaluation starts +peer0.org1.example.com | [2b95 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614680 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2b96 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614680 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2b97 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614680 principal matched by identity 0 +peer0.org1.example.com | [2b98 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 5d 4f ff 4a 19 f7 f0 ef 39 07 3b 45 81 3a 23 |.]O.J....9.;E.:#| +peer0.org1.example.com | 00000010 f8 71 e5 47 35 7e 57 86 69 08 d4 d9 31 6b a7 fb |.q.G5~W.i...1k..| +peer0.org1.example.com | [2b99 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 b4 db d3 29 b5 df 6e ed 88 09 27 |0D. ....)..n...'| +peer0.org1.example.com | 00000010 ad d1 96 85 b4 8c 4c 6e 48 60 ee ad 21 ef da 1d |......LnH`..!...| +peer0.org1.example.com | 00000020 82 96 92 b0 02 20 68 8f 6f 51 48 f8 35 4d b0 ca |..... h.oQH.5M..| +peer0.org1.example.com | 00000030 a7 31 97 0b 58 9c 91 42 0c 61 db b7 8b 26 ae de |.1..X..B.a...&..| +peer0.org1.example.com | 00000040 3b 1a dd b7 2b df |;...+.| +peer0.org1.example.com | [2b9a 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614680 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2b9b 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614680 gate 1598907120459673700 evaluation succeeds +peer0.org1.example.com | [2b9c 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3361 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [3362 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3363 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [3364 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3365 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 64 4f 9f 3f 47 05 95 4c 76 9b 7e 67 42 75 e2 |kdO.?G..Lv.~gBu.| +peer1.org2.example.com | 00000010 18 b4 8b c8 5e 17 a9 b1 0c 4a 23 68 e1 a1 3c 58 |....^....J#h.. DEBU Verify: sig = 00000000 30 44 02 20 0f 51 8f 83 be 9f 3f ee c6 d8 d0 2e |0D. .Q....?.....| +peer1.org2.example.com | 00000010 37 b6 9d b1 c0 ae 81 b6 32 9b 15 fc a0 5a bc bd |7.......2....Z..| +peer1.org2.example.com | 00000020 d1 74 8d f6 02 20 22 77 6b 3e 04 16 45 93 9c 46 |.t... "wk>..E..F| +peer1.org2.example.com | 00000030 3c 2a 4e 79 3f 5f 8d ba 44 48 69 96 13 68 d3 b8 |<*Ny?_..DHi..h..| +peer1.org2.example.com | 00000040 f0 df e3 34 7a ba |...4z.| +peer1.org2.example.com | [3367 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [3368 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 01 66 04 db f2 b4 01 8e 30 eb 6c 83 |0D. .f......0.l.| +peer1.org2.example.com | 00000010 78 9b ac 00 bc 6a b2 bf 5d be ed 7e 17 72 30 0a |x....j..]..~.r0.| +peer1.org2.example.com | 00000020 62 92 95 99 02 20 25 41 a2 cb 72 8e fa b6 6f 4b |b.... %A..r...oK| +peer1.org2.example.com | 00000030 f0 9d f0 41 60 20 00 5f be a2 16 2b 68 d8 62 3c |...A` ._...+h.b<| +peer1.org2.example.com | 00000040 6c ec 47 de d3 61 |l.G..a| +peer1.org2.example.com | [3369 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [336a 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [336b 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [336c 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [336d 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [336e 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [336f 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3370 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3371 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [3372 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3373 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3374 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3375 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" secret_envelope: > alive: +peer1.org2.example.com | [3376 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3377 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3378 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3379 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f03 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f04 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2f05 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f07 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f08 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f06 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f0a 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f09 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f0b 08-31 20:52:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f0c 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f0d 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f0e 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f0f 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f10 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f11 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f12 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2f13 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161034 +peer1.org1.example.com | [2f14 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 511A64113FC38D28FA7E8C29BBE86972C27CFAD0157124714838163E1A8745A9 +peer1.org1.example.com | [2f15 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2f16 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2f17 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [2f18 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [2f19 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f1a 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f1b 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2f1c 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f1d 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2f1e 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f1f 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2f20 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f21 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f22 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f23 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f24 08-31 20:52:10.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f25 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f26 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f27 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f28 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f29 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f2a 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f2b 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f2c 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f2d 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f2e 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [2f2f 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f30 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2f31 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2f32 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2f33 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2f34 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2f35 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2f36 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a35710 gate 1598907130438229900 evaluation starts +peer1.org1.example.com | [2f37 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a35710 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2f38 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a35710 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2f39 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a35710 principal matched by identity 0 +peer1.org1.example.com | [2f3a 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 d6 b5 0a 35 7c 05 ec fa 46 2d fc 01 a1 62 dd |....5|...F-...b.| +peer1.org1.example.com | 00000010 e4 e2 99 8a 64 93 bd f5 88 d5 13 08 d0 a2 12 b7 |....d...........| +peer1.org1.example.com | [2f3b 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 7d 29 44 e5 60 46 db c4 93 d8 31 |0D. .})D.`F....1| +peer1.org1.example.com | 00000010 34 1c 07 ca 79 2a cb e9 ce b7 8d a6 43 d0 ac 50 |4...y*......C..P| +peer1.org1.example.com | 00000020 4c 9a e5 c0 02 20 6b af 68 b0 cb 56 b4 f6 98 a4 |L.... k.h..V....| +peer1.org1.example.com | 00000030 bc 9e 29 a1 5e 31 c0 80 ad e2 47 5a af f9 c2 79 |..).^1....GZ...y| +peer1.org1.example.com | 00000040 16 da 1a e2 02 40 |.....@| +peer1.org1.example.com | [2f3c 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a35710 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2f3d 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a35710 gate 1598907130438229900 evaluation succeeds +peer1.org1.example.com | [2f3e 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2f3f 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2f40 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2f41 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2f42 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f43 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [337a 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [337b 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [337c 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [337d 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [337e 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [337f 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3380 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [3381 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3382 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3383 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3384 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3385 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3386 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3387 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3388 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3389 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [338a 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [338b 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [338c 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [338d 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21770 gate 1598907129608748900 evaluation starts +peer1.org2.example.com | [338e 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21770 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [338f 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21770 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3390 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3391 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21770 principal evaluation fails +peer1.org2.example.com | [3392 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21770 gate 1598907129608748900 evaluation fails +peer1.org2.example.com | [3393 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3394 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3395 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3396 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21ce0 gate 1598907129609127500 evaluation starts +peer1.org2.example.com | [3397 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21ce0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3398 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21ce0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3399 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21ce0 principal matched by identity 0 +peer1.org2.example.com | [339a 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 06 4f 12 2f cf 24 26 df 51 68 23 1a b6 c5 5a |..O./.$&.Qh#...Z| +peer1.org2.example.com | 00000010 08 10 ed ed 81 50 a6 97 35 12 b4 68 cc 9d 22 d7 |.....P..5..h..".| +peer1.org2.example.com | [339b 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 45 bc 61 d7 d7 cf 88 66 0b 98 16 |0D. pE.a....f...| +peer1.org2.example.com | 00000010 c0 92 8e 80 c2 1b 41 50 4d f4 ef b2 8e dd d8 49 |......APM......I| +peer1.org2.example.com | 00000020 26 4b c2 46 02 20 76 75 57 5d 83 f8 b2 a2 e4 e3 |&K.F. vuW]......| +peer1.org2.example.com | 00000030 ae f4 cb ca de 0f c0 1d 93 bc fe d7 68 e9 04 cc |............h...| +peer1.org2.example.com | 00000040 c7 2f 8b 38 64 c7 |./.8d.| +peer1.org2.example.com | [339c 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21ce0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [339d 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a21ce0 gate 1598907129609127500 evaluation succeeds +peer1.org2.example.com | [339e 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [339f 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [33a0 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [33a1 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [33a2 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [33a3 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [33a4 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [33a5 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [33a6 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [33a7 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33a8 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33a9 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33aa 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [33ab 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33ac 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33ad 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33ae 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [33af 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" > alive: alive: alive: +peer1.org2.example.com | [33b0 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [33b1 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2b9d 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2b9e 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2b9f 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2ba0 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2ba1 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [2ba2 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2ba3 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2ba4 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2ba5 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ba6 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ba7 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ba8 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ba9 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2baa 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bab 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bac 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bad 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bae 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2baf 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2bb0 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bb1 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2bb2 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2bb3 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bb4 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2bb5 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bb6 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [2bb7 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2bb8 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2bb9 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bba 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2bbb 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bbc 08-31 20:52:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2bbd 08-31 20:52:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816102B +peer0.org1.example.com | [2bbe 08-31 20:52:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 97B46D502BC31A96C36C69C241537B0DD34EA4987A84AD1975CC5C94EEA58C8A +peer0.org1.example.com | [2bbf 08-31 20:52:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2f45 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f44 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2f46 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2f47 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2f48 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f49 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f4a 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f4b 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f4c 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f4d 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f4e 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f4f 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f50 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f51 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2f52 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f53 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f54 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2f55 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f56 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f57 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f58 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f59 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f5a 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f5b 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f5c 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f5d 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f5e 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f5f 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f60 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f61 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f62 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [2f63 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b 35 9a dd 9f 54 2e 35 d9 eb 40 82 02 e8 a7 6d |[5...T.5..@....m| +peer1.org1.example.com | 00000010 14 10 c6 20 59 e3 e0 1d e4 47 cf 39 f1 c4 3b 66 |... Y....G.9..;f| +peer1.org1.example.com | [2f64 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6e b3 ef 21 94 45 6d bd b3 71 01 19 |0D. n..!.Em..q..| +peer1.org1.example.com | 00000010 97 fc a0 4f 36 60 6d a2 df a9 30 b1 09 a3 90 07 |...O6`m...0.....| +peer1.org1.example.com | 00000020 0d ba 3c 84 02 20 4d 66 53 59 09 5e 6d 25 ab d8 |..<.. MfSY.^m%..| +peer1.org1.example.com | 00000030 6a c8 f5 38 4f 5f b1 06 b9 1f e2 d4 e2 c4 58 d3 |j..8O_........X.| +peer1.org1.example.com | 00000040 dd 52 88 ea db f4 |.R....| +peer1.org1.example.com | [2f65 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3280 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3281 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3282 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3283 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [3284 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3285 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f bf 80 35 88 b4 5b e6 9f 32 d4 41 b7 09 ed 0f |o..5..[..2.A....| +peer0.org2.example.com | 00000010 34 d7 bd f8 6b 0e 06 76 63 fa 7a 7c a3 3e 80 3a |4...k..vc.z|.>.:| +peer0.org2.example.com | [3286 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fa 65 3f 1e 10 70 c0 a9 4e 51 b4 |0D. U.e?..p..NQ.| +peer0.org2.example.com | 00000010 f3 2c 93 90 53 d0 9b d0 7f 62 a7 f1 0c ef 07 c6 |.,..S....b......| +peer0.org2.example.com | 00000020 a9 50 fc c6 02 20 18 c8 87 be b7 06 63 1b 8d 96 |.P... ......c...| +peer0.org2.example.com | 00000030 82 62 c7 68 41 b0 2c f4 c0 09 14 96 16 92 01 a0 |.b.hA.,.........| +peer0.org2.example.com | 00000040 71 35 0c 02 1b 23 |q5...#| +peer0.org2.example.com | [3287 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3288 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [3289 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 62 6d 54 6b 54 5b 80 21 4e d6 7e a7 |0D. bmTkT[.!N.~.| +peer0.org2.example.com | 00000010 53 92 9e 51 44 f2 9f 8b 77 ff de a1 72 81 b0 db |S..QD...w...r...| +peer0.org2.example.com | 00000020 f2 65 16 cf 02 20 24 f9 2d be aa a4 4d 26 4f 48 |.e... $.-...M&OH| +peer0.org2.example.com | 00000030 4f ba f0 75 07 a5 f1 3a 8a 2f bf 99 97 0a f6 2d |O..u...:./.....-| +peer0.org2.example.com | 00000040 0a 77 0f 25 32 d7 |.w.%2.| +peer0.org2.example.com | [328a 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [328b 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [328c 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [328d 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [328e 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [328f 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3290 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org2.example.com | [3291 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3292 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3293 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3294 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3295 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3296 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3297 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3298 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3299 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b1460 gate 1598907125505671500 evaluation starts +peer1.org2.example.com | [33b2 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [33b3 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33b4 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33b5 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33b6 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33b7 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [33b8 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [33b9 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33ba 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33bb 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33bc 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33bd 08-31 20:52:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [33be 08-31 20:52:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161033 +peer1.org2.example.com | [33bf 08-31 20:52:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4C7C08A494C3B5EAC70D646CE7C324DF996E106E61E262D3ECE185FB8C50FE89 +peer1.org2.example.com | [33c0 08-31 20:52:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [33c1 08-31 20:52:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [33c2 08-31 20:52:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [33c3 08-31 20:52:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [33c4 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33c5 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33c6 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33c7 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [33c8 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [33c9 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33ca 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [33cb 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [33cc 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33cd 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [33ce 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33cf 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [33d0 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33d1 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [33d2 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [33d3 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33d4 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33d5 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33d6 08-31 20:52:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [33d7 08-31 20:52:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [33d8 08-31 20:52:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [33d9 08-31 20:52:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [33da 08-31 20:52:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33db 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [33dc 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [33dd 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [33de 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [33df 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [33e0 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [33e1 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [33e2 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [33e3 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [33e4 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [33e5 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [33e6 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [33e7 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003949660 gate 1598907130271278300 evaluation starts +peer1.org2.example.com | [33e8 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003949660 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [33e9 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003949660 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [33ea 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003949660 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [33eb 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003949660 principal evaluation fails +peer1.org2.example.com | [33ec 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003949660 gate 1598907130271278300 evaluation fails +peer1.org2.example.com | [33ed 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [33ee 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [33ef 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [33f0 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003949bd0 gate 1598907130272746800 evaluation starts +peer1.org2.example.com | [33f1 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003949bd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [33f2 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003949bd0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [33f3 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003949bd0 principal matched by identity 0 +peer1.org2.example.com | [33f4 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 1a 64 11 3f c3 8d 28 fa 7e 8c 29 bb e8 69 72 |Q.d.?..(.~.)..ir| +peer1.org2.example.com | 00000010 c2 7c fa d0 15 71 24 71 48 38 16 3e 1a 87 45 a9 |.|...q$qH8.>..E.| +peer1.org2.example.com | [33f5 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 27 2b ab 42 71 9b 91 52 60 15 30 |0D. 3'+.Bq..R`.0| +peer1.org2.example.com | 00000010 bd f8 5e 24 43 56 4a 86 6f b2 3b 2c 21 bb c9 92 |..^$CVJ.o.;,!...| +peer1.org2.example.com | 00000020 6a 32 d9 a1 02 20 7c 1a 38 39 03 75 8d 83 20 30 |j2... |.89.u.. 0| +peer1.org2.example.com | 00000030 c0 25 73 b2 03 da 95 ea 5d 16 2a c8 76 d6 9c fa |.%s.....].*.v...| +peer1.org2.example.com | 00000040 54 56 d3 3a ce cb |TV.:..| +peer1.org2.example.com | [33f6 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003949bd0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [33f7 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003949bd0 gate 1598907130272746800 evaluation succeeds +peer1.org2.example.com | [33f8 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [33f9 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [33fa 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [33fb 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2f66 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2f67 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2f68 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2f69 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [2f6a 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f6b 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f6c 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f6d 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f6e 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f6f 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f70 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2f71 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f72 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [2f73 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f74 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f75 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f76 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f77 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f78 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f79 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f7a 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f7b 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f7c 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f7d 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f7e 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f7f 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f80 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f81 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f82 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2f83 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f84 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f85 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f86 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f87 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f88 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f89 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bc0 08-31 20:52:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2bc1 08-31 20:52:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [2bc2 08-31 20:52:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [2bc3 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bc4 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bc5 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bc6 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2bc7 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2bc8 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bc9 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2bca 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2bcb 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bcc 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2bcd 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bce 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2bcf 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2bd0 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36850 +peer0.org1.example.com | [2bd1 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0003c5180 +peer0.org1.example.com | [2bd2 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2bd3 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2bd4 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2bd5 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2bd6 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org1.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org1.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org1.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org1.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org1.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org1.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [2bd7 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org1.example.com | [2bd8 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [2bd9 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [2bda 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2bdb 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b 24 91 3f 39 da 07 ce d2 08 88 8f 3d 7a 8f 4e |.$.?9.......=z.N| +peer0.org1.example.com | 00000010 36 11 3b 45 cc cb 2b 32 06 f7 6a 9f 24 66 46 80 |6.;E..+2..j.$fF.| +peer0.org1.example.com | [2bdc 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 62 ea cc cb c4 a1 02 b5 f7 70 49 |0D. Hb........pI| +peer0.org1.example.com | 00000010 ee cc a1 13 63 55 a2 45 9b 07 99 43 b2 68 9b e8 |....cU.E...C.h..| +peer0.org1.example.com | 00000020 08 95 d8 ff 02 20 05 3f 4b 33 b5 5b 8e a4 99 4f |..... .?K3.[...O| +peer0.org1.example.com | 00000030 38 ed 11 bf cb 3e 61 5f e0 3c 27 db df bb b7 12 |8....>a_.<'.....| +peer0.org1.example.com | 00000040 05 bb 9c d4 49 ac |....I.| +peer0.org1.example.com | [2bdd 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2bde 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00015f030, header 0xc0003c5680 +peer0.org1.example.com | [2bdf 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [2be0 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][abfcbde7] processing txid: abfcbde7407588aaa6ba500b4637c233487e6a3942bdc4ab70cc8b2e65630312 +peer0.org1.example.com | [2be1 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [abfcbde7407588aaa6ba500b4637c233487e6a3942bdc4ab70cc8b2e65630312] +peer0.org1.example.com | [2be2 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [2be3 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [2be4 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [2be5 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2be6 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer0.org1.example.com | [2be7 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e9600 gate 1598907120649298700 evaluation starts +peer0.org1.example.com | [2be8 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e9600 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2be9 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e9600 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2bea 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org1.example.com | [2beb 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [2bec 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [2bed 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e9600 principal matched by identity 0 +peer0.org1.example.com | [2bee 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b 24 91 3f 39 da 07 ce d2 08 88 8f 3d 7a 8f 4e |.$.?9.......=z.N| +peer0.org1.example.com | 00000010 36 11 3b 45 cc cb 2b 32 06 f7 6a 9f 24 66 46 80 |6.;E..+2..j.$fF.| +peer0.org1.example.com | [2bef 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 62 ea cc cb c4 a1 02 b5 f7 70 49 |0D. Hb........pI| +peer0.org1.example.com | 00000010 ee cc a1 13 63 55 a2 45 9b 07 99 43 b2 68 9b e8 |....cU.E...C.h..| +peer0.org1.example.com | 00000020 08 95 d8 ff 02 20 05 3f 4b 33 b5 5b 8e a4 99 4f |..... .?K3.[...O| +peer0.org1.example.com | 00000030 38 ed 11 bf cb 3e 61 5f e0 3c 27 db df bb b7 12 |8....>a_.<'.....| +peer0.org1.example.com | 00000040 05 bb 9c d4 49 ac |....I.| +peer0.org1.example.com | [2bf0 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e9600 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2bf1 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e9600 gate 1598907120649298700 evaluation succeeds +peer0.org1.example.com | [2bf2 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [2bf3 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [2bf4 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [2bf5 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [2bf6 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2bf7 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [abfcbde7407588aaa6ba500b4637c233487e6a3942bdc4ab70cc8b2e65630312] +peer0.org1.example.com | [2bf8 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][abfcbde7] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2bf9 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2bfa 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [2bfb 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][abfcbde7] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2bfc 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2bfd 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [abfcbde7] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [2bfe 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [abfcbde7] handling GET_STATE from chaincode +peer0.org1.example.com | [2bff 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [abfcbde7] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [2c00 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [2c01 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [abfcbde7] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [2c02 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [abfcbde7] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2c03 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [abfcbde7] notifying Txid:abfcbde7407588aaa6ba500b4637c233487e6a3942bdc4ab70cc8b2e65630312, channelID:businesschannel +peer0.org1.example.com | [2c04 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2c05 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][abfcbde7] Exit chaincode: name:"exp02" (3ms) +peer0.org1.example.com | [2c06 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2c07 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [abfcbde7407588aaa6ba500b4637c233487e6a3942bdc4ab70cc8b2e65630312] +peer0.org1.example.com | [2c08 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][abfcbde7] Exit +peer0.org1.example.com | [2c09 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][abfcbde7] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2c0a 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][abfcbde7] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [2c0b 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: abfcbde7407588aaa6ba500b4637c233487e6a3942bdc4ab70cc8b2e65630312, chaincode: exp02} +peer0.org1.example.com | [2c0c 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A202F69E5C292594DB42A60970762DE...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2c0d 08-31 20:52:00.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 04F20CE6D769BCE3DB89965A6EE6D917E2DFE028C138E716AB63FBA8A587F9C2 +peer0.org1.example.com | [2c0e 08-31 20:52:00.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: abfcbde7407588aaa6ba500b4637c233487e6a3942bdc4ab70cc8b2e65630312, chaincode: exp02} +peer0.org1.example.com | [2c0f 08-31 20:52:00.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][abfcbde7] Exit +peer0.org1.example.com | [2c10 08-31 20:52:00.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [abfcbde7407588aaa6ba500b4637c233487e6a3942bdc4ab70cc8b2e65630312] +peer0.org1.example.com | [2c11 08-31 20:52:00.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36850 +peer0.org1.example.com | [2c12 08-31 20:52:00.66 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36850 grpc.code=OK grpc.call_duration=18.8598ms +peer0.org1.example.com | [2c13 08-31 20:52:00.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:36850: read: connection reset by peer +peer0.org1.example.com | [2c14 08-31 20:52:00.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2c15 08-31 20:52:00.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2c16 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c17 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c18 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c19 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f8a 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f8b 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f8c 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [2f8d 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f8e 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f8f 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2f90 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [2f91 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2f92 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2f93 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2f94 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2f95 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2f96 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [2f97 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2f98 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2f99 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d428d0 gate 1598907133084355700 evaluation starts +peer1.org1.example.com | [2f9a 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d428d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2f9b 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d428d0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2f9c 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d428d0 principal matched by identity 0 +peer1.org1.example.com | [2f9d 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 5c a2 78 e0 1f 04 7e 3b 4f 8e b8 2b c1 1e af |Q\.x...~;O..+...| +peer1.org1.example.com | 00000010 06 66 70 37 7b a7 be 74 db 4c 83 18 71 e0 de 96 |.fp7{..t.L..q...| +peer1.org1.example.com | [2f9e 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 59 0f 8f d3 2c 9f a8 ea 33 65 98 |0D. dY...,...3e.| +peer1.org1.example.com | 00000010 5d d4 d4 a8 74 a7 52 d2 5f 2c 06 5d 35 0a d0 59 |]...t.R._,.]5..Y| +peer1.org1.example.com | 00000020 6e 38 f0 42 02 20 7d f5 47 0a 5e ed 53 b1 f6 05 |n8.B. }.G.^.S...| +peer1.org1.example.com | 00000030 af e0 d7 06 d5 32 67 41 93 83 c4 06 e7 9d 18 31 |.....2gA.......1| +peer1.org1.example.com | 00000040 0e fe 14 61 d9 19 |...a..| +peer1.org1.example.com | [2f9f 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d428d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2fa0 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002d428d0 gate 1598907133084355700 evaluation succeeds +peer1.org1.example.com | [2fa1 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2fa2 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2fa3 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2fa4 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [33fc 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [33fd 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [33fe 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [33ff 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3400 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3401 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3402 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3403 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3404 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3405 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3406 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3407 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3408 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3409 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [340a 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [340b 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [340c 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [340d 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [340e 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [340f 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3410 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3411 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3412 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3413 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3414 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3415 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3416 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3417 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3418 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3419 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [341a 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [341b 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [341c 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [341d 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [341e 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3421 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c1a 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c1b 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c1c 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c1d 08-31 20:52:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c1e 08-31 20:52:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c1f 08-31 20:52:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [2c20 08-31 20:52:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c21 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c22 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c23 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c24 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c25 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2c26 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c27 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2c28 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c29 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c2a 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2c2b 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2c2c 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2c2d 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037203b0 gate 1598907121110268800 evaluation starts +peer0.org1.example.com | [2c2e 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037203b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2c2f 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037203b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2c30 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037203b0 principal matched by identity 0 +peer0.org1.example.com | [2c31 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 5b 37 f3 59 2a 3d 1c 8c 82 f6 83 f7 e7 f3 1e |=[7.Y*=.........| +peer0.org1.example.com | 00000010 f4 28 26 0f 02 53 00 aa 05 07 d0 da 3f 7a 06 41 |.(&..S......?z.A| +peer0.org1.example.com | [2c32 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de ee 1b dc b7 1a e2 1b 53 7f 16 |0E.!.........S..| +peer0.org1.example.com | 00000010 a3 38 34 24 60 fd 7a 03 5c 53 7f 2a ef 00 95 34 |.84$`.z.\S.*...4| +peer0.org1.example.com | 00000020 46 26 d9 e2 46 02 20 6c 4a a0 18 ef 6f 2c 50 d4 |F&..F. lJ...o,P.| +peer0.org1.example.com | 00000030 d4 66 95 9f 6e 41 79 68 aa 6e dc b2 5f c9 cf df |.f..nAyh.n.._...| +peer0.org1.example.com | 00000040 4d 02 bb 49 8f 8c 3c |M..I..<| +peer0.org1.example.com | [2c33 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037203b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2fa5 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2fa6 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [2fa7 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [2fa8 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [2fa9 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [2faa 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fab 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fac 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fad 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [2fae 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2faf 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2fb0 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2fb1 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2fb2 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [2fb3 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fb4 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fb5 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [2fb6 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2fb7 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [2fb8 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2fb9 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [2fba 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2fbb 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fbc 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fbd 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fbe 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fbf 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fc0 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fc1 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [329a 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b1460 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [329b 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b1460 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [329c 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b1460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [329d 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b1460 principal evaluation fails +peer0.org2.example.com | [329e 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b1460 gate 1598907125505671500 evaluation fails +peer0.org2.example.com | [329f 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [32a0 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [32a1 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [32a2 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b19d0 gate 1598907125505973100 evaluation starts +peer0.org2.example.com | [32a3 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b19d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [32a4 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b19d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [32a5 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b19d0 principal matched by identity 0 +peer0.org2.example.com | [32a6 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 10 07 8f e4 2b 02 2d 3e fc 47 48 d6 8f 49 ad |.....+.->.GH..I.| +peer0.org2.example.com | 00000010 f2 d8 41 ea bd 99 65 15 93 84 fb f2 3e 69 8d 88 |..A...e.....>i..| +peer0.org2.example.com | [32a7 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 ee 06 3e b8 e0 d4 82 23 2c 60 aa |0D. C..>....#,`.| +peer0.org2.example.com | 00000010 9d e7 9e 39 08 8f b3 1f 87 55 47 87 62 d9 88 a3 |...9.....UG.b...| +peer0.org2.example.com | 00000020 5f 1f ee 65 02 20 1d 6c fd 2c 4b 23 d7 eb bc 62 |_..e. .l.,K#...b| +peer0.org2.example.com | 00000030 be 76 b0 77 85 48 ce da cd 6f d0 2b 60 ab bc 00 |.v.w.H...o.+`...| +peer0.org2.example.com | 00000040 5c 73 bc 0e 0d 58 |\s...X| +peer0.org2.example.com | [32a8 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b19d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [32a9 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b19d0 gate 1598907125505973100 evaluation succeeds +peer0.org2.example.com | [32aa 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [32ab 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [32ac 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [32ad 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [32ae 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [32af 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32b0 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [32b1 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f bf 80 35 88 b4 5b e6 9f 32 d4 41 b7 09 ed 0f |o..5..[..2.A....| +peer0.org2.example.com | 00000010 34 d7 bd f8 6b 0e 06 76 63 fa 7a 7c a3 3e 80 3a |4...k..vc.z|.>.:| +peer0.org2.example.com | [32b2 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fa 65 3f 1e 10 70 c0 a9 4e 51 b4 |0D. U.e?..p..NQ.| +peer0.org2.example.com | 00000010 f3 2c 93 90 53 d0 9b d0 7f 62 a7 f1 0c ef 07 c6 |.,..S....b......| +peer0.org2.example.com | 00000020 a9 50 fc c6 02 20 18 c8 87 be b7 06 63 1b 8d 96 |.P... ......c...| +peer0.org2.example.com | 00000030 82 62 c7 68 41 b0 2c f4 c0 09 14 96 16 92 01 a0 |.b.hA.,.........| +peer0.org2.example.com | 00000040 71 35 0c 02 1b 23 |q5...#| +peer0.org2.example.com | [32b3 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [32b4 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [32b5 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32b6 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [32b7 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e 74 70 5f 69 da ef 58 05 f1 9d 10 2e d6 70 |..tp_i..X......p| +peer0.org2.example.com | 00000010 3a de 14 88 17 ee d0 42 51 d5 a6 46 8d f5 8c 3d |:......BQ..F...=| +peer0.org2.example.com | [32b8 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a c0 56 b6 72 65 1b f5 d5 29 c0 a2 |0D. *.V.re...)..| +peer0.org2.example.com | 00000010 58 56 5c 65 a7 0b 2c 94 80 c5 ce 83 ac be f6 54 |XV\e..,........T| +peer0.org2.example.com | 00000020 2f 31 e3 48 02 20 5b 2a ae cd 07 ba a2 8e 32 f3 |/1.H. [*......2.| +peer0.org2.example.com | 00000030 dd 1c 0d 2d 4b c6 ed e9 22 79 c7 aa 01 3d 20 6f |...-K..."y...= o| +peer0.org2.example.com | 00000040 8b 81 64 ef ec 80 |..d...| +peer0.org2.example.com | [32b9 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [32ba 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32bb 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [32bc 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c34 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037203b0 gate 1598907121110268800 evaluation succeeds +peer0.org1.example.com | [2c35 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c36 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c37 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2c38 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2c39 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2c3a 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2c3b 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2c3c 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2c3d 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2c3e 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c3f 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c40 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c41 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [2c42 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c43 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c44 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c45 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2c46 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c47 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c48 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [2c49 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c4a 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c4b 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [2c4c 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c4d 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c4e 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fc2 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fc3 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fc4 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fc5 08-31 20:52:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fc6 08-31 20:52:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fc7 08-31 20:52:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fc8 08-31 20:52:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fc9 08-31 20:52:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fca 08-31 20:52:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fcb 08-31 20:52:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fcc 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2fcd 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161035 +peer1.org1.example.com | [2fce 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5727BCE021AC9F49122BCBF7708598711235BD3C327CCC4A6EF00ADCC20CE9E6 +peer1.org1.example.com | [2fcf 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [2fd0 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [2fd1 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [2fd2 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2fd3 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2fd4 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [2fd5 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2fd6 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [341f 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3422 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3420 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3423 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3424 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3425 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3426 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3427 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3428 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [342a 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [342b 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [342c 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [342d 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3429 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [342e 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [342f 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3430 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e2590 gate 1598907130423841300 evaluation starts +peer1.org2.example.com | [3431 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e2590 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3432 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e2590 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3433 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e2590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3434 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e2590 principal evaluation fails +peer1.org2.example.com | [3435 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e2590 gate 1598907130423841300 evaluation fails +peer1.org2.example.com | [3436 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3437 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3438 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3439 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [343a 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e2b10 gate 1598907130435582200 evaluation starts +peer1.org2.example.com | [343b 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e2b10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [343c 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e2b10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [343d 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e2b10 principal matched by identity 0 +peer1.org2.example.com | [343e 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org2.example.com | [343f 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org2.example.com | [3440 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e2b10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3441 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e2b10 gate 1598907130435582200 evaluation succeeds +peer1.org2.example.com | [3442 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3443 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3444 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3445 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3446 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3447 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3448 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3449 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [344a 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [344b 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [344c 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [344d 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [344e 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e3d10 gate 1598907130445465400 evaluation starts +peer1.org2.example.com | [344f 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e3d10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3450 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e3d10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3451 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e3d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3452 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e3d10 principal evaluation fails +peer1.org2.example.com | [3453 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038e3d10 gate 1598907130445465400 evaluation fails +peer1.org2.example.com | [3454 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3455 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3456 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3457 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00386e2c0 gate 1598907130445830000 evaluation starts +peer1.org2.example.com | [3458 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00386e2c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3459 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00386e2c0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [345a 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00386e2c0 principal matched by identity 0 +peer1.org2.example.com | [345b 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org2.example.com | [345c 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org1.example.com | [2c4f 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c50 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2c51 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 f8 9b e4 72 34 12 af 1e 59 64 6f 0d 8a c1 60 |....r4...Ydo...`| +peer0.org1.example.com | 00000010 90 df 35 e3 f0 30 73 f6 1b f0 ab 1c 65 d5 17 e0 |..5..0s.....e...| +peer0.org1.example.com | [2c52 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 52 69 8a 68 62 3a 2f 6e 03 e8 |0E.!..Ri.hb:/n..| +peer0.org1.example.com | 00000010 4c 2e 14 0b f5 82 38 bb e3 47 31 24 d1 ef a4 35 |L.....8..G1$...5| +peer0.org1.example.com | 00000020 d6 2f 24 69 da 02 20 68 de cb 59 e9 9d a8 cd 04 |./$i.. h..Y.....| +peer0.org1.example.com | 00000030 fa 70 d6 f6 14 21 7c 03 a6 83 99 8d 03 f9 e2 09 |.p...!|.........| +peer0.org1.example.com | 00000040 cc ff 9c a0 c7 ef 71 |......q| +peer0.org1.example.com | [2c53 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [2c54 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 e2 b0 83 f3 4e 66 83 d3 26 df |0E.!......Nf..&.| +peer0.org1.example.com | 00000010 e5 a1 c0 e1 27 7e 73 09 31 37 5c b8 ca 52 4e 5a |....'~s.17\..RNZ| +peer0.org1.example.com | 00000020 72 c3 c1 14 12 02 20 11 3b 2b c5 bb 8a 3d b2 5a |r..... .;+...=.Z| +peer0.org1.example.com | 00000030 f3 ca 50 78 c8 11 43 08 2b 70 3b e6 cc e8 38 62 |..Px..C.+p;...8b| +peer0.org1.example.com | 00000040 73 66 d1 4d 25 49 17 |sf.M%I.| +peer0.org1.example.com | [2c55 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2c56 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [2c57 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2c58 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2c59 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [2c5a 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c5b 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c5c 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c5d 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [2c5e 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c5f 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c60 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2c61 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [2c62 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c63 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c64 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c65 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c66 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c67 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c68 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c69 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c6a 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c6b 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c6c 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32bd 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [32be 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [32bf 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [32c0 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [32c1 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [32c2 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [32c3 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380ff70 gate 1598907125512530300 evaluation starts +peer0.org2.example.com | [32c4 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380ff70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [32c5 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380ff70 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [32c6 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380ff70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [32c7 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380ff70 principal evaluation fails +peer0.org2.example.com | [32c8 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00380ff70 gate 1598907125512530300 evaluation fails +peer0.org2.example.com | [32c9 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [32ca 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [32cb 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [32cc 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f0500 gate 1598907125513538600 evaluation starts +peer0.org2.example.com | [32cd 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f0500 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [32ce 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f0500 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [32cf 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [32d0 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f0500 principal matched by identity 0 +peer0.org2.example.com | [32d1 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c e1 4c 4c 55 4e e3 2a fa a7 5f 9a ca 30 55 d9 |\.LLUN.*.._..0U.| +peer0.org2.example.com | 00000010 b1 55 79 03 4e b2 a0 d3 b8 90 24 86 cb ca 59 db |.Uy.N.....$...Y.| +peer0.org2.example.com | [32d2 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 e1 9a 6a e4 17 d5 2f 69 d6 b8 09 |0D. 3..j.../i...| +peer0.org2.example.com | 00000010 f0 d5 1e f6 8e 9d 86 f1 e3 0d 75 07 c8 e2 d1 30 |..........u....0| +peer0.org2.example.com | 00000020 d4 81 0e 59 02 20 44 ba 45 91 9d f4 90 d6 02 8d |...Y. D.E.......| +peer0.org2.example.com | 00000030 c4 82 41 61 1c c5 bb 0f e6 4e a0 75 e8 59 62 cb |..Aa.....N.u.Yb.| +peer0.org2.example.com | 00000040 ce 99 d2 a5 c2 82 |......| +peer0.org2.example.com | [32d3 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f0500 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [32d4 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f0500 gate 1598907125513538600 evaluation succeeds +peer0.org2.example.com | [32d5 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [32d6 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [32d7 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [32d8 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [32d9 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [32da 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [32db 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [32dc 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [32dd 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [32de 08-31 20:52:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32df 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32e0 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [32e1 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [32e2 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [32e3 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [32e4 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [32e5 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [32e6 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [32e7 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [32e8 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [32e9 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [32ea 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f1d90 gate 1598907125529593800 evaluation starts +peer0.org2.example.com | [32eb 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f1d90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [32ec 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f1d90 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [32ed 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f1d90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [32ee 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f1d90 principal evaluation fails +peer0.org2.example.com | [32ef 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037f1d90 gate 1598907125529593800 evaluation fails +peer0.org2.example.com | [32f0 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [32f1 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [32f2 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [32f3 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037de300 gate 1598907125529823100 evaluation starts +peer0.org2.example.com | [32f4 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037de300 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [32f5 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037de300 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [32f6 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037de300 principal matched by identity 0 +peer0.org2.example.com | [32f7 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c e1 4c 4c 55 4e e3 2a fa a7 5f 9a ca 30 55 d9 |\.LLUN.*.._..0U.| +peer0.org2.example.com | 00000010 b1 55 79 03 4e b2 a0 d3 b8 90 24 86 cb ca 59 db |.Uy.N.....$...Y.| +peer0.org2.example.com | [32f8 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 e1 9a 6a e4 17 d5 2f 69 d6 b8 09 |0D. 3..j.../i...| +peer0.org2.example.com | 00000010 f0 d5 1e f6 8e 9d 86 f1 e3 0d 75 07 c8 e2 d1 30 |..........u....0| +peer0.org2.example.com | 00000020 d4 81 0e 59 02 20 44 ba 45 91 9d f4 90 d6 02 8d |...Y. D.E.......| +peer0.org2.example.com | 00000030 c4 82 41 61 1c c5 bb 0f e6 4e a0 75 e8 59 62 cb |..Aa.....N.u.Yb.| +peer0.org2.example.com | 00000040 ce 99 d2 a5 c2 82 |......| +peer0.org2.example.com | [32f9 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037de300 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [32fa 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037de300 gate 1598907125529823100 evaluation succeeds +peer0.org2.example.com | [32fb 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [32fc 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [32fd 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [345d 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00386e2c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [345e 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00386e2c0 gate 1598907130445830000 evaluation succeeds +peer1.org2.example.com | [345f 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3460 08-31 20:52:10.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3461 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3462 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3463 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org2.example.com | [3465 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org2.example.com | [3464 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3466 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org2.example.com | [3467 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org2.example.com | [3468 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3469 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [346a 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org2.example.com | [346b 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org2.example.com | [346c 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [346d 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [346e 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [346f 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3470 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3471 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3472 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3473 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3474 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382ef70 gate 1598907130460045500 evaluation starts +peer1.org2.example.com | [3475 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382ef70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3476 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382ef70 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2fd7 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fd8 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fd9 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fda 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fdb 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fdc 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fdd 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fde 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fdf 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fe0 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fe1 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [2fe2 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 27 bc e0 21 ac 9f 49 12 2b cb f7 70 85 98 71 |W'..!..I.+..p..q| +peer1.org1.example.com | 00000010 12 35 bd 3c 32 7c cc 4a 6e f0 0a dc c2 0c e9 e6 |.5.<2|.Jn.......| +peer1.org1.example.com | [2fe3 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 21 fc 14 f8 3c 39 da 81 0f b6 |0E.!..!...<9....| +peer1.org1.example.com | 00000010 17 d5 a3 68 c7 e5 c4 03 fc 86 a5 b4 ec f8 54 d2 |...h..........T.| +peer1.org1.example.com | 00000020 d2 86 34 73 52 02 20 77 42 50 c8 3e 6b ff f9 75 |..4sR. wBP.>k..u| +peer1.org1.example.com | 00000030 a4 4b 8d 4f a8 db 54 d3 dd d3 bf 5c 87 26 8d 67 |.K.O..T....\.&.g| +peer1.org1.example.com | 00000040 01 c0 b7 05 c0 2a a2 |.....*.| +peer1.org1.example.com | [2fe4 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2fe5 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [2fe6 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2fe7 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [2fe8 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [2fe9 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [2fea 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2feb 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [2fec 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2c6d 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [2c6e 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c6f 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c70 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c71 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c72 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c73 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2c74 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c75 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2c76 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c77 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2c78 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2c79 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2c7a 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2c7b 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037761e0 gate 1598907121501943400 evaluation starts +peer0.org1.example.com | [2c7c 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037761e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2c7d 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037761e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2c7e 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037761e0 principal matched by identity 0 +peer0.org1.example.com | [2c7f 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 e2 6c 42 f2 a8 e2 3f 70 70 87 06 55 06 f1 1c |..lB...?pp..U...| +peer0.org1.example.com | 00000010 0d d9 f7 7e a8 3b 92 34 16 5f fe d2 69 f8 7c a6 |...~.;.4._..i.|.| +peer0.org1.example.com | [2c80 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 d3 ec 39 b0 40 f0 97 91 21 35 |0E.!....9.@...!5| +peer0.org1.example.com | 00000010 7d 64 7f f8 31 b9 cd 11 e8 6d 70 50 41 d5 f3 58 |}d..1....mpPA..X| +peer0.org1.example.com | 00000020 7e 04 66 4a a2 02 20 2a b7 16 58 02 a4 c6 82 b9 |~.fJ.. *..X.....| +peer0.org1.example.com | 00000030 a0 eb 2f 01 26 3d 0f 66 2e 59 14 44 9c a3 ad bf |../.&=.f.Y.D....| +peer0.org1.example.com | 00000040 a0 8f b9 51 b3 d2 b5 |...Q...| +peer0.org1.example.com | [2c81 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037761e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2c82 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037761e0 gate 1598907121501943400 evaluation succeeds +peer0.org1.example.com | [2c83 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c84 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2c85 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2c86 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2c87 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2c88 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [2c89 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2c8a 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2c8b 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [2c8c 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c8d 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c8e 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c8f 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [2c90 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c91 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c92 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2c93 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2c94 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [2c95 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c96 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c97 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2c98 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2c99 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [2c9a 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2c9b 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [2c9c 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2c9d 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2c9e 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2c9f 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ca0 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ca1 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ca2 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ca3 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3477 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382ef70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3478 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382ef70 principal evaluation fails +peer1.org2.example.com | [3479 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382ef70 gate 1598907130460045500 evaluation fails +peer1.org2.example.com | [347a 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [347b 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [347c 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [347d 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382f550 gate 1598907130462183800 evaluation starts +peer1.org2.example.com | [347e 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382f550 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [347f 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382f550 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3480 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382f550 principal matched by identity 0 +peer1.org2.example.com | [3481 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org2.example.com | [3482 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org2.example.com | [3483 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382f550 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3484 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00382f550 gate 1598907130462183800 evaluation succeeds +peer1.org2.example.com | [3485 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3486 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3487 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3488 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3489 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [348a 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [348b 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [348c 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [348d 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [348e 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [348f 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3490 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3491 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003790860 gate 1598907130468999300 evaluation starts +peer1.org2.example.com | [3492 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003790860 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3493 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003790860 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3494 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003790860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3495 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003790860 principal evaluation fails +peer1.org2.example.com | [3496 08-31 20:52:10.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003790860 gate 1598907130468999300 evaluation fails +peer1.org2.example.com | [3497 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3498 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3499 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [349a 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003790dd0 gate 1598907130470956900 evaluation starts +peer1.org1.example.com | [2fed 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [2fee 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [2fef 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319b1e0 gate 1598907133327438600 evaluation starts +peer1.org1.example.com | [2ff0 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319b1e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [2ff1 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319b1e0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [2ff2 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319b1e0 principal matched by identity 0 +peer1.org1.example.com | [2ff3 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 5c a2 78 e0 1f 04 7e 3b 4f 8e b8 2b c1 1e af |Q\.x...~;O..+...| +peer1.org1.example.com | 00000010 06 66 70 37 7b a7 be 74 db 4c 83 18 71 e0 de 96 |.fp7{..t.L..q...| +peer1.org1.example.com | [2ff4 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 59 0f 8f d3 2c 9f a8 ea 33 65 98 |0D. dY...,...3e.| +peer1.org1.example.com | 00000010 5d d4 d4 a8 74 a7 52 d2 5f 2c 06 5d 35 0a d0 59 |]...t.R._,.]5..Y| +peer1.org1.example.com | 00000020 6e 38 f0 42 02 20 7d f5 47 0a 5e ed 53 b1 f6 05 |n8.B. }.G.^.S...| +peer1.org1.example.com | 00000030 af e0 d7 06 d5 32 67 41 93 83 c4 06 e7 9d 18 31 |.....2gA.......1| +peer1.org1.example.com | 00000040 0e fe 14 61 d9 19 |...a..| +peer1.org1.example.com | [2ff5 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319b1e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [2ff6 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319b1e0 gate 1598907133327438600 evaluation succeeds +peer1.org1.example.com | [2ff7 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ff8 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [2ff9 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [2ffa 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [2ffb 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [2ffc 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ffd 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [2ffe 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [2fff 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3000 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [3001 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3002 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 27 bc e0 21 ac 9f 49 12 2b cb f7 70 85 98 71 |W'..!..I.+..p..q| +peer1.org1.example.com | 00000010 12 35 bd 3c 32 7c cc 4a 6e f0 0a dc c2 0c e9 e6 |.5.<2|.Jn.......| +peer1.org1.example.com | [3003 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 21 fc 14 f8 3c 39 da 81 0f b6 |0E.!..!...<9....| +peer1.org1.example.com | 00000010 17 d5 a3 68 c7 e5 c4 03 fc 86 a5 b4 ec f8 54 d2 |...h..........T.| +peer1.org1.example.com | 00000020 d2 86 34 73 52 02 20 77 42 50 c8 3e 6b ff f9 75 |..4sR. wBP.>k..u| +peer1.org1.example.com | 00000030 a4 4b 8d 4f a8 db 54 d3 dd d3 bf 5c 87 26 8d 67 |.K.O..T....\.&.g| +peer1.org1.example.com | 00000040 01 c0 b7 05 c0 2a a2 |.....*.| +peer1.org1.example.com | [3004 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3005 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3006 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3007 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3008 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [3009 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [300a 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [300b 08-31 20:52:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [300c 08-31 20:52:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [300d 08-31 20:52:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 27 bc e0 21 ac 9f 49 12 2b cb f7 70 85 98 71 |W'..!..I.+..p..q| +peer1.org1.example.com | 00000010 12 35 bd 3c 32 7c cc 4a 6e f0 0a dc c2 0c e9 e6 |.5.<2|.Jn.......| +peer1.org1.example.com | [300e 08-31 20:52:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 21 fc 14 f8 3c 39 da 81 0f b6 |0E.!..!...<9....| +peer1.org1.example.com | 00000010 17 d5 a3 68 c7 e5 c4 03 fc 86 a5 b4 ec f8 54 d2 |...h..........T.| +peer1.org1.example.com | 00000020 d2 86 34 73 52 02 20 77 42 50 c8 3e 6b ff f9 75 |..4sR. wBP.>k..u| +peer1.org1.example.com | 00000030 a4 4b 8d 4f a8 db 54 d3 dd d3 bf 5c 87 26 8d 67 |.K.O..T....\.&.g| +peer1.org1.example.com | 00000040 01 c0 b7 05 c0 2a a2 |.....*.| +peer1.org1.example.com | [300f 08-31 20:52:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [2ca4 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ca5 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ca6 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ca7 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ca8 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ca9 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [2caa 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cab 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cac 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cad 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cae 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2caf 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816102C +peer0.org1.example.com | [2cb0 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 286745E2B2B6DDCBC61726F9C3804C6178F06FF2463EDFCF0AD13D63217182B9 +peer0.org1.example.com | [2cb1 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2cb2 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [2cb3 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [2cb4 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2cb5 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cb6 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2cb7 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cb8 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [349b 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003790dd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [349c 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003790dd0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [349d 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003790dd0 principal matched by identity 0 +peer1.org2.example.com | [349e 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org2.example.com | [349f 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org2.example.com | [34a0 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003790dd0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [34a1 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003790dd0 gate 1598907130470956900 evaluation succeeds +peer1.org2.example.com | [34a2 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [34a3 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [34a4 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [34a5 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [34a6 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org2.example.com | [34a7 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org2.example.com | [34a8 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34a9 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [34aa 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34ab 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34ac 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34ad 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [34ae 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [34af 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [34b0 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [34b1 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [34b2 08-31 20:52:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [34b3 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003740be0 gate 1598907130480298900 evaluation starts +peer1.org2.example.com | [34b4 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003740be0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [34b5 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003740be0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [34b6 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003740be0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [34b7 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003740be0 principal evaluation fails +peer1.org2.example.com | [34b8 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003740be0 gate 1598907130480298900 evaluation fails +peer1.org2.example.com | [34b9 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [34ba 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [32fe 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [32ff 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3300 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3301 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3302 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3303 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3304 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3305 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3306 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3307 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3308 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3309 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [330a 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [330c 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [330b 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [330d 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [330e 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [330f 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3310 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3311 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3312 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3313 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3314 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3315 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3316 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3317 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3318 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3319 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [331a 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [331b 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [331c 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [331d 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [331e 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [331f 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [3320 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3010 08-31 20:52:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 29 a7 ba ae 3d 8a bc 03 5e fe ad |0D. 7)...=...^..| +peer1.org1.example.com | 00000010 70 3d f4 2a 4e cc f7 9f ea ee 08 56 28 74 46 bd |p=.*N......V(tF.| +peer1.org1.example.com | 00000020 d9 43 cb 02 02 20 26 7c 06 c0 3b 23 04 08 11 0a |.C... &|..;#....| +peer1.org1.example.com | 00000030 f4 3f 61 b3 fc a1 e4 07 75 1e 5e cf 5f 2f 7c 7e |.?a.....u.^._/|~| +peer1.org1.example.com | 00000040 48 82 29 3c e0 dc |H.)<..| +peer1.org1.example.com | [3011 08-31 20:52:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3012 08-31 20:52:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [3013 08-31 20:52:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3014 08-31 20:52:13.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3015 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3016 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3017 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3018 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3019 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [301a 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [301b 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [301c 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [301d 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [301e 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [301f 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3020 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3021 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3022 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3023 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3024 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3025 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cb9 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cba 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cbb 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cbc 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cbd 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cbe 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cbf 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cc0 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cc1 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cc2 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cc3 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2cc4 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 67 45 e2 b2 b6 dd cb c6 17 26 f9 c3 80 4c 61 |(gE.......&...La| +peer0.org1.example.com | 00000010 78 f0 6f f2 46 3e df cf 0a d1 3d 63 21 71 82 b9 |x.o.F>....=c!q..| +peer0.org1.example.com | [2cc5 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 37 c0 99 e0 4d 4b c6 43 5c 1b |0E.!..7...MK.C\.| +peer0.org1.example.com | 00000010 f3 b5 30 5a 1c 66 ae 7e 3e c5 02 08 de 6f f5 78 |..0Z.f.~>....o.x| +peer0.org1.example.com | 00000020 4b 9b f5 c9 d8 02 20 70 bf 4b 5b b4 32 61 8a c6 |K..... p.K[.2a..| +peer0.org1.example.com | 00000030 d0 f7 4f 42 86 38 6b 84 df 24 71 aa 70 44 01 49 |..OB.8k..$q.pD.I| +peer0.org1.example.com | 00000040 8f 8c c8 d7 43 97 51 |....C.Q| +peer0.org1.example.com | [2cc6 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2cc7 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2cc8 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cc9 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2cca 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 f8 9b e4 72 34 12 af 1e 59 64 6f 0d 8a c1 60 |....r4...Ydo...`| +peer0.org1.example.com | 00000010 90 df 35 e3 f0 30 73 f6 1b f0 ab 1c 65 d5 17 e0 |..5..0s.....e...| +peer0.org1.example.com | [2ccb 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 52 69 8a 68 62 3a 2f 6e 03 e8 |0E.!..Ri.hb:/n..| +peer0.org1.example.com | 00000010 4c 2e 14 0b f5 82 38 bb e3 47 31 24 d1 ef a4 35 |L.....8..G1$...5| +peer0.org1.example.com | 00000020 d6 2f 24 69 da 02 20 68 de cb 59 e9 9d a8 cd 04 |./$i.. h..Y.....| +peer0.org1.example.com | 00000030 fa 70 d6 f6 14 21 7c 03 a6 83 99 8d 03 f9 e2 09 |.p...!|.........| +peer0.org1.example.com | 00000040 cc ff 9c a0 c7 ef 71 |......q| +peer0.org1.example.com | [2ccc 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ccd 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cce 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2ccf 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cd0 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [2cd1 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3321 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3322 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3323 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:C\010" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3324 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3325 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:C\010" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3326 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [3327 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3328 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3329 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [332a 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [332b 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [332c 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [332d 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [332e 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a83f0 gate 1598907125606410800 evaluation starts +peer0.org2.example.com | [332f 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a83f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3330 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a83f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3331 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a83f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3332 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a83f0 principal evaluation fails +peer0.org2.example.com | [3333 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a83f0 gate 1598907125606410800 evaluation fails +peer0.org2.example.com | [3334 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3335 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3336 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3337 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a8960 gate 1598907125607308500 evaluation starts +peer0.org2.example.com | [3338 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a8960 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3339 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a8960 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [333a 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a8960 principal matched by identity 0 +peer0.org2.example.com | [333b 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 32 a5 08 5b 5d 36 89 0c 4a 22 07 f8 c0 bb af |.2..[]6..J".....| +peer0.org2.example.com | 00000010 81 5e c6 35 d5 0c 8f f9 28 5b 93 d5 1d 82 31 47 |.^.5....([....1G| +peer0.org2.example.com | [333c 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 20 4b 9b 56 37 47 b1 a7 58 68 4a |0D. m K.V7G..XhJ| +peer0.org2.example.com | 00000010 2c a7 0e f2 23 b6 f7 9c c2 4f 95 09 80 b0 47 a0 |,...#....O....G.| +peer0.org2.example.com | 00000020 ca d7 85 94 02 20 27 8e 25 2e 24 47 56 b3 2a 69 |..... '.%.$GV.*i| +peer0.org2.example.com | 00000030 9d 97 17 a3 9e f6 07 c2 c3 cb a1 47 2f c5 b7 e2 |...........G/...| +peer0.org1.example.com | [2cd2 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2cd3 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2cd4 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2cd5 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2cd6 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2cd7 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2cd8 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003846590 gate 1598907121616298600 evaluation starts +peer0.org1.example.com | [2cd9 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003846590 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2cda 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003846590 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2cdb 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003846590 principal matched by identity 0 +peer0.org1.example.com | [2cdc 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 e2 6c 42 f2 a8 e2 3f 70 70 87 06 55 06 f1 1c |..lB...?pp..U...| +peer0.org1.example.com | 00000010 0d d9 f7 7e a8 3b 92 34 16 5f fe d2 69 f8 7c a6 |...~.;.4._..i.|.| +peer0.org1.example.com | [2cdd 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 d3 ec 39 b0 40 f0 97 91 21 35 |0E.!....9.@...!5| +peer0.org1.example.com | 00000010 7d 64 7f f8 31 b9 cd 11 e8 6d 70 50 41 d5 f3 58 |}d..1....mpPA..X| +peer0.org1.example.com | 00000020 7e 04 66 4a a2 02 20 2a b7 16 58 02 a4 c6 82 b9 |~.fJ.. *..X.....| +peer0.org1.example.com | 00000030 a0 eb 2f 01 26 3d 0f 66 2e 59 14 44 9c a3 ad bf |../.&=.f.Y.D....| +peer0.org1.example.com | 00000040 a0 8f b9 51 b3 d2 b5 |...Q...| +peer0.org1.example.com | [2cde 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003846590 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2cdf 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003846590 gate 1598907121616298600 evaluation succeeds +peer0.org1.example.com | [2ce0 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2ce1 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2ce2 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2ce3 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2ce4 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2ce5 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ce6 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ce7 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ce8 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ce9 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [2cea 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2ceb 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 67 45 e2 b2 b6 dd cb c6 17 26 f9 c3 80 4c 61 |(gE.......&...La| +peer0.org1.example.com | 00000010 78 f0 6f f2 46 3e df cf 0a d1 3d 63 21 71 82 b9 |x.o.F>....=c!q..| +peer0.org1.example.com | [2cec 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 37 c0 99 e0 4d 4b c6 43 5c 1b |0E.!..7...MK.C\.| +peer0.org1.example.com | 00000010 f3 b5 30 5a 1c 66 ae 7e 3e c5 02 08 de 6f f5 78 |..0Z.f.~>....o.x| +peer0.org1.example.com | 00000020 4b 9b f5 c9 d8 02 20 70 bf 4b 5b b4 32 61 8a c6 |K..... p.K[.2a..| +peer0.org1.example.com | 00000030 d0 f7 4f 42 86 38 6b 84 df 24 71 aa 70 44 01 49 |..OB.8k..$q.pD.I| +peer0.org1.example.com | 00000040 8f 8c c8 d7 43 97 51 |....C.Q| +peer0.org1.example.com | [2ced 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2cee 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2cef 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cf0 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [2cf1 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 f8 9b e4 72 34 12 af 1e 59 64 6f 0d 8a c1 60 |....r4...Ydo...`| +peer0.org1.example.com | 00000010 90 df 35 e3 f0 30 73 f6 1b f0 ab 1c 65 d5 17 e0 |..5..0s.....e...| +peer0.org1.example.com | [2cf2 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 52 69 8a 68 62 3a 2f 6e 03 e8 |0E.!..Ri.hb:/n..| +peer0.org1.example.com | 00000010 4c 2e 14 0b f5 82 38 bb e3 47 31 24 d1 ef a4 35 |L.....8..G1$...5| +peer0.org1.example.com | 00000020 d6 2f 24 69 da 02 20 68 de cb 59 e9 9d a8 cd 04 |./$i.. h..Y.....| +peer0.org1.example.com | 00000030 fa 70 d6 f6 14 21 7c 03 a6 83 99 8d 03 f9 e2 09 |.p...!|.........| +peer0.org1.example.com | 00000040 cc ff 9c a0 c7 ef 71 |......q| +peer0.org1.example.com | [2cf3 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2cf4 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2cf5 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [2cf6 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2cf7 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2cf8 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2cf9 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2cfa 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2cfb 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2cfc 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2cfd 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003864fd0 gate 1598907121625612500 evaluation starts +peer0.org1.example.com | [2cfe 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003864fd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2cff 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003864fd0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2d00 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003864fd0 principal matched by identity 0 +peer0.org1.example.com | [2d01 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 5b 37 f3 59 2a 3d 1c 8c 82 f6 83 f7 e7 f3 1e |=[7.Y*=.........| +peer0.org1.example.com | 00000010 f4 28 26 0f 02 53 00 aa 05 07 d0 da 3f 7a 06 41 |.(&..S......?z.A| +peer0.org1.example.com | [2d02 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de ee 1b dc b7 1a e2 1b 53 7f 16 |0E.!.........S..| +peer0.org1.example.com | 00000010 a3 38 34 24 60 fd 7a 03 5c 53 7f 2a ef 00 95 34 |.84$`.z.\S.*...4| +peer0.org1.example.com | 00000020 46 26 d9 e2 46 02 20 6c 4a a0 18 ef 6f 2c 50 d4 |F&..F. lJ...o,P.| +peer0.org1.example.com | 00000030 d4 66 95 9f 6e 41 79 68 aa 6e dc b2 5f c9 cf df |.f..nAyh.n.._...| +peer0.org1.example.com | 00000040 4d 02 bb 49 8f 8c 3c |M..I..<| +peer0.org1.example.com | [2d03 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003864fd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2d04 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003864fd0 gate 1598907121625612500 evaluation succeeds +peer0.org1.example.com | [2d05 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2d06 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2d07 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2d08 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2d09 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2d0a 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d0b 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3026 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [34bb 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2d0c 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [3027 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3028 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000040 b6 71 55 3e 43 08 |.qU>C.| +peer1.org2.example.com | [34bc 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037411f0 gate 1598907130481815700 evaluation starts +peer0.org1.example.com | [2d0e 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3029 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [333d 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a8960 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [34bd 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037411f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2d0d 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [302a 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [333e 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037a8960 gate 1598907125607308500 evaluation succeeds +peer1.org2.example.com | [34be 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037411f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2d0f 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 67 45 e2 b2 b6 dd cb c6 17 26 f9 c3 80 4c 61 |(gE.......&...La| +peer1.org1.example.com | [302b 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [302c 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003185aa0 gate 1598907133497801800 evaluation starts +peer1.org2.example.com | [34bf 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037411f0 principal matched by identity 0 +peer0.org1.example.com | 00000010 78 f0 6f f2 46 3e df cf 0a d1 3d 63 21 71 82 b9 |x.o.F>....=c!q..| +peer1.org1.example.com | [302d 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003185aa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [333f 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [34c0 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org2.example.com | [34c1 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org1.example.com | [302e 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003185aa0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [302f 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003185aa0 principal matched by identity 0 +peer1.org1.example.com | [3030 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 64 7e f1 14 ff 7a d5 17 09 62 b0 ee a6 f3 26 |.d~...z...b....&| +peer1.org1.example.com | 00000010 76 71 60 f0 e6 6e 2f 81 71 8a e5 72 12 24 f0 f4 |vq`..n/.q..r.$..| +peer1.org1.example.com | [3031 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ca e1 de ed fe 90 29 a7 dd a3 |0E.!........)...| +peer0.org1.example.com | [2d10 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 37 c0 99 e0 4d 4b c6 43 5c 1b |0E.!..7...MK.C\.| +peer1.org1.example.com | 00000010 d8 d7 99 68 c9 ea 25 46 b4 e2 f5 4b d1 07 e4 cb |...h..%F...K....| +peer0.org1.example.com | 00000010 f3 b5 30 5a 1c 66 ae 7e 3e c5 02 08 de 6f f5 78 |..0Z.f.~>....o.x| +peer1.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | [3340 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000020 b1 5c 45 19 cc 02 20 1b de fc ab b1 41 37 4a 60 |.\E... .....A7J`| +peer0.org1.example.com | 00000020 4b 9b f5 c9 d8 02 20 70 bf 4b 5b b4 32 61 8a c6 |K..... p.K[.2a..| +peer1.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | [3341 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 8e 23 cc fb d9 74 16 25 d0 b0 1b e1 f6 68 7c f6 |.#...t.%.....h|.| +peer0.org1.example.com | 00000030 d0 f7 4f 42 86 38 6b 84 df 24 71 aa 70 44 01 49 |..OB.8k..$q.pD.I| +peer1.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org2.example.com | [3342 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3343 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000040 5f a9 cd 66 bc 1d 77 |_..f..w| +peer1.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org1.example.com | [3032 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003185aa0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000040 8f 8c c8 d7 43 97 51 |....C.Q| +peer1.org1.example.com | [3033 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003185aa0 gate 1598907133497801800 evaluation succeeds +peer0.org2.example.com | [3344 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [34c2 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037411f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2d11 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | [3034 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3345 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3346 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [2d12 08-31 20:52:01.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 69 1f e4 ae cc 59 74 ab f5 21 3a |0D. zi....Yt..!:| +peer0.org2.example.com | [3347 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | 00000010 ab 85 04 2f 4c 15 74 4e 36 ee 48 91 f6 27 0d e8 |.../L.tN6.H..'..| +peer1.org1.example.com | [3035 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3348 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34c3 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037411f0 gate 1598907130481815700 evaluation succeeds +peer1.org1.example.com | [3036 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3349 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34c4 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3037 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000020 9a 18 53 a8 02 20 0b dd df 7d cf 08 d1 c3 d7 ac |..S.. ...}......| +peer0.org2.example.com | [334a 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34c5 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3038 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000030 2e f4 70 ea 00 bc bd c9 19 39 ff 22 5c 1c b3 54 |..p......9."\..T| +peer0.org2.example.com | [334b 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [3039 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | 00000040 11 58 e0 54 16 31 |.X.T.1| +peer0.org2.example.com | [334c 08-31 20:52:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [303a 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [34c6 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [334d 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [303b 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [34c7 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [334e 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d13 08-31 20:52:01.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [303c 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [34c8 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [334f 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2d14 08-31 20:52:01.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [303d 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34c9 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3350 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d15 08-31 20:52:01.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [303e 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34ca 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3351 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d16 08-31 20:52:01.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [303f 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34cb 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3352 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:C\010" > alive:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" > alive: +peer0.org1.example.com | [2d17 08-31 20:52:01.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3040 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [34cc 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3353 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d18 08-31 20:52:01.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3041 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34cd 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3354 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d19 08-31 20:52:01.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [3042 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34ce 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3355 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d1a 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3043 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34cf 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3356 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d1b 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3044 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [34d0 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c23f0 gate 1598907130488136200 evaluation starts +peer0.org2.example.com | [3357 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d1c 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3045 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [34d1 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c23f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3358 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [2d1d 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3046 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [34d2 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c23f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3359 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d1e 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [34d3 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c23f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [3047 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [335a 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2d1f 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34d4 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c23f0 principal evaluation fails +peer1.org1.example.com | [3048 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [335b 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d20 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes +peer1.org2.example.com | [34d5 08-31 20:52:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c23f0 gate 1598907130488136200 evaluation fails +peer1.org1.example.com | [3049 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [335c 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d21 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes +peer1.org2.example.com | [34d6 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [304a 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [335d 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2d22 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34d7 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [304b 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [335e 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2d23 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer1.org2.example.com | [34d8 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [304c 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [335f 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer1.org2.example.com | [34d9 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c2960 gate 1598907130490798900 evaluation starts +peer1.org1.example.com | [304d 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [3360 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037904d0 gate 1598907125693374400 evaluation starts +peer0.org1.example.com | [2d24 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer1.org2.example.com | [34da 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c2960 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [304e 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [3361 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037904d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer1.org2.example.com | [34db 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c2960 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [304f 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3362 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037904d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer1.org2.example.com | [34dc 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c2960 principal matched by identity 0 +peer1.org1.example.com | [3050 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [3363 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037904d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer1.org2.example.com | [34dd 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org1.example.com | [3051 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [3364 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037904d0 principal evaluation fails +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer1.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org1.example.com | [3052 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 59 da f7 db 4b 11 ae 2e a3 bf 73 62 0e 99 f3 |.Y...K.....sb...| +peer0.org2.example.com | [3365 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037904d0 gate 1598907125693374400 evaluation fails +peer0.org1.example.com | [2d25 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer1.org2.example.com | [34de 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org1.example.com | 00000010 aa e8 26 83 f3 cb ac 1d 7b fb 5f ae ad 42 a8 d9 |..&.....{._..B..| +peer0.org2.example.com | [3366 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [2d26 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org2.example.com | [3367 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer1.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org1.example.com | [3053 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 0e af 30 1c bb 42 56 cf 80 59 |0E.!....0..BV..Y| +peer0.org2.example.com | [3368 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer1.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org1.example.com | 00000010 ba 36 fe f0 69 9d b6 6d 0f b8 cf a3 5d 8d 02 60 |.6..i..m....]..`| +peer0.org2.example.com | [3369 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003790a40 gate 1598907125693793600 evaluation starts +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer1.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org1.example.com | 00000020 a5 85 1e 5e 6e 02 20 77 58 41 bc a4 ad 85 b9 1b |...^n. wXA......| +peer0.org2.example.com | [336a 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003790a40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer1.org2.example.com | [34df 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c2960 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000030 f5 e5 4f 19 90 f9 b4 dc 6c 49 15 5f c2 44 0d 88 |..O.....lI._.D..| +peer0.org2.example.com | [336b 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003790a40 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2d27 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34e0 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c2960 gate 1598907130490798900 evaluation succeeds +peer1.org1.example.com | 00000040 62 e2 03 69 56 23 93 |b..iV#.| +peer0.org2.example.com | [336c 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003790a40 principal matched by identity 0 +peer0.org1.example.com | [2d28 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34e1 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3054 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [336d 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org2.example.com | [34e2 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2d29 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org2.example.com | [34e3 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2d2a 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3055 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab b5 ac f4 98 50 d7 bb 0d 69 e4 |0E.!......P...i.| +peer0.org2.example.com | [336e 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org2.example.com | [34e4 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2d2b 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000010 76 6a a8 11 45 32 bb b7 ea 81 33 9b 8a 07 69 e8 |vj..E2....3...i.| +peer0.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org2.example.com | [34e5 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org1.example.com | [2d2c 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | 00000020 1c 65 85 16 6d 02 20 40 f5 aa e3 e1 ed fa ce da |.e..m. @........| +peer0.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org1.example.com | [2d2d 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000030 c6 cf e0 83 4d af 21 8b d5 80 31 8c 88 7a b3 88 |....M.!...1..z..| +peer0.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org2.example.com | [34e6 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org1.example.com | [2d2e 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000040 32 a0 e1 66 32 bd 8f |2..f2..| +peer0.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org1.example.com | [2d2f 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a4d00 gate 1598907121691679800 evaluation starts +peer1.org1.example.com | [3056 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [336f 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003790a40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org1.example.com | [2d30 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a4d00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3057 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [3370 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003790a40 gate 1598907125693793600 evaluation succeeds +peer1.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org1.example.com | [2d31 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a4d00 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3371 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [3058 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2d32 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a4d00 principal matched by identity 0 +peer0.org2.example.com | [3372 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [34e7 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org1.example.com | [3059 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2d33 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org2.example.com | [3373 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org1.example.com | [305a 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org2.example.com | [3374 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [34e8 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org1.example.com | [305b 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d34 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org2.example.com | [3375 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org1.example.com | [305c 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org2.example.com | [3376 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org1.example.com | [305d 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org2.example.com | [3377 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org1.example.com | [305e 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org2.example.com | [3378 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org1.example.com | [305f 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3060 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34e9 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3061 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3379 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer1.org2.example.com | [34ea 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3062 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [337a 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2d35 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a4d00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [34eb 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34ec 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3063 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [3064 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d36 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a4d00 gate 1598907121691679800 evaluation succeeds +peer0.org1.example.com | [2d37 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2d38 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2d39 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2d3a 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2d3b 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d3c 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d3d 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2d3e 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d3f 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3065 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3066 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3067 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3068 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3069 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [306a 08-31 20:52:13.73 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [306b 08-31 20:52:13.73 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org1.example.com | [306c 08-31 20:52:13.73 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [306d 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [306e 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [306f 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 af 7d 61 e0 f9 01 e5 26 f3 e4 d8 28 0c c7 26 | .}a....&...(..&| +peer1.org1.example.com | 00000010 57 ea ea ed a0 d4 54 de 0c 89 2b 1f d4 ad b0 e8 |W.....T...+.....| +peer1.org1.example.com | [3070 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 22 cc 4a 6c 24 c9 d0 a2 dc e7 e3 |0D. V".Jl$......| +peer1.org1.example.com | 00000010 14 70 ea cb 76 91 62 5e d1 0d cc e2 48 f2 b5 af |.p..v.b^....H...| +peer1.org1.example.com | 00000020 d1 79 41 c5 02 20 63 64 48 1c 63 45 4e c5 15 c3 |.yA.. cdH.cEN...| +peer1.org1.example.com | 00000030 7a 33 99 c8 f7 1e 2e a5 79 1b c6 44 3b e4 13 ee |z3......y..D;...| +peer1.org1.example.com | 00000040 60 37 25 d3 a0 d3 |`7%...| +peer1.org1.example.com | [3071 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3072 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3073 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3074 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [3075 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [3076 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [3077 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [3078 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 5 1] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3079 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [307a 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [307b 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [307c 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [307d 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [307e 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [307f 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [337b 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [337c 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003791650 gate 1598907125695862300 evaluation starts +peer0.org2.example.com | [337d 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003791650 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [337e 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003791650 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [337f 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003791650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3380 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003791650 principal evaluation fails +peer0.org2.example.com | [3381 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003791650 gate 1598907125695862300 evaluation fails +peer0.org2.example.com | [3382 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3383 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3384 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3385 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003791c00 gate 1598907125696184200 evaluation starts +peer0.org2.example.com | [3386 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003791c00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3387 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003791c00 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3388 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003791c00 principal matched by identity 0 +peer0.org2.example.com | [3389 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [338a 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org2.example.com | [338b 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003791c00 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [338c 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003791c00 gate 1598907125696184200 evaluation succeeds +peer0.org2.example.com | [338d 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [338e 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [338f 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3390 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3391 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3392 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3393 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3394 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [3395 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3396 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3397 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3398 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3399 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [339a 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [339b 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [339c 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [339d 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [339e 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [339f 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33a0 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [33a1 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [33a2 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [33a3 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c1f10 gate 1598907125703000600 evaluation starts +peer0.org2.example.com | [33a4 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c1f10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [33a5 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c1f10 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [33a6 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c1f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [33a7 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c1f10 principal evaluation fails +peer0.org2.example.com | [33a8 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c1f10 gate 1598907125703000600 evaluation fails +peer0.org2.example.com | [33a9 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [33aa 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [33ab 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [33ac 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372a480 gate 1598907125704319600 evaluation starts +peer0.org2.example.com | [33ad 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372a480 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [33ae 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372a480 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [33af 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372a480 principal matched by identity 0 +peer0.org2.example.com | [33b0 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [33b1 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org2.example.com | [33b2 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372a480 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [33b3 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00372a480 gate 1598907125704319600 evaluation succeeds +peer0.org2.example.com | [33b4 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [33b5 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [33b6 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [33b7 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [33b8 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33b9 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [33ba 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34ed 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [34ee 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34ef 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34f0 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [34f1 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34f2 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34f3 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [34f4 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [34f5 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [34f6 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [34f7 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [34f8 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 d6 b5 0a 35 7c 05 ec fa 46 2d fc 01 a1 62 dd |....5|...F-...b.| +peer1.org2.example.com | 00000010 e4 e2 99 8a 64 93 bd f5 88 d5 13 08 d0 a2 12 b7 |....d...........| +peer1.org2.example.com | [34f9 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 7d 29 44 e5 60 46 db c4 93 d8 31 |0D. .})D.`F....1| +peer1.org2.example.com | 00000010 34 1c 07 ca 79 2a cb e9 ce b7 8d a6 43 d0 ac 50 |4...y*......C..P| +peer1.org2.example.com | 00000020 4c 9a e5 c0 02 20 6b af 68 b0 cb 56 b4 f6 98 a4 |L.... k.h..V....| +peer1.org2.example.com | 00000030 bc 9e 29 a1 5e 31 c0 80 ad e2 47 5a af f9 c2 79 |..).^1....GZ...y| +peer1.org2.example.com | 00000040 16 da 1a e2 02 40 |.....@| +peer1.org2.example.com | [34fa 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [34fb 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [34fc 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [34fd 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [2d40 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2d41 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2d42 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2d43 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0000 gate 1598907121694082600 evaluation starts +peer0.org1.example.com | [2d44 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0000 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2d45 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0000 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2d46 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0000 principal matched by identity 0 +peer0.org1.example.com | [2d47 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer0.org1.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer0.org1.example.com | [2d48 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer0.org1.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer0.org1.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer0.org1.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer0.org1.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer0.org1.example.com | [2d49 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d4a 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0000 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2d4b 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0000 gate 1598907121694082600 evaluation succeeds +peer0.org1.example.com | [2d4c 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2d4d 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2d4e 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2d50 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2d51 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d52 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d53 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d54 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2d55 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2d56 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2d57 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0b40 gate 1598907121696787000 evaluation starts +peer0.org1.example.com | [2d58 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0b40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2d59 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0b40 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2d5a 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0b40 principal matched by identity 0 +peer0.org1.example.com | [2d5b 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer0.org1.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer0.org1.example.com | [2d5c 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer0.org1.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer0.org1.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer0.org1.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer0.org1.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer0.org1.example.com | [2d5d 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0b40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2d5e 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0b40 gate 1598907121696787000 evaluation succeeds +peer0.org1.example.com | [2d5f 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2d60 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2d61 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2d62 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2d63 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d64 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes +peer0.org1.example.com | [2d65 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d66 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [2d67 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [2d68 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d4f 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d69 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33bb 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [33bc 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33bd 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33be 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [33bf 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [33c0 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [33c1 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375d730 gate 1598907125708566500 evaluation starts +peer0.org2.example.com | [33c2 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375d730 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [33c3 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375d730 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [33c4 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375d730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [33c5 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375d730 principal evaluation fails +peer0.org2.example.com | [33c6 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375d730 gate 1598907125708566500 evaluation fails +peer0.org2.example.com | [33c7 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [33c8 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [33c9 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [33ca 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375dca0 gate 1598907125708904500 evaluation starts +peer0.org2.example.com | [33cb 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375dca0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [33cc 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375dca0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [33cd 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375dca0 principal matched by identity 0 +peer0.org2.example.com | [33ce 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [33cf 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org2.example.com | [33d0 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375dca0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [33d1 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375dca0 gate 1598907125708904500 evaluation succeeds +peer0.org2.example.com | [33d2 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [33d3 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [33d4 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [33d5 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [33d6 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33d7 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33d8 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [33d9 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33da 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33db 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33dc 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33dd 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [33de 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [34fe 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [34ff 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3500 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3501 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3502 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3503 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3504 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3505 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3506 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3507 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3508 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3509 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [350a 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [350b 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [350c 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [350d 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [350e 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [350f 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3510 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [3511 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3512 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3080 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3081 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org1.example.com | [3082 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org1.example.com | [3083 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org1.example.com | [3084 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org1.example.com | [3085 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3086 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3087 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3088 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3089 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [308a 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [308b 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [308c 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [308d 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327bc30 gate 1598907133930673300 evaluation starts +peer1.org1.example.com | [308e 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327bc30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [308f 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327bc30 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3090 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327bc30 principal matched by identity 0 +peer1.org1.example.com | [3091 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [3092 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [3093 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327bc30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3094 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00327bc30 gate 1598907133930673300 evaluation succeeds +peer1.org1.example.com | [3095 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3096 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3097 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3098 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3099 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [309a 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d6a 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2d6b 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d6c 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d6d 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d6e 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2d6f 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2d70 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2d71 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer0.org1.example.com | [2d72 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bac730 gate 1598907121699385900 evaluation starts +peer0.org1.example.com | [2d73 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bac730 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2d74 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bac730 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2d75 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bac730 principal matched by identity 0 +peer0.org1.example.com | [2d76 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d77 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [2d78 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [2d79 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d7a 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2d7b 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bac730 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2d7c 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bac730 gate 1598907121699385900 evaluation succeeds +peer0.org1.example.com | [2d7d 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d7e 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2d7f 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2d80 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2d81 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2d82 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2d83 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d84 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2d85 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [33df 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [33e0 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33e1 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33e2 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [33e3 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [33e4 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [33e5 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036053f0 gate 1598907125948972300 evaluation starts +peer0.org2.example.com | [33e6 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036053f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [33e7 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036053f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [33e8 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036053f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [33e9 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036053f0 principal evaluation fails +peer0.org2.example.com | [33ea 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036053f0 gate 1598907125948972300 evaluation fails +peer0.org2.example.com | [33eb 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [33ec 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [33ed 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [33ee 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003605960 gate 1598907125950186300 evaluation starts +peer0.org2.example.com | [33ef 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003605960 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [33f0 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003605960 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [33f1 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003605960 principal matched by identity 0 +peer0.org2.example.com | [33f2 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org2.example.com | [33f3 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org2.example.com | [33f4 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003605960 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [33f5 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003605960 gate 1598907125950186300 evaluation succeeds +peer0.org2.example.com | [33f6 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [33f7 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [33f8 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [33f9 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [33fa 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33fb 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [33fc 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33fd 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [33fe 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [33ff 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3400 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3401 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e4610 gate 1598907125957033500 evaluation starts +peer0.org2.example.com | [3402 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e4610 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3403 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e4610 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3404 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e4610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3405 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e4610 principal evaluation fails +peer0.org2.example.com | [3406 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e4610 gate 1598907125957033500 evaluation fails +peer0.org2.example.com | [3407 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3408 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3409 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3513 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3514 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3515 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [3516 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3517 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388fbe0 gate 1598907130516966600 evaluation starts +peer1.org2.example.com | [3518 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388fbe0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3519 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388fbe0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [351a 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388fbe0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [351b 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388fbe0 principal evaluation fails +peer1.org2.example.com | [351c 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00388fbe0 gate 1598907130516966600 evaluation fails +peer1.org2.example.com | [351d 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [351e 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [351f 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3520 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e0150 gate 1598907130517222900 evaluation starts +peer1.org2.example.com | [3521 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e0150 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3522 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e0150 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3523 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e0150 principal matched by identity 0 +peer1.org2.example.com | [3524 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b 35 9a dd 9f 54 2e 35 d9 eb 40 82 02 e8 a7 6d |[5...T.5..@....m| +peer1.org2.example.com | 00000010 14 10 c6 20 59 e3 e0 1d e4 47 cf 39 f1 c4 3b 66 |... Y....G.9..;f| +peer1.org2.example.com | [3525 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6e b3 ef 21 94 45 6d bd b3 71 01 19 |0D. n..!.Em..q..| +peer1.org2.example.com | 00000010 97 fc a0 4f 36 60 6d a2 df a9 30 b1 09 a3 90 07 |...O6`m...0.....| +peer1.org2.example.com | 00000020 0d ba 3c 84 02 20 4d 66 53 59 09 5e 6d 25 ab d8 |..<.. MfSY.^m%..| +peer1.org2.example.com | 00000030 6a c8 f5 38 4f 5f b1 06 b9 1f e2 d4 e2 c4 58 d3 |j..8O_........X.| +peer1.org2.example.com | 00000040 dd 52 88 ea db f4 |.R....| +peer1.org2.example.com | [3526 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3527 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3528 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e0150 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3529 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035e0150 gate 1598907130517222900 evaluation succeeds +peer1.org2.example.com | [352a 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [352b 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [352c 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [352d 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [352e 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [352f 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3531 08-31 20:52:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3530 08-31 20:52:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3532 08-31 20:52:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3533 08-31 20:52:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3534 08-31 20:52:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3535 08-31 20:52:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3536 08-31 20:52:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3537 08-31 20:52:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3538 08-31 20:52:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3539 08-31 20:52:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2d86 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +peer0.org1.example.com | 00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +peer0.org1.example.com | [2d87 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +peer0.org1.example.com | 00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +peer0.org1.example.com | 00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +peer0.org1.example.com | 00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +peer0.org1.example.com | 00000040 60 c8 49 33 05 26 8a |`.I3.&.| +peer0.org1.example.com | [2d88 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d89 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d8a 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2d8b 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d8c 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d8d 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2d8e 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2d8f 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2d90 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e200c0 gate 1598907121728368100 evaluation starts +peer0.org1.example.com | [2d91 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e200c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2d92 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e200c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2d93 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e200c0 principal matched by identity 0 +peer0.org1.example.com | [2d94 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +peer0.org1.example.com | 00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +peer0.org1.example.com | [2d95 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +peer0.org1.example.com | 00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +peer0.org1.example.com | 00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +peer0.org1.example.com | 00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +peer0.org1.example.com | 00000040 95 10 dc 3c 55 b0 |... DEBU 0xc004e200c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2d97 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e200c0 gate 1598907121728368100 evaluation succeeds +peer0.org1.example.com | [2d98 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2d99 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2d9a 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2d9b 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2d9c 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2d9d 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d9e 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2d9f 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2da0 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2da1 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2da2 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e20c10 gate 1598907121738849100 evaluation starts +peer0.org1.example.com | [2da3 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e20c10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2da4 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e20c10 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2da5 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e20c10 principal matched by identity 0 +peer0.org1.example.com | [2da6 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +peer1.org1.example.com | [309b 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [309c 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [309d 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [309e 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [309f 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [30a0 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [30a1 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a2e30 gate 1598907133931748600 evaluation starts +peer1.org1.example.com | [30a2 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a2e30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [30a3 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a2e30 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [30a4 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a2e30 principal matched by identity 0 +peer1.org1.example.com | [30a5 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org1.example.com | [30a6 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org1.example.com | [30a7 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a2e30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [30a8 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032a2e30 gate 1598907133931748600 evaluation succeeds +peer1.org1.example.com | [30a9 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [30aa 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [30ab 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [30ac 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [30ad 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30ae 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [30af 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [30b0 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30b1 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30b2 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [30b3 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30b4 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30b5 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [353a 08-31 20:52:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [353b 08-31 20:52:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [353c 08-31 20:52:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [353d 08-31 20:52:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [353e 08-31 20:52:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [353f 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3540 08-31 20:52:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3541 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3543 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3542 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3544 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3545 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3547 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3546 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3548 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3549 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [354a 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [354b 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [354c 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [354d 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [354e 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [354f 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3550 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3551 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3552 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3553 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3554 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3555 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3556 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3557 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3558 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [3559 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [355a 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [355b 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [355c 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [355d 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [355e 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [355f 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3560 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3561 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3562 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3564 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3563 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3565 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3566 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3567 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3568 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3569 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [356a 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [356b 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [356c 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [356d 08-31 20:52:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [356e 08-31 20:52:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161034 +peer1.org2.example.com | [356f 08-31 20:52:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 515CA278E01F047E3B4F8EB82BC11EAF066670377BA7BE74DB4C831871E0DE96 +peer1.org2.example.com | [3570 08-31 20:52:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3571 08-31 20:52:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3572 08-31 20:52:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3573 08-31 20:52:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3574 08-31 20:52:13.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3575 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3576 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3577 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3578 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3579 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [357a 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [357b 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [357c 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [357f 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [357d 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [3580 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [3581 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3582 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [3583 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [357e 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3584 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 5c a2 78 e0 1f 04 7e 3b 4f 8e b8 2b c1 1e af |Q\.x...~;O..+...| +peer1.org2.example.com | 00000010 06 66 70 37 7b a7 be 74 db 4c 83 18 71 e0 de 96 |.fp7{..t.L..q...| +peer1.org2.example.com | [3585 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 59 0f 8f d3 2c 9f a8 ea 33 65 98 |0D. dY...,...3e.| +peer1.org2.example.com | 00000010 5d d4 d4 a8 74 a7 52 d2 5f 2c 06 5d 35 0a d0 59 |]...t.R._,.]5..Y| +peer1.org2.example.com | 00000020 6e 38 f0 42 02 20 7d f5 47 0a 5e ed 53 b1 f6 05 |n8.B. }.G.^.S...| +peer1.org2.example.com | 00000030 af e0 d7 06 d5 32 67 41 93 83 c4 06 e7 9d 18 31 |.....2gA.......1| +peer1.org2.example.com | 00000040 0e fe 14 61 d9 19 |...a..| +peer1.org2.example.com | [3586 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3587 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3588 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3589 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [358a 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [358b 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [358c 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [358e 08-31 20:52:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 5c a2 78 e0 1f 04 7e 3b 4f 8e b8 2b c1 1e af |Q\.x...~;O..+...| +peer1.org2.example.com | 00000010 06 66 70 37 7b a7 be 74 db 4c 83 18 71 e0 de 96 |.fp7{..t.L..q...| +peer1.org2.example.com | [358f 08-31 20:52:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 59 0f 8f d3 2c 9f a8 ea 33 65 98 |0D. dY...,...3e.| +peer1.org2.example.com | 00000010 5d d4 d4 a8 74 a7 52 d2 5f 2c 06 5d 35 0a d0 59 |]...t.R._,.]5..Y| +peer1.org2.example.com | 00000020 6e 38 f0 42 02 20 7d f5 47 0a 5e ed 53 b1 f6 05 |n8.B. }.G.^.S...| +peer1.org2.example.com | 00000030 af e0 d7 06 d5 32 67 41 93 83 c4 06 e7 9d 18 31 |.....2gA.......1| +peer1.org2.example.com | 00000040 0e fe 14 61 d9 19 |...a..| +peer1.org2.example.com | [358d 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3590 08-31 20:52:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [3591 08-31 20:52:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e c5 f2 7d c7 a1 2e 8f 00 61 de |0E.!....}.....a.| +peer1.org2.example.com | 00000010 1a af ba ff 54 c0 9e e8 25 2a 74 0e 89 8c 8f 21 |....T...%*t....!| +peer1.org2.example.com | 00000020 eb 38 24 fc eb 02 20 12 68 61 82 c4 c9 df 19 0c |.8$... .ha......| +peer1.org1.example.com | [30b6 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [30b7 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [30b8 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [30b9 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [30ba 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [30bb 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [30bc 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cca20 gate 1598907133934872600 evaluation starts +peer1.org1.example.com | [30bd 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cca20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [30be 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cca20 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [30bf 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cca20 principal matched by identity 0 +peer1.org1.example.com | [30c0 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org1.example.com | [30c1 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org1.example.com | [30c2 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cca20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [30c3 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032cca20 gate 1598907133934872600 evaluation succeeds +peer1.org1.example.com | [30c4 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [30c5 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [30c6 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [30c7 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [30c8 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org1.example.com | [30c9 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org1.example.com | [30ca 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org1.example.com | [30cb 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [30cc 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org1.example.com | [30cd 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30ce 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [340a 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e4b80 gate 1598907125958360400 evaluation starts +peer0.org2.example.com | [340b 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e4b80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [340c 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e4b80 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [340d 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e4b80 principal matched by identity 0 +peer0.org2.example.com | [340e 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org2.example.com | [340f 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org2.example.com | [3410 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e4b80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3411 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e4b80 gate 1598907125958360400 evaluation succeeds +peer0.org2.example.com | [3412 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3413 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3414 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3415 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3416 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3417 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3418 08-31 20:52:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3419 08-31 20:52:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [341a 08-31 20:52:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [341b 08-31 20:52:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [341c 08-31 20:52:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [341d 08-31 20:52:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [341e 08-31 20:52:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [341f 08-31 20:52:05.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3420 08-31 20:52:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3421 08-31 20:52:05.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3422 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3423 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3424 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3425 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3426 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5fc0 gate 1598907125982513500 evaluation starts +peer1.org2.example.com | 00000030 a4 b7 15 b8 e5 dc b5 c9 cc b5 04 82 05 be b0 8d |................| +peer1.org2.example.com | 00000040 63 84 6c d9 e3 ce 17 |c.l....| +peer1.org2.example.com | [3592 08-31 20:52:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3593 08-31 20:52:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3594 08-31 20:52:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3595 08-31 20:52:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3596 08-31 20:52:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [3597 08-31 20:52:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3598 08-31 20:52:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org2.example.com | [3599 08-31 20:52:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [359a 08-31 20:52:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 5c a2 78 e0 1f 04 7e 3b 4f 8e b8 2b c1 1e af |Q\.x...~;O..+...| +peer1.org2.example.com | 00000010 06 66 70 37 7b a7 be 74 db 4c 83 18 71 e0 de 96 |.fp7{..t.L..q...| +peer1.org2.example.com | [359b 08-31 20:52:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 59 0f 8f d3 2c 9f a8 ea 33 65 98 |0D. dY...,...3e.| +peer1.org2.example.com | 00000010 5d d4 d4 a8 74 a7 52 d2 5f 2c 06 5d 35 0a d0 59 |]...t.R._,.]5..Y| +peer1.org2.example.com | 00000020 6e 38 f0 42 02 20 7d f5 47 0a 5e ed 53 b1 f6 05 |n8.B. }.G.^.S...| +peer1.org2.example.com | 00000030 af e0 d7 06 d5 32 67 41 93 83 c4 06 e7 9d 18 31 |.....2gA.......1| +peer1.org2.example.com | 00000040 0e fe 14 61 d9 19 |...a..| +peer1.org2.example.com | [359c 08-31 20:52:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [359d 08-31 20:52:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [359e 08-31 20:52:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [359f 08-31 20:52:13.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35a0 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [35a1 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [35a2 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [35a3 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35a4 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35a5 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35a6 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35a7 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35a8 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35a9 08-31 20:52:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [35aa 08-31 20:52:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35ab 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [35ac 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [35ad 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35ae 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [35af 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [35b0 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30cf 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [30d0 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [30d1 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [30d2 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [30d3 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [30d4 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [30d5 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f6a00 gate 1598907133937052800 evaluation starts +peer1.org1.example.com | [30d6 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f6a00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [30d7 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f6a00 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [30d8 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f6a00 principal matched by identity 0 +peer1.org1.example.com | [30d9 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [30da 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [30db 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f6a00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [30dc 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f6a00 gate 1598907133937052800 evaluation succeeds +peer1.org1.example.com | [30dd 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [30de 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [30df 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [30e0 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [30e1 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [30e2 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [30e3 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30e4 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30e5 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30e6 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [30e7 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [30e8 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [30e9 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [30ea 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [30eb 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [30ec 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f7e50 gate 1598907133938335200 evaluation starts +peer1.org1.example.com | [30ed 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f7e50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [30ee 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f7e50 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [30ef 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f7e50 principal matched by identity 0 +peer1.org1.example.com | [30f0 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org1.example.com | 00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +peer0.org1.example.com | [2da7 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +peer0.org1.example.com | 00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +peer0.org1.example.com | 00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +peer0.org1.example.com | 00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +peer0.org1.example.com | 00000040 95 10 dc 3c 55 b0 |... DEBU 0xc004e20c10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2da9 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e20c10 gate 1598907121738849100 evaluation succeeds +peer0.org1.example.com | [2daa 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2dab 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2dac 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2dad 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2dae 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2daf 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes +peer0.org1.example.com | [2db0 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +peer0.org1.example.com | 00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +peer0.org1.example.com | [2db1 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +peer0.org1.example.com | 00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +peer0.org1.example.com | 00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +peer0.org1.example.com | 00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +peer0.org1.example.com | 00000040 9f dc 4e 54 20 46 |..NT F| +peer0.org1.example.com | [2db2 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2db3 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2db4 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2db5 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2db6 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2db7 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2db8 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2db9 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2dba 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e566b0 gate 1598907121745817400 evaluation starts +peer0.org1.example.com | [2dbb 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e566b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2dbc 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e566b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2dbd 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e566b0 principal matched by identity 0 +peer0.org1.example.com | [2dbe 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +peer0.org1.example.com | 00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +peer0.org1.example.com | [2dbf 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +peer0.org1.example.com | 00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +peer0.org1.example.com | 00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +peer0.org1.example.com | 00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +peer0.org1.example.com | 00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +peer0.org1.example.com | [2dc0 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e566b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2dc1 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e566b0 gate 1598907121745817400 evaluation succeeds +peer0.org1.example.com | [2dc2 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2dc3 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2dc4 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2dc5 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2dc6 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2dc7 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2dc8 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2dc9 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2dca 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2dcb 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2dcc 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2dcd 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2dce 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e578c0 gate 1598907121748896000 evaluation starts +peer0.org1.example.com | [2dcf 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e578c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2dd0 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e578c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2dd1 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e578c0 principal matched by identity 0 +peer0.org1.example.com | [2dd2 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +peer0.org1.example.com | 00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +peer0.org1.example.com | [2dd3 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +peer0.org1.example.com | 00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +peer0.org1.example.com | 00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +peer0.org1.example.com | 00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +peer0.org1.example.com | 00000040 a1 f9 a7 3e a1 dd 9c |...>...| +peer0.org1.example.com | [2dd4 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e578c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2dd5 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e578c0 gate 1598907121748896000 evaluation succeeds +peer0.org1.example.com | [2dd6 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2dd7 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2dd8 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2dd9 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2dda 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer0.org1.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer0.org1.example.com | [2ddb 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer0.org1.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer0.org1.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer0.org1.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer0.org1.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer0.org1.example.com | [2ddc 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ddd 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2dde 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2ddf 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2de0 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2de1 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580a40 gate 1598907121750706700 evaluation starts +peer0.org1.example.com | [2de2 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580a40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2de3 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580a40 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2de4 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2de5 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580a40 principal evaluation fails +peer0.org1.example.com | [2de6 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580a40 gate 1598907121750706700 evaluation fails +peer0.org1.example.com | [2de7 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2de8 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2de9 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [2dea 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580fb0 gate 1598907121751474400 evaluation starts +peer0.org1.example.com | [2deb 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580fb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2dec 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580fb0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2ded 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580fb0 principal matched by identity 0 +peer0.org1.example.com | [2dee 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer0.org1.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer0.org1.example.com | [2def 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer0.org1.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer0.org1.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer0.org1.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer0.org1.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer0.org1.example.com | [2df0 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580fb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2df1 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580fb0 gate 1598907121751474400 evaluation succeeds +peer0.org1.example.com | [2df2 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2df3 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [2df4 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2df5 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2df6 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2df7 08-31 20:52:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2df8 08-31 20:52:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2df9 08-31 20:52:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [2dfa 08-31 20:52:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2dfb 08-31 20:52:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2dfc 08-31 20:52:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2dfd 08-31 20:52:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [2dfe 08-31 20:52:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2dff 08-31 20:52:01.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 43 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e00 08-31 20:52:01.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 43 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e01 08-31 20:52:01.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e02 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e03 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e04 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e05 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e06 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e07 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3427 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5fc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3428 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5fc0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3429 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5fc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [342a 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5fc0 principal evaluation fails +peer0.org2.example.com | [342b 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e5fc0 gate 1598907125982513500 evaluation fails +peer0.org2.example.com | [342c 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [342d 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [342e 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [342f 08-31 20:52:05.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e2530 gate 1598907125988550400 evaluation starts +peer0.org2.example.com | [3430 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e2530 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3431 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e2530 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3432 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e2530 principal matched by identity 0 +peer0.org2.example.com | [3433 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org2.example.com | [3434 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org2.example.com | [3435 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e2530 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3436 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e2530 gate 1598907125988550400 evaluation succeeds +peer0.org2.example.com | [3437 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3438 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3439 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [343a 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [343b 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [343c 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [343d 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [343e 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [343f 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3440 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [3441 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3443 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3444 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3445 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3442 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3446 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3447 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3448 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [344a 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [344b 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer0.org2.example.com | [344c 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3450 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3449 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [344d 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3451 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3452 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [344e 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3453 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3454 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [344f 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [3455 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3457 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3458 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3459 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [345a 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [345b 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [345c 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e3f60 gate 1598907126167668300 evaluation starts +peer0.org2.example.com | [345d 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e3f60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [345e 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e3f60 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [345f 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e3f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3460 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e3f60 principal evaluation fails +peer0.org2.example.com | [3461 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e3f60 gate 1598907126167668300 evaluation fails +peer0.org2.example.com | [3462 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3463 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3464 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3465 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034584d0 gate 1598907126169797200 evaluation starts +peer0.org2.example.com | [3466 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034584d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3467 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034584d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3468 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034584d0 principal matched by identity 0 +peer0.org2.example.com | [3469 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org2.example.com | [346a 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org2.example.com | [346b 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034584d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [346c 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034584d0 gate 1598907126169797200 evaluation succeeds +peer0.org2.example.com | [346d 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [346e 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [346f 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3470 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3471 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3472 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3473 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3474 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3475 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3476 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3456 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3477 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3478 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3479 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034596d0 gate 1598907126177994100 evaluation starts +peer0.org2.example.com | [347a 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034596d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [347b 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034596d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [347c 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034596d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [347d 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034596d0 principal evaluation fails +peer0.org2.example.com | [347e 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034596d0 gate 1598907126177994100 evaluation fails +peer0.org2.example.com | [347f 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3480 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3481 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3482 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003459c50 gate 1598907126179866400 evaluation starts +peer0.org2.example.com | [3483 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003459c50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3484 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003459c50 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3485 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003459c50 principal matched by identity 0 +peer0.org2.example.com | [3486 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [3487 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org2.example.com | [3488 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003459c50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3489 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003459c50 gate 1598907126179866400 evaluation succeeds +peer0.org2.example.com | [348a 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [348b 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [348c 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [348d 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [348e 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org2.example.com | [348f 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org2.example.com | [3490 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3491 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3492 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3493 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3494 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3495 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aae40 gate 1598907126188129300 evaluation starts +peer0.org2.example.com | [3496 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aae40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3497 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aae40 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3498 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aae40 principal matched by identity 0 +peer0.org2.example.com | [3499 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org2.example.com | [349a 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org2.example.com | [349b 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aae40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [349c 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032aae40 gate 1598907126188129300 evaluation succeeds +peer0.org2.example.com | [349d 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [349e 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [349f 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [34a0 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [34a1 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org2.example.com | [34a2 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org1.example.com | [2e08 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e09 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer0.org1.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer0.org1.example.com | [2e0a 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer0.org1.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer0.org1.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer0.org1.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer0.org1.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer0.org1.example.com | [2e0b 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e0c 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e0d 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer0.org1.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer0.org1.example.com | [2e0e 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer0.org1.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer0.org1.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer0.org1.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer0.org1.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer0.org1.example.com | [2e0f 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e10 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e11 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e12 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer0.org1.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer0.org1.example.com | [2e13 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer0.org1.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer0.org1.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer0.org1.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer0.org1.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer0.org1.example.com | [2e14 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e15 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e16 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e17 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e18 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [2e19 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e1a 08-31 20:52:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e1b 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2e1c 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e1d 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e1e 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e1f 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e20 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e21 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e22 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e23 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2e24 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2e25 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2e26 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2e27 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2e28 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2e29 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035da4d0 gate 1598907122177582900 evaluation starts +peer0.org1.example.com | [2e2a 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035da4d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2e2b 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035da4d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2e2c 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035da4d0 principal matched by identity 0 +peer0.org1.example.com | [2e2d 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer0.org1.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer0.org1.example.com | [2e2e 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer0.org1.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer0.org1.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer0.org1.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer0.org1.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer0.org1.example.com | [2e2f 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035da4d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2e30 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035da4d0 gate 1598907122177582900 evaluation succeeds +peer0.org1.example.com | [2e31 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e32 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e33 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2e34 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2e35 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e36 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e37 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e38 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2e39 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34a3 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [34a4 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [34a5 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34a6 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34a7 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34a8 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [34a9 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34aa 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34ab 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [34ac 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [34ad 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [34ae 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003206b40 gate 1598907126194023600 evaluation starts +peer0.org2.example.com | [34af 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003206b40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [34b0 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003206b40 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [30f1 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [30f2 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f7e50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [30f3 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032f7e50 gate 1598907133938335200 evaluation succeeds +peer1.org1.example.com | [30f4 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [30f5 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [30f6 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [30f7 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [30f8 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org1.example.com | [30f9 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org1.example.com | [30fa 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org1.example.com | [30fb 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org1.example.com | [30fc 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30fd 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [30fe 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [30ff 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3100 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3101 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3102 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3103 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3104 08-31 20:52:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003327e30 gate 1598907133940004200 evaluation starts +peer1.org1.example.com | [3105 08-31 20:52:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003327e30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3106 08-31 20:52:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003327e30 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3107 08-31 20:52:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003327e30 principal matched by identity 0 +peer1.org1.example.com | [3108 08-31 20:52:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org1.example.com | [3109 08-31 20:52:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org1.example.com | [310a 08-31 20:52:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003327e30 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [310b 08-31 20:52:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003327e30 gate 1598907133940004200 evaluation succeeds +peer0.org1.example.com | [2e3a 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2e3b 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2e3c 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2e3d 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2e3e 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2e3f 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2e40 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff9f80 gate 1598907122191165100 evaluation starts +peer0.org1.example.com | [2e41 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff9f80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2e42 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff9f80 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2e43 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff9f80 principal matched by identity 0 +peer0.org1.example.com | [2e44 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer0.org1.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer0.org1.example.com | [2e45 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer0.org1.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer0.org1.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer0.org1.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer0.org1.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer0.org1.example.com | [2e46 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff9f80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2e47 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff9f80 gate 1598907122191165100 evaluation succeeds +peer0.org1.example.com | [2e48 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e49 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2e4a 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2e4b 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2e4c 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2e4d 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2e4e 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2e4f 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2e50 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [2e51 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2e52 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [2e53 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f0b90 gate 1598907122417833300 evaluation starts +peer0.org1.example.com | [2e54 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f0b90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2e55 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f0b90 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2e56 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f0b90 principal matched by identity 0 +peer0.org1.example.com | [2e57 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 57 82 7c 99 56 4d b0 0d 98 c4 b7 3a 1b 64 2e |\W.|.VM.....:.d.| +peer0.org1.example.com | 00000010 95 f3 97 e3 ee 1e f0 5e e5 b8 b8 71 94 6c a7 5f |.......^...q.l._| +peer0.org1.example.com | [2e58 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e 87 15 e0 00 30 28 5e ff 32 4b d1 |0D. ^....0(^.2K.| +peer0.org1.example.com | 00000010 94 29 83 39 a6 b4 28 0d f1 a3 52 1f ce 3a cb a0 |.).9..(...R..:..| +peer0.org1.example.com | 00000020 77 98 25 ec 02 20 1c 42 af 3d d4 28 56 75 01 b9 |w.%.. .B.=.(Vu..| +peer0.org1.example.com | 00000030 2a 07 1b 15 77 67 97 e5 81 ad a6 52 66 12 72 36 |*...wg.....Rf.r6| +peer0.org1.example.com | 00000040 aa c0 42 33 fb 79 |..B3.y| +peer0.org1.example.com | [2e59 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f0b90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2e5a 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f0b90 gate 1598907122417833300 evaluation succeeds +peer0.org1.example.com | [2e5b 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [2e5c 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [2e5d 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [2e5e 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [2e5f 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer0.org1.example.com | [2e60 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +peer0.org1.example.com | [2e61 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [2e63 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [4], peers number [3] +peer0.org1.example.com | [2e62 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +peer0.org1.example.com | [2e64 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +peer0.org1.example.com | [2e65 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +peer0.org1.example.com | [2e66 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +peer0.org1.example.com | [2e67 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +peer0.org1.example.com | [2e68 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org2.example.com | [35b1 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [35b2 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [35b3 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [35b4 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [35b5 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [35b6 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [35b7 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555d60 gate 1598907133320140900 evaluation starts +peer1.org2.example.com | [35b8 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555d60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [35b9 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555d60 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [35ba 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [35bb 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555d60 principal evaluation fails +peer1.org2.example.com | [35bc 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003555d60 gate 1598907133320140900 evaluation fails +peer1.org2.example.com | [35bd 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [35be 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [35bf 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [35c0 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035102e0 gate 1598907133320560300 evaluation starts +peer1.org2.example.com | [35c1 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035102e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [35c2 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035102e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [35c3 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035102e0 principal matched by identity 0 +peer1.org2.example.com | [35c4 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 27 bc e0 21 ac 9f 49 12 2b cb f7 70 85 98 71 |W'..!..I.+..p..q| +peer1.org2.example.com | 00000010 12 35 bd 3c 32 7c cc 4a 6e f0 0a dc c2 0c e9 e6 |.5.<2|.Jn.......| +peer1.org2.example.com | [35c5 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 21 fc 14 f8 3c 39 da 81 0f b6 |0E.!..!...<9....| +peer1.org2.example.com | 00000010 17 d5 a3 68 c7 e5 c4 03 fc 86 a5 b4 ec f8 54 d2 |...h..........T.| +peer1.org2.example.com | 00000020 d2 86 34 73 52 02 20 77 42 50 c8 3e 6b ff f9 75 |..4sR. wBP.>k..u| +peer1.org2.example.com | 00000030 a4 4b 8d 4f a8 db 54 d3 dd d3 bf 5c 87 26 8d 67 |.K.O..T....\.&.g| +peer1.org2.example.com | 00000040 01 c0 b7 05 c0 2a a2 |.....*.| +peer1.org2.example.com | [35c6 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035102e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [35c7 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035102e0 gate 1598907133320560300 evaluation succeeds +peer1.org2.example.com | [35c8 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [35c9 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [35ca 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [35cb 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [35cc 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [35cd 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [35ce 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [2e69 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00008a5c0 env 0xc00377c960 txn 0 +peer0.org1.example.com | [2e6a 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc00377c960 +peer0.org1.example.com | [2e6b 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\360\305\265\372\005\020\214\243\205\302\001\"\017businesschannel*@a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\027\010\177\221psw\030\236\237*T\302`\367\254+Q\2323-$v\360" +peer0.org1.example.com | [2e6c 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2e6d 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2e6e 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2e6f 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [2e70 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2e71 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 36 4f 61 9a cb be 2c 0e 7c f3 d3 0a ae 63 b0 |.6Oa...,.|....c.| +peer0.org1.example.com | 00000010 cb df 45 66 c7 92 ad 14 79 e7 5b 4f 81 2e ae 1c |..Ef....y.[O....| +peer0.org1.example.com | [2e72 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b 6a 46 c8 38 65 ff 3e 84 0d 72 0a |0D. +jF.8e.>..r.| +peer0.org1.example.com | 00000010 1b 71 b6 da 55 29 15 fa 20 ed 85 cd e5 54 13 8e |.q..U).. ....T..| +peer0.org1.example.com | 00000020 73 d7 49 c1 02 20 55 36 0c 7d d4 d5 f6 0a a0 75 |s.I.. U6.}.....u| +peer0.org1.example.com | 00000030 26 3b e5 cd d5 60 48 c1 e0 09 21 1b f6 c1 c2 bb |&;...`H...!.....| +peer0.org1.example.com | 00000040 35 e0 49 3f d9 2c |5.I?.,| +peer0.org1.example.com | [2e73 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2e74 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0027b4000, header channel_header:"\010\003\032\014\010\360\305\265\372\005\020\214\243\205\302\001\"\017businesschannel*@a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\027\010\177\221psw\030\236\237*T\302`\367\254+Q\2323-$v\360" +peer0.org1.example.com | [2e75 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org1.example.com | [2e76 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org1.example.com | [2e77 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [2e78 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [2e79 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] +peer0.org1.example.com | [2e7a 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org1.example.com | [2e7b 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc003620000 +peer0.org1.example.com | [2e7c 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [7df37376-30d2-463b-a4a0-d09fea2bb220] +peer0.org1.example.com | [2e7d 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2e7e 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [7df37376-30d2-463b-a4a0-d09fea2bb220] +peer0.org1.example.com | [2e7f 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +peer0.org1.example.com | [2e80 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [73a41de1-5241-456b-8560-d7800c2a4c1b] +peer0.org1.example.com | [2e81 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [73a41de1-5241-456b-8560-d7800c2a4c1b] +peer0.org1.example.com | [2e82 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361c240 gate 1598907122433131900 evaluation starts +peer0.org1.example.com | [2e83 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361c240 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2e84 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361c240 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2e85 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361c240 principal matched by identity 0 +peer0.org1.example.com | [2e86 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c d1 4f 8e 83 45 bc 08 e9 72 bf 23 62 2d 37 ed |..O..E...r.#b-7.| +peer0.org1.example.com | 00000010 c8 e0 4d 7a a2 57 f9 4d 8a ba ef 95 bb 58 8c 53 |..Mz.W.M.....X.S| +peer0.org1.example.com | [2e87 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 06 0c 41 8e ee ef 15 ef 93 13 |0E.!....A.......| +peer0.org1.example.com | 00000010 7c 65 7d 52 64 ed d7 c8 0e 65 27 49 00 5b 7d 28 ||e}Rd....e'I.[}(| +peer0.org1.example.com | 00000020 0e f5 f9 19 61 02 20 40 2b bc 92 d7 d4 6d cf c9 |....a. @+....m..| +peer0.org1.example.com | 00000030 d6 0e 22 a0 7e f6 ca 0f b1 46 b6 f5 ff a4 df 94 |..".~....F......| +peer0.org1.example.com | 00000040 74 af d9 d4 da 20 6d |t.... m| +peer0.org1.example.com | [2e88 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361c240 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2e89 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361c240 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [2e8a 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361c240 skipping identity 0 because it has already been used +peer0.org1.example.com | [2e8b 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361c240 principal evaluation fails +peer0.org2.example.com | [34b1 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003206b40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [34b2 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003206b40 principal evaluation fails +peer0.org2.example.com | [34b3 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003206b40 gate 1598907126194023600 evaluation fails +peer0.org2.example.com | [34b4 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [34b5 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [34b6 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [34b7 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032070b0 gate 1598907126195483100 evaluation starts +peer0.org2.example.com | [34b8 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032070b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [34b9 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032070b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [34ba 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032070b0 principal matched by identity 0 +peer0.org2.example.com | [34bb 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [34bc 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org2.example.com | [34bd 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032070b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [34be 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032070b0 gate 1598907126195483100 evaluation succeeds +peer0.org2.example.com | [34bf 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [34c0 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [34c1 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [34c2 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [34c3 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34c4 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34c5 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [34c6 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34c7 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34c8 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [34c9 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [34ca 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [34cb 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ec2c0 gate 1598907126199602600 evaluation starts +peer0.org2.example.com | [34cc 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ec2c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [34cd 08-31 20:52:06.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ec2c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [34ce 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ec2c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [34cf 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ec2c0 principal evaluation fails +peer0.org2.example.com | [34d0 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ec2c0 gate 1598907126199602600 evaluation fails +peer0.org2.example.com | [34d1 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [34d2 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [34d3 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [34d4 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ec830 gate 1598907126201178500 evaluation starts +peer0.org2.example.com | [34d5 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ec830 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [310c 08-31 20:52:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [310d 08-31 20:52:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [310e 08-31 20:52:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [310f 08-31 20:52:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3110 08-31 20:52:13.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3111 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3112 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3113 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [3114 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3115 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3116 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3117 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [3118 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3119 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [311a 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [311b 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org1.example.com | [311c 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [311d 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [311e 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [311f 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3120 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3121 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3122 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3123 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3124 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3125 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3126 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3127 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3128 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3129 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [312a 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [312b 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [312c 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34d6 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ec830 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [34d7 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ec830 principal matched by identity 0 +peer0.org2.example.com | [34d8 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org2.example.com | [34d9 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org2.example.com | [34da 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ec830 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [34db 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031ec830 gate 1598907126201178500 evaluation succeeds +peer0.org2.example.com | [34dc 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [34dd 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [34de 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [34df 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [34e0 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org2.example.com | [34e1 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org2.example.com | [34e2 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org2.example.com | [34e3 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org2.example.com | [34e4 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [34e5 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [34e6 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer0.org2.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer0.org2.example.com | [34e7 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer0.org2.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer0.org2.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer0.org2.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer0.org2.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer0.org2.example.com | [34e8 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org2.example.com | [34e9 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org2.example.com | [34ea 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34eb 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [34ec 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2e8c 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361c240 gate 1598907122433131900 evaluation succeeds +peer0.org1.example.com | [2e8d 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [6446b274-e342-494b-b809-c3bd2fe87b51] +peer0.org1.example.com | [2e8e 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [6446b274-e342-494b-b809-c3bd2fe87b51] +peer0.org1.example.com | [2e8f 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +peer0.org1.example.com | [2e90 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d appears to be valid +peer0.org1.example.com | [2e91 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc003620000 +peer0.org1.example.com | [2e92 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00008a5c0 env 0xc00377c960 txn 0 +peer0.org1.example.com | [2e93 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [2e94 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 12ms +peer0.org1.example.com | [2e95 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [2e96 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [2e97 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +peer0.org1.example.com | [2e98 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [2e99 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [2e9a 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [2e9b 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +peer0.org1.example.com | [2e9c 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [2e9d 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org1.example.com | [2e9e 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [2e9f 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [2ea0 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org1.example.com | [2ea1 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [2ea2 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2ea3 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [2ea4 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] marked as valid by state validator +peer0.org1.example.com | [2ea5 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00028ac80), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00028acc0)} +peer0.org1.example.com | [2ea6 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [2ea7 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [2ea8 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [2ea9 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +peer0.org1.example.com | [2eaa 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +peer0.org1.example.com | [2eab 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +peer0.org1.example.com | [2eac 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4021 bytes, seq: 4}, Envelope: 4051 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [2ead 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +peer0.org1.example.com | [2eae 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2eaf 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2eb0 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2eb1 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2eb2 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4021 bytes, seq: 4}, Envelope: 4051 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2eb3 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2eb7 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2eb4 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +peer0.org1.example.com | [2eb5 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2eb8 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2eb9 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [2eba 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ebb 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ebc 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ebd 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [312d 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [312e 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [312f 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3130 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3131 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3132 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3133 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00336d3c0 gate 1598907135034980500 evaluation starts +peer1.org1.example.com | [3134 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00336d3c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3135 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00336d3c0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3136 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00336d3c0 principal matched by identity 0 +peer1.org1.example.com | [3137 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff e3 09 84 f3 a2 0e a4 c9 6b 29 4a 9f a6 d7 c1 |.........k)J....| +peer1.org1.example.com | 00000010 fa 43 9a e5 c6 d1 66 47 34 7a 48 71 77 43 83 82 |.C....fG4zHqwC..| +peer1.org1.example.com | [3138 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 52 c6 39 30 34 23 76 dd 90 6f |0E.!..R.904#v..o| +peer1.org1.example.com | 00000010 99 a9 38 4b b8 01 c0 e2 7c ee 8e fe 2f ae e6 88 |..8K....|.../...| +peer1.org1.example.com | 00000020 bf f2 6b 81 92 02 20 67 41 a5 91 f2 38 4f ff a8 |..k... gA...8O..| +peer1.org1.example.com | 00000030 0e 43 54 c3 54 b0 67 20 0f b4 88 85 19 54 62 6b |.CT.T.g .....Tbk| +peer1.org1.example.com | 00000040 f8 18 2b cc 12 b9 6d |..+...m| +peer1.org1.example.com | [3139 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00336d3c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [313a 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00336d3c0 gate 1598907135034980500 evaluation succeeds +peer1.org1.example.com | [313b 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [313c 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [313d 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [313e 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [313f 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3140 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3141 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3142 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3143 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3144 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3145 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3146 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3147 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3148 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3149 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [314a 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [314b 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [314c 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [314d 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [314e 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [314f 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3150 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3151 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3152 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3153 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3154 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3155 08-31 20:52:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3156 08-31 20:52:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3157 08-31 20:52:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3158 08-31 20:52:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3159 08-31 20:52:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [315a 08-31 20:52:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [315b 08-31 20:52:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [315c 08-31 20:52:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [315d 08-31 20:52:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [315e 08-31 20:52:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [315f 08-31 20:52:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3160 08-31 20:52:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161036 +peer1.org1.example.com | [3161 08-31 20:52:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EA227DA875EB640CE8BF3B87B4871663C4ABA784582BF55F87741C13C01A2221 +peer1.org1.example.com | [3162 08-31 20:52:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3163 08-31 20:52:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3164 08-31 20:52:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3165 08-31 20:52:15.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [3166 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3167 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3168 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3169 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [316a 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [316b 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [316c 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [316d 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [316e 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [316f 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3170 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3171 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3172 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3173 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3174 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3175 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3176 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2ebe 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [2ebf 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ec0 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [2ec1 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ec2 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2ec3 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [2ec4 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2ec5 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [2ec6 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367ced0 gate 1598907122455302300 evaluation starts +peer0.org1.example.com | [2ec7 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367ced0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2ec8 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367ced0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2ec9 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367ced0 principal matched by identity 0 +peer0.org1.example.com | [2eca 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +peer0.org1.example.com | 00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +peer0.org1.example.com | [2ecb 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +peer0.org1.example.com | 00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +peer0.org1.example.com | 00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +peer0.org1.example.com | 00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +peer0.org1.example.com | 00000040 95 10 dc 3c 55 b0 |... DEBU 0xc00367ced0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2ecd 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367ced0 gate 1598907122455302300 evaluation succeeds +peer0.org1.example.com | [2ece 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2ecf 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [2ed0 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [2ed1 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [2ed2 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2ed3 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2eb6 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4021 bytes, seq: 4}, Envelope: 4051 bytes, Signature: 0 bytes +peer0.org1.example.com | [2ed4 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ed5 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0x81, 0x47, 0x7e, 0x41, 0x1c, 0xad, 0xf5, 0x8b, 0x36, 0x32, 0x94, 0x83, 0x50, 0xc2, 0x29, 0x32, 0xda, 0xd5, 0xc, 0x74, 0xc8, 0x4a, 0xac, 0xd3, 0xc3, 0x82, 0x1e, 0x87, 0x25, 0x9, 0x5, 0x17} txOffsets= +peer0.org1.example.com | txId=a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d locPointer=offset=70, bytesLength=2981 +peer0.org1.example.com | ] +peer0.org1.example.com | [2ed6 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89532, bytesLength=2981] for tx ID: [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] to txid-index +peer0.org1.example.com | [2ed7 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89532, bytesLength=2981] for tx number:[0] ID: [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] to blockNumTranNum index +peer0.org1.example.com | [2ed8 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93505], isChainEmpty=[false], lastBlockNumber=[4] +peer0.org1.example.com | [2ed9 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +peer0.org1.example.com | [2eda 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +peer0.org1.example.com | [2edb 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +peer0.org1.example.com | [2edc 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [2edd 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [34ed 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34ee 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [34ef 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [34f0 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [34f1 08-31 20:52:06.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [34f2 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c37c0 gate 1598907126210015500 evaluation starts +peer0.org2.example.com | [34f3 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c37c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [34f4 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c37c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [34f5 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c37c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [34f6 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c37c0 principal evaluation fails +peer0.org2.example.com | [34f7 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c37c0 gate 1598907126210015500 evaluation fails +peer0.org2.example.com | [34f8 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [34f9 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [34fa 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [34fb 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c3d30 gate 1598907126211546000 evaluation starts +peer0.org2.example.com | [34fc 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c3d30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [34fd 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c3d30 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [34fe 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c3d30 principal matched by identity 0 +peer0.org2.example.com | [34ff 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [3500 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org2.example.com | [3501 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c3d30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3502 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031c3d30 gate 1598907126211546000 evaluation succeeds +peer0.org2.example.com | [3503 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3504 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3505 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3506 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3507 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3508 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3509 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [350a 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [350b 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [350c 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [350d 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [350e 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [350f 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319cf40 gate 1598907126215491600 evaluation starts +peer0.org2.example.com | [3510 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319cf40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3511 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319cf40 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3512 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319cf40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3513 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319cf40 principal evaluation fails +peer0.org2.example.com | [3514 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319cf40 gate 1598907126215491600 evaluation fails +peer0.org2.example.com | [3515 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3516 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3517 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3518 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319d4b0 gate 1598907126219311700 evaluation starts +peer0.org2.example.com | [3519 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319d4b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [351a 08-31 20:52:06.21 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319d4b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [351b 08-31 20:52:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319d4b0 principal matched by identity 0 +peer0.org2.example.com | [351c 08-31 20:52:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org2.example.com | [351d 08-31 20:52:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org2.example.com | [351e 08-31 20:52:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319d4b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [351f 08-31 20:52:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00319d4b0 gate 1598907126219311700 evaluation succeeds +peer0.org2.example.com | [3520 08-31 20:52:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3521 08-31 20:52:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3522 08-31 20:52:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3523 08-31 20:52:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3524 08-31 20:52:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3525 08-31 20:52:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3526 08-31 20:52:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3527 08-31 20:52:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3528 08-31 20:52:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3529 08-31 20:52:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [352a 08-31 20:52:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [352b 08-31 20:52:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [352c 08-31 20:52:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [352d 08-31 20:52:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org2.example.com | [352e 08-31 20:52:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org2.example.com | [352f 08-31 20:52:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3530 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3531 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3532 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3533 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3534 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3535 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org2.example.com | [3536 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org2.example.com | [3537 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35cf 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [35d0 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [35d1 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35d2 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35d3 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35d4 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [35d5 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35d6 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35d7 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [35d8 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [35d9 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" > alive: +peer1.org2.example.com | [35da 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [35db 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35dc 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [35dd 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [35de 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [35df 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [35e0 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35e1 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [35e2 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [35e3 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35e4 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [3177 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3178 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3179 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [317a 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [317b 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [317c 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [317d 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [317e 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [317f 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ec100 gate 1598907135439373100 evaluation starts +peer1.org1.example.com | [3180 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ec100 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3181 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ec100 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3182 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ec100 principal matched by identity 0 +peer1.org1.example.com | [3183 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af b2 10 8a be 07 43 03 c5 53 59 74 3f 2b 84 bb |......C..SYt?+..| +peer1.org1.example.com | 00000010 eb 3f 1d 1e b1 3f 26 f7 1a 82 b3 69 0b 46 e5 11 |.?...?&....i.F..| +peer1.org1.example.com | [3184 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 84 cf 51 90 23 91 bd dc ab 79 |0E.!....Q.#....y| +peer1.org1.example.com | 00000010 3b 5d 3b e1 35 2f 28 9c 70 66 78 b3 34 c7 bc 50 |;];.5/(.pfx.4..P| +peer1.org1.example.com | 00000020 92 b4 0e 1b 03 02 20 58 37 d4 56 13 28 d1 3a 50 |...... X7.V.(.:P| +peer1.org1.example.com | 00000030 c6 d3 a3 6b 9a 18 12 c5 ae a9 af 46 7d e5 30 bc |...k.......F}.0.| +peer1.org1.example.com | 00000040 48 dc 90 2d 63 89 92 |H..-c..| +peer1.org1.example.com | [3185 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ec100 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3186 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033ec100 gate 1598907135439373100 evaluation succeeds +peer1.org1.example.com | [3187 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3188 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3189 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [318a 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [318b 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [318c 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [318d 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [318e 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [318f 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3190 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3191 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3192 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2ede 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [2edf 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [2ee0 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org1.example.com | [2ee1 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org1.example.com | [2ee2 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [2ee3 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +peer0.org1.example.com | [2ee4 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +peer0.org1.example.com | [2ee5 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +peer0.org1.example.com | [2ee6 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [2ee7 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +peer0.org1.example.com | [2ee8 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +peer0.org1.example.com | [2ee9 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +peer0.org1.example.com | [2eea 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 45ms (state_validation=11ms block_and_pvtdata_commit=26ms state_commit=1ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +peer0.org1.example.com | [2eeb 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2eec 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8CFEFBEF6AF9D9816...08051A0C0A0565787030321203312E30 +peer0.org1.example.com | [2eed 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9A455C5AC52AD928C03D2B2270BCA0C688A58CAA9C1CF476A9543DD6C6F40F3B +peer0.org1.example.com | [2eee 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +peer0.org1.example.com | [2eef 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36854 +peer0.org1.example.com | [2ef0 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0037b1770 +peer0.org1.example.com | [2ef1 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2ef2 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2ef3 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2ef4 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org1.example.com | [2ef5 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2ef6 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 00 4a 92 0f 3b 99 04 39 d3 52 52 ac b5 1c f9 b4 |.J..;..9.RR.....| +peer0.org1.example.com | 00000010 5c 65 2c 8f 13 c4 3b 35 39 5c 57 60 e3 51 fd 56 |\e,...;59\W`.Q.V| +peer0.org1.example.com | [2ef7 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 38 e7 4f b7 38 4d af df 4c 30 |0E.!..8.O.8M..L0| +peer0.org1.example.com | 00000010 65 6b 43 e1 97 13 00 76 43 4e 99 51 b6 2c 08 80 |ekC....vCN.Q.,..| +peer0.org1.example.com | 00000020 a2 84 2e f8 59 02 20 0a 2c be c4 e3 2f b1 b0 7c |....Y. .,.../..|| +peer0.org1.example.com | 00000030 7e f1 26 b5 29 69 19 7b a6 4b ea 4f c5 95 ad df |~.&.)i.{.K.O....| +peer0.org1.example.com | 00000040 6b 73 fa e1 5f 37 4d |ks.._7M| +peer0.org1.example.com | [2ef8 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2ef9 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0037a70a0, header 0xc0037b1bd0 +peer0.org1.example.com | [2efa 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [2efb 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][02b91c03] processing txid: 02b91c03172fe63e56e1288d76718ecf9ba4eec41aea754c7016d98bbeb227b1 +peer0.org1.example.com | [2efc 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [02b91c03172fe63e56e1288d76718ecf9ba4eec41aea754c7016d98bbeb227b1] +peer0.org1.example.com | [2efd 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [2efe 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [2eff 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [2f00 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2f01 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer0.org1.example.com | [2f02 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e6bf0 gate 1598907122791757400 evaluation starts +peer0.org1.example.com | [2f03 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e6bf0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2f04 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e6bf0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2f05 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e6bf0 principal matched by identity 0 +peer0.org1.example.com | [2f06 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 00 4a 92 0f 3b 99 04 39 d3 52 52 ac b5 1c f9 b4 |.J..;..9.RR.....| +peer0.org1.example.com | 00000010 5c 65 2c 8f 13 c4 3b 35 39 5c 57 60 e3 51 fd 56 |\e,...;59\W`.Q.V| +peer0.org1.example.com | [2f07 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 38 e7 4f b7 38 4d af df 4c 30 |0E.!..8.O.8M..L0| +peer0.org1.example.com | 00000010 65 6b 43 e1 97 13 00 76 43 4e 99 51 b6 2c 08 80 |ekC....vCN.Q.,..| +peer0.org1.example.com | 00000020 a2 84 2e f8 59 02 20 0a 2c be c4 e3 2f b1 b0 7c |....Y. .,.../..|| +peer0.org1.example.com | 00000030 7e f1 26 b5 29 69 19 7b a6 4b ea 4f c5 95 ad df |~.&.)i.{.K.O....| +peer0.org1.example.com | 00000040 6b 73 fa e1 5f 37 4d |ks.._7M| +peer0.org1.example.com | [2f08 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e6bf0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2f09 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e6bf0 gate 1598907122791757400 evaluation succeeds +peer0.org1.example.com | [2f0a 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [2f0b 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [2f0c 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [2f0d 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [2f0e 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2f0f 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [02b91c03172fe63e56e1288d76718ecf9ba4eec41aea754c7016d98bbeb227b1] +peer0.org1.example.com | [2f10 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][02b91c03] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2f11 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2f12 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [2f13 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][02b91c03] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2f14 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2f15 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [02b91c03] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [2f16 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [02b91c03] handling GET_STATE from chaincode +peer0.org1.example.com | [2f17 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [02b91c03] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [2f18 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [2f19 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [02b91c03] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [2f1a 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [02b91c03] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2f1b 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [02b91c03] notifying Txid:02b91c03172fe63e56e1288d76718ecf9ba4eec41aea754c7016d98bbeb227b1, channelID:businesschannel +peer0.org1.example.com | [2f1c 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2f1d 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][02b91c03] Exit chaincode: name:"exp02" (4ms) +peer0.org1.example.com | [2f1e 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2f1f 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [02b91c03172fe63e56e1288d76718ecf9ba4eec41aea754c7016d98bbeb227b1] +peer0.org1.example.com | [2f20 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][02b91c03] Exit +peer0.org1.example.com | [2f21 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][02b91c03] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2f22 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][02b91c03] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [2f23 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 02b91c03172fe63e56e1288d76718ecf9ba4eec41aea754c7016d98bbeb227b1, chaincode: exp02} +peer0.org1.example.com | [2f24 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2077CFDCB4A217656ACA5FB1D076D7...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2f25 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 610CD9C979F56373765FD2D000B3F6B19BC7FE80CF1259B69740F180C639B289 +peer0.org1.example.com | [2f26 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 02b91c03172fe63e56e1288d76718ecf9ba4eec41aea754c7016d98bbeb227b1, chaincode: exp02} +peer0.org1.example.com | [2f27 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][02b91c03] Exit +peer0.org1.example.com | [2f28 08-31 20:52:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [02b91c03172fe63e56e1288d76718ecf9ba4eec41aea754c7016d98bbeb227b1] +peer0.org1.example.com | [2f29 08-31 20:52:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36854 +peer0.org1.example.com | [2f2a 08-31 20:52:02.80 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36854 grpc.code=OK grpc.call_duration=10.07ms +peer0.org1.example.com | [2f2b 08-31 20:52:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2f2c 08-31 20:52:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2f2d 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36858 +peer0.org1.example.com | [2f2e 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00386a6e0 +peer0.org1.example.com | [2f2f 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2f30 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2f31 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2f32 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org1.example.com | [2f33 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2f34 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 95 68 f4 10 aa 39 3b c0 45 a2 77 fc 48 07 c0 |..h...9;.E.w.H..| +peer0.org1.example.com | 00000010 27 dd 80 a8 7b d8 97 fe 57 75 75 fb 80 e0 00 c5 |'...{...Wuu.....| +peer0.org1.example.com | [2f35 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 c4 62 13 e0 41 08 2b 43 20 24 |0E.!...b..A.+C $| +peer0.org1.example.com | 00000010 dc 1d 14 27 cc 1a 85 a4 d1 0c c5 b8 ed 87 26 29 |...'..........&)| +peer0.org1.example.com | 00000020 25 79 05 11 91 02 20 4f 7e 4d 18 cf 00 1c 8e c3 |%y.... O~M......| +peer0.org1.example.com | 00000030 74 47 56 98 4d bb 99 95 87 ac 69 dc f1 a9 99 0d |tGV.M.....i.....| +peer0.org1.example.com | 00000040 50 8c 85 01 1e 53 63 |P....Sc| +peer0.org1.example.com | [2f36 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2f37 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0035185b0, header 0xc00386ab90 +peer0.org1.example.com | [2f38 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [2f39 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ba76c229] processing txid: ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b +peer0.org1.example.com | [2f3a 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] +peer0.org1.example.com | [2f3b 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [2f3c 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [2f3d 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [2f3e 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2f3f 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer0.org1.example.com | [2f40 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003730a90 gate 1598907122959737000 evaluation starts +peer0.org1.example.com | [2f41 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003730a90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2f42 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003730a90 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2f43 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003730a90 principal matched by identity 0 +peer0.org1.example.com | [2f44 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 95 68 f4 10 aa 39 3b c0 45 a2 77 fc 48 07 c0 |..h...9;.E.w.H..| +peer0.org1.example.com | 00000010 27 dd 80 a8 7b d8 97 fe 57 75 75 fb 80 e0 00 c5 |'...{...Wuu.....| +peer0.org1.example.com | [2f45 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 c4 62 13 e0 41 08 2b 43 20 24 |0E.!...b..A.+C $| +peer0.org2.example.com | [3538 08-31 20:52:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [35e5 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3193 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 dc 1d 14 27 cc 1a 85 a4 d1 0c c5 b8 ed 87 26 29 |...'..........&)| +peer0.org2.example.com | [3539 08-31 20:52:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [35e6 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 64 7e f1 14 ff 7a d5 17 09 62 b0 ee a6 f3 26 |.d~...z...b....&| +peer1.org1.example.com | [3194 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 25 79 05 11 91 02 20 4f 7e 4d 18 cf 00 1c 8e c3 |%y.... O~M......| +peer0.org2.example.com | [353a 08-31 20:52:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 5 1] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org2.example.com | 00000010 76 71 60 f0 e6 6e 2f 81 71 8a e5 72 12 24 f0 f4 |vq`..n/.q..r.$..| +peer1.org1.example.com | [3195 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000030 74 47 56 98 4d bb 99 95 87 ac 69 dc f1 a9 99 0d |tGV.M.....i.....| +peer0.org2.example.com | [353b 08-31 20:52:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35e7 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ca e1 de ed fe 90 29 a7 dd a3 |0E.!........)...| +peer1.org2.example.com | 00000010 d8 d7 99 68 c9 ea 25 46 b4 e2 f5 4b d1 07 e4 cb |...h..%F...K....| +peer0.org1.example.com | 00000040 50 8c 85 01 1e 53 63 |P....Sc| +peer0.org1.example.com | [2f46 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003730a90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3196 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f47 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003730a90 gate 1598907122959737000 evaluation succeeds +peer1.org2.example.com | 00000020 b1 5c 45 19 cc 02 20 1b de fc ab b1 41 37 4a 60 |.\E... .....A7J`| +peer0.org2.example.com | [353c 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3197 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f48 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +peer1.org2.example.com | 00000030 8e 23 cc fb d9 74 16 25 d0 b0 1b e1 f6 68 7c f6 |.#...t.%.....h|.| +peer1.org2.example.com | 00000040 5f a9 cd 66 bc 1d 77 |_..f..w| +peer0.org2.example.com | [353d 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f49 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [353e 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [3198 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f4a 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org2.example.com | [353f 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3540 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [3541 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f4b 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org2.example.com | [3542 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [35e8 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org1.example.com | [3199 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f4c 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [3543 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [35e9 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 7f cb f1 fa d6 bb 03 d0 34 cf |0E.!..........4.| +peer0.org1.example.com | [2f4d 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] +peer0.org2.example.com | [3544 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 cb 52 a0 a2 f6 de b7 15 19 d2 31 4d 82 0d 79 |..R........1M..y| +peer1.org2.example.com | 00000010 ef 4e 52 1d 8c cf e9 3a fe f5 64 b5 7f 45 de 70 |.NR....:..d..E.p| +peer0.org1.example.com | [2f4e 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ba76c229] Entry chaincode: name:"exp02" +peer1.org1.example.com | [319a 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 99 e7 0c 97 22 b0 e1 d0 79 bf 2d 9f 60 8f 9d cb |...."...y.-.`...| +peer1.org2.example.com | 00000020 74 ae 81 b4 31 02 20 32 32 cb 4c 48 1c 11 02 50 |t...1. 22.LH...P| +peer0.org1.example.com | [2f4f 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [319b 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3545 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 6d df 71 b4 35 38 08 9f e7 a0 |0E.!..m.q.58....| +peer1.org2.example.com | 00000030 f3 e8 b7 5a df 91 c4 cb aa 84 ac 85 12 c5 f4 af |...Z............| +peer0.org1.example.com | [2f50 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer1.org1.example.com | [319c 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 de 81 34 e7 e9 91 39 0b f5 91 c5 d9 cc 09 34 16 |..4...9.......4.| +peer1.org2.example.com | 00000040 e9 b8 d9 f3 7b 69 60 |....{i`| +peer0.org1.example.com | [2f51 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ba76c229] Entry chaincode: name:"exp02" +peer1.org1.example.com | [319d 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000020 c7 cc 75 05 d6 02 20 3b d3 12 d9 a9 6f 2e 45 83 |..u... ;....o.E.| +peer1.org2.example.com | [35ea 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [2f52 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2f53 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer1.org1.example.com | [319e 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | 00000030 75 66 75 c2 b4 c0 85 4e f5 0f 4b 08 00 0f aa 65 |ufu....N..K....e| +peer1.org2.example.com | [35eb 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [2f54 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] handling GET_STATE from chaincode +peer1.org1.example.com | [319f 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 f5 c9 e8 c5 e9 88 8c |.......| +peer1.org1.example.com | [31a0 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [3546 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org1.example.com | [2f55 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [2f56 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer1.org1.example.com | [31a1 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org1.example.com | [2f57 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [2f58 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer1.org2.example.com | [35ec 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3547 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 54 b8 80 f2 8f e3 0a be b8 af |0E.!..T.........| +peer0.org1.example.com | [2f59 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] handling GET_STATE from chaincode +peer1.org2.example.com | [35ed 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [35ee 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [31a2 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f5a 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] getting state for chaincode exp02, key b, channel businesschannel +peer1.org2.example.com | [35ef 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31a3 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000010 9d d4 a3 8e 0a b5 4b 11 67 ca 85 9b a5 d4 25 9d |......K.g.....%.| +peer0.org1.example.com | [2f5b 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer1.org2.example.com | [35f0 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31a4 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000020 e7 8f be 8d 9c 02 20 70 73 4d 32 90 0b 3d 0a 3c |...... psM2..=.<| +peer0.org1.example.com | [2f5c 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [2f5d 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer1.org1.example.com | [31a5 08-31 20:52:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2f5e 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] handling PUT_STATE from chaincode +peer1.org2.example.com | [35f1 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [35f2 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [31a6 08-31 20:52:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2f5f 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] Completed PUT_STATE. Sending RESPONSE +peer1.org2.example.com | [35f3 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31a7 08-31 20:52:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 4c 51 2d 73 ed cd 30 8e c7 32 f8 a4 a6 11 ff 5b |LQ-s..0..2.....[| +peer0.org1.example.com | [2f60 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +peer0.org1.example.com | [2f61 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] handling PUT_STATE from chaincode +peer0.org2.example.com | 00000040 55 ee 7c eb 2a 91 1b |U.|.*..| +peer0.org1.example.com | [2f62 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] Completed PUT_STATE. Sending RESPONSE +peer1.org2.example.com | [35f4 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3548 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [31a8 08-31 20:52:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [2f63 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [35f5 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3549 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [31a9 08-31 20:52:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f64 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] notifying Txid:ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b, channelID:businesschannel +peer1.org2.example.com | [35f6 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [354a 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [31aa 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2f65 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [35f7 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [354b 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [31ab 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2f66 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ba76c229] Exit chaincode: name:"exp02" (6ms) +peer1.org2.example.com | [35f8 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [354c 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [31ac 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f67 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [35f9 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [31ad 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [2f68 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] +peer1.org2.example.com | [35fa 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [354d 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [354e 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f69 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ba76c229] Exit +peer0.org1.example.com | [2f6a 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ba76c229] Entry chaincode: name:"exp02" +peer0.org2.example.com | [354f 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [31ae 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [2f6b 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ba76c229] escc for chaincode name:"exp02" is escc +peer1.org2.example.com | [35fb 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3550 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31af 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 24 c8 49 ef c3 73 d9 c9 24 28 8e 37 d6 83 2f |.$.I..s..$(.7../| +peer0.org1.example.com | [2f6c 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b, chaincode: exp02} +peer1.org1.example.com | 00000010 be 5d dd 53 2d eb f4 14 50 23 24 49 aa bb d2 20 |.].S-...P#$I... | +peer0.org2.example.com | [3551 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2f6d 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A208019E9F420CFC5CE9CDA57A863EB...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [31b0 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 6c a1 89 b1 de fa 74 43 87 1b d8 |0D. {l.....tC...| +peer1.org2.example.com | [35fc 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3552 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [2f6e 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DE467A9A545BD801BE17F9FB54659BC26A2D25202A18AAF1B2E3B947DB8EAB25 +peer1.org1.example.com | 00000010 36 1c 66 60 79 25 8d 80 aa cd ed 43 3c 85 ac 8e |6.f`y%.....C<...| +peer1.org2.example.com | [35fd 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3553 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [2f6f 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b, chaincode: exp02} +peer1.org1.example.com | 00000020 b8 85 b5 36 02 20 3f eb 19 18 80 93 ad 47 5b 06 |...6. ?......G[.| +peer1.org2.example.com | [35fe 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3554 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [2f70 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ba76c229] Exit +peer1.org2.example.com | [35ff 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3555 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f71 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] +peer1.org2.example.com | [3600 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3556 08-31 20:52:09.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2f72 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36858 +peer1.org2.example.com | [3601 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [3557 08-31 20:52:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer1.org1.example.com | 00000030 26 e9 2b b1 65 11 ea b6 c8 8f 06 b3 ba 98 b1 84 |&.+.e...........| +peer0.org1.example.com | [2f73 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36858 grpc.code=OK grpc.call_duration=8.2112ms +peer0.org2.example.com | [3558 08-31 20:52:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer1.org1.example.com | 00000040 fb 5f 3b ca bd 8d |._;...| +peer0.org1.example.com | [2f74 08-31 20:52:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2f75 08-31 20:52:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2f76 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36864 +peer0.org1.example.com | [2f77 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00386bae0 +peer0.org1.example.com | [2f78 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2f79 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2f7a 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2f7b 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [2f7c 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2f7d 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e bd 1e 52 74 1d 6b 73 8d 7e 77 bb 1b 10 4a ec |^..Rt.ks.~w...J.| +peer0.org1.example.com | 00000010 ca 17 01 7f a7 9a f3 48 7b c9 b7 8d 44 94 73 bc |.......H{...D.s.| +peer0.org1.example.com | [2f7e 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 7f 97 8a 6d a5 c4 66 de f6 8e f2 |0D. ....m..f....| +peer0.org1.example.com | 00000010 49 06 23 ea 13 31 b2 6b 59 8a 94 66 c1 23 0f 2e |I.#..1.kY..f.#..| +peer0.org1.example.com | 00000020 71 8f 0e 06 02 20 1d 3b 4e 82 de b7 68 fb b4 28 |q.... .;N...h..(| +peer0.org1.example.com | 00000030 c6 97 05 70 1a 3c c5 1a 46 d0 83 52 e9 a3 20 33 |...p.<..F..R.. 3| +peer0.org1.example.com | 00000040 3e 61 d5 7f 2f fa |>a../.| +peer0.org1.example.com | [2f7f 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2f80 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003518a10, header 0xc00386bef0 +peer0.org1.example.com | [2f81 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [2f82 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3a630a55] processing txid: 3a630a5566e3f31b5e91ed358e9242d8f5ca204320f9fc6d3f9339754aebaa3e +peer0.org1.example.com | [2f83 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [3a630a5566e3f31b5e91ed358e9242d8f5ca204320f9fc6d3f9339754aebaa3e] +peer0.org1.example.com | [2f84 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [2f85 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [2f86 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [2f87 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2f88 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer0.org1.example.com | [2f89 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003771ce0 gate 1598907123158475800 evaluation starts +peer0.org1.example.com | [2f8a 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003771ce0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2f8b 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003771ce0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2f8c 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003771ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [2f8d 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003771ce0 principal evaluation fails +peer0.org1.example.com | [2f8e 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003771ce0 gate 1598907123158475800 evaluation fails +peer0.org1.example.com | [2f8f 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [2f90 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [2f91 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [2f92 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c4250 gate 1598907123160511900 evaluation starts +peer0.org1.example.com | [2f93 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c4250 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2f94 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c4250 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2f95 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c4250 principal matched by identity 0 +peer0.org1.example.com | [2f96 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e bd 1e 52 74 1d 6b 73 8d 7e 77 bb 1b 10 4a ec |^..Rt.ks.~w...J.| +peer0.org1.example.com | 00000010 ca 17 01 7f a7 9a f3 48 7b c9 b7 8d 44 94 73 bc |.......H{...D.s.| +peer0.org1.example.com | [2f97 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 7f 97 8a 6d a5 c4 66 de f6 8e f2 |0D. ....m..f....| +peer0.org1.example.com | 00000010 49 06 23 ea 13 31 b2 6b 59 8a 94 66 c1 23 0f 2e |I.#..1.kY..f.#..| +peer0.org1.example.com | 00000020 71 8f 0e 06 02 20 1d 3b 4e 82 de b7 68 fb b4 28 |q.... .;N...h..(| +peer0.org1.example.com | 00000030 c6 97 05 70 1a 3c c5 1a 46 d0 83 52 e9 a3 20 33 |...p.<..F..R.. 3| +peer0.org1.example.com | 00000040 3e 61 d5 7f 2f fa |>a../.| +peer0.org1.example.com | [2f98 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c4250 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [2f99 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c4250 gate 1598907123160511900 evaluation succeeds +peer0.org1.example.com | [2f9a 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2f9b 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [2f9c 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [2f9d 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [2f9e 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [2f9f 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [3a630a5566e3f31b5e91ed358e9242d8f5ca204320f9fc6d3f9339754aebaa3e] +peer0.org1.example.com | [2fa0 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3a630a55] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2fa1 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [2fa2 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [2fa3 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3a630a55] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2fa4 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [2fa5 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [3a630a55] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [2fa6 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [3a630a55] handling GET_STATE from chaincode +peer0.org1.example.com | [2fa7 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [3a630a55] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [2fa8 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [2fa9 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [3a630a55] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [2faa 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [3a630a55] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [2fab 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [3a630a55] notifying Txid:3a630a5566e3f31b5e91ed358e9242d8f5ca204320f9fc6d3f9339754aebaa3e, channelID:businesschannel +peer0.org1.example.com | [2fac 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [2fad 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3a630a55] Exit chaincode: name:"exp02" (2ms) +peer0.org1.example.com | [2fae 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [2faf 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3a630a5566e3f31b5e91ed358e9242d8f5ca204320f9fc6d3f9339754aebaa3e] +peer0.org1.example.com | [2fb0 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3a630a55] Exit +peer0.org1.example.com | [2fb1 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3a630a55] Entry chaincode: name:"exp02" +peer0.org1.example.com | [2fb2 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3a630a55] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [2fb3 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3a630a5566e3f31b5e91ed358e9242d8f5ca204320f9fc6d3f9339754aebaa3e, chaincode: exp02} +peer0.org1.example.com | [2fb4 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20965651423C120628239C2F972927...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [2fb5 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 24E3FBE05E2A09C347FD6C804DAF1A0B30E14448D318F73DD01730E9A45E816A +peer0.org1.example.com | [2fb6 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 3a630a5566e3f31b5e91ed358e9242d8f5ca204320f9fc6d3f9339754aebaa3e, chaincode: exp02} +peer0.org1.example.com | [2fb7 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3a630a55] Exit +peer0.org1.example.com | [2fb8 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3a630a5566e3f31b5e91ed358e9242d8f5ca204320f9fc6d3f9339754aebaa3e] +peer0.org1.example.com | [2fb9 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36864 +peer0.org1.example.com | [2fba 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36864 grpc.code=OK grpc.call_duration=12.6766ms +peer0.org1.example.com | [2fbb 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2fbc 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [2fbd 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [2fbe 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [2fbf 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [2fc0 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D9816100E1801 +peer0.org1.example.com | [2fc1 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B638D092E639E4F83DBACE3A1CCE7AF87DF2F72349BDFC5F501D8BBCD17D8FBE +peer0.org1.example.com | [2fc2 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [2fc3 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fc4 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fc5 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fc6 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fc7 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [2fc8 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fc9 08-31 20:52:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fca 08-31 20:52:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [2fcb 08-31 20:52:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2fcc 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2fcd 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2fce 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [2fcf 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fd0 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fd1 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fd2 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fd3 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fd4 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [2fd5 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [2fd6 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2fd7 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2fd8 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [2fd9 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [2fda 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [2fdb 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [2fdc 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371f450 gate 1598907124997468900 evaluation starts +peer0.org1.example.com | [2fdd 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371f450 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [2fde 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371f450 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [2fdf 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371f450 principal matched by identity 0 +peer0.org1.example.com | [2fe0 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 d8 f5 0f 48 65 c8 f4 0c cd 0e 2e 8f ad 75 8f |....He........u.| +peer0.org1.example.com | 00000010 ab 85 7b f4 d3 8b 3b 99 75 1d a4 43 c3 f9 55 94 |..{...;.u..C..U.| +peer0.org1.example.com | [2fe1 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 8e 3b ef a4 f2 de 25 6b ad 88 |0E.!...;....%k..| +peer0.org1.example.com | 00000010 74 2e 8c b8 4d 18 ee 72 ed 27 2d a4 49 8a db 08 |t...M..r.'-.I...| +peer0.org1.example.com | 00000020 de 88 c3 21 7f 02 20 2b 42 c2 70 ca 56 7a 28 40 |...!.. +B.p.Vz(@| +peer0.org1.example.com | 00000030 7f 0d 90 23 8e 19 ae 18 e2 85 e9 57 ac 12 83 ce |...#.......W....| +peer0.org1.example.com | 00000040 cc 76 ef 31 10 24 d4 |.v.1.$.| +peer0.org1.example.com | [2fe2 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371f450 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3559 08-31 20:52:09.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [355a 08-31 20:52:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [355b 08-31 20:52:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 55 4a 3c 20 c0 bf d3 fa 61 35 9d 98 06 75 2c d5 |UJ< ....a5...u,.| +peer0.org2.example.com | 00000010 20 1d 23 a2 bc c7 23 d2 f4 3e 3c 31 61 58 fb 60 | .#...#..><1aX.`| +peer0.org2.example.com | [355c 08-31 20:52:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 65 46 0d aa 87 e9 24 9c cf fb 00 c2 |0D. eF....$.....| +peer0.org2.example.com | 00000010 b7 53 08 6a e8 ab d2 28 de 7c b1 ca 35 b2 81 02 |.S.j...(.|..5...| +peer0.org2.example.com | 00000020 6b 48 1d 3a 02 20 7f 83 11 43 3e 19 0a 41 c2 9d |kH.:. ...C>..A..| +peer0.org2.example.com | 00000030 de 9e 5d 84 7f 64 61 07 2e 77 4c eb 2d 16 60 56 |..]..da..wL.-.`V| +peer0.org2.example.com | 00000040 7c f3 99 73 41 dc ||..sA.| +peer0.org2.example.com | [355d 08-31 20:52:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [355e 08-31 20:52:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [355f 08-31 20:52:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3560 08-31 20:52:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [3561 08-31 20:52:09.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [3562 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3563 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3564 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3565 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3566 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3567 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3568 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3569 08-31 20:52:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [356a 08-31 20:52:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [356b 08-31 20:52:09.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [356c 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [356d 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [356e 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [356f 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3570 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3571 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3572 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3573 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3574 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3575 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3576 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3577 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a3340 gate 1598907129329429800 evaluation starts +peer0.org2.example.com | [3578 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a3340 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3579 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a3340 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [357a 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a3340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [357b 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a3340 principal evaluation fails +peer0.org2.example.com | [357c 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a3340 gate 1598907129329429800 evaluation fails +peer0.org2.example.com | [357d 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [357e 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [357f 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3580 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a38b0 gate 1598907129333250400 evaluation starts +peer0.org2.example.com | [3581 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a38b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3582 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a38b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3583 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a38b0 principal matched by identity 0 +peer0.org2.example.com | [3584 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 f0 25 be b1 a9 b8 a2 4c ee 74 ba 53 5a 73 bd |..%.....L.t.SZs.| +peer0.org2.example.com | 00000010 cc 26 d3 03 49 c0 ea 6c 60 02 2e a5 ac bf 56 bc |.&..I..l`.....V.| +peer0.org2.example.com | [3585 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 34 95 95 dd 93 d5 d3 09 4e 7c |0E.!..4.......N|| +peer0.org2.example.com | 00000010 47 80 d0 dd 35 b9 ad cd b7 f1 8e dd 28 0e 8f f9 |G...5.......(...| +peer0.org2.example.com | 00000020 07 17 f4 9b be 02 20 0f 5b 32 cb a3 4a 81 47 ec |...... .[2..J.G.| +peer0.org2.example.com | 00000030 4d fd ed 3d 64 4e c2 92 14 e4 4c ef 74 e3 1e 0d |M..=dN....L.t...| +peer0.org2.example.com | 00000040 ba 5a 6a 99 92 7c 40 |.Zj..|@| +peer0.org2.example.com | [3586 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a38b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3587 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030a38b0 gate 1598907129333250400 evaluation succeeds +peer0.org2.example.com | [3588 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3589 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [358a 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [358b 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [358c 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3602 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [2fe3 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371f450 gate 1598907124997468900 evaluation succeeds +peer0.org1.example.com | [2fe4 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [2fe5 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [2fe6 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [2fe7 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [2fe8 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer0.org1.example.com | [2fe9 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +peer0.org1.example.com | [2fea 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [2fec 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [5], peers number [3] +peer0.org1.example.com | [2feb 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +peer0.org1.example.com | [2fed 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +peer0.org1.example.com | [2fee 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +peer0.org1.example.com | [2fef 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +peer0.org1.example.com | [2ff0 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +peer0.org1.example.com | [2ff1 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [2ff2 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002794e00 env 0xc004b21540 txn 0 +peer0.org1.example.com | [2ff3 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004b21540 +peer0.org1.example.com | [2ff4 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\362\305\265\372\005\020\330\366\336\310\003\"\017businesschannel*@ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030}\357\315\302\232\007\257\034BQH\017\351&]\"\010\252\276J\270\353\250@" +peer0.org1.example.com | [2ff5 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [2ff6 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [2ff7 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [2ff8 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org1.example.com | [2ff9 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [2ffa 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 35 37 a9 79 33 a2 e5 2b 9c 00 24 05 6e 93 3f |`57.y3..+..$.n.?| +peer0.org1.example.com | 00000010 8d d7 90 73 0d 35 87 ae 3b dd 80 ca fa 0e 01 84 |...s.5..;.......| +peer0.org1.example.com | [2ffb 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c 1e 88 5b 8d 81 cf 0e a2 2f d3 11 |0D. |..[...../..| +peer0.org1.example.com | 00000010 a4 a8 f1 b3 5c 74 52 c0 c6 9d 67 23 3f e7 8d d0 |....\tR...g#?...| +peer0.org1.example.com | 00000020 de 36 b3 af 02 20 14 7b 59 42 5f fc de 82 a4 91 |.6... .{YB_.....| +peer0.org1.example.com | 00000030 9e 10 21 3b 91 48 0d fa dd 17 37 33 ab 68 b1 3b |..!;.H....73.h.;| +peer0.org1.example.com | 00000040 92 ff b4 50 2d 54 |...P-T| +peer0.org1.example.com | [2ffc 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [2ffd 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0036b0800, header channel_header:"\010\003\032\014\010\362\305\265\372\005\020\330\366\336\310\003\"\017businesschannel*@ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030}\357\315\302\232\007\257\034BQH\017\351&]\"\010\252\276J\270\353\250@" +peer0.org1.example.com | [2ffe 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +peer0.org1.example.com | [2fff 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +peer0.org1.example.com | [3000 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +peer0.org1.example.com | [3001 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [3002 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] +peer0.org1.example.com | [3003 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +peer0.org1.example.com | [3004 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc0036ab800 +peer0.org1.example.com | [3005 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [436465a6-d99c-4f4c-b263-faff8801c1d9] +peer0.org1.example.com | [3006 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [3007 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [436465a6-d99c-4f4c-b263-faff8801c1d9] +peer0.org1.example.com | [3008 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +peer0.org1.example.com | [3009 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [b6816ba1-7b1b-47d3-bb29-068a704241ac] +peer0.org1.example.com | [300a 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b6816ba1-7b1b-47d3-bb29-068a704241ac] +peer0.org1.example.com | [300b 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2460 gate 1598907125006500600 evaluation starts +peer0.org1.example.com | [300c 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2460 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [300d 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2460 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [300e 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2460 principal matched by identity 0 +peer0.org1.example.com | [300f 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 46 7a 9a 54 5b d8 01 be 17 f9 fb 54 65 9b c2 |.Fz.T[......Te..| +peer0.org1.example.com | 00000010 6a 2d 25 20 2a 18 aa f1 b2 e3 b9 47 db 8e ab 25 |j-% *......G...%| +peer0.org1.example.com | [3010 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 02 52 70 3b fc a7 0c 50 fb f7 a0 |0D. ;.Rp;...P...| +peer0.org1.example.com | 00000010 bc e1 53 83 eb c9 a5 d8 aa 9b 1b 5b 91 4c a8 2d |..S........[.L.-| +peer0.org1.example.com | 00000020 61 25 a5 ec 02 20 21 e1 95 52 28 ef ca c0 87 1b |a%... !..R(.....| +peer0.org1.example.com | 00000030 c4 b9 39 15 3e 7c 4e e2 b1 b4 5b 4f d7 2e 24 8d |..9.>|N...[O..$.| +peer0.org1.example.com | 00000040 9f 7f eb 94 e9 29 |.....)| +peer0.org1.example.com | [3012 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2460 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3013 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2460 signed by 1 principal evaluation starts (used [true]) +peer0.org1.example.com | [3014 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2460 skipping identity 0 because it has already been used +peer0.org1.example.com | [3015 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2460 principal evaluation fails +peer0.org1.example.com | [3011 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4021 bytes, seq: 5}, Envelope: 4051 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [3016 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2460 gate 1598907125006500600 evaluation succeeds +peer0.org1.example.com | [3018 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [f17ddf0c-9d36-4748-b63f-97cc36d32036] +peer0.org1.example.com | [3019 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f17ddf0c-9d36-4748-b63f-97cc36d32036] +peer0.org1.example.com | [301a 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +peer0.org1.example.com | [3017 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +peer0.org1.example.com | [301b 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b appears to be valid +peer0.org1.example.com | [301c 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc0036ab800 +peer0.org1.example.com | [301d 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3020 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [301e 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002794e00 env 0xc004b21540 txn 0 +peer0.org1.example.com | [301f 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [3022 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 13ms +peer0.org1.example.com | [3021 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3023 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3024 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4021 bytes, seq: 5}, Envelope: 4051 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3025 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [3026 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [3027 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3028 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [302a 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4021 bytes, seq: 5}, Envelope: 4051 bytes, Signature: 0 bytes +peer0.org1.example.com | [302b 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3029 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +peer0.org1.example.com | [302c 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [302d 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [302e 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [302f 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +peer0.org1.example.com | [3030 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [3031 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +peer0.org1.example.com | [3032 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [3033 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org1.example.com | [3034 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +peer0.org1.example.com | [3035 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +peer0.org1.example.com | [3036 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [3037 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +peer0.org1.example.com | [3038 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] marked as valid by state validator +peer0.org1.example.com | [3039 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0027959c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc002795a00)} +peer0.org1.example.com | [303a 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [303b 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [303c 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [303d 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +peer0.org1.example.com | [303e 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +peer0.org1.example.com | [303f 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +peer0.org1.example.com | [3040 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3041 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3042 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3043 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3044 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3045 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3046 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3047 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [31b1 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [31b2 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [31b3 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [31b4 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [31b5 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [31b6 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31b7 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31b8 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31b9 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31ba 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31bb 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31bc 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [31bd 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31be 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [31bf 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [31c0 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31c1 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [31c2 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31c3 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [31c4 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31c5 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [31c6 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31c7 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [31c8 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [31c9 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31ca 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [31cb 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31cc 08-31 20:52:16.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [31cd 08-31 20:52:16.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [31ce 08-31 20:52:16.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31cf 08-31 20:52:16.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31d0 08-31 20:52:16.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31d1 08-31 20:52:16.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31d2 08-31 20:52:16.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31d3 08-31 20:52:16.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31d4 08-31 20:52:16.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [31d5 08-31 20:52:16.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31d6 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [31d7 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3603 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3604 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3605 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3606 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3607 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3608 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3609 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [360a 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [360b 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [360c 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [360d 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [360e 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493620 gate 1598907133596712700 evaluation starts +peer1.org2.example.com | [360f 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493620 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3610 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493620 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3611 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3612 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493620 principal evaluation fails +peer1.org2.example.com | [3613 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493620 gate 1598907133596712700 evaluation fails +peer1.org2.example.com | [3614 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3615 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3616 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3617 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493b90 gate 1598907133597051700 evaluation starts +peer1.org2.example.com | [3618 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493b90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3619 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493b90 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [361a 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493b90 principal matched by identity 0 +peer1.org2.example.com | [361b 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 59 da f7 db 4b 11 ae 2e a3 bf 73 62 0e 99 f3 |.Y...K.....sb...| +peer1.org2.example.com | 00000010 aa e8 26 83 f3 cb ac 1d 7b fb 5f ae ad 42 a8 d9 |..&.....{._..B..| +peer1.org2.example.com | [361c 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 0e af 30 1c bb 42 56 cf 80 59 |0E.!....0..BV..Y| +peer1.org2.example.com | 00000010 ba 36 fe f0 69 9d b6 6d 0f b8 cf a3 5d 8d 02 60 |.6..i..m....]..`| +peer1.org2.example.com | 00000020 a5 85 1e 5e 6e 02 20 77 58 41 bc a4 ad 85 b9 1b |...^n. wXA......| +peer1.org2.example.com | 00000030 f5 e5 4f 19 90 f9 b4 dc 6c 49 15 5f c2 44 0d 88 |..O.....lI._.D..| +peer1.org2.example.com | 00000040 62 e2 03 69 56 23 93 |b..iV#.| +peer1.org2.example.com | [361d 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493b90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [361e 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003493b90 gate 1598907133597051700 evaluation succeeds +peer1.org2.example.com | [361f 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3620 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3048 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3049 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [304a 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [304b 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [304c 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42e10 gate 1598907125041061800 evaluation starts +peer0.org1.example.com | [304d 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42e10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [304e 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42e10 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [304f 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42e10 principal matched by identity 0 +peer0.org1.example.com | [3050 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f c6 c4 e1 15 cf cc 1c 60 63 d0 7b a3 8e 99 33 |O.......`c.{...3| +peer0.org1.example.com | 00000010 d1 2e f8 33 b8 58 69 18 fb 93 4e 34 6e 55 52 13 |...3.Xi...N4nUR.| +peer0.org1.example.com | [3051 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 ca 6b f5 11 7c d3 ad ea a2 91 |0E.!...k..|.....| +peer0.org1.example.com | 00000010 c5 90 bd 9a 4f 50 b0 6d e6 39 cc a1 5d 23 8c b6 |....OP.m.9..]#..| +peer0.org1.example.com | 00000020 8d 6b 62 36 c8 02 20 5c f5 1f f7 c0 ab 13 da c4 |.kb6.. \........| +peer0.org1.example.com | 00000030 71 d6 00 98 84 08 89 a8 9c d0 7f bf 7e 91 03 6c |q...........~..l| +peer0.org1.example.com | 00000040 9d 77 b0 d8 73 84 be |.w..s..| +peer0.org1.example.com | [3052 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42e10 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3053 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42e10 gate 1598907125041061800 evaluation succeeds +peer0.org1.example.com | [3054 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3055 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3056 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3057 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3058 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3059 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [305a 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [305b 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [305c 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [305d 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [305e 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [305f 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3060 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3062 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3061 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3063 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3066 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3064 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3067 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3068 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3069 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3065 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +peer0.org1.example.com | [306a 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [306b 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0xdc, 0x42, 0xca, 0x8d, 0x6b, 0x16, 0xf2, 0x93, 0x4, 0x29, 0x62, 0xf1, 0xe4, 0x9, 0xe8, 0xbf, 0x83, 0x51, 0xc9, 0xc7, 0x8b, 0xc4, 0x6, 0xa4, 0xd3, 0x7b, 0x3d, 0x42, 0xb5, 0xa5, 0x4, 0x73} txOffsets= +peer0.org1.example.com | txId=ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b locPointer=offset=70, bytesLength=2980 +peer0.org1.example.com | ] +peer0.org1.example.com | [306c 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [306e 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [306d 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93575, bytesLength=2980] for tx ID: [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] to txid-index +peer1.org2.example.com | [3621 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3622 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3623 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3624 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3625 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3626 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3627 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3628 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3629 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [362a 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [362b 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [362c 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [362d 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [362e 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [362f 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3630 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3631 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3632 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" > alive: alive: +peer1.org2.example.com | [3633 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3634 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3635 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3636 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3637 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3638 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3639 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [363a 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [363b 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [363c 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [363d 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [363e 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [363f 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3640 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3641 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3642 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3643 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer0.org1.example.com | [306f 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93575, bytesLength=2980] for tx number:[0] ID: [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] to blockNumTranNum index +peer0.org1.example.com | [3070 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3071 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3072 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97548], isChainEmpty=[false], lastBlockNumber=[5] +peer0.org1.example.com | [3073 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +peer0.org1.example.com | [3074 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3075 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +peer0.org1.example.com | [3076 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +peer0.org1.example.com | [3077 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [3079 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [307a 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [307b 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [307c 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +peer0.org1.example.com | [307d 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +peer0.org1.example.com | [3078 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [307f 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [307e 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [3080 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +peer0.org1.example.com | [3081 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +peer0.org1.example.com | [3082 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +peer0.org1.example.com | [3083 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [3084 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +peer0.org1.example.com | [3085 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +peer0.org1.example.com | [3086 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3087 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3088 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3089 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [308a 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [308b 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [308c 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +peer0.org1.example.com | [308d 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 57ms (state_validation=7ms block_and_pvtdata_commit=38ms state_commit=3ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +peer0.org1.example.com | [308e 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [308f 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8CFEFBEF6AF9D9816...08061A0C0A0565787030321203312E30 +peer0.org1.example.com | [3090 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DE37101E8731D4588E15F55EC1C717E44ADED98CA6284A0406499042F874AB06 +peer0.org1.example.com | [3091 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +peer0.org1.example.com | [3092 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3093 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3094 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3095 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3096 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3097 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3098 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3099 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [309a 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [309b 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [309c 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [309d 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [309e 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a657a0 gate 1598907125082705400 evaluation starts +peer0.org1.example.com | [309f 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a657a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [30a0 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a657a0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [30a1 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a657a0 principal matched by identity 0 +peer0.org1.example.com | [30a2 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e 74 70 5f 69 da ef 58 05 f1 9d 10 2e d6 70 |..tp_i..X......p| +peer0.org1.example.com | 00000010 3a de 14 88 17 ee d0 42 51 d5 a6 46 8d f5 8c 3d |:......BQ..F...=| +peer0.org1.example.com | [30a3 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a c0 56 b6 72 65 1b f5 d5 29 c0 a2 |0D. *.V.re...)..| +peer0.org1.example.com | 00000010 58 56 5c 65 a7 0b 2c 94 80 c5 ce 83 ac be f6 54 |XV\e..,........T| +peer0.org1.example.com | 00000020 2f 31 e3 48 02 20 5b 2a ae cd 07 ba a2 8e 32 f3 |/1.H. [*......2.| +peer0.org1.example.com | 00000030 dd 1c 0d 2d 4b c6 ed e9 22 79 c7 aa 01 3d 20 6f |...-K..."y...= o| +peer0.org1.example.com | 00000040 8b 81 64 ef ec 80 |..d...| +peer0.org1.example.com | [30a4 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a657a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [30a5 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a657a0 gate 1598907125082705400 evaluation succeeds +peer0.org1.example.com | [30a6 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [30a7 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [30a8 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [30a9 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [30aa 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [30ab 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [30ac 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [30ad 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [30ae 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [30af 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30b0 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30b1 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30b2 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [30b3 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30b4 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30b5 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30b6 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [30b7 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [30b8 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [30b9 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30ba 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [30bb 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [30bc 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [30bd 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30be 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [30bf 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30c0 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [30c1 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [30c2 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 e5 e9 a6 fb 05 57 8b d3 8e 51 f7 68 a5 7e 34 |......W...Q.h.~4| +peer0.org1.example.com | 00000010 b6 76 b4 12 be 3b bf 81 92 39 f3 26 08 8e 3d f9 |.v...;...9.&..=.| +peer0.org1.example.com | [30c3 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 bc 8b 48 51 d1 a7 f4 4e 90 17 b0 |0D. $..HQ...N...| +peer0.org1.example.com | 00000010 99 35 8b 1a f5 b3 d0 ea df 36 6c 2a ac 9b 9a c6 |.5.......6l*....| +peer0.org1.example.com | 00000020 75 1b 64 53 02 20 56 08 1f 62 ca c4 b4 51 85 eb |u.dS. V..b...Q..| +peer0.org1.example.com | 00000030 70 95 38 d7 bd ce c4 65 f6 21 5c 79 f5 17 7e 57 |p.8....e.!\y..~W| +peer0.org1.example.com | 00000040 55 69 e5 10 d3 6b |Ui...k| +peer0.org1.example.com | [30c4 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [30c5 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [30c6 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [30c7 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [30c8 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [30c9 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30ca 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30cb 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30cc 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30cd 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30ce 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [358d 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [358e 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [358f 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3590 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3591 08-31 20:52:09.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3592 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3593 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [3594 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3595 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3596 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3597 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3598 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3599 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:C\010" > alive: alive: alive: +peer0.org2.example.com | [359a 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [359b 08-31 20:52:09.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [359c 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [359d 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [359e 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [359f 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [35a0 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [35a1 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35a2 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [35a3 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [35a4 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [35a5 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35a6 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [35a7 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35a8 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [35a9 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [35aa 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35ab 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [35ac 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [35ad 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35ae 08-31 20:52:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [35af 08-31 20:52:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [35b0 08-31 20:52:09.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35b1 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [35b2 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161030 +peer0.org2.example.com | [35b3 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6B644F9F3F4705954C769B7E674275E218B48BC85E17A9B10C4A2368E1A13C58 +peer0.org2.example.com | [35b4 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [35b5 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [35b6 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [35b7 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35b8 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [35b9 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35ba 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [35bb 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [35bc 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [35be 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [35c0 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35bf 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35bd 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [35c1 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35c2 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [35c3 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35c4 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org2.example.com | [35c5 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [35c6 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 64 4f 9f 3f 47 05 95 4c 76 9b 7e 67 42 75 e2 |kdO.?G..Lv.~gBu.| +peer0.org2.example.com | 00000010 18 b4 8b c8 5e 17 a9 b1 0c 4a 23 68 e1 a1 3c 58 |....^....J#h.. DEBU Verify: sig = 00000000 30 44 02 20 0f 51 8f 83 be 9f 3f ee c6 d8 d0 2e |0D. .Q....?.....| +peer0.org2.example.com | 00000010 37 b6 9d b1 c0 ae 81 b6 32 9b 15 fc a0 5a bc bd |7.......2....Z..| +peer0.org2.example.com | 00000020 d1 74 8d f6 02 20 22 77 6b 3e 04 16 45 93 9c 46 |.t... "wk>..E..F| +peer0.org2.example.com | 00000030 3c 2a 4e 79 3f 5f 8d ba 44 48 69 96 13 68 d3 b8 |<*Ny?_..DHi..h..| +peer0.org2.example.com | 00000040 f0 df e3 34 7a ba |...4z.| +peer0.org2.example.com | [35c8 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [35c9 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [35ca 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35cb 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [35cc 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 cb 52 a0 a2 f6 de b7 15 19 d2 31 4d 82 0d 79 |..R........1M..y| +peer0.org2.example.com | 00000010 99 e7 0c 97 22 b0 e1 d0 79 bf 2d 9f 60 8f 9d cb |...."...y.-.`...| +peer0.org2.example.com | [35cd 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 6d df 71 b4 35 38 08 9f e7 a0 |0E.!..m.q.58....| +peer0.org2.example.com | 00000010 de 81 34 e7 e9 91 39 0b f5 91 c5 d9 cc 09 34 16 |..4...9.......4.| +peer0.org2.example.com | 00000020 c7 cc 75 05 d6 02 20 3b d3 12 d9 a9 6f 2e 45 83 |..u... ;....o.E.| +peer0.org2.example.com | 00000030 75 66 75 c2 b4 c0 85 4e f5 0f 4b 08 00 0f aa 65 |ufu....N..K....e| +peer0.org2.example.com | 00000040 f5 c9 e8 c5 e9 88 8c |.......| +peer0.org2.example.com | [35ce 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [35cf 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35d0 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [35d1 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [35d2 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [35d3 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [35d4 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [35d5 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [35d6 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3644 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [3645 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3646 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D981610101801 +peer1.org2.example.com | [3647 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F273704808E2708A5056DB7B6D1478A57B13FD9AD69073CD059CF42F342F607F +peer1.org2.example.com | [3648 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [3649 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [364a 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [364b 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [364c 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [364d 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [364e 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [364f 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3650 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [3651 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3652 08-31 20:52:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3653 08-31 20:52:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3654 08-31 20:52:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3655 08-31 20:52:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [3656 08-31 20:52:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3657 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3658 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3659 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [365a 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [365b 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [365c 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [365d 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [365e 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [365f 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3660 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3661 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3662 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3663 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3664 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31d8 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [31d9 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [31da 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31db 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [31dc 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [31dd 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [31de 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [31df 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [31e0 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [31e1 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003431ff0 gate 1598907137092814800 evaluation starts +peer1.org1.example.com | [31e2 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003431ff0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [31e3 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003431ff0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [31e4 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003431ff0 principal matched by identity 0 +peer1.org1.example.com | [31e5 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 22 75 ee d7 b7 5f ef ef 01 a6 d3 9f c4 26 19 |i"u..._.......&.| +peer1.org1.example.com | 00000010 dc 92 50 99 03 d9 71 4a 23 fa 01 75 71 b1 ba 7c |..P...qJ#..uq..|| +peer1.org1.example.com | [31e6 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 5c bc b9 d0 e9 32 c4 85 69 fd 8a |0D. .\....2..i..| +peer1.org1.example.com | 00000010 86 a2 14 bc 8f d4 11 6d f3 1b 94 0e ed e8 dc 12 |.......m........| +peer1.org1.example.com | 00000020 b1 d4 3a 0d 02 20 6a 63 7e ed 6d 99 28 6f 2e c0 |..:.. jc~.m.(o..| +peer1.org1.example.com | 00000030 e0 7e 50 e0 55 4c cf 50 1a ee 99 07 49 aa e3 ee |.~P.UL.P....I...| +peer1.org1.example.com | 00000040 43 44 ef 85 57 69 |CD..Wi| +peer1.org1.example.com | [31e7 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003431ff0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [31e8 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003431ff0 gate 1598907137092814800 evaluation succeeds +peer1.org1.example.com | [31e9 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [31ea 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [31eb 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [31ec 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [31ed 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [31ee 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [31ef 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [31f0 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [35d7 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [35d8 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [35d9 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9830 gate 1598907129508463500 evaluation starts +peer0.org2.example.com | [35da 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9830 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [35db 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9830 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [35dc 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [35dd 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9830 principal evaluation fails +peer0.org2.example.com | [35de 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9830 gate 1598907129508463500 evaluation fails +peer0.org2.example.com | [35df 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [35e0 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [35e1 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [35e2 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9da0 gate 1598907129510075400 evaluation starts +peer0.org2.example.com | [35e3 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9da0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [35e4 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9da0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [35e5 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9da0 principal matched by identity 0 +peer0.org2.example.com | [35e6 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 32 a5 08 5b 5d 36 89 0c 4a 22 07 f8 c0 bb af |.2..[]6..J".....| +peer0.org2.example.com | 00000010 81 5e c6 35 d5 0c 8f f9 28 5b 93 d5 1d 82 31 47 |.^.5....([....1G| +peer0.org2.example.com | [35e7 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 20 4b 9b 56 37 47 b1 a7 58 68 4a |0D. m K.V7G..XhJ| +peer0.org2.example.com | 00000010 2c a7 0e f2 23 b6 f7 9c c2 4f 95 09 80 b0 47 a0 |,...#....O....G.| +peer0.org2.example.com | 00000020 ca d7 85 94 02 20 27 8e 25 2e 24 47 56 b3 2a 69 |..... '.%.$GV.*i| +peer0.org2.example.com | 00000030 9d 97 17 a3 9e f6 07 c2 c3 cb a1 47 2f c5 b7 e2 |...........G/...| +peer0.org2.example.com | 00000040 b6 71 55 3e 43 08 |.qU>C.| +peer0.org2.example.com | [35e8 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9da0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [35e9 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd9da0 gate 1598907129510075400 evaluation succeeds +peer0.org2.example.com | [35ea 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [35eb 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [35ec 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [35ed 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [35ee 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [35ef 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35f0 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35f1 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [35f2 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [35f3 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35f4 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [35f5 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 64 4f 9f 3f 47 05 95 4c 76 9b 7e 67 42 75 e2 |kdO.?G..Lv.~gBu.| +peer0.org2.example.com | 00000010 18 b4 8b c8 5e 17 a9 b1 0c 4a 23 68 e1 a1 3c 58 |....^....J#h.. DEBU Verify: sig = 00000000 30 44 02 20 0f 51 8f 83 be 9f 3f ee c6 d8 d0 2e |0D. .Q....?.....| +peer0.org2.example.com | 00000010 37 b6 9d b1 c0 ae 81 b6 32 9b 15 fc a0 5a bc bd |7.......2....Z..| +peer0.org2.example.com | 00000020 d1 74 8d f6 02 20 22 77 6b 3e 04 16 45 93 9c 46 |.t... "wk>..E..F| +peer0.org2.example.com | 00000030 3c 2a 4e 79 3f 5f 8d ba 44 48 69 96 13 68 d3 b8 |<*Ny?_..DHi..h..| +peer0.org2.example.com | 00000040 f0 df e3 34 7a ba |...4z.| +peer0.org2.example.com | [35f7 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [35f8 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 01 66 04 db f2 b4 01 8e 30 eb 6c 83 |0D. .f......0.l.| +peer0.org2.example.com | 00000010 78 9b ac 00 bc 6a b2 bf 5d be ed 7e 17 72 30 0a |x....j..]..~.r0.| +peer0.org2.example.com | 00000020 62 92 95 99 02 20 25 41 a2 cb 72 8e fa b6 6f 4b |b.... %A..r...oK| +peer0.org2.example.com | 00000030 f0 9d f0 41 60 20 00 5f be a2 16 2b 68 d8 62 3c |...A` ._...+h.b<| +peer0.org2.example.com | 00000040 6c ec 47 de d3 61 |l.G..a| +peer0.org2.example.com | [35f9 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [35fa 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [35fb 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35fc 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35fd 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [30cf 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [30d0 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30d2 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [30d1 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [30d3 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30d4 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [30d5 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30d6 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" secret_envelope:*\013\311\005\177A\351\327t" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [30d7 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30d8 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" secret_envelope:*\013\311\005\177A\351\327t" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [30d9 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [30da 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 10 07 8f e4 2b 02 2d 3e fc 47 48 d6 8f 49 ad |.....+.->.GH..I.| +peer0.org1.example.com | 00000010 f2 d8 41 ea bd 99 65 15 93 84 fb f2 3e 69 8d 88 |..A...e.....>i..| +peer0.org1.example.com | [30db 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 ee 06 3e b8 e0 d4 82 23 2c 60 aa |0D. C..>....#,`.| +peer0.org1.example.com | 00000010 9d e7 9e 39 08 8f b3 1f 87 55 47 87 62 d9 88 a3 |...9.....UG.b...| +peer0.org1.example.com | 00000020 5f 1f ee 65 02 20 1d 6c fd 2c 4b 23 d7 eb bc 62 |_..e. .l.,K#...b| +peer0.org1.example.com | 00000030 be 76 b0 77 85 48 ce da cd 6f d0 2b 60 ab bc 00 |.v.w.H...o.+`...| +peer0.org1.example.com | 00000040 5c 73 bc 0e 0d 58 |\s...X| +peer0.org1.example.com | [30dc 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [30dd 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 77 51 d2 f7 b4 ec 1e c3 49 1e 33 |0D. HwQ......I.3| +peer0.org1.example.com | 00000010 de 2c b1 b1 7a f1 1b ff 39 12 8b 6e a4 d2 a7 0a |.,..z...9..n....| +peer0.org1.example.com | 00000020 8d 45 52 d3 02 20 1d 73 59 b9 0c 86 8a 0b 28 e1 |.ER.. .sY.....(.| +peer0.org1.example.com | 00000030 2d f2 2e 52 bc 7a 23 10 ba e6 8a 68 3e 2a 0b c9 |-..R.z#....h>*..| +peer0.org1.example.com | 00000040 05 7f 41 e9 d7 74 |..A..t| +peer0.org1.example.com | [30de 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [30df 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [30e0 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [30e1 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [30e2 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [30e3 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30e4 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30e5 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30e6 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [30e7 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30e8 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30e9 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [30eb 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org1.example.com | [30ec 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30ea 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" secret_envelope:*\013\311\005\177A\351\327t" > > alive: +peer0.org1.example.com | [30ed 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [30ee 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [30ef 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30f0 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [30f1 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30f2 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [30f3 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [30f4 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30f5 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [30f6 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [30f7 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [30f8 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [30f9 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [30fa 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30fb 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30fc 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30fd 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30fe 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [30ff 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3100 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [3101 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3102 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3103 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3104 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3105 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3106 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [3107 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3108 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3109 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [310a 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [310b 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [310c 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [310d 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [310e 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8bf00 gate 1598907125427425800 evaluation starts +peer0.org1.example.com | [310f 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8bf00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3110 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8bf00 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3111 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8bf00 principal matched by identity 0 +peer0.org1.example.com | [3112 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 3f 53 55 af 41 40 b7 82 ca 7c 32 ff b8 ce 68 |.?SU.A@...|2...h| +peer0.org1.example.com | 00000010 a0 98 99 06 03 79 e7 70 7e b8 92 8a 48 f0 61 0f |.....y.p~...H.a.| +peer0.org1.example.com | [3113 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 63 a9 d0 da c0 f3 7c df 1c 0a e6 |0D. .c.....|....| +peer0.org1.example.com | 00000010 2d 8f 30 9d fe 80 91 12 60 de c7 9e 6e e4 e3 0d |-.0.....`...n...| +peer0.org1.example.com | 00000020 70 8f 44 d2 02 20 03 f0 52 44 15 4e 3f 59 be 57 |p.D.. ..RD.N?Y.W| +peer0.org1.example.com | 00000030 21 15 2d 79 db bb 32 86 b8 86 ef 10 c0 c1 43 07 |!.-y..2.......C.| +peer0.org1.example.com | 00000040 58 64 34 c7 d0 61 |Xd4..a| +peer0.org1.example.com | [3114 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8bf00 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3115 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8bf00 gate 1598907125427425800 evaluation succeeds +peer0.org1.example.com | [3116 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3117 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3118 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3119 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [311a 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [311b 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [311c 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [311d 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [311e 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3665 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3666 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3667 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3668 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3669 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [366a 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [366b 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fca10 gate 1598907134412622300 evaluation starts +peer1.org2.example.com | [366c 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fca10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [366d 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fca10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [366e 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fca10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [366f 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fca10 principal evaluation fails +peer1.org2.example.com | [3670 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fca10 gate 1598907134412622300 evaluation fails +peer1.org2.example.com | [3671 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3672 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3673 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3674 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fcf80 gate 1598907134412890200 evaluation starts +peer1.org2.example.com | [3675 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fcf80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3676 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fcf80 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3677 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fcf80 principal matched by identity 0 +peer1.org2.example.com | [3678 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org2.example.com | [3679 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org2.example.com | [367a 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fcf80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [367b 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032fcf80 gate 1598907134412890200 evaluation succeeds +peer1.org2.example.com | [367c 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [367d 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [367e 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [367f 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3680 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3681 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3682 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3683 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3684 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3685 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3686 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [31f1 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [31f2 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31f3 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31f4 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31f5 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [31f6 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31f7 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31f8 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [31f9 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [31fa 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [31fb 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [31fc 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [31fd 08-31 20:52:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [31fe 08-31 20:52:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [31ff 08-31 20:52:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [3200 08-31 20:52:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3201 08-31 20:52:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [3202 08-31 20:52:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3203 08-31 20:52:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3204 08-31 20:52:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3205 08-31 20:52:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3206 08-31 20:52:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3207 08-31 20:52:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3208 08-31 20:52:17.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3209 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [320a 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [320b 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [320c 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [35fe 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [35ff 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3600 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3601 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3602 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3603 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3604 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3605 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3606 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3607 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb5930 gate 1598907129518070700 evaluation starts +peer0.org2.example.com | [3608 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb5930 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3609 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb5930 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [360a 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb5930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [360b 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb5930 principal evaluation fails +peer0.org2.example.com | [360c 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb5930 gate 1598907129518070700 evaluation fails +peer0.org2.example.com | [360d 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [360e 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [360f 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3610 08-31 20:52:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb5ea0 gate 1598907129519954900 evaluation starts +peer0.org2.example.com | [3611 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb5ea0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3612 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb5ea0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3613 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb5ea0 principal matched by identity 0 +peer0.org2.example.com | [3614 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 f0 25 be b1 a9 b8 a2 4c ee 74 ba 53 5a 73 bd |..%.....L.t.SZs.| +peer0.org2.example.com | 00000010 cc 26 d3 03 49 c0 ea 6c 60 02 2e a5 ac bf 56 bc |.&..I..l`.....V.| +peer0.org2.example.com | [3615 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 34 95 95 dd 93 d5 d3 09 4e 7c |0E.!..4.......N|| +peer0.org2.example.com | 00000010 47 80 d0 dd 35 b9 ad cd b7 f1 8e dd 28 0e 8f f9 |G...5.......(...| +peer0.org2.example.com | 00000020 07 17 f4 9b be 02 20 0f 5b 32 cb a3 4a 81 47 ec |...... .[2..J.G.| +peer0.org2.example.com | 00000030 4d fd ed 3d 64 4e c2 92 14 e4 4c ef 74 e3 1e 0d |M..=dN....L.t...| +peer0.org2.example.com | 00000040 ba 5a 6a 99 92 7c 40 |.Zj..|@| +peer0.org2.example.com | [3616 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb5ea0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3617 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb5ea0 gate 1598907129519954900 evaluation succeeds +peer0.org2.example.com | [3618 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3619 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [361a 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [361b 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [361c 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [361d 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [361e 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [361f 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3620 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [311f 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3120 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3121 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3122 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3123 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3124 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3125 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3126 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3127 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3128 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3129 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [312a 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [312b 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [312c 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [312d 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [312e 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [312f 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3130 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3131 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3132 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3133 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3134 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3135 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3136 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3137 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3138 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3139 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36868 +peer0.org1.example.com | [313a 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003aa17c0 +peer0.org1.example.com | [313b 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [313c 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [313d 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [313e 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [313f 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3140 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 29 27 20 a2 34 fe ab 1f 4e f6 70 e6 4a 1b 4d |.)' .4...N.p.J.M| +peer0.org1.example.com | 00000010 0e 20 2d 68 79 7e 04 d6 33 26 d1 8b 9e b2 2a 88 |. -hy~..3&....*.| +peer0.org1.example.com | [3141 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0c 93 83 04 d2 70 f7 84 2f 98 75 7b |0D. .....p../.u{| +peer0.org1.example.com | 00000010 d0 14 a3 69 94 60 e4 38 22 68 26 be 30 b8 9f e7 |...i.`.8"h&.0...| +peer0.org1.example.com | 00000020 09 b2 38 60 02 20 79 3b c7 0d 06 9a 92 db aa 70 |..8`. y;.......p| +peer0.org1.example.com | 00000030 cb 34 22 11 d2 98 8b cf 0e 57 27 24 1a d1 0e dc |.4"......W'$....| +peer0.org1.example.com | 00000040 66 8a 1f e3 fe bf |f.....| +peer0.org1.example.com | [3142 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [3143 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ad0380, header 0xc003aa1bd0 +peer0.org1.example.com | [3144 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +peer0.org1.example.com | [3145 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c33c7397] processing txid: c33c7397fe3ff8a72d4b7f9b7e7df02d38f0cb736d5662f3adf546d7988de3a1 +peer0.org1.example.com | [3146 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [c33c7397fe3ff8a72d4b7f9b7e7df02d38f0cb736d5662f3adf546d7988de3a1] +peer0.org1.example.com | [3147 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +peer0.org1.example.com | [3148 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +peer0.org1.example.com | [3149 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [314a 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [314b 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +peer0.org1.example.com | [314c 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b50d00 gate 1598907125455460300 evaluation starts +peer0.org1.example.com | [314d 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b50d00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [320d 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [320e 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [320f 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3210 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3211 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3212 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3213 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3214 08-31 20:52:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3215 08-31 20:52:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161037 +peer1.org1.example.com | [3216 08-31 20:52:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D3E05BAD9BCF6E40C0F14011CB7425EBC1BA7723511291BF1FC3B4CD496EBC28 +peer1.org1.example.com | [3217 08-31 20:52:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3218 08-31 20:52:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3219 08-31 20:52:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [321a 08-31 20:52:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [321b 08-31 20:52:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [321c 08-31 20:52:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [321d 08-31 20:52:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [321e 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [321f 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3220 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3221 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [3222 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3621 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3622 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3623 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3624 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3625 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3626 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3627 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3628 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3629 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 64 4f 9f 3f 47 05 95 4c 76 9b 7e 67 42 75 e2 |kdO.?G..Lv.~gBu.| +peer0.org2.example.com | 00000010 18 b4 8b c8 5e 17 a9 b1 0c 4a 23 68 e1 a1 3c 58 |....^....J#h.. DEBU Verify: sig = 00000000 30 44 02 20 0f 51 8f 83 be 9f 3f ee c6 d8 d0 2e |0D. .Q....?.....| +peer0.org2.example.com | 00000010 37 b6 9d b1 c0 ae 81 b6 32 9b 15 fc a0 5a bc bd |7.......2....Z..| +peer0.org2.example.com | 00000020 d1 74 8d f6 02 20 22 77 6b 3e 04 16 45 93 9c 46 |.t... "wk>..E..F| +peer0.org2.example.com | 00000030 3c 2a 4e 79 3f 5f 8d ba 44 48 69 96 13 68 d3 b8 |<*Ny?_..DHi..h..| +peer0.org2.example.com | 00000040 f0 df e3 34 7a ba |...4z.| +peer0.org2.example.com | [362b 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [362c 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [362d 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [362e 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [362f 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 cb 52 a0 a2 f6 de b7 15 19 d2 31 4d 82 0d 79 |..R........1M..y| +peer0.org2.example.com | 00000010 99 e7 0c 97 22 b0 e1 d0 79 bf 2d 9f 60 8f 9d cb |...."...y.-.`...| +peer0.org2.example.com | [3630 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 6d df 71 b4 35 38 08 9f e7 a0 |0E.!..m.q.58....| +peer0.org2.example.com | 00000010 de 81 34 e7 e9 91 39 0b f5 91 c5 d9 cc 09 34 16 |..4...9.......4.| +peer0.org2.example.com | 00000020 c7 cc 75 05 d6 02 20 3b d3 12 d9 a9 6f 2e 45 83 |..u... ;....o.E.| +peer0.org2.example.com | 00000030 75 66 75 c2 b4 c0 85 4e f5 0f 4b 08 00 0f aa 65 |ufu....N..K....e| +peer0.org2.example.com | 00000040 f5 c9 e8 c5 e9 88 8c |.......| +peer0.org2.example.com | [3631 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3632 08-31 20:52:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3633 08-31 20:52:09.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3634 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3635 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3636 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [3637 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [3638 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [314e 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b50d00 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [314f 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b50d00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3150 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b50d00 principal evaluation fails +peer0.org1.example.com | [3151 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b50d00 gate 1598907125455460300 evaluation fails +peer0.org1.example.com | [3152 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [3153 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [3154 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [3155 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51270 gate 1598907125456109700 evaluation starts +peer0.org1.example.com | [3156 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51270 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3157 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51270 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3158 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51270 principal matched by identity 0 +peer0.org1.example.com | [3159 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 29 27 20 a2 34 fe ab 1f 4e f6 70 e6 4a 1b 4d |.)' .4...N.p.J.M| +peer0.org1.example.com | 00000010 0e 20 2d 68 79 7e 04 d6 33 26 d1 8b 9e b2 2a 88 |. -hy~..3&....*.| +peer0.org1.example.com | [315a 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0c 93 83 04 d2 70 f7 84 2f 98 75 7b |0D. .....p../.u{| +peer0.org1.example.com | 00000010 d0 14 a3 69 94 60 e4 38 22 68 26 be 30 b8 9f e7 |...i.`.8"h&.0...| +peer0.org1.example.com | 00000020 09 b2 38 60 02 20 79 3b c7 0d 06 9a 92 db aa 70 |..8`. y;.......p| +peer0.org1.example.com | 00000030 cb 34 22 11 d2 98 8b cf 0e 57 27 24 1a d1 0e dc |.4"......W'$....| +peer0.org1.example.com | 00000040 66 8a 1f e3 fe bf |f.....| +peer0.org1.example.com | [315b 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51270 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [315c 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51270 gate 1598907125456109700 evaluation succeeds +peer0.org1.example.com | [315d 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [315e 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [315f 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [3160 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [3161 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [3162 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [c33c7397fe3ff8a72d4b7f9b7e7df02d38f0cb736d5662f3adf546d7988de3a1] +peer0.org1.example.com | [3163 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c33c7397] Entry chaincode: name:"exp02" +peer0.org1.example.com | [3164 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org1.example.com | [3165 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +peer0.org1.example.com | [3166 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c33c7397] Entry chaincode: name:"exp02" +peer0.org1.example.com | [3167 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [3168 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [c33c7397] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org1.example.com | [3169 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [c33c7397] handling GET_STATE from chaincode +peer0.org1.example.com | [316a 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [c33c7397] getting state for chaincode exp02, key a, channel businesschannel +peer0.org1.example.com | [316b 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +peer0.org1.example.com | [316c 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [c33c7397] Completed GET_STATE. Sending RESPONSE +peer0.org1.example.com | [316d 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [c33c7397] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [316e 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [c33c7397] notifying Txid:c33c7397fe3ff8a72d4b7f9b7e7df02d38f0cb736d5662f3adf546d7988de3a1, channelID:businesschannel +peer0.org1.example.com | [316f 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [3170 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c33c7397] Exit chaincode: name:"exp02" (3ms) +peer0.org1.example.com | [3171 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [3172 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c33c7397fe3ff8a72d4b7f9b7e7df02d38f0cb736d5662f3adf546d7988de3a1] +peer0.org1.example.com | [3173 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c33c7397] Exit +peer0.org1.example.com | [3174 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c33c7397] Entry chaincode: name:"exp02" +peer0.org1.example.com | [3175 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c33c7397] escc for chaincode name:"exp02" is escc +peer0.org1.example.com | [3176 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: c33c7397fe3ff8a72d4b7f9b7e7df02d38f0cb736d5662f3adf546d7988de3a1, chaincode: exp02} +peer0.org1.example.com | [3177 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A203FA0A534EAD19FFFB31D3F1FF5D4...455254494649434154452D2D2D2D2D0A +peer0.org1.example.com | [3178 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CA30532DB47998C6EEC21E9FCC70B765E7D01062479B1DBC5DE1D8F5B34619B9 +peer0.org1.example.com | [3179 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: c33c7397fe3ff8a72d4b7f9b7e7df02d38f0cb736d5662f3adf546d7988de3a1, chaincode: exp02} +peer0.org1.example.com | [317a 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c33c7397] Exit +peer0.org1.example.com | [317b 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c33c7397fe3ff8a72d4b7f9b7e7df02d38f0cb736d5662f3adf546d7988de3a1] +peer0.org1.example.com | [317c 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36868 +peer0.org1.example.com | [317d 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36868 grpc.code=OK grpc.call_duration=13.8011ms +peer0.org1.example.com | [317e 08-31 20:52:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [317f 08-31 20:52:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3180 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3181 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3182 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3183 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3184 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [3185 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3186 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3187 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3188 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3189 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [318a 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [318b 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [318c 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b70e90 gate 1598907125493165200 evaluation starts +peer0.org1.example.com | [318d 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b70e90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [318e 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b70e90 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [318f 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b70e90 principal matched by identity 0 +peer0.org1.example.com | [3190 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3191 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816102D +peer0.org1.example.com | [3192 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5CE14C4C554EE32AFAA75F9ACA3055D9B15579034EB2A0D3B8902486CBCA59DB +peer0.org1.example.com | [3193 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3194 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3196 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3197 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [3195 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f bf 80 35 88 b4 5b e6 9f 32 d4 41 b7 09 ed 0f |o..5..[..2.A....| +peer0.org1.example.com | 00000010 34 d7 bd f8 6b 0e 06 76 63 fa 7a 7c a3 3e 80 3a |4...k..vc.z|.>.:| +peer0.org1.example.com | [3198 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fa 65 3f 1e 10 70 c0 a9 4e 51 b4 |0D. U.e?..p..NQ.| +peer0.org1.example.com | 00000010 f3 2c 93 90 53 d0 9b d0 7f 62 a7 f1 0c ef 07 c6 |.,..S....b......| +peer0.org1.example.com | 00000020 a9 50 fc c6 02 20 18 c8 87 be b7 06 63 1b 8d 96 |.P... ......c...| +peer0.org1.example.com | 00000030 82 62 c7 68 41 b0 2c f4 c0 09 14 96 16 92 01 a0 |.b.hA.,.........| +peer0.org1.example.com | 00000040 71 35 0c 02 1b 23 |q5...#| +peer0.org1.example.com | [3199 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b70e90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [319a 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b70e90 gate 1598907125493165200 evaluation succeeds +peer0.org1.example.com | [319b 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [319c 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [319d 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [319e 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [319f 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [31a0 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [31a1 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [31a2 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [31a3 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [31a4 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31a5 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31a6 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3223 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3224 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3225 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3226 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3227 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3228 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3229 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [322a 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e0 5b ad 9b cf 6e 40 c0 f1 40 11 cb 74 25 eb |..[...n@..@..t%.| +peer1.org1.example.com | 00000010 c1 ba 77 23 51 12 91 bf 1f c3 b4 cd 49 6e bc 28 |..w#Q.......In.(| +peer1.org1.example.com | [322b 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 11 9b 13 4b 9c 6c fc a8 d4 78 |0E.!.....K.l...x| +peer1.org1.example.com | 00000010 76 89 ae 84 b1 25 60 5c 18 f4 05 22 ef f7 5e 24 |v....%`\..."..^$| +peer1.org1.example.com | 00000020 da 0e 69 39 5d 02 20 33 c3 49 af 4c d1 cd 87 ad |..i9]. 3.I.L....| +peer1.org1.example.com | 00000030 c0 da 6c 1f 69 0c 99 cb 76 c8 42 6d 5e f6 4c e0 |..l.i...v.Bm^.L.| +peer1.org1.example.com | 00000040 d7 4d 22 89 0c ad 87 |.M"....| +peer1.org1.example.com | [322c 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [322d 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [322e 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [322f 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3230 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3231 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3232 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3233 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3234 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3235 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3236 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3237 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a57b0 gate 1598907137328704100 evaluation starts +peer1.org1.example.com | [3238 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a57b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3239 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a57b0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [323a 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a57b0 principal matched by identity 0 +peer1.org1.example.com | [323b 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 22 75 ee d7 b7 5f ef ef 01 a6 d3 9f c4 26 19 |i"u..._.......&.| +peer1.org2.example.com | [3687 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3688 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003240180 gate 1598907134413781700 evaluation starts +peer1.org2.example.com | [3689 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003240180 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [368a 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003240180 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [368b 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003240180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [368c 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003240180 principal evaluation fails +peer1.org2.example.com | [368d 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003240180 gate 1598907134413781700 evaluation fails +peer1.org2.example.com | [368e 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [368f 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3690 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3691 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032406f0 gate 1598907134414042000 evaluation starts +peer1.org2.example.com | [3692 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032406f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3693 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032406f0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3694 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032406f0 principal matched by identity 0 +peer1.org2.example.com | [3695 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org2.example.com | [3696 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org2.example.com | [3697 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032406f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3698 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032406f0 gate 1598907134414042000 evaluation succeeds +peer1.org2.example.com | [3699 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [369a 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [369b 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [369c 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [369d 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org2.example.com | [369e 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org2.example.com | [369f 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org2.example.com | [36a0 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org2.example.com | [36a1 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36a2 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [36a3 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36a4 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36a5 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3639 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [363a 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [363b 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [363c 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [363d 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [363e 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [363f 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd1810 gate 1598907129603350500 evaluation starts +peer0.org2.example.com | [3640 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd1810 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3641 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd1810 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3642 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd1810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3643 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd1810 principal evaluation fails +peer0.org2.example.com | [3644 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd1810 gate 1598907129603350500 evaluation fails +peer0.org2.example.com | [3645 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3646 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3647 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3648 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd1d80 gate 1598907129604953600 evaluation starts +peer0.org2.example.com | [3649 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd1d80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [364a 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd1d80 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [364b 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd1d80 principal matched by identity 0 +peer0.org2.example.com | [364c 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 06 4f 12 2f cf 24 26 df 51 68 23 1a b6 c5 5a |..O./.$&.Qh#...Z| +peer0.org2.example.com | 00000010 08 10 ed ed 81 50 a6 97 35 12 b4 68 cc 9d 22 d7 |.....P..5..h..".| +peer0.org2.example.com | [364d 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 45 bc 61 d7 d7 cf 88 66 0b 98 16 |0D. pE.a....f...| +peer0.org2.example.com | 00000010 c0 92 8e 80 c2 1b 41 50 4d f4 ef b2 8e dd d8 49 |......APM......I| +peer0.org2.example.com | 00000020 26 4b c2 46 02 20 76 75 57 5d 83 f8 b2 a2 e4 e3 |&K.F. vuW]......| +peer0.org2.example.com | 00000030 ae f4 cb ca de 0f c0 1d 93 bc fe d7 68 e9 04 cc |............h...| +peer0.org2.example.com | 00000040 c7 2f 8b 38 64 c7 |./.8d.| +peer0.org2.example.com | [364e 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd1d80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [364f 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd1d80 gate 1598907129604953600 evaluation succeeds +peer0.org2.example.com | [3650 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3651 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3652 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3653 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3654 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3655 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3656 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3657 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3658 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3659 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [365a 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [365b 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [365c 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [365d 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [365e 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [365f 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3660 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000010 dc 92 50 99 03 d9 71 4a 23 fa 01 75 71 b1 ba 7c |..P...qJ#..uq..|| +peer1.org1.example.com | [323c 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 5c bc b9 d0 e9 32 c4 85 69 fd 8a |0D. .\....2..i..| +peer1.org1.example.com | 00000010 86 a2 14 bc 8f d4 11 6d f3 1b 94 0e ed e8 dc 12 |.......m........| +peer1.org1.example.com | 00000020 b1 d4 3a 0d 02 20 6a 63 7e ed 6d 99 28 6f 2e c0 |..:.. jc~.m.(o..| +peer1.org1.example.com | 00000030 e0 7e 50 e0 55 4c cf 50 1a ee 99 07 49 aa e3 ee |.~P.UL.P....I...| +peer1.org1.example.com | 00000040 43 44 ef 85 57 69 |CD..Wi| +peer1.org1.example.com | [323d 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a57b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [323e 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034a57b0 gate 1598907137328704100 evaluation succeeds +peer1.org1.example.com | [323f 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3240 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3241 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3242 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3243 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3244 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3245 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3246 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3247 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3248 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3249 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [324a 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e0 5b ad 9b cf 6e 40 c0 f1 40 11 cb 74 25 eb |..[...n@..@..t%.| +peer1.org1.example.com | 00000010 c1 ba 77 23 51 12 91 bf 1f c3 b4 cd 49 6e bc 28 |..w#Q.......In.(| +peer1.org1.example.com | [324b 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 11 9b 13 4b 9c 6c fc a8 d4 78 |0E.!.....K.l...x| +peer1.org1.example.com | 00000010 76 89 ae 84 b1 25 60 5c 18 f4 05 22 ef f7 5e 24 |v....%`\..."..^$| +peer1.org1.example.com | 00000020 da 0e 69 39 5d 02 20 33 c3 49 af 4c d1 cd 87 ad |..i9]. 3.I.L....| +peer1.org1.example.com | 00000030 c0 da 6c 1f 69 0c 99 cb 76 c8 42 6d 5e f6 4c e0 |..l.i...v.Bm^.L.| +peer1.org1.example.com | 00000040 d7 4d 22 89 0c ad 87 |.M"....| +peer1.org1.example.com | [324c 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [324d 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [324e 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [324f 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3250 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [3251 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3252 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [3253 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3254 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e0 5b ad 9b cf 6e 40 c0 f1 40 11 cb 74 25 eb |..[...n@..@..t%.| +peer1.org1.example.com | 00000010 c1 ba 77 23 51 12 91 bf 1f c3 b4 cd 49 6e bc 28 |..w#Q.......In.(| +peer1.org1.example.com | [3256 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 11 9b 13 4b 9c 6c fc a8 d4 78 |0E.!.....K.l...x| +peer1.org1.example.com | 00000010 76 89 ae 84 b1 25 60 5c 18 f4 05 22 ef f7 5e 24 |v....%`\..."..^$| +peer1.org1.example.com | 00000020 da 0e 69 39 5d 02 20 33 c3 49 af 4c d1 cd 87 ad |..i9]. 3.I.L....| +peer1.org1.example.com | 00000030 c0 da 6c 1f 69 0c 99 cb 76 c8 42 6d 5e f6 4c e0 |..l.i...v.Bm^.L.| +peer1.org1.example.com | 00000040 d7 4d 22 89 0c ad 87 |.M"....| +peer1.org1.example.com | [3255 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3257 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [3258 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 c6 67 15 31 52 79 be be e8 56 |0E.!...g.1Ry...V| +peer1.org1.example.com | 00000010 64 8c 19 3a 92 d4 b4 be 57 ac 5f f0 dd 35 77 83 |d..:....W._..5w.| +peer1.org1.example.com | 00000020 e0 04 72 7a 7c 02 20 01 06 42 09 26 6e 4f b0 4e |..rz|. ..B.&nO.N| +peer1.org1.example.com | 00000030 90 17 21 94 7b 7a 47 bf ab b8 c9 81 80 32 49 ad |..!.{zG......2I.| +peer1.org1.example.com | 00000040 95 c6 11 be 78 4b d4 |....xK.| +peer1.org1.example.com | [3259 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [325a 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [36a6 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [36a7 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [36a8 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [36a9 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [36aa 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [36ab 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [36ac 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098970 gate 1598907134415848300 evaluation starts +peer1.org2.example.com | [36ad 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098970 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [36ae 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098970 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [36af 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [36b0 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098970 principal evaluation fails +peer1.org2.example.com | [36b1 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098970 gate 1598907134415848300 evaluation fails +peer1.org2.example.com | [36b2 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [36b3 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [36b4 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [36b5 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098f50 gate 1598907134416084900 evaluation starts +peer1.org2.example.com | [36b6 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098f50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [36b7 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098f50 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [36b8 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098f50 principal matched by identity 0 +peer1.org2.example.com | [36b9 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org2.example.com | [36ba 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org2.example.com | [36bb 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098f50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [36bc 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003098f50 gate 1598907134416084900 evaluation succeeds +peer1.org2.example.com | [36bd 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [36be 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [36bf 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [36c0 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [36c1 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36c2 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36c3 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [36c4 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [36c5 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [36c6 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [36c7 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [36c8 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [36c9 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008190 gate 1598907134416953100 evaluation starts +peer1.org2.example.com | [36ca 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008190 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [36cb 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008190 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [36cc 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [36cd 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008190 principal evaluation fails +peer1.org2.example.com | [36ce 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008190 gate 1598907134416953100 evaluation fails +peer1.org2.example.com | [36cf 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [36d0 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [36d1 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [36d2 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [36d3 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008700 gate 1598907134420147200 evaluation starts +peer1.org2.example.com | [36d4 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008700 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [36d5 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008700 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [36d6 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008700 principal matched by identity 0 +peer1.org2.example.com | [36d7 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org2.example.com | [36d8 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org2.example.com | [36d9 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008700 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [36da 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003008700 gate 1598907134420147200 evaluation succeeds +peer1.org2.example.com | [36db 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [36dc 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [36dd 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [36de 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [36df 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org2.example.com | [36e0 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org2.example.com | [36e1 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org2.example.com | [36e2 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org2.example.com | [36e3 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [36e4 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [36e5 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org2.example.com | [36e6 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org2.example.com | [36e7 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [36e8 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31a7 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [31a8 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31a9 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31aa 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31ab 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [31ac 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [31ad 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31ae 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" > alive: alive: alive: +peer0.org1.example.com | [31af 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31b0 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31b1 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org1.example.com | [31b2 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31b3 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [31b4 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31b5 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [31b7 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [31b8 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31b9 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [31ba 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3661 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [3662 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3663 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3664 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3665 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3666 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3667 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3668 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3669 08-31 20:52:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [366a 08-31 20:52:09.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [366b 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [366c 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [366d 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [366e 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3670 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3671 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [3672 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4c 7c 08 a4 94 c3 b5 ea c7 0d 64 6c e7 c3 24 df |L|........dl..$.| +peer0.org2.example.com | 00000010 99 6e 10 6e 61 e2 62 d3 ec e1 85 fb 8c 50 fe 89 |.n.na.b......P..| +peer0.org2.example.com | [3673 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 49 7e 45 3d 5c 74 87 d9 bc 0c 1a |0D. ,I~E=\t.....| +peer0.org2.example.com | 00000010 13 ee 79 12 62 a4 ea 93 c8 0a ae e4 5b 81 b8 2f |..y.b.......[../| +peer0.org2.example.com | 00000020 b7 55 c1 07 02 20 75 cd 01 55 b3 bf e4 c5 06 34 |.U... u..U.....4| +peer0.org2.example.com | 00000030 bd 38 fd cb 52 48 08 b6 06 0d b6 a4 84 b0 9f 8d |.8..RH..........| +peer0.org2.example.com | 00000040 4e eb 2b a1 90 cc |N.+...| +peer0.org2.example.com | [3674 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3675 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3676 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3677 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3678 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3679 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [367a 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [367b 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [366f 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [367c 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [367d 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [367e 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [367f 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [36e9 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [36ea 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [36eb 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [36ec 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [36ed 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [36ee 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [36ef 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ff9040 gate 1598907134421927900 evaluation starts +peer1.org2.example.com | [36f0 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ff9040 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [36f1 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ff9040 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [36f2 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ff9040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [36f3 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ff9040 principal evaluation fails +peer1.org2.example.com | [36f4 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ff9040 gate 1598907134421927900 evaluation fails +peer1.org2.example.com | [36f5 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [36f6 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [36f7 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [36f8 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ff95b0 gate 1598907134422173000 evaluation starts +peer1.org2.example.com | [36f9 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ff95b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [36fa 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ff95b0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [36fb 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ff95b0 principal matched by identity 0 +peer1.org2.example.com | [36fc 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org2.example.com | [36fd 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org2.example.com | [36fe 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ff95b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [36ff 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ff95b0 gate 1598907134422173000 evaluation succeeds +peer1.org2.example.com | [3700 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3701 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3702 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3703 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3704 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3705 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3706 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [325b 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [325c 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [325d 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [325e 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [325f 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3260 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3261 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3262 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3263 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3264 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3265 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3266 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [3267 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3268 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [3269 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [326a 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [326b 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [326c 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [326d 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [326e 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [326f 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3270 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3271 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3272 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3273 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3274 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e95b0 gate 1598907137505914600 evaluation starts +peer1.org1.example.com | [3275 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e95b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3276 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e95b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3680 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3681 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3683 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3684 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3682 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3685 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3686 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3687 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3688 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3689 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [368a 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [368b 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [368c 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [368d 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [368e 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [368f 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3690 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [3692 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3693 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3691 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3694 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3695 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3696 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3697 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3698 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org2.example.com | [3699 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org2.example.com | [369a 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [369b 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3707 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3708 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3709 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [370a 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [370b 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [370c 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fdc8d0 gate 1598907134427528600 evaluation starts +peer1.org2.example.com | [370d 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fdc8d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [370e 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fdc8d0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [370f 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fdc8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3710 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fdc8d0 principal evaluation fails +peer1.org2.example.com | [3711 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fdc8d0 gate 1598907134427528600 evaluation fails +peer1.org2.example.com | [3712 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3713 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3714 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3715 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fdceb0 gate 1598907134427791400 evaluation starts +peer1.org2.example.com | [3716 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fdceb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3717 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fdceb0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3718 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fdceb0 principal matched by identity 0 +peer1.org2.example.com | [3719 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org2.example.com | [371a 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org2.example.com | [371b 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fdceb0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [371c 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fdceb0 gate 1598907134427791400 evaluation succeeds +peer1.org2.example.com | [371d 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [371e 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [371f 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3720 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3721 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org2.example.com | [3722 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org2.example.com | [3723 08-31 20:52:14.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3724 08-31 20:52:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3725 08-31 20:52:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3726 08-31 20:52:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3727 08-31 20:52:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3728 08-31 20:52:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3729 08-31 20:52:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [372a 08-31 20:52:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [372b 08-31 20:52:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [372c 08-31 20:52:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [372d 08-31 20:52:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [372e 08-31 20:52:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org2.example.com | [372f 08-31 20:52:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3730 08-31 20:52:15.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3731 08-31 20:52:15.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161035 +peer1.org2.example.com | [3732 08-31 20:52:15.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FFE30984F3A20EA4C96B294A9FA6D7C1FA439AE5C6D16647347A487177438382 +peer1.org2.example.com | [3733 08-31 20:52:15.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [369c 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [369d 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [369e 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [369f 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [36a0 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [36a1 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [36a2 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efbe40 gate 1598907130167514800 evaluation starts +peer0.org2.example.com | [36a3 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efbe40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [36a4 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efbe40 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [36a5 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efbe40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [36a6 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efbe40 principal evaluation fails +peer0.org2.example.com | [36a7 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002efbe40 gate 1598907130167514800 evaluation fails +peer0.org2.example.com | [36a8 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [36a9 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [36aa 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [36ab 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e503b0 gate 1598907130168401700 evaluation starts +peer0.org2.example.com | [36ac 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e503b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [36ad 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e503b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [36ae 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e503b0 principal matched by identity 0 +peer0.org2.example.com | [36af 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [36b0 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org2.example.com | [36b1 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e503b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [36b2 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e503b0 gate 1598907130168401700 evaluation succeeds +peer0.org2.example.com | [36b3 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [36b4 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [36b5 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [36b6 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [36b7 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36b8 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31b6 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [31bb 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31bc 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [31bd 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [31be 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [31bf 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [31c0 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [31c1 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [31c2 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [31c3 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31c4 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [31c5 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31c6 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [31c7 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31c8 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [31c9 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [31ca 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31cb 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [31cc 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [31cd 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [31ce 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31cf 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [31d0 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [31d1 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [31d2 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31d3 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [31d4 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816102E +peer0.org1.example.com | [31d5 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1D32A5085B5D36890C4A2207F8C0BBAF815EC635D50C8FF9285B93D51D823147 +peer0.org1.example.com | [31d6 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [31d7 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [31d8 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [31d9 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:C\010" secret_envelope:q/\205\240;\014\002 O\263\261\343\310\266r<_\026L\250\033~&\233\n\243\226Y\024S\026\221I\250'7\354\306\000\251" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [31da 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31db 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:C\010" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [31dc 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31dd 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:C\010" secret_envelope:q/\205\240;\014\002 O\263\261\343\310\266r<_\026L\250\033~&\233\n\243\226Y\024S\026\221I\250'7\354\306\000\251" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [31de 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31df 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:C\010" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [31e0 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:C\010" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [31e1 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31e2 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:C\010" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [31e4 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31e3 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [31e5 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31e6 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [31e7 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [31e8 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [31e9 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [31ea 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 32 a5 08 5b 5d 36 89 0c 4a 22 07 f8 c0 bb af |.2..[]6..J".....| +peer0.org1.example.com | 00000010 81 5e c6 35 d5 0c 8f f9 28 5b 93 d5 1d 82 31 47 |.^.5....([....1G| +peer0.org1.example.com | [31eb 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 20 4b 9b 56 37 47 b1 a7 58 68 4a |0D. m K.V7G..XhJ| +peer0.org1.example.com | 00000010 2c a7 0e f2 23 b6 f7 9c c2 4f 95 09 80 b0 47 a0 |,...#....O....G.| +peer0.org1.example.com | 00000020 ca d7 85 94 02 20 27 8e 25 2e 24 47 56 b3 2a 69 |..... '.%.$GV.*i| +peer0.org1.example.com | 00000030 9d 97 17 a3 9e f6 07 c2 c3 cb a1 47 2f c5 b7 e2 |...........G/...| +peer0.org1.example.com | 00000040 b6 71 55 3e 43 08 |.qU>C.| +peer0.org1.example.com | [31ec 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [31ed 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org2.example.com | [3734 08-31 20:52:15.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3735 08-31 20:52:15.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3736 08-31 20:52:15.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [3737 08-31 20:52:15.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3738 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3739 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org2.example.com | [373a 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [373b 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [373c 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [373d 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [373e 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [373f 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3740 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3741 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3742 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3743 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3744 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3745 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3746 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3747 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3748 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3749 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [374a 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3277 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e95b0 principal matched by identity 0 +peer1.org1.example.com | [3278 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a d6 45 b8 d3 22 dd e5 7e a8 88 56 61 c5 0c 0b |..E.."..~..Va...| +peer1.org1.example.com | 00000010 b2 c7 e3 7c ec b2 ab 8a a3 4b b3 50 99 fc cd f9 |...|.....K.P....| +peer1.org1.example.com | [3279 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a df 5d bf 7e 74 a9 28 a5 f6 2b be |0D. J.].~t.(..+.| +peer1.org1.example.com | 00000010 9c 6a 08 bc b8 9b cb c9 fa 11 1c a7 6b 8c d8 ff |.j..........k...| +peer1.org1.example.com | 00000020 35 76 a0 1b 02 20 32 4d 85 2d 6e 53 fc c7 18 7a |5v... 2M.-nS...z| +peer1.org1.example.com | 00000030 b7 d2 42 de 2a 9e 7a cf 2c 00 f6 b6 b4 2c 7c 02 |..B.*.z.,....,|.| +peer1.org1.example.com | 00000040 3d 3c f7 3d 17 da |=<.=..| +peer1.org1.example.com | [327a 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e95b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [327b 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e95b0 gate 1598907137505914600 evaluation succeeds +peer1.org1.example.com | [327c 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [327d 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [327e 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [327f 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3280 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3281 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [3282 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3283 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3284 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3285 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3286 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3287 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [3288 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3289 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [328a 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [328b 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [328c 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [328d 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [328e 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [328f 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3290 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3291 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3292 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3293 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3294 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36b9 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [36ba 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [36bb 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [36bc 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [36bd 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [36be 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [36bf 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e515d0 gate 1598907130171414600 evaluation starts +peer0.org2.example.com | [36c0 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e515d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [36c1 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e515d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [36c2 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e515d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [36c3 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e515d0 principal evaluation fails +peer0.org2.example.com | [36c4 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002e515d0 gate 1598907130171414600 evaluation fails +peer0.org2.example.com | [36c5 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [36c6 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [36c7 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [36c8 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002edaf70 gate 1598907130174085200 evaluation starts +peer0.org2.example.com | [36c9 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002edaf70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [36ca 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002edaf70 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [36cb 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002edaf70 principal matched by identity 0 +peer0.org2.example.com | [36cc 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org2.example.com | [36cd 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org2.example.com | [36ce 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002edaf70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [36cf 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002edaf70 gate 1598907130174085200 evaluation succeeds +peer0.org2.example.com | [36d0 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [36d1 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [36d2 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [36d3 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [36d4 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org2.example.com | [36d5 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org2.example.com | [36d6 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [36d7 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [36d8 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36d9 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36da 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36db 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [36dc 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [36dd 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [36de 08-31 20:52:10.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [36df 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [36e0 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [36e1 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a12b10 gate 1598907130180343400 evaluation starts +peer0.org2.example.com | [36e2 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a12b10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [36e3 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a12b10 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [36e4 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a12b10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [36e5 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a12b10 principal evaluation fails +peer0.org2.example.com | [36e6 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a12b10 gate 1598907130180343400 evaluation fails +peer0.org2.example.com | [36e7 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [36e8 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [36e9 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [36ea 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a13080 gate 1598907130182107400 evaluation starts +peer0.org2.example.com | [36eb 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a13080 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [36ec 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a13080 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [36ed 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a13080 principal matched by identity 0 +peer0.org2.example.com | [36ee 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org2.example.com | [36ef 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org2.example.com | [36f0 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a13080 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [36f1 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a13080 gate 1598907130182107400 evaluation succeeds +peer0.org2.example.com | [36f2 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [36f3 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [36f4 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [36f5 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [36f6 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36f7 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [36f8 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3295 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\362(\330/" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [3296 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\362(\330/" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [3297 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3298 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\362(\330/" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [3299 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [329a 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 da 95 59 ce d7 fe 40 7c a7 0a 11 8b 6d 52 83 |...Y...@|....mR.| +peer1.org1.example.com | 00000010 2d be b8 a2 94 b0 89 d7 45 a7 e5 9a e9 af ac b5 |-.......E.......| +peer1.org1.example.com | [329b 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 2f 13 1a f1 c2 e8 a9 04 93 83 c5 |0D. A/..........| +peer1.org1.example.com | 00000010 2a 5c 62 67 80 5a 77 68 97 90 5d f1 44 b4 54 1e |*\bg.Zwh..].D.T.| +peer1.org1.example.com | 00000020 28 da c0 4c 02 20 31 cd ee 59 6c 01 74 19 e1 9e |(..L. 1..Yl.t...| +peer1.org1.example.com | 00000030 87 29 cf 3c 72 70 90 58 15 c2 3c 7f 85 47 fa 36 |.)..(./| +peer1.org1.example.com | [329c 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [329d 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 bc d0 f7 c8 5e 81 96 33 f1 5a |0E.!......^..3.Z| +peer1.org1.example.com | 00000010 34 f5 bb 6b d7 e3 6b 57 50 73 60 0c 69 dc 53 f9 |4..k..kWPs`.i.S.| +peer1.org1.example.com | 00000020 8c bd f9 63 62 02 20 64 93 b7 84 37 92 c8 0e cf |...cb. d...7....| +peer1.org1.example.com | 00000030 5a 74 ea a8 dd c4 f8 b6 f9 b0 44 2f fd ea aa 10 |Zt........D/....| +peer1.org1.example.com | 00000040 ee 70 d3 79 07 04 b5 |.p.y...| +peer1.org1.example.com | [329e 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [329f 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [32a0 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [32a1 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [32a2 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [32a3 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32a4 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32a5 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32a6 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [32a7 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32a8 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32a9 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [374b 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [374c 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [374d 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [374e 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [374f 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3750 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd3ac0 gate 1598907135273799500 evaluation starts +peer1.org2.example.com | [3751 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd3ac0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3752 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd3ac0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3753 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd3ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3754 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd3ac0 principal evaluation fails +peer1.org2.example.com | [3755 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fd3ac0 gate 1598907135273799500 evaluation fails +peer1.org2.example.com | [3756 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3757 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3758 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3759 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb6030 gate 1598907135274050700 evaluation starts +peer1.org2.example.com | [375a 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb6030 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [375b 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb6030 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [375c 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb6030 principal matched by identity 0 +peer1.org2.example.com | [375d 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 22 7d a8 75 eb 64 0c e8 bf 3b 87 b4 87 16 63 |."}.u.d...;....c| +peer1.org2.example.com | 00000010 c4 ab a7 84 58 2b f5 5f 87 74 1c 13 c0 1a 22 21 |....X+._.t...."!| +peer1.org2.example.com | [375e 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 b3 f2 a6 31 57 10 a9 ae e4 cb 9e |0D. ....1W......| +peer1.org2.example.com | 00000010 a5 8d 94 82 49 64 ac 44 14 43 74 02 5a 7a da 96 |....Id.D.Ct.Zz..| +peer1.org2.example.com | 00000020 eb 21 a5 40 02 20 58 52 e1 be 34 53 83 9a cc c7 |.!.@. XR..4S....| +peer1.org2.example.com | 00000030 2d a6 17 3b 30 7d 4e c7 83 9f 5e e4 c3 de 13 0e |-..;0}N...^.....| +peer1.org2.example.com | 00000040 79 35 3a 99 cd df |y5:...| +peer1.org2.example.com | [375f 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb6030 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3760 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002fb6030 gate 1598907135274050700 evaluation succeeds +peer1.org2.example.com | [3761 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3762 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3763 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3764 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3765 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3766 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3767 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3768 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3769 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [376a 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [376b 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [376c 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [376d 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [376e 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [376f 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3770 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3771 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3772 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3773 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3774 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3775 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3776 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [32aa 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\362(\330/" secret_envelope: > alive: +peer1.org1.example.com | [32ab 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [32ac 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32ad 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [32ae 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [32af 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32b0 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32b1 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32b2 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [32b3 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [32b4 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [32b5 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 1 2 3] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [32b6 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32b7 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32b8 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32b9 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [32ba 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [32bb 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32bc 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [32bd 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32be 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [32bf 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32c0 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [32c1 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [32c2 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32c3 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32c4 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32c5 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [32c6 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [32c7 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [32c8 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [32c9 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [32ca 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [32cb 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352b6d0 gate 1598907137928751500 evaluation starts +peer1.org1.example.com | [32cc 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352b6d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [32cd 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352b6d0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [32ce 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352b6d0 principal matched by identity 0 +peer1.org1.example.com | [32d0 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [32cf 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [32d1 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [32d2 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352b6d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [32d3 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00352b6d0 gate 1598907137928751500 evaluation succeeds +peer1.org1.example.com | [32d4 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [32d5 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [32d6 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [32d7 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [32d8 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org1.example.com | [32d9 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org1.example.com | [32da 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org1.example.com | [32db 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org1.example.com | [32dc 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32dd 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32de 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [32df 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [32e0 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [32e1 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [31ee 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 b1 7a 89 d9 8f 68 24 b0 8b 6d |0E.!...z...h$..m| +peer0.org1.example.com | 00000010 25 2f 64 84 35 a7 70 19 b8 ee e2 06 8a a0 3e 71 |%/d.5.p.......>q| +peer0.org1.example.com | 00000020 2f 85 a0 3b 0c 02 20 4f b3 b1 e3 c8 b6 72 3c 5f |/..;.. O.....r<_| +peer0.org1.example.com | 00000030 16 4c a8 1b 7e 26 9b 0a a3 96 59 14 53 16 91 49 |.L..~&....Y.S..I| +peer0.org1.example.com | 00000040 a8 27 37 ec c6 00 a9 |.'7....| +peer0.org1.example.com | [31ef 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [31f0 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [31f1 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31f2 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31f3 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [31f4 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [31f5 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [31f6 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [31f7 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [31f8 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [31f9 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [31fa 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [31fb 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [31fc 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [31fd 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [31fe 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8d930 gate 1598907125612601000 evaluation starts +peer0.org1.example.com | [31ff 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8d930 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3200 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8d930 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3201 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8d930 principal matched by identity 0 +peer0.org1.example.com | [3202 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f bf 80 35 88 b4 5b e6 9f 32 d4 41 b7 09 ed 0f |o..5..[..2.A....| +peer0.org1.example.com | 00000010 34 d7 bd f8 6b 0e 06 76 63 fa 7a 7c a3 3e 80 3a |4...k..vc.z|.>.:| +peer0.org1.example.com | [3203 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fa 65 3f 1e 10 70 c0 a9 4e 51 b4 |0D. U.e?..p..NQ.| +peer0.org1.example.com | 00000010 f3 2c 93 90 53 d0 9b d0 7f 62 a7 f1 0c ef 07 c6 |.,..S....b......| +peer0.org1.example.com | 00000020 a9 50 fc c6 02 20 18 c8 87 be b7 06 63 1b 8d 96 |.P... ......c...| +peer0.org1.example.com | 00000030 82 62 c7 68 41 b0 2c f4 c0 09 14 96 16 92 01 a0 |.b.hA.,.........| +peer0.org1.example.com | 00000040 71 35 0c 02 1b 23 |q5...#| +peer0.org1.example.com | [3204 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8d930 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3205 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8d930 gate 1598907125612601000 evaluation succeeds +peer0.org1.example.com | [3206 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3207 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3208 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3209 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [320a 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [320b 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [320c 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [320d 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 32 a5 08 5b 5d 36 89 0c 4a 22 07 f8 c0 bb af |.2..[]6..J".....| +peer0.org1.example.com | 00000010 81 5e c6 35 d5 0c 8f f9 28 5b 93 d5 1d 82 31 47 |.^.5....([....1G| +peer0.org1.example.com | [320e 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 20 4b 9b 56 37 47 b1 a7 58 68 4a |0D. m K.V7G..XhJ| +peer0.org1.example.com | 00000010 2c a7 0e f2 23 b6 f7 9c c2 4f 95 09 80 b0 47 a0 |,...#....O....G.| +peer0.org1.example.com | 00000020 ca d7 85 94 02 20 27 8e 25 2e 24 47 56 b3 2a 69 |..... '.%.$GV.*i| +peer0.org1.example.com | 00000030 9d 97 17 a3 9e f6 07 c2 c3 cb a1 47 2f c5 b7 e2 |...........G/...| +peer0.org1.example.com | 00000040 b6 71 55 3e 43 08 |.qU>C.| +peer0.org1.example.com | [320f 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3210 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3211 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3212 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3213 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 10 07 8f e4 2b 02 2d 3e fc 47 48 d6 8f 49 ad |.....+.->.GH..I.| +peer0.org1.example.com | 00000010 f2 d8 41 ea bd 99 65 15 93 84 fb f2 3e 69 8d 88 |..A...e.....>i..| +peer0.org1.example.com | [3214 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 ee 06 3e b8 e0 d4 82 23 2c 60 aa |0D. C..>....#,`.| +peer0.org1.example.com | 00000010 9d e7 9e 39 08 8f b3 1f 87 55 47 87 62 d9 88 a3 |...9.....UG.b...| +peer0.org1.example.com | 00000020 5f 1f ee 65 02 20 1d 6c fd 2c 4b 23 d7 eb bc 62 |_..e. .l.,K#...b| +peer0.org1.example.com | 00000030 be 76 b0 77 85 48 ce da cd 6f d0 2b 60 ab bc 00 |.v.w.H...o.+`...| +peer0.org1.example.com | 00000040 5c 73 bc 0e 0d 58 |\s...X| +peer0.org1.example.com | [3215 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3216 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3217 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3218 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [3219 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [321a 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [321b 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [321c 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [321d 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [321e 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [321f 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3220 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3221 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3222 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe040 gate 1598907125614713500 evaluation starts +peer0.org1.example.com | [3223 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe040 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [36f9 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [36fa 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [36fb 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [36fc 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [36fd 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [36fe 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f2280 gate 1598907130186420000 evaluation starts +peer0.org2.example.com | [36ff 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f2280 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3700 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f2280 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3701 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f2280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3702 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f2280 principal evaluation fails +peer0.org2.example.com | [3703 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f2280 gate 1598907130186420000 evaluation fails +peer0.org2.example.com | [3704 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3705 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3706 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3707 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f27f0 gate 1598907130187830400 evaluation starts +peer0.org2.example.com | [3708 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f27f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3709 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f27f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [370a 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f27f0 principal matched by identity 0 +peer0.org2.example.com | [370b 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [370c 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org2.example.com | [370d 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f27f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [370e 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029f27f0 gate 1598907130187830400 evaluation succeeds +peer0.org2.example.com | [370f 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3710 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3711 08-31 20:52:10.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3712 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3713 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org2.example.com | [3714 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org2.example.com | [3715 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org2.example.com | [3716 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org2.example.com | [3717 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3718 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3719 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [371a 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [371b 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32e2 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [32e3 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [32e4 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035896b0 gate 1598907137930754900 evaluation starts +peer1.org1.example.com | [32e5 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035896b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [32e6 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035896b0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [32e7 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035896b0 principal matched by identity 0 +peer1.org1.example.com | [32e8 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org1.example.com | [32e9 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org1.example.com | [32ea 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035896b0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [32eb 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035896b0 gate 1598907137930754900 evaluation succeeds +peer1.org1.example.com | [32ec 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [32ed 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [32ee 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [32ef 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [32f0 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [32f1 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [32f2 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32f3 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32f4 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [32f5 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [32f6 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [32f7 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [32f8 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [32f9 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [32fa 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [32fb 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359eb00 gate 1598907137933435600 evaluation starts +peer1.org1.example.com | [32fc 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359eb00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [32fd 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359eb00 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [32fe 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359eb00 principal matched by identity 0 +peer1.org1.example.com | [32ff 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org1.example.com | [3300 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org1.example.com | [3301 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359eb00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3302 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00359eb00 gate 1598907137933435600 evaluation succeeds +peer1.org1.example.com | [3303 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3304 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3305 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3306 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3307 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org1.example.com | [3308 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org1.example.com | [3309 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org1.example.com | [330a 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org1.example.com | [330b 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [330c 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [330d 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [330e 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [330f 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3310 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3311 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3312 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3313 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ccae0 gate 1598907137934885100 evaluation starts +peer1.org1.example.com | [3314 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ccae0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3315 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ccae0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3316 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ccae0 principal matched by identity 0 +peer1.org1.example.com | [3317 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [3318 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [3319 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ccae0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [331a 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035ccae0 gate 1598907137934885100 evaluation succeeds +peer1.org1.example.com | [331b 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [331c 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [331d 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [331e 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [331f 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3320 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3321 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org1.example.com | [3322 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org1.example.com | [3323 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org1.example.com | [3324 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org2.example.com | [3777 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3778 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3779 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [377a 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [377b 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [377c 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [377d 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [377e 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [377f 08-31 20:52:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3780 08-31 20:52:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3781 08-31 20:52:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3782 08-31 20:52:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3783 08-31 20:52:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3784 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3785 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3786 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3787 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3788 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3789 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af b2 10 8a be 07 43 03 c5 53 59 74 3f 2b 84 bb |......C..SYt?+..| +peer1.org2.example.com | 00000010 eb 3f 1d 1e b1 3f 26 f7 1a 82 b3 69 0b 46 e5 11 |.?...?&....i.F..| +peer1.org2.example.com | [378a 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 84 cf 51 90 23 91 bd dc ab 79 |0E.!....Q.#....y| +peer1.org2.example.com | 00000010 3b 5d 3b e1 35 2f 28 9c 70 66 78 b3 34 c7 bc 50 |;];.5/(.pfx.4..P| +peer1.org2.example.com | 00000020 92 b4 0e 1b 03 02 20 58 37 d4 56 13 28 d1 3a 50 |...... X7.V.(.:P| +peer1.org2.example.com | 00000030 c6 d3 a3 6b 9a 18 12 c5 ae a9 af 46 7d e5 30 bc |...k.......F}.0.| +peer1.org2.example.com | 00000040 48 dc 90 2d 63 89 92 |H..-c..| +peer1.org2.example.com | [378b 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [378c 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [378d 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [378e 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [378f 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3790 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3791 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3792 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3793 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3794 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3795 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3224 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe040 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3225 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe040 principal matched by identity 0 +peer0.org1.example.com | [3226 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e 74 70 5f 69 da ef 58 05 f1 9d 10 2e d6 70 |..tp_i..X......p| +peer0.org1.example.com | 00000010 3a de 14 88 17 ee d0 42 51 d5 a6 46 8d f5 8c 3d |:......BQ..F...=| +peer0.org1.example.com | [3227 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a c0 56 b6 72 65 1b f5 d5 29 c0 a2 |0D. *.V.re...)..| +peer0.org1.example.com | 00000010 58 56 5c 65 a7 0b 2c 94 80 c5 ce 83 ac be f6 54 |XV\e..,........T| +peer0.org1.example.com | 00000020 2f 31 e3 48 02 20 5b 2a ae cd 07 ba a2 8e 32 f3 |/1.H. [*......2.| +peer0.org1.example.com | 00000030 dd 1c 0d 2d 4b c6 ed e9 22 79 c7 aa 01 3d 20 6f |...-K..."y...= o| +peer0.org1.example.com | 00000040 8b 81 64 ef ec 80 |..d...| +peer0.org1.example.com | [3228 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe040 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3229 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe040 gate 1598907125614713500 evaluation succeeds +peer0.org1.example.com | [322a 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [322b 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [322c 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [322d 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [322e 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [322f 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3230 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3231 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 32 a5 08 5b 5d 36 89 0c 4a 22 07 f8 c0 bb af |.2..[]6..J".....| +peer0.org1.example.com | 00000010 81 5e c6 35 d5 0c 8f f9 28 5b 93 d5 1d 82 31 47 |.^.5....([....1G| +peer0.org1.example.com | [3232 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 20 4b 9b 56 37 47 b1 a7 58 68 4a |0D. m K.V7G..XhJ| +peer0.org1.example.com | 00000010 2c a7 0e f2 23 b6 f7 9c c2 4f 95 09 80 b0 47 a0 |,...#....O....G.| +peer0.org1.example.com | 00000020 ca d7 85 94 02 20 27 8e 25 2e 24 47 56 b3 2a 69 |..... '.%.$GV.*i| +peer0.org1.example.com | 00000030 9d 97 17 a3 9e f6 07 c2 c3 cb a1 47 2f c5 b7 e2 |...........G/...| +peer0.org1.example.com | 00000040 b6 71 55 3e 43 08 |.qU>C.| +peer0.org1.example.com | [3233 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3234 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3235 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3236 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3237 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 10 07 8f e4 2b 02 2d 3e fc 47 48 d6 8f 49 ad |.....+.->.GH..I.| +peer0.org1.example.com | 00000010 f2 d8 41 ea bd 99 65 15 93 84 fb f2 3e 69 8d 88 |..A...e.....>i..| +peer0.org1.example.com | [3238 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 ee 06 3e b8 e0 d4 82 23 2c 60 aa |0D. C..>....#,`.| +peer0.org1.example.com | 00000010 9d e7 9e 39 08 8f b3 1f 87 55 47 87 62 d9 88 a3 |...9.....UG.b...| +peer0.org1.example.com | 00000020 5f 1f ee 65 02 20 1d 6c fd 2c 4b 23 d7 eb bc 62 |_..e. .l.,K#...b| +peer0.org1.example.com | 00000030 be 76 b0 77 85 48 ce da cd 6f d0 2b 60 ab bc 00 |.v.w.H...o.+`...| +peer0.org1.example.com | 00000040 5c 73 bc 0e 0d 58 |\s...X| +peer0.org1.example.com | [3239 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [323a 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [323b 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [323c 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [323d 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [323e 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [323f 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3240 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3241 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3242 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3243 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3244 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3245 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org1.example.com | [3246 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org1.example.com | [3247 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer0.org1.example.com | [3248 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org1.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org1.example.com | [3249 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer0.org1.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer0.org1.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer0.org1.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer0.org1.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer0.org1.example.com | [324a 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [324b 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [324c 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [324d 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [324e 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [324f 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3250 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3251 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3252 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91c90 gate 1598907125682547100 evaluation starts +peer0.org1.example.com | [3253 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91c90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3254 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91c90 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3255 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91c90 principal matched by identity 0 +peer0.org1.example.com | [3256 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer0.org1.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer0.org1.example.com | [3257 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer0.org1.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer0.org1.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer0.org1.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer0.org1.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer0.org1.example.com | [3258 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91c90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3259 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91c90 gate 1598907125682547100 evaluation succeeds +peer0.org1.example.com | [325a 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [325b 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [325c 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [325d 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [325e 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [325f 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3260 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3261 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3262 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3263 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3264 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3265 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3266 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfae90 gate 1598907125683299900 evaluation starts +peer0.org1.example.com | [3267 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfae90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3268 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfae90 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3269 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfae90 principal matched by identity 0 +peer0.org1.example.com | [326a 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +peer0.org1.example.com | 00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +peer0.org1.example.com | [326b 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +peer0.org1.example.com | 00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +peer0.org1.example.com | 00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +peer0.org1.example.com | 00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +peer0.org1.example.com | 00000040 95 10 dc 3c 55 b0 |... DEBU 0xc003cfae90 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [326d 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfae90 gate 1598907125683299900 evaluation succeeds +peer0.org1.example.com | [326e 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [326f 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3270 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3271 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3272 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org1.example.com | [3273 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org1.example.com | [3274 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3275 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3276 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3277 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3278 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3279 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14010 gate 1598907125684475700 evaluation starts +peer0.org1.example.com | [327a 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14010 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [327b 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14010 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [327c 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [327d 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14010 principal evaluation fails +peer0.org1.example.com | [327e 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14010 gate 1598907125684475700 evaluation fails +peer0.org1.example.com | [327f 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3280 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3281 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3282 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14580 gate 1598907125684852700 evaluation starts +peer0.org1.example.com | [3283 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14580 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3284 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14580 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3285 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14580 principal matched by identity 0 +peer0.org1.example.com | [3286 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org1.example.com | [3287 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org1.example.com | [3288 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3289 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [328a 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14580 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [328b 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14580 gate 1598907125684852700 evaluation succeeds +peer0.org1.example.com | [328c 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer0.org1.example.com | [328d 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [328e 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [328f 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3290 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3291 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [3292 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3293 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3294 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3295 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3296 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3297 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3298 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org1.example.com | [3299 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [329a 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org1.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org1.example.com | [329b 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer0.org1.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer0.org1.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer0.org1.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer0.org1.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer0.org1.example.com | [329c 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [329d 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [329e 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer0.org1.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer0.org1.example.com | [329f 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer0.org1.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer0.org1.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer0.org1.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer0.org1.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer0.org1.example.com | [32a0 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32a1 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32a2 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [32a3 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32a4 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32a5 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [32a6 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [32a7 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [32a8 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d367b0 gate 1598907125693416100 evaluation starts +peer0.org1.example.com | [32a9 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d367b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [32aa 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d367b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [32ab 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d367b0 principal matched by identity 0 +peer0.org1.example.com | [32ac 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +peer0.org1.example.com | 00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +peer1.org2.example.com | [3796 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3797 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3798 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3799 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [379a 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [379b 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [379c 08-31 20:52:15.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [379d 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [379e 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [379f 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37a0 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [37a1 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37a2 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [37a3 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37a4 08-31 20:52:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [37a5 08-31 20:52:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37a6 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [37a7 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37a8 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [37a9 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [37aa 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [37ab 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [371c 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [371d 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [371e 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [371f 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3720 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3721 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3722 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029dadc0 gate 1598907130196490300 evaluation starts +peer0.org2.example.com | [3723 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029dadc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3724 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029dadc0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3725 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029dadc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3726 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029dadc0 principal evaluation fails +peer0.org2.example.com | [3727 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029dadc0 gate 1598907130196490300 evaluation fails +peer0.org2.example.com | [3728 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3729 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [372a 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [372b 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029db330 gate 1598907130198318700 evaluation starts +peer0.org2.example.com | [372c 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029db330 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [372d 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029db330 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [372e 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029db330 principal matched by identity 0 +peer0.org2.example.com | [372f 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [3730 08-31 20:52:10.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org2.example.com | [3731 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029db330 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3732 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029db330 gate 1598907130198318700 evaluation succeeds +peer0.org2.example.com | [3733 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3734 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3735 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3736 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3737 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3738 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3739 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [373a 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [37ac 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [37ad 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [37ae 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [37af 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [37b0 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [37b1 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26ae0 gate 1598907135518173900 evaluation starts +peer1.org2.example.com | [37b2 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26ae0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [37b3 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26ae0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [37b4 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [37b5 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26ae0 principal evaluation fails +peer1.org2.example.com | [37b6 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f26ae0 gate 1598907135518173900 evaluation fails +peer1.org2.example.com | [37b7 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [37b8 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [37b9 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [37ba 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f27050 gate 1598907135518633700 evaluation starts +peer1.org2.example.com | [37bb 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f27050 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [37bc 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f27050 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [37bd 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f27050 principal matched by identity 0 +peer1.org2.example.com | [37be 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 24 c8 49 ef c3 73 d9 c9 24 28 8e 37 d6 83 2f |.$.I..s..$(.7../| +peer1.org2.example.com | 00000010 be 5d dd 53 2d eb f4 14 50 23 24 49 aa bb d2 20 |.].S-...P#$I... | +peer1.org2.example.com | [37bf 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 6c a1 89 b1 de fa 74 43 87 1b d8 |0D. {l.....tC...| +peer1.org2.example.com | 00000010 36 1c 66 60 79 25 8d 80 aa cd ed 43 3c 85 ac 8e |6.f`y%.....C<...| +peer1.org2.example.com | 00000020 b8 85 b5 36 02 20 3f eb 19 18 80 93 ad 47 5b 06 |...6. ?......G[.| +peer1.org2.example.com | 00000030 26 e9 2b b1 65 11 ea b6 c8 8f 06 b3 ba 98 b1 84 |&.+.e...........| +peer1.org2.example.com | 00000040 fb 5f 3b ca bd 8d |._;...| +peer1.org2.example.com | [37c0 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f27050 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [37c1 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f27050 gate 1598907135518633700 evaluation succeeds +peer1.org2.example.com | [37c2 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [37c3 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [37c4 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [37c5 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [37c6 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [37c7 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [37c8 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [37c9 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [37ca 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [37cb 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37cc 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37cd 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37ce 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [37cf 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [37d0 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [37d1 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [37d2 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [37d3 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [37d4 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [37d5 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [37d6 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37d7 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3325 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3326 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3327 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3328 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3329 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [332a 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [332b 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [332c 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [332d 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f6c60 gate 1598907137936345400 evaluation starts +peer1.org1.example.com | [332e 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f6c60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [332f 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f6c60 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3330 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f6c60 principal matched by identity 0 +peer1.org1.example.com | [3331 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [3332 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [3333 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f6c60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3334 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f6c60 gate 1598907137936345400 evaluation succeeds +peer1.org1.example.com | [3335 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3336 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3337 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3338 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3339 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [333a 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [373b 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [373c 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [373d 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [373e 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [373f 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6530 gate 1598907130203431400 evaluation starts +peer0.org2.example.com | [3740 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6530 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3741 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6530 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3742 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3743 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6530 principal evaluation fails +peer0.org2.example.com | [3744 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6530 gate 1598907130203431400 evaluation fails +peer0.org2.example.com | [3745 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3746 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3747 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3748 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6aa0 gate 1598907130204095900 evaluation starts +peer0.org2.example.com | [3749 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6aa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [374a 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6aa0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [374b 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6aa0 principal matched by identity 0 +peer0.org2.example.com | [374c 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org2.example.com | [374d 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org2.example.com | [374e 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6aa0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [374f 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029c6aa0 gate 1598907130204095900 evaluation succeeds +peer0.org2.example.com | [3750 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3751 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3752 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3753 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3754 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org2.example.com | [3755 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org2.example.com | [3756 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org2.example.com | [3757 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org2.example.com | [3758 08-31 20:52:10.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3759 08-31 20:52:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [375a 08-31 20:52:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [375b 08-31 20:52:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [375c 08-31 20:52:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [375d 08-31 20:52:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [375e 08-31 20:52:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [375f 08-31 20:52:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3760 08-31 20:52:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3761 08-31 20:52:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org2.example.com | [3762 08-31 20:52:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org2.example.com | [3763 08-31 20:52:10.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3764 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [37d8 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [37d9 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37da 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [37db 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37dc 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [37dd 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [37de 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [37df 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [37e0 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37e1 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [37e2 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [37e3 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37e4 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [37e5 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37e6 08-31 20:52:16.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [37e7 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [37e8 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [37ea 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [37eb 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [37e9 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [37ec 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [37ef 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37ed 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [37f1 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [37f2 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37f3 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [37f4 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [37ee 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37f0 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [37f5 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37f6 08-31 20:52:16.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [37f7 08-31 20:52:16.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [37f8 08-31 20:52:16.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37f9 08-31 20:52:16.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [37fa 08-31 20:52:16.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [37fb 08-31 20:52:16.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [37fc 08-31 20:52:16.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [37fd 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [37fe 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161036 +peer1.org2.example.com | [37ff 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 692275EED7B75FEFEF01A6D39FC42619DC92509903D9714A23FA017571B1BA7C +peer1.org2.example.com | [3800 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3801 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3802 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3803 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3804 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3805 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3806 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [3807 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3808 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3809 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [380a 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [380b 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [380c 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [380d 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [380e 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [380f 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3810 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3811 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3812 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3813 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3814 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 22 75 ee d7 b7 5f ef ef 01 a6 d3 9f c4 26 19 |i"u..._.......&.| +peer1.org2.example.com | 00000010 dc 92 50 99 03 d9 71 4a 23 fa 01 75 71 b1 ba 7c |..P...qJ#..uq..|| +peer1.org2.example.com | [3815 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 5c bc b9 d0 e9 32 c4 85 69 fd 8a |0D. .\....2..i..| +peer1.org2.example.com | 00000010 86 a2 14 bc 8f d4 11 6d f3 1b 94 0e ed e8 dc 12 |.......m........| +peer1.org2.example.com | 00000020 b1 d4 3a 0d 02 20 6a 63 7e ed 6d 99 28 6f 2e c0 |..:.. jc~.m.(o..| +peer1.org2.example.com | 00000030 e0 7e 50 e0 55 4c cf 50 1a ee 99 07 49 aa e3 ee |.~P.UL.P....I...| +peer1.org2.example.com | 00000040 43 44 ef 85 57 69 |CD..Wi| +peer1.org2.example.com | [3816 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3817 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3818 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3819 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [381a 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [381b 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [381c 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [381d 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [381e 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 22 75 ee d7 b7 5f ef ef 01 a6 d3 9f c4 26 19 |i"u..._.......&.| +peer1.org2.example.com | 00000010 dc 92 50 99 03 d9 71 4a 23 fa 01 75 71 b1 ba 7c |..P...qJ#..uq..|| +peer1.org2.example.com | [381f 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 5c bc b9 d0 e9 32 c4 85 69 fd 8a |0D. .\....2..i..| +peer1.org2.example.com | 00000010 86 a2 14 bc 8f d4 11 6d f3 1b 94 0e ed e8 dc 12 |.......m........| +peer1.org2.example.com | 00000020 b1 d4 3a 0d 02 20 6a 63 7e ed 6d 99 28 6f 2e c0 |..:.. jc~.m.(o..| +peer1.org2.example.com | 00000030 e0 7e 50 e0 55 4c cf 50 1a ee 99 07 49 aa e3 ee |.~P.UL.P....I...| +peer1.org2.example.com | 00000040 43 44 ef 85 57 69 |CD..Wi| +peer1.org2.example.com | [3820 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3821 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3822 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3823 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3824 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3825 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3826 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3827 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3828 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 22 75 ee d7 b7 5f ef ef 01 a6 d3 9f c4 26 19 |i"u..._.......&.| +peer1.org2.example.com | 00000010 dc 92 50 99 03 d9 71 4a 23 fa 01 75 71 b1 ba 7c |..P...qJ#..uq..|| +peer1.org2.example.com | [3829 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 5c bc b9 d0 e9 32 c4 85 69 fd 8a |0D. .\....2..i..| +peer1.org2.example.com | 00000010 86 a2 14 bc 8f d4 11 6d f3 1b 94 0e ed e8 dc 12 |.......m........| +peer1.org2.example.com | 00000020 b1 d4 3a 0d 02 20 6a 63 7e ed 6d 99 28 6f 2e c0 |..:.. jc~.m.(o..| +peer1.org2.example.com | 00000030 e0 7e 50 e0 55 4c cf 50 1a ee 99 07 49 aa e3 ee |.~P.UL.P....I...| +peer1.org2.example.com | 00000040 43 44 ef 85 57 69 |CD..Wi| +peer1.org2.example.com | [382a 08-31 20:52:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [382b 08-31 20:52:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 19 bd 62 71 89 59 57 e6 d2 7c 95 |0D. ...bq.YW..|.| +peer1.org2.example.com | 00000010 1c 17 93 d7 cb 6c 16 9e c5 a4 e7 0f 64 7f cd d6 |.....l......d...| +peer1.org2.example.com | 00000020 c6 3f 14 02 02 20 1d e8 2c f0 15 b0 fb 2b ea d1 |.?... ..,....+..| +peer1.org2.example.com | 00000030 51 80 37 6d 20 fb ea bc 3d 2f b7 44 b6 0d 31 d0 |Q.7m ...=/.D..1.| +peer1.org2.example.com | 00000040 d4 4d 48 24 a1 79 |.MH$.y| +peer1.org2.example.com | [382c 08-31 20:52:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [382d 08-31 20:52:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [382e 08-31 20:52:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [382f 08-31 20:52:17.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3830 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3831 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3832 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3833 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3834 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3835 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3836 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3837 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3838 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3839 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [383a 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [383b 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [383c 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [383d 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [383e 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [383f 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3840 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [333b 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [333c 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [333d 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [333e 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [333f 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3340 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3341 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f7e60 gate 1598907137937396500 evaluation starts +peer1.org1.example.com | [3342 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f7e60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3343 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f7e60 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3344 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f7e60 principal matched by identity 0 +peer1.org1.example.com | [3345 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org1.example.com | [3346 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org1.example.com | [3347 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f7e60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3348 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f7e60 gate 1598907137937396500 evaluation succeeds +peer1.org1.example.com | [3349 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [334a 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [334b 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [334c 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [334d 08-31 20:52:17.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [334e 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [334f 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3350 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [3351 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3352 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3353 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3354 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [3355 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3356 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [3357 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [3358 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer1.org1.example.com | [3359 08-31 20:52:18.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [335a 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [335b 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [335c 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [335d 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3765 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3766 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3767 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3768 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3769 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [376a 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [376b 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [376c 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [376d 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [376e 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [376f 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029516c0 gate 1598907130277952300 evaluation starts +peer0.org2.example.com | [3770 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029516c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3771 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029516c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3772 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029516c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3773 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029516c0 principal evaluation fails +peer0.org2.example.com | [3774 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029516c0 gate 1598907130277952300 evaluation fails +peer0.org2.example.com | [3775 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3776 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3777 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3778 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002951c30 gate 1598907130279265200 evaluation starts +peer0.org2.example.com | [3779 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002951c30 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [377a 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002951c30 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [377b 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002951c30 principal matched by identity 0 +peer0.org2.example.com | [377c 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 1a 64 11 3f c3 8d 28 fa 7e 8c 29 bb e8 69 72 |Q.d.?..(.~.)..ir| +peer0.org2.example.com | 00000010 c2 7c fa d0 15 71 24 71 48 38 16 3e 1a 87 45 a9 |.|...q$qH8.>..E.| +peer0.org2.example.com | [377d 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 27 2b ab 42 71 9b 91 52 60 15 30 |0D. 3'+.Bq..R`.0| +peer0.org2.example.com | 00000010 bd f8 5e 24 43 56 4a 86 6f b2 3b 2c 21 bb c9 92 |..^$CVJ.o.;,!...| +peer0.org2.example.com | 00000020 6a 32 d9 a1 02 20 7c 1a 38 39 03 75 8d 83 20 30 |j2... |.89.u.. 0| +peer0.org2.example.com | 00000030 c0 25 73 b2 03 da 95 ea 5d 16 2a c8 76 d6 9c fa |.%s.....].*.v...| +peer0.org2.example.com | 00000040 54 56 d3 3a ce cb |TV.:..| +peer0.org2.example.com | [377e 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002951c30 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [377f 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002951c30 gate 1598907130279265200 evaluation succeeds +peer0.org2.example.com | [3780 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3781 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [32ad 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +peer0.org1.example.com | 00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +peer0.org1.example.com | 00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +peer0.org1.example.com | 00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +peer0.org1.example.com | 00000040 95 10 dc 3c 55 b0 |... DEBU 0xc003d367b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [32af 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d367b0 gate 1598907125693416100 evaluation succeeds +peer0.org1.example.com | [32b0 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32b1 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32b2 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [32b3 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [32b4 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32b5 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32b6 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [32b7 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32b8 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32b9 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [32ba 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [32bb 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [32bc 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d379b0 gate 1598907125700147700 evaluation starts +peer0.org1.example.com | [32bd 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d379b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [32be 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d379b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [32bf 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d379b0 principal matched by identity 0 +peer0.org1.example.com | [32c0 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [335e 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [335f 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3360 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3361 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3362 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3363 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3364 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3365 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [3366 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [3367 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3b 1b 63 19 0d bb 5d 21 90 f3 8d 81 47 28 97 47 |;.c...]!....G(.G| +peer1.org1.example.com | 00000010 7d 17 b3 de c5 ad 01 46 34 86 b1 09 85 bd b9 6f |}......F4......o| +peer1.org1.example.com | [3368 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d e3 00 d5 3b 8b b7 a4 4c 1a 7c ff |0D. ]...;...L.|.| +peer1.org1.example.com | 00000010 40 64 2a 4a 00 a2 2d 06 2d ae ec 73 77 e5 62 8c |@d*J..-.-..sw.b.| +peer1.org1.example.com | 00000020 9c 66 d0 30 02 20 15 ae 30 d6 1e 52 c4 2d 0c 87 |.f.0. ..0..R.-..| +peer1.org1.example.com | 00000030 94 3b 16 e7 14 67 f5 f5 e5 2f 56 86 b2 ef 53 01 |.;...g.../V...S.| +peer1.org1.example.com | 00000040 4b 17 fd a6 6c 1e |K...l.| +peer1.org1.example.com | [3369 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [336a 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [336b 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [336c 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [336d 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41188 bytes, seq: 6}, Envelope: 41221 bytes, Signature: 0 bytes +peer1.org1.example.com | [336e 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41188 bytes, seq: 6}, Envelope: 41221 bytes, Signature: 0 bytes +peer1.org1.example.com | [336f 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3370 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3371 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer1.org1.example.com | [3372 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3373 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org1.example.com | [3374 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361fae0 gate 1598907139406102100 evaluation starts +peer1.org1.example.com | [3375 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361fae0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3376 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361fae0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3377 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361fae0 principal matched by identity 0 +peer1.org1.example.com | [3378 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 31 5f 42 ab c1 88 47 d7 5c e3 57 9c b2 4a a9 |V1_B...G.\.W..J.| +peer1.org1.example.com | 00000010 c7 3d 74 e2 1b 6b f5 64 fc 8f fe d9 3b 04 0c 9b |.=t..k.d....;...| +peer1.org1.example.com | [3379 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b 71 4a d0 06 df 4f ae e8 1d 8c 46 |0D. KqJ...O....F| +peer1.org1.example.com | 00000010 e2 2e 17 30 72 48 e6 56 24 87 15 73 86 50 5f 1a |...0rH.V$..s.P_.| +peer1.org1.example.com | 00000020 34 03 0e f8 02 20 64 d6 50 26 22 c3 4b f8 73 fa |4.... d.P&".K.s.| +peer1.org1.example.com | 00000030 1b d8 f5 80 26 90 8f c4 63 ec f9 e8 c4 b8 4a d2 |....&...c.....J.| +peer1.org1.example.com | 00000040 99 25 90 f7 6e a5 |.%..n.| +peer1.org1.example.com | [337a 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361fae0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [337b 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361fae0 gate 1598907139406102100 evaluation succeeds +peer1.org1.example.com | [337c 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [337d 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer1.org1.example.com | [337e 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [337f 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer1.org1.example.com | [3380 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41188 bytes, seq: 6}, Envelope: 41221 bytes, Signature: 0 bytes to the block puller +peer1.org1.example.com | [3381 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +peer1.org1.example.com | [3382 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3383 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer1.org1.example.com | [3384 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer1.org1.example.com | [3385 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer1.org1.example.com | [3386 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +peer1.org1.example.com | [3387 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +peer1.org1.example.com | [3388 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer1.org1.example.com | [3389 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +peer1.org1.example.com | [338a 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +peer0.org1.example.com | [32c1 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org1.example.com | [32c2 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d379b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [32c3 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d379b0 gate 1598907125700147700 evaluation succeeds +peer0.org1.example.com | [32c4 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32c5 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32c6 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [32c7 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [32c8 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [32c9 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32ca 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32cb 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32cc 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [32cd 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [32ce 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [32cf 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d564f0 gate 1598907125712702600 evaluation starts +peer0.org1.example.com | [32d0 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d564f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [32d1 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d564f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [32d2 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d564f0 principal matched by identity 0 +peer0.org1.example.com | [32d3 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org1.example.com | [32d4 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org1.example.com | [32d5 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d564f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [32d6 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d564f0 gate 1598907125712702600 evaluation succeeds +peer0.org1.example.com | [32d7 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32d8 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32d9 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [32da 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [32db 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [32dc 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +peer0.org1.example.com | [32dd 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32de 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +peer0.org1.example.com | 00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +peer0.org1.example.com | [32df 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +peer0.org1.example.com | 00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +peer0.org1.example.com | 00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +peer0.org1.example.com | 00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +peer0.org1.example.com | 00000040 86 ca 58 09 73 c4 |..X.s.| +peer0.org1.example.com | [32e0 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +peer0.org1.example.com | 00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +peer0.org1.example.com | [32e1 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +peer0.org1.example.com | 00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +peer0.org1.example.com | 00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +peer0.org1.example.com | 00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +peer0.org1.example.com | 00000040 b0 b6 9e bd e0 6f |.....o| +peer0.org1.example.com | [32e2 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32e3 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [338b 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer1.org1.example.com | [338c 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002822900 env 0xc003618ff0 txn 0 +peer1.org1.example.com | [338d 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc003618ff0 +peer1.org1.example.com | [338e 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\203\306\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\350c\034\327\214\356\327|\351\320\253\304j\r0\333\310\276\276\324\377\007\237t" +peer1.org1.example.com | [338f 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer1.org1.example.com | [3390 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [3391 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [3392 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3393 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer1.org1.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer1.org1.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer1.org1.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer1.org1.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer1.org1.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer1.org1.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3394 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer1.org1.example.com | [3395 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer1.org1.example.com | [3396 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer1.org1.example.com | [3397 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [3398 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 91 49 22 67 d4 21 5a c5 5d ba b6 53 95 4a 0e |p.I"g.!Z.]..S.J.| +peer1.org1.example.com | 00000010 ee fd 0a 4b 0b b3 b0 39 d0 4f 7a 03 2f 68 d7 2b |...K...9.Oz./h.+| +peer1.org1.example.com | [3399 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b 0e 7b 4c 2d fb 5c 6a 92 7b 58 8b |0D. ..{L-.\j.{X.| +peer1.org1.example.com | 00000010 0a 94 e5 5d d9 f6 e0 78 df 56 82 b4 e5 6a e7 97 |...]...x.V...j..| +peer1.org1.example.com | 00000020 4a d7 3d d0 02 20 37 8c 68 5f 50 c0 44 97 70 a1 |J.=.. 7.h_P.D.p.| +peer1.org1.example.com | 00000030 6d 73 fc 0e d0 ba 0e f6 ad 2a 7d 93 67 93 90 59 |ms.......*}.g..Y| +peer1.org1.example.com | 00000040 46 c7 bb 03 af ad |F.....| +peer1.org1.example.com | [339a 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [339b 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0036fc000, header channel_header:"\010\001\032\006\010\203\306\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\350c\034\327\214\356\327|\351\320\253\304j\r0\333\310\276\276\324\377\007\237t" +peer1.org1.example.com | [339c 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer1.org1.example.com | [339d 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [339e 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [339f 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33a0 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33a1 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33a2 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33a3 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33a4 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [33a5 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [33a6 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [33a7 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [33a8 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [33a9 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [33aa 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [33ab 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [33ac 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [33ad 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [33ae 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer1.org1.example.com | [33af 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer1.org1.example.com | [33b0 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer1.org1.example.com | [33b1 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org1.example.com | [33b2 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer1.org1.example.com | [33b3 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer1.org1.example.com | [33b4 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org1.example.com | [33b5 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [33b6 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org1.example.com | [33b7 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org1.example.com | [33b8 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [33b9 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [33ba 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org1.example.com | [33bb 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [33bc 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer1.org1.example.com | [33bd 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer1.org1.example.com | [33be 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer1.org1.example.com | [33bf 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +peer1.org1.example.com | [33c0 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +peer1.org1.example.com | [33c1 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +peer1.org1.example.com | [33c2 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +peer1.org1.example.com | [33c3 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +peer1.org1.example.com | [33c4 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [33c5 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [33c6 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer1.org1.example.com | [33c7 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [33c8 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [33c9 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer1.org1.example.com | [33ca 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [33cb 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer1.org1.example.com | [33cc 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +peer1.org1.example.com | [33cd 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [33ce 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer1.org1.example.com | [33cf 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer1.org1.example.com | [33d0 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e090 gate 1598907139428543800 evaluation starts +peer1.org1.example.com | [33d1 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e090 signed by 0 principal evaluation starts (used [false false false]) +peer1.org1.example.com | [33d2 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e090 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [33d3 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e090 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [33d4 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e090 processing identity 1 with bytes of 115a4b0 +peer1.org1.example.com | [33d5 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org1.example.com | [33d6 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org1.example.com | [33d7 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [33d8 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [33d9 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org1.example.com | [33da 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [33db 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e090 principal matched by identity 1 +peer1.org1.example.com | [33dc 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c 16 ac 57 86 d3 c3 21 1e c6 7b f6 f4 33 15 53 |...W...!..{..3.S| +peer1.org1.example.com | 00000010 51 0a 12 8c c9 dc af 08 54 64 1f 16 1c 10 79 1c |Q.......Td....y.| +peer1.org1.example.com | [33dd 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 5d cb e8 72 66 8f d2 c7 ff a3 |0E.!..]..rf.....| +peer1.org1.example.com | 00000010 aa d3 dc 46 c5 bd 34 a5 d8 7d dc a8 35 2c d6 29 |...F..4..}..5,.)| +peer1.org1.example.com | 00000020 07 b0 75 b1 d5 02 20 0a ef 18 c5 de bf be 2c 7c |..u... .......,|| +peer1.org1.example.com | 00000030 16 ea 9e 3a ba 4b 56 95 85 92 21 ee 94 17 ad 3b |...:.KV...!....;| +peer1.org1.example.com | 00000040 78 aa 13 9c c2 d4 33 |x.....3| +peer1.org1.example.com | [33de 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e090 principal evaluation succeeds for identity 1 +peer1.org1.example.com | [33df 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e090 gate 1598907139428543800 evaluation succeeds +peer1.org1.example.com | [33e0 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [33e1 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer1.org1.example.com | [33e2 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer1.org1.example.com | [33e3 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer1.org1.example.com | [33e4 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e9c0 gate 1598907139436770900 evaluation starts +peer1.org1.example.com | [33e5 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e9c0 signed by 0 principal evaluation starts (used [false false false]) +peer1.org1.example.com | [33e6 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e9c0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [33e7 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e9c0 principal matched by identity 0 +peer1.org1.example.com | [33e8 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 79 4d e9 a3 71 1d 24 0f fe ed 23 9d 11 9b 00 |tyM..q.$...#....| +peer1.org1.example.com | 00000010 3e 25 10 29 78 cb 07 bc 16 8a c0 53 e9 e3 ae 76 |>%.)x......S...v| +peer1.org1.example.com | [33e9 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 6e 97 55 ce e1 8f 4a 2e 44 e9 |0E.!..n.U...J.D.| +peer1.org1.example.com | 00000010 86 cc c7 d8 15 32 92 11 5c 0f ae 9c 24 1e e3 31 |.....2..\...$..1| +peer1.org1.example.com | 00000020 b0 8c 3d 39 f2 02 20 6c 7f 82 68 b5 f7 a9 fc 04 |..=9.. l..h.....| +peer1.org1.example.com | 00000030 9c c0 f7 ee 68 f9 99 1d 35 23 c7 b2 62 e6 51 30 |....h...5#..b.Q0| +peer1.org1.example.com | 00000040 4f f1 8e 15 f4 64 79 |O....dy| +peer1.org1.example.com | [33ea 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e9c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [33eb 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00375e9c0 gate 1598907139436770900 evaluation succeeds +peer1.org1.example.com | [33ec 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [33ed 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer1.org1.example.com | [33ee 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +peer1.org1.example.com | [33ef 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +peer1.org1.example.com | [33f0 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +peer1.org1.example.com | [33f1 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +peer1.org1.example.com | [33f2 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [33f3 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +peer1.org1.example.com | [33f4 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [33f5 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [33f6 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [33f7 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [33f8 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org1.example.com | [33f9 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [33fa 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [33fb 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [33fc 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [33fd 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [33fe 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [33ff 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3400 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3401 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org2.example.com | [3841 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3842 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3843 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3844 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3845 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3846 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3847 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a0a690 gate 1598907137322332900 evaluation starts +peer1.org2.example.com | [3848 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a0a690 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3849 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a0a690 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [384a 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a0a690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [384b 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a0a690 principal evaluation fails +peer1.org2.example.com | [384c 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a0a690 gate 1598907137322332900 evaluation fails +peer1.org2.example.com | [384d 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [384e 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [384f 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3850 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a0ac00 gate 1598907137322771300 evaluation starts +peer1.org2.example.com | [3851 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a0ac00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3852 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a0ac00 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3853 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a0ac00 principal matched by identity 0 +peer1.org2.example.com | [3854 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e0 5b ad 9b cf 6e 40 c0 f1 40 11 cb 74 25 eb |..[...n@..@..t%.| +peer1.org2.example.com | 00000010 c1 ba 77 23 51 12 91 bf 1f c3 b4 cd 49 6e bc 28 |..w#Q.......In.(| +peer1.org2.example.com | [3855 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 11 9b 13 4b 9c 6c fc a8 d4 78 |0E.!.....K.l...x| +peer1.org2.example.com | 00000010 76 89 ae 84 b1 25 60 5c 18 f4 05 22 ef f7 5e 24 |v....%`\..."..^$| +peer1.org2.example.com | 00000020 da 0e 69 39 5d 02 20 33 c3 49 af 4c d1 cd 87 ad |..i9]. 3.I.L....| +peer1.org2.example.com | 00000030 c0 da 6c 1f 69 0c 99 cb 76 c8 42 6d 5e f6 4c e0 |..l.i...v.Bm^.L.| +peer1.org2.example.com | 00000040 d7 4d 22 89 0c ad 87 |.M"....| +peer1.org2.example.com | [3856 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a0ac00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3857 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002a0ac00 gate 1598907137322771300 evaluation succeeds +peer1.org2.example.com | [3858 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3859 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [385a 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [385b 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [385c 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [385d 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [385e 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [385f 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3860 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3861 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3862 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3863 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3864 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [3865 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3866 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3867 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3868 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3869 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [386a 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3782 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3783 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3784 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3785 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3786 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3787 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3788 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3789 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [378a 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [378b 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [378c 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [378d 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [378e 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [378f 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3790 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3791 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3792 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3793 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3794 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3795 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3796 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3797 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3798 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3799 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [379a 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [379b 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [379c 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [379d 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [379f 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [379e 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [37a0 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [37a1 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37a2 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [37a3 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37a4 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [37a5 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161031 +peer0.org2.example.com | [37a6 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E2D6B50A357C05ECFA462DFC01A162DDE4E2998A6493BDF588D51308D0A212B7 +peer0.org2.example.com | [37a7 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [37a8 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [386b 08-31 20:52:17.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [386c 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [386d 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [386e 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [386f 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [3870 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3871 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3872 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3873 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3874 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3875 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3876 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a d6 45 b8 d3 22 dd e5 7e a8 88 56 61 c5 0c 0b |..E.."..~..Va...| +peer1.org2.example.com | 00000010 b2 c7 e3 7c ec b2 ab 8a a3 4b b3 50 99 fc cd f9 |...|.....K.P....| +peer1.org2.example.com | [3877 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a df 5d bf 7e 74 a9 28 a5 f6 2b be |0D. J.].~t.(..+.| +peer1.org2.example.com | 00000010 9c 6a 08 bc b8 9b cb c9 fa 11 1c a7 6b 8c d8 ff |.j..........k...| +peer1.org2.example.com | 00000020 35 76 a0 1b 02 20 32 4d 85 2d 6e 53 fc c7 18 7a |5v... 2M.-nS...z| +peer1.org2.example.com | 00000030 b7 d2 42 de 2a 9e 7a cf 2c 00 f6 b6 b4 2c 7c 02 |..B.*.z.,....,|.| +peer1.org2.example.com | 00000040 3d 3c f7 3d 17 da |=<.=..| +peer1.org2.example.com | [3878 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [3879 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd a9 3d f3 4a 3a ae 34 10 f5 ef |0E.!...=.J:.4...| +peer1.org2.example.com | 00000010 3f e2 1c 2d 86 c7 ee ea 93 3a 7c e9 60 bb ef ac |?..-.....:|.`...| +peer1.org2.example.com | 00000020 20 af 3c 1d d9 02 20 0d d6 c5 45 f4 df 0a 65 be | .<... ...E...e.| +peer1.org2.example.com | 00000030 4e 2f 16 73 b2 0d 10 9a 39 b9 ee 23 6d 52 46 4f |N/.s....9..#mRFO| +peer1.org2.example.com | 00000040 b0 89 94 11 5b 4f b7 |....[O.| +peer1.org2.example.com | [387a 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [387b 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [3402 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [3403 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3404 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3405 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer1.org1.example.com | [3406 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +peer1.org1.example.com | [3407 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +peer1.org1.example.com | [3408 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org1.example.com | [3409 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer1.org1.example.com | [340a 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [340b 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [340c 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [340d 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer1.org1.example.com | [340e 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer1.org1.example.com | [340f 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer1.org1.example.com | [3410 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer1.org1.example.com | [3411 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer1.org1.example.com | [3412 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [3413 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer1.org1.example.com | [3414 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer1.org1.example.com | [3415 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer1.org1.example.com | [3416 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer1.org1.example.com | [3417 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer1.org1.example.com | [3418 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer1.org1.example.com | [3419 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [341a 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer1.org1.example.com | [341b 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer1.org1.example.com | [341c 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [341d 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [341e 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer1.org1.example.com | [341f 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [3420 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [3421 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer1.org1.example.com | [3422 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer1.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer1.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer1.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer1.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer1.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer1.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer1.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer1.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer1.org1.example.com | nw== +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3423 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer1.org1.example.com | [3424 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer1.org1.example.com | [3425 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer1.org1.example.com | [3426 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [3427 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [3428 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [3429 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [342a 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +peer1.org1.example.com | [342b 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +peer1.org1.example.com | [342c 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [342d 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [342e 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +peer1.org1.example.com | [342f 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +peer1.org1.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +peer1.org1.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +peer1.org1.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3430 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [3431 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [3432 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [3433 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [3434 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer1.org1.example.com | [3435 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer1.org1.example.com | [3436 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [3437 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [3438 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer1.org1.example.com | [3439 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer1.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer1.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer1.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org1.example.com | [32e4 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [32e5 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32e6 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [32e7 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [32e8 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [32e9 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [32ea 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d72720 gate 1598907125721071700 evaluation starts +peer0.org1.example.com | [32eb 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d72720 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [32ec 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d72720 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [32ed 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d72720 principal matched by identity 0 +peer0.org1.example.com | [32ee 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +peer0.org1.example.com | 00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +peer0.org1.example.com | [32ef 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +peer0.org1.example.com | 00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +peer0.org1.example.com | 00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +peer0.org1.example.com | 00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +peer0.org1.example.com | 00000040 b8 e5 d0 6d 1c 3c |...m.<| +peer0.org1.example.com | [32f0 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d72720 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [32f1 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d72720 gate 1598907125721071700 evaluation succeeds +peer0.org1.example.com | [32f2 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32f3 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [32f4 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [32f5 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [32f6 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32f7 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [32f8 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [32f9 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [387c 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [387d 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [387e 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [387f 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3880 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3881 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3882 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [3883 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3884 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3885 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3886 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [3887 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [3888 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3889 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [388a 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [388b 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [388c 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [388d 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [388e 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [388f 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3890 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3891 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [3892 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3893 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\362(\330/" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3894 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3895 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\362(\330/" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3896 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3897 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3898 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3899 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [389a 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [389b 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [389c 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [389d 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [389e 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029cd100 gate 1598907137597661400 evaluation starts +peer1.org2.example.com | [389f 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029cd100 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [38a0 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029cd100 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [38a1 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029cd100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [38a2 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029cd100 principal evaluation fails +peer1.org2.example.com | [38a3 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029cd100 gate 1598907137597661400 evaluation fails +peer1.org2.example.com | [38a4 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [38a5 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [38a6 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [38a7 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029cd670 gate 1598907137597981200 evaluation starts +peer1.org2.example.com | [38a8 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029cd670 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [38a9 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029cd670 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [38aa 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029cd670 principal matched by identity 0 +peer1.org2.example.com | [38ab 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 da 95 59 ce d7 fe 40 7c a7 0a 11 8b 6d 52 83 |...Y...@|....mR.| +peer1.org2.example.com | 00000010 2d be b8 a2 94 b0 89 d7 45 a7 e5 9a e9 af ac b5 |-.......E.......| +peer1.org2.example.com | [38ac 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 2f 13 1a f1 c2 e8 a9 04 93 83 c5 |0D. A/..........| +peer1.org2.example.com | 00000010 2a 5c 62 67 80 5a 77 68 97 90 5d f1 44 b4 54 1e |*\bg.Zwh..].D.T.| +peer1.org2.example.com | 00000020 28 da c0 4c 02 20 31 cd ee 59 6c 01 74 19 e1 9e |(..L. 1..Yl.t...| +peer1.org2.example.com | 00000030 87 29 cf 3c 72 70 90 58 15 c2 3c 7f 85 47 fa 36 |.)..(./| +peer1.org2.example.com | [38ad 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029cd670 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [38ae 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029cd670 gate 1598907137597981200 evaluation succeeds +peer1.org2.example.com | [38af 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [38b0 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [38b1 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [38b2 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [38b3 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [38b4 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [38b5 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [38b6 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [38b7 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [38b8 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38b9 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38ba 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38bb 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [38bc 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38bd 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38be 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38bf 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [38c0 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\362(\330/" > alive: alive: +peer1.org2.example.com | [38c1 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [38c2 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38c3 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [38c4 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38c5 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38c6 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38c7 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38c8 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [38c9 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [38ca 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38cb 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38cc 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38cd 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38ce 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [38cf 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [38d0 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38d1 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38d2 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38d3 08-31 20:52:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [38d4 08-31 20:52:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [38d5 08-31 20:52:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [38d6 08-31 20:52:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [38d7 08-31 20:52:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [38d8 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38d9 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38da 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [37a9 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [32fa 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [38db 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [37aa 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [343a 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [32fb 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [38dc 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37ab 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [343b 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [32fc 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [38dd 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [37ac 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [343c 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [32fd 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [38de 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37ad 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [343d 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [32fe 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d73920 gate 1598907125726743100 evaluation starts +peer1.org2.example.com | [38df 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [37ae 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [343e 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer0.org1.example.com | [32ff 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d73920 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [38e0 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37af 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer1.org1.example.com | [343f 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org1.example.com | [3300 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d73920 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [38e1 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [37b0 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3440 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [3301 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d73920 principal matched by identity 0 +peer1.org2.example.com | [38e2 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [37b1 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3441 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [3302 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org2.example.com | [38e3 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org2.example.com | [37b2 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3442 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org2.example.com | [37b3 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3443 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [3303 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org2.example.com | [38e4 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org2.example.com | [37b4 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org2.example.com | [37b5 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org2.example.com | [37b6 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org2.example.com | [37b7 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org2.example.com | [37b8 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [3304 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d73920 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [38e5 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37b9 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | [3305 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d73920 gate 1598907125726743100 evaluation succeeds +peer1.org2.example.com | [38e6 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37ba 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | [3306 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [38e7 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [37bb 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org1.example.com | [3307 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [38e8 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [37bc 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | [3308 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [38e9 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [37bd 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org1.example.com | [3309 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [38ea 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [37be 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | [330a 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [38eb 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [37bf 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org1.example.com | [330b 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [38ec 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [37c0 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org1.example.com | [330c 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [38ed 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291ead0 gate 1598907138413854500 evaluation starts +peer0.org2.example.com | [37c2 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [330d 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [38ee 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291ead0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [37c1 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [3444 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +peer0.org1.example.com | [330e 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [38ef 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291ead0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3445 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +peer0.org2.example.com | [37c4 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [330f 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [38f0 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291ead0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [3446 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [37c5 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 5 1 2] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [3310 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d86460 gate 1598907125731466700 evaluation starts +peer1.org2.example.com | [38f1 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291ead0 principal evaluation fails +peer1.org1.example.com | [3447 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [37c6 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3311 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d86460 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [38f2 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291ead0 gate 1598907138413854500 evaluation fails +peer1.org1.example.com | [3448 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [37c3 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3312 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d86460 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [38f3 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3449 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | [37c7 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3313 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d86460 principal matched by identity 0 +peer1.org2.example.com | [38f4 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [344a 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | [37c8 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3314 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org2.example.com | [38f5 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [344b 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org2.example.com | [37c9 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e4ed0 gate 1598907130506909000 evaluation starts +peer0.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org2.example.com | [38f6 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [344c 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org2.example.com | [37ca 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e4ed0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3315 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org1.example.com | [344d 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +peer1.org2.example.com | [38f7 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291f040 gate 1598907138414186300 evaluation starts +peer0.org2.example.com | [37cb 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e4ed0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org1.example.com | [344e 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +peer1.org2.example.com | [38f8 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291f040 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [37cc 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e4ed0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org1.example.com | [344f 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +peer1.org2.example.com | [38f9 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291f040 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [37cd 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e4ed0 principal evaluation fails +peer0.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org1.example.com | [3450 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +peer1.org2.example.com | [38fa 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291f040 principal matched by identity 0 +peer0.org2.example.com | [37ce 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e4ed0 gate 1598907130506909000 evaluation fails +peer0.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org1.example.com | [3451 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer1.org2.example.com | [38fb 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | [37cf 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3316 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d86460 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3452 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer1.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [37d0 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3317 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d86460 gate 1598907125731466700 evaluation succeeds +peer1.org1.example.com | [3453 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer1.org2.example.com | [38fc 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | [37d1 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3318 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3454 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer1.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | [37d2 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e5440 gate 1598907130508550600 evaluation starts +peer0.org1.example.com | [3319 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3455 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer1.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | [37d3 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e5440 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [331a 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3456 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer1.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org2.example.com | [37d4 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e5440 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [331b 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3457 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer1.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org2.example.com | [37d5 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e5440 principal matched by identity 0 +peer0.org1.example.com | [331c 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3458 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer1.org2.example.com | [38fd 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291f040 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [37d6 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b 35 9a dd 9f 54 2e 35 d9 eb 40 82 02 e8 a7 6d |[5...T.5..@....m| +peer0.org1.example.com | [331d 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3459 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer1.org2.example.com | [38fe 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00291f040 gate 1598907138414186300 evaluation succeeds +peer0.org2.example.com | 00000010 14 10 c6 20 59 e3 e0 1d e4 47 cf 39 f1 c4 3b 66 |... Y....G.9..;f| +peer0.org1.example.com | [331e 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org1.example.com | [345a 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org2.example.com | [37d7 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6e b3 ef 21 94 45 6d bd b3 71 01 19 |0D. n..!.Em..q..| +peer0.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org1.example.com | [345b 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | 00000010 97 fc a0 4f 36 60 6d a2 df a9 30 b1 09 a3 90 07 |...O6`m...0.....| +peer1.org2.example.com | [38ff 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [331f 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org1.example.com | [345c 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | 00000020 0d ba 3c 84 02 20 4d 66 53 59 09 5e 6d 25 ab d8 |..<.. MfSY.^m%..| +peer1.org2.example.com | [3900 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org1.example.com | [345d 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org2.example.com | 00000030 6a c8 f5 38 4f 5f b1 06 b9 1f e2 d4 e2 c4 58 d3 |j..8O_........X.| +peer1.org2.example.com | [3901 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org1.example.com | [345e 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org2.example.com | 00000040 dd 52 88 ea db f4 |.R....| +peer1.org2.example.com | [3902 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org1.example.com | [345f 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [37d8 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e5440 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3903 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org1.example.com | [3460 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | [37d9 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0028e5440 gate 1598907130508550600 evaluation succeeds +peer1.org2.example.com | [3904 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3320 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3461 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | [37da 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3905 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3321 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3462 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org2.example.com | [37db 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3906 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3322 08-31 20:52:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37dc 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3907 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3323 08-31 20:52:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3463 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [37dd 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3908 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3324 08-31 20:52:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer1.org1.example.com | [3464 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | [37de 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3909 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3325 08-31 20:52:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3465 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | [37df 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [390a 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3326 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3466 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org2.example.com | [37e0 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [390b 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287e2c0 gate 1598907138420680900 evaluation starts +peer1.org1.example.com | [3467 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org1.example.com | [3327 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [37e1 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [390c 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287e2c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3468 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org1.example.com | [3328 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [37e2 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [390d 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287e2c0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3469 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [3329 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37e3 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [390e 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287e2c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [346a 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org1.example.com | [332a 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org2.example.com | [37e4 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [390f 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287e2c0 principal evaluation fails +peer1.org1.example.com | [346b 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org1.example.com | [332b 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org2.example.com | [37e5 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3910 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287e2c0 gate 1598907138420680900 evaluation fails +peer1.org1.example.com | [346c 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org1.example.com | [332c 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37e6 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3911 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [346d 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org1.example.com | [332d 08-31 20:52:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [37e7 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3912 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [346e 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org1.example.com | [332e 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37e8 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3913 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [346f 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org1.example.com | [332f 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [37e9 08-31 20:52:10.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3914 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287e850 gate 1598907138421083600 evaluation starts +peer1.org1.example.com | [3470 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org1.example.com | [3330 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [37ea 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3915 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287e850 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3331 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3471 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org2.example.com | [37eb 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3916 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287e850 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3332 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [3472 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org2.example.com | [37ec 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3917 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287e850 principal matched by identity 0 +peer0.org1.example.com | [3333 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org1.example.com | [3473 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [37ed 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org2.example.com | [3918 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org1.example.com | [3474 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer0.org2.example.com | [37ee 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3334 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org1.example.com | [3475 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer0.org2.example.com | [37ef 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org2.example.com | [3919 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org1.example.com | [3476 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [37f0 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org1.example.com | [3477 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org2.example.com | [37f1 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org1.example.com | [3478 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org2.example.com | [37f2 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org1.example.com | [3479 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org2.example.com | [37f3 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3335 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org1.example.com | [347a 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [37f4 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3336 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [391a 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287e850 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [347b 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [37f5 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3337 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org2.example.com | [391b 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00287e850 gate 1598907138421083600 evaluation succeeds +peer1.org1.example.com | [347c 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [37f6 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org2.example.com | [391c 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [347d 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [37f7 08-31 20:52:10.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3338 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org2.example.com | [391d 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [347e 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org2.example.com | [391e 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [37f8 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [347f 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org2.example.com | [391f 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [37f9 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3480 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer1.org2.example.com | [3920 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org2.example.com | [37fa 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3481 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org2.example.com | [37fb 08-31 20:52:10.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3482 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org2.example.com | [3921 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org2.example.com | [37fc 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3483 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [3339 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org2.example.com | [37fd 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3484 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [333a 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org2.example.com | [37fe 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [3485 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [333b 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org2.example.com | [37ff 08-31 20:52:12.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3486 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [333c 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org2.example.com | [3800 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [3487 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [333d 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [3922 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3801 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3488 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer1.org2.example.com | [3923 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3802 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [3489 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [333e 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3924 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3803 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [348a 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [333f 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3925 08-31 20:52:18.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3804 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 5c a2 78 e0 1f 04 7e 3b 4f 8e b8 2b c1 1e af |Q\.x...~;O..+...| +peer1.org1.example.com | [348b 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [3340 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3926 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 06 66 70 37 7b a7 be 74 db 4c 83 18 71 e0 de 96 |.fp7{..t.L..q...| +peer1.org1.example.com | [348c 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [3341 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org2.example.com | [3927 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3805 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 59 0f 8f d3 2c 9f a8 ea 33 65 98 |0D. dY...,...3e.| +peer1.org1.example.com | [348d 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org2.example.com | [3928 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 5d d4 d4 a8 74 a7 52 d2 5f 2c 06 5d 35 0a d0 59 |]...t.R._,.]5..Y| +peer1.org1.example.com | [348e 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org1.example.com | [3342 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org2.example.com | [3929 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [348f 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org2.example.com | [392a 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | 00000020 6e 38 f0 42 02 20 7d f5 47 0a 5e ed 53 b1 f6 05 |n8.B. }.G.^.S...| +peer1.org1.example.com | [3490 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org2.example.com | [392b 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000030 af e0 d7 06 d5 32 67 41 93 83 c4 06 e7 9d 18 31 |.....2gA.......1| +peer1.org1.example.com | [3491 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org2.example.com | [392c 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000040 0e fe 14 61 d9 19 |...a..| +peer1.org1.example.com | [3492 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org2.example.com | [392d 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002802530 gate 1598907138432937600 evaluation starts +peer0.org2.example.com | [3806 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | [3493 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org1.example.com | [3343 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [392e 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002802530 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org1.example.com | [3494 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org1.example.com | [3344 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [392f 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002802530 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3495 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org1.example.com | [3345 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36872 +peer1.org2.example.com | [3930 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002802530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3807 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9e c5 f2 7d c7 a1 2e 8f 00 61 de |0E.!....}.....a.| +peer1.org1.example.com | [3496 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org1.example.com | [3346 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003d94820 +peer1.org2.example.com | [3931 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002802530 principal evaluation fails +peer0.org2.example.com | 00000010 1a af ba ff 54 c0 9e e8 25 2a 74 0e 89 8c 8f 21 |....T...%*t....!| +peer1.org1.example.com | [3497 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [3347 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [3932 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002802530 gate 1598907138432937600 evaluation fails +peer0.org2.example.com | 00000020 eb 38 24 fc eb 02 20 12 68 61 82 c4 c9 df 19 0c |.8$... .ha......| +peer1.org1.example.com | [3498 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [3348 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [3933 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000030 a4 b7 15 b8 e5 dc b5 c9 cc b5 04 82 05 be b0 8d |................| +peer1.org1.example.com | [3499 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [3349 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [3934 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000040 63 84 6c d9 e3 ce 17 |c.l....| +peer1.org1.example.com | [349a 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [334a 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org2.example.com | [3935 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3808 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [349b 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [334b 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [3936 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002802aa0 gate 1598907138433921800 evaluation starts +peer1.org1.example.com | [349c 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +peer0.org2.example.com | [3809 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [334c 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 e8 fc 9e c8 58 2b e8 a4 2a 74 f4 e4 e5 90 bd |2....X+..*t.....| +peer1.org2.example.com | [3937 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002802aa0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [349d 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [380a 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | 00000010 6f ea c0 53 56 10 b7 89 04 ee 90 f1 53 7c a3 8f |o..SV.......S|..| +peer1.org1.example.com | [349e 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org2.example.com | [3938 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002802aa0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [380b 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [334d 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 51 6c be 92 96 2e f8 65 a3 f4 |0E.!..Ql.....e..| +peer1.org2.example.com | [3939 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002802aa0 principal matched by identity 0 +peer0.org2.example.com | [380c 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [349f 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org1.example.com | 00000010 4d 35 57 83 f6 1d 31 cc 13 61 c7 ed 3f 9c a8 d5 |M5W...1..a..?...| +peer1.org2.example.com | [393a 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org2.example.com | [380d 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34a0 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org1.example.com | 00000020 9d e7 43 ea 90 02 20 32 7d f2 e3 46 9b 9e 93 90 |..C... 2}..F....| +peer1.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org2.example.com | [380e 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34a1 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org1.example.com | 00000030 93 3f 74 49 d9 ba d2 00 e6 59 03 15 8a 0e ac 96 |.?tI.....Y......| +peer1.org2.example.com | [393b 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org2.example.com | [380f 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34a2 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | 00000040 7d 8a 3e 1c f7 92 49 |}.>...I| +peer1.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org2.example.com | [3810 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [34a3 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [334e 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org2.example.com | [3811 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34a4 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org1.example.com | [334f 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003b37420, header 0xc003d94c30 +peer0.org2.example.com | [3812 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34a5 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org1.example.com | [3350 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer1.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org2.example.com | [3813 08-31 20:52:13.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [34a6 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org1.example.com | [3351 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][56716c61] processing txid: 56716c6173a161fcd343f3906acba073428ece07d80c8eba3888fc963cb28e46 +peer1.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org2.example.com | [3814 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [34a7 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org1.example.com | [3352 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [56716c6173a161fcd343f3906acba073428ece07d80c8eba3888fc963cb28e46] +peer1.org2.example.com | [393c 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002802aa0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3815 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34a8 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org1.example.com | [3353 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [393d 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002802aa0 gate 1598907138433921800 evaluation succeeds +peer0.org2.example.com | [3816 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [3354 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [56716c6173a161fcd343f3906acba073428ece07d80c8eba3888fc963cb28e46] +peer1.org1.example.com | [34a9 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org2.example.com | [393e 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3817 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3355 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][56716c61] Entry chaincode: name:"lscc" +peer1.org1.example.com | [34aa 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org2.example.com | [393f 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3818 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3356 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][56716c61] Entry chaincode: name:"lscc" +peer1.org1.example.com | [34ab 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org2.example.com | [3940 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3819 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3357 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [34ac 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org2.example.com | [3941 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [381a 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3358 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/ChaincodeExists +peer1.org1.example.com | [34ad 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org2.example.com | [3942 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [381b 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3359 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org1.example.com | [34ae 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +peer1.org2.example.com | [3943 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [381c 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [335a 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [34af 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org2.example.com | [3944 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [381d 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [335b 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [34b0 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org2.example.com | [3945 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [381e 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [335c 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [34b1 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org2.example.com | [3946 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [381f 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [335d 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddced0 gate 1598907126062830700 evaluation starts +peer1.org1.example.com | [34b2 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3947 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3820 08-31 20:52:13.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [335e 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddced0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [34b3 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3948 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3821 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [335f 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddced0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [34b4 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3949 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3822 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3360 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddced0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [394a 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002803d90 gate 1598907138435973400 evaluation starts +peer0.org2.example.com | [3823 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3361 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddced0 principal evaluation fails +peer1.org2.example.com | [394b 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002803d90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [34b5 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3824 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3362 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddced0 gate 1598907126062830700 evaluation fails +peer1.org2.example.com | [394c 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002803d90 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [34b6 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3825 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3363 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [394d 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002803d90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [34b7 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003864d20 gate 1598907139498565900 evaluation starts +peer0.org2.example.com | [3826 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3364 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [394e 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002803d90 principal evaluation fails +peer1.org1.example.com | [34b8 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003864d20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3827 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3365 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [394f 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002803d90 gate 1598907138435973400 evaluation fails +peer1.org1.example.com | [34b9 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003864d20 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3828 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3366 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd440 gate 1598907126065692600 evaluation starts +peer1.org2.example.com | [3950 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [34ba 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003864d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3829 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3367 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd440 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3951 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [34bb 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003864d20 principal evaluation fails +peer0.org2.example.com | [382a 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3368 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd440 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3952 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [34bc 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003864d20 gate 1598907139498565900 evaluation fails +peer0.org2.example.com | [382b 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3369 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd440 principal matched by identity 0 +peer1.org2.example.com | [3953 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274e300 gate 1598907138436373000 evaluation starts +peer1.org1.example.com | [34bd 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [382c 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027cf720 gate 1598907133318032500 evaluation starts +peer0.org1.example.com | [336a 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 e8 fc 9e c8 58 2b e8 a4 2a 74 f4 e4 e5 90 bd |2....X+..*t.....| +peer1.org2.example.com | [3954 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274e300 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [34be 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [382d 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027cf720 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000010 6f ea c0 53 56 10 b7 89 04 ee 90 f1 53 7c a3 8f |o..SV.......S|..| +peer1.org2.example.com | [3955 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274e300 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [34bf 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [382e 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027cf720 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [336b 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 51 6c be 92 96 2e f8 65 a3 f4 |0E.!..Ql.....e..| +peer1.org2.example.com | [3956 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274e300 principal matched by identity 0 +peer1.org1.example.com | [34c0 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003865290 gate 1598907139498905400 evaluation starts +peer0.org2.example.com | [382f 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027cf720 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | 00000010 4d 35 57 83 f6 1d 31 cc 13 61 c7 ed 3f 9c a8 d5 |M5W...1..a..?...| +peer1.org2.example.com | [3957 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org1.example.com | [34c1 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003865290 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3830 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027cf720 principal evaluation fails +peer0.org1.example.com | 00000020 9d e7 43 ea 90 02 20 32 7d f2 e3 46 9b 9e 93 90 |..C... 2}..F....| +peer1.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org1.example.com | [34c2 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003865290 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3831 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027cf720 gate 1598907133318032500 evaluation fails +peer0.org1.example.com | 00000030 93 3f 74 49 d9 ba d2 00 e6 59 03 15 8a 0e ac 96 |.?tI.....Y......| +peer1.org2.example.com | [3958 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org1.example.com | [34c3 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003865290 principal matched by identity 0 +peer0.org2.example.com | [3832 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000040 7d 8a 3e 1c f7 92 49 |}.>...I| +peer1.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org1.example.com | [34c4 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | [3833 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [336c 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd440 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [3834 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [336d 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd440 gate 1598907126065692600 evaluation succeeds +peer1.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org1.example.com | [34c5 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | [3835 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027cfc90 gate 1598907133318462400 evaluation starts +peer0.org1.example.com | [336e 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | [3836 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027cfc90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [336f 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3959 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274e300 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | [3837 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027cfc90 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3370 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [395a 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00274e300 gate 1598907138436373000 evaluation succeeds +peer1.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org2.example.com | [3838 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027cfc90 principal matched by identity 0 +peer0.org1.example.com | [3371 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [395b 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org2.example.com | [3839 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 27 bc e0 21 ac 9f 49 12 2b cb f7 70 85 98 71 |W'..!..I.+..p..q| +peer0.org1.example.com | [3372 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [56716c61] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer1.org2.example.com | [395c 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [34c6 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003865290 principal evaluation succeeds for identity 0 +peer0.org2.example.com | 00000010 12 35 bd 3c 32 7c cc 4a 6e f0 0a dc c2 0c e9 e6 |.5.<2|.Jn.......| +peer0.org1.example.com | [3373 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [56716c61] handling GET_STATE from chaincode +peer1.org2.example.com | [395d 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [34c7 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003865290 gate 1598907139498905400 evaluation succeeds +peer0.org2.example.com | [383a 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 21 fc 14 f8 3c 39 da 81 0f b6 |0E.!..!...<9....| +peer1.org2.example.com | [395e 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3374 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [56716c61] getting state for chaincode lscc, key exp02, channel businesschannel +peer1.org1.example.com | [34c8 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000010 17 d5 a3 68 c7 e5 c4 03 fc 86 a5 b4 ec f8 54 d2 |...h..........T.| +peer1.org2.example.com | [395f 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org1.example.com | [3375 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | 00000020 d2 86 34 73 52 02 20 77 42 50 c8 3e 6b ff f9 75 |..4sR. wBP.>k..u| +peer1.org2.example.com | [3960 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org1.example.com | [3376 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [56716c61] Completed GET_STATE. Sending RESPONSE +peer1.org1.example.com | [34c9 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000030 a4 4b 8d 4f a8 db 54 d3 dd d3 bf 5c 87 26 8d 67 |.K.O..T....\.&.g| +peer1.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org1.example.com | [3377 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [56716c61] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [34ca 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000040 01 c0 b7 05 c0 2a a2 |.....*.| +peer1.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org1.example.com | [3378 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [56716c61] notifying Txid:56716c6173a161fcd343f3906acba073428ece07d80c8eba3888fc963cb28e46, channelID:businesschannel +peer1.org1.example.com | [34cb 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [383b 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027cfc90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org1.example.com | [3379 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [34cc 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [383c 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027cfc90 gate 1598907133318462400 evaluation succeeds +peer1.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org1.example.com | [337a 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][56716c61] Exit chaincode: name:"lscc" (12ms) +peer1.org1.example.com | [34cd 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [383d 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3961 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org1.example.com | [337b 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | [34ce 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [383e 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org1.example.com | [337c 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [56716c6173a161fcd343f3906acba073428ece07d80c8eba3888fc963cb28e46] +peer1.org1.example.com | [34cf 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [383f 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3962 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org1.example.com | [337d 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][56716c61] Exit +peer1.org1.example.com | [34d0 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3840 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org1.example.com | [337e 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][56716c61] Entry chaincode: name:"lscc" +peer1.org1.example.com | [34d1 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3841 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org1.example.com | [337f 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][56716c61] escc for chaincode name:"lscc" is escc +peer1.org1.example.com | [34d2 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003865dd0 gate 1598907139508329800 evaluation starts +peer0.org2.example.com | [3842 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3380 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 56716c6173a161fcd343f3906acba073428ece07d80c8eba3888fc963cb28e46, chaincode: lscc} +peer1.org1.example.com | [34d3 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003865dd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3843 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org1.example.com | [3381 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A209918ADE5503D7FC7833E6D9A864B...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [34d4 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003865dd0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3844 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org1.example.com | [3382 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 942653D2B584F184A4ACF1653554A49218DF3C6D5753E950E1D2FAF631D1EA4C +peer1.org1.example.com | [34d5 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003865dd0 principal matched by identity 0 +peer1.org2.example.com | [3963 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3845 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3383 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 56716c6173a161fcd343f3906acba073428ece07d80c8eba3888fc963cb28e46, chaincode: lscc} +peer1.org1.example.com | [34d6 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org2.example.com | [3964 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48146 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3846 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3384 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][56716c61] Exit +peer1.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org2.example.com | [3965 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3847 08-31 20:52:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3385 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [56716c6173a161fcd343f3906acba073428ece07d80c8eba3888fc963cb28e46] +peer1.org1.example.com | [34d7 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org2.example.com | [3966 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3848 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3386 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36872 +peer1.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org2.example.com | [3967 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3849 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [3387 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36872 grpc.code=OK grpc.call_duration=21.9862ms +peer1.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org2.example.com | [3968 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [384a 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3388 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org2.example.com | [3969 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [384b 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3389 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org2.example.com | [396a 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [384c 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [338a 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [34d8 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003865dd0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [396b 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [384d 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [338b 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [34d9 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003865dd0 gate 1598907139508329800 evaluation succeeds +peer1.org2.example.com | [396c 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [384e 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [338c 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34da 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [396d 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [384f 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [338d 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34db 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [396e 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dcb50 gate 1598907138439781100 evaluation starts +peer0.org2.example.com | [3850 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" > alive: alive: alive: +peer0.org1.example.com | [338e 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34dc 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [396f 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dcb50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3851 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [338f 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34dd 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3970 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dcb50 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3852 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3390 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [34de 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3971 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dcb50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3853 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3391 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [34df 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3972 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dcb50 principal evaluation fails +peer0.org2.example.com | [3854 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3392 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34e0 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3973 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dcb50 gate 1598907138439781100 evaluation fails +peer0.org2.example.com | [3855 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [34e1 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3393 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3974 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3856 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [34e2 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3394 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3975 08-31 20:52:18.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3857 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [34e3 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3395 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3976 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3858 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34e4 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003876910 gate 1598907139512911100 evaluation starts +peer0.org1.example.com | [3396 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3977 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dd120 gate 1598907138440033500 evaluation starts +peer0.org2.example.com | [3859 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [34e5 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003876910 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3397 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3978 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dd120 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [385a 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34e6 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003876910 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3398 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3979 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dd120 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [385b 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [34e7 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003876910 principal matched by identity 0 +peer0.org1.example.com | [3399 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3d80 gate 1598907126174129500 evaluation starts +peer1.org2.example.com | [397a 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dd120 principal matched by identity 0 +peer0.org2.example.com | [385c 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [34e8 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org1.example.com | [339a 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3d80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [397b 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | [385d 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org1.example.com | [339b 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3d80 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [385e 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [34e9 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org1.example.com | [339c 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3d80 principal matched by identity 0 +peer1.org2.example.com | [397c 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | [385f 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org1.example.com | [339d 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | [3860 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org2.example.com | [3861 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [339e 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org2.example.com | [3862 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org1.example.com | [34ea 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003876910 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3863 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org2.example.com | [397d 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dd120 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [34eb 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003876910 gate 1598907139512911100 evaluation succeeds +peer0.org2.example.com | [3864 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org2.example.com | [397e 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026dd120 gate 1598907138440033500 evaluation succeeds +peer1.org1.example.com | [34ec 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3865 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org2.example.com | [397f 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [34ed 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3866 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [339f 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3d80 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3980 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [34ee 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3867 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161032 +peer0.org1.example.com | [33a0 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3d80 gate 1598907126174129500 evaluation succeeds +peer1.org2.example.com | [3981 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [34ef 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3868 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AA647EF114FF7AD5170962B0EEA6F326767160F0E66E2F81718AE5721224F0F4 +peer0.org1.example.com | [33a1 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3982 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [34f0 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer0.org2.example.com | [3869 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [33a2 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3983 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34f1 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer0.org2.example.com | [386a 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [33a3 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3984 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [34f2 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer0.org2.example.com | [386b 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | [33a4 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3985 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [34f3 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer0.org2.example.com | [386c 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [33a5 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3986 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [34f4 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [386d 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33a6 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3987 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [34f6 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +peer0.org2.example.com | [386e 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [33a7 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3988 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [34f5 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [386f 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33a8 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3989 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [34f7 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [3870 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [33a9 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [398a 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [34f8 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org2.example.com | [3871 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [33aa 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [398b 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c320 gate 1598907138443926000 evaluation starts +peer1.org1.example.com | [34f9 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [3872 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33ab 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [398c 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c320 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [34fa 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003898e30, CONNECTING +peer0.org2.example.com | [3873 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [33ac 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [398d 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c320 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [34fb 08-31 20:52:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer0.org2.example.com | [3874 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33ad 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [398e 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [34fc 08-31 20:52:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3875 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [33ae 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [398f 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c320 principal evaluation fails +peer1.org1.example.com | [34fe 08-31 20:52:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org2.example.com | [3876 08-31 20:52:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33af 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3990 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c320 gate 1598907138443926000 evaluation fails +peer1.org1.example.com | [34ff 08-31 20:52:19.54 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer0.org2.example.com | [3877 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [33b0 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45190 gate 1598907126183548400 evaluation starts +peer1.org2.example.com | [3991 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [34fd 08-31 20:52:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [3878 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3992 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [33b1 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45190 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3500 08-31 20:52:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org2.example.com | [3993 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3879 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [33b2 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45190 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3501 08-31 20:52:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org2.example.com | [3994 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c890 gate 1598907138444189200 evaluation starts +peer0.org2.example.com | [387a 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [33b3 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45190 principal matched by identity 0 +peer1.org1.example.com | [3502 08-31 20:52:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org2.example.com | [3995 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c890 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [387b 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 64 7e f1 14 ff 7a d5 17 09 62 b0 ee a6 f3 26 |.d~...z...b....&| +peer0.org1.example.com | [33b4 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org1.example.com | [3503 08-31 20:52:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003877850, CONNECTING +peer1.org2.example.com | [3996 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c890 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | 00000010 76 71 60 f0 e6 6e 2f 81 71 8a e5 72 12 24 f0 f4 |vq`..n/.q..r.$..| +peer0.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [3504 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003898e30, READY +peer1.org2.example.com | [3997 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c890 principal matched by identity 0 +peer0.org2.example.com | [387c 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ca e1 de ed fe 90 29 a7 dd a3 |0E.!........)...| +peer0.org1.example.com | [33b5 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org1.example.com | [3505 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3998 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org2.example.com | 00000010 d8 d7 99 68 c9 ea 25 46 b4 e2 f5 4b d1 07 e4 cb |...h..%F...K....| +peer0.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org1.example.com | [3506 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000020 b1 5c 45 19 cc 02 20 1b de fc ab b1 41 37 4a 60 |.\E... .....A7J`| +peer0.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org2.example.com | [3999 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org1.example.com | [3507 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 8e 23 cc fb d9 74 16 25 d0 b0 1b e1 f6 68 7c f6 |.#...t.%.....h|.| +peer0.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org1.example.com | [3508 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000040 5f a9 cd 66 bc 1d 77 |_..f..w| +peer0.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org1.example.com | [3509 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org2.example.com | [387d 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org1.example.com | [33b6 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45190 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org1.example.com | [350a 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org1.example.com | [33b7 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45190 gate 1598907126183548400 evaluation succeeds +peer1.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org1.example.com | [350b 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer0.org2.example.com | [387e 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 7f cb f1 fa d6 bb 03 d0 34 cf |0E.!..........4.| +peer0.org1.example.com | [33b8 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [399a 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c890 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [350c 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer0.org2.example.com | 00000010 ef 4e 52 1d 8c cf e9 3a fe f5 64 b5 7f 45 de 70 |.NR....:..d..E.p| +peer0.org1.example.com | [33b9 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [350d 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:7051 +peer1.org2.example.com | [399b 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00268c890 gate 1598907138444189200 evaluation succeeds +peer0.org2.example.com | 00000020 74 ae 81 b4 31 02 20 32 32 cb 4c 48 1c 11 02 50 |t...1. 22.LH...P| +peer0.org1.example.com | [33ba 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [350e 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003877850, READY +peer1.org2.example.com | [399c 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000030 f3 e8 b7 5a df 91 c4 cb aa 84 ac 85 12 c5 f4 af |...Z............| +peer0.org1.example.com | [33bb 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [350f 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org2.example.com | [399d 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000040 e9 b8 d9 f3 7b 69 60 |....{i`| +peer0.org1.example.com | [33bc 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3510 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org2.example.com | [399e 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [387f 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [33bd 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [399f 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3880 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org1.example.com | [33be 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36876 +peer1.org2.example.com | [39a0 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [3511 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be 8b 8e d2 a4 c9 96 be ad 82 5a |0E.!...........Z| +peer0.org1.example.com | [33bf 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003e8e0a0 +peer1.org2.example.com | [39a1 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org2.example.com | [3881 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33c0 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org2.example.com | [3882 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 46 d7 82 47 9b 71 a5 b9 3e e5 93 1a 80 88 c9 28 |F..G.q..>......(| +peer0.org1.example.com | [33c1 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org2.example.com | [3883 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000020 ca 31 66 8c ff 02 20 5d fd 91 68 c6 dc 61 04 86 |.1f... ]..h..a..| +peer0.org1.example.com | [33c2 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [33c3 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org2.example.com | [3884 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 a2 9c 75 b1 b9 63 1a b3 3d 90 f0 0d 01 89 94 6d |..u..c..=......m| +peer0.org1.example.com | [33c4 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org2.example.com | [3885 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000040 df a7 03 7e ae 6c 47 |...~.lG| +peer0.org1.example.com | [33c5 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 a0 b7 0f 2f 59 0d 1c e0 ba 62 db 85 1e e1 20 |..../Y....b.... | +peer1.org2.example.com | [39a2 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org2.example.com | [3886 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3512 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org1.example.com | 00000010 73 36 b0 25 0f 53 69 90 fe 76 09 cf 8b 66 b9 7c |s6.%.Si..v...f.|| +peer1.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org2.example.com | [3887 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 5c a2 78 e0 1f 04 7e 3b 4f 8e b8 2b c1 1e af |Q\.x...~;O..+...| +peer1.org1.example.com | [3513 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [33c6 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 ce f7 ee 8e 9b 19 cd 91 81 52 |0E.!...........R| +peer1.org2.example.com | [39a3 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org2.example.com | 00000010 06 66 70 37 7b a7 be 74 db 4c 83 18 71 e0 de 96 |.fp7{..t.L..q...| +peer1.org1.example.com | [3514 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D9816103D +peer0.org1.example.com | 00000010 08 06 33 93 26 de bd 25 3b 1e 96 fc a9 ef 55 47 |..3.&..%;.....UG| +peer1.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org2.example.com | [3888 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 59 0f 8f d3 2c 9f a8 ea 33 65 98 |0D. dY...,...3e.| +peer0.org1.example.com | 00000020 68 b1 11 f5 0e 02 20 20 80 77 1c 84 2b 69 2b 20 |h..... .w..+i+ | +peer1.org1.example.com | [3515 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B3F08914CE1354B4F18FA2B6BF44B14E87CFD1304541FE993B30B4C2C3391358 +peer1.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org2.example.com | 00000010 5d d4 d4 a8 74 a7 52 d2 5f 2c 06 5d 35 0a d0 59 |]...t.R._,.]5..Y| +peer0.org1.example.com | 00000030 be 8e fb 23 61 0b 19 99 5d 9d 89 d1 0c 5c 0c 6b |...#a...]....\.k| +peer1.org1.example.com | [3516 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org2.example.com | 00000020 6e 38 f0 42 02 20 7d f5 47 0a 5e ed 53 b1 f6 05 |n8.B. }.G.^.S...| +peer0.org1.example.com | 00000040 09 d6 9f f2 07 42 75 |.....Bu| +peer1.org1.example.com | [3517 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org2.example.com | 00000030 af e0 d7 06 d5 32 67 41 93 83 c4 06 e7 9d 18 31 |.....2gA.......1| +peer0.org1.example.com | [33c7 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [3518 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | [39a4 08-31 20:52:18.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 0e fe 14 61 d9 19 |...a..| +peer0.org1.example.com | [33c8 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ad1f80, header 0xc003e8e4b0 +peer1.org1.example.com | [3519 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:17129995604692463347 tag:EMPTY mem_req:\024\023B\210f\352\303\376P\241\345\014\244\201x\237\333\371\006\313\021\273\206\005\331x\327\253\002 }\321\277\373{\225\020\251\236\305\267^\014\316~\343\332\335\037\341a\301c\323|\032\351c\252]\253(" > > > , Envelope: 281 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [39a5 08-31 20:52:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3889 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33c9 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer1.org1.example.com | [351a 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:17129995604692463347 tag:EMPTY mem_req:\024\023B\210f\352\303\376P\241\345\014\244\201x\237\333\371\006\313\021\273\206\005\331x\327\253\002 }\321\277\373{\225\020\251\236\305\267^\014\316~\343\332\335\037\341a\301c\323|\032\351c\252]\253(" > > > , Envelope: 281 bytes, Signature: 0 bytes +peer0.org2.example.com | [388a 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33ca 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][db35a7ec] processing txid: db35a7ece469990b46ba41a885c4c0cae95fa6461125a349a4ad573225bbe5f8 +peer1.org1.example.com | [351b 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [388b 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [33cb 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [db35a7ece469990b46ba41a885c4c0cae95fa6461125a349a4ad573225bbe5f8] +peer1.org1.example.com | [351c 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [39a6 08-31 20:52:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [388c 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 64 7e f1 14 ff 7a d5 17 09 62 b0 ee a6 f3 26 |.d~...z...b....&| +peer1.org1.example.com | [351d 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer1.org2.example.com | [39a7 08-31 20:52:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | 00000010 76 71 60 f0 e6 6e 2f 81 71 8a e5 72 12 24 f0 f4 |vq`..n/.q..r.$..| +peer0.org1.example.com | [33cc 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [351e 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [39a8 08-31 20:52:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [388d 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ca e1 de ed fe 90 29 a7 dd a3 |0E.!........)...| +peer0.org1.example.com | [33cd 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [db35a7ece469990b46ba41a885c4c0cae95fa6461125a349a4ad573225bbe5f8] +peer1.org1.example.com | [351f 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org2.example.com | [39a9 08-31 20:52:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000010 d8 d7 99 68 c9 ea 25 46 b4 e2 f5 4b d1 07 e4 cb |...h..%F...K....| +peer0.org1.example.com | [33ce 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][db35a7ec] Entry chaincode: name:"lscc" +peer1.org1.example.com | [3520 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org2.example.com | [39aa 08-31 20:52:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | 00000020 b1 5c 45 19 cc 02 20 1b de fc ab b1 41 37 4a 60 |.\E... .....A7J`| +peer0.org1.example.com | [33cf 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][db35a7ec] Entry chaincode: name:"lscc" +peer1.org1.example.com | [3521 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:7051 +peer1.org2.example.com | [39ab 08-31 20:52:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 8e 23 cc fb d9 74 16 25 d0 b0 1b e1 f6 68 7c f6 |.#...t.%.....h|.| +peer0.org1.example.com | [33d0 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [3522 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org2.example.com | [39ac 08-31 20:52:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 5f a9 cd 66 bc 1d 77 |_..f..w| +peer0.org1.example.com | [33d1 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetDeploymentSpec +peer1.org1.example.com | [3523 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org2.example.com | [39ad 08-31 20:52:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org2.example.com | [388e 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [33d2 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org1.example.com | [3524 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org2.example.com | [39ae 08-31 20:52:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org2.example.com | [388f 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [33d3 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3525 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +peer1.org2.example.com | [39af 08-31 20:52:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org2.example.com | [3890 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33d4 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3526 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org2.example.com | [39b0 08-31 20:52:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3891 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [33d5 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3527 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org2.example.com | [39b1 08-31 20:52:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer0.org2.example.com | [3892 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33d6 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e930d0 gate 1598907126323084100 evaluation starts +peer1.org1.example.com | [3528 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org2.example.com | [39b2 08-31 20:52:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer0.org2.example.com | [3893 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [33d7 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e930d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3529 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 229ms +peer1.org2.example.com | [39b3 08-31 20:52:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3894 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [33d8 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e930d0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [352a 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer1.org2.example.com | [39b4 08-31 20:52:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D981610111801 +peer0.org2.example.com | [3895 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 64 7e f1 14 ff 7a d5 17 09 62 b0 ee a6 f3 26 |.d~...z...b....&| +peer0.org1.example.com | [33d9 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e930d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [352b 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org2.example.com | [39b5 08-31 20:52:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AC9B63299588FD442763559D713204900B3EAB6C375A06256731900027184B8E +peer0.org2.example.com | 00000010 76 71 60 f0 e6 6e 2f 81 71 8a e5 72 12 24 f0 f4 |vq`..n/.q..r.$..| +peer0.org1.example.com | [33da 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e930d0 principal evaluation fails +peer1.org1.example.com | [352c 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org2.example.com | [39b6 08-31 20:52:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer0.org1.example.com | [33db 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e930d0 gate 1598907126323084100 evaluation fails +peer0.org2.example.com | [3897 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ca e1 de ed fe 90 29 a7 dd a3 |0E.!........)...| +peer1.org1.example.com | [352e 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +peer1.org2.example.com | [39b7 08-31 20:52:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33dc 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 d8 d7 99 68 c9 ea 25 46 b4 e2 f5 4b d1 07 e4 cb |...h..%F...K....| +peer1.org1.example.com | [352f 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org2.example.com | [39b8 08-31 20:52:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33dd 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000020 b1 5c 45 19 cc 02 20 1b de fc ab b1 41 37 4a 60 |.\E... .....A7J`| +peer1.org1.example.com | [3530 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org2.example.com | [39b9 08-31 20:52:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33de 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | 00000030 8e 23 cc fb d9 74 16 25 d0 b0 1b e1 f6 68 7c f6 |.#...t.%.....h|.| +peer1.org1.example.com | [3531 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org2.example.com | [39ba 08-31 20:52:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33df 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e93640 gate 1598907126323949100 evaluation starts +peer0.org2.example.com | 00000040 5f a9 cd 66 bc 1d 77 |_..f..w| +peer1.org1.example.com | [3532 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +peer1.org2.example.com | [39bb 08-31 20:52:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [33e0 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e93640 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3896 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3533 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org2.example.com | [39bc 08-31 20:52:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33e1 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e93640 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3898 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3534 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org2.example.com | [39be 08-31 20:52:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33e2 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e93640 principal matched by identity 0 +peer0.org2.example.com | [3899 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3535 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org2.example.com | [39bd 08-31 20:52:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [33e3 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 a0 b7 0f 2f 59 0d 1c e0 ba 62 db 85 1e e1 20 |..../Y....b.... | +peer0.org2.example.com | [389a 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3536 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org2.example.com | [39bf 08-31 20:52:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 73 36 b0 25 0f 53 69 90 fe 76 09 cf 8b 66 b9 7c |s6.%.Si..v...f.|| +peer0.org2.example.com | [389b 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3537 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org2.example.com | [39c0 08-31 20:52:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [389c 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 5c a2 78 e0 1f 04 7e 3b 4f 8e b8 2b c1 1e af |Q\.x...~;O..+...| +peer0.org1.example.com | [33e4 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 ce f7 ee 8e 9b 19 cd 91 81 52 |0E.!...........R| +peer1.org1.example.com | [3538 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org2.example.com | [39c1 08-31 20:52:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 06 66 70 37 7b a7 be 74 db 4c 83 18 71 e0 de 96 |.fp7{..t.L..q...| +peer0.org1.example.com | 00000010 08 06 33 93 26 de bd 25 3b 1e 96 fc a9 ef 55 47 |..3.&..%;.....UG| +peer1.org1.example.com | [3539 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org2.example.com | [39c2 08-31 20:52:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [389d 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 59 0f 8f d3 2c 9f a8 ea 33 65 98 |0D. dY...,...3e.| +peer0.org1.example.com | 00000020 68 b1 11 f5 0e 02 20 20 80 77 1c 84 2b 69 2b 20 |h..... .w..+i+ | +peer1.org2.example.com | [39c3 08-31 20:52:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | 00000010 5d d4 d4 a8 74 a7 52 d2 5f 2c 06 5d 35 0a d0 59 |]...t.R._,.]5..Y| +peer0.org1.example.com | 00000030 be 8e fb 23 61 0b 19 99 5d 9d 89 d1 0c 5c 0c 6b |...#a...]....\.k| +peer1.org2.example.com | [39c4 08-31 20:52:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer1.org1.example.com | [353a 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org2.example.com | 00000020 6e 38 f0 42 02 20 7d f5 47 0a 5e ed 53 b1 f6 05 |n8.B. }.G.^.S...| +peer0.org1.example.com | 00000040 09 d6 9f f2 07 42 75 |.....Bu| +peer1.org2.example.com | [39c5 08-31 20:52:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266a180 gate 1598907139348958300 evaluation starts +peer1.org1.example.com | [353b 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org2.example.com | 00000030 af e0 d7 06 d5 32 67 41 93 83 c4 06 e7 9d 18 31 |.....2gA.......1| +peer0.org1.example.com | [33e5 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e93640 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [39c6 08-31 20:52:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266a180 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [353c 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org2.example.com | 00000040 0e fe 14 61 d9 19 |...a..| +peer0.org1.example.com | [33e6 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e93640 gate 1598907126323949100 evaluation succeeds +peer1.org1.example.com | [353d 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +peer1.org2.example.com | [39c7 08-31 20:52:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266a180 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [389e 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [33e7 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [353e 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0039b2ec0)} +peer1.org2.example.com | [39c8 08-31 20:52:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266a180 principal matched by identity 0 +peer0.org2.example.com | [389f 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [33e8 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [352d 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:7051 +peer1.org2.example.com | [39c9 08-31 20:52:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d e3 66 b0 07 43 c9 c1 64 9d 7f 39 51 38 d4 79 |M.f..C..d..9Q8.y| +peer0.org2.example.com | [38a0 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [33e9 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [353f 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 ce b4 aa c9 62 6e 44 52 6c ec e2 de 78 ba cd 1f |....bnDRl...x...| +peer0.org2.example.com | [38a1 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [33ea 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3540 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39ca 08-31 20:52:19.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a 58 70 21 3e 2c 57 36 82 80 73 71 |0D. :Xp!>,W6..sq| +peer0.org2.example.com | [38a2 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [33eb 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [db35a7ec] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer1.org1.example.com | [3541 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org2.example.com | 00000010 8f f1 88 88 ba 67 83 2c 0a 44 0f 62 b5 de c8 be |.....g.,.D.b....| +peer0.org2.example.com | [38a3 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [33ec 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [db35a7ec] handling GET_STATE from chaincode +peer1.org1.example.com | [3542 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org2.example.com | 00000020 a7 88 55 52 02 20 7e 53 30 35 b7 da 73 e1 2f 9a |..UR. ~S05..s./.| +peer0.org2.example.com | [38a4 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [33ed 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [db35a7ec] getting state for chaincode lscc, key exp02, channel businesschannel +peer1.org1.example.com | [3543 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org2.example.com | 00000030 ee 5a c0 4d 7f 51 0a 84 35 95 80 5c e7 68 27 cf |.Z.M.Q..5..\.h'.| +peer0.org2.example.com | [38a5 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [33ee 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer1.org1.example.com | [3544 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +peer1.org2.example.com | 00000040 a7 e0 05 f2 88 65 |.....e| +peer0.org2.example.com | [38a6 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [33ef 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [db35a7ec] Completed GET_STATE. Sending RESPONSE +peer1.org1.example.com | [3545 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +peer1.org2.example.com | [39cb 08-31 20:52:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266a180 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [38a7 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [33f0 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [db35a7ec] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [3546 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +peer1.org2.example.com | [39cc 08-31 20:52:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266a180 gate 1598907139348958300 evaluation succeeds +peer0.org2.example.com | [38a8 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265edc0 gate 1598907133511608800 evaluation starts +peer0.org1.example.com | [33f1 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [db35a7ec] notifying Txid:db35a7ece469990b46ba41a885c4c0cae95fa6461125a349a4ad573225bbe5f8, channelID:businesschannel +peer1.org1.example.com | [3547 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002822900 env 0xc003618ff0 txn 0 +peer1.org2.example.com | [39cd 08-31 20:52:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [38a9 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265edc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [33f2 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [3548 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | [39ce 08-31 20:52:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [38aa 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265edc0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [33f3 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][db35a7ec] Exit chaincode: name:"lscc" (4ms) +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | [39cf 08-31 20:52:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [38ab 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265edc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [33f4 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | [39d0 08-31 20:52:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [38ac 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265edc0 principal evaluation fails +peer0.org1.example.com | [33f5 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [db35a7ece469990b46ba41a885c4c0cae95fa6461125a349a4ad573225bbe5f8] +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | [39d1 08-31 20:52:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer0.org2.example.com | [38ad 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265edc0 gate 1598907133511608800 evaluation fails +peer0.org1.example.com | [33f6 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][db35a7ec] Exit +peer1.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | [39d2 08-31 20:52:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer0.org2.example.com | [38ae 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [33f7 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][db35a7ec] Entry chaincode: name:"lscc" +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | [39d3 08-31 20:52:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [38af 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [33f8 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][db35a7ec] escc for chaincode name:"lscc" is escc +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | [39d4 08-31 20:52:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +peer0.org2.example.com | [38b0 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [33f9 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: db35a7ece469990b46ba41a885c4c0cae95fa6461125a349a4ad573225bbe5f8, chaincode: lscc} +peer1.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer1.org2.example.com | [39d5 08-31 20:52:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +peer0.org2.example.com | [38b1 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f370 gate 1598907133513387500 evaluation starts +peer0.org1.example.com | [33fa 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A201993BF853B06EC32B1AFCAD1110A...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer1.org2.example.com | [39d6 08-31 20:52:19.35 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer0.org2.example.com | [38b2 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f370 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [33fb 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6EB2493F2E1FA3C0404602304C14436F8D87DF10F0BB05DC99694A030E64DC18 +peer1.org1.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | [39d7 08-31 20:52:19.35 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +peer0.org2.example.com | [38b3 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f370 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [33fc 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: db35a7ece469990b46ba41a885c4c0cae95fa6461125a349a4ad573225bbe5f8, chaincode: lscc} +peer1.org1.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer1.org2.example.com | [39d8 08-31 20:52:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +peer0.org2.example.com | [38b4 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f370 principal matched by identity 0 +peer0.org1.example.com | [33fd 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][db35a7ec] Exit +peer1.org1.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer1.org2.example.com | [39d9 08-31 20:52:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [38b5 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 27 bc e0 21 ac 9f 49 12 2b cb f7 70 85 98 71 |W'..!..I.+..p..q| +peer0.org1.example.com | [33fe 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [db35a7ece469990b46ba41a885c4c0cae95fa6461125a349a4ad573225bbe5f8] +peer1.org1.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org2.example.com | [39da 08-31 20:52:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0037207c0 env 0xc0031fb2c0 txn 0 +peer0.org2.example.com | 00000010 12 35 bd 3c 32 7c cc 4a 6e f0 0a dc c2 0c e9 e6 |.5.<2|.Jn.......| +peer0.org1.example.com | [33ff 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36876 +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [39db 08-31 20:52:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0031fb2c0 +peer0.org2.example.com | [38b6 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 21 fc 14 f8 3c 39 da 81 0f b6 |0E.!..!...<9....| +peer0.org1.example.com | [3400 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36876 grpc.code=OK grpc.call_duration=8.2115ms +peer1.org1.example.com | [3549 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +peer1.org2.example.com | [39dc 08-31 20:52:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\203\306\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\350c\034\327\214\356\327|\351\320\253\304j\r0\333\310\276\276\324\377\007\237t" +peer0.org2.example.com | 00000010 17 d5 a3 68 c7 e5 c4 03 fc 86 a5 b4 ec f8 54 d2 |...h..........T.| +peer0.org1.example.com | [3401 08-31 20:52:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:36876: read: connection reset by peer +peer1.org1.example.com | [354a 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xee, 0x50, 0x5e, 0x32, 0xbb, 0x9a, 0x52, 0xe4, 0xd5, 0xa5, 0xcd, 0xd8, 0x92, 0x7, 0xb9, 0x48, 0x99, 0xcf, 0x4a, 0x4f, 0xd4, 0x14, 0x2, 0xe7, 0xd3, 0xba, 0x81, 0x57, 0xfe, 0x38, 0x65, 0xd} txOffsets= +peer1.org2.example.com | [39dd 08-31 20:52:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org2.example.com | 00000020 d2 86 34 73 52 02 20 77 42 50 c8 3e 6b ff f9 75 |..4sR. wBP.>k..u| +peer0.org1.example.com | [3402 08-31 20:52:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | txId=7f1fe83799f527adf316dfcd38e1f157d571d6adfecc0451fce63bd20f6fd24b locPointer=offset=71, bytesLength=40147 +peer1.org2.example.com | [39de 08-31 20:52:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | 00000030 a4 4b 8d 4f a8 db 54 d3 dd d3 bf 5c 87 26 8d 67 |.K.O..T....\.&.g| +peer0.org1.example.com | [3403 08-31 20:52:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | ] +peer1.org2.example.com | [39df 08-31 20:52:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | 00000040 01 c0 b7 05 c0 2a a2 |.....*.| +peer0.org1.example.com | [3404 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [354b 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97619, bytesLength=40147] for tx ID: [7f1fe83799f527adf316dfcd38e1f157d571d6adfecc0451fce63bd20f6fd24b] to txid-index +peer1.org2.example.com | [39e0 08-31 20:52:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org2.example.com | [38b7 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f370 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3405 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [354c 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97619, bytesLength=40147] for tx number:[0] ID: [7f1fe83799f527adf316dfcd38e1f157d571d6adfecc0451fce63bd20f6fd24b] to blockNumTranNum index +peer1.org2.example.com | [39e1 08-31 20:52:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [38b8 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f370 gate 1598907133513387500 evaluation succeeds +peer0.org1.example.com | [3406 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [354d 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138758], isChainEmpty=[false], lastBlockNumber=[6] +peer1.org2.example.com | [39e2 08-31 20:52:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org2.example.com | [38b9 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3407 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [354e 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +peer1.org2.example.com | [39e3 08-31 20:52:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [38ba 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3408 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [354f 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [39e4 08-31 20:52:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 91 49 22 67 d4 21 5a c5 5d ba b6 53 95 4a 0e |p.I"g.!Z.]..S.J.| +peer0.org2.example.com | [38bb 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3409 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3550 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +peer1.org2.example.com | 00000010 ee fd 0a 4b 0b b3 b0 39 d0 4f 7a 03 2f 68 d7 2b |...K...9.Oz./h.+| +peer0.org2.example.com | [38bc 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [340a 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [3551 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +peer1.org2.example.com | [39e5 08-31 20:52:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [6], peers number [3] +peer0.org2.example.com | [38bd 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [340b 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [3552 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer1.org2.example.com | [39e7 08-31 20:52:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41192 bytes, seq: 6}, Envelope: 41225 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [38be 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [340c 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3553 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer1.org2.example.com | [39e6 08-31 20:52:19.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b 0e 7b 4c 2d fb 5c 6a 92 7b 58 8b |0D. ..{L-.\j.{X.| +peer0.org2.example.com | [38bf 08-31 20:52:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3554 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [340d 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000010 0a 94 e5 5d d9 f6 e0 78 df 56 82 b4 e5 6a e7 97 |...]...x.V...j..| +peer0.org2.example.com | [38c0 08-31 20:52:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3555 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [340e 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000020 4a d7 3d d0 02 20 37 8c 68 5f 50 c0 44 97 70 a1 |J.=.. 7.h_P.D.p.| +peer0.org2.example.com | [38c1 08-31 20:52:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3556 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org1.example.com | [340f 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000030 6d 73 fc 0e d0 ba 0e f6 ad 2a 7d 93 67 93 90 59 |ms.......*}.g..Y| +peer0.org2.example.com | [38c2 08-31 20:52:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3557 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [3410 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | 00000040 46 c7 bb 03 af ad |F.....| +peer0.org2.example.com | [38c3 08-31 20:52:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3411 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3558 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +peer1.org2.example.com | [39e8 08-31 20:52:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +peer0.org2.example.com | [38c4 08-31 20:52:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3412 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3559 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +peer1.org2.example.com | [39e9 08-31 20:52:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [38c5 08-31 20:52:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3413 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede000 gate 1598907126423824100 evaluation starts +peer1.org1.example.com | [355a 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +peer1.org2.example.com | [39ea 08-31 20:52:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [38c6 08-31 20:52:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3414 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede000 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [355b 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer1.org2.example.com | [39eb 08-31 20:52:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc002ea2000, header channel_header:"\010\001\032\006\010\203\306\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\350c\034\327\214\356\327|\351\320\253\304j\r0\333\310\276\276\324\377\007\237t" +peer0.org2.example.com | [38c7 08-31 20:52:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3415 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede000 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [355c 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +peer1.org2.example.com | [39ed 08-31 20:52:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [38c8 08-31 20:52:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [3416 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede000 principal matched by identity 0 +peer1.org1.example.com | [355d 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +peer0.org2.example.com | [38c9 08-31 20:52:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39ec 08-31 20:52:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3417 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org1.example.com | [355e 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org2.example.com | [38ca 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [39ee 08-31 20:52:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org1.example.com | [355f 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [38cb 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [39ef 08-31 20:52:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3418 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org1.example.com | [3560 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +peer0.org2.example.com | [38cc 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [39f0 08-31 20:52:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41192 bytes, seq: 6}, Envelope: 41225 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org1.example.com | [3561 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 49ms (state_validation=11ms block_and_pvtdata_commit=29ms state_commit=5ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +peer0.org2.example.com | [38cd 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [39f1 08-31 20:52:19.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org1.example.com | [3562 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [38ce 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39f2 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org1.example.com | [3563 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408D8CA91B5F7AF9D9816...08071A0C0A0565787030321203312E30 +peer1.org2.example.com | [39f3 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41192 bytes, seq: 6}, Envelope: 41225 bytes, Signature: 0 bytes +peer0.org2.example.com | [38cf 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org1.example.com | [3564 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 10766A622A93BE80EAD86B89AF822838AC3F4C8C34CA78A75A4156170840C805 +peer1.org2.example.com | [39f4 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [38d0 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3419 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede000 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3565 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +peer1.org2.example.com | [39f5 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [38d1 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [341a 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede000 gate 1598907126423824100 evaluation succeeds +peer1.org1.example.com | [3566 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [39f6 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [38d2 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [341b 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3567 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39f7 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [38d3 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [341c 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3568 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [39f8 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [38d4 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [341d 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3569 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [39f9 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [38d5 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266fa80 gate 1598907133607083800 evaluation starts +peer0.org1.example.com | [341e 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [356a 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [39fa 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [38d6 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266fa80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [341f 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [356b 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [39fb 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [38d7 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266fa80 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3420 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [356d 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer1.org2.example.com | [39fc 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [38d8 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266fa80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3421 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36880 +peer1.org1.example.com | [356c 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [39fd 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [38d9 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266fa80 principal evaluation fails +peer0.org1.example.com | [3422 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003e8f9f0 +peer1.org1.example.com | [356e 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [39fe 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [38da 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266fa80 gate 1598907133607083800 evaluation fails +peer0.org1.example.com | [3423 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [356f 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [39ff 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [38db 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3424 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [3570 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3a00 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [38dc 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3425 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org1.example.com | [3571 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1710 gate 1598907139720974200 evaluation starts +peer1.org2.example.com | [3a01 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [38dd 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3426 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [3572 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1710 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3a02 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [38de 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266fff0 gate 1598907133607383000 evaluation starts +peer0.org1.example.com | [3427 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [3573 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1710 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3a03 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [38df 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266fff0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3428 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 77 f3 b5 73 60 e6 e1 2b 56 24 06 3e f4 d4 35 |Ew..s`..+V$.>..5| +peer1.org1.example.com | [3574 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org2.example.com | [3a04 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer0.org2.example.com | [38e0 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266fff0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 91 05 4d 1c 79 d5 d4 87 76 93 0c 89 7b eb 74 6a |..M.y...v...{.tj| +peer1.org1.example.com | [3575 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1710 principal evaluation fails +peer1.org2.example.com | [3a05 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer0.org2.example.com | [38e1 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266fff0 principal matched by identity 0 +peer0.org1.example.com | [3429 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 9c 12 fc b4 e5 d4 c1 a1 63 8a |0E.!..........c.| +peer1.org1.example.com | [3576 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1710 gate 1598907139720974200 evaluation fails +peer1.org2.example.com | [3a06 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org2.example.com | [38e2 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 59 da f7 db 4b 11 ae 2e a3 bf 73 62 0e 99 f3 |.Y...K.....sb...| +peer0.org1.example.com | 00000010 7a 39 53 1d 5a 07 28 6f 67 f5 df e9 be d9 a1 17 |z9S.Z.(og.......| +peer1.org1.example.com | [3577 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3a07 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | 00000010 aa e8 26 83 f3 cb ac 1d 7b fb 5f ae ad 42 a8 d9 |..&.....{._..B..| +peer0.org1.example.com | 00000020 28 6c 8b e4 f3 02 20 4d f6 9b d1 70 a9 67 09 d3 |(l.... M...p.g..| +peer1.org1.example.com | [3578 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3a08 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org2.example.com | [38e3 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 0e af 30 1c bb 42 56 cf 80 59 |0E.!....0..BV..Y| +peer0.org1.example.com | 00000030 af c9 a9 52 7c bc e4 77 bb c9 66 58 7b a7 9c 31 |...R|..w..fX{..1| +peer1.org1.example.com | [3579 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3a09 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org2.example.com | 00000010 ba 36 fe f0 69 9d b6 6d 0f b8 cf a3 5d 8d 02 60 |.6..i..m....]..`| +peer0.org1.example.com | 00000040 5e 2d d8 4f 2d f7 c1 |^-.O-..| +peer1.org1.example.com | [357a 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1ca0 gate 1598907139723041700 evaluation starts +peer1.org2.example.com | [3a0a 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | 00000020 a5 85 1e 5e 6e 02 20 77 58 41 bc a4 ad 85 b9 1b |...^n. wXA......| +peer0.org1.example.com | [342a 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [357b 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1ca0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3a0b 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | 00000030 f5 e5 4f 19 90 f9 b4 dc 6c 49 15 5f c2 44 0d 88 |..O.....lI._.D..| +peer0.org1.example.com | [342b 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ea24d0, header 0xc003e8fe00 +peer1.org1.example.com | [357c 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1ca0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3a0c 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | 00000040 62 e2 03 69 56 23 93 |b..iV#.| +peer0.org1.example.com | [342c 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer1.org1.example.com | [357d 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [3a0d 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [38e4 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266fff0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [342d 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][dd274571] processing txid: dd2745714853c43e29317f362cbd48b27477b29ae236e0a4c7bfaf13f02512e0 +peer1.org1.example.com | [357e 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1ca0 principal evaluation fails +peer1.org2.example.com | [3a0e 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [38e5 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00266fff0 gate 1598907133607383000 evaluation succeeds +peer0.org1.example.com | [342e 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [dd2745714853c43e29317f362cbd48b27477b29ae236e0a4c7bfaf13f02512e0] +peer1.org1.example.com | [357f 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1ca0 gate 1598907139723041700 evaluation fails +peer1.org2.example.com | [3a0f 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [38e6 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [342f 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [3580 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a10 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [38e7 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3430 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [dd2745714853c43e29317f362cbd48b27477b29ae236e0a4c7bfaf13f02512e0] +peer1.org1.example.com | [3581 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a11 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org2.example.com | [38e8 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3582 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3431 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][dd274571] Entry chaincode: name:"lscc" +peer1.org2.example.com | [3a12 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org2.example.com | [38e9 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3583 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b48230 gate 1598907139724681800 evaluation starts +peer0.org1.example.com | [3432 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][dd274571] Entry chaincode: name:"lscc" +peer1.org2.example.com | [3a13 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +peer0.org2.example.com | [38ea 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3584 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b48230 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3433 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [3a14 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [38eb 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3585 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b48230 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3434 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetChaincodeData +peer1.org2.example.com | [3a15 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org2.example.com | [38ec 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3586 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org1.example.com | [3435 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org2.example.com | [3a16 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +peer0.org2.example.com | [38ed 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3587 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [3436 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3a17 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +peer0.org2.example.com | [38ee 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3588 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [3437 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3a18 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +peer0.org2.example.com | [38ef 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3589 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b48230 principal matched by identity 0 +peer0.org1.example.com | [3438 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3a19 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [38f0 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [358a 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | [3439 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f32c00 gate 1598907126550042800 evaluation starts +peer1.org2.example.com | [3a1a 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [38f1 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [343a 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f32c00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3a1b 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [38f2 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [358b 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 75 84 5d 19 7c 26 0f ec 3e c4 |0E.!..u.].|&..>.| +peer0.org1.example.com | [343b 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f32c00 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3a1c 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [38f3 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 e0 06 ac 13 73 c2 63 0c 72 af 00 6c a6 d3 96 45 |....s.c.r..l...E| +peer0.org1.example.com | [343c 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f32c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3a1d 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [38f4 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 e4 9f 06 71 5c 02 20 6f b8 d3 33 c7 86 47 e9 1b |...q\. o..3..G..| +peer0.org1.example.com | [343d 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f32c00 principal evaluation fails +peer1.org2.example.com | [3a1e 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [38f5 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 6f aa 4a aa 1c 09 9e f6 c5 e8 a4 64 7e 62 f6 bd |o.J........d~b..| +peer0.org1.example.com | [343e 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f32c00 gate 1598907126550042800 evaluation fails +peer1.org2.example.com | [3a1f 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [38f6 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000040 a1 7f aa c2 4d 7f 9c |....M..| +peer0.org1.example.com | [343f 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3a20 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [38f7 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" > alive: alive: +peer1.org1.example.com | [358c 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b48230 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3440 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3a21 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +peer0.org2.example.com | [38f8 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [358d 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b48230 gate 1598907139724681800 evaluation succeeds +peer0.org1.example.com | [3441 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3a22 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [38f9 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [358e 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3442 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f33170 gate 1598907126550818600 evaluation starts +peer1.org2.example.com | [3a23 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer0.org2.example.com | [38fa 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [358f 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3443 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f33170 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3a24 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer0.org2.example.com | [38fb 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3590 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3444 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f33170 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3a25 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f76420 gate 1598907139402070700 evaluation starts +peer0.org2.example.com | [38fc 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3591 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3445 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f33170 principal matched by identity 0 +peer1.org2.example.com | [3a26 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f76420 signed by 0 principal evaluation starts (used [false false false]) +peer0.org2.example.com | [38fd 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3592 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer0.org1.example.com | [3446 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 77 f3 b5 73 60 e6 e1 2b 56 24 06 3e f4 d4 35 |Ew..s`..+V$.>..5| +peer0.org2.example.com | [38fe 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a27 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f76420 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3593 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | 00000010 91 05 4d 1c 79 d5 d4 87 76 93 0c 89 7b eb 74 6a |..M.y...v...{.tj| +peer0.org2.example.com | [38ff 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a28 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f76420 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [3594 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3447 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 9c 12 fc b4 e5 d4 c1 a1 63 8a |0E.!..........c.| +peer0.org2.example.com | [3900 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a29 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f76420 processing identity 1 with bytes of 115a4b0 +peer1.org1.example.com | [3595 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000010 7a 39 53 1d 5a 07 28 6f 67 f5 df e9 be d9 a1 17 |z9S.Z.(og.......| +peer0.org2.example.com | [3901 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a2a 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer1.org1.example.com | [3596 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D9816103E +peer0.org1.example.com | 00000020 28 6c 8b e4 f3 02 20 4d f6 9b d1 70 a9 67 09 d3 |(l.... M...p.g..| +peer0.org2.example.com | [3902 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a2b 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer1.org1.example.com | [3597 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 48EFD880A320B9DEB219D39710C5FB61160B879EDD9C568B8ACD6A6DD3954FC1 +peer0.org1.example.com | 00000030 af c9 a9 52 7c bc e4 77 bb c9 66 58 7b a7 9c 31 |...R|..w..fX{..1| +peer0.org2.example.com | [3903 08-31 20:52:13.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a2c 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org1.example.com | [3598 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000040 5e 2d d8 4f 2d f7 c1 |^-.O-..| +peer0.org2.example.com | [3904 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a2d 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [3599 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3448 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f33170 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3905 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a2e 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer1.org1.example.com | [359a 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org1.example.com | [3449 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f33170 gate 1598907126550818600 evaluation succeeds +peer0.org2.example.com | [3906 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [3a2f 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org1.example.com | [359b 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [344a 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3907 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a30 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f76420 principal matched by identity 1 +peer1.org1.example.com | [359c 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:13880014470684646127 tag:EMPTY mem_req:" signature:"0E\002!\000\375vY\272l\300w\316\277[M\357\177\357(a\210\010^\321\024$l\026^\321\302&\0310eK\002 8He\250\205Q\251\336\020[M#$\240\362j\006a\322\306#F2V\271 \262g]\326\324?" > > , Envelope: 177 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [344b 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3908 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3a31 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c 16 ac 57 86 d3 c3 21 1e c6 7b f6 f4 33 15 53 |...W...!..{..3.S| +peer1.org1.example.com | [359d 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:13880014470684646127 tag:EMPTY mem_req:" signature:"0E\002!\000\375vY\272l\300w\316\277[M\357\177\357(a\210\010^\321\024$l\026^\321\302&\0310eK\002 8He\250\205Q\251\336\020[M#$\240\362j\006a\322\306#F2V\271 \262g]\326\324?" > > , Envelope: 177 bytes, Signature: 0 bytes +peer0.org1.example.com | [344c 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3909 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 51 0a 12 8c c9 dc af 08 54 64 1f 16 1c 10 79 1c |Q.......Td....y.| +peer1.org1.example.com | [359e 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org2.example.com:7051, PKIid:a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 isn't responsive: EOF +peer0.org1.example.com | [344d 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [390a 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3a32 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 5d cb e8 72 66 8f d2 c7 ff a3 |0E.!..]..rf.....| +peer1.org1.example.com | [359f 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> WARN Entering [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] +peer0.org1.example.com | [344e 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [dd274571] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +peer0.org2.example.com | [390b 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 aa d3 dc 46 c5 bd 34 a5 d8 7d dc a8 35 2c d6 29 |...F..4..}..5,.)| +peer1.org1.example.com | [35a0 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28, Metadata: +peer0.org1.example.com | [344f 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [dd274571] handling GET_STATE from chaincode +peer0.org2.example.com | [390c 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 07 b0 75 b1 d5 02 20 0a ef 18 c5 de bf be 2c 7c |..u... .......,|| +peer1.org1.example.com | [35a1 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [3450 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [dd274571] getting state for chaincode lscc, key exp02, channel businesschannel +peer0.org2.example.com | [390d 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000030 16 ea 9e 3a ba 4b 56 95 85 92 21 ee 94 17 ad 3b |...:.KV...!....;| +peer1.org1.example.com | [35a2 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer0.org1.example.com | [3451 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +peer0.org2.example.com | [390e 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 78 aa 13 9c c2 d4 33 |x.....3| +peer1.org1.example.com | [35a3 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3452 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [dd274571] Completed GET_STATE. Sending RESPONSE +peer0.org2.example.com | [390f 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a33 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f76420 principal evaluation succeeds for identity 1 +peer1.org1.example.com | [35a4 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3453 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [dd274571] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [3910 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a34 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f76420 gate 1598907139402070700 evaluation succeeds +peer1.org1.example.com | [35a5 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3454 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [dd274571] notifying Txid:dd2745714853c43e29317f362cbd48b27477b29ae236e0a4c7bfaf13f02512e0, channelID:businesschannel +peer1.org2.example.com | [3a35 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [3911 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [35a6 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3455 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [3a36 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [3912 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [35a7 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3456 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][dd274571] Exit chaincode: name:"lscc" (4ms) +peer1.org2.example.com | [3a37 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org2.example.com | [3913 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [35a8 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3457 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [3a38 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer0.org2.example.com | [3914 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [35a9 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3458 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [dd2745714853c43e29317f362cbd48b27477b29ae236e0a4c7bfaf13f02512e0] +peer1.org2.example.com | [3a39 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f76d80 gate 1598907139407509300 evaluation starts +peer0.org2.example.com | [3915 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [35aa 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3459 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][dd274571] Exit +peer1.org2.example.com | [3a3a 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f76d80 signed by 0 principal evaluation starts (used [false false false]) +peer0.org2.example.com | [3916 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [35ab 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [345a 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][dd274571] Entry chaincode: name:"lscc" +peer1.org2.example.com | [3a3b 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f76d80 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3917 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002614d80 gate 1598907134158968700 evaluation starts +peer1.org1.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [345b 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][dd274571] escc for chaincode name:"lscc" is escc +peer1.org2.example.com | [3a3c 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f76d80 principal matched by identity 0 +peer0.org2.example.com | [3918 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002614d80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [345c 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: dd2745714853c43e29317f362cbd48b27477b29ae236e0a4c7bfaf13f02512e0, chaincode: lscc} +peer1.org2.example.com | [3a3d 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 79 4d e9 a3 71 1d 24 0f fe ed 23 9d 11 9b 00 |tyM..q.$...#....| +peer0.org2.example.com | [3919 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002614d80 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [345d 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20D91120761BFE729A8A1D4FE88520...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | 00000010 3e 25 10 29 78 cb 07 bc 16 8a c0 53 e9 e3 ae 76 |>%.)x......S...v| +peer0.org2.example.com | [391a 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002614d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | [345e 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 90DD5C88FD4DDA23497AB69ABD268E8EFBAA98EBC443706D47D070AA8993901A +peer1.org2.example.com | [3a3e 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 6e 97 55 ce e1 8f 4a 2e 44 e9 |0E.!..n.U...J.D.| +peer0.org2.example.com | [391b 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002614d80 principal evaluation fails +peer1.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [345f 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: dd2745714853c43e29317f362cbd48b27477b29ae236e0a4c7bfaf13f02512e0, chaincode: lscc} +peer1.org2.example.com | 00000010 86 cc c7 d8 15 32 92 11 5c 0f ae 9c 24 1e e3 31 |.....2..\...$..1| +peer0.org2.example.com | [391c 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002614d80 gate 1598907134158968700 evaluation fails +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org1.example.com | [3460 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][dd274571] Exit +peer1.org2.example.com | 00000020 b0 8c 3d 39 f2 02 20 6c 7f 82 68 b5 f7 a9 fc 04 |..=9.. l..h.....| +peer0.org2.example.com | [391d 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org1.example.com | [3461 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [dd2745714853c43e29317f362cbd48b27477b29ae236e0a4c7bfaf13f02512e0] +peer1.org2.example.com | 00000030 9c c0 f7 ee 68 f9 99 1d 35 23 c7 b2 62 e6 51 30 |....h...5#..b.Q0| +peer0.org2.example.com | [391e 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org1.example.com | [3462 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36880 +peer1.org2.example.com | 00000040 4f f1 8e 15 f4 64 79 |O....dy| +peer0.org2.example.com | [391f 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | [3463 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36880 grpc.code=OK grpc.call_duration=10.0123ms +peer1.org2.example.com | [3a3f 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f76d80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3920 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026152f0 gate 1598907134159359100 evaluation starts +peer1.org1.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org1.example.com | [3464 08-31 20:52:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [3a40 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002f76d80 gate 1598907139407509300 evaluation succeeds +peer0.org2.example.com | [3921 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026152f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer1.org2.example.com | [3a41 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [3465 08-31 20:52:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3922 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026152f0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer1.org2.example.com | [3a42 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [3466 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36884 +peer0.org2.example.com | [3923 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026152f0 principal matched by identity 0 +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [3a43 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +peer0.org1.example.com | [3467 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003f34f00 +peer0.org2.example.com | [3924 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org1.example.com | [35ac 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [3a44 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +peer0.org1.example.com | [3468 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org1.example.com | [35ad 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [3a45 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +peer0.org1.example.com | [3469 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [3925 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org2.example.com | [3a46 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [35ae 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [346a 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org2.example.com | [3a47 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [35af 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [346b 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org2.example.com | [3a48 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [35b0 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [346c 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org2.example.com | [3a49 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [35b1 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [346d 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 1a a3 54 75 12 55 1d 3f 10 bc 14 79 09 19 78 |...Tu.U.?...y..x| +peer0.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org2.example.com | [3a4a 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer1.org1.example.com | [35b2 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 6b a8 c8 36 b2 60 2c 2c 91 2d c3 d5 f9 45 98 fc |k..6.`,,.-...E..| +peer0.org2.example.com | [3926 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026152f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3a4b 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [35b3 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [346e 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 4c a8 c1 13 1e 38 55 6c 7e dd 13 |0D. HL....8Ul~..| +peer0.org2.example.com | [3927 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026152f0 gate 1598907134159359100 evaluation succeeds +peer1.org2.example.com | [3a4c 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [35b4 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b61770 gate 1598907140047841500 evaluation starts +peer0.org1.example.com | 00000010 6d 19 ae c1 c6 1c 7a 73 f7 5a 01 f6 93 6d 69 36 |m.....zs.Z...mi6| +peer0.org2.example.com | [3928 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a4d 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [35b5 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b61770 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000020 e1 30 a8 9a 02 20 4b 8d d0 d8 3c 8b 9a 01 bf 05 |.0... K...<.....| +peer0.org2.example.com | [3929 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3a4e 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [35b6 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b61770 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000030 39 1f ec 92 12 7d d4 e1 02 98 0b bd 21 8a cf 27 |9....}......!..'| +peer0.org2.example.com | [392a 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3a4f 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [35b7 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b61770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | 00000040 52 27 e5 88 3b 1e |R'..;.| +peer0.org2.example.com | [392b 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3a50 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [35b8 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b61770 principal evaluation fails +peer0.org1.example.com | [346f 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [392c 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a51 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [35b9 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b61770 gate 1598907140047841500 evaluation fails +peer0.org1.example.com | [3470 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ea29a0, header 0xc003f35310 +peer0.org2.example.com | [392d 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a52 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [35ba 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3471 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org2.example.com | [392e 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3a53 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer1.org1.example.com | [35bb 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3472 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5cee7c51] processing txid: 5cee7c516122522850a820f8e2dc9d4bce8375cf872b117d790feb01976178b4 +peer0.org2.example.com | [392f 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a54 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer1.org1.example.com | [35bc 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3473 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [5cee7c516122522850a820f8e2dc9d4bce8375cf872b117d790feb01976178b4] +peer0.org2.example.com | [3930 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a55 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [35bd 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b61d00 gate 1598907140059542100 evaluation starts +peer0.org1.example.com | [3474 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [3931 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3a56 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer1.org1.example.com | [35be 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b61d00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3475 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [5cee7c516122522850a820f8e2dc9d4bce8375cf872b117d790feb01976178b4] +peer0.org2.example.com | [3932 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3a57 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +peer1.org1.example.com | [35bf 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b61d00 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3476 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5cee7c51] Entry chaincode: name:"lscc" +peer0.org2.example.com | [3933 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3a58 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer1.org1.example.com | [35c0 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b61d00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3477 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5cee7c51] Entry chaincode: name:"lscc" +peer1.org2.example.com | [3a59 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org2.example.com | [3934 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da620 gate 1598907134160557500 evaluation starts +peer1.org1.example.com | [35c1 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b61d00 principal evaluation fails +peer0.org1.example.com | [3478 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [3a5a 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org2.example.com | [3935 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da620 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [35c2 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b61d00 gate 1598907140059542100 evaluation fails +peer0.org1.example.com | [3479 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 1a a3 54 75 12 55 1d 3f 10 bc 14 79 09 19 78 |...Tu.U.?...y..x| +peer1.org2.example.com | [3a5b 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +peer0.org2.example.com | [3936 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da620 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [35c3 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 6b a8 c8 36 b2 60 2c 2c 91 2d c3 d5 f9 45 98 fc |k..6.`,,.-...E..| +peer1.org2.example.com | [3a5c 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3937 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da620 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [35c4 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [347a 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 4c a8 c1 13 1e 38 55 6c 7e dd 13 |0D. HL....8Ul~..| +peer1.org2.example.com | [3a5d 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [3938 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da620 principal evaluation fails +peer1.org1.example.com | [35c5 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000010 6d 19 ae c1 c6 1c 7a 73 f7 5a 01 f6 93 6d 69 36 |m.....zs.Z...mi6| +peer1.org2.example.com | [3a5e 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3939 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025da620 gate 1598907134160557500 evaluation fails +peer1.org1.example.com | [35c6 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72290 gate 1598907140061978800 evaluation starts +peer0.org1.example.com | 00000020 e1 30 a8 9a 02 20 4b 8d d0 d8 3c 8b 9a 01 bf 05 |.0... K...<.....| +peer1.org2.example.com | [3a5f 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org2.example.com | [393a 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [35c7 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72290 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000030 39 1f ec 92 12 7d d4 e1 02 98 0b bd 21 8a cf 27 |9....}......!..'| +peer1.org2.example.com | [3a60 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org2.example.com | [393b 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [35c8 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72290 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000040 52 27 e5 88 3b 1e |R'..;.| +peer1.org2.example.com | [3a61 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org2.example.com | [393c 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [35c9 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org1.example.com | [347b 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU [5cee7c51] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [3a62 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org2.example.com | [393d 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025dab90 gate 1598907134160898900 evaluation starts +peer1.org1.example.com | [35ca 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [347c 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU [5cee7c51] notifying Txid:5cee7c516122522850a820f8e2dc9d4bce8375cf872b117d790feb01976178b4, channelID:businesschannel +peer1.org2.example.com | [3a63 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org2.example.com | [393e 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025dab90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [35cb 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [347d 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [3a64 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [393f 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025dab90 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [35cc 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72290 principal matched by identity 0 +peer0.org1.example.com | [347e 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5cee7c51] Exit chaincode: name:"lscc" (2ms) +peer1.org2.example.com | [3a65 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | [3940 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025dab90 principal matched by identity 0 +peer1.org1.example.com | [35cd 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 7e db e0 fd fe 59 06 06 30 99 c9 f0 c9 6c 50 |.~....Y..0....lP| +peer0.org1.example.com | [347f 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [3a66 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | [3941 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org1.example.com | 00000010 c6 b8 e4 71 14 93 14 bc 1a b3 32 d7 88 86 0a f8 |...q......2.....| +peer0.org1.example.com | [3480 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5cee7c516122522850a820f8e2dc9d4bce8375cf872b117d790feb01976178b4] +peer1.org2.example.com | [3a67 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org1.example.com | [35ce 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 2d 90 ec 15 f1 5e ec 3b 00 16 6b |0D. .-....^.;..k| +peer0.org1.example.com | [3481 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5cee7c51] Exit +peer1.org2.example.com | [3a68 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | [3942 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org1.example.com | 00000010 e1 f8 cd 95 a5 c3 25 29 91 08 82 80 4e 70 f2 16 |......%)....Np..| +peer0.org1.example.com | [3482 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5cee7c51] Entry chaincode: name:"lscc" +peer1.org2.example.com | [3a69 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org1.example.com | 00000020 ed 75 b6 c9 02 20 45 67 3f b2 7f ea d8 07 8f a7 |.u... Eg?.......| +peer0.org1.example.com | [3483 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5cee7c51] escc for chaincode name:"lscc" is escc +peer1.org2.example.com | [3a6a 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org1.example.com | 00000030 2c 32 c8 5f 27 0f 8e a1 57 a9 ad e4 bf eb a8 3c |,2._'...W......<| +peer0.org1.example.com | [3484 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 5cee7c516122522850a820f8e2dc9d4bce8375cf872b117d790feb01976178b4, chaincode: lscc} +peer1.org2.example.com | [3a6b 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org1.example.com | 00000040 cb ef 0e 22 be 84 |..."..| +peer0.org1.example.com | [3485 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20569C9345DAF555408A4FBDD638CE...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [3a6c 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org1.example.com | [35cf 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72290 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3486 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9FAE9B2C08D241F4289535CC25DAE229403CF8D94F347361E3AF5B1F19E6883A +peer1.org2.example.com | [3a6d 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org2.example.com | [3943 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025dab90 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [35d0 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b72290 gate 1598907140061978800 evaluation succeeds +peer0.org1.example.com | [3487 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 5cee7c516122522850a820f8e2dc9d4bce8375cf872b117d790feb01976178b4, chaincode: lscc} +peer1.org2.example.com | [3a6e 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [3944 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025dab90 gate 1598907134160898900 evaluation succeeds +peer1.org1.example.com | [35d1 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3488 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5cee7c51] Exit +peer1.org2.example.com | [3a6f 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [3945 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [35d2 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3489 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5cee7c516122522850a820f8e2dc9d4bce8375cf872b117d790feb01976178b4] +peer1.org2.example.com | [3a70 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org2.example.com | [3946 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [35d3 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [348a 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36884 +peer1.org2.example.com | [3a71 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [3947 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [35d4 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [348b 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36884 grpc.code=OK grpc.call_duration=8.7433ms +peer1.org2.example.com | [3a72 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [3948 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [35d5 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [348c 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [3a73 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org2.example.com | [3949 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org1.example.com | [35d6 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [348d 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:36884: read: connection reset by peer +peer1.org2.example.com | [3a74 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [35d7 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [348e 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | [394a 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org1.example.com | [35d8 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [348f 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36888 +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org1.example.com | [35d9 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3490 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003fbe5a0 +peer1.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org1.example.com | [35da 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3491 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org1.example.com | [35db 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3492 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [35dc 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3493 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org2.example.com | [394b 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org1.example.com | [35dd 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:52:22.075Z grpc.peer_address=172.18.0.6:48518 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=220.8µs +peer0.org1.example.com | [3494 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org1.example.com | [35de 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3495 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org2.example.com | [394c 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org1.example.com | [35df 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer1.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | [3496 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 4b dc 69 3a 70 e3 9b ba ae d4 fe 49 40 df 74 |.K.i:p......I@.t| +peer0.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org1.example.com | [35e0 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer1.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org1.example.com | 00000010 f5 4d 1c 77 27 61 e7 dc 2e 70 5a f9 35 18 ec 9e |.M.w'a...pZ.5...| +peer0.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org1.example.com | [35e1 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:48518 +peer1.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org1.example.com | [3497 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 a9 a7 5a 95 fc ba 93 01 ec 89 34 |0D. 8..Z.......4| +peer0.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org1.example.com | [35e2 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:48518 +peer1.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org1.example.com | 00000010 cd 31 9e a2 dc e5 c2 ac 18 c2 d6 24 a3 04 b2 8d |.1.........$....| +peer0.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org1.example.com | [35e3 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | nw== +peer0.org1.example.com | 00000020 c7 c7 40 99 02 20 78 0a 85 6d 0b 22 18 4d 09 69 |..@.. x..m.".M.i| +peer0.org2.example.com | [394d 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [35e4 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | 00000030 97 d4 1d 88 ef 02 9b 6e 61 2a 2d 1e cb c4 9e ce |.......na*-.....| +peer0.org2.example.com | [394e 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [35e5 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a75 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org1.example.com | 00000040 75 fd 27 b2 e3 2b |u.'..+| +peer0.org2.example.com | [394f 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org1.example.com | [35e6 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3a76 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org1.example.com | [3498 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org1.example.com | [35e7 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3a77 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [3499 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ea2ee0, header 0xc003fbe9b0 +peer0.org2.example.com | [3950 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org1.example.com | [35e8 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3a78 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [349a 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +peer0.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org1.example.com | [35e9 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a79 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [349b 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c2151b8f] processing txid: c2151b8f71c928893ff3b85aa6e51394cbe8ea916fed172463b5e58ddf295e1d +peer0.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org1.example.com | [35ea 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a7a 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [349c 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [c2151b8f71c928893ff3b85aa6e51394cbe8ea916fed172463b5e58ddf295e1d] +peer0.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org1.example.com | [35eb 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3a7b 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [349d 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org1.example.com | [35ec 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3a7c 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +peer0.org1.example.com | [349e 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [c2151b8f71c928893ff3b85aa6e51394cbe8ea916fed172463b5e58ddf295e1d] +peer0.org2.example.com | [3951 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35ed 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3a7d 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +peer0.org1.example.com | [349f 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c2151b8f] Entry chaincode: name:"lscc" +peer0.org2.example.com | [3952 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [35ee 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baf940 gate 1598907140081902500 evaluation starts +peer1.org2.example.com | [3a7e 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [34a0 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c2151b8f] Entry chaincode: name:"lscc" +peer1.org1.example.com | [35ef 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baf940 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3953 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3a7f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [34a1 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [35f0 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baf940 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3954 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a80 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +peer0.org1.example.com | [34a2 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetInstantiatedChaincodes +peer1.org1.example.com | [35f1 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baf940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org2.example.com | [3955 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3a81 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [34a3 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org1.example.com | [35f2 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baf940 principal evaluation fails +peer0.org2.example.com | [3956 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | [34a4 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [35f3 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baf940 gate 1598907140081902500 evaluation fails +peer0.org2.example.com | [3957 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [34a5 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [35f4 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3958 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [34a6 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [35f5 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3959 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b14c0 gate 1598907134162761000 evaluation starts +peer1.org2.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | [34a7 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fec4b0 gate 1598907126929679700 evaluation starts +peer1.org1.example.com | [35f6 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [395a 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b14c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [34a8 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fec4b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [35f7 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bafeb0 gate 1598907140083476300 evaluation starts +peer0.org2.example.com | [395b 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b14c0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | [34a9 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fec4b0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [35f8 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bafeb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [395c 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b14c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | [34aa 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fec4b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [35f9 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bafeb0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [395d 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b14c0 principal evaluation fails +peer1.org2.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +peer0.org1.example.com | [34ab 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fec4b0 principal evaluation fails +peer1.org1.example.com | [35fa 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bafeb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [395e 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b14c0 gate 1598907134162761000 evaluation fails +peer1.org2.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | [34ac 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fec4b0 gate 1598907126929679700 evaluation fails +peer1.org1.example.com | [35fb 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bafeb0 principal evaluation fails +peer0.org2.example.com | [395f 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +peer0.org1.example.com | [34ad 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [35fc 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bafeb0 gate 1598907140083476300 evaluation fails +peer0.org2.example.com | [3960 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | [34ae 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [35fd 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3961 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +peer0.org1.example.com | [34af 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [35fe 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3962 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b1a40 gate 1598907134163025200 evaluation starts +peer1.org2.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +peer0.org1.example.com | [34b0 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003feca20 gate 1598907126931768300 evaluation starts +peer1.org1.example.com | [35ff 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3963 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b1a40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [34b1 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003feca20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3600 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bca420 gate 1598907140085607200 evaluation starts +peer0.org2.example.com | [3964 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b1a40 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3a82 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [34b2 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003feca20 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3601 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bca420 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3965 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b1a40 principal matched by identity 0 +peer1.org2.example.com | [3a83 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [34b3 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003feca20 principal matched by identity 0 +peer1.org1.example.com | [3602 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bca420 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3966 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org1.example.com | [34b4 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 4b dc 69 3a 70 e3 9b ba ae d4 fe 49 40 df 74 |.K.i:p......I@.t| +peer1.org2.example.com | [3a84 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [3603 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bca420 principal matched by identity 0 +peer1.org1.example.com | [3604 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 f5 4d 1c 77 27 61 e7 dc 2e 70 5a f9 35 18 ec 9e |.M.w'a...pZ.5...| +peer1.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org1.example.com | [34b5 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 a9 a7 5a 95 fc ba 93 01 ec 89 34 |0D. 8..Z.......4| +peer1.org2.example.com | [3a85 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [3967 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org1.example.com | [3605 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 67 c3 47 1f 05 c9 49 fa 9e bf 8b 92 |0D. g.G...I.....| +peer0.org1.example.com | 00000010 cd 31 9e a2 dc e5 c2 ac 18 c2 d6 24 a3 04 b2 8d |.1.........$....| +peer1.org2.example.com | [3a86 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org1.example.com | 00000010 7c 72 ad a8 ff 37 98 72 d5 fc e0 af df be fa b0 ||r...7.r........| +peer0.org1.example.com | 00000020 c7 c7 40 99 02 20 78 0a 85 6d 0b 22 18 4d 09 69 |..@.. x..m.".M.i| +peer1.org2.example.com | [3a87 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org1.example.com | 00000020 4e 19 06 b9 02 20 23 fa 23 07 d7 7d 21 26 d3 67 |N.... #.#..}!&.g| +peer0.org1.example.com | 00000030 97 d4 1d 88 ef 02 9b 6e 61 2a 2d 1e cb c4 9e ce |.......na*-.....| +peer1.org2.example.com | [3a88 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org1.example.com | 00000030 f2 b7 14 32 9e 38 42 4e 60 55 96 00 04 f3 6c 96 |...2.8BN`U....l.| +peer0.org1.example.com | 00000040 75 fd 27 b2 e3 2b |u.'..+| +peer1.org2.example.com | [3a89 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org1.example.com | 00000040 53 ff 42 59 f2 41 |S.BY.A| +peer0.org1.example.com | [34b6 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003feca20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3a8a 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org2.example.com | [3968 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b1a40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3606 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bca420 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [34b7 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003feca20 gate 1598907126931768300 evaluation succeeds +peer1.org2.example.com | [3a8b 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | [3969 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0025b1a40 gate 1598907134163025200 evaluation succeeds +peer1.org1.example.com | [3607 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bca420 gate 1598907140085607200 evaluation succeeds +peer0.org1.example.com | [34b8 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | [396a 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3608 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [34b9 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | [396b 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3609 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [34ba 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | [396c 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [360a 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [34bb 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | [396d 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [360b 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [34bc 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [c2151b8f] Fabric side handling ChaincodeMessage of type: GET_STATE_BY_RANGE in state ready +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | [396e 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [360c 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:48518 +peer0.org1.example.com | [34bd 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [c2151b8f] handling GET_STATE_BY_RANGE from chaincode +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | [396f 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [360d 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:48518 +peer0.org1.example.com | [34be 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x1}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x1}] +peer1.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | [3970 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [360e 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34bf 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding a result +peer1.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org2.example.com | [3971 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [360f 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [34c0 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got keys and values. Sending RESPONSE +peer1.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer1.org1.example.com | [3611 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3972 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [34c1 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [c2151b8f] Completed GET_STATE_BY_RANGE. Sending RESPONSE +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer1.org1.example.com | [3612 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3973 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [34c2 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [c2151b8f] Fabric side handling ChaincodeMessage of type: QUERY_STATE_CLOSE in state ready +peer1.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer1.org1.example.com | [3613 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3974 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [34c3 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [c2151b8f] handling QUERY_STATE_CLOSE from chaincode +peer1.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer1.org1.example.com | [3614 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3975 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [34c4 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [c2151b8f] Completed QUERY_STATE_CLOSE. Sending RESPONSE +peer1.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer1.org1.example.com | [3615 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3976 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258eda0 gate 1598907134165790100 evaluation starts +peer0.org1.example.com | [34c5 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [c2151b8f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [3616 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> WARN peer0.org1.example.com:7051, PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c isn't responsive: EOF +peer0.org2.example.com | [3977 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258eda0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [34c6 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [c2151b8f] notifying Txid:c2151b8f71c928893ff3b85aa6e51394cbe8ea916fed172463b5e58ddf295e1d, channelID:businesschannel +peer1.org2.example.com | [3a8c 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer1.org1.example.com | [3610 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3978 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258eda0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [34c7 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [3a8d 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer1.org1.example.com | [3617 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3979 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258eda0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [34c8 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c2151b8f] Exit chaincode: name:"lscc" (10ms) +peer1.org2.example.com | [3a8e 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer1.org1.example.com | [3618 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [397a 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258eda0 principal evaluation fails +peer0.org1.example.com | [34c9 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org2.example.com | [3a8f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer1.org1.example.com | [3619 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [397b 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258eda0 gate 1598907134165790100 evaluation fails +peer0.org1.example.com | [34ca 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c2151b8f71c928893ff3b85aa6e51394cbe8ea916fed172463b5e58ddf295e1d] +peer1.org2.example.com | [3a90 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer1.org1.example.com | [361a 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> WARN Entering [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] +peer0.org2.example.com | [397c 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [34cb 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c2151b8f] Exit +peer1.org2.example.com | [3a91 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer1.org1.example.com | [361b 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> WARN Closing connection to Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: +peer0.org2.example.com | [397d 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [34cc 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c2151b8f] Entry chaincode: name:"lscc" +peer1.org2.example.com | [3a92 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer1.org1.example.com | [361c 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Closing connection for , PKIid:9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [397e 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [34cd 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c2151b8f] escc for chaincode name:"lscc" is escc +peer1.org2.example.com | [3a93 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer1.org1.example.com | [361d 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> WARN Exiting +peer0.org2.example.com | [397f 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258f330 gate 1598907134166143100 evaluation starts +peer0.org1.example.com | [34ce 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: c2151b8f71c928893ff3b85aa6e51394cbe8ea916fed172463b5e58ddf295e1d, chaincode: lscc} +peer1.org2.example.com | [3a94 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer1.org1.example.com | [361e 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3980 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258f330 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [34cf 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20DF4175E6B3B790D9C2741C78F2F4...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [3a95 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [361f 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:52:22.103Z grpc.peer_address=172.18.0.7:56540 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=146µs +peer0.org2.example.com | [3981 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258f330 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [34d0 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E1A0ABD05DE6DF1E18C0ACA5FC17E5FF0D343B1A32937E70F127449886AA475A +peer1.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | [3620 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3982 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258f330 principal matched by identity 0 +peer0.org1.example.com | [34d1 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: c2151b8f71c928893ff3b85aa6e51394cbe8ea916fed172463b5e58ddf295e1d, chaincode: lscc} +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | [3621 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A201FF20917D230849155...E4A8B03CA56915E0C92AB2E9A9B05566 +peer0.org2.example.com | [3983 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org1.example.com | [34d2 08-31 20:52:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c2151b8f] Exit +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | [3622 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D56C4ADAE45D55818D56BE9A170EE215D3C9735EDF59849DE8830E88DAA8DB4B +peer0.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org1.example.com | [34d3 08-31 20:52:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c2151b8f71c928893ff3b85aa6e51394cbe8ea916fed172463b5e58ddf295e1d] +peer1.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | [3623 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.7:56540 +peer0.org2.example.com | [3984 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org1.example.com | [34d4 08-31 20:52:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36888 +peer1.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | [3624 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7\nbuDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f\nVXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:56540 +peer0.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org1.example.com | [34d5 08-31 20:52:06.94 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36888 grpc.code=OK grpc.call_duration=17.3837ms +peer1.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org1.example.com | [3625 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org1.example.com | [34d6 08-31 20:52:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org1.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org1.example.com | [34d7 08-31 20:52:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org1.example.com | [3626 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 8b 59 63 7e 42 59 2a 1e 18 87 |0E.!...Yc~BY*...| +peer0.org1.example.com | [34d8 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36892 +peer1.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | [3985 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258f330 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 1c 62 6d f6 ca b7 50 e0 04 dc fa f9 21 83 2a b8 |.bm...P.....!.*.| +peer0.org1.example.com | [34d9 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003fbf6d0 +peer1.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org2.example.com | [3986 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00258f330 gate 1598907134166143100 evaluation succeeds +peer1.org1.example.com | 00000020 11 a8 ed cf a4 02 20 40 32 25 06 8f 29 9a 92 3e |...... @2%..)..>| +peer0.org1.example.com | [34da 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | [3987 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000030 c5 d3 f2 96 7b 37 c2 91 8e 40 25 8b 51 a9 68 02 |....{7...@%.Q.h.| +peer0.org1.example.com | [34db 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org2.example.com | [3988 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000040 29 4e 93 5f 2d 74 60 |)N._-t`| +peer0.org1.example.com | [34dc 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org2.example.com | [3989 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3627 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:56540 +peer0.org1.example.com | [34dd 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [398a 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3628 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:56540 +peer0.org1.example.com | [34de 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [3a96 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +peer0.org2.example.com | [398b 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org1.example.com | [3629 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [34df 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 4f 6f ff cb 9a aa f8 77 e0 33 ef 37 8f ad 90 |.Oo.....w.3.7...| +peer1.org2.example.com | [3a97 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +peer0.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [362a 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 da 9e 36 02 a3 a8 c6 7c fc ee 47 82 c1 24 12 0a |..6....|..G..$..| +peer1.org2.example.com | [3a98 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [398c 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org1.example.com | [362b 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [34e0 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 1f cf 76 b7 43 97 2b ab 14 ad |0E.!....v.C.+...| +peer1.org2.example.com | [3a99 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org1.example.com | [362c 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 3a 34 36 85 af 4c 3d ee a5 a9 12 10 58 f0 fa 47 |:46..L=.....X..G| +peer1.org2.example.com | [3a9a 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org1.example.com | [362d 08-31 20:52:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000020 1d 5b ca a3 e9 02 20 2d 02 dc ee 68 b8 e7 c6 de |.[.... -...h....| +peer1.org2.example.com | [3a9b 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org1.example.com | [362e 08-31 20:52:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D9816103F +peer0.org1.example.com | 00000030 70 5d 43 2d 7c b0 29 66 bd 4c a0 6a 98 62 4e e5 |p]C-|.)f.L.j.bN.| +peer1.org2.example.com | [3a9c 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [362f 08-31 20:52:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0B880769C07A0CE9F608F3FBD5CDECD0DA725D5734FBF559C7A2C63A852148F8 +peer0.org1.example.com | 00000040 00 f7 51 40 4b d2 46 |..Q@K.F| +peer1.org2.example.com | [3a9d 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org2.example.com | [398d 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3630 08-31 20:52:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [34e1 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [3a9e 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org2.example.com | [398e 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3631 08-31 20:52:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [34e2 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ea3420, header 0xc003fbfae0 +peer1.org2.example.com | [3a9f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +peer0.org2.example.com | [398f 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3632 08-31 20:52:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org2.example.com | [3aa0 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +peer0.org1.example.com | [34e3 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org2.example.com | [3990 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3633 08-31 20:52:20.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [3aa1 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +peer0.org1.example.com | [34e4 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4e57ca63] processing txid: 4e57ca6355883f9de4e2bdd856260effc05c6255435f9201bbf04e8441849f9d +peer0.org2.example.com | [3991 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3634 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3aa2 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +peer0.org1.example.com | [34e5 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [4e57ca6355883f9de4e2bdd856260effc05c6255435f9201bbf04e8441849f9d] +peer0.org2.example.com | [3992 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3635 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3aa3 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org1.example.com | [34e6 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4e57ca63] Entry chaincode: name:"qscc" +peer1.org1.example.com | [3636 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3993 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3aa4 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org1.example.com | [34e7 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][4e57ca63] Entry chaincode: name:"qscc" +peer1.org1.example.com | [3637 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3994 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3aa5 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org1.example.com | [34e8 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [3638 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3995 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3aa6 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org1.example.com | [34e9 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer1.org1.example.com | [3639 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3996 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3aa7 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org1.example.com | [34ea 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer1.org1.example.com | [363a 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3997 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3aa8 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org1.example.com | [34eb 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org1.example.com | [363b 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3998 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435430 gate 1598907134169904400 evaluation starts +peer1.org2.example.com | [3aa9 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [34ec 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [363c 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3999 08-31 20:52:14.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435430 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3aaa 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [34ed 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [363d 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 88 07 69 c0 7a 0c e9 f6 08 f3 fb d5 cd ec d0 |...i.z..........| +peer0.org2.example.com | [399a 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435430 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3aab 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org1.example.com | [34ee 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | 00000010 da 72 5d 57 34 fb f5 59 c7 a2 c6 3a 85 21 48 f8 |.r]W4..Y...:.!H.| +peer0.org2.example.com | [399b 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3aac 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [34ef 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054d80 gate 1598907127339993700 evaluation starts +peer1.org1.example.com | [363e 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f 6b 9a f7 47 1f 55 9f c4 aa 13 da |0D. _k..G.U.....| +peer0.org2.example.com | [399c 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435430 principal evaluation fails +peer1.org2.example.com | [3aad 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [34f0 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054d80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000010 ed eb e1 72 c1 03 65 c9 8f 4c bb 80 5b 51 58 56 |...r..e..L..[QXV| +peer0.org2.example.com | [399d 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000435430 gate 1598907134169904400 evaluation fails +peer1.org2.example.com | [3aae 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org1.example.com | [34f1 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054d80 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000020 c4 3c 97 6b 02 20 08 d0 37 a1 ec e7 29 f6 6a 8e |.<.k. ..7...).j.| +peer0.org2.example.com | [399e 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3aaf 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org1.example.com | [34f2 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | 00000030 8d 2e 4a eb a0 a0 c2 1b bb 09 5d 34 11 8a a3 10 |..J.......]4....| +peer0.org2.example.com | [399f 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3ab0 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org1.example.com | [34f3 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054d80 principal evaluation fails +peer1.org1.example.com | 00000040 98 22 7c 8a 63 b7 |."|.c.| +peer0.org2.example.com | [39a0 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3ab1 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org1.example.com | [34f4 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054d80 gate 1598907127339993700 evaluation fails +peer1.org1.example.com | [363f 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [39a1 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004359a0 gate 1598907134170314200 evaluation starts +peer1.org2.example.com | [3ab2 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org1.example.com | [34f5 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3640 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39a2 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004359a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ab3 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org1.example.com | [34f6 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3641 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [39a3 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004359a0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3ab4 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org1.example.com | [34f7 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3642 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39a4 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004359a0 principal matched by identity 0 +peer1.org2.example.com | [3ab5 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [34f8 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040552f0 gate 1598907127340639400 evaluation starts +peer1.org1.example.com | [3643 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [39a5 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org2.example.com | [3ab6 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org1.example.com | [34f9 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040552f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3644 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org2.example.com | [3ab7 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org1.example.com | [34fa 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040552f0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3645 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 88 07 69 c0 7a 0c e9 f6 08 f3 fb d5 cd ec d0 |...i.z..........| +peer0.org2.example.com | [39a6 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org2.example.com | [3ab8 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org1.example.com | [34fb 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040552f0 principal matched by identity 0 +peer1.org1.example.com | 00000010 da 72 5d 57 34 fb f5 59 c7 a2 c6 3a 85 21 48 f8 |.r]W4..Y...:.!H.| +peer0.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org2.example.com | [3ab9 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [34fc 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 4f 6f ff cb 9a aa f8 77 e0 33 ef 37 8f ad 90 |.Oo.....w.3.7...| +peer1.org1.example.com | [3646 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f 6b 9a f7 47 1f 55 9f c4 aa 13 da |0D. _k..G.U.....| +peer0.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org2.example.com | [3aba 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org1.example.com | 00000010 da 9e 36 02 a3 a8 c6 7c fc ee 47 82 c1 24 12 0a |..6....|..G..$..| +peer0.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org1.example.com | 00000010 ed eb e1 72 c1 03 65 c9 8f 4c bb 80 5b 51 58 56 |...r..e..L..[QXV| +peer1.org2.example.com | [3abb 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org1.example.com | [34fd 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 1f cf 76 b7 43 97 2b ab 14 ad |0E.!....v.C.+...| +peer0.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org1.example.com | 00000020 c4 3c 97 6b 02 20 08 d0 37 a1 ec e7 29 f6 6a 8e |.<.k. ..7...).j.| +peer1.org2.example.com | [3abc 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org1.example.com | 00000010 3a 34 36 85 af 4c 3d ee a5 a9 12 10 58 f0 fa 47 |:46..L=.....X..G| +peer0.org2.example.com | [39a7 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004359a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000030 8d 2e 4a eb a0 a0 c2 1b bb 09 5d 34 11 8a a3 10 |..J.......]4....| +peer1.org2.example.com | [3abd 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org1.example.com | 00000020 1d 5b ca a3 e9 02 20 2d 02 dc ee 68 b8 e7 c6 de |.[.... -...h....| +peer0.org2.example.com | [39a8 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004359a0 gate 1598907134170314200 evaluation succeeds +peer1.org1.example.com | 00000040 98 22 7c 8a 63 b7 |."|.c.| +peer1.org2.example.com | [3abe 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org1.example.com | 00000030 70 5d 43 2d 7c b0 29 66 bd 4c a0 6a 98 62 4e e5 |p]C-|.)f.L.j.bN.| +peer0.org2.example.com | [39a9 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3647 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3abf 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org1.example.com | 00000040 00 f7 51 40 4b d2 46 |..Q@K.F| +peer0.org2.example.com | [39aa 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3648 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ac0 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org1.example.com | [34fe 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040552f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [39ab 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3649 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3ac1 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org1.example.com | [34ff 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040552f0 gate 1598907127340639400 evaluation succeeds +peer0.org2.example.com | [39ac 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [364a 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ac2 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org1.example.com | [3500 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [39ad 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [364b 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3ac3 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org1.example.com | [3501 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [39ae 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [364c 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3ac4 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org1.example.com | [3502 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [364d 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39af 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3ac5 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [3503 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [364e 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [39b0 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ac6 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer0.org1.example.com | [3504 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU [4e57ca63] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [364f 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [39b1 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ac7 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer0.org1.example.com | [3505 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU [4e57ca63] notifying Txid:4e57ca6355883f9de4e2bdd856260effc05c6255435f9201bbf04e8441849f9d, channelID:businesschannel +peer1.org1.example.com | [3650 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [39b2 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ac8 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org1.example.com | [3506 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [3651 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [39b3 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3ac9 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3507 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][4e57ca63] Exit chaincode: name:"qscc" (2ms) +peer1.org1.example.com | [3652 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [39b4 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3aca 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org1.example.com | [3508 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4e57ca63] Exit +peer1.org1.example.com | [3653 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [39b5 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042abb0 gate 1598907134171552100 evaluation starts +peer1.org2.example.com | [3acb 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org1.example.com | [3509 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4e57ca63] Entry chaincode: name:"qscc" +peer1.org1.example.com | [3654 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [39b6 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042abb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3acc 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [350a 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4e57ca63] escc for chaincode name:"qscc" is escc +peer1.org1.example.com | [3655 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c38cf0 gate 1598907140453538100 evaluation starts +peer0.org2.example.com | [39b7 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042abb0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3acd 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [350b 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 4e57ca6355883f9de4e2bdd856260effc05c6255435f9201bbf04e8441849f9d, chaincode: qscc} +peer1.org1.example.com | [3656 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c38cf0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [39b8 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042abb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3ace 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [350c 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20D095FBC68ED0E8B61A0C596C1DD3...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [3657 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c38cf0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [39b9 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042abb0 principal evaluation fails +peer1.org2.example.com | [3acf 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [350d 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7F0A520CEC1E9169A4A87FBB8B8F7200B5D91B84599E6E0FFE0776A3D2734580 +peer1.org1.example.com | [3658 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c38cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org2.example.com | [39ba 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042abb0 gate 1598907134171552100 evaluation fails +peer1.org2.example.com | [3ad0 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [350e 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 4e57ca6355883f9de4e2bdd856260effc05c6255435f9201bbf04e8441849f9d, chaincode: qscc} +peer1.org1.example.com | [3659 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c38cf0 principal evaluation fails +peer0.org2.example.com | [39bb 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [350f 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4e57ca63] Exit +peer1.org1.example.com | [365a 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c38cf0 gate 1598907140453538100 evaluation fails +peer0.org2.example.com | [39bc 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3ad1 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [3510 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36892 +peer1.org1.example.com | [365b 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [39bd 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3ad2 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [3511 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36892 grpc.code=OK grpc.call_duration=4.7573ms +peer1.org1.example.com | [365c 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [39be 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042b150 gate 1598907134171890200 evaluation starts +peer1.org2.example.com | [3ad3 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [3512 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [365d 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [39bf 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042b150 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ad4 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org1.example.com | [3513 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [365e 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c39260 gate 1598907140453948100 evaluation starts +peer0.org2.example.com | [39c0 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042b150 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3ad5 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3514 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36896 +peer1.org1.example.com | [365f 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c39260 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [39c1 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042b150 principal matched by identity 0 +peer1.org2.example.com | [3ad6 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [3515 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0040aea50 +peer1.org1.example.com | [3660 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c39260 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [39c2 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org2.example.com | [3ad7 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [3516 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [3661 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c39260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org2.example.com | [3ad8 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer1.org1.example.com | [3662 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c39260 principal evaluation fails +peer0.org1.example.com | [3517 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [39c3 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org2.example.com | [3ad9 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer1.org1.example.com | [3663 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c39260 gate 1598907140453948100 evaluation fails +peer0.org1.example.com | [3518 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org2.example.com | [3ada 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [3519 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [3664 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org2.example.com | [3adb 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer1.org1.example.com | [3665 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3666 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3adc 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [351a 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [3667 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c397d0 gate 1598907140455399300 evaluation starts +peer1.org2.example.com | [3add 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org1.example.com | [351b 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 b1 99 7c 77 71 65 bc 1b c3 cd ba 4d 39 4a 11 |G..|wqe.....M9J.| +peer1.org1.example.com | [3668 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c397d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ade 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [39c4 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042b150 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 07 94 1d fb 81 d3 d7 67 9d 52 5d 78 bc 49 87 04 |.......g.R]x.I..| +peer1.org1.example.com | [3669 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c397d0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3adf 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org2.example.com | [39c5 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00042b150 gate 1598907134171890200 evaluation succeeds +peer0.org1.example.com | [351c 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 94 9c 86 7b c7 7d f1 72 97 df e8 |0D. f...{.}.r...| +peer1.org1.example.com | [366a 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c397d0 principal matched by identity 0 +peer1.org2.example.com | [3ae0 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org2.example.com | [39c6 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000010 42 dd 2e 6f 78 d8 b1 22 4d d8 19 64 eb 1f 90 a2 |B..ox.."M..d....| +peer1.org1.example.com | [366b 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 2d fa 2c 67 2d 33 a2 36 ed 3d 13 c1 c8 85 c9 |.-.,g-3.6.=.....| +peer1.org2.example.com | [3ae1 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org2.example.com | [39c7 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000020 43 0c bc 06 02 20 61 85 26 13 bf 36 49 9c da 82 |C.... a.&..6I...| +peer1.org1.example.com | 00000010 83 7a 4c 24 5b 0c 04 d2 88 56 85 dc b2 1c 45 94 |.zL$[....V....E.| +peer1.org2.example.com | [3ae2 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org2.example.com | [39c8 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 4a fd b9 2b 67 39 e2 e6 87 6a 2b 62 09 17 e3 8c |J..+g9...j+b....| +peer1.org1.example.com | [366c 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af 20 a1 09 1c b0 bc d3 33 1d d8 |0E.!.. ......3..| +peer1.org2.example.com | [3ae3 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org2.example.com | [39c9 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000040 cf 76 69 fe 63 18 |.vi.c.| +peer1.org1.example.com | 00000010 2f 39 96 d4 04 4d fb d7 cd 9b 02 d7 80 b2 65 c2 |/9...M........e.| +peer1.org2.example.com | [3ae4 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org2.example.com | [39ca 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org1.example.com | [351d 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | 00000020 e3 41 10 75 df 02 20 63 80 44 a9 7f 76 7e 77 cc |.A.u.. c.D..v~w.| +peer1.org2.example.com | [3ae5 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org1.example.com | 00000030 50 e7 e1 bd 41 ed c0 d9 81 28 40 ed dc 16 81 21 |P...A....(@....!| +peer1.org2.example.com | [3ae6 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org1.example.com | [351e 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ea3880, header 0xc0040aee60 +peer0.org2.example.com | [39cb 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org1.example.com | 00000040 1f 80 aa c0 1b 5d ec |.....].| +peer1.org2.example.com | [3ae7 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org1.example.com | [351f 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org1.example.com | [366d 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c397d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ae8 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org1.example.com | [3520 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d1e7aa33] processing txid: d1e7aa33601650943f6b3e1229428b2a639b8ac3f18ca81c64731f2d2800a685 +peer0.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org1.example.com | [366e 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c397d0 gate 1598907140455399300 evaluation succeeds +peer1.org2.example.com | [3ae9 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [3521 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [d1e7aa33601650943f6b3e1229428b2a639b8ac3f18ca81c64731f2d2800a685] +peer0.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org1.example.com | [366f 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3aea 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [3522 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d1e7aa33] Entry chaincode: name:"qscc" +peer0.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org1.example.com | [3670 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3aeb 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [3523 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][d1e7aa33] Entry chaincode: name:"qscc" +peer0.org2.example.com | [39cc 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org1.example.com | [3671 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3aec 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [3524 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [3672 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3aed 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +peer0.org1.example.com | [3525 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetBlockByNumber on chain: businesschannel +peer0.org2.example.com | [39cd 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org1.example.com | [3673 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3526 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber +peer1.org2.example.com | [3aee 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org1.example.com | [3674 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes t: {1598907045476826300 58 {} [] 0} +peer0.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org1.example.com | [3675 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org1.example.com | [3527 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org2.example.com | [3aef 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer1.org1.example.com | [3676 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org1.example.com | [3528 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3af0 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer1.org1.example.com | [3677 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39ce 08-31 20:52:14.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3529 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3af1 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer1.org1.example.com | [3678 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [39cf 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [352a 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3af2 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer1.org1.example.com | [3679 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39d0 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f2 73 70 48 08 e2 70 8a 50 56 db 7b 6d 14 78 a5 |.spH..p.PV.{m.x.| +peer0.org1.example.com | [352b 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bdc20 gate 1598907127518406100 evaluation starts +peer1.org2.example.com | [3af3 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer1.org1.example.com | [367a 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 7b 13 fd 9a d6 90 73 cd 05 9c f4 2f 34 2f 60 7f |{.....s..../4/`.| +peer0.org1.example.com | [352c 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bdc20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3af4 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer1.org1.example.com | [367b 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [39d1 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 85 44 b2 1f fb 80 c6 9a 4e c9 45 |0D. ..D......N.E| +peer0.org1.example.com | [352d 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bdc20 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3af5 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer1.org1.example.com | [367c 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 a4 d9 48 89 c7 f4 9c 7c 48 cf 76 e0 43 ee 42 78 |..H....|H.v.C.Bx| +peer0.org1.example.com | [352e 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bdc20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3af6 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer1.org1.example.com | [367d 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000020 04 02 dc a2 02 20 14 bc 61 54 45 55 fd 8d 4f 52 |..... ..aTEU..OR| +peer0.org1.example.com | [352f 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bdc20 principal evaluation fails +peer1.org2.example.com | [3af7 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer1.org1.example.com | [367e 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 bf 9b d6 e7 b3 c4 e2 74 8b 8b 93 72 45 76 51 07 |.......t...rEvQ.| +peer0.org1.example.com | [3530 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bdc20 gate 1598907127518406100 evaluation fails +peer1.org2.example.com | [3af8 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer1.org1.example.com | [367f 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 9c 05 0e 83 bc be |......| +peer0.org1.example.com | [3531 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3af9 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer1.org1.example.com | [3680 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39d2 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3532 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3afa 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer1.org1.example.com | [3681 08-31 20:52:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39d3 08-31 20:52:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3533 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3afb 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer1.org1.example.com | [3682 08-31 20:52:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39d4 08-31 20:52:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3534 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004118190 gate 1598907127518807600 evaluation starts +peer1.org2.example.com | [3afc 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer1.org1.example.com | [3683 08-31 20:52:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39d5 08-31 20:52:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org1.example.com | [3535 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004118190 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3afd 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer1.org1.example.com | [3684 08-31 20:52:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3536 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004118190 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [39d6 08-31 20:52:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer1.org2.example.com | [3afe 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer1.org1.example.com | [3685 08-31 20:52:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3537 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004118190 principal matched by identity 0 +peer0.org2.example.com | [39d7 08-31 20:52:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3aff 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer1.org1.example.com | [3686 08-31 20:52:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3538 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 b1 99 7c 77 71 65 bc 1b c3 cd ba 4d 39 4a 11 |G..|wqe.....M9J.| +peer0.org2.example.com | [39d8 08-31 20:52:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b00 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +peer1.org1.example.com | [3687 08-31 20:52:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 07 94 1d fb 81 d3 d7 67 9d 52 5d 78 bc 49 87 04 |.......g.R]x.I..| +peer0.org2.example.com | [39d9 08-31 20:52:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | [3b01 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer1.org1.example.com | [3688 08-31 20:52:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3539 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 94 9c 86 7b c7 7d f1 72 97 df e8 |0D. f...{.}.r...| +peer0.org2.example.com | [39da 08-31 20:52:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b02 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer1.org1.example.com | [3689 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000010 42 dd 2e 6f 78 d8 b1 22 4d d8 19 64 eb 1f 90 a2 |B..ox.."M..d....| +peer0.org2.example.com | [39db 08-31 20:52:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b03 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer1.org1.example.com | [368a 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 43 0c bc 06 02 20 61 85 26 13 bf 36 49 9c da 82 |C.... a.&..6I...| +peer0.org2.example.com | [39dc 08-31 20:52:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3b04 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [368b 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000030 4a fd b9 2b 67 39 e2 e6 87 6a 2b 62 09 17 e3 8c |J..+g9...j+b....| +peer0.org2.example.com | [39dd 08-31 20:52:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b05 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [368c 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | 00000040 cf 76 69 fe 63 18 |.vi.c.| +peer0.org2.example.com | [39de 08-31 20:52:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b06 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [353a 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004118190 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [368d 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 37 b5 70 e3 a4 f1 ec 54 49 6d a3 9a 84 48 c1 |.7.p....TIm...H.| +peer0.org2.example.com | [39df 08-31 20:52:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b07 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [353b 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004118190 gate 1598907127518807600 evaluation succeeds +peer1.org1.example.com | 00000010 e5 6e 48 d8 a7 80 59 ee a6 80 fa 29 4a 4b a2 ea |.nH...Y....)JK..| +peer0.org2.example.com | [39e0 08-31 20:52:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b08 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [353c 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [368e 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb b6 89 09 b2 93 e7 02 6c 2a fc |0E.!.........l*.| +peer0.org2.example.com | [39e1 08-31 20:52:14.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b09 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [353d 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 b8 86 d3 9e 43 da aa 65 de c3 65 0a 5d a3 27 25 |....C..e..e.].'%| +peer0.org2.example.com | [39e2 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b0a 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e0500 gate 1598907139447261600 evaluation starts +peer0.org1.example.com | [353e 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000020 41 30 46 20 50 02 20 78 90 37 a2 c0 38 ea 80 94 |A0F P. x.7..8...| +peer0.org2.example.com | [39e3 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b0b 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e0500 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [353f 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 ca 35 c3 84 1d b9 9e 03 bc 73 62 2b a8 cd 69 6b |.5.......sb+..ik| +peer0.org2.example.com | [39e4 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b0c 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e0500 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3540 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveBlockByNumber() - blockNum = [2] +peer1.org1.example.com | 00000040 20 0a 6f d2 1c 1f c5 | .o....| +peer0.org2.example.com | [39e5 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b0d 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e0500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3541 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[56675] +peer1.org1.example.com | [368f 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [39e6 08-31 20:52:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b0e 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e0500 principal evaluation fails +peer0.org1.example.com | [3542 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[40873], Going to peek [8] bytes +peer1.org1.example.com | [3690 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, AliveMessage: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes t: {1598907045534780300 57 {} [] 0} +peer0.org2.example.com | [39e7 08-31 20:52:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b0f 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e0500 gate 1598907139447261600 evaluation fails +peer0.org1.example.com | [3543 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[28202], placementInfo={fileNum=[0], startOffset=[56675], bytesOffset=[56678]} +peer1.org1.example.com | [3691 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [39e8 08-31 20:52:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 5 1 2] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org2.example.com | [3b10 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3692 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3544 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU [d1e7aa33] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [39e9 08-31 20:52:14.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b11 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3693 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3545 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU [d1e7aa33] notifying Txid:d1e7aa33601650943f6b3e1229428b2a639b8ac3f18ca81c64731f2d2800a685, channelID:businesschannel +peer0.org2.example.com | [39ea 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b12 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3694 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3546 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [39eb 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b13 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e0b60 gate 1598907139448214500 evaluation starts +peer1.org1.example.com | [3695 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3547 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][d1e7aa33] Exit chaincode: name:"qscc" (5ms) +peer0.org2.example.com | [39ec 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b14 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e0b60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3696 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3548 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d1e7aa33] Exit +peer0.org2.example.com | [39ed 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3b15 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e0b60 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3697 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3549 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d1e7aa33] Entry chaincode: name:"qscc" +peer0.org2.example.com | [39ee 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff e3 09 84 f3 a2 0e a4 c9 6b 29 4a 9f a6 d7 c1 |.........k)J....| +peer1.org2.example.com | [3b16 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e0b60 principal matched by identity 0 +peer1.org1.example.com | [3698 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [354a 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d1e7aa33] escc for chaincode name:"qscc" is escc +peer0.org2.example.com | 00000010 fa 43 9a e5 c6 d1 66 47 34 7a 48 71 77 43 83 82 |.C....fG4zHqwC..| +peer1.org2.example.com | [3b17 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer1.org1.example.com | [3699 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [354b 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: d1e7aa33601650943f6b3e1229428b2a639b8ac3f18ca81c64731f2d2800a685, chaincode: qscc} +peer0.org2.example.com | [39ef 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 52 c6 39 30 34 23 76 dd 90 6f |0E.!..R.904#v..o| +peer1.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer1.org1.example.com | [369a 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [354c 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A208599ABA728B09F1B4C14F33DC942...455254494649434154452D2D2D2D2D0A +peer0.org2.example.com | 00000010 99 a9 38 4b b8 01 c0 e2 7c ee 8e fe 2f ae e6 88 |..8K....|.../...| +peer1.org2.example.com | [3b18 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer1.org1.example.com | [369b 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [354d 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C854528D7203032B8A296434F93ECFC16680B9770B152CEBFC532C28FF2B5A4B +peer0.org2.example.com | 00000020 bf f2 6b 81 92 02 20 67 41 a5 91 f2 38 4f ff a8 |..k... gA...8O..| +peer1.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer1.org1.example.com | [369c 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [354e 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: d1e7aa33601650943f6b3e1229428b2a639b8ac3f18ca81c64731f2d2800a685, chaincode: qscc} +peer0.org2.example.com | 00000030 0e 43 54 c3 54 b0 67 20 0f b4 88 85 19 54 62 6b |.CT.T.g .....Tbk| +peer1.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer1.org1.example.com | [369d 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [354f 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d1e7aa33] Exit +peer0.org2.example.com | 00000040 f8 18 2b cc 12 b9 6d |..+...m| +peer1.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer1.org1.example.com | [369e 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3550 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36896 +peer0.org2.example.com | [39f0 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer1.org1.example.com | [369f 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3551 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36896 grpc.code=OK grpc.call_duration=7.532ms +peer0.org2.example.com | [39f1 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3b19 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e0b60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [36a0 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3552 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [39f2 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3b1a 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e0b60 gate 1598907139448214500 evaluation succeeds +peer1.org1.example.com | [36a1 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3553 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:36896: read: connection reset by peer +peer0.org2.example.com | [39f3 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3b1b 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [36a2 08-31 20:52:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3554 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [39f4 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3b1c 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [36a3 08-31 20:52:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3555 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36900 +peer0.org2.example.com | [39f5 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b1d 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [36a4 08-31 20:52:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3556 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00402c960 +peer0.org2.example.com | [39f6 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b1e 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [36a5 08-31 20:52:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3557 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [39f7 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b1f 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36a6 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3558 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [39f8 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b20 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [36a7 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3559 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [39f9 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b21 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [36a8 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [355a 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org2.example.com | [39fa 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3b22 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [36a9 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [355b 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [39fb 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b23 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [36aa 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [355c 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 2e c1 bc 73 b1 d9 c8 f6 0d 58 a4 46 87 59 18 |....s.....X.F.Y.| +peer0.org2.example.com | [39fc 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 5b ec 7e 8b 9c 4b 47 f5 eb b0 d9 da 15 9b 0b de |[.~..KG.........| +peer0.org2.example.com | [39fd 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [355d 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 d8 bf 3d f1 a7 56 70 c4 44 53 ad |0D. q..=..Vp.DS.| +peer1.org2.example.com | [3b24 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [36ab 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39fe 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 96 03 39 47 04 74 64 05 c9 ff 10 95 87 b7 c8 38 |..9G.td........8| +peer1.org2.example.com | [3b25 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e16e0 gate 1598907139459228600 evaluation starts +peer1.org1.example.com | [36ac 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [39ff 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | 00000020 33 79 80 95 02 20 26 bf 74 1b c3 60 a0 d3 8d 78 |3y... &.t..`...x| +peer1.org2.example.com | [3b26 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e16e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [36ad 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a00 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 d2 e2 e6 84 44 9f 06 e7 05 63 28 be 6e 36 ed 10 |....D....c(.n6..| +peer1.org2.example.com | [3b27 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e16e0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [36ae 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [3a01 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | 00000040 a7 b3 26 94 73 8f |..&.s.| +peer1.org2.example.com | [3b28 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e16e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org1.example.com | [36af 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a02 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [355e 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [3b29 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e16e0 principal evaluation fails +peer1.org1.example.com | [36b0 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a03 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [355f 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00400e310, header 0xc00402cd70 +peer1.org2.example.com | [3b2a 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e16e0 gate 1598907139459228600 evaluation fails +peer1.org1.example.com | [36b1 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a04 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3560 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org2.example.com | [3b2b 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36b2 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a05 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3561 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8ab9f882] processing txid: 8ab9f882c8efc65f7bf8ccc10b9fb72400ff6044eeb276be0d5cb1e51dd06403 +peer1.org2.example.com | [3b2c 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [36b3 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [3a06 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3562 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [8ab9f882c8efc65f7bf8ccc10b9fb72400ff6044eeb276be0d5cb1e51dd06403] +peer1.org2.example.com | [3b2d 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [36b4 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a07 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3563 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8ab9f882] Entry chaincode: name:"cscc" +peer1.org2.example.com | [3b2e 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e1c50 gate 1598907139459765800 evaluation starts +peer1.org1.example.com | [36b5 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3a08 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3564 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8ab9f882] Entry chaincode: name:"cscc" +peer1.org2.example.com | [3b2f 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e1c50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [36b6 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3a09 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3565 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [3b30 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e1c50 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [36b7 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3a0a 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3566 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetConfigBlock +peer1.org2.example.com | [3b31 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e1c50 principal matched by identity 0 +peer1.org1.example.com | [36b8 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3a0b 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3567 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock +peer1.org2.example.com | [3b32 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org1.example.com | [36b9 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3a0c 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3568 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org1.example.com | [36ba 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3a0d 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3569 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3b33 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org1.example.com | [36bb 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81bd0 gate 1598907141095979100 evaluation starts +peer0.org2.example.com | [3a0e 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [356a 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org1.example.com | [36bc 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81bd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a0f 08-31 20:52:15.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [356b 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org1.example.com | [36bd 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81bd0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3a10 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [356c 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004011e50 gate 1598907127920110100 evaluation starts +peer1.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org2.example.com | [3a11 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [356d 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004011e50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3b34 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e1c50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [36be 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org2.example.com | [3a12 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [356e 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004011e50 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3b35 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e1c50 gate 1598907139459765800 evaluation succeeds +peer1.org1.example.com | [36bf 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81bd0 principal evaluation fails +peer0.org2.example.com | [3a13 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [356f 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004011e50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3b36 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [36c0 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c81bd0 gate 1598907141095979100 evaluation fails +peer0.org1.example.com | [3570 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004011e50 principal evaluation fails +peer0.org2.example.com | [3a14 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3b37 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [36c1 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3571 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004011e50 gate 1598907127920110100 evaluation fails +peer0.org2.example.com | [3a15 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bfe70 gate 1598907135282430100 evaluation starts +peer1.org2.example.com | [3b38 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [36c2 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3572 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a16 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bfe70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3b39 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [36c3 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3573 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a17 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bfe70 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3b3a 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [36c4 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0140 gate 1598907141101561100 evaluation starts +peer0.org1.example.com | [3574 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3a18 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bfe70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3b3b 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [36c5 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0140 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3575 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d03c0 gate 1598907127920754300 evaluation starts +peer0.org2.example.com | [3a19 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bfe70 principal evaluation fails +peer1.org2.example.com | [3b3c 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [36c6 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0140 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3576 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d03c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a1a 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003bfe70 gate 1598907135282430100 evaluation fails +peer1.org2.example.com | [3b3d 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [36c7 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3577 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d03c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3a1b 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3b3e 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [36c8 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0140 principal evaluation fails +peer0.org2.example.com | [3a1c 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3578 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d03c0 principal matched by identity 0 +peer1.org2.example.com | [3b3f 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d46e0 gate 1598907139460624700 evaluation starts +peer1.org2.example.com | [3b40 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d46e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a1d 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3579 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 2e c1 bc 73 b1 d9 c8 f6 0d 58 a4 46 87 59 18 |....s.....X.F.Y.| +peer1.org2.example.com | [3b41 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d46e0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [36c9 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb0140 gate 1598907141101561100 evaluation fails +peer0.org2.example.com | [3a1e 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a63e0 gate 1598907135282754900 evaluation starts +peer0.org1.example.com | 00000010 5b ec 7e 8b 9c 4b 47 f5 eb b0 d9 da 15 9b 0b de |[.~..KG.........| +peer1.org2.example.com | [3b42 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d46e0 principal matched by identity 0 +peer1.org1.example.com | [36ca 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a1f 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a63e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [357a 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 d8 bf 3d f1 a7 56 70 c4 44 53 ad |0D. q..=..Vp.DS.| +peer1.org2.example.com | [3b43 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org1.example.com | [36cb 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3a20 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a63e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 96 03 39 47 04 74 64 05 c9 ff 10 95 87 b7 c8 38 |..9G.td........8| +peer1.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [36cc 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3a21 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a63e0 principal matched by identity 0 +peer0.org1.example.com | 00000020 33 79 80 95 02 20 26 bf 74 1b c3 60 a0 d3 8d 78 |3y... &.t..`...x| +peer1.org2.example.com | [3b44 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org1.example.com | [36cd 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb06b0 gate 1598907141103888200 evaluation starts +peer0.org2.example.com | [3a22 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 22 7d a8 75 eb 64 0c e8 bf 3b 87 b4 87 16 63 |."}.u.d...;....c| +peer0.org1.example.com | 00000030 d2 e2 e6 84 44 9f 06 e7 05 63 28 be 6e 36 ed 10 |....D....c(.n6..| +peer1.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org1.example.com | [36ce 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb06b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | 00000010 c4 ab a7 84 58 2b f5 5f 87 74 1c 13 c0 1a 22 21 |....X+._.t...."!| +peer0.org1.example.com | 00000040 a7 b3 26 94 73 8f |..&.s.| +peer1.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org1.example.com | [36cf 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb06b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3a23 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 b3 f2 a6 31 57 10 a9 ae e4 cb 9e |0D. ....1W......| +peer0.org1.example.com | [357b 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d03c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org1.example.com | [36d0 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb06b0 principal matched by identity 0 +peer0.org2.example.com | 00000010 a5 8d 94 82 49 64 ac 44 14 43 74 02 5a 7a da 96 |....Id.D.Ct.Zz..| +peer0.org1.example.com | [357c 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d03c0 gate 1598907127920754300 evaluation succeeds +peer1.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [36d1 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 9e 73 14 28 18 21 1d f9 18 a6 7b 11 64 ed 40 |..s.(.!....{.d.@| +peer0.org2.example.com | 00000020 eb 21 a5 40 02 20 58 52 e1 be 34 53 83 9a cc c7 |.!.@. XR..4S....| +peer0.org1.example.com | [357d 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3b45 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d46e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 87 cd 2c 29 a5 28 0d 2d c8 e9 60 18 ae 29 bf 2d |..,).(.-..`..).-| +peer0.org2.example.com | 00000030 2d a6 17 3b 30 7d 4e c7 83 9f 5e e4 c3 de 13 0e |-..;0}N...^.....| +peer0.org1.example.com | [357e 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3b46 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002d46e0 gate 1598907139460624700 evaluation succeeds +peer1.org1.example.com | [36d2 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e1 77 99 e7 ee 43 a9 6f 30 e6 |0E.!...w...C.o0.| +peer0.org2.example.com | 00000040 79 35 3a 99 cd df |y5:...| +peer0.org1.example.com | [357f 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3b47 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a24 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a63e0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | 00000010 fb 77 6a da bf cc 64 75 9d eb 18 cb 69 d4 bf c0 |.wj...du....i...| +peer0.org1.example.com | [3580 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3b48 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a25 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a63e0 gate 1598907135282754900 evaluation succeeds +peer1.org1.example.com | 00000020 08 bf 62 c2 4a 02 20 6d 34 73 8a 97 9d a4 7f c5 |..b.J. m4s......| +peer1.org2.example.com | [3b49 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3a26 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000030 ba 10 d5 39 69 b9 5e e5 63 68 00 ce 7a 49 9e 5e |...9i.^.ch..zI.^| +peer0.org2.example.com | [3a27 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3b4a 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3581 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU [8ab9f882] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [3582 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU [8ab9f882] notifying Txid:8ab9f882c8efc65f7bf8ccc10b9fb72400ff6044eeb276be0d5cb1e51dd06403, channelID:businesschannel +peer0.org2.example.com | [3a28 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3b4b 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer0.org1.example.com | [3583 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | 00000040 f1 b2 c8 7f c7 f5 c3 |.......| +peer0.org2.example.com | [3a29 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3b4c 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer0.org1.example.com | [3584 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8ab9f882] Exit chaincode: name:"cscc" (3ms) +peer1.org1.example.com | [36d3 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb06b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3a2a 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b4d 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer0.org1.example.com | [3585 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8ab9f882] Exit +peer1.org1.example.com | [36d4 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb06b0 gate 1598907141103888200 evaluation succeeds +peer0.org2.example.com | [3a2b 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3b4e 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer0.org1.example.com | [3586 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8ab9f882] Entry chaincode: name:"cscc" +peer1.org1.example.com | [36d5 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a2c 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3b4f 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3587 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8ab9f882] escc for chaincode name:"cscc" is escc +peer1.org1.example.com | [36d6 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3a2d 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3b50 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +peer0.org1.example.com | [3588 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 8ab9f882c8efc65f7bf8ccc10b9fb72400ff6044eeb276be0d5cb1e51dd06403, chaincode: cscc} +peer1.org1.example.com | [36d7 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3a2e 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3b51 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer0.org1.example.com | [3589 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A206DCAF70A573A8AA93AB0A861A803...455254494649434154452D2D2D2D2D0A +peer1.org1.example.com | [36d8 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3a2f 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b52 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [358a 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0EF91D50E248A1B498302A623ED4026F433A0413B4D3815B1DDE9A38D40EACDE +peer1.org1.example.com | [36d9 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a30 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b53 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org1.example.com | [358b 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 8ab9f882c8efc65f7bf8ccc10b9fb72400ff6044eeb276be0d5cb1e51dd06403, chaincode: cscc} +peer1.org1.example.com | [36da 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3a31 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b54 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [358c 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8ab9f882] Exit +peer1.org1.example.com | [36db 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3a32 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [358d 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36900 +peer1.org2.example.com | [3b55 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [36dc 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3a33 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [358e 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36900 grpc.code=OK grpc.call_duration=5.2333ms +peer1.org2.example.com | [3b56 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [36dd 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3a34 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [358f 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [3b57 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [36de 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a35 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3590 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [3b58 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer1.org1.example.com | [36df 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a36 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3591 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36904 +peer1.org2.example.com | [3b59 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [36e0 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a37 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3592 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00402ddb0 +peer1.org2.example.com | [3b5a 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [36e1 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [3a38 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3593 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [3b5b 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | [36e2 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a39 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3594 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [3b5c 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [36e3 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a3a 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3595 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer1.org2.example.com | [3b5d 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0002e9500, CONNECTING +peer1.org1.example.com | [36e4 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a3b 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3596 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org2.example.com | [3b5e 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [36e5 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3a3c 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3597 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [3b5f 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [36e6 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [3a3d 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3598 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 3a 1e ab 06 7c d4 07 79 13 de d4 43 74 bd b9 |.:...|..y...Ct..| +peer1.org2.example.com | [3b60 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer1.org1.example.com | [36e7 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a3e 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 96 df 4b 20 9d 22 30 80 fb d4 03 e7 70 c6 bb f9 |..K ."0.....p...| +peer1.org2.example.com | [3b61 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [36e8 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3599 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 0d 7f 9a 22 1e 1b 87 e6 60 f9 60 |0D. /..."....`.`| +peer0.org2.example.com | [3a3f 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [3b62 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc000345290, CONNECTING +peer1.org1.example.com | [36e9 08-31 20:52:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | 00000010 f2 39 8a 6c 1b 01 11 8c ac fc d1 08 fd 6d 19 ed |.9.l.........m..| +peer0.org2.example.com | [3a40 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b63 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer1.org1.example.com | [36ea 08-31 20:52:21.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000020 67 4d 1b 45 02 20 14 af d9 81 91 4c fe dd 82 4d |gM.E. .....L...M| +peer0.org2.example.com | [3a41 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b64 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer1.org1.example.com | [36eb 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | 00000030 8d 9f 68 53 c8 97 8d 02 f9 48 62 f0 f0 ef 6c 74 |..hS.....Hb...lt| +peer0.org2.example.com | [3a42 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b65 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +peer1.org1.example.com | [36ec 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | 00000040 00 03 d5 54 af 8d |...T..| +peer0.org2.example.com | [3a43 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b66 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer1.org1.example.com | [36ed 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [359a 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [3a44 08-31 20:52:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b67 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer1.org1.example.com | [36ee 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [359b 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00400e770, header 0xc00429e1e0 +peer0.org2.example.com | [3a45 08-31 20:52:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b68 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer1.org1.example.com | [36ef 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [359c 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org2.example.com | [3a46 08-31 20:52:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b69 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0037207c0 env 0xc0031fb2c0 txn 0 +peer1.org1.example.com | [36f0 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [359d 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e547306b] processing txid: e547306bf13a2744398c078227f797d756a0566d90a73d32cefdc86f6f5b1ed9 +peer0.org2.example.com | [3a47 08-31 20:52:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b6a 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer1.org1.example.com | [36f1 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [359e 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [e547306bf13a2744398c078227f797d756a0566d90a73d32cefdc86f6f5b1ed9] +peer0.org2.example.com | [3a48 08-31 20:52:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3b6b 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 136ms +peer1.org1.example.com | [36f2 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [359f 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e547306b] Entry chaincode: name:"cscc" +peer0.org2.example.com | [3a49 08-31 20:52:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161033 +peer1.org2.example.com | [3b6c 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [35a0 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e547306b] Entry chaincode: name:"cscc" +peer1.org1.example.com | [36f3 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a4a 08-31 20:52:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AFB2108ABE074303C55359743F2B84BBEB3F1D1EB13F26F71A82B3690B46E511 +peer0.org1.example.com | [35a1 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [3b6d 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer1.org1.example.com | [36f4 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a4b 08-31 20:52:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [35a2 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer1.org2.example.com | [3b6e 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer1.org1.example.com | [36f5 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a4c 08-31 20:52:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [35a3 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 3a 1e ab 06 7c d4 07 79 13 de d4 43 74 bd b9 |.:...|..y...Ct..| +peer1.org2.example.com | [3b6f 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +peer1.org1.example.com | [36f6 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a4d 08-31 20:52:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org1.example.com | 00000010 96 df 4b 20 9d 22 30 80 fb d4 03 e7 70 c6 bb f9 |..K ."0.....p...| +peer1.org2.example.com | [3b70 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer1.org1.example.com | [36f7 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a4e 08-31 20:52:15.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [35a4 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 0d 7f 9a 22 1e 1b 87 e6 60 f9 60 |0D. /..."....`.`| +peer1.org2.example.com | [3b71 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer1.org1.example.com | [36f8 08-31 20:52:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a4f 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 f2 39 8a 6c 1b 01 11 8c ac fc d1 08 fd 6d 19 ed |.9.l.........m..| +peer1.org2.example.com | [3b72 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer1.org1.example.com | [36f9 08-31 20:52:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a50 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 67 4d 1b 45 02 20 14 af d9 81 91 4c fe dd 82 4d |gM.E. .....L...M| +peer1.org2.example.com | [3b73 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +peer1.org1.example.com | [36fa 08-31 20:52:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a51 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 8d 9f 68 53 c8 97 8d 02 f9 48 62 f0 f0 ef 6c 74 |..hS.....Hb...lt| +peer1.org2.example.com | [3b74 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer1.org1.example.com | [36fb 08-31 20:52:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a52 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | 00000040 00 03 d5 54 af 8d |...T..| +peer1.org2.example.com | [3b75 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer1.org1.example.com | [36fc 08-31 20:52:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a53 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [35a5 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU [e547306b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [3b76 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer1.org1.example.com | [36fd 08-31 20:52:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a54 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [35a6 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU [e547306b] notifying Txid:e547306bf13a2744398c078227f797d756a0566d90a73d32cefdc86f6f5b1ed9, channelID:businesschannel +peer1.org2.example.com | [3b77 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer1.org1.example.com | [36fe 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3a55 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35a7 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [3b78 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer1.org1.example.com | [36ff 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161040 +peer0.org2.example.com | [3a56 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [35a8 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e547306b] Exit chaincode: name:"cscc" (1ms) +peer1.org2.example.com | [3b79 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer1.org1.example.com | [3700 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 91B28229C02AF9B3A5B0B234504931B37DFC932C848A3D36EC6F509E1A66C02C +peer0.org2.example.com | [3a57 08-31 20:52:15.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35a9 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e547306b] Exit +peer1.org2.example.com | [3b7a 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org1.example.com | [3701 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3a58 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [35aa 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e547306b] Entry chaincode: name:"cscc" +peer1.org2.example.com | [3b7b 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc0002e9500, READY +peer1.org1.example.com | [3702 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3a59 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [35ab 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e547306b] escc for chaincode name:"cscc" is escc +peer1.org2.example.com | [3b7c 08-31 20:52:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc000345290, READY +peer1.org1.example.com | [3703 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer0.org2.example.com | [3a5a 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [35ac 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: e547306bf13a2744398c078227f797d756a0566d90a73d32cefdc86f6f5b1ed9, chaincode: cscc} +peer1.org1.example.com | [3704 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a5b 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35ad 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A207D162BA32AD69B45A803103D2475...455254494649434154452D2D2D2D2D0A +peer1.org2.example.com | [3b7d 08-31 20:52:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer1.org1.example.com | [3705 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3a5c 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [35ae 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 47D827293931F1DB0C30CEE6EE0DBB05DAAE1001BF631C415E00F9551511A370 +peer1.org2.example.com | [3b7e 08-31 20:52:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer1.org1.example.com | [3706 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\002\303eS\003\014\311-3Y`\232\326-\377\211P\266\304ek~\272p\337\346\336\224SV\231\002 f\244q\307VCDA\302\366\337JmJm\344\000\2654\275R{\347:y\036\264n\235\222\266\212" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3a5d 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35af 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: e547306bf13a2744398c078227f797d756a0566d90a73d32cefdc86f6f5b1ed9, chaincode: cscc} +peer1.org2.example.com | [3b7f 08-31 20:52:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer1.org1.example.com | [3707 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3a5e 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [35b0 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e547306b] Exit +peer1.org2.example.com | [3b80 08-31 20:52:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +peer1.org1.example.com | [3708 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3a5f 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [35b1 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36904 +peer1.org2.example.com | [3b81 08-31 20:52:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc00324c7c0)} +peer0.org2.example.com | [3a60 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3709 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [35b2 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36904 grpc.code=OK grpc.call_duration=3.5879ms +peer1.org2.example.com | [3b82 08-31 20:52:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer1.org1.example.com | [370a 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35b3 08-31 20:52:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [370b 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a61 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [35b4 08-31 20:52:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [3b83 08-31 20:52:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer1.org1.example.com | [370c 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a62 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [35b5 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer1.org2.example.com | [3b84 08-31 20:52:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer1.org1.example.com | [370d 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\002\303eS\003\014\311-3Y`\232\326-\377\211P\266\304ek~\272p\337\346\336\224SV\231\002 f\244q\307VCDA\302\366\337JmJm\344\000\2654\275R{\347:y\036\264n\235\222\266\212" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a63 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [35b6 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer1.org2.example.com | [3b85 08-31 20:52:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +peer1.org1.example.com | [370e 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a64 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [35b7 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3b86 08-31 20:52:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +peer1.org1.example.com | [370f 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a65 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [35b8 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D9816100F1801 +peer1.org2.example.com | [3b87 08-31 20:52:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +peer1.org1.example.com | [3710 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a66 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [35b9 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 47E4FAAE42F91C8B22F7E9B1D12B60BABBF90BA0538C28124F4F28ED072D6CF5 +peer1.org2.example.com | [3b88 08-31 20:52:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +peer1.org1.example.com | [3711 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a67 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033ac30 gate 1598907135518290500 evaluation starts +peer0.org1.example.com | [35ba 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer1.org2.example.com | [3b89 08-31 20:52:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3712 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3a68 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033ac30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [35bb 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b8a 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org1.example.com | [3713 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 b2 82 29 c0 2a f9 b3 a5 b0 b2 34 50 49 31 b3 |...).*.....4PI1.| +peer0.org2.example.com | [3a69 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033ac30 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [35bc 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b8b 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org1.example.com | 00000010 7d fc 93 2c 84 8a 3d 36 ec 6f 50 9e 1a 66 c0 2c |}..,..=6.oP..f.,| +peer0.org2.example.com | [3a6a 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033ac30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [35bd 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b8c 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer1.org1.example.com | [3714 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 9b 8b 2c 40 90 2f 80 63 af cd |0E.!....,@./.c..| +peer0.org2.example.com | [3a6b 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033ac30 principal evaluation fails +peer0.org1.example.com | [35be 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b8d 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer1.org1.example.com | 00000010 48 ca 37 69 29 29 9f bb 1d c3 5b 8f 63 a1 7c 47 |H.7i))....[.c.|G| +peer0.org2.example.com | [3a6c 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033ac30 gate 1598907135518290500 evaluation fails +peer0.org1.example.com | [35bf 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3b8e 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 15 1f ae b2 23 02 20 24 bb 15 3f ac ba ee 84 d3 |....#. $..?.....| +peer0.org2.example.com | [3a6d 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [35c0 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b8f 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 7a 04 a8 d3 db 97 f1 f4 cf d9 e8 4f a1 21 81 7f |z..........O.!..| +peer0.org2.example.com | [3a6e 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [35c1 08-31 20:52:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3b90 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | 00000040 ce 31 a6 98 54 3c 44 |.1..T DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [35c2 08-31 20:52:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer1.org1.example.com | [3715 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org2.example.com | [3a70 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033b280 gate 1598907135518633700 evaluation starts +peer0.org1.example.com | [35c3 08-31 20:52:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org2.example.com | [3a71 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033b280 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [35c4 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org1.example.com | [3716 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 02 c3 65 53 03 0c c9 2d 33 59 60 |0D. >..eS...-3Y`| +peer0.org2.example.com | [3a72 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033b280 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [35c5 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org1.example.com | 00000010 9a d6 2d ff 89 50 b6 c4 65 6b 7e ba 70 df e6 de |..-..P..ek~.p...| +peer0.org2.example.com | [3a73 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033b280 principal matched by identity 0 +peer0.org1.example.com | [35c6 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org1.example.com | 00000020 94 53 56 99 02 20 66 a4 71 c7 56 43 44 41 c2 f6 |.SV.. f.q.VCDA..| +peer0.org2.example.com | [3a74 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 24 c8 49 ef c3 73 d9 c9 24 28 8e 37 d6 83 2f |.$.I..s..$(.7../| +peer0.org1.example.com | [35c7 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org1.example.com | 00000030 df 4a 6d 4a 6d e4 00 b5 34 bd 52 7b e7 3a 79 1e |.JmJm...4.R{.:y.| +peer0.org2.example.com | 00000010 be 5d dd 53 2d eb f4 14 50 23 24 49 aa bb d2 20 |.].S-...P#$I... | +peer0.org1.example.com | [35c8 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer1.org1.example.com | 00000040 b4 6e 9d 92 b6 8a |.n....| +peer0.org2.example.com | [3a75 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7b 6c a1 89 b1 de fa 74 43 87 1b d8 |0D. {l.....tC...| +peer0.org1.example.com | [35c9 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer1.org1.example.com | [3717 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | 00000010 36 1c 66 60 79 25 8d 80 aa cd ed 43 3c 85 ac 8e |6.f`y%.....C<...| +peer0.org1.example.com | [35ca 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | [3718 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | 00000020 b8 85 b5 36 02 20 3f eb 19 18 80 93 ad 47 5b 06 |...6. ?......G[.| +peer0.org1.example.com | [35cb 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | [3719 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 26 e9 2b b1 65 11 ea b6 c8 8f 06 b3 ba 98 b1 84 |&.+.e...........| +peer0.org1.example.com | [35cc 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org1.example.com | [371a 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000040 fb 5f 3b ca bd 8d |._;...| +peer0.org1.example.com | [35cd 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer1.org1.example.com | [371b 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a76 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033b280 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [35ce 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [371c 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a77 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00033b280 gate 1598907135518633700 evaluation succeeds +peer0.org1.example.com | [35cf 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b91 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [371d 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [3a78 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [35d0 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3b92 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [371e 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3a79 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [35d1 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3b93 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [371f 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 b2 82 29 c0 2a f9 b3 a5 b0 b2 34 50 49 31 b3 |...).*.....4PI1.| +peer0.org2.example.com | [3a7a 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3b94 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [35d2 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 7d fc 93 2c 84 8a 3d 36 ec 6f 50 9e 1a 66 c0 2c |}..,..=6.oP..f.,| +peer0.org2.example.com | [3a7b 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3b95 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [35d3 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3720 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 9b 8b 2c 40 90 2f 80 63 af cd |0E.!....,@./.c..| +peer0.org2.example.com | [3a7c 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3b96 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [35d4 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 48 ca 37 69 29 29 9f bb 1d c3 5b 8f 63 a1 7c 47 |H.7i))....[.c.|G| +peer0.org2.example.com | [3a7d 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [35d5 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3b97 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000020 15 1f ae b2 23 02 20 24 bb 15 3f ac ba ee 84 d3 |....#. $..?.....| +peer0.org2.example.com | [3a7e 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [35d6 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3b98 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000030 7a 04 a8 d3 db 97 f1 f4 cf d9 e8 4f a1 21 81 7f |z..........O.!..| +peer0.org2.example.com | [3a7f 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [35d7 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3b99 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | 00000040 ce 31 a6 98 54 3c 44 |.1..T DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [35d8 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3b9a 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3721 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a81 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35d9 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3b9b 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3722 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3a82 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35da 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3b9c 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3723 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a83 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [35db 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7030 gate 1598907129085575100 evaluation starts +peer1.org2.example.com | [3b9d 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb5e10 gate 1598907139573512700 evaluation starts +peer0.org2.example.com | [3a84 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3724 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [35dc 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7030 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3b9e 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb5e10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a85 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3725 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [35dd 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7030 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3b9f 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb5e10 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3a86 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3726 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [35de 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7030 principal matched by identity 0 +peer1.org2.example.com | [3ba0 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb5e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3a87 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3727 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [35df 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 cb 52 a0 a2 f6 de b7 15 19 d2 31 4d 82 0d 79 |..R........1M..y| +peer1.org2.example.com | [3ba1 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb5e10 principal evaluation fails +[36;1mpeer0.org2.example.com | [3a88 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3728 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 99 e7 0c 97 22 b0 e1 d0 79 bf 2d 9f 60 8f 9d cb |...."...y.-.`...| +peer1.org2.example.com | [3ba2 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb5e10 gate 1598907139573512700 evaluation fails +peer0.org2.example.com | [3a89 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3729 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [35e0 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 6d df 71 b4 35 38 08 9f e7 a0 |0E.!..m.q.58....| +peer1.org2.example.com | [3ba3 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3a8a 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [372b 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 de 81 34 e7 e9 91 39 0b f5 91 c5 d9 cc 09 34 16 |..4...9.......4.| +peer1.org2.example.com | [3ba6 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3a8b 08-31 20:52:15.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [372c 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | 00000020 c7 cc 75 05 d6 02 20 3b d3 12 d9 a9 6f 2e 45 83 |..u... ;....o.E.| +peer1.org2.example.com | [3ba4 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xee, 0x50, 0x5e, 0x32, 0xbb, 0x9a, 0x52, 0xe4, 0xd5, 0xa5, 0xcd, 0xd8, 0x92, 0x7, 0xb9, 0x48, 0x99, 0xcf, 0x4a, 0x4f, 0xd4, 0x14, 0x2, 0xe7, 0xd3, 0xba, 0x81, 0x57, 0xfe, 0x38, 0x65, 0xd} txOffsets= +peer0.org2.example.com | [3a8c 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [372d 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cef1d0 gate 1598907141348056800 evaluation starts +peer0.org1.example.com | 00000030 75 66 75 c2 b4 c0 85 4e f5 0f 4b 08 00 0f aa 65 |ufu....N..K....e| +peer1.org2.example.com | txId=7f1fe83799f527adf316dfcd38e1f157d571d6adfecc0451fce63bd20f6fd24b locPointer=offset=71, bytesLength=40147 +peer0.org2.example.com | [3a8d 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [372e 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cef1d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | 00000040 f5 c9 e8 c5 e9 88 8c |.......| +peer1.org2.example.com | ] +peer0.org2.example.com | [3a8e 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [372f 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cef1d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [35e1 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7030 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ba5 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3a8f 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3730 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cef1d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [35e2 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7030 gate 1598907129085575100 evaluation succeeds +peer1.org2.example.com | [3ba7 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3a90 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3731 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cef1d0 principal evaluation fails +peer0.org1.example.com | [35e3 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3ba9 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer0.org2.example.com | [3a91 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [372a 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [35e4 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3bab 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer0.org2.example.com | [3a92 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3732 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cef1d0 gate 1598907141348056800 evaluation fails +peer0.org1.example.com | [35e5 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3bac 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:7051 +peer0.org2.example.com | [3a93 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3733 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [35e6 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3baa 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cec440 gate 1598907139582173200 evaluation starts +peer0.org2.example.com | [3a94 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3734 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [35e7 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3bad 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cec440 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a95 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [3735 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [35e8 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3bae 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cec440 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3a96 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3736 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cef760 gate 1598907141349807900 evaluation starts +peer0.org1.example.com | [35e9 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3baf 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [3a97 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3737 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cef760 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [35ea 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3bb0 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [3a98 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3738 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cef760 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3bb1 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [35eb 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3a99 08-31 20:52:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3739 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cef760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [3bb2 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cec440 principal matched by identity 0 +peer0.org1.example.com | [35ec 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a9a 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [373a 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cef760 principal evaluation fails +peer1.org2.example.com | [3ba8 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97639, bytesLength=40147] for tx ID: [7f1fe83799f527adf316dfcd38e1f157d571d6adfecc0451fce63bd20f6fd24b] to txid-index +peer0.org1.example.com | [35ed 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a9b 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [373b 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cef760 gate 1598907141349807900 evaluation fails +peer1.org2.example.com | [3bb3 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:7051 +peer0.org1.example.com | [35ee 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3a9c 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [373c 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3bb5 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | [35ef 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [3a9d 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [373d 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [35f0 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [373e 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [373f 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cefcd0 gate 1598907141351513300 evaluation starts +peer0.org2.example.com | [3a9e 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [35f1 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3740 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cefcd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3a9f 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bb6 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d dd 65 b9 ce 13 73 e2 3f 99 1c |0E.!...e...s.?..| +peer0.org1.example.com | [35f2 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3741 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cefcd0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3aa0 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000010 7f 39 d6 45 89 62 28 66 05 e5 72 e3 f9 78 39 7f |.9.E.b(f..r..x9.| +peer0.org1.example.com | [35f3 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3742 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cefcd0 principal matched by identity 0 +peer0.org2.example.com | [3aa1 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | 00000020 30 47 93 e3 79 02 20 34 8d ce 96 78 a6 94 0b 13 |0G..y. 4...x....| +peer0.org1.example.com | [35f4 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" > alive: alive: alive: +peer1.org1.example.com | [3743 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 9e 73 14 28 18 21 1d f9 18 a6 7b 11 64 ed 40 |..s.(.!....{.d.@| +peer0.org2.example.com | [3aa2 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 22 75 ee d7 b7 5f ef ef 01 a6 d3 9f c4 26 19 |i"u..._.......&.| +peer1.org2.example.com | 00000030 e7 43 a5 ea c3 f1 47 a0 f3 74 49 c4 71 0f 03 7a |.C....G..tI.q..z| +peer0.org1.example.com | [35f5 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | 00000010 87 cd 2c 29 a5 28 0d 2d c8 e9 60 18 ae 29 bf 2d |..,).(.-..`..).-| +peer0.org2.example.com | 00000010 dc 92 50 99 03 d9 71 4a 23 fa 01 75 71 b1 ba 7c |..P...qJ#..uq..|| +peer0.org1.example.com | [35f6 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000040 41 25 3a 9a 53 a2 a2 |A%:.S..| +peer1.org1.example.com | [3744 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e1 77 99 e7 ee 43 a9 6f 30 e6 |0E.!...w...C.o0.| +peer0.org2.example.com | [3aa3 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 5c bc b9 d0 e9 32 c4 85 69 fd 8a |0D. .\....2..i..| +peer0.org1.example.com | [35f7 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bb7 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer1.org1.example.com | 00000010 fb 77 6a da bf cc 64 75 9d eb 18 cb 69 d4 bf c0 |.wj...du....i...| +peer0.org2.example.com | 00000010 86 a2 14 bc 8f d4 11 6d f3 1b 94 0e ed e8 dc 12 |.......m........| +peer0.org1.example.com | [35f8 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bb8 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000020 08 bf 62 c2 4a 02 20 6d 34 73 8a 97 9d a4 7f c5 |..b.J. m4s......| +peer0.org2.example.com | 00000020 b1 d4 3a 0d 02 20 6a 63 7e ed 6d 99 28 6f 2e c0 |..:.. jc~.m.(o..| +peer0.org1.example.com | [35f9 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [3bb9 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D9816103C +peer1.org1.example.com | 00000030 ba 10 d5 39 69 b9 5e e5 63 68 00 ce 7a 49 9e 5e |...9i.^.ch..zI.^| +peer0.org2.example.com | 00000030 e0 7e 50 e0 55 4c cf 50 1a ee 99 07 49 aa e3 ee |.~P.UL.P....I...| +peer0.org1.example.com | [35fa 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bba 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CA60DA52C5A371F2AA0FBDBC754CBC177245BEDB3B75D69F6C285264E2E79F55 +peer1.org1.example.com | 00000040 f1 b2 c8 7f c7 f5 c3 |.......| +peer0.org2.example.com | 00000040 43 44 ef 85 57 69 |CD..Wi| +peer0.org1.example.com | [35fb 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bbb 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3745 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cefcd0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3aa4 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org1.example.com | [35fc 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bbc 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3746 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cefcd0 gate 1598907141351513300 evaluation succeeds +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org1.example.com | [35fd 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bbd 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org1.example.com | [3747 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3aa5 08-31 20:52:17.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f 19 bd 62 71 89 59 57 e6 d2 7c 95 |0D. ...bq.YW..|.| +peer0.org1.example.com | [35fe 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3bbe 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:9256576129007349551 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3748 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | 00000010 1c 17 93 d7 cb 6c 16 9e c5 a4 e7 0f 64 7f cd d6 |.....l......d...| +peer0.org1.example.com | [35ff 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 f0 25 be b1 a9 b8 a2 4c ee 74 ba 53 5a 73 bd |..%.....L.t.SZs.| +peer1.org2.example.com | [3bbf 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:9256576129007349551 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes +peer1.org1.example.com | [3749 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | 00000020 c6 3f 14 02 02 20 1d e8 2c f0 15 b0 fb 2b ea d1 |.?... ..,....+..| +peer0.org1.example.com | 00000010 cc 26 d3 03 49 c0 ea 6c 60 02 2e a5 ac bf 56 bc |.&..I..l`.....V.| +peer1.org2.example.com | [3bc0 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [374a 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000030 51 80 37 6d 20 fb ea bc 3d 2f b7 44 b6 0d 31 d0 |Q.7m ...=/.D..1.| +peer0.org1.example.com | [3600 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 34 95 95 dd 93 d5 d3 09 4e 7c |0E.!..4.......N|| +peer1.org2.example.com | [3bb4 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | [374b 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | 00000040 d4 4d 48 24 a1 79 |.MH$.y| +peer0.org1.example.com | 00000010 47 80 d0 dd 35 b9 ad cd b7 f1 8e dd 28 0e 8f f9 |G...5.......(...| +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [374c 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3aa6 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | 00000020 07 17 f4 9b be 02 20 0f 5b 32 cb a3 4a 81 47 ec |...... .[2..J.G.| +peer1.org2.example.com | [3bc1 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a7 a4 1b 85 22 ff 79 4d 7a 98 6b |0E.!.....".yMz.k| +peer1.org1.example.com | [374d 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3aa7 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | 00000030 4d fd ed 3d 64 4e c2 92 14 e4 4c ef 74 e3 1e 0d |M..=dN....L.t...| +peer1.org2.example.com | 00000010 46 63 f4 42 df 6f 10 c8 fb 1e 5b db e7 41 99 29 |Fc.B.o....[..A.)| +peer1.org1.example.com | [374e 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [3aa8 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | 00000040 ba 5a 6a 99 92 7c 40 |.Zj..|@| +peer1.org2.example.com | 00000020 e0 87 46 38 aa 02 20 60 de 06 4e 0a 9c 1e 33 cd |..F8.. `..N...3.| +peer1.org1.example.com | [3750 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3aa9 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3601 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org2.example.com | 00000030 d7 08 9f 80 d2 16 e7 20 3d 04 51 b8 06 c9 dc ba |....... =.Q.....| +peer1.org1.example.com | [3751 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 b2 82 29 c0 2a f9 b3 a5 b0 b2 34 50 49 31 b3 |...).*.....4PI1.| +peer0.org2.example.com | [3aaa 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org2.example.com | 00000040 b0 2b a4 dd 03 18 c0 |.+.....| +peer1.org1.example.com | 00000010 7d fc 93 2c 84 8a 3d 36 ec 6f 50 9e 1a 66 c0 2c |}..,..=6.oP..f.,| +peer0.org2.example.com | [3aab 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3602 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 7d 3f 58 5c 72 9b 8a 36 d7 7a 80 |0D. }?X\r..6.z.| +peer1.org2.example.com | [3bc2 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cec440 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [374f 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3aac 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 60 29 24 e5 fd 4f ba 42 38 6f c6 71 b4 40 0d fd |`)$..O.B8o.q.@..| +peer1.org2.example.com | [3bc3 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cec440 gate 1598907139582173200 evaluation succeeds +peer1.org1.example.com | [3752 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 9b 8b 2c 40 90 2f 80 63 af cd |0E.!....,@./.c..| +peer0.org2.example.com | [3aad 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 bd 40 88 03 02 20 0f 22 fd 57 aa 0c 70 98 da 05 |.@... .".W..p...| +peer1.org2.example.com | [3bc4 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 48 ca 37 69 29 29 9f bb 1d c3 5b 8f 63 a1 7c 47 |H.7i))....[.c.|G| +peer0.org2.example.com | [3aae 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | 00000030 08 3b 9e 34 fb e7 7e 0d dc b2 b2 ca 11 0b cc c6 |.;.4..~.........| +peer1.org2.example.com | [3bc5 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000020 15 1f ae b2 23 02 20 24 bb 15 3f ac ba ee 84 d3 |....#. $..?.....| +peer0.org2.example.com | [3aaf 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 e0 a2 e7 5e c8 a9 |...^..| +peer1.org2.example.com | [3bc6 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | 00000030 7a 04 a8 d3 db 97 f1 f4 cf d9 e8 4f a1 21 81 7f |z..........O.!..| +peer0.org2.example.com | [3ab0 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bc7 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3603 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | 00000040 ce 31 a6 98 54 3c 44 |.1..T DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3bc9 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org1.example.com | [3604 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [3753 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3ab2 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bca 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3605 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3754 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3ab3 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bc8 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97639, bytesLength=40147] for tx number:[0] ID: [7f1fe83799f527adf316dfcd38e1f157d571d6adfecc0451fce63bd20f6fd24b] to blockNumTranNum index +peer0.org1.example.com | [3606 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3755 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ab4 08-31 20:52:17.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [3bcb 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3607 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3756 08-31 20:52:21.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ab5 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bcc 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3608 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3757 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ab6 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bcf 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D9816103D +peer0.org1.example.com | [3609 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3758 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ab7 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bcd 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138782], isChainEmpty=[false], lastBlockNumber=[6] +peer0.org1.example.com | [360a 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3759 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bce 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3ab8 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [360b 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org1.example.com | [375a 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bd0 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 79B0A3B73BF4534401CD5E1FA54F3933EBCC59369E6CC714C00308CEB34BEFF5 +peer0.org2.example.com | [3ab9 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [360c 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [375b 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bd1 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +peer0.org2.example.com | [3aba 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [360d 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [375c 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bd2 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3abb 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [360e 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [375d 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bd3 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3abc 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [360f 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [375e 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bd4 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer0.org2.example.com | [3abd 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3610 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [375f 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [3bd5 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3abe 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3611 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3760 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bd6 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +peer0.org2.example.com | [3abf 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3612 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3761 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bd7 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +peer0.org2.example.com | [3ac0 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3613 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3762 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3bd8 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org2.example.com | [3ac1 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3614 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3763 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3bd9 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org2.example.com | [3ac2 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3615 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3764 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3bda 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org2.example.com | [3ac3 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3616 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3765 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3bdb 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org2.example.com | [3ac4 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3617 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3766 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3bdc 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org2.example.com | [3ac5 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3618 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3767 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3bdd 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:1288765530053796509 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3ac6 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3619 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3768 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3bde 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:1288765530053796509 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ac7 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [361a 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3769 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3bdf 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ac8 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [361b 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [376a 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3be0 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [3ac9 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [361c 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [376b 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3be1 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +peer0.org2.example.com | [3aca 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000442c00 gate 1598907137323038900 evaluation starts +peer0.org1.example.com | [361d 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [376c 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3e5b0 gate 1598907141517650400 evaluation starts +peer1.org2.example.com | [3be2 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +peer0.org2.example.com | [3acb 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000442c00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [361e 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [376d 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3e5b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3be3 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +peer0.org2.example.com | [3acc 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000442c00 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [361f 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [376e 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3e5b0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3be4 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [3acd 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000442c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3620 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [376f 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3e5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org2.example.com | [3be5 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +peer0.org2.example.com | [3ace 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000442c00 principal evaluation fails +peer0.org1.example.com | [3621 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3770 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3e5b0 principal evaluation fails +peer1.org2.example.com | [3be6 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +peer0.org2.example.com | [3acf 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000442c00 gate 1598907137323038900 evaluation fails +peer0.org1.example.com | [3622 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3771 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3e5b0 gate 1598907141517650400 evaluation fails +peer1.org2.example.com | [3be7 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org2.example.com | [3ad0 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3623 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3772 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3be8 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +peer0.org2.example.com | [3ad1 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3624 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3773 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3be9 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 135ms (state_validation=33ms block_and_pvtdata_commit=89ms state_commit=4ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +peer0.org2.example.com | [3ad2 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3625 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3774 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3bea 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3ad3 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443500 gate 1598907137323459000 evaluation starts +peer0.org1.example.com | [3626 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3775 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3eb20 gate 1598907141518839600 evaluation starts +peer1.org2.example.com | [3beb 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408B8BB829CF9AF9D9816...08071A0C0A0565787030321203312E30 +peer0.org2.example.com | [3ad4 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443500 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3627 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3776 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3eb20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3bec 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D2169919859CAD4547F63876683A945B41B566FA7F7AEB0A375411F726663485 +peer0.org2.example.com | [3ad5 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443500 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3628 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3777 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3eb20 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3bed 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer0.org2.example.com | [3ad6 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443500 principal matched by identity 0 +peer0.org1.example.com | [3629 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004343280 gate 1598907129502013100 evaluation starts +peer1.org1.example.com | [3778 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3eb20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [3bee 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +peer0.org2.example.com | [3ad7 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e0 5b ad 9b cf 6e 40 c0 f1 40 11 cb 74 25 eb |..[...n@..@..t%.| +peer0.org1.example.com | [362a 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004343280 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3779 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3eb20 principal evaluation fails +peer1.org2.example.com | [3bef 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [362b 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004343280 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | 00000010 c1 ba 77 23 51 12 91 bf 1f c3 b4 cd 49 6e bc 28 |..w#Q.......In.(| +peer1.org1.example.com | [377a 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3eb20 gate 1598907141518839600 evaluation fails +peer1.org2.example.com | [3bf0 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [362c 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004343280 principal matched by identity 0 +peer0.org2.example.com | [3ad8 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 11 9b 13 4b 9c 6c fc a8 d4 78 |0E.!.....K.l...x| +peer1.org1.example.com | [377b 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3bf1 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:48146 disconnected +peer0.org1.example.com | [362d 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 64 4f 9f 3f 47 05 95 4c 76 9b 7e 67 42 75 e2 |kdO.?G..Lv.~gBu.| +peer0.org2.example.com | 00000010 76 89 ae 84 b1 25 60 5c 18 f4 05 22 ef f7 5e 24 |v....%`\..."..^$| +peer1.org1.example.com | [377c 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3bf2 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:48146 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=1m14.3937972s +peer0.org1.example.com | 00000010 18 b4 8b c8 5e 17 a9 b1 0c 4a 23 68 e1 a1 3c 58 |....^....J#h.. DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3bf3 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [362e 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 51 8f 83 be 9f 3f ee c6 d8 d0 2e |0D. .Q....?.....| +peer0.org2.example.com | 00000030 c0 da 6c 1f 69 0c 99 cb 76 c8 42 6d 5e f6 4c e0 |..l.i...v.Bm^.L.| +peer1.org1.example.com | [377e 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3f090 gate 1598907141520029000 evaluation starts +peer1.org2.example.com | [3bf4 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:52:21.707Z grpc.peer_address=172.18.0.6:58934 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=297.3µs +peer0.org1.example.com | 00000010 37 b6 9d b1 c0 ae 81 b6 32 9b 15 fc a0 5a bc bd |7.......2....Z..| +peer0.org2.example.com | 00000040 d7 4d 22 89 0c ad 87 |.M"....| +peer1.org1.example.com | [377f 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3f090 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3bf5 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | 00000020 d1 74 8d f6 02 20 22 77 6b 3e 04 16 45 93 9c 46 |.t... "wk>..E..F| +peer0.org2.example.com | [3ad9 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443500 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3780 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3f090 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3bf6 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer0.org1.example.com | 00000030 3c 2a 4e 79 3f 5f 8d ba 44 48 69 96 13 68 d3 b8 |<*Ny?_..DHi..h..| +peer0.org2.example.com | [3ada 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000443500 gate 1598907137323459000 evaluation succeeds +peer1.org1.example.com | [3781 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3f090 principal matched by identity 0 +peer1.org2.example.com | [3bf7 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer0.org1.example.com | 00000040 f0 df e3 34 7a ba |...4z.| +peer0.org2.example.com | [3adb 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3782 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 7e 2f 8e 4a e0 ef 3f 41 cc 65 57 67 1b 37 83 |.~/.J..?A.eWg.7.| +peer1.org2.example.com | [3bf8 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.6:58934 +peer0.org1.example.com | [362f 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004343280 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3adc 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000010 0e 55 35 d1 da 3f 2e b6 34 1a b3 ea fa b3 11 09 |.U5..?..4.......| +peer1.org2.example.com | [3bf9 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:58934 +peer0.org1.example.com | [3630 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004343280 gate 1598907129502013100 evaluation succeeds +peer0.org2.example.com | [3add 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3783 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c ff 97 c8 ab 01 42 c7 54 7e 27 c1 |0D. \.....B.T~'.| +peer1.org2.example.com | [3bfa 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | [3631 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3ade 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | 00000010 99 22 31 c0 8a 82 a1 07 49 83 6c 18 c4 e5 cb 4c |."1.....I.l....L| +peer1.org2.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [3632 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3adf 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | 00000020 cb ca a3 a4 02 20 6c c0 df 95 33 89 f1 40 60 5d |..... l...3..@`]| +peer1.org2.example.com | [3bfb 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 8e 9d 27 42 a0 57 64 8f 43 c6 8a |0D. ...'B.Wd.C..| +peer0.org1.example.com | [3633 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3ae0 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | 00000030 49 a2 9d 59 e8 dd f0 be 82 bc 9e 58 04 65 01 0d |I..Y.......X.e..| +peer1.org2.example.com | 00000010 e2 46 3f 2b ac b4 4b 5d ec 5a ea 8b 9e 7b c6 2e |.F?+..K].Z...{..| +peer0.org1.example.com | [3634 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3ae1 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | 00000040 62 25 ea 10 1b 58 |b%...X| +peer1.org2.example.com | 00000020 94 28 43 0c 02 20 6a 23 55 39 83 a9 c5 ed 6c e4 |.(C.. j#U9....l.| +peer0.org1.example.com | [3635 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3ae2 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3784 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3f090 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000030 32 3d 64 d4 30 5b 90 7d 35 12 d5 d4 5e 78 33 83 |2=d.0[.}5...^x3.| +peer0.org1.example.com | [3636 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3ae3 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3785 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d3f090 gate 1598907141520029000 evaluation succeeds +peer1.org2.example.com | 00000040 2f 97 89 2a 4a d2 |/..*J.| +peer0.org1.example.com | [3637 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3ae4 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3786 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3bfc 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:58934 +peer0.org1.example.com | [3638 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3ae5 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3787 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3bfd 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:58934 +peer0.org1.example.com | [3639 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3ae6 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3788 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3bfe 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [363a 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ae7 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org1.example.com | [3789 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3bff 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [363b 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ae8 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [378a 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3c00 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 9256576129007349551, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes +peer0.org1.example.com | [363c 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ae9 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [378b 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3c01 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3aea 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [363d 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [378c 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3c02 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 9256576129007349551, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes +peer0.org2.example.com | [3aeb 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [363e 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c03 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [378d 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3aec 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [363f 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c04 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ca 60 da 52 c5 a3 71 f2 aa 0f bd bc 75 4c bc 17 |.`.R..q.....uL..| +peer1.org1.example.com | [378e 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3aed 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3640 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 72 45 be db 3b 75 d6 9f 6c 28 52 64 e2 e7 9f 55 |rE..;u..l(Rd...U| +peer1.org1.example.com | [378f 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3aee 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3641 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3c05 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 cd 5a da 68 13 f3 bf 97 86 38 |0E.!...Z.h.....8| +peer1.org1.example.com | [3790 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3aef 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org1.example.com | [3642 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" > alive: alive: +peer1.org2.example.com | 00000010 ce f2 f2 ca da ef 37 0e 59 1a f1 f7 2c b2 5b 87 |......7.Y...,.[.| +peer1.org1.example.com | [3791 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org2.example.com | [3af0 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3643 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000020 f1 8a 66 de 59 02 20 70 1e 27 2c 8f c0 b9 f7 bf |..f.Y. p.',.....| +peer1.org1.example.com | [3792 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3af1 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3644 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 82 36 3c cd 5c 9f 70 9f 6f 0c 4b b3 05 56 c2 56 |.6<.\.p.o.K..V.V| +peer1.org1.example.com | [3793 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3af2 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3645 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | 00000040 7b 74 4d cd 35 94 25 |{tM.5.%| +peer1.org1.example.com | [3794 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3af3 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [3646 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3c06 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org1.example.com | [3795 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3af4 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3647 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org1.example.com | [3796 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [3af5 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3648 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3c07 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 95 6e e0 dc 76 d2 87 52 0c bd 37 |0D. ..n..v..R..7| +peer1.org1.example.com | [3797 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3af6 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3649 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org2.example.com | 00000010 d7 58 57 90 39 1a de cd e1 f9 aa 23 9e d4 f0 55 |.XW.9......#...U| +peer1.org1.example.com | [3799 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3af7 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [364a 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | 00000020 fb de 16 a8 02 20 49 a0 fe bb 36 e6 8f 04 dc ff |..... I...6.....| +peer1.org1.example.com | [379a 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [364b 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [3af8 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000030 02 17 ae 33 9a b2 cf 41 a8 50 9a ec 89 48 d7 a0 |...3...A.P...H..| +peer1.org1.example.com | [3798 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [364c 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3af9 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | 00000040 98 17 88 84 6c 41 |....lA| +peer1.org1.example.com | [379b 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [364d 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3afa 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c08 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [379c 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [364e 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3afb 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c09 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [379d 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [364f 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [3afc 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c0a 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [379e 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [3650 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3afd 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c0b 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [379f 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3651 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3afe 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c0c 08-31 20:52:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [37a0 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [3652 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [3aff 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c0d 08-31 20:52:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D9816103E +peer1.org1.example.com | [37a1 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3653 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b00 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c0e 08-31 20:52:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 037EDBE0FDFE5906063099C9F0C96C50C6B8E471149314BC1AB332D788860AF8 +peer1.org1.example.com | [37a2 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 9a f5 53 9e f9 83 db 2f 34 ad d5 1c 20 26 85 |...S..../4... &.| +peer0.org1.example.com | [3654 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b01 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c0f 08-31 20:52:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000010 58 ee 5c ab 5d 7e 9c e3 6f f9 49 1b 23 bc 85 2c |X.\.]~..o.I.#..,| +peer0.org1.example.com | [3655 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b02 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c10 08-31 20:52:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [37a3 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 8f b8 0c ad a4 ff 4d 70 69 23 a7 |0D. w......Mpi#.| +peer0.org1.example.com | [3656 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b03 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c11 08-31 20:52:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org1.example.com | 00000010 b4 26 e3 1b 93 c8 16 6b 88 53 10 5b 0d 2f 05 ba |.&.....k.S.[./..| +peer0.org1.example.com | [3657 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b04 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3c12 08-31 20:52:20.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | 00000020 a0 7b b5 64 02 20 44 8c a3 73 eb ae ed 12 e7 ac |.{.d. D..s......| +peer0.org1.example.com | [3658 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b05 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161034 +peer1.org2.example.com | [3c13 08-31 20:52:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000030 94 05 8e 24 5e b6 4b 48 75 3b 40 52 cc 85 23 5c |...$^.KHu;@R..#\| +peer0.org1.example.com | [3659 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b06 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1AD645B8D322DDE57EA8885661C50C0BB2C7E37CECB2AB8AA34BB35099FCCDF9 +peer1.org2.example.com | [3c14 08-31 20:52:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 f8 d3 83 df 4e ae |....N.| +peer0.org1.example.com | [365a 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b07 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3c15 08-31 20:52:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | [37a4 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | [365b 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b08 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [365c 08-31 20:52:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3b09 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer1.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | [365d 08-31 20:52:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816102F +peer1.org1.example.com | [37a5 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 70 2c 74 bb 86 9e f8 50 1b 29 |0E.!..p,t....P.)| +peer0.org2.example.com | [3b0a 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | [365e 08-31 20:52:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E9064F122FCF2426DF5168231AB6C55A0810EDED8150A6973512B468CC9D22D7 +peer1.org1.example.com | 00000010 77 78 d8 7f 0f 38 92 d0 c6 5a e7 4a aa 45 15 51 |wx...8...Z.J.E.Q| +peer0.org2.example.com | [3b0b 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | [365f 08-31 20:52:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000020 a6 96 2b 4c 56 02 20 02 b3 17 0c 41 8e 09 40 40 |..+LV. ....A..@@| +peer0.org2.example.com | [3b0c 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | [3660 08-31 20:52:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | 00000030 14 05 78 60 e0 ac 99 f3 cd 14 04 5e b0 c0 d9 f1 |..x`.......^....| +peer0.org2.example.com | [3b0d 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | [3661 08-31 20:52:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer1.org1.example.com | 00000040 c3 2e f5 14 4e 0b 5c |....N.\| +peer0.org2.example.com | [3b0e 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org1.example.com | [3662 08-31 20:52:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:[\333\034\315" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [37a6 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org2.example.com | [3b0f 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3663 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37a7 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org2.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | [3b10 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3664 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:[\333\034\315" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [37a8 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org2.example.com | [3b11 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3665 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37a9 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org2.example.com | [3b12 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3666 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [37aa 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org2.example.com | [3b13 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [3667 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37ab 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3b14 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3668 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [37ac 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c16 08-31 20:52:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b15 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3669 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [37ad 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c17 08-31 20:52:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b16 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [366a 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37ae 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [3b17 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c18 08-31 20:52:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [366b 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org1.example.com | [37af 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b18 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3c19 08-31 20:52:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [37b0 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [366d 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b19 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 22 75 ee d7 b7 5f ef ef 01 a6 d3 9f c4 26 19 |i"u..._.......&.| +peer1.org2.example.com | [3c1a 08-31 20:52:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [37b1 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [366c 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 dc 92 50 99 03 d9 71 4a 23 fa 01 75 71 b1 ba 7c |..P...qJ#..uq..|| +peer1.org2.example.com | [3c1b 08-31 20:52:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37b2 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [366e 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b1a 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 5c bc b9 d0 e9 32 c4 85 69 fd 8a |0D. .\....2..i..| +peer1.org2.example.com | [3c1c 08-31 20:52:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [37b3 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [366f 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 86 a2 14 bc 8f d4 11 6d f3 1b 94 0e ed e8 dc 12 |.......m........| +peer1.org2.example.com | [3c1d 08-31 20:52:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [37b4 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3670 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 b1 d4 3a 0d 02 20 6a 63 7e ed 6d 99 28 6f 2e c0 |..:.. jc~.m.(o..| +peer1.org2.example.com | [3c1e 08-31 20:52:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [37b5 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3671 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000030 e0 7e 50 e0 55 4c cf 50 1a ee 99 07 49 aa e3 ee |.~P.UL.P....I...| +peer1.org2.example.com | [3c1f 08-31 20:52:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37b6 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3672 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | 00000040 43 44 ef 85 57 69 |CD..Wi| +peer1.org2.example.com | [3c20 08-31 20:52:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [37b7 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3673 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 06 4f 12 2f cf 24 26 df 51 68 23 1a b6 c5 5a |..O./.$&.Qh#...Z| +peer0.org2.example.com | [3b1b 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3c21 08-31 20:52:20.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37b8 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 08 10 ed ed 81 50 a6 97 35 12 b4 68 cc 9d 22 d7 |.....P..5..h..".| +peer0.org2.example.com | [3b1c 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c22 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer1.org1.example.com | [37b9 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [3674 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 45 bc 61 d7 d7 cf 88 66 0b 98 16 |0D. pE.a....f...| +peer0.org2.example.com | [3b1d 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3c23 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer1.org1.example.com | [37ba 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org1.example.com | 00000010 c0 92 8e 80 c2 1b 41 50 4d f4 ef b2 8e dd d8 49 |......APM......I| +peer0.org2.example.com | [3b1e 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c24 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer1.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org1.example.com | 00000020 26 4b c2 46 02 20 76 75 57 5d 83 f8 b2 a2 e4 e3 |&K.F. vuW]......| +peer0.org2.example.com | [3b1f 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3c25 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer1.org1.example.com | [37bb 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org1.example.com | 00000030 ae f4 cb ca de 0f c0 1d 93 bc fe d7 68 e9 04 cc |............h...| +peer0.org2.example.com | [3b20 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c26 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004fc53a0, CONNECTING +peer1.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org1.example.com | 00000040 c7 2f 8b 38 64 c7 |./.8d.| +peer0.org2.example.com | [3b21 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c27 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004fc53a0, READY +peer1.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org1.example.com | [3675 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org2.example.com | [3b22 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3c28 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org2.example.com | [3b23 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3c29 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer1.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org1.example.com | [3676 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 d4 22 31 18 03 fb 8d fd d8 17 |0E.!..."1.......| +peer0.org2.example.com | [3b24 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3c2a 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer1.org1.example.com | [37bc 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 b8 50 28 72 db 1d 38 8f 39 d0 4a 8a 80 a1 47 aa |.P(r..8.9.J...G.| +peer1.org2.example.com | [3c2b 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:7051 +peer0.org2.example.com | [3b25 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ec770 gate 1598907137513201600 evaluation starts +peer1.org1.example.com | [37bd 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000020 9f b8 e0 7b eb 02 20 05 aa 79 3c b6 9c 2c 85 19 |...{.. ..y<..,..| +peer1.org2.example.com | [3c2c 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer0.org2.example.com | [3b26 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ec770 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [37be 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | 00000030 a0 fb c3 d4 61 81 65 ca d2 0d 29 3c a3 32 93 ed |....a.e...)<.2..| +peer1.org2.example.com | [3c2d 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b27 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ec770 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [37bf 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000040 22 f5 3e 5b db 1c cd |".>[...| +peer0.org2.example.com | [3b28 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ec770 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3c2e 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [37c0 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [3677 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [3b29 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ec770 principal evaluation fails +peer1.org2.example.com | [3c2f 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37c1 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3678 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [3b2a 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c30 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [37c2 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | [3679 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b2b 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ec770 gate 1598907137513201600 evaluation fails +peer1.org2.example.com | [3c31 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | [367a 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b2c 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3c32 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | [367b 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b2d 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3c33 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | [367d 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3b2e 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3c34 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | [367e 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b2f 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ecce0 gate 1598907137518583500 evaluation starts +peer1.org2.example.com | [3c35 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [367c 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | [3b30 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ecce0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c36 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [367f 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3680 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3681 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | [3682 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org2.example.com | [3b31 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ecce0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3c37 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:52:22.101Z grpc.peer_address=172.18.0.7:48344 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=99.1µs +peer0.org1.example.com | [3683 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org2.example.com | [3b32 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ecce0 principal matched by identity 0 +peer1.org2.example.com | [3c38 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [3684 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | [3b33 08-31 20:52:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e0 5b ad 9b cf 6e 40 c0 f1 40 11 cb 74 25 eb |..[...n@..@..t%.| +peer1.org2.example.com | [3c39 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501b8d0 gate 1598907140102925900 evaluation starts +peer0.org1.example.com | [3685 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004395880 gate 1598907129615290900 evaluation starts +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | 00000010 c1 ba 77 23 51 12 91 bf 1f c3 b4 cd 49 6e bc 28 |..w#Q.......In.(| +peer1.org2.example.com | [3c3a 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501b8d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org1.example.com | [3686 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004395880 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b34 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 11 9b 13 4b 9c 6c fc a8 d4 78 |0E.!.....K.l...x| +peer1.org2.example.com | [3c3b 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org1.example.com | [3687 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004395880 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | 00000010 76 89 ae 84 b1 25 60 5c 18 f4 05 22 ef f7 5e 24 |v....%`\..."..^$| +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [3c3c 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172F9060A204EE140FBD31CE482F0...31998DA2BFAD57935491814E9BAD81B3 +peer0.org1.example.com | [3688 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004395880 principal matched by identity 0 +peer0.org2.example.com | 00000020 da 0e 69 39 5d 02 20 33 c3 49 af 4c d1 cd 87 ad |..i9]. 3.I.L....| +peer1.org1.example.com | [37c3 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d612d0 gate 1598907141694507500 evaluation starts +peer1.org2.example.com | [3c3d 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 92C64F3125CE3D602AE91EE6923E65DE5CF54B005C573E42C781BD967F03F8F8 +peer0.org1.example.com | [3689 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 64 4f 9f 3f 47 05 95 4c 76 9b 7e 67 42 75 e2 |kdO.?G..Lv.~gBu.| +peer0.org2.example.com | 00000030 c0 da 6c 1f 69 0c 99 cb 76 c8 42 6d 5e f6 4c e0 |..l.i...v.Bm^.L.| +peer1.org1.example.com | [37c4 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d612d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c3e 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 894 bytes, Signature: 70 bytes to 172.18.0.7:48344 +peer0.org1.example.com | 00000010 18 b4 8b c8 5e 17 a9 b1 0c 4a 23 68 e1 a1 3c 58 |....^....J#h.. DEBU 0xc003d612d0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3c3f 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501b8d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [368a 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 51 8f 83 be 9f 3f ee c6 d8 d0 2e |0D. .Q....?.....| +peer0.org2.example.com | [3b35 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ecce0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [37c6 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d612d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3c40 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501b8d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org1.example.com | 00000010 37 b6 9d b1 c0 ae 81 b6 32 9b 15 fc a0 5a bc bd |7.......2....Z..| +peer0.org2.example.com | [3b36 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ecce0 gate 1598907137518583500 evaluation succeeds +peer1.org1.example.com | [37c7 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d612d0 principal evaluation fails +peer1.org2.example.com | [3c41 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501b8d0 principal evaluation fails +peer0.org1.example.com | 00000020 d1 74 8d f6 02 20 22 77 6b 3e 04 16 45 93 9c 46 |.t... "wk>..E..F| +peer0.org2.example.com | [3b37 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [37c8 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d612d0 gate 1598907141694507500 evaluation fails +peer1.org2.example.com | [3c42 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501b8d0 gate 1598907140102925900 evaluation fails +peer0.org1.example.com | 00000030 3c 2a 4e 79 3f 5f 8d ba 44 48 69 96 13 68 d3 b8 |<*Ny?_..DHi..h..| +peer0.org2.example.com | [3b38 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [37c9 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3c43 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | 00000040 f0 df e3 34 7a ba |...4z.| +peer0.org2.example.com | [3b39 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [37ca 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3c44 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [368b 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004395880 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3b3a 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [37cb 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3c45 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [368c 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004395880 gate 1598907129615290900 evaluation succeeds +peer0.org2.example.com | [3b3b 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [37cc 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da8120 gate 1598907141694794600 evaluation starts +peer1.org2.example.com | [3c46 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501be40 gate 1598907140106667900 evaluation starts +peer0.org1.example.com | [368d 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3b3c 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37cd 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da8120 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c47 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501be40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [368e 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3b3d 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [37ce 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da8120 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3c48 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501be40 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [368f 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3b3e 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a d6 45 b8 d3 22 dd e5 7e a8 88 56 61 c5 0c 0b |..E.."..~..Va...| +peer1.org1.example.com | [37cf 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org2.example.com | [3c49 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501be40 principal matched by identity 0 +peer0.org1.example.com | [3690 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000010 b2 c7 e3 7c ec b2 ab 8a a3 4b b3 50 99 fc cd f9 |...|.....K.P....| +peer1.org1.example.com | [37d0 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org2.example.com | [3c4a 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org1.example.com | [3691 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3b3f 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a df 5d bf 7e 74 a9 28 a5 f6 2b be |0D. J.].~t.(..+.| +peer1.org1.example.com | [37d1 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org1.example.com | [3692 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 9c 6a 08 bc b8 9b cb c9 fa 11 1c a7 6b 8c d8 ff |.j..........k...| +peer1.org1.example.com | [37d2 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da8120 principal matched by identity 0 +peer1.org2.example.com | [3c4b 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ce b8 6d 82 0f 7b 64 3a e9 cd 82 |0E.!...m..{d:...| +peer0.org1.example.com | [3693 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | 00000020 35 76 a0 1b 02 20 32 4d 85 2d 6e 53 fc c7 18 7a |5v... 2M.-nS...z| +peer1.org1.example.com | [37d3 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org2.example.com | 00000010 47 bb 7b 1a 4f d5 20 56 1d 1a 52 5c 8c 8c 6e e0 |G.{.O. V..R\..n.| +peer0.org1.example.com | [3694 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 06 4f 12 2f cf 24 26 df 51 68 23 1a b6 c5 5a |..O./.$&.Qh#...Z| +peer0.org2.example.com | 00000030 b7 d2 42 de 2a 9e 7a cf 2c 00 f6 b6 b4 2c 7c 02 |..B.*.z.,....,|.| +peer1.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org2.example.com | 00000020 e9 48 ca 26 62 02 20 61 b6 c5 5f 79 53 cf 08 92 |.H.&b. a.._yS...| +peer0.org1.example.com | 00000010 08 10 ed ed 81 50 a6 97 35 12 b4 68 cc 9d 22 d7 |.....P..5..h..".| +peer0.org2.example.com | 00000040 3d 3c f7 3d 17 da |=<.=..| +peer1.org1.example.com | [37d4 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org2.example.com | 00000030 41 41 a0 f4 fe 09 77 8e 00 a5 76 85 bf 0e d8 21 |AA....w...v....!| +peer0.org1.example.com | [3695 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 45 bc 61 d7 d7 cf 88 66 0b 98 16 |0D. pE.a....f...| +peer0.org2.example.com | [3b40 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org2.example.com | 00000040 5d 1c 2f 5c bd 41 02 |]./\.A.| +peer0.org1.example.com | 00000010 c0 92 8e 80 c2 1b 41 50 4d f4 ef b2 8e dd d8 49 |......APM......I| +peer0.org2.example.com | [3b41 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org2.example.com | [3c4c 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501be40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000020 26 4b c2 46 02 20 76 75 57 5d 83 f8 b2 a2 e4 e3 |&K.F. vuW]......| +peer0.org2.example.com | [3b42 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org2.example.com | [3c4d 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00501be40 gate 1598907140106667900 evaluation succeeds +peer0.org1.example.com | 00000030 ae f4 cb ca de 0f c0 1d 93 bc fe d7 68 e9 04 cc |............h...| +peer0.org2.example.com | [3b43 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org2.example.com | [3c4e 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | 00000040 c7 2f 8b 38 64 c7 |./.8d.| +peer0.org2.example.com | [3b44 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [37d5 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da8120 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3c4f 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3696 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b45 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [37d6 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da8120 gate 1598907141694794600 evaluation succeeds +peer1.org2.example.com | [3c50 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3697 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3b46 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer1.org1.example.com | [37d7 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c51 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3698 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b47 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [37d8 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c52 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org1.example.com | [3699 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3b48 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a d6 45 b8 d3 22 dd e5 7e a8 88 56 61 c5 0c 0b |..E.."..~..Va...| +peer1.org1.example.com | [37d9 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3c53 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [369a 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 b2 c7 e3 7c ec b2 ab 8a a3 4b b3 50 99 fc cd f9 |...|.....K.P....| +peer1.org1.example.com | [37da 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3c54 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [369b 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3b49 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a df 5d bf 7e 74 a9 28 a5 f6 2b be |0D. J.].~t.(..+.| +peer1.org1.example.com | [37db 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c55 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [369c 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 f0 25 be b1 a9 b8 a2 4c ee 74 ba 53 5a 73 bd |..%.....L.t.SZs.| +peer0.org2.example.com | 00000010 9c 6a 08 bc b8 9b cb c9 fa 11 1c a7 6b 8c d8 ff |.j..........k...| +peer1.org1.example.com | [37dc 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c56 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:48344 +peer0.org1.example.com | 00000010 cc 26 d3 03 49 c0 ea 6c 60 02 2e a5 ac bf 56 bc |.&..I..l`.....V.| +peer0.org2.example.com | 00000020 35 76 a0 1b 02 20 32 4d 85 2d 6e 53 fc c7 18 7a |5v... 2M.-nS...z| +peer1.org1.example.com | [37dd 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3c57 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [369d 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 34 95 95 dd 93 d5 d3 09 4e 7c |0E.!..4.......N|| +peer0.org2.example.com | 00000030 b7 d2 42 de 2a 9e 7a cf 2c 00 f6 b6 b4 2c 7c 02 |..B.*.z.,....,|.| +peer1.org1.example.com | [37de 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org1.example.com | 00000010 47 80 d0 dd 35 b9 ad cd b7 f1 8e dd 28 0e 8f f9 |G...5.......(...| +peer1.org2.example.com | [3c58 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000040 3d 3c f7 3d 17 da |=<.=..| +peer1.org1.example.com | [37df 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 07 17 f4 9b be 02 20 0f 5b 32 cb a3 4a 81 47 ec |...... .[2..J.G.| +peer1.org2.example.com | [3c59 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b4a 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org1.example.com | [37e0 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000030 4d fd ed 3d 64 4e c2 92 14 e4 4c ef 74 e3 1e 0d |M..=dN....L.t...| +peer1.org2.example.com | [3c5a 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org1.example.com | [37e1 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 ba 5a 6a 99 92 7c 40 |.Zj..|@| +peer1.org2.example.com | [3c5b 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [37e2 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b4b 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd a9 3d f3 4a 3a ae 34 10 f5 ef |0E.!...=.J:.4...| +peer0.org2.example.com | 00000010 3f e2 1c 2d 86 c7 ee ea 93 3a 7c e9 60 bb ef ac |?..-.....:|.`...| +peer1.org2.example.com | [3c5c 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [37e3 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000020 20 af 3c 1d d9 02 20 0d d6 c5 45 f4 df 0a 65 be | .<... ...E...e.| +peer0.org1.example.com | [369e 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3c5d 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [37e4 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 4e 2f 16 73 b2 0d 10 9a 39 b9 ee 23 6d 52 46 4f |N/.s....9..#mRFO| +peer0.org1.example.com | [369f 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c5e 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [37e5 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | 00000040 b0 89 94 11 5b 4f b7 |....[O.| +peer0.org1.example.com | [36a0 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c5f 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [37e6 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org2.example.com | [3b4c 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [36a1 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c60 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org2.example.com | [3b4d 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [36a2 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3c61 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [37e7 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org2.example.com | [3b4e 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36a3 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 06 4f 12 2f cf 24 26 df 51 68 23 1a b6 c5 5a |..O./.$&.Qh#...Z| +peer0.org1.example.com | 00000010 08 10 ed ed 81 50 a6 97 35 12 b4 68 cc 9d 22 d7 |.....P..5..h..".| +peer1.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org2.example.com | [3b4f 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36a4 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 45 bc 61 d7 d7 cf 88 66 0b 98 16 |0D. pE.a....f...| +peer1.org2.example.com | [3c62 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8c50 gate 1598907140115387100 evaluation starts +peer1.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org2.example.com | [3b50 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000010 c0 92 8e 80 c2 1b 41 50 4d f4 ef b2 8e dd d8 49 |......APM......I| +peer1.org2.example.com | [3c63 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8c50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org2.example.com | [3b51 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000020 26 4b c2 46 02 20 76 75 57 5d 83 f8 b2 a2 e4 e3 |&K.F. vuW]......| +peer1.org2.example.com | [3c64 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8c50 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org2.example.com | [3b52 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000030 ae f4 cb ca de 0f c0 1d 93 bc fe d7 68 e9 04 cc |............h...| +peer1.org2.example.com | [3c65 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org1.example.com | [37e8 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b53 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000040 c7 2f 8b 38 64 c7 |./.8d.| +peer1.org2.example.com | [3c66 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8c50 principal evaluation fails +peer1.org1.example.com | [37e9 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b54 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36a5 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3c67 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8c50 gate 1598907140115387100 evaluation fails +peer1.org1.example.com | [37ea 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [3b55 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36a6 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3c68 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [37eb 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org2.example.com | [3b56 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36a7 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org2.example.com | [3b57 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36a8 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3c69 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [37ec 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org2.example.com | [3b58 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36a9 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 f0 25 be b1 a9 b8 a2 4c ee 74 ba 53 5a 73 bd |..%.....L.t.SZs.| +peer1.org2.example.com | [3c6a 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org2.example.com | [3b59 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 cc 26 d3 03 49 c0 ea 6c 60 02 2e a5 ac bf 56 bc |.&..I..l`.....V.| +peer1.org2.example.com | [3c6b 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f91c0 gate 1598907140116500800 evaluation starts +peer1.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org2.example.com | [3b5a 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org1.example.com | [36aa 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 34 95 95 dd 93 d5 d3 09 4e 7c |0E.!..4.......N|| +peer1.org2.example.com | [3c6c 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f91c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org2.example.com | [3b5b 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 47 80 d0 dd 35 b9 ad cd b7 f1 8e dd 28 0e 8f f9 |G...5.......(...| +peer1.org2.example.com | [3c6d 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f91c0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org2.example.com | [3b5c 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | 00000020 07 17 f4 9b be 02 20 0f 5b 32 cb a3 4a 81 47 ec |...... .[2..J.G.| +peer1.org2.example.com | [3c6e 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f91c0 principal matched by identity 0 +peer1.org1.example.com | [37ed 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b5d 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a d6 45 b8 d3 22 dd e5 7e a8 88 56 61 c5 0c 0b |..E.."..~..Va...| +peer0.org1.example.com | 00000030 4d fd ed 3d 64 4e c2 92 14 e4 4c ef 74 e3 1e 0d |M..=dN....L.t...| +peer1.org2.example.com | [3c6f 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer1.org1.example.com | [37ee 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 b2 c7 e3 7c ec b2 ab 8a a3 4b b3 50 99 fc cd f9 |...|.....K.P....| +peer0.org1.example.com | 00000040 ba 5a 6a 99 92 7c 40 |.Zj..|@| +peer1.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer1.org1.example.com | [37ef 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b5e 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a df 5d bf 7e 74 a9 28 a5 f6 2b be |0D. J.].~t.(..+.| +peer0.org1.example.com | [36ab 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3c70 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1e 38 a5 68 59 f7 aa 37 fe 40 d0 8b |0D. .8.hY..7.@..| +peer1.org1.example.com | [37f0 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 9c 6a 08 bc b8 9b cb c9 fa 11 1c a7 6b 8c d8 ff |.j..........k...| +peer0.org1.example.com | [36ac 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | 00000010 b7 47 c5 94 37 96 15 29 a6 27 60 04 16 a3 e4 e8 |.G..7..).'`.....| +peer1.org1.example.com | [37f1 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | 00000020 35 76 a0 1b 02 20 32 4d 85 2d 6e 53 fc c7 18 7a |5v... 2M.-nS...z| +peer0.org1.example.com | [36ad 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000020 93 01 46 f3 02 20 3b 17 b2 4e ae da 27 e9 ff 49 |..F.. ;..N..'..I| +peer1.org1.example.com | [37f2 08-31 20:52:21.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000030 b7 d2 42 de 2a 9e 7a cf 2c 00 f6 b6 b4 2c 7c 02 |..B.*.z.,....,|.| +peer0.org1.example.com | [36ae 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | 00000030 8b da f4 9a f9 fe ae e5 17 ac 0c d0 6e af a3 02 |............n...| +peer1.org1.example.com | [37f3 08-31 20:52:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000040 3d 3c f7 3d 17 da |=<.=..| +peer0.org1.example.com | [36af 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 d8 1c bf 40 c2 76 |...@.v| +peer1.org1.example.com | [37f4 08-31 20:52:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b5f 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36b0 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3c71 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f91c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [37f5 08-31 20:52:21.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [3b60 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36b1 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c72 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f91c0 gate 1598907140116500800 evaluation succeeds +peer1.org1.example.com | [37f6 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b61 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36b2 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c73 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [37f7 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b62 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [36b3 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3c74 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [37f8 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b63 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 22 75 ee d7 b7 5f ef ef 01 a6 d3 9f c4 26 19 |i"u..._.......&.| +peer0.org1.example.com | [36b4 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3c75 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [37f9 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000010 dc 92 50 99 03 d9 71 4a 23 fa 01 75 71 b1 ba 7c |..P...qJ#..uq..|| +peer0.org1.example.com | [36b5 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3c76 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [37fb 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b64 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 5c bc b9 d0 e9 32 c4 85 69 fd 8a |0D. .\....2..i..| +peer0.org1.example.com | [36b6 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd1e0 gate 1598907129623062100 evaluation starts +peer1.org2.example.com | [3c77 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:48344 +peer1.org1.example.com | [37fa 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | 00000010 86 a2 14 bc 8f d4 11 6d f3 1b 94 0e ed e8 dc 12 |.......m........| +peer0.org1.example.com | [36b7 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd1e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c78 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:48344 +peer1.org1.example.com | [37fc 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000020 b1 d4 3a 0d 02 20 6a 63 7e ed 6d 99 28 6f 2e c0 |..:.. jc~.m.(o..| +peer0.org1.example.com | [36b8 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd1e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3c79 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [37fd 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 e0 7e 50 e0 55 4c cf 50 1a ee 99 07 49 aa e3 ee |.~P.UL.P....I...| +peer0.org1.example.com | [36b9 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd1e0 principal matched by identity 0 +peer1.org2.example.com | [3c7a 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c canceling read because closing +peer1.org1.example.com | [37fe 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org2.example.com | 00000040 43 44 ef 85 57 69 |CD..Wi| +peer0.org1.example.com | [36ba 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 cb 52 a0 a2 f6 de b7 15 19 d2 31 4d 82 0d 79 |..R........1M..y| +peer1.org2.example.com | [3c7b 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer1.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org2.example.com | [3b65 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | 00000010 99 e7 0c 97 22 b0 e1 d0 79 bf 2d 9f 60 8f 9d cb |...."...y.-.`...| +peer1.org2.example.com | [3c7c 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [37ff 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org2.example.com | [3b66 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36bb 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 6d df 71 b4 35 38 08 9f e7 a0 |0E.!..m.q.58....| +peer1.org2.example.com | [3c7d 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org2.example.com | [3b67 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 de 81 34 e7 e9 91 39 0b f5 91 c5 d9 cc 09 34 16 |..4...9.......4.| +peer1.org2.example.com | [3c7e 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org2.example.com | [3b68 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\362(\330/" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | 00000020 c7 cc 75 05 d6 02 20 3b d3 12 d9 a9 6f 2e 45 83 |..u... ;....o.E.| +peer1.org2.example.com | [3c7f 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 7e db e0 fd fe 59 06 06 30 99 c9 f0 c9 6c 50 |.~....Y..0....lP| +peer1.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org2.example.com | [3b69 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000030 75 66 75 c2 b4 c0 85 4e f5 0f 4b 08 00 0f aa 65 |ufu....N..K....e| +peer1.org2.example.com | 00000010 c6 b8 e4 71 14 93 14 bc 1a b3 32 d7 88 86 0a f8 |...q......2.....| +peer1.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org1.example.com | 00000040 f5 c9 e8 c5 e9 88 8c |.......| +peer0.org2.example.com | [3b6a 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\362(\330/" > > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3c80 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 2d 90 ec 15 f1 5e ec 3b 00 16 6b |0D. .-....^.;..k| +peer1.org1.example.com | [3800 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36bc 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd1e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3b6b 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | 00000010 e1 f8 cd 95 a5 c3 25 29 91 08 82 80 4e 70 f2 16 |......%)....Np..| +peer1.org1.example.com | [3801 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36bd 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd1e0 gate 1598907129623062100 evaluation succeeds +peer0.org2.example.com | [3b6c 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000020 ed 75 b6 c9 02 20 45 67 3f b2 7f ea d8 07 8f a7 |.u... Eg?.......| +peer0.org1.example.com | [36be 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3802 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3b6d 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | 00000030 2c 32 c8 5f 27 0f 8e a1 57 a9 ad e4 bf eb a8 3c |,2._'...W......<| +peer0.org1.example.com | [36bf 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3803 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3b6e 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | 00000040 cb ef 0e 22 be 84 |..."..| +peer0.org1.example.com | [36c0 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3804 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3b6f 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3c81 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [36c1 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3805 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3b70 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3c82 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3806 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [36c2 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3b71 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3c83 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3807 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [36c3 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b72 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3c84 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3808 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd0e0 gate 1598907141941068800 evaluation starts +peer0.org1.example.com | [36c4 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b73 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031ca10 gate 1598907137609175300 evaluation starts +peer1.org2.example.com | [3c85 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3809 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd0e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [36c5 08-31 20:52:09.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b74 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031ca10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c86 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [380a 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd0e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [36c6 08-31 20:52:09.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b75 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031ca10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3c87 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [380b 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd0e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [36c7 08-31 20:52:09.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [3b76 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031ca10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer1.org2.example.com | [3c88 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [380c 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd0e0 principal evaluation fails +peer0.org1.example.com | [36c8 08-31 20:52:09.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b77 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031ca10 principal evaluation fails +peer1.org2.example.com | [3c89 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [380d 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd0e0 gate 1598907141941068800 evaluation fails +peer0.org1.example.com | [36ca 08-31 20:52:09.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b78 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031ca10 gate 1598907137609175300 evaluation fails +peer1.org2.example.com | [3c8a 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [380e 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [36c9 08-31 20:52:09.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b79 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3c8b 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [380f 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [36cb 08-31 20:52:09.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b7a 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3810 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3c8c 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [36cc 08-31 20:52:09.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b7b 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3811 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd650 gate 1598907141943291400 evaluation starts +peer1.org2.example.com | [3c8d 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [36cd 08-31 20:52:09.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b7c 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031cf80 gate 1598907137609481500 evaluation starts +peer1.org1.example.com | [3812 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd650 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c8e 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [36ce 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3b7d 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031cf80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3814 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd650 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3c8f 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [36cf 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [3815 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [3c90 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [36d0 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3816 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd650 principal evaluation fails +peer0.org2.example.com | [3b7e 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031cf80 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3c91 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [36d1 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3817 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd650 gate 1598907141943291400 evaluation fails +peer0.org2.example.com | [3b7f 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031cf80 principal matched by identity 0 +peer1.org2.example.com | [3c92 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341cb30 gate 1598907140277389800 evaluation starts +peer0.org1.example.com | [36d2 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3818 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3b80 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 da 95 59 ce d7 fe 40 7c a7 0a 11 8b 6d 52 83 |...Y...@|....mR.| +peer1.org2.example.com | [3c93 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341cb30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [36d3 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3819 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | 00000010 2d be b8 a2 94 b0 89 d7 45 a7 e5 9a e9 af ac b5 |-.......E.......| +peer1.org2.example.com | [3c94 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341cb30 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [36d4 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3813 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b81 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 2f 13 1a f1 c2 e8 a9 04 93 83 c5 |0D. A/..........| +peer1.org2.example.com | [3c95 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341cb30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3c96 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341cb30 principal evaluation fails +peer0.org1.example.com | [36d5 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | 00000010 2a 5c 62 67 80 5a 77 68 97 90 5d f1 44 b4 54 1e |*\bg.Zwh..].D.T.| +peer1.org2.example.com | [3c97 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341cb30 gate 1598907140277389800 evaluation fails +peer0.org1.example.com | [36d6 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [381a 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | 00000020 28 da c0 4c 02 20 31 cd ee 59 6c 01 74 19 e1 9e |(..L. 1..Yl.t...| +peer1.org2.example.com | [3c98 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [36d7 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [381b 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | 00000030 87 29 cf 3c 72 70 90 58 15 c2 3c 7f 85 47 fa 36 |.). DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [36d8 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [381c 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dddbc0 gate 1598907141945499100 evaluation starts +peer0.org2.example.com | 00000040 dd 3e f2 28 d8 2f |.>.(./| +peer1.org2.example.com | [3c9a 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [36d9 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f2290 gate 1598907129686486900 evaluation starts +peer1.org1.example.com | [381d 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dddbc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b82 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031cf80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3b83 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00031cf80 gate 1598907137609481500 evaluation succeeds +peer0.org2.example.com | [3b84 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [381e 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer0.org2.example.com | [3b85 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3c9b 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341d0c0 gate 1598907140279156500 evaluation starts +peer1.org1.example.com | [3820 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [36da 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f2290 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3c9c 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341d0c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3b86 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3821 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36db 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f2290 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3c9d 08-31 20:52:20.27 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341d0c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3b87 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3822 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36dc 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f2290 principal matched by identity 0 +peer1.org2.example.com | [3c9e 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [3b88 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3823 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [36dd 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer1.org2.example.com | [3c9f 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [3b89 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [3824 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer1.org2.example.com | [3ca0 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [3b8a 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3825 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36de 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org2.example.com | [3ca1 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341d0c0 principal matched by identity 0 +peer0.org2.example.com | [3b8b 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [381f 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dddbc0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer1.org2.example.com | [3ca2 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 88 07 69 c0 7a 0c e9 f6 08 f3 fb d5 cd ec d0 |...i.z..........| +peer0.org2.example.com | [3b8c 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3826 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dddbc0 principal matched by identity 0 +peer0.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org2.example.com | 00000010 da 72 5d 57 34 fb f5 59 c7 a2 c6 3a 85 21 48 f8 |.r]W4..Y...:.!H.| +peer0.org2.example.com | [3b8d 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3827 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org2.example.com | [3ca3 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f 6b 9a f7 47 1f 55 9f c4 aa 13 da |0D. _k..G.U.....| +peer0.org2.example.com | [3b8e 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3828 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer1.org2.example.com | 00000010 ed eb e1 72 c1 03 65 c9 8f 4c bb 80 5b 51 58 56 |...r..e..L..[QXV| +peer0.org2.example.com | [3b8f 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3829 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org1.example.com | [36df 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f2290 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000020 c4 3c 97 6b 02 20 08 d0 37 a1 ec e7 29 f6 6a 8e |.<.k. ..7...).j.| +peer0.org2.example.com | [3b90 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org1.example.com | [36e0 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f2290 gate 1598907129686486900 evaluation succeeds +peer1.org2.example.com | 00000030 8d 2e 4a eb a0 a0 c2 1b bb 09 5d 34 11 8a a3 10 |..J.......]4....| +peer0.org2.example.com | [3b91 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [382a 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org1.example.com | [36e1 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | 00000040 98 22 7c 8a 63 b7 |."|.c.| +peer0.org2.example.com | [3b92 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org1.example.com | [36e2 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3ca4 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341d0c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3b93 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer1.org2.example.com | [3ca5 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00341d0c0 gate 1598907140279156500 evaluation succeeds +peer0.org1.example.com | [36e3 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3b94 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org2.example.com | [3ca6 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [36e4 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3b95 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\362(\330/" > alive: alive: alive: +peer1.org2.example.com | [3ca7 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org1.example.com | [36e5 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | [3b96 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ca8 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [382b 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dddbc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [3b97 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ca9 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [382c 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dddbc0 gate 1598907141945499100 evaluation succeeds +peer0.org1.example.com | [36e6 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | [3b98 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3caa 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [382d 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | [3b99 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b9a 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b9b 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3b9c 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3b9d 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [382e 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | [3b9e 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cab 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [382f 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org2.example.com | [3b9f 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cac 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3830 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org2.example.com | [3ba0 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cad 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3831 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36e7 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ba1 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3832 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cae 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [36e8 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org2.example.com | [3ba2 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3833 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3caf 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org2.example.com | [3ba3 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3834 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3cb0 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36e9 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org2.example.com | [3ba4 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [3835 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3cb1 08-31 20:52:20.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org2.example.com | [3ba5 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3836 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3cb2 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org2.example.com | [3ba6 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3837 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3cb3 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org2.example.com | [3ba8 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3838 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3cb4 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org1.example.com | [36ea 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36eb 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3839 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05010 gate 1598907141964695600 evaluation starts +peer0.org1.example.com | [36ec 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [36ed 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3cb5 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ba9 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [36ee 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3cb6 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [383a 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05010 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ba7 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36ef 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3cb7 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [383b 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05010 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3baa 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36f0 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3cb8 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [383c 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org2.example.com | [3bab 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [36f1 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3cb9 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [383d 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05010 principal evaluation fails +peer0.org2.example.com | [3bac 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36f2 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044142d0 gate 1598907129697710900 evaluation starts +peer1.org2.example.com | [3cba 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [383e 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05010 gate 1598907141964695600 evaluation fails +peer0.org2.example.com | [3bad 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36f3 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044142d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3cbc 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [383f 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3bae 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [36f4 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044142d0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3cbb 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3840 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3baf 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [36f5 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044142d0 principal matched by identity 0 +peer1.org2.example.com | [3cbd 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3841 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3bb0 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [36f6 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org2.example.com | [3cbe 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3842 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05580 gate 1598907141967120800 evaluation starts +peer0.org2.example.com | [3bb1 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org2.example.com | [3cbf 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3843 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05580 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3bb2 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [36f7 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer1.org2.example.com | [3cc0 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3844 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05580 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3bb3 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org2.example.com | [3cc1 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3845 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [3bb4 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org2.example.com | [3cc2 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3846 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05580 principal evaluation fails +peer0.org2.example.com | [3bb5 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000217860 gate 1598907138158754100 evaluation starts +peer0.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org2.example.com | [3cc3 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3847 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05580 gate 1598907141967120800 evaluation fails +peer1.org1.example.com | [3848 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3849 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [384a 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [384b 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05af0 gate 1598907141969752200 evaluation starts +peer1.org1.example.com | [384c 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05af0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [384d 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05af0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [384e 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05af0 principal matched by identity 0 +peer1.org1.example.com | [384f 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org2.example.com | [3bb6 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000217860 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3bb7 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000217860 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3bb8 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000217860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3bb9 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000217860 principal evaluation fails +peer0.org2.example.com | [3bba 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000217860 gate 1598907138158754100 evaluation fails +peer0.org2.example.com | [3bbb 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3bbc 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3bbd 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3bbe 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000217df0 gate 1598907138159010900 evaluation starts +peer0.org2.example.com | [3bbf 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000217df0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3bc0 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000217df0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3bc1 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000217df0 principal matched by identity 0 +peer0.org2.example.com | [3bc2 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [3bc3 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org2.example.com | [3bc4 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000217df0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3bc5 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000217df0 gate 1598907138159010900 evaluation succeeds +peer0.org2.example.com | [3bc6 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3bc7 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3bc8 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3bc9 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3bca 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bcb 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org1.example.com | [36f8 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044142d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [36f9 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044142d0 gate 1598907129697710900 evaluation succeeds +peer0.org1.example.com | [36fa 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [36fb 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [36fc 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [36fd 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [36fe 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [36ff 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org2.example.com | [3cc4 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 2d fa 2c 67 2d 33 a2 36 ed 3d 13 c1 c8 85 c9 |.-.,g-3.6.=.....| +peer1.org2.example.com | 00000010 83 7a 4c 24 5b 0c 04 d2 88 56 85 dc b2 1c 45 94 |.zL$[....V....E.| +peer1.org2.example.com | [3cc5 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af 20 a1 09 1c b0 bc d3 33 1d d8 |0E.!.. ......3..| +peer1.org2.example.com | 00000010 2f 39 96 d4 04 4d fb d7 cd 9b 02 d7 80 b2 65 c2 |/9...M........e.| +peer1.org2.example.com | 00000020 e3 41 10 75 df 02 20 63 80 44 a9 7f 76 7e 77 cc |.A.u.. c.D..v~w.| +peer1.org2.example.com | 00000030 50 e7 e1 bd 41 ed c0 d9 81 28 40 ed dc 16 81 21 |P...A....(@....!| +peer1.org2.example.com | 00000040 1f 80 aa c0 1b 5d ec |.....].| +peer1.org2.example.com | [3cc6 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3cc7 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3cc8 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3cc9 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3cca 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3ccb 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ccc 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ccd 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cce 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ccf 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cd0 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3cd1 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3cd2 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bcc 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3bcd 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3bce 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3bcf 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3bd0 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3bd1 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3bd2 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b49020 gate 1598907138159843900 evaluation starts +peer0.org2.example.com | [3bd3 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b49020 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3bd4 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b49020 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3bd5 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b49020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3bd6 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b49020 principal evaluation fails +peer0.org2.example.com | [3bd7 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b49020 gate 1598907138159843900 evaluation fails +peer0.org2.example.com | [3bd8 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3bd9 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3bda 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3bdb 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b49590 gate 1598907138160211100 evaluation starts +peer0.org2.example.com | [3bdc 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b49590 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3bdd 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b49590 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3bde 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b49590 principal matched by identity 0 +peer0.org2.example.com | [3bdf 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org2.example.com | [3be0 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org2.example.com | [3be1 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b49590 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3be2 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b49590 gate 1598907138160211100 evaluation succeeds +peer0.org2.example.com | [3be3 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3be4 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3be5 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3be6 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3be7 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org2.example.com | [3be8 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org2.example.com | [3be9 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org2.example.com | [3bea 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer1.org1.example.com | [3850 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org1.example.com | [3851 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05af0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3852 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e05af0 gate 1598907141969752200 evaluation succeeds +peer1.org1.example.com | [3853 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3854 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3855 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3856 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3857 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3858 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3859 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [385a 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [385b 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [385c 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [385d 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e24630 gate 1598907141981592100 evaluation starts +peer1.org1.example.com | [385e 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e24630 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [385f 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e24630 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3860 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e24630 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3861 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e24630 principal evaluation fails +peer1.org1.example.com | [3862 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e24630 gate 1598907141981592100 evaluation fails +peer1.org1.example.com | [3863 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3864 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3865 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3866 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e24ba0 gate 1598907141983836400 evaluation starts +peer1.org1.example.com | [3867 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e24ba0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3868 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e24ba0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3869 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e24ba0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [386a 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e24ba0 principal evaluation fails +peer1.org1.example.com | [386b 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e24ba0 gate 1598907141983836400 evaluation fails +peer1.org1.example.com | [386c 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [386d 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [386e 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [386f 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e25110 gate 1598907141985563600 evaluation starts +peer1.org1.example.com | [3870 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e25110 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3871 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e25110 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3872 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e25110 principal matched by identity 0 +peer1.org1.example.com | [3873 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org1.example.com | [3874 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org1.example.com | [3875 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e25110 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3876 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e25110 gate 1598907141985563600 evaluation succeeds +peer1.org1.example.com | [3877 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3878 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3879 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [387a 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [387b 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org1.example.com | [387c 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org1.example.com | [387d 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cd3 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3cd4 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3cd5 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cd6 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3cd7 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cd8 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3cd9 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cda 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3cdb 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cdc 08-31 20:52:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3cdd 08-31 20:52:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3cde 08-31 20:52:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3cdf 08-31 20:52:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3ce0 08-31 20:52:20.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ce1 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3ce2 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ce3 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3ce4 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3ce5 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3ce6 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3ce7 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ce8 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3ce9 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3cea 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ceb 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3cec 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3ced 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3cee 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349c570 gate 1598907140536000000 evaluation starts +peer1.org2.example.com | [3cef 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349c570 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3cf0 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349c570 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3cf1 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349c570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3cf2 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349c570 principal evaluation fails +peer1.org2.example.com | [3cf3 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349c570 gate 1598907140536000000 evaluation fails +peer1.org2.example.com | [3cf4 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3cf5 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3cf6 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3cf7 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349cae0 gate 1598907140538621000 evaluation starts +peer1.org2.example.com | [3cf8 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349cae0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3cf9 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349cae0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3cfa 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349cae0 principal matched by identity 0 +peer1.org2.example.com | [3cfb 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 37 b5 70 e3 a4 f1 ec 54 49 6d a3 9a 84 48 c1 |.7.p....TIm...H.| +peer1.org2.example.com | 00000010 e5 6e 48 d8 a7 80 59 ee a6 80 fa 29 4a 4b a2 ea |.nH...Y....)JK..| +peer1.org2.example.com | [3cfc 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb b6 89 09 b2 93 e7 02 6c 2a fc |0E.!.........l*.| +peer1.org2.example.com | 00000010 b8 86 d3 9e 43 da aa 65 de c3 65 0a 5d a3 27 25 |....C..e..e.].'%| +peer1.org2.example.com | 00000020 41 30 46 20 50 02 20 78 90 37 a2 c0 38 ea 80 94 |A0F P. x.7..8...| +peer1.org2.example.com | 00000030 ca 35 c3 84 1d b9 9e 03 bc 73 62 2b a8 cd 69 6b |.5.......sb+..ik| +peer1.org2.example.com | 00000040 20 0a 6f d2 1c 1f c5 | .o....| +peer1.org2.example.com | [3cfd 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349cae0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3cfe 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00349cae0 gate 1598907140538621000 evaluation succeeds +peer1.org2.example.com | [3cff 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3d00 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3d01 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3d02 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3d03 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d04 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3d05 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3d06 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3d07 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3d08 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d09 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d0a 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d0b 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d0c 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d0d 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d0e 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d0f 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d10 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d11 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d12 08-31 20:52:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d13 08-31 20:52:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d14 08-31 20:52:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d15 08-31 20:52:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d16 08-31 20:52:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d17 08-31 20:52:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d18 08-31 20:52:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d19 08-31 20:52:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3d1a 08-31 20:52:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d1b 08-31 20:52:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [3d1c 08-31 20:52:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d1d 08-31 20:52:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d1e 08-31 20:52:20.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d1f 08-31 20:52:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d20 08-31 20:52:20.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3d21 08-31 20:52:20.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3d22 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [3d23 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3d24 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [3d25 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3d26 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d27 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d28 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d29 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d2a 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d2b 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d2c 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d2d 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d2e 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d2f 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d30 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [387e 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer1.org1.example.com | [387f 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3880 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer1.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer1.org1.example.com | [3881 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer1.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer1.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer1.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer1.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer1.org1.example.com | [3882 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3883 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3884 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3885 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3886 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3887 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3888 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3889 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [388a 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3b340 gate 1598907141989158600 evaluation starts +peer1.org1.example.com | [388b 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3b340 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [388c 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3b340 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [388d 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3b340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [388e 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3b340 principal evaluation fails +peer1.org1.example.com | [388f 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3b340 gate 1598907141989158600 evaluation fails +peer1.org1.example.com | [3890 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3891 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3892 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3893 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3b8b0 gate 1598907141989397800 evaluation starts +peer1.org1.example.com | [3894 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3b8b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3895 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3b8b0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3896 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3b8b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3897 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3b8b0 principal evaluation fails +peer1.org1.example.com | [3898 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3b8b0 gate 1598907141989397800 evaluation fails +peer1.org1.example.com | [3899 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [389a 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [389b 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [389c 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3be20 gate 1598907141989707400 evaluation starts +peer1.org1.example.com | [389d 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3be20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [389e 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3be20 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [389f 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3be20 principal matched by identity 0 +peer1.org1.example.com | [38a0 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer1.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer1.org1.example.com | [38a1 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org1.example.com | [3700 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org1.example.com | [3701 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org1.example.com | [3702 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org1.example.com | [3703 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org1.example.com | [3704 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3705 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3706 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3707 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3708 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3709 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [370a 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [370b 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [370c 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442a450 gate 1598907129708925200 evaluation starts +peer0.org1.example.com | [370d 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442a450 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [370e 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442a450 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [370f 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442a450 principal matched by identity 0 +peer0.org1.example.com | [3710 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org1.example.com | [3711 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org1.example.com | [3712 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442a450 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3713 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442a450 gate 1598907129708925200 evaluation succeeds +peer0.org1.example.com | [3714 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3715 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3716 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3717 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3718 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3719 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [371a 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [371b 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [371c 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [371d 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [371e 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [371f 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3720 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b650 gate 1598907129717852300 evaluation starts +peer0.org1.example.com | [3721 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b650 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3722 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b650 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3723 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b650 principal matched by identity 0 +peer0.org1.example.com | [3724 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org1.example.com | [3725 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org1.example.com | [3726 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b650 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3727 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b650 gate 1598907129717852300 evaluation succeeds +peer0.org1.example.com | [3728 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3729 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [372a 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [372b 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [372c 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [372d 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [372e 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [372f 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3730 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3731 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer1.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer1.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer1.org1.example.com | [38a2 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3be20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [38a3 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e3be20 gate 1598907141989707400 evaluation succeeds +peer1.org1.example.com | [38a4 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [38a5 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [38a6 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [38a7 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [38a8 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38a9 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38aa 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [38ab 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [38ac 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [38ad 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [38ae 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [38af 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [38b0 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51020 gate 1598907141991681400 evaluation starts +peer1.org1.example.com | [38b1 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51020 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [38b2 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51020 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [38b3 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [38b4 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51020 principal evaluation fails +peer1.org1.example.com | [38b5 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51020 gate 1598907141991681400 evaluation fails +peer1.org1.example.com | [38b6 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [38b7 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [38b8 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [38b9 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51590 gate 1598907141993480900 evaluation starts +peer1.org1.example.com | [38ba 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51590 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [38bb 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51590 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [38bc 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [38bd 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51590 principal evaluation fails +peer1.org1.example.com | [38be 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51590 gate 1598907141993480900 evaluation fails +peer1.org1.example.com | [38bf 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [38c0 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [38c1 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [38c2 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51b00 gate 1598907141995924600 evaluation starts +peer1.org1.example.com | [38c3 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51b00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [38c4 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51b00 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [38c6 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51b00 principal matched by identity 0 +peer1.org1.example.com | [38c7 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org2.example.com | [3beb 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3bec 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:34440 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3bed 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bee 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bef 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3bf0 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3bf1 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3bf2 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3bf3 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3bf4 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3bf5 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3bf6 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bdf8e0 gate 1598907138161949800 evaluation starts +peer0.org2.example.com | [3bf7 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bdf8e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3bf8 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bdf8e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3bf9 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bdf8e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3bfa 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bdf8e0 principal evaluation fails +peer0.org2.example.com | [3bfb 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bdf8e0 gate 1598907138161949800 evaluation fails +peer0.org2.example.com | [3bfc 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3bfd 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3bfe 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3bff 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bdfe50 gate 1598907138165274000 evaluation starts +peer0.org2.example.com | [3c00 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bdfe50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c01 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bdfe50 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3c02 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bdfe50 principal matched by identity 0 +peer0.org2.example.com | [3c03 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org2.example.com | [3c04 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org2.example.com | [3c05 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bdfe50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3c06 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bdfe50 gate 1598907138165274000 evaluation succeeds +peer0.org2.example.com | [3c07 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c08 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c09 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3c0a 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3c0b 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c0c 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d31 08-31 20:52:20.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d32 08-31 20:52:20.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d33 08-31 20:52:20.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d34 08-31 20:52:20.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d35 08-31 20:52:20.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d36 08-31 20:52:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3d37 08-31 20:52:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D9816103F +peer1.org2.example.com | [3d38 08-31 20:52:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F39E73142818211DF918A67B1164ED4087CD2C29A5280D2DC8E96018AE29BF2D +peer1.org2.example.com | [3d39 08-31 20:52:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [3d3a 08-31 20:52:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [3d3b 08-31 20:52:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [3d3c 08-31 20:52:21.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d3d 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3d3e 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\312\222\031s\252\3665\017\334\301\236\343\361Jw\036*E\037c\373\004y\213\313\365\035S\356\335\002 \241\2238/\351Dy\232_E\342\367\233\262@#\031\331\004\\\310\\\022\360\344\306he)\357\350" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3d3f 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d40 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d41 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d42 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3d43 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\312\222\031s\252\3665\017\334\301\236\343\361Jw\036*E\037c\373\004y\213\313\365\035S\356\335\002 \241\2238/\351Dy\232_E\342\367\233\262@#\031\331\004\\\310\\\022\360\344\306he)\357\350" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d44 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d45 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d46 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [3732 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3733 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3734 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3735 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3736 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3737 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004448aa0 gate 1598907129728558700 evaluation starts +peer0.org1.example.com | [3738 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004448aa0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3739 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004448aa0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [373a 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004448aa0 principal matched by identity 0 +peer0.org1.example.com | [373b 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org1.example.com | [373c 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org1.example.com | [373d 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004448aa0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [373e 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004448aa0 gate 1598907129728558700 evaluation succeeds +peer0.org1.example.com | [373f 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3740 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3741 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3742 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3743 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org1.example.com | [3744 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org1.example.com | [3745 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org1.example.com | [3746 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org1.example.com | [3747 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3748 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3749 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [374a 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [374b 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [374c 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [374d 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [374e 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [374f 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446ca80 gate 1598907129745516400 evaluation starts +peer1.org2.example.com | [3d47 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d48 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d49 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d4a 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d4b 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d4c 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3d4d 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 9e 73 14 28 18 21 1d f9 18 a6 7b 11 64 ed 40 |..s.(.!....{.d.@| +peer1.org2.example.com | 00000010 87 cd 2c 29 a5 28 0d 2d c8 e9 60 18 ae 29 bf 2d |..,).(.-..`..).-| +peer1.org2.example.com | [3d4e 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e1 77 99 e7 ee 43 a9 6f 30 e6 |0E.!...w...C.o0.| +peer1.org2.example.com | 00000010 fb 77 6a da bf cc 64 75 9d eb 18 cb 69 d4 bf c0 |.wj...du....i...| +peer1.org2.example.com | 00000020 08 bf 62 c2 4a 02 20 6d 34 73 8a 97 9d a4 7f c5 |..b.J. m4s......| +peer1.org2.example.com | 00000030 ba 10 d5 39 69 b9 5e e5 63 68 00 ce 7a 49 9e 5e |...9i.^.ch..zI.^| +peer1.org2.example.com | 00000040 f1 b2 c8 7f c7 f5 c3 |.......| +peer1.org2.example.com | [3d4f 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [3d50 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 3e ca 92 19 73 aa f6 35 0f dc |0E.!..>...s..5..| +peer1.org2.example.com | 00000010 c1 9e e3 f1 4a 77 1e 2a 45 1f 63 fb 04 79 8b cb |....Jw.*E.c..y..| +peer1.org2.example.com | 00000020 f5 1d 53 ee dd 02 20 20 a1 93 38 2f e9 44 79 9a |..S... ..8/.Dy.| +peer1.org2.example.com | 00000030 5f 45 e2 f7 9b b2 40 23 19 d9 04 5c c8 5c 12 f0 |_E....@#...\.\..| +peer1.org2.example.com | 00000040 e4 c6 68 65 29 ef e8 |..he)..| +peer1.org2.example.com | [3d51 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3d52 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [3d53 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d54 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d56 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d57 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d55 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d58 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3d59 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 9e 73 14 28 18 21 1d f9 18 a6 7b 11 64 ed 40 |..s.(.!....{.d.@| +peer1.org2.example.com | 00000010 87 cd 2c 29 a5 28 0d 2d c8 e9 60 18 ae 29 bf 2d |..,).(.-..`..).-| +peer1.org2.example.com | [3d5a 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e1 77 99 e7 ee 43 a9 6f 30 e6 |0E.!...w...C.o0.| +peer1.org2.example.com | 00000010 fb 77 6a da bf cc 64 75 9d eb 18 cb 69 d4 bf c0 |.wj...du....i...| +peer1.org2.example.com | 00000020 08 bf 62 c2 4a 02 20 6d 34 73 8a 97 9d a4 7f c5 |..b.J. m4s......| +peer1.org2.example.com | 00000030 ba 10 d5 39 69 b9 5e e5 63 68 00 ce 7a 49 9e 5e |...9i.^.ch..zI.^| +peer1.org2.example.com | 00000040 f1 b2 c8 7f c7 f5 c3 |.......| +peer1.org2.example.com | [3d5b 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d5c 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d5d 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d5e 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d5f 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d60 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [3d62 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 9e 73 14 28 18 21 1d f9 18 a6 7b 11 64 ed 40 |..s.(.!....{.d.@| +peer1.org2.example.com | 00000010 87 cd 2c 29 a5 28 0d 2d c8 e9 60 18 ae 29 bf 2d |..,).(.-..`..).-| +peer1.org2.example.com | [3d63 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e1 77 99 e7 ee 43 a9 6f 30 e6 |0E.!...w...C.o0.| +peer1.org2.example.com | 00000010 fb 77 6a da bf cc 64 75 9d eb 18 cb 69 d4 bf c0 |.wj...du....i...| +peer1.org2.example.com | 00000020 08 bf 62 c2 4a 02 20 6d 34 73 8a 97 9d a4 7f c5 |..b.J. m4s......| +peer1.org2.example.com | 00000030 ba 10 d5 39 69 b9 5e e5 63 68 00 ce 7a 49 9e 5e |...9i.^.ch..zI.^| +peer1.org2.example.com | 00000040 f1 b2 c8 7f c7 f5 c3 |.......| +peer1.org2.example.com | [3d64 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3750 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446ca80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3751 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446ca80 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3752 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446ca80 principal matched by identity 0 +peer0.org1.example.com | [3753 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org1.example.com | [3754 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org1.example.com | [3755 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446ca80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3756 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446ca80 gate 1598907129745516400 evaluation succeeds +peer0.org1.example.com | [3757 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3758 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3759 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [375a 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [375b 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [375c 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [375d 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [375e 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [375f 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3760 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3761 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3762 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3763 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3764 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [3765 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org1.example.com | [3766 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3767 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3768 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3769 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [376a 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [376b 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [376c 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [376d 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [376e 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [376f 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3770 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3771 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3772 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3773 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3774 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d65 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d66 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d67 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d61 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d68 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d69 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d6a 08-31 20:52:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d6b 08-31 20:52:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d6c 08-31 20:52:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d6d 08-31 20:52:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d6e 08-31 20:52:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d6f 08-31 20:52:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d70 08-31 20:52:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d71 08-31 20:52:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [3d72 08-31 20:52:21.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d73 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d74 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d75 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d76 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [3d77 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [3d78 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d79 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3d7a 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3d7b 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3d7c 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3d7d 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3d7e 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3d7f 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003583360 gate 1598907141329270600 evaluation starts +peer1.org2.example.com | [3d80 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003583360 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3d81 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003583360 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3d82 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003583360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3d83 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003583360 principal evaluation fails +peer1.org2.example.com | [3d84 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003583360 gate 1598907141329270600 evaluation fails +peer1.org2.example.com | [3d85 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3d86 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3d87 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3d88 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035838d0 gate 1598907141340301400 evaluation starts +peer1.org2.example.com | [3d89 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035838d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3d8a 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035838d0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3d8b 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035838d0 principal matched by identity 0 +peer1.org2.example.com | [3d8c 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 b2 82 29 c0 2a f9 b3 a5 b0 b2 34 50 49 31 b3 |...).*.....4PI1.| +peer1.org2.example.com | 00000010 7d fc 93 2c 84 8a 3d 36 ec 6f 50 9e 1a 66 c0 2c |}..,..=6.oP..f.,| +peer1.org2.example.com | [3d8d 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 9b 8b 2c 40 90 2f 80 63 af cd |0E.!....,@./.c..| +peer1.org2.example.com | 00000010 48 ca 37 69 29 29 9f bb 1d c3 5b 8f 63 a1 7c 47 |H.7i))....[.c.|G| +peer1.org2.example.com | 00000020 15 1f ae b2 23 02 20 24 bb 15 3f ac ba ee 84 d3 |....#. $..?.....| +peer1.org2.example.com | 00000030 7a 04 a8 d3 db 97 f1 f4 cf d9 e8 4f a1 21 81 7f |z..........O.!..| +peer1.org2.example.com | 00000040 ce 31 a6 98 54 3c 44 |.1..T DEBU 0xc0035838d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3d8f 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035838d0 gate 1598907141340301400 evaluation succeeds +peer1.org2.example.com | [3d90 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3d91 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3d92 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3d93 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3d94 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3d95 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [3d96 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3d97 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3d98 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [3d99 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d9a 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d9b 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3d9c 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [3d9d 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d9e 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3d9f 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3da0 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3da1 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:" signature:"0D\002 \023-\220\354\025\361^\354;\000\026k\341\370\315\225\245\303%)\221\010\202\200Np\362\026\355u\266\311\002 Eg?\262\177\352\330\007\217\247,2\310_'\017\216\241W\251\255\344\277\353\250<\313\357\016\"\276\204" > +peer1.org2.example.com | [3da2 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [3da3 08-31 20:52:21.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3da4 08-31 20:52:21.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3da5 08-31 20:52:21.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [3da6 08-31 20:52:21.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [3da7 08-31 20:52:21.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3da8 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [3da9 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3daa 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dab 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [3dac 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 7e 2f 8e 4a e0 ef 3f 41 cc 65 57 67 1b 37 83 |.~/.J..?A.eWg.7.| +peer1.org2.example.com | 00000010 0e 55 35 d1 da 3f 2e b6 34 1a b3 ea fa b3 11 09 |.U5..?..4.......| +peer1.org2.example.com | [3dad 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c ff 97 c8 ab 01 42 c7 54 7e 27 c1 |0D. \.....B.T~'.| +peer1.org2.example.com | 00000010 99 22 31 c0 8a 82 a1 07 49 83 6c 18 c4 e5 cb 4c |."1.....I.l....L| +peer1.org2.example.com | 00000020 cb ca a3 a4 02 20 6c c0 df 95 33 89 f1 40 60 5d |..... l...3..@`]| +peer1.org2.example.com | 00000030 49 a2 9d 59 e8 dd f0 be 82 bc 9e 58 04 65 01 0d |I..Y.......X.e..| +peer1.org2.example.com | 00000040 62 25 ea 10 1b 58 |b%...X| +peer1.org2.example.com | [3dae 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [3daf 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 aa fe 67 79 76 a4 45 36 ef 2f 2b |0D. B..gyv.E6./+| +peer1.org2.example.com | 00000010 77 cc 0c 5c a5 0d 60 5d ea 34 e2 37 ea c4 95 8f |w..\..`].4.7....| +peer1.org2.example.com | 00000020 1d 41 b7 09 02 20 0d 9b 0b 24 d4 72 64 f6 f5 5a |.A... ...$.rd..Z| +peer1.org2.example.com | 00000030 64 a4 85 55 97 8b 77 64 52 04 e3 31 e0 39 e3 4c |d..U..wdR..1.9.L| +peer1.org2.example.com | 00000040 d5 70 29 6f a2 0b |.p)o..| +peer1.org2.example.com | [3db0 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [3db1 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [3db2 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3c0d 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3c0e 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c0f 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c10 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3c11 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3c12 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3c13 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c17180 gate 1598907138166205700 evaluation starts +peer0.org2.example.com | [3c14 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c17180 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c15 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c17180 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3c16 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c17180 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3c17 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c17180 principal evaluation fails +peer0.org2.example.com | [3c18 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c17180 gate 1598907138166205700 evaluation fails +peer0.org2.example.com | [3c19 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3c1a 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3c1b 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3c1c 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c176f0 gate 1598907138166523000 evaluation starts +peer0.org2.example.com | [3c1d 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c176f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c1e 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c176f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3c1f 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c176f0 principal matched by identity 0 +peer0.org2.example.com | [3c20 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [3c21 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org2.example.com | [3c22 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c176f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3c23 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c176f0 gate 1598907138166523000 evaluation succeeds +peer0.org2.example.com | [3c24 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c25 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c26 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3c27 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3c28 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org2.example.com | [3c29 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org2.example.com | [3c2a 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org2.example.com | [3c2b 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer1.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org1.example.com | [38c8 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org1.example.com | [38c5 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38c9 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51b00 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [38ca 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e51b00 gate 1598907141995924600 evaluation succeeds +peer1.org1.example.com | [38cb 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [38cc 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [38cd 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38cf 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [38d0 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38d1 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38ce 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [38d3 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [38d2 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [38d4 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38d5 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [38d6 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [38d7 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [38d8 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [38d9 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [38da 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc5a90 gate 1598907141999732400 evaluation starts +peer1.org1.example.com | [38db 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [38dc 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38dd 08-31 20:52:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc5a90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [38de 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc5a90 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [38df 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc5a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [38e0 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc5a90 principal evaluation fails +peer1.org1.example.com | [38e1 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc5a90 gate 1598907141999732400 evaluation fails +peer1.org1.example.com | [38e2 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [38e3 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [38e4 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [38e5 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e76940 gate 1598907142000727600 evaluation starts +peer1.org1.example.com | [38e6 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e76940 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [38e7 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e76940 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [38e8 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e76940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [38e9 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e76940 principal evaluation fails +peer1.org1.example.com | [38ea 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e76940 gate 1598907142000727600 evaluation fails +peer1.org1.example.com | [38eb 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [38ec 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [38ed 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [38ee 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e76eb0 gate 1598907142003462900 evaluation starts +peer1.org1.example.com | [38ef 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e76eb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [38f0 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e76eb0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [38f1 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e76eb0 principal matched by identity 0 +peer1.org1.example.com | [38f2 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org1.example.com | [38f3 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org1.example.com | [38f4 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e76eb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [38f5 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e76eb0 gate 1598907142003462900 evaluation succeeds +peer1.org1.example.com | [38f6 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [38f7 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3775 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3776 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3777 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3778 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3779 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [377a 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [377b 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448d0c0 gate 1598907130031354200 evaluation starts +peer0.org1.example.com | [377c 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448d0c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [377d 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448d0c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [377e 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448d0c0 principal matched by identity 0 +peer0.org1.example.com | [377f 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4c 7c 08 a4 94 c3 b5 ea c7 0d 64 6c e7 c3 24 df |L|........dl..$.| +peer0.org1.example.com | 00000010 99 6e 10 6e 61 e2 62 d3 ec e1 85 fb 8c 50 fe 89 |.n.na.b......P..| +peer0.org1.example.com | [3780 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 49 7e 45 3d 5c 74 87 d9 bc 0c 1a |0D. ,I~E=\t.....| +peer0.org1.example.com | 00000010 13 ee 79 12 62 a4 ea 93 c8 0a ae e4 5b 81 b8 2f |..y.b.......[../| +peer0.org1.example.com | 00000020 b7 55 c1 07 02 20 75 cd 01 55 b3 bf e4 c5 06 34 |.U... u..U.....4| +peer0.org1.example.com | 00000030 bd 38 fd cb 52 48 08 b6 06 0d b6 a4 84 b0 9f 8d |.8..RH..........| +peer0.org1.example.com | 00000040 4e eb 2b a1 90 cc |N.+...| +peer0.org1.example.com | [3781 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448d0c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3782 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448d0c0 gate 1598907130031354200 evaluation succeeds +peer0.org1.example.com | [3783 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3784 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3785 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3786 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3787 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3788 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3789 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [378b 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [378c 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [378d 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [378e 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [378f 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3790 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [378a 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3791 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3792 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3793 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3794 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3795 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3796 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3797 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3798 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3799 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [379a 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [379b 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [379c 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [379d 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [379e 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [379f 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37a0 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37a1 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37a2 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37a3 08-31 20:52:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37a4 08-31 20:52:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37a5 08-31 20:52:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37a6 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [37a7 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [37a8 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37a9 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37aa 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37ab 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37ac 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37ad 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37ae 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37af 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [37b0 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 1a 64 11 3f c3 8d 28 fa 7e 8c 29 bb e8 69 72 |Q.d.?..(.~.)..ir| +peer0.org1.example.com | 00000010 c2 7c fa d0 15 71 24 71 48 38 16 3e 1a 87 45 a9 |.|...q$qH8.>..E.| +peer0.org1.example.com | [37b1 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 27 2b ab 42 71 9b 91 52 60 15 30 |0D. 3'+.Bq..R`.0| +peer0.org1.example.com | 00000010 bd f8 5e 24 43 56 4a 86 6f b2 3b 2c 21 bb c9 92 |..^$CVJ.o.;,!...| +peer0.org1.example.com | 00000020 6a 32 d9 a1 02 20 7c 1a 38 39 03 75 8d 83 20 30 |j2... |.89.u.. 0| +peer0.org1.example.com | 00000030 c0 25 73 b2 03 da 95 ea 5d 16 2a c8 76 d6 9c fa |.%s.....].*.v...| +peer0.org1.example.com | 00000040 54 56 d3 3a ce cb |TV.:..| +peer0.org1.example.com | [37b2 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37b3 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3db3 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3db4 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3db5 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3db6 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3db7 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3db8 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [3db9 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dba 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dbb 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3dbc 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:" signature:"0D\002 \023-\220\354\025\361^\354;\000\026k\341\370\315\225\245\303%)\221\010\202\200Np\362\026\355u\266\311\002 Eg?\262\177\352\330\007\217\247,2\310_'\017\216\241W\251\255\344\277\353\250<\313\357\016\"\276\204" > +peer1.org2.example.com | [3dbd 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dbe 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dbf 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dc0 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dc1 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dc2 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dc3 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dc4 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dc5 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dc6 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dc7 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [3dc8 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dc9 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dca 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dcb 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dcc 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [3dcd 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [38f8 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [38f9 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [38fa 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org1.example.com | [38fb 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org1.example.com | [38fc 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [38fd 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [38fe 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org1.example.com | [38ff 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org1.example.com | [3900 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3901 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3902 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3903 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3904 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3905 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3906 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3907 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3908 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e97030 gate 1598907142012163300 evaluation starts +peer1.org1.example.com | [3909 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e97030 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [390a 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e97030 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [390b 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e97030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [390c 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e97030 principal evaluation fails +peer1.org1.example.com | [390d 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e97030 gate 1598907142012163300 evaluation fails +peer1.org1.example.com | [390e 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [390f 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3910 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3911 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e975a0 gate 1598907142015311600 evaluation starts +peer1.org1.example.com | [3912 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e975a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3913 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e975a0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3914 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e975a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3915 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e975a0 principal evaluation fails +peer1.org1.example.com | [3916 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e975a0 gate 1598907142015311600 evaluation fails +peer1.org1.example.com | [3917 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3dce 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3dcf 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3dd0 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3dd1 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3dd2 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3dd3 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3dd4 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003601c70 gate 1598907141608628600 evaluation starts +peer1.org2.example.com | [3dd5 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003601c70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3dd6 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003601c70 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3dd7 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003601c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3dd8 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003601c70 principal evaluation fails +peer1.org2.example.com | [3dd9 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003601c70 gate 1598907141608628600 evaluation fails +peer1.org2.example.com | [3dda 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3ddb 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3ddc 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3ddd 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363a1e0 gate 1598907141609446900 evaluation starts +peer1.org2.example.com | [3dde 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363a1e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ddf 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363a1e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3de0 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363a1e0 principal matched by identity 0 +peer1.org2.example.com | [3de1 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 9a f5 53 9e f9 83 db 2f 34 ad d5 1c 20 26 85 |...S..../4... &.| +peer1.org2.example.com | 00000010 58 ee 5c ab 5d 7e 9c e3 6f f9 49 1b 23 bc 85 2c |X.\.]~..o.I.#..,| +peer1.org2.example.com | [3de2 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 8f b8 0c ad a4 ff 4d 70 69 23 a7 |0D. w......Mpi#.| +peer1.org2.example.com | 00000010 b4 26 e3 1b 93 c8 16 6b 88 53 10 5b 0d 2f 05 ba |.&.....k.S.[./..| +peer1.org2.example.com | 00000020 a0 7b b5 64 02 20 44 8c a3 73 eb ae ed 12 e7 ac |.{.d. D..s......| +peer1.org2.example.com | 00000030 94 05 8e 24 5e b6 4b 48 75 3b 40 52 cc 85 23 5c |...$^.KHu;@R..#\| +peer1.org2.example.com | 00000040 f8 d3 83 df 4e ae |....N.| +peer1.org2.example.com | [3de3 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363a1e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3de4 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363a1e0 gate 1598907141609446900 evaluation succeeds +peer1.org2.example.com | [3de5 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3de6 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3de7 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3de8 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3de9 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [3dea 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [3deb 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [3dec 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [3ded 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [3dee 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3def 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3df0 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3df1 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [3df2 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3df3 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3df4 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3df5 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3df6 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:" signature:"0D\002 \023-\220\354\025\361^\354;\000\026k\341\370\315\225\245\303%)\221\010\202\200Np\362\026\355u\266\311\002 Eg?\262\177\352\330\007\217\247,2\310_'\017\216\241W\251\255\344\277\353\250<\313\357\016\"\276\204" > +peer1.org2.example.com | [3df7 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [3df8 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3df9 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3dfa 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dfb 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dfc 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3dfd 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3dfe 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [3dff 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e00 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3e01 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e02 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e03 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3e04 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3e05 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3e06 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363bf10 gate 1598907141687364400 evaluation starts +peer1.org2.example.com | [3e07 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363bf10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e08 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363bf10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3e09 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363bf10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3e0a 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363bf10 principal evaluation fails +peer1.org2.example.com | [3e0b 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00363bf10 gate 1598907141687364400 evaluation fails +peer1.org2.example.com | [3e0c 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3e0d 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3e0e 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [37b4 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [37b5 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [37b6 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [37b7 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37b8 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37b9 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37ba 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37bb 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37bc 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37bd 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [37be 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37bf 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [37c0 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37c1 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37c2 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37c3 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37c4 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37c5 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37c6 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37c7 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37c8 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37c9 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37ca 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37cb 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37cc 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37cd 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37ce 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [37cf 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [37d0 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37d1 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37d2 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37d3 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37d4 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37d5 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37d6 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37d7 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37d8 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [37d9 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37da 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [37db 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [37dc 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [37dd 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [37de 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [37df 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [37e0 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e27f0 gate 1598907130432449800 evaluation starts +peer0.org1.example.com | [37e1 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e27f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [37e2 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e27f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [37e3 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e27f0 principal matched by identity 0 +peer0.org1.example.com | [37e4 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 d6 b5 0a 35 7c 05 ec fa 46 2d fc 01 a1 62 dd |....5|...F-...b.| +peer0.org1.example.com | 00000010 e4 e2 99 8a 64 93 bd f5 88 d5 13 08 d0 a2 12 b7 |....d...........| +peer0.org1.example.com | [37e5 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 7d 29 44 e5 60 46 db c4 93 d8 31 |0D. .})D.`F....1| +peer0.org1.example.com | 00000010 34 1c 07 ca 79 2a cb e9 ce b7 8d a6 43 d0 ac 50 |4...y*......C..P| +peer0.org1.example.com | 00000020 4c 9a e5 c0 02 20 6b af 68 b0 cb 56 b4 f6 98 a4 |L.... k.h..V....| +peer0.org1.example.com | 00000030 bc 9e 29 a1 5e 31 c0 80 ad e2 47 5a af f9 c2 79 |..).^1....GZ...y| +peer0.org1.example.com | 00000040 16 da 1a e2 02 40 |.....@| +peer0.org1.example.com | [37e6 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e27f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [37e7 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e27f0 gate 1598907130432449800 evaluation succeeds +peer0.org1.example.com | [37e8 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [37e9 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [37ea 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [37eb 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org2.example.com | [3c2c 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c2d 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c2e 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org2.example.com | [3c2f 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org2.example.com | [3c30 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c31 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c32 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3c33 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c34 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c35 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3c36 08-31 20:52:18.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3c37 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3c38 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43f90 gate 1598907138172736600 evaluation starts +peer0.org2.example.com | [3c39 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43f90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c3a 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43f90 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3c3b 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43f90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3c3c 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43f90 principal evaluation fails +peer0.org2.example.com | [3c3d 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c43f90 gate 1598907138172736600 evaluation fails +peer0.org2.example.com | [3c3e 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3c3f 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3c40 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3c41 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c88500 gate 1598907138173508700 evaluation starts +peer0.org2.example.com | [3c42 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c88500 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c43 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c88500 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3c44 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c88500 principal matched by identity 0 +peer0.org2.example.com | [3c45 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [3c46 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org2.example.com | [3c47 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c88500 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3c48 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c88500 gate 1598907138173508700 evaluation succeeds +peer0.org2.example.com | [3c49 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c4a 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c4b 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3e0f 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003678480 gate 1598907141688155700 evaluation starts +peer1.org2.example.com | [3e10 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003678480 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e11 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003678480 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3e12 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003678480 principal matched by identity 0 +peer1.org2.example.com | [3e13 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org2.example.com | [3e14 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org2.example.com | [3e15 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003678480 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3e16 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003678480 gate 1598907141688155700 evaluation succeeds +peer1.org2.example.com | [3e17 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e18 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e19 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3e1a 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3e1b 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e1c 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e1d 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e1e 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e1f 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3e20 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3e21 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3e22 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003679070 gate 1598907141689155600 evaluation starts +peer1.org2.example.com | [3e23 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003679070 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e24 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003679070 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3e25 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003679070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3e26 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003679070 principal evaluation fails +peer1.org2.example.com | [3e27 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003679070 gate 1598907141689155600 evaluation fails +peer1.org2.example.com | [3e28 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3e29 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3e2a 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3e2b 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036795e0 gate 1598907141692395900 evaluation starts +peer1.org2.example.com | [3e2c 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036795e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e2d 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036795e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3e2e 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036795e0 principal matched by identity 0 +peer1.org2.example.com | [3e2f 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org2.example.com | [3e30 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org2.example.com | [3e31 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036795e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3e32 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036795e0 gate 1598907141692395900 evaluation succeeds +peer1.org2.example.com | [3e33 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e34 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e35 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3e36 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3e37 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e38 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e39 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3918 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3919 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [391a 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e97b10 gate 1598907142015570500 evaluation starts +peer1.org1.example.com | [391b 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e97b10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [391c 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e97b10 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [391d 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e97b10 principal matched by identity 0 +peer1.org1.example.com | [391e 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org1.example.com | [391f 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org1.example.com | [3920 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e97b10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3921 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e97b10 gate 1598907142015570500 evaluation succeeds +peer1.org1.example.com | [3922 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3923 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3924 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3925 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3926 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org1.example.com | [3927 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org1.example.com | [3928 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3929 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [392a 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [392b 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [392c 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [392d 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [392e 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [392f 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3930 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1400 gate 1598907142018443200 evaluation starts +peer1.org1.example.com | [3931 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1400 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3932 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1400 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3933 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3934 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1400 principal evaluation fails +peer1.org1.example.com | [3935 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1400 gate 1598907142018443200 evaluation fails +peer1.org1.example.com | [3936 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3937 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3938 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3939 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1970 gate 1598907142019708400 evaluation starts +peer1.org1.example.com | [393a 08-31 20:52:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1970 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [393b 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1970 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [393c 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1970 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [393d 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1970 principal evaluation fails +peer1.org1.example.com | [393e 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1970 gate 1598907142019708400 evaluation fails +peer1.org1.example.com | [393f 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3940 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3941 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3942 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1ee0 gate 1598907142020644900 evaluation starts +peer1.org1.example.com | [3943 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1ee0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3944 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1ee0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3945 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1ee0 principal matched by identity 0 +peer1.org1.example.com | [3946 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org1.example.com | [3947 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org1.example.com | [3948 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1ee0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3949 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb1ee0 gate 1598907142020644900 evaluation succeeds +peer1.org1.example.com | [394a 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [394b 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [394c 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [394d 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [394e 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [394f 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [3950 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [3951 08-31 20:52:22.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3952 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3953 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3954 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3955 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3956 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3957 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [3958 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e3a 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org2.example.com | [3e3b 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e3c 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e3d 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [3e3e 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [3e3f 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e40 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [3e42 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e41 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [3e43 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e44 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3e45 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e46 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e47 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3e48 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3e49 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3e4a 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b2e10 gate 1598907141705968700 evaluation starts +peer1.org2.example.com | [3e4b 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b2e10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e4c 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b2e10 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [37ec 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37ed 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [37ee 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [37ef 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [37f0 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [37f1 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37f2 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37f3 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [37f4 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37f5 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37f6 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37f7 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37f8 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37f9 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37fa 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37fb 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [37fc 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [37fd 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [37fe 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [37ff 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3800 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3801 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3802 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3803 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3804 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3805 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3806 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3807 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161030 +peer0.org1.example.com | [3808 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5B359ADD9F542E35D9EB408202E8A76D1410C62059E3E01DE447CF39F1C43B66 +peer0.org1.example.com | [3809 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [380a 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [380b 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [380c 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [380d 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [380e 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [380f 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3810 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3811 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3812 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3813 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3814 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3815 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3816 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3817 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3818 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3819 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [381a 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [381b 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [381c 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [381d 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [381e 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [381f 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3820 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3821 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3822 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3823 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3824 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3825 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3826 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3827 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3828 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [3829 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [382a 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [382b 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [382c 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [382d 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [382e 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [382f 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3830 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3831 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3832 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3833 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3834 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3835 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3836 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004517270 gate 1598907133094071300 evaluation starts +peer0.org1.example.com | [3837 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004517270 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3838 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004517270 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3839 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004517270 principal matched by identity 0 +peer0.org1.example.com | [383a 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 5c a2 78 e0 1f 04 7e 3b 4f 8e b8 2b c1 1e af |Q\.x...~;O..+...| +peer0.org1.example.com | 00000010 06 66 70 37 7b a7 be 74 db 4c 83 18 71 e0 de 96 |.fp7{..t.L..q...| +peer0.org1.example.com | [383b 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 59 0f 8f d3 2c 9f a8 ea 33 65 98 |0D. dY...,...3e.| +peer0.org1.example.com | 00000010 5d d4 d4 a8 74 a7 52 d2 5f 2c 06 5d 35 0a d0 59 |]...t.R._,.]5..Y| +peer0.org1.example.com | 00000020 6e 38 f0 42 02 20 7d f5 47 0a 5e ed 53 b1 f6 05 |n8.B. }.G.^.S...| +peer0.org1.example.com | 00000030 af e0 d7 06 d5 32 67 41 93 83 c4 06 e7 9d 18 31 |.....2gA.......1| +peer0.org1.example.com | 00000040 0e fe 14 61 d9 19 |...a..| +peer0.org1.example.com | [383c 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004517270 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [383d 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004517270 gate 1598907133094071300 evaluation succeeds +peer0.org1.example.com | [383e 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [383f 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3840 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3841 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3842 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3843 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3844 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3845 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3846 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3847 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3848 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3849 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [384a 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [384b 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [384c 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [384d 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [384e 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [3e4d 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b2e10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3e4e 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b2e10 principal evaluation fails +peer1.org2.example.com | [3e4f 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b2e10 gate 1598907141705968700 evaluation fails +peer1.org2.example.com | [3e50 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3e51 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3e52 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3e53 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b3380 gate 1598907141712042400 evaluation starts +peer1.org2.example.com | [3e54 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b3380 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e55 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b3380 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3e56 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b3380 principal matched by identity 0 +peer1.org2.example.com | [3e57 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org2.example.com | [3e58 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org2.example.com | [3e59 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b3380 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3e5a 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036b3380 gate 1598907141712042400 evaluation succeeds +peer1.org2.example.com | [3e5b 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e5c 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e5d 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3e5e 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3e5f 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e60 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e61 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [3e62 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e63 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3e64 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e65 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e66 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3e67 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3e68 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3e69 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036de6f0 gate 1598907141720133100 evaluation starts +peer1.org2.example.com | [3e6a 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036de6f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e6b 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036de6f0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3e6c 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036de6f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3e6d 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036de6f0 principal evaluation fails +peer1.org2.example.com | [3e6e 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036de6f0 gate 1598907141720133100 evaluation fails +peer1.org2.example.com | [3e6f 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3e70 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3e71 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3e72 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dec60 gate 1598907141722470200 evaluation starts +peer1.org2.example.com | [3e73 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dec60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e74 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dec60 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3e75 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dec60 principal matched by identity 0 +peer1.org2.example.com | [3e76 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org2.example.com | [3e77 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org2.example.com | [3e78 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dec60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3e79 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dec60 gate 1598907141722470200 evaluation succeeds +peer1.org2.example.com | [3e7a 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e7b 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3e7c 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3e7d 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3e7e 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e7f 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e80 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3e81 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e82 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e83 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e84 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3e85 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3e86 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3e87 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e88 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3e89 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3e8a 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [384f 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [3850 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +peer0.org1.example.com | [3851 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3852 08-31 20:52:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3853 08-31 20:52:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3854 08-31 20:52:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3855 08-31 20:52:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3856 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [3857 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3858 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [3859 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [385a 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 27 bc e0 21 ac 9f 49 12 2b cb f7 70 85 98 71 |W'..!..I.+..p..q| +peer0.org1.example.com | 00000010 12 35 bd 3c 32 7c cc 4a 6e f0 0a dc c2 0c e9 e6 |.5.<2|.Jn.......| +peer0.org1.example.com | [385b 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 21 fc 14 f8 3c 39 da 81 0f b6 |0E.!..!...<9....| +peer0.org1.example.com | 00000010 17 d5 a3 68 c7 e5 c4 03 fc 86 a5 b4 ec f8 54 d2 |...h..........T.| +peer0.org1.example.com | 00000020 d2 86 34 73 52 02 20 77 42 50 c8 3e 6b ff f9 75 |..4sR. wBP.>k..u| +peer0.org1.example.com | 00000030 a4 4b 8d 4f a8 db 54 d3 dd d3 bf 5c 87 26 8d 67 |.K.O..T....\.&.g| +peer0.org1.example.com | 00000040 01 c0 b7 05 c0 2a a2 |.....*.| +peer0.org1.example.com | [385c 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [385d 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 29 a7 ba ae 3d 8a bc 03 5e fe ad |0D. 7)...=...^..| +peer0.org1.example.com | 00000010 70 3d f4 2a 4e cc f7 9f ea ee 08 56 28 74 46 bd |p=.*N......V(tF.| +peer0.org1.example.com | 00000020 d9 43 cb 02 02 20 26 7c 06 c0 3b 23 04 08 11 0a |.C... &|..;#....| +peer0.org1.example.com | 00000030 f4 3f 61 b3 fc a1 e4 07 75 1e 5e cf 5f 2f 7c 7e |.?a.....u.^._/|~| +peer0.org1.example.com | 00000040 48 82 29 3c e0 dc |H.)<..| +peer0.org1.example.com | [385e 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [385f 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [3860 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3861 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3862 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3863 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3864 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3865 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3866 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [3867 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3868 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3869 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [386a 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" secret_envelope: > alive: +peer0.org1.example.com | [386b 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [386c 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [386d 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [386e 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [386f 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3870 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3871 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3872 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3873 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3874 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3875 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3876 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [3877 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3878 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [3879 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [387a 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [387b 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [387c 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [387d 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3959 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [395a 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [395b 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [395c 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [395d 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [395e 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [395f 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecf3f0 gate 1598907142174006100 evaluation starts +peer1.org1.example.com | [3960 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecf3f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3961 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecf3f0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3962 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecf3f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3963 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecf3f0 principal evaluation fails +peer1.org1.example.com | [3964 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecf3f0 gate 1598907142174006100 evaluation fails +peer1.org1.example.com | [3965 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3966 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3967 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3968 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecf960 gate 1598907142175768900 evaluation starts +peer1.org1.example.com | [3969 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecf960 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [396a 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecf960 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [396b 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecf960 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [396c 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecf960 principal evaluation fails +peer1.org1.example.com | [396d 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecf960 gate 1598907142175768900 evaluation fails +peer1.org1.example.com | [396e 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [396f 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3970 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3971 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecfed0 gate 1598907142178492700 evaluation starts +peer1.org1.example.com | [3972 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecfed0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3973 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecfed0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3974 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecfed0 principal matched by identity 0 +peer1.org1.example.com | [3975 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org1.example.com | [3976 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org1.example.com | [3977 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecfed0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3978 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ecfed0 gate 1598907142178492700 evaluation succeeds +peer1.org1.example.com | [3979 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [397a 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [397b 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [397c 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [397d 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [397e 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [397f 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org1.example.com | [3980 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3e8b 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3e8c 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3e8d 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3e8e 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dffc0 gate 1598907141951625500 evaluation starts +peer1.org2.example.com | [3e8f 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dffc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e90 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dffc0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3e91 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dffc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3e92 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dffc0 principal evaluation fails +peer1.org2.example.com | [3e93 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036dffc0 gate 1598907141951625500 evaluation fails +peer1.org2.example.com | [3e94 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3e95 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3e96 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3e97 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003706530 gate 1598907141954631800 evaluation starts +peer1.org2.example.com | [3e98 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003706530 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3e99 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003706530 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3e9a 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003706530 principal matched by identity 0 +peer1.org2.example.com | [3e9b 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org2.example.com | [3e9c 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org2.example.com | [3e9d 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003706530 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3e9e 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003706530 gate 1598907141954631800 evaluation succeeds +peer1.org2.example.com | [3e9f 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ea0 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ea1 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3ea2 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3ea3 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ea4 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ea5 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ea6 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ea7 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ea8 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3ea9 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3eaa 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003707120 gate 1598907141958931600 evaluation starts +peer1.org2.example.com | [3eab 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003707120 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3eac 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003707120 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3ead 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003707120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3eae 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003707120 principal evaluation fails +peer1.org2.example.com | [3eaf 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003707120 gate 1598907141958931600 evaluation fails +peer1.org2.example.com | [3eb0 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3eb1 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3eb2 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3eb3 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003707690 gate 1598907141961437200 evaluation starts +peer1.org2.example.com | [3eb4 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003707690 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3eb5 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003707690 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3eb6 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003707690 principal matched by identity 0 +peer1.org2.example.com | [3eb7 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org2.example.com | [3eb8 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org2.example.com | [3eb9 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003707690 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3eba 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003707690 gate 1598907141961437200 evaluation succeeds +peer1.org2.example.com | [3ebb 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ebc 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ebd 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3ebe 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3ebf 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ec0 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ec1 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ec2 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer1.org2.example.com | [3ec3 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3ec4 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ec5 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3ec6 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ec7 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ec8 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ec9 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3eca 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ecb 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3ecc 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ecd 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ece 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ecf 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3ed0 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3ed1 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3190 gate 1598907141976962300 evaluation starts +peer1.org2.example.com | [3ed2 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3190 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ed3 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3190 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3ed4 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3ed5 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3190 principal evaluation fails +peer1.org2.example.com | [3ed6 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3190 gate 1598907141976962300 evaluation fails +peer1.org2.example.com | [3ed7 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3ed8 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3ed9 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3981 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3982 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3983 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3984 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3985 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3986 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3987 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef3240 gate 1598907142200118400 evaluation starts +peer1.org1.example.com | [3988 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef3240 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3989 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef3240 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [398a 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef3240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [398b 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef3240 principal evaluation fails +peer1.org1.example.com | [398c 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef3240 gate 1598907142200118400 evaluation fails +peer1.org1.example.com | [398d 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [398e 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [398f 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3990 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef37b0 gate 1598907142200534400 evaluation starts +peer1.org1.example.com | [3991 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef37b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3992 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef37b0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3993 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef37b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3994 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef37b0 principal evaluation fails +peer1.org1.example.com | [3995 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef37b0 gate 1598907142200534400 evaluation fails +peer1.org1.example.com | [3996 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3997 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3998 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3999 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef3d20 gate 1598907142200782300 evaluation starts +peer1.org1.example.com | [399a 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef3d20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [399b 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef3d20 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [399c 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef3d20 principal matched by identity 0 +peer1.org1.example.com | [399d 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org1.example.com | [399e 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org1.example.com | [399f 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef3d20 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [39a0 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef3d20 gate 1598907142200782300 evaluation succeeds +peer1.org1.example.com | [39a1 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [39a2 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [39a3 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [39a4 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [39a5 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39a6 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39a7 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [39a8 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39a9 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39aa 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39ab 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39ac 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org1.example.com | [39ad 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39ae 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [39af 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [39b0 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [39b1 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [39b2 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [39b3 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [39b4 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1eae0 gate 1598907142426088600 evaluation starts +peer1.org1.example.com | [39b5 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1eae0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [39b6 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1eae0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [39b7 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1eae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [39b8 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1eae0 principal evaluation fails +peer1.org1.example.com | [39b9 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1eae0 gate 1598907142426088600 evaluation fails +peer1.org1.example.com | [39ba 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [39bb 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [39bc 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [39bd 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1f050 gate 1598907142426939300 evaluation starts +peer1.org1.example.com | [39be 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1f050 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [39bf 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1f050 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [39c0 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1f050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [39c1 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1f050 principal evaluation fails +peer1.org1.example.com | [39c2 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1f050 gate 1598907142426939300 evaluation fails +peer1.org1.example.com | [39c3 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [39c4 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [39c5 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [39c6 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1f5c0 gate 1598907142427691400 evaluation starts +peer1.org1.example.com | [39c7 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1f5c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [39c8 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1f5c0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [39c9 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1f5c0 principal matched by identity 0 +peer1.org1.example.com | [39ca 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org1.example.com | [39cb 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org1.example.com | [39cc 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1f5c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [39cd 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f1f5c0 gate 1598907142427691400 evaluation succeeds +peer1.org1.example.com | [39ce 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [39cf 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [39d0 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [39d1 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [39d2 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39d3 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39d4 08-31 20:52:23.73 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [39d5 08-31 20:52:23.73 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org1.example.com | [39d6 08-31 20:52:23.73 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer1.org1.example.com | [39d7 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [39d8 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 d5 e0 96 87 38 8f 25 b4 5a 0f 31 98 1f 6d b4 |.....8.%.Z.1..m.| +peer1.org1.example.com | 00000010 05 ec 4d 75 17 86 a0 f6 81 9e 2b 9d b8 e7 50 b7 |..Mu......+...P.| +peer1.org1.example.com | [39d9 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 1b 6b 0a 27 be 51 d0 06 2a ba |0E.!...k.'.Q..*.| +peer1.org1.example.com | 00000010 35 2a e4 c4 eb 18 86 67 b4 72 5e 37 cd dd 05 f2 |5*.....g.r^7....| +peer1.org1.example.com | 00000020 e8 b8 f6 be 3a 02 20 3e b2 df 01 cf 46 ed 17 e8 |....:. >....F...| +peer1.org1.example.com | 00000030 65 e6 aa 35 c3 b9 95 53 02 05 b9 2e b7 08 ba f8 |e..5...S........| +peer1.org1.example.com | 00000040 74 4a ac 33 cd b3 22 |tJ.3.."| +peer1.org1.example.com | [39da 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39db 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39dc 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39dd 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [39de 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [39df 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [39e0 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39e1 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39e2 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39e3 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39e4 08-31 20:52:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39e5 08-31 20:52:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [39e6 08-31 20:52:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [39e7 08-31 20:52:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39e8 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [39e9 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [39ea 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [39eb 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [39ec 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c4c 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3c4d 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c4e 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c4f 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3c50 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c51 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c52 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3c53 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3c54 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3c55 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89700 gate 1598907138174307700 evaluation starts +peer0.org2.example.com | [3c56 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89700 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c57 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89700 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3c58 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3c59 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89700 principal evaluation fails +peer0.org2.example.com | [3c5a 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89700 gate 1598907138174307700 evaluation fails +peer0.org2.example.com | [3c5b 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3c5c 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3c5d 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3c5e 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89cf0 gate 1598907138174623800 evaluation starts +peer0.org2.example.com | [3c5f 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89cf0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c60 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89cf0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3c61 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89cf0 principal matched by identity 0 +peer0.org2.example.com | [3c62 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org2.example.com | [3c63 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org2.example.com | [3c64 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89cf0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3c65 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c89cf0 gate 1598907138174623800 evaluation succeeds +peer0.org2.example.com | [3c66 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c67 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3c68 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3c69 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3c6a 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org2.example.com | [3c6b 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org2.example.com | [3c6c 08-31 20:52:18.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3eda 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3700 gate 1598907141977273000 evaluation starts +peer1.org2.example.com | [3edb 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3700 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3edc 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3700 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3edd 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3700 principal matched by identity 0 +peer1.org2.example.com | [3ede 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org2.example.com | [3edf 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org2.example.com | [3ee0 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3700 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ee1 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036f3700 gate 1598907141977273000 evaluation succeeds +peer1.org2.example.com | [3ee2 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ee3 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ee4 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3ee5 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3ee6 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ee7 08-31 20:52:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3ee8 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ee9 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3eea 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3eeb 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [3eec 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org2.example.com | [3eed 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org2.example.com | [3eee 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3eef 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3ef0 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3ef1 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3ef2 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3ef3 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ef4 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer1.org2.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer1.org2.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer1.org2.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org2.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer1.org2.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer1.org2.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [3ef5 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003748d30 gate 1598907142184060400 evaluation starts +peer1.org2.example.com | [3ef6 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003748d30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3ef7 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003748d30 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3ef8 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003748d30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org2.example.com | [3ef9 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003748d30 principal evaluation fails +peer1.org2.example.com | [3efa 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003748d30 gate 1598907142184060400 evaluation fails +peer1.org2.example.com | [3efb 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3efc 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3efd 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3efe 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003749b80 gate 1598907142184723000 evaluation starts +peer1.org2.example.com | [3eff 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003749b80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f00 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003749b80 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3f01 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003749b80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [387e 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [387f 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3880 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3881 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3882 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3883 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3884 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454f680 gate 1598907133506299700 evaluation starts +peer0.org1.example.com | [3885 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454f680 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3886 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454f680 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3887 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454f680 principal matched by identity 0 +peer0.org1.example.com | [3888 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 64 7e f1 14 ff 7a d5 17 09 62 b0 ee a6 f3 26 |.d~...z...b....&| +peer0.org1.example.com | 00000010 76 71 60 f0 e6 6e 2f 81 71 8a e5 72 12 24 f0 f4 |vq`..n/.q..r.$..| +peer0.org1.example.com | [3889 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ca e1 de ed fe 90 29 a7 dd a3 |0E.!........)...| +peer0.org1.example.com | 00000010 d8 d7 99 68 c9 ea 25 46 b4 e2 f5 4b d1 07 e4 cb |...h..%F...K....| +peer0.org1.example.com | 00000020 b1 5c 45 19 cc 02 20 1b de fc ab b1 41 37 4a 60 |.\E... .....A7J`| +peer0.org1.example.com | 00000030 8e 23 cc fb d9 74 16 25 d0 b0 1b e1 f6 68 7c f6 |.#...t.%.....h|.| +peer0.org1.example.com | 00000040 5f a9 cd 66 bc 1d 77 |_..f..w| +peer0.org1.example.com | [388a 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454f680 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [388b 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454f680 gate 1598907133506299700 evaluation succeeds +peer0.org1.example.com | [388c 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [388d 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [388e 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [388f 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3890 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3891 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3892 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3893 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3894 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3895 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3896 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3897 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3898 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [3899 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [389a 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [389b 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [389c 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3c6d 08-31 20:52:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c6e 08-31 20:52:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c6f 08-31 20:52:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [3c70 08-31 20:52:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c71 08-31 20:52:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c72 08-31 20:52:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3c73 08-31 20:52:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c74 08-31 20:52:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c75 08-31 20:52:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c76 08-31 20:52:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c77 08-31 20:52:18.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c78 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c79 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c7a 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c7b 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c7c 08-31 20:52:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c7d 08-31 20:52:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c7e 08-31 20:52:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [3c7f 08-31 20:52:18.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c80 08-31 20:52:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [3c81 08-31 20:52:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [3c82 08-31 20:52:19.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [3c83 08-31 20:52:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [3c84 08-31 20:52:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac 9b 63 29 95 88 fd 44 27 63 55 9d 71 32 04 90 |..c)...D'cU.q2..| +peer0.org2.example.com | 00000010 0b 3e ab 6c 37 5a 06 25 67 31 90 00 27 18 4b 8e |.>.l7Z.%g1..'.K.| +peer0.org2.example.com | [3c85 08-31 20:52:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 8e dd 41 8f d3 23 89 24 71 f2 |0E.!....A..#.$q.| +peer0.org2.example.com | 00000010 2e 78 4b d0 fe 68 b9 a8 50 0e 6d e0 10 03 de 91 |.xK..h..P.m.....| +peer0.org2.example.com | 00000020 9c c3 cf 40 f2 02 20 59 bd 68 c6 24 6e c5 7f 7a |...@.. Y.h.$n..z| +peer0.org2.example.com | 00000030 d8 74 9f 14 24 95 7e de a5 41 f1 43 7d d8 30 cd |.t..$.~..A.C}.0.| +peer0.org2.example.com | 00000040 7e 9a 0c cc 8a 89 b8 |~......| +peer0.org2.example.com | [3c86 08-31 20:52:19.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3c87 08-31 20:52:19.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c88 08-31 20:52:19.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3c89 08-31 20:52:19.24 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [3c8a 08-31 20:52:19.24 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [3c8b 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:42532 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41192 bytes, seq: 6}, Envelope: 41225 bytes, Signature: 0 bytes +peer0.org2.example.com | [3c8c 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c8d 08-31 20:52:19.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3c8e 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org2.example.com | [3c8f 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3c90 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org2.example.com | [3c91 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0b640 gate 1598907139391858500 evaluation starts +peer0.org2.example.com | [3c92 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0b640 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3c93 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0b640 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3c94 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0b640 principal matched by identity 0 +peer0.org2.example.com | [3c95 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d e3 66 b0 07 43 c9 c1 64 9d 7f 39 51 38 d4 79 |M.f..C..d..9Q8.y| +peer0.org2.example.com | 00000010 ce b4 aa c9 62 6e 44 52 6c ec e2 de 78 ba cd 1f |....bnDRl...x...| +peer0.org2.example.com | [3c96 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a 58 70 21 3e 2c 57 36 82 80 73 71 |0D. :Xp!>,W6..sq| +peer0.org2.example.com | 00000010 8f f1 88 88 ba 67 83 2c 0a 44 0f 62 b5 de c8 be |.....g.,.D.b....| +peer0.org2.example.com | 00000020 a7 88 55 52 02 20 7e 53 30 35 b7 da 73 e1 2f 9a |..UR. ~S05..s./.| +peer0.org2.example.com | 00000030 ee 5a c0 4d 7f 51 0a 84 35 95 80 5c e7 68 27 cf |.Z.M.Q..5..\.h'.| +peer0.org2.example.com | 00000040 a7 e0 05 f2 88 65 |.....e| +peer0.org2.example.com | [3c97 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0b640 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3c98 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d0b640 gate 1598907139391858500 evaluation succeeds +peer0.org2.example.com | [3c99 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [3c9a 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [3c9b 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [3c9c 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org2.example.com | [3c9d 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41192 bytes, seq: 6}, Envelope: 41225 bytes, Signature: 0 bytes to the block puller +peer0.org2.example.com | [3c9e 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +peer0.org2.example.com | [3c9f 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ca0 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Received new message via gossip channel +peer0.org2.example.com | [3ca1 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer0.org2.example.com | [3ca2 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org2.example.com | [3ca3 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +peer0.org2.example.com | [3ca4 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +peer0.org2.example.com | [3ca5 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer0.org2.example.com | [3ca6 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +peer0.org2.example.com | [3ca7 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +peer0.org2.example.com | [3ca8 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org2.example.com | [3ca9 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0034bd5c0 env 0xc0027205f0 txn 0 +peer0.org2.example.com | [3caa 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0027205f0 +peer0.org2.example.com | [3cab 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\203\306\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\350c\034\327\214\356\327|\351\320\253\304j\r0\333\310\276\276\324\377\007\237t" +peer0.org2.example.com | [3cac 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org2.example.com | [3cad 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [3cae 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org2.example.com | [3caf 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org2.example.com | [3cb0 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org2.example.com | [3cb1 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org2.example.com | [3cb2 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [3cb3 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 91 49 22 67 d4 21 5a c5 5d ba b6 53 95 4a 0e |p.I"g.!Z.]..S.J.| +peer0.org2.example.com | 00000010 ee fd 0a 4b 0b b3 b0 39 d0 4f 7a 03 2f 68 d7 2b |...K...9.Oz./h.+| +peer0.org2.example.com | [3cb4 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b 0e 7b 4c 2d fb 5c 6a 92 7b 58 8b |0D. ..{L-.\j.{X.| +peer0.org2.example.com | 00000010 0a 94 e5 5d d9 f6 e0 78 df 56 82 b4 e5 6a e7 97 |...]...x.V...j..| +peer0.org2.example.com | 00000020 4a d7 3d d0 02 20 37 8c 68 5f 50 c0 44 97 70 a1 |J.=.. 7.h_P.D.p.| +peer0.org2.example.com | 00000030 6d 73 fc 0e d0 ba 0e f6 ad 2a 7d 93 67 93 90 59 |ms.......*}.g..Y| +peer0.org2.example.com | 00000040 46 c7 bb 03 af ad |F.....| +peer0.org2.example.com | [3cb5 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [3cb6 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc003234000, header channel_header:"\010\001\032\006\010\203\306\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\350c\034\327\214\356\327|\351\320\253\304j\r0\333\310\276\276\324\377\007\237t" +peer0.org2.example.com | [3cb7 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org2.example.com | [3cb8 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [3cb9 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [3cba 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [3cbb 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [3cbc 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [3cbd 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [3cbe 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [3cbf 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [3cc0 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [3cc1 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [3cc2 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [3cc3 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [3cc4 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [3cc5 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [3cc6 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer1.org1.example.com | [39ed 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [39ee 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [39ef 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [39f0 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [39f1 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [39f2 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [39f3 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f50860 gate 1598907145034292200 evaluation starts +peer1.org1.example.com | [39f4 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f50860 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [39f5 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f50860 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [39f6 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f50860 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [39f7 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f50860 principal evaluation fails +peer1.org1.example.com | [39f8 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f50860 gate 1598907145034292200 evaluation fails +peer1.org1.example.com | [39f9 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [39fa 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [39fb 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [39fc 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f50dd0 gate 1598907145036441300 evaluation starts +peer1.org1.example.com | [39fd 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f50dd0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [39fe 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f50dd0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [39ff 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f50dd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3a00 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f50dd0 principal evaluation fails +peer1.org1.example.com | [3a01 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f50dd0 gate 1598907145036441300 evaluation fails +peer1.org1.example.com | [3a02 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3a03 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3a04 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3a05 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f51340 gate 1598907145038781100 evaluation starts +peer1.org1.example.com | [3a06 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f51340 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3a07 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f51340 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3a08 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f51340 principal matched by identity 0 +peer1.org1.example.com | [3a09 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 b0 f9 f3 76 b0 19 27 5f 6f f0 59 26 46 b4 f9 |....v..'_o.Y&F..| +peer1.org1.example.com | 00000010 15 b0 6a ce 97 a7 73 a0 23 d2 88 89 5c 3c bb 66 |..j...s.#...\<.f| +peer1.org1.example.com | [3a0a 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 de f1 e7 50 26 d3 49 87 f7 44 |0E.!.....P&.I..D| +peer1.org1.example.com | 00000010 0f 87 ad 2e 86 4f 36 b1 1a e6 0a 6a 28 fd 1a fd |.....O6....j(...| +peer1.org1.example.com | 00000020 57 8a a0 5d d5 02 20 5d 02 7a 4d c5 23 dc bf a6 |W..].. ].zM.#...| +peer1.org1.example.com | 00000030 c9 74 49 b6 bd 3e d6 41 68 f3 72 02 fe b8 bd b2 |.tI..>.Ah.r.....| +peer1.org1.example.com | 00000040 07 10 79 82 e6 73 62 |..y..sb| +peer1.org1.example.com | [3a0b 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f51340 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3a0c 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f51340 gate 1598907145038781100 evaluation succeeds +peer1.org1.example.com | [3a0d 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a0e 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a0f 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3a10 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3a11 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a12 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3a13 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3a14 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3a15 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3a16 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a17 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a18 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a19 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a1a 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a1b 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a1c 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a1d 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a1e 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a1f 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a20 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a21 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a22 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a23 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a24 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a25 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a26 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a27 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3a28 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a29 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a2a 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3a2b 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a2c 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a2d 08-31 20:52:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a2e 08-31 20:52:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a2f 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3a30 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a31 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3a32 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3a33 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a34 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3a35 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3a36 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3a37 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3a38 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3a39 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3a3a 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f34c70 gate 1598907145112179400 evaluation starts +peer1.org1.example.com | [3a3b 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f34c70 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3a3c 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f34c70 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3a3d 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f34c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3a3e 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f34c70 principal evaluation fails +peer1.org1.example.com | [3a3f 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f34c70 gate 1598907145112179400 evaluation fails +peer1.org1.example.com | [3a40 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3a41 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3a42 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3a43 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f351e0 gate 1598907145115053600 evaluation starts +peer1.org1.example.com | [3a44 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f351e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3a45 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f351e0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3a46 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f351e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3a47 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f351e0 principal evaluation fails +peer1.org1.example.com | [3a48 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f351e0 gate 1598907145115053600 evaluation fails +peer1.org1.example.com | [3a49 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3a4a 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3a4b 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3a4c 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f35750 gate 1598907145127333100 evaluation starts +peer1.org1.example.com | [3a4d 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f35750 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3a4e 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f35750 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3a4f 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f35750 principal matched by identity 0 +peer1.org1.example.com | [3a50 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 bb 37 cd a7 3d c7 15 e9 10 ed e0 8b 7c cb 8b |..7..=.......|..| +peer1.org1.example.com | 00000010 37 da ab 81 32 e6 31 10 6e 3a f2 65 5d 49 60 6a |7...2.1.n:.e]I`j| +peer1.org1.example.com | [3a51 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb d8 7a 44 f0 ba 1c 97 51 e4 6b |0E.!...zD....Q.k| +peer1.org1.example.com | 00000010 df af be f7 46 7e cd 10 71 ac cf 38 e6 99 9b 95 |....F~..q..8....| +peer1.org1.example.com | 00000020 8f 1a 12 16 6a 02 20 2c 40 29 1b 48 a5 78 d7 11 |....j. ,@).H.x..| +peer1.org1.example.com | 00000030 e1 ab a0 0f 96 3c b1 51 15 13 b7 a7 58 76 e5 73 |.....<.Q....Xv.s| +peer1.org1.example.com | 00000040 65 eb f1 d2 be ca 9d |e......| +peer1.org1.example.com | [3a52 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f35750 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3a53 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f35750 gate 1598907145127333100 evaluation succeeds +peer1.org1.example.com | [3a54 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a55 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3a56 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3f02 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003749b80 principal evaluation fails +peer1.org2.example.com | [3f03 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003749b80 gate 1598907142184723000 evaluation fails +peer1.org2.example.com | [3f04 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f05 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f06 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [3f07 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003764110 gate 1598907142185348000 evaluation starts +peer1.org2.example.com | [3f08 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003764110 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f09 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003764110 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3f0a 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | [3f0b 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [3f0c 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [3f0d 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003764110 principal matched by identity 0 +peer1.org2.example.com | [3f0e 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org2.example.com | [3f0f 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org2.example.com | [3f10 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003764110 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3f11 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003764110 gate 1598907142185348000 evaluation succeeds +peer1.org2.example.com | [3f12 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3f13 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [3f14 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3f15 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3f16 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f17 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f18 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f19 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer1.org2.example.com | [3f1a 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f1b 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f1c 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [3f1d 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f1e 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer1.org2.example.com | [3f1f 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f20 08-31 20:52:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f21 08-31 20:52:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f22 08-31 20:52:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 6 1 2 3 4] to 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [3f23 08-31 20:52:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f24 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f25 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f26 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [3f27 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f28 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [389d 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" > alive: +peer0.org1.example.com | [389e 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [389f 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38a0 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [38a1 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [38a2 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [38a3 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [38a4 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [38a5 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [38a6 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [38a7 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38a8 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [38a9 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38aa 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [38ab 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38ac 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [38ad 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [38ae 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [38af 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38b0 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [3cc7 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer0.org2.example.com | [3cc8 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org2.example.com | [3cc9 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org2.example.com | [3cca 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3ccb 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org2.example.com | [3ccc 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [3ccd 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [3cce 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [3ccf 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [3cd0 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [3cd1 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [3cd2 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [3cd3 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [3cd4 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3cd5 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +peer0.org2.example.com | [3cd6 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +peer0.org2.example.com | [3cd7 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +peer0.org2.example.com | [3cd8 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +peer0.org2.example.com | [3cd9 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [3cda 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [3cdb 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [3cdc 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [3cdd 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [3cde 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [3cdf 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [3ce0 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [3ce1 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +peer0.org2.example.com | [3ce2 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3ce3 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org2.example.com | [3ce4 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer0.org2.example.com | [3ce5 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a0db0 gate 1598907139423489700 evaluation starts +peer0.org2.example.com | [3ce6 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a0db0 signed by 0 principal evaluation starts (used [false false false]) +peer0.org2.example.com | [3ce7 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a0db0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3ce8 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a0db0 principal matched by identity 0 +peer0.org2.example.com | [3ce9 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 79 4d e9 a3 71 1d 24 0f fe ed 23 9d 11 9b 00 |tyM..q.$...#....| +peer0.org2.example.com | 00000010 3e 25 10 29 78 cb 07 bc 16 8a c0 53 e9 e3 ae 76 |>%.)x......S...v| +peer0.org2.example.com | [3cea 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 6e 97 55 ce e1 8f 4a 2e 44 e9 |0E.!..n.U...J.D.| +peer0.org2.example.com | 00000010 86 cc c7 d8 15 32 92 11 5c 0f ae 9c 24 1e e3 31 |.....2..\...$..1| +peer0.org2.example.com | 00000020 b0 8c 3d 39 f2 02 20 6c 7f 82 68 b5 f7 a9 fc 04 |..=9.. l..h.....| +peer0.org2.example.com | 00000030 9c c0 f7 ee 68 f9 99 1d 35 23 c7 b2 62 e6 51 30 |....h...5#..b.Q0| +peer0.org2.example.com | 00000040 4f f1 8e 15 f4 64 79 |O....dy| +peer0.org2.example.com | [3ceb 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a0db0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3cec 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a0db0 gate 1598907139423489700 evaluation succeeds +peer0.org2.example.com | [3ced 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [3cee 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [3cef 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer0.org2.example.com | [3cf0 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer0.org2.example.com | [3cf1 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a1320 gate 1598907139426404800 evaluation starts +peer0.org2.example.com | [3cf2 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a1320 signed by 0 principal evaluation starts (used [false false false]) +peer0.org2.example.com | [3cf3 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a1320 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3cf4 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a1320 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3cf5 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a1320 processing identity 1 with bytes of 115a4b0 +peer0.org2.example.com | [3cf7 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer0.org2.example.com | [3cf6 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cf8 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer0.org2.example.com | [3cf9 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [3cfa 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cfb 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cfc 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3cfd 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [3cfe 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer0.org2.example.com | [3cff 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d00 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [3d01 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3d02 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a1320 principal matched by identity 1 +peer0.org2.example.com | [3d03 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c 16 ac 57 86 d3 c3 21 1e c6 7b f6 f4 33 15 53 |...W...!..{..3.S| +peer0.org2.example.com | 00000010 51 0a 12 8c c9 dc af 08 54 64 1f 16 1c 10 79 1c |Q.......Td....y.| +peer0.org2.example.com | [3d04 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 5d cb e8 72 66 8f d2 c7 ff a3 |0E.!..]..rf.....| +peer0.org2.example.com | 00000010 aa d3 dc 46 c5 bd 34 a5 d8 7d dc a8 35 2c d6 29 |...F..4..}..5,.)| +peer0.org2.example.com | 00000020 07 b0 75 b1 d5 02 20 0a ef 18 c5 de bf be 2c 7c |..u... .......,|| +peer0.org2.example.com | 00000030 16 ea 9e 3a ba 4b 56 95 85 92 21 ee 94 17 ad 3b |...:.KV...!....;| +peer0.org2.example.com | 00000040 78 aa 13 9c c2 d4 33 |x.....3| +peer0.org2.example.com | [3d05 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a1320 principal evaluation succeeds for identity 1 +peer0.org2.example.com | [3d06 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003a1320 gate 1598907139426404800 evaluation succeeds +peer0.org2.example.com | [3d07 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [3d08 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [3d09 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +peer0.org2.example.com | [3d0a 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +peer0.org2.example.com | [3d0b 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +peer0.org2.example.com | [3d0c 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org2.example.com | [3d0d 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org2.example.com | [3d0e 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org2.example.com | [3d0f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d10 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d11 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d12 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d13 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d14 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d15 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d16 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d17 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d18 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d19 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d1a 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d1b 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d1c 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d1d 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d1e 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d1f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer1.org1.example.com | [3a57 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3a58 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a59 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3a5a 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3a5b 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3a5c 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3a5d 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f29 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f2a 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f2b 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f2c 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f2d 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f2e 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org2.example.com | [3f2f 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org2.example.com | [3f30 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f31 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f32 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3f33 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f34 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f35 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3f36 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3f37 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3f38 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003794540 gate 1598907142416986700 evaluation starts +peer1.org2.example.com | [3f39 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003794540 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f3a 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003794540 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3f3b 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003794540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3f3c 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003794540 principal evaluation fails +peer1.org2.example.com | [3f3d 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003794540 gate 1598907142416986700 evaluation fails +peer1.org2.example.com | [3f3e 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3f3f 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3f40 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3f41 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003794ab0 gate 1598907142418055700 evaluation starts +peer1.org2.example.com | [3f42 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003794ab0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f43 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003794ab0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3f45 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003794ab0 principal matched by identity 0 +peer1.org2.example.com | [3f46 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org2.example.com | [3f47 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org2.example.com | [3f48 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003794ab0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3f49 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003794ab0 gate 1598907142418055700 evaluation succeeds +peer1.org2.example.com | [3f4a 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f4b 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f4c 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3f4d 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3f44 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f4e 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f4f 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f50 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3f51 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f52 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f53 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3f54 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3f55 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3f56 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003795cb0 gate 1598907142420973200 evaluation starts +peer1.org2.example.com | [3f57 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003795cb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f58 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003795cb0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3f59 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003795cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3f5a 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003795cb0 principal evaluation fails +peer1.org2.example.com | [3f5b 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003795cb0 gate 1598907142420973200 evaluation fails +peer1.org2.example.com | [3f5c 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3f5d 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f5e 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3f5f 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3f60 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f61 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b0220 gate 1598907142421884500 evaluation starts +peer1.org2.example.com | [3f62 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b0220 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f63 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b0220 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3f64 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +peer1.org2.example.com | [3f65 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b0220 principal matched by identity 0 +peer1.org2.example.com | [3f66 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org2.example.com | [3f67 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f68 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org2.example.com | [3f69 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a5e 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a5f 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [3a60 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a61 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a62 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a63 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3a64 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a65 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [3a66 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org1.example.com | [3a67 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a68 08-31 20:52:25.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org1.example.com | [3a69 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [3a6a 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3a6b 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [3a6c 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3a6d 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3a6e 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a6f 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [3a70 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3a71 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3a72 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a73 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3a74 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a75 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3a76 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3a77 08-31 20:52:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a78 08-31 20:52:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3a79 08-31 20:52:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [38b1 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [38b2 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38b3 08-31 20:52:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [38b4 08-31 20:52:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [38b5 08-31 20:52:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [38b6 08-31 20:52:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38b7 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [38b8 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161031 +peer0.org1.example.com | [38b9 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1259DAF7DB4B11AE2EA3BF73620E99F3AAE82683F3CBAC1D7BFB5FAEAD42A8D9 +peer0.org1.example.com | [38ba 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [38bb 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [38bc 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [38bd 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [38be 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38bf 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [38c0 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38c1 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [38c2 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [38c3 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38c4 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [38c5 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38c6 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [38c7 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3d20 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org2.example.com | [3d21 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +peer0.org2.example.com | [3d22 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +peer0.org2.example.com | [3d23 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org2.example.com | [3d24 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org2.example.com | [3d25 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d26 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d27 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org2.example.com | [3d28 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org2.example.com | [3d29 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org2.example.com | [3d2a 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org2.example.com | [3d2b 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org2.example.com | [3d2c 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org2.example.com | [3d2d 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [3d2e 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org2.example.com | [3d2f 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org2.example.com | [3d30 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org2.example.com | [3d31 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org2.example.com | [3d32 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org2.example.com | [3d33 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org2.example.com | [3d34 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [3d35 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org2.example.com | [3d36 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org2.example.com | [3d37 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [3d38 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [3d39 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org2.example.com | [3d3a 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [3d3b 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [3d3c 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org2.example.com | [3d3d 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org2.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org2.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org2.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer1.org2.example.com | [3f6a 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f6b 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b0220 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3f6d 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b0220 gate 1598907142421884500 evaluation succeeds +peer1.org2.example.com | [3f6c 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f6e 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f6f 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f70 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3f71 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3f72 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org2.example.com | [3f73 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org2.example.com | [3f74 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f75 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [3f76 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f77 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f78 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f79 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3f7a 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f7b 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f7c 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f7d 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f7e 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3f7f 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer1.org2.example.com | [3f80 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3f81 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3f82 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3f83 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b1d60 gate 1598907142424017800 evaluation starts +peer1.org2.example.com | [3f84 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b1d60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f85 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b1d60 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3a7a 08-31 20:52:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a7b 08-31 20:52:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3a7c 08-31 20:52:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3a7d 08-31 20:52:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a7e 08-31 20:52:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3a7f 08-31 20:52:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161041 +peer1.org1.example.com | [3a80 08-31 20:52:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E87EB8FB7B92F9A85543C1694C47D2B21110126178D4EB0CC8D165AA086CFA51 +peer1.org1.example.com | [3a81 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3a82 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3a83 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3a84 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [3a85 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a86 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a87 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a88 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3a89 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a8b 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a8a 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a8c 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3a8d 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a8e 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a8f 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3a90 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3a91 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a92 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3a93 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161042 +peer1.org1.example.com | [3a94 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C99297FAAAD402288BD8618486F940EFFB5ECD5B1DB137DC33681E313075BD0B +peer1.org1.example.com | [3a95 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3a96 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3a97 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3a98 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a99 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3a9a 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3a9b 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3a9c 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3a9d 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3a9f 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3a9e 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3aa1 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3aa0 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [3aa2 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3aa3 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [3aa4 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3aa5 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [3aa6 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3aa7 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 92 97 fa aa d4 02 28 8b d8 61 84 86 f9 40 ef |.......(..a...@.| +peer1.org1.example.com | 00000010 fb 5e cd 5b 1d b1 37 dc 33 68 1e 31 30 75 bd 0b |.^.[..7.3h.10u..| +peer1.org1.example.com | [3aa8 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 34 0f 82 b6 c8 0f 1b 71 00 00 |0E.!..4......q..| +peer1.org1.example.com | 00000010 b4 79 07 e4 fd da 76 35 0d 8a 32 f0 9a 5a c6 f9 |.y....v5..2..Z..| +peer1.org1.example.com | 00000020 e3 4d 1b e5 84 02 20 21 79 59 ec 7f e4 89 df b6 |.M.... !yY......| +peer1.org1.example.com | 00000030 9c 4b 7e 22 d9 b1 ef d7 6a b6 7c 1a 7b ef a3 2d |.K~"....j.|.{..-| +peer1.org1.example.com | 00000040 07 5c bb e6 ba bb 91 |.\.....| +peer1.org1.example.com | [3aa9 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [3aaa 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 b1 7a e6 b4 a4 6a e8 fe ac f8 |0E.!...z...j....| +peer1.org1.example.com | 00000010 8b c3 a8 4c 38 56 b3 df b5 84 73 54 21 00 46 fd |...L8V....sT!.F.| +peer1.org1.example.com | 00000020 6f ef 16 a1 2b 02 20 57 6a 51 e6 a0 90 d0 a0 75 |o...+. WjQ.....u| +peer1.org1.example.com | 00000030 a6 a0 f7 30 0f 78 26 93 55 0f e9 e6 4c bf bc ec |...0.x&.U...L...| +peer1.org1.example.com | 00000040 b7 07 32 7c 5f 30 fa |..2|_0.| +peer1.org1.example.com | [3aab 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3aac 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3aad 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3aae 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3aaf 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ab0 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ab1 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ab2 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3ab3 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 9a f5 53 9e f9 83 db 2f 34 ad d5 1c 20 26 85 |...S..../4... &.| +peer1.org1.example.com | 00000010 58 ee 5c ab 5d 7e 9c e3 6f f9 49 1b 23 bc 85 2c |X.\.]~..o.I.#..,| +peer1.org1.example.com | [3ab4 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 8f b8 0c ad a4 ff 4d 70 69 23 a7 |0D. w......Mpi#.| +peer1.org1.example.com | 00000010 b4 26 e3 1b 93 c8 16 6b 88 53 10 5b 0d 2f 05 ba |.&.....k.S.[./..| +peer1.org1.example.com | 00000020 a0 7b b5 64 02 20 44 8c a3 73 eb ae ed 12 e7 ac |.{.d. D..s......| +peer1.org1.example.com | 00000030 94 05 8e 24 5e b6 4b 48 75 3b 40 52 cc 85 23 5c |...$^.KHu;@R..#\| +peer1.org1.example.com | 00000040 f8 d3 83 df 4e ae |....N.| +peer1.org1.example.com | [3ab5 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3ab6 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ab7 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ab8 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3ab9 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 92 97 fa aa d4 02 28 8b d8 61 84 86 f9 40 ef |.......(..a...@.| +peer1.org1.example.com | 00000010 fb 5e cd 5b 1d b1 37 dc 33 68 1e 31 30 75 bd 0b |.^.[..7.3h.10u..| +peer1.org1.example.com | [3aba 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 34 0f 82 b6 c8 0f 1b 71 00 00 |0E.!..4......q..| +peer1.org1.example.com | 00000010 b4 79 07 e4 fd da 76 35 0d 8a 32 f0 9a 5a c6 f9 |.y....v5..2..Z..| +peer1.org1.example.com | 00000020 e3 4d 1b e5 84 02 20 21 79 59 ec 7f e4 89 df b6 |.M.... !yY......| +peer1.org1.example.com | 00000030 9c 4b 7e 22 d9 b1 ef d7 6a b6 7c 1a 7b ef a3 2d |.K~"....j.|.{..-| +peer1.org1.example.com | 00000040 07 5c bb e6 ba bb 91 |.\.....| +peer1.org1.example.com | [3abb 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3abc 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3abd 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3abe 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3abf 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ac0 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3ac1 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ac2 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ac3 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3ac4 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3ac5 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3ac6 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbbfd0 gate 1598907145362413900 evaluation starts +peer1.org1.example.com | [3ac7 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbbfd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [38c8 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [38c9 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [38ca 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38cb 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [38cc 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [38cd 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 59 da f7 db 4b 11 ae 2e a3 bf 73 62 0e 99 f3 |.Y...K.....sb...| +peer0.org1.example.com | 00000010 aa e8 26 83 f3 cb ac 1d 7b fb 5f ae ad 42 a8 d9 |..&.....{._..B..| +peer0.org1.example.com | [38ce 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 0e af 30 1c bb 42 56 cf 80 59 |0E.!....0..BV..Y| +peer0.org1.example.com | 00000010 ba 36 fe f0 69 9d b6 6d 0f b8 cf a3 5d 8d 02 60 |.6..i..m....]..`| +peer0.org1.example.com | 00000020 a5 85 1e 5e 6e 02 20 77 58 41 bc a4 ad 85 b9 1b |...^n. wXA......| +peer0.org1.example.com | 00000030 f5 e5 4f 19 90 f9 b4 dc 6c 49 15 5f c2 44 0d 88 |..O.....lI._.D..| +peer0.org1.example.com | 00000040 62 e2 03 69 56 23 93 |b..iV#.| +peer0.org1.example.com | [38cf 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [38d0 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [38d1 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38d2 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [38d3 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 27 bc e0 21 ac 9f 49 12 2b cb f7 70 85 98 71 |W'..!..I.+..p..q| +peer0.org1.example.com | 00000010 12 35 bd 3c 32 7c cc 4a 6e f0 0a dc c2 0c e9 e6 |.5.<2|.Jn.......| +peer0.org1.example.com | [38d4 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 21 fc 14 f8 3c 39 da 81 0f b6 |0E.!..!...<9....| +peer0.org1.example.com | 00000010 17 d5 a3 68 c7 e5 c4 03 fc 86 a5 b4 ec f8 54 d2 |...h..........T.| +peer0.org1.example.com | 00000020 d2 86 34 73 52 02 20 77 42 50 c8 3e 6b ff f9 75 |..4sR. wBP.>k..u| +peer0.org1.example.com | 00000030 a4 4b 8d 4f a8 db 54 d3 dd d3 bf 5c 87 26 8d 67 |.K.O..T....\.&.g| +peer0.org1.example.com | 00000040 01 c0 b7 05 c0 2a a2 |.....*.| +peer0.org1.example.com | [38d5 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [38d6 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38d7 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [38d8 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [38d9 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [38da 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [38db 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [38dc 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [38dd 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [38de 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [38df 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7700 gate 1598907133602253900 evaluation starts +peer0.org1.example.com | [38e0 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7700 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [38e1 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7700 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [38e2 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7700 principal matched by identity 0 +peer0.org1.example.com | [38e3 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 64 7e f1 14 ff 7a d5 17 09 62 b0 ee a6 f3 26 |.d~...z...b....&| +peer0.org1.example.com | 00000010 76 71 60 f0 e6 6e 2f 81 71 8a e5 72 12 24 f0 f4 |vq`..n/.q..r.$..| +peer0.org1.example.com | [38e4 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [38e5 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ca e1 de ed fe 90 29 a7 dd a3 |0E.!........)...| +peer0.org1.example.com | 00000010 d8 d7 99 68 c9 ea 25 46 b4 e2 f5 4b d1 07 e4 cb |...h..%F...K....| +peer0.org1.example.com | 00000020 b1 5c 45 19 cc 02 20 1b de fc ab b1 41 37 4a 60 |.\E... .....A7J`| +peer0.org1.example.com | 00000030 8e 23 cc fb d9 74 16 25 d0 b0 1b e1 f6 68 7c f6 |.#...t.%.....h|.| +peer0.org1.example.com | 00000040 5f a9 cd 66 bc 1d 77 |_..f..w| +peer0.org1.example.com | [38e6 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7700 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [38e7 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7700 gate 1598907133602253900 evaluation succeeds +peer0.org1.example.com | [38e8 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [38e9 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [38ea 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [38eb 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [38ec 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [38ed 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38ee 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38ef 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [38f0 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38f1 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [38f2 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 59 da f7 db 4b 11 ae 2e a3 bf 73 62 0e 99 f3 |.Y...K.....sb...| +peer0.org1.example.com | 00000010 aa e8 26 83 f3 cb ac 1d 7b fb 5f ae ad 42 a8 d9 |..&.....{._..B..| +peer0.org1.example.com | [38f3 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 0e af 30 1c bb 42 56 cf 80 59 |0E.!....0..BV..Y| +peer0.org1.example.com | 00000010 ba 36 fe f0 69 9d b6 6d 0f b8 cf a3 5d 8d 02 60 |.6..i..m....]..`| +peer0.org1.example.com | 00000020 a5 85 1e 5e 6e 02 20 77 58 41 bc a4 ad 85 b9 1b |...^n. wXA......| +peer0.org1.example.com | 00000030 f5 e5 4f 19 90 f9 b4 dc 6c 49 15 5f c2 44 0d 88 |..O.....lI._.D..| +peer0.org1.example.com | 00000040 62 e2 03 69 56 23 93 |b..iV#.| +peer0.org1.example.com | [38f4 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [38f5 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab b5 ac f4 98 50 d7 bb 0d 69 e4 |0E.!......P...i.| +peer0.org1.example.com | 00000010 76 6a a8 11 45 32 bb b7 ea 81 33 9b 8a 07 69 e8 |vj..E2....3...i.| +peer0.org1.example.com | 00000020 1c 65 85 16 6d 02 20 40 f5 aa e3 e1 ed fa ce da |.e..m. @........| +peer0.org1.example.com | 00000030 c6 cf e0 83 4d af 21 8b d5 80 31 8c 88 7a b3 88 |....M.!...1..z..| +peer0.org1.example.com | 00000040 32 a0 e1 66 32 bd 8f |2..f2..| +peer0.org1.example.com | [38f6 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [38f7 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [38f8 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38f9 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38fa 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [38fb 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [38fc 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [38fd 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [38fe 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [38ff 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 59 da f7 db 4b 11 ae 2e a3 bf 73 62 0e 99 f3 |.Y...K.....sb...| +peer0.org1.example.com | 00000010 aa e8 26 83 f3 cb ac 1d 7b fb 5f ae ad 42 a8 d9 |..&.....{._..B..| +peer0.org1.example.com | [3900 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 0e af 30 1c bb 42 56 cf 80 59 |0E.!....0..BV..Y| +peer0.org1.example.com | 00000010 ba 36 fe f0 69 9d b6 6d 0f b8 cf a3 5d 8d 02 60 |.6..i..m....]..`| +peer0.org1.example.com | 00000020 a5 85 1e 5e 6e 02 20 77 58 41 bc a4 ad 85 b9 1b |...^n. wXA......| +peer0.org1.example.com | 00000030 f5 e5 4f 19 90 f9 b4 dc 6c 49 15 5f c2 44 0d 88 |..O.....lI._.D..| +peer0.org1.example.com | 00000040 62 e2 03 69 56 23 93 |b..iV#.| +peer0.org1.example.com | [3901 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3902 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3903 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3904 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3905 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 27 bc e0 21 ac 9f 49 12 2b cb f7 70 85 98 71 |W'..!..I.+..p..q| +peer0.org1.example.com | 00000010 12 35 bd 3c 32 7c cc 4a 6e f0 0a dc c2 0c e9 e6 |.5.<2|.Jn.......| +peer0.org1.example.com | [3906 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 21 fc 14 f8 3c 39 da 81 0f b6 |0E.!..!...<9....| +peer0.org1.example.com | 00000010 17 d5 a3 68 c7 e5 c4 03 fc 86 a5 b4 ec f8 54 d2 |...h..........T.| +peer0.org1.example.com | 00000020 d2 86 34 73 52 02 20 77 42 50 c8 3e 6b ff f9 75 |..4sR. wBP.>k..u| +peer0.org1.example.com | 00000030 a4 4b 8d 4f a8 db 54 d3 dd d3 bf 5c 87 26 8d 67 |.K.O..T....\.&.g| +peer0.org1.example.com | 00000040 01 c0 b7 05 c0 2a a2 |.....*.| +peer0.org1.example.com | [3907 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3908 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3909 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [390a 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [390b 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [390c 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [390d 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [390e 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [390f 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3910 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3911 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046072d0 gate 1598907133622057800 evaluation starts +peer0.org1.example.com | [3912 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046072d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3913 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046072d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3914 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046072d0 principal matched by identity 0 +peer0.org1.example.com | [3915 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 5c a2 78 e0 1f 04 7e 3b 4f 8e b8 2b c1 1e af |Q\.x...~;O..+...| +peer0.org1.example.com | 00000010 06 66 70 37 7b a7 be 74 db 4c 83 18 71 e0 de 96 |.fp7{..t.L..q...| +peer0.org1.example.com | [3916 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 59 0f 8f d3 2c 9f a8 ea 33 65 98 |0D. dY...,...3e.| +peer0.org1.example.com | 00000010 5d d4 d4 a8 74 a7 52 d2 5f 2c 06 5d 35 0a d0 59 |]...t.R._,.]5..Y| +peer0.org1.example.com | 00000020 6e 38 f0 42 02 20 7d f5 47 0a 5e ed 53 b1 f6 05 |n8.B. }.G.^.S...| +peer0.org1.example.com | 00000030 af e0 d7 06 d5 32 67 41 93 83 c4 06 e7 9d 18 31 |.....2gA.......1| +peer0.org1.example.com | 00000040 0e fe 14 61 d9 19 |...a..| +peer0.org1.example.com | [3917 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046072d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org2.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org2.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org2.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org2.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org2.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org2.example.com | nw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3d3e 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org2.example.com | [3d3f 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org2.example.com | [3d40 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org2.example.com | [3d41 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [3d42 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [3d43 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [3d44 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [3d45 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +peer0.org2.example.com | [3d46 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +peer0.org2.example.com | [3d47 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [3d48 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [3d49 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +peer0.org2.example.com | [3d4a 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +peer0.org2.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +peer0.org2.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +peer0.org2.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3d4b 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [3d4c 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [3d4d 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [3d4e 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [3d4f 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org2.example.com | [3d50 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org2.example.com | [3d51 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [3d52 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [3d53 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org2.example.com | [3d54 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org2.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org2.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org2.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org2.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3d55 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org2.example.com | [3d56 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org2.example.com | [3d57 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org2.example.com | [3d58 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [3d59 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer0.org2.example.com | [3d5a 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org2.example.com | [3d5b 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org2.example.com | [3d5c 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org2.example.com | [3d5d 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org2.example.com | [3d5e 08-31 20:52:19.45 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org2.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org2.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org2.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org2.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org2.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org2.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org2.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3d5f 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +peer0.org2.example.com | [3d60 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +peer0.org2.example.com | [3d61 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [3d62 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [3d63 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org2.example.com | [3d64 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org2.example.com | [3d65 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org2.example.com | [3d66 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org2.example.com | [3d67 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org2.example.com | [3d68 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +peer0.org2.example.com | [3d69 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +peer0.org2.example.com | [3d6a 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +peer0.org2.example.com | [3d6b 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +peer0.org2.example.com | [3d6c 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org2.example.com | [3d6d 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org2.example.com | [3d6e 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org2.example.com | [3d6f 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org2.example.com | [3d70 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org2.example.com | [3d71 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org2.example.com | [3d72 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org2.example.com | [3d73 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [3d74 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [3d75 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org2.example.com | [3d76 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org2.example.com | [3d77 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org2.example.com | [3d78 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org2.example.com | [3d79 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org2.example.com | [3d7a 08-31 20:52:19.46 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [3d7b 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org2.example.com | [3d7c 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org2.example.com | [3d7d 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org2.example.com | [3d7e 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org2.example.com | [3d7f 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org2.example.com | [3d80 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org2.example.com | [3d81 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org2.example.com | [3d82 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org2.example.com | [3d83 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org2.example.com | [3d84 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org2.example.com | [3d85 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org2.example.com | [3d86 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer1.org1.example.com | [3ac8 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbbfd0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3ac9 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbbfd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3aca 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbbfd0 principal evaluation fails +peer1.org1.example.com | [3acb 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbbfd0 gate 1598907145362413900 evaluation fails +peer1.org1.example.com | [3acc 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3acd 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3ace 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3acf 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffe540 gate 1598907145363756600 evaluation starts +peer1.org1.example.com | [3ad0 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffe540 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ad1 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffe540 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3918 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046072d0 gate 1598907133622057800 evaluation succeeds +peer0.org1.example.com | [3919 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [391a 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [391b 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [391c 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [391d 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [391e 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [391f 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3920 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3921 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3922 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [3923 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3924 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3925 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3926 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3927 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3928 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3929 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [392a 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [392b 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [392c 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [392d 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [392e 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [392f 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3930 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3931 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3932 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3933 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3934 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004623050 gate 1598907133681700800 evaluation starts +peer0.org1.example.com | [3935 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004623050 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3936 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004623050 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3937 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004623050 principal matched by identity 0 +peer0.org1.example.com | [3938 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org1.example.com | [3939 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org1.example.com | [393a 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004623050 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [393b 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004623050 gate 1598907133681700800 evaluation succeeds +peer0.org1.example.com | [393c 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [393d 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [393e 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [393f 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3940 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org1.example.com | [3941 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org1.example.com | [3942 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org1.example.com | [3943 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org1.example.com | [3944 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3945 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3946 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3947 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3948 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3949 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [394a 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [394b 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [394c 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004643030 gate 1598907133683180100 evaluation starts +peer0.org1.example.com | [394d 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004643030 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [394e 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004643030 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [394f 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004643030 principal matched by identity 0 +peer0.org1.example.com | [3950 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org1.example.com | [3951 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3952 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org1.example.com | [3953 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004643030 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3954 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004643030 gate 1598907133683180100 evaluation succeeds +peer0.org1.example.com | [3955 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3956 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3957 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3d87 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org2.example.com | [3d88 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org2.example.com | [3d89 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org2.example.com | [3d8a 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org2.example.com | [3d8b 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org2.example.com | [3d8c 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org2.example.com | [3d8d 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org2.example.com | [3d8e 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org2.example.com | [3d8f 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer0.org2.example.com | [3d90 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer0.org2.example.com | [3d91 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org2.example.com | [3d92 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3d93 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org2.example.com | [3d94 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org2.example.com | [3d95 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org2.example.com | [3d96 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org2.example.com | [3d97 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org2.example.com | [3d98 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3d99 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org2.example.com | [3d9a 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org2.example.com | [3d9b 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org2.example.com | [3d9c 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org2.example.com | [3d9d 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org2.example.com | [3d9e 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org2.example.com | [3d9f 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org2.example.com | [3da0 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3da1 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org2.example.com | [3da2 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org2.example.com | [3da3 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org2.example.com | [3da4 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org2.example.com | [3da5 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org2.example.com | [3da6 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org2.example.com | [3da7 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org2.example.com | [3da8 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org2.example.com | [3da9 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org2.example.com | [3daa 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org2.example.com | [3dab 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org2.example.com | [3dac 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org2.example.com | [3dad 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org2.example.com | [3dae 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org2.example.com | [3daf 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org2.example.com | [3db0 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org2.example.com | [3db1 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org2.example.com | [3db2 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org2.example.com | [3db3 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [3db4 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [3db5 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org2.example.com | [3db6 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org2.example.com | [3db7 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org2.example.com | [3db8 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +peer0.org2.example.com | [3db9 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org2.example.com | [3dba 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org2.example.com | [3dbb 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org2.example.com | [3dbc 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org2.example.com | [3dbd 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org2.example.com | [3dbe 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org2.example.com | [3dbf 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org2.example.com | [3dc0 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org1.example.com | [3958 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3959 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [395a 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [395b 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org1.example.com | [395c 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org1.example.com | [395d 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org1.example.com | [395e 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org1.example.com | [395f 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3960 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3961 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3962 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3963 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3964 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3965 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3966 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3967 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046631b0 gate 1598907133685141500 evaluation starts +peer0.org1.example.com | [3968 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046631b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3969 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046631b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [396a 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046631b0 principal matched by identity 0 +peer0.org1.example.com | [396b 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org1.example.com | [396c 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org1.example.com | [396d 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046631b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [396e 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046631b0 gate 1598907133685141500 evaluation succeeds +peer0.org1.example.com | [396f 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3970 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3971 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3972 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3973 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3974 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ad2 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffe540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3ad3 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffe540 principal evaluation fails +peer1.org1.example.com | [3ad4 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffe540 gate 1598907145363756600 evaluation fails +peer1.org1.example.com | [3ad5 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3ad6 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3ad7 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3ad8 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffeab0 gate 1598907145365083300 evaluation starts +peer1.org1.example.com | [3ad9 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffeab0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ada 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffeab0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3adb 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffeab0 principal matched by identity 0 +peer1.org1.example.com | [3adc 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 bb 37 cd a7 3d c7 15 e9 10 ed e0 8b 7c cb 8b |..7..=.......|..| +peer1.org1.example.com | 00000010 37 da ab 81 32 e6 31 10 6e 3a f2 65 5d 49 60 6a |7...2.1.n:.e]I`j| +peer1.org1.example.com | [3add 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb d8 7a 44 f0 ba 1c 97 51 e4 6b |0E.!...zD....Q.k| +peer1.org1.example.com | 00000010 df af be f7 46 7e cd 10 71 ac cf 38 e6 99 9b 95 |....F~..q..8....| +peer1.org1.example.com | 00000020 8f 1a 12 16 6a 02 20 2c 40 29 1b 48 a5 78 d7 11 |....j. ,@).H.x..| +peer1.org1.example.com | 00000030 e1 ab a0 0f 96 3c b1 51 15 13 b7 a7 58 76 e5 73 |.....<.Q....Xv.s| +peer1.org1.example.com | 00000040 65 eb f1 d2 be ca 9d |e......| +peer1.org1.example.com | [3ade 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffeab0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3adf 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffeab0 gate 1598907145365083300 evaluation succeeds +peer1.org1.example.com | [3ae0 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ae1 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ae2 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3ae3 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3ae4 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ae5 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ae6 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ae7 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ae9 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3aea 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3aeb 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3aec 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3aed 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3aee 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3ae8 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3aef 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3af0 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3af1 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffff80 gate 1598907145369172700 evaluation starts +peer1.org1.example.com | [3af2 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffff80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3af3 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffff80 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3af4 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffff80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3af5 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffff80 principal evaluation fails +peer1.org1.example.com | [3af6 08-31 20:52:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ffff80 gate 1598907145369172700 evaluation fails +peer1.org1.example.com | [3af7 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3af8 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3af9 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3afa 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040224f0 gate 1598907145370710000 evaluation starts +peer1.org1.example.com | [3afb 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040224f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3afc 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040224f0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3afd 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040224f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3afe 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040224f0 principal evaluation fails +peer1.org1.example.com | [3aff 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040224f0 gate 1598907145370710000 evaluation fails +peer1.org1.example.com | [3b00 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3b01 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3b02 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3b03 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004022a60 gate 1598907145371815700 evaluation starts +peer1.org1.example.com | [3b04 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004022a60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b05 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004022a60 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3b06 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004022a60 principal matched by identity 0 +peer1.org1.example.com | [3b07 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 7e 2f 8e 4a e0 ef 3f 41 cc 65 57 67 1b 37 83 |.~/.J..?A.eWg.7.| +peer1.org1.example.com | 00000010 0e 55 35 d1 da 3f 2e b6 34 1a b3 ea fa b3 11 09 |.U5..?..4.......| +peer1.org1.example.com | [3b08 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c ff 97 c8 ab 01 42 c7 54 7e 27 c1 |0D. \.....B.T~'.| +peer1.org1.example.com | 00000010 99 22 31 c0 8a 82 a1 07 49 83 6c 18 c4 e5 cb 4c |."1.....I.l....L| +peer1.org1.example.com | 00000020 cb ca a3 a4 02 20 6c c0 df 95 33 89 f1 40 60 5d |..... l...3..@`]| +peer1.org1.example.com | 00000030 49 a2 9d 59 e8 dd f0 be 82 bc 9e 58 04 65 01 0d |I..Y.......X.e..| +peer1.org1.example.com | 00000040 62 25 ea 10 1b 58 |b%...X| +peer1.org1.example.com | [3b09 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004022a60 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3b0a 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004022a60 gate 1598907145371815700 evaluation succeeds +peer1.org1.example.com | [3b0b 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b0c 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b0d 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3b0e 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3b0f 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3b10 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b11 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3b12 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 9a f5 53 9e f9 83 db 2f 34 ad d5 1c 20 26 85 |...S..../4... &.| +peer1.org1.example.com | 00000010 58 ee 5c ab 5d 7e 9c e3 6f f9 49 1b 23 bc 85 2c |X.\.]~..o.I.#..,| +peer1.org1.example.com | [3b13 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 8f b8 0c ad a4 ff 4d 70 69 23 a7 |0D. w......Mpi#.| +peer1.org1.example.com | 00000010 b4 26 e3 1b 93 c8 16 6b 88 53 10 5b 0d 2f 05 ba |.&.....k.S.[./..| +peer1.org1.example.com | 00000020 a0 7b b5 64 02 20 44 8c a3 73 eb ae ed 12 e7 ac |.{.d. D..s......| +peer1.org1.example.com | 00000030 94 05 8e 24 5e b6 4b 48 75 3b 40 52 cc 85 23 5c |...$^.KHu;@R..#\| +peer1.org2.example.com | [3f86 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b1d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3f87 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b1d60 principal evaluation fails +peer1.org2.example.com | [3f88 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037b1d60 gate 1598907142424017800 evaluation fails +peer1.org2.example.com | [3f89 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3f8a 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3f8b 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3f8c 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037de2d0 gate 1598907142438262300 evaluation starts +peer1.org2.example.com | [3f8d 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037de2d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3f8e 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037de2d0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3f8f 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037de2d0 principal matched by identity 0 +peer1.org2.example.com | [3f90 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org2.example.com | [3f91 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org2.example.com | [3f92 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037de2d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3f93 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037de2d0 gate 1598907142438262300 evaluation succeeds +peer1.org2.example.com | [3f94 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f95 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3f96 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3f97 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3f98 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org2.example.com | [3f99 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org2.example.com | [3f9a 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f9b 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3f9c 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3f9d 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f9e 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3f9f 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3fa0 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3fa1 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3fa2 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037dfbc0 gate 1598907142446606500 evaluation starts +peer1.org2.example.com | [3fa3 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037dfbc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3fa4 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037dfbc0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3fa5 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037dfbc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3fa6 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037dfbc0 principal evaluation fails +peer1.org2.example.com | [3fa7 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037dfbc0 gate 1598907142446606500 evaluation fails +peer0.org2.example.com | [3dc1 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:52:21.476Z grpc.peer_address=172.18.0.7:51460 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=110.5µs +peer0.org2.example.com | [3dc2 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3dc3 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [3dc4 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [3dc5 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [3dc8 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3dc9 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3975 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3976 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3977 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3978 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3979 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [397a 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [397b 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046823b0 gate 1598907133685956900 evaluation starts +peer0.org1.example.com | [397c 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046823b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [397d 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046823b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [397e 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046823b0 principal matched by identity 0 +peer0.org1.example.com | [397f 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org1.example.com | [3980 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org1.example.com | [3981 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046823b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3982 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046823b0 gate 1598907133685956900 evaluation succeeds +peer0.org1.example.com | [3983 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3984 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3985 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3986 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3987 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3988 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3989 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [398a 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [398b 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | 00000040 f8 d3 83 df 4e ae |....N.| +peer1.org1.example.com | [3b14 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3b15 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b16 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3b17 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 92 97 fa aa d4 02 28 8b d8 61 84 86 f9 40 ef |.......(..a...@.| +peer1.org1.example.com | 00000010 fb 5e cd 5b 1d b1 37 dc 33 68 1e 31 30 75 bd 0b |.^.[..7.3h.10u..| +peer1.org1.example.com | [3b18 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 34 0f 82 b6 c8 0f 1b 71 00 00 |0E.!..4......q..| +peer1.org1.example.com | 00000010 b4 79 07 e4 fd da 76 35 0d 8a 32 f0 9a 5a c6 f9 |.y....v5..2..Z..| +peer1.org1.example.com | 00000020 e3 4d 1b e5 84 02 20 21 79 59 ec 7f e4 89 df b6 |.M.... !yY......| +peer1.org1.example.com | 00000030 9c 4b 7e 22 d9 b1 ef d7 6a b6 7c 1a 7b ef a3 2d |.K~"....j.|.{..-| +peer1.org1.example.com | 00000040 07 5c bb e6 ba bb 91 |.\.....| +peer1.org1.example.com | [3b19 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3b1a 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [3fa8 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3fa9 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3faa 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3fab 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003816130 gate 1598907142447588200 evaluation starts +peer1.org2.example.com | [3fac 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003816130 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3fad 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003816130 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3fae 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003816130 principal matched by identity 0 +peer1.org2.example.com | [3faf 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org2.example.com | [3fb0 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org2.example.com | [3fb1 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003816130 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3fb2 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003816130 gate 1598907142447588200 evaluation succeeds +peer1.org2.example.com | [3fb3 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3fb4 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3fb5 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3fb6 08-31 20:52:22.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3fb7 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org2.example.com | [3fb8 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org2.example.com | [3fb9 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3fba 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [3fbb 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fbc 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fbd 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fbe 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3fbf 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3fc0 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3fc1 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3fc2 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3fc3 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3fc4 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003817c70 gate 1598907142453127400 evaluation starts +peer1.org2.example.com | [3fc5 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003817c70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3fc6 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003817c70 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3fc7 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003817c70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3fc8 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003817c70 principal evaluation fails +peer1.org2.example.com | [3fc9 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003817c70 gate 1598907142453127400 evaluation fails +peer1.org2.example.com | [3fca 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3fcb 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3fcc 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3fcd 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038441e0 gate 1598907142454108900 evaluation starts +peer1.org2.example.com | [3fce 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038441e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3fcf 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038441e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3fd0 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038441e0 principal matched by identity 0 +peer1.org2.example.com | [3fd1 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org2.example.com | [3fd2 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org2.example.com | [3fd3 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038441e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3fd4 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038441e0 gate 1598907142454108900 evaluation succeeds +peer1.org2.example.com | [3fd5 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3fd6 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3fd7 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3fd8 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3fd9 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fda 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fdb 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [3fdc 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3fdd 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [3fde 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [3fdf 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [3fe0 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [3fe1 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038453e0 gate 1598907142458946000 evaluation starts +peer1.org2.example.com | [3fe2 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038453e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3fe3 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038453e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [3fe4 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038453e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [3fe5 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038453e0 principal evaluation fails +peer1.org2.example.com | [3fe6 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038453e0 gate 1598907142458946000 evaluation fails +peer1.org2.example.com | [3fe7 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3fe8 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [3fe9 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [3fea 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003845950 gate 1598907142459716800 evaluation starts +peer1.org2.example.com | [3feb 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003845950 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [3fec 08-31 20:52:22.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003845950 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3dca 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3dcb 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dcc 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3dcd 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3dce 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3dcf 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3dd0 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3dd1 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3dd2 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339ce90 gate 1598907139480129800 evaluation starts +peer0.org2.example.com | [3dd3 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339ce90 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3dd4 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org2.example.com | [3dd6 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org2.example.com | [3dd7 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org2.example.com | [3dd8 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org2.example.com | [3dd9 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org2.example.com | [3dda 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org2.example.com | [3ddb 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org2.example.com | [3ddc 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org2.example.com | [3ddd 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +peer0.org2.example.com | [3dde 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org2.example.com | [3ddf 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer0.org2.example.com | [3de0 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org2.example.com | [3de1 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3de2 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3de3 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3de4 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3de5 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3de6 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3de7 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b01a0 gate 1598907139487110100 evaluation starts +peer0.org2.example.com | [3de8 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b01a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3de9 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b01a0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3dea 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b01a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3deb 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b01a0 principal evaluation fails +peer0.org2.example.com | [3dec 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b01a0 gate 1598907139487110100 evaluation fails +peer0.org2.example.com | [3ded 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3dee 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3def 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3df0 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b0710 gate 1598907139487735600 evaluation starts +peer0.org2.example.com | [3df1 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b0710 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3df2 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b0710 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3df3 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b0710 principal matched by identity 0 +peer0.org2.example.com | [3df4 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org2.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org2.example.com | [3df5 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org2.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org2.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org2.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org2.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org2.example.com | [3df6 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b0710 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3df7 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b0710 gate 1598907139487735600 evaluation succeeds +peer0.org2.example.com | [3df8 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3df9 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3dfa 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3dfb 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3dfc 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3dfd 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3dfe 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3dff 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3e00 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3e01 08-31 20:52:19.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3dd5 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3e02 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:51286 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: nonce:4083847945516476258 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e03 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e04 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:4083847945516476258 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e05 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [3e06 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [398c 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [398d 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [398e 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [398f 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3990 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3991 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3992 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004683800 gate 1598907133692490100 evaluation starts +peer0.org1.example.com | [3993 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004683800 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3994 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004683800 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3995 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004683800 principal matched by identity 0 +peer0.org1.example.com | [3996 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org1.example.com | [3997 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org1.example.com | [3998 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004683800 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3999 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004683800 gate 1598907133692490100 evaluation succeeds +peer0.org1.example.com | [399a 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [399b 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [399c 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [399d 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [399e 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org1.example.com | [399f 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org1.example.com | [39a0 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org1.example.com | [39a1 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org1.example.com | [39a2 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39a3 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39a4 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [39a5 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [39a6 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e07 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3e08 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e09 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e0a 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3e0b 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3e0c 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3e0d 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b1f10 gate 1598907139503792100 evaluation starts +peer0.org2.example.com | [3e0e 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b1f10 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3e0f 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b1f10 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3e10 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b1f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3e11 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b1f10 principal evaluation fails +peer0.org2.example.com | [3e12 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b1f10 gate 1598907139503792100 evaluation fails +peer0.org2.example.com | [3e13 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3e14 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3e15 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3e16 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cc480 gate 1598907139504035900 evaluation starts +peer0.org2.example.com | [3e17 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cc480 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3e18 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cc480 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3e19 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cc480 principal matched by identity 0 +peer0.org2.example.com | [3e1a 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 a9 5f e7 59 fe fd 5d 7d 15 d5 81 03 cb 54 f9 |.._.Y..]}.....T.| +peer0.org2.example.com | 00000010 45 f7 7f 6b 8b 61 3e 6a 06 7a 1f ce b4 cc 52 b6 |E..k.a>j.z....R.| +peer0.org2.example.com | [3e1b 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 23 c7 1c 19 ec 8e 68 fc 5c f3 ed |0D. <#.....h.\..| +peer0.org2.example.com | 00000010 e5 1b 3d e5 03 56 05 68 af a6 18 0c cb 08 15 fb |..=..V.h........| +peer0.org2.example.com | 00000020 d6 c4 7c e3 02 20 6a 25 7a 85 7e 1f 7a bc c5 0f |..|.. j%z.~.z...| +peer0.org2.example.com | 00000030 9c 00 1a 7a 7f 16 92 d4 89 20 8a a2 60 2e 51 2e |...z..... ..`.Q.| +peer0.org2.example.com | 00000040 bf 57 b9 87 f7 4d |.W...M| +peer0.org2.example.com | [3e1c 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cc480 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3e1d 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cc480 gate 1598907139504035900 evaluation succeeds +peer0.org2.example.com | [3e1e 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e1f 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e20 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3e21 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3e22 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3e23 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3e24 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3e25 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3e26 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3e27 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e28 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e29 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e2a 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [3e2b 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e2c 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e2d 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e2e 08-31 20:52:19.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 4083847945516476258, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [39a7 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [39a8 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [39a9 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [39aa 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469f7e0 gate 1598907133693856500 evaluation starts +peer0.org1.example.com | [39ab 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469f7e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [39ac 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469f7e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [39ad 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469f7e0 principal matched by identity 0 +peer0.org1.example.com | [39ae 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org1.example.com | [39af 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org1.example.com | [39b0 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469f7e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [39b1 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469f7e0 gate 1598907133693856500 evaluation succeeds +peer0.org1.example.com | [39b2 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [39b3 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [39b4 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [39b5 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [39b6 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39b7 08-31 20:52:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [39b8 08-31 20:52:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [39b9 08-31 20:52:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [39ba 08-31 20:52:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610101801 +peer0.org1.example.com | [39bb 08-31 20:52:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 20AF7D61E0F901E526F3E4D8280CC72657EAEAEDA0D454DE0C892B1FD4ADB0E8 +peer0.org1.example.com | [39bc 08-31 20:52:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [39bd 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39be 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39bf 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39c0 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39c1 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [39c2 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39c3 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39c4 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [39c5 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39c6 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39c7 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39c8 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [39c9 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39ca 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39cb 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [39cc 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [39cd 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39ce 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org1.example.com | [39cf 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org1.example.com | [39d0 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39d1 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [39d2 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39d3 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39d4 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39d5 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b1b 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b1c 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b1d 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b1e 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b1f 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b20 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b21 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b22 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b23 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b24 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b25 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [3b26 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b27 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3b28 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b29 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3b2a 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3b2b 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b2c 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3b2d 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3b2e 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3b2f 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3b30 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3b31 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3b32 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054730 gate 1598907145449679100 evaluation starts +peer1.org1.example.com | [3b33 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054730 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b34 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054730 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3b35 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3b36 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054730 principal evaluation fails +peer1.org1.example.com | [3b37 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054730 gate 1598907145449679100 evaluation fails +peer1.org1.example.com | [3b38 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3b39 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3b3a 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3b3b 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054ca0 gate 1598907145453792500 evaluation starts +peer1.org1.example.com | [3b3c 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054ca0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b3d 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054ca0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3b3e 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3b3f 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054ca0 principal evaluation fails +peer1.org1.example.com | [3b40 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054ca0 gate 1598907145453792500 evaluation fails +peer1.org1.example.com | [3b41 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3b42 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3b43 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3b44 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004055210 gate 1598907145459339800 evaluation starts +peer1.org1.example.com | [3b45 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004055210 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b46 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004055210 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3b47 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004055210 principal matched by identity 0 +peer1.org1.example.com | [3b48 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3b49 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 46 eb 2e 41 1c e8 c9 f9 6c 23 22 92 30 0a ca |.F..A....l#".0..| +peer1.org1.example.com | 00000010 42 2a e9 22 dc 20 28 4b 8f af 99 96 bb b5 2d f2 |B*.". (K......-.| +peer1.org1.example.com | [3b4a 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db c1 ce d6 c6 69 dc f3 b2 2b 04 |0E.!......i...+.| +peer1.org1.example.com | 00000010 da 06 7f c6 bf d7 a5 be 66 4b ac 61 04 e2 97 7c |........fK.a...|| +peer1.org1.example.com | 00000020 79 85 42 1e 83 02 20 0d b0 13 a3 da 93 f6 98 16 |y.B... .........| +peer1.org1.example.com | 00000030 b2 d6 a6 c9 5c bd ca d3 51 d3 c7 61 0f dd 14 d0 |....\...Q..a....| +peer1.org1.example.com | 00000040 0b 30 0a fb ce ce 88 |.0.....| +peer1.org1.example.com | [3b4b 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004055210 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3b4c 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004055210 gate 1598907145459339800 evaluation succeeds +peer1.org1.example.com | [3b4d 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b4e 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b4f 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3b50 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3b51 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3b52 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3b53 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3b54 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3b55 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [3b56 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b57 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b58 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b59 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3b5a 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b5b 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b5c 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3b5d 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b5e 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3b5f 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b60 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b61 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b62 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b63 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b64 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b65 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b66 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3b67 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b68 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fed 08-31 20:52:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003845950 principal matched by identity 0 +peer1.org2.example.com | [3fee 08-31 20:52:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org2.example.com | [3fef 08-31 20:52:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org2.example.com | [3ff0 08-31 20:52:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003845950 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [3ff1 08-31 20:52:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003845950 gate 1598907142459716800 evaluation succeeds +peer1.org2.example.com | [3ff2 08-31 20:52:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ff3 08-31 20:52:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [3ff4 08-31 20:52:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [3ff5 08-31 20:52:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [3ff6 08-31 20:52:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org2.example.com | [3ff7 08-31 20:52:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org2.example.com | [3ff8 08-31 20:52:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org2.example.com | [3ff9 08-31 20:52:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org2.example.com | [3ffa 08-31 20:52:22.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [3ffb 08-31 20:52:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ffc 08-31 20:52:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3ffd 08-31 20:52:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [3ffe 08-31 20:52:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [3fff 08-31 20:52:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4000 08-31 20:52:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4001 08-31 20:52:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [4002 08-31 20:52:22.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4003 08-31 20:52:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [4004 08-31 20:52:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [4005 08-31 20:52:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4006 08-31 20:52:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [4007 08-31 20:52:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [4008 08-31 20:52:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4009 08-31 20:52:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D981610121801 +peer1.org2.example.com | [400a 08-31 20:52:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 287BD3C147A66BF87FD239C60A77E1CFB9A20447D383E0037B32456C1D57B3B4 +peer1.org2.example.com | [400b 08-31 20:52:24.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [400c 08-31 20:52:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [400d 08-31 20:52:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [400e 08-31 20:52:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [400f 08-31 20:52:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4010 08-31 20:52:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4011 08-31 20:52:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4012 08-31 20:52:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4013 08-31 20:52:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org2.example.com | [4014 08-31 20:52:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4015 08-31 20:52:24.91 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer1.org2.example.com | [4016 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org2.example.com | [3e2f 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [3e30 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 4083847945516476258, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org2.example.com | [3e31 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e32 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cd700 gate 1598907139510161200 evaluation starts +peer0.org2.example.com | [3e33 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cd700 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3e34 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cd700 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3e35 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cd700 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3e36 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cd700 principal evaluation fails +peer0.org2.example.com | [3e37 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cd700 gate 1598907139510161200 evaluation fails +peer0.org2.example.com | [3e38 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3e39 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339ce90 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3e3a 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339ce90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org2.example.com | [3e3b 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339ce90 principal evaluation fails +peer0.org2.example.com | [3e3c 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339ce90 gate 1598907139480129800 evaluation fails +peer0.org2.example.com | [3e3d 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3e3e 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3e3f 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3e40 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339d400 gate 1598907139510870400 evaluation starts +peer0.org2.example.com | [3e41 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339d400 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3e42 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339d400 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3e43 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339d400 principal matched by identity 0 +peer0.org2.example.com | [3e44 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [3e45 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 93 78 4f ff 4e 2a b3 51 10 03 3a |0D. w.xO.N*.Q..:| +peer0.org2.example.com | 00000010 37 ee fc 62 d3 68 19 65 b7 57 b5 f5 14 96 2b b1 |7..b.h.e.W....+.| +peer0.org2.example.com | 00000020 17 9d 2c 40 02 20 2b 1a 5c f4 f8 f3 6a 21 da 7d |..,@. +.\...j!.}| +peer0.org2.example.com | 00000030 50 5b 6c 45 96 aa dc bb 93 ec 55 54 39 4a a4 97 |P[lE......UT9J..| +peer0.org2.example.com | 00000040 de df f4 0b c9 85 |......| +peer0.org2.example.com | [3e46 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339d400 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3e47 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00339d400 gate 1598907139510870400 evaluation succeeds +peer0.org2.example.com | [3e48 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e49 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e4a 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3e4b 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3e4c 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3e4d 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cdc70 gate 1598907139511448000 evaluation starts +peer0.org2.example.com | [3e4e 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cdc70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3e4f 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cdc70 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3e50 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3e51 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:51460 +peer0.org2.example.com | [3e52 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.7:51460 +peer0.org2.example.com | [3e53 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [3e54 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:51286 disconnected +peer0.org2.example.com | [3e55 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.7:51286 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m14.2121936s +peer0.org2.example.com | [3e56 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c canceling read because closing +peer0.org2.example.com | [3e57 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [3e58 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.7:51460 disconnected +peer0.org2.example.com | [3e59 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:52:29.477Z grpc.peer_address=172.18.0.7:51460 grpc.peer_subject="CN=peer0.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=33.4654ms +peer0.org2.example.com | [3e5a 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cdc70 principal matched by identity 0 +peer0.org2.example.com | [3e5b 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org2.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org1.example.com | [39d6 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [39d7 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [39d8 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39d9 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [39da 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [39db 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39dc 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39dd 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39de 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39df 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [39e0 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [39e1 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39e2 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39e3 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39e4 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39e5 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [39e6 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [39e7 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [39e8 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [39e9 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [39ea 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [39eb 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [39ec 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [39ed 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [39ee 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [39ef 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [39f0 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [39f1 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fe4b0 gate 1598907135040801000 evaluation starts +peer0.org1.example.com | [39f2 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fe4b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [39f3 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fe4b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [39f4 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fe4b0 principal matched by identity 0 +peer1.org2.example.com | [4017 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4018 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [4019 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [401a 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [401b 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [401c 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [401d 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [401e 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [401f 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4020 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [4021 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4022 08-31 20:52:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4023 08-31 20:52:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4024 08-31 20:52:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4025 08-31 20:52:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4026 08-31 20:52:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [4027 08-31 20:52:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [4028 08-31 20:52:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4029 08-31 20:52:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [402a 08-31 20:52:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [402b 08-31 20:52:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [402c 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [402d 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161040 +peer1.org2.example.com | [402e 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 91B0F9F376B019275F6FF0592646B4F915B06ACE97A773A023D288895C3CBB66 +peer1.org2.example.com | [402f 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4030 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [4031 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [4032 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [4033 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4034 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4035 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4036 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4037 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [4038 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4039 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [403b 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [403c 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [403d 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [403e 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [403a 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [403f 08-31 20:52:25.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4040 08-31 20:52:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4041 08-31 20:52:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161041 +peer1.org2.example.com | [4042 08-31 20:52:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A5BB37CDA73DC715E910EDE08B7CCB8B37DAAB8132E631106E3AF2655D49606A +peer1.org2.example.com | [4043 08-31 20:52:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4044 08-31 20:52:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [4045 08-31 20:52:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [4046 08-31 20:52:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4047 08-31 20:52:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4048 08-31 20:52:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4049 08-31 20:52:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [404a 08-31 20:52:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [404b 08-31 20:52:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [404c 08-31 20:52:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [404d 08-31 20:52:25.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [404e 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b69 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3b6a 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3b6b 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b6c 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3b6d 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b6e 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b6f 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b70 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3b71 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3b72 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3b73 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3b74 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3b75 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3b76 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3b77 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3b78 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3b79 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004039d80 gate 1598907145516642400 evaluation starts +peer1.org1.example.com | [3b7a 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004039d80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b7b 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004039d80 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3b7c 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004039d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3b7d 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004039d80 principal evaluation fails +peer1.org1.example.com | [3b7e 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004039d80 gate 1598907145516642400 evaluation fails +peer1.org1.example.com | [3b7f 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3b80 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3b81 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3b82 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040982f0 gate 1598907145520307500 evaluation starts +peer1.org1.example.com | [3b83 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040982f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b84 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040982f0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3b85 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040982f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3b86 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040982f0 principal evaluation fails +peer1.org1.example.com | [3b87 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040982f0 gate 1598907145520307500 evaluation fails +peer1.org1.example.com | [3b88 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3b89 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3b8a 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3b8b 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004098860 gate 1598907145520576300 evaluation starts +peer1.org1.example.com | [3b8c 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004098860 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3b8d 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004098860 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3b8e 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004098860 principal matched by identity 0 +peer1.org1.example.com | [3b8f 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e4 b0 84 4b 07 df 73 7a 11 0c 44 35 9d 1d 7f |....K..sz..D5...| +peer1.org1.example.com | 00000010 f5 f0 fa 1e d7 a5 c0 10 5a 6a e8 0d 87 44 2e 4e |........Zj...D.N| +peer1.org1.example.com | [3b90 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 33 f0 79 6c 51 c3 d7 39 cb eb |0E.!..3.ylQ..9..| +peer1.org1.example.com | 00000010 c3 16 f3 19 8f 04 6d c3 41 aa ea cf 84 60 d0 c7 |......m.A....`..| +peer1.org1.example.com | 00000020 9f 18 6f 34 a8 02 20 6f 81 d6 42 16 92 06 21 50 |..o4.. o..B...!P| +peer1.org1.example.com | 00000030 32 3a 12 4c b6 fe d5 74 02 3a 69 81 62 43 8e a6 |2:.L...t.:i.bC..| +peer1.org1.example.com | 00000040 7c 6a ba 25 70 78 59 ||j.%pxY| +peer1.org1.example.com | [3b91 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004098860 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3b92 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004098860 gate 1598907145520576300 evaluation succeeds +peer1.org1.example.com | [3b93 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b94 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3b95 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3b96 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3b97 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3b98 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3b99 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3b9a 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3b9b 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3b9c 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b9d 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b9e 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3b9f 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [3ba0 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ba1 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ba2 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ba3 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3e5c 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org2.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org2.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org2.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org2.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org2.example.com | [3e5d 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cdc70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3e5e 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cdc70 gate 1598907139511448000 evaluation succeeds +peer0.org2.example.com | [3e5f 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e60 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3e61 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3e62 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3e63 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e64 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3e65 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3e66 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3e67 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [3e68 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8700 gate 1598907139516775000 evaluation starts +peer0.org2.example.com | [3e69 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8700 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3e6a 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8700 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3e6b 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8700 principal matched by identity 0 +peer0.org2.example.com | [3e6c 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org2.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org2.example.com | [3e6d 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org2.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org2.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org2.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org2.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org2.example.com | [3e6e 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8700 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3e6f 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033f8700 gate 1598907139516775000 evaluation succeeds +peer0.org2.example.com | [3e70 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3e71 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3e72 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3e73 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3e74 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer0.org2.example.com | [3e75 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +peer0.org2.example.com | [3e76 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer for channel businesschannel with same endpoint, skipping connecting to myself +peer0.org2.example.com | [3e77 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer0.org2.example.com | [3e78 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer0.org2.example.com | [3e79 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: , Metadata: +peer0.org2.example.com | [3e7a 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3e7b 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org2.example.com | [3e7c 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> WARN Failed to update ordering service endpoints, due to Channel with businesschannel id was not found +peer0.org2.example.com | [3e7d 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e7e 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3e7f 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3e80 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3e81 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org2.example.com | [3e82 08-31 20:52:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [3e83 08-31 20:52:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [3e84 08-31 20:52:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org2.example.com | [3e85 08-31 20:52:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [3e86 08-31 20:52:19.53 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00344ddd0, CONNECTING +peer0.org2.example.com | [3e87 08-31 20:52:19.54 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:52:21.542Z grpc.peer_address=172.18.0.5:42714 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=3.0175ms +peer0.org2.example.com | [3e88 08-31 20:52:19.54 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org2.example.com | [3e89 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org2.example.com | [3e8a 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +peer0.org2.example.com | [3e8b 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org2.example.com | [3e8c 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org2.example.com | [3e8d 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org2.example.com | [3e8e 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0034bd5c0 env 0xc0027205f0 txn 0 +peer0.org2.example.com | [3e8f 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org2.example.com | [3e90 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 169ms +peer0.org2.example.com | [3e91 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org2.example.com | [3e92 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org2.example.com | [3e93 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org2.example.com | [3e94 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +peer0.org2.example.com | [3e95 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org2.example.com | [3e96 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org2.example.com | [3e97 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org2.example.com | [3e98 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +peer0.org2.example.com | [3e99 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org2.example.com | [3e9a 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org2.example.com | [3e9b 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org2.example.com | [3e9c 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org2.example.com | [3e9d 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org2.example.com | [3e9e 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org2.example.com | [3e9f 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer0.org2.example.com | [3ea0 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3ea1 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [3ea2 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [3ea3 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Verify: digest = 00000000 ff e3 09 84 f3 a2 0e a4 c9 6b 29 4a 9f a6 d7 c1 |.........k)J....| +peer0.org1.example.com | 00000010 fa 43 9a e5 c6 d1 66 47 34 7a 48 71 77 43 83 82 |.C....fG4zHqwC..| +peer0.org1.example.com | [39f6 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 52 c6 39 30 34 23 76 dd 90 6f |0E.!..R.904#v..o| +peer0.org1.example.com | 00000010 99 a9 38 4b b8 01 c0 e2 7c ee 8e fe 2f ae e6 88 |..8K....|.../...| +peer0.org1.example.com | 00000020 bf f2 6b 81 92 02 20 67 41 a5 91 f2 38 4f ff a8 |..k... gA...8O..| +peer0.org1.example.com | 00000030 0e 43 54 c3 54 b0 67 20 0f b4 88 85 19 54 62 6b |.CT.T.g .....Tbk| +peer0.org1.example.com | 00000040 f8 18 2b cc 12 b9 6d |..+...m| +peer0.org1.example.com | [39f7 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fe4b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [39f8 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fe4b0 gate 1598907135040801000 evaluation succeeds +peer0.org1.example.com | [39f9 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [39fa 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [39fb 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [39fc 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [39fd 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [39fe 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [39ff 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3a00 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3a01 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3a02 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a03 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a04 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a05 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a06 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a07 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a08 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a09 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a0a 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a0b 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a0c 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a0d 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a0e 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a0f 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a10 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a11 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3a12 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a13 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3a14 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a15 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a16 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a17 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a18 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ba4 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [3ba5 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ba6 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ba7 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ba8 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ba9 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3baa 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3bab 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bac 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3bad 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3bae 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3baf 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd e8 4a fb d3 45 42 77 a9 86 75 78 67 29 80 85 |..J..EBw..uxg)..| +peer1.org1.example.com | 00000010 6f 12 c4 de 2d 89 80 5d 19 bd 52 56 0c b1 71 af |o...-..]..RV..q.| +peer1.org1.example.com | [3bb0 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 a8 7b 3b 5b fe fd 46 83 d2 17 |0E.!...{;[..F...| +peer1.org1.example.com | 00000010 0a 63 9c 71 0f e1 13 d9 8f f3 25 2e 6a 8e 91 a1 |.c.q......%.j...| +peer1.org1.example.com | 00000020 3e 0b 9c bf af 02 20 31 4f 57 9f 75 28 33 95 b1 |>..... 1OW.u(3..| +peer1.org1.example.com | 00000030 68 0a 14 8a 0a 66 c4 81 04 e2 37 1e d2 19 56 7f |h....f....7...V.| +peer1.org1.example.com | 00000040 bc a6 2e 8e ab e1 0f |.......| +peer1.org1.example.com | [3bb1 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bb2 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3bb3 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3bb4 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3bb5 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3bb6 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bb7 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bb8 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bb9 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bba 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bbb 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bbc 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bbd 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bbe 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bbf 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bc0 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3bc1 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bc2 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3bc3 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bc4 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bc5 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bc6 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bc7 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bc8 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bc9 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3bca 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bcb 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\267\221\022S\007\337\253\303\034s\367\3734Q\205\327\370\300\270\006\002 /\010\307\277;\250Jcx\204\342\"\2026\331\377\024>\375K\203=B\312\312R\032\201\344\317\030\263" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [3bcc 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bcd 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\267\221\022S\007\337\253\303\034s\367\3734Q\205\327\370\300\270\006\002 /\010\307\277;\250Jcx\204\342\"\2026\331\377\024>\375K\203=B\312\312R\032\201\344\317\030\263" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [3bce 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3bcf 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 6f bc e6 0e 08 91 b2 0a 67 44 c2 14 2e dc 99 |.o.......gD.....| +peer1.org1.example.com | 00000010 d6 c7 15 c7 53 70 16 ae 4b 70 12 96 0c f6 e9 86 |....Sp..Kp......| +peer1.org1.example.com | [3bd0 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 fc 7d 0e ee ef b1 04 45 2d 8e |0E.!...}.....E-.| +peer1.org1.example.com | 00000010 b5 09 4e 13 39 28 76 7e 53 53 d0 bd 17 48 eb 7d |..N.9(v~SS...H.}| +peer1.org1.example.com | 00000020 2a 28 83 40 6c 02 20 55 00 c7 99 e9 e2 6c 60 8d |*(.@l. U.....l`.| +peer1.org1.example.com | 00000030 3a 32 f6 d1 cb 98 7b d9 21 47 a3 3c 8c 63 f4 9d |:2....{.!G.<.c..| +peer1.org1.example.com | 00000040 04 f5 d4 cc 5e b2 19 |....^..| +peer1.org1.example.com | [3bd1 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [3bd2 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 12 31 70 78 23 a8 64 08 e5 cf |0E.!...1px#.d...| +peer1.org1.example.com | 00000010 3e b7 91 12 53 07 df ab c3 1c 73 f7 fb 34 51 85 |>...S.....s..4Q.| +peer1.org1.example.com | 00000020 d7 f8 c0 b8 06 02 20 2f 08 c7 bf 3b a8 4a 63 78 |...... /...;.Jcx| +peer1.org1.example.com | 00000030 84 e2 22 82 36 d9 ff 14 3e fd 4b 83 3d 42 ca ca |..".6...>.K.=B..| +peer1.org1.example.com | 00000040 52 1a 81 e4 cf 18 b3 |R......| +peer1.org1.example.com | [3bd3 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3bd4 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [3bd5 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3bd6 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3bd7 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3bd8 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bd9 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bda 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bdb 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [3bdc 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bdd 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bde 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3bdf 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [3be0 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3be1 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\267\221\022S\007\337\253\303\034s\367\3734Q\205\327\370\300\270\006\002 /\010\307\277;\250Jcx\204\342\"\2026\331\377\024>\375K\203=B\312\312R\032\201\344\317\030\263" > > alive: +peer1.org1.example.com | [3be2 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3be3 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3be4 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3be5 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3be6 08-31 20:52:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [3be7 08-31 20:52:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [3be8 08-31 20:52:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [6 1 2 3 4 5] to 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3be9 08-31 20:52:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bea 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3beb 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bec 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [3bed 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3bee 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3bef 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bf0 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bf1 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3bf2 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3bf3 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [3bf4 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bf5 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a19 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a1a 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a1b 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a1c 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3a1d 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a1e 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3a1f 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3a20 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 22 7d a8 75 eb 64 0c e8 bf 3b 87 b4 87 16 63 |."}.u.d...;....c| +peer0.org1.example.com | 00000010 c4 ab a7 84 58 2b f5 5f 87 74 1c 13 c0 1a 22 21 |....X+._.t...."!| +peer0.org1.example.com | [3a21 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 b3 f2 a6 31 57 10 a9 ae e4 cb 9e |0D. ....1W......| +peer0.org1.example.com | 00000010 a5 8d 94 82 49 64 ac 44 14 43 74 02 5a 7a da 96 |....Id.D.Ct.Zz..| +peer0.org1.example.com | 00000020 eb 21 a5 40 02 20 58 52 e1 be 34 53 83 9a cc c7 |.!.@. XR..4S....| +peer0.org1.example.com | 00000030 2d a6 17 3b 30 7d 4e c7 83 9f 5e e4 c3 de 13 0e |-..;0}N...^.....| +peer0.org1.example.com | 00000040 79 35 3a 99 cd df |y5:...| +peer0.org1.example.com | [3a22 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3a23 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3a24 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3a25 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3a27 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3a28 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a29 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a26 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3a2a 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a2b 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3a2c 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a2d 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3a2e 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a2f 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a30 08-31 20:52:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a31 08-31 20:52:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a32 08-31 20:52:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3a33 08-31 20:52:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a34 08-31 20:52:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3a35 08-31 20:52:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3a36 08-31 20:52:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a37 08-31 20:52:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3bf6 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [404f 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4050 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [4051 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4053 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4052 08-31 20:52:25.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [4054 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4055 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 bb 37 cd a7 3d c7 15 e9 10 ed e0 8b 7c cb 8b |..7..=.......|..| +peer1.org2.example.com | 00000010 37 da ab 81 32 e6 31 10 6e 3a f2 65 5d 49 60 6a |7...2.1.n:.e]I`j| +peer1.org2.example.com | [4056 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb d8 7a 44 f0 ba 1c 97 51 e4 6b |0E.!...zD....Q.k| +peer1.org2.example.com | 00000010 df af be f7 46 7e cd 10 71 ac cf 38 e6 99 9b 95 |....F~..q..8....| +peer1.org2.example.com | 00000020 8f 1a 12 16 6a 02 20 2c 40 29 1b 48 a5 78 d7 11 |....j. ,@).H.x..| +peer1.org2.example.com | 00000030 e1 ab a0 0f 96 3c b1 51 15 13 b7 a7 58 76 e5 73 |.....<.Q....Xv.s| +peer1.org2.example.com | 00000040 65 eb f1 d2 be ca 9d |e......| +peer1.org2.example.com | [4057 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [4058 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [4059 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 7f b9 c6 4c 3f d3 cb 18 0c 70 |0E.!.....L?....p| +peer1.org2.example.com | 00000010 92 bd 9a 4e 7a 56 9c ee 84 30 0b 47 45 f2 9d 0a |...NzV...0.GE...| +peer1.org2.example.com | 00000020 b8 91 de 51 3c 02 20 48 cc 0c 77 31 ea cd 75 8a |...Q<. H..w1..u.| +peer1.org2.example.com | 00000030 58 78 20 f6 ef e4 4f 4e bf 66 51 c5 26 6d 8b ea |Xx ...ON.fQ.&m..| +peer1.org2.example.com | 00000040 dc fc 62 4d 87 2c 08 |..bM.,.| +peer1.org2.example.com | [405a 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [405b 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [405c 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [405d 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [405e 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [4060 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4061 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4062 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [405f 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4064 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4065 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4066 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4063 08-31 20:52:25.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a38 08-31 20:52:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3a39 08-31 20:52:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a3a 08-31 20:52:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3a3b 08-31 20:52:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3a3d 08-31 20:52:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a3c 08-31 20:52:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a3e 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a3f 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a40 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a41 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a42 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a43 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a44 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [3a45 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a46 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3a47 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a48 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a49 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3a4a 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3a4b 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3a4c 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047445b0 gate 1598907135467109700 evaluation starts +peer0.org1.example.com | [3a4d 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047445b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3a4e 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047445b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3a4f 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047445b0 principal matched by identity 0 +peer0.org1.example.com | [3a50 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af b2 10 8a be 07 43 03 c5 53 59 74 3f 2b 84 bb |......C..SYt?+..| +peer0.org1.example.com | 00000010 eb 3f 1d 1e b1 3f 26 f7 1a 82 b3 69 0b 46 e5 11 |.?...?&....i.F..| +peer0.org1.example.com | [3a51 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 84 cf 51 90 23 91 bd dc ab 79 |0E.!....Q.#....y| +peer0.org1.example.com | 00000010 3b 5d 3b e1 35 2f 28 9c 70 66 78 b3 34 c7 bc 50 |;];.5/(.pfx.4..P| +peer0.org1.example.com | 00000020 92 b4 0e 1b 03 02 20 58 37 d4 56 13 28 d1 3a 50 |...... X7.V.(.:P| +peer0.org1.example.com | 00000030 c6 d3 a3 6b 9a 18 12 c5 ae a9 af 46 7d e5 30 bc |...k.......F}.0.| +peer0.org1.example.com | 00000040 48 dc 90 2d 63 89 92 |H..-c..| +peer0.org1.example.com | [3a52 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047445b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3a53 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047445b0 gate 1598907135467109700 evaluation succeeds +peer0.org1.example.com | [3a54 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3a55 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3a56 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3a57 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3a58 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a59 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3a5a 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3a5b 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3a5c 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3a5d 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a5e 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a5f 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a60 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a61 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a62 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a63 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a64 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a65 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a66 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a67 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a68 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a69 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a6a 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a6b 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a6c 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a6d 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3a6e 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a6f 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a70 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3a71 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a72 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a73 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3a74 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a75 08-31 20:52:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3a76 08-31 20:52:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161032 +peer0.org1.example.com | [3a77 08-31 20:52:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FD24C849EFC373D9C924288E37D6832FBE5DDD532DEBF41450232449AABBD220 +peer1.org2.example.com | [4067 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4069 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [406a 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b5f40 gate 1598907145150528300 evaluation starts +peer1.org2.example.com | [406b 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b5f40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [406c 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b5f40 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [406d 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b5f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [406e 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b5f40 principal evaluation fails +peer1.org2.example.com | [4068 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [406f 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038b5f40 gate 1598907145150528300 evaluation fails +peer1.org2.example.com | [4070 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4071 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4072 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4073 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393cb60 gate 1598907145153300700 evaluation starts +peer1.org2.example.com | [4074 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393cb60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4075 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393cb60 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4076 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393cb60 principal matched by identity 0 +peer1.org2.example.com | [4077 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 b2 82 29 c0 2a f9 b3 a5 b0 b2 34 50 49 31 b3 |...).*.....4PI1.| +peer1.org2.example.com | 00000010 7d fc 93 2c 84 8a 3d 36 ec 6f 50 9e 1a 66 c0 2c |}..,..=6.oP..f.,| +peer1.org2.example.com | [4078 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 9b 8b 2c 40 90 2f 80 63 af cd |0E.!....,@./.c..| +peer1.org2.example.com | 00000010 48 ca 37 69 29 29 9f bb 1d c3 5b 8f 63 a1 7c 47 |H.7i))....[.c.|G| +peer1.org2.example.com | 00000020 15 1f ae b2 23 02 20 24 bb 15 3f ac ba ee 84 d3 |....#. $..?.....| +peer1.org2.example.com | 00000030 7a 04 a8 d3 db 97 f1 f4 cf d9 e8 4f a1 21 81 7f |z..........O.!..| +peer1.org2.example.com | 00000040 ce 31 a6 98 54 3c 44 |.1..T DEBU 0xc00393cb60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [407a 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00393cb60 gate 1598907145153300700 evaluation succeeds +peer1.org2.example.com | [407b 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [407c 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [407d 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [407e 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [407f 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4080 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4081 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4082 08-31 20:52:25.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 7e 2f 8e 4a e0 ef 3f 41 cc 65 57 67 1b 37 83 |.~/.J..?A.eWg.7.| +peer1.org2.example.com | 00000010 0e 55 35 d1 da 3f 2e b6 34 1a b3 ea fa b3 11 09 |.U5..?..4.......| +peer1.org2.example.com | [4083 08-31 20:52:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c ff 97 c8 ab 01 42 c7 54 7e 27 c1 |0D. \.....B.T~'.| +peer1.org2.example.com | 00000010 99 22 31 c0 8a 82 a1 07 49 83 6c 18 c4 e5 cb 4c |."1.....I.l....L| +peer1.org2.example.com | 00000020 cb ca a3 a4 02 20 6c c0 df 95 33 89 f1 40 60 5d |..... l...3..@`]| +peer1.org2.example.com | 00000030 49 a2 9d 59 e8 dd f0 be 82 bc 9e 58 04 65 01 0d |I..Y.......X.e..| +peer1.org2.example.com | 00000040 62 25 ea 10 1b 58 |b%...X| +peer1.org2.example.com | [4084 08-31 20:52:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4085 08-31 20:52:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4086 08-31 20:52:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4087 08-31 20:52:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 bb 37 cd a7 3d c7 15 e9 10 ed e0 8b 7c cb 8b |..7..=.......|..| +peer1.org2.example.com | 00000010 37 da ab 81 32 e6 31 10 6e 3a f2 65 5d 49 60 6a |7...2.1.n:.e]I`j| +peer1.org2.example.com | [4088 08-31 20:52:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb d8 7a 44 f0 ba 1c 97 51 e4 6b |0E.!...zD....Q.k| +peer1.org2.example.com | 00000010 df af be f7 46 7e cd 10 71 ac cf 38 e6 99 9b 95 |....F~..q..8....| +peer1.org2.example.com | 00000020 8f 1a 12 16 6a 02 20 2c 40 29 1b 48 a5 78 d7 11 |....j. ,@).H.x..| +peer1.org2.example.com | 00000030 e1 ab a0 0f 96 3c b1 51 15 13 b7 a7 58 76 e5 73 |.....<.Q....Xv.s| +peer1.org2.example.com | 00000040 65 eb f1 d2 be ca 9d |e......| +peer1.org2.example.com | [4089 08-31 20:52:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [408a 08-31 20:52:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [408b 08-31 20:52:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [408c 08-31 20:52:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [408d 08-31 20:52:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer1.org2.example.com | [408e 08-31 20:52:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [408f 08-31 20:52:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4090 08-31 20:52:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 7e 2f 8e 4a e0 ef 3f 41 cc 65 57 67 1b 37 83 |.~/.J..?A.eWg.7.| +peer1.org2.example.com | 00000010 0e 55 35 d1 da 3f 2e b6 34 1a b3 ea fa b3 11 09 |.U5..?..4.......| +peer1.org2.example.com | [4091 08-31 20:52:25.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c ff 97 c8 ab 01 42 c7 54 7e 27 c1 |0D. \.....B.T~'.| +peer1.org2.example.com | 00000010 99 22 31 c0 8a 82 a1 07 49 83 6c 18 c4 e5 cb 4c |."1.....I.l....L| +peer1.org2.example.com | 00000020 cb ca a3 a4 02 20 6c c0 df 95 33 89 f1 40 60 5d |..... l...3..@`]| +peer1.org2.example.com | 00000030 49 a2 9d 59 e8 dd f0 be 82 bc 9e 58 04 65 01 0d |I..Y.......X.e..| +peer1.org2.example.com | 00000040 62 25 ea 10 1b 58 |b%...X| +peer1.org2.example.com | [4092 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4093 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4094 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [4095 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4096 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4097 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4098 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4099 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [409a 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [409b 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [409c 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039abb40 gate 1598907145173814100 evaluation starts +peer1.org2.example.com | [409d 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039abb40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [409e 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039abb40 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [409f 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039abb40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [40a0 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039abb40 principal evaluation fails +peer1.org2.example.com | [40a1 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039abb40 gate 1598907145173814100 evaluation fails +peer1.org2.example.com | [40a2 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [40a3 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [40a4 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [40a5 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039be0b0 gate 1598907145175656500 evaluation starts +peer1.org2.example.com | [40a6 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039be0b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3a78 08-31 20:52:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3a79 08-31 20:52:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3a7a 08-31 20:52:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3a7b 08-31 20:52:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [3a7c 08-31 20:52:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a7d 08-31 20:52:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a7e 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a7f 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3a80 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a81 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3a82 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3a83 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3a84 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a85 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3a86 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a87 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3a88 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a89 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a8a 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a8b 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a8c 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a8d 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a8e 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a8f 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a90 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a91 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3a92 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [3a93 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a94 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a95 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a96 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3a97 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3a98 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3a99 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3bf7 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3bf8 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3bf9 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3bfa 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3bfb 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3bfc 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3bfd 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410aac0 gate 1598907145929788100 evaluation starts +peer1.org1.example.com | [3bfe 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410aac0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3bff 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410aac0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3c00 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410aac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3c01 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410aac0 principal evaluation fails +peer1.org1.example.com | [3c02 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410aac0 gate 1598907145929788100 evaluation fails +peer1.org1.example.com | [3c03 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3c04 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3c05 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3c06 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b030 gate 1598907145931181200 evaluation starts +peer1.org1.example.com | [3c07 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b030 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c08 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b030 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3c09 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3c0a 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b030 principal evaluation fails +peer1.org1.example.com | [3c0b 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b030 gate 1598907145931181200 evaluation fails +peer1.org1.example.com | [3c0c 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c0d 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c0e 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3c0f 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b5a0 gate 1598907145931803300 evaluation starts +peer1.org1.example.com | [3c10 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b5a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c11 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b5a0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3c12 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b5a0 principal matched by identity 0 +peer1.org1.example.com | [3c13 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org1.example.com | [3c14 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org1.example.com | [3c15 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b5a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3c16 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00410b5a0 gate 1598907145931803300 evaluation succeeds +peer1.org1.example.com | [3c17 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c18 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c19 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3c1a 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3c1b 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org1.example.com | [3c1c 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org1.example.com | [3c1d 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org2.example.com | [40a7 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039be0b0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [40a8 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039be0b0 principal matched by identity 0 +peer1.org2.example.com | [40a9 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 9a f5 53 9e f9 83 db 2f 34 ad d5 1c 20 26 85 |...S..../4... &.| +peer1.org2.example.com | 00000010 58 ee 5c ab 5d 7e 9c e3 6f f9 49 1b 23 bc 85 2c |X.\.]~..o.I.#..,| +peer1.org2.example.com | [40aa 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 8f b8 0c ad a4 ff 4d 70 69 23 a7 |0D. w......Mpi#.| +peer1.org2.example.com | 00000010 b4 26 e3 1b 93 c8 16 6b 88 53 10 5b 0d 2f 05 ba |.&.....k.S.[./..| +peer1.org2.example.com | 00000020 a0 7b b5 64 02 20 44 8c a3 73 eb ae ed 12 e7 ac |.{.d. D..s......| +peer1.org2.example.com | 00000030 94 05 8e 24 5e b6 4b 48 75 3b 40 52 cc 85 23 5c |...$^.KHu;@R..#\| +peer1.org2.example.com | 00000040 f8 d3 83 df 4e ae |....N.| +peer1.org2.example.com | [40ab 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039be0b0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [40ac 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039be0b0 gate 1598907145175656500 evaluation succeeds +peer1.org2.example.com | [40ad 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [40ae 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [40af 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [40b0 08-31 20:52:25.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [40b1 08-31 20:52:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [40b2 08-31 20:52:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40b3 08-31 20:52:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [40b4 08-31 20:52:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 bb 37 cd a7 3d c7 15 e9 10 ed e0 8b 7c cb 8b |..7..=.......|..| +peer1.org2.example.com | 00000010 37 da ab 81 32 e6 31 10 6e 3a f2 65 5d 49 60 6a |7...2.1.n:.e]I`j| +peer1.org2.example.com | [40b5 08-31 20:52:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb d8 7a 44 f0 ba 1c 97 51 e4 6b |0E.!...zD....Q.k| +peer1.org2.example.com | 00000010 df af be f7 46 7e cd 10 71 ac cf 38 e6 99 9b 95 |....F~..q..8....| +peer1.org2.example.com | 00000020 8f 1a 12 16 6a 02 20 2c 40 29 1b 48 a5 78 d7 11 |....j. ,@).H.x..| +peer1.org2.example.com | 00000030 e1 ab a0 0f 96 3c b1 51 15 13 b7 a7 58 76 e5 73 |.....<.Q....Xv.s| +peer1.org2.example.com | 00000040 65 eb f1 d2 be ca 9d |e......| +peer1.org2.example.com | [40b6 08-31 20:52:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [40b7 08-31 20:52:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [40b8 08-31 20:52:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40b9 08-31 20:52:25.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40ba 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [40bb 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [40bc 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [40bd 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40be 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40bf 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40c0 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40c1 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40c2 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40c3 08-31 20:52:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [40c4 08-31 20:52:25.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40c5 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [40c6 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [40c7 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40c8 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [40c9 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [40ca 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40cb 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [40cc 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [40cd 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [40ce 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [40cf 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [40d0 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [40d1 08-31 20:52:25.28 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039458a0 gate 1598907145289946800 evaluation starts +peer1.org2.example.com | [40d2 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039458a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [40d3 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039458a0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [40d4 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039458a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [40d5 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039458a0 principal evaluation fails +peer1.org2.example.com | [40d6 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039458a0 gate 1598907145289946800 evaluation fails +peer1.org2.example.com | [40d7 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [40d8 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [40d9 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [40da 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003945e10 gate 1598907145291680500 evaluation starts +peer1.org2.example.com | [40db 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003945e10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [40dc 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003945e10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [40dd 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003945e10 principal matched by identity 0 +peer1.org2.example.com | [40de 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 7e b8 fb 7b 92 f9 a8 55 43 c1 69 4c 47 d2 b2 |.~..{...UC.iLG..| +peer1.org2.example.com | 00000010 11 10 12 61 78 d4 eb 0c c8 d1 65 aa 08 6c fa 51 |...ax.....e..l.Q| +peer1.org2.example.com | [40df 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 8b 52 d5 99 fe 97 1c 64 ef 6c |0E.!...R.....d.l| +peer1.org2.example.com | 00000010 06 64 3b 74 65 f3 cf f8 32 a5 57 36 bb 76 2c c8 |.d;te...2.W6.v,.| +peer1.org2.example.com | 00000020 b6 aa ec a4 dd 02 20 4d 13 76 f1 83 d6 67 90 3d |...... M.v...g.=| +peer1.org2.example.com | 00000030 dd fb b8 0e e1 80 26 48 e1 a7 72 11 50 fb 81 26 |......&H..r.P..&| +peer1.org2.example.com | 00000040 ab 16 85 61 5e a6 cc |...a^..| +peer1.org2.example.com | [40e0 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003945e10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [40e1 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003945e10 gate 1598907145291680500 evaluation succeeds +peer1.org2.example.com | [40e2 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [40e3 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [40e4 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [40e5 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [40e6 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [40e7 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [40e8 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [40e9 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3c1e 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org1.example.com | [3c1f 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c20 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c21 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3c22 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c23 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c24 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3c25 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3c26 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3c27 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412b580 gate 1598907145935539900 evaluation starts +peer1.org1.example.com | [3c28 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412b580 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c29 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412b580 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3c2a 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412b580 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3c2b 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412b580 principal evaluation fails +peer1.org1.example.com | [3c2c 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412b580 gate 1598907145935539900 evaluation fails +peer1.org1.example.com | [3c2d 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3c2e 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3c2f 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3c30 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412baf0 gate 1598907145935794900 evaluation starts +peer1.org1.example.com | [3c31 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412baf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c32 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412baf0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3c33 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412baf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3c34 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412baf0 principal evaluation fails +peer1.org1.example.com | [3c35 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412baf0 gate 1598907145935794900 evaluation fails +peer1.org1.example.com | [3c36 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c37 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c38 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3c39 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414a060 gate 1598907145937823000 evaluation starts +peer1.org1.example.com | [3c3a 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414a060 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c3b 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414a060 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3c3c 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414a060 principal matched by identity 0 +peer1.org1.example.com | [3c3d 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org1.example.com | [3c3e 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org1.example.com | [3a9a 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3a9b 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a9c 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3a9d 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3a9e 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3a9f 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3aa0 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004772fc0 gate 1598907137095690400 evaluation starts +peer0.org1.example.com | [3aa1 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004772fc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3aa2 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004772fc0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3aa3 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004772fc0 principal matched by identity 0 +peer0.org1.example.com | [3aa4 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 22 75 ee d7 b7 5f ef ef 01 a6 d3 9f c4 26 19 |i"u..._.......&.| +peer0.org1.example.com | 00000010 dc 92 50 99 03 d9 71 4a 23 fa 01 75 71 b1 ba 7c |..P...qJ#..uq..|| +peer0.org1.example.com | [3aa5 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 5c bc b9 d0 e9 32 c4 85 69 fd 8a |0D. .\....2..i..| +peer0.org1.example.com | 00000010 86 a2 14 bc 8f d4 11 6d f3 1b 94 0e ed e8 dc 12 |.......m........| +peer0.org1.example.com | 00000020 b1 d4 3a 0d 02 20 6a 63 7e ed 6d 99 28 6f 2e c0 |..:.. jc~.m.(o..| +peer0.org1.example.com | 00000030 e0 7e 50 e0 55 4c cf 50 1a ee 99 07 49 aa e3 ee |.~P.UL.P....I...| +peer0.org1.example.com | 00000040 43 44 ef 85 57 69 |CD..Wi| +peer0.org1.example.com | [3aa6 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004772fc0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3aa7 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004772fc0 gate 1598907137095690400 evaluation succeeds +peer0.org1.example.com | [3aa8 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3aa9 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3aaa 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3aab 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3aac 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3aad 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3aae 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3aaf 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3ab0 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3ab1 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ab2 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ab3 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ab4 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [3ab5 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ab6 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ab7 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ab8 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3ea6 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org2.example.com | [3ea9 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org2.example.com | [3eaa 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org2.example.com | [3ea7 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.5:42714 +peer0.org2.example.com | [3ea8 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3eab 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +peer0.org2.example.com | [3eac 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org2.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org2.example.com | [3ead 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [3eae 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0028e66c0)} +peer0.org2.example.com | [3eaf 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 58 67 e7 90 97 88 86 d3 23 5d b5 1b |0D. Xg......#]..| +peer0.org2.example.com | 00000010 10 20 8b eb e7 dd 98 bd bb 17 2a 52 ed ad e0 bd |. ........*R....| +peer0.org2.example.com | 00000020 58 29 cd df 02 20 13 af 62 56 33 f7 eb f0 33 bd |X)... ..bV3...3.| +peer0.org2.example.com | 00000030 bd 12 33 fd b4 3d 0d 87 3b 7a 51 1a 63 32 f8 9e |..3..=..;zQ.c2..| +peer0.org2.example.com | 00000040 2c 8a 93 b6 19 b3 |,.....| +peer0.org2.example.com | [3eb0 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [3eb1 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org2.example.com | [3eb4 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3eb5 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [3eb6 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [3eb7 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:42714 +peer0.org2.example.com | [3eb8 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:42714 +peer0.org2.example.com | [3eb2 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [40eb 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40ec 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40ed 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40ee 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40ef 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40f0 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40f1 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40f2 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40f3 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40f4 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40f5 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [40f6 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [40f7 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [40f8 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40f9 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [40fa 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [40fb 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40fc 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [40fd 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [40fe 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [40ff 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4100 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4101 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4102 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4103 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4104 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4105 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4106 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4107 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4108 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4109 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c3f 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414a060 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3c40 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414a060 gate 1598907145937823000 evaluation succeeds +peer1.org1.example.com | [3c41 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c42 08-31 20:52:25.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c43 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3c44 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3c45 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c46 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [3c47 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org1.example.com | [3c48 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org1.example.com | [3c49 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c4a 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c4b 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3c4c 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c4d 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c4e 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3c4f 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3c50 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3c51 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414baf0 gate 1598907145942305900 evaluation starts +peer1.org1.example.com | [3c52 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414baf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c53 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414baf0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3c54 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414baf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3c55 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414baf0 principal evaluation fails +peer1.org1.example.com | [3c56 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00414baf0 gate 1598907145942305900 evaluation fails +peer1.org1.example.com | [3c57 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3c58 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3c59 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3c5a 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004164060 gate 1598907145943052900 evaluation starts +peer1.org1.example.com | [3c5b 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004164060 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c5c 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004164060 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3c5d 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004164060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [3ebb 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +peer0.org2.example.com | [3ebc 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [3ebd 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: > > , Envelope: 282 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ebf 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ec0 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:34650 +peer0.org2.example.com | [3ec1 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ec2 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ec3 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org2.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org2.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org2.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org2.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3ec4 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [3ec5 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [3ec6 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:9256576129007349551 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes +peer1.org2.example.com | [410a 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [410b 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [410c 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [410d 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [410e 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [410f 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4110 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e2c0 gate 1598907145335368800 evaluation starts +peer1.org2.example.com | [4111 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e2c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4112 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e2c0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4113 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e2c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4114 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e2c0 principal evaluation fails +peer1.org2.example.com | [4115 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e2c0 gate 1598907145335368800 evaluation fails +peer1.org2.example.com | [4116 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4117 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4118 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4119 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e830 gate 1598907145342411400 evaluation starts +peer1.org2.example.com | [411a 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e830 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [411b 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e830 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [411c 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e830 principal matched by identity 0 +peer1.org2.example.com | [411d 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 92 97 fa aa d4 02 28 8b d8 61 84 86 f9 40 ef |.......(..a...@.| +peer1.org2.example.com | 00000010 fb 5e cd 5b 1d b1 37 dc 33 68 1e 31 30 75 bd 0b |.^.[..7.3h.10u..| +peer1.org2.example.com | [411e 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 34 0f 82 b6 c8 0f 1b 71 00 00 |0E.!..4......q..| +peer1.org2.example.com | 00000010 b4 79 07 e4 fd da 76 35 0d 8a 32 f0 9a 5a c6 f9 |.y....v5..2..Z..| +peer1.org2.example.com | 00000020 e3 4d 1b e5 84 02 20 21 79 59 ec 7f e4 89 df b6 |.M.... !yY......| +peer1.org2.example.com | 00000030 9c 4b 7e 22 d9 b1 ef d7 6a b6 7c 1a 7b ef a3 2d |.K~"....j.|.{..-| +peer1.org2.example.com | 00000040 07 5c bb e6 ba bb 91 |.\.....| +peer1.org2.example.com | [411f 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e830 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4120 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a2e830 gate 1598907145342411400 evaluation succeeds +peer1.org2.example.com | [4121 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4122 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4123 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4124 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4125 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4126 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [4127 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4128 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4129 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [412a 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [412b 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ab9 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3aba 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3abb 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [3abc 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3abd 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3abe 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3abf 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ac0 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ac1 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ac2 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ac3 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3ac4 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e0 5b ad 9b cf 6e 40 c0 f1 40 11 cb 74 25 eb |..[...n@..@..t%.| +peer0.org1.example.com | 00000010 c1 ba 77 23 51 12 91 bf 1f c3 b4 cd 49 6e bc 28 |..w#Q.......In.(| +peer0.org1.example.com | [3ac5 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 11 9b 13 4b 9c 6c fc a8 d4 78 |0E.!.....K.l...x| +peer0.org1.example.com | 00000010 76 89 ae 84 b1 25 60 5c 18 f4 05 22 ef f7 5e 24 |v....%`\..."..^$| +peer0.org1.example.com | 00000020 da 0e 69 39 5d 02 20 33 c3 49 af 4c d1 cd 87 ad |..i9]. 3.I.L....| +peer0.org1.example.com | 00000030 c0 da 6c 1f 69 0c 99 cb 76 c8 42 6d 5e f6 4c e0 |..l.i...v.Bm^.L.| +peer0.org1.example.com | 00000040 d7 4d 22 89 0c ad 87 |.M"....| +peer0.org1.example.com | [3ac6 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [3ac7 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 c6 67 15 31 52 79 be be e8 56 |0E.!...g.1Ry...V| +peer0.org1.example.com | 00000010 64 8c 19 3a 92 d4 b4 be 57 ac 5f f0 dd 35 77 83 |d..:....W._..5w.| +peer0.org1.example.com | 00000020 e0 04 72 7a 7c 02 20 01 06 42 09 26 6e 4f b0 4e |..rz|. ..B.&nO.N| +peer0.org1.example.com | 00000030 90 17 21 94 7b 7a 47 bf ab b8 c9 81 80 32 49 ad |..!.{zG......2I.| +peer0.org1.example.com | 00000040 95 c6 11 be 78 4b d4 |....xK.| +peer0.org1.example.com | [3ac8 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [3ac9 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [3aca 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3acb 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3c5e 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004164060 principal evaluation fails +peer1.org1.example.com | [3c5f 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004164060 gate 1598907145943052900 evaluation fails +peer1.org1.example.com | [3c60 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c61 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c62 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3c63 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041645d0 gate 1598907145945732000 evaluation starts +peer1.org1.example.com | [3c64 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041645d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c65 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041645d0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3c66 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041645d0 principal matched by identity 0 +peer1.org1.example.com | [3c67 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org1.example.com | [3c68 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org1.example.com | [3c69 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041645d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3c6a 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041645d0 gate 1598907145945732000 evaluation succeeds +peer1.org1.example.com | [3c6b 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c6c 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c6d 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3c6e 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3c6f 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org1.example.com | [3c70 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org1.example.com | [3c71 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c72 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c73 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3c74 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c75 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c76 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3c77 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3c78 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3c79 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004165ec0 gate 1598907145946900900 evaluation starts +peer1.org1.example.com | [3c7a 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004165ec0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c7b 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004165ec0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3c7c 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004165ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3c7d 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004165ec0 principal evaluation fails +peer1.org1.example.com | [3c7e 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004165ec0 gate 1598907145946900900 evaluation fails +peer0.org2.example.com | [3ec7 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3ec8 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3ec9 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [3eca 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:42714 disconnected +peer0.org2.example.com | [3ecd 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:52:29.58Z grpc.peer_address=172.18.0.5:42714 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=69.2574ms +peer0.org2.example.com | [3eb3 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org2.example.com | [3ece 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org2.example.com | [3ecf 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +peer0.org2.example.com | [3ed0 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +peer0.org2.example.com | [3ed1 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +peer0.org2.example.com | [3ed2 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ed3 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +peer0.org2.example.com | [3ed4 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3ed5 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ed6 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3ed8 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3ed9 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3eda 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3ed7 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xee, 0x50, 0x5e, 0x32, 0xbb, 0x9a, 0x52, 0xe4, 0xd5, 0xa5, 0xcd, 0xd8, 0x92, 0x7, 0xb9, 0x48, 0x99, 0xcf, 0x4a, 0x4f, 0xd4, 0x14, 0x2, 0xe7, 0xd3, 0xba, 0x81, 0x57, 0xfe, 0x38, 0x65, 0xd} txOffsets= +peer1.org2.example.com | [412c 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [412d 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [412e 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [412f 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4130 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4131 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4132 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\326Ah\363r\002\376\270\275\262\007\020y\202\346sb" > +peer1.org2.example.com | [4133 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [4134 08-31 20:52:25.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4135 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [4136 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [4137 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [4138 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4139 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [413a 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [413b 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [413c 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [413d 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 46 eb 2e 41 1c e8 c9 f9 6c 23 22 92 30 0a ca |.F..A....l#".0..| +peer1.org2.example.com | 00000010 42 2a e9 22 dc 20 28 4b 8f af 99 96 bb b5 2d f2 |B*.". (K......-.| +peer1.org2.example.com | [413e 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db c1 ce d6 c6 69 dc f3 b2 2b 04 |0E.!......i...+.| +peer1.org2.example.com | 00000010 da 06 7f c6 bf d7 a5 be 66 4b ac 61 04 e2 97 7c |........fK.a...|| +peer1.org2.example.com | 00000020 79 85 42 1e 83 02 20 0d b0 13 a3 da 93 f6 98 16 |y.B... .........| +peer1.org2.example.com | 00000030 b2 d6 a6 c9 5c bd ca d3 51 d3 c7 61 0f dd 14 d0 |....\...Q..a....| +peer1.org2.example.com | 00000040 0b 30 0a fb ce ce 88 |.0.....| +peer1.org2.example.com | [413f 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4140 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [4141 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4142 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4143 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [4144 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4145 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4146 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3acc 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3acd 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ace 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3acf 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ad0 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [3ad1 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ad2 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ad3 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3ad4 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [3ad5 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ad6 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ad7 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ad8 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ad9 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ada 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3adb 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3adc 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3add 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ade 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3adf 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ae0 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [3ae1 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ae2 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ae3 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ae4 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ae5 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ae6 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [3ae7 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c7f 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3c80 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3c81 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3c82 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e430 gate 1598907145947137200 evaluation starts +peer1.org1.example.com | [3c83 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e430 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c84 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e430 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3c85 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e430 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3c86 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e430 principal evaluation fails +peer1.org1.example.com | [3c87 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e430 gate 1598907145947137200 evaluation fails +peer1.org1.example.com | [3c88 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c89 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3c8a 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3c8b 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e9a0 gate 1598907145947369100 evaluation starts +peer1.org1.example.com | [3c8c 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e9a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3c8d 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e9a0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3c8e 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e9a0 principal matched by identity 0 +peer1.org1.example.com | [3c8f 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org1.example.com | [3c90 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org1.example.com | [3c91 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e9a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3c92 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417e9a0 gate 1598907145947369100 evaluation succeeds +peer1.org1.example.com | [3c93 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c94 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3c95 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3c96 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3c97 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3c98 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [3c99 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c9a 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c9b 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3c9c 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3c9d 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c9e 08-31 20:52:25.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3c9f 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3ca0 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3ca1 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3ca2 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417fdf0 gate 1598907145952973000 evaluation starts +peer0.org1.example.com | [3ae8 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ae9 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3aea 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3aeb 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3aec 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3aed 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3aee 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cf120 gate 1598907137500386300 evaluation starts +peer0.org1.example.com | [3aef 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cf120 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3af0 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cf120 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3af1 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cf120 principal matched by identity 0 +peer0.org1.example.com | [3af2 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a d6 45 b8 d3 22 dd e5 7e a8 88 56 61 c5 0c 0b |..E.."..~..Va...| +peer0.org1.example.com | 00000010 b2 c7 e3 7c ec b2 ab 8a a3 4b b3 50 99 fc cd f9 |...|.....K.P....| +peer0.org1.example.com | [3af3 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a df 5d bf 7e 74 a9 28 a5 f6 2b be |0D. J.].~t.(..+.| +peer0.org1.example.com | 00000010 9c 6a 08 bc b8 9b cb c9 fa 11 1c a7 6b 8c d8 ff |.j..........k...| +peer0.org1.example.com | 00000020 35 76 a0 1b 02 20 32 4d 85 2d 6e 53 fc c7 18 7a |5v... 2M.-nS...z| +peer0.org1.example.com | 00000030 b7 d2 42 de 2a 9e 7a cf 2c 00 f6 b6 b4 2c 7c 02 |..B.*.z.,....,|.| +peer0.org1.example.com | 00000040 3d 3c f7 3d 17 da |=<.=..| +peer0.org1.example.com | [3af4 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cf120 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3af5 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cf120 gate 1598907137500386300 evaluation succeeds +peer0.org1.example.com | [3af6 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3af7 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3af8 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3af9 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3afa 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3afb 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3afc 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3afd 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3afe 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3aff 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b00 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b01 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b02 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [3b03 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b04 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b05 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b06 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3b07 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [3b08 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b09 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b0a 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3b0b 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3b0c 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [3b0d 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3b0e 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [3b0f 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3b10 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b11 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b12 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b13 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b14 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b15 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b16 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b17 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b18 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b19 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b1a 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | txId=7f1fe83799f527adf316dfcd38e1f157d571d6adfecc0451fce63bd20f6fd24b locPointer=offset=71, bytesLength=40147 +peer0.org2.example.com | ] +peer0.org2.example.com | [3ecc 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [3ecb 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" tls_cert_hash:"\006\275\267-\313G.\241\027\030p\331/\337p\211\2162\307\352\260\033\202\t\340Z|rF~\242\374" from 172.18.0.7:7051 +peer0.org2.example.com | [3edc 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97638, bytesLength=40147] for tx ID: [7f1fe83799f527adf316dfcd38e1f157d571d6adfecc0451fce63bd20f6fd24b] to txid-index +peer0.org2.example.com | [3edd 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ca 60 da 52 c5 a3 71 f2 aa 0f bd bc 75 4c bc 17 |.`.R..q.....uL..| +peer0.org2.example.com | 00000010 72 45 be db 3b 75 d6 9f 6c 28 52 64 e2 e7 9f 55 |rE..;u..l(Rd...U| +peer0.org2.example.com | [3ee0 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 cd 5a da 68 13 f3 bf 97 86 38 |0E.!...Z.h.....8| +peer0.org2.example.com | 00000010 ce f2 f2 ca da ef 37 0e 59 1a f1 f7 2c b2 5b 87 |......7.Y...,.[.| +peer0.org2.example.com | 00000020 f1 8a 66 de 59 02 20 70 1e 27 2c 8f c0 b9 f7 bf |..f.Y. p.',.....| +peer0.org2.example.com | 00000030 82 36 3c cd 5c 9f 70 9f 6f 0c 4b b3 05 56 c2 56 |.6<.\.p.o.K..V.V| +peer0.org2.example.com | 00000040 7b 74 4d cd 35 94 25 |{tM.5.%| +peer0.org2.example.com | [3ee1 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [3ee2 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 95 6e e0 dc 76 d2 87 52 0c bd 37 |0D. ..n..v..R..7| +peer0.org2.example.com | 00000010 d7 58 57 90 39 1a de cd e1 f9 aa 23 9e d4 f0 55 |.XW.9......#...U| +peer0.org2.example.com | 00000020 fb de 16 a8 02 20 49 a0 fe bb 36 e6 8f 04 dc ff |..... I...6.....| +peer0.org2.example.com | 00000030 02 17 ae 33 9a b2 cf 41 a8 50 9a ec 89 48 d7 a0 |...3...A.P...H..| +peer0.org2.example.com | 00000040 98 17 88 84 6c 41 |....lA| +peer0.org2.example.com | [3ee3 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [3ee4 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [3ee5 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3ee6 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3ee7 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3ee8 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ee9 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3eea 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3eeb 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [3eec 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3eed 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3eee 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org2.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org2.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org2.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org2.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org2.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer1.org2.example.com | [4147 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4148 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4149 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [414a 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [414b 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [414c 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [414d 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [414e 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [414f 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4150 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4151 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4152 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4153 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4154 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4155 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4156 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4157 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4158 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4159 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [415a 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [415b 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [415c 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [415d 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [415e 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e4 b0 84 4b 07 df 73 7a 11 0c 44 35 9d 1d 7f |....K..sz..D5...| +peer1.org2.example.com | 00000010 f5 f0 fa 1e d7 a5 c0 10 5a 6a e8 0d 87 44 2e 4e |........Zj...D.N| +peer1.org2.example.com | [415f 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 33 f0 79 6c 51 c3 d7 39 cb eb |0E.!..3.ylQ..9..| +peer1.org2.example.com | 00000010 c3 16 f3 19 8f 04 6d c3 41 aa ea cf 84 60 d0 c7 |......m.A....`..| +peer1.org2.example.com | 00000020 9f 18 6f 34 a8 02 20 6f 81 d6 42 16 92 06 21 50 |..o4.. o..B...!P| +peer1.org2.example.com | 00000030 32 3a 12 4c b6 fe d5 74 02 3a 69 81 62 43 8e a6 |2:.L...t.:i.bC..| +peer1.org2.example.com | 00000040 7c 6a ba 25 70 78 59 ||j.%pxY| +peer1.org2.example.com | [4160 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [4161 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 7f 3b 64 50 f7 2e f7 1c d9 f5 07 |0D. ..;dP.......| +peer1.org1.example.com | [3ca3 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417fdf0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ca4 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417fdf0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3ca5 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417fdf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3ca6 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417fdf0 principal evaluation fails +peer1.org1.example.com | [3ca7 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00417fdf0 gate 1598907145952973000 evaluation fails +peer1.org1.example.com | [3ca8 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3ca9 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3caa 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3cab 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419a360 gate 1598907145953228300 evaluation starts +peer1.org1.example.com | [3cac 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419a360 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3cad 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419a360 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3cae 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419a360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3caf 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419a360 principal evaluation fails +peer1.org1.example.com | [3cb0 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419a360 gate 1598907145953228300 evaluation fails +peer1.org1.example.com | [3cb1 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3cb2 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3cb3 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3cb4 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419a8d0 gate 1598907145953581300 evaluation starts +peer1.org1.example.com | [3cb5 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419a8d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3cb6 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419a8d0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3cb7 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419a8d0 principal matched by identity 0 +peer1.org1.example.com | [3cb8 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org1.example.com | [3cb9 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org1.example.com | [3cba 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419a8d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3cbb 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00419a8d0 gate 1598907145953581300 evaluation succeeds +peer1.org1.example.com | [3cbc 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3cbd 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3cbe 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3cbf 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3cc0 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org1.example.com | [3cc1 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org1.example.com | [3cc2 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org1.example.com | [3cc3 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org1.example.com | [3cc4 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cc5 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000010 d0 58 69 39 46 bb 32 1b 7c 11 cf 89 21 0c c7 a5 |.Xi9F.2.|...!...| +peer1.org2.example.com | 00000020 f5 f2 7f 06 02 20 4e db d7 d6 fd a6 78 9e ab be |..... N.....x...| +peer1.org2.example.com | 00000030 ba fc 3f 22 ab 3a 29 f1 97 97 16 1d dd 1c 0d 4d |..?".:)........M| +peer1.org2.example.com | 00000040 61 28 65 4b 30 0c |a(eK0.| +peer1.org2.example.com | [4162 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [4163 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [4164 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [4165 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4166 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [4167 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4168 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4169 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [416a 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [416b 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [416c 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [416d 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [416e 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [416f 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4170 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\326Ah\363r\002\376\270\275\262\007\020y\202\346sb" > +peer1.org2.example.com | [4171 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4172 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4173 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4174 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [4175 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4176 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4177 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4178 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4179 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [417a 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [417b 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [417c 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [417d 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [417e 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [417f 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4180 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4181 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4182 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4183 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4184 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4185 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4186 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad44f0 gate 1598907145537438600 evaluation starts +peer1.org2.example.com | [4187 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad44f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4188 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad44f0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4189 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad44f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [418a 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad44f0 principal evaluation fails +peer1.org2.example.com | [418b 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad44f0 gate 1598907145537438600 evaluation fails +peer1.org2.example.com | [418c 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [418d 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [418e 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [418f 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad4a60 gate 1598907145539070500 evaluation starts +peer1.org2.example.com | [4190 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad4a60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4191 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad4a60 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4192 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad4a60 principal matched by identity 0 +peer1.org2.example.com | [4193 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd e8 4a fb d3 45 42 77 a9 86 75 78 67 29 80 85 |..J..EBw..uxg)..| +peer1.org2.example.com | 00000010 6f 12 c4 de 2d 89 80 5d 19 bd 52 56 0c b1 71 af |o...-..]..RV..q.| +peer1.org2.example.com | [4194 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 a8 7b 3b 5b fe fd 46 83 d2 17 |0E.!...{;[..F...| +peer1.org2.example.com | 00000010 0a 63 9c 71 0f e1 13 d9 8f f3 25 2e 6a 8e 91 a1 |.c.q......%.j...| +peer1.org2.example.com | 00000020 3e 0b 9c bf af 02 20 31 4f 57 9f 75 28 33 95 b1 |>..... 1OW.u(3..| +peer1.org2.example.com | 00000030 68 0a 14 8a 0a 66 c4 81 04 e2 37 1e d2 19 56 7f |h....f....7...V.| +peer1.org2.example.com | 00000040 bc a6 2e 8e ab e1 0f |.......| +peer1.org2.example.com | [4195 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad4a60 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4196 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ad4a60 gate 1598907145539070500 evaluation succeeds +peer1.org2.example.com | [4197 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4198 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4199 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [419a 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [419b 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [419c 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [419d 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [419e 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3cc6 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3cc7 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3cc8 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3cc9 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3cca 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3ccb 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3ccc 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ba8b0 gate 1598907145954942400 evaluation starts +peer1.org1.example.com | [3ccd 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ba8b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3cce 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ba8b0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3ccf 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ba8b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3cd0 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ba8b0 principal evaluation fails +peer1.org1.example.com | [3cd1 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ba8b0 gate 1598907145954942400 evaluation fails +peer1.org1.example.com | [3cd2 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3cd3 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3cd4 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3cd5 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bae20 gate 1598907145955176000 evaluation starts +peer1.org1.example.com | [3cd6 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bae20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3cd7 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bae20 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3cd8 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bae20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3cd9 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bae20 principal evaluation fails +peer1.org1.example.com | [3cda 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bae20 gate 1598907145955176000 evaluation fails +peer1.org1.example.com | [3cdb 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3cdc 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3cdd 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3cde 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bb390 gate 1598907145955537400 evaluation starts +peer1.org1.example.com | [3cdf 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bb390 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ce0 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bb390 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3ce1 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bb390 principal matched by identity 0 +peer1.org1.example.com | [3ce2 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org1.example.com | [3ce3 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org1.example.com | [3ce4 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bb390 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3ce5 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041bb390 gate 1598907145955537400 evaluation succeeds +peer1.org1.example.com | [3ce6 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ce7 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ce8 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3ce9 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3cea 08-31 20:52:25.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ceb 08-31 20:52:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cec 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ced 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [3cee 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cef 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cf0 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3cf1 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [3cf2 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3cf3 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org1.example.com | [3cf4 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org1.example.com | [3cf5 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3cf6 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3cf7 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cf8 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cf9 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cfa 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3cfb 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3cfc 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cfd 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cfe 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3cff 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d00 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer1.org1.example.com | [3d01 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b 7e a2 12 2f a2 76 3f ca 16 38 7b d9 a2 69 ec |.~../.v?..8{..i.| +peer1.org1.example.com | 00000010 d2 65 f0 79 b8 cb aa 8f 24 b1 e0 57 8d ce 7a 97 |.e.y....$..W..z.| +peer1.org1.example.com | [3d02 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0c 99 6b 03 49 cf ca 3c cc 65 bc 31 |0D. ..k.I..<.e.1| +peer1.org1.example.com | 00000010 f4 bf 48 34 e8 6d cd 41 78 8d 68 d7 aa d6 ae 84 |..H4.m.Ax.h.....| +peer1.org1.example.com | 00000020 13 6c b3 13 02 20 4d 62 b9 c0 22 ca 59 14 a5 ff |.l... Mb..".Y...| +peer1.org1.example.com | 00000030 88 e5 f0 0e 99 6c a0 fd 09 80 8d f6 80 6c c9 73 |.....l.......l.s| +peer1.org1.example.com | 00000040 d8 87 7f 8e 7f cd |......| +peer1.org1.example.com | [3d03 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d04 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d05 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d06 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [3d07 08-31 20:52:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d08 08-31 20:52:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d09 08-31 20:52:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d0a 08-31 20:52:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d0b 08-31 20:52:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d0c 08-31 20:52:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d0d 08-31 20:52:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d0e 08-31 20:52:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d0f 08-31 20:52:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [3d10 08-31 20:52:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d11 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d12 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d13 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [3eef 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ef0 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 9256576129007349551, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3b1b 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b1c 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b1d 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [419f 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [41a0 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41a1 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41a2 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41a3 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41a4 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41a5 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41a6 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41a7 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41a8 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41a9 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [41aa 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41ab 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41ac 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [41ad 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [41ae 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41af 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [41b0 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41b1 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [41b2 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [41b3 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41b4 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [41b5 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41b6 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [41b7 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41b8 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [41b9 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41ba 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [41bb 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41bc 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [41bd 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [41be 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d14 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3d15 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d16 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3d17 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d18 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d19 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3d1a 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3d1b 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3d1c 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d3740 gate 1598907149107365600 evaluation starts +peer1.org1.example.com | [3d1d 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d3740 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d1e 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d3740 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3d1f 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d3740 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3d20 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d3740 principal evaluation fails +peer1.org1.example.com | [3d21 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d3740 gate 1598907149107365600 evaluation fails +peer1.org1.example.com | [3d22 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3d23 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3d24 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3d25 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d3cb0 gate 1598907149111585600 evaluation starts +peer1.org1.example.com | [3d26 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d3cb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d27 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d3cb0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3d28 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d3cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3d29 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d3cb0 principal evaluation fails +peer1.org1.example.com | [3d2a 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d3cb0 gate 1598907149111585600 evaluation fails +peer1.org1.example.com | [3d2b 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3d2c 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3d2d 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3d2e 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004216220 gate 1598907149113940700 evaluation starts +peer1.org1.example.com | [3d2f 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004216220 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d30 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004216220 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3d31 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004216220 principal matched by identity 0 +peer1.org1.example.com | [3d32 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 c6 aa ca 4b 34 fb 28 1b f8 14 65 62 8b 48 9a |....K4.(...eb.H.| +peer1.org1.example.com | 00000010 25 8b 97 16 05 19 3a 40 85 36 e0 f5 0f f4 c9 e1 |%.....:@.6......| +peer1.org1.example.com | [3d33 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 8c 08 ce a8 0d f4 e2 1c 0f 72 |0E.!...........r| +peer1.org1.example.com | 00000010 af 0a d7 f2 ba 8a 90 26 28 d4 cc a1 a8 9e 2f b5 |.......&(...../.| +peer1.org1.example.com | 00000020 fc 9b d7 0a 6a 02 20 2c ed 4a 62 87 c0 d5 27 65 |....j. ,.Jb...'e| +peer1.org1.example.com | 00000030 76 8c 5b 0d f0 5c 57 e1 52 14 32 7c 49 ec e9 1b |v.[..\W.R.2|I...| +peer1.org1.example.com | 00000040 a0 fc ff 7f be b6 c9 |.......| +peer1.org1.example.com | [3d34 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004216220 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3d35 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004216220 gate 1598907149113940700 evaluation succeeds +peer1.org1.example.com | [3d36 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3d37 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3d38 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3d39 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3d3a 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3d3b 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3d3c 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3d3d 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3d3e 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3d3f 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d40 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d41 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d42 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [3d43 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d44 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d45 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d46 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3d47 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org1.example.com | [3d48 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d49 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d4a 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [3d4b 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3d4c 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [3d4d 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3d4e 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [3d4f 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3d50 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d51 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d52 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d53 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d54 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d55 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d56 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d57 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d58 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41bf 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [41c0 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [41c1 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [41c2 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [41c3 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [41c4 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [41c5 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b08cb0 gate 1598907145611826200 evaluation starts +peer1.org2.example.com | [41c6 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b08cb0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [41c7 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b08cb0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [41c8 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b08cb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [41c9 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b08cb0 principal evaluation fails +peer1.org2.example.com | [41ca 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b08cb0 gate 1598907145611826200 evaluation fails +peer1.org2.example.com | [41cb 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [41cc 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [41cd 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [41ce 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b09220 gate 1598907145617930000 evaluation starts +peer1.org2.example.com | [41cf 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b09220 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [41d0 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b09220 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [41d1 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b09220 principal matched by identity 0 +peer1.org2.example.com | [41d2 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 6f bc e6 0e 08 91 b2 0a 67 44 c2 14 2e dc 99 |.o.......gD.....| +peer1.org2.example.com | 00000010 d6 c7 15 c7 53 70 16 ae 4b 70 12 96 0c f6 e9 86 |....Sp..Kp......| +peer1.org2.example.com | [41d3 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 fc 7d 0e ee ef b1 04 45 2d 8e |0E.!...}.....E-.| +peer1.org2.example.com | 00000010 b5 09 4e 13 39 28 76 7e 53 53 d0 bd 17 48 eb 7d |..N.9(v~SS...H.}| +peer1.org2.example.com | 00000020 2a 28 83 40 6c 02 20 55 00 c7 99 e9 e2 6c 60 8d |*(.@l. U.....l`.| +peer1.org2.example.com | 00000030 3a 32 f6 d1 cb 98 7b d9 21 47 a3 3c 8c 63 f4 9d |:2....{.!G.<.c..| +peer1.org2.example.com | 00000040 04 f5 d4 cc 5e b2 19 |....^..| +peer1.org2.example.com | [41d4 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b09220 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [41d5 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b09220 gate 1598907145617930000 evaluation succeeds +peer1.org2.example.com | [41d6 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [41d7 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [41d8 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [41d9 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [41da 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [41db 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [41dc 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [41dd 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [41de 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [41df 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41e0 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41e1 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41e2 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [41e3 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41e4 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41e5 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b1e 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b1f 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b20 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b21 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3b22 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161033 +peer0.org1.example.com | [3b23 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E6DA9559CED7FE407CA70A118B6D52832DBEB8A294B089D745A7E59AE9AFACB5 +peer0.org1.example.com | [3b24 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3b25 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3b26 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3b27 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\362(\330/" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3b28 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b29 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\362(\330/" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3b2a 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b2b 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\362(\330/" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3b2c 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\362(\330/" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b2d 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b2e 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\362(\330/" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b2f 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b30 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\362(\330/" > > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b31 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b32 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b33 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b34 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b35 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3b36 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 da 95 59 ce d7 fe 40 7c a7 0a 11 8b 6d 52 83 |...Y...@|....mR.| +peer0.org1.example.com | 00000010 2d be b8 a2 94 b0 89 d7 45 a7 e5 9a e9 af ac b5 |-.......E.......| +peer0.org1.example.com | [3b37 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 2f 13 1a f1 c2 e8 a9 04 93 83 c5 |0D. A/..........| +peer0.org1.example.com | 00000010 2a 5c 62 67 80 5a 77 68 97 90 5d f1 44 b4 54 1e |*\bg.Zwh..].D.T.| +peer0.org1.example.com | 00000020 28 da c0 4c 02 20 31 cd ee 59 6c 01 74 19 e1 9e |(..L. 1..Yl.t...| +peer0.org1.example.com | 00000030 87 29 cf 3c 72 70 90 58 15 c2 3c 7f 85 47 fa 36 |.)..(./| +peer0.org1.example.com | [3b38 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [3b39 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 bc d0 f7 c8 5e 81 96 33 f1 5a |0E.!......^..3.Z| +peer0.org1.example.com | 00000010 34 f5 bb 6b d7 e3 6b 57 50 73 60 0c 69 dc 53 f9 |4..k..kWPs`.i.S.| +peer0.org1.example.com | 00000020 8c bd f9 63 62 02 20 64 93 b7 84 37 92 c8 0e cf |...cb. d...7....| +peer0.org1.example.com | 00000030 5a 74 ea a8 dd c4 f8 b6 f9 b0 44 2f fd ea aa 10 |Zt........D/....| +peer0.org1.example.com | 00000040 ee 70 d3 79 07 04 b5 |.p.y...| +peer0.org1.example.com | [3b3a 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [3b3b 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [3b3c 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b3d 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b3e 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b3f 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b40 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b41 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b42 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [3b43 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b44 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3b45 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3b46 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3b47 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3b48 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3b49 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3b4a 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483c2c0 gate 1598907137606775800 evaluation starts +peer0.org1.example.com | [3b4b 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483c2c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3b4c 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483c2c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3b4d 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483c2c0 principal matched by identity 0 +peer0.org1.example.com | [3b4e 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a d6 45 b8 d3 22 dd e5 7e a8 88 56 61 c5 0c 0b |..E.."..~..Va...| +peer0.org1.example.com | 00000010 b2 c7 e3 7c ec b2 ab 8a a3 4b b3 50 99 fc cd f9 |...|.....K.P....| +peer0.org1.example.com | [3b4f 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a df 5d bf 7e 74 a9 28 a5 f6 2b be |0D. J.].~t.(..+.| +peer0.org1.example.com | 00000010 9c 6a 08 bc b8 9b cb c9 fa 11 1c a7 6b 8c d8 ff |.j..........k...| +peer0.org1.example.com | 00000020 35 76 a0 1b 02 20 32 4d 85 2d 6e 53 fc c7 18 7a |5v... 2M.-nS...z| +peer0.org1.example.com | 00000030 b7 d2 42 de 2a 9e 7a cf 2c 00 f6 b6 b4 2c 7c 02 |..B.*.z.,....,|.| +peer0.org1.example.com | 00000040 3d 3c f7 3d 17 da |=<.=..| +peer0.org1.example.com | [3b50 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483c2c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3b51 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483c2c0 gate 1598907137606775800 evaluation succeeds +peer0.org1.example.com | [3b52 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [3ef1 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [3ef2 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9256576129007349551, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes +peer0.org2.example.com | [3ef3 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [3edb 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3ef4 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3ef5 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e41c0 gate 1598907139672173300 evaluation starts +peer0.org2.example.com | [3ef6 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e41c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3ef7 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e41c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3ef8 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e41c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3ef9 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e41c0 principal evaluation fails +peer0.org2.example.com | [3efa 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e41c0 gate 1598907139672173300 evaluation fails +peer0.org2.example.com | [3efb 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3efc 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3efd 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3efe 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e4750 gate 1598907139673293100 evaluation starts +peer0.org2.example.com | [3eff 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e4750 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f00 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e4750 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3f01 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [3f02 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [3f03 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [3f04 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e4750 principal matched by identity 0 +peer0.org2.example.com | [3f05 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org2.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org2.example.com | [3f06 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 89 2c f7 21 ea 16 3b d4 7d 95 0c |0D. >.,.!..;.}..| +peer0.org2.example.com | 00000010 82 13 16 da 47 b9 1b ab 70 57 98 19 8f 50 db d9 |....G...pW...P..| +peer0.org2.example.com | 00000020 56 47 fc d0 02 20 07 5e c3 d4 53 8e 91 8f 9d a0 |VG... .^..S.....| +peer0.org2.example.com | 00000030 1a ca bb 08 f0 20 14 41 13 bb 23 c8 9a bf 26 20 |..... .A..#...& | +peer0.org2.example.com | 00000040 83 12 50 8e 7d da |..P.}.| +peer0.org2.example.com | [3f07 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [3f08 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [3f09 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +peer0.org2.example.com | [3f0a 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [3f0b 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003753300, CONNECTING +peer0.org2.example.com | [3ede 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f0c 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e4750 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3f0d 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e4750 gate 1598907139673293100 evaluation succeeds +peer0.org2.example.com | [3f0e 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [3f0f 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f10 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f11 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [3f12 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3f13 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [41e6 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [41e7 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\326Ah\363r\002\376\270\275\262\007\020y\202\346sb" > +peer1.org2.example.com | [41e8 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [41e9 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41ea 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [41eb 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41ec 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41ed 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41ee 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41ef 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [41f0 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [41f1 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41f2 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41f3 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41f4 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41f5 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [41f6 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41f7 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41f8 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41f9 08-31 20:52:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [41fa 08-31 20:52:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [41fb 08-31 20:52:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [41fc 08-31 20:52:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [41fd 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41fe 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [41ff 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [4200 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4201 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4202 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4203 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4204 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4205 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4206 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4207 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org2.example.com | [3f14 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3f15 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f16 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:34650 +peer0.org2.example.com | [3f18 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3f19 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f1a 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3f1b 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f1c 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f1d 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3f1e 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3f1f 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3f20 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cac60 gate 1598907139677824600 evaluation starts +peer0.org2.example.com | [3f21 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cac60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f22 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cac60 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3f23 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cac60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3f24 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cac60 principal evaluation fails +peer0.org2.example.com | [3f25 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cac60 gate 1598907139677824600 evaluation fails +peer0.org2.example.com | [3f26 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f27 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f28 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3f29 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cb1f0 gate 1598907139679119000 evaluation starts +peer0.org2.example.com | [3f2a 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cb1f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f2b 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cb1f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3f2c 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org2.example.com | [3f2d 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org2.example.com | [3f2e 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org2.example.com | [3f2f 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cb1f0 principal matched by identity 0 +peer0.org2.example.com | [3f30 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [3f17 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:34650 +peer0.org2.example.com | [3edf 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97638, bytesLength=40147] for tx number:[0] ID: [7f1fe83799f527adf316dfcd38e1f157d571d6adfecc0451fce63bd20f6fd24b] to blockNumTranNum index +peer0.org2.example.com | [3f31 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 8f 7b 3a dd 7a b3 8f e6 85 0d |0E.!...{:.z.....| +peer0.org2.example.com | 00000010 cd cb d7 8f 33 fd f4 20 80 90 ee 81 c2 90 37 ac |....3.. ......7.| +peer0.org2.example.com | 00000020 a2 b8 c3 10 94 02 20 76 69 8d 70 68 f6 16 ab 98 |...... vi.ph....| +peer0.org2.example.com | 00000030 c2 80 66 6b a7 af 1b 42 01 54 e9 47 0a fa a8 e7 |..fk...B.T.G....| +peer0.org2.example.com | 00000040 5f f6 d2 98 d1 6e 1f |_....n.| +peer0.org2.example.com | [3f32 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [3f33 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:34440 disconnected +peer0.org2.example.com | [3f34 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cb1f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3f37 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037cb1f0 gate 1598907139679119000 evaluation succeeds +peer0.org2.example.com | [3f38 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f39 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f3a 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3f3b 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3f3c 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org2.example.com | [3f3d 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f3e 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3f3f 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161039 +peer0.org2.example.com | [3f40 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7A1980E786741FD5288651EA420D54550F88B0264E0A2D270DE5456DF3066E59 +peer0.org2.example.com | [3f41 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3f42 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [3f43 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [3f44 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f45 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:11960660938038967932 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [3f46 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: nonce:11960660938038967932 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [3f4a 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org1.example.com:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [3f47 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003753300, READY +peer0.org2.example.com | [3f36 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:34650 disconnected +peer0.org2.example.com | [3f48 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org2.example.com | [3f35 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:34440 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m15.5945733s +peer0.org2.example.com | [3f49 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3f4b 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:52:29.627Z grpc.peer_address=172.18.0.8:34650 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=72.0483ms +peer0.org1.example.com | [3b53 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3b54 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3b55 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3b56 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b57 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b58 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3b59 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 da 95 59 ce d7 fe 40 7c a7 0a 11 8b 6d 52 83 |...Y...@|....mR.| +peer0.org1.example.com | 00000010 2d be b8 a2 94 b0 89 d7 45 a7 e5 9a e9 af ac b5 |-.......E.......| +peer0.org1.example.com | [3b5a 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 2f 13 1a f1 c2 e8 a9 04 93 83 c5 |0D. A/..........| +peer0.org1.example.com | 00000010 2a 5c 62 67 80 5a 77 68 97 90 5d f1 44 b4 54 1e |*\bg.Zwh..].D.T.| +peer0.org1.example.com | 00000020 28 da c0 4c 02 20 31 cd ee 59 6c 01 74 19 e1 9e |(..L. 1..Yl.t...| +peer0.org1.example.com | 00000030 87 29 cf 3c 72 70 90 58 15 c2 3c 7f 85 47 fa 36 |.)..(./| +peer0.org1.example.com | [3b5b 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b5c 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b5d 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b5e 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3b5f 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e0 5b ad 9b cf 6e 40 c0 f1 40 11 cb 74 25 eb |..[...n@..@..t%.| +peer0.org1.example.com | 00000010 c1 ba 77 23 51 12 91 bf 1f c3 b4 cd 49 6e bc 28 |..w#Q.......In.(| +peer0.org1.example.com | [3b60 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 11 9b 13 4b 9c 6c fc a8 d4 78 |0E.!.....K.l...x| +peer0.org1.example.com | 00000010 76 89 ae 84 b1 25 60 5c 18 f4 05 22 ef f7 5e 24 |v....%`\..."..^$| +peer0.org1.example.com | 00000020 da 0e 69 39 5d 02 20 33 c3 49 af 4c d1 cd 87 ad |..i9]. 3.I.L....| +peer0.org1.example.com | 00000030 c0 da 6c 1f 69 0c 99 cb 76 c8 42 6d 5e f6 4c e0 |..l.i...v.Bm^.L.| +peer0.org1.example.com | 00000040 d7 4d 22 89 0c ad 87 |.M"....| +peer0.org1.example.com | [3b61 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3b62 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b63 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b64 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b65 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b66 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b67 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b68 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3b69 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 da 95 59 ce d7 fe 40 7c a7 0a 11 8b 6d 52 83 |...Y...@|....mR.| +peer0.org1.example.com | 00000010 2d be b8 a2 94 b0 89 d7 45 a7 e5 9a e9 af ac b5 |-.......E.......| +peer0.org1.example.com | [3b6a 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 2f 13 1a f1 c2 e8 a9 04 93 83 c5 |0D. A/..........| +peer0.org1.example.com | 00000010 2a 5c 62 67 80 5a 77 68 97 90 5d f1 44 b4 54 1e |*\bg.Zwh..].D.T.| +peer0.org1.example.com | 00000020 28 da c0 4c 02 20 31 cd ee 59 6c 01 74 19 e1 9e |(..L. 1..Yl.t...| +peer0.org1.example.com | 00000030 87 29 cf 3c 72 70 90 58 15 c2 3c 7f 85 47 fa 36 |.)..(./| +peer0.org1.example.com | [3b6b 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b6c 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b6d 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b6e 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3b6f 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e0 5b ad 9b cf 6e 40 c0 f1 40 11 cb 74 25 eb |..[...n@..@..t%.| +peer0.org1.example.com | 00000010 c1 ba 77 23 51 12 91 bf 1f c3 b4 cd 49 6e bc 28 |..w#Q.......In.(| +peer0.org2.example.com | [3f4c 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [3f4d 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b canceling read because closing +peer0.org2.example.com | [3f4e 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [3f4f 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org1.example.com:7051 0 }] +peer0.org2.example.com | [3f50 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [3f53 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00381eed0, CONNECTING +peer0.org2.example.com | [3f54 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3f55 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [3f56 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [3f57 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org2.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org2.example.com | [3f62 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 c3 bf 4d 3e 6b c4 38 1a 5e c9 ea |0D. 1..M>k.8.^..| +peer0.org2.example.com | 00000010 d4 c5 2f 55 39 4d 9e 24 7c 40 c1 20 c7 0c 45 15 |../U9M.$|@. ..E.| +peer0.org2.example.com | 00000020 55 99 a0 be 02 20 6b d0 ce 77 17 68 cf e8 c2 2c |U.... k..w.h...,| +peer0.org2.example.com | 00000030 75 e0 46 2f 64 e7 fe f0 0b 46 a5 d2 a2 37 14 7b |u.F/d....F...7.{| +peer0.org2.example.com | 00000040 f4 81 d4 d2 29 73 |....)s| +peer0.org2.example.com | [3f63 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer0.org2.example.com | [3f64 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f65 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [3f66 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3f67 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3f68 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3f69 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org2.example.com | [3f6a 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +peer0.org2.example.com | [3f6b 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +peer0.org2.example.com | [3f6d 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +peer0.org2.example.com | [3f6c 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org2.example.com | [3f6e 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +peer0.org2.example.com | [3f6f 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +peer0.org2.example.com | [3f70 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org2.example.com | [3f71 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3f72 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +peer0.org2.example.com | [3f73 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 172ms (state_validation=85ms block_and_pvtdata_commit=66ms state_commit=17ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +peer0.org2.example.com | [3f74 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3f75 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408B0BECFA2F8AF9D9816...08071A0C0A0565787030321203312E30 +peer0.org2.example.com | [3f76 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 13FD5008CF2C7FC83307BC5C1F299B93EDB29AE8D2413847CFE8922650E8F057 +peer0.org2.example.com | [3f77 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +peer0.org2.example.com | [3f78 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [3f79 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00381eed0, READY +peer0.org2.example.com | [3f7a 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3f7b 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [3f7c 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [3f7d 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: DEBU Obtaining identity +peer0.org2.example.com | [3f80 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3f81 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f82 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3f83 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3f84 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3f85 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f86 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3f87 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3f88 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3f89 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3f8a 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398efa0 gate 1598907139756155000 evaluation starts +peer0.org2.example.com | [3f8b 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398efa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f8c 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398efa0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3f8d 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398efa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3f8e 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398efa0 principal evaluation fails +peer0.org2.example.com | [3f8f 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398efa0 gate 1598907139756155000 evaluation fails +peer0.org2.example.com | [3f90 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f91 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3f92 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3f93 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398f510 gate 1598907139758945700 evaluation starts +peer0.org2.example.com | [3f94 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398f510 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3f95 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398f510 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3f96 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398f510 principal matched by identity 0 +peer0.org2.example.com | [3f97 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2f ee 22 32 0c da 94 a4 ce 0c cd c9 aa 73 ac 98 |/."2.........s..| +peer0.org2.example.com | 00000010 99 18 0c 54 12 81 3a df 1c 16 3a ce 1b cf 86 4a |...T..:...:....J| +peer0.org2.example.com | [3f98 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa ee bb da 52 df 62 33 0c d5 91 |0E.!.....R.b3...| +peer0.org2.example.com | 00000010 37 09 8b 4b a5 27 27 44 6c f2 c7 ac 15 d6 ed cd |7..K.''Dl.......| +peer0.org2.example.com | 00000020 03 49 f8 ac fc 02 20 07 97 76 81 07 7f e2 5e dc |.I.... ..v....^.| +peer0.org2.example.com | 00000030 e9 af a9 df ab cc 8b 16 65 75 b2 ca e2 f3 fb a8 |........eu......| +peer0.org1.example.com | [3b70 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 11 9b 13 4b 9c 6c fc a8 d4 78 |0E.!.....K.l...x| +peer0.org1.example.com | 00000010 76 89 ae 84 b1 25 60 5c 18 f4 05 22 ef f7 5e 24 |v....%`\..."..^$| +peer0.org1.example.com | 00000020 da 0e 69 39 5d 02 20 33 c3 49 af 4c d1 cd 87 ad |..i9]. 3.I.L....| +peer0.org1.example.com | 00000030 c0 da 6c 1f 69 0c 99 cb 76 c8 42 6d 5e f6 4c e0 |..l.i...v.Bm^.L.| +peer0.org1.example.com | 00000040 d7 4d 22 89 0c ad 87 |.M"....| +peer0.org1.example.com | [3b71 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3b72 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b73 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3b74 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b75 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3b76 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3b77 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3b78 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3b79 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3b7a 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3b7b 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004853eb0 gate 1598907137615100100 evaluation starts +peer0.org1.example.com | [3b7c 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004853eb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3b7d 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004853eb0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3b7e 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004853eb0 principal matched by identity 0 +peer0.org1.example.com | [3b7f 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 22 75 ee d7 b7 5f ef ef 01 a6 d3 9f c4 26 19 |i"u..._.......&.| +peer0.org1.example.com | 00000010 dc 92 50 99 03 d9 71 4a 23 fa 01 75 71 b1 ba 7c |..P...qJ#..uq..|| +peer0.org1.example.com | [3b80 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 5c bc b9 d0 e9 32 c4 85 69 fd 8a |0D. .\....2..i..| +peer0.org1.example.com | 00000010 86 a2 14 bc 8f d4 11 6d f3 1b 94 0e ed e8 dc 12 |.......m........| +peer0.org1.example.com | 00000020 b1 d4 3a 0d 02 20 6a 63 7e ed 6d 99 28 6f 2e c0 |..:.. jc~.m.(o..| +peer0.org1.example.com | 00000030 e0 7e 50 e0 55 4c cf 50 1a ee 99 07 49 aa e3 ee |.~P.UL.P....I...| +peer0.org1.example.com | 00000040 43 44 ef 85 57 69 |CD..Wi| +peer0.org1.example.com | [3b81 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004853eb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3b82 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004853eb0 gate 1598907137615100100 evaluation succeeds +peer0.org1.example.com | [3b83 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3b84 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3b85 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3b86 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3b87 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3b88 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b89 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b8a 08-31 20:52:17.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b8b 08-31 20:52:17.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b8c 08-31 20:52:17.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [3b8e 08-31 20:52:17.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b8f 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b90 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b91 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b8d 08-31 20:52:17.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b92 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3b93 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3b94 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org1.example.com | [3b95 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org1.example.com | [3b96 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org1.example.com | [3b97 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org1.example.com | [3b98 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b99 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3b9a 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3b9b 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3b9c 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3b9d 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3b9e 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3b9f 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3ba0 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048924f0 gate 1598907137685054400 evaluation starts +peer0.org1.example.com | [3ba1 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048924f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ba2 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048924f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3ba3 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048924f0 principal matched by identity 0 +peer0.org1.example.com | [3ba4 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org1.example.com | [3ba5 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer1.org2.example.com | [4208 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org2.example.com | [4209 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [420a 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [420b 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [420c 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [420d 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [420e 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [420f 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4210 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4211 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af9d70 gate 1598907146413998400 evaluation starts +peer1.org2.example.com | [4212 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af9d70 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4213 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af9d70 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4214 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af9d70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4215 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af9d70 principal evaluation fails +peer1.org2.example.com | [4216 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003af9d70 gate 1598907146413998400 evaluation fails +peer1.org2.example.com | [4217 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4218 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4219 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [421a 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b842e0 gate 1598907146414589800 evaluation starts +peer1.org2.example.com | [421b 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b842e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [421c 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b842e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [421d 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b842e0 principal matched by identity 0 +peer1.org2.example.com | [421e 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org2.example.com | [421f 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org2.example.com | [4220 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b842e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4221 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b842e0 gate 1598907146414589800 evaluation succeeds +peer1.org2.example.com | [4222 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4223 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4224 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4225 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4226 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org1.example.com | [3ba6 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048924f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3ba7 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048924f0 gate 1598907137685054400 evaluation succeeds +peer1.org2.example.com | [4227 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4228 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4229 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [422a 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [422b 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [422c 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [422d 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [422e 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b854e0 gate 1598907146415729200 evaluation starts +peer1.org2.example.com | [422f 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b854e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4230 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b854e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4231 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b854e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4232 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b854e0 principal evaluation fails +peer1.org2.example.com | [4233 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b854e0 gate 1598907146415729200 evaluation fails +peer1.org2.example.com | [4234 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4235 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4236 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4237 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b85a50 gate 1598907146416061500 evaluation starts +peer1.org2.example.com | [4238 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b85a50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4239 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b85a50 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [423a 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [423b 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b85a50 principal matched by identity 0 +peer1.org2.example.com | [423c 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org2.example.com | [423d 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org2.example.com | [423e 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b85a50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [423f 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b85a50 gate 1598907146416061500 evaluation succeeds +peer1.org2.example.com | [4240 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4241 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4242 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4243 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4244 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org2.example.com | [4245 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org2.example.com | [4246 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4247 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4248 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4249 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [424a 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [424b 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [424c 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [424d 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [424e 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [424f 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4250 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4251 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baf590 gate 1598907146419001600 evaluation starts +peer1.org2.example.com | [4252 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baf590 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4253 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baf590 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4254 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baf590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4255 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baf590 principal evaluation fails +peer1.org2.example.com | [4256 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003baf590 gate 1598907146419001600 evaluation fails +peer1.org2.example.com | [4257 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4258 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4259 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [425a 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bafb00 gate 1598907146419387900 evaluation starts +peer1.org2.example.com | [425b 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bafb00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [425c 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bafb00 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [425d 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bafb00 principal matched by identity 0 +peer1.org2.example.com | [425e 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org2.example.com | [425f 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org1.example.com | [3d59 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d5a 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d5b 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d5c 08-31 20:52:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d5d 08-31 20:52:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d5e 08-31 20:52:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d5f 08-31 20:52:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3d60 08-31 20:52:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161043 +peer1.org1.example.com | [3d61 08-31 20:52:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3F4CE87C41D4F7A3F5AC60E5DE00AE4F0B3CF028A03E58C0FE51D71BE856FC1C +peer1.org1.example.com | [3d62 08-31 20:52:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3d63 08-31 20:52:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3d64 08-31 20:52:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3d65 08-31 20:52:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d66 08-31 20:52:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3d67 08-31 20:52:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3d68 08-31 20:52:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3d69 08-31 20:52:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3d6a 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d6b 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d6c 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d6d 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d6e 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | 00000040 c9 b8 7c 08 44 30 c1 |..|.D0.| +peer0.org2.example.com | [3f99 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398f510 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3f9a 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00398f510 gate 1598907139758945700 evaluation succeeds +peer0.org2.example.com | [3f9b 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f9c 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3f9d 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3f9e 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3f9f 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.7:7051 +peer0.org2.example.com | [3fa0 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fa1 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org1.example.com:7051, 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [3fa2 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fa3 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 11960660938038967932, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer0.org2.example.com | [3fa4 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 11960660938038967932, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer0.org2.example.com | [3fa5 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fa6 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 11960660938038967932, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer0.org2.example.com | [3fa7 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [3fa8 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fa9 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3faa 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3fab 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3fac 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [3fad 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [3fae 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [3faf 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a2cf0 gate 1598907139775419500 evaluation starts +peer0.org2.example.com | [3fb0 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a2cf0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3fb1 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a2cf0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3fb2 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a2cf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [3fb3 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a2cf0 principal evaluation fails +peer0.org2.example.com | [3fb4 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a2cf0 gate 1598907139775419500 evaluation fails +peer0.org2.example.com | [3fb5 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3fb6 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [3fb7 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [3fb8 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a3260 gate 1598907139777717600 evaluation starts +peer0.org2.example.com | [3fb9 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a3260 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [3fba 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a3260 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [3fbb 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a3260 principal matched by identity 0 +peer0.org2.example.com | [3fbc 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e0 5b ad 9b cf 6e 40 c0 f1 40 11 cb 74 25 eb |..[...n@..@..t%.| +peer0.org2.example.com | 00000010 c1 ba 77 23 51 12 91 bf 1f c3 b4 cd 49 6e bc 28 |..w#Q.......In.(| +peer1.org1.example.com | [3d6f 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d70 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d71 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d72 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3d73 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 4c e8 7c 41 d4 f7 a3 f5 ac 60 e5 de 00 ae 4f |?L.|A.....`....O| +peer1.org1.example.com | 00000010 0b 3c f0 28 a0 3e 58 c0 fe 51 d7 1b e8 56 fc 1c |.<.(.>X..Q...V..| +peer1.org1.example.com | [3d74 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 0f d7 87 e9 12 8f b2 f3 85 30 |0E.!...........0| +peer1.org1.example.com | 00000010 62 c9 8c 45 56 44 bf 74 ef 55 23 70 7c ae fb 21 |b..EVD.t.U#p|..!| +peer1.org1.example.com | 00000020 e6 37 76 cb c9 02 20 11 7e c4 66 12 ff 9b 01 c4 |.7v... .~.f.....| +peer1.org1.example.com | 00000030 83 63 aa 51 db fa 69 6b 92 b8 0b 02 07 4f 26 71 |.c.Q..ik.....O&q| +peer1.org1.example.com | 00000040 b7 8f 6a 62 5e 8f 09 |..jb^..| +peer1.org1.example.com | [3d75 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [3d76 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 69 89 c7 c2 5a f4 b3 ef 12 fb |0E.!..i...Z.....| +peer1.org1.example.com | 00000010 f1 7e e3 9b ce f8 2d 5d e4 40 07 f5 cd 2f 7d 4c |.~....-].@.../}L| +peer1.org1.example.com | 00000020 cb 00 bc 87 06 02 20 6a 01 2e 2b 9d 62 d7 1e c2 |...... j..+.b...| +peer1.org1.example.com | 00000030 9d 90 66 10 c9 8c db 62 b7 8a fa f2 a6 52 4f 82 |..f....b.....RO.| +peer1.org1.example.com | 00000040 af cb 2b ed 0a bc f1 |..+....| +peer1.org1.example.com | [3d77 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3d78 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3d79 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d7a 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d7b 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d7c 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d7d 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d7e 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [3d7f 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3d80 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 6f bc e6 0e 08 91 b2 0a 67 44 c2 14 2e dc 99 |.o.......gD.....| +peer1.org1.example.com | 00000010 d6 c7 15 c7 53 70 16 ae 4b 70 12 96 0c f6 e9 86 |....Sp..Kp......| +peer1.org1.example.com | [3d81 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 fc 7d 0e ee ef b1 04 45 2d 8e |0E.!...}.....E-.| +peer1.org1.example.com | 00000010 b5 09 4e 13 39 28 76 7e 53 53 d0 bd 17 48 eb 7d |..N.9(v~SS...H.}| +peer1.org1.example.com | 00000020 2a 28 83 40 6c 02 20 55 00 c7 99 e9 e2 6c 60 8d |*(.@l. U.....l`.| +peer1.org1.example.com | 00000030 3a 32 f6 d1 cb 98 7b d9 21 47 a3 3c 8c 63 f4 9d |:2....{.!G.<.c..| +peer1.org1.example.com | 00000040 04 f5 d4 cc 5e b2 19 |....^..| +peer1.org1.example.com | [3d82 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3d83 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d84 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3d85 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 4c e8 7c 41 d4 f7 a3 f5 ac 60 e5 de 00 ae 4f |?L.|A.....`....O| +peer1.org1.example.com | 00000010 0b 3c f0 28 a0 3e 58 c0 fe 51 d7 1b e8 56 fc 1c |.<.(.>X..Q...V..| +peer1.org1.example.com | [3d86 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 0f d7 87 e9 12 8f b2 f3 85 30 |0E.!...........0| +peer1.org1.example.com | 00000010 62 c9 8c 45 56 44 bf 74 ef 55 23 70 7c ae fb 21 |b..EVD.t.U#p|..!| +peer1.org1.example.com | 00000020 e6 37 76 cb c9 02 20 11 7e c4 66 12 ff 9b 01 c4 |.7v... .~.f.....| +peer1.org1.example.com | 00000030 83 63 aa 51 db fa 69 6b 92 b8 0b 02 07 4f 26 71 |.c.Q..ik.....O&q| +peer1.org1.example.com | 00000040 b7 8f 6a 62 5e 8f 09 |..jb^..| +peer1.org1.example.com | [3d87 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3d88 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3d89 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3d8a 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3d8b 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ba8 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ba9 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3baa 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3bab 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3bac 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bad 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bae 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3baf 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3bb0 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3bb1 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3bb2 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3bb3 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3bb4 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048936f0 gate 1598907137688478800 evaluation starts +peer0.org1.example.com | [3bb5 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048936f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3bb6 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048936f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3bb7 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048936f0 principal matched by identity 0 +peer0.org1.example.com | [3bb8 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org1.example.com | [3bb9 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org1.example.com | [3bba 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048936f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3bbb 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048936f0 gate 1598907137688478800 evaluation succeeds +peer0.org1.example.com | [3bbc 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3bbd 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3bbe 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3bbf 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3bc0 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3bc1 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3bc2 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3bc3 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bc4 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bc5 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org2.example.com | [4260 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bafb00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4261 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bafb00 gate 1598907146419387900 evaluation succeeds +peer1.org2.example.com | [4262 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4263 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4264 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4265 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4266 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org2.example.com | [4267 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org1.example.com | [3d8c 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3d8d 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d8e 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3d8f 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3d90 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3d91 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3d92 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042769f0 gate 1598907149356622000 evaluation starts +peer1.org1.example.com | [3d93 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042769f0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d94 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042769f0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3d95 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042769f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3d96 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042769f0 principal evaluation fails +peer1.org1.example.com | [3d97 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042769f0 gate 1598907149356622000 evaluation fails +peer1.org1.example.com | [3d98 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3d99 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3d9a 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3d9b 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004276f60 gate 1598907149356874000 evaluation starts +peer1.org1.example.com | [3d9c 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004276f60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3d9d 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004276f60 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3d9e 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004276f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3d9f 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004276f60 principal evaluation fails +peer1.org1.example.com | [3da0 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004276f60 gate 1598907149356874000 evaluation fails +peer1.org1.example.com | [3da1 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3da2 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3da3 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3da4 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042774d0 gate 1598907149357341500 evaluation starts +peer1.org1.example.com | [3da5 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042774d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3da6 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042774d0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3da7 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042774d0 principal matched by identity 0 +peer1.org1.example.com | [3da8 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 c6 aa ca 4b 34 fb 28 1b f8 14 65 62 8b 48 9a |....K4.(...eb.H.| +peer1.org1.example.com | 00000010 25 8b 97 16 05 19 3a 40 85 36 e0 f5 0f f4 c9 e1 |%.....:@.6......| +peer1.org1.example.com | [3da9 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 8c 08 ce a8 0d f4 e2 1c 0f 72 |0E.!...........r| +peer1.org1.example.com | 00000010 af 0a d7 f2 ba 8a 90 26 28 d4 cc a1 a8 9e 2f b5 |.......&(...../.| +peer1.org1.example.com | 00000020 fc 9b d7 0a 6a 02 20 2c ed 4a 62 87 c0 d5 27 65 |....j. ,.Jb...'e| +peer1.org1.example.com | 00000030 76 8c 5b 0d f0 5c 57 e1 52 14 32 7c 49 ec e9 1b |v.[..\W.R.2|I...| +peer1.org1.example.com | 00000040 a0 fc ff 7f be b6 c9 |.......| +peer1.org1.example.com | [3daa 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dab 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042774d0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3dac 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042774d0 gate 1598907149357341500 evaluation succeeds +peer1.org1.example.com | [3dad 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3dae 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3daf 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3db0 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3bc6 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3bc7 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3bc8 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3bc9 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3bca 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3bcb 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3bcc 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b4310 gate 1598907137693752800 evaluation starts +peer0.org1.example.com | [3bcd 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b4310 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3bce 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b4310 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3bcf 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b4310 principal matched by identity 0 +peer0.org1.example.com | [3bd0 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org1.example.com | [3bd1 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org1.example.com | [3bd2 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b4310 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3bd3 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b4310 gate 1598907137693752800 evaluation succeeds +peer0.org1.example.com | [3bd4 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3bd5 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3bd6 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3bd7 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3bd8 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3bd9 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org1.example.com | [3bda 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org1.example.com | [3bdb 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org1.example.com | [3bdc 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org1.example.com | [3bdd 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bde 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3db1 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3db2 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3db3 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3db4 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [3db5 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3db6 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3db7 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3db8 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3db9 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3dba 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3dbb 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3dbc 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3dbd 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004290990 gate 1598907149359633500 evaluation starts +peer1.org1.example.com | [3dbe 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004290990 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3dbf 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004290990 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3dc0 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004290990 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3dc1 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004290990 principal evaluation fails +peer1.org1.example.com | [3dc2 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004290990 gate 1598907149359633500 evaluation fails +peer1.org1.example.com | [3dc3 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3dc4 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3dc5 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3dc6 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004290f00 gate 1598907149359885700 evaluation starts +peer1.org1.example.com | [3dc7 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004290f00 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3dc8 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004290f00 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3dc9 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004290f00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3dca 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004290f00 principal evaluation fails +peer1.org1.example.com | [3dcb 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004290f00 gate 1598907149359885700 evaluation fails +peer1.org1.example.com | [3dcc 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3dcd 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3dce 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3dcf 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291470 gate 1598907149360139100 evaluation starts +peer1.org1.example.com | [3dd0 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291470 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3dd1 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291470 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3dd2 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291470 principal matched by identity 0 +peer1.org1.example.com | [3dd3 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e4 b0 84 4b 07 df 73 7a 11 0c 44 35 9d 1d 7f |....K..sz..D5...| +peer1.org1.example.com | 00000010 f5 f0 fa 1e d7 a5 c0 10 5a 6a e8 0d 87 44 2e 4e |........Zj...D.N| +peer1.org1.example.com | [3dd4 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 33 f0 79 6c 51 c3 d7 39 cb eb |0E.!..3.ylQ..9..| +peer1.org1.example.com | 00000010 c3 16 f3 19 8f 04 6d c3 41 aa ea cf 84 60 d0 c7 |......m.A....`..| +peer1.org1.example.com | 00000020 9f 18 6f 34 a8 02 20 6f 81 d6 42 16 92 06 21 50 |..o4.. o..B...!P| +peer1.org1.example.com | 00000030 32 3a 12 4c b6 fe d5 74 02 3a 69 81 62 43 8e a6 |2:.L...t.:i.bC..| +peer1.org1.example.com | 00000040 7c 6a ba 25 70 78 59 ||j.%pxY| +peer1.org1.example.com | [3dd5 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291470 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3dd6 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291470 gate 1598907149360139100 evaluation succeeds +peer1.org1.example.com | [3dd7 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3dd8 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3dd9 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3dda 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3ddb 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3ddc 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ddd 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3dde 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 6f bc e6 0e 08 91 b2 0a 67 44 c2 14 2e dc 99 |.o.......gD.....| +peer1.org1.example.com | 00000010 d6 c7 15 c7 53 70 16 ae 4b 70 12 96 0c f6 e9 86 |....Sp..Kp......| +peer1.org1.example.com | [3ddf 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 fc 7d 0e ee ef b1 04 45 2d 8e |0E.!...}.....E-.| +peer1.org1.example.com | 00000010 b5 09 4e 13 39 28 76 7e 53 53 d0 bd 17 48 eb 7d |..N.9(v~SS...H.}| +peer1.org1.example.com | 00000020 2a 28 83 40 6c 02 20 55 00 c7 99 e9 e2 6c 60 8d |*(.@l. U.....l`.| +peer1.org1.example.com | 00000030 3a 32 f6 d1 cb 98 7b d9 21 47 a3 3c 8c 63 f4 9d |:2....{.!G.<.c..| +peer1.org1.example.com | 00000040 04 f5 d4 cc 5e b2 19 |....^..| +peer1.org1.example.com | [3de0 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3de1 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3de2 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [3de3 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 4c e8 7c 41 d4 f7 a3 f5 ac 60 e5 de 00 ae 4f |?L.|A.....`....O| +peer1.org1.example.com | 00000010 0b 3c f0 28 a0 3e 58 c0 fe 51 d7 1b e8 56 fc 1c |.<.(.>X..Q...V..| +peer1.org1.example.com | [3de4 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 0f d7 87 e9 12 8f b2 f3 85 30 |0E.!...........0| +peer1.org1.example.com | 00000010 62 c9 8c 45 56 44 bf 74 ef 55 23 70 7c ae fb 21 |b..EVD.t.U#p|..!| +peer1.org1.example.com | 00000020 e6 37 76 cb c9 02 20 11 7e c4 66 12 ff 9b 01 c4 |.7v... .~.f.....| +peer1.org1.example.com | 00000030 83 63 aa 51 db fa 69 6b 92 b8 0b 02 07 4f 26 71 |.c.Q..ik.....O&q| +peer1.org1.example.com | 00000040 b7 8f 6a 62 5e 8f 09 |..jb^..| +peer1.org1.example.com | [3de5 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3de6 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3de7 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3de8 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3de9 08-31 20:52:29.36 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3dea 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3deb 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [3dec 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ded 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3dee 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3def 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3df0 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3df1 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3df2 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [3df3 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3df4 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3df5 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3bdf 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3be0 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3be1 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3be2 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3be3 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3be4 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3be5 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ce2f0 gate 1598907137698386800 evaluation starts +peer0.org1.example.com | [3be6 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ce2f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3be7 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ce2f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3be8 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ce2f0 principal matched by identity 0 +peer0.org1.example.com | [3be9 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org1.example.com | [3bea 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org1.example.com | [3beb 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ce2f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3bec 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ce2f0 gate 1598907137698386800 evaluation succeeds +peer0.org1.example.com | [3bed 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3bee 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3bef 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3bf0 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3bf1 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3bf2 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [3bf3 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bf4 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bf5 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3bf6 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3bf7 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [3fbd 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 11 9b 13 4b 9c 6c fc a8 d4 78 |0E.!.....K.l...x| +peer0.org2.example.com | 00000010 76 89 ae 84 b1 25 60 5c 18 f4 05 22 ef f7 5e 24 |v....%`\..."..^$| +peer0.org2.example.com | 00000020 da 0e 69 39 5d 02 20 33 c3 49 af 4c d1 cd 87 ad |..i9]. 3.I.L....| +peer0.org2.example.com | 00000030 c0 da 6c 1f 69 0c 99 cb 76 c8 42 6d 5e f6 4c e0 |..l.i...v.Bm^.L.| +peer0.org2.example.com | 00000040 d7 4d 22 89 0c ad 87 |.M"....| +peer0.org2.example.com | [3fbe 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a3260 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [3fbf 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039a3260 gate 1598907139777717600 evaluation succeeds +peer0.org2.example.com | [3fc0 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3fc1 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [3fc2 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [3fc3 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [3fc4 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3fc5 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fc6 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [3fc7 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7a 19 80 e7 86 74 1f d5 28 86 51 ea 42 0d 54 55 |z....t..(.Q.B.TU| +peer0.org2.example.com | 00000010 0f 88 b0 26 4e 0a 2d 27 0d e5 45 6d f3 06 6e 59 |...&N.-'..Em..nY| +peer0.org2.example.com | [3fc8 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 55 04 7c cb 88 14 21 bc 77 6b db |0D. \U.|...!.wk.| +peer0.org2.example.com | 00000010 3f 69 3a a6 b3 ab 69 ce 39 75 f0 16 9a f5 8a 96 |?i:...i.9u......| +peer0.org2.example.com | 00000020 fb f4 9a 4d 02 20 78 b0 fa 98 76 bd c7 f5 7b 27 |...M. x...v...{'| +peer0.org2.example.com | 00000030 39 07 1a cd 65 4c 4b f3 7c cd 62 6e 00 fd da 6a |9...eLK.|.bn...j| +peer0.org2.example.com | 00000040 bb bd ed 2b 1d 5e |...+.^| +peer0.org2.example.com | [3fc9 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3fca 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3fcb 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fcc 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [3fcd 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 79 b0 a3 b7 3b f4 53 44 01 cd 5e 1f a5 4f 39 33 |y...;.SD..^..O93| +peer0.org2.example.com | 00000010 eb cc 59 36 9e 6c c7 14 c0 03 08 ce b3 4b ef f5 |..Y6.l.......K..| +peer0.org2.example.com | [3fce 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac 58 f5 ef 7b 5d fc 10 49 b1 bc |0E.!..X..{]..I..| +peer0.org2.example.com | 00000010 38 22 c1 41 f6 5e 66 29 53 24 99 0f e3 d1 63 5f |8".A.^f)S$....c_| +peer0.org2.example.com | 00000020 71 a6 76 fb 07 02 20 3f 4e 7b 47 02 54 eb 7b ce |q.v... ?N{G.T.{.| +peer0.org2.example.com | 00000030 d4 1b 2b ff d7 c0 44 4e 95 8c e0 16 6f 3a f0 bf |..+...DN....o:..| +peer0.org2.example.com | 00000040 54 50 f5 5c 03 f2 68 |TP.\..h| +peer0.org2.example.com | [3fcf 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [3fd0 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [3fd1 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3fd2 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3fd3 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [3fd4 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fd5 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fd6 08-31 20:52:19.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fd7 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3fd8 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3fd9 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fda 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3fdb 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [3fdc 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 7e db e0 fd fe 59 06 06 30 99 c9 f0 c9 6c 50 |.~....Y..0....lP| +peer0.org2.example.com | 00000010 c6 b8 e4 71 14 93 14 bc 1a b3 32 d7 88 86 0a f8 |...q......2.....| +peer0.org2.example.com | [3fdd 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 2d 90 ec 15 f1 5e ec 3b 00 16 6b |0D. .-....^.;..k| +peer0.org2.example.com | 00000010 e1 f8 cd 95 a5 c3 25 29 91 08 82 80 4e 70 f2 16 |......%)....Np..| +peer0.org2.example.com | 00000020 ed 75 b6 c9 02 20 45 67 3f b2 7f ea d8 07 8f a7 |.u... Eg?.......| +peer0.org2.example.com | 00000030 2c 32 c8 5f 27 0f 8e a1 57 a9 ad e4 bf eb a8 3c |,2._'...W......<| +peer0.org2.example.com | 00000040 cb ef 0e 22 be 84 |..."..| +peer0.org2.example.com | [3fde 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3fdf 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [3fe0 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [3fe1 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [3fe2 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [3fe3 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fe4 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fe5 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3fe6 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fe7 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fe8 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3fe9 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3fea 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3feb 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [3fed 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3fee 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [3fec 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [3fef 08-31 20:52:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [3ff0 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org2.example.com | [3ff1 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org2.example.com | [3ff2 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }] +peer0.org2.example.com | [3ff3 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org2.example.com | [3ff4 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003a05e50, CONNECTING +peer0.org2.example.com | [3ff5 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003a05e50, READY +peer0.org2.example.com | [3ff6 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [3ff7 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A20A583F8EF0329C5FDAE...DC9F94464423B5C18D07A2414C5E953D +peer0.org2.example.com | [3ff8 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE41BD3D8FD7DF33AA2264C2B86D02550B4F565C23D86146F39306308BDB2331 +peer0.org2.example.com | [3ff9 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" > > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [3df7 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3df8 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3df9 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3dfa 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3dfb 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3dfc 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3dfd 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3dfe 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3dff 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b1b50 gate 1598907149528131600 evaluation starts +peer1.org1.example.com | [3e00 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b1b50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3e01 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b1b50 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3e02 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b1b50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3e03 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b1b50 principal evaluation fails +peer1.org1.example.com | [3e04 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042b1b50 gate 1598907149528131600 evaluation fails +peer1.org1.example.com | [3e05 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3e06 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3e07 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3e08 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d00c0 gate 1598907149532068800 evaluation starts +peer1.org1.example.com | [3e09 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d00c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3e0a 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d00c0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3e0b 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d00c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3e0c 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d00c0 principal evaluation fails +peer1.org1.example.com | [3e0d 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d00c0 gate 1598907149532068800 evaluation fails +peer1.org1.example.com | [3e0e 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3e0f 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3e10 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3e11 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d0630 gate 1598907149532692600 evaluation starts +peer1.org1.example.com | [3e12 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d0630 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3e13 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d0630 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3e14 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d0630 principal matched by identity 0 +peer1.org1.example.com | [3e15 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 01 24 31 7f 14 c1 2b c5 b6 8c 37 ab 5c 65 be |..$1...+...7.\e.| +peer1.org1.example.com | 00000010 69 79 c5 5c 09 c9 b4 62 16 82 2d 7e 47 40 bc c5 |iy.\...b..-~G@..| +peer1.org1.example.com | [3e16 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa d0 ca fb 28 92 78 b8 dc 68 46 |0E.!.....(.x..hF| +peer1.org1.example.com | 00000010 cc a0 de 06 1f 1e ab d4 a0 02 30 65 87 b0 5c b3 |..........0e..\.| +peer1.org1.example.com | 00000020 e8 89 d5 d9 02 02 20 03 f5 6a bd 54 66 b0 7f a8 |...... ..j.Tf...| +peer1.org1.example.com | 00000030 7c c3 0d e0 fb 41 e5 a0 b2 cf da 83 40 89 0e ba ||....A......@...| +peer1.org1.example.com | 00000040 ca 21 a1 73 b5 9b 81 |.!.s...| +peer1.org1.example.com | [3e17 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d0630 principal evaluation succeeds for identity 0 +peer1.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org2.example.com | [4268 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4269 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [426a 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [426b 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [426c 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [426d 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [426e 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [426f 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4270 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc73f0 gate 1598907146420747100 evaluation starts +peer1.org2.example.com | [4271 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc73f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4272 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc73f0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4273 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc73f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4274 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc73f0 principal evaluation fails +peer1.org2.example.com | [4275 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc73f0 gate 1598907146420747100 evaluation fails +peer1.org2.example.com | [4276 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4277 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4278 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4279 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc7960 gate 1598907146421077700 evaluation starts +peer1.org2.example.com | [427a 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc7960 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [427b 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc7960 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [427c 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc7960 principal matched by identity 0 +peer1.org2.example.com | [427d 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org2.example.com | [427e 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org2.example.com | [427f 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc7960 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4280 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bc7960 gate 1598907146421077700 evaluation succeeds +peer1.org2.example.com | [4281 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4282 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4283 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4284 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4285 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org2.example.com | [4286 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org2.example.com | [3ffa 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:7051 +peer0.org2.example.com | [3ffb 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ffc 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3ffd 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [3ffe 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [3fff 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4000 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4001 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4002 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4003 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4004 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4005 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4006 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa5030 gate 1598907140087870700 evaluation starts +peer0.org2.example.com | [4007 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa5030 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4008 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa5030 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4009 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa5030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [400a 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa5030 principal evaluation fails +peer0.org2.example.com | [400b 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa5030 gate 1598907140087870700 evaluation fails +peer0.org2.example.com | [400c 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [400d 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [400e 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [400f 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa55a0 gate 1598907140089325100 evaluation starts +peer0.org2.example.com | [4010 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa55a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4011 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa55a0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4012 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa55a0 principal matched by identity 0 +peer0.org2.example.com | [4013 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org2.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org2.example.com | [4014 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a cd 1c fe a0 c0 c8 07 a7 ca 4c ca |0D. j.........L.| +peer0.org2.example.com | 00000010 e7 6a bb 93 cd 33 e4 ab d8 12 26 ed d9 27 f9 9d |.j...3....&..'..| +peer0.org2.example.com | 00000020 51 5d 3d 78 02 20 11 70 33 43 12 94 de 8a 9e 3e |Q]=x. .p3C.....>| +peer0.org2.example.com | 00000030 18 ec 48 4b 6b 39 38 64 1a 27 5a c2 4c 1e ef a9 |..HKk98d.'Z.L...| +peer0.org2.example.com | 00000040 a1 e1 5d a4 ce 71 |..]..q| +peer0.org2.example.com | [4015 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa55a0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4016 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003aa55a0 gate 1598907140089325100 evaluation succeeds +peer0.org2.example.com | [4017 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4018 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4019 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [401a 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [401b 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051 +peer0.org2.example.com | [401c 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [401d 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [401e 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [401f 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4020 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4021 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4022 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4023 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4024 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4025 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4026 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4027 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4028 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4029 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [402a 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [402b 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45800 gate 1598907140300060900 evaluation starts +peer0.org2.example.com | [402c 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45800 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [402d 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45800 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [402e 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [402f 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45800 principal evaluation fails +peer0.org2.example.com | [4030 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45800 gate 1598907140300060900 evaluation fails +peer0.org2.example.com | [4031 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4032 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4033 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4034 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45d70 gate 1598907140301696200 evaluation starts +peer0.org2.example.com | [4035 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45d70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4036 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45d70 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4037 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45d70 principal matched by identity 0 +peer0.org2.example.com | [4038 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 88 07 69 c0 7a 0c e9 f6 08 f3 fb d5 cd ec d0 |...i.z..........| +peer0.org2.example.com | 00000010 da 72 5d 57 34 fb f5 59 c7 a2 c6 3a 85 21 48 f8 |.r]W4..Y...:.!H.| +peer0.org2.example.com | [4039 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f 6b 9a f7 47 1f 55 9f c4 aa 13 da |0D. _k..G.U.....| +peer0.org2.example.com | 00000010 ed eb e1 72 c1 03 65 c9 8f 4c bb 80 5b 51 58 56 |...r..e..L..[QXV| +peer0.org2.example.com | 00000020 c4 3c 97 6b 02 20 08 d0 37 a1 ec e7 29 f6 6a 8e |.<.k. ..7...).j.| +peer0.org2.example.com | 00000030 8d 2e 4a eb a0 a0 c2 1b bb 09 5d 34 11 8a a3 10 |..J.......]4....| +peer0.org2.example.com | 00000040 98 22 7c 8a 63 b7 |."|.c.| +peer0.org2.example.com | [403a 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45d70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [403b 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a45d70 gate 1598907140301696200 evaluation succeeds +peer0.org2.example.com | [403c 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [403d 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [403e 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [403f 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4040 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4041 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [4042 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4043 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4044 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4045 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4046 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4047 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4287 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4288 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4289 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [428a 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [428b 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [428c 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [428d 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [428e 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [428f 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4290 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4291 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4292 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf94a0 gate 1598907146423039800 evaluation starts +peer1.org2.example.com | [4293 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf94a0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4294 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf94a0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4295 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf94a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4296 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf94a0 principal evaluation fails +peer1.org2.example.com | [4297 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf94a0 gate 1598907146423039800 evaluation fails +peer1.org2.example.com | [4298 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4299 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [429a 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [429b 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf9a10 gate 1598907146423828100 evaluation starts +peer1.org2.example.com | [429c 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf9a10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [429d 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf9a10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [429e 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf9a10 principal matched by identity 0 +peer1.org2.example.com | [429f 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org2.example.com | [42a0 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org2.example.com | [42a1 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf9a10 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [42a2 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bf9a10 gate 1598907146423828100 evaluation succeeds +peer1.org2.example.com | [42a3 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [42a4 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [42a5 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [42a6 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [42a7 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42a8 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42a9 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [42aa 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [42ab 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [42ac 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [42ad 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [42ae 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [42af 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0ac10 gate 1598907146425672000 evaluation starts +peer1.org2.example.com | [42b0 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0ac10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [42b1 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0ac10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [42b2 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0ac10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [42b3 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0ac10 principal evaluation fails +peer1.org2.example.com | [42b4 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0ac10 gate 1598907146425672000 evaluation fails +peer1.org2.example.com | [42b5 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [42b6 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [42b7 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [42b8 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0b180 gate 1598907146426496700 evaluation starts +peer1.org2.example.com | [42b9 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0b180 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [42ba 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0b180 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [42bb 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0b180 principal matched by identity 0 +peer1.org2.example.com | [42bc 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org2.example.com | [42bd 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org2.example.com | [42be 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0b180 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [42bf 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c0b180 gate 1598907146426496700 evaluation succeeds +peer1.org2.example.com | [42c0 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [42c1 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [42c2 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [42c3 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [42c4 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org2.example.com | [42c5 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org2.example.com | [42c6 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org2.example.com | [42c7 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org2.example.com | [42c8 08-31 20:52:26.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4048 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4049 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [404a 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [404b 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [404c 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [404d 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [404e 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [404f 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4050 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4051 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4052 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4053 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4054 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [4055 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4056 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4057 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4058 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [405a 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [405b 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4059 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [405c 08-31 20:52:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [405d 08-31 20:52:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816103A +peer0.org2.example.com | [405e 08-31 20:52:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AA2DFA2C672D33A236ED3D13C1C885C9837A4C245B0C04D2885685DCB21C4594 +peer0.org2.example.com | [405f 08-31 20:52:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4060 08-31 20:52:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [4061 08-31 20:52:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [4062 08-31 20:52:20.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [4063 08-31 20:52:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4064 08-31 20:52:20.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4065 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4066 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4067 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4068 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4069 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [406b 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [406d 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [406c 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [406e 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [406a 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [406f 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3bf8 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3bf9 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3bfa 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3bfb 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3bfc 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cf740 gate 1598907137699423800 evaluation starts +peer0.org1.example.com | [3bfd 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cf740 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3bfe 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cf740 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3bff 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cf740 principal matched by identity 0 +peer0.org1.example.com | [3c00 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org1.example.com | [3c01 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org1.example.com | [3c02 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cf740 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3c03 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cf740 gate 1598907137699423800 evaluation succeeds +peer0.org1.example.com | [3c04 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c05 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c06 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3c07 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3c08 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org1.example.com | [3c09 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org1.example.com | [3c0a 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org1.example.com | [3c0b 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org1.example.com | [3c0c 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c0d 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c0e 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3c0f 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c10 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c11 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3c12 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3c13 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3c14 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e9720 gate 1598907137706575900 evaluation starts +peer0.org1.example.com | [3c15 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e9720 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [42c9 08-31 20:52:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42ca 08-31 20:52:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42cb 08-31 20:52:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [42cc 08-31 20:52:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42cd 08-31 20:52:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42ce 08-31 20:52:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [42cf 08-31 20:52:26.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [42d0 08-31 20:52:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42d1 08-31 20:52:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [42d2 08-31 20:52:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [42d3 08-31 20:52:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42d4 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [42d5 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [42d6 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [42d7 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [42d8 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [42d9 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [42da 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [42db 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [42dc 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42dd 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [42de 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42df 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [42e1 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [42e2 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42e0 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42e3 08-31 20:52:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [42e4 08-31 20:52:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [42e5 08-31 20:52:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [42e6 08-31 20:52:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4070 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4071 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4072 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4073 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4074 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [4075 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4076 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4077 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4078 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [407a 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [407b 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [407c 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [407d 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afd910 gate 1598907140529618000 evaluation starts +peer0.org2.example.com | [407e 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afd910 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [407f 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afd910 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4080 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afd910 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4081 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afd910 principal evaluation fails +peer0.org2.example.com | [4079 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4082 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afd910 gate 1598907140529618000 evaluation fails +peer0.org2.example.com | [4084 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4085 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4086 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4087 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afde80 gate 1598907140532025600 evaluation starts +peer0.org2.example.com | [4083 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4088 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afde80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4089 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afde80 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [408a 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afde80 principal matched by identity 0 +peer0.org2.example.com | [408b 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f1 37 b5 70 e3 a4 f1 ec 54 49 6d a3 9a 84 48 c1 |.7.p....TIm...H.| +peer0.org2.example.com | 00000010 e5 6e 48 d8 a7 80 59 ee a6 80 fa 29 4a 4b a2 ea |.nH...Y....)JK..| +peer0.org2.example.com | [408c 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb b6 89 09 b2 93 e7 02 6c 2a fc |0E.!.........l*.| +peer0.org2.example.com | 00000010 b8 86 d3 9e 43 da aa 65 de c3 65 0a 5d a3 27 25 |....C..e..e.].'%| +peer0.org2.example.com | 00000020 41 30 46 20 50 02 20 78 90 37 a2 c0 38 ea 80 94 |A0F P. x.7..8...| +peer0.org2.example.com | 00000030 ca 35 c3 84 1d b9 9e 03 bc 73 62 2b a8 cd 69 6b |.5.......sb+..ik| +peer0.org2.example.com | 00000040 20 0a 6f d2 1c 1f c5 | .o....| +peer0.org2.example.com | [408d 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afde80 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [408e 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afde80 gate 1598907140532025600 evaluation succeeds +peer0.org2.example.com | [408f 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4090 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4091 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4092 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4093 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4094 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [4095 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4096 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4097 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [4098 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4099 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [409a 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [409b 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [409d 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [409c 08-31 20:52:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [409e 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [409f 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40a0 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40a1 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40a2 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40a3 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40a4 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [40a5 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40a6 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40a7 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [40a8 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [40a9 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40aa 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [40ab 08-31 20:52:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40ac 08-31 20:52:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [40ad 08-31 20:52:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [40ae 08-31 20:52:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40af 08-31 20:52:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [40b0 08-31 20:52:20.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40b1 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [40b2 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c16 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e9720 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3c17 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e9720 principal matched by identity 0 +peer0.org1.example.com | [3c18 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org1.example.com | [3c19 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org1.example.com | [3c1a 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e9720 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3c1b 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e9720 gate 1598907137706575900 evaluation succeeds +peer0.org1.example.com | [3c1c 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c1d 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3c1e 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3c1f 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3c20 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c21 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c22 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c23 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [3c24 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c25 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c26 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3c27 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c28 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c29 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c2a 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c2b 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c2c 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c2d 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c2e 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c2f 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c30 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c31 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c32 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3c33 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c34 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c35 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c36 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c37 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c38 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c39 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c3a 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c3b 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [3c3c 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c3d 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c3e 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c3f 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c40 08-31 20:52:18.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [3c41 08-31 20:52:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [3c42 08-31 20:52:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3c43 08-31 20:52:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610111801 +peer1.org1.example.com | [3e18 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042d0630 gate 1598907149532692600 evaluation succeeds +peer1.org1.example.com | [3e19 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3e1a 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3e1b 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3e1c 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3e1d 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3e1e 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3e1f 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3e20 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3e21 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3e22 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e23 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e24 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e25 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e26 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e27 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [3e29 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3e2a 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e28 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e2b 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e2c 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e2d 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3e2e 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" > alive: alive: alive: +peer1.org1.example.com | [3e2f 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e30 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e31 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e32 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40b3 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [40b4 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [40b5 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40b6 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\312\222\031s\252\3665\017\334\301\236\343\361Jw\036*E\037c\373\004y\213\313\365\035S\356\335\002 \241\2238/\351Dy\232_E\342\367\233\262@#\031\331\004\\\310\\\022\360\344\306he)\357\350" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [40b7 08-31 20:52:21.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\312\222\031s\252\3665\017\334\301\236\343\361Jw\036*E\037c\373\004y\213\313\365\035S\356\335\002 \241\2238/\351Dy\232_E\342\367\233\262@#\031\331\004\\\310\\\022\360\344\306he)\357\350" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [40b8 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40b9 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\312\222\031s\252\3665\017\334\301\236\343\361Jw\036*E\037c\373\004y\213\313\365\035S\356\335\002 \241\2238/\351Dy\232_E\342\367\233\262@#\031\331\004\\\310\\\022\360\344\306he)\357\350" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [40ba 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [40bb 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 9e 73 14 28 18 21 1d f9 18 a6 7b 11 64 ed 40 |..s.(.!....{.d.@| +peer0.org2.example.com | 00000010 87 cd 2c 29 a5 28 0d 2d c8 e9 60 18 ae 29 bf 2d |..,).(.-..`..).-| +peer0.org2.example.com | [40bc 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e1 77 99 e7 ee 43 a9 6f 30 e6 |0E.!...w...C.o0.| +peer0.org2.example.com | 00000010 fb 77 6a da bf cc 64 75 9d eb 18 cb 69 d4 bf c0 |.wj...du....i...| +peer0.org2.example.com | 00000020 08 bf 62 c2 4a 02 20 6d 34 73 8a 97 9d a4 7f c5 |..b.J. m4s......| +peer0.org2.example.com | 00000030 ba 10 d5 39 69 b9 5e e5 63 68 00 ce 7a 49 9e 5e |...9i.^.ch..zI.^| +peer0.org2.example.com | 00000040 f1 b2 c8 7f c7 f5 c3 |.......| +peer0.org2.example.com | [40bd 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [40be 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 82 3e ca 92 19 73 aa f6 35 0f dc |0E.!..>...s..5..| +peer0.org2.example.com | 00000010 c1 9e e3 f1 4a 77 1e 2a 45 1f 63 fb 04 79 8b cb |....Jw.*E.c..y..| +peer0.org2.example.com | 00000020 f5 1d 53 ee dd 02 20 20 a1 93 38 2f e9 44 79 9a |..S... ..8/.Dy.| +peer0.org2.example.com | 00000030 5f 45 e2 f7 9b b2 40 23 19 d9 04 5c c8 5c 12 f0 |_E....@#...\.\..| +peer0.org2.example.com | 00000040 e4 c6 68 65 29 ef e8 |..he)..| +peer0.org2.example.com | [40bf 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [40c0 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [40c1 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [40c2 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [40c3 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [40c4 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40c5 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40c6 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40c7 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [40c8 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40c9 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40ca 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [42e7 08-31 20:52:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [42e8 08-31 20:52:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [42e9 08-31 20:52:28.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42ea 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [42eb 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161042 +peer1.org2.example.com | [42ec 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F6C6AACA4B34FB281BF81465628B489A258B971605193A408536E0F50FF4C9E1 +peer1.org2.example.com | [42ed 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [42ee 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [42ef 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [42f0 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [42f1 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42f2 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [42f3 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [42f4 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [42f5 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [42f6 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42f7 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org2.example.com | [42f8 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42f9 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [42fa 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42fb 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [42fc 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [42fd 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer1.org2.example.com | [42fe 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [42ff 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 c6 aa ca 4b 34 fb 28 1b f8 14 65 62 8b 48 9a |....K4.(...eb.H.| +peer1.org2.example.com | 00000010 25 8b 97 16 05 19 3a 40 85 36 e0 f5 0f f4 c9 e1 |%.....:@.6......| +peer1.org2.example.com | [4300 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 8c 08 ce a8 0d f4 e2 1c 0f 72 |0E.!...........r| +peer1.org2.example.com | 00000010 af 0a d7 f2 ba 8a 90 26 28 d4 cc a1 a8 9e 2f b5 |.......&(...../.| +peer0.org1.example.com | [3c44 08-31 20:52:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3B1B63190DBB5D2190F38D81472897477D17B3DEC5AD01463486B10985BDB96F +peer0.org1.example.com | [3c45 08-31 20:52:18.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [3c46 08-31 20:52:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c47 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c48 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c49 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c4a 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3c4b 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c4c 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [3c4d 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3c4e 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c4f 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c50 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3c51 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +peer0.org1.example.com | [3c52 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3c53 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +peer0.org1.example.com | [3c54 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492e530 gate 1598907139393850900 evaluation starts +peer0.org1.example.com | [3c55 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492e530 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3c56 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492e530 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3c57 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492e530 principal matched by identity 0 +peer0.org1.example.com | [3c58 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 31 5f 42 ab c1 88 47 d7 5c e3 57 9c b2 4a a9 |V1_B...G.\.W..J.| +peer0.org1.example.com | 00000010 c7 3d 74 e2 1b 6b f5 64 fc 8f fe d9 3b 04 0c 9b |.=t..k.d....;...| +peer0.org1.example.com | [3c59 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b 71 4a d0 06 df 4f ae e8 1d 8c 46 |0D. KqJ...O....F| +peer0.org1.example.com | 00000010 e2 2e 17 30 72 48 e6 56 24 87 15 73 86 50 5f 1a |...0rH.V$..s.P_.| +peer0.org1.example.com | 00000020 34 03 0e f8 02 20 64 d6 50 26 22 c3 4b f8 73 fa |4.... d.P&".K.s.| +peer0.org1.example.com | 00000030 1b d8 f5 80 26 90 8f c4 63 ec f9 e8 c4 b8 4a d2 |....&...c.....J.| +peer0.org1.example.com | 00000040 99 25 90 f7 6e a5 |.%..n.| +peer0.org1.example.com | [3c5a 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492e530 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3c5b 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492e530 gate 1598907139393850900 evaluation succeeds +peer0.org1.example.com | [3c5c 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [3c5d 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [3c5e 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [3c5f 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +peer0.org1.example.com | [3c60 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer0.org1.example.com | [3c61 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +peer0.org1.example.com | [3c62 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +peer0.org1.example.com | [3c63 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [6], peers number [3] +peer0.org1.example.com | [3c64 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41188 bytes, seq: 6}, Envelope: 41221 bytes, Signature: 0 bytes to the block puller +peer0.org1.example.com | [3c65 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +peer0.org1.example.com | [3c66 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +peer0.org1.example.com | [3c67 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +peer0.org1.example.com | [3c68 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +peer0.org1.example.com | [3c69 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +peer0.org1.example.com | [3c6a 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +peer0.org1.example.com | [3c6b 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +peer0.org1.example.com | [3c6c 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0046fb640 env 0xc0048e14f0 txn 0 +peer0.org1.example.com | [3c6d 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0048e14f0 +peer0.org1.example.com | [3c6e 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\203\306\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\350c\034\327\214\356\327|\351\320\253\304j\r0\333\310\276\276\324\377\007\237t" +peer0.org1.example.com | [3c6f 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +peer0.org1.example.com | [3c70 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [3e33 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e34 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [3e35 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 5a 86 be 63 a7 6e 20 8f 01 e1 a2 d1 bb ca d9 |%Z..c.n ........| +peer1.org1.example.com | 00000010 1e 4a e9 e5 8b 87 7b ad 02 b4 45 62 b8 1f d5 ae |.J....{...Eb....| +peer1.org1.example.com | [3e36 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c f3 ad 47 07 f0 14 8f ed ba e7 82 |0D. \..G........| +peer1.org1.example.com | 00000010 88 2f 80 50 1f 5f 8b 79 6a 1c 34 31 74 52 55 2b |./.P._.yj.41tRU+| +peer1.org1.example.com | 00000020 58 76 00 c1 02 20 78 e3 70 86 d8 ef ba 05 43 d8 |Xv... x.p.....C.| +peer1.org1.example.com | 00000030 03 1d 97 bf 58 33 81 b8 ea 91 db 8d b0 f4 dd 9d |....X3..........| +peer1.org1.example.com | 00000040 08 d5 88 b9 8a 89 |......| +peer1.org1.example.com | [3e37 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [3e38 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 46 44 84 26 7e 91 ee 58 0c 15 |0E.!..FD.&~..X..| +peer1.org1.example.com | 00000010 c2 24 b1 10 ad 38 72 82 1d 1e 96 8e e2 a6 d4 1f |.$...8r.........| +peer1.org1.example.com | 00000020 9d 60 0d e3 d3 02 20 12 7e 88 fe 03 14 df da a4 |.`.... .~.......| +peer1.org1.example.com | 00000030 0d 2e 5c 1e bb e6 2a f3 77 b0 7b 9e ed 7c ee 39 |..\...*.w.{..|.9| +peer1.org1.example.com | 00000040 67 b6 94 76 b4 2f 34 |g..v./4| +peer1.org1.example.com | [3e39 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [3e3a 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer1.org1.example.com | [3e3b 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3e3c 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3e3d 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3e3e 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e3f 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e40 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e41 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [3e42 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e43 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e44 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3e45 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org1.example.com | [3e46 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e47 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e48 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e49 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e4a 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e4b 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e4c 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e4d 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [40cb 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\312\222\031s\252\3665\017\334\301\236\343\361Jw\036*E\037c\373\004y\213\313\365\035S\356\335\002 \241\2238/\351Dy\232_E\342\367\233\262@#\031\331\004\\\310\\\022\360\344\306he)\357\350" > > alive: +peer0.org2.example.com | [40cc 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [40cd 08-31 20:52:21.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40ce 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [40cf 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [40d0 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [40d1 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40d2 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40d3 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40d4 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40d5 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40d6 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40d7 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [40d8 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40d9 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [40da 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [40db 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [40dc 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [40dd 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [40de 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [40df 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [40e0 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [40e1 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [40e2 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [40e3 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [40e4 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bea8f0 gate 1598907141331429200 evaluation starts +peer0.org2.example.com | [40e5 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bea8f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [40e6 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bea8f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [40e7 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bea8f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [40e8 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bea8f0 principal evaluation fails +peer0.org2.example.com | [40e9 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bea8f0 gate 1598907141331429200 evaluation fails +peer0.org2.example.com | [40ea 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [40eb 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [40ec 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [40ed 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [40ee 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003beae60 gate 1598907141332691400 evaluation starts +peer0.org2.example.com | [40ef 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003beae60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [40f0 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003beae60 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [40f1 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003beae60 principal matched by identity 0 +peer0.org2.example.com | [40f2 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 b2 82 29 c0 2a f9 b3 a5 b0 b2 34 50 49 31 b3 |...).*.....4PI1.| +peer0.org2.example.com | 00000010 7d fc 93 2c 84 8a 3d 36 ec 6f 50 9e 1a 66 c0 2c |}..,..=6.oP..f.,| +peer0.org2.example.com | [40f3 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 9b 8b 2c 40 90 2f 80 63 af cd |0E.!....,@./.c..| +peer0.org2.example.com | 00000010 48 ca 37 69 29 29 9f bb 1d c3 5b 8f 63 a1 7c 47 |H.7i))....[.c.|G| +peer0.org2.example.com | 00000020 15 1f ae b2 23 02 20 24 bb 15 3f ac ba ee 84 d3 |....#. $..?.....| +peer0.org2.example.com | 00000030 7a 04 a8 d3 db 97 f1 f4 cf d9 e8 4f a1 21 81 7f |z..........O.!..| +peer0.org2.example.com | 00000040 ce 31 a6 98 54 3c 44 |.1..T DEBU 0xc003beae60 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [40f5 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003beae60 gate 1598907141332691400 evaluation succeeds +peer0.org2.example.com | [40f6 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [40f7 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [40f8 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [40f9 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [40fa 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [40fb 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [40fc 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [40fd 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [40fe 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [40ff 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4100 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4101 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4102 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [4103 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4104 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4105 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4106 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3c71 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +peer0.org1.example.com | [3c72 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3c73 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +peer0.org1.example.com | LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +peer0.org1.example.com | 2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +peer0.org1.example.com | TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +peer0.org1.example.com | MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +peer0.org1.example.com | IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +peer0.org1.example.com | WJ3lSBQ/BUZnxtqUKZb5f082AQ== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3c74 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +peer0.org1.example.com | [3c75 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +peer0.org1.example.com | [3c76 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +peer0.org1.example.com | [3c77 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [3c78 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 91 49 22 67 d4 21 5a c5 5d ba b6 53 95 4a 0e |p.I"g.!Z.]..S.J.| +peer0.org1.example.com | 00000010 ee fd 0a 4b 0b b3 b0 39 d0 4f 7a 03 2f 68 d7 2b |...K...9.Oz./h.+| +peer0.org1.example.com | [3c79 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b 0e 7b 4c 2d fb 5c 6a 92 7b 58 8b |0D. ..{L-.\j.{X.| +peer0.org1.example.com | 00000010 0a 94 e5 5d d9 f6 e0 78 df 56 82 b4 e5 6a e7 97 |...]...x.V...j..| +peer0.org1.example.com | 00000020 4a d7 3d d0 02 20 37 8c 68 5f 50 c0 44 97 70 a1 |J.=.. 7.h_P.D.p.| +peer0.org1.example.com | 00000030 6d 73 fc 0e d0 ba 0e f6 ad 2a 7d 93 67 93 90 59 |ms.......*}.g..Y| +peer0.org1.example.com | 00000040 46 c7 bb 03 af ad |F.....| +peer0.org1.example.com | [3c7a 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [3c7b 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0049c0000, header channel_header:"\010\001\032\006\010\203\306\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\350c\034\327\214\356\327|\351\320\253\304j\r0\333\310\276\276\324\377\007\237t" +peer0.org1.example.com | [3c7c 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +peer0.org1.example.com | [3c7d 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [3c7e 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [3c7f 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [3c80 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [3c81 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [3c82 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [3c83 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [3c84 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [3c85 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [3c86 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [3c87 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [3c88 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [3c89 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [3c8a 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [3c8b 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [3c8c 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer0.org1.example.com | [3c8d 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer0.org1.example.com | [3c8e 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org1.example.com | [3c8f 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org1.example.com | [3c90 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3c91 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org1.example.com | [3c92 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [3c93 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [3c94 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [3c95 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [3c96 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [3c97 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [3c98 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [3c99 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org1.example.com | [3c9a 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +peer0.org1.example.com | [3c9b 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +peer0.org1.example.com | [3c9c 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3c9d 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org1.example.com | [3c9e 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org1.example.com | [3c9f 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +peer0.org1.example.com | [3ca0 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +peer0.org1.example.com | [3ca1 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +peer0.org1.example.com | [3ca2 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [3ca3 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [3ca4 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [3ca5 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [3ca6 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [3ca7 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [3ca8 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [3ca9 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [3caa 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +peer0.org1.example.com | [3cab 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3cac 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +peer0.org1.example.com | [3cad 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer0.org2.example.com | [4107 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [4108 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [4109 08-31 20:52:21.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [410a 08-31 20:52:21.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [410b 08-31 20:52:21.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [410c 08-31 20:52:21.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [410d 08-31 20:52:21.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [410e 08-31 20:52:21.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [410f 08-31 20:52:21.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4110 08-31 20:52:21.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4111 08-31 20:52:21.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4112 08-31 20:52:21.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4113 08-31 20:52:21.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4114 08-31 20:52:21.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4115 08-31 20:52:21.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4116 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4117 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4118 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4119 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [411a 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [411b 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [411c 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [411d 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [411e 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [411f 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4120 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4121 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4122 08-31 20:52:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4123 08-31 20:52:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816103B +peer0.org2.example.com | [4124 08-31 20:52:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 857E2F8E4AE0EF3F41CC6557671B37830E5535D1DA3F2EB6341AB3EAFAB31109 +peer0.org2.example.com | [4125 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4126 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [4127 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [4128 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4129 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [412a 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [412b 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [412d 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [412c 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [412f 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [412e 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4130 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4131 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org2.example.com | [4132 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4133 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [4134 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [4135 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4136 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +peer0.org2.example.com | [4137 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [4138 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 7e 2f 8e 4a e0 ef 3f 41 cc 65 57 67 1b 37 83 |.~/.J..?A.eWg.7.| +peer0.org2.example.com | 00000010 0e 55 35 d1 da 3f 2e b6 34 1a b3 ea fa b3 11 09 |.U5..?..4.......| +peer0.org2.example.com | [4139 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c ff 97 c8 ab 01 42 c7 54 7e 27 c1 |0D. \.....B.T~'.| +peer0.org2.example.com | 00000010 99 22 31 c0 8a 82 a1 07 49 83 6c 18 c4 e5 cb 4c |."1.....I.l....L| +peer0.org2.example.com | 00000020 cb ca a3 a4 02 20 6c c0 df 95 33 89 f1 40 60 5d |..... l...3..@`]| +peer0.org2.example.com | 00000030 49 a2 9d 59 e8 dd f0 be 82 bc 9e 58 04 65 01 0d |I..Y.......X.e..| +peer0.org2.example.com | 00000040 62 25 ea 10 1b 58 |b%...X| +peer0.org2.example.com | [413a 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [413b 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 42 aa fe 67 79 76 a4 45 36 ef 2f 2b |0D. B..gyv.E6./+| +peer0.org2.example.com | 00000010 77 cc 0c 5c a5 0d 60 5d ea 34 e2 37 ea c4 95 8f |w..\..`].4.7....| +peer0.org2.example.com | 00000020 1d 41 b7 09 02 20 0d 9b 0b 24 d4 72 64 f6 f5 5a |.A... ...$.rd..Z| +peer0.org2.example.com | 00000030 64 a4 85 55 97 8b 77 64 52 04 e3 31 e0 39 e3 4c |d..U..wdR..1.9.L| +peer0.org2.example.com | 00000040 d5 70 29 6f a2 0b |.p)o..| +peer0.org2.example.com | [413c 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [413d 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [413e 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [413f 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [4140 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4141 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4142 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4143 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4144 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4145 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4146 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4147 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4148 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4149 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [414a 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [414b 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [414c 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c33730 gate 1598907141525592800 evaluation starts +peer0.org2.example.com | [414d 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c33730 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [414e 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c33730 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [414f 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c33730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4150 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c33730 principal evaluation fails +peer1.org2.example.com | 00000020 fc 9b d7 0a 6a 02 20 2c ed 4a 62 87 c0 d5 27 65 |....j. ,.Jb...'e| +peer1.org2.example.com | 00000030 76 8c 5b 0d f0 5c 57 e1 52 14 32 7c 49 ec e9 1b |v.[..\W.R.2|I...| +peer1.org2.example.com | 00000040 a0 fc ff 7f be b6 c9 |.......| +peer1.org2.example.com | [4301 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [4302 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 68 60 c3 b9 af 4b dc 41 58 0e |0E.!..h`...K.AX.| +peer1.org2.example.com | 00000010 ac 8b 69 83 ba 16 1c 88 11 6b d4 c1 11 31 76 92 |..i......k...1v.| +peer1.org2.example.com | 00000020 42 d1 41 65 be 02 20 4b 84 9b 0c 36 d2 66 3b 65 |B.Ae.. K...6.f;e| +peer1.org2.example.com | 00000030 b7 76 5c f1 33 eb 8f 19 2a 75 04 b6 c5 5e e5 89 |.v\.3...*u...^..| +peer1.org2.example.com | 00000040 f9 07 95 03 74 c5 26 |....t.&| +peer1.org2.example.com | [4303 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [4304 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [4305 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [4306 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org2.example.com | [4307 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4308 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4309 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [430a 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [430c 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [430b 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [430d 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [430e 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [430f 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4310 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4311 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4312 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4313 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4314 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c4dfd0 gate 1598907149134360300 evaluation starts +peer1.org2.example.com | [4315 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c4dfd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4316 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c4dfd0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4317 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c4dfd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4318 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c4dfd0 principal evaluation fails +peer1.org2.example.com | [4319 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c4dfd0 gate 1598907149134360300 evaluation fails +peer1.org2.example.com | [431a 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [431b 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3e4e 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [3e4f 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e50 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:53634 +peer1.org1.example.com | [3e51 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc004229810 +peer1.org1.example.com | [3e52 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [3e53 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [3e54 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [3e55 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [3e56 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb d3 f6 f2 fa 4c ef 8d b1 69 95 cb 34 e8 02 24 |.....L...i..4..$| +peer1.org1.example.com | 00000010 fe b4 8c 8e 42 29 82 26 75 07 bf 6e 2d 7c a5 1d |....B).&u..n-|..| +peer1.org1.example.com | [3e57 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 aa 42 bd ee c0 2d 65 aa 1b aa 79 |0D. 9.B...-e...y| +peer1.org1.example.com | 00000010 63 a3 ae b5 2d dd 5e 8d e9 81 d0 86 9c a9 3a 5b |c...-.^.......:[| +peer1.org1.example.com | 00000020 37 a6 28 12 02 20 47 a2 a0 8f bd 89 0f 6e 64 4b |7.(.. G......ndK| +peer1.org1.example.com | 00000030 2b b5 2d a5 54 42 14 d4 67 43 f5 06 86 a7 6b 08 |+.-.TB..gC....k.| +peer1.org1.example.com | 00000040 c4 1f 08 bd 20 05 |.... .| +peer1.org1.example.com | [3e58 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [3e59 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003fa1f80, header 0xc004229c20 +peer1.org1.example.com | [3e5a 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org1.example.com | [3e5b 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU [][99a099d2] processing txid: 99a099d25c27e554760e45d74c7c8d22e36114c103ac713482dc14b04d38a460 +peer1.org1.example.com | [3e5c 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU [][99a099d2] Entry chaincode: name:"cscc" +peer1.org1.example.com | [3e5d 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> INFO [][99a099d2] Entry chaincode: name:"cscc" +peer1.org1.example.com | [3e5e 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [3e5f 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer1.org1.example.com | [3e60 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb d3 f6 f2 fa 4c ef 8d b1 69 95 cb 34 e8 02 24 |.....L...i..4..$| +peer1.org1.example.com | 00000010 fe b4 8c 8e 42 29 82 26 75 07 bf 6e 2d 7c a5 1d |....B).&u..n-|..| +peer1.org1.example.com | [3e61 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 39 aa 42 bd ee c0 2d 65 aa 1b aa 79 |0D. 9.B...-e...y| +peer1.org1.example.com | 00000010 63 a3 ae b5 2d dd 5e 8d e9 81 d0 86 9c a9 3a 5b |c...-.^.......:[| +peer1.org1.example.com | 00000020 37 a6 28 12 02 20 47 a2 a0 8f bd 89 0f 6e 64 4b |7.(.. G......ndK| +peer1.org1.example.com | 00000030 2b b5 2d a5 54 42 14 d4 67 43 f5 06 86 a7 6b 08 |+.-.TB..gC....k.| +peer1.org1.example.com | 00000040 c4 1f 08 bd 20 05 |.... .| +peer1.org1.example.com | [3e62 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU [99a099d2] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [3e63 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU [99a099d2] notifying Txid:99a099d25c27e554760e45d74c7c8d22e36114c103ac713482dc14b04d38a460, channelID: +peer1.org1.example.com | [3e64 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [3e65 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> INFO [][99a099d2] Exit chaincode: name:"cscc" (2ms) +peer1.org1.example.com | [3e66 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU [][99a099d2] Exit +peer1.org1.example.com | [3e67 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e68 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e69 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [3e6a 08-31 20:52:29.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e6b 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e6c 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e6d 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e6e 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e6f 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3e70 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:53634 +peer1.org1.example.com | [3e71 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:53634 grpc.code=OK grpc.call_duration=6.909ms +peer1.org1.example.com | [3e72 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [3e73 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e74 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e75 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e76 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3e77 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3e78 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3e79 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3e7a 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3e7b 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3e7c 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433f260 gate 1598907149939886300 evaluation starts +peer1.org1.example.com | [3e7d 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433f260 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3e7e 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433f260 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3e7f 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433f260 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3e80 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433f260 principal evaluation fails +peer1.org1.example.com | [3e81 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433f260 gate 1598907149939886300 evaluation fails +peer1.org1.example.com | [3e82 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3e83 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3e84 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3e85 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433f7d0 gate 1598907149941687900 evaluation starts +peer1.org1.example.com | [3e86 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433f7d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3e87 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433f7d0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3e88 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433f7d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3e89 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433f7d0 principal evaluation fails +peer1.org1.example.com | [3e8a 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433f7d0 gate 1598907149941687900 evaluation fails +peer1.org1.example.com | [3e8b 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3e8c 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3e8d 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3e8e 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433fd40 gate 1598907149943648400 evaluation starts +peer1.org1.example.com | [3e8f 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433fd40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3e90 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433fd40 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3e91 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433fd40 principal matched by identity 0 +peer1.org1.example.com | [3e92 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org1.example.com | [3e93 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org1.example.com | [3e94 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433fd40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3e95 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433fd40 gate 1598907149943648400 evaluation succeeds +peer1.org1.example.com | [3e96 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3e97 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3e98 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3e99 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3e9a 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org1.example.com | [3e9b 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org1.example.com | [3e9c 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org1.example.com | [3e9d 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org2.example.com | [4151 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c33730 gate 1598907141525592800 evaluation fails +peer0.org2.example.com | [4152 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4153 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4154 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4155 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c33ca0 gate 1598907141531277600 evaluation starts +peer0.org2.example.com | [4156 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c33ca0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4157 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c33ca0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4158 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c33ca0 principal matched by identity 0 +peer0.org2.example.com | [415b 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 b2 82 29 c0 2a f9 b3 a5 b0 b2 34 50 49 31 b3 |...).*.....4PI1.| +peer0.org2.example.com | 00000010 7d fc 93 2c 84 8a 3d 36 ec 6f 50 9e 1a 66 c0 2c |}..,..=6.oP..f.,| +peer0.org2.example.com | [415c 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 9b 8b 2c 40 90 2f 80 63 af cd |0E.!....,@./.c..| +peer0.org2.example.com | 00000010 48 ca 37 69 29 29 9f bb 1d c3 5b 8f 63 a1 7c 47 |H.7i))....[.c.|G| +peer0.org2.example.com | 00000020 15 1f ae b2 23 02 20 24 bb 15 3f ac ba ee 84 d3 |....#. $..?.....| +peer0.org2.example.com | 00000030 7a 04 a8 d3 db 97 f1 f4 cf d9 e8 4f a1 21 81 7f |z..........O.!..| +peer0.org2.example.com | 00000040 ce 31 a6 98 54 3c 44 |.1..T DEBU 0xc003c33ca0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4159 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [415e 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c33ca0 gate 1598907141531277600 evaluation succeeds +peer0.org2.example.com | [4160 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [415f 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4161 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4162 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4163 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4165 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4166 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4164 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4168 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4169 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [416a 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [416b 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [4167 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [415a 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [416c 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 7e 2f 8e 4a e0 ef 3f 41 cc 65 57 67 1b 37 83 |.~/.J..?A.eWg.7.| +peer0.org2.example.com | 00000010 0e 55 35 d1 da 3f 2e b6 34 1a b3 ea fa b3 11 09 |.U5..?..4.......| +peer0.org2.example.com | [416e 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c ff 97 c8 ab 01 42 c7 54 7e 27 c1 |0D. \.....B.T~'.| +peer0.org2.example.com | 00000010 99 22 31 c0 8a 82 a1 07 49 83 6c 18 c4 e5 cb 4c |."1.....I.l....L| +peer0.org2.example.com | 00000020 cb ca a3 a4 02 20 6c c0 df 95 33 89 f1 40 60 5d |..... l...3..@`]| +peer0.org2.example.com | 00000030 49 a2 9d 59 e8 dd f0 be 82 bc 9e 58 04 65 01 0d |I..Y.......X.e..| +peer0.org2.example.com | 00000040 62 25 ea 10 1b 58 |b%...X| +peer0.org2.example.com | [416d 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [416f 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4170 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [4172 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4173 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [4171 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4174 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4175 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4176 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [4177 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 9e 73 14 28 18 21 1d f9 18 a6 7b 11 64 ed 40 |..s.(.!....{.d.@| +peer0.org2.example.com | 00000010 87 cd 2c 29 a5 28 0d 2d c8 e9 60 18 ae 29 bf 2d |..,).(.-..`..).-| +peer0.org2.example.com | [4178 08-31 20:52:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e1 77 99 e7 ee 43 a9 6f 30 e6 |0E.!...w...C.o0.| +peer0.org1.example.com | [3cae 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ff440 gate 1598907139399451500 evaluation starts +peer0.org1.example.com | [3caf 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ff440 signed by 0 principal evaluation starts (used [false false false]) +peer0.org1.example.com | [3cb0 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ff440 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3cb1 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ff440 principal matched by identity 0 +peer0.org1.example.com | [3cb2 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 79 4d e9 a3 71 1d 24 0f fe ed 23 9d 11 9b 00 |tyM..q.$...#....| +peer0.org1.example.com | 00000010 3e 25 10 29 78 cb 07 bc 16 8a c0 53 e9 e3 ae 76 |>%.)x......S...v| +peer0.org1.example.com | [3cb3 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 6e 97 55 ce e1 8f 4a 2e 44 e9 |0E.!..n.U...J.D.| +peer0.org1.example.com | 00000010 86 cc c7 d8 15 32 92 11 5c 0f ae 9c 24 1e e3 31 |.....2..\...$..1| +peer0.org1.example.com | 00000020 b0 8c 3d 39 f2 02 20 6c 7f 82 68 b5 f7 a9 fc 04 |..=9.. l..h.....| +peer0.org1.example.com | 00000030 9c c0 f7 ee 68 f9 99 1d 35 23 c7 b2 62 e6 51 30 |....h...5#..b.Q0| +peer0.org1.example.com | 00000040 4f f1 8e 15 f4 64 79 |O....dy| +peer0.org1.example.com | [3cb4 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cb5 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cb6 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cb7 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cb8 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41188 bytes, seq: 6}, Envelope: 41221 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3cb9 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cba 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3cbb 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41188 bytes, seq: 6}, Envelope: 41221 bytes, Signature: 0 bytes +peer0.org1.example.com | [3cbc 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3cbd 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ff440 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3cbe 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ff440 gate 1598907139399451500 evaluation succeeds +peer0.org1.example.com | [3cbf 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [3cc0 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [3cc1 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +peer0.org1.example.com | [3cc2 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +peer0.org1.example.com | [3cc3 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffa70 gate 1598907139403192100 evaluation starts +peer0.org1.example.com | [3cc4 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffa70 signed by 0 principal evaluation starts (used [false false false]) +peer0.org1.example.com | [3cc5 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffa70 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3cc6 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffa70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3cc7 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffa70 processing identity 1 with bytes of 115a4b0 +peer0.org1.example.com | [3cc8 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +peer0.org1.example.com | [3cc9 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +peer0.org1.example.com | [3cca 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [3ccb 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [3ccc 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +peer0.org1.example.com | [3ccd 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [3cce 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffa70 principal matched by identity 1 +peer0.org1.example.com | [3ccf 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c 16 ac 57 86 d3 c3 21 1e c6 7b f6 f4 33 15 53 |...W...!..{..3.S| +peer0.org1.example.com | 00000010 51 0a 12 8c c9 dc af 08 54 64 1f 16 1c 10 79 1c |Q.......Td....y.| +peer0.org1.example.com | [3cd0 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 5d cb e8 72 66 8f d2 c7 ff a3 |0E.!..]..rf.....| +peer1.org2.example.com | [431c 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [431d 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c72540 gate 1598907149134623600 evaluation starts +peer1.org2.example.com | [431e 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c72540 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [431f 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c72540 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4320 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c72540 principal matched by identity 0 +peer1.org2.example.com | [4321 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 92 97 fa aa d4 02 28 8b d8 61 84 86 f9 40 ef |.......(..a...@.| +peer1.org2.example.com | 00000010 fb 5e cd 5b 1d b1 37 dc 33 68 1e 31 30 75 bd 0b |.^.[..7.3h.10u..| +peer1.org2.example.com | [4322 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 34 0f 82 b6 c8 0f 1b 71 00 00 |0E.!..4......q..| +peer1.org2.example.com | 00000010 b4 79 07 e4 fd da 76 35 0d 8a 32 f0 9a 5a c6 f9 |.y....v5..2..Z..| +peer1.org2.example.com | 00000020 e3 4d 1b e5 84 02 20 21 79 59 ec 7f e4 89 df b6 |.M.... !yY......| +peer1.org2.example.com | 00000030 9c 4b 7e 22 d9 b1 ef d7 6a b6 7c 1a 7b ef a3 2d |.K~"....j.|.{..-| +peer1.org2.example.com | 00000040 07 5c bb e6 ba bb 91 |.\.....| +peer1.org2.example.com | [4323 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c72540 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4324 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c72540 gate 1598907149134623600 evaluation succeeds +peer1.org2.example.com | [4325 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4326 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4327 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4328 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4329 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [432a 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [432b 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [432c 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e4 b0 84 4b 07 df 73 7a 11 0c 44 35 9d 1d 7f |....K..sz..D5...| +peer1.org2.example.com | 00000010 f5 f0 fa 1e d7 a5 c0 10 5a 6a e8 0d 87 44 2e 4e |........Zj...D.N| +peer1.org2.example.com | [432d 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 33 f0 79 6c 51 c3 d7 39 cb eb |0E.!..3.ylQ..9..| +peer1.org2.example.com | 00000010 c3 16 f3 19 8f 04 6d c3 41 aa ea cf 84 60 d0 c7 |......m.A....`..| +peer1.org2.example.com | 00000020 9f 18 6f 34 a8 02 20 6f 81 d6 42 16 92 06 21 50 |..o4.. o..B...!P| +peer1.org2.example.com | 00000030 32 3a 12 4c b6 fe d5 74 02 3a 69 81 62 43 8e a6 |2:.L...t.:i.bC..| +peer1.org2.example.com | 00000040 7c 6a ba 25 70 78 59 ||j.%pxY| +peer1.org2.example.com | [432e 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [432f 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4330 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4331 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 c6 aa ca 4b 34 fb 28 1b f8 14 65 62 8b 48 9a |....K4.(...eb.H.| +peer1.org2.example.com | 00000010 25 8b 97 16 05 19 3a 40 85 36 e0 f5 0f f4 c9 e1 |%.....:@.6......| +peer1.org2.example.com | [4332 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 8c 08 ce a8 0d f4 e2 1c 0f 72 |0E.!...........r| +peer1.org2.example.com | 00000010 af 0a d7 f2 ba 8a 90 26 28 d4 cc a1 a8 9e 2f b5 |.......&(...../.| +peer1.org2.example.com | 00000020 fc 9b d7 0a 6a 02 20 2c ed 4a 62 87 c0 d5 27 65 |....j. ,.Jb...'e| +peer1.org2.example.com | 00000030 76 8c 5b 0d f0 5c 57 e1 52 14 32 7c 49 ec e9 1b |v.[..\W.R.2|I...| +peer1.org2.example.com | 00000040 a0 fc ff 7f be b6 c9 |.......| +peer1.org2.example.com | [4333 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4334 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4335 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4336 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4337 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [4338 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4339 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e4 b0 84 4b 07 df 73 7a 11 0c 44 35 9d 1d 7f |....K..sz..D5...| +peer1.org2.example.com | 00000010 f5 f0 fa 1e d7 a5 c0 10 5a 6a e8 0d 87 44 2e 4e |........Zj...D.N| +peer1.org2.example.com | [433a 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 33 f0 79 6c 51 c3 d7 39 cb eb |0E.!..3.ylQ..9..| +peer1.org2.example.com | 00000010 c3 16 f3 19 8f 04 6d c3 41 aa ea cf 84 60 d0 c7 |......m.A....`..| +peer1.org2.example.com | 00000020 9f 18 6f 34 a8 02 20 6f 81 d6 42 16 92 06 21 50 |..o4.. o..B...!P| +peer1.org2.example.com | 00000030 32 3a 12 4c b6 fe d5 74 02 3a 69 81 62 43 8e a6 |2:.L...t.:i.bC..| +peer1.org2.example.com | 00000040 7c 6a ba 25 70 78 59 ||j.%pxY| +peer1.org2.example.com | [433b 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [433c 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [433e 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [433d 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org1.example.com | [3e9e 08-31 20:52:29.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3e9f 08-31 20:52:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.8:7051->172.18.0.9:53634: read: connection reset by peer +peer1.org1.example.com | [3ea0 08-31 20:52:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [3ea1 08-31 20:52:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ea2 08-31 20:52:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3ea3 08-31 20:52:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ea4 08-31 20:52:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ea5 08-31 20:52:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3ea6 08-31 20:52:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3ea7 08-31 20:52:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3ea8 08-31 20:52:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004369d20 gate 1598907149954960500 evaluation starts +peer1.org1.example.com | [3ea9 08-31 20:52:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004369d20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3eaa 08-31 20:52:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004369d20 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3eab 08-31 20:52:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004369d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3eac 08-31 20:52:29.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004369d20 principal evaluation fails +peer1.org1.example.com | [3ead 08-31 20:52:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004369d20 gate 1598907149954960500 evaluation fails +peer1.org1.example.com | [3eae 08-31 20:52:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3eaf 08-31 20:52:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3eb0 08-31 20:52:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3eb1 08-31 20:52:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004384290 gate 1598907149962827200 evaluation starts +peer1.org1.example.com | [3eb2 08-31 20:52:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004384290 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3eb3 08-31 20:52:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004384290 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3eb4 08-31 20:52:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004384290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3eb5 08-31 20:52:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004384290 principal evaluation fails +peer1.org1.example.com | [3eb6 08-31 20:52:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004384290 gate 1598907149962827200 evaluation fails +peer1.org1.example.com | [3eb7 08-31 20:52:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3eb8 08-31 20:52:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3eb9 08-31 20:52:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3eba 08-31 20:52:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004384800 gate 1598907149967821900 evaluation starts +peer1.org1.example.com | [3ebb 08-31 20:52:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004384800 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ebc 08-31 20:52:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004384800 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3ebd 08-31 20:52:29.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004384800 principal matched by identity 0 +peer1.org1.example.com | [3ebe 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org1.example.com | [3ebf 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org1.example.com | [3ec0 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004384800 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3ec1 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004384800 gate 1598907149967821900 evaluation succeeds +peer1.org1.example.com | [3ec2 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ec3 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3ec4 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3ec5 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3ec6 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3ec7 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [3ec8 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ec9 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3eca 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ecb 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3ecc 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ecd 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ece 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3ecf 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3ed0 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3ed1 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004385c50 gate 1598907149975657400 evaluation starts +peer1.org1.example.com | [3ed2 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004385c50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ed3 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004385c50 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3ed4 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004385c50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3ed5 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004385c50 principal evaluation fails +peer1.org1.example.com | [3ed6 08-31 20:52:29.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004385c50 gate 1598907149975657400 evaluation fails +peer1.org1.example.com | [3ed7 08-31 20:52:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3ed8 08-31 20:52:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3ed9 08-31 20:52:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3eda 08-31 20:52:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439e1c0 gate 1598907149981278700 evaluation starts +peer1.org1.example.com | [3edb 08-31 20:52:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439e1c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3edc 08-31 20:52:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439e1c0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3edd 08-31 20:52:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439e1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3ede 08-31 20:52:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439e1c0 principal evaluation fails +peer1.org1.example.com | [3edf 08-31 20:52:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439e1c0 gate 1598907149981278700 evaluation fails +peer1.org1.example.com | [3ee0 08-31 20:52:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3ee1 08-31 20:52:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3ee2 08-31 20:52:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3ee3 08-31 20:52:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439e730 gate 1598907149984913300 evaluation starts +peer1.org2.example.com | [433f 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4340 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4341 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4342 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4343 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4344 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4345 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4346 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8b520 gate 1598907149140839200 evaluation starts +peer1.org2.example.com | [4347 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8b520 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4348 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8b520 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4349 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8b520 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [434a 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8b520 principal evaluation fails +peer1.org2.example.com | [434b 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8b520 gate 1598907149140839200 evaluation fails +peer1.org2.example.com | [434c 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [434d 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [434e 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [434f 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8ba90 gate 1598907149142744600 evaluation starts +peer1.org2.example.com | [4350 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8ba90 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4351 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8ba90 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4352 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8ba90 principal matched by identity 0 +peer1.org2.example.com | [4353 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 6f bc e6 0e 08 91 b2 0a 67 44 c2 14 2e dc 99 |.o.......gD.....| +peer1.org2.example.com | 00000010 d6 c7 15 c7 53 70 16 ae 4b 70 12 96 0c f6 e9 86 |....Sp..Kp......| +peer1.org2.example.com | [4354 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 fc 7d 0e ee ef b1 04 45 2d 8e |0E.!...}.....E-.| +peer1.org2.example.com | 00000010 b5 09 4e 13 39 28 76 7e 53 53 d0 bd 17 48 eb 7d |..N.9(v~SS...H.}| +peer1.org2.example.com | 00000020 2a 28 83 40 6c 02 20 55 00 c7 99 e9 e2 6c 60 8d |*(.@l. U.....l`.| +peer1.org2.example.com | 00000030 3a 32 f6 d1 cb 98 7b d9 21 47 a3 3c 8c 63 f4 9d |:2....{.!G.<.c..| +peer1.org2.example.com | 00000040 04 f5 d4 cc 5e b2 19 |....^..| +peer1.org2.example.com | [4355 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8ba90 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4356 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8ba90 gate 1598907149142744600 evaluation succeeds +peer1.org2.example.com | [4357 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4358 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4359 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [435a 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [435b 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [435c 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [435d 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [435e 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 c6 aa ca 4b 34 fb 28 1b f8 14 65 62 8b 48 9a |....K4.(...eb.H.| +peer1.org2.example.com | 00000010 25 8b 97 16 05 19 3a 40 85 36 e0 f5 0f f4 c9 e1 |%.....:@.6......| +peer1.org2.example.com | [435f 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 8c 08 ce a8 0d f4 e2 1c 0f 72 |0E.!...........r| +peer0.org2.example.com | 00000010 fb 77 6a da bf cc 64 75 9d eb 18 cb 69 d4 bf c0 |.wj...du....i...| +peer0.org2.example.com | 00000020 08 bf 62 c2 4a 02 20 6d 34 73 8a 97 9d a4 7f c5 |..b.J. m4s......| +peer0.org2.example.com | 00000030 ba 10 d5 39 69 b9 5e e5 63 68 00 ce 7a 49 9e 5e |...9i.^.ch..zI.^| +peer0.org2.example.com | 00000040 f1 b2 c8 7f c7 f5 c3 |.......| +peer0.org2.example.com | [4179 08-31 20:52:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [417a 08-31 20:52:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [417b 08-31 20:52:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [417c 08-31 20:52:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [417d 08-31 20:52:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [417e 08-31 20:52:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [417f 08-31 20:52:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 7e 2f 8e 4a e0 ef 3f 41 cc 65 57 67 1b 37 83 |.~/.J..?A.eWg.7.| +peer0.org2.example.com | 00000010 0e 55 35 d1 da 3f 2e b6 34 1a b3 ea fa b3 11 09 |.U5..?..4.......| +peer0.org2.example.com | [4180 08-31 20:52:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c ff 97 c8 ab 01 42 c7 54 7e 27 c1 |0D. \.....B.T~'.| +peer0.org2.example.com | 00000010 99 22 31 c0 8a 82 a1 07 49 83 6c 18 c4 e5 cb 4c |."1.....I.l....L| +peer0.org2.example.com | 00000020 cb ca a3 a4 02 20 6c c0 df 95 33 89 f1 40 60 5d |..... l...3..@`]| +peer0.org2.example.com | 00000030 49 a2 9d 59 e8 dd f0 be 82 bc 9e 58 04 65 01 0d |I..Y.......X.e..| +peer0.org2.example.com | 00000040 62 25 ea 10 1b 58 |b%...X| +peer0.org2.example.com | [4181 08-31 20:52:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4182 08-31 20:52:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4183 08-31 20:52:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4184 08-31 20:52:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [4185 08-31 20:52:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 9e 73 14 28 18 21 1d f9 18 a6 7b 11 64 ed 40 |..s.(.!....{.d.@| +peer0.org2.example.com | 00000010 87 cd 2c 29 a5 28 0d 2d c8 e9 60 18 ae 29 bf 2d |..,).(.-..`..).-| +peer0.org2.example.com | [4186 08-31 20:52:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e1 77 99 e7 ee 43 a9 6f 30 e6 |0E.!...w...C.o0.| +peer0.org2.example.com | 00000010 fb 77 6a da bf cc 64 75 9d eb 18 cb 69 d4 bf c0 |.wj...du....i...| +peer0.org2.example.com | 00000020 08 bf 62 c2 4a 02 20 6d 34 73 8a 97 9d a4 7f c5 |..b.J. m4s......| +peer0.org2.example.com | 00000030 ba 10 d5 39 69 b9 5e e5 63 68 00 ce 7a 49 9e 5e |...9i.^.ch..zI.^| +peer0.org2.example.com | 00000040 f1 b2 c8 7f c7 f5 c3 |.......| +peer0.org2.example.com | [4187 08-31 20:52:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4188 08-31 20:52:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4189 08-31 20:52:21.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [418a 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [418b 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [418c 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [418d 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [418e 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [418f 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4190 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4191 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4192 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4193 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4194 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4195 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4196 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c829e0 gate 1598907141618413800 evaluation starts +peer0.org2.example.com | [4197 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c829e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4198 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c829e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4199 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c829e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [419a 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c829e0 principal evaluation fails +peer0.org2.example.com | [419b 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c829e0 gate 1598907141618413800 evaluation fails +peer0.org2.example.com | [419c 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [419d 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [419e 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [419f 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c82f50 gate 1598907141619344000 evaluation starts +peer0.org2.example.com | [41a0 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c82f50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [41a1 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c82f50 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [41a2 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c82f50 principal matched by identity 0 +peer0.org2.example.com | [41a3 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 9a f5 53 9e f9 83 db 2f 34 ad d5 1c 20 26 85 |...S..../4... &.| +peer0.org2.example.com | 00000010 58 ee 5c ab 5d 7e 9c e3 6f f9 49 1b 23 bc 85 2c |X.\.]~..o.I.#..,| +peer0.org2.example.com | [41a4 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 8f b8 0c ad a4 ff 4d 70 69 23 a7 |0D. w......Mpi#.| +peer0.org2.example.com | 00000010 b4 26 e3 1b 93 c8 16 6b 88 53 10 5b 0d 2f 05 ba |.&.....k.S.[./..| +peer0.org2.example.com | 00000020 a0 7b b5 64 02 20 44 8c a3 73 eb ae ed 12 e7 ac |.{.d. D..s......| +peer0.org2.example.com | 00000030 94 05 8e 24 5e b6 4b 48 75 3b 40 52 cc 85 23 5c |...$^.KHu;@R..#\| +peer0.org2.example.com | 00000040 f8 d3 83 df 4e ae |....N.| +peer0.org2.example.com | [41a5 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c82f50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [41a6 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c82f50 gate 1598907141619344000 evaluation succeeds +peer0.org2.example.com | [41a7 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41a8 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41a9 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [41aa 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [41ab 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [41ac 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [41ad 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [41ae 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [41af 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [41b0 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41b1 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41b2 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41b3 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [41b4 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41b5 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ee4 08-31 20:52:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439e730 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ee5 08-31 20:52:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439e730 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3ee6 08-31 20:52:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439e730 principal matched by identity 0 +peer1.org1.example.com | [3ee7 08-31 20:52:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org1.example.com | [3ee8 08-31 20:52:29.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org1.example.com | [3ee9 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439e730 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3eea 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00439e730 gate 1598907149984913300 evaluation succeeds +peer1.org1.example.com | [3eeb 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3eec 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3eed 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3eee 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3eef 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org1.example.com | [3ef0 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org1.example.com | [3ef1 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org1.example.com | [3ef2 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org1.example.com | [3ef3 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ef4 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3ef5 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3ef6 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ef7 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3ef8 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3ef9 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3efa 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3efb 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c2710 gate 1598907149997762700 evaluation starts +peer1.org1.example.com | [3efc 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c2710 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3efd 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c2710 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3efe 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c2710 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3eff 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c2710 principal evaluation fails +peer1.org1.example.com | [3f00 08-31 20:52:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c2710 gate 1598907149997762700 evaluation fails +peer1.org1.example.com | [3f01 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3f02 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3f03 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3f04 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c2c80 gate 1598907150000887100 evaluation starts +peer1.org1.example.com | [3f05 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f06 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f07 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [3f08 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f0a 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f0b 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [3f0c 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f0d 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f09 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c2c80 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f0e 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c2c80 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3f0f 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c2c80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3f10 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c2c80 principal evaluation fails +peer1.org1.example.com | [3f11 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c2c80 gate 1598907150000887100 evaluation fails +peer1.org1.example.com | [3f12 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f13 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f14 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3f15 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433aeb0 gate 1598907150004799300 evaluation starts +peer1.org1.example.com | [3f16 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433aeb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f17 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433aeb0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3f18 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433aeb0 principal matched by identity 0 +peer1.org1.example.com | [3f19 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org1.example.com | [3f1a 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org1.example.com | [3f1b 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433aeb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3f1c 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00433aeb0 gate 1598907150004799300 evaluation succeeds +peer1.org1.example.com | [3f1d 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f1e 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f1f 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3f20 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3f21 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 af 0a d7 f2 ba 8a 90 26 28 d4 cc a1 a8 9e 2f b5 |.......&(...../.| +peer1.org2.example.com | 00000020 fc 9b d7 0a 6a 02 20 2c ed 4a 62 87 c0 d5 27 65 |....j. ,.Jb...'e| +peer1.org2.example.com | 00000030 76 8c 5b 0d f0 5c 57 e1 52 14 32 7c 49 ec e9 1b |v.[..\W.R.2|I...| +peer1.org2.example.com | 00000040 a0 fc ff 7f be b6 c9 |.......| +peer1.org2.example.com | [4360 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4361 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4362 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4363 08-31 20:52:29.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4364 08-31 20:52:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [4365 08-31 20:52:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [4366 08-31 20:52:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4367 08-31 20:52:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D981610131801 +peer1.org2.example.com | [4368 08-31 20:52:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FAC784DDDB76F1A2A141101499BA5AC997990D5160E93CF4771708C7C1A0CF7B +peer1.org2.example.com | [4369 08-31 20:52:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [436a 08-31 20:52:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [436b 08-31 20:52:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [436c 08-31 20:52:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [436d 08-31 20:52:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [436e 08-31 20:52:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [436f 08-31 20:52:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4370 08-31 20:52:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4371 08-31 20:52:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [4372 08-31 20:52:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4373 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4374 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4375 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4376 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4377 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4378 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4379 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [437a 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [437b 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [437c 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [437d 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [437e 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [437f 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4380 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4381 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4382 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4383 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000010 aa d3 dc 46 c5 bd 34 a5 d8 7d dc a8 35 2c d6 29 |...F..4..}..5,.)| +peer0.org1.example.com | 00000020 07 b0 75 b1 d5 02 20 0a ef 18 c5 de bf be 2c 7c |..u... .......,|| +peer0.org1.example.com | 00000030 16 ea 9e 3a ba 4b 56 95 85 92 21 ee 94 17 ad 3b |...:.KV...!....;| +peer0.org1.example.com | 00000040 78 aa 13 9c c2 d4 33 |x.....3| +peer0.org1.example.com | [3cd1 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffa70 principal evaluation succeeds for identity 1 +peer0.org1.example.com | [3cd2 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffa70 gate 1598907139403192100 evaluation succeeds +peer0.org1.example.com | [3cd3 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [3cd4 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [3cd5 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +peer0.org1.example.com | [3cd6 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +peer0.org1.example.com | [3cd7 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3cd8 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [3cd9 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3cda 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [3cdb 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +peer0.org1.example.com | [3cdc 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3cdd 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3cde 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3cdf 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3ce0 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [3ce1 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3ce2 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3ce3 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [3ce4 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [3ce5 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +peer0.org1.example.com | [3ce6 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3ce7 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3ce8 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +peer0.org1.example.com | [3ce9 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +peer0.org1.example.com | [3cea 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +peer0.org1.example.com | [3ceb 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +peer0.org1.example.com | [3cec 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +peer0.org1.example.com | [3ced 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3cee 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +peer0.org1.example.com | [3cef 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +peer0.org1.example.com | [3cf0 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +peer0.org1.example.com | [3cf1 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +peer0.org1.example.com | [3cf2 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +peer0.org1.example.com | [3cf3 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +peer0.org1.example.com | [3cf4 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +peer0.org1.example.com | [3cf5 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [3cf6 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +peer0.org1.example.com | [3cf7 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +peer0.org1.example.com | [3cf8 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [3cf9 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [3cfa 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [3cfb 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [3cfc 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org2.example.com | [41b6 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41b7 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [41b8 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [41b9 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [41ba 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41bb 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [41bc 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [41bd 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41be 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41bf 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41c0 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41c1 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [41c2 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [41c3 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41c4 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [41c5 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [41c6 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [41c7 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [41c8 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [41c9 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3f22 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f23 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org1.example.com | [3f24 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org1.example.com | [3f25 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f26 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4384 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4385 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4386 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4387 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4388 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4389 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [438a 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5bc10 gate 1598907149340614200 evaluation starts +peer1.org2.example.com | [438b 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5bc10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [438c 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5bc10 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [438d 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5bc10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [438e 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5bc10 principal evaluation fails +peer1.org2.example.com | [438f 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c5bc10 gate 1598907149340614200 evaluation fails +peer1.org2.example.com | [4390 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4391 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4392 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4393 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cde180 gate 1598907149341013800 evaluation starts +peer1.org2.example.com | [4394 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cde180 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4395 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cde180 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4396 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cde180 principal matched by identity 0 +peer1.org2.example.com | [4397 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 4c e8 7c 41 d4 f7 a3 f5 ac 60 e5 de 00 ae 4f |?L.|A.....`....O| +peer1.org2.example.com | 00000010 0b 3c f0 28 a0 3e 58 c0 fe 51 d7 1b e8 56 fc 1c |.<.(.>X..Q...V..| +peer1.org2.example.com | [4398 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 0f d7 87 e9 12 8f b2 f3 85 30 |0E.!...........0| +peer1.org2.example.com | 00000010 62 c9 8c 45 56 44 bf 74 ef 55 23 70 7c ae fb 21 |b..EVD.t.U#p|..!| +peer1.org2.example.com | 00000020 e6 37 76 cb c9 02 20 11 7e c4 66 12 ff 9b 01 c4 |.7v... .~.f.....| +peer1.org2.example.com | 00000030 83 63 aa 51 db fa 69 6b 92 b8 0b 02 07 4f 26 71 |.c.Q..ik.....O&q| +peer1.org2.example.com | 00000040 b7 8f 6a 62 5e 8f 09 |..jb^..| +peer1.org2.example.com | [4399 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cde180 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [439a 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cde180 gate 1598907149341013800 evaluation succeeds +peer1.org2.example.com | [439b 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [439c 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [439d 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [439e 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [439f 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [43a0 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [43a1 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [43a2 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3cfd 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +peer0.org1.example.com | [3cfe 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +peer0.org1.example.com | [3cff 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [3d00 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [3d01 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +peer0.org1.example.com | [3d02 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +peer0.org1.example.com | WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +peer0.org1.example.com | X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +peer0.org1.example.com | Cn9MH6oeCY2L1BpZpd3WSl88UmRk +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3d03 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [3d04 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [3d05 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [3d06 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [3d07 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +peer0.org1.example.com | [3d08 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +peer0.org1.example.com | [3d09 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [3d0a 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [3d0b 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +peer0.org1.example.com | [3d0c 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +peer0.org1.example.com | 6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +peer0.org1.example.com | uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +peer0.org1.example.com | AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +peer0.org1.example.com | 7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3d0d 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +peer0.org1.example.com | [3d0e 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +peer0.org1.example.com | [3d0f 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [3d10 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [3d11 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +peer0.org1.example.com | [3d12 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +peer0.org1.example.com | [3d13 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [3d14 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [3d15 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +peer0.org1.example.com | [3d16 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +peer0.org1.example.com | ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +peer0.org1.example.com | szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +peer0.org1.example.com | gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +peer0.org1.example.com | CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +peer0.org1.example.com | 9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +peer0.org1.example.com | AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +peer0.org1.example.com | C/Ss9LR+jThkl1qHzVQYXujczlU= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3d17 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +peer0.org1.example.com | [3d18 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +peer0.org1.example.com | [3d19 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +peer0.org1.example.com | [3d1a 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +peer0.org1.example.com | [3d1b 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +peer0.org1.example.com | [3d1c 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +peer0.org1.example.com | [3d1d 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +peer0.org1.example.com | [3d1e 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +peer0.org1.example.com | [3d1f 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +peer0.org1.example.com | [3d20 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +peer0.org1.example.com | [3d21 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +peer0.org1.example.com | [3d22 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +peer0.org1.example.com | [3d23 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +peer0.org1.example.com | [3d24 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +peer0.org1.example.com | [3d25 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +peer0.org1.example.com | [3d26 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +peer0.org1.example.com | cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +peer0.org1.example.com | BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +peer0.org1.example.com | c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +peer0.org1.example.com | b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +peer0.org1.example.com | E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +peer0.org1.example.com | azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +peer0.org1.example.com | MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +peer0.org1.example.com | B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +peer0.org1.example.com | K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +peer0.org1.example.com | nw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3d27 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +peer0.org1.example.com | [3d28 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +peer0.org1.example.com | [3d29 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [3d2a 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [3d2b 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +peer0.org1.example.com | [3d2c 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +peer0.org1.example.com | [3d2d 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +peer0.org1.example.com | [3d2e 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +peer0.org1.example.com | [3d2f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +peer0.org1.example.com | [3d30 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +peer0.org1.example.com | [3d31 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +peer0.org1.example.com | [3d32 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +peer0.org1.example.com | [3d33 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +peer0.org1.example.com | [3d34 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +peer0.org1.example.com | [3d35 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +peer0.org1.example.com | [3d36 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +peer0.org1.example.com | [3d37 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +peer0.org1.example.com | [3d38 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +peer0.org1.example.com | [3d39 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +peer0.org1.example.com | [3d3a 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +peer0.org2.example.com | [41ca 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9f190 gate 1598907141689947600 evaluation starts +peer0.org2.example.com | [41cb 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9f190 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [41cc 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9f190 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [41cd 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9f190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [41ce 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9f190 principal evaluation fails +peer0.org2.example.com | [41cf 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9f190 gate 1598907141689947600 evaluation fails +peer0.org2.example.com | [41d0 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [41d1 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [41d2 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [41d3 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9f700 gate 1598907141690224300 evaluation starts +peer0.org2.example.com | [41d4 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9f700 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [41d5 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9f700 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [41d6 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9f700 principal matched by identity 0 +peer0.org2.example.com | [41d7 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org2.example.com | [41d8 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org2.example.com | [41d9 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9f700 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [41da 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c9f700 gate 1598907141690224300 evaluation succeeds +peer0.org2.example.com | [41db 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41dc 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41dd 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [41de 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [41df 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41e0 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41e1 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [41e2 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [41e3 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [41e4 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [41e5 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [41e6 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc02f0 gate 1598907141691460500 evaluation starts +peer0.org2.example.com | [41e7 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc02f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [41e8 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc02f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [41e9 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc02f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [41ea 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc02f0 principal evaluation fails +peer0.org2.example.com | [41eb 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc02f0 gate 1598907141691460500 evaluation fails +peer0.org2.example.com | [41ec 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [41ed 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [41ee 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [41ef 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc0860 gate 1598907141691849800 evaluation starts +peer0.org2.example.com | [41f0 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc0860 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [41f1 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc0860 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [41f2 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc0860 principal matched by identity 0 +peer0.org2.example.com | [41f3 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org2.example.com | [41f4 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org2.example.com | [41f5 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc0860 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [41f6 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc0860 gate 1598907141691849800 evaluation succeeds +peer0.org2.example.com | [41f7 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41f8 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [41f9 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [41fa 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [41fb 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [41fc 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [41fd 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [41fe 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [41ff 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [4200 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4201 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4202 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4203 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4204 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4205 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4206 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc1bd0 gate 1598907141704308000 evaluation starts +peer0.org2.example.com | [4207 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc1bd0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4208 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc1bd0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4209 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc1bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [420a 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc1bd0 principal evaluation fails +peer0.org2.example.com | [420b 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cc1bd0 gate 1598907141704308000 evaluation fails +peer0.org2.example.com | [420c 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [420d 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [420e 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [420f 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cda140 gate 1598907141706483500 evaluation starts +peer0.org2.example.com | [4210 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cda140 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4211 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cda140 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4212 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cda140 principal matched by identity 0 +peer0.org2.example.com | [4213 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org2.example.com | [4214 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org2.example.com | [4215 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cda140 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4216 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cda140 gate 1598907141706483500 evaluation succeeds +peer0.org2.example.com | [4217 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4218 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4219 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [421a 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [421b 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [421c 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [421d 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [421e 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [421f 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4220 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4221 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3f27 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3f28 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f29 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f2a 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3f2b 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3f2c 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3f2d 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e6940 gate 1598907150012843700 evaluation starts +peer1.org1.example.com | [3f2e 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e6940 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f2f 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e6940 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3f30 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e6940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3f31 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e6940 principal evaluation fails +peer1.org1.example.com | [3f32 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e6940 gate 1598907150012843700 evaluation fails +peer1.org1.example.com | [3f33 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3f34 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3f35 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3f36 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e6eb0 gate 1598907150013179400 evaluation starts +peer1.org1.example.com | [3f37 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e6eb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f38 08-31 20:52:30.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e6eb0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3f39 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e6eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3f3a 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e6eb0 principal evaluation fails +peer1.org1.example.com | [3f3b 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e6eb0 gate 1598907150013179400 evaluation fails +peer1.org1.example.com | [3f3c 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f3d 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f3e 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3f3f 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e7420 gate 1598907150022485800 evaluation starts +peer1.org1.example.com | [3f40 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e7420 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f41 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e7420 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3f42 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e7420 principal matched by identity 0 +peer1.org1.example.com | [3f43 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org1.example.com | [3f44 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org1.example.com | [3f45 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e7420 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3f46 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043e7420 gate 1598907150022485800 evaluation succeeds +peer1.org1.example.com | [3f47 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f48 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f49 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3f4a 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3f4b 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org1.example.com | [3f4c 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org2.example.com | [43a3 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [43a4 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43a5 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43a6 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43a7 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [43a8 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43a9 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43aa 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43ab 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [43ac 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\326Ah\363r\002\376\270\275\262\007\020y\202\346sb" > +peer1.org2.example.com | [43ad 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer1.org2.example.com | [43ae 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43af 08-31 20:52:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [43b0 08-31 20:52:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [43b1 08-31 20:52:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [43b2 08-31 20:52:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43b3 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [43b4 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43b5 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [43b6 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [43b7 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 01 24 31 7f 14 c1 2b c5 b6 8c 37 ab 5c 65 be |..$1...+...7.\e.| +peer1.org2.example.com | 00000010 69 79 c5 5c 09 c9 b4 62 16 82 2d 7e 47 40 bc c5 |iy.\...b..-~G@..| +peer1.org2.example.com | [43b8 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa d0 ca fb 28 92 78 b8 dc 68 46 |0E.!.....(.x..hF| +peer1.org2.example.com | 00000010 cc a0 de 06 1f 1e ab d4 a0 02 30 65 87 b0 5c b3 |..........0e..\.| +peer1.org2.example.com | 00000020 e8 89 d5 d9 02 02 20 03 f5 6a bd 54 66 b0 7f a8 |...... ..j.Tf...| +peer1.org2.example.com | 00000030 7c c3 0d e0 fb 41 e5 a0 b2 cf da 83 40 89 0e ba ||....A......@...| +peer1.org2.example.com | 00000040 ca 21 a1 73 b5 9b 81 |.!.s...| +peer1.org2.example.com | [43b9 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer1.org2.example.com | [43ba 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 ce 7c 97 fd 14 bc fb eb f9 a5 3d |0D. S.|........=| +peer1.org2.example.com | 00000010 4f b8 28 ec dc 66 98 8d 0f 6c 1b 45 b7 a5 b2 e2 |O.(..f...l.E....| +peer1.org2.example.com | 00000020 62 86 10 6a 02 20 1d 9a 43 36 bd b9 68 c9 0a fd |b..j. ..C6..h...| +peer1.org2.example.com | 00000030 19 62 a4 d6 92 9a 67 1b 07 5a ea 87 6a e8 60 46 |.b....g..Z..j.`F| +peer0.org1.example.com | [3d3b 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +peer0.org1.example.com | [3d3c 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [3d3d 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [3d3e 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +peer0.org1.example.com | [3d3f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +peer0.org1.example.com | [3d40 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +peer0.org1.example.com | [3d41 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +peer0.org1.example.com | [3d42 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +peer0.org1.example.com | [3d43 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +peer0.org1.example.com | [3d44 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +peer0.org1.example.com | [3d45 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +peer0.org1.example.com | [3d46 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +peer0.org1.example.com | [3d47 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +peer0.org1.example.com | [3d48 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +peer0.org1.example.com | [3d49 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +peer0.org1.example.com | [3d4a 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +peer0.org1.example.com | [3d4b 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +peer0.org1.example.com | [3d4c 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +peer0.org1.example.com | [3d4d 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +peer0.org1.example.com | [3d4e 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +peer0.org1.example.com | [3d4f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +peer0.org1.example.com | [3d50 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +peer0.org1.example.com | [3d51 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +peer0.org1.example.com | [3d52 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +peer0.org1.example.com | [3d53 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +peer0.org1.example.com | [3d54 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +peer0.org1.example.com | [3d55 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +peer0.org1.example.com | [3d56 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +peer0.org1.example.com | [3d57 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +peer0.org1.example.com | [3d58 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +peer0.org1.example.com | [3d59 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +peer0.org2.example.com | [4222 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4223 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4224 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb3e0 gate 1598907141708860900 evaluation starts +peer0.org2.example.com | [4225 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb3e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4226 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb3e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4227 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb3e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4228 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb3e0 principal evaluation fails +peer0.org2.example.com | [4229 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb3e0 gate 1598907141708860900 evaluation fails +peer0.org2.example.com | [422a 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [422b 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [422c 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [422d 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [422e 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 2 peers +peer0.org2.example.com | [422f 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4230 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4231 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [4232 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4233 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [4234 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org1.example.com | [3f4d 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f4e 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f4f 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3f50 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f51 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f52 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3f53 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3f54 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3f55 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c37e0 gate 1598907150052793900 evaluation starts +peer1.org1.example.com | [3f56 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c37e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f57 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c37e0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3f58 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c37e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3f59 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c37e0 principal evaluation fails +peer1.org1.example.com | [3f5a 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c37e0 gate 1598907150052793900 evaluation fails +peer1.org1.example.com | [3f5b 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3f5c 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3f5d 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3f5e 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c3d50 gate 1598907150061442600 evaluation starts +peer1.org1.example.com | [3f5f 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c3d50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f60 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c3d50 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3f61 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c3d50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3f62 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c3d50 principal evaluation fails +peer1.org1.example.com | [3f63 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043c3d50 gate 1598907150061442600 evaluation fails +peer1.org1.example.com | [3f64 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f65 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f66 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3f67 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440e2c0 gate 1598907150077212300 evaluation starts +peer1.org1.example.com | [3f68 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440e2c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f69 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440e2c0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3f6a 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440e2c0 principal matched by identity 0 +peer1.org1.example.com | [3f6b 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org1.example.com | [3f6c 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org1.example.com | [3f6d 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440e2c0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3f6e 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440e2c0 gate 1598907150077212300 evaluation succeeds +peer1.org1.example.com | [3f6f 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f70 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f71 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3f72 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3f73 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f74 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f75 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org1.example.com | [3f76 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f77 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3f78 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3f7a 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3f79 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3f7b 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [3f7c 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3f7d 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3f7e 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f7f 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3f80 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3f81 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3f82 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3f83 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440f9c0 gate 1598907150084444100 evaluation starts +peer1.org1.example.com | [3f84 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440f9c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f85 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440f9c0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3f86 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440f9c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3f87 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440f9c0 principal evaluation fails +peer1.org1.example.com | [3f88 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440f9c0 gate 1598907150084444100 evaluation fails +peer1.org1.example.com | [3f89 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3f8a 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3f8b 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3f8c 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440ff30 gate 1598907150086267900 evaluation starts +peer1.org1.example.com | [3f8d 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440ff30 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f8e 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440ff30 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3f8f 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440ff30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3f90 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440ff30 principal evaluation fails +peer1.org1.example.com | [3f91 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00440ff30 gate 1598907150086267900 evaluation fails +peer1.org1.example.com | [3f92 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f93 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3f94 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3f95 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044244a0 gate 1598907150087357600 evaluation starts +peer1.org1.example.com | [3f96 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044244a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3f97 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044244a0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3f98 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044244a0 principal matched by identity 0 +peer1.org1.example.com | [3f99 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 bd 6c 71 9f 8e a3 e3 1e 7a ea 70 83 1b 6d c2 |2.lq.....z.p..m.| +peer1.org1.example.com | 00000010 6b bd 37 73 68 9b 81 0a 3f 03 7e 0e 9c c0 67 fa |k.7sh...?.~...g.| +peer1.org1.example.com | [3f9a 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 e8 be af 3f 71 01 48 4d 01 98 |0E.!.....?q.HM..| +peer1.org1.example.com | 00000010 1a d1 b5 b7 74 e0 51 a7 5d 96 02 84 74 ee 94 13 |....t.Q.]...t...| +peer1.org1.example.com | 00000020 0b b2 34 a3 8f 02 20 66 e8 c2 8a ef 06 0e 44 84 |..4... f......D.| +peer1.org1.example.com | 00000030 c8 93 19 72 c3 44 b0 2a 87 41 bf 53 b5 81 c1 f5 |...r.D.*.A.S....| +peer1.org1.example.com | 00000040 c7 cc 36 96 e6 2d 09 |..6..-.| +peer1.org1.example.com | [3f9b 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044244a0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [3f9c 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044244a0 gate 1598907150087357600 evaluation succeeds +peer1.org1.example.com | [3f9d 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f9e 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [3f9f 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [3fa0 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [3fa1 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3fa2 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [3fa3 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [3fa4 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [3fa5 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [3fa6 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fa7 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fa8 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fa9 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3faa 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3fab 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3fac 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fad 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3fae 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3faf 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fb0 08-31 20:52:30.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fb1 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fb2 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3d5a 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3d5b 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +peer0.org1.example.com | [3d5c 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +peer0.org1.example.com | [3d5d 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +peer0.org1.example.com | [3d5e 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +peer0.org1.example.com | [3d5f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +peer0.org1.example.com | [3d60 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3d61 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [3d62 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +peer0.org1.example.com | [3d63 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +peer0.org1.example.com | [3d64 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +peer0.org1.example.com | [3d65 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +peer0.org1.example.com | [3d66 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3d67 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +peer0.org1.example.com | [3d68 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +peer0.org1.example.com | [3d69 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +peer0.org1.example.com | [3d6a 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +peer0.org1.example.com | [3d6b 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +peer0.org1.example.com | [3d6c 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +peer0.org1.example.com | [3d6d 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +peer0.org1.example.com | [3d6e 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +peer0.org1.example.com | [3d6f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +peer0.org1.example.com | [3d70 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +peer0.org1.example.com | [3d71 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +peer0.org1.example.com | [3d72 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +peer0.org1.example.com | [3d73 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +peer0.org1.example.com | [3d74 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +peer0.org1.example.com | [3d75 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +peer0.org1.example.com | [3d76 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +peer0.org1.example.com | [3d77 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +peer0.org1.example.com | [3d78 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +peer0.org1.example.com | [3d79 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +peer0.org1.example.com | [3d7a 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +peer0.org1.example.com | [3d7b 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [3d7c 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [3d7d 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +peer0.org1.example.com | [3d7e 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +peer0.org1.example.com | [3d7f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +peer0.org1.example.com | [3d80 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +peer0.org1.example.com | [3d81 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +peer0.org1.example.com | [3d82 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +peer0.org1.example.com | [3d83 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +peer0.org1.example.com | [3d84 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +peer0.org1.example.com | [3d85 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +peer0.org1.example.com | [3d86 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +peer0.org1.example.com | [3d87 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +peer0.org1.example.com | [3d88 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +peer0.org1.example.com | [3d89 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +peer0.org1.example.com | [3d8a 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +peer0.org1.example.com | [3d8b 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +peer0.org1.example.com | [3d8c 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +peer0.org1.example.com | [3d8d 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +peer0.org1.example.com | [3d8e 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +peer0.org1.example.com | [3d8f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +peer0.org1.example.com | [3d90 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +peer0.org1.example.com | [3d91 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +peer0.org1.example.com | [3d92 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +peer0.org1.example.com | [3d93 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +peer0.org1.example.com | [3d94 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +peer0.org1.example.com | [3d95 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d96 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3d97 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3d98 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3d99 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3d9a 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4d800 gate 1598907139442614800 evaluation starts +peer0.org1.example.com | [3d9b 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4d800 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3d9c 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4d800 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3d9d 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4d800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [3d9e 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4d800 principal evaluation fails +peer0.org1.example.com | [3d9f 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4d800 gate 1598907139442614800 evaluation fails +peer0.org1.example.com | [3da0 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3da1 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3da2 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3da3 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4dd70 gate 1598907139442892800 evaluation starts +peer0.org1.example.com | [3da4 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4dd70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3da5 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4dd70 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3da6 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4dd70 principal matched by identity 0 +peer0.org1.example.com | [3da7 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org1.example.com | [3da8 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org1.example.com | [3da9 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4dd70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3daa 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4dd70 gate 1598907139442892800 evaluation succeeds +peer0.org1.example.com | [3dab 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3dac 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3dad 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3dae 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3daf 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3db0 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3db1 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3db2 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3db3 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3db4 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3db5 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b648b0 gate 1598907139443638000 evaluation starts +peer0.org1.example.com | [3db6 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b648b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3db7 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b648b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3db8 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b648b0 principal matched by identity 0 +peer0.org1.example.com | [3db9 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org1.example.com | [3dba 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org1.example.com | [3dbb 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b648b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3dbc 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b648b0 gate 1598907139443638000 evaluation succeeds +peer0.org1.example.com | [3dbd 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3dbe 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3dbf 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3dc0 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3dc1 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dc2 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3dc3 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3dc4 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3dc5 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | 00000040 9f 1c d2 3c 47 4c |... DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [43bc 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [43bd 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [43be 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [43bf 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [43c0 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43c1 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43c2 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43c3 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [43c4 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43c5 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43c6 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [43c7 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [43c8 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43c9 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" secret_envelope: > alive:\326Ah\363r\002\376\270\275\262\007\020y\202\346sb" > +peer1.org2.example.com | [43ca 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [43cb 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org2.example.com | [43cc 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43cd 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43ce 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43cf 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43d0 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43d1 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43d2 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [43d3 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43d4 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [43d5 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43d6 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [43d7 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [43d8 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fb3 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fb4 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fb5 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fb6 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fb7 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3fb8 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fb9 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4235 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4236 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb950 gate 1598907141717550600 evaluation starts +peer0.org2.example.com | [4237 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb950 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4238 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb950 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4239 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb950 principal matched by identity 0 +peer0.org2.example.com | [423a 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org2.example.com | [423b 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org2.example.com | [423c 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb950 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [423d 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cdb950 gate 1598907141717550600 evaluation succeeds +peer0.org2.example.com | [423e 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [423f 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4240 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4241 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4242 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4243 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4244 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4245 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4246 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4247 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4248 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4249 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [424a 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [424b 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [424c 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [424d 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [424e 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [424f 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4250 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4251 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4252 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [43d9 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [43da 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [43db 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [43dc 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [43dd 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [43de 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [43df 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d205d0 gate 1598907149618998700 evaluation starts +peer1.org2.example.com | [43e0 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d205d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [43e1 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d205d0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [43e2 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d205d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [43e3 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d205d0 principal evaluation fails +peer1.org2.example.com | [43e4 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d205d0 gate 1598907149618998700 evaluation fails +peer1.org2.example.com | [43e5 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [43e6 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [43e7 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [43e8 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d20b40 gate 1598907149622508700 evaluation starts +peer1.org2.example.com | [43e9 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d20b40 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [43ea 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d20b40 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [43eb 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d20b40 principal matched by identity 0 +peer1.org2.example.com | [43ec 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 5a 86 be 63 a7 6e 20 8f 01 e1 a2 d1 bb ca d9 |%Z..c.n ........| +peer1.org2.example.com | 00000010 1e 4a e9 e5 8b 87 7b ad 02 b4 45 62 b8 1f d5 ae |.J....{...Eb....| +peer1.org2.example.com | [43ed 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c f3 ad 47 07 f0 14 8f ed ba e7 82 |0D. \..G........| +peer1.org2.example.com | 00000010 88 2f 80 50 1f 5f 8b 79 6a 1c 34 31 74 52 55 2b |./.P._.yj.41tRU+| +peer1.org2.example.com | 00000020 58 76 00 c1 02 20 78 e3 70 86 d8 ef ba 05 43 d8 |Xv... x.p.....C.| +peer1.org2.example.com | 00000030 03 1d 97 bf 58 33 81 b8 ea 91 db 8d b0 f4 dd 9d |....X3..........| +peer1.org2.example.com | 00000040 08 d5 88 b9 8a 89 |......| +peer1.org2.example.com | [43ee 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d20b40 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [43ef 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d20b40 gate 1598907149622508700 evaluation succeeds +peer1.org2.example.com | [43f0 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [43f1 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [43f2 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [43f3 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [43f4 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [43f5 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [43f6 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [43f7 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4253 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00d60 gate 1598907141953618700 evaluation starts +peer0.org2.example.com | [4254 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00d60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4255 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00d60 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4256 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4257 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00d60 principal evaluation fails +peer0.org2.example.com | [4258 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d00d60 gate 1598907141953618700 evaluation fails +peer0.org2.example.com | [4259 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [425a 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [425b 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [425c 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d012d0 gate 1598907141957573500 evaluation starts +peer0.org2.example.com | [425d 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d012d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [425e 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d012d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [425f 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d012d0 principal matched by identity 0 +peer0.org2.example.com | [4260 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org2.example.com | [4261 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org2.example.com | [4262 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d012d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4263 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d012d0 gate 1598907141957573500 evaluation succeeds +peer0.org2.example.com | [4264 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4265 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4266 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4267 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4268 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4269 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [426a 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [426b 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [426c 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [426d 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [426e 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [426f 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01ec0 gate 1598907141964125200 evaluation starts +peer0.org2.example.com | [4270 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01ec0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4271 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01ec0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4272 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01ec0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4273 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01ec0 principal evaluation fails +peer0.org2.example.com | [4274 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d01ec0 gate 1598907141964125200 evaluation fails +peer0.org2.example.com | [4275 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4276 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4277 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4278 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d20430 gate 1598907141964414900 evaluation starts +peer0.org2.example.com | [4279 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d20430 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [427a 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d20430 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [427b 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d20430 principal matched by identity 0 +peer0.org2.example.com | [427c 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org2.example.com | [427d 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org2.example.com | [427e 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d20430 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [427f 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d20430 gate 1598907141964414900 evaluation succeeds +peer0.org2.example.com | [4280 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4281 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4282 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4283 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4284 08-31 20:52:21.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4285 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4286 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4287 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 2 peers +peer0.org2.example.com | [4288 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4289 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [428a 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [428b 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [428c 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [428d 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [428e 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [428f 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [4290 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4291 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4292 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4293 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4294 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4295 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4296 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4297 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d21e50 gate 1598907141975003900 evaluation starts +peer0.org2.example.com | [4298 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d21e50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4299 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d21e50 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [429a 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d21e50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [429b 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d21e50 principal evaluation fails +peer0.org2.example.com | [429c 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d21e50 gate 1598907141975003900 evaluation fails +peer0.org2.example.com | [429d 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [429e 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [43f8 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [43f9 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43fa 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43fb 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [43fc 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [43fd 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43fe 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [43ff 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4400 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4401 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" > alive: alive: alive:\326Ah\363r\002\376\270\275\262\007\020y\202\346sb" > +peer1.org2.example.com | [4402 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [4403 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4404 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4405 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4406 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4407 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4408 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4409 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [440a 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [440b 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [440c 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [440d 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [440e 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [440f 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4410 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161043 +peer1.org2.example.com | [4411 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 32BD6C719F8EA3E31E7AEA70831B6DC26BBD3773689B810A3F037E0E9CC067FA +peer1.org2.example.com | [4412 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4413 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [4414 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [4415 08-31 20:52:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org2.example.com | [4416 08-31 20:52:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4417 08-31 20:52:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4418 08-31 20:52:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4419 08-31 20:52:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [441a 08-31 20:52:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [441b 08-31 20:52:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [441c 08-31 20:52:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [3dc6 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3dc7 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b653f0 gate 1598907139444311500 evaluation starts +peer0.org1.example.com | [3dc8 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b653f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3dc9 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b653f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3dca 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b653f0 principal matched by identity 0 +peer0.org1.example.com | [3dcb 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org1.example.com | [3dcc 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org1.example.com | [3dcd 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b653f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3dce 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b653f0 gate 1598907139444311500 evaluation succeeds +peer0.org1.example.com | [3dcf 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3dd0 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3dd1 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3dd2 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3dd3 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +peer0.org1.example.com | [3dd4 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +peer0.org1.example.com | [3dd5 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +peer0.org1.example.com | [3dd6 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer for channel businesschannel with same endpoint, skipping connecting to myself +peer0.org1.example.com | [3dd7 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +peer0.org1.example.com | [3dd8 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +peer0.org1.example.com | [3dd9 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3dda 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +peer0.org1.example.com | [3ddb 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ddc 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ddd 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fba 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3fbb 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fbc 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3fbd 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fbe 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3fbf 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fc0 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fc1 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fc2 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fc3 08-31 20:52:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3fc4 08-31 20:52:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161044 +peer1.org1.example.com | [3fc5 08-31 20:52:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BA74774119C860EABAEFA0FF8207FA982553C0AA29FDCBED6DB80370306B4D17 +peer1.org1.example.com | [3fc6 08-31 20:52:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [3fc7 08-31 20:52:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [3fc8 08-31 20:52:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [3fc9 08-31 20:52:30.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer1.org1.example.com | [3fca 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fcb 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fcc 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fcd 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3fce 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fcf 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3fd0 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org1.example.com | [3fd1 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3fd2 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fd3 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3fd4 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fd5 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [3fd6 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fd7 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [3fd8 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fd9 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fda 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fdb 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fdc 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3fdd 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [3fde 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [3fdf 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [3fe0 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [3fe1 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [3fe2 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3fe3 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [3fe4 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [3fe5 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [3fe6 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [3fe7 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044553d0 gate 1598907150452997100 evaluation starts +peer1.org1.example.com | [3fe8 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044553d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3fe9 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044553d0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3fea 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044553d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [3feb 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044553d0 principal evaluation fails +peer1.org1.example.com | [3fec 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044553d0 gate 1598907150452997100 evaluation fails +peer1.org1.example.com | [3fed 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3fee 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [3fef 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [3ff0 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004455940 gate 1598907150453521200 evaluation starts +peer1.org1.example.com | [3ff1 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004455940 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ff2 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004455940 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3ff3 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004455940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [3ff4 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004455940 principal evaluation fails +peer1.org1.example.com | [3ff5 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004455940 gate 1598907150453521200 evaluation fails +peer1.org1.example.com | [3ff6 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3ff7 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [3ff8 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [3ff9 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004455eb0 gate 1598907150453759100 evaluation starts +peer1.org1.example.com | [3ffa 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004455eb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [3ffb 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004455eb0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [3ffc 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004455eb0 principal matched by identity 0 +peer1.org1.example.com | [3ffd 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b 97 5e 88 bd 3e b9 81 a8 0b e7 48 cb ee 53 b3 |[.^..>.....H..S.| +peer1.org1.example.com | 00000010 d3 77 95 7e 0e 16 cb 07 dd 09 64 f4 6d 05 de 6f |.w.~......d.m..o| +peer1.org1.example.com | [3ffe 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b a1 6e 04 31 7f 05 ce 18 6d 1e 65 |0D. [.n.1....m.e| +peer1.org1.example.com | 00000010 45 65 eb 8f 99 e0 a0 a6 f0 9f d6 54 37 e8 f9 f7 |Ee.........T7...| +peer1.org1.example.com | 00000020 38 b4 7d 28 02 20 71 b5 cf a8 3a 90 c2 d2 88 16 |8.}(. q...:.....| +peer1.org1.example.com | 00000030 50 e1 2c 4c 59 d4 0a 36 85 d3 87 4b 79 f7 a9 2a |P.,LY..6...Ky..*| +peer1.org1.example.com | 00000040 5d fb 7c 40 02 07 |].|@..| +peer1.org1.example.com | [3fff 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004455eb0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4000 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004455eb0 gate 1598907150453759100 evaluation succeeds +peer1.org1.example.com | [4001 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4002 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4003 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4004 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4005 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3dde 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ddf 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +peer0.org1.example.com | [3de0 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [3de1 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [3de2 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +peer0.org1.example.com | [3de3 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [3de4 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004b93d70, CONNECTING +peer0.org1.example.com | [3de5 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004b93d70, READY +peer0.org1.example.com | [3de6 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3de7 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [3de8 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [3de9 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:7051 +peer0.org1.example.com | [3dea 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:7051 +peer0.org1.example.com | [3deb 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dec 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ded 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [429f 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [42a0 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d423c0 gate 1598907141976366600 evaluation starts +peer0.org2.example.com | [42a1 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d423c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [42a2 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d423c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [42a3 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d423c0 principal matched by identity 0 +peer0.org2.example.com | [42a4 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org2.example.com | [42a5 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org2.example.com | [42a6 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d423c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [42a7 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d423c0 gate 1598907141976366600 evaluation succeeds +peer0.org2.example.com | [42a8 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [42a9 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [42aa 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [42ab 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [42ac 08-31 20:52:21.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42ad 08-31 20:52:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [42ae 08-31 20:52:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [42af 08-31 20:52:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [42b0 08-31 20:52:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [42b1 08-31 20:52:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42b2 08-31 20:52:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [42b3 08-31 20:52:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42b4 08-31 20:52:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [42b5 08-31 20:52:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42b6 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [42b7 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org2.example.com | [42b8 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [42b9 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org2.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org2.example.com | [42ba 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org2.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org2.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org2.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org2.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org2.example.com | [42bb 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org2.example.com | [42bc 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org2.example.com | [42be 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [42bd 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [42bf 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [42c0 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [42c1 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [42c2 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [42c3 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [42c4 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer0.org2.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org2.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org2.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org2.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org2.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer1.org2.example.com | [441d 08-31 20:52:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [441e 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [441f 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4420 08-31 20:52:30.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4421 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4422 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4423 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4424 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4425 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4426 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4427 08-31 20:52:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [4428 08-31 20:52:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [4429 08-31 20:52:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [442a 08-31 20:52:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [442b 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [442c 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [442d 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [442e 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [442f 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4430 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4431 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4432 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4433 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4434 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4435 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4436 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4437 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d49370 gate 1598907150295366800 evaluation starts +peer1.org2.example.com | [4438 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d49370 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org2.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org2.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org2.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org2.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org2.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [42c5 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d627e0 gate 1598907142167902500 evaluation starts +peer0.org2.example.com | [42c6 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d627e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [42c7 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d627e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [42c8 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d627e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org2.example.com | [42c9 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d627e0 principal evaluation fails +peer0.org2.example.com | [42ca 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d627e0 gate 1598907142167902500 evaluation fails +peer0.org2.example.com | [42cb 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [42cc 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [42cd 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [42cf 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [42d0 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer0.org2.example.com | [42d1 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [42d2 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [42d3 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [42d4 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42d5 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [42d6 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org2.example.com | [42d7 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42ce 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [42d8 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d439e0 gate 1598907142171929300 evaluation starts +peer0.org2.example.com | [42d9 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d439e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [42da 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d439e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [42db 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d439e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [42dc 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d439e0 principal evaluation fails +peer0.org2.example.com | [42dd 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d439e0 gate 1598907142171929300 evaluation fails +peer0.org2.example.com | [42de 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [42df 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [42e0 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [42e1 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d43f70 gate 1598907142179833300 evaluation starts +peer0.org2.example.com | [42e2 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d43f70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [42e3 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d43f70 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [42e4 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [42e5 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [42e6 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [42e7 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [42e8 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d43f70 principal matched by identity 0 +peer0.org2.example.com | [42e9 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org2.example.com | [42ea 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org2.example.com | [42eb 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d43f70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [42ec 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d43f70 gate 1598907142179833300 evaluation succeeds +peer0.org2.example.com | [42ed 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [42ee 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [42ef 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [42f0 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [42f1 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [42f2 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [42f3 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [42f4 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [42f5 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [42f6 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [42f7 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [42f8 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [42f9 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7d400 gate 1598907142189304400 evaluation starts +peer0.org2.example.com | [42fa 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7d400 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [42fb 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7d400 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [42fc 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7d400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [42fd 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7d400 principal evaluation fails +peer0.org2.example.com | [42fe 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7d400 gate 1598907142189304400 evaluation fails +peer0.org2.example.com | [42ff 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4300 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4301 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4302 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7d970 gate 1598907142189695100 evaluation starts +peer0.org2.example.com | [4303 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7d970 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4304 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7d970 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4305 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7d970 principal matched by identity 0 +peer0.org2.example.com | [4306 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org2.example.com | [4307 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org2.example.com | [4308 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7d970 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4309 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d7d970 gate 1598907142189695100 evaluation succeeds +peer0.org2.example.com | [430a 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [430b 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [430c 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [430d 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [430e 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [430f 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3dee 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3def 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3df0 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3df1 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3df2 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3df3 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3df4 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3df5 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3df6 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26fb0 gate 1598907139481854300 evaluation starts +peer0.org1.example.com | [3df7 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26fb0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3df8 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26fb0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3df9 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26fb0 principal matched by identity 0 +peer0.org1.example.com | [3dfa 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [3dfb 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 29 6b 50 7a ae f5 55 f4 bd d5 80 |0D. ,)kPz..U....| +peer0.org1.example.com | 00000010 53 4d e3 97 c1 50 76 7d 66 64 94 83 04 12 4f d0 |SM...Pv}fd....O.| +peer0.org1.example.com | 00000020 63 80 e5 7d 02 20 50 86 bf 83 90 b9 9a 88 55 ae |c..}. P.......U.| +peer0.org1.example.com | 00000030 dc 6c 5d bf fb a0 e4 62 ee ec d5 41 91 6c d9 38 |.l]....b...A.l.8| +peer0.org1.example.com | 00000040 42 66 fb f1 79 be |Bf..y.| +peer0.org1.example.com | [3dfc 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26fb0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3dfd 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26fb0 gate 1598907139481854300 evaluation succeeds +peer0.org1.example.com | [3dfe 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3dff 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e00 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3e01 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3e02 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +peer0.org1.example.com | [3e03 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e04 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3e05 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161038 +peer0.org1.example.com | [3e06 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D9A95FE759FEFD5D7D15D58103CB54F945F77F6B8B613E6A067A1FCEB4CC52B6 +peer0.org1.example.com | [3e07 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [4006 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [4007 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [4008 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [4009 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [400a 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [400b 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [400c 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [400d 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [400e 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [400f 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4010 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4011 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4012 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4013 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4014 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4015 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4016 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4017 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [4018 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4019 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [401a 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [401b 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [401c 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [401d 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [401e 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [401f 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4020 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4021 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4022 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4023 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4024 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4025 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4026 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [4027 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 24 c0 e0 c1 94 ff b0 1a 55 7e 49 78 80 c9 02 |.$.......U~Ix...| +peer1.org1.example.com | 00000010 ff ee 36 0a e4 df 30 e7 56 b1 07 41 60 f3 e4 e1 |..6...0.V..A`...| +peer1.org1.example.com | [4028 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 10 1a 4b 31 13 65 02 e6 d8 79 3c |0D. E..K1.e...y<| +peer1.org1.example.com | 00000010 aa dc 82 d1 8a b1 38 c1 6d 5d d1 fb 37 1a 45 c1 |......8.m]..7.E.| +peer1.org1.example.com | 00000020 c0 db d6 f8 02 20 3f b2 f3 a6 be c1 de 78 fc 4d |..... ?......x.M| +peer1.org1.example.com | 00000030 66 1f 72 af b4 33 76 12 2b 46 a1 80 5a 01 ab de |f.r..3v.+F..Z...| +peer1.org1.example.com | 00000040 a9 7f 42 7c 4b 33 |..B|K3| +peer1.org1.example.com | [4029 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [402a 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org1.example.com | [402b 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [402c 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [402d 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [402e 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [402f 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4030 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4031 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4032 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4033 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4034 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [4035 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4036 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org1.example.com | [4037 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4038 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4039 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [403a 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [403b 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [403c 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [403d 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [403e 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [403f 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4310 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4311 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4312 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4313 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4314 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4315 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4316 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d98b70 gate 1598907142191543800 evaluation starts +peer0.org2.example.com | [4317 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d98b70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4318 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d98b70 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4319 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d98b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [431a 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d98b70 principal evaluation fails +peer0.org2.example.com | [431b 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d98b70 gate 1598907142191543800 evaluation fails +peer0.org2.example.com | [431c 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [431d 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [431e 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [431f 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d990e0 gate 1598907142192294000 evaluation starts +peer0.org2.example.com | [4320 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d990e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4321 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d990e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4322 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d990e0 principal matched by identity 0 +peer0.org2.example.com | [4323 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org2.example.com | [4324 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org2.example.com | [4325 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d990e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4326 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d990e0 gate 1598907142192294000 evaluation succeeds +peer0.org2.example.com | [4327 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4328 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4329 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [432a 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [432b 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [432c 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [432d 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [432e 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [432f 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e08 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [3e09 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [3e0a 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e0b 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:4083847945516476258 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3e0c 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:4083847945516476258 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e0d 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e0e 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3e0f 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +peer0.org1.example.com | [3e10 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 4083847945516476258, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e11 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 4083847945516476258, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e12 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e13 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 4083847945516476258, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e14 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3e15 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e16 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3e17 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e18 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e19 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3e1a 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3e1b 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3e1c 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c07200 gate 1598907139518412800 evaluation starts +peer0.org1.example.com | [3e1d 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c07200 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3e1e 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c07200 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3e1f 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c07200 principal matched by identity 0 +peer0.org1.example.com | [3e20 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 22 75 ee d7 b7 5f ef ef 01 a6 d3 9f c4 26 19 |i"u..._.......&.| +peer0.org1.example.com | 00000010 dc 92 50 99 03 d9 71 4a 23 fa 01 75 71 b1 ba 7c |..P...qJ#..uq..|| +peer0.org1.example.com | [3e21 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 5c bc b9 d0 e9 32 c4 85 69 fd 8a |0D. .\....2..i..| +peer0.org1.example.com | 00000010 86 a2 14 bc 8f d4 11 6d f3 1b 94 0e ed e8 dc 12 |.......m........| +peer0.org1.example.com | 00000020 b1 d4 3a 0d 02 20 6a 63 7e ed 6d 99 28 6f 2e c0 |..:.. jc~.m.(o..| +peer0.org1.example.com | 00000030 e0 7e 50 e0 55 4c cf 50 1a ee 99 07 49 aa e3 ee |.~P.UL.P....I...| +peer0.org1.example.com | 00000040 43 44 ef 85 57 69 |CD..Wi| +peer0.org1.example.com | [3e22 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c07200 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3e23 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c07200 gate 1598907139518412800 evaluation succeeds +peer0.org1.example.com | [3e24 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e25 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3e26 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3e27 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3e28 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e29 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e2a 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [3e2b 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 a9 5f e7 59 fe fd 5d 7d 15 d5 81 03 cb 54 f9 |.._.Y..]}.....T.| +peer0.org1.example.com | 00000010 45 f7 7f 6b 8b 61 3e 6a 06 7a 1f ce b4 cc 52 b6 |E..k.a>j.z....R.| +peer0.org1.example.com | [3e2c 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 23 c7 1c 19 ec 8e 68 fc 5c f3 ed |0D. <#.....h.\..| +peer0.org1.example.com | 00000010 e5 1b 3d e5 03 56 05 68 af a6 18 0c cb 08 15 fb |..=..V.h........| +peer0.org1.example.com | 00000020 d6 c4 7c e3 02 20 6a 25 7a 85 7e 1f 7a bc c5 0f |..|.. j%z.~.z...| +peer0.org1.example.com | 00000030 9c 00 1a 7a 7f 16 92 d4 89 20 8a a2 60 2e 51 2e |...z..... ..`.Q.| +peer0.org1.example.com | 00000040 bf 57 b9 87 f7 4d |.W...M| +peer0.org1.example.com | [3e2d 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e2e 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3e2f 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e30 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [3e31 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e0 5b ad 9b cf 6e 40 c0 f1 40 11 cb 74 25 eb |..[...n@..@..t%.| +peer0.org1.example.com | 00000010 c1 ba 77 23 51 12 91 bf 1f c3 b4 cd 49 6e bc 28 |..w#Q.......In.(| +peer0.org1.example.com | [3e32 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 11 9b 13 4b 9c 6c fc a8 d4 78 |0E.!.....K.l...x| +peer0.org1.example.com | 00000010 76 89 ae 84 b1 25 60 5c 18 f4 05 22 ef f7 5e 24 |v....%`\..."..^$| +peer0.org1.example.com | 00000020 da 0e 69 39 5d 02 20 33 c3 49 af 4c d1 cd 87 ad |..i9]. 3.I.L....| +peer0.org1.example.com | 00000030 c0 da 6c 1f 69 0c 99 cb 76 c8 42 6d 5e f6 4c e0 |..l.i...v.Bm^.L.| +peer0.org1.example.com | 00000040 d7 4d 22 89 0c ad 87 |.M"....| +peer0.org1.example.com | [3e33 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3e34 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e35 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e36 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +peer0.org1.example.com | [3e37 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +peer0.org1.example.com | [3e38 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +peer0.org1.example.com | [3e39 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +peer0.org1.example.com | [3e3a 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +peer0.org1.example.com | [3e3b 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +peer0.org1.example.com | [3e3c 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0046fb640 env 0xc0048e14f0 txn 0 +peer0.org1.example.com | [3e3d 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +peer0.org1.example.com | [3e3e 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 133ms +peer0.org1.example.com | [3e3f 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +peer0.org1.example.com | [3e40 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +peer0.org1.example.com | [3e41 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +peer0.org1.example.com | [3e42 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +peer0.org1.example.com | [3e43 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +peer0.org1.example.com | [3e44 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +peer0.org1.example.com | [3e45 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +peer0.org1.example.com | [3e46 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +peer0.org1.example.com | [3e47 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +peer0.org1.example.com | [3e48 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +peer0.org1.example.com | [3e49 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +peer0.org1.example.com | [3e4a 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +peer0.org1.example.com | [3e4b 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +peer0.org1.example.com | [3e4c 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +peer0.org1.example.com | [3e4d 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +peer1.org2.example.com | [4439 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d49370 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [443a 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d49370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [443b 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d49370 principal evaluation fails +peer1.org2.example.com | [443c 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d49370 gate 1598907150295366800 evaluation fails +peer1.org2.example.com | [443d 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [443e 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [443f 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4440 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d498e0 gate 1598907150296435500 evaluation starts +peer1.org2.example.com | [4441 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d498e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4442 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d498e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4443 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d498e0 principal matched by identity 0 +peer1.org2.example.com | [4444 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 77 41 19 c8 60 ea ba ef a0 ff 82 07 fa 98 |.twA..`.........| +peer1.org2.example.com | 00000010 25 53 c0 aa 29 fd cb ed 6d b8 03 70 30 6b 4d 17 |%S..)...m..p0kM.| +peer1.org2.example.com | [4445 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 43 51 f7 a3 56 a4 5b 3f 67 7d |0E.!..CQ..V.[?g}| +peer1.org2.example.com | 00000010 38 74 79 85 40 54 10 89 ce e5 61 a1 89 f6 09 ca |8ty.@T....a.....| +peer1.org2.example.com | 00000020 cb 18 9c d8 c7 02 20 2b 73 d9 66 06 2c d4 a3 14 |...... +s.f.,...| +peer1.org2.example.com | 00000030 07 27 18 58 7d a8 94 71 d3 5a 7c 62 4a a7 fd f1 |.'.X}..q.Z|bJ...| +peer1.org2.example.com | 00000040 f6 12 2f f6 34 d4 15 |../.4..| +peer1.org2.example.com | [4446 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d498e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4447 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d498e0 gate 1598907150296435500 evaluation succeeds +peer1.org2.example.com | [4448 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4449 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [444a 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [444b 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [444c 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [444d 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [444e 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [444f 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4450 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [4451 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4452 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4453 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4454 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4455 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4456 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4457 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4458 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4459 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [445a 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [445b 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [445c 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [445d 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [445e 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [445f 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4460 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4461 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4040 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4041 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4042 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4043 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:53642 +peer1.org1.example.com | [4044 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00442d810 +peer1.org1.example.com | [4045 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org1.example.com | [4046 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org1.example.com | [4047 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer1.org1.example.com | [4048 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org1.example.com | [4049 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f e2 eb c0 7a d2 b8 b2 c6 0e b9 c1 fe 25 14 bc |_...z........%..| +peer1.org1.example.com | 00000010 ac a3 89 bb 4c 98 ef ce d3 1f 7b 95 ec 0a 62 f9 |....L.....{...b.| +peer1.org1.example.com | [404a 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 fd f3 87 7c 43 4a 6c 82 56 55 |0E.!.....|CJl.VU| +peer1.org1.example.com | 00000010 11 e7 e8 5f 8e a3 55 28 ee f0 33 33 ae de 1f 6a |..._..U(..33...j| +peer1.org1.example.com | 00000020 1d ce 9a 32 dd 02 20 22 44 82 9a e0 4b d4 2b 8f |...2.. "D...K.+.| +peer1.org1.example.com | 00000030 b1 68 6f e8 0d f2 7e 28 3c f5 78 21 44 64 e5 47 |.ho...~(<.x!Dd.G| +peer1.org1.example.com | 00000040 a1 46 15 f5 38 37 9f |.F..87.| +peer1.org1.example.com | [404b 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org1.example.com | [404c 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00448a700, header 0xc00442dc20 +peer1.org1.example.com | [404d 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer1.org1.example.com | [404e 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU [][8269097c] processing txid: 8269097c8f26347e73a2a80ffbb4322f4634b33dd847257fa884ca77662e1535 +peer1.org1.example.com | [404f 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU [][8269097c] Entry chaincode: name:"qscc" +peer1.org1.example.com | [4050 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> INFO [][8269097c] Entry chaincode: name:"qscc" +peer1.org1.example.com | [4051 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org1.example.com | [4052 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer1.org1.example.com | [4053 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer1.org1.example.com | [4054 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org1.example.com | [4055 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4056 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4057 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4058 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4059 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer1.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer1.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer1.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer1.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer1.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer1.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer1.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer1.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer1.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer1.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer1.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer1.org1.example.com | -----END CERTIFICATE----- +peer1.org1.example.com | [405a 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c1760 gate 1598907151066991300 evaluation starts +peer1.org1.example.com | [405b 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c1760 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [405c 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c1760 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [405d 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c1760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org1.example.com | [405e 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c1760 principal evaluation fails +peer1.org1.example.com | [405f 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044c1760 gate 1598907151066991300 evaluation fails +peer1.org1.example.com | [4060 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4061 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4062 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4063 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045085b0 gate 1598907151068030800 evaluation starts +peer1.org1.example.com | [4064 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045085b0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4065 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045085b0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [4066 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer1.org1.example.com | [4067 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer1.org1.example.com | [4068 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer1.org1.example.com | [4069 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045085b0 principal matched by identity 0 +peer1.org1.example.com | [406a 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5f e2 eb c0 7a d2 b8 b2 c6 0e b9 c1 fe 25 14 bc |_...z........%..| +peer1.org1.example.com | 00000010 ac a3 89 bb 4c 98 ef ce d3 1f 7b 95 ec 0a 62 f9 |....L.....{...b.| +peer1.org1.example.com | [406b 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 fd f3 87 7c 43 4a 6c 82 56 55 |0E.!.....|CJl.VU| +peer1.org1.example.com | 00000010 11 e7 e8 5f 8e a3 55 28 ee f0 33 33 ae de 1f 6a |..._..U(..33...j| +peer1.org1.example.com | 00000020 1d ce 9a 32 dd 02 20 22 44 82 9a e0 4b d4 2b 8f |...2.. "D...K.+.| +peer1.org1.example.com | 00000030 b1 68 6f e8 0d f2 7e 28 3c f5 78 21 44 64 e5 47 |.ho...~(<.x!Dd.G| +peer1.org1.example.com | 00000040 a1 46 15 f5 38 37 9f |.F..87.| +peer1.org1.example.com | [406c 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045085b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4330 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4331 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4332 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4333 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4334 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4335 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4336 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db0530 gate 1598907142193865600 evaluation starts +peer0.org2.example.com | [4337 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db0530 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4338 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db0530 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4339 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db0530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [433a 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db0530 principal evaluation fails +peer0.org2.example.com | [433b 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db0530 gate 1598907142193865600 evaluation fails +peer0.org2.example.com | [433c 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [433d 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [433e 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [433f 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db0aa0 gate 1598907142194283200 evaluation starts +peer0.org2.example.com | [4340 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db0aa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4341 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db0aa0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4342 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db0aa0 principal matched by identity 0 +peer0.org2.example.com | [4343 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org2.example.com | [4344 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org2.example.com | [4345 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db0aa0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4346 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db0aa0 gate 1598907142194283200 evaluation succeeds +peer0.org2.example.com | [4347 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4348 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4349 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [434a 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [434b 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org2.example.com | [434c 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org2.example.com | [434d 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [434e 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4462 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4463 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4464 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4465 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4466 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4467 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4468 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4469 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [446a 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [446b 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [446c 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [446d 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [446e 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [446f 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4470 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4471 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [4472 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4473 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4474 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4475 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4476 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4477 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4478 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4479 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [447a 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [447b 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [447c 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [447d 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [447e 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75d10 gate 1598907150416975800 evaluation starts +peer1.org2.example.com | [447f 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75d10 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4480 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75d10 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [434f 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4350 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4351 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4352 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4353 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4354 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4355 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd8390 gate 1598907142203485800 evaluation starts +peer0.org2.example.com | [4356 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd8390 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4357 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd8390 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4358 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd8390 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4359 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd8390 principal evaluation fails +peer0.org2.example.com | [435a 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd8390 gate 1598907142203485800 evaluation fails +peer0.org2.example.com | [435b 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [435c 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [435d 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [435e 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd8900 gate 1598907142203881900 evaluation starts +peer0.org2.example.com | [435f 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd8900 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4360 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd8900 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4361 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd8900 principal matched by identity 0 +peer0.org2.example.com | [4362 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org2.example.com | [4363 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org2.example.com | [4364 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd8900 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4365 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd8900 gate 1598907142203881900 evaluation succeeds +peer0.org2.example.com | [4366 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4367 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4368 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4369 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [436a 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org2.example.com | [436b 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org2.example.com | [436c 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [436d 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [436e 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [436f 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4370 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [406d 08-31 20:52:31.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045085b0 gate 1598907151068030800 evaluation succeeds +peer1.org1.example.com | [406e 08-31 20:52:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [406f 08-31 20:52:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4070 08-31 20:52:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4071 08-31 20:52:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4072 08-31 20:52:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU [8269097c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org1.example.com | [4073 08-31 20:52:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU [8269097c] notifying Txid:8269097c8f26347e73a2a80ffbb4322f4634b33dd847257fa884ca77662e1535, channelID: +peer1.org1.example.com | [4074 08-31 20:52:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org1.example.com | [4075 08-31 20:52:31.07 UTC] [%{longpkg}] %{callpath} -> INFO [][8269097c] Exit chaincode: name:"qscc" (6ms) +peer1.org1.example.com | [4076 08-31 20:52:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU [][8269097c] Exit +peer1.org1.example.com | [4077 08-31 20:52:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:53642 +peer1.org1.example.com | [4078 08-31 20:52:31.07 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:53642 grpc.code=OK grpc.call_duration=8.463ms +peer1.org1.example.com | [4079 08-31 20:52:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.8:7051->172.18.0.9:53642: read: connection reset by peer +peer1.org1.example.com | [407a 08-31 20:52:31.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org1.example.com | [407b 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [407c 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [407d 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [407e 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [407f 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4080 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4081 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4082 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4083 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer1.org1.example.com | [4084 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4085 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [4086 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4087 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [4088 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [4089 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [408a 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [408b 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [408c 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [408d 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [408e 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [408f 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4090 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a1470 gate 1598907153079818700 evaluation starts +peer1.org1.example.com | [4091 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a1470 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4092 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a1470 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [4093 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a1470 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4094 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a1470 principal evaluation fails +peer1.org1.example.com | [4095 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a1470 gate 1598907153079818700 evaluation fails +peer1.org1.example.com | [4096 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4097 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4098 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4099 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a19e0 gate 1598907153083008700 evaluation starts +peer0.org2.example.com | [4371 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4372 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4373 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4374 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4375 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4376 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4377 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dee440 gate 1598907142205747400 evaluation starts +peer0.org2.example.com | [4378 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dee440 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4379 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dee440 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [437a 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dee440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [437b 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dee440 principal evaluation fails +peer0.org2.example.com | [437c 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dee440 gate 1598907142205747400 evaluation fails +peer0.org2.example.com | [437d 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [437e 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [437f 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4380 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dee9b0 gate 1598907142206333600 evaluation starts +peer0.org2.example.com | [4381 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dee9b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4382 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dee9b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4383 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dee9b0 principal matched by identity 0 +peer0.org2.example.com | [4384 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org2.example.com | [4385 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org2.example.com | [4386 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dee9b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4387 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dee9b0 gate 1598907142206333600 evaluation succeeds +peer0.org2.example.com | [4388 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4389 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [438a 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [438b 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [438c 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [438d 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4481 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75d10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4482 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75d10 principal evaluation fails +peer1.org2.example.com | [4483 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75d10 gate 1598907150416975800 evaluation fails +peer1.org2.example.com | [4484 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4485 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4486 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4487 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2280 gate 1598907150417614300 evaluation starts +peer1.org2.example.com | [4488 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2280 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4489 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2280 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [448a 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2280 principal matched by identity 0 +peer1.org2.example.com | [448b 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org2.example.com | [448c 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org2.example.com | [448d 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2280 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [448e 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db2280 gate 1598907150417614300 evaluation succeeds +peer1.org2.example.com | [448f 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4490 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4491 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4492 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4493 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4494 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4495 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4496 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4497 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4498 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4499 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [449a 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [449b 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db3480 gate 1598907150418989700 evaluation starts +peer1.org2.example.com | [449c 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db3480 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [449d 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db3480 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [449e 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db3480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [449f 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db3480 principal evaluation fails +peer1.org2.example.com | [44a0 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db3480 gate 1598907150418989700 evaluation fails +peer1.org2.example.com | [44a1 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [44a2 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [44a3 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [44a4 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db39f0 gate 1598907150419457400 evaluation starts +peer1.org2.example.com | [44a5 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db39f0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [44a6 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db39f0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [44a7 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db39f0 principal matched by identity 0 +peer1.org2.example.com | [44a8 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org2.example.com | [44a9 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org2.example.com | [44aa 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db39f0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [44ab 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003db39f0 gate 1598907150419457400 evaluation succeeds +peer1.org2.example.com | [44ac 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [44ad 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [44ae 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [44af 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [44b0 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org2.example.com | [44b1 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org2.example.com | [44b2 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org2.example.com | [44b3 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org2.example.com | [44b4 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [44b5 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [44b6 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [44b7 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [44b8 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [44b9 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [438e 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [438f 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4390 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4391 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4392 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4393 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4394 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003defbb0 gate 1598907142208066300 evaluation starts +peer0.org2.example.com | [4395 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003defbb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4396 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003defbb0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4397 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003defbb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4398 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003defbb0 principal evaluation fails +peer0.org2.example.com | [4399 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003defbb0 gate 1598907142208066300 evaluation fails +peer0.org2.example.com | [439a 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [439b 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [439c 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [439d 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0a120 gate 1598907142208663900 evaluation starts +peer0.org2.example.com | [439e 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0a120 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [439f 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0a120 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [43a0 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0a120 principal matched by identity 0 +peer0.org2.example.com | [43a1 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org2.example.com | [43a2 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org2.example.com | [43a3 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0a120 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [43a4 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e0a120 gate 1598907142208663900 evaluation succeeds +peer0.org2.example.com | [43a5 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [43a6 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [43a7 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [43a8 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [43a9 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org2.example.com | [43aa 08-31 20:52:22.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org2.example.com | [43ab 08-31 20:52:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org2.example.com | [43ac 08-31 20:52:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org2.example.com | [43ad 08-31 20:52:22.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43ae 08-31 20:52:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43af 08-31 20:52:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43b0 08-31 20:52:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [43b1 08-31 20:52:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43b2 08-31 20:52:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43b3 08-31 20:52:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [43b4 08-31 20:52:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [43b5 08-31 20:52:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43b6 08-31 20:52:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [44ba 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [44bb 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [44bc 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [44bd 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [44be 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [44bf 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7c20 gate 1598907150422508300 evaluation starts +peer1.org2.example.com | [44c0 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7c20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [44c1 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7c20 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [44c2 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [43b7 08-31 20:52:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org2.example.com | [43b8 08-31 20:52:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org2.example.com | [43b9 08-31 20:52:22.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43ba 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [43bb 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [43bc 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43bd 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43be 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43bf 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [43c0 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org2.example.com | [43c1 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org2.example.com | [43c2 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org2.example.com | [43c3 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43c4 08-31 20:52:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [43c5 08-31 20:52:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [43c6 08-31 20:52:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [43c7 08-31 20:52:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [43c8 08-31 20:52:22.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43c9 08-31 20:52:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [43ca 08-31 20:52:24.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org2.example.com | [43cb 08-31 20:52:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 7b d3 c1 47 a6 6b f8 7f d2 39 c6 0a 77 e1 cf |({..G.k...9..w..| +peer0.org2.example.com | 00000010 b9 a2 04 47 d3 83 e0 03 7b 32 45 6c 1d 57 b3 b4 |...G....{2El.W..| +peer0.org2.example.com | [43cc 08-31 20:52:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 37 a8 96 89 36 6c 98 99 11 f6 3d |0D. .7...6l....=| +peer0.org2.example.com | 00000010 68 02 40 77 23 81 55 05 cf f3 d1 18 0b 1e 29 86 |h.@w#.U.......).| +peer0.org2.example.com | 00000020 18 75 55 26 02 20 0f b4 65 a0 79 af 5e f2 30 42 |.uU&. ..e.y.^.0B| +peer0.org2.example.com | 00000030 9b ab ba 8e 09 07 eb 19 d1 ea 04 d5 df da c7 ee |................| +peer0.org2.example.com | 00000040 eb c2 cc a8 3e fe |....>.| +peer0.org2.example.com | [43cd 08-31 20:52:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43ce 08-31 20:52:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43cf 08-31 20:52:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43d0 08-31 20:52:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [43d1 08-31 20:52:24.24 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [43d2 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [43d3 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [43d4 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [43d5 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [43d6 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3e4e 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +peer0.org1.example.com | [3e4f 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +peer0.org1.example.com | [3e50 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +peer0.org1.example.com | [3e51 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +peer0.org1.example.com | [3e52 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc004c49300)} +peer0.org1.example.com | [3e53 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +peer0.org1.example.com | [3e54 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +peer0.org1.example.com | [3e55 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +peer0.org1.example.com | [3e56 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +peer0.org1.example.com | [3e57 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +peer0.org1.example.com | [3e58 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +peer0.org1.example.com | [3e59 08-31 20:52:19.54 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:52:21.546Z grpc.peer_address=172.18.0.5:39624 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=126µs +peer0.org1.example.com | [3e5a 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +peer0.org1.example.com | [3e5b 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xee, 0x50, 0x5e, 0x32, 0xbb, 0x9a, 0x52, 0xe4, 0xd5, 0xa5, 0xcd, 0xd8, 0x92, 0x7, 0xb9, 0x48, 0x99, 0xcf, 0x4a, 0x4f, 0xd4, 0x14, 0x2, 0xe7, 0xd3, 0xba, 0x81, 0x57, 0xfe, 0x38, 0x65, 0xd} txOffsets= +peer0.org1.example.com | txId=7f1fe83799f527adf316dfcd38e1f157d571d6adfecc0451fce63bd20f6fd24b locPointer=offset=71, bytesLength=40147 +peer0.org1.example.com | ] +peer0.org1.example.com | [3e5c 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97619, bytesLength=40147] for tx ID: [7f1fe83799f527adf316dfcd38e1f157d571d6adfecc0451fce63bd20f6fd24b] to txid-index +peer0.org1.example.com | [3e5d 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97619, bytesLength=40147] for tx number:[0] ID: [7f1fe83799f527adf316dfcd38e1f157d571d6adfecc0451fce63bd20f6fd24b] to blockNumTranNum index +peer0.org1.example.com | [3e5e 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3e5f 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [3e60 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org2.example.com | [43d7 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [43d8 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [43d9 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [43da 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [43db 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 b0 f9 f3 76 b0 19 27 5f 6f f0 59 26 46 b4 f9 |....v..'_o.Y&F..| +peer0.org2.example.com | 00000010 15 b0 6a ce 97 a7 73 a0 23 d2 88 89 5c 3c bb 66 |..j...s.#...\<.f| +peer0.org2.example.com | [43dc 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 de f1 e7 50 26 d3 49 87 f7 44 |0E.!.....P&.I..D| +peer0.org2.example.com | 00000010 0f 87 ad 2e 86 4f 36 b1 1a e6 0a 6a 28 fd 1a fd |.....O6....j(...| +peer0.org2.example.com | 00000020 57 8a a0 5d d5 02 20 5d 02 7a 4d c5 23 dc bf a6 |W..].. ].zM.#...| +peer0.org2.example.com | 00000030 c9 74 49 b6 bd 3e d6 41 68 f3 72 02 fe b8 bd b2 |.tI..>.Ah.r.....| +peer0.org2.example.com | 00000040 07 10 79 82 e6 73 62 |..y..sb| +peer0.org2.example.com | [43dd 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [43de 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [43df 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [43e0 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [43e1 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [43e2 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43e3 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43e4 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43e5 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43e6 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43e7 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43e8 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [43e9 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [43ea 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [43eb 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [43ec 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43ed 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [43ee 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43ef 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [43f0 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43f1 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [43f2 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43f3 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [43f4 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [409a 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a19e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [409b 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a19e0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [409c 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a19e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [409d 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a19e0 principal evaluation fails +peer1.org1.example.com | [409e 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a19e0 gate 1598907153083008700 evaluation fails +peer1.org1.example.com | [409f 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [40a0 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [40a1 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [40a2 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a1f50 gate 1598907153083323600 evaluation starts +peer1.org1.example.com | [40a3 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a1f50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [40a4 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a1f50 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [40a5 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a1f50 principal matched by identity 0 +peer1.org1.example.com | [40a6 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 3d 51 34 f1 97 74 34 15 c7 4c fc 7e 6c 2a a0 |v=Q4..t4..L.~l*.| +peer1.org1.example.com | 00000010 b2 3b 9a 0a 78 9f 8f e4 c9 ec 76 80 d4 b7 bb 58 |.;..x.....v....X| +peer1.org1.example.com | [40a7 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 10 04 a6 70 23 1c b6 86 2b ff |0E.!.....p#...+.| +peer1.org1.example.com | 00000010 b8 0b 1b ac 7a ac 2a 42 95 43 98 b7 8b a3 61 c5 |....z.*B.C....a.| +peer1.org1.example.com | 00000020 3a 28 95 71 35 02 20 67 04 bc 00 5b f0 ae 51 73 |:(.q5. g...[..Qs| +peer1.org1.example.com | 00000030 43 b6 79 40 3f be 83 f7 1b 13 5a 8d 6f 94 51 86 |C.y@?.....Z.o.Q.| +peer1.org1.example.com | 00000040 87 86 e0 99 79 9f fe |....y..| +peer1.org1.example.com | [40a8 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a1f50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [40a9 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a1f50 gate 1598907153083323600 evaluation succeeds +peer1.org1.example.com | [40aa 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [40ab 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [40ac 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [40ad 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [40ae 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [40af 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [40b0 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [40b1 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [40b2 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org1.example.com | [40b3 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40b4 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40b5 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40b6 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer1.org1.example.com | [40b7 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40b8 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40b9 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40ba 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [40bb 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:" signature:"0D\002 E\020\032K1\023e\002\346\330y<\252\334\202\321\212\2618\301m]\321\3737\032E\301\300\333\326\370\002 ?\262\363\246\276\301\336x\374Mf\037r\257\2643v\022+F\241\200Z\001\253\336\251\177B|K3" > alive: alive: +peer1.org1.example.com | [40bc 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [3e61 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:39624 +peer0.org1.example.com | [3e62 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138758], isChainEmpty=[false], lastBlockNumber=[6] +peer0.org1.example.com | [3e63 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +peer0.org1.example.com | [3e64 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +peer0.org1.example.com | [3e65 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +peer0.org1.example.com | [3e66 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +peer0.org1.example.com | [3e67 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +peer0.org1.example.com | [3e68 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +peer0.org1.example.com | [3e69 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +peer0.org1.example.com | [3e6a 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +peer0.org1.example.com | [3e6b 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +peer0.org1.example.com | [3e6c 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +peer0.org1.example.com | [3e6d 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +peer0.org1.example.com | [3e6e 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +peer0.org1.example.com | [3e6f 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +peer0.org1.example.com | [3e70 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +peer0.org1.example.com | [3e72 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.5:39624 +peer0.org1.example.com | [3e73 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e74 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e71 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +peer0.org1.example.com | [3e77 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +peer0.org1.example.com | [3e75 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +peer0.org1.example.com | n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +peer0.org1.example.com | z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +peer0.org1.example.com | AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +peer0.org1.example.com | 3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3e76 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +peer0.org1.example.com | [3e78 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 45ms (state_validation=1ms block_and_pvtdata_commit=30ms state_commit=4ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +peer0.org1.example.com | [3e79 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3e7a 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8CFEFBEF6AF9D9816...08071A0C0A0565787030321203312E30 +peer0.org1.example.com | [3e7b 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0183774F2188C91A6BA5B5494C1202FAFDBEC69701BF34E9CD13F159E99125BB +peer0.org1.example.com | [3e7c 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +peer0.org1.example.com | [3e7d 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [3e7e 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:52:21.578Z grpc.peer_address=172.18.0.8:54186 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=91.2µs +peer0.org1.example.com | [3e7f 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [3e80 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3e83 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e81 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3e84 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [3e85 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [3e86 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:54186 +peer0.org1.example.com | [3e87 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:54186 +peer0.org1.example.com | [3e88 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org1.example.com | [3e89 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc b9 5b 2c c8 a4 ff ed 54 f0 d2 |0E.!...[,....T..| +peer0.org1.example.com | 00000010 aa f1 1e 4b af e1 a6 a6 dd 16 e6 46 09 95 49 f3 |...K.......F..I.| +peer0.org1.example.com | 00000020 42 59 7b 99 d3 02 20 24 13 6e f4 b2 42 a1 76 2c |BY{... $.n..B.v,| +peer0.org1.example.com | 00000030 0c e7 73 02 ed 3b 11 63 10 d1 6f 56 21 a0 e3 6f |..s..;.c..oV!..o| +peer0.org1.example.com | 00000040 a2 79 bf 37 8d a7 5a |.y.7..Z| +peer0.org1.example.com | [3e8a 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:54186 +peer0.org1.example.com | [3e8b 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:54186 +peer0.org1.example.com | [3e82 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:52:21.588Z grpc.peer_address=172.18.0.6:55090 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=101.1µs +peer1.org2.example.com | [44c3 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7c20 principal evaluation fails +peer1.org2.example.com | [44c4 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dd7c20 gate 1598907150422508300 evaluation fails +peer1.org2.example.com | [44c5 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [44c6 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [44c7 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [44c8 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df0190 gate 1598907150423896500 evaluation starts +peer1.org2.example.com | [44c9 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df0190 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [44ca 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df0190 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [44cb 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df0190 principal matched by identity 0 +peer1.org2.example.com | [44cc 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org2.example.com | [44cd 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org2.example.com | [44ce 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df0190 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [44cf 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df0190 gate 1598907150423896500 evaluation succeeds +peer1.org2.example.com | [44d0 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [44d1 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [44d2 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [44d3 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [44d4 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org2.example.com | [44d5 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org2.example.com | [44d6 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [44d7 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [44d8 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [44d9 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [44da 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [44db 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [44dc 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [44dd 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [44de 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df1a80 gate 1598907150429880600 evaluation starts +peer1.org2.example.com | [44df 08-31 20:52:30.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df1a80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [44e0 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df1a80 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [44e1 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df1a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [44e2 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df1a80 principal evaluation fails +peer1.org2.example.com | [44e3 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df1a80 gate 1598907150429880600 evaluation fails +peer1.org2.example.com | [44e4 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [44e5 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [44e6 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [44e7 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df1ff0 gate 1598907150434874200 evaluation starts +peer1.org2.example.com | [44e8 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df1ff0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [44e9 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df1ff0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [44ea 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df1ff0 principal matched by identity 0 +peer1.org2.example.com | [44eb 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org2.example.com | [44ec 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org2.example.com | [44ed 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df1ff0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [44ee 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003df1ff0 gate 1598907150434874200 evaluation succeeds +peer1.org2.example.com | [44ef 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [44f0 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [44f1 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [44f2 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [44f3 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org2.example.com | [44f4 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org2.example.com | [44f5 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [44f6 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [44f7 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org2.example.com | [44f8 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org2.example.com | [44f9 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [44fa 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [44fb 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [44fc 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [44fd 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [44fe 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [44ff 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4500 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4501 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2c170 gate 1598907150445415100 evaluation starts +peer1.org2.example.com | [4502 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2c170 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4503 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2c170 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4504 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2c170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4505 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2c170 principal evaluation fails +peer1.org2.example.com | [4506 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2c170 gate 1598907150445415100 evaluation fails +peer1.org2.example.com | [4507 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4508 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4509 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [450a 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2c6e0 gate 1598907150448607200 evaluation starts +peer1.org2.example.com | [450b 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2c6e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [450c 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2c6e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [450d 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2c6e0 principal matched by identity 0 +peer1.org2.example.com | [450e 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org2.example.com | [450f 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org2.example.com | [4510 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2c6e0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4511 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2c6e0 gate 1598907150448607200 evaluation succeeds +peer1.org2.example.com | [4512 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4513 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4514 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4515 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4516 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4517 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4518 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3e8c 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3e8d 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [3e8e 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:54002 disconnected +peer0.org1.example.com | [3e8f 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:54002 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m14.3473111s +peer0.org1.example.com | [3e90 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [3e91 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:54186 disconnected +peer0.org1.example.com | [3e93 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:52:29.587Z grpc.peer_address=172.18.0.8:54186 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=17.9765ms +peer0.org1.example.com | [3e92 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b canceling read because closing +peer0.org1.example.com | [3e94 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b canceling read because closing +peer0.org1.example.com | [3e95 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3e96 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3e97 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [3e98 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [3e99 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:55090 +peer0.org1.example.com | [3e9a 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3e9b 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3e9c 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3e9d 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3e9e 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ea0 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3e9f 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:1288765530053796509 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ea2 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:1288765530053796509 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ea3 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40bd 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40be 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org1.example.com | [40bf 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [40c0 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [40c1 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [40c2 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer1.org1.example.com | [40c3 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [40c5 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [40c4 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [40c6 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40c7 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40c8 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [40c9 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40ca 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [40cb 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [40cc 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40cd 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [40ce 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org1.example.com | [40cf 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40d0 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [40d1 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org1.example.com | [40d2 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40d3 08-31 20:52:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [40d4 08-31 20:52:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...3D9B120C08C88BB087C8AF9D98161045 +peer1.org1.example.com | [40d5 08-31 20:52:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BADC22104258D5CCDBBD89D26A48766A46D812DD6460F0EA980FA19D5AC7E9B9 +peer1.org1.example.com | [40d6 08-31 20:52:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org1.example.com | [40d7 08-31 20:52:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267312E6578616D706C652E636F6D3A37303531 +peer1.org1.example.com | [40d8 08-31 20:52:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5E1207E32E2709D3C49FD6E4E42EA75E054BF7CAB0517372323BB60EB639719F +peer1.org1.example.com | [40d9 08-31 20:52:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [40da 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40db 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [40dc 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40dd 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer1.org1.example.com | [40de 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40df 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [40e0 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [40e1 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40e2 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [40e3 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40e4 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [40e5 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40e6 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org1.example.com | [40e7 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [40e8 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba dc 22 10 42 58 d5 cc db bd 89 d2 6a 48 76 6a |..".BX......jHvj| +peer1.org1.example.com | 00000010 46 d8 12 dd 64 60 f0 ea 98 0f a1 9d 5a c7 e9 b9 |F...d`......Z...| +peer1.org1.example.com | [40e9 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 2c ea 98 60 5b 8e 3d 4e 82 97 |0E.!..,..`[.=N..| +peer1.org1.example.com | 00000010 ab 55 59 95 9f 4b aa ab 4d c3 36 4a 89 d5 10 b8 |.UY..K..M.6J....| +peer1.org1.example.com | 00000020 5a 08 aa b3 59 02 20 5e 7b 39 87 3f 2a 0a 55 ef |Z...Y. ^{9.?*.U.| +peer1.org1.example.com | 00000030 74 f1 98 55 c8 02 84 85 ba 07 e4 e8 c3 14 82 a3 |t..U............| +peer1.org1.example.com | 00000040 e9 68 33 cb 87 fd 42 |.h3...B| +peer1.org1.example.com | [40ea 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer1.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer1.org1.example.com | [40eb 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 c0 4a 00 c1 c6 17 e5 5f d4 68 |0E.!...J....._.h| +peer1.org1.example.com | 00000010 e3 bc 25 1e a8 b4 50 11 e4 36 2f 1a 38 2d 07 80 |..%...P..6/.8-..| +peer1.org1.example.com | 00000020 54 02 49 d5 a9 02 20 61 70 2c b0 77 9a 3f de a9 |T.I... ap,.w.?..| +peer1.org1.example.com | 00000030 97 de f9 b4 b2 49 b3 47 b8 23 24 7f 51 7a 33 80 |.....I.G.#$.Qz3.| +peer1.org1.example.com | 00000040 b1 3b 61 8f ed f5 ca |.;a....| +peer1.org1.example.com | [40ec 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [40ed 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer1.org1.example.com | [40ee 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40ef 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40f0 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [40f1 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40f2 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [40f3 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [40f4 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba dc 22 10 42 58 d5 cc db bd 89 d2 6a 48 76 6a |..".BX......jHvj| +peer1.org1.example.com | 00000010 46 d8 12 dd 64 60 f0 ea 98 0f a1 9d 5a c7 e9 b9 |F...d`......Z...| +peer1.org1.example.com | [40f5 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 2c ea 98 60 5b 8e 3d 4e 82 97 |0E.!..,..`[.=N..| +peer1.org1.example.com | 00000010 ab 55 59 95 9f 4b aa ab 4d c3 36 4a 89 d5 10 b8 |.UY..K..M.6J....| +peer1.org1.example.com | 00000020 5a 08 aa b3 59 02 20 5e 7b 39 87 3f 2a 0a 55 ef |Z...Y. ^{9.?*.U.| +peer1.org1.example.com | 00000030 74 f1 98 55 c8 02 84 85 ba 07 e4 e8 c3 14 82 a3 |t..U............| +peer1.org1.example.com | 00000040 e9 68 33 cb 87 fd 42 |.h3...B| +peer1.org1.example.com | [40f6 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [40f7 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [40f8 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [40f9 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org1.example.com | [40fa 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [40fb 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [40fc 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [40fd 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [40fe 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [40ff 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4100 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4101 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045599a0 gate 1598907153321115500 evaluation starts +peer1.org1.example.com | [4102 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045599a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4103 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045599a0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [4104 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045599a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4105 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045599a0 principal evaluation fails +peer1.org1.example.com | [4106 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045599a0 gate 1598907153321115500 evaluation fails +peer1.org1.example.com | [4107 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4108 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [4109 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [410a 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [410b 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004559f10 gate 1598907153325805700 evaluation starts +peer1.org1.example.com | [410c 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004559f10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [410d 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004559f10 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [410e 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004559f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [410f 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004559f10 principal evaluation fails +peer1.org1.example.com | [4110 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004559f10 gate 1598907153325805700 evaluation fails +peer0.org1.example.com | [3ea4 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:1288765530053796509 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ea5 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3ea6 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ea7 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ea8 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3ea9 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3eaa 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3eab 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3eac 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [3ead 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3050 gate 1598907139644284100 evaluation starts +peer0.org1.example.com | [3eae 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3050 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3eaf 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3050 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3eb0 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [3eb1 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3050 principal evaluation fails +peer0.org1.example.com | [3eb2 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3050 gate 1598907139644284100 evaluation fails +peer0.org1.example.com | [3eb3 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3eb4 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3eb5 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3eb6 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec35e0 gate 1598907139646806800 evaluation starts +peer0.org1.example.com | [3eb7 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec35e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3eb8 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec35e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3eb9 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec35e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3eba 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec35e0 principal evaluation fails +peer0.org1.example.com | [3ebb 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec35e0 gate 1598907139646806800 evaluation fails +peer0.org1.example.com | [3ebc 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3ebd 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3ebe 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3ebf 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3b70 gate 1598907139649687900 evaluation starts +peer0.org1.example.com | [3ec0 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3b70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ec1 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3b70 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3ec2 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org1.example.com | [3ec3 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [3ec4 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [3ec5 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3b70 principal matched by identity 0 +peer0.org1.example.com | [3ec6 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 79 b0 a3 b7 3b f4 53 44 01 cd 5e 1f a5 4f 39 33 |y...;.SD..^..O93| +peer0.org1.example.com | 00000010 eb cc 59 36 9e 6c c7 14 c0 03 08 ce b3 4b ef f5 |..Y6.l.......K..| +peer0.org2.example.com | [43f5 08-31 20:52:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [43f6 08-31 20:52:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [43f7 08-31 20:52:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43f8 08-31 20:52:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [43f9 08-31 20:52:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43fa 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [43fb 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [43fc 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [43fd 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [43fe 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [43ff 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 bb 37 cd a7 3d c7 15 e9 10 ed e0 8b 7c cb 8b |..7..=.......|..| +peer0.org2.example.com | 00000010 37 da ab 81 32 e6 31 10 6e 3a f2 65 5d 49 60 6a |7...2.1.n:.e]I`j| +peer0.org2.example.com | [4400 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb d8 7a 44 f0 ba 1c 97 51 e4 6b |0E.!...zD....Q.k| +peer0.org2.example.com | 00000010 df af be f7 46 7e cd 10 71 ac cf 38 e6 99 9b 95 |....F~..q..8....| +peer0.org2.example.com | 00000020 8f 1a 12 16 6a 02 20 2c 40 29 1b 48 a5 78 d7 11 |....j. ,@).H.x..| +peer0.org2.example.com | 00000030 e1 ab a0 0f 96 3c b1 51 15 13 b7 a7 58 76 e5 73 |.....<.Q....Xv.s| +peer0.org2.example.com | 00000040 65 eb f1 d2 be ca 9d |e......| +peer0.org2.example.com | [4401 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [4402 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fb 7f b9 c6 4c 3f d3 cb 18 0c 70 |0E.!.....L?....p| +peer0.org2.example.com | 00000010 92 bd 9a 4e 7a 56 9c ee 84 30 0b 47 45 f2 9d 0a |...NzV...0.GE...| +peer0.org2.example.com | 00000020 b8 91 de 51 3c 02 20 48 cc 0c 77 31 ea cd 75 8a |...Q<. H..w1..u.| +peer0.org2.example.com | 00000030 58 78 20 f6 ef e4 4f 4e bf 66 51 c5 26 6d 8b ea |Xx ...ON.fQ.&m..| +peer0.org2.example.com | 00000040 dc fc 62 4d 87 2c 08 |..bM.,.| +peer0.org2.example.com | [4403 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [4404 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [4405 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4406 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4407 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4408 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4409 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [440a 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [440b 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [440c 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [440d 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [440e 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [440f 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [4410 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [4411 08-31 20:52:25.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4412 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4413 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4414 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4415 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4416 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4417 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4418 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4419 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [441a 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [441b 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [441c 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [441d 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [441e 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [441f 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4420 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4421 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4422 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ec7 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac 58 f5 ef 7b 5d fc 10 49 b1 bc |0E.!..X..{]..I..| +peer0.org1.example.com | 00000010 38 22 c1 41 f6 5e 66 29 53 24 99 0f e3 d1 63 5f |8".A.^f)S$....c_| +peer0.org1.example.com | 00000020 71 a6 76 fb 07 02 20 3f 4e 7b 47 02 54 eb 7b ce |q.v... ?N{G.T.{.| +peer0.org1.example.com | 00000030 d4 1b 2b ff d7 c0 44 4e 95 8c e0 16 6f 3a f0 bf |..+...DN....o:..| +peer0.org1.example.com | 00000040 54 50 f5 5c 03 f2 68 |TP.\..h| +peer0.org1.example.com | [3ec8 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3b70 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3ec9 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3b70 gate 1598907139649687900 evaluation succeeds +peer0.org1.example.com | [3eca 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ecb 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3ecc 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3ecd 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3ece 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [3ecf 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [3ed0 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3ed1 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3ed2 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3ed3 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ed4 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ed5 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ed6 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [3ed7 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ed8 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ed9 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3eda 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +peer0.org1.example.com | 46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +peer0.org1.example.com | SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +peer0.org1.example.com | hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [3edb 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3edc 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:55090 +peer0.org1.example.com | [3ea1 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3edf 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [3edd 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ede 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 1288765530053796509, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3ee0 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e659c0 gate 1598907139676513400 evaluation starts +peer0.org1.example.com | [3ee1 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [3ee2 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1288765530053796509, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +peer0.org1.example.com | [3ee4 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3ee3 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e659c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ee5 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e659c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3ee6 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e659c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [3ee7 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e659c0 principal evaluation fails +peer0.org1.example.com | [3ee8 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e659c0 gate 1598907139676513400 evaluation fails +peer0.org1.example.com | [3ee9 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3eea 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3eeb 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3eec 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eedde0 gate 1598907139681889800 evaluation starts +peer0.org1.example.com | [3eed 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eedde0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3eee 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eedde0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3eef 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eedde0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3ef0 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eedde0 principal evaluation fails +peer0.org1.example.com | [3ef1 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eedde0 gate 1598907139681889800 evaluation fails +peer0.org1.example.com | [3ef2 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3ef3 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3ef4 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3ef5 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f14350 gate 1598907139682410300 evaluation starts +peer0.org1.example.com | [3ef6 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f14350 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3ef7 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f14350 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3ef8 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f14350 principal matched by identity 0 +peer0.org1.example.com | [3ef9 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org1.example.com | [3efa 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 83 55 23 2d 8d bf d6 da 57 7b 8c |0D. &.U#-....W{.| +peer0.org1.example.com | 00000010 6c 66 0c 6c ee c5 14 a2 5e e8 01 ca 06 68 92 a2 |lf.l....^....h..| +peer0.org1.example.com | 00000020 94 16 ca a1 02 20 1e de 7c 18 04 80 89 01 ba 03 |..... ..|.......| +peer0.org1.example.com | 00000030 0d 31 4a d6 75 b3 9d 1e 40 52 fe 4b a5 74 f1 3a |.1J.u...@R.K.t.:| +peer0.org1.example.com | 00000040 3f 06 67 7d e4 2a |?.g}.*| +peer0.org1.example.com | [3efb 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f14350 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3efc 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f14350 gate 1598907139682410300 evaluation succeeds +peer0.org1.example.com | [3efd 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3efe 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3eff 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3f00 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3f01 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:39624 +peer0.org1.example.com | [3f02 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:39624 +peer0.org1.example.com | [3f03 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [3f04 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +peer0.org1.example.com | [3f05 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer1.org2.example.com | [4519 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [451a 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [451b 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [451c 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [451d 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [451e 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2d8e0 gate 1598907150463360300 evaluation starts +peer1.org2.example.com | [451f 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2d8e0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4520 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2d8e0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4521 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2d8e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4522 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2d8e0 principal evaluation fails +peer1.org2.example.com | [4523 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2d8e0 gate 1598907150463360300 evaluation fails +peer1.org2.example.com | [4524 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4525 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4526 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4527 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2de50 gate 1598907150465496800 evaluation starts +peer1.org2.example.com | [4528 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2de50 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4529 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2de50 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [452a 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2de50 principal matched by identity 0 +peer1.org2.example.com | [452b 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org2.example.com | [452c 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org2.example.com | [452d 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [452e 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2de50 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [452f 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e2de50 gate 1598907150465496800 evaluation succeeds +peer1.org2.example.com | [4530 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4531 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [4532 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4533 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4534 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org2.example.com | [4535 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org2.example.com | [4536 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4537 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4538 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4539 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [453a 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b 97 5e 88 bd 3e b9 81 a8 0b e7 48 cb ee 53 b3 |[.^..>.....H..S.| +peer1.org2.example.com | 00000010 d3 77 95 7e 0e 16 cb 07 dd 09 64 f4 6d 05 de 6f |.w.~......d.m..o| +peer1.org2.example.com | [453b 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b a1 6e 04 31 7f 05 ce 18 6d 1e 65 |0D. [.n.1....m.e| +peer1.org2.example.com | 00000010 45 65 eb 8f 99 e0 a0 a6 f0 9f d6 54 37 e8 f9 f7 |Ee.........T7...| +peer1.org2.example.com | 00000020 38 b4 7d 28 02 20 71 b5 cf a8 3a 90 c2 d2 88 16 |8.}(. q...:.....| +peer1.org2.example.com | 00000030 50 e1 2c 4c 59 d4 0a 36 85 d3 87 4b 79 f7 a9 2a |P.,LY..6...Ky..*| +peer1.org2.example.com | 00000040 5d fb 7c 40 02 07 |].|@..| +peer1.org2.example.com | [453c 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org1.example.com | [4111 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4112 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4113 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4114 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6480 gate 1598907153329483600 evaluation starts +peer1.org1.example.com | [4115 08-31 20:52:33.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6480 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4116 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6480 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [4117 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6480 principal matched by identity 0 +peer1.org1.example.com | [4118 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 3d 51 34 f1 97 74 34 15 c7 4c fc 7e 6c 2a a0 |v=Q4..t4..L.~l*.| +peer1.org1.example.com | 00000010 b2 3b 9a 0a 78 9f 8f e4 c9 ec 76 80 d4 b7 bb 58 |.;..x.....v....X| +peer1.org1.example.com | [4119 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 10 04 a6 70 23 1c b6 86 2b ff |0E.!.....p#...+.| +peer1.org1.example.com | 00000010 b8 0b 1b ac 7a ac 2a 42 95 43 98 b7 8b a3 61 c5 |....z.*B.C....a.| +peer1.org1.example.com | 00000020 3a 28 95 71 35 02 20 67 04 bc 00 5b f0 ae 51 73 |:(.q5. g...[..Qs| +peer1.org1.example.com | 00000030 43 b6 79 40 3f be 83 f7 1b 13 5a 8d 6f 94 51 86 |C.y@?.....Z.o.Q.| +peer1.org1.example.com | 00000040 87 86 e0 99 79 9f fe |....y..| +peer1.org1.example.com | [411a 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6480 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [411b 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045a6480 gate 1598907153329483600 evaluation succeeds +peer1.org1.example.com | [411c 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [411d 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [411e 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [411f 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4120 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4121 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4122 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4123 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org1.example.com | [4124 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4125 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org1.example.com | [4126 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba dc 22 10 42 58 d5 cc db bd 89 d2 6a 48 76 6a |..".BX......jHvj| +peer1.org1.example.com | 00000010 46 d8 12 dd 64 60 f0 ea 98 0f a1 9d 5a c7 e9 b9 |F...d`......Z...| +peer1.org1.example.com | [4127 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 2c ea 98 60 5b 8e 3d 4e 82 97 |0E.!..,..`[.=N..| +peer1.org1.example.com | 00000010 ab 55 59 95 9f 4b aa ab 4d c3 36 4a 89 d5 10 b8 |.UY..K..M.6J....| +peer1.org1.example.com | 00000020 5a 08 aa b3 59 02 20 5e 7b 39 87 3f 2a 0a 55 ef |Z...Y. ^{9.?*.U.| +peer1.org1.example.com | 00000030 74 f1 98 55 c8 02 84 85 ba 07 e4 e8 c3 14 82 a3 |t..U............| +peer1.org1.example.com | 00000040 e9 68 33 cb 87 fd 42 |.h3...B| +peer1.org1.example.com | [4128 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4129 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [412a 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [412b 08-31 20:52:33.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [412c 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [412d 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org1.example.com | [412e 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [412f 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4130 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4131 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4132 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4133 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4134 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org1.example.com | [4135 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4136 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [4137 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4423 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4424 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4425 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4426 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4427 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4428 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4429 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e98d20 gate 1598907145297423500 evaluation starts +peer0.org2.example.com | [442a 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e98d20 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [442b 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e98d20 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [442c 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e98d20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [442d 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e98d20 principal evaluation fails +peer0.org2.example.com | [442e 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e98d20 gate 1598907145297423500 evaluation fails +peer0.org2.example.com | [442f 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4430 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4431 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4432 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e99290 gate 1598907145298502600 evaluation starts +peer0.org2.example.com | [4433 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e99290 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4434 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e99290 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4435 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e99290 principal matched by identity 0 +peer0.org2.example.com | [4436 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 7e b8 fb 7b 92 f9 a8 55 43 c1 69 4c 47 d2 b2 |.~..{...UC.iLG..| +peer0.org2.example.com | 00000010 11 10 12 61 78 d4 eb 0c c8 d1 65 aa 08 6c fa 51 |...ax.....e..l.Q| +peer0.org2.example.com | [4437 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 8b 52 d5 99 fe 97 1c 64 ef 6c |0E.!...R.....d.l| +peer0.org2.example.com | 00000010 06 64 3b 74 65 f3 cf f8 32 a5 57 36 bb 76 2c c8 |.d;te...2.W6.v,.| +peer0.org2.example.com | 00000020 b6 aa ec a4 dd 02 20 4d 13 76 f1 83 d6 67 90 3d |...... M.v...g.=| +peer0.org2.example.com | 00000030 dd fb b8 0e e1 80 26 48 e1 a7 72 11 50 fb 81 26 |......&H..r.P..&| +peer0.org2.example.com | 00000040 ab 16 85 61 5e a6 cc |...a^..| +peer0.org2.example.com | [4438 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e99290 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4439 08-31 20:52:25.29 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e99290 gate 1598907145298502600 evaluation succeeds +peer0.org2.example.com | [443a 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [443b 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [443c 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [443d 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [443e 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [443f 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [4440 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4441 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4442 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4443 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4444 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4445 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4446 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4447 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4448 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4449 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [444b 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [444c 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [444d 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [444e 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [444f 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4450 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4451 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4452 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [444a 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4453 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4454 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4455 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4456 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4457 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4458 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4459 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [445a 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [445b 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [445c 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [445d 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [445e 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [445f 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4460 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4461 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4462 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4463 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4464 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4465 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4466 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4467 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4468 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4469 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [446a 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebdab0 gate 1598907145342821600 evaluation starts +peer0.org2.example.com | [446b 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebdab0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [446c 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebdab0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [446d 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebdab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [446e 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebdab0 principal evaluation fails +peer0.org2.example.com | [446f 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ebdab0 gate 1598907145342821600 evaluation fails +peer0.org2.example.com | [4470 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4471 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4472 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4473 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edc020 gate 1598907145347062100 evaluation starts +peer0.org2.example.com | [4474 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edc020 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4475 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edc020 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4476 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edc020 principal matched by identity 0 +peer0.org2.example.com | [4477 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 92 97 fa aa d4 02 28 8b d8 61 84 86 f9 40 ef |.......(..a...@.| +peer0.org2.example.com | 00000010 fb 5e cd 5b 1d b1 37 dc 33 68 1e 31 30 75 bd 0b |.^.[..7.3h.10u..| +peer0.org2.example.com | [4478 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 34 0f 82 b6 c8 0f 1b 71 00 00 |0E.!..4......q..| +peer0.org2.example.com | 00000010 b4 79 07 e4 fd da 76 35 0d 8a 32 f0 9a 5a c6 f9 |.y....v5..2..Z..| +peer0.org2.example.com | 00000020 e3 4d 1b e5 84 02 20 21 79 59 ec 7f e4 89 df b6 |.M.... !yY......| +peer0.org2.example.com | 00000030 9c 4b 7e 22 d9 b1 ef d7 6a b6 7c 1a 7b ef a3 2d |.K~"....j.|.{..-| +peer0.org2.example.com | 00000040 07 5c bb e6 ba bb 91 |.\.....| +peer0.org2.example.com | [4479 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edc020 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [447a 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003edc020 gate 1598907145347062100 evaluation succeeds +peer0.org2.example.com | [447b 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [447c 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [447d 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [447e 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [447f 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4480 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [4481 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4482 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4483 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4484 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4485 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4486 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4487 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [4488 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4489 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [448a 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [448b 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3f06 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:39624 disconnected +peer0.org1.example.com | [3f07 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:52:29.553Z grpc.peer_address=172.18.0.5:39624 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=132.2024ms +peer0.org1.example.com | [3f08 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [3f09 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3f0a 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [3f0b 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [3f0c 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3f0d 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f0e 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3f0f 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f10 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3f11 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f12 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f13 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3f14 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3f15 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4138 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org1.example.com | [4139 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org1.example.com | [413a 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [413b 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [413c 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [413d 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [413e 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [413f 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4140 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4141 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bf2c0 gate 1598907153496183900 evaluation starts +peer1.org1.example.com | [4142 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bf2c0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4143 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bf2c0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [4144 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bf2c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4145 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bf2c0 principal evaluation fails +peer1.org1.example.com | [4146 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bf2c0 gate 1598907153496183900 evaluation fails +peer1.org1.example.com | [4147 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4148 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4149 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [414a 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bf830 gate 1598907153497275000 evaluation starts +peer1.org1.example.com | [414b 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bf830 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [414c 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bf830 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [414d 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bf830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [414e 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bf830 principal evaluation fails +peer1.org1.example.com | [414f 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bf830 gate 1598907153497275000 evaluation fails +peer1.org1.example.com | [4150 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4151 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4152 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4153 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bfda0 gate 1598907153497832500 evaluation starts +peer1.org1.example.com | [4154 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bfda0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4155 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bfda0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [4156 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bfda0 principal matched by identity 0 +peer1.org1.example.com | [4157 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 85 4d e3 1b 2b 14 d5 61 8e 17 5c 84 83 32 48 |..M..+..a..\..2H| +peer1.org1.example.com | 00000010 b6 f7 83 21 a9 ec ab ea a8 d7 d7 84 0b a3 77 e2 |...!..........w.| +peer1.org1.example.com | [4158 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 b4 0c 15 cf 64 72 f1 f9 4d 79 |0E.!......dr..My| +peer1.org1.example.com | 00000010 8f 54 a8 d6 ba b3 64 2e 0d 29 76 9e bc 66 b0 c0 |.T....d..)v..f..| +peer1.org1.example.com | 00000020 c4 52 6c e8 c1 02 20 24 9d 0a 58 11 c3 60 1e 40 |.Rl... $..X..`.@| +peer1.org1.example.com | 00000030 ac 6a 8a fb 5a 8b b8 33 d9 fe 2b e4 46 d7 4a 07 |.j..Z..3..+.F.J.| +peer1.org1.example.com | 00000040 97 96 9b 09 2a a8 51 |....*.Q| +peer1.org1.example.com | [4159 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bfda0 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [415a 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045bfda0 gate 1598907153497832500 evaluation succeeds +peer1.org1.example.com | [415b 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [415c 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [415d 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [415e 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [415f 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org1.example.com | [4160 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org1.example.com | [4161 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [4162 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [4163 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [4164 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4165 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4166 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4167 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org1.example.com | [4168 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4169 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [416a 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [416b 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [416c 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org1.example.com | [416d 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [416e 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:" signature:"0D\002 E\020\032K1\023e\002\346\330y<\252\334\202\321\212\2618\301m]\321\3737\032E\301\300\333\326\370\002 ?\262\363\246\276\301\336x\374Mf\037r\257\2643v\022+F\241\200Z\001\253\336\251\177B|K3" > alive: alive: +peer1.org1.example.com | [416f 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [4170 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer1.org1.example.com | [4171 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [4172 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4173 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req:\330JSR\335\333ETV\354=/V|\206\234\344\315\034k\002 \177\332^(\232\302\234\321\3142\362\255td6W\327cK\270\024\020\2044$l>\377z\240*\004" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [4174 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4175 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\330JSR\335\333ETV\354=/V|\206\234\344\315\034k\002 \177\332^(\232\302\234\321\3142\362\255td6W\327cK\270\024\020\2044$l>\377z\240*\004" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer1.org1.example.com | [4176 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org1.example.com | [4177 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 b6 af 9a 4d 2d f1 0f ed 74 cc b1 73 7a 52 f6 |....M-...t..szR.| +peer1.org1.example.com | 00000010 2b c8 4d 70 de a6 4b 03 f3 15 a6 12 42 1a 1d c6 |+.Mp..K.....B...| +peer1.org1.example.com | [4178 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 20 93 43 04 22 e5 56 44 e9 50 07 |0D. . .C.".VD.P.| +peer1.org1.example.com | 00000010 be 5e 40 76 05 fb 54 63 f5 18 f0 65 ee df e0 c1 |.^@v..Tc...e....| +peer1.org1.example.com | 00000020 83 2f 90 10 02 20 00 ef 62 10 df c6 81 8a b7 61 |./... ..b......a| +peer1.org1.example.com | 00000030 25 ad ae 35 e3 52 88 aa 57 f6 1f 5c 1c ad a9 a5 |%..5.R..W..\....| +peer1.org1.example.com | 00000040 a4 96 4b 35 f7 b7 |..K5..| +peer1.org1.example.com | [4179 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer1.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer1.org1.example.com | [417a 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 80 e0 7c a0 4c 61 3c fb a3 42 3e |0D. U..|.La<..B>| +peer1.org1.example.com | 00000010 d8 4a 53 52 dd db 45 54 56 ec 3d 2f 56 7c 86 9c |.JSR..ETV.=/V|..| +peer1.org1.example.com | 00000020 e4 cd 1c 6b 02 20 7f da 5e 28 9a c2 9c d1 cc 32 |...k. ..^(.....2| +peer1.org1.example.com | 00000030 f2 ad 74 64 36 57 d7 63 4b b8 14 10 84 34 24 6c |..td6W.cK....4$l| +peer1.org1.example.com | 00000040 3e ff 7a a0 2a 04 |>.z.*.| +peer1.org1.example.com | [417b 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org1.example.com | [417c 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org1.example.com | [417d 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org1.example.com | [417e 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org1.example.com | [417f 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org1.example.com | [4180 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4181 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4182 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org1.example.com | [4183 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4184 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4185 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [4186 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\330JSR\335\333ETV\354=/V|\206\234\344\315\034k\002 \177\332^(\232\302\234\321\3142\362\255td6W\327cK\270\024\020\2044$l>\377z\240*\004" > > alive: +peer1.org1.example.com | [4187 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org1.example.com | [4188 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4189 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [418a 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [418b 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [418c 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [418d 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [418e 08-31 20:52:33.70 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Exiting +peer1.org1.example.com | [418f 08-31 20:52:33.70 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Returning false +peer1.org1.example.com | [4190 08-31 20:52:33.70 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : Entering +peer0.org1.example.com | [3f16 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [3f17 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15310 gate 1598907139705081900 evaluation starts +peer0.org1.example.com | [3f18 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15310 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f19 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15310 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3f1a 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [3f1b 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15310 principal evaluation fails +peer0.org1.example.com | [3f1c 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15310 gate 1598907139705081900 evaluation fails +peer0.org1.example.com | [3f1d 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3f1e 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3f1f 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3f20 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f158a0 gate 1598907139708523700 evaluation starts +peer0.org1.example.com | [3f21 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f158a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f22 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f158a0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3f23 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f158a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3f24 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f158a0 principal evaluation fails +peer0.org1.example.com | [3f25 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f158a0 gate 1598907139708523700 evaluation fails +peer0.org1.example.com | [3f26 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3f27 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3f28 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3f29 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15e30 gate 1598907139715041400 evaluation starts +peer0.org1.example.com | [3f2a 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15e30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f2b 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15e30 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3f2c 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org1.example.com | [3f2d 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org1.example.com | [3f2e 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org1.example.com | [3f2f 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15e30 principal matched by identity 0 +peer0.org1.example.com | [3f30 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [3f31 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d c8 31 dc 98 e2 bf 3f 93 39 58 6a |0D. =.1....?.9Xj| +peer0.org1.example.com | 00000010 4d af f3 d1 f5 c6 53 36 a5 e9 dc a8 7a 20 69 d7 |M.....S6....z i.| +peer0.org1.example.com | 00000020 eb 02 ef 15 02 20 11 ef ad 42 60 9d 99 21 c9 87 |..... ...B`..!..| +peer0.org1.example.com | 00000030 77 3b 25 5d e3 60 6f 3f 07 89 24 7d 90 eb f3 6e |w;%].`o?..$}...n| +peer0.org1.example.com | 00000040 20 ab 4d 1d 36 14 | .M.6.| +peer0.org1.example.com | [3f32 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15e30 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3f33 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15e30 gate 1598907139715041400 evaluation succeeds +peer0.org1.example.com | [3f34 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f35 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f36 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3f37 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3f38 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:55090 +peer0.org1.example.com | [3f39 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:55090 +peer0.org1.example.com | [3f3a 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [3f3b 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer0.org1.example.com | [3f3c 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:55090 disconnected +peer0.org1.example.com | [3f3d 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:52:29.61Z grpc.peer_address=172.18.0.6:55090 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=122.5588ms +peer0.org1.example.com | [3f3e 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [3f3f 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [3f40 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:52:21.742Z grpc.peer_address=172.18.0.6:55096 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=241.6µs +peer0.org1.example.com | [3f41 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3f42 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [3f43 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org2.example.com | [448c 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [448d 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [448e 08-31 20:52:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [448f 08-31 20:52:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org2.example.com | [4490 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [4491 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4492 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [4493 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4494 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [4495 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4496 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4499 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4497 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [449a 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4498 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [449b 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [449c 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [449d 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [449e 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [449f 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [44a0 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44a1 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [44a2 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [44a3 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44a4 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [44a5 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [44a6 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [44a7 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816103C +peer0.org2.example.com | [44a8 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2E46EB2E411CE8C9F96C232292300ACA422AE922DC20284B8FAF9996BBB52DF2 +peer0.org2.example.com | [44a9 08-31 20:52:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [44aa 08-31 20:52:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [44ab 08-31 20:52:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [44ac 08-31 20:52:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [44ad 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [44ae 08-31 20:52:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44af 08-31 20:52:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [44b0 08-31 20:52:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [44b1 08-31 20:52:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [44b2 08-31 20:52:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [44b3 08-31 20:52:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [44b4 08-31 20:52:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [44b5 08-31 20:52:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [44b6 08-31 20:52:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [44b7 08-31 20:52:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44b8 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [44b9 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44ba 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [44bb 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44bc 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [44bd 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816103D +peer0.org2.example.com | [44be 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: ACE4B0844B07DF737A110C44359D1D7FF5F0FA1ED7A5C0105A6AE80D87442E4E +peer0.org2.example.com | [44bf 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [44c0 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [44c1 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [44c2 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [44c3 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [44c4 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f44 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:55096 +peer0.org1.example.com | [3f45 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:55096 +peer0.org1.example.com | [3f46 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f47 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3f48 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f49 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3f4a 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [453d 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [453e 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [453f 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4540 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [4541 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4542 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4543 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4544 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4545 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4546 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4547 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4548 08-31 20:52:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4549 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [454a 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [454b 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [454c 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [454d 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [454e 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [454f 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4550 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4551 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4552 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4553 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [4554 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4555 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4556 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4557 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:49342 +peer1.org2.example.com | [4558 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003e158b0 +peer1.org2.example.com | [4559 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [455a 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [455b 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org2.example.com | [455c 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [455d 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 11 3c 2f c5 8e f4 2c 28 c5 12 c8 e7 46 c5 11 |.. DEBU Verify: sig = 00000000 30 45 02 21 00 c6 c0 f2 66 80 c3 63 b1 24 ee ea |0E.!....f..c.$..| +peer1.org2.example.com | 00000010 31 be b4 bb fb b4 54 b8 cf 09 fb 23 44 54 25 ee |1.....T....#DT%.| +peer1.org2.example.com | 00000020 2c bf 74 98 46 02 20 1b ed bb 00 f5 1d 66 f3 f2 |,.t.F. ......f..| +peer1.org2.example.com | 00000030 1e af f0 cd e6 2c b0 6a 9a 35 7c 88 8b 70 5d 32 |.....,.j.5|..p]2| +peer1.org2.example.com | 00000040 b1 1f ff e5 2e 69 30 |.....i0| +peer1.org2.example.com | [455f 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [4560 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003e56380, header 0xc003e15cc0 +peer1.org2.example.com | [4561 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer1.org2.example.com | [4562 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU [][1dd3c1bb] processing txid: 1dd3c1bb3d6abe9bb3405b865ab2571ec3897385089d3f79c11dcb3baecb08f1 +peer1.org2.example.com | [4563 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU [][1dd3c1bb] Entry chaincode: name:"cscc" +peer0.org1.example.com | [3f4b 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3f4c 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f4d 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f4e 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3f4f 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3f50 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [3f51 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faf4a0 gate 1598907139749471300 evaluation starts +peer0.org1.example.com | [3f52 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faf4a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f53 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faf4a0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3f54 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faf4a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [3f55 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faf4a0 principal evaluation fails +peer0.org1.example.com | [3f56 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faf4a0 gate 1598907139749471300 evaluation fails +peer0.org1.example.com | [3f57 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3f58 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3f59 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3f5a 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fafa10 gate 1598907139751714900 evaluation starts +peer0.org1.example.com | [3f5b 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fafa10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f5c 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fafa10 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3f5d 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fafa10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3f5e 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fafa10 principal evaluation fails +peer0.org1.example.com | [3f5f 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fafa10 gate 1598907139751714900 evaluation fails +peer0.org1.example.com | [3f60 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3f61 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3f62 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3f63 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faff80 gate 1598907139755091200 evaluation starts +peer0.org1.example.com | [3f64 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faff80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f65 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faff80 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3f66 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faff80 principal matched by identity 0 +peer0.org1.example.com | [3f67 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +peer0.org1.example.com | 00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +peer0.org1.example.com | [3f68 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c d2 2d bc 1c 60 12 38 5d 27 22 91 |0D. |.-..`.8]'".| +peer0.org1.example.com | 00000010 03 c5 87 50 05 9c 88 80 c4 cd a7 3b 3a cf de bc |...P.......;:...| +peer0.org1.example.com | 00000020 7f 5d fd 36 02 20 3d 39 0d e3 d5 0c 54 5b 9a a3 |.].6. =9....T[..| +peer0.org1.example.com | 00000030 31 36 b4 2c 2f b1 fb d8 31 d0 b5 c2 ae da a4 94 |16.,/...1.......| +peer0.org1.example.com | 00000040 14 61 a4 97 84 c6 |.a....| +peer0.org1.example.com | [3f69 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faff80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3f6a 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faff80 gate 1598907139755091200 evaluation succeeds +peer0.org1.example.com | [3f6b 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f6c 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f6d 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3f6e 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3f6f 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:55096 +peer0.org1.example.com | [3f70 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:55096 +peer0.org1.example.com | [3f71 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: nonce:11960660938038967932 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org2.example.com | [44c5 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [44c6 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [44c9 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44c7 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [44c8 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [44cb 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [44cc 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44ca 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44cd 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [44ce 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [44cf 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44d0 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [44d1 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [44d2 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [44d3 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [44d4 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [44d5 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [44d6 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [44d7 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [44d8 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [44d9 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2af50 gate 1598907145521433300 evaluation starts +peer0.org2.example.com | [44da 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2af50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [44db 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2af50 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [44dc 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2af50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [44dd 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2af50 principal evaluation fails +peer0.org2.example.com | [44de 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2af50 gate 1598907145521433300 evaluation fails +peer0.org2.example.com | [44df 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [44e0 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [44e1 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [44e2 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2b4c0 gate 1598907145521704600 evaluation starts +peer0.org2.example.com | [44e3 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2b4c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [44e4 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2b4c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [44e5 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2b4c0 principal matched by identity 0 +peer0.org2.example.com | [44e6 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 92 97 fa aa d4 02 28 8b d8 61 84 86 f9 40 ef |.......(..a...@.| +peer0.org2.example.com | 00000010 fb 5e cd 5b 1d b1 37 dc 33 68 1e 31 30 75 bd 0b |.^.[..7.3h.10u..| +peer0.org2.example.com | [44e7 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 34 0f 82 b6 c8 0f 1b 71 00 00 |0E.!..4......q..| +peer0.org2.example.com | 00000010 b4 79 07 e4 fd da 76 35 0d 8a 32 f0 9a 5a c6 f9 |.y....v5..2..Z..| +peer0.org2.example.com | 00000020 e3 4d 1b e5 84 02 20 21 79 59 ec 7f e4 89 df b6 |.M.... !yY......| +peer0.org2.example.com | 00000030 9c 4b 7e 22 d9 b1 ef d7 6a b6 7c 1a 7b ef a3 2d |.K~"....j.|.{..-| +peer0.org2.example.com | 00000040 07 5c bb e6 ba bb 91 |.\.....| +peer0.org2.example.com | [44e8 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2b4c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [44e9 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f2b4c0 gate 1598907145521704600 evaluation succeeds +peer0.org2.example.com | [44ea 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [44eb 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [44ec 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [44ed 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [44ee 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4564 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> INFO [][1dd3c1bb] Entry chaincode: name:"cscc" +peer1.org2.example.com | [4565 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [4566 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer1.org2.example.com | [4567 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 11 3c 2f c5 8e f4 2c 28 c5 12 c8 e7 46 c5 11 |.. DEBU Verify: sig = 00000000 30 45 02 21 00 c6 c0 f2 66 80 c3 63 b1 24 ee ea |0E.!....f..c.$..| +peer1.org2.example.com | 00000010 31 be b4 bb fb b4 54 b8 cf 09 fb 23 44 54 25 ee |1.....T....#DT%.| +peer1.org2.example.com | 00000020 2c bf 74 98 46 02 20 1b ed bb 00 f5 1d 66 f3 f2 |,.t.F. ......f..| +peer1.org2.example.com | 00000030 1e af f0 cd e6 2c b0 6a 9a 35 7c 88 8b 70 5d 32 |.....,.j.5|..p]2| +peer1.org2.example.com | 00000040 b1 1f ff e5 2e 69 30 |.....i0| +peer1.org2.example.com | [4569 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU [1dd3c1bb] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [456a 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU [1dd3c1bb] notifying Txid:1dd3c1bb3d6abe9bb3405b865ab2571ec3897385089d3f79c11dcb3baecb08f1, channelID: +peer1.org2.example.com | [456b 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [456c 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> INFO [][1dd3c1bb] Exit chaincode: name:"cscc" (1ms) +peer1.org2.example.com | [456d 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU [][1dd3c1bb] Exit +peer1.org2.example.com | [456e 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:49342 +peer1.org2.example.com | [456f 08-31 20:52:30.49 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:49342 grpc.code=OK grpc.call_duration=3.8449ms +peer1.org2.example.com | [4570 08-31 20:52:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.5:7051->172.18.0.9:49342: read: connection reset by peer +peer1.org2.example.com | [4571 08-31 20:52:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [4572 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4573 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4574 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [4575 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4576 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4577 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4578 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org2.example.com | [4579 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [457a 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [457b 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org2.example.com | [457c 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [457d 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [457e 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [457f 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4580 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer1.org2.example.com | [4581 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4191 08-31 20:52:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org1.example.com | [4192 08-31 20:52:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 e3 02 72 c7 8b df 3e 99 e1 bc 1c 03 42 07 84 |i..r...>.....B..| +peer1.org1.example.com | 00000010 d2 5a 8a a9 6d 15 97 90 b4 5e 03 a0 de 94 05 8c |.Z..m....^......| +peer1.org1.example.com | [4193 08-31 20:52:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 2d 97 21 1c 72 0e 76 f4 e4 cc |0E.!..-.!.r.v...| +peer1.org1.example.com | 00000010 7b d4 5f c0 12 7a e9 8e c5 d8 3f 2a 62 b6 06 ec |{._..z....?*b...| +peer1.org1.example.com | 00000020 6c af 0e e3 14 02 20 47 9a 68 6b 90 82 15 ad a6 |l..... G.hk.....| +peer1.org1.example.com | 00000030 9b e9 c2 2c 65 92 7f 1f ad 67 58 5f f5 4f 77 03 |...,e....gX_.Ow.| +peer1.org1.example.com | 00000040 c6 34 e3 f0 68 c7 51 |.4..h.Q| +peer1.org1.example.com | [4194 08-31 20:52:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [4195 08-31 20:52:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4196 08-31 20:52:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4197 08-31 20:52:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b : 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us declaration +peer1.org1.example.com | [4198 08-31 20:52:33.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [4199 08-31 20:52:33.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [419a 08-31 20:52:33.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 5 6 1 2] to 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org1.example.com | [419b 08-31 20:52:33.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [419c 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [419d 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [419e 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org1.example.com | [419f 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [41a0 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41a1 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [41a2 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41a3 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [41a4 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41a5 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [41a6 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org1.example.com | [41a7 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org1.example.com | [41a8 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41a9 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41aa 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [41ab 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f72 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3f73 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:11960660938038967932 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +peer0.org1.example.com | [3f74 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [3f75 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3f76 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3f77 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f78 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3f79 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3f7a 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3f7b 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [3f7c 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9370 gate 1598907139766543400 evaluation starts +peer0.org1.example.com | [3f7d 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9370 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f7e 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9370 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3f7f 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [3f80 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9370 principal evaluation fails +peer0.org1.example.com | [3f81 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9370 gate 1598907139766543400 evaluation fails +peer0.org1.example.com | [3f82 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3f83 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3f84 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3f85 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc98e0 gate 1598907139767067600 evaluation starts +peer0.org1.example.com | [3f86 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc98e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f87 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc98e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3f88 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc98e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3f89 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc98e0 principal evaluation fails +peer0.org1.example.com | [3f8a 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc98e0 gate 1598907139767067600 evaluation fails +peer0.org1.example.com | [3f8b 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3f8c 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3f8d 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3f8e 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9e50 gate 1598907139767639800 evaluation starts +peer0.org1.example.com | [3f8f 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9e50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3f90 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9e50 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3f91 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9e50 principal matched by identity 0 +peer0.org1.example.com | [3f92 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7a 19 80 e7 86 74 1f d5 28 86 51 ea 42 0d 54 55 |z....t..(.Q.B.TU| +peer0.org1.example.com | 00000010 0f 88 b0 26 4e 0a 2d 27 0d e5 45 6d f3 06 6e 59 |...&N.-'..Em..nY| +peer0.org1.example.com | [3f93 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 55 04 7c cb 88 14 21 bc 77 6b db |0D. \U.|...!.wk.| +peer0.org1.example.com | 00000010 3f 69 3a a6 b3 ab 69 ce 39 75 f0 16 9a f5 8a 96 |?i:...i.9u......| +peer1.org1.example.com | [41ac 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [41ad 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [41ae 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [41af 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [41b0 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004656270 gate 1598907153901364900 evaluation starts +peer1.org1.example.com | [41b1 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004656270 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [41b2 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004656270 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [41b3 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004656270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [41b4 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004656270 principal evaluation fails +peer1.org1.example.com | [41b5 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004656270 gate 1598907153901364900 evaluation fails +peer1.org1.example.com | [41b6 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [41b7 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [41b8 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [41b9 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046567e0 gate 1598907153902360900 evaluation starts +peer1.org1.example.com | [41ba 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046567e0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [41bb 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046567e0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [41bc 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046567e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [41bd 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046567e0 principal evaluation fails +peer1.org1.example.com | [41be 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046567e0 gate 1598907153902360900 evaluation fails +peer1.org1.example.com | [41bf 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [41c0 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [41c1 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [41c2 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004656d50 gate 1598907153902606000 evaluation starts +peer1.org1.example.com | [41c3 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004656d50 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [41c4 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004656d50 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [41c5 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004656d50 principal matched by identity 0 +peer1.org1.example.com | [41c6 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org1.example.com | [41c7 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org1.example.com | [41c8 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004656d50 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [41c9 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004656d50 gate 1598907153902606000 evaluation succeeds +peer1.org1.example.com | [41ca 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [41cb 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [41cc 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [41cd 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [41ce 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org1.example.com | [41cf 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org1.example.com | [41d0 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41d1 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | 00000020 fb f4 9a 4d 02 20 78 b0 fa 98 76 bd c7 f5 7b 27 |...M. x...v...{'| +peer0.org1.example.com | 00000030 39 07 1a cd 65 4c 4b f3 7c cd 62 6e 00 fd da 6a |9...eLK.|.bn...j| +peer0.org1.example.com | 00000040 bb bd ed 2b 1d 5e |...+.^| +peer0.org1.example.com | [3f94 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9e50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3f95 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9e50 gate 1598907139767639800 evaluation succeeds +peer0.org1.example.com | [3f96 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f97 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3f98 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3f99 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3f9a 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3f9b 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3f9c 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3f9d 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3f9e 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [3f9f 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fa0 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fa1 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fa2 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [3fa3 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fa4 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fa5 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fa6 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 11960660938038967932, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [3fa7 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [3fa8 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 11960660938038967932, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +peer0.org1.example.com | [3fa9 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3faa 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3fab 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fac 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3fad 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [3fae 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [44ef 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44f0 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [44f1 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e4 b0 84 4b 07 df 73 7a 11 0c 44 35 9d 1d 7f |....K..sz..D5...| +peer0.org2.example.com | 00000010 f5 f0 fa 1e d7 a5 c0 10 5a 6a e8 0d 87 44 2e 4e |........Zj...D.N| +peer0.org2.example.com | [44f2 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 33 f0 79 6c 51 c3 d7 39 cb eb |0E.!..3.ylQ..9..| +peer0.org2.example.com | 00000010 c3 16 f3 19 8f 04 6d c3 41 aa ea cf 84 60 d0 c7 |......m.A....`..| +peer0.org2.example.com | 00000020 9f 18 6f 34 a8 02 20 6f 81 d6 42 16 92 06 21 50 |..o4.. o..B...!P| +peer0.org2.example.com | 00000030 32 3a 12 4c b6 fe d5 74 02 3a 69 81 62 43 8e a6 |2:.L...t.:i.bC..| +peer0.org2.example.com | 00000040 7c 6a ba 25 70 78 59 ||j.%pxY| +peer0.org2.example.com | [44f3 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [44f4 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [44f5 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44f6 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [44f7 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 bb 37 cd a7 3d c7 15 e9 10 ed e0 8b 7c cb 8b |..7..=.......|..| +peer0.org2.example.com | 00000010 37 da ab 81 32 e6 31 10 6e 3a f2 65 5d 49 60 6a |7...2.1.n:.e]I`j| +peer0.org2.example.com | [44f8 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb d8 7a 44 f0 ba 1c 97 51 e4 6b |0E.!...zD....Q.k| +peer0.org2.example.com | 00000010 df af be f7 46 7e cd 10 71 ac cf 38 e6 99 9b 95 |....F~..q..8....| +peer0.org2.example.com | 00000020 8f 1a 12 16 6a 02 20 2c 40 29 1b 48 a5 78 d7 11 |....j. ,@).H.x..| +peer0.org2.example.com | 00000030 e1 ab a0 0f 96 3c b1 51 15 13 b7 a7 58 76 e5 73 |.....<.Q....Xv.s| +peer0.org2.example.com | 00000040 65 eb f1 d2 be ca 9d |e......| +peer0.org2.example.com | [44f9 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [44fa 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44fb 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [44fc 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [44fd 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [4582 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4583 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4584 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4585 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4586 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4587 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4588 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb8010 gate 1598907150528306500 evaluation starts +peer1.org2.example.com | [4589 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb8010 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [458a 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb8010 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [458b 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb8010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [458c 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb8010 principal evaluation fails +peer1.org2.example.com | [458d 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb8010 gate 1598907150528306500 evaluation fails +peer1.org2.example.com | [458e 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [458f 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4590 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4591 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb8580 gate 1598907150528796100 evaluation starts +peer1.org2.example.com | [4592 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb8580 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4593 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb8580 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4594 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb8580 principal matched by identity 0 +peer1.org2.example.com | [4595 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 24 c0 e0 c1 94 ff b0 1a 55 7e 49 78 80 c9 02 |.$.......U~Ix...| +peer1.org2.example.com | 00000010 ff ee 36 0a e4 df 30 e7 56 b1 07 41 60 f3 e4 e1 |..6...0.V..A`...| +peer1.org2.example.com | [4596 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 10 1a 4b 31 13 65 02 e6 d8 79 3c |0D. E..K1.e...y<| +peer1.org2.example.com | 00000010 aa dc 82 d1 8a b1 38 c1 6d 5d d1 fb 37 1a 45 c1 |......8.m]..7.E.| +peer1.org2.example.com | 00000020 c0 db d6 f8 02 20 3f b2 f3 a6 be c1 de 78 fc 4d |..... ?......x.M| +peer1.org2.example.com | 00000030 66 1f 72 af b4 33 76 12 2b 46 a1 80 5a 01 ab de |f.r..3v.+F..Z...| +peer1.org2.example.com | 00000040 a9 7f 42 7c 4b 33 |..B|K3| +peer1.org2.example.com | [4597 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb8580 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4598 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eb8580 gate 1598907150528796100 evaluation succeeds +peer1.org2.example.com | [4599 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [459a 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [459b 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [459c 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [459d 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [459e 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [459f 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [45a0 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [45a1 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [45a2 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [45a3 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [45a4 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [45a5 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [45a6 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [45a7 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [45a8 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [45a9 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [44fe 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [44ff 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4501 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4500 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4502 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4503 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4504 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4505 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4506 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4507 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4508 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4da40 gate 1598907145542895500 evaluation starts +peer0.org2.example.com | [4509 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4da40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [450a 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4da40 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [450b 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4da40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [450c 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4da40 principal evaluation fails +peer0.org2.example.com | [450d 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4da40 gate 1598907145542895500 evaluation fails +peer0.org2.example.com | [450e 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [450f 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4510 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4511 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4dfb0 gate 1598907145543247300 evaluation starts +peer0.org2.example.com | [4512 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4dfb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4513 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4dfb0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4514 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4dfb0 principal matched by identity 0 +peer0.org2.example.com | [4515 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd e8 4a fb d3 45 42 77 a9 86 75 78 67 29 80 85 |..J..EBw..uxg)..| +peer0.org2.example.com | 00000010 6f 12 c4 de 2d 89 80 5d 19 bd 52 56 0c b1 71 af |o...-..]..RV..q.| +peer0.org2.example.com | [4516 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 a8 7b 3b 5b fe fd 46 83 d2 17 |0E.!...{;[..F...| +peer0.org2.example.com | 00000010 0a 63 9c 71 0f e1 13 d9 8f f3 25 2e 6a 8e 91 a1 |.c.q......%.j...| +peer0.org2.example.com | 00000020 3e 0b 9c bf af 02 20 31 4f 57 9f 75 28 33 95 b1 |>..... 1OW.u(3..| +peer0.org2.example.com | 00000030 68 0a 14 8a 0a 66 c4 81 04 e2 37 1e d2 19 56 7f |h....f....7...V.| +peer0.org2.example.com | 00000040 bc a6 2e 8e ab e1 0f |.......| +peer0.org2.example.com | [4517 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4dfb0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4518 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f4dfb0 gate 1598907145543247300 evaluation succeeds +peer0.org2.example.com | [4519 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [451a 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [451b 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [451c 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [41d2 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [41d3 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [41d4 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [41d5 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [41d6 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [41d7 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [41d8 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466a640 gate 1598907153903801800 evaluation starts +peer1.org1.example.com | [41d9 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466a640 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [41da 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466a640 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [41db 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466a640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [41dc 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466a640 principal evaluation fails +peer1.org1.example.com | [41dd 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466a640 gate 1598907153903801800 evaluation fails +peer1.org1.example.com | [41de 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [41df 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [41e0 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [41e1 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466abb0 gate 1598907153904038900 evaluation starts +peer1.org1.example.com | [41e2 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466abb0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [41e3 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466abb0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [41e4 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466abb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [41e5 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466abb0 principal evaluation fails +peer1.org1.example.com | [41e6 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466abb0 gate 1598907153904038900 evaluation fails +peer1.org1.example.com | [41e7 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [41e8 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [41e9 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [41ea 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466b120 gate 1598907153908693700 evaluation starts +peer1.org1.example.com | [41eb 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466b120 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [41ec 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466b120 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [41ed 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466b120 principal matched by identity 0 +peer1.org1.example.com | [41ee 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org1.example.com | [41ef 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org1.example.com | [41f0 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466b120 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [41f1 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00466b120 gate 1598907153908693700 evaluation succeeds +peer1.org1.example.com | [41f2 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [41f3 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [41f4 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [41f5 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [41f6 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41f7 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [41f8 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41f9 08-31 20:52:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [41fa 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3faf 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3fb0 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3fb1 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [3fb2 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [3fb3 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [3fb4 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [3fb5 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f5bd10 gate 1598907140053133400 evaluation starts +peer0.org1.example.com | [3fb6 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f5bd10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3fb7 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f5bd10 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3fb8 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f5bd10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [3fb9 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f5bd10 principal evaluation fails +peer0.org1.example.com | [3fba 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f5bd10 gate 1598907140053133400 evaluation fails +peer0.org1.example.com | [3fbb 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3fbc 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [3fbd 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [3fbe 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005008280 gate 1598907140055865800 evaluation starts +peer0.org1.example.com | [3fbf 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005008280 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3fc0 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005008280 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3fc1 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005008280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [3fc2 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005008280 principal evaluation fails +peer0.org1.example.com | [3fc3 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005008280 gate 1598907140055865800 evaluation fails +peer0.org1.example.com | [3fc4 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3fc5 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [3fc6 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [3fc7 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050087f0 gate 1598907140057647600 evaluation starts +peer0.org1.example.com | [3fc8 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050087f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [3fc9 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050087f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [3fca 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050087f0 principal matched by identity 0 +peer0.org1.example.com | [3fcb 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 7e db e0 fd fe 59 06 06 30 99 c9 f0 c9 6c 50 |.~....Y..0....lP| +peer0.org1.example.com | 00000010 c6 b8 e4 71 14 93 14 bc 1a b3 32 d7 88 86 0a f8 |...q......2.....| +peer0.org1.example.com | [3fcc 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 2d 90 ec 15 f1 5e ec 3b 00 16 6b |0D. .-....^.;..k| +peer0.org1.example.com | 00000010 e1 f8 cd 95 a5 c3 25 29 91 08 82 80 4e 70 f2 16 |......%)....Np..| +peer0.org1.example.com | 00000020 ed 75 b6 c9 02 20 45 67 3f b2 7f ea d8 07 8f a7 |.u... Eg?.......| +peer0.org1.example.com | 00000030 2c 32 c8 5f 27 0f 8e a1 57 a9 ad e4 bf eb a8 3c |,2._'...W......<| +peer0.org1.example.com | 00000040 cb ef 0e 22 be 84 |..."..| +peer0.org1.example.com | [3fcd 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050087f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [3fce 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050087f0 gate 1598907140057647600 evaluation succeeds +peer0.org1.example.com | [3fcf 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3fd0 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [3fd1 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [3fd2 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [3fd3 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [451d 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [451e 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [451f 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4520 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4521 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [4522 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4523 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4524 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4525 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [4526 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [4527 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4528 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4529 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e4 b0 84 4b 07 df 73 7a 11 0c 44 35 9d 1d 7f |....K..sz..D5...| +peer0.org2.example.com | 00000010 f5 f0 fa 1e d7 a5 c0 10 5a 6a e8 0d 87 44 2e 4e |........Zj...D.N| +peer0.org2.example.com | [452a 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 33 f0 79 6c 51 c3 d7 39 cb eb |0E.!..3.ylQ..9..| +peer0.org2.example.com | 00000010 c3 16 f3 19 8f 04 6d c3 41 aa ea cf 84 60 d0 c7 |......m.A....`..| +peer0.org2.example.com | 00000020 9f 18 6f 34 a8 02 20 6f 81 d6 42 16 92 06 21 50 |..o4.. o..B...!P| +peer0.org2.example.com | 00000030 32 3a 12 4c b6 fe d5 74 02 3a 69 81 62 43 8e a6 |2:.L...t.:i.bC..| +peer0.org2.example.com | 00000040 7c 6a ba 25 70 78 59 ||j.%pxY| +peer0.org2.example.com | [452b 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [452c 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 14 7f 3b 64 50 f7 2e f7 1c d9 f5 07 |0D. ..;dP.......| +peer0.org2.example.com | 00000010 d0 58 69 39 46 bb 32 1b 7c 11 cf 89 21 0c c7 a5 |.Xi9F.2.|...!...| +peer0.org2.example.com | 00000020 f5 f2 7f 06 02 20 4e db d7 d6 fd a6 78 9e ab be |..... N.....x...| +peer0.org2.example.com | 00000030 ba fc 3f 22 ab 3a 29 f1 97 97 16 1d dd 1c 0d 4d |..?".:)........M| +peer0.org2.example.com | 00000040 61 28 65 4b 30 0c |a(eK0.| +peer0.org2.example.com | [452d 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [452e 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [452f 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4530 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4531 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4532 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4533 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [4534 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4535 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e4 b0 84 4b 07 df 73 7a 11 0c 44 35 9d 1d 7f |....K..sz..D5...| +peer0.org2.example.com | 00000010 f5 f0 fa 1e d7 a5 c0 10 5a 6a e8 0d 87 44 2e 4e |........Zj...D.N| +peer0.org2.example.com | [4536 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 33 f0 79 6c 51 c3 d7 39 cb eb |0E.!..3.ylQ..9..| +peer0.org2.example.com | 00000010 c3 16 f3 19 8f 04 6d c3 41 aa ea cf 84 60 d0 c7 |......m.A....`..| +peer0.org2.example.com | 00000020 9f 18 6f 34 a8 02 20 6f 81 d6 42 16 92 06 21 50 |..o4.. o..B...!P| +peer0.org2.example.com | 00000030 32 3a 12 4c b6 fe d5 74 02 3a 69 81 62 43 8e a6 |2:.L...t.:i.bC..| +peer0.org2.example.com | 00000040 7c 6a ba 25 70 78 59 ||j.%pxY| +peer0.org2.example.com | [4537 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4539 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4538 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [453a 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [41fb 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [41fc 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [41fd 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [41fe 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [41ff 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4200 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4201 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004688570 gate 1598907153910539000 evaluation starts +peer1.org1.example.com | [4202 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004688570 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4203 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004688570 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [4204 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004688570 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4205 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004688570 principal evaluation fails +peer1.org1.example.com | [4206 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004688570 gate 1598907153910539000 evaluation fails +peer1.org1.example.com | [4207 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4208 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4209 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [420a 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004688ae0 gate 1598907153910825200 evaluation starts +peer1.org1.example.com | [420b 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004688ae0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [420c 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004688ae0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [420d 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004688ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [420e 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004688ae0 principal evaluation fails +peer1.org1.example.com | [420f 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004688ae0 gate 1598907153910825200 evaluation fails +peer1.org1.example.com | [4210 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4211 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4212 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4213 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004689050 gate 1598907153911067200 evaluation starts +peer1.org1.example.com | [4214 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004689050 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4215 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004689050 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [4216 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004689050 principal matched by identity 0 +peer1.org1.example.com | [4217 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org1.example.com | [4218 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org1.example.com | [4219 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004689050 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [421a 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004689050 gate 1598907153911067200 evaluation succeeds +peer1.org1.example.com | [421b 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [421c 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [421d 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [421e 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [421f 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org1.example.com | [4220 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org1.example.com | [4221 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org1.example.com | [3fd4 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [3fd5 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [3fd6 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [3fd7 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [3fd8 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fd9 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fda 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [3fdb 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fdc 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fdd 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fde 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fdf 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fe0 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fe1 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fe2 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3fe3 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3fe5 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [3fe6 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3fe7 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [3fe4 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [3fe8 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [3fe9 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [3fea 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +peer0.org1.example.com | [3feb 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [3fec 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }] +peer0.org1.example.com | [3fed 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [3fee 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00506dd70, CONNECTING +peer0.org1.example.com | [3fef 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +peer0.org1.example.com | [3ff0 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +peer0.org1.example.com | [3ff1 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +peer0.org1.example.com | [3ff2 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc005074dd0, CONNECTING +peer0.org1.example.com | [3ff3 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:52:22.07Z grpc.peer_address=172.18.0.5:39636 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=96.1µs +peer0.org1.example.com | [3ff4 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [3ff5 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [3ff6 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [3ff7 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:39636 +peer0.org1.example.com | [3ff8 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.5:39636 +peer0.org1.example.com | [3ff9 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ffa 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ffb 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [3ffc 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3ffd 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45aa 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [45ab 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [45ac 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [45ad 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [45ae 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45af 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45b0 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45b1 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45b2 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45b3 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45b4 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [45b5 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45b6 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45b7 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer1.org2.example.com | [45b8 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [45b9 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [45ba 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [45bb 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [45bc 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:49350 +peer1.org2.example.com | [45bd 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003e96d20 +peer1.org2.example.com | [45be 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer1.org2.example.com | [45bf 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer1.org2.example.com | [45c0 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer1.org2.example.com | [45c1 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer1.org2.example.com | [45c2 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 47 60 ca 35 20 d8 2a 05 64 29 44 85 99 3f 9a |.G`.5 .*.d)D..?.| +peer1.org2.example.com | 00000010 4d 15 35 dd b9 26 5f cd ab 22 82 9f 57 e5 76 81 |M.5..&_.."..W.v.| +peer1.org2.example.com | [45c3 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 06 90 76 5e 53 d2 b4 81 1c ed f0 |0D. ..v^S......| +peer1.org2.example.com | 00000010 7c 41 23 72 fd 1f 65 d4 1b f9 3f 47 a5 09 43 6a ||A#r..e...?G..Cj| +peer1.org2.example.com | 00000020 0a e1 99 06 02 20 54 93 f0 0a f8 f5 b4 a9 2a df |..... T.......*.| +peer1.org2.example.com | 00000030 e5 ed 09 37 2b e9 cc 6e 02 09 97 d1 64 dd 75 24 |...7+..n....d.u$| +peer1.org2.example.com | 00000040 be 63 d9 7b 91 9d |.c.{..| +peer1.org2.example.com | [45c4 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer1.org2.example.com | [45c5 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003e568c0, header 0xc003e97130 +peer1.org2.example.com | [45c6 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer1.org2.example.com | [45c7 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU [][9933690a] processing txid: 9933690ab4f7b65f0de497682d00a59878891845441ff34aaf26307ae7a29db6 +peer1.org2.example.com | [45c8 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU [][9933690a] Entry chaincode: name:"qscc" +peer1.org2.example.com | [45c9 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> INFO [][9933690a] Entry chaincode: name:"qscc" +peer1.org2.example.com | [45ca 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer1.org2.example.com | [45cb 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer1.org2.example.com | [45cc 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer1.org2.example.com | [45cd 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer1.org2.example.com | [45ce 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [45cf 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [45d0 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [45d1 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [45d2 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer1.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer1.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer1.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer1.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer1.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer1.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer1.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer1.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer1.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer1.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer1.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer1.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer1.org2.example.com | -----END CERTIFICATE----- +peer1.org2.example.com | [45d3 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f00c30 gate 1598907151393044400 evaluation starts +peer1.org2.example.com | [45d4 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f00c30 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [45d5 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f00c30 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [45d6 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f00c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org2.example.com | [45d7 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f00c30 principal evaluation fails +peer1.org2.example.com | [45d8 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f00c30 gate 1598907151393044400 evaluation fails +peer1.org2.example.com | [45d9 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [45da 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [45db 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org1.example.com | [4222 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org1.example.com | [4223 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4224 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4225 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4226 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4227 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4228 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4229 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [422a 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [422b 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a5030 gate 1598907153916927900 evaluation starts +peer1.org1.example.com | [422c 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a5030 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [422d 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a5030 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [422e 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a5030 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [422f 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a5030 principal evaluation fails +peer1.org1.example.com | [4230 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a5030 gate 1598907153916927900 evaluation fails +peer1.org1.example.com | [4231 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4232 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4233 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4234 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a55a0 gate 1598907153918417200 evaluation starts +peer1.org1.example.com | [4235 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a55a0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4236 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a55a0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [4237 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a55a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4238 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a55a0 principal evaluation fails +peer1.org1.example.com | [4239 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a55a0 gate 1598907153918417200 evaluation fails +peer1.org1.example.com | [423a 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [423b 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [423c 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [423d 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a5b10 gate 1598907153919741500 evaluation starts +peer1.org1.example.com | [423e 08-31 20:52:33.91 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a5b10 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [423f 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a5b10 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [4240 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a5b10 principal matched by identity 0 +peer1.org1.example.com | [4241 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org1.example.com | [4242 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org1.example.com | [3ffe 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [3fff 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4000 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4001 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4002 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4003 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4004 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a0ca0 gate 1598907140091174800 evaluation starts +peer0.org1.example.com | [4005 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a0ca0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4006 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a0ca0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4007 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a0ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4008 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a0ca0 principal evaluation fails +peer0.org1.example.com | [4009 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a0ca0 gate 1598907140091174800 evaluation fails +peer0.org1.example.com | [400a 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [400b 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc005074dd0, READY +peer0.org1.example.com | [400c 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00506dd70, READY +peer0.org1.example.com | [400d 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4010 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4012 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a1210 gate 1598907140104906700 evaluation starts +peer0.org1.example.com | [4011 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [400e 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [400f 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4013 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a1210 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4016 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a1210 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4017 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a1210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4014 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [4015 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +peer0.org1.example.com | [4018 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a1210 principal evaluation fails +peer0.org1.example.com | [401a 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a1210 gate 1598907140104906700 evaluation fails +peer0.org1.example.com | [401b 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [401c 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [401d 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [401e 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b7fe0 gate 1598907140111543400 evaluation starts +peer0.org1.example.com | [401f 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b7fe0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4021 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b7fe0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4019 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [4023 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.5:7051 +peer0.org1.example.com | [4020 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +peer0.org1.example.com | [4025 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:7051 +peer0.org1.example.com | [4026 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:7051 +peer0.org1.example.com | [4027 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +peer0.org1.example.com | 00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +peer0.org1.example.com | [4028 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 25 41 34 d2 75 02 02 4a 84 0e |0E.!..%A4.u..J..| +peer0.org1.example.com | 00000010 19 45 9f 76 f9 62 f2 5b 35 33 dc 51 96 44 18 71 |.E.v.b.[53.Q.D.q| +peer0.org1.example.com | 00000020 05 af 1f 32 89 02 20 31 dc d9 e1 01 2c d5 6e c3 |...2.. 1....,.n.| +peer0.org1.example.com | 00000030 e3 e3 6a 27 58 cc 03 0e f6 8a 94 88 81 77 44 a8 |..j'X........wD.| +peer0.org1.example.com | 00000040 7b c8 0a 73 44 60 a2 |{..sD`.| +peer0.org1.example.com | [4029 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051 +peer0.org1.example.com | [402a 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [402b 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [4022 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b7fe0 principal matched by identity 0 +peer0.org1.example.com | [4024 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.5:7051 +peer0.org1.example.com | [402c 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [402d 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org1.example.com | [402f 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2d 26 b0 0f 5d 6d 61 b7 31 d2 c7 82 |0D. -&..]ma.1...| +peer0.org1.example.com | 00000010 23 67 f1 39 62 ab 08 22 67 33 d7 27 1c 85 93 d3 |#g.9b.."g3.'....| +peer0.org1.example.com | 00000020 ab 8b 72 e9 02 20 65 d5 14 fa 93 52 40 6d b2 d2 |..r.. e....R@m..| +peer0.org1.example.com | 00000030 f3 a0 1f 6c 6c 0c 07 99 2d 07 b0 b2 01 92 60 d7 |...ll...-.....`.| +peer0.org1.example.com | 00000040 64 da 06 52 4f b3 |d..RO.| +peer0.org1.example.com | [4030 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b7fe0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [402e 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4031 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b7fe0 gate 1598907140111543400 evaluation succeeds +peer0.org1.example.com | [4033 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4034 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4035 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4036 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4037 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:39636 +peer0.org1.example.com | [4038 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:39636 +peer0.org1.example.com | [4032 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4039 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [403a 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [403b 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [403c 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [403d 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [403e 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [403f 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [45dc 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f01a80 gate 1598907151393369400 evaluation starts +peer1.org2.example.com | [45dd 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f01a80 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [45de 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f01a80 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [45df 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f01a80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org2.example.com | [45e0 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f01a80 principal evaluation fails +peer1.org2.example.com | [45e1 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f01a80 gate 1598907151393369400 evaluation fails +peer1.org2.example.com | [45e2 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [45e3 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [45e4 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org2.example.com | [45e5 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f28010 gate 1598907151393639900 evaluation starts +peer1.org2.example.com | [45e6 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f28010 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [45e7 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f28010 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [45e8 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer1.org2.example.com | [45e9 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer1.org2.example.com | [45ea 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer1.org2.example.com | [45eb 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f28010 principal matched by identity 0 +peer1.org2.example.com | [45ec 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 47 60 ca 35 20 d8 2a 05 64 29 44 85 99 3f 9a |.G`.5 .*.d)D..?.| +peer1.org2.example.com | 00000010 4d 15 35 dd b9 26 5f cd ab 22 82 9f 57 e5 76 81 |M.5..&_.."..W.v.| +peer1.org2.example.com | [45ed 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 06 90 76 5e 53 d2 b4 81 1c ed f0 |0D. ..v^S......| +peer1.org2.example.com | 00000010 7c 41 23 72 fd 1f 65 d4 1b f9 3f 47 a5 09 43 6a ||A#r..e...?G..Cj| +peer1.org2.example.com | 00000020 0a e1 99 06 02 20 54 93 f0 0a f8 f5 b4 a9 2a df |..... T.......*.| +peer1.org2.example.com | 00000030 e5 ed 09 37 2b e9 cc 6e 02 09 97 d1 64 dd 75 24 |...7+..n....d.u$| +peer1.org2.example.com | 00000040 be 63 d9 7b 91 9d |.c.{..| +peer1.org2.example.com | [45ee 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f28010 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [45ef 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f28010 gate 1598907151393639900 evaluation succeeds +peer1.org2.example.com | [45f0 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [45f1 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org2.example.com | [45f2 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [45f3 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [45f4 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU [9933690a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer1.org2.example.com | [45f5 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU [9933690a] notifying Txid:9933690ab4f7b65f0de497682d00a59878891845441ff34aaf26307ae7a29db6, channelID: +peer1.org2.example.com | [45f6 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer1.org2.example.com | [45f7 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> INFO [][9933690a] Exit chaincode: name:"qscc" (2ms) +peer1.org2.example.com | [45f8 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU [][9933690a] Exit +peer1.org2.example.com | [45f9 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:49350 +peer1.org2.example.com | [45fa 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:49350 grpc.code=OK grpc.call_duration=3.3405ms +peer1.org2.example.com | [45fb 08-31 20:52:31.39 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer1.org2.example.com | [45fc 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer1.org2.example.com | [45fd 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [45fe 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [45ff 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4600 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer1.org2.example.com | [4601 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4602 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [453c 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [453d 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [453b 08-31 20:52:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [453e 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [453f 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4540 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4541 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4542 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4543 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4544 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f89400 gate 1598907145562603300 evaluation starts +peer0.org2.example.com | [4545 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f89400 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4546 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f89400 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4547 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f89400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4548 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f89400 principal evaluation fails +peer0.org2.example.com | [4549 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f89400 gate 1598907145562603300 evaluation fails +peer0.org2.example.com | [454a 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [454b 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [454c 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [454d 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f89970 gate 1598907145564806100 evaluation starts +peer0.org2.example.com | [454e 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f89970 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [454f 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f89970 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4550 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f89970 principal matched by identity 0 +peer0.org2.example.com | [4551 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 9a f5 53 9e f9 83 db 2f 34 ad d5 1c 20 26 85 |...S..../4... &.| +peer0.org2.example.com | 00000010 58 ee 5c ab 5d 7e 9c e3 6f f9 49 1b 23 bc 85 2c |X.\.]~..o.I.#..,| +peer0.org2.example.com | [4552 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 8f b8 0c ad a4 ff 4d 70 69 23 a7 |0D. w......Mpi#.| +peer0.org2.example.com | 00000010 b4 26 e3 1b 93 c8 16 6b 88 53 10 5b 0d 2f 05 ba |.&.....k.S.[./..| +peer0.org2.example.com | 00000020 a0 7b b5 64 02 20 44 8c a3 73 eb ae ed 12 e7 ac |.{.d. D..s......| +peer0.org2.example.com | 00000030 94 05 8e 24 5e b6 4b 48 75 3b 40 52 cc 85 23 5c |...$^.KHu;@R..#\| +peer0.org2.example.com | 00000040 f8 d3 83 df 4e ae |....N.| +peer0.org2.example.com | [4553 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f89970 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4554 08-31 20:52:25.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f89970 gate 1598907145564806100 evaluation succeeds +peer0.org2.example.com | [4555 08-31 20:52:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4556 08-31 20:52:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4557 08-31 20:52:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4558 08-31 20:52:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4559 08-31 20:52:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer1.org2.example.com | [4603 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4604 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4605 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4606 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4607 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4608 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [4609 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [460a 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [460b 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [460c 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer1.org2.example.com | [460d 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [460e 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [460f 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [4610 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [4611 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4612 08-31 20:52:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4613 08-31 20:52:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572312E6F72...7482120C08B0C6BFF7C6AF9D98161044 +peer1.org2.example.com | [4614 08-31 20:52:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 763D5134F197743415C74CFC7E6C2AA0B23B9A0A789F8FE4C9EC7680D4B7BB58 +peer1.org2.example.com | [4615 08-31 20:52:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [4616 08-31 20:52:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572312E6F7267322E6578616D706C652E636F6D3A37303531 +peer1.org2.example.com | [4617 08-31 20:52:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 84DCB4760C577E9B4E2A280CB22EA6979C16748D7FD46DCFD4002D8650CAD285 +peer1.org2.example.com | [4618 08-31 20:52:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\016\30674\267\306\376s\262\365q\245SW\305\006\261\235g|\002 +\032\306\t\225ch\323\\\2469\303n&\205\262\324\272\337\262\247/\324\023\203d\036\352\330\263#<" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4619 08-31 20:52:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [461a 08-31 20:52:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [461b 08-31 20:52:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\016\30674\267\306\376s\262\365q\245SW\305\006\261\235g|\002 +\032\306\t\225ch\323\\\2469\303n&\205\262\324\272\337\262\247/\324\023\203d\036\352\330\263#<" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [461c 08-31 20:52:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [461d 08-31 20:52:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [461e 08-31 20:52:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [461f 08-31 20:52:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4620 08-31 20:52:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4621 08-31 20:52:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4622 08-31 20:52:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4623 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [4624 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4625 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer1.org2.example.com | [4626 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4627 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 3d 51 34 f1 97 74 34 15 c7 4c fc 7e 6c 2a a0 |v=Q4..t4..L.~l*.| +peer1.org2.example.com | 00000010 b2 3b 9a 0a 78 9f 8f e4 c9 ec 76 80 d4 b7 bb 58 |.;..x.....v....X| +peer1.org2.example.com | [4628 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 10 04 a6 70 23 1c b6 86 2b ff |0E.!.....p#...+.| +peer1.org2.example.com | 00000010 b8 0b 1b ac 7a ac 2a 42 95 43 98 b7 8b a3 61 c5 |....z.*B.C....a.| +peer1.org2.example.com | 00000020 3a 28 95 71 35 02 20 67 04 bc 00 5b f0 ae 51 73 |:(.q5. g...[..Qs| +peer1.org2.example.com | 00000030 43 b6 79 40 3f be 83 f7 1b 13 5a 8d 6f 94 51 86 |C.y@?.....Z.o.Q.| +peer1.org2.example.com | 00000040 87 86 e0 99 79 9f fe |....y..| +peer1.org2.example.com | [4629 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer1.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer1.org2.example.com | [462a 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 36 d6 12 0f 0f 1b 40 10 eb 24 3e |0D. .6.....@..$>| +peer1.org2.example.com | 00000010 0e c6 37 34 b7 c6 fe 73 b2 f5 71 a5 53 57 c5 06 |..74...s..q.SW..| +peer1.org2.example.com | 00000020 b1 9d 67 7c 02 20 2b 1a c6 09 95 63 68 d3 5c a6 |..g|. +....ch.\.| +peer1.org2.example.com | 00000030 39 c3 6e 26 85 b2 d4 ba df b2 a7 2f d4 13 83 64 |9.n&......./...d| +peer1.org2.example.com | 00000040 1e ea d8 b3 23 3c |....#<| +peer1.org2.example.com | [462b 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [462c 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [462d 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [462e 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [462f 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [4630 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4631 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [4632 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [4633 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 3d 51 34 f1 97 74 34 15 c7 4c fc 7e 6c 2a a0 |v=Q4..t4..L.~l*.| +peer0.org1.example.com | [4040 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4041 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4042 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051535f0 gate 1598907140123641700 evaluation starts +peer0.org1.example.com | [4043 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051535f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4044 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051535f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4045 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051535f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4046 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051535f0 principal evaluation fails +peer0.org1.example.com | [4047 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051535f0 gate 1598907140123641700 evaluation fails +peer0.org1.example.com | [4048 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4049 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [404a 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [404b 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005153b60 gate 1598907140123986400 evaluation starts +peer0.org1.example.com | [404c 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005153b60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [404d 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [404e 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +peer1.org1.example.com | [4243 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a5b10 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4244 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046a5b10 gate 1598907153919741500 evaluation succeeds +peer1.org1.example.com | [4245 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4246 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4247 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4248 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4249 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [424a 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org1.example.com | [424b 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [424c 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [424d 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [424e 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [424f 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4250 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [4251 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [4252 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [4253 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [4254 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046baf60 gate 1598907153922715000 evaluation starts +peer1.org1.example.com | [4255 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046baf60 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4256 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046baf60 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [4257 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046baf60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4258 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046baf60 principal evaluation fails +peer1.org1.example.com | [4259 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046baf60 gate 1598907153922715000 evaluation fails +peer1.org1.example.com | [425a 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [425b 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [425c 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [425d 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bb4d0 gate 1598907153923567400 evaluation starts +peer1.org1.example.com | [425e 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bb4d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [425f 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bb4d0 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [4260 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bb4d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [4261 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bb4d0 principal evaluation fails +peer1.org1.example.com | [4262 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bb4d0 gate 1598907153923567400 evaluation fails +peer1.org1.example.com | [4263 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4264 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [4265 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4266 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bba40 gate 1598907153924938500 evaluation starts +peer1.org1.example.com | [4267 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bba40 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4268 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bba40 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [4269 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bba40 principal matched by identity 0 +peer0.org2.example.com | [455a 08-31 20:52:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" lastAliveTS: 1598907045534780300, 59 but got ts: inc_num:1598907045534780300 seq_num:58 +peer0.org2.example.com | [455b 08-31 20:52:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [455c 08-31 20:52:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [455d 08-31 20:52:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 bb 37 cd a7 3d c7 15 e9 10 ed e0 8b 7c cb 8b |..7..=.......|..| +peer0.org2.example.com | 00000010 37 da ab 81 32 e6 31 10 6e 3a f2 65 5d 49 60 6a |7...2.1.n:.e]I`j| +peer0.org2.example.com | [455e 08-31 20:52:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb d8 7a 44 f0 ba 1c 97 51 e4 6b |0E.!...zD....Q.k| +peer0.org2.example.com | 00000010 df af be f7 46 7e cd 10 71 ac cf 38 e6 99 9b 95 |....F~..q..8....| +peer0.org2.example.com | 00000020 8f 1a 12 16 6a 02 20 2c 40 29 1b 48 a5 78 d7 11 |....j. ,@).H.x..| +peer0.org2.example.com | 00000030 e1 ab a0 0f 96 3c b1 51 15 13 b7 a7 58 76 e5 73 |.....<.Q....Xv.s| +peer0.org2.example.com | 00000040 65 eb f1 d2 be ca 9d |e......| +peer0.org2.example.com | [455f 08-31 20:52:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4560 08-31 20:52:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4561 08-31 20:52:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4562 08-31 20:52:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4563 08-31 20:52:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4564 08-31 20:52:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4565 08-31 20:52:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4566 08-31 20:52:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4567 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4568 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4569 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [456a 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [456b 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [456c 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [456d 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [456e 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [456f 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [4570 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4571 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [426a 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org1.example.com | [426b 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org1.example.com | [426c 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bba40 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [426d 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046bba40 gate 1598907153924938500 evaluation succeeds +peer1.org1.example.com | [426e 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [426f 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4270 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [4271 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [4272 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org1.example.com | [4273 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org1.example.com | [4274 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org1.example.com | [4275 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org1.example.com | [4276 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4277 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [4278 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org1.example.com | [4279 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org1.example.com | [427a 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org1.example.com | [427b 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org1.example.com | [427c 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org1.example.com | [427d 08-31 20:52:33.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org1.example.com | [427e 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9a20 gate 1598907153930180100 evaluation starts +peer1.org1.example.com | [427f 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9a20 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4280 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9a20 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [4281 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9a20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer1.org1.example.com | [4282 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9a20 principal evaluation fails +peer1.org1.example.com | [4283 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9a20 gate 1598907153930180100 evaluation fails +peer1.org1.example.com | [4284 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4285 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org1.example.com | [4286 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org1.example.com | [4287 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9f90 gate 1598907153930833500 evaluation starts +peer1.org1.example.com | [4288 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9f90 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4289 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9f90 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [428a 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9f90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer1.org1.example.com | [428b 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9f90 principal evaluation fails +peer1.org1.example.com | [428c 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046d9f90 gate 1598907153930833500 evaluation fails +peer1.org2.example.com | 00000010 b2 3b 9a 0a 78 9f 8f e4 c9 ec 76 80 d4 b7 bb 58 |.;..x.....v....X| +peer1.org2.example.com | [4634 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 10 04 a6 70 23 1c b6 86 2b ff |0E.!.....p#...+.| +peer0.org1.example.com | [404f 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:39636 disconnected +peer0.org1.example.com | [4050 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:39636 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=48.5111ms +peer0.org1.example.com | [4051 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +peer0.org1.example.com | [4052 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005153b60 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4053 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005153b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4054 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005153b60 principal evaluation fails +peer0.org1.example.com | [4055 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005153b60 gate 1598907140123986400 evaluation fails +peer0.org1.example.com | [4056 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4057 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4058 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4059 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516c0d0 gate 1598907140125618600 evaluation starts +peer0.org1.example.com | [405a 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516c0d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [405b 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516c0d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [405c 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516c0d0 principal matched by identity 0 +peer0.org1.example.com | [405d 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +peer0.org1.example.com | 00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +peer0.org1.example.com | [405e 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b f1 d6 ba 84 32 1a e7 54 e7 7f 3e |0D. k....2..T..>| +peer0.org1.example.com | 00000010 b5 ed a0 95 08 80 86 6b a1 0c a6 26 59 1d b3 6d |.......k...&Y..m| +peer0.org1.example.com | 00000020 61 bf 60 5a 02 20 21 bb 4b e1 fc bf 94 ab 63 89 |a.`Z. !.K.....c.| +peer0.org1.example.com | 00000030 a4 a7 8b 73 82 d1 98 00 08 16 e2 b9 12 3a f1 5f |...s.........:._| +peer0.org1.example.com | 00000040 bf 25 f4 9b 93 ad |.%....| +peer0.org1.example.com | [405f 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516c0d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4060 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516c0d0 gate 1598907140125618600 evaluation succeeds +peer0.org1.example.com | [4061 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4062 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4063 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4064 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4065 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +peer0.org1.example.com | [4066 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4067 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [4068 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4069 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [406a 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [406b 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [406c 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [406d 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [406e 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 88 07 69 c0 7a 0c e9 f6 08 f3 fb d5 cd ec d0 |...i.z..........| +peer0.org1.example.com | 00000010 da 72 5d 57 34 fb f5 59 c7 a2 c6 3a 85 21 48 f8 |.r]W4..Y...:.!H.| +peer0.org1.example.com | [406f 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f 6b 9a f7 47 1f 55 9f c4 aa 13 da |0D. _k..G.U.....| +peer0.org1.example.com | 00000010 ed eb e1 72 c1 03 65 c9 8f 4c bb 80 5b 51 58 56 |...r..e..L..[QXV| +peer0.org1.example.com | 00000020 c4 3c 97 6b 02 20 08 d0 37 a1 ec e7 29 f6 6a 8e |.<.k. ..7...).j.| +peer0.org1.example.com | 00000030 8d 2e 4a eb a0 a0 c2 1b bb 09 5d 34 11 8a a3 10 |..J.......]4....| +peer0.org1.example.com | 00000040 98 22 7c 8a 63 b7 |."|.c.| +peer0.org1.example.com | [4070 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4071 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [4072 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4073 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4572 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4573 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4574 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4575 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4576 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4577 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1750 gate 1598907145588318500 evaluation starts +peer0.org2.example.com | [4578 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1750 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4579 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1750 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [457a 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1750 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [457b 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1750 principal evaluation fails +peer0.org2.example.com | [457c 08-31 20:52:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1750 gate 1598907145588318500 evaluation fails +peer0.org2.example.com | [457d 08-31 20:52:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [457e 08-31 20:52:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [457f 08-31 20:52:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4580 08-31 20:52:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1cc0 gate 1598907145595580800 evaluation starts +peer0.org2.example.com | [4581 08-31 20:52:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1cc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4582 08-31 20:52:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1cc0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4583 08-31 20:52:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1cc0 principal matched by identity 0 +peer0.org2.example.com | [4584 08-31 20:52:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd e8 4a fb d3 45 42 77 a9 86 75 78 67 29 80 85 |..J..EBw..uxg)..| +peer0.org2.example.com | 00000010 6f 12 c4 de 2d 89 80 5d 19 bd 52 56 0c b1 71 af |o...-..]..RV..q.| +peer0.org2.example.com | [4585 08-31 20:52:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 a8 7b 3b 5b fe fd 46 83 d2 17 |0E.!...{;[..F...| +peer0.org2.example.com | 00000010 0a 63 9c 71 0f e1 13 d9 8f f3 25 2e 6a 8e 91 a1 |.c.q......%.j...| +peer0.org2.example.com | 00000020 3e 0b 9c bf af 02 20 31 4f 57 9f 75 28 33 95 b1 |>..... 1OW.u(3..| +peer0.org2.example.com | 00000030 68 0a 14 8a 0a 66 c4 81 04 e2 37 1e d2 19 56 7f |h....f....7...V.| +peer0.org2.example.com | 00000040 bc a6 2e 8e ab e1 0f |.......| +peer0.org2.example.com | [4586 08-31 20:52:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1cc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4587 08-31 20:52:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1cc0 gate 1598907145595580800 evaluation succeeds +peer0.org2.example.com | [4588 08-31 20:52:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4589 08-31 20:52:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [458a 08-31 20:52:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [458b 08-31 20:52:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [458c 08-31 20:52:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [458d 08-31 20:52:25.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [458e 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [458f 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4591 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4590 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4592 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4593 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4594 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4595 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4596 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4597 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4598 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4599 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [459a 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [459b 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [459c 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [459d 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [459e 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [459f 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [45a0 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [45a1 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [45a2 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [45a3 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [45a4 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [45a5 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [45a6 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [45a7 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [45a8 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [45a9 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45aa 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [45ab 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [45ac 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [45ad 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [45ae 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [45af 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [45b0 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff6060 gate 1598907145628005100 evaluation starts +peer0.org2.example.com | [45b1 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff6060 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [45b2 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff6060 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [45b3 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff6060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [45b4 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff6060 principal evaluation fails +peer0.org2.example.com | [45b5 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff6060 gate 1598907145628005100 evaluation fails +peer0.org2.example.com | [45b6 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [45b7 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [45b8 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [45b9 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff65d0 gate 1598907145628899500 evaluation starts +peer0.org2.example.com | [45ba 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff65d0 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [428d 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [428e 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org1.example.com | [428f 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer1.org1.example.com | [4290 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fc500 gate 1598907153931709200 evaluation starts +peer1.org1.example.com | [4291 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fc500 signed by 0 principal evaluation starts (used [false]) +peer1.org1.example.com | [4292 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fc500 processing identity 0 with bytes of 115a4b0 +peer1.org1.example.com | [4293 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fc500 principal matched by identity 0 +peer1.org1.example.com | [4294 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org1.example.com | [4295 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org1.example.com | [4296 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fc500 principal evaluation succeeds for identity 0 +peer1.org1.example.com | [4297 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fc500 gate 1598907153931709200 evaluation succeeds +peer1.org1.example.com | [4298 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [4299 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer1.org1.example.com | [429a 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org1.example.com | [429b 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org1.example.com | [429c 08-31 20:52:33.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [429d 08-31 20:52:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [429e 08-31 20:52:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [429f 08-31 20:52:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org1.example.com:7051 +peer1.org1.example.com | [42a0 08-31 20:52:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [42a1 08-31 20:52:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [42a2 08-31 20:52:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer1.org1.example.com | [42a3 08-31 20:52:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer1.org1.example.com | [42a4 08-31 20:52:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42a5 08-31 20:52:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:56540 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [42a6 08-31 20:52:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer1.org1.example.com | [42a7 08-31 20:52:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42a8 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:48518 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [42a9 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [42aa 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [42ab 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [42ac 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org1.example.com | [42ad 08-31 20:52:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:41200 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org1.example.com | [42ae 08-31 20:52:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [42af 08-31 20:52:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [42b0 08-31 20:52:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org1.example.com | [42b1 08-31 20:52:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [45bb 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff65d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [45bc 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff65d0 principal matched by identity 0 +peer0.org2.example.com | [45bd 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 6f bc e6 0e 08 91 b2 0a 67 44 c2 14 2e dc 99 |.o.......gD.....| +peer0.org2.example.com | 00000010 d6 c7 15 c7 53 70 16 ae 4b 70 12 96 0c f6 e9 86 |....Sp..Kp......| +peer0.org2.example.com | [45be 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 fc 7d 0e ee ef b1 04 45 2d 8e |0E.!...}.....E-.| +peer0.org2.example.com | 00000010 b5 09 4e 13 39 28 76 7e 53 53 d0 bd 17 48 eb 7d |..N.9(v~SS...H.}| +peer0.org2.example.com | 00000020 2a 28 83 40 6c 02 20 55 00 c7 99 e9 e2 6c 60 8d |*(.@l. U.....l`.| +peer0.org2.example.com | 00000030 3a 32 f6 d1 cb 98 7b d9 21 47 a3 3c 8c 63 f4 9d |:2....{.!G.<.c..| +peer0.org2.example.com | 00000040 04 f5 d4 cc 5e b2 19 |....^..| +peer0.org2.example.com | [45bf 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff65d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [45c0 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff65d0 gate 1598907145628899500 evaluation succeeds +peer0.org2.example.com | [45c1 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [45c2 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [45c3 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [45c4 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [45c5 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [45c6 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [45c7 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [45c8 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [45c9 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [45ca 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [45cb 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [45cc 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [45cd 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [45ce 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45cf 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45d0 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45d1 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [45d2 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [45d3 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [45d4 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [45d5 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [45d6 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [45d7 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45d8 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45d9 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45da 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | 00000010 b8 0b 1b ac 7a ac 2a 42 95 43 98 b7 8b a3 61 c5 |....z.*B.C....a.| +peer1.org2.example.com | 00000020 3a 28 95 71 35 02 20 67 04 bc 00 5b f0 ae 51 73 |:(.q5. g...[..Qs| +peer1.org2.example.com | 00000030 43 b6 79 40 3f be 83 f7 1b 13 5a 8d 6f 94 51 86 |C.y@?.....Z.o.Q.| +peer1.org2.example.com | 00000040 87 86 e0 99 79 9f fe |....y..| +peer1.org2.example.com | [4635 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4636 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4637 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4638 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4639 08-31 20:52:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [463a 08-31 20:52:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [463b 08-31 20:52:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [463c 08-31 20:52:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [463d 08-31 20:52:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer1.org2.example.com | [463e 08-31 20:52:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 3d 51 34 f1 97 74 34 15 c7 4c fc 7e 6c 2a a0 |v=Q4..t4..L.~l*.| +peer1.org2.example.com | 00000010 b2 3b 9a 0a 78 9f 8f e4 c9 ec 76 80 d4 b7 bb 58 |.;..x.....v....X| +peer1.org2.example.com | [463f 08-31 20:52:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 10 04 a6 70 23 1c b6 86 2b ff |0E.!.....p#...+.| +peer1.org2.example.com | 00000010 b8 0b 1b ac 7a ac 2a 42 95 43 98 b7 8b a3 61 c5 |....z.*B.C....a.| +peer1.org2.example.com | 00000020 3a 28 95 71 35 02 20 67 04 bc 00 5b f0 ae 51 73 |:(.q5. g...[..Qs| +peer1.org2.example.com | 00000030 43 b6 79 40 3f be 83 f7 1b 13 5a 8d 6f 94 51 86 |C.y@?.....Z.o.Q.| +peer1.org2.example.com | 00000040 87 86 e0 99 79 9f fe |....y..| +peer1.org2.example.com | [4640 08-31 20:52:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4641 08-31 20:52:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer1.org2.example.com | [4642 08-31 20:52:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4643 08-31 20:52:33.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4644 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4645 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4646 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4647 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4648 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4649 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [464a 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [464b 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [464c 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [464d 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer1.org2.example.com | [464e 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [464f 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4650 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4651 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4652 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer1.org2.example.com | [4653 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer1.org2.example.com | [4654 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4655 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4656 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4657 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4658 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4659 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [465a 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [465b 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f88590 gate 1598907153311929400 evaluation starts +peer1.org2.example.com | [465c 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f88590 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [465d 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f88590 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [465e 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f88590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [465f 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f88590 principal evaluation fails +peer1.org2.example.com | [4660 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f88590 gate 1598907153311929400 evaluation fails +peer1.org2.example.com | [4661 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4662 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4663 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4664 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f88b00 gate 1598907153312278800 evaluation starts +peer1.org2.example.com | [4665 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f88b00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4666 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f88b00 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4667 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f88b00 principal matched by identity 0 +peer1.org2.example.com | [4668 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba dc 22 10 42 58 d5 cc db bd 89 d2 6a 48 76 6a |..".BX......jHvj| +peer1.org2.example.com | 00000010 46 d8 12 dd 64 60 f0 ea 98 0f a1 9d 5a c7 e9 b9 |F...d`......Z...| +peer1.org2.example.com | [4669 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 2c ea 98 60 5b 8e 3d 4e 82 97 |0E.!..,..`[.=N..| +peer1.org2.example.com | 00000010 ab 55 59 95 9f 4b aa ab 4d c3 36 4a 89 d5 10 b8 |.UY..K..M.6J....| +peer1.org2.example.com | 00000020 5a 08 aa b3 59 02 20 5e 7b 39 87 3f 2a 0a 55 ef |Z...Y. ^{9.?*.U.| +peer1.org2.example.com | 00000030 74 f1 98 55 c8 02 84 85 ba 07 e4 e8 c3 14 82 a3 |t..U............| +peer1.org2.example.com | 00000040 e9 68 33 cb 87 fd 42 |.h3...B| +peer1.org2.example.com | [466a 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f88b00 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [466b 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f88b00 gate 1598907153312278800 evaluation succeeds +peer1.org2.example.com | [466c 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [466d 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [466e 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [466f 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4670 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4074 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4075 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4076 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4077 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4078 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4079 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [407a 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [407b 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [407c 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [407d 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [407f 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [407e 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4080 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4081 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4082 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4083 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4084 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4085 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4086 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4087 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4088 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4089 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [408a 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [408b 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [408c 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [408d 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [408e 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [408f 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4090 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516db10 gate 1598907140444976400 evaluation starts +peer0.org1.example.com | [4091 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516db10 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4092 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516db10 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4093 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516db10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4094 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516db10 principal evaluation fails +peer0.org1.example.com | [4095 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516db10 gate 1598907140444976400 evaluation fails +peer0.org1.example.com | [4096 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4097 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4098 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4099 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a080 gate 1598907140445560000 evaluation starts +peer0.org1.example.com | [409a 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a080 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [409b 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a080 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [409c 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [409d 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a080 principal evaluation fails +peer0.org1.example.com | [409e 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a080 gate 1598907140445560000 evaluation fails +peer0.org1.example.com | [409f 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [40a0 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [40a1 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [40a2 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a5f0 gate 1598907140449091200 evaluation starts +peer0.org1.example.com | [40a3 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a5f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [40a4 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a5f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [40a5 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a5f0 principal matched by identity 0 +peer0.org1.example.com | [40a6 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 2d fa 2c 67 2d 33 a2 36 ed 3d 13 c1 c8 85 c9 |.-.,g-3.6.=.....| +peer0.org1.example.com | 00000010 83 7a 4c 24 5b 0c 04 d2 88 56 85 dc b2 1c 45 94 |.zL$[....V....E.| +peer0.org1.example.com | [40a7 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af 20 a1 09 1c b0 bc d3 33 1d d8 |0E.!.. ......3..| +peer0.org1.example.com | 00000010 2f 39 96 d4 04 4d fb d7 cd 9b 02 d7 80 b2 65 c2 |/9...M........e.| +peer0.org1.example.com | 00000020 e3 41 10 75 df 02 20 63 80 44 a9 7f 76 7e 77 cc |.A.u.. c.D..v~w.| +peer0.org1.example.com | 00000030 50 e7 e1 bd 41 ed c0 d9 81 28 40 ed dc 16 81 21 |P...A....(@....!| +peer0.org1.example.com | 00000040 1f 80 aa c0 1b 5d ec |.....].| +peer0.org1.example.com | [40a8 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a5f0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [40a9 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a5f0 gate 1598907140449091200 evaluation succeeds +peer0.org1.example.com | [40aa 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [40ac 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [40ad 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [40ae 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [40af 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [40b0 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [40b1 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [40b2 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [40b3 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [40b4 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40b5 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40b6 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40ab 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [40b7 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [40b8 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4671 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer1.org2.example.com | [4672 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [45db 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [45dc 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [45dd 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45de 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45df 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45e0 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [45e1 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45e2 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45e3 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [45e4 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [45e5 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [45e6 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [45e7 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [45e8 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [45e9 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [45ea 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [45eb 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [45ec 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org2.example.com | [45ed 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org2.example.com | [45ee 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45ef 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [45f0 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [45f1 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [45f2 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [45f3 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [45f4 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [45f5 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [45f6 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040343f0 gate 1598907146157881300 evaluation starts +peer0.org2.example.com | [45f7 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040343f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [45f8 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040343f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [45f9 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040343f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org1.example.com | [40b9 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [40ba 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40bb 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40bc 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40bd 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40be 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40bf 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40c0 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40c1 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40c2 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [40c3 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40c4 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [40c5 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [40c6 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40c7 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [40c8 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40c9 08-31 20:52:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [40ca 08-31 20:52:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161039 +peer0.org1.example.com | [40cb 08-31 20:52:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F137B570E3A4F1EC54496DA39A8448C1E56E48D8A78059EEA680FA294A4BA2EA +peer0.org1.example.com | [40cc 08-31 20:52:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [40cd 08-31 20:52:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [40ce 08-31 20:52:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [40cf 08-31 20:52:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [40d0 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40d1 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40d2 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org1.example.com | [40d3 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40d4 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [40d5 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40d6 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [40d7 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40d8 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [40d9 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [40da 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40db 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [40dc 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40dd 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [40de 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [40df 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [40e0 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40e1 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40e2 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40e3 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40e4 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40e5 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40e6 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [40e7 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40e8 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [40e9 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [40ea 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [40eb 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [40ec 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [40ed 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [40ee 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [40ef 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [40f0 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [40f1 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [40f2 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [40f3 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [40f4 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7480 gate 1598907141117990200 evaluation starts +peer0.org1.example.com | [40f5 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7480 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [40f6 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7480 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [40f7 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [40f8 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7480 principal evaluation fails +peer0.org1.example.com | [40f9 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7480 gate 1598907141117990200 evaluation fails +peer0.org1.example.com | [40fa 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [40fb 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [40fc 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [40fd 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c79f0 gate 1598907141120151200 evaluation starts +peer1.org2.example.com | [4673 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4674 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer1.org2.example.com | [4675 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4676 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4677 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4678 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer1.org2.example.com | [4679 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [467a 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [467b 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [467c 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [467d 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:" signature:"0D\002 E\020\032K1\023e\002\346\330y<\252\334\202\321\212\2618\301m]\321\3737\032E\301\300\333\326\370\002 ?\262\363\246\276\301\336x\374Mf\037r\257\2643v\022+F\241\200Z\001\253\336\251\177B|K3" > alive: alive: +peer1.org2.example.com | [467e 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer1.org2.example.com | [467f 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4680 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4681 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [4682 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [4683 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4684 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [4685 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4686 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer1.org2.example.com | [4687 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer1.org2.example.com | [4688 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 85 4d e3 1b 2b 14 d5 61 8e 17 5c 84 83 32 48 |..M..+..a..\..2H| +peer1.org2.example.com | 00000010 b6 f7 83 21 a9 ec ab ea a8 d7 d7 84 0b a3 77 e2 |...!..........w.| +peer1.org2.example.com | [4689 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 b4 0c 15 cf 64 72 f1 f9 4d 79 |0E.!......dr..My| +peer1.org2.example.com | 00000010 8f 54 a8 d6 ba b3 64 2e 0d 29 76 9e bc 66 b0 c0 |.T....d..)v..f..| +peer1.org2.example.com | 00000020 c4 52 6c e8 c1 02 20 24 9d 0a 58 11 c3 60 1e 40 |.Rl... $..X..`.@| +peer1.org2.example.com | 00000030 ac 6a 8a fb 5a 8b b8 33 d9 fe 2b e4 46 d7 4a 07 |.j..Z..3..+.F.J.| +peer1.org2.example.com | 00000040 97 96 9b 09 2a a8 51 |....*.Q| +peer1.org2.example.com | [468a 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer1.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org1.example.com | [40fe 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c79f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [40ff 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c79f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4100 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c79f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4101 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c79f0 principal evaluation fails +peer0.org1.example.com | [4102 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c79f0 gate 1598907141120151200 evaluation fails +peer0.org1.example.com | [4103 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4104 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4105 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4106 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7f60 gate 1598907141121599400 evaluation starts +peer0.org1.example.com | [4107 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7f60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4108 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7f60 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4109 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7f60 principal matched by identity 0 +peer0.org1.example.com | [410a 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 9e 73 14 28 18 21 1d f9 18 a6 7b 11 64 ed 40 |..s.(.!....{.d.@| +peer0.org1.example.com | 00000010 87 cd 2c 29 a5 28 0d 2d c8 e9 60 18 ae 29 bf 2d |..,).(.-..`..).-| +peer0.org1.example.com | [410b 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e1 77 99 e7 ee 43 a9 6f 30 e6 |0E.!...w...C.o0.| +peer0.org1.example.com | 00000010 fb 77 6a da bf cc 64 75 9d eb 18 cb 69 d4 bf c0 |.wj...du....i...| +peer0.org1.example.com | 00000020 08 bf 62 c2 4a 02 20 6d 34 73 8a 97 9d a4 7f c5 |..b.J. m4s......| +peer0.org1.example.com | 00000030 ba 10 d5 39 69 b9 5e e5 63 68 00 ce 7a 49 9e 5e |...9i.^.ch..zI.^| +peer0.org1.example.com | 00000040 f1 b2 c8 7f c7 f5 c3 |.......| +peer0.org1.example.com | [410c 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7f60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [410d 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7f60 gate 1598907141121599400 evaluation succeeds +peer0.org1.example.com | [410e 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [410f 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4110 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4111 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4112 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4113 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4114 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4115 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4116 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4117 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4118 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4119 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [411a 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [411b 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [411c 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [411d 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [411e 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [411f 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [4120 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4121 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4122 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4123 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4124 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4125 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [4126 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4127 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\002\303eS\003\014\311-3Y`\232\326-\377\211P\266\304ek~\272p\337\346\336\224SV\231\002 f\244q\307VCDA\302\366\337JmJm\344\000\2654\275R{\347:y\036\264n\235\222\266\212" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [4128 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\002\303eS\003\014\311-3Y`\232\326-\377\211P\266\304ek~\272p\337\346\336\224SV\231\002 f\244q\307VCDA\302\366\337JmJm\344\000\2654\275R{\347:y\036\264n\235\222\266\212" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [4129 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [412a 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\002\303eS\003\014\311-3Y`\232\326-\377\211P\266\304ek~\272p\337\346\336\224SV\231\002 f\244q\307VCDA\302\366\337JmJm\344\000\2654\275R{\347:y\036\264n\235\222\266\212" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [412b 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [412c 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 b2 82 29 c0 2a f9 b3 a5 b0 b2 34 50 49 31 b3 |...).*.....4PI1.| +peer0.org1.example.com | 00000010 7d fc 93 2c 84 8a 3d 36 ec 6f 50 9e 1a 66 c0 2c |}..,..=6.oP..f.,| +peer0.org1.example.com | [412d 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 9b 8b 2c 40 90 2f 80 63 af cd |0E.!....,@./.c..| +peer0.org1.example.com | 00000010 48 ca 37 69 29 29 9f bb 1d c3 5b 8f 63 a1 7c 47 |H.7i))....[.c.|G| +peer0.org1.example.com | 00000020 15 1f ae b2 23 02 20 24 bb 15 3f ac ba ee 84 d3 |....#. $..?.....| +peer0.org1.example.com | 00000030 7a 04 a8 d3 db 97 f1 f4 cf d9 e8 4f a1 21 81 7f |z..........O.!..| +peer0.org1.example.com | 00000040 ce 31 a6 98 54 3c 44 |.1..T DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [412f 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 02 c3 65 53 03 0c c9 2d 33 59 60 |0D. >..eS...-3Y`| +peer0.org1.example.com | 00000010 9a d6 2d ff 89 50 b6 c4 65 6b 7e ba 70 df e6 de |..-..P..ek~.p...| +peer0.org1.example.com | 00000020 94 53 56 99 02 20 66 a4 71 c7 56 43 44 41 c2 f6 |.SV.. f.q.VCDA..| +peer0.org1.example.com | 00000030 df 4a 6d 4a 6d e4 00 b5 34 bd 52 7b e7 3a 79 1e |.JmJm...4.R{.:y.| +peer0.org1.example.com | 00000040 b4 6e 9d 92 b6 8a |.n....| +peer0.org1.example.com | [4130 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [4131 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org1.example.com | [4132 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4133 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4134 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4135 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4136 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4137 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [468b 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 ae d5 2f e5 15 b1 01 77 cf 34 b7 |0D. T../....w.4.| +peer1.org2.example.com | 00000010 66 97 55 86 fa d6 7a 38 0c 59 69 82 d8 31 52 e3 |f.U...z8.Yi..1R.| +peer1.org2.example.com | 00000020 7e c9 e8 6d 02 20 29 1d 34 f1 cf bb ef 36 50 03 |~..m. ).4....6P.| +peer1.org2.example.com | 00000030 37 c6 a8 54 29 ef e7 a6 c2 fe 31 8c 7f e0 ba ad |7..T).....1.....| +peer1.org2.example.com | 00000040 ac d8 6d 5b 65 91 |..m[e.| +peer1.org2.example.com | [468c 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer1.org2.example.com | [468d 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer1.org2.example.com | [468e 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [468f 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [4690 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [4691 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4692 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4693 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4694 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer1.org2.example.com | [4695 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4696 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4697 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [4698 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer1.org2.example.com | [4699 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [469a 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer1.org2.example.com | [469b 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [469c 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer1.org2.example.com | [469d 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [469e 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [469f 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46a0 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46a1 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46a2 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46a3 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer1.org2.example.com | [46a4 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46a5 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [46a6 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46a7 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer1.org2.example.com | [46a8 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [45fa 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040343f0 principal evaluation fails +peer0.org2.example.com | [45fb 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040343f0 gate 1598907146157881300 evaluation fails +peer0.org2.example.com | [45fc 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [45fd 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [45fe 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [45ff 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004034960 gate 1598907146158134400 evaluation starts +peer0.org2.example.com | [4600 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004034960 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4601 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004034960 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4602 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004034960 principal matched by identity 0 +peer0.org2.example.com | [4603 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org2.example.com | [4604 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org2.example.com | [4605 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004034960 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4606 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004034960 gate 1598907146158134400 evaluation succeeds +peer0.org2.example.com | [4607 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4608 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4609 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [460a 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [460b 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [460c 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [460d 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [460e 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [460f 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4610 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4611 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4612 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4613 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004035b60 gate 1598907146159215600 evaluation starts +peer0.org2.example.com | [4614 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004035b60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4615 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004035b60 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4616 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004035b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4617 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004035b60 principal evaluation fails +peer0.org2.example.com | [4618 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004035b60 gate 1598907146159215600 evaluation fails +peer0.org2.example.com | [4619 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [461a 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [461b 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [461c 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a0d0 gate 1598907146159526300 evaluation starts +peer0.org2.example.com | [461d 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a0d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [461e 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a0d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4138 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [4139 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [413a 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [413b 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [413c 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\002\303eS\003\014\311-3Y`\232\326-\377\211P\266\304ek~\272p\337\346\336\224SV\231\002 f\244q\307VCDA\302\366\337JmJm\344\000\2654\275R{\347:y\036\264n\235\222\266\212" > > alive: +peer0.org1.example.com | [413d 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [413e 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [413f 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4140 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4141 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4142 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4143 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4144 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4145 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4146 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4147 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [4148 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4149 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [414a 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [414b 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [414c 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [414d 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [414e 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [46a9 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46aa 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [46ab 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [46ac 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [46ad 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [46ae 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [46af 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [46b0 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbd5b0 gate 1598907153586449300 evaluation starts +peer1.org2.example.com | [46b1 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbd5b0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [46b2 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbd5b0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [46b3 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbd5b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [46b4 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbd5b0 principal evaluation fails +peer1.org2.example.com | [46b5 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbd5b0 gate 1598907153586449300 evaluation fails +peer1.org2.example.com | [46b6 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [46b7 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [46b8 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [46b9 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbdb20 gate 1598907153588516100 evaluation starts +peer1.org2.example.com | [46ba 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbdb20 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [46bb 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbdb20 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [46bc 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbdb20 principal matched by identity 0 +peer1.org2.example.com | [46bd 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 b6 af 9a 4d 2d f1 0f ed 74 cc b1 73 7a 52 f6 |....M-...t..szR.| +peer1.org2.example.com | 00000010 2b c8 4d 70 de a6 4b 03 f3 15 a6 12 42 1a 1d c6 |+.Mp..K.....B...| +peer1.org2.example.com | [46be 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 20 93 43 04 22 e5 56 44 e9 50 07 |0D. . .C.".VD.P.| +peer1.org2.example.com | 00000010 be 5e 40 76 05 fb 54 63 f5 18 f0 65 ee df e0 c1 |.^@v..Tc...e....| +peer1.org2.example.com | 00000020 83 2f 90 10 02 20 00 ef 62 10 df c6 81 8a b7 61 |./... ..b......a| +peer1.org2.example.com | 00000030 25 ad ae 35 e3 52 88 aa 57 f6 1f 5c 1c ad a9 a5 |%..5.R..W..\....| +peer1.org2.example.com | 00000040 a4 96 4b 35 f7 b7 |..K5..| +peer1.org2.example.com | [46bf 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbdb20 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [46c0 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fbdb20 gate 1598907153588516100 evaluation succeeds +peer1.org2.example.com | [46c1 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [46c2 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [46c3 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [46c4 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [46c5 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [461f 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a0d0 principal matched by identity 0 +peer0.org2.example.com | [4620 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org2.example.com | [4621 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org2.example.com | [4622 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a0d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4623 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00404a0d0 gate 1598907146159526300 evaluation succeeds +peer0.org2.example.com | [4624 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4625 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4626 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4627 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4628 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org2.example.com | [4629 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org2.example.com | [462a 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [462b 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [462c 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [462d 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [462e 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [462f 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4630 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4631 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4632 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4633 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4634 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4635 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4636 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401d380 gate 1598907146161315700 evaluation starts +peer0.org2.example.com | [4637 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401d380 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4638 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401d380 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4639 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401d380 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [463a 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401d380 principal evaluation fails +peer0.org2.example.com | [463b 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401d380 gate 1598907146161315700 evaluation fails +peer0.org2.example.com | [463c 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [463d 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [463e 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [463f 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401d8f0 gate 1598907146161564400 evaluation starts +peer0.org2.example.com | [4640 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401d8f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4641 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401d8f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4642 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401d8f0 principal matched by identity 0 +peer0.org2.example.com | [4643 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org2.example.com | [4644 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org2.example.com | [4645 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401d8f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4646 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00401d8f0 gate 1598907146161564400 evaluation succeeds +peer0.org2.example.com | [4647 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4648 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4649 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [464a 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [464b 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org2.example.com | [464c 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org2.example.com | [464d 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [464e 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [464f 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4650 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4651 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4652 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4653 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4654 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4655 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4656 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040711e0 gate 1598907146163320500 evaluation starts +peer0.org2.example.com | [4657 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040711e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4658 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040711e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4659 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040711e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [465a 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040711e0 principal evaluation fails +peer0.org2.example.com | [465b 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040711e0 gate 1598907146163320500 evaluation fails +peer0.org2.example.com | [465c 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [465d 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [465e 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [46c6 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer1.org2.example.com | [46c7 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer1.org2.example.com | [46c8 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer1.org2.example.com | [46c9 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer1.org2.example.com | [46ca 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46cb 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46cc 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46cd 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer1.org2.example.com | [46ce 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46cf 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46d0 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46d1 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [46d2 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer1.org2.example.com | [46d3 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer1.org2.example.com | [46d4 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46d5 08-31 20:52:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [46d6 08-31 20:52:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46d7 08-31 20:52:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46d8 08-31 20:52:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46d9 08-31 20:52:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46da 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [46db 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [46dc 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46dd 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46de 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46df 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46e0 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [46e1 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46e2 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46e3 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46e4 08-31 20:52:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Exiting +peer1.org2.example.com | [46e5 08-31 20:52:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Returning true +peer1.org2.example.com | [46e6 08-31 20:52:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer1.org2.example.com | [46e7 08-31 20:52:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08CCB4D3A7F9AF9D981610141801 +peer1.org2.example.com | [46e8 08-31 20:52:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D60B2D3C2266D8920C8CA927AC8ABADED32F45D32982E01B53B409A820CD4365 +peer1.org2.example.com | [46e9 08-31 20:52:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 : Entering +peer1.org2.example.com | [46ea 08-31 20:52:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [414f 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4150 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4151 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4152 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4153 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4154 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051eb560 gate 1598907141510736700 evaluation starts +peer0.org1.example.com | [4155 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051eb560 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4156 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051eb560 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4157 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051eb560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4158 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051eb560 principal evaluation fails +peer0.org1.example.com | [4159 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051eb560 gate 1598907141510736700 evaluation fails +peer0.org1.example.com | [415a 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [415b 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [415c 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [415d 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051ebad0 gate 1598907141511004600 evaluation starts +peer0.org1.example.com | [415e 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051ebad0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [415f 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051ebad0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4160 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051ebad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4161 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051ebad0 principal evaluation fails +peer0.org1.example.com | [4162 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051ebad0 gate 1598907141511004600 evaluation fails +peer0.org1.example.com | [4163 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4164 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4165 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4166 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525a040 gate 1598907141511332500 evaluation starts +peer0.org1.example.com | [4167 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525a040 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4168 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525a040 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4169 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525a040 principal matched by identity 0 +peer0.org1.example.com | [416a 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 7e 2f 8e 4a e0 ef 3f 41 cc 65 57 67 1b 37 83 |.~/.J..?A.eWg.7.| +peer0.org1.example.com | 00000010 0e 55 35 d1 da 3f 2e b6 34 1a b3 ea fa b3 11 09 |.U5..?..4.......| +peer0.org1.example.com | [416b 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c ff 97 c8 ab 01 42 c7 54 7e 27 c1 |0D. \.....B.T~'.| +peer0.org1.example.com | 00000010 99 22 31 c0 8a 82 a1 07 49 83 6c 18 c4 e5 cb 4c |."1.....I.l....L| +peer0.org1.example.com | 00000020 cb ca a3 a4 02 20 6c c0 df 95 33 89 f1 40 60 5d |..... l...3..@`]| +peer0.org1.example.com | 00000030 49 a2 9d 59 e8 dd f0 be 82 bc 9e 58 04 65 01 0d |I..Y.......X.e..| +peer0.org1.example.com | 00000040 62 25 ea 10 1b 58 |b%...X| +peer0.org1.example.com | [416c 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525a040 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [416d 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525a040 gate 1598907141511332500 evaluation succeeds +peer0.org1.example.com | [416e 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [416f 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4170 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4171 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4172 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4173 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [4174 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4175 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4176 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4177 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4178 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4179 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [417a 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [417b 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [417c 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [465f 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004071750 gate 1598907146163567000 evaluation starts +peer0.org2.example.com | [4660 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004071750 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4661 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004071750 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4662 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004071750 principal matched by identity 0 +peer0.org2.example.com | [4663 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org2.example.com | [4664 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org2.example.com | [4665 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004071750 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4666 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004071750 gate 1598907146163567000 evaluation succeeds +peer0.org2.example.com | [4667 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4668 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4669 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [466a 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [466b 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org2.example.com | [466c 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org2.example.com | [466d 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [466e 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [466f 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4670 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4671 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4672 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4673 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4674 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4675 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4676 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4677 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4678 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408b290 gate 1598907146164717700 evaluation starts +peer0.org2.example.com | [4679 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408b290 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [467a 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408b290 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [467b 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408b290 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [467c 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408b290 principal evaluation fails +peer0.org2.example.com | [467d 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408b290 gate 1598907146164717700 evaluation fails +peer0.org2.example.com | [467e 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [467f 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [46eb 08-31 20:52:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46ec 08-31 20:52:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46ed 08-31 20:52:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46ee 08-31 20:52:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer1.org2.example.com | [46ef 08-31 20:52:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46f0 08-31 20:52:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46f1 08-31 20:52:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer1.org2.example.com | [46f2 08-31 20:52:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46f3 08-31 20:52:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [46f4 08-31 20:52:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [46f5 08-31 20:52:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer1.org2.example.com | [46f6 08-31 20:52:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46f7 08-31 20:52:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46f8 08-31 20:52:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [46f9 08-31 20:52:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer1.org2.example.com | [46fa 08-31 20:52:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [46fd 08-31 20:52:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46fb 08-31 20:52:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [46fe 08-31 20:52:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [46fc 08-31 20:52:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer1.org2.example.com | [46ff 08-31 20:52:34.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4700 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4701 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4702 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4703 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4704 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4705 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4706 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4707 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4708 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4709 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [470a 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [417d 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [417e 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [417f 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [4180 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4181 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4182 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [4183 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4184 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [4185 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4186 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [4187 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4188 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4189 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [418a 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [418b 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [418c 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [418d 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [418e 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [418f 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4680 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4681 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408b800 gate 1598907146164963600 evaluation starts +peer0.org2.example.com | [4682 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408b800 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4683 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408b800 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4684 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408b800 principal matched by identity 0 +peer0.org2.example.com | [4685 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org2.example.com | [4686 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org2.example.com | [4687 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408b800 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4688 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408b800 gate 1598907146164963600 evaluation succeeds +peer0.org2.example.com | [4689 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [468a 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [468b 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [468c 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [468d 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [468e 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [468f 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4690 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4691 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4692 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4693 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4694 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4695 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a0a00 gate 1598907146166370400 evaluation starts +peer0.org2.example.com | [4696 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a0a00 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4697 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a0a00 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4698 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a0a00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4699 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a0a00 principal evaluation fails +peer0.org2.example.com | [469a 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a0a00 gate 1598907146166370400 evaluation fails +peer0.org2.example.com | [469b 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [469c 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [469d 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [469e 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a0f70 gate 1598907146166904000 evaluation starts +peer0.org2.example.com | [469f 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a0f70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [46a0 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a0f70 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [46a1 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a0f70 principal matched by identity 0 +peer0.org2.example.com | [46a2 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org2.example.com | [470b 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1ff0 gate 1598907154385719700 evaluation starts +peer1.org2.example.com | [470c 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1ff0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [470d 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1ff0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [470e 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1ff0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [470f 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1ff0 principal evaluation fails +peer1.org2.example.com | [4710 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fe1ff0 gate 1598907154385719700 evaluation fails +peer1.org2.example.com | [4711 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4712 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4713 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4714 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004032560 gate 1598907154389525200 evaluation starts +peer1.org2.example.com | [4715 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004032560 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4716 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004032560 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4717 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004032560 principal matched by identity 0 +peer1.org2.example.com | [4718 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org2.example.com | [4719 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org2.example.com | [471a 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004032560 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [471b 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004032560 gate 1598907154389525200 evaluation succeeds +peer1.org2.example.com | [471c 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [471d 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [471e 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [471f 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4720 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4721 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4722 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4723 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4724 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4725 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4726 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [4727 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [4728 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004033760 gate 1598907154394286800 evaluation starts +peer1.org2.example.com | [4729 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004033760 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [472a 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004033760 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [472b 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004033760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [472c 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004033760 principal evaluation fails +peer1.org2.example.com | [472d 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004033760 gate 1598907154394286800 evaluation fails +peer1.org2.example.com | [472e 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [472f 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4730 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4731 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004033cd0 gate 1598907154396494400 evaluation starts +peer1.org2.example.com | [4732 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004033cd0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4733 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004033cd0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4734 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004033cd0 principal matched by identity 0 +peer1.org2.example.com | [4735 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org2.example.com | [4736 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org2.example.com | [4737 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004033cd0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [4738 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004033cd0 gate 1598907154396494400 evaluation succeeds +peer1.org2.example.com | [4739 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [473a 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [473b 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [473c 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [473d 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org2.example.com | [473e 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org2.example.com | [473f 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org2.example.com | [4740 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org2.example.com | [4741 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4742 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:48344 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4743 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4744 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4745 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4746 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4747 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4748 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4749 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [474a 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [474b 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [46a3 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org2.example.com | [46a4 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a0f70 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [46a5 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a0f70 gate 1598907146166904000 evaluation succeeds +peer0.org2.example.com | [46a6 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [46a7 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [46a8 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [46a9 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [46aa 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org2.example.com | [46ab 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org2.example.com | [46ac 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org2.example.com | [46ad 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org2.example.com | [46ae 08-31 20:52:26.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46af 08-31 20:52:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46b0 08-31 20:52:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46b1 08-31 20:52:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [46b2 08-31 20:52:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46b3 08-31 20:52:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46b4 08-31 20:52:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [46b5 08-31 20:52:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [46b6 08-31 20:52:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46b7 08-31 20:52:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [46b8 08-31 20:52:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [46b9 08-31 20:52:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [46ba 08-31 20:52:26.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46bb 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [46bc 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [46bd 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46be 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46bf 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46c0 08-31 20:52:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [46c1 08-31 20:52:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [46c2 08-31 20:52:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [46c3 08-31 20:52:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [3 4 5 6 1 2] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [46c4 08-31 20:52:26.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46c5 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [46c6 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [46c7 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [46c8 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [46c9 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46ca 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [46cb 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [46cc 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46cd 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org2.example.com | [46ce 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [46cf 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 c6 aa ca 4b 34 fb 28 1b f8 14 65 62 8b 48 9a |....K4.(...eb.H.| +peer0.org2.example.com | 00000010 25 8b 97 16 05 19 3a 40 85 36 e0 f5 0f f4 c9 e1 |%.....:@.6......| +peer0.org2.example.com | [46d0 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 8c 08 ce a8 0d f4 e2 1c 0f 72 |0E.!...........r| +peer0.org2.example.com | 00000010 af 0a d7 f2 ba 8a 90 26 28 d4 cc a1 a8 9e 2f b5 |.......&(...../.| +peer0.org2.example.com | 00000020 fc 9b d7 0a 6a 02 20 2c ed 4a 62 87 c0 d5 27 65 |....j. ,.Jb...'e| +peer0.org2.example.com | 00000030 76 8c 5b 0d f0 5c 57 e1 52 14 32 7c 49 ec e9 1b |v.[..\W.R.2|I...| +peer0.org2.example.com | 00000040 a0 fc ff 7f be b6 c9 |.......| +peer0.org2.example.com | [46d1 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [46d2 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 68 60 c3 b9 af 4b dc 41 58 0e |0E.!..h`...K.AX.| +peer0.org2.example.com | 00000010 ac 8b 69 83 ba 16 1c 88 11 6b d4 c1 11 31 76 92 |..i......k...1v.| +peer0.org2.example.com | 00000020 42 d1 41 65 be 02 20 4b 84 9b 0c 36 d2 66 3b 65 |B.Ae.. K...6.f;e| +peer0.org2.example.com | 00000030 b7 76 5c f1 33 eb 8f 19 2a 75 04 b6 c5 5e e5 89 |.v\.3...*u...^..| +peer0.org2.example.com | 00000040 f9 07 95 03 74 c5 26 |....t.&| +peer0.org2.example.com | [46d3 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org2.example.com | [46d4 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org2.example.com | [46d5 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [46d6 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [46d7 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [46d8 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46d9 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46da 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46db 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [46dc 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46dd 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46de 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [46df 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org2.example.com | [46e0 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org2.example.com | [46e1 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46e2 08-31 20:52:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Exiting +peer0.org2.example.com | [46e3 08-31 20:52:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [46e4 08-31 20:52:29.22 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Entering +peer0.org2.example.com | [46e5 08-31 20:52:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [46e6 08-31 20:52:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [46e7 08-31 20:52:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fa c7 84 dd db 76 f1 a2 a1 41 10 14 99 ba 5a c9 |.....v...A....Z.| +peer0.org2.example.com | 00000010 97 99 0d 51 60 e9 3c f4 77 17 08 c7 c1 a0 cf 7b |...Q`.<.w......{| +peer0.org2.example.com | [46e8 08-31 20:52:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 78 55 f4 d3 06 73 f1 a8 dd 38 |0E.!..xU...s...8| +peer0.org2.example.com | 00000010 b8 70 8a 64 0a 18 a5 9e df 2c 91 7b ab 11 c7 15 |.p.d.....,.{....| +peer0.org2.example.com | 00000020 1f 6f ad b7 4a 02 20 10 d7 6b 0a 49 9c 3a 78 8e |.o..J. ..k.I.:x.| +peer0.org2.example.com | 00000030 28 d2 db 50 ce 73 75 ff 94 ab 74 75 50 c7 b9 2c |(..P.su...tuP..,| +peer0.org2.example.com | 00000040 96 ca 5c 14 fe 22 d7 |..\..".| +peer0.org2.example.com | [46e9 08-31 20:52:29.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46ea 08-31 20:52:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46eb 08-31 20:52:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46ec 08-31 20:52:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [46ed 08-31 20:52:29.24 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [46ee 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [46ef 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [46f0 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [46f1 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46f2 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46f3 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46f4 08-31 20:52:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4190 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4191 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4192 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4193 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4194 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4195 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4196 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4197 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4198 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4199 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [419a 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816103A +peer0.org1.example.com | [419b 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E79AF5539EF983DB2F34ADD51C20268558EE5CAB5D7E9CE36FF9491B23BC852C +peer0.org1.example.com | [419c 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [419d 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [419e 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [419f 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [41a0 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41a1 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [41a2 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41a3 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [41a4 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [41a5 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [474c 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004051f00 gate 1598907154399795700 evaluation starts +peer1.org2.example.com | [474d 08-31 20:52:34.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004051f00 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [474e 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004051f00 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [474f 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004051f00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4750 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004051f00 principal evaluation fails +peer1.org2.example.com | [4751 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004051f00 gate 1598907154399795700 evaluation fails +peer1.org2.example.com | [4752 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4753 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4754 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4755 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00406e470 gate 1598907154400470000 evaluation starts +peer1.org2.example.com | [4756 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00406e470 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4757 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00406e470 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4758 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00406e470 principal matched by identity 0 +peer1.org2.example.com | [4759 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org2.example.com | [475a 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org2.example.com | [475b 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00406e470 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [475c 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00406e470 gate 1598907154400470000 evaluation succeeds +peer1.org2.example.com | [475d 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [475e 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [475f 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [4760 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4761 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org2.example.com | [4762 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org2.example.com | [4763 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4764 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4765 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4766 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4767 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [4768 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [4769 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [476a 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [476b 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00406fd60 gate 1598907154402407100 evaluation starts +peer1.org2.example.com | [476c 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00406fd60 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [476d 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00406fd60 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [46f5 08-31 20:52:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46f6 08-31 20:52:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46f7 08-31 20:52:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [46f8 08-31 20:52:29.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46f9 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [46fa 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [46fb 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [46fc 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [46fd 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [41a6 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [41a7 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41a8 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [41a9 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41aa 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [41ab 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [41ac 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41ad 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +peer0.org1.example.com | [41ae 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [41af 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41b0 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [41b1 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [41b2 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [41b3 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [41b4 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [41b5 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [41b6 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005283af0 gate 1598907141613341400 evaluation starts +peer0.org1.example.com | [41b7 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005283af0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [41b8 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005283af0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [41b9 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005283af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [41ba 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005283af0 principal evaluation fails +peer0.org1.example.com | [41bb 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005283af0 gate 1598907141613341400 evaluation fails +peer0.org1.example.com | [41bc 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [41bd 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [41be 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [41bf 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa060 gate 1598907141613624200 evaluation starts +peer0.org1.example.com | [41c0 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa060 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [41c1 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa060 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [41c2 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [41c3 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa060 principal evaluation fails +peer0.org1.example.com | [41c4 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa060 gate 1598907141613624200 evaluation fails +peer0.org1.example.com | [41c5 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [476e 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00406fd60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [476f 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00406fd60 principal evaluation fails +peer1.org2.example.com | [4770 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00406fd60 gate 1598907154402407100 evaluation fails +peer1.org2.example.com | [4771 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4772 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4773 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4774 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408c2d0 gate 1598907154403180300 evaluation starts +peer1.org2.example.com | [4775 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408c2d0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4776 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408c2d0 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4777 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408c2d0 principal matched by identity 0 +peer1.org2.example.com | [4778 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org2.example.com | [4779 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org2.example.com | [477a 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408c2d0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [477b 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00408c2d0 gate 1598907154403180300 evaluation succeeds +peer1.org2.example.com | [477c 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [477d 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [477e 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [477f 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [4780 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org2.example.com | [4781 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org2.example.com | [4782 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [4783 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer1.org2.example.com | [4784 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer1.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer1.org2.example.com | [4785 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer1.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer1.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer1.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer1.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer1.org2.example.com | [4786 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4787 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [4788 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [4789 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [478a 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [478b 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [478c 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [478d 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [478e 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a6450 gate 1598907154406874200 evaluation starts +peer1.org2.example.com | [478f 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a6450 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4790 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a6450 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [4791 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a6450 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [4792 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a6450 principal evaluation fails +peer1.org2.example.com | [4793 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a6450 gate 1598907154406874200 evaluation fails +peer1.org2.example.com | [4794 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4795 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [4796 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [4797 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a69c0 gate 1598907154407632700 evaluation starts +peer1.org2.example.com | [4798 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a69c0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [4799 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a69c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [46fe 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [46ff 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4700 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4701 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4702 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4703 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4704 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4705 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1650 gate 1598907149350275800 evaluation starts +peer0.org2.example.com | [4706 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1650 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4707 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1650 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4708 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4709 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1650 principal evaluation fails +peer0.org2.example.com | [470a 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1650 gate 1598907149350275800 evaluation fails +peer0.org2.example.com | [470b 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [470c 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [470d 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [470e 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1bc0 gate 1598907149350642100 evaluation starts +peer0.org2.example.com | [470f 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1bc0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4710 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1bc0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4711 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1bc0 principal matched by identity 0 +peer0.org2.example.com | [4712 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 4c e8 7c 41 d4 f7 a3 f5 ac 60 e5 de 00 ae 4f |?L.|A.....`....O| +peer0.org2.example.com | 00000010 0b 3c f0 28 a0 3e 58 c0 fe 51 d7 1b e8 56 fc 1c |.<.(.>X..Q...V..| +peer0.org2.example.com | [4713 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 0f d7 87 e9 12 8f b2 f3 85 30 |0E.!...........0| +peer0.org2.example.com | 00000010 62 c9 8c 45 56 44 bf 74 ef 55 23 70 7c ae fb 21 |b..EVD.t.U#p|..!| +peer0.org2.example.com | 00000020 e6 37 76 cb c9 02 20 11 7e c4 66 12 ff 9b 01 c4 |.7v... .~.f.....| +peer0.org2.example.com | 00000030 83 63 aa 51 db fa 69 6b 92 b8 0b 02 07 4f 26 71 |.c.Q..ik.....O&q| +peer0.org2.example.com | 00000040 b7 8f 6a 62 5e 8f 09 |..jb^..| +peer0.org2.example.com | [4714 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1bc0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4715 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040f1bc0 gate 1598907149350642100 evaluation succeeds +peer0.org2.example.com | [4716 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4717 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4718 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4719 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [471a 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [471b 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [471c 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [41c6 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [41c7 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [41c8 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa5d0 gate 1598907141613901900 evaluation starts +peer0.org1.example.com | [41c9 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa5d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [41ca 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa5d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [41cb 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa5d0 principal matched by identity 0 +peer0.org1.example.com | [41cc 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 7e 2f 8e 4a e0 ef 3f 41 cc 65 57 67 1b 37 83 |.~/.J..?A.eWg.7.| +peer0.org1.example.com | 00000010 0e 55 35 d1 da 3f 2e b6 34 1a b3 ea fa b3 11 09 |.U5..?..4.......| +peer0.org1.example.com | [41cd 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c ff 97 c8 ab 01 42 c7 54 7e 27 c1 |0D. \.....B.T~'.| +peer0.org1.example.com | 00000010 99 22 31 c0 8a 82 a1 07 49 83 6c 18 c4 e5 cb 4c |."1.....I.l....L| +peer0.org1.example.com | 00000020 cb ca a3 a4 02 20 6c c0 df 95 33 89 f1 40 60 5d |..... l...3..@`]| +peer0.org1.example.com | 00000030 49 a2 9d 59 e8 dd f0 be 82 bc 9e 58 04 65 01 0d |I..Y.......X.e..| +peer0.org1.example.com | 00000040 62 25 ea 10 1b 58 |b%...X| +peer0.org1.example.com | [41ce 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa5d0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [41cf 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa5d0 gate 1598907141613901900 evaluation succeeds +peer0.org1.example.com | [41d0 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [41d1 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [41d2 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [41d3 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [41d4 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [41d5 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41d6 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [41d7 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 9a f5 53 9e f9 83 db 2f 34 ad d5 1c 20 26 85 |...S..../4... &.| +peer0.org1.example.com | 00000010 58 ee 5c ab 5d 7e 9c e3 6f f9 49 1b 23 bc 85 2c |X.\.]~..o.I.#..,| +peer0.org1.example.com | [41d8 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 8f b8 0c ad a4 ff 4d 70 69 23 a7 |0D. w......Mpi#.| +peer0.org1.example.com | 00000010 b4 26 e3 1b 93 c8 16 6b 88 53 10 5b 0d 2f 05 ba |.&.....k.S.[./..| +peer0.org1.example.com | 00000020 a0 7b b5 64 02 20 44 8c a3 73 eb ae ed 12 e7 ac |.{.d. D..s......| +peer0.org1.example.com | 00000030 94 05 8e 24 5e b6 4b 48 75 3b 40 52 cc 85 23 5c |...$^.KHu;@R..#\| +peer0.org1.example.com | 00000040 f8 d3 83 df 4e ae |....N.| +peer0.org1.example.com | [41d9 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [41da 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [41db 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41dc 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [41dd 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 b2 82 29 c0 2a f9 b3 a5 b0 b2 34 50 49 31 b3 |...).*.....4PI1.| +peer0.org1.example.com | 00000010 7d fc 93 2c 84 8a 3d 36 ec 6f 50 9e 1a 66 c0 2c |}..,..=6.oP..f.,| +peer0.org1.example.com | [41de 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 9b 8b 2c 40 90 2f 80 63 af cd |0E.!....,@./.c..| +peer0.org1.example.com | 00000010 48 ca 37 69 29 29 9f bb 1d c3 5b 8f 63 a1 7c 47 |H.7i))....[.c.|G| +peer0.org1.example.com | 00000020 15 1f ae b2 23 02 20 24 bb 15 3f ac ba ee 84 d3 |....#. $..?.....| +peer0.org1.example.com | 00000030 7a 04 a8 d3 db 97 f1 f4 cf d9 e8 4f a1 21 81 7f |z..........O.!..| +peer0.org1.example.com | 00000040 ce 31 a6 98 54 3c 44 |.1..T DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41e0 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41e1 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41e2 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [41e3 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [41e4 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41e5 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [41e6 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [41e7 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 9a f5 53 9e f9 83 db 2f 34 ad d5 1c 20 26 85 |...S..../4... &.| +peer0.org1.example.com | 00000010 58 ee 5c ab 5d 7e 9c e3 6f f9 49 1b 23 bc 85 2c |X.\.]~..o.I.#..,| +peer0.org1.example.com | [41e8 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 8f b8 0c ad a4 ff 4d 70 69 23 a7 |0D. w......Mpi#.| +peer0.org1.example.com | 00000010 b4 26 e3 1b 93 c8 16 6b 88 53 10 5b 0d 2f 05 ba |.&.....k.S.[./..| +peer0.org1.example.com | 00000020 a0 7b b5 64 02 20 44 8c a3 73 eb ae ed 12 e7 ac |.{.d. D..s......| +peer0.org1.example.com | 00000030 94 05 8e 24 5e b6 4b 48 75 3b 40 52 cc 85 23 5c |...$^.KHu;@R..#\| +peer0.org1.example.com | 00000040 f8 d3 83 df 4e ae |....N.| +peer0.org2.example.com | [471d 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [471e 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [471f 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4720 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4721 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4722 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [4723 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4724 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4725 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4726 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4727 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [4728 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [4729 08-31 20:52:29.35 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [472a 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [472b 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [472c 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [472d 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [472e 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [472f 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4730 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4731 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4732 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4733 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4734 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4735 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4736 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4737 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4738 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer1.org2.example.com | [479a 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a69c0 principal matched by identity 0 +peer1.org2.example.com | [479b 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer1.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer1.org2.example.com | [479c 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer1.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer1.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer1.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer1.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer1.org2.example.com | [479d 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a69c0 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [479e 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a69c0 gate 1598907154407632700 evaluation succeeds +peer1.org2.example.com | [479f 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [47a0 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [47a1 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [47a2 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [47a3 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [47a4 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [47a5 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer1.org2.example.com | [47a6 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer1.org2.example.com | [47a7 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer1.org2.example.com | [47a8 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer1.org2.example.com | [47a9 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer1.org2.example.com | [47aa 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer1.org2.example.com | [47ab 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a7bc0 gate 1598907154409140200 evaluation starts +peer1.org2.example.com | [47ac 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a7bc0 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [47ad 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a7bc0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [41e9 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [41ea 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 70 2c 74 bb 86 9e f8 50 1b 29 |0E.!..p,t....P.)| +peer0.org1.example.com | 00000010 77 78 d8 7f 0f 38 92 d0 c6 5a e7 4a aa 45 15 51 |wx...8...Z.J.E.Q| +peer0.org1.example.com | 00000020 a6 96 2b 4c 56 02 20 02 b3 17 0c 41 8e 09 40 40 |..+LV. ....A..@@| +peer0.org1.example.com | 00000030 14 05 78 60 e0 ac 99 f3 cd 14 04 5e b0 c0 d9 f1 |..x`.......^....| +peer0.org1.example.com | 00000040 c3 2e f5 14 4e 0b 5c |....N.\| +peer0.org1.example.com | [41eb 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [41ec 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [41ed 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41ee 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41ef 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [41f0 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41f1 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [41f2 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [41f3 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 b2 82 29 c0 2a f9 b3 a5 b0 b2 34 50 49 31 b3 |...).*.....4PI1.| +peer0.org1.example.com | 00000010 7d fc 93 2c 84 8a 3d 36 ec 6f 50 9e 1a 66 c0 2c |}..,..=6.oP..f.,| +peer0.org1.example.com | [41f4 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 9b 8b 2c 40 90 2f 80 63 af cd |0E.!....,@./.c..| +peer0.org1.example.com | 00000010 48 ca 37 69 29 29 9f bb 1d c3 5b 8f 63 a1 7c 47 |H.7i))....[.c.|G| +peer0.org1.example.com | 00000020 15 1f ae b2 23 02 20 24 bb 15 3f ac ba ee 84 d3 |....#. $..?.....| +peer0.org1.example.com | 00000030 7a 04 a8 d3 db 97 f1 f4 cf d9 e8 4f a1 21 81 7f |z..........O.!..| +peer0.org1.example.com | 00000040 ce 31 a6 98 54 3c 44 |.1..T DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [41f6 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [41f7 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [41f8 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [41f9 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [41fa 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [41fb 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [41fc 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [41fd 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [41fe 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [41ff 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e2c30 gate 1598907141624880000 evaluation starts +peer0.org1.example.com | [4200 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e2c30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4201 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e2c30 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4739 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [473a 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [473b 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [473c 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [473d 08-31 20:52:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [473e 08-31 20:52:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [473f 08-31 20:52:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4740 08-31 20:52:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org2.example.com | [4741 08-31 20:52:29.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4742 08-31 20:52:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4743 08-31 20:52:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816103E +peer0.org2.example.com | [4744 08-31 20:52:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0F0124317F14C12BC5B68C37AB5C65BE6979C55C09C9B46216822D7E4740BCC5 +peer0.org2.example.com | [4745 08-31 20:52:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4746 08-31 20:52:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [4747 08-31 20:52:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [4748 08-31 20:52:29.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4749 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [474a 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [474b 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [474c 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [474d 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [474e 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [474f 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4750 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4751 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [4752 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4753 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [4754 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [4755 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4756 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [4757 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4758 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4759 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [475a 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [475b 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [475c 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [475d 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [475e 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4760 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4761 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4762 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4763 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [4765 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [475f 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4766 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4767 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4768 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4769 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4202 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e2c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4203 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e2c30 principal evaluation fails +peer0.org1.example.com | [4204 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e2c30 gate 1598907141624880000 evaluation fails +peer0.org1.example.com | [4205 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4206 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4207 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4208 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e31a0 gate 1598907141625307100 evaluation starts +peer0.org1.example.com | [4209 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e31a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [420a 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e31a0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [420b 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e31a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [420c 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e31a0 principal evaluation fails +peer0.org1.example.com | [420d 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e31a0 gate 1598907141625307100 evaluation fails +peer0.org1.example.com | [420e 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [420f 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4210 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4211 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e3710 gate 1598907141625638800 evaluation starts +peer0.org1.example.com | [4212 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e3710 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4213 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e3710 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4214 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e3710 principal matched by identity 0 +peer0.org1.example.com | [4215 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 9e 73 14 28 18 21 1d f9 18 a6 7b 11 64 ed 40 |..s.(.!....{.d.@| +peer0.org1.example.com | 00000010 87 cd 2c 29 a5 28 0d 2d c8 e9 60 18 ae 29 bf 2d |..,).(.-..`..).-| +peer0.org1.example.com | [4216 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e1 77 99 e7 ee 43 a9 6f 30 e6 |0E.!...w...C.o0.| +peer0.org1.example.com | 00000010 fb 77 6a da bf cc 64 75 9d eb 18 cb 69 d4 bf c0 |.wj...du....i...| +peer0.org1.example.com | 00000020 08 bf 62 c2 4a 02 20 6d 34 73 8a 97 9d a4 7f c5 |..b.J. m4s......| +peer0.org1.example.com | 00000030 ba 10 d5 39 69 b9 5e e5 63 68 00 ce 7a 49 9e 5e |...9i.^.ch..zI.^| +peer0.org1.example.com | 00000040 f1 b2 c8 7f c7 f5 c3 |.......| +peer0.org1.example.com | [4217 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e3710 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4218 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e3710 gate 1598907141625638800 evaluation succeeds +peer0.org1.example.com | [4219 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [421a 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [421b 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [421c 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [421d 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [421e 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [421f 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4220 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 9a f5 53 9e f9 83 db 2f 34 ad d5 1c 20 26 85 |...S..../4... &.| +peer0.org1.example.com | 00000010 58 ee 5c ab 5d 7e 9c e3 6f f9 49 1b 23 bc 85 2c |X.\.]~..o.I.#..,| +peer0.org1.example.com | [4221 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 8f b8 0c ad a4 ff 4d 70 69 23 a7 |0D. w......Mpi#.| +peer0.org1.example.com | 00000010 b4 26 e3 1b 93 c8 16 6b 88 53 10 5b 0d 2f 05 ba |.&.....k.S.[./..| +peer0.org1.example.com | 00000020 a0 7b b5 64 02 20 44 8c a3 73 eb ae ed 12 e7 ac |.{.d. D..s......| +peer0.org1.example.com | 00000030 94 05 8e 24 5e b6 4b 48 75 3b 40 52 cc 85 23 5c |...$^.KHu;@R..#\| +peer0.org1.example.com | 00000040 f8 d3 83 df 4e ae |....N.| +peer0.org1.example.com | [4222 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4223 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4224 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4225 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4226 08-31 20:52:21.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4227 08-31 20:52:21.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4228 08-31 20:52:21.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [4229 08-31 20:52:21.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [422a 08-31 20:52:21.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [422b 08-31 20:52:21.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [422c 08-31 20:52:21.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47ae 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a7bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer1.org2.example.com | [47af 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a7bc0 principal evaluation fails +peer1.org2.example.com | [47b0 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a7bc0 gate 1598907154409140200 evaluation fails +peer1.org2.example.com | [47b1 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [47b2 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer1.org2.example.com | [47b3 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer1.org2.example.com | [47b4 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bc130 gate 1598907154409561500 evaluation starts +peer1.org2.example.com | [47b5 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bc130 signed by 0 principal evaluation starts (used [false]) +peer1.org2.example.com | [47b6 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bc130 processing identity 0 with bytes of 115a4b0 +peer1.org2.example.com | [47b7 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bc130 principal matched by identity 0 +peer1.org2.example.com | [47b8 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer1.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer1.org2.example.com | [47b9 08-31 20:52:34.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer1.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer1.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer1.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer1.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer1.org2.example.com | [47ba 08-31 20:52:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bc130 principal evaluation succeeds for identity 0 +peer1.org2.example.com | [47bb 08-31 20:52:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bc130 gate 1598907154409561500 evaluation succeeds +peer1.org2.example.com | [47bc 08-31 20:52:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [47bd 08-31 20:52:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer1.org2.example.com | [47be 08-31 20:52:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer1.org2.example.com | [47bf 08-31 20:52:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer1.org2.example.com | [47c0 08-31 20:52:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer1.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer1.org2.example.com | [47c1 08-31 20:52:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer1.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer1.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer1.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer1.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer1.org2.example.com | [47c2 08-31 20:52:34.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47c3 08-31 20:52:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [47c4 08-31 20:52:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [47c5 08-31 20:52:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer0.org2.example.com:7051 +peer1.org2.example.com | [47c6 08-31 20:52:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [47c7 08-31 20:52:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer1.org2.example.com | [47c8 08-31 20:52:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer1.org2.example.com | [47c9 08-31 20:52:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer1.org2.example.com | [47ca 08-31 20:52:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer1.org2.example.com | [47cb 08-31 20:52:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:58934 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [47cc 08-31 20:52:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer1.org2.example.com | [47cd 08-31 20:52:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [476a 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [476b 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412bf50 gate 1598907149550642400 evaluation starts +peer0.org2.example.com | [476c 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412bf50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [476d 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412bf50 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [476e 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412bf50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [476f 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412bf50 principal evaluation fails +peer0.org2.example.com | [4770 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00412bf50 gate 1598907149550642400 evaluation fails +peer0.org2.example.com | [4771 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4772 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4773 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4774 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418a4c0 gate 1598907149550915400 evaluation starts +peer0.org2.example.com | [4775 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418a4c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4776 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418a4c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4777 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418a4c0 principal matched by identity 0 +peer0.org2.example.com | [4778 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [4779 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 4c e8 7c 41 d4 f7 a3 f5 ac 60 e5 de 00 ae 4f |?L.|A.....`....O| +peer0.org2.example.com | 00000010 0b 3c f0 28 a0 3e 58 c0 fe 51 d7 1b e8 56 fc 1c |.<.(.>X..Q...V..| +peer0.org2.example.com | [477a 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [477b 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 0f d7 87 e9 12 8f b2 f3 85 30 |0E.!...........0| +peer0.org2.example.com | 00000010 62 c9 8c 45 56 44 bf 74 ef 55 23 70 7c ae fb 21 |b..EVD.t.U#p|..!| +peer0.org2.example.com | 00000020 e6 37 76 cb c9 02 20 11 7e c4 66 12 ff 9b 01 c4 |.7v... .~.f.....| +peer0.org2.example.com | 00000030 83 63 aa 51 db fa 69 6b 92 b8 0b 02 07 4f 26 71 |.c.Q..ik.....O&q| +peer0.org2.example.com | 00000040 b7 8f 6a 62 5e 8f 09 |..jb^..| +peer0.org2.example.com | [4764 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [477c 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418a4c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [477d 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00418a4c0 gate 1598907149550915400 evaluation succeeds +peer0.org2.example.com | [477e 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [477f 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4780 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4781 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4782 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4783 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4784 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [4785 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 01 24 31 7f 14 c1 2b c5 b6 8c 37 ab 5c 65 be |..$1...+...7.\e.| +peer0.org2.example.com | 00000010 69 79 c5 5c 09 c9 b4 62 16 82 2d 7e 47 40 bc c5 |iy.\...b..-~G@..| +peer0.org2.example.com | [4786 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa d0 ca fb 28 92 78 b8 dc 68 46 |0E.!.....(.x..hF| +peer0.org2.example.com | 00000010 cc a0 de 06 1f 1e ab d4 a0 02 30 65 87 b0 5c b3 |..........0e..\.| +peer0.org2.example.com | 00000020 e8 89 d5 d9 02 02 20 03 f5 6a bd 54 66 b0 7f a8 |...... ..j.Tf...| +peer0.org2.example.com | 00000030 7c c3 0d e0 fb 41 e5 a0 b2 cf da 83 40 89 0e ba ||....A......@...| +peer0.org2.example.com | 00000040 ca 21 a1 73 b5 9b 81 |.!.s...| +peer0.org2.example.com | [4787 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4788 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4789 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [478a 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [478b 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 c6 aa ca 4b 34 fb 28 1b f8 14 65 62 8b 48 9a |....K4.(...eb.H.| +peer0.org2.example.com | 00000010 25 8b 97 16 05 19 3a 40 85 36 e0 f5 0f f4 c9 e1 |%.....:@.6......| +peer0.org2.example.com | [478c 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 8c 08 ce a8 0d f4 e2 1c 0f 72 |0E.!...........r| +peer0.org2.example.com | 00000010 af 0a d7 f2 ba 8a 90 26 28 d4 cc a1 a8 9e 2f b5 |.......&(...../.| +peer0.org2.example.com | 00000020 fc 9b d7 0a 6a 02 20 2c ed 4a 62 87 c0 d5 27 65 |....j. ,.Jb...'e| +peer0.org2.example.com | 00000030 76 8c 5b 0d f0 5c 57 e1 52 14 32 7c 49 ec e9 1b |v.[..\W.R.2|I...| +peer0.org2.example.com | 00000040 a0 fc ff 7f be b6 c9 |.......| +peer0.org2.example.com | [478d 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [478e 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [478f 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4790 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org2.example.com | [4791 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4792 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [4793 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [4794 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 01 24 31 7f 14 c1 2b c5 b6 8c 37 ab 5c 65 be |..$1...+...7.\e.| +peer0.org2.example.com | 00000010 69 79 c5 5c 09 c9 b4 62 16 82 2d 7e 47 40 bc c5 |iy.\...b..-~G@..| +peer0.org2.example.com | [4795 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa d0 ca fb 28 92 78 b8 dc 68 46 |0E.!.....(.x..hF| +peer0.org2.example.com | 00000010 cc a0 de 06 1f 1e ab d4 a0 02 30 65 87 b0 5c b3 |..........0e..\.| +peer0.org2.example.com | 00000020 e8 89 d5 d9 02 02 20 03 f5 6a bd 54 66 b0 7f a8 |...... ..j.Tf...| +peer0.org2.example.com | 00000030 7c c3 0d e0 fb 41 e5 a0 b2 cf da 83 40 89 0e ba ||....A......@...| +peer0.org2.example.com | 00000040 ca 21 a1 73 b5 9b 81 |.!.s...| +peer0.org2.example.com | [4796 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4797 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4798 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4799 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [479a 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [479b 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [479c 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [479d 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [479e 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [479f 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [47a0 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [47a1 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ab550 gate 1598907149569063800 evaluation starts +peer0.org2.example.com | [47a2 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ab550 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [47a3 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ab550 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [47a4 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ab550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [47a5 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ab550 principal evaluation fails +peer0.org2.example.com | [47a6 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041ab550 gate 1598907149569063800 evaluation fails +peer0.org2.example.com | [47a7 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [47a8 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [47a9 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [47aa 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041abac0 gate 1598907149571856100 evaluation starts +peer0.org2.example.com | [47ab 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041abac0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [47ac 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041abac0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [47ad 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041abac0 principal matched by identity 0 +peer0.org2.example.com | [47ae 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 6f bc e6 0e 08 91 b2 0a 67 44 c2 14 2e dc 99 |.o.......gD.....| +peer0.org2.example.com | 00000010 d6 c7 15 c7 53 70 16 ae 4b 70 12 96 0c f6 e9 86 |....Sp..Kp......| +peer0.org2.example.com | [47af 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 fc 7d 0e ee ef b1 04 45 2d 8e |0E.!...}.....E-.| +peer0.org2.example.com | 00000010 b5 09 4e 13 39 28 76 7e 53 53 d0 bd 17 48 eb 7d |..N.9(v~SS...H.}| +peer0.org2.example.com | 00000020 2a 28 83 40 6c 02 20 55 00 c7 99 e9 e2 6c 60 8d |*(.@l. U.....l`.| +peer0.org2.example.com | 00000030 3a 32 f6 d1 cb 98 7b d9 21 47 a3 3c 8c 63 f4 9d |:2....{.!G.<.c..| +peer0.org2.example.com | 00000040 04 f5 d4 cc 5e b2 19 |....^..| +peer0.org2.example.com | [47b0 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041abac0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [47b1 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041abac0 gate 1598907149571856100 evaluation succeeds +peer0.org2.example.com | [47b2 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [47b3 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [47b4 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [47b5 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [47b6 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [47b7 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [47b8 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [47b9 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 c6 aa ca 4b 34 fb 28 1b f8 14 65 62 8b 48 9a |....K4.(...eb.H.| +peer0.org2.example.com | 00000010 25 8b 97 16 05 19 3a 40 85 36 e0 f5 0f f4 c9 e1 |%.....:@.6......| +peer0.org2.example.com | [47ba 08-31 20:52:29.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 8c 08 ce a8 0d f4 e2 1c 0f 72 |0E.!...........r| +peer0.org2.example.com | 00000010 af 0a d7 f2 ba 8a 90 26 28 d4 cc a1 a8 9e 2f b5 |.......&(...../.| +peer0.org2.example.com | 00000020 fc 9b d7 0a 6a 02 20 2c ed 4a 62 87 c0 d5 27 65 |....j. ,.Jb...'e| +peer0.org2.example.com | 00000030 76 8c 5b 0d f0 5c 57 e1 52 14 32 7c 49 ec e9 1b |v.[..\W.R.2|I...| +peer0.org2.example.com | 00000040 a0 fc ff 7f be b6 c9 |.......| +peer0.org2.example.com | [47bb 08-31 20:52:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [47bc 08-31 20:52:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [47bd 08-31 20:52:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [47be 08-31 20:52:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [47bf 08-31 20:52:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [47c0 08-31 20:52:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [47c1 08-31 20:52:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 01 24 31 7f 14 c1 2b c5 b6 8c 37 ab 5c 65 be |..$1...+...7.\e.| +peer0.org2.example.com | 00000010 69 79 c5 5c 09 c9 b4 62 16 82 2d 7e 47 40 bc c5 |iy.\...b..-~G@..| +peer0.org2.example.com | [47c2 08-31 20:52:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa d0 ca fb 28 92 78 b8 dc 68 46 |0E.!.....(.x..hF| +peer0.org2.example.com | 00000010 cc a0 de 06 1f 1e ab d4 a0 02 30 65 87 b0 5c b3 |..........0e..\.| +peer0.org2.example.com | 00000020 e8 89 d5 d9 02 02 20 03 f5 6a bd 54 66 b0 7f a8 |...... ..j.Tf...| +peer0.org2.example.com | 00000030 7c c3 0d e0 fb 41 e5 a0 b2 cf da 83 40 89 0e ba ||....A......@...| +peer0.org2.example.com | 00000040 ca 21 a1 73 b5 9b 81 |.!.s...| +peer0.org2.example.com | [47c3 08-31 20:52:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [47c4 08-31 20:52:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 53 ce 7c 97 fd 14 bc fb eb f9 a5 3d |0D. S.|........=| +peer0.org2.example.com | 00000010 4f b8 28 ec dc 66 98 8d 0f 6c 1b 45 b7 a5 b2 e2 |O.(..f...l.E....| +peer0.org2.example.com | 00000020 62 86 10 6a 02 20 1d 9a 43 36 bd b9 68 c9 0a fd |b..j. ..C6..h...| +peer0.org2.example.com | 00000030 19 62 a4 d6 92 9a 67 1b 07 5a ea 87 6a e8 60 46 |.b....g..Z..j.`F| +peer0.org2.example.com | 00000040 9f 1c d2 3c 47 4c |... DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [47c6 08-31 20:52:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [47c7 08-31 20:52:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [47c8 08-31 20:52:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [47c9 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [47ca 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [47cb 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [47cc 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [47cd 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [47ce 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [47cf 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [47d0 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [47d1 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [47d2 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [47d3 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [47d4 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [47d5 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041dac80 gate 1598907149629303800 evaluation starts +peer0.org2.example.com | [47d6 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041dac80 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [47d7 08-31 20:52:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041dac80 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [47d8 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041dac80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [47d9 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041dac80 principal evaluation fails +peer0.org2.example.com | [47da 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041dac80 gate 1598907149629303800 evaluation fails +peer0.org2.example.com | [47db 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [47dc 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [47dd 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [47de 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041db1f0 gate 1598907149633866800 evaluation starts +peer0.org2.example.com | [47df 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041db1f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [47e0 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041db1f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [47e1 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041db1f0 principal matched by identity 0 +peer0.org2.example.com | [47e2 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 5a 86 be 63 a7 6e 20 8f 01 e1 a2 d1 bb ca d9 |%Z..c.n ........| +peer0.org2.example.com | 00000010 1e 4a e9 e5 8b 87 7b ad 02 b4 45 62 b8 1f d5 ae |.J....{...Eb....| +peer0.org2.example.com | [47e3 08-31 20:52:29.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c f3 ad 47 07 f0 14 8f ed ba e7 82 |0D. \..G........| +peer0.org2.example.com | 00000010 88 2f 80 50 1f 5f 8b 79 6a 1c 34 31 74 52 55 2b |./.P._.yj.41tRU+| +peer0.org2.example.com | 00000020 58 76 00 c1 02 20 78 e3 70 86 d8 ef ba 05 43 d8 |Xv... x.p.....C.| +peer0.org2.example.com | 00000030 03 1d 97 bf 58 33 81 b8 ea 91 db 8d b0 f4 dd 9d |....X3..........| +peer0.org2.example.com | 00000040 08 d5 88 b9 8a 89 |......| +peer0.org2.example.com | [47e4 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041db1f0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [47e5 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041db1f0 gate 1598907149633866800 evaluation succeeds +peer0.org2.example.com | [47e6 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [47e7 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [47e8 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [47e9 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [422d 08-31 20:52:21.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [422e 08-31 20:52:21.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [422f 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4230 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4231 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +peer0.org1.example.com | [4232 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4233 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4234 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [4235 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4236 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [4237 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4238 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [4239 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [423a 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [423b 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [423c 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org1.example.com | [423d 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org1.example.com | [423e 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org1.example.com | [423f 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org1.example.com | [4240 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4241 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [47ea 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [47eb 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [47ec 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [47ed 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [47ee 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [47ef 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [47f0 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [47f1 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [47f2 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [47f3 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [47f4 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [47f5 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [47f6 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [47f7 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [47f8 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [47f9 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [47fa 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [47fb 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [47fc 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [47fd 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [47fe 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [47ff 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4800 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4801 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4802 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4803 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4804 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4805 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4806 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4807 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4808 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4242 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4243 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4244 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4245 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4246 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4247 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4248 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c460 gate 1598907141689947600 evaluation starts +peer0.org1.example.com | [4249 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c460 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [424a 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c460 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [424b 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [424c 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c460 principal evaluation fails +peer0.org1.example.com | [424d 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c460 gate 1598907141689947600 evaluation fails +peer0.org1.example.com | [424e 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [424f 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4250 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4251 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c9d0 gate 1598907141690224300 evaluation starts +peer0.org1.example.com | [4252 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c9d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4253 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c9d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4254 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4255 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c9d0 principal evaluation fails +peer0.org1.example.com | [4256 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [4257 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 783 bytes, Signature: 0 bytes +peer0.org1.example.com | [4258 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c9d0 gate 1598907141690224300 evaluation fails +peer0.org1.example.com | [4259 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [425a 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [425b 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [425c 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532cf40 gate 1598907141696488700 evaluation starts +peer0.org1.example.com | [425d 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532cf40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [425e 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532cf40 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [425f 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532cf40 principal matched by identity 0 +peer0.org1.example.com | [4260 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org1.example.com | [4261 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org1.example.com | [4262 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532cf40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4263 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532cf40 gate 1598907141696488700 evaluation succeeds +peer0.org1.example.com | [4264 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4265 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4266 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4267 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4268 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4269 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4809 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [480a 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [480b 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 bd 6c 71 9f 8e a3 e3 1e 7a ea 70 83 1b 6d c2 |2.lq.....z.p..m.| +peer0.org2.example.com | 00000010 6b bd 37 73 68 9b 81 0a 3f 03 7e 0e 9c c0 67 fa |k.7sh...?.~...g.| +peer0.org2.example.com | [480c 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 e8 be af 3f 71 01 48 4d 01 98 |0E.!.....?q.HM..| +peer0.org2.example.com | 00000010 1a d1 b5 b7 74 e0 51 a7 5d 96 02 84 74 ee 94 13 |....t.Q.]...t...| +peer0.org2.example.com | 00000020 0b b2 34 a3 8f 02 20 66 e8 c2 8a ef 06 0e 44 84 |..4... f......D.| +peer0.org2.example.com | 00000030 c8 93 19 72 c3 44 b0 2a 87 41 bf 53 b5 81 c1 f5 |...r.D.*.A.S....| +peer0.org2.example.com | 00000040 c7 cc 36 96 e6 2d 09 |..6..-.| +peer0.org2.example.com | [480d 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [480e 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [480f 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4810 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4811 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4812 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4813 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4814 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4815 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4816 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4817 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4818 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4819 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [481a 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [481b 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [481c 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [481d 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [481e 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [481f 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4820 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4821 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4822 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4823 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4824 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4825 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4826 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4827 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4828 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4829 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [482a 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [482b 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [482c 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [482d 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [482e 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4830 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [482f 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4831 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4832 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4833 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4834 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org2.example.com | [4835 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org2.example.com | [4836 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4837 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4838 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4839 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [483b 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [483a 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [483c 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [483d 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [483e 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [483f 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4840 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424a830 gate 1598907150165349000 evaluation starts +peer0.org2.example.com | [4841 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424a830 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4842 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424a830 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4843 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424a830 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4844 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424a830 principal evaluation fails +peer0.org2.example.com | [4845 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424a830 gate 1598907150165349000 evaluation fails +peer0.org1.example.com | [426a 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [426b 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [426c 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [426d 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [426e 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [426f 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4270 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e140 gate 1598907141706957500 evaluation starts +peer0.org1.example.com | [4271 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e140 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4272 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e140 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4273 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4274 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e140 principal evaluation fails +peer0.org1.example.com | [4275 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e140 gate 1598907141706957500 evaluation fails +peer0.org1.example.com | [4276 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4277 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4278 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4279 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e6b0 gate 1598907141709576500 evaluation starts +peer0.org1.example.com | [427a 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e6b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [427b 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e6b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [427c 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e6b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [427d 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e6b0 principal evaluation fails +peer0.org1.example.com | [427e 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e6b0 gate 1598907141709576500 evaluation fails +peer0.org1.example.com | [427f 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4280 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4281 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4282 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534ec20 gate 1598907141709814400 evaluation starts +peer0.org1.example.com | [4283 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534ec20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4284 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534ec20 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4285 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534ec20 principal matched by identity 0 +peer0.org1.example.com | [4286 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org1.example.com | [4287 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org1.example.com | [4288 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534ec20 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4289 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534ec20 gate 1598907141709814400 evaluation succeeds +peer0.org1.example.com | [428a 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [428b 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [428c 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [428d 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [428e 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [428f 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4290 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4291 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4292 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4293 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4294 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534f760 gate 1598907141711140600 evaluation starts +peer0.org1.example.com | [4295 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534f760 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4296 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534f760 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4297 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534f760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4298 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534f760 principal evaluation fails +peer0.org1.example.com | [4299 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534f760 gate 1598907141711140600 evaluation fails +peer0.org1.example.com | [429a 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [429b 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [429c 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [429d 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534fcd0 gate 1598907141712108800 evaluation starts +peer0.org1.example.com | [429e 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534fcd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [429f 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534fcd0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [42a0 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534fcd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [42a1 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534fcd0 principal evaluation fails +peer0.org1.example.com | [42a2 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534fcd0 gate 1598907141712108800 evaluation fails +peer0.org1.example.com | [42a3 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [42a4 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [42a5 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [42a6 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366240 gate 1598907141713073600 evaluation starts +peer0.org1.example.com | [42a7 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366240 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [42a8 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366240 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [42a9 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366240 principal matched by identity 0 +peer0.org1.example.com | [42aa 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org1.example.com | [42ab 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org1.example.com | [42ac 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366240 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [42ad 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366240 gate 1598907141713073600 evaluation succeeds +peer0.org1.example.com | [42ae 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [42af 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [42b0 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [42b1 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [42b2 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [42b3 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +peer0.org1.example.com | [42b4 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org1.example.com | [42b5 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org1.example.com | [42b6 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42b7 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4846 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4847 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4848 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4849 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424ada0 gate 1598907150165882000 evaluation starts +peer0.org2.example.com | [484a 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424ada0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [484b 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424ada0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [484c 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424ada0 principal matched by identity 0 +peer0.org2.example.com | [484d 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org2.example.com | [484e 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org2.example.com | [484f 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424ada0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4850 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424ada0 gate 1598907150165882000 evaluation succeeds +peer0.org2.example.com | [4851 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4852 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4853 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4854 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4855 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4856 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4857 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4858 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4859 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [485a 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [485b 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [485c 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [485d 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424bfa0 gate 1598907150168007500 evaluation starts +peer0.org2.example.com | [485e 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424bfa0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [485f 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424bfa0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4860 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424bfa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4861 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424bfa0 principal evaluation fails +peer0.org2.example.com | [4862 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424bfa0 gate 1598907150168007500 evaluation fails +peer0.org2.example.com | [4863 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4864 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4865 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4866 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425e510 gate 1598907150169165000 evaluation starts +peer0.org2.example.com | [4867 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425e510 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4868 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425e510 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4869 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425e510 principal matched by identity 0 +peer0.org1.example.com | [42b8 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [42b9 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [42ba 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [42bb 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [42bc 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [42bd 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [42be 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367cd0 gate 1598907141716015400 evaluation starts +peer0.org1.example.com | [42bf 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367cd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [42c0 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367cd0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [42c1 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [42c2 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367cd0 principal evaluation fails +peer0.org1.example.com | [42c3 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367cd0 gate 1598907141716015400 evaluation fails +peer0.org1.example.com | [42c4 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [42c5 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [42c6 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [42c7 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e240 gate 1598907141720997900 evaluation starts +peer0.org1.example.com | [42c8 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e240 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [42c9 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e240 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [42ca 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [42cb 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e240 principal evaluation fails +peer0.org1.example.com | [42cc 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e240 gate 1598907141720997900 evaluation fails +peer0.org1.example.com | [42cd 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [42ce 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [42cf 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [42d0 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e7b0 gate 1598907141721544300 evaluation starts +peer0.org1.example.com | [42d1 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e7b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [42d2 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e7b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [42d3 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e7b0 principal matched by identity 0 +peer0.org1.example.com | [42d4 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +peer0.org1.example.com | 00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +peer0.org1.example.com | [42d5 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +peer0.org1.example.com | 00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +peer0.org1.example.com | 00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +peer0.org1.example.com | 00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +peer0.org1.example.com | 00000040 9c 30 13 97 0e fc |.0....| +peer0.org1.example.com | [42d6 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e7b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [42d7 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e7b0 gate 1598907141721544300 evaluation succeeds +peer0.org1.example.com | [42d8 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [42d9 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [42da 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [42db 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [42dc 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [42dd 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [486a 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org2.example.com | [486b 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org2.example.com | [486c 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425e510 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [486d 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00425e510 gate 1598907150169165000 evaluation succeeds +peer0.org2.example.com | [486e 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [486f 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4870 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4871 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4872 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org2.example.com | [4873 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org2.example.com | [4874 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4875 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4876 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4877 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4878 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4879 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [487a 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [487b 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [487c 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [487d 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [487e 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [487f 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004278050 gate 1598907150173487200 evaluation starts +peer0.org2.example.com | [4880 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004278050 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4881 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004278050 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4882 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004278050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4883 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004278050 principal evaluation fails +peer0.org2.example.com | [4884 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004278050 gate 1598907150173487200 evaluation fails +peer0.org2.example.com | [4885 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4886 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4887 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4888 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042785c0 gate 1598907150174797600 evaluation starts +peer0.org2.example.com | [4889 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042785c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [488a 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042785c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [42de 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [42df 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [42e0 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [42e1 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [42e2 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [42e3 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [42e4 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537f9b0 gate 1598907141725352700 evaluation starts +peer0.org1.example.com | [42e5 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537f9b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [42e6 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537f9b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [42e7 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537f9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [42e8 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537f9b0 principal evaluation fails +peer0.org1.example.com | [42e9 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537f9b0 gate 1598907141725352700 evaluation fails +peer0.org1.example.com | [42ea 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [42eb 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [42ec 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [42ed 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537ff20 gate 1598907141727622400 evaluation starts +peer0.org1.example.com | [42ee 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537ff20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [42ef 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537ff20 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [42f0 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537ff20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [42f1 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537ff20 principal evaluation fails +peer0.org1.example.com | [42f2 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537ff20 gate 1598907141727622400 evaluation fails +peer0.org1.example.com | [42f3 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [42f4 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [42f5 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [42f6 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539c490 gate 1598907141729304800 evaluation starts +peer0.org1.example.com | [42f7 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539c490 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [42f8 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539c490 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [42f9 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539c490 principal matched by identity 0 +peer0.org1.example.com | [42fa 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org1.example.com | [42fb 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org1.example.com | [42fc 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539c490 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [42fd 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539c490 gate 1598907141729304800 evaluation succeeds +peer0.org1.example.com | [42fe 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [42ff 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4300 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4301 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4302 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org1.example.com | [4303 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org1.example.com | [4304 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4305 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4306 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4307 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4308 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4309 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [430a 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +peer0.org1.example.com | LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +peer0.org1.example.com | Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +peer0.org1.example.com | kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +peer0.org1.example.com | BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +peer0.org1.example.com | AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +peer0.org1.example.com | XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [430b 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539d610 gate 1598907141732150700 evaluation starts +peer0.org1.example.com | [430c 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539d610 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [430d 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539d610 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [430e 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539d610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org1.example.com | [430f 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539d610 principal evaluation fails +peer0.org1.example.com | [4310 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539d610 gate 1598907141732150700 evaluation fails +peer0.org1.example.com | [4311 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4312 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4313 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4314 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053bc460 gate 1598907141732536000 evaluation starts +peer0.org1.example.com | [4315 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053bc460 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4316 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053bc460 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4317 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [4318 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [4319 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [431a 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053bc460 principal matched by identity 0 +peer0.org1.example.com | [431b 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org1.example.com | [431c 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org1.example.com | [431d 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053bc460 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [431e 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053bc460 gate 1598907141732536000 evaluation succeeds +peer0.org1.example.com | [431f 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4320 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4321 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4322 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4323 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4324 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 783 bytes, Signature: 0 bytes +peer0.org1.example.com | [4325 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4326 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +peer0.org1.example.com | 00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +peer0.org1.example.com | [4327 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +peer0.org1.example.com | 00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +peer0.org1.example.com | 00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +peer0.org1.example.com | 00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +peer0.org1.example.com | 00000040 aa cd d6 30 b0 82 e3 |...0...| +peer0.org1.example.com | [4328 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +peer0.org1.example.com | 00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +peer0.org1.example.com | [4329 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +peer0.org1.example.com | 00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +peer0.org1.example.com | 00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +peer0.org1.example.com | 00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +peer0.org1.example.com | 00000040 8d 22 17 b0 af d9 4b |."....K| +peer0.org1.example.com | [432a 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [432b 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [432c 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [432d 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [432e 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [432f 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4330 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4331 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4332 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053da920 gate 1598907141736943100 evaluation starts +peer0.org1.example.com | [4333 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053da920 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4334 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053da920 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4335 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053da920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4336 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053da920 principal evaluation fails +peer0.org1.example.com | [4337 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053da920 gate 1598907141736943100 evaluation fails +peer0.org1.example.com | [4338 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4339 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [433a 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [433b 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053dae90 gate 1598907141739090500 evaluation starts +peer0.org1.example.com | [433c 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053dae90 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [433d 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053dae90 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [433e 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053dae90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [433f 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053dae90 principal evaluation fails +peer0.org1.example.com | [4340 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053dae90 gate 1598907141739090500 evaluation fails +peer0.org1.example.com | [4341 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4342 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4343 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4344 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053db400 gate 1598907141740456700 evaluation starts +peer0.org1.example.com | [4345 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053db400 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4346 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053db400 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4347 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053db400 principal matched by identity 0 +peer0.org1.example.com | [4348 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +peer0.org1.example.com | 00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +peer0.org1.example.com | [4349 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +peer0.org1.example.com | 00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +peer0.org1.example.com | 00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +peer0.org1.example.com | 00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +peer0.org1.example.com | 00000040 41 a3 44 15 ec f1 bb |A.D....| +peer0.org1.example.com | [434a 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053db400 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [434b 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053db400 gate 1598907141740456700 evaluation succeeds +peer0.org1.example.com | [434c 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [434d 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [434e 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [434f 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4350 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4351 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4352 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4353 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4354 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4355 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4356 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4357 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4358 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4600 gate 1598907141742222000 evaluation starts +peer0.org1.example.com | [4359 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4600 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [435a 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4600 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [435b 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [435c 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4600 principal evaluation fails +peer0.org1.example.com | [435d 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4600 gate 1598907141742222000 evaluation fails +peer0.org1.example.com | [435e 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [435f 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4360 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4361 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4b70 gate 1598907141742787000 evaluation starts +peer0.org1.example.com | [4362 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4b70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4363 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4b70 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4364 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4365 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4b70 principal evaluation fails +peer0.org1.example.com | [4366 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4b70 gate 1598907141742787000 evaluation fails +peer0.org1.example.com | [4367 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4368 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4369 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [436a 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f50e0 gate 1598907141743328100 evaluation starts +peer0.org1.example.com | [436b 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f50e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [436c 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f50e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [436d 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f50e0 principal matched by identity 0 +peer0.org1.example.com | [436e 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org1.example.com | [436f 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org1.example.com | [4370 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f50e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4371 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f50e0 gate 1598907141743328100 evaluation succeeds +peer0.org1.example.com | [4372 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4373 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4374 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [488b 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042785c0 principal matched by identity 0 +peer0.org2.example.com | [488c 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org2.example.com | [488d 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org2.example.com | [488e 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042785c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [488f 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042785c0 gate 1598907150174797600 evaluation succeeds +peer0.org2.example.com | [4890 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4891 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4892 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4893 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4894 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org2.example.com | [4895 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org2.example.com | [4896 08-31 20:52:30.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4897 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4898 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4899 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [489a 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [489b 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [489c 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [489d 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [489e 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004279eb0 gate 1598907150182391300 evaluation starts +peer0.org2.example.com | [489f 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004279eb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [48a0 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004279eb0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [48a1 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004279eb0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [48a2 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004279eb0 principal evaluation fails +peer0.org2.example.com | [48a3 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004279eb0 gate 1598907150182391300 evaluation fails +peer0.org2.example.com | [48a4 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [48a5 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [48a6 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [48a7 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004292420 gate 1598907150185113400 evaluation starts +peer0.org2.example.com | [48a8 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004292420 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [48a9 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004292420 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [48aa 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004292420 principal matched by identity 0 +peer0.org2.example.com | [48ab 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org2.example.com | [48ac 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org2.example.com | [48ad 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004292420 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [48ae 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004292420 gate 1598907150185113400 evaluation succeeds +peer0.org2.example.com | [48af 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [48b0 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [48b1 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [48b2 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [48b3 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org2.example.com | [48b4 08-31 20:52:30.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org2.example.com | [48b5 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48b6 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [48b7 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [48b8 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [48b9 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [48ba 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [48bb 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [48bc 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [48bd 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [48be 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [48bf 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [48c0 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004293f60 gate 1598907150191978500 evaluation starts +peer0.org2.example.com | [48c1 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004293f60 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [48c2 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004293f60 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [48c3 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004293f60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [48c4 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004293f60 principal evaluation fails +peer0.org2.example.com | [48c5 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004293f60 gate 1598907150191978500 evaluation fails +peer0.org2.example.com | [48c6 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [48c7 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [48c8 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [48c9 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ac4d0 gate 1598907150195306800 evaluation starts +peer0.org2.example.com | [48ca 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ac4d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [48cb 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ac4d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [48cc 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ac4d0 principal matched by identity 0 +peer0.org2.example.com | [48cd 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org2.example.com | [48ce 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org2.example.com | [48cf 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ac4d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [48d0 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ac4d0 gate 1598907150195306800 evaluation succeeds +peer0.org2.example.com | [48d1 08-31 20:52:30.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [48d2 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [48d3 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [48d4 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [48d5 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [48d6 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [48d7 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [48d8 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [48d9 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [48da 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [48db 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [48dc 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [48dd 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ad6d0 gate 1598907150202063400 evaluation starts +peer0.org2.example.com | [48de 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ad6d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [48df 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ad6d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [48e0 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ad6d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [48e1 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ad6d0 principal evaluation fails +peer0.org2.example.com | [48e2 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042ad6d0 gate 1598907150202063400 evaluation fails +peer0.org2.example.com | [48e3 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [48e4 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [48e5 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [48e6 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042adc40 gate 1598907150203885600 evaluation starts +peer0.org2.example.com | [48e7 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042adc40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [48e8 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042adc40 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [48e9 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042adc40 principal matched by identity 0 +peer0.org2.example.com | [48ea 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org2.example.com | [48eb 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org2.example.com | [48ec 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042adc40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [48ed 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042adc40 gate 1598907150203885600 evaluation succeeds +peer0.org2.example.com | [48ee 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [48ef 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [48f0 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [48f1 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [48f2 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org2.example.com | [48f3 08-31 20:52:30.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org2.example.com | [48f4 08-31 20:52:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org2.example.com | [48f5 08-31 20:52:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org2.example.com | [48f6 08-31 20:52:30.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48f7 08-31 20:52:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [48f8 08-31 20:52:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [48f9 08-31 20:52:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [48fa 08-31 20:52:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [48fb 08-31 20:52:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [48fc 08-31 20:52:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [48fd 08-31 20:52:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [48fe 08-31 20:52:30.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [48ff 08-31 20:52:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [4900 08-31 20:52:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [4901 08-31 20:52:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org2.example.com | [4902 08-31 20:52:30.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4903 08-31 20:52:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:38108 +peer0.org2.example.com | [4904 08-31 20:52:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0042af630 +peer0.org2.example.com | [4905 08-31 20:52:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [4906 08-31 20:52:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [4907 08-31 20:52:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [4908 08-31 20:52:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [4909 08-31 20:52:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 80 54 a1 be 6f 61 b6 a8 94 f6 5c d9 33 58 08 |..T..oa....\.3X.| +peer0.org2.example.com | 00000010 e6 7f 08 c4 ab e4 d0 6d be d5 21 30 32 66 c6 41 |.......m..!02f.A| +peer0.org2.example.com | [490a 08-31 20:52:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 a4 5c fe f6 91 28 d3 5b b8 83 |0E.!...\...(.[..| +peer0.org2.example.com | 00000010 c7 14 f5 cd 01 d9 7d b6 e9 a4 af d9 12 5a a3 3e |......}......Z.>| +peer0.org2.example.com | 00000020 42 19 78 16 d0 02 20 17 4d d9 af 65 c0 d9 60 69 |B.x... .M..e..`i| +peer0.org2.example.com | 00000030 05 94 13 c8 25 ca 53 8c 5d 74 b5 54 07 01 4f a8 |....%.S.]t.T..O.| +peer0.org2.example.com | 00000040 ab 07 09 4a f8 ff 53 |...J..S| +peer0.org2.example.com | [490b 08-31 20:52:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [490c 08-31 20:52:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00429a3f0, header 0xc0042afa40 +peer0.org2.example.com | [490d 08-31 20:52:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org2.example.com | [490e 08-31 20:52:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU [][9d8fcd62] processing txid: 9d8fcd6221eef37b0e5e3906536c8f63b7fa9569f601e2bebf906454c45652a3 +peer0.org2.example.com | [490f 08-31 20:52:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU [][9d8fcd62] Entry chaincode: name:"cscc" +peer0.org2.example.com | [4910 08-31 20:52:30.26 UTC] [%{longpkg}] %{callpath} -> INFO [][9d8fcd62] Entry chaincode: name:"cscc" +peer0.org2.example.com | [4911 08-31 20:52:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [4912 08-31 20:52:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer0.org2.example.com | [4913 08-31 20:52:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 80 54 a1 be 6f 61 b6 a8 94 f6 5c d9 33 58 08 |..T..oa....\.3X.| +peer0.org2.example.com | 00000010 e6 7f 08 c4 ab e4 d0 6d be d5 21 30 32 66 c6 41 |.......m..!02f.A| +peer0.org2.example.com | [4914 08-31 20:52:30.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b2 a4 5c fe f6 91 28 d3 5b b8 83 |0E.!...\...(.[..| +peer0.org2.example.com | 00000010 c7 14 f5 cd 01 d9 7d b6 e9 a4 af d9 12 5a a3 3e |......}......Z.>| +peer0.org2.example.com | 00000020 42 19 78 16 d0 02 20 17 4d d9 af 65 c0 d9 60 69 |B.x... .M..e..`i| +peer0.org2.example.com | 00000030 05 94 13 c8 25 ca 53 8c 5d 74 b5 54 07 01 4f a8 |....%.S.]t.T..O.| +peer0.org2.example.com | 00000040 ab 07 09 4a f8 ff 53 |...J..S| +peer0.org2.example.com | [4915 08-31 20:52:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU [9d8fcd62] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [4916 08-31 20:52:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU [9d8fcd62] notifying Txid:9d8fcd6221eef37b0e5e3906536c8f63b7fa9569f601e2bebf906454c45652a3, channelID: +peer0.org2.example.com | [4917 08-31 20:52:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [4918 08-31 20:52:30.27 UTC] [%{longpkg}] %{callpath} -> INFO [][9d8fcd62] Exit chaincode: name:"cscc" (2ms) +peer0.org2.example.com | [4919 08-31 20:52:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU [][9d8fcd62] Exit +peer0.org2.example.com | [491a 08-31 20:52:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:38108 +peer0.org2.example.com | [491b 08-31 20:52:30.27 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:38108 grpc.code=OK grpc.call_duration=3.9662ms +peer0.org2.example.com | [491c 08-31 20:52:30.27 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [491d 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [491e 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [491f 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4920 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4921 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4922 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4923 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4924 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4925 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4926 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4927 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4928 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4929 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431d170 gate 1598907150300063000 evaluation starts +peer0.org2.example.com | [492a 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431d170 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [492b 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431d170 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [492c 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431d170 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [492d 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [492e 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [492f 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431d170 principal evaluation fails +peer0.org2.example.com | [4930 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431d170 gate 1598907150300063000 evaluation fails +peer0.org2.example.com | [4931 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4932 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4933 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4934 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431d6e0 gate 1598907150303858100 evaluation starts +peer0.org2.example.com | [4935 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431d6e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4936 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431d6e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4937 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431d6e0 principal matched by identity 0 +peer0.org2.example.com | [4938 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 77 41 19 c8 60 ea ba ef a0 ff 82 07 fa 98 |.twA..`.........| +peer0.org2.example.com | 00000010 25 53 c0 aa 29 fd cb ed 6d b8 03 70 30 6b 4d 17 |%S..)...m..p0kM.| +peer0.org2.example.com | [4939 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 43 51 f7 a3 56 a4 5b 3f 67 7d |0E.!..CQ..V.[?g}| +peer0.org2.example.com | 00000010 38 74 79 85 40 54 10 89 ce e5 61 a1 89 f6 09 ca |8ty.@T....a.....| +peer0.org2.example.com | 00000020 cb 18 9c d8 c7 02 20 2b 73 d9 66 06 2c d4 a3 14 |...... +s.f.,...| +peer0.org2.example.com | 00000030 07 27 18 58 7d a8 94 71 d3 5a 7c 62 4a a7 fd f1 |.'.X}..q.Z|bJ...| +peer0.org2.example.com | 00000040 f6 12 2f f6 34 d4 15 |../.4..| +peer0.org2.example.com | [493a 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431d6e0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [493b 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00431d6e0 gate 1598907150303858100 evaluation succeeds +peer0.org2.example.com | [493c 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [493d 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [493e 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [493f 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4940 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4941 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [4942 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4943 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4944 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4945 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4946 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4947 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4948 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4949 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [494a 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [494b 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [494c 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [494d 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [494e 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [494f 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4950 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4951 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4952 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4953 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4954 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4955 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4956 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4957 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [4958 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4959 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org2.example.com | [495a 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [495b 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [495c 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [495d 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [495e 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [495f 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4960 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4961 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4962 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4963 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4964 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D9816103F +peer0.org2.example.com | [4965 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5B975E88BD3EB981A80BE748CBEE53B3D377957E0E16CB07DD0964F46D05DE6F +peer0.org2.example.com | [4966 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4967 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [4968 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [4969 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org2.example.com | [496a 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [496b 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [496c 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +peer0.org2.example.com | [496d 08-31 20:52:30.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [496e 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [496f 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4970 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4971 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4972 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [4973 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4974 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4975 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4976 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4977 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [4978 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [4979 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org2.example.com | [497a 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 5 6 1] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [497b 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [497c 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [497d 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [497e 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [497f 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4980 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [4981 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4982 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4983 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4984 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4985 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4986 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4987 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4988 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043610b0 gate 1598907150526284000 evaluation starts +peer0.org2.example.com | [4989 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043610b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [498a 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043610b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [498b 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043610b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [498c 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043610b0 principal evaluation fails +peer0.org2.example.com | [498d 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043610b0 gate 1598907150526284000 evaluation fails +peer0.org2.example.com | [498e 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [498f 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4990 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4991 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004361620 gate 1598907150526555900 evaluation starts +peer0.org2.example.com | [4992 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004361620 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4993 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004361620 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4994 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004361620 principal matched by identity 0 +peer0.org2.example.com | [4995 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 24 c0 e0 c1 94 ff b0 1a 55 7e 49 78 80 c9 02 |.$.......U~Ix...| +peer0.org2.example.com | 00000010 ff ee 36 0a e4 df 30 e7 56 b1 07 41 60 f3 e4 e1 |..6...0.V..A`...| +peer0.org2.example.com | [4996 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 10 1a 4b 31 13 65 02 e6 d8 79 3c |0D. E..K1.e...y<| +peer0.org2.example.com | 00000010 aa dc 82 d1 8a b1 38 c1 6d 5d d1 fb 37 1a 45 c1 |......8.m]..7.E.| +peer0.org2.example.com | 00000020 c0 db d6 f8 02 20 3f b2 f3 a6 be c1 de 78 fc 4d |..... ?......x.M| +peer0.org2.example.com | 00000030 66 1f 72 af b4 33 76 12 2b 46 a1 80 5a 01 ab de |f.r..3v.+F..Z...| +peer0.org2.example.com | 00000040 a9 7f 42 7c 4b 33 |..B|K3| +peer0.org2.example.com | [4997 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004361620 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4998 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004361620 gate 1598907150526555900 evaluation succeeds +peer0.org2.example.com | [4999 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [499a 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [499b 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [499c 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [499d 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [499e 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [499f 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [49a0 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [49a1 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [49a2 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49a3 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49a4 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49a5 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [49a6 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [49a7 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49a8 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [49a9 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49aa 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [49ab 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [49ac 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [49ad 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [49ae 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [49af 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [49b0 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [49b1 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [49b2 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [49b3 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org2.example.com | [49b4 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [49b5 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49b6 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [49b7 08-31 20:52:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49b8 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [49b9 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [49ba 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49bb 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [49bc 08-31 20:52:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [49bd 08-31 20:52:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:38116 +peer0.org2.example.com | [49be 08-31 20:52:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00436a960 +peer0.org2.example.com | [49bf 08-31 20:52:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org2.example.com | [49c0 08-31 20:52:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org2.example.com | [49c1 08-31 20:52:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +peer0.org2.example.com | [49c2 08-31 20:52:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org2.example.com | [49c3 08-31 20:52:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 c7 f4 67 d4 89 a4 b9 42 21 af 03 dd 6e 70 02 |b..g....B!...np.| +peer0.org2.example.com | 00000010 ad 17 83 57 3f f2 00 35 81 63 8e 8d 33 93 c2 88 |...W?..5.c..3...| +peer0.org2.example.com | [49c4 08-31 20:52:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 05 44 5c a7 c8 ee 79 a8 f3 ee |0E.!...D\...y...| +peer0.org2.example.com | 00000010 52 a9 39 59 dc d4 73 d1 ca c4 56 42 21 88 4b 93 |R.9Y..s...VB!.K.| +peer0.org2.example.com | 00000020 29 55 43 e7 0e 02 20 08 eb 1c a5 dc c0 a6 86 fb |)UC... .........| +peer0.org2.example.com | 00000030 cb 18 61 e0 2e e6 78 23 99 d9 73 13 9d 28 42 5a |..a...x#..s..(BZ| +peer0.org2.example.com | 00000040 34 eb 85 1b 85 17 dc |4......| +peer0.org2.example.com | [49c5 08-31 20:52:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org2.example.com | [49c6 08-31 20:52:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc004029c00, header 0xc00436ad70 +peer0.org2.example.com | [49c7 08-31 20:52:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org2.example.com | [49c8 08-31 20:52:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU [][881f3bf1] processing txid: 881f3bf1f3cbd2a5e3cbe432ea75386cc208094b9412e7aed9992b707156dd7d +peer0.org2.example.com | [49c9 08-31 20:52:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU [][881f3bf1] Entry chaincode: name:"qscc" +peer0.org2.example.com | [49ca 08-31 20:52:31.21 UTC] [%{longpkg}] %{callpath} -> INFO [][881f3bf1] Entry chaincode: name:"qscc" +peer0.org2.example.com | [49cb 08-31 20:52:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org2.example.com | [49cc 08-31 20:52:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer0.org2.example.com | [49cd 08-31 20:52:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer0.org2.example.com | [49ce 08-31 20:52:31.21 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org2.example.com | [49cf 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [49d0 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [49d1 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [49d2 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [49d3 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org2.example.com | MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +peer0.org2.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org2.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org2.example.com | Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org2.example.com | WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org2.example.com | U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +peer0.org2.example.com | ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +peer0.org2.example.com | uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +peer0.org2.example.com | yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +peer0.org2.example.com | HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +peer0.org2.example.com | PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +peer0.org2.example.com | DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +peer0.org2.example.com | -----END CERTIFICATE----- +peer0.org2.example.com | [49d4 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bd120 gate 1598907151220389800 evaluation starts +peer0.org2.example.com | [49d5 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bd120 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [49d6 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bd120 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [49d7 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bd120 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org2.example.com | [49d8 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bd120 principal evaluation fails +peer0.org2.example.com | [49d9 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bd120 gate 1598907151220389800 evaluation fails +peer0.org2.example.com | [49da 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [49db 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [49dc 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [49dd 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bdf70 gate 1598907151220690300 evaluation starts +peer0.org2.example.com | [49de 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bdf70 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [49df 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bdf70 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [49e0 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bdf70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org2.example.com | [49e1 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bdf70 principal evaluation fails +peer0.org2.example.com | [49e2 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043bdf70 gate 1598907151220690300 evaluation fails +peer0.org2.example.com | [49e3 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [49e4 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [49e5 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org2.example.com | [49e6 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d4500 gate 1598907151221171900 evaluation starts +peer0.org2.example.com | [49e7 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d4500 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [49e8 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d4500 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [49e9 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +peer0.org2.example.com | [49ea 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +peer0.org2.example.com | [49eb 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +peer0.org2.example.com | [49ec 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d4500 principal matched by identity 0 +peer0.org2.example.com | [49ed 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 62 c7 f4 67 d4 89 a4 b9 42 21 af 03 dd 6e 70 02 |b..g....B!...np.| +peer0.org2.example.com | 00000010 ad 17 83 57 3f f2 00 35 81 63 8e 8d 33 93 c2 88 |...W?..5.c..3...| +peer0.org2.example.com | [49ee 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 aa 05 44 5c a7 c8 ee 79 a8 f3 ee |0E.!...D\...y...| +peer0.org2.example.com | 00000010 52 a9 39 59 dc d4 73 d1 ca c4 56 42 21 88 4b 93 |R.9Y..s...VB!.K.| +peer0.org2.example.com | 00000020 29 55 43 e7 0e 02 20 08 eb 1c a5 dc c0 a6 86 fb |)UC... .........| +peer0.org2.example.com | 00000030 cb 18 61 e0 2e e6 78 23 99 d9 73 13 9d 28 42 5a |..a...x#..s..(BZ| +peer0.org2.example.com | 00000040 34 eb 85 1b 85 17 dc |4......| +peer0.org2.example.com | [49ef 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d4500 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [49f0 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043d4500 gate 1598907151221171900 evaluation succeeds +peer0.org2.example.com | [49f1 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [49f2 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org2.example.com | [49f3 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [49f4 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [49f5 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU [881f3bf1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org2.example.com | [49f6 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU [881f3bf1] notifying Txid:881f3bf1f3cbd2a5e3cbe432ea75386cc208094b9412e7aed9992b707156dd7d, channelID: +peer0.org2.example.com | [49f7 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org2.example.com | [49f8 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> INFO [][881f3bf1] Exit chaincode: name:"qscc" (2ms) +peer0.org2.example.com | [49f9 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU [][881f3bf1] Exit +peer0.org2.example.com | [49fa 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:38116 +peer0.org2.example.com | [49fb 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:38116 grpc.code=OK grpc.call_duration=3.7259ms +peer0.org2.example.com | [49fc 08-31 20:52:31.22 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org2.example.com | [49fd 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [49fe 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [49ff 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a00 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [4a01 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a02 08-31 20:52:33.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\016\30674\267\306\376s\262\365q\245SW\305\006\261\235g|\002 +\032\306\t\225ch\323\\\2469\303n&\205\262\324\272\337\262\247/\324\023\203d\036\352\330\263#<" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a03 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\016\30674\267\306\376s\262\365q\245SW\305\006\261\235g|\002 +\032\306\t\225ch\323\\\2469\303n&\205\262\324\272\337\262\247/\324\023\203d\036\352\330\263#<" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a04 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a05 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\016\30674\267\306\376s\262\365q\245SW\305\006\261\235g|\002 +\032\306\t\225ch\323\\\2469\303n&\205\262\324\272\337\262\247/\324\023\203d\036\352\330\263#<" > > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a06 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [4a07 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 3d 51 34 f1 97 74 34 15 c7 4c fc 7e 6c 2a a0 |v=Q4..t4..L.~l*.| +peer0.org2.example.com | 00000010 b2 3b 9a 0a 78 9f 8f e4 c9 ec 76 80 d4 b7 bb 58 |.;..x.....v....X| +peer0.org2.example.com | [4a08 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 10 04 a6 70 23 1c b6 86 2b ff |0E.!.....p#...+.| +peer0.org2.example.com | 00000010 b8 0b 1b ac 7a ac 2a 42 95 43 98 b7 8b a3 61 c5 |....z.*B.C....a.| +peer0.org2.example.com | 00000020 3a 28 95 71 35 02 20 67 04 bc 00 5b f0 ae 51 73 |:(.q5. g...[..Qs| +peer0.org2.example.com | 00000030 43 b6 79 40 3f be 83 f7 1b 13 5a 8d 6f 94 51 86 |C.y@?.....Z.o.Q.| +peer0.org2.example.com | 00000040 87 86 e0 99 79 9f fe |....y..| +peer0.org2.example.com | [4a09 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 dc b4 76 0c 57 7e 9b 4e 2a 28 0c b2 2e a6 97 |...v.W~.N*(.....| +peer0.org2.example.com | 00000010 9c 16 74 8d 7f d4 6d cf d4 00 2d 86 50 ca d2 85 |..t...m...-.P...| +peer0.org2.example.com | [4a0a 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 36 d6 12 0f 0f 1b 40 10 eb 24 3e |0D. .6.....@..$>| +peer0.org2.example.com | 00000010 0e c6 37 34 b7 c6 fe 73 b2 f5 71 a5 53 57 c5 06 |..74...s..q.SW..| +peer0.org2.example.com | 00000020 b1 9d 67 7c 02 20 2b 1a c6 09 95 63 68 d3 5c a6 |..g|. +....ch.\.| +peer0.org2.example.com | 00000030 39 c3 6e 26 85 b2 d4 ba df b2 a7 2f d4 13 83 64 |9.n&......./...d| +peer0.org2.example.com | 00000040 1e ea d8 b3 23 3c |....#<| +peer0.org2.example.com | [4a0b 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [4a0c 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +peer0.org2.example.com | [4a0d 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4a0e 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4a0f 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4a10 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a11 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a12 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a13 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org2.example.com | [4a14 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a15 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a16 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4a17 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\016\30674\267\306\376s\262\365q\245SW\305\006\261\235g|\002 +\032\306\t\225ch\323\\\2469\303n&\205\262\324\272\337\262\247/\324\023\203d\036\352\330\263#<" > > alive: +peer0.org2.example.com | [4a18 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a19 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a1a 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a1b 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a1c 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a1d 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a1e 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a1f 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a20 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a21 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a22 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a23 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org2.example.com | [4a24 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a25 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a26 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a27 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a28 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a29 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4a2a 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a2b 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4a2c 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4a2d 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4a2e 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4a2f 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4a30 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4a31 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044220a0 gate 1598907153307361900 evaluation starts +peer0.org2.example.com | [4a32 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044220a0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4a33 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044220a0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4a34 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044220a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4a35 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044220a0 principal evaluation fails +peer0.org2.example.com | [4a36 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044220a0 gate 1598907153307361900 evaluation fails +peer0.org2.example.com | [4a37 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4a38 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4a39 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4a3a 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004422610 gate 1598907153307717700 evaluation starts +peer0.org2.example.com | [4a3b 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004422610 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4a3c 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004422610 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4a3d 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004422610 principal matched by identity 0 +peer0.org2.example.com | [4a3e 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba dc 22 10 42 58 d5 cc db bd 89 d2 6a 48 76 6a |..".BX......jHvj| +peer0.org2.example.com | 00000010 46 d8 12 dd 64 60 f0 ea 98 0f a1 9d 5a c7 e9 b9 |F...d`......Z...| +peer0.org2.example.com | [4a3f 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 2c ea 98 60 5b 8e 3d 4e 82 97 |0E.!..,..`[.=N..| +peer0.org2.example.com | 00000010 ab 55 59 95 9f 4b aa ab 4d c3 36 4a 89 d5 10 b8 |.UY..K..M.6J....| +peer0.org2.example.com | 00000020 5a 08 aa b3 59 02 20 5e 7b 39 87 3f 2a 0a 55 ef |Z...Y. ^{9.?*.U.| +peer0.org2.example.com | 00000030 74 f1 98 55 c8 02 84 85 ba 07 e4 e8 c3 14 82 a3 |t..U............| +peer0.org2.example.com | 00000040 e9 68 33 cb 87 fd 42 |.h3...B| +peer0.org2.example.com | [4a40 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004422610 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4a41 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004422610 gate 1598907153307717700 evaluation succeeds +peer0.org2.example.com | [4a42 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4a43 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4a44 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4a45 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4a46 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4375 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4376 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4377 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4378 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4379 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [437a 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [437b 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [437c 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f5c20 gate 1598907141745075600 evaluation starts +peer0.org1.example.com | [437d 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f5c20 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [437e 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f5c20 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [437f 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f5c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4380 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f5c20 principal evaluation fails +peer0.org1.example.com | [4381 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f5c20 gate 1598907141745075600 evaluation fails +peer0.org1.example.com | [4382 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4383 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4384 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4385 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a190 gate 1598907141745799900 evaluation starts +peer0.org1.example.com | [4386 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a190 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4387 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a190 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4388 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4389 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a190 principal evaluation fails +peer0.org1.example.com | [438a 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a190 gate 1598907141745799900 evaluation fails +peer0.org1.example.com | [438b 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [438c 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [438d 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [438e 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a700 gate 1598907141746499300 evaluation starts +peer0.org1.example.com | [438f 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a700 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4390 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a700 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4391 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a700 principal matched by identity 0 +peer0.org1.example.com | [4392 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org1.example.com | [4393 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org1.example.com | [4394 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a700 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4395 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a700 gate 1598907141746499300 evaluation succeeds +peer0.org1.example.com | [4396 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4397 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4398 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4399 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [439a 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [439b 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [439c 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [439d 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [439e 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [439f 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43a0 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [43a1 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [43a2 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43a3 08-31 20:52:21.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org1.example.com | [43a4 08-31 20:52:21.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org1.example.com | [43a5 08-31 20:52:21.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org1.example.com | [43a6 08-31 20:52:21.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a47 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org2.example.com | [4a48 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4a49 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4a4a 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org2.example.com | [4a4b 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a4c 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a4d 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a4e 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org2.example.com | [4a4f 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a50 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a51 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a52 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4a53 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:" signature:"0D\002 E\020\032K1\023e\002\346\330y<\252\334\202\321\212\2618\301m]\321\3737\032E\301\300\333\326\370\002 ?\262\363\246\276\301\336x\374Mf\037r\257\2643v\022+F\241\200Z\001\253\336\251\177B|K3" > alive: alive: alive: +peer0.org2.example.com | [4a54 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a55 08-31 20:52:33.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a56 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org1.example.com:7051 +peer0.org2.example.com | [4a57 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4a58 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org2.example.com | [4a59 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4a5a 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [4a5b 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4a5c 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a5d 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a5e 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a60 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a5f 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a61 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a62 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a63 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [43a7 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [43a8 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [43a9 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43aa 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43ab 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43ac 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [43ad 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [43ae 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org1.example.com | [43af 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org1.example.com | [43b0 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43b1 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [43b2 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [43b3 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org1.example.com | [43b4 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org1.example.com | [43b5 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43b6 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43b7 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [43b8 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org1.example.com | [43b9 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org1.example.com | [43ba 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43bb 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43bc 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [43bd 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [43be 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [43bf 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [43c0 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43c1 08-31 20:52:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [43c2 08-31 20:52:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43c3 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43c4 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43c5 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43c6 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [43c7 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43c8 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [43c9 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [43ca 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [43cb 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [43cc 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [43cd 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [43ce 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005439f70 gate 1598907142175671300 evaluation starts +peer0.org1.example.com | [43cf 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005439f70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [43d0 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005439f70 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [43d1 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005439f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [43d2 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005439f70 principal evaluation fails +peer0.org1.example.com | [43d3 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005439f70 gate 1598907142175671300 evaluation fails +peer0.org1.example.com | [43d4 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [43d5 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [43d6 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [43d7 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054644e0 gate 1598907142177842000 evaluation starts +peer0.org1.example.com | [43d8 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054644e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [43d9 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054644e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [43da 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054644e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [43db 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054644e0 principal evaluation fails +peer0.org1.example.com | [43dc 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054644e0 gate 1598907142177842000 evaluation fails +peer0.org1.example.com | [43dd 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [43de 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [43df 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [43e0 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005464a50 gate 1598907142180655000 evaluation starts +peer0.org1.example.com | [43e1 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005464a50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [43e2 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005464a50 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [43e3 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005464a50 principal matched by identity 0 +peer0.org1.example.com | [43e4 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org2.example.com | [4a64 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a65 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a66 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a67 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a68 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a69 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a6a 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a6b 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a6c 08-31 20:52:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a6d 08-31 20:52:33.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a6e 08-31 20:52:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4a6f 08-31 20:52:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...9B28120C08BCF98FD4C8AF9D98161040 +peer0.org2.example.com | [4a70 08-31 20:52:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 17854DE31B2B14D5618E175C84833248B6F78321A9ECABEAA8D7D7840BA377E2 +peer0.org2.example.com | [4a71 08-31 20:52:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org2.example.com | [4a72 08-31 20:52:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267322E6578616D706C652E636F6D3A37303531 +peer0.org2.example.com | [4a73 08-31 20:52:33.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 31AA5BDA348977D7C004285715D545FB004C7F32E9BB02A9710DB7C2282B8EA6 +peer0.org2.example.com | [4a74 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a75 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4a76 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a78 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4a77 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a79 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a7a 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4a7b 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a7d 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a7c 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a7f 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a7e 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a80 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a81 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a82 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a83 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a84 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4a85 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [4a86 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 85 4d e3 1b 2b 14 d5 61 8e 17 5c 84 83 32 48 |..M..+..a..\..2H| +peer0.org2.example.com | 00000010 b6 f7 83 21 a9 ec ab ea a8 d7 d7 84 0b a3 77 e2 |...!..........w.| +peer0.org2.example.com | [4a87 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 b4 0c 15 cf 64 72 f1 f9 4d 79 |0E.!......dr..My| +peer0.org2.example.com | 00000010 8f 54 a8 d6 ba b3 64 2e 0d 29 76 9e bc 66 b0 c0 |.T....d..)v..f..| +peer0.org2.example.com | 00000020 c4 52 6c e8 c1 02 20 24 9d 0a 58 11 c3 60 1e 40 |.Rl... $..X..`.@| +peer0.org2.example.com | 00000030 ac 6a 8a fb 5a 8b b8 33 d9 fe 2b e4 46 d7 4a 07 |.j..Z..3..+.F.J.| +peer0.org2.example.com | 00000040 97 96 9b 09 2a a8 51 |....*.Q| +peer0.org2.example.com | [4a88 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4a89 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4a8a 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a8b 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [4a8c 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 3d 51 34 f1 97 74 34 15 c7 4c fc 7e 6c 2a a0 |v=Q4..t4..L.~l*.| +peer0.org2.example.com | 00000010 b2 3b 9a 0a 78 9f 8f e4 c9 ec 76 80 d4 b7 bb 58 |.;..x.....v....X| +peer0.org2.example.com | [4a8d 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 10 04 a6 70 23 1c b6 86 2b ff |0E.!.....p#...+.| +peer0.org2.example.com | 00000010 b8 0b 1b ac 7a ac 2a 42 95 43 98 b7 8b a3 61 c5 |....z.*B.C....a.| +peer0.org2.example.com | 00000020 3a 28 95 71 35 02 20 67 04 bc 00 5b f0 ae 51 73 |:(.q5. g...[..Qs| +peer0.org2.example.com | 00000030 43 b6 79 40 3f be 83 f7 1b 13 5a 8d 6f 94 51 86 |C.y@?.....Z.o.Q.| +peer0.org2.example.com | 00000040 87 86 e0 99 79 9f fe |....y..| +peer0.org2.example.com | [4a8e 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4a8f 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4a90 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org2.example.com | [4a91 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4a92 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4a93 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4a94 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4a95 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4a96 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4a97 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4a98 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488040 gate 1598907153506947300 evaluation starts +peer0.org2.example.com | [4a99 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488040 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4a9a 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488040 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4a9b 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488040 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4a9c 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488040 principal evaluation fails +peer0.org2.example.com | [4a9d 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004488040 gate 1598907153506947300 evaluation fails +peer0.org2.example.com | [4a9e 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4a9f 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4aa0 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4aa1 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044885b0 gate 1598907153508320700 evaluation starts +peer0.org2.example.com | [4aa2 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044885b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4aa3 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044885b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4aa4 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044885b0 principal matched by identity 0 +peer0.org2.example.com | [4aa5 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba dc 22 10 42 58 d5 cc db bd 89 d2 6a 48 76 6a |..".BX......jHvj| +peer0.org2.example.com | 00000010 46 d8 12 dd 64 60 f0 ea 98 0f a1 9d 5a c7 e9 b9 |F...d`......Z...| +peer0.org2.example.com | [4aa6 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 2c ea 98 60 5b 8e 3d 4e 82 97 |0E.!..,..`[.=N..| +peer0.org2.example.com | 00000010 ab 55 59 95 9f 4b aa ab 4d c3 36 4a 89 d5 10 b8 |.UY..K..M.6J....| +peer0.org2.example.com | 00000020 5a 08 aa b3 59 02 20 5e 7b 39 87 3f 2a 0a 55 ef |Z...Y. ^{9.?*.U.| +peer0.org2.example.com | 00000030 74 f1 98 55 c8 02 84 85 ba 07 e4 e8 c3 14 82 a3 |t..U............| +peer0.org2.example.com | 00000040 e9 68 33 cb 87 fd 42 |.h3...B| +peer0.org2.example.com | [4aa7 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044885b0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4aa8 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044885b0 gate 1598907153508320700 evaluation succeeds +peer0.org2.example.com | [4aa9 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4aaa 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4aab 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4aac 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4aad 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4aae 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4aaf 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4ab0 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4ab1 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4ab2 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4ab3 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org2.example.com | [4ab4 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [4ab5 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 85 4d e3 1b 2b 14 d5 61 8e 17 5c 84 83 32 48 |..M..+..a..\..2H| +peer0.org2.example.com | 00000010 b6 f7 83 21 a9 ec ab ea a8 d7 d7 84 0b a3 77 e2 |...!..........w.| +peer0.org2.example.com | [4ab6 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 b4 0c 15 cf 64 72 f1 f9 4d 79 |0E.!......dr..My| +peer0.org2.example.com | 00000010 8f 54 a8 d6 ba b3 64 2e 0d 29 76 9e bc 66 b0 c0 |.T....d..)v..f..| +peer0.org2.example.com | 00000020 c4 52 6c e8 c1 02 20 24 9d 0a 58 11 c3 60 1e 40 |.Rl... $..X..`.@| +peer0.org2.example.com | 00000030 ac 6a 8a fb 5a 8b b8 33 d9 fe 2b e4 46 d7 4a 07 |.j..Z..3..+.F.J.| +peer0.org2.example.com | 00000040 97 96 9b 09 2a a8 51 |....*.Q| +peer0.org2.example.com | [4ab7 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4ab8 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4ab9 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4aba 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org2.example.com | [4abb 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 3d 51 34 f1 97 74 34 15 c7 4c fc 7e 6c 2a a0 |v=Q4..t4..L.~l*.| +peer0.org2.example.com | 00000010 b2 3b 9a 0a 78 9f 8f e4 c9 ec 76 80 d4 b7 bb 58 |.;..x.....v....X| +peer0.org2.example.com | [4abc 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 10 04 a6 70 23 1c b6 86 2b ff |0E.!.....p#...+.| +peer0.org2.example.com | 00000010 b8 0b 1b ac 7a ac 2a 42 95 43 98 b7 8b a3 61 c5 |....z.*B.C....a.| +peer0.org2.example.com | 00000020 3a 28 95 71 35 02 20 67 04 bc 00 5b f0 ae 51 73 |:(.q5. g...[..Qs| +peer0.org2.example.com | 00000030 43 b6 79 40 3f be 83 f7 1b 13 5a 8d 6f 94 51 86 |C.y@?.....Z.o.Q.| +peer0.org2.example.com | 00000040 87 86 e0 99 79 9f fe |....y..| +peer0.org2.example.com | [4abd 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org2.example.com | [4abe 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4abf 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4ac0 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [4ac1 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org2.example.com | [4ac2 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org2.example.com | [4ac3 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 85 4d e3 1b 2b 14 d5 61 8e 17 5c 84 83 32 48 |..M..+..a..\..2H| +peer0.org2.example.com | 00000010 b6 f7 83 21 a9 ec ab ea a8 d7 d7 84 0b a3 77 e2 |...!..........w.| +peer0.org2.example.com | [4ac4 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 b4 0c 15 cf 64 72 f1 f9 4d 79 |0E.!......dr..My| +peer0.org2.example.com | 00000010 8f 54 a8 d6 ba b3 64 2e 0d 29 76 9e bc 66 b0 c0 |.T....d..)v..f..| +peer0.org2.example.com | 00000020 c4 52 6c e8 c1 02 20 24 9d 0a 58 11 c3 60 1e 40 |.Rl... $..X..`.@| +peer0.org2.example.com | 00000030 ac 6a 8a fb 5a 8b b8 33 d9 fe 2b e4 46 d7 4a 07 |.j..Z..3..+.F.J.| +peer0.org2.example.com | 00000040 97 96 9b 09 2a a8 51 |....*.Q| +peer0.org2.example.com | [4ac5 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 31 aa 5b da 34 89 77 d7 c0 04 28 57 15 d5 45 fb |1.[.4.w...(W..E.| +peer0.org2.example.com | 00000010 00 4c 7f 32 e9 bb 02 a9 71 0d b7 c2 28 2b 8e a6 |.L.2....q...(+..| +peer0.org2.example.com | [4ac6 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 54 ae d5 2f e5 15 b1 01 77 cf 34 b7 |0D. T../....w.4.| +peer0.org2.example.com | 00000010 66 97 55 86 fa d6 7a 38 0c 59 69 82 d8 31 52 e3 |f.U...z8.Yi..1R.| +peer0.org2.example.com | 00000020 7e c9 e8 6d 02 20 29 1d 34 f1 cf bb ef 36 50 03 |~..m. ).4....6P.| +peer0.org2.example.com | 00000030 37 c6 a8 54 29 ef e7 a6 c2 fe 31 8c 7f e0 ba ad |7..T).....1.....| +peer0.org2.example.com | 00000040 ac d8 6d 5b 65 91 |..m[e.| +peer0.org2.example.com | [4ac7 08-31 20:52:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [4ac8 08-31 20:52:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org2.example.com | [4ac9 08-31 20:52:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4aca 08-31 20:52:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4acb 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4acc 08-31 20:52:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4acd 08-31 20:52:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org2.example.com | [4ace 08-31 20:52:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4acf 08-31 20:52:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ad0 08-31 20:52:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ad1 08-31 20:52:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ad2 08-31 20:52:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ad3 08-31 20:52:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ad4 08-31 20:52:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c +peer0.org2.example.com | [4ad5 08-31 20:52:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4ad6 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4ad7 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4ad8 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4ad9 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org2.example.com | [4ada 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org2.example.com | [4adb 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4adc 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4add 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4ade 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4adf 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4ae0 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4ae1 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4ae2 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d04e0 gate 1598907153607840000 evaluation starts +peer0.org2.example.com | [4ae3 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d04e0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4ae4 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d04e0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4ae5 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d04e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4ae6 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d04e0 principal evaluation fails +peer0.org2.example.com | [4ae7 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d04e0 gate 1598907153607840000 evaluation fails +peer0.org2.example.com | [4ae8 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4ae9 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4aea 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4aeb 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d0a50 gate 1598907153611593800 evaluation starts +peer0.org2.example.com | [4aec 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d0a50 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4aed 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d0a50 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4aee 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d0a50 principal matched by identity 0 +peer0.org2.example.com | [4aef 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 b6 af 9a 4d 2d f1 0f ed 74 cc b1 73 7a 52 f6 |....M-...t..szR.| +peer0.org2.example.com | 00000010 2b c8 4d 70 de a6 4b 03 f3 15 a6 12 42 1a 1d c6 |+.Mp..K.....B...| +peer0.org2.example.com | [4af0 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 20 93 43 04 22 e5 56 44 e9 50 07 |0D. . .C.".VD.P.| +peer0.org2.example.com | 00000010 be 5e 40 76 05 fb 54 63 f5 18 f0 65 ee df e0 c1 |.^@v..Tc...e....| +peer0.org2.example.com | 00000020 83 2f 90 10 02 20 00 ef 62 10 df c6 81 8a b7 61 |./... ..b......a| +peer0.org2.example.com | 00000030 25 ad ae 35 e3 52 88 aa 57 f6 1f 5c 1c ad a9 a5 |%..5.R..W..\....| +peer0.org2.example.com | 00000040 a4 96 4b 35 f7 b7 |..K5..| +peer0.org2.example.com | [4af1 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d0a50 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4af2 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044d0a50 gate 1598907153611593800 evaluation succeeds +peer0.org2.example.com | [4af3 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4af4 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4af5 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4af6 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4af7 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org2.example.com | [4af8 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org2.example.com | [4af9 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org2.example.com | [4afa 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org2.example.com | [4afb 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org2.example.com | [4afc 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4afd 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4afe 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4aff 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org1.example.com:7051" pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" +peer0.org2.example.com | [4b00 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b01 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b02 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b03 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4b04 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org2.example.com | [4b05 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b06 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b07 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b08 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b09 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b0a 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b0b 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b0c 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b0d 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b0e 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b0f 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b10 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b11 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b12 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b13 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b14 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b15 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org2.example.com | [4b16 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b17 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b19 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b18 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b1a 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b1b 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b1c 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b1d 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.7:7051 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b1e 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b1f 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b20 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b21 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4b22 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4b23 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4b24 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4b25 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b27 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b26 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4b28 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4b29 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f13f0 gate 1598907154131585200 evaluation starts +peer0.org2.example.com | [4b2a 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f13f0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4b2b 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f13f0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4b2c 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f13f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4b2d 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f13f0 principal evaluation fails +peer0.org2.example.com | [4b2e 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f13f0 gate 1598907154131585200 evaluation fails +peer0.org2.example.com | [4b2f 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4b30 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4b31 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4b32 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f1960 gate 1598907154132608500 evaluation starts +peer0.org2.example.com | [4b33 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f1960 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4b34 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f1960 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4b35 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f1960 principal matched by identity 0 +peer0.org2.example.com | [4b36 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org2.example.com | [4b37 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org2.example.com | [4b38 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f1960 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4b39 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044f1960 gate 1598907154132608500 evaluation succeeds +peer0.org2.example.com | [4b3a 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4b3b 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4b3c 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4b3d 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4b3e 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org2.example.com | [4b3f 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org2.example.com | [4b40 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b41 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b42 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4b43 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4b44 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4b45 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4b46 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4b47 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4b48 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004519250 gate 1598907154137133300 evaluation starts +peer0.org2.example.com | [4b49 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004519250 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4b4a 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004519250 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4b4b 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004519250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4b4c 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004519250 principal evaluation fails +peer0.org2.example.com | [4b4d 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004519250 gate 1598907154137133300 evaluation fails +peer0.org2.example.com | [4b4e 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4b4f 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4b50 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4b51 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045197c0 gate 1598907154137675500 evaluation starts +peer0.org2.example.com | [4b52 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045197c0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4b53 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045197c0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4b54 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045197c0 principal matched by identity 0 +peer0.org2.example.com | [4b55 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org2.example.com | [4b56 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org2.example.com | [4b57 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045197c0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4b58 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045197c0 gate 1598907154137675500 evaluation succeeds +peer0.org2.example.com | [4b59 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4b5a 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4b5b 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4b5c 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4b5d 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org2.example.com | [4b5e 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org2.example.com | [4b5f 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4b60 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4b61 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org2.example.com | [4b62 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org2.example.com | [4b63 08-31 20:52:34.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b64 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b65 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4b66 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4b67 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4b68 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4b69 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4b6a 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4b6b 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004537940 gate 1598907154140652300 evaluation starts +peer0.org2.example.com | [4b6c 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004537940 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4b6d 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004537940 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4b6e 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004537940 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4b6f 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004537940 principal evaluation fails +peer0.org2.example.com | [4b70 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004537940 gate 1598907154140652300 evaluation fails +peer0.org2.example.com | [4b71 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4b72 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4b73 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4b74 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004537eb0 gate 1598907154141280200 evaluation starts +peer0.org2.example.com | [4b75 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004537eb0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4b76 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004537eb0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4b77 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004537eb0 principal matched by identity 0 +peer0.org2.example.com | [4b78 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org2.example.com | [4b79 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org2.example.com | [4b7a 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004537eb0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4b7b 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004537eb0 gate 1598907154141280200 evaluation succeeds +peer0.org2.example.com | [4b7c 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4b7d 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4b7e 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4b7f 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4b80 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b81 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4b82 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4b83 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4b84 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4b85 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4b86 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4b87 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4b88 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d0b0 gate 1598907154143122900 evaluation starts +peer0.org2.example.com | [4b89 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d0b0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4b8a 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d0b0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4b8b 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d0b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4b8c 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d0b0 principal evaluation fails +peer0.org2.example.com | [4b8d 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d0b0 gate 1598907154143122900 evaluation fails +peer0.org2.example.com | [4b8e 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4b8f 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4b90 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4b91 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d620 gate 1598907154143873500 evaluation starts +peer0.org2.example.com | [4b92 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d620 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4b93 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d620 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4b94 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d620 principal matched by identity 0 +peer0.org2.example.com | [4b95 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org2.example.com | [4b96 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org2.example.com | [4b97 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d620 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4b98 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454d620 gate 1598907154143873500 evaluation succeeds +peer0.org2.example.com | [4b99 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4b9a 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4b9b 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4b9c 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4b9d 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org2.example.com | [4b9e 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org2.example.com | [4b9f 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4ba0 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org2.example.com | [4ba1 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ba2 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ba3 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4ba4 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 36 67 41 77 49 42 41 67 49 51 56 37 37 36 6e 34 48 79 4d 6a 68 38 35 4a 4e 53 35 31 67 54 32 6a 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 78 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 41 44 4e 66 42 2f 6c 38 4f 4a 71 31 0a 59 32 41 72 6e 54 52 2b 4a 72 61 41 61 43 31 35 2b 54 51 44 4f 33 72 6d 63 50 2b 35 70 7a 6a 48 2b 4d 50 45 4d 6d 69 6e 50 30 35 6f 2f 79 51 32 30 38 6d 75 77 71 6b 78 64 54 5a 64 6c 76 48 5a 0a 6b 6d 49 49 34 34 68 65 2b 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 6e 62 6f 68 72 68 38 71 64 77 31 32 58 53 76 2b 44 44 47 55 4f 62 59 38 6e 43 62 42 48 2b 61 37 6c 4f 71 53 44 6f 58 41 30 7a 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 53 41 41 77 52 51 49 68 41 50 67 76 6f 51 6f 4f 45 2b 31 73 55 72 45 78 2f 78 46 73 2f 7a 6b 46 6a 67 52 35 4f 57 77 75 4a 70 69 78 36 4b 39 38 6e 46 73 7a 41 69 41 33 42 50 62 6e 0a 58 65 70 7a 48 56 52 77 67 49 45 54 6d 79 42 57 55 65 51 58 49 65 6b 59 48 69 30 33 53 78 71 58 6d 63 6b 32 4d 77 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4ba5 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4ba6 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4ba7 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4ba8 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4ba9 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4baa 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004563160 gate 1598907154147341300 evaluation starts +peer0.org2.example.com | [4bab 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004563160 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4bac 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004563160 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4bad 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004563160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4bae 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004563160 principal evaluation fails +peer0.org2.example.com | [4baf 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004563160 gate 1598907154147341300 evaluation fails +peer0.org2.example.com | [4bb0 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4bb1 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4bb2 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4bb3 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045636d0 gate 1598907154147813600 evaluation starts +peer0.org2.example.com | [4bb4 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045636d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4bb5 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045636d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4bb6 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045636d0 principal matched by identity 0 +peer0.org2.example.com | [4bb7 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org2.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org2.example.com | [4bb8 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org2.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org2.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org2.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org2.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org2.example.com | [4bb9 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045636d0 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4bba 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045636d0 gate 1598907154147813600 evaluation succeeds +peer0.org2.example.com | [4bbb 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4bbc 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4bbd 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4bbe 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4bbf 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4bc0 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4bc1 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 31 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4c 6a 50 4c 48 56 53 72 78 42 6c 39 33 58 54 41 6a 43 44 61 59 41 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 45 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 53 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 47 6b 67 4c 32 79 41 4c 6b 68 37 0a 62 75 44 79 54 69 43 42 7a 34 78 54 52 62 4e 42 43 41 67 57 6e 6e 69 4a 38 4c 77 59 71 6f 56 59 62 61 4e 42 66 62 54 33 5a 49 6a 68 73 6b 69 32 45 46 39 64 6e 79 75 6e 55 44 6c 77 55 63 2f 66 0a 56 58 51 79 31 50 7a 35 56 37 65 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 4a 32 36 49 61 34 66 4b 6e 63 4e 64 6c 30 72 2f 67 77 78 6c 44 6d 32 50 4a 77 6d 77 52 2f 6d 75 35 54 71 6b 67 36 46 77 4e 4d 33 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 43 73 42 52 54 64 4c 69 69 66 45 56 41 55 75 75 65 71 34 64 51 72 37 62 51 31 2b 58 78 46 70 65 57 56 48 33 31 45 63 54 6e 2b 6b 41 69 42 56 62 77 44 78 0a 50 67 6d 4b 4d 53 58 76 38 76 31 2f 6c 48 75 78 56 34 57 50 4d 63 35 66 56 30 6e 55 53 35 59 73 49 6a 53 36 6c 41 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org2.example.com | [4bc2 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4bc3 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org2.example.com | [4bc4 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org2.example.com | [4bc5 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org2.example.com | [4bc6 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org2.example.com | [4bc7 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045868d0 gate 1598907154149335900 evaluation starts +peer0.org2.example.com | [4bc8 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045868d0 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4bc9 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045868d0 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4bca 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045868d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org2.example.com | [4bcb 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045868d0 principal evaluation fails +peer0.org2.example.com | [4bcc 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045868d0 gate 1598907154149335900 evaluation fails +peer0.org2.example.com | [4bcd 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4bce 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org2.example.com | [4bcf 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org2.example.com | [4bd0 08-31 20:52:34.14 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004586e40 gate 1598907154149934200 evaluation starts +peer0.org2.example.com | [4bd1 08-31 20:52:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004586e40 signed by 0 principal evaluation starts (used [false]) +peer0.org2.example.com | [4bd2 08-31 20:52:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004586e40 processing identity 0 with bytes of 115a4b0 +peer0.org2.example.com | [4bd3 08-31 20:52:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004586e40 principal matched by identity 0 +peer0.org2.example.com | [4bd4 08-31 20:52:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org2.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org2.example.com | [4bd5 08-31 20:52:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org2.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org2.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org2.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org2.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org2.example.com | [4bd6 08-31 20:52:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004586e40 principal evaluation succeeds for identity 0 +peer0.org2.example.com | [4bd7 08-31 20:52:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004586e40 gate 1598907154149934200 evaluation succeeds +peer0.org2.example.com | [4bd8 08-31 20:52:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4bd9 08-31 20:52:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org2.example.com | [4bda 08-31 20:52:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org2.example.com | [4bdb 08-31 20:52:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org2.example.com | [4bdc 08-31 20:52:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org2.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org2.example.com | [4bdd 08-31 20:52:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org2.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org2.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org2.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org2.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org2.example.com | [4bde 08-31 20:52:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org2.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org2.example.com | [4bdf 08-31 20:52:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org2.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org2.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org2.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org2.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org2.example.com | [4be0 08-31 20:52:34.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4be1 08-31 20:52:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [4be2 08-31 20:52:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org2.example.com | [4be3 08-31 20:52:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 0b 2d 3c 22 66 d8 92 0c 8c a9 27 ac 8a ba de |..-<"f.....'....| +peer0.org2.example.com | 00000010 d3 2f 45 d3 29 82 e0 1b 53 b4 09 a8 20 cd 43 65 |./E.)...S... .Ce| +peer0.org2.example.com | [4be4 08-31 20:52:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 36 20 78 8b 6a 35 87 e5 08 32 |0E.!..6 x.j5...2| +peer0.org2.example.com | 00000010 64 10 dc 25 13 a0 d7 bd e6 89 05 3a ae ac ac 97 |d..%.......:....| +peer0.org2.example.com | 00000020 61 73 3e 64 81 02 20 65 87 84 a3 f7 11 f6 0a 17 |as>d.. e........| +peer0.org2.example.com | 00000030 4c 93 42 6a b4 05 2a 52 8b 88 aa c4 4c a4 7b e1 |L.Bj..*R....L.{.| +peer0.org2.example.com | 00000040 a6 d7 5a 5c 35 e6 65 |..Z\5.e| +peer0.org2.example.com | [4be5 08-31 20:52:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4be6 08-31 20:52:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4be7 08-31 20:52:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4be8 08-31 20:52:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us declaration +peer0.org2.example.com | [4be9 08-31 20:52:34.20 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 : Returning false +peer0.org2.example.com | [4bea 08-31 20:52:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4beb 08-31 20:52:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4bec 08-31 20:52:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org2.example.com:7051 +peer0.org2.example.com | [4bed 08-31 20:52:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4bee 08-31 20:52:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4bef 08-31 20:52:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +peer0.org2.example.com | [4bf0 08-31 20:52:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [4bf1 08-31 20:52:34.21 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bf2 08-31 20:52:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org2.example.com | [4bf3 08-31 20:52:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org2.example.com | [4bf4 08-31 20:52:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +peer0.org2.example.com | [4bf5 08-31 20:52:34.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bf6 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4bf7 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org2.example.com | [4bf8 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4bf9 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org2.example.com | [4bfa 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org2.example.com | [4bfb 08-31 20:52:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [4bfc 08-31 20:52:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [4bfd 08-31 20:52:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org2.example.com | [4bfe 08-31 20:52:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [6 1 2 3 4 5] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org2.example.com | [4bff 08-31 20:52:34.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43e5 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org1.example.com | [43e6 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005464a50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [43e7 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005464a50 gate 1598907142180655000 evaluation succeeds +peer0.org1.example.com | [43e8 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [43e9 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [43ea 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [43eb 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [43ec 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43ed 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [43ee 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [43ef 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +peer0.org1.example.com | [43f0 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [43f1 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [43f2 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [43f3 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [43f4 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [43f5 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [43f6 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [43f7 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005315d40 gate 1598907142197710400 evaluation starts +peer0.org1.example.com | [43f8 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005315d40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [43f9 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005315d40 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [43fa 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005315d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [43fb 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005315d40 principal evaluation fails +peer0.org1.example.com | [43fc 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005315d40 gate 1598907142197710400 evaluation fails +peer0.org1.example.com | [43fd 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [43fe 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [43ff 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4400 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054802b0 gate 1598907142198082500 evaluation starts +peer0.org1.example.com | [4401 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054802b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4402 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054802b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4403 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054802b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4404 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054802b0 principal evaluation fails +peer0.org1.example.com | [4405 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054802b0 gate 1598907142198082500 evaluation fails +peer0.org1.example.com | [4406 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4407 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4408 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4409 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005480820 gate 1598907142198546600 evaluation starts +peer0.org1.example.com | [440a 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005480820 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [440b 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005480820 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [440c 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005480820 principal matched by identity 0 +peer0.org1.example.com | [440d 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org1.example.com | [440e 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org1.example.com | [440f 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005480820 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4410 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005480820 gate 1598907142198546600 evaluation succeeds +peer0.org1.example.com | [4411 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4412 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4413 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4414 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4415 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4416 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4417 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4418 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4419 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [441a 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [441b 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [441c 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [441d 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [441e 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +peer0.org1.example.com | [441f 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4420 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4421 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4422 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4423 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4424 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4425 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4426 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005481c30 gate 1598907142430241000 evaluation starts +peer0.org1.example.com | [4427 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005481c30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4428 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005481c30 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4429 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005481c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [442a 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005481c30 principal evaluation fails +peer0.org1.example.com | [442b 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005481c30 gate 1598907142430241000 evaluation fails +peer0.org1.example.com | [442c 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [442d 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [442e 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [442f 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c1a0 gate 1598907142431755600 evaluation starts +peer0.org1.example.com | [4430 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c1a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4431 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c1a0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4432 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c1a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4433 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c1a0 principal evaluation fails +peer0.org1.example.com | [4434 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c1a0 gate 1598907142431755600 evaluation fails +peer0.org1.example.com | [4435 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4436 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4437 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4438 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c710 gate 1598907142432905200 evaluation starts +peer0.org1.example.com | [4439 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c710 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [443a 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c710 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [443b 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c710 principal matched by identity 0 +peer0.org1.example.com | [443c 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org1.example.com | [443d 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org1.example.com | [443e 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c710 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [443f 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c710 gate 1598907142432905200 evaluation succeeds +peer0.org1.example.com | [4440 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4441 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4442 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4443 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4444 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4445 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4446 08-31 20:52:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [4447 08-31 20:52:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [4448 08-31 20:52:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4449 08-31 20:52:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610121801 +peer0.org1.example.com | [444a 08-31 20:52:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F4D5E09687388F25B45A0F31981F6DB405EC4D751786A0F6819E2B9DB8E750B7 +peer0.org1.example.com | [444b 08-31 20:52:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [444c 08-31 20:52:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [444d 08-31 20:52:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [444e 08-31 20:52:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [444f 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4450 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4451 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4452 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [4453 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4454 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4455 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4456 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4457 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4458 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4459 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [445a 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [445b 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [445c 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [445d 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [445e 08-31 20:52:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [445f 08-31 20:52:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4460 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4461 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4462 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4463 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4464 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4465 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4466 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4467 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4468 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4469 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [446a 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [446b 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [446c 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4650 gate 1598907145033944900 evaluation starts +peer0.org1.example.com | [446d 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4650 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [446e 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4650 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [446f 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4470 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4650 principal evaluation fails +peer0.org1.example.com | [4471 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4650 gate 1598907145033944900 evaluation fails +peer0.org1.example.com | [4472 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4473 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4474 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4475 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4bc0 gate 1598907145037984700 evaluation starts +peer0.org1.example.com | [4476 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4bc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4477 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4bc0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4478 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4479 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4bc0 principal evaluation fails +peer0.org1.example.com | [447a 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4bc0 gate 1598907145037984700 evaluation fails +peer0.org1.example.com | [447b 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [447c 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [447d 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [447e 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d5130 gate 1598907145038725000 evaluation starts +peer0.org1.example.com | [447f 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d5130 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4480 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d5130 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4481 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d5130 principal matched by identity 0 +peer0.org1.example.com | [4482 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 b0 f9 f3 76 b0 19 27 5f 6f f0 59 26 46 b4 f9 |....v..'_o.Y&F..| +peer0.org1.example.com | 00000010 15 b0 6a ce 97 a7 73 a0 23 d2 88 89 5c 3c bb 66 |..j...s.#...\<.f| +peer0.org1.example.com | [4483 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 de f1 e7 50 26 d3 49 87 f7 44 |0E.!.....P&.I..D| +peer0.org1.example.com | 00000010 0f 87 ad 2e 86 4f 36 b1 1a e6 0a 6a 28 fd 1a fd |.....O6....j(...| +peer0.org1.example.com | 00000020 57 8a a0 5d d5 02 20 5d 02 7a 4d c5 23 dc bf a6 |W..].. ].zM.#...| +peer0.org1.example.com | 00000030 c9 74 49 b6 bd 3e d6 41 68 f3 72 02 fe b8 bd b2 |.tI..>.Ah.r.....| +peer0.org1.example.com | 00000040 07 10 79 82 e6 73 62 |..y..sb| +peer0.org1.example.com | [4484 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d5130 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4485 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d5130 gate 1598907145038725000 evaluation succeeds +peer0.org1.example.com | [4486 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4487 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4488 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4489 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [448a 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [448b 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [448c 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [448d 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [448e 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [448f 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4490 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4491 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4492 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4493 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4494 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4495 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4496 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4497 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4498 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4499 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [449a 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [449b 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [449c 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [449d 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [449e 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [449f 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44a0 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44a1 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44a2 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44a3 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44a4 08-31 20:52:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44a5 08-31 20:52:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44a6 08-31 20:52:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44a7 08-31 20:52:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44a8 08-31 20:52:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44a9 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [44aa 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [44ab 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44ac 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [44ad 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [44ae 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44af 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [44b0 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [44b1 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [44b2 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [44b3 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [44b4 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [44b5 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054cdbd0 gate 1598907145122301000 evaluation starts +peer0.org1.example.com | [44b6 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054cdbd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [44b7 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054cdbd0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [44b8 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054cdbd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [44b9 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054cdbd0 principal evaluation fails +peer0.org1.example.com | [44ba 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054cdbd0 gate 1598907145122301000 evaluation fails +peer0.org1.example.com | [44bb 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [44bc 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [44bd 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [44be 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c140 gate 1598907145123174500 evaluation starts +peer0.org1.example.com | [44bf 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c140 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [44c0 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c140 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [44c1 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [44c2 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c140 principal evaluation fails +peer0.org1.example.com | [44c3 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c140 gate 1598907145123174500 evaluation fails +peer0.org1.example.com | [44c4 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [44c5 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [44c6 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [44c7 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c6b0 gate 1598907145124643600 evaluation starts +peer0.org1.example.com | [44c8 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c6b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [44c9 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c6b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [44ca 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c6b0 principal matched by identity 0 +peer0.org1.example.com | [44cb 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 bb 37 cd a7 3d c7 15 e9 10 ed e0 8b 7c cb 8b |..7..=.......|..| +peer0.org1.example.com | 00000010 37 da ab 81 32 e6 31 10 6e 3a f2 65 5d 49 60 6a |7...2.1.n:.e]I`j| +peer0.org1.example.com | [44cc 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb d8 7a 44 f0 ba 1c 97 51 e4 6b |0E.!...zD....Q.k| +peer0.org1.example.com | 00000010 df af be f7 46 7e cd 10 71 ac cf 38 e6 99 9b 95 |....F~..q..8....| +peer0.org1.example.com | 00000020 8f 1a 12 16 6a 02 20 2c 40 29 1b 48 a5 78 d7 11 |....j. ,@).H.x..| +peer0.org1.example.com | 00000030 e1 ab a0 0f 96 3c b1 51 15 13 b7 a7 58 76 e5 73 |.....<.Q....Xv.s| +peer0.org1.example.com | 00000040 65 eb f1 d2 be ca 9d |e......| +peer0.org1.example.com | [44cd 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c6b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [44ce 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c6b0 gate 1598907145124643600 evaluation succeeds +peer0.org1.example.com | [44cf 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [44d0 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [44d1 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [44d2 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [44d3 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44d4 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [44d5 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [44d6 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [44d7 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [44d8 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44d9 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44da 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [44db 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44dc 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44dd 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [44de 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [44df 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +peer0.org1.example.com | [44e0 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44e1 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [44e2 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44e3 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [44e4 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [44e5 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [44e6 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [44e7 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44e8 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44e9 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44ea 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44eb 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44ec 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [44ed 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 7e b8 fb 7b 92 f9 a8 55 43 c1 69 4c 47 d2 b2 |.~..{...UC.iLG..| +peer0.org1.example.com | 00000010 11 10 12 61 78 d4 eb 0c c8 d1 65 aa 08 6c fa 51 |...ax.....e..l.Q| +peer0.org1.example.com | [44ee 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 8b 52 d5 99 fe 97 1c 64 ef 6c |0E.!...R.....d.l| +peer0.org1.example.com | 00000010 06 64 3b 74 65 f3 cf f8 32 a5 57 36 bb 76 2c c8 |.d;te...2.W6.v,.| +peer0.org1.example.com | 00000020 b6 aa ec a4 dd 02 20 4d 13 76 f1 83 d6 67 90 3d |...... M.v...g.=| +peer0.org1.example.com | 00000030 dd fb b8 0e e1 80 26 48 e1 a7 72 11 50 fb 81 26 |......&H..r.P..&| +peer0.org1.example.com | 00000040 ab 16 85 61 5e a6 cc |...a^..| +peer0.org1.example.com | [44ef 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44f0 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [44f1 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [44f2 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [44f3 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [44f4 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44f5 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44f6 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44f7 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44f8 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44f9 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44fa 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44fb 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44fc 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44fd 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [44fe 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [44ff 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4500 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4501 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4502 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4503 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4504 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4505 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4506 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4507 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4508 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4509 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [450a 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [450b 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [450c 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [450d 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [450e 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [450f 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 92 97 fa aa d4 02 28 8b d8 61 84 86 f9 40 ef |.......(..a...@.| +peer0.org1.example.com | 00000010 fb 5e cd 5b 1d b1 37 dc 33 68 1e 31 30 75 bd 0b |.^.[..7.3h.10u..| +peer0.org1.example.com | [4510 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 34 0f 82 b6 c8 0f 1b 71 00 00 |0E.!..4......q..| +peer0.org1.example.com | 00000010 b4 79 07 e4 fd da 76 35 0d 8a 32 f0 9a 5a c6 f9 |.y....v5..2..Z..| +peer0.org1.example.com | 00000020 e3 4d 1b e5 84 02 20 21 79 59 ec 7f e4 89 df b6 |.M.... !yY......| +peer0.org1.example.com | 00000030 9c 4b 7e 22 d9 b1 ef d7 6a b6 7c 1a 7b ef a3 2d |.K~"....j.|.{..-| +peer0.org1.example.com | 00000040 07 5c bb e6 ba bb 91 |.\.....| +peer0.org1.example.com | [4511 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [4512 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 b1 7a e6 b4 a4 6a e8 fe ac f8 |0E.!...z...j....| +peer0.org1.example.com | 00000010 8b c3 a8 4c 38 56 b3 df b5 84 73 54 21 00 46 fd |...L8V....sT!.F.| +peer0.org1.example.com | 00000020 6f ef 16 a1 2b 02 20 57 6a 51 e6 a0 90 d0 a0 75 |o...+. WjQ.....u| +peer0.org1.example.com | 00000030 a6 a0 f7 30 0f 78 26 93 55 0f e9 e6 4c bf bc ec |...0.x&.U...L...| +peer0.org1.example.com | 00000040 b7 07 32 7c 5f 30 fa |..2|_0.| +peer0.org1.example.com | [4513 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [4514 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [4515 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4516 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4517 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4518 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4519 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [451a 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [451b 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [451c 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [451d 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [451e 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [451f 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +peer0.org1.example.com | [4520 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [4521 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4522 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4523 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4524 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4525 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4526 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4527 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4528 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4529 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [452a 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [452b 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [452c 08-31 20:52:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +peer0.org1.example.com | [452d 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [452e 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [452f 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4530 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4531 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4532 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4533 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4534 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4535 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4536 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4537 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4538 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005544e80 gate 1598907145448785400 evaluation starts +peer0.org1.example.com | [4539 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005544e80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [453a 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005544e80 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [453b 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005544e80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [453c 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005544e80 principal evaluation fails +peer0.org1.example.com | [453d 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005544e80 gate 1598907145448785400 evaluation fails +peer0.org1.example.com | [453e 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [453f 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4540 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4541 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055453f0 gate 1598907145450436500 evaluation starts +peer0.org1.example.com | [4542 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055453f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4543 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055453f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4544 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055453f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4545 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055453f0 principal evaluation fails +peer0.org1.example.com | [4546 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055453f0 gate 1598907145450436500 evaluation fails +peer0.org1.example.com | [4547 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4548 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4549 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [454a 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005545960 gate 1598907145450721200 evaluation starts +peer0.org1.example.com | [454b 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005545960 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [454c 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005545960 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [454d 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005545960 principal matched by identity 0 +peer0.org1.example.com | [454e 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 46 eb 2e 41 1c e8 c9 f9 6c 23 22 92 30 0a ca |.F..A....l#".0..| +peer0.org1.example.com | 00000010 42 2a e9 22 dc 20 28 4b 8f af 99 96 bb b5 2d f2 |B*.". (K......-.| +peer0.org1.example.com | [454f 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db c1 ce d6 c6 69 dc f3 b2 2b 04 |0E.!......i...+.| +peer0.org1.example.com | 00000010 da 06 7f c6 bf d7 a5 be 66 4b ac 61 04 e2 97 7c |........fK.a...|| +peer0.org1.example.com | 00000020 79 85 42 1e 83 02 20 0d b0 13 a3 da 93 f6 98 16 |y.B... .........| +peer0.org1.example.com | 00000030 b2 d6 a6 c9 5c bd ca d3 51 d3 c7 61 0f dd 14 d0 |....\...Q..a....| +peer0.org1.example.com | 00000040 0b 30 0a fb ce ce 88 |.0.....| +peer0.org1.example.com | [4550 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005545960 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4551 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005545960 gate 1598907145450721200 evaluation succeeds +peer0.org1.example.com | [4552 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4553 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4554 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4555 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4556 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4557 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4558 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4559 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [455a 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [455b 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [455c 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [455d 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [455e 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [455f 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4560 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4561 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4562 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4563 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4564 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4565 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4566 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4567 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4568 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4569 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [456a 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [456b 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [456c 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [456d 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [456e 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [456f 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4570 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4571 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4572 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4573 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4574 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4575 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4576 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4577 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4578 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4579 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [457a 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [457b 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [457c 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [457d 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [457e 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816103B +peer0.org1.example.com | [4580 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FDE84AFBD3454277A9867578672980856F12C4DE2D89805D19BD52560CB171AF +peer0.org1.example.com | [4581 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [457f 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4583 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4584 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4582 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [4585 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4586 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7070 gate 1598907145512767900 evaluation starts +peer0.org1.example.com | [4587 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7070 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4588 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [4589 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7070 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [458a 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [458b 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7070 principal evaluation fails +peer0.org1.example.com | [458c 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7070 gate 1598907145512767900 evaluation fails +peer0.org1.example.com | [458d 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [458e 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [458f 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4591 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [4590 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a75e0 gate 1598907145515660600 evaluation starts +peer0.org1.example.com | [4592 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a75e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4593 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a75e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4594 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a75e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4595 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a75e0 principal evaluation fails +peer0.org1.example.com | [4596 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a75e0 gate 1598907145515660600 evaluation fails +peer0.org1.example.com | [4597 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4598 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4599 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [459a 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7b50 gate 1598907145516708500 evaluation starts +peer0.org1.example.com | [459b 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7b50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [459c 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7b50 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [459d 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7b50 principal matched by identity 0 +peer0.org1.example.com | [459e 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e4 b0 84 4b 07 df 73 7a 11 0c 44 35 9d 1d 7f |....K..sz..D5...| +peer0.org1.example.com | 00000010 f5 f0 fa 1e d7 a5 c0 10 5a 6a e8 0d 87 44 2e 4e |........Zj...D.N| +peer0.org1.example.com | [459f 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 33 f0 79 6c 51 c3 d7 39 cb eb |0E.!..3.ylQ..9..| +peer0.org1.example.com | 00000010 c3 16 f3 19 8f 04 6d c3 41 aa ea cf 84 60 d0 c7 |......m.A....`..| +peer0.org1.example.com | 00000020 9f 18 6f 34 a8 02 20 6f 81 d6 42 16 92 06 21 50 |..o4.. o..B...!P| +peer0.org1.example.com | 00000030 32 3a 12 4c b6 fe d5 74 02 3a 69 81 62 43 8e a6 |2:.L...t.:i.bC..| +peer0.org1.example.com | 00000040 7c 6a ba 25 70 78 59 ||j.%pxY| +peer0.org1.example.com | [45a0 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7b50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [45a1 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7b50 gate 1598907145516708500 evaluation succeeds +peer0.org1.example.com | [45a2 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [45a3 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [45a4 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [45a5 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [45a6 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [45a7 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [45a8 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [45a9 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [45aa 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [45ab 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45ac 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45ad 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45ae 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [45af 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45b0 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45b1 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45b2 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [45b3 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\013\234\277\257\002 1OW\237u(3\225\261h\n\024\212\nf\304\201\004\3427\036\322\031V\177\274\246.\216\253\341\017" > +peer0.org1.example.com | [45b4 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [45b5 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45b6 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45b7 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45b8 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45b9 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [45ba 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [45bb 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45bc 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [45bd 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [45c1 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45be 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [45c2 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45bf 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [45c3 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45c0 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [45c4 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [45c5 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [45c6 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [45c7 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [45c8 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [45c9 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [45ca 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45cb 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [45cc 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45cd 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [45ce 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45cf 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [45d0 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [45d1 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [45d2 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45d3 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [45d4 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [45d5 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [45d6 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45d7 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [45d8 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [45d9 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45da 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [45db 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816103C +peer0.org1.example.com | [45dc 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C76FBCE60E0891B20A6744C2142EDC99D6C715C7537016AE4B7012960CF6E986 +peer0.org1.example.com | [45dd 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [45de 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [45df 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [45e0 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45e1 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [45e2 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [45e4 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45e3 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\267\221\022S\007\337\253\303\034s\367\3734Q\205\327\370\300\270\006\002 /\010\307\277;\250Jcx\204\342\"\2026\331\377\024>\375K\203=B\312\312R\032\201\344\317\030\263" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [45e5 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\267\221\022S\007\337\253\303\034s\367\3734Q\205\327\370\300\270\006\002 /\010\307\277;\250Jcx\204\342\"\2026\331\377\024>\375K\203=B\312\312R\032\201\344\317\030\263" > > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [45e6 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45e7 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45e8 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [45e9 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [45ea 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45eb 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [45ec 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [45ed 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45ee 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [45ef 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [45f0 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 6f bc e6 0e 08 91 b2 0a 67 44 c2 14 2e dc 99 |.o.......gD.....| +peer0.org1.example.com | 00000010 d6 c7 15 c7 53 70 16 ae 4b 70 12 96 0c f6 e9 86 |....Sp..Kp......| +peer0.org1.example.com | [45f1 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 fc 7d 0e ee ef b1 04 45 2d 8e |0E.!...}.....E-.| +peer0.org1.example.com | 00000010 b5 09 4e 13 39 28 76 7e 53 53 d0 bd 17 48 eb 7d |..N.9(v~SS...H.}| +peer0.org1.example.com | 00000020 2a 28 83 40 6c 02 20 55 00 c7 99 e9 e2 6c 60 8d |*(.@l. U.....l`.| +peer0.org1.example.com | 00000030 3a 32 f6 d1 cb 98 7b d9 21 47 a3 3c 8c 63 f4 9d |:2....{.!G.<.c..| +peer0.org1.example.com | 00000040 04 f5 d4 cc 5e b2 19 |....^..| +peer0.org1.example.com | [45f2 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [45f3 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 12 31 70 78 23 a8 64 08 e5 cf |0E.!...1px#.d...| +peer0.org1.example.com | 00000010 3e b7 91 12 53 07 df ab c3 1c 73 f7 fb 34 51 85 |>...S.....s..4Q.| +peer0.org1.example.com | 00000020 d7 f8 c0 b8 06 02 20 2f 08 c7 bf 3b a8 4a 63 78 |...... /...;.Jcx| +peer0.org1.example.com | 00000030 84 e2 22 82 36 d9 ff 14 3e fd 4b 83 3d 42 ca ca |..".6...>.K.=B..| +peer0.org1.example.com | 00000040 52 1a 81 e4 cf 18 b3 |R......| +peer0.org1.example.com | [45f4 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [45f5 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [45f6 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45f7 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45f8 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [45f9 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [45fa 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [45fb 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [45fc 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [45fd 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [45fe 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [45ff 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4600 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4601 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4602 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4603 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4604 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9280 gate 1598907145635984600 evaluation starts +peer0.org1.example.com | [4605 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9280 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4606 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9280 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4607 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4608 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9280 principal evaluation fails +peer0.org1.example.com | [4609 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9280 gate 1598907145635984600 evaluation fails +peer0.org1.example.com | [460a 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [460b 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [460c 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [460d 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f97f0 gate 1598907145637870400 evaluation starts +peer0.org1.example.com | [460e 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f97f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [460f 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f97f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4610 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f97f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4611 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f97f0 principal evaluation fails +peer0.org1.example.com | [4612 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f97f0 gate 1598907145637870400 evaluation fails +peer0.org1.example.com | [4613 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4614 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4615 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4616 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9d60 gate 1598907145640731300 evaluation starts +peer0.org1.example.com | [4617 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9d60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4618 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9d60 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4619 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9d60 principal matched by identity 0 +peer0.org1.example.com | [461a 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e4 b0 84 4b 07 df 73 7a 11 0c 44 35 9d 1d 7f |....K..sz..D5...| +peer0.org1.example.com | 00000010 f5 f0 fa 1e d7 a5 c0 10 5a 6a e8 0d 87 44 2e 4e |........Zj...D.N| +peer0.org1.example.com | [461b 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 33 f0 79 6c 51 c3 d7 39 cb eb |0E.!..3.ylQ..9..| +peer0.org1.example.com | 00000010 c3 16 f3 19 8f 04 6d c3 41 aa ea cf 84 60 d0 c7 |......m.A....`..| +peer0.org1.example.com | 00000020 9f 18 6f 34 a8 02 20 6f 81 d6 42 16 92 06 21 50 |..o4.. o..B...!P| +peer0.org1.example.com | 00000030 32 3a 12 4c b6 fe d5 74 02 3a 69 81 62 43 8e a6 |2:.L...t.:i.bC..| +peer0.org1.example.com | 00000040 7c 6a ba 25 70 78 59 ||j.%pxY| +peer0.org1.example.com | [461c 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9d60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [461d 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9d60 gate 1598907145640731300 evaluation succeeds +peer0.org1.example.com | [461e 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [461f 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4620 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4621 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4622 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4623 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4624 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4625 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [4626 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 6f bc e6 0e 08 91 b2 0a 67 44 c2 14 2e dc 99 |.o.......gD.....| +peer0.org1.example.com | 00000010 d6 c7 15 c7 53 70 16 ae 4b 70 12 96 0c f6 e9 86 |....Sp..Kp......| +peer0.org1.example.com | [4627 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 fc 7d 0e ee ef b1 04 45 2d 8e |0E.!...}.....E-.| +peer0.org1.example.com | 00000010 b5 09 4e 13 39 28 76 7e 53 53 d0 bd 17 48 eb 7d |..N.9(v~SS...H.}| +peer0.org1.example.com | 00000020 2a 28 83 40 6c 02 20 55 00 c7 99 e9 e2 6c 60 8d |*(.@l. U.....l`.| +peer0.org1.example.com | 00000030 3a 32 f6 d1 cb 98 7b d9 21 47 a3 3c 8c 63 f4 9d |:2....{.!G.<.c..| +peer0.org1.example.com | 00000040 04 f5 d4 cc 5e b2 19 |....^..| +peer0.org1.example.com | [4628 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4629 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [462a 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [462b 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [462c 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 92 97 fa aa d4 02 28 8b d8 61 84 86 f9 40 ef |.......(..a...@.| +peer0.org1.example.com | 00000010 fb 5e cd 5b 1d b1 37 dc 33 68 1e 31 30 75 bd 0b |.^.[..7.3h.10u..| +peer0.org1.example.com | [462d 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 34 0f 82 b6 c8 0f 1b 71 00 00 |0E.!..4......q..| +peer0.org1.example.com | 00000010 b4 79 07 e4 fd da 76 35 0d 8a 32 f0 9a 5a c6 f9 |.y....v5..2..Z..| +peer0.org1.example.com | 00000020 e3 4d 1b e5 84 02 20 21 79 59 ec 7f e4 89 df b6 |.M.... !yY......| +peer0.org1.example.com | 00000030 9c 4b 7e 22 d9 b1 ef d7 6a b6 7c 1a 7b ef a3 2d |.K~"....j.|.{..-| +peer0.org1.example.com | 00000040 07 5c bb e6 ba bb 91 |.\.....| +peer0.org1.example.com | [462e 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [462f 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4630 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4631 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4632 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [4633 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4634 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 6f bc e6 0e 08 91 b2 0a 67 44 c2 14 2e dc 99 |.o.......gD.....| +peer0.org1.example.com | 00000010 d6 c7 15 c7 53 70 16 ae 4b 70 12 96 0c f6 e9 86 |....Sp..Kp......| +peer0.org1.example.com | [4635 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 fc 7d 0e ee ef b1 04 45 2d 8e |0E.!...}.....E-.| +peer0.org1.example.com | 00000010 b5 09 4e 13 39 28 76 7e 53 53 d0 bd 17 48 eb 7d |..N.9(v~SS...H.}| +peer0.org1.example.com | 00000020 2a 28 83 40 6c 02 20 55 00 c7 99 e9 e2 6c 60 8d |*(.@l. U.....l`.| +peer0.org1.example.com | 00000030 3a 32 f6 d1 cb 98 7b d9 21 47 a3 3c 8c 63 f4 9d |:2....{.!G.<.c..| +peer0.org1.example.com | 00000040 04 f5 d4 cc 5e b2 19 |....^..| +peer0.org1.example.com | [4636 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4637 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4638 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4639 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [463a 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 92 97 fa aa d4 02 28 8b d8 61 84 86 f9 40 ef |.......(..a...@.| +peer0.org1.example.com | 00000010 fb 5e cd 5b 1d b1 37 dc 33 68 1e 31 30 75 bd 0b |.^.[..7.3h.10u..| +peer0.org1.example.com | [463b 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 34 0f 82 b6 c8 0f 1b 71 00 00 |0E.!..4......q..| +peer0.org1.example.com | 00000010 b4 79 07 e4 fd da 76 35 0d 8a 32 f0 9a 5a c6 f9 |.y....v5..2..Z..| +peer0.org1.example.com | 00000020 e3 4d 1b e5 84 02 20 21 79 59 ec 7f e4 89 df b6 |.M.... !yY......| +peer0.org1.example.com | 00000030 9c 4b 7e 22 d9 b1 ef d7 6a b6 7c 1a 7b ef a3 2d |.K~"....j.|.{..-| +peer0.org1.example.com | 00000040 07 5c bb e6 ba bb 91 |.\.....| +peer0.org1.example.com | [463c 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [463d 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [463e 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [463f 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4640 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4641 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4642 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4643 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4644 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4645 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4646 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005650ab0 gate 1598907145664370400 evaluation starts +peer0.org1.example.com | [4647 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005650ab0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4648 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005650ab0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4649 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005650ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [464a 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005650ab0 principal evaluation fails +peer0.org1.example.com | [464b 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005650ab0 gate 1598907145664370400 evaluation fails +peer0.org1.example.com | [464c 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [464d 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [464e 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [464f 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651020 gate 1598907145666866000 evaluation starts +peer0.org1.example.com | [4650 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651020 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4651 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651020 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4652 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4653 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651020 principal evaluation fails +peer0.org1.example.com | [4654 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651020 gate 1598907145666866000 evaluation fails +peer0.org1.example.com | [4655 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4656 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4657 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4658 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651590 gate 1598907145668937200 evaluation starts +peer0.org1.example.com | [4659 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651590 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [465a 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651590 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [465b 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651590 principal matched by identity 0 +peer0.org1.example.com | [465c 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 bb 37 cd a7 3d c7 15 e9 10 ed e0 8b 7c cb 8b |..7..=.......|..| +peer0.org1.example.com | 00000010 37 da ab 81 32 e6 31 10 6e 3a f2 65 5d 49 60 6a |7...2.1.n:.e]I`j| +peer0.org1.example.com | [465d 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb d8 7a 44 f0 ba 1c 97 51 e4 6b |0E.!...zD....Q.k| +peer0.org1.example.com | 00000010 df af be f7 46 7e cd 10 71 ac cf 38 e6 99 9b 95 |....F~..q..8....| +peer0.org1.example.com | 00000020 8f 1a 12 16 6a 02 20 2c 40 29 1b 48 a5 78 d7 11 |....j. ,@).H.x..| +peer0.org1.example.com | 00000030 e1 ab a0 0f 96 3c b1 51 15 13 b7 a7 58 76 e5 73 |.....<.Q....Xv.s| +peer0.org1.example.com | 00000040 65 eb f1 d2 be ca 9d |e......| +peer0.org1.example.com | [465e 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651590 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [465f 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651590 gate 1598907145668937200 evaluation succeeds +peer0.org1.example.com | [4660 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4661 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4662 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4663 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4664 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4665 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4666 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4667 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4668 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4669 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [466a 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [466b 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [466c 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [466d 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [466e 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [466f 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4670 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4671 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4672 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4673 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4674 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4675 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4676 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4677 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4678 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4679 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [467a 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [467b 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005668e60 gate 1598907145687313700 evaluation starts +peer0.org1.example.com | [467c 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005668e60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [467d 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005668e60 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [467e 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005668e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [467f 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005668e60 principal evaluation fails +peer0.org1.example.com | [4680 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005668e60 gate 1598907145687313700 evaluation fails +peer0.org1.example.com | [4681 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4682 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4683 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4684 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056693d0 gate 1598907145689009800 evaluation starts +peer0.org1.example.com | [4685 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056693d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4686 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056693d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4687 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056693d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4688 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056693d0 principal evaluation fails +peer0.org1.example.com | [4689 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056693d0 gate 1598907145689009800 evaluation fails +peer0.org1.example.com | [468a 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [468b 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [468c 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [468d 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005669940 gate 1598907145690647600 evaluation starts +peer0.org1.example.com | [468e 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005669940 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [468f 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005669940 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4690 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005669940 principal matched by identity 0 +peer0.org1.example.com | [4691 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org1.example.com | [4692 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org1.example.com | [4693 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005669940 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4694 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005669940 gate 1598907145690647600 evaluation succeeds +peer0.org1.example.com | [4695 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4696 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4697 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4698 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4699 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org1.example.com | [469a 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org1.example.com | [469b 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org1.example.com | [469c 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org1.example.com | [469d 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [469e 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [469f 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [46a0 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [46a1 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [46a2 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [46a3 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [46a4 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [46a5 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [46a6 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689a30 gate 1598907145696077700 evaluation starts +peer0.org1.example.com | [46a7 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689a30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [46a8 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689a30 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [46a9 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [46aa 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689a30 principal evaluation fails +peer0.org1.example.com | [46ab 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689a30 gate 1598907145696077700 evaluation fails +peer0.org1.example.com | [46ac 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [46ad 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [46ae 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [46af 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689fa0 gate 1598907145700017700 evaluation starts +peer0.org1.example.com | [46b0 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689fa0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [46b1 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689fa0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [46b2 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [46b3 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689fa0 principal evaluation fails +peer0.org1.example.com | [46b4 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689fa0 gate 1598907145700017700 evaluation fails +peer0.org1.example.com | [46b5 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [46b6 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [46b7 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [46b8 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ac510 gate 1598907145700992000 evaluation starts +peer0.org1.example.com | [46b9 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ac510 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [46ba 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ac510 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [46bb 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ac510 principal matched by identity 0 +peer0.org1.example.com | [46bc 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org1.example.com | [46bd 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org1.example.com | [46be 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ac510 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [46bf 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ac510 gate 1598907145700992000 evaluation succeeds +peer0.org1.example.com | [46c0 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [46c1 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [46c2 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [46c3 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [46c4 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [46c5 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [46c6 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org1.example.com | [46c7 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org1.example.com | [46c8 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org1.example.com | [46c9 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org1.example.com | [46ca 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [46cb 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [46cc 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [46cd 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [46ce 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [46cf 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [46d0 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [46d1 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [46d2 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0690 gate 1598907145705369000 evaluation starts +peer0.org1.example.com | [46d3 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0690 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [46d4 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0690 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [46d5 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [46d6 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0690 principal evaluation fails +peer0.org1.example.com | [46d7 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0690 gate 1598907145705369000 evaluation fails +peer0.org1.example.com | [46d8 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [46d9 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [46da 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [46db 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0c00 gate 1598907145706172900 evaluation starts +peer0.org1.example.com | [46dc 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0c00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [46dd 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0c00 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [46de 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [46df 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0c00 principal evaluation fails +peer0.org1.example.com | [46e0 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0c00 gate 1598907145706172900 evaluation fails +peer0.org1.example.com | [46e1 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [46e2 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [46e3 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [46e4 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c1170 gate 1598907145707630000 evaluation starts +peer0.org1.example.com | [46e5 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c1170 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [46e6 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c1170 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [46e7 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c1170 principal matched by identity 0 +peer0.org1.example.com | [46e8 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org1.example.com | [46e9 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org1.example.com | [46ea 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c1170 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [46eb 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c1170 gate 1598907145707630000 evaluation succeeds +peer0.org1.example.com | [46ec 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [46ed 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [46ee 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [46ef 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [46f0 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [46f1 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [46f2 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [46f3 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [46f4 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [46f5 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [46f6 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [46f7 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [46f8 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc370 gate 1598907145710070700 evaluation starts +peer0.org1.example.com | [46f9 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc370 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [46fa 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc370 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [46fb 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [46fc 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc370 principal evaluation fails +peer0.org1.example.com | [46fd 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc370 gate 1598907145710070700 evaluation fails +peer0.org1.example.com | [46fe 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [46ff 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4700 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4701 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc8e0 gate 1598907145711137400 evaluation starts +peer0.org1.example.com | [4702 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc8e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4703 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc8e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4704 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc8e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4705 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc8e0 principal evaluation fails +peer0.org1.example.com | [4706 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc8e0 gate 1598907145711137400 evaluation fails +peer0.org1.example.com | [4707 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4708 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4709 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [470a 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dce50 gate 1598907145712093800 evaluation starts +peer0.org1.example.com | [470b 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dce50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [470c 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dce50 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [470d 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dce50 principal matched by identity 0 +peer0.org1.example.com | [470e 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org1.example.com | [470f 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org1.example.com | [4710 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dce50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4711 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dce50 gate 1598907145712093800 evaluation succeeds +peer0.org1.example.com | [4712 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4713 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4714 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4715 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4716 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4717 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4718 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4719 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [471a 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [471b 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [471c 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [471d 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [471e 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [471f 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4720 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4721 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057062a0 gate 1598907145715880500 evaluation starts +peer0.org1.example.com | [4722 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057062a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4723 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057062a0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4724 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057062a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4725 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057062a0 principal evaluation fails +peer0.org1.example.com | [4726 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057062a0 gate 1598907145715880500 evaluation fails +peer0.org1.example.com | [4727 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4728 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4729 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [472a 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706810 gate 1598907145716847400 evaluation starts +peer0.org1.example.com | [472b 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706810 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [472c 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706810 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [472d 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [472e 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706810 principal evaluation fails +peer0.org1.example.com | [472f 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706810 gate 1598907145716847400 evaluation fails +peer0.org1.example.com | [4730 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4731 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4732 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4733 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706d80 gate 1598907145717940200 evaluation starts +peer0.org1.example.com | [4734 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706d80 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4735 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706d80 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4736 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706d80 principal matched by identity 0 +peer0.org1.example.com | [4737 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org1.example.com | [4738 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org1.example.com | [4739 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706d80 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [473a 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706d80 gate 1598907145717940200 evaluation succeeds +peer0.org1.example.com | [473b 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [473c 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [473d 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [473e 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [473f 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org1.example.com | [4740 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org1.example.com | [4741 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org1.example.com | [4742 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org1.example.com | [4743 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4744 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4745 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4746 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4747 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4748 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4749 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [474a 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [474b 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005718d60 gate 1598907145721702000 evaluation starts +peer0.org1.example.com | [474c 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005718d60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [474d 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005718d60 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [474e 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005718d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [474f 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005718d60 principal evaluation fails +peer0.org1.example.com | [4750 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005718d60 gate 1598907145721702000 evaluation fails +peer0.org1.example.com | [4751 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4752 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4753 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4754 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057192d0 gate 1598907145722540000 evaluation starts +peer0.org1.example.com | [4755 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057192d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4756 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057192d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4757 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057192d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4758 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057192d0 principal evaluation fails +peer0.org1.example.com | [4759 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057192d0 gate 1598907145722540000 evaluation fails +peer0.org1.example.com | [475a 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [475b 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [475c 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [475d 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005719840 gate 1598907145723503900 evaluation starts +peer0.org1.example.com | [475e 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005719840 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [475f 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005719840 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4760 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005719840 principal matched by identity 0 +peer0.org1.example.com | [4761 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org1.example.com | [4762 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org1.example.com | [4763 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005719840 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4764 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005719840 gate 1598907145723503900 evaluation succeeds +peer0.org1.example.com | [4765 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4766 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4767 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4768 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4769 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [476a 08-31 20:52:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [476b 08-31 20:52:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [476c 08-31 20:52:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [476d 08-31 20:52:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [476e 08-31 20:52:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [476f 08-31 20:52:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4770 08-31 20:52:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [4771 08-31 20:52:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4772 08-31 20:52:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4773 08-31 20:52:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4774 08-31 20:52:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4775 08-31 20:52:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4776 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4777 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4778 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4779 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [477a 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [477b 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [477c 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [477d 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [477e 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [477f 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4780 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4781 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4782 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4783 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4784 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4785 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4786 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4787 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4788 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4789 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [478a 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [478b 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [478c 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [478d 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [478e 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610131801 +peer0.org1.example.com | [478f 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8B7EA2122FA2763FCA16387BD9A269ECD265F079B8CBAA8F24B1E0578DCE7A97 +peer0.org1.example.com | [4790 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [4791 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4792 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4793 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4794 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4795 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4796 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4797 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4798 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +peer0.org1.example.com | [4799 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [479a 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [479b 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [479c 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [479d 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [479e 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [479f 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47a0 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47a1 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47a2 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47a3 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [47a4 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [47a5 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [47a6 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [47a7 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [47a8 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [47a9 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [47aa 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47ab 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [47ac 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [47ad 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [47ae 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [47af 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [47b0 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [47b1 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792160 gate 1598907149113849200 evaluation starts +peer0.org1.example.com | [47b2 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792160 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [47b3 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792160 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [47b4 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [47b5 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792160 principal evaluation fails +peer0.org1.example.com | [47b6 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792160 gate 1598907149113849200 evaluation fails +peer0.org1.example.com | [47b7 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [47b8 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [47b9 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [47ba 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057926d0 gate 1598907149115778400 evaluation starts +peer0.org1.example.com | [47bb 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057926d0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [47bc 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057926d0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [47bd 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057926d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [47be 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057926d0 principal evaluation fails +peer0.org1.example.com | [47bf 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057926d0 gate 1598907149115778400 evaluation fails +peer0.org1.example.com | [47c0 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [47c1 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [47c2 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [47c3 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792c40 gate 1598907149120648300 evaluation starts +peer0.org1.example.com | [47c4 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792c40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [47c5 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792c40 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [47c6 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792c40 principal matched by identity 0 +peer0.org1.example.com | [47c7 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 c6 aa ca 4b 34 fb 28 1b f8 14 65 62 8b 48 9a |....K4.(...eb.H.| +peer0.org1.example.com | 00000010 25 8b 97 16 05 19 3a 40 85 36 e0 f5 0f f4 c9 e1 |%.....:@.6......| +peer0.org1.example.com | [47c8 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 8c 08 ce a8 0d f4 e2 1c 0f 72 |0E.!...........r| +peer0.org1.example.com | 00000010 af 0a d7 f2 ba 8a 90 26 28 d4 cc a1 a8 9e 2f b5 |.......&(...../.| +peer0.org1.example.com | 00000020 fc 9b d7 0a 6a 02 20 2c ed 4a 62 87 c0 d5 27 65 |....j. ,.Jb...'e| +peer0.org1.example.com | 00000030 76 8c 5b 0d f0 5c 57 e1 52 14 32 7c 49 ec e9 1b |v.[..\W.R.2|I...| +peer0.org1.example.com | 00000040 a0 fc ff 7f be b6 c9 |.......| +peer0.org1.example.com | [47c9 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792c40 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [47ca 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792c40 gate 1598907149120648300 evaluation succeeds +peer0.org1.example.com | [47cb 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [47cc 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [47cd 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [47ce 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [47cf 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [47d0 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [47d1 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [47d2 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [47d3 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [47d4 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [47d5 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [47d6 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [47d7 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [47d8 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47d9 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47da 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47db 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [47dc 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\013\234\277\257\002 1OW\237u(3\225\261h\n\024\212\nf\304\201\004\3427\036\322\031V\177\274\246.\216\253\341\017" > +peer0.org1.example.com | [47dd 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [47de 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [47df 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [47e0 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [47e1 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [47e2 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [47e3 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [47e4 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [47e5 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [47e6 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [47e7 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [47e8 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [47e9 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 4c e8 7c 41 d4 f7 a3 f5 ac 60 e5 de 00 ae 4f |?L.|A.....`....O| +peer0.org1.example.com | 00000010 0b 3c f0 28 a0 3e 58 c0 fe 51 d7 1b e8 56 fc 1c |.<.(.>X..Q...V..| +peer0.org1.example.com | [47ea 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 0f d7 87 e9 12 8f b2 f3 85 30 |0E.!...........0| +peer0.org1.example.com | 00000010 62 c9 8c 45 56 44 bf 74 ef 55 23 70 7c ae fb 21 |b..EVD.t.U#p|..!| +peer0.org1.example.com | 00000020 e6 37 76 cb c9 02 20 11 7e c4 66 12 ff 9b 01 c4 |.7v... .~.f.....| +peer0.org1.example.com | 00000030 83 63 aa 51 db fa 69 6b 92 b8 0b 02 07 4f 26 71 |.c.Q..ik.....O&q| +peer0.org1.example.com | 00000040 b7 8f 6a 62 5e 8f 09 |..jb^..| +peer0.org1.example.com | [47eb 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [47ec 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 69 89 c7 c2 5a f4 b3 ef 12 fb |0E.!..i...Z.....| +peer0.org1.example.com | 00000010 f1 7e e3 9b ce f8 2d 5d e4 40 07 f5 cd 2f 7d 4c |.~....-].@.../}L| +peer0.org1.example.com | 00000020 cb 00 bc 87 06 02 20 6a 01 2e 2b 9d 62 d7 1e c2 |...... j..+.b...| +peer0.org1.example.com | 00000030 9d 90 66 10 c9 8c db 62 b7 8a fa f2 a6 52 4f 82 |..f....b.....RO.| +peer0.org1.example.com | 00000040 af cb 2b ed 0a bc f1 |..+....| +peer0.org1.example.com | [47ed 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [47ee 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [47ef 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [47f0 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [47f1 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [47f2 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [47f3 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [47f4 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [47f5 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [47f6 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47f7 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47f8 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [47f9 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\013\234\277\257\002 1OW\237u(3\225\261h\n\024\212\nf\304\201\004\3427\036\322\031V\177\274\246.\216\253\341\017" > +peer0.org1.example.com | [47fa 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +peer0.org1.example.com | [47fb 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [47fc 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [47fd 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [47fe 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [47ff 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4800 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4801 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4802 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4803 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4804 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [4805 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4806 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4807 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4808 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" > > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4809 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [480a 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [480b 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [480c 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [480d 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [480e 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [480f 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4810 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4811 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057aedd0 gate 1598907149516279300 evaluation starts +peer0.org1.example.com | [4812 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057aedd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4813 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057aedd0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4814 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057aedd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4815 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057aedd0 principal evaluation fails +peer0.org1.example.com | [4816 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057aedd0 gate 1598907149516279300 evaluation fails +peer0.org1.example.com | [4817 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4818 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4819 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [481a 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af340 gate 1598907149517135000 evaluation starts +peer0.org1.example.com | [481b 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af340 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [481c 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af340 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [481d 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [481e 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af340 principal evaluation fails +peer0.org1.example.com | [481f 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af340 gate 1598907149517135000 evaluation fails +peer0.org1.example.com | [4820 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4821 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4822 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4823 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af8b0 gate 1598907149518341400 evaluation starts +peer0.org1.example.com | [4824 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af8b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4825 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af8b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4826 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af8b0 principal matched by identity 0 +peer0.org1.example.com | [4827 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 01 24 31 7f 14 c1 2b c5 b6 8c 37 ab 5c 65 be |..$1...+...7.\e.| +peer0.org1.example.com | 00000010 69 79 c5 5c 09 c9 b4 62 16 82 2d 7e 47 40 bc c5 |iy.\...b..-~G@..| +peer0.org1.example.com | [4828 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa d0 ca fb 28 92 78 b8 dc 68 46 |0E.!.....(.x..hF| +peer0.org1.example.com | 00000010 cc a0 de 06 1f 1e ab d4 a0 02 30 65 87 b0 5c b3 |..........0e..\.| +peer0.org1.example.com | 00000020 e8 89 d5 d9 02 02 20 03 f5 6a bd 54 66 b0 7f a8 |...... ..j.Tf...| +peer0.org1.example.com | 00000030 7c c3 0d e0 fb 41 e5 a0 b2 cf da 83 40 89 0e ba ||....A......@...| +peer0.org1.example.com | 00000040 ca 21 a1 73 b5 9b 81 |.!.s...| +peer0.org1.example.com | [4829 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af8b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [482a 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af8b0 gate 1598907149518341400 evaluation succeeds +peer0.org1.example.com | [482b 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [482c 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [482d 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [482e 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [482f 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4830 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4831 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4832 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4833 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4834 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4835 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4836 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4837 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [4838 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4839 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [483a 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [483b 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [483d 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +peer0.org1.example.com | [483e 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [483c 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" > alive: alive:\013\234\277\257\002 1OW\237u(3\225\261h\n\024\212\nf\304\201\004\3427\036\322\031V\177\274\246.\216\253\341\017" > +peer0.org1.example.com | [483f 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [4840 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4841 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [4842 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4843 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4844 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4845 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [4846 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4847 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4848 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4849 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [484a 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [484b 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [484c 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [484d 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [484e 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [484f 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4850 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4851 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4852 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4853 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4854 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4855 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4856 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4857 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816103D +peer0.org1.example.com | [4858 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 255A86BE63A76E208F01E1A2D1BBCAD91E4AE9E58B877BAD02B44562B81FD5AE +peer0.org1.example.com | [4859 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [485a 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [485b 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [485c 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [485d 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [485e 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [485f 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4860 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4861 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4862 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4863 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +peer0.org1.example.com | [4864 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4865 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4866 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4867 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4868 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4869 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [486a 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [486b 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [486c 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [486d 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [486e 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [486f 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4870 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4871 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4872 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4873 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a310 gate 1598907149646138900 evaluation starts +peer0.org1.example.com | [4874 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a310 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4875 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a310 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4876 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4877 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a310 principal evaluation fails +peer0.org1.example.com | [4878 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a310 gate 1598907149646138900 evaluation fails +peer0.org1.example.com | [4879 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [487a 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [487b 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [487c 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a880 gate 1598907149647007800 evaluation starts +peer0.org1.example.com | [487d 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a880 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [487e 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a880 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [487f 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4880 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a880 principal evaluation fails +peer0.org1.example.com | [4881 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a880 gate 1598907149647007800 evaluation fails +peer0.org1.example.com | [4882 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4883 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4884 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4885 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582adf0 gate 1598907149647917400 evaluation starts +peer0.org1.example.com | [4886 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582adf0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4887 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582adf0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4888 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582adf0 principal matched by identity 0 +peer0.org1.example.com | [4889 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 01 24 31 7f 14 c1 2b c5 b6 8c 37 ab 5c 65 be |..$1...+...7.\e.| +peer0.org1.example.com | 00000010 69 79 c5 5c 09 c9 b4 62 16 82 2d 7e 47 40 bc c5 |iy.\...b..-~G@..| +peer0.org1.example.com | [488a 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa d0 ca fb 28 92 78 b8 dc 68 46 |0E.!.....(.x..hF| +peer0.org1.example.com | 00000010 cc a0 de 06 1f 1e ab d4 a0 02 30 65 87 b0 5c b3 |..........0e..\.| +peer0.org1.example.com | 00000020 e8 89 d5 d9 02 02 20 03 f5 6a bd 54 66 b0 7f a8 |...... ..j.Tf...| +peer0.org1.example.com | 00000030 7c c3 0d e0 fb 41 e5 a0 b2 cf da 83 40 89 0e ba ||....A......@...| +peer0.org1.example.com | 00000040 ca 21 a1 73 b5 9b 81 |.!.s...| +peer0.org1.example.com | [488b 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582adf0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [488c 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582adf0 gate 1598907149647917400 evaluation succeeds +peer0.org1.example.com | [488d 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [488e 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [488f 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4890 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4891 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4892 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4893 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4894 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 5a 86 be 63 a7 6e 20 8f 01 e1 a2 d1 bb ca d9 |%Z..c.n ........| +peer0.org1.example.com | 00000010 1e 4a e9 e5 8b 87 7b ad 02 b4 45 62 b8 1f d5 ae |.J....{...Eb....| +peer0.org1.example.com | [4895 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c f3 ad 47 07 f0 14 8f ed ba e7 82 |0D. \..G........| +peer0.org1.example.com | 00000010 88 2f 80 50 1f 5f 8b 79 6a 1c 34 31 74 52 55 2b |./.P._.yj.41tRU+| +peer0.org1.example.com | 00000020 58 76 00 c1 02 20 78 e3 70 86 d8 ef ba 05 43 d8 |Xv... x.p.....C.| +peer0.org1.example.com | 00000030 03 1d 97 bf 58 33 81 b8 ea 91 db 8d b0 f4 dd 9d |....X3..........| +peer0.org1.example.com | 00000040 08 d5 88 b9 8a 89 |......| +peer0.org1.example.com | [4896 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4897 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4899 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4898 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [489a 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [489b 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [489c 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 4c e8 7c 41 d4 f7 a3 f5 ac 60 e5 de 00 ae 4f |?L.|A.....`....O| +peer0.org1.example.com | 00000010 0b 3c f0 28 a0 3e 58 c0 fe 51 d7 1b e8 56 fc 1c |.<.(.>X..Q...V..| +peer0.org1.example.com | [489d 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 0f d7 87 e9 12 8f b2 f3 85 30 |0E.!...........0| +peer0.org1.example.com | 00000010 62 c9 8c 45 56 44 bf 74 ef 55 23 70 7c ae fb 21 |b..EVD.t.U#p|..!| +peer0.org1.example.com | 00000020 e6 37 76 cb c9 02 20 11 7e c4 66 12 ff 9b 01 c4 |.7v... .~.f.....| +peer0.org1.example.com | 00000030 83 63 aa 51 db fa 69 6b 92 b8 0b 02 07 4f 26 71 |.c.Q..ik.....O&q| +peer0.org1.example.com | 00000040 b7 8f 6a 62 5e 8f 09 |..jb^..| +peer0.org1.example.com | [489e 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [489f 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48a0 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48a1 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48a2 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [48a3 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [48a4 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 5a 86 be 63 a7 6e 20 8f 01 e1 a2 d1 bb ca d9 |%Z..c.n ........| +peer0.org1.example.com | 00000010 1e 4a e9 e5 8b 87 7b ad 02 b4 45 62 b8 1f d5 ae |.J....{...Eb....| +peer0.org1.example.com | [48a5 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c f3 ad 47 07 f0 14 8f ed ba e7 82 |0D. \..G........| +peer0.org1.example.com | 00000010 88 2f 80 50 1f 5f 8b 79 6a 1c 34 31 74 52 55 2b |./.P._.yj.41tRU+| +peer0.org1.example.com | 00000020 58 76 00 c1 02 20 78 e3 70 86 d8 ef ba 05 43 d8 |Xv... x.p.....C.| +peer0.org1.example.com | 00000030 03 1d 97 bf 58 33 81 b8 ea 91 db 8d b0 f4 dd 9d |....X3..........| +peer0.org1.example.com | 00000040 08 d5 88 b9 8a 89 |......| +peer0.org1.example.com | [48a6 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [48a7 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [48a8 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 46 44 84 26 7e 91 ee 58 0c 15 |0E.!..FD.&~..X..| +peer0.org1.example.com | 00000010 c2 24 b1 10 ad 38 72 82 1d 1e 96 8e e2 a6 d4 1f |.$...8r.........| +peer0.org1.example.com | 00000020 9d 60 0d e3 d3 02 20 12 7e 88 fe 03 14 df da a4 |.`.... .~.......| +peer0.org1.example.com | 00000030 0d 2e 5c 1e bb e6 2a f3 77 b0 7b 9e ed 7c ee 39 |..\...*.w.{..|.9| +peer0.org1.example.com | 00000040 67 b6 94 76 b4 2f 34 |g..v./4| +peer0.org1.example.com | [48a9 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [48aa 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [48ab 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48ac 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48ad 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [48ae 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [48af 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 5a 86 be 63 a7 6e 20 8f 01 e1 a2 d1 bb ca d9 |%Z..c.n ........| +peer0.org1.example.com | 00000010 1e 4a e9 e5 8b 87 7b ad 02 b4 45 62 b8 1f d5 ae |.J....{...Eb....| +peer0.org1.example.com | [48b0 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c f3 ad 47 07 f0 14 8f ed ba e7 82 |0D. \..G........| +peer0.org1.example.com | 00000010 88 2f 80 50 1f 5f 8b 79 6a 1c 34 31 74 52 55 2b |./.P._.yj.41tRU+| +peer0.org1.example.com | 00000020 58 76 00 c1 02 20 78 e3 70 86 d8 ef ba 05 43 d8 |Xv... x.p.....C.| +peer0.org1.example.com | 00000030 03 1d 97 bf 58 33 81 b8 ea 91 db 8d b0 f4 dd 9d |....X3..........| +peer0.org1.example.com | 00000040 08 d5 88 b9 8a 89 |......| +peer0.org1.example.com | [48b1 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [48b2 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [48b3 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48b4 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [48b5 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 4c e8 7c 41 d4 f7 a3 f5 ac 60 e5 de 00 ae 4f |?L.|A.....`....O| +peer0.org1.example.com | 00000010 0b 3c f0 28 a0 3e 58 c0 fe 51 d7 1b e8 56 fc 1c |.<.(.>X..Q...V..| +peer0.org1.example.com | [48b6 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 0f d7 87 e9 12 8f b2 f3 85 30 |0E.!...........0| +peer0.org1.example.com | 00000010 62 c9 8c 45 56 44 bf 74 ef 55 23 70 7c ae fb 21 |b..EVD.t.U#p|..!| +peer0.org1.example.com | 00000020 e6 37 76 cb c9 02 20 11 7e c4 66 12 ff 9b 01 c4 |.7v... .~.f.....| +peer0.org1.example.com | 00000030 83 63 aa 51 db fa 69 6b 92 b8 0b 02 07 4f 26 71 |.c.Q..ik.....O&q| +peer0.org1.example.com | 00000040 b7 8f 6a 62 5e 8f 09 |..jb^..| +peer0.org1.example.com | [48b7 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48b8 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [48b9 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48ba 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [48bb 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48bc 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [48bd 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [48be 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [48bf 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [48c0 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [48c1 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [48c2 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869980 gate 1598907149670599800 evaluation starts +peer0.org1.example.com | [48c3 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869980 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [48c4 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869980 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [48c5 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [48c6 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869980 principal evaluation fails +peer0.org1.example.com | [48c7 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869980 gate 1598907149670599800 evaluation fails +peer0.org1.example.com | [48c8 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [48c9 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [48ca 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [48cb 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869ef0 gate 1598907149671973000 evaluation starts +peer0.org1.example.com | [48cc 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869ef0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [48cd 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869ef0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [48ce 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [48cf 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869ef0 principal evaluation fails +peer0.org1.example.com | [48d0 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869ef0 gate 1598907149671973000 evaluation fails +peer0.org1.example.com | [48d1 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [48d2 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [48d3 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [48d4 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005880460 gate 1598907149672970200 evaluation starts +peer0.org1.example.com | [48d5 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005880460 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [48d6 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005880460 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [48d7 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005880460 principal matched by identity 0 +peer0.org1.example.com | [48d8 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 c6 aa ca 4b 34 fb 28 1b f8 14 65 62 8b 48 9a |....K4.(...eb.H.| +peer0.org1.example.com | 00000010 25 8b 97 16 05 19 3a 40 85 36 e0 f5 0f f4 c9 e1 |%.....:@.6......| +peer0.org1.example.com | [48d9 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 8c 08 ce a8 0d f4 e2 1c 0f 72 |0E.!...........r| +peer0.org1.example.com | 00000010 af 0a d7 f2 ba 8a 90 26 28 d4 cc a1 a8 9e 2f b5 |.......&(...../.| +peer0.org1.example.com | 00000020 fc 9b d7 0a 6a 02 20 2c ed 4a 62 87 c0 d5 27 65 |....j. ,.Jb...'e| +peer0.org1.example.com | 00000030 76 8c 5b 0d f0 5c 57 e1 52 14 32 7c 49 ec e9 1b |v.[..\W.R.2|I...| +peer0.org1.example.com | 00000040 a0 fc ff 7f be b6 c9 |.......| +peer0.org1.example.com | [48da 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005880460 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [48db 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005880460 gate 1598907149672970200 evaluation succeeds +peer0.org1.example.com | [48dc 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [48dd 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [48de 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [48df 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [48e0 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [48e1 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48e2 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48e3 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48e4 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48e5 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [48e6 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [48e7 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48e8 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [48e9 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [48ea 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48eb 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [48ec 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [48ed 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48ee 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48ef 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [48f0 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [48f1 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [48f2 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [48f3 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [48f4 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [48f5 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [48f6 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005881bd0 gate 1598907149684439600 evaluation starts +peer0.org1.example.com | [48f7 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005881bd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [48f8 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005881bd0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [48f9 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005881bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [48fa 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005881bd0 principal evaluation fails +peer0.org1.example.com | [48fb 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005881bd0 gate 1598907149684439600 evaluation fails +peer0.org1.example.com | [48fc 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [48fd 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [48fe 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [48ff 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a2140 gate 1598907149684830500 evaluation starts +peer0.org1.example.com | [4900 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a2140 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4901 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a2140 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4902 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a2140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4903 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a2140 principal evaluation fails +peer0.org1.example.com | [4904 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a2140 gate 1598907149684830500 evaluation fails +peer0.org1.example.com | [4905 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4906 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4907 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4908 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a26b0 gate 1598907149685063700 evaluation starts +peer0.org1.example.com | [4909 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a26b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [490a 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a26b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [490b 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a26b0 principal matched by identity 0 +peer0.org1.example.com | [490c 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org1.example.com | [490d 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org1.example.com | [490e 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [490f 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a26b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4910 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a26b0 gate 1598907149685063700 evaluation succeeds +peer0.org1.example.com | [4911 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4912 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4913 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4914 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4915 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org1.example.com | [4916 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org1.example.com | [4917 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org1.example.com | [4918 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org1.example.com | [4919 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [491a 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [491b 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [491c 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [491d 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [491e 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [491f 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4920 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4921 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4922 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058be690 gate 1598907149688958800 evaluation starts +peer0.org1.example.com | [4923 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058be690 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4924 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058be690 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4925 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058be690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4926 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058be690 principal evaluation fails +peer0.org1.example.com | [4927 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058be690 gate 1598907149688958800 evaluation fails +peer0.org1.example.com | [4928 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4929 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [492a 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [492b 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bec00 gate 1598907149689921900 evaluation starts +peer0.org1.example.com | [492c 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bec00 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [492d 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bec00 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [492e 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bec00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [492f 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bec00 principal evaluation fails +peer0.org1.example.com | [4930 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bec00 gate 1598907149689921900 evaluation fails +peer0.org1.example.com | [4931 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4932 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4933 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4934 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bf170 gate 1598907149690151900 evaluation starts +peer0.org1.example.com | [4935 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bf170 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4936 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bf170 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4937 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bf170 principal matched by identity 0 +peer0.org1.example.com | [4938 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org1.example.com | [4939 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org1.example.com | [493a 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bf170 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [493b 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bf170 gate 1598907149690151900 evaluation succeeds +peer0.org1.example.com | [493c 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [493d 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [493e 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [493f 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4940 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4941 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4942 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4943 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4944 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4945 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4946 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4947 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4948 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4949 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [494a 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [494b 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d65c0 gate 1598907149697027900 evaluation starts +peer0.org1.example.com | [494c 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d65c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [494d 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d65c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [494e 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d65c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [494f 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d65c0 principal evaluation fails +peer0.org1.example.com | [4950 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d65c0 gate 1598907149697027900 evaluation fails +peer0.org1.example.com | [4951 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4952 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4953 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4954 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d6b30 gate 1598907149701323300 evaluation starts +peer0.org1.example.com | [4955 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d6b30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4956 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d6b30 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4957 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d6b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4958 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d6b30 principal evaluation fails +peer0.org1.example.com | [4959 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d6b30 gate 1598907149701323300 evaluation fails +peer0.org1.example.com | [495a 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [495b 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [495c 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [495d 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d70a0 gate 1598907149704305500 evaluation starts +peer0.org1.example.com | [495e 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d70a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [495f 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d70a0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4960 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d70a0 principal matched by identity 0 +peer0.org1.example.com | [4961 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org1.example.com | [4962 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org1.example.com | [4963 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d70a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4964 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d70a0 gate 1598907149704305500 evaluation succeeds +peer0.org1.example.com | [4965 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4966 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4967 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4968 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4969 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org1.example.com | [496a 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org1.example.com | [496b 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org1.example.com | [496c 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org1.example.com | [496d 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [496e 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [496f 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4970 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4971 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4972 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4973 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4974 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4975 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9080 gate 1598907149716132700 evaluation starts +peer0.org1.example.com | [4976 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9080 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4977 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9080 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4978 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4979 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9080 principal evaluation fails +peer0.org1.example.com | [497a 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9080 gate 1598907149716132700 evaluation fails +peer0.org1.example.com | [497b 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [497c 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [497d 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [497e 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f95f0 gate 1598907149717604700 evaluation starts +peer0.org1.example.com | [497f 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f95f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4980 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f95f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4981 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f95f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4982 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f95f0 principal evaluation fails +peer0.org1.example.com | [4983 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f95f0 gate 1598907149717604700 evaluation fails +peer0.org1.example.com | [4984 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4985 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4986 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4987 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9b60 gate 1598907149721394800 evaluation starts +peer0.org1.example.com | [4988 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9b60 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4989 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9b60 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [498a 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9b60 principal matched by identity 0 +peer0.org1.example.com | [498b 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org1.example.com | [498c 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org1.example.com | [498d 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9b60 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [498e 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9b60 gate 1598907149721394800 evaluation succeeds +peer0.org1.example.com | [498f 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4990 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4991 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4992 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4993 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4994 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4995 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org1.example.com | [4996 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org1.example.com | [4997 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org1.example.com | [4998 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org1.example.com | [4999 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [499a 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [499b 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [499c 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [499d 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [499e 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [499f 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [49a0 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [49a1 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005913ce0 gate 1598907149728031200 evaluation starts +peer0.org1.example.com | [49a2 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005913ce0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [49a3 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005913ce0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [49a4 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005913ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [49a5 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005913ce0 principal evaluation fails +peer0.org1.example.com | [49a6 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005913ce0 gate 1598907149728031200 evaluation fails +peer0.org1.example.com | [49a7 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [49a8 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [49a9 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [49aa 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005928250 gate 1598907149728992200 evaluation starts +peer0.org1.example.com | [49ab 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005928250 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [49ac 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005928250 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [49ad 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005928250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [49ae 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005928250 principal evaluation fails +peer0.org1.example.com | [49af 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005928250 gate 1598907149728992200 evaluation fails +peer0.org1.example.com | [49b0 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [49b1 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [49b2 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [49b3 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059287c0 gate 1598907149730378600 evaluation starts +peer0.org1.example.com | [49b4 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059287c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [49b5 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059287c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [49b6 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059287c0 principal matched by identity 0 +peer0.org1.example.com | [49b7 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org1.example.com | [49b8 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org1.example.com | [49b9 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059287c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [49ba 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059287c0 gate 1598907149730378600 evaluation succeeds +peer0.org1.example.com | [49bb 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [49bc 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [49bd 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [49be 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [49bf 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49c0 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [49c1 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [49c2 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [49c3 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [49c4 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [49c5 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [49c6 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [49c7 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059299c0 gate 1598907149735653300 evaluation starts +peer0.org1.example.com | [49c8 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059299c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [49c9 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059299c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [49ca 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059299c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [49cb 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059299c0 principal evaluation fails +peer0.org1.example.com | [49cc 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059299c0 gate 1598907149735653300 evaluation fails +peer0.org1.example.com | [49cd 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [49ce 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [49cf 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [49d0 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005929f30 gate 1598907149739061600 evaluation starts +peer0.org1.example.com | [49d1 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005929f30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [49d2 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005929f30 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [49d3 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005929f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [49d4 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005929f30 principal evaluation fails +peer0.org1.example.com | [49d5 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005929f30 gate 1598907149739061600 evaluation fails +peer0.org1.example.com | [49d6 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [49d7 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [49d8 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [49d9 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059404a0 gate 1598907149740386900 evaluation starts +peer0.org1.example.com | [49da 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059404a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [49db 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059404a0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [49dc 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059404a0 principal matched by identity 0 +peer0.org1.example.com | [49dd 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org1.example.com | [49de 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org1.example.com | [49df 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059404a0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [49e0 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059404a0 gate 1598907149740386900 evaluation succeeds +peer0.org1.example.com | [49e1 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [49e2 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [49e3 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [49e4 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [49e5 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [49e6 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36990 +peer0.org1.example.com | [49e7 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00594a2d0 +peer0.org1.example.com | [49e8 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [49e9 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [49ea 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [49eb 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [49ec 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 0c 20 63 a4 8f 9f 12 75 1e cd a2 52 da 78 6f |.. c....u...R.xo| +peer0.org1.example.com | 00000010 0c 29 aa 2b ec e0 a5 15 e9 f8 c1 18 42 a1 13 99 |.).+........B...| +peer0.org1.example.com | [49ed 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 36 73 8c 62 0c c5 6b fc 6b f2 |0E.!..6s.b..k.k.| +peer0.org1.example.com | 00000010 cd e3 56 9d 5d e2 90 7b 82 c5 fc c3 58 17 91 f4 |..V.]..{....X...| +peer0.org1.example.com | 00000020 35 0d 78 7e 5b 02 20 10 1c b2 0e 96 7d 9d 7d e4 |5.x~[. .....}.}.| +peer0.org1.example.com | 00000030 41 28 9d 36 88 e2 0e 60 2d 14 3c 50 a6 f5 fc e2 |A(.6...`-._.| +peer0.org1.example.com | [49ee 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [49ef 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00584ccb0, header 0xc00594a6e0 +peer0.org1.example.com | [49f0 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +peer0.org1.example.com | [49f1 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU [][a10a3d0c] processing txid: a10a3d0c4fad2dd44f995baad616e6fc4066f8dc745957940454af3e8e88bcdf +peer0.org1.example.com | [49f2 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU [][a10a3d0c] Entry chaincode: name:"cscc" +peer0.org1.example.com | [49f3 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> INFO [][a10a3d0c] Entry chaincode: name:"cscc" +peer0.org1.example.com | [49f4 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [49f5 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +peer0.org1.example.com | [49f6 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 0c 20 63 a4 8f 9f 12 75 1e cd a2 52 da 78 6f |.. c....u...R.xo| +peer0.org1.example.com | 00000010 0c 29 aa 2b ec e0 a5 15 e9 f8 c1 18 42 a1 13 99 |.).+........B...| +peer0.org1.example.com | [49f7 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 36 73 8c 62 0c c5 6b fc 6b f2 |0E.!..6s.b..k.k.| +peer0.org1.example.com | 00000010 cd e3 56 9d 5d e2 90 7b 82 c5 fc c3 58 17 91 f4 |..V.]..{....X...| +peer0.org1.example.com | 00000020 35 0d 78 7e 5b 02 20 10 1c b2 0e 96 7d 9d 7d e4 |5.x~[. .....}.}.| +peer0.org1.example.com | 00000030 41 28 9d 36 88 e2 0e 60 2d 14 3c 50 a6 f5 fc e2 |A(.6...`-._.| +peer0.org1.example.com | [49f8 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU [a10a3d0c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [49f9 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU [a10a3d0c] notifying Txid:a10a3d0c4fad2dd44f995baad616e6fc4066f8dc745957940454af3e8e88bcdf, channelID: +peer0.org1.example.com | [49fa 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [49fb 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> INFO [][a10a3d0c] Exit chaincode: name:"cscc" (1ms) +peer0.org1.example.com | [49fc 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU [][a10a3d0c] Exit +peer0.org1.example.com | [49fd 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36990 +peer0.org1.example.com | [49fe 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36990 grpc.code=OK grpc.call_duration=3.6245ms +peer0.org1.example.com | [49ff 08-31 20:52:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:36990: read: connection reset by peer +peer0.org1.example.com | [4a00 08-31 20:52:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [4a01 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a02 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a03 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [4a04 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a05 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a06 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4a07 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [4a08 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a09 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4a0a 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4a0b 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4a0c 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a0d 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4a0e 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4a0f 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a10 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a11 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a12 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [4a13 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [4a14 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +peer0.org1.example.com | [4a15 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [4a16 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a17 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a18 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a19 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a1a 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a1b 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4a1c 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a1d 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4a1e 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a1f 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a20 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4a21 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4a22 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4a23 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005851f70 gate 1598907150049660900 evaluation starts +peer0.org1.example.com | [4a24 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005851f70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4a25 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005851f70 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4a26 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005851f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4a27 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005851f70 principal evaluation fails +peer0.org1.example.com | [4a28 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005851f70 gate 1598907150049660900 evaluation fails +peer0.org1.example.com | [4a29 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4a2a 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4a2b 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4a2c 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b04e0 gate 1598907150051500100 evaluation starts +peer0.org1.example.com | [4a2d 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b04e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4a2e 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b04e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4a2f 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b04e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4a30 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b04e0 principal evaluation fails +peer0.org1.example.com | [4a31 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b04e0 gate 1598907150051500100 evaluation fails +peer0.org1.example.com | [4a32 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4a33 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4a34 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4a35 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b0a50 gate 1598907150057826400 evaluation starts +peer0.org1.example.com | [4a36 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b0a50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4a37 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b0a50 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4a38 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b0a50 principal matched by identity 0 +peer0.org1.example.com | [4a39 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 bd 6c 71 9f 8e a3 e3 1e 7a ea 70 83 1b 6d c2 |2.lq.....z.p..m.| +peer0.org1.example.com | 00000010 6b bd 37 73 68 9b 81 0a 3f 03 7e 0e 9c c0 67 fa |k.7sh...?.~...g.| +peer0.org1.example.com | [4a3a 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 e8 be af 3f 71 01 48 4d 01 98 |0E.!.....?q.HM..| +peer0.org1.example.com | 00000010 1a d1 b5 b7 74 e0 51 a7 5d 96 02 84 74 ee 94 13 |....t.Q.]...t...| +peer0.org1.example.com | 00000020 0b b2 34 a3 8f 02 20 66 e8 c2 8a ef 06 0e 44 84 |..4... f......D.| +peer0.org1.example.com | 00000030 c8 93 19 72 c3 44 b0 2a 87 41 bf 53 b5 81 c1 f5 |...r.D.*.A.S....| +peer0.org1.example.com | 00000040 c7 cc 36 96 e6 2d 09 |..6..-.| +peer0.org1.example.com | [4a3b 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b0a50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4a3c 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b0a50 gate 1598907150057826400 evaluation succeeds +peer0.org1.example.com | [4a3d 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4a3e 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4a3f 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4a40 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4a41 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a42 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4a43 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4a44 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4a45 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4a46 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a47 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a48 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a49 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a4a 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a4b 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a4c 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a4d 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a4e 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a4f 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4a50 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a51 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a52 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4a53 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a54 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a55 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a57 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a56 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a58 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a59 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a5a 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a5b 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a5c 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a5d 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a5e 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a5f 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a60 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4a61 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a62 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a63 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a64 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a65 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a66 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a67 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a68 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a69 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4a6a 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 77 41 19 c8 60 ea ba ef a0 ff 82 07 fa 98 |.twA..`.........| +peer0.org1.example.com | 00000010 25 53 c0 aa 29 fd cb ed 6d b8 03 70 30 6b 4d 17 |%S..)...m..p0kM.| +peer0.org1.example.com | [4a6b 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 43 51 f7 a3 56 a4 5b 3f 67 7d |0E.!..CQ..V.[?g}| +peer0.org1.example.com | 00000010 38 74 79 85 40 54 10 89 ce e5 61 a1 89 f6 09 ca |8ty.@T....a.....| +peer0.org1.example.com | 00000020 cb 18 9c d8 c7 02 20 2b 73 d9 66 06 2c d4 a3 14 |...... +s.f.,...| +peer0.org1.example.com | 00000030 07 27 18 58 7d a8 94 71 d3 5a 7c 62 4a a7 fd f1 |.'.X}..q.Z|bJ...| +peer0.org1.example.com | 00000040 f6 12 2f f6 34 d4 15 |../.4..| +peer0.org1.example.com | [4a6c 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a6d 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4a6e 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4a6f 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4a70 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4a71 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a72 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a73 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a74 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a75 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a76 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a77 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a78 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a79 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a7a 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a7b 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a7c 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4a7d 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a7e 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a7f 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a80 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4a81 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a82 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a83 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a84 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a85 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4a86 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a87 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4a88 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4a89 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a8a 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a8b 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a8c 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a8d 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4a8e 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4a8f 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4a90 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4a91 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4a92 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4a93 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a94 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4a95 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4a96 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4a97 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4a98 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a02ce0 gate 1598907150443133300 evaluation starts +peer0.org1.example.com | [4a99 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a02ce0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4a9a 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a02ce0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4a9b 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a02ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4a9c 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a02ce0 principal evaluation fails +peer0.org1.example.com | [4a9d 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a02ce0 gate 1598907150443133300 evaluation fails +peer0.org1.example.com | [4a9e 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4a9f 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4aa0 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4aa1 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a03250 gate 1598907150446580600 evaluation starts +peer0.org1.example.com | [4aa2 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a03250 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4aa3 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a03250 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4aa4 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a03250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4aa5 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a03250 principal evaluation fails +peer0.org1.example.com | [4aa6 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a03250 gate 1598907150446580600 evaluation fails +peer0.org1.example.com | [4aa7 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4aa8 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4aa9 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4aaa 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a037c0 gate 1598907150450080800 evaluation starts +peer0.org1.example.com | [4aab 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a037c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4aac 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a037c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4aad 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a037c0 principal matched by identity 0 +peer0.org1.example.com | [4aae 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b 97 5e 88 bd 3e b9 81 a8 0b e7 48 cb ee 53 b3 |[.^..>.....H..S.| +peer0.org1.example.com | 00000010 d3 77 95 7e 0e 16 cb 07 dd 09 64 f4 6d 05 de 6f |.w.~......d.m..o| +peer0.org1.example.com | [4aaf 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b a1 6e 04 31 7f 05 ce 18 6d 1e 65 |0D. [.n.1....m.e| +peer0.org1.example.com | 00000010 45 65 eb 8f 99 e0 a0 a6 f0 9f d6 54 37 e8 f9 f7 |Ee.........T7...| +peer0.org1.example.com | 00000020 38 b4 7d 28 02 20 71 b5 cf a8 3a 90 c2 d2 88 16 |8.}(. q...:.....| +peer0.org1.example.com | 00000030 50 e1 2c 4c 59 d4 0a 36 85 d3 87 4b 79 f7 a9 2a |P.,LY..6...Ky..*| +peer0.org1.example.com | 00000040 5d fb 7c 40 02 07 |].|@..| +peer0.org1.example.com | [4ab0 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a037c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4ab1 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a037c0 gate 1598907150450080800 evaluation succeeds +peer0.org1.example.com | [4ab2 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4ab3 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4ab4 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4ab5 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4ab6 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4ab7 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +peer0.org1.example.com | [4ab8 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4ab9 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4aba 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4abb 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4abc 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4abd 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4abe 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4abf 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ac0 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ac1 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ac2 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ac3 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ac4 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ac5 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4ac6 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ac7 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4ac8 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4ac9 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4aca 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4acb 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4acc 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4acd 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4ace 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4acf 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4ad0 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ad1 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4ad2 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4ad3 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ad4 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4ad5 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ad6 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4ad7 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816103E +peer0.org1.example.com | [4ad8 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E324C0E0C194FFB01A557E497880C902FFEE360AE4DF30E756B1074160F3E4E1 +peer0.org1.example.com | [4ad9 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4ada 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [4adb 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [4adc 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +peer0.org1.example.com | [4add 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ade 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4adf 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ae0 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4ae1 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4ae2 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ae3 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +peer0.org1.example.com | [4ae4 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4ae5 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ae6 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4ae7 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ae8 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4ae9 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4aea 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36998 +peer0.org1.example.com | [4aeb 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc005993810 +peer0.org1.example.com | [4aec 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +peer0.org1.example.com | [4aed 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU begin +peer0.org1.example.com | [4aee 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +peer0.org1.example.com | [4aef 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +peer0.org1.example.com | [4af0 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc 1f eb 26 2b 85 da c8 78 c7 6d 56 97 0b c1 44 |...&+...x.mV...D| +peer0.org1.example.com | 00000010 f9 57 ab 00 ab a2 f1 89 45 6c 2d ae a4 32 3e f8 |.W......El-..2>.| +peer0.org1.example.com | [4af1 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 dc 24 aa d1 83 3d 86 a8 17 94 d6 |0D. w.$...=.....| +peer0.org1.example.com | 00000010 f1 78 8a a7 05 16 32 ad 46 b6 ab 46 a8 c5 a8 e8 |.x....2.F..F....| +peer0.org1.example.com | 00000020 c5 78 e5 f1 02 20 6c d8 2f e0 18 7e 9a 4a c4 8e |.x... l./..~.J..| +peer0.org1.example.com | 00000030 d5 73 e2 83 1b 38 d5 5f 7b 71 82 bd 1a 0e d3 de |.s...8._{q......| +peer0.org1.example.com | 00000040 d5 c7 de 7c 1d 03 |...|..| +peer0.org1.example.com | [4af2 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +peer0.org1.example.com | [4af3 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0059e65b0, header 0xc005993c20 +peer0.org1.example.com | [4af4 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +peer0.org1.example.com | [4af5 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU [][f21cb71d] processing txid: f21cb71d01e356c9e46faa671d04e699ffce614af071fcab9db1934ef7f5adbc +peer0.org1.example.com | [4af6 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU [][f21cb71d] Entry chaincode: name:"qscc" +peer0.org1.example.com | [4af7 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> INFO [][f21cb71d] Entry chaincode: name:"qscc" +peer0.org1.example.com | [4af8 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +peer0.org1.example.com | [4af9 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +peer0.org1.example.com | [4afa 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +peer0.org1.example.com | [4afb 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +peer0.org1.example.com | [4afc 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4afd 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4afe 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4aff 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b00 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +peer0.org1.example.com | CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +peer0.org1.example.com | YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +peer0.org1.example.com | b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +peer0.org1.example.com | MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +peer0.org1.example.com | YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +peer0.org1.example.com | rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +peer0.org1.example.com | xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +peer0.org1.example.com | GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [4b01 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3d8b0 gate 1598907150902935900 evaluation starts +peer0.org1.example.com | [4b02 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3d8b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4b03 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3d8b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4b04 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3d8b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +peer0.org1.example.com | [4b05 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3d8b0 principal evaluation fails +peer0.org1.example.com | [4b06 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3d8b0 gate 1598907150902935900 evaluation fails +peer0.org1.example.com | [4b07 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4b08 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4b09 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4b0a 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a90700 gate 1598907150904613600 evaluation starts +peer0.org1.example.com | [4b0b 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a90700 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4b0c 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a90700 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4b0d 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [4b0e 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [4b0f 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [4b10 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a90700 principal matched by identity 0 +peer0.org1.example.com | [4b11 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc 1f eb 26 2b 85 da c8 78 c7 6d 56 97 0b c1 44 |...&+...x.mV...D| +peer0.org1.example.com | 00000010 f9 57 ab 00 ab a2 f1 89 45 6c 2d ae a4 32 3e f8 |.W......El-..2>.| +peer0.org1.example.com | [4b12 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 dc 24 aa d1 83 3d 86 a8 17 94 d6 |0D. w.$...=.....| +peer0.org1.example.com | 00000010 f1 78 8a a7 05 16 32 ad 46 b6 ab 46 a8 c5 a8 e8 |.x....2.F..F....| +peer0.org1.example.com | 00000020 c5 78 e5 f1 02 20 6c d8 2f e0 18 7e 9a 4a c4 8e |.x... l./..~.J..| +peer0.org1.example.com | 00000030 d5 73 e2 83 1b 38 d5 5f 7b 71 82 bd 1a 0e d3 de |.s...8._{q......| +peer0.org1.example.com | 00000040 d5 c7 de 7c 1d 03 |...|..| +peer0.org1.example.com | [4b13 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a90700 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4b14 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a90700 gate 1598907150904613600 evaluation succeeds +peer0.org1.example.com | [4b15 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4b16 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4b17 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4b18 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4b19 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU [f21cb71d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +peer0.org1.example.com | [4b1a 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU [f21cb71d] notifying Txid:f21cb71d01e356c9e46faa671d04e699ffce614af071fcab9db1934ef7f5adbc, channelID: +peer0.org1.example.com | [4b1b 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +peer0.org1.example.com | [4b1c 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> INFO [][f21cb71d] Exit chaincode: name:"qscc" (9ms) +peer0.org1.example.com | [4b1d 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU [][f21cb71d] Exit +peer0.org1.example.com | [4b1e 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36998 +peer0.org1.example.com | [4b1f 08-31 20:52:30.91 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36998 grpc.code=OK grpc.call_duration=14.7195ms +peer0.org1.example.com | [4b20 08-31 20:52:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [4b21 08-31 20:52:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing request from 172.18.0.9:37006: authentication:tg\262n\302\216X\340\024\027\255\274\260\274\301\363\252\010" > queries: > > > +peer0.org1.example.com | [4b22 08-31 20:52:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +peer0.org1.example.com | [4b23 08-31 20:52:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4b24 08-31 20:52:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +peer0.org1.example.com | [4b25 08-31 20:52:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a91b50 gate 1598907151979704900 evaluation starts +peer0.org1.example.com | [4b26 08-31 20:52:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a91b50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4b27 08-31 20:52:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a91b50 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4b28 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a91b50 principal matched by identity 0 +peer0.org1.example.com | [4b29 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 50 fd 85 13 59 7c c0 23 4d 67 c6 92 bd 53 52 |tP...Y|.#Mg...SR| +peer0.org1.example.com | 00000010 e4 01 c3 48 8e a8 08 14 b6 fc cf be 17 ce 67 9f |...H..........g.| +peer0.org1.example.com | [4b2a 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 22 ff 9e 38 a3 ef 1f 68 b5 66 41 |0D. 5"..8...h.fA| +peer0.org1.example.com | 00000010 10 71 52 33 61 99 00 61 b0 94 65 0a c3 11 42 ce |.qR3a..a..e...B.| +peer0.org1.example.com | 00000020 88 91 4b c1 02 20 5c 8a 58 57 af 50 2f d6 2d 77 |..K.. \.XW.P/.-w| +peer0.org1.example.com | 00000030 5c 7d b4 65 74 db 1b 57 fe 94 f7 63 8e 74 bf 1c |\}.et..W...c.t..| +peer0.org1.example.com | 00000040 76 89 b1 ad 38 af |v...8.| +peer0.org1.example.com | [4b2b 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a91b50 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4b2c 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a91b50 gate 1598907151979704900 evaluation succeeds +peer0.org1.example.com | [4b2d 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [4b2e 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +peer0.org1.example.com | [4b2f 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +peer0.org1.example.com | [4b30 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +peer0.org1.example.com | [4b31 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Returning metadata for channel businesschannel , chaincode exp02 : {exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []} +peer0.org1.example.com | [4b32 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Returning metadata for channel businesschannel , chaincode exp02 : {exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []} +peer0.org1.example.com | [4b33 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b, Metadata: satisfies principal principal:"\n\007Org1MSP" +peer0.org1.example.com | [4b34 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28, Metadata: doesn't satisfy principal principal:"\n\007Org1MSP" : the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4b35 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer1.org2.example.com:7051, InternalEndpoint: , PKI-ID: 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482, Metadata: doesn't satisfy principal principal:"\n\007Org1MSP" : the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4b36 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b37 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +peer0.org1.example.com | MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +peer0.org1.example.com | MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +peer0.org1.example.com | cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +peer0.org1.example.com | Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +peer0.org1.example.com | WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +peer0.org1.example.com | U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +peer0.org1.example.com | MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +peer0.org1.example.com | buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +peer0.org1.example.com | VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +peer0.org1.example.com | IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +peer0.org1.example.com | BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +peer0.org1.example.com | PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +peer0.org1.example.com | -----END CERTIFICATE----- +peer0.org1.example.com | [4b38 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +peer0.org1.example.com | [4b39 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +peer0.org1.example.com | [4b3a 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +peer0.org1.example.com | [4b3b 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: satisfies principal principal:"\n\007Org1MSP" +peer0.org1.example.com | [4b3c 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b, Metadata: doesn't satisfy principal principal:"\n\007Org2MSP" : the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [4b3d 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28, Metadata: satisfies principal principal:"\n\007Org2MSP" +peer0.org1.example.com | [4b3e 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer1.org2.example.com:7051, InternalEndpoint: , PKI-ID: 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482, Metadata: satisfies principal principal:"\n\007Org2MSP" +peer0.org1.example.com | [4b3f 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: doesn't satisfy principal principal:"\n\007Org2MSP" : the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +peer0.org1.example.com | [4b40 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Returning to 172.18.0.9:37006 a response containing: [cc_query_res:\342\014\235r`\335\216\211\030\255\021\002 \0379\210\363\205\272\270\332\356\227\206(\322\204cfp\354\221(\327\222\3164\033\352\357\302\t\236\267!" > membership_info: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > peers:\010z\335\227\263\213\034\205\367\252\247VU\037o'\002\007\035\021\340" > membership_info: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > > > endorsers_by_groups: membership_info: identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" > peers: identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" > > > layouts: > layouts: > > > ] +peer0.org1.example.com | [4b41 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=discovery.Discovery grpc.method=Discover grpc.request_deadline=2020-08-31T20:52:41.963Z grpc.peer_address=172.18.0.9:37006 grpc.peer_subject="CN=Admin@org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=10.4094ms +peer0.org1.example.com | [4b42 08-31 20:52:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +peer0.org1.example.com | [4b43 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b44 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b45 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b46 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b47 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b48 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b49 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b4a 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b4b 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b4c 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +peer0.org1.example.com | [4b4d 08-31 20:52:32.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b4e 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b4f 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b50 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b51 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b52 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4b53 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b54 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4b55 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4b56 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4b57 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4b58 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4b59 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4b5a 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aaefc0 gate 1598907153072798100 evaluation starts +peer0.org1.example.com | [4b5b 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aaefc0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4b5c 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aaefc0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4b5d 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aaefc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4b5e 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aaefc0 principal evaluation fails +peer0.org1.example.com | [4b5f 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aaefc0 gate 1598907153072798100 evaluation fails +peer0.org1.example.com | [4b60 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4b61 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4b62 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4b63 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aaf530 gate 1598907153073594300 evaluation starts +peer0.org1.example.com | [4b64 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aaf530 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4b65 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aaf530 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4b66 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aaf530 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4b67 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aaf530 principal evaluation fails +peer0.org1.example.com | [4b68 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aaf530 gate 1598907153073594300 evaluation fails +peer0.org1.example.com | [4b69 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4b6a 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4b6b 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4b6c 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aafaa0 gate 1598907153075805100 evaluation starts +peer0.org1.example.com | [4b6d 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aafaa0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4b6e 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aafaa0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4b6f 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aafaa0 principal matched by identity 0 +peer0.org1.example.com | [4b70 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 3d 51 34 f1 97 74 34 15 c7 4c fc 7e 6c 2a a0 |v=Q4..t4..L.~l*.| +peer0.org1.example.com | 00000010 b2 3b 9a 0a 78 9f 8f e4 c9 ec 76 80 d4 b7 bb 58 |.;..x.....v....X| +peer0.org1.example.com | [4b71 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 10 04 a6 70 23 1c b6 86 2b ff |0E.!.....p#...+.| +peer0.org1.example.com | 00000010 b8 0b 1b ac 7a ac 2a 42 95 43 98 b7 8b a3 61 c5 |....z.*B.C....a.| +peer0.org1.example.com | 00000020 3a 28 95 71 35 02 20 67 04 bc 00 5b f0 ae 51 73 |:(.q5. g...[..Qs| +peer0.org1.example.com | 00000030 43 b6 79 40 3f be 83 f7 1b 13 5a 8d 6f 94 51 86 |C.y@?.....Z.o.Q.| +peer0.org1.example.com | 00000040 87 86 e0 99 79 9f fe |....y..| +peer0.org1.example.com | [4b72 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aafaa0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4b73 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005aafaa0 gate 1598907153075805100 evaluation succeeds +peer0.org1.example.com | [4b74 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4b75 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4b76 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4b77 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4b78 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4b79 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4b7a 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4b7b 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4b7c 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4b7d 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b7e 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b7f 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b80 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +peer0.org1.example.com | [4b81 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b82 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b83 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4b84 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4b85 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b86 08-31 20:52:33.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b87 08-31 20:52:33.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:" signature:"0D\002 E\020\032K1\023e\002\346\330y<\252\334\202\321\212\2618\301m]\321\3737\032E\301\300\333\326\370\002 ?\262\363\246\276\301\336x\374Mf\037r\257\2643v\022+F\241\200Z\001\253\336\251\177B|K3" > +peer0.org1.example.com | [4b88 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b89 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b8a 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b8b 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [4b8c 08-31 20:52:33.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b8d 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b8e 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b8f 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b90 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +peer0.org1.example.com | [4b91 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4b92 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba dc 22 10 42 58 d5 cc db bd 89 d2 6a 48 76 6a |..".BX......jHvj| +peer0.org1.example.com | 00000010 46 d8 12 dd 64 60 f0 ea 98 0f a1 9d 5a c7 e9 b9 |F...d`......Z...| +peer0.org1.example.com | [4b93 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 2c ea 98 60 5b 8e 3d 4e 82 97 |0E.!..,..`[.=N..| +peer0.org1.example.com | 00000010 ab 55 59 95 9f 4b aa ab 4d c3 36 4a 89 d5 10 b8 |.UY..K..M.6J....| +peer0.org1.example.com | 00000020 5a 08 aa b3 59 02 20 5e 7b 39 87 3f 2a 0a 55 ef |Z...Y. ^{9.?*.U.| +peer0.org1.example.com | 00000030 74 f1 98 55 c8 02 84 85 ba 07 e4 e8 c3 14 82 a3 |t..U............| +peer0.org1.example.com | 00000040 e9 68 33 cb 87 fd 42 |.h3...B| +peer0.org1.example.com | [4b94 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +peer0.org1.example.com | 00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +peer0.org1.example.com | [4b95 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f9 c0 4a 00 c1 c6 17 e5 5f d4 68 |0E.!...J....._.h| +peer0.org1.example.com | 00000010 e3 bc 25 1e a8 b4 50 11 e4 36 2f 1a 38 2d 07 80 |..%...P..6/.8-..| +peer0.org1.example.com | 00000020 54 02 49 d5 a9 02 20 61 70 2c b0 77 9a 3f de a9 |T.I... ap,.w.?..| +peer0.org1.example.com | 00000030 97 de f9 b4 b2 49 b3 47 b8 23 24 7f 51 7a 33 80 |.....I.G.#$.Qz3.| +peer0.org1.example.com | 00000040 b1 3b 61 8f ed f5 ca |.;a....| +peer0.org1.example.com | [4b96 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +peer0.org1.example.com | [4b97 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +peer0.org1.example.com | [4b98 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4b99 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4b9a 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +peer0.org1.example.com | [4b9b 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b9c 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b9d 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4b9e 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +peer0.org1.example.com | [4b9f 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ba0 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ba1 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4ba2 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:" signature:"0D\002 E\020\032K1\023e\002\346\330y<\252\334\202\321\212\2618\301m]\321\3737\032E\301\300\333\326\370\002 ?\262\363\246\276\301\336x\374Mf\037r\257\2643v\022+F\241\200Z\001\253\336\251\177B|K3" > +peer0.org1.example.com | [4ba3 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ba4 08-31 20:52:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4ba5 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ba6 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ba7 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ba8 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ba9 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4baa 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4bab 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4bac 08-31 20:52:33.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4bad 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +peer0.org1.example.com | [4bae 08-31 20:52:33.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4baf 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bb0 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bb1 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bb2 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4bb3 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4bb4 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4bb5 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4bb6 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4bb7 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4bb8 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4bb9 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4bba 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b6d5e0 gate 1598907153485488400 evaluation starts +peer0.org1.example.com | [4bbb 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b6d5e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4bbc 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b6d5e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4bbd 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b6d5e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4bbe 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b6d5e0 principal evaluation fails +peer0.org1.example.com | [4bbf 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b6d5e0 gate 1598907153485488400 evaluation fails +peer0.org1.example.com | [4bc0 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4bc1 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4bc2 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4bc3 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b6db50 gate 1598907153486151900 evaluation starts +peer0.org1.example.com | [4bc4 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b6db50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4bc5 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b6db50 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4bc6 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b6db50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4bc7 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b6db50 principal evaluation fails +peer0.org1.example.com | [4bc8 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005b6db50 gate 1598907153486151900 evaluation fails +peer0.org1.example.com | [4bc9 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4bca 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4bcb 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4bcc 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b920c0 gate 1598907153486706200 evaluation starts +peer0.org1.example.com | [4bcd 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b920c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4bce 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b920c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4bcf 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b920c0 principal matched by identity 0 +peer0.org1.example.com | [4bd0 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 85 4d e3 1b 2b 14 d5 61 8e 17 5c 84 83 32 48 |..M..+..a..\..2H| +peer0.org1.example.com | 00000010 b6 f7 83 21 a9 ec ab ea a8 d7 d7 84 0b a3 77 e2 |...!..........w.| +peer0.org1.example.com | [4bd1 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 b4 0c 15 cf 64 72 f1 f9 4d 79 |0E.!......dr..My| +peer0.org1.example.com | 00000010 8f 54 a8 d6 ba b3 64 2e 0d 29 76 9e bc 66 b0 c0 |.T....d..)v..f..| +peer0.org1.example.com | 00000020 c4 52 6c e8 c1 02 20 24 9d 0a 58 11 c3 60 1e 40 |.Rl... $..X..`.@| +peer0.org1.example.com | 00000030 ac 6a 8a fb 5a 8b b8 33 d9 fe 2b e4 46 d7 4a 07 |.j..Z..3..+.F.J.| +peer0.org1.example.com | 00000040 97 96 9b 09 2a a8 51 |....*.Q| +peer0.org1.example.com | [4bd2 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b920c0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4bd3 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008b920c0 gate 1598907153486706200 evaluation succeeds +peer0.org1.example.com | [4bd4 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4bd5 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4bd6 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4bd7 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4bd8 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4bd9 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +peer0.org1.example.com | [4bda 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +peer0.org1.example.com | [4bdb 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +peer0.org1.example.com | [4bdc 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +peer0.org1.example.com | [4bdd 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bde 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bdf 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4be0 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +peer0.org1.example.com | [4be1 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4be2 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4be3 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4be4 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4be5 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4be6 08-31 20:52:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4be7 08-31 20:52:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:" signature:"0D\002 E\020\032K1\023e\002\346\330y<\252\334\202\321\212\2618\301m]\321\3737\032E\301\300\333\326\370\002 ?\262\363\246\276\301\336x\374Mf\037r\257\2643v\022+F\241\200Z\001\253\336\251\177B|K3" > +peer0.org1.example.com | [4be8 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [4be9 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4bea 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +peer0.org1.example.com | [4beb 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4bec 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +peer0.org1.example.com | [4bed 08-31 20:52:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4bee 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bef 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bf0 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bf1 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bf2 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bf3 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bf4 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bf5 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bf6 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bf7 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bf8 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bf9 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bfa 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bfb 08-31 20:52:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bfc 08-31 20:52:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bfd 08-31 20:52:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +peer0.org1.example.com | [4bfe 08-31 20:52:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4bff 08-31 20:52:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4c00 08-31 20:52:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161040 +peer0.org1.example.com | [4c01 08-31 20:52:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 89B6AF9A4D2DF10FED74CCB1737A52F62BC84D70DEA64B03F315A612421A1DC6 +peer0.org1.example.com | [4c02 08-31 20:52:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4c03 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +peer0.org1.example.com | [4c04 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +peer0.org1.example.com | [4c05 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\330JSR\335\333ETV\354=/V|\206\234\344\315\034k\002 \177\332^(\232\302\234\321\3142\362\255td6W\327cK\270\024\020\2044$l>\377z\240*\004" > > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4c06 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c07 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4c08 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c09 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4c0b 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c0d 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c0c 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c0e 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c0a 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\330JSR\335\333ETV\354=/V|\206\234\344\315\034k\002 \177\332^(\232\302\234\321\3142\362\255td6W\327cK\270\024\020\2044$l>\377z\240*\004" > > > , Envelope: 270 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c0f 08-31 20:52:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c10 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c11 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c12 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c13 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c14 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4c15 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 b6 af 9a 4d 2d f1 0f ed 74 cc b1 73 7a 52 f6 |....M-...t..szR.| +peer0.org1.example.com | 00000010 2b c8 4d 70 de a6 4b 03 f3 15 a6 12 42 1a 1d c6 |+.Mp..K.....B...| +peer0.org1.example.com | [4c16 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 20 93 43 04 22 e5 56 44 e9 50 07 |0D. . .C.".VD.P.| +peer0.org1.example.com | 00000010 be 5e 40 76 05 fb 54 63 f5 18 f0 65 ee df e0 c1 |.^@v..Tc...e....| +peer0.org1.example.com | 00000020 83 2f 90 10 02 20 00 ef 62 10 df c6 81 8a b7 61 |./... ..b......a| +peer0.org1.example.com | 00000030 25 ad ae 35 e3 52 88 aa 57 f6 1f 5c 1c ad a9 a5 |%..5.R..W..\....| +peer0.org1.example.com | 00000040 a4 96 4b 35 f7 b7 |..K5..| +peer0.org1.example.com | [4c17 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +peer0.org1.example.com | 00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +peer0.org1.example.com | [4c18 08-31 20:52:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 80 e0 7c a0 4c 61 3c fb a3 42 3e |0D. U..|.La<..B>| +peer0.org1.example.com | 00000010 d8 4a 53 52 dd db 45 54 56 ec 3d 2f 56 7c 86 9c |.JSR..ETV.=/V|..| +peer0.org1.example.com | 00000020 e4 cd 1c 6b 02 20 7f da 5e 28 9a c2 9c d1 cc 32 |...k. ..^(.....2| +peer0.org1.example.com | 00000030 f2 ad 74 64 36 57 d7 63 4b b8 14 10 84 34 24 6c |..td6W.cK....4$l| +peer0.org1.example.com | 00000040 3e ff 7a a0 2a 04 |>.z.*.| +peer0.org1.example.com | [4c19 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c1a 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c1b 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [4c1c 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +peer0.org1.example.com | [4c1d 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c1e 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c1f 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c20 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c21 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4c22 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 b6 af 9a 4d 2d f1 0f ed 74 cc b1 73 7a 52 f6 |....M-...t..szR.| +peer0.org1.example.com | 00000010 2b c8 4d 70 de a6 4b 03 f3 15 a6 12 42 1a 1d c6 |+.Mp..K.....B...| +peer0.org1.example.com | [4c23 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 20 93 43 04 22 e5 56 44 e9 50 07 |0D. . .C.".VD.P.| +peer0.org1.example.com | 00000010 be 5e 40 76 05 fb 54 63 f5 18 f0 65 ee df e0 c1 |.^@v..Tc...e....| +peer0.org1.example.com | 00000020 83 2f 90 10 02 20 00 ef 62 10 df c6 81 8a b7 61 |./... ..b......a| +peer0.org1.example.com | 00000030 25 ad ae 35 e3 52 88 aa 57 f6 1f 5c 1c ad a9 a5 |%..5.R..W..\....| +peer0.org1.example.com | 00000040 a4 96 4b 35 f7 b7 |..K5..| +peer0.org1.example.com | [4c24 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4c25 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4c26 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c27 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4c28 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba dc 22 10 42 58 d5 cc db bd 89 d2 6a 48 76 6a |..".BX......jHvj| +peer0.org1.example.com | 00000010 46 d8 12 dd 64 60 f0 ea 98 0f a1 9d 5a c7 e9 b9 |F...d`......Z...| +peer0.org1.example.com | [4c29 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 2c ea 98 60 5b 8e 3d 4e 82 97 |0E.!..,..`[.=N..| +peer0.org1.example.com | 00000010 ab 55 59 95 9f 4b aa ab 4d c3 36 4a 89 d5 10 b8 |.UY..K..M.6J....| +peer0.org1.example.com | 00000020 5a 08 aa b3 59 02 20 5e 7b 39 87 3f 2a 0a 55 ef |Z...Y. ^{9.?*.U.| +peer0.org1.example.com | 00000030 74 f1 98 55 c8 02 84 85 ba 07 e4 e8 c3 14 82 a3 |t..U............| +peer0.org1.example.com | 00000040 e9 68 33 cb 87 fd 42 |.h3...B| +peer0.org1.example.com | [4c2a 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4c2b 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c2c 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +peer0.org1.example.com | [4c2d 08-31 20:52:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c2e 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4c2f 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4c30 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4c31 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4c32 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4c33 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4c34 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bef140 gate 1598907153614045700 evaluation starts +peer0.org1.example.com | [4c35 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bef140 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4c36 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bef140 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4c37 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bef140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4c38 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bef140 principal evaluation fails +peer0.org1.example.com | [4c39 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bef140 gate 1598907153614045700 evaluation fails +peer0.org1.example.com | [4c3a 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4c3b 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4c3c 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4c3d 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bef6b0 gate 1598907153616705100 evaluation starts +peer0.org1.example.com | [4c3e 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bef6b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4c3f 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bef6b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4c41 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bef6b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4c42 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bef6b0 principal evaluation fails +peer0.org1.example.com | [4c40 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c43 08-31 20:52:33.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bef6b0 gate 1598907153616705100 evaluation fails +peer0.org1.example.com | [4c44 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4c45 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4c46 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4c47 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bd06b0 gate 1598907153620880000 evaluation starts +peer0.org1.example.com | [4c48 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bd06b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4c49 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bd06b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4c4a 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bd06b0 principal matched by identity 0 +peer0.org1.example.com | [4c4b 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 17 85 4d e3 1b 2b 14 d5 61 8e 17 5c 84 83 32 48 |..M..+..a..\..2H| +peer0.org1.example.com | 00000010 b6 f7 83 21 a9 ec ab ea a8 d7 d7 84 0b a3 77 e2 |...!..........w.| +peer0.org1.example.com | [4c4c 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 b4 0c 15 cf 64 72 f1 f9 4d 79 |0E.!......dr..My| +peer0.org1.example.com | 00000010 8f 54 a8 d6 ba b3 64 2e 0d 29 76 9e bc 66 b0 c0 |.T....d..)v..f..| +peer0.org1.example.com | 00000020 c4 52 6c e8 c1 02 20 24 9d 0a 58 11 c3 60 1e 40 |.Rl... $..X..`.@| +peer0.org1.example.com | 00000030 ac 6a 8a fb 5a 8b b8 33 d9 fe 2b e4 46 d7 4a 07 |.j..Z..3..+.F.J.| +peer0.org1.example.com | 00000040 97 96 9b 09 2a a8 51 |....*.Q| +peer0.org1.example.com | [4c4d 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bd06b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4c4e 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008bd06b0 gate 1598907153620880000 evaluation succeeds +peer0.org1.example.com | [4c4f 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4c50 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4c51 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4c52 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4c53 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4c54 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c55 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c56 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c57 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +peer0.org1.example.com | [4c58 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 b6 af 9a 4d 2d f1 0f ed 74 cc b1 73 7a 52 f6 |....M-...t..szR.| +peer0.org1.example.com | 00000010 2b c8 4d 70 de a6 4b 03 f3 15 a6 12 42 1a 1d c6 |+.Mp..K.....B...| +peer0.org1.example.com | [4c59 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b 20 93 43 04 22 e5 56 44 e9 50 07 |0D. . .C.".VD.P.| +peer0.org1.example.com | 00000010 be 5e 40 76 05 fb 54 63 f5 18 f0 65 ee df e0 c1 |.^@v..Tc...e....| +peer0.org1.example.com | 00000020 83 2f 90 10 02 20 00 ef 62 10 df c6 81 8a b7 61 |./... ..b......a| +peer0.org1.example.com | 00000030 25 ad ae 35 e3 52 88 aa 57 f6 1f 5c 1c ad a9 a5 |%..5.R..W..\....| +peer0.org1.example.com | 00000040 a4 96 4b 35 f7 b7 |..K5..| +peer0.org1.example.com | [4c5a 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4c5b 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +peer0.org1.example.com | [4c5c 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c5d 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +peer0.org1.example.com | [4c5e 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba dc 22 10 42 58 d5 cc db bd 89 d2 6a 48 76 6a |..".BX......jHvj| +peer0.org1.example.com | 00000010 46 d8 12 dd 64 60 f0 ea 98 0f a1 9d 5a c7 e9 b9 |F...d`......Z...| +peer0.org1.example.com | [4c5f 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 2c ea 98 60 5b 8e 3d 4e 82 97 |0E.!..,..`[.=N..| +peer0.org1.example.com | 00000010 ab 55 59 95 9f 4b aa ab 4d c3 36 4a 89 d5 10 b8 |.UY..K..M.6J....| +peer0.org1.example.com | 00000020 5a 08 aa b3 59 02 20 5e 7b 39 87 3f 2a 0a 55 ef |Z...Y. ^{9.?*.U.| +peer0.org1.example.com | 00000030 74 f1 98 55 c8 02 84 85 ba 07 e4 e8 c3 14 82 a3 |t..U............| +peer0.org1.example.com | 00000040 e9 68 33 cb 87 fd 42 |.h3...B| +peer0.org1.example.com | [4c60 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4c61 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c62 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +peer0.org1.example.com | [4c63 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c64 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4c65 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4c67 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4c66 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c68 08-31 20:52:33.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4c69 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4c6a 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4c6b 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c1add0 gate 1598907153630554500 evaluation starts +peer0.org1.example.com | [4c6c 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c1add0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4c6d 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c1add0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4c6e 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c1add0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4c6f 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c1add0 principal evaluation fails +peer0.org1.example.com | [4c70 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c1add0 gate 1598907153630554500 evaluation fails +peer0.org1.example.com | [4c71 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4c72 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4c73 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4c74 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c1b340 gate 1598907153632473900 evaluation starts +peer0.org1.example.com | [4c75 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c1b340 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4c76 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c1b340 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4c77 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c1b340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4c78 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c1b340 principal evaluation fails +peer0.org1.example.com | [4c79 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c1b340 gate 1598907153632473900 evaluation fails +peer0.org1.example.com | [4c7a 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4c7b 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4c7c 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4c7d 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c1b8b0 gate 1598907153634232500 evaluation starts +peer0.org1.example.com | [4c7e 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c1b8b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4c7f 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c1b8b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4c80 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c1b8b0 principal matched by identity 0 +peer0.org1.example.com | [4c81 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 3d 51 34 f1 97 74 34 15 c7 4c fc 7e 6c 2a a0 |v=Q4..t4..L.~l*.| +peer0.org1.example.com | 00000010 b2 3b 9a 0a 78 9f 8f e4 c9 ec 76 80 d4 b7 bb 58 |.;..x.....v....X| +peer0.org1.example.com | [4c82 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 80 10 04 a6 70 23 1c b6 86 2b ff |0E.!.....p#...+.| +peer0.org1.example.com | 00000010 b8 0b 1b ac 7a ac 2a 42 95 43 98 b7 8b a3 61 c5 |....z.*B.C....a.| +peer0.org1.example.com | 00000020 3a 28 95 71 35 02 20 67 04 bc 00 5b f0 ae 51 73 |:(.q5. g...[..Qs| +peer0.org1.example.com | 00000030 43 b6 79 40 3f be 83 f7 1b 13 5a 8d 6f 94 51 86 |C.y@?.....Z.o.Q.| +peer0.org1.example.com | 00000040 87 86 e0 99 79 9f fe |....y..| +peer0.org1.example.com | [4c83 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c1b8b0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4c84 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c1b8b0 gate 1598907153634232500 evaluation succeeds +peer0.org1.example.com | [4c85 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4c86 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4c87 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4c88 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4c89 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +peer0.org1.example.com | [4c8a 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c8b 08-31 20:52:33.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c8c 08-31 20:52:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c8d 08-31 20:52:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c8e 08-31 20:52:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +peer0.org1.example.com | [4c8f 08-31 20:52:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c90 08-31 20:52:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c91 08-31 20:52:33.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c93 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c92 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c94 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c95 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c96 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4c97 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4c98 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c99 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4c9a 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4c9b 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4c9c 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4c9d 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4c9e 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4c9f 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4ca0 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c3ed40 gate 1598907153654883200 evaluation starts +peer0.org1.example.com | [4ca1 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c3ed40 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4ca2 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c3ed40 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4ca3 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c3ed40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4ca4 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c3ed40 principal evaluation fails +peer0.org1.example.com | [4ca5 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c3ed40 gate 1598907153654883200 evaluation fails +peer0.org1.example.com | [4ca6 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4ca7 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4ca8 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4ca9 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c3f2b0 gate 1598907153655624000 evaluation starts +peer0.org1.example.com | [4caa 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4cab 08-31 20:52:33.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c3f2b0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4cac 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c3f2b0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4cad 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c3f2b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4cae 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c3f2b0 principal evaluation fails +peer0.org1.example.com | [4caf 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c3f2b0 gate 1598907153655624000 evaluation fails +peer0.org1.example.com | [4cb0 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4cb1 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4cb2 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4cb3 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c3f820 gate 1598907153664320600 evaluation starts +peer0.org1.example.com | [4cb4 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c3f820 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4cb5 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c3f820 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4cb6 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c3f820 principal matched by identity 0 +peer0.org1.example.com | [4cb7 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org1.example.com | [4cb8 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org1.example.com | [4cb9 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c3f820 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4cba 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c3f820 gate 1598907153664320600 evaluation succeeds +peer0.org1.example.com | [4cbb 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4cbc 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4cbd 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4cbe 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4cbf 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org1.example.com | [4cc0 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org1.example.com | [4cc1 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org1.example.com | [4cc2 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org1.example.com | [4cc3 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4cc4 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4cc5 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4cc6 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4cc7 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4cc8 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4cc9 08-31 20:52:33.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4cca 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4ccb 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c5f800 gate 1598907153670267200 evaluation starts +peer0.org1.example.com | [4ccc 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c5f800 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4ccd 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c5f800 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4cce 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c5f800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4ccf 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c5f800 principal evaluation fails +peer0.org1.example.com | [4cd0 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c5f800 gate 1598907153670267200 evaluation fails +peer0.org1.example.com | [4cd1 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4cd2 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4cd3 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4cd4 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c5fd70 gate 1598907153671911800 evaluation starts +peer0.org1.example.com | [4cd5 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c5fd70 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4cd6 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c5fd70 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4cd7 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c5fd70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4cd8 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c5fd70 principal evaluation fails +peer0.org1.example.com | [4cd9 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c5fd70 gate 1598907153671911800 evaluation fails +peer0.org1.example.com | [4cda 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4cdb 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4cdc 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4cdd 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c7a2e0 gate 1598907153673706800 evaluation starts +peer0.org1.example.com | [4cde 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c7a2e0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4cdf 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c7a2e0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4ce0 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c7a2e0 principal matched by identity 0 +peer0.org1.example.com | [4ce1 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org1.example.com | [4ce2 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org1.example.com | [4ce3 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c7a2e0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4ce4 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c7a2e0 gate 1598907153673706800 evaluation succeeds +peer0.org1.example.com | [4ce5 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4ce6 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4ce7 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4ce8 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4ce9 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4cea 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4ceb 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4cec 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4ced 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4cee 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4cef 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4cf0 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4cf1 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4cf2 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4cf3 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4cf4 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c7b730 gate 1598907153677616000 evaluation starts +peer0.org1.example.com | [4cf5 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c7b730 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4cf6 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c7b730 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4cf7 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c7b730 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4cf8 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c7b730 principal evaluation fails +peer0.org1.example.com | [4cf9 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c7b730 gate 1598907153677616000 evaluation fails +peer0.org1.example.com | [4cfa 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4cfb 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4cfc 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4cfd 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c7bca0 gate 1598907153678567100 evaluation starts +peer0.org1.example.com | [4cfe 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c7bca0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4cff 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c7bca0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4d00 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c7bca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4d01 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c7bca0 principal evaluation fails +peer0.org1.example.com | [4d02 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c7bca0 gate 1598907153678567100 evaluation fails +peer0.org1.example.com | [4d03 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4d04 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4d05 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4d06 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c96210 gate 1598907153679570600 evaluation starts +peer0.org1.example.com | [4d07 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c96210 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d08 08-31 20:52:33.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c96210 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4d09 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c96210 principal matched by identity 0 +peer0.org1.example.com | [4d0a 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org1.example.com | [4d0b 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org1.example.com | [4d0c 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c96210 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4d0d 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008c96210 gate 1598907153679570600 evaluation succeeds +peer0.org1.example.com | [4d0e 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4d0f 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4d10 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4d11 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4d12 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org1.example.com | [4d13 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org1.example.com | [4d14 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org1.example.com | [4d15 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org1.example.com | [4d16 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d17 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d18 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4d19 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4d1a 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4d1b 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4d1c 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4d1d 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4d1e 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cac1f0 gate 1598907153683800900 evaluation starts +peer0.org1.example.com | [4d1f 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cac1f0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d20 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cac1f0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4d21 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cac1f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4d22 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cac1f0 principal evaluation fails +peer0.org1.example.com | [4d23 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cac1f0 gate 1598907153683800900 evaluation fails +peer0.org1.example.com | [4d24 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4d25 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4d26 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4d27 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cac760 gate 1598907153684883200 evaluation starts +peer0.org1.example.com | [4d28 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cac760 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d29 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cac760 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4d2a 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cac760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4d2b 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cac760 principal evaluation fails +peer0.org1.example.com | [4d2c 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cac760 gate 1598907153684883200 evaluation fails +peer0.org1.example.com | [4d2d 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4d2e 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4d2f 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4d30 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008caccd0 gate 1598907153686171000 evaluation starts +peer0.org1.example.com | [4d31 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008caccd0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d32 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008caccd0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4d33 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008caccd0 principal matched by identity 0 +peer0.org1.example.com | [4d34 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org1.example.com | [4d35 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org1.example.com | [4d36 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008caccd0 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4d37 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008caccd0 gate 1598907153686171000 evaluation succeeds +peer0.org1.example.com | [4d38 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4d39 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4d3a 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4d3b 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4d3c 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4d3d 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +peer0.org1.example.com | [4d3e 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +peer0.org1.example.com | 00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +peer0.org1.example.com | [4d3f 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +peer0.org1.example.com | 00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +peer0.org1.example.com | 00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +peer0.org1.example.com | 00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +peer0.org1.example.com | 00000040 ea ef c2 09 9e b7 21 |......!| +peer0.org1.example.com | [4d40 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +peer0.org1.example.com | 00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +peer0.org1.example.com | [4d41 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +peer0.org1.example.com | 00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +peer0.org1.example.com | 00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +peer0.org1.example.com | 00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +peer0.org1.example.com | 00000040 27 02 07 1d 11 e0 |'.....| +peer0.org1.example.com | [4d42 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d43 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d44 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4d45 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4d46 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4d47 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4d48 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4d49 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4d4a 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cc4e50 gate 1598907153689756100 evaluation starts +peer0.org1.example.com | [4d4b 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cc4e50 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d4c 08-31 20:52:33.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cc4e50 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4d4d 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cc4e50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4d4e 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cc4e50 principal evaluation fails +peer0.org1.example.com | [4d4f 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cc4e50 gate 1598907153689756100 evaluation fails +peer0.org1.example.com | [4d50 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4d51 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4d52 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4d53 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cc53c0 gate 1598907153690807400 evaluation starts +peer0.org1.example.com | [4d54 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cc53c0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d55 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cc53c0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4d56 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cc53c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4d57 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cc53c0 principal evaluation fails +peer0.org1.example.com | [4d58 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cc53c0 gate 1598907153690807400 evaluation fails +peer0.org1.example.com | [4d59 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4d5a 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4d5b 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4d5c 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cc5930 gate 1598907153691915000 evaluation starts +peer0.org1.example.com | [4d5d 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cc5930 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d5e 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cc5930 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4d5f 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cc5930 principal matched by identity 0 +peer0.org1.example.com | [4d60 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +peer0.org1.example.com | 00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +peer0.org1.example.com | [4d61 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +peer0.org1.example.com | 00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +peer0.org1.example.com | 00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +peer0.org1.example.com | 00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +peer0.org1.example.com | 00000040 30 1a be f0 35 29 |0...5)| +peer0.org1.example.com | [4d62 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cc5930 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4d63 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008cc5930 gate 1598907153691915000 evaluation succeeds +peer0.org1.example.com | [4d64 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4d65 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4d66 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4d67 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4d68 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d69 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d6a 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +peer0.org1.example.com | [4d6b 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4d6c 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +peer0.org1.example.com | [4d6d 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +peer0.org1.example.com | [4d6e 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +peer0.org1.example.com | [4d6f 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +peer0.org1.example.com | [4d70 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ce4b30 gate 1598907153695353900 evaluation starts +peer0.org1.example.com | [4d71 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ce4b30 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d72 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ce4b30 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4d73 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ce4b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +peer0.org1.example.com | [4d74 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ce4b30 principal evaluation fails +peer0.org1.example.com | [4d75 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ce4b30 gate 1598907153695353900 evaluation fails +peer0.org1.example.com | [4d76 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4d77 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +peer0.org1.example.com | [4d78 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +peer0.org1.example.com | [4d79 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ce50a0 gate 1598907153697121700 evaluation starts +peer0.org1.example.com | [4d7a 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ce50a0 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d7b 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ce50a0 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4d7c 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ce50a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +peer0.org1.example.com | [4d7d 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ce50a0 principal evaluation fails +peer0.org1.example.com | [4d7e 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ce50a0 gate 1598907153697121700 evaluation fails +peer0.org1.example.com | [4d7f 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4d80 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +peer0.org1.example.com | [4d81 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +peer0.org1.example.com | [4d82 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ce5610 gate 1598907153698507800 evaluation starts +peer0.org1.example.com | [4d83 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ce5610 signed by 0 principal evaluation starts (used [false]) +peer0.org1.example.com | [4d84 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ce5610 processing identity 0 with bytes of 115a4b0 +peer0.org1.example.com | [4d85 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ce5610 principal matched by identity 0 +peer0.org1.example.com | [4d86 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +peer0.org1.example.com | 00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +peer0.org1.example.com | [4d87 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +peer0.org1.example.com | 00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +peer0.org1.example.com | 00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +peer0.org1.example.com | 00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +peer0.org1.example.com | 00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +peer0.org1.example.com | [4d88 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ce5610 principal evaluation succeeds for identity 0 +peer0.org1.example.com | [4d89 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc008ce5610 gate 1598907153698507800 evaluation succeeds +peer0.org1.example.com | [4d8a 08-31 20:52:33.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4d8b 08-31 20:52:33.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +peer0.org1.example.com | [4d8c 08-31 20:52:33.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +peer0.org1.example.com | [4d8d 08-31 20:52:33.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +peer0.org1.example.com | [4d8e 08-31 20:52:33.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4d8f 08-31 20:52:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +peer0.org1.example.com | [4d90 08-31 20:52:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +peer0.org1.example.com | [4d91 08-31 20:52:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +peer0.org1.example.com | [4d92 08-31 20:52:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610141801 +peer0.org1.example.com | [4d93 08-31 20:52:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 69E30272C78BDF3E99E1BC1C03420784D25A8AA96D159790B45E03A0DE94058C +peer0.org1.example.com | [4d94 08-31 20:52:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +peer0.org1.example.com | [4d95 08-31 20:52:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d96 08-31 20:52:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d97 08-31 20:52:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d98 08-31 20:52:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d99 08-31 20:52:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +peer0.org1.example.com | [4d9a 08-31 20:52:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d9b 08-31 20:52:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d9c 08-31 20:52:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +peer0.org1.example.com | [4d9d 08-31 20:52:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4d9e 08-31 20:52:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4d9f 08-31 20:52:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4da0 08-31 20:52:33.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +peer0.org1.example.com | [4da1 08-31 20:52:33.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4da2 08-31 20:52:33.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4da3 08-31 20:52:33.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +peer0.org1.example.com | [4da4 08-31 20:52:33.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [4da5 08-31 20:52:33.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4da6 08-31 20:52:33.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4da7 08-31 20:52:33.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4da8 08-31 20:52:33.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +peer0.org1.example.com | [4da9 08-31 20:52:33.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4daa 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4dab 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4dac 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4dad 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4dae 08-31 20:52:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4daf 08-31 20:52:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [4db0 08-31 20:52:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [4db1 08-31 20:52:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +peer0.org1.example.com | [4db2 08-31 20:52:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 3 4 5 6 1] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +peer0.org1.example.com | [4db3 08-31 20:52:33.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4db4 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4db5 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4db6 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4db7 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4db8 08-31 20:52:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +peer0.org1.example.com | [4db9 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4dba 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +peer0.org1.example.com | [4dbb 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4dbc 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4dbd 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +peer0.org1.example.com | [4dbe 08-31 20:52:34.38 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting diff --git a/hyperledger_fabric/v1.4.8/raft/logs/dev_orderer.log b/hyperledger_fabric/v1.4.8/raft/logs/dev_orderer.log new file mode 100644 index 00000000..b08d05f7 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/logs/dev_orderer.log @@ -0,0 +1,9132 @@ +2020-08-31 20:50:43.080 UTC [viperutil] getKeysRecursively -> DEBU 001 Found map[interface{}]interface{} value for general +2020-08-31 20:50:43.081 UTC [viperutil] unmarshalJSON -> DEBU 002 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +2020-08-31 20:50:43.081 UTC [viperutil] getKeysRecursively -> DEBU 003 Found real value for general.LedgerType setting to string file +2020-08-31 20:50:43.081 UTC [viperutil] unmarshalJSON -> DEBU 004 Unmarshal JSON: value cannot be unmarshalled: invalid character 'i' in literal false (expecting 'a') +2020-08-31 20:50:43.081 UTC [viperutil] getKeysRecursively -> DEBU 005 Found real value for general.GenesisMethod setting to string file +2020-08-31 20:50:43.082 UTC [viperutil] unmarshalJSON -> DEBU 006 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2020-08-31 20:50:43.082 UTC [viperutil] getKeysRecursively -> DEBU 007 Found real value for general.GenesisProfile setting to string SampleInsecureSolo +2020-08-31 20:50:43.082 UTC [viperutil] unmarshalJSON -> DEBU 008 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +2020-08-31 20:50:43.082 UTC [viperutil] getKeysRecursively -> DEBU 009 Found real value for general.ListenPort setting to string 7050 +2020-08-31 20:50:43.082 UTC [viperutil] unmarshalJSON -> DEBU 00a Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-08-31 20:50:43.082 UTC [viperutil] getKeysRecursively -> DEBU 00b Found real value for general.GenesisFile setting to string /var/hyperledger/orderer/orderer.genesis.block +2020-08-31 20:50:43.083 UTC [viperutil] getKeysRecursively -> DEBU 00c Found map[string]interface{} value for general.TLS +2020-08-31 20:50:43.084 UTC [viperutil] unmarshalJSON -> DEBU 00d Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.084 UTC [viperutil] getKeysRecursively -> DEBU 00e Found real value for general.TLS.ClientRootCAs setting to +2020-08-31 20:50:43.084 UTC [viperutil] unmarshalJSON -> DEBU 00f Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal bool into Go value of type map[string]string +2020-08-31 20:50:43.085 UTC [viperutil] getKeysRecursively -> DEBU 010 Found real value for general.TLS.Enabled setting to string true +2020-08-31 20:50:43.086 UTC [viperutil] unmarshalJSON -> DEBU 011 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-08-31 20:50:43.086 UTC [viperutil] getKeysRecursively -> DEBU 012 Found real value for general.TLS.PrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2020-08-31 20:50:43.086 UTC [viperutil] unmarshalJSON -> DEBU 013 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-08-31 20:50:43.086 UTC [viperutil] getKeysRecursively -> DEBU 014 Found real value for general.TLS.Certificate setting to string /var/hyperledger/orderer/tls/server.crt +2020-08-31 20:50:43.086 UTC [viperutil] unmarshalJSON -> DEBU 015 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-08-31 20:50:43.086 UTC [viperutil] getKeysRecursively -> DEBU 016 Found real value for general.TLS.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +2020-08-31 20:50:43.086 UTC [viperutil] unmarshalJSON -> DEBU 017 Unmarshal JSON: value is not a string: false +2020-08-31 20:50:43.086 UTC [viperutil] getKeysRecursively -> DEBU 018 Found real value for general.TLS.ClientAuthRequired setting to bool false +2020-08-31 20:50:43.086 UTC [viperutil] unmarshalJSON -> DEBU 019 Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.086 UTC [viperutil] getKeysRecursively -> DEBU 01a Found real value for general.SystemChannel setting to +2020-08-31 20:50:43.086 UTC [viperutil] unmarshalJSON -> DEBU 01b Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2020-08-31 20:50:43.087 UTC [viperutil] getKeysRecursively -> DEBU 01c Found real value for general.ListenAddress setting to string 0.0.0.0 +2020-08-31 20:50:43.087 UTC [viperutil] getKeysRecursively -> DEBU 01d Found map[string]interface{} value for general.Cluster +2020-08-31 20:50:43.087 UTC [viperutil] unmarshalJSON -> DEBU 01e Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2020-08-31 20:50:43.087 UTC [viperutil] getKeysRecursively -> DEBU 01f Found real value for general.Cluster.ListenAddress setting to string 0.0.0.0 +2020-08-31 20:50:43.087 UTC [viperutil] unmarshalJSON -> DEBU 020 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-08-31 20:50:43.087 UTC [viperutil] getKeysRecursively -> DEBU 021 Found real value for general.Cluster.ServerPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2020-08-31 20:50:43.088 UTC [viperutil] unmarshalJSON -> DEBU 022 Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.088 UTC [viperutil] getKeysRecursively -> DEBU 023 Found real value for general.Cluster.DialTimeout setting to +2020-08-31 20:50:43.089 UTC [viperutil] unmarshalJSON -> DEBU 024 Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.089 UTC [viperutil] getKeysRecursively -> DEBU 025 Found real value for general.Cluster.ReplicationMaxRetries setting to +2020-08-31 20:50:43.090 UTC [viperutil] unmarshalJSON -> DEBU 026 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-08-31 20:50:43.090 UTC [viperutil] getKeysRecursively -> DEBU 027 Found real value for general.Cluster.ClientPrivateKey setting to string /var/hyperledger/orderer/tls/server.key +2020-08-31 20:50:43.090 UTC [viperutil] unmarshalJSON -> DEBU 028 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-08-31 20:50:43.090 UTC [viperutil] getKeysRecursively -> DEBU 029 Found real value for general.Cluster.RootCAs setting to string [/var/hyperledger/orderer/tls/ca.crt] +2020-08-31 20:50:43.091 UTC [viperutil] unmarshalJSON -> DEBU 02a Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.091 UTC [viperutil] getKeysRecursively -> DEBU 02b Found real value for general.Cluster.RPCTimeout setting to +2020-08-31 20:50:43.092 UTC [viperutil] unmarshalJSON -> DEBU 02c Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.092 UTC [viperutil] getKeysRecursively -> DEBU 02d Found real value for general.Cluster.ReplicationRetryTimeout setting to +2020-08-31 20:50:43.092 UTC [viperutil] unmarshalJSON -> DEBU 02e Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.093 UTC [viperutil] getKeysRecursively -> DEBU 02f Found real value for general.Cluster.ReplicationBackgroundRefreshInterval setting to +2020-08-31 20:50:43.093 UTC [viperutil] unmarshalJSON -> DEBU 030 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-08-31 20:50:43.093 UTC [viperutil] getKeysRecursively -> DEBU 031 Found real value for general.Cluster.ServerCertificate setting to string /var/hyperledger/orderer/tls/server.crt +2020-08-31 20:50:43.093 UTC [viperutil] unmarshalJSON -> DEBU 032 Unmarshal JSON: value is not a string: 10 +2020-08-31 20:50:43.094 UTC [viperutil] getKeysRecursively -> DEBU 033 Found real value for general.Cluster.SendBufferSize setting to int 10 +2020-08-31 20:50:43.095 UTC [viperutil] unmarshalJSON -> DEBU 034 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-08-31 20:50:43.095 UTC [viperutil] getKeysRecursively -> DEBU 035 Found real value for general.Cluster.ClientCertificate setting to string /var/hyperledger/orderer/tls/server.crt +2020-08-31 20:50:43.095 UTC [viperutil] unmarshalJSON -> DEBU 036 Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.095 UTC [viperutil] getKeysRecursively -> DEBU 037 Found real value for general.Cluster.ReplicationBufferSize setting to +2020-08-31 20:50:43.095 UTC [viperutil] unmarshalJSON -> DEBU 038 Unmarshal JSON: value cannot be unmarshalled: json: cannot unmarshal number into Go value of type map[string]string +2020-08-31 20:50:43.095 UTC [viperutil] getKeysRecursively -> DEBU 039 Found real value for general.Cluster.ListenPort setting to string 7055 +2020-08-31 20:50:43.095 UTC [viperutil] unmarshalJSON -> DEBU 03a Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.095 UTC [viperutil] getKeysRecursively -> DEBU 03b Found real value for general.Cluster.ReplicationPullTimeout setting to +2020-08-31 20:50:43.096 UTC [viperutil] unmarshalJSON -> DEBU 03c Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.096 UTC [viperutil] getKeysRecursively -> DEBU 03d Found real value for general.Cluster.CertExpirationWarningThreshold setting to +2020-08-31 20:50:43.096 UTC [viperutil] unmarshalJSON -> DEBU 03e Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.096 UTC [viperutil] getKeysRecursively -> DEBU 03f Found real value for general.Cluster.TLSHandshakeTimeShift setting to +2020-08-31 20:50:43.097 UTC [viperutil] getKeysRecursively -> DEBU 040 Found map[string]interface{} value for general.Authentication +2020-08-31 20:50:43.099 UTC [viperutil] unmarshalJSON -> DEBU 041 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2020-08-31 20:50:43.099 UTC [viperutil] getKeysRecursively -> DEBU 042 Found real value for general.Authentication.TimeWindow setting to string 15m +2020-08-31 20:50:43.099 UTC [viperutil] unmarshalJSON -> DEBU 043 Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.099 UTC [viperutil] getKeysRecursively -> DEBU 044 Found real value for general.Authentication.NoExpirationChecks setting to +2020-08-31 20:50:43.099 UTC [viperutil] getKeysRecursively -> DEBU 045 Found map[string]interface{} value for general.Profile +2020-08-31 20:50:43.100 UTC [viperutil] unmarshalJSON -> DEBU 046 Unmarshal JSON: value is not a string: false +2020-08-31 20:50:43.100 UTC [viperutil] getKeysRecursively -> DEBU 047 Found real value for general.Profile.Enabled setting to bool false +2020-08-31 20:50:43.100 UTC [viperutil] unmarshalJSON -> DEBU 048 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2020-08-31 20:50:43.100 UTC [viperutil] getKeysRecursively -> DEBU 049 Found real value for general.Profile.Address setting to string 0.0.0.0:6060 +2020-08-31 20:50:43.100 UTC [viperutil] unmarshalJSON -> DEBU 04a Unmarshal JSON: value cannot be unmarshalled: invalid character 'O' looking for beginning of value +2020-08-31 20:50:43.100 UTC [viperutil] getKeysRecursively -> DEBU 04b Found real value for general.LocalMSPID setting to string OrdererMSP +2020-08-31 20:50:43.101 UTC [viperutil] unmarshalJSON -> DEBU 04c Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.101 UTC [viperutil] getKeysRecursively -> DEBU 04d Found real value for general.ConnectionTimeout setting to +2020-08-31 20:50:43.101 UTC [viperutil] getKeysRecursively -> DEBU 04e Found map[string]interface{} value for general.BCCSP +2020-08-31 20:50:43.101 UTC [viperutil] unmarshalJSON -> DEBU 04f Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2020-08-31 20:50:43.102 UTC [viperutil] getKeysRecursively -> DEBU 050 Found real value for general.BCCSP.Default setting to string SW +2020-08-31 20:50:43.102 UTC [viperutil] getKeysRecursively -> DEBU 051 Found map[string]interface{} value for general.BCCSP.SW +2020-08-31 20:50:43.102 UTC [viperutil] getKeysRecursively -> DEBU 052 Found map[string]interface{} value for general.BCCSP.SW.FileKeyStore +2020-08-31 20:50:43.102 UTC [viperutil] unmarshalJSON -> DEBU 053 Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.102 UTC [viperutil] getKeysRecursively -> DEBU 054 Found real value for general.BCCSP.SW.FileKeyStore.KeyStore setting to +2020-08-31 20:50:43.102 UTC [viperutil] unmarshalJSON -> DEBU 055 Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +2020-08-31 20:50:43.102 UTC [viperutil] getKeysRecursively -> DEBU 056 Found real value for general.BCCSP.SW.Hash setting to string SHA2 +2020-08-31 20:50:43.103 UTC [viperutil] unmarshalJSON -> DEBU 057 Unmarshal JSON: value is not a string: 256 +2020-08-31 20:50:43.103 UTC [viperutil] getKeysRecursively -> DEBU 058 Found real value for general.BCCSP.SW.Security setting to int 256 +2020-08-31 20:50:43.103 UTC [viperutil] getKeysRecursively -> DEBU 059 Found map[string]interface{} value for general.BCCSP.PKCS11 +2020-08-31 20:50:43.103 UTC [viperutil] unmarshalJSON -> DEBU 05a Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.104 UTC [viperutil] getKeysRecursively -> DEBU 05b Found real value for general.BCCSP.PKCS11.Library setting to +2020-08-31 20:50:43.105 UTC [viperutil] unmarshalJSON -> DEBU 05c Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.105 UTC [viperutil] getKeysRecursively -> DEBU 05d Found real value for general.BCCSP.PKCS11.Label setting to +2020-08-31 20:50:43.105 UTC [viperutil] unmarshalJSON -> DEBU 05e Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.107 UTC [viperutil] getKeysRecursively -> DEBU 05f Found real value for general.BCCSP.PKCS11.Pin setting to +2020-08-31 20:50:43.108 UTC [viperutil] unmarshalJSON -> DEBU 060 Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.108 UTC [viperutil] getKeysRecursively -> DEBU 061 Found real value for general.BCCSP.PKCS11.Hash setting to +2020-08-31 20:50:43.108 UTC [viperutil] unmarshalJSON -> DEBU 062 Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.108 UTC [viperutil] getKeysRecursively -> DEBU 063 Found real value for general.BCCSP.PKCS11.Security setting to +2020-08-31 20:50:43.109 UTC [viperutil] getKeysRecursively -> DEBU 064 Found map[string]interface{} value for general.BCCSP.PKCS11.FileKeyStore +2020-08-31 20:50:43.109 UTC [viperutil] unmarshalJSON -> DEBU 065 Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.109 UTC [viperutil] getKeysRecursively -> DEBU 066 Found real value for general.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +2020-08-31 20:50:43.109 UTC [viperutil] unmarshalJSON -> DEBU 067 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-08-31 20:50:43.109 UTC [viperutil] getKeysRecursively -> DEBU 068 Found real value for general.LocalMSPDir setting to string /var/hyperledger/orderer/msp +2020-08-31 20:50:43.109 UTC [viperutil] getKeysRecursively -> DEBU 069 Found map[string]interface{} value for general.Keepalive +2020-08-31 20:50:43.111 UTC [viperutil] unmarshalJSON -> DEBU 06a Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-08-31 20:50:43.111 UTC [viperutil] getKeysRecursively -> DEBU 06b Found real value for general.Keepalive.ServerInterval setting to string 7200s +2020-08-31 20:50:43.111 UTC [viperutil] unmarshalJSON -> DEBU 06c Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-08-31 20:50:43.111 UTC [viperutil] getKeysRecursively -> DEBU 06d Found real value for general.Keepalive.ServerTimeout setting to string 20s +2020-08-31 20:50:43.112 UTC [viperutil] unmarshalJSON -> DEBU 06e Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-08-31 20:50:43.113 UTC [viperutil] getKeysRecursively -> DEBU 06f Found real value for general.Keepalive.ServerMinInterval setting to string 60s +2020-08-31 20:50:43.113 UTC [viperutil] getKeysRecursively -> DEBU 070 Found map[interface{}]interface{} value for fileledger +2020-08-31 20:50:43.113 UTC [viperutil] unmarshalJSON -> DEBU 071 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-08-31 20:50:43.113 UTC [viperutil] getKeysRecursively -> DEBU 072 Found real value for fileledger.Location setting to string /var/hyperledger/production/orderer +2020-08-31 20:50:43.113 UTC [viperutil] unmarshalJSON -> DEBU 073 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' looking for beginning of value +2020-08-31 20:50:43.113 UTC [viperutil] getKeysRecursively -> DEBU 074 Found real value for fileledger.Prefix setting to string hyperledger-fabric-ordererledger +2020-08-31 20:50:43.113 UTC [viperutil] getKeysRecursively -> DEBU 075 Found map[interface{}]interface{} value for ramledger +2020-08-31 20:50:43.113 UTC [viperutil] unmarshalJSON -> DEBU 076 Unmarshal JSON: value is not a string: 1000 +2020-08-31 20:50:43.113 UTC [viperutil] getKeysRecursively -> DEBU 077 Found real value for ramledger.HistorySize setting to int 1000 +2020-08-31 20:50:43.113 UTC [viperutil] getKeysRecursively -> DEBU 078 Found map[interface{}]interface{} value for kafka +2020-08-31 20:50:43.113 UTC [viperutil] getKeysRecursively -> DEBU 079 Found map[string]interface{} value for kafka.Retry +2020-08-31 20:50:43.114 UTC [viperutil] unmarshalJSON -> DEBU 07a Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 07b Found real value for kafka.Retry.ShortInterval setting to string 5s +2020-08-31 20:50:43.114 UTC [viperutil] unmarshalJSON -> DEBU 07c Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 07d Found real value for kafka.Retry.ShortTotal setting to string 10m +2020-08-31 20:50:43.114 UTC [viperutil] unmarshalJSON -> DEBU 07e Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 07f Found real value for kafka.Retry.LongInterval setting to string 5m +2020-08-31 20:50:43.114 UTC [viperutil] unmarshalJSON -> DEBU 080 Unmarshal JSON: value cannot be unmarshalled: invalid character 'h' after top-level value +2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 081 Found real value for kafka.Retry.LongTotal setting to string 12h +2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 082 Found map[string]interface{} value for kafka.Retry.NetworkTimeouts +2020-08-31 20:50:43.114 UTC [viperutil] unmarshalJSON -> DEBU 083 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 084 Found real value for kafka.Retry.NetworkTimeouts.ReadTimeout setting to string 10s +2020-08-31 20:50:43.114 UTC [viperutil] unmarshalJSON -> DEBU 085 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 086 Found real value for kafka.Retry.NetworkTimeouts.WriteTimeout setting to string 10s +2020-08-31 20:50:43.114 UTC [viperutil] unmarshalJSON -> DEBU 087 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 088 Found real value for kafka.Retry.NetworkTimeouts.DialTimeout setting to string 10s +2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 089 Found map[string]interface{} value for kafka.Retry.Metadata +2020-08-31 20:50:43.114 UTC [viperutil] unmarshalJSON -> DEBU 08a Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2020-08-31 20:50:43.114 UTC [viperutil] getKeysRecursively -> DEBU 08b Found real value for kafka.Retry.Metadata.RetryBackoff setting to string 250ms +2020-08-31 20:50:43.115 UTC [viperutil] unmarshalJSON -> DEBU 08c Unmarshal JSON: value is not a string: 3 +2020-08-31 20:50:43.115 UTC [viperutil] getKeysRecursively -> DEBU 08d Found real value for kafka.Retry.Metadata.RetryMax setting to int 3 +2020-08-31 20:50:43.115 UTC [viperutil] getKeysRecursively -> DEBU 08e Found map[string]interface{} value for kafka.Retry.Producer +2020-08-31 20:50:43.115 UTC [viperutil] unmarshalJSON -> DEBU 08f Unmarshal JSON: value is not a string: 3 +2020-08-31 20:50:43.115 UTC [viperutil] getKeysRecursively -> DEBU 090 Found real value for kafka.Retry.Producer.RetryMax setting to int 3 +2020-08-31 20:50:43.115 UTC [viperutil] unmarshalJSON -> DEBU 091 Unmarshal JSON: value cannot be unmarshalled: invalid character 'm' after top-level value +2020-08-31 20:50:43.115 UTC [viperutil] getKeysRecursively -> DEBU 092 Found real value for kafka.Retry.Producer.RetryBackoff setting to string 100ms +2020-08-31 20:50:43.115 UTC [viperutil] getKeysRecursively -> DEBU 093 Found map[string]interface{} value for kafka.Retry.Consumer +2020-08-31 20:50:43.115 UTC [viperutil] unmarshalJSON -> DEBU 094 Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-08-31 20:50:43.115 UTC [viperutil] getKeysRecursively -> DEBU 095 Found real value for kafka.Retry.Consumer.RetryBackoff setting to string 2s +2020-08-31 20:50:43.115 UTC [viperutil] getKeysRecursively -> DEBU 096 Found map[string]interface{} value for kafka.Topic +2020-08-31 20:50:43.115 UTC [viperutil] unmarshalJSON -> DEBU 097 Unmarshal JSON: value is not a string: 3 +2020-08-31 20:50:43.115 UTC [viperutil] getKeysRecursively -> DEBU 098 Found real value for kafka.Topic.ReplicationFactor setting to int 3 +2020-08-31 20:50:43.115 UTC [viperutil] unmarshalJSON -> DEBU 099 Unmarshal JSON: value is not a string: false +2020-08-31 20:50:43.115 UTC [viperutil] getKeysRecursively -> DEBU 09a Found real value for kafka.Verbose setting to bool false +2020-08-31 20:50:43.116 UTC [viperutil] getKeysRecursively -> DEBU 09b Found map[string]interface{} value for kafka.TLS +2020-08-31 20:50:43.116 UTC [viperutil] unmarshalJSON -> DEBU 09c Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.116 UTC [viperutil] getKeysRecursively -> DEBU 09d Found real value for kafka.TLS.ClientAuthRequired setting to +2020-08-31 20:50:43.116 UTC [viperutil] unmarshalJSON -> DEBU 09e Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.116 UTC [viperutil] getKeysRecursively -> DEBU 09f Found real value for kafka.TLS.ClientRootCAs setting to +2020-08-31 20:50:43.116 UTC [viperutil] unmarshalJSON -> DEBU 0a0 Unmarshal JSON: value is not a string: false +2020-08-31 20:50:43.116 UTC [viperutil] getKeysRecursively -> DEBU 0a1 Found real value for kafka.TLS.Enabled setting to bool false +2020-08-31 20:50:43.116 UTC [viperutil] unmarshalJSON -> DEBU 0a2 Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.117 UTC [viperutil] getKeysRecursively -> DEBU 0a3 Found real value for kafka.TLS.PrivateKey setting to +2020-08-31 20:50:43.117 UTC [viperutil] unmarshalJSON -> DEBU 0a4 Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.117 UTC [viperutil] getKeysRecursively -> DEBU 0a5 Found real value for kafka.TLS.Certificate setting to +2020-08-31 20:50:43.117 UTC [viperutil] unmarshalJSON -> DEBU 0a6 Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.117 UTC [viperutil] getKeysRecursively -> DEBU 0a7 Found real value for kafka.TLS.RootCAs setting to +2020-08-31 20:50:43.117 UTC [viperutil] getKeysRecursively -> DEBU 0a8 Found map[string]interface{} value for kafka.SASLPlain +2020-08-31 20:50:43.117 UTC [viperutil] unmarshalJSON -> DEBU 0a9 Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.117 UTC [viperutil] getKeysRecursively -> DEBU 0aa Found real value for kafka.SASLPlain.User setting to +2020-08-31 20:50:43.118 UTC [viperutil] unmarshalJSON -> DEBU 0ab Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.118 UTC [viperutil] getKeysRecursively -> DEBU 0ac Found real value for kafka.SASLPlain.Password setting to +2020-08-31 20:50:43.118 UTC [viperutil] unmarshalJSON -> DEBU 0ad Unmarshal JSON: value is not a string: false +2020-08-31 20:50:43.118 UTC [viperutil] getKeysRecursively -> DEBU 0ae Found real value for kafka.SASLPlain.Enabled setting to bool false +2020-08-31 20:50:43.118 UTC [viperutil] unmarshalJSON -> DEBU 0af Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.118 UTC [viperutil] getKeysRecursively -> DEBU 0b0 Found real value for kafka.Version setting to +2020-08-31 20:50:43.118 UTC [viperutil] getKeysRecursively -> DEBU 0b1 Found map[interface{}]interface{} value for debug +2020-08-31 20:50:43.119 UTC [viperutil] unmarshalJSON -> DEBU 0b2 Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.119 UTC [viperutil] getKeysRecursively -> DEBU 0b3 Found real value for debug.BroadcastTraceDir setting to +2020-08-31 20:50:43.119 UTC [viperutil] unmarshalJSON -> DEBU 0b4 Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.119 UTC [viperutil] getKeysRecursively -> DEBU 0b5 Found real value for debug.DeliverTraceDir setting to +2020-08-31 20:50:43.119 UTC [viperutil] getKeysRecursively -> DEBU 0b6 Found map[interface{}]interface{} value for operations +2020-08-31 20:50:43.119 UTC [viperutil] getKeysRecursively -> DEBU 0b7 Found map[string]interface{} value for operations.TLS +2020-08-31 20:50:43.119 UTC [viperutil] unmarshalJSON -> DEBU 0b8 Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.119 UTC [viperutil] getKeysRecursively -> DEBU 0b9 Found real value for operations.TLS.Certificate setting to +2020-08-31 20:50:43.119 UTC [viperutil] unmarshalJSON -> DEBU 0ba Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.119 UTC [viperutil] getKeysRecursively -> DEBU 0bb Found real value for operations.TLS.PrivateKey setting to +2020-08-31 20:50:43.119 UTC [viperutil] unmarshalJSON -> DEBU 0bc Unmarshal JSON: value is not a string: false +2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0bd Found real value for operations.TLS.ClientAuthRequired setting to bool false +2020-08-31 20:50:43.120 UTC [viperutil] unmarshalJSON -> DEBU 0be Unmarshal JSON: value is not a string: [] +2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0bf Found real value for operations.TLS.ClientRootCAs setting to []interface {} [] +2020-08-31 20:50:43.120 UTC [viperutil] unmarshalJSON -> DEBU 0c0 Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0c1 Found real value for operations.TLS.RootCAs setting to +2020-08-31 20:50:43.120 UTC [viperutil] unmarshalJSON -> DEBU 0c2 Unmarshal JSON: value is not a string: false +2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0c3 Found real value for operations.TLS.Enabled setting to bool false +2020-08-31 20:50:43.120 UTC [viperutil] unmarshalJSON -> DEBU 0c4 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0c5 Found real value for operations.ListenAddress setting to string 0.0.0.0:8443 +2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0c6 Found map[interface{}]interface{} value for metrics +2020-08-31 20:50:43.120 UTC [viperutil] unmarshalJSON -> DEBU 0c7 Unmarshal JSON: value cannot be unmarshalled: invalid character 'p' looking for beginning of value +2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0c8 Found real value for metrics.Provider setting to string prometheus +2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0c9 Found map[string]interface{} value for metrics.Statsd +2020-08-31 20:50:43.120 UTC [viperutil] unmarshalJSON -> DEBU 0ca Unmarshal JSON: value cannot be unmarshalled: invalid character 's' after top-level value +2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0cb Found real value for metrics.Statsd.WriteInterval setting to string 30s +2020-08-31 20:50:43.120 UTC [viperutil] unmarshalJSON -> DEBU 0cc Unmarshal JSON: value is not a string: +2020-08-31 20:50:43.120 UTC [viperutil] getKeysRecursively -> DEBU 0cd Found real value for metrics.Statsd.Prefix setting to +2020-08-31 20:50:43.120 UTC [viperutil] unmarshalJSON -> DEBU 0ce Unmarshal JSON: value cannot be unmarshalled: invalid character 'u' looking for beginning of value +2020-08-31 20:50:43.121 UTC [viperutil] getKeysRecursively -> DEBU 0cf Found real value for metrics.Statsd.Network setting to string udp +2020-08-31 20:50:43.121 UTC [viperutil] unmarshalJSON -> DEBU 0d0 Unmarshal JSON: value cannot be unmarshalled: invalid character '.' after top-level value +2020-08-31 20:50:43.121 UTC [viperutil] getKeysRecursively -> DEBU 0d1 Found real value for metrics.Statsd.Address setting to string 127.0.0.1:8125 +2020-08-31 20:50:43.121 UTC [viperutil] getKeysRecursively -> DEBU 0d2 Found map[interface{}]interface{} value for consensus +2020-08-31 20:50:43.121 UTC [viperutil] unmarshalJSON -> DEBU 0d3 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-08-31 20:50:43.121 UTC [viperutil] getKeysRecursively -> DEBU 0d4 Found real value for consensus.WALDir setting to string /var/hyperledger/production/orderer/etcdraft/wal +2020-08-31 20:50:43.121 UTC [viperutil] unmarshalJSON -> DEBU 0d5 Unmarshal JSON: value cannot be unmarshalled: invalid character '/' looking for beginning of value +2020-08-31 20:50:43.121 UTC [viperutil] getKeysRecursively -> DEBU 0d6 Found real value for consensus.SnapDir setting to string /var/hyperledger/production/orderer/etcdraft/snapshot +2020-08-31 20:50:43.121 UTC [viperutil] EnhancedExactUnmarshal -> DEBU 0d7 map[consensus:map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] debug:map[BroadcastTraceDir: DeliverTraceDir:] fileledger:map[Location:/var/hyperledger/production/orderer Prefix:hyperledger-fabric-ordererledger] general:map[Authentication:map[NoExpirationChecks: TimeWindow:15m] BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]] Cluster:map[CertExpirationWarningThreshold: ClientCertificate:/var/hyperledger/orderer/tls/server.crt ClientPrivateKey:/var/hyperledger/orderer/tls/server.key DialTimeout: ListenAddress:0.0.0.0 ListenPort:7055 RPCTimeout: ReplicationBackgroundRefreshInterval: ReplicationBufferSize: ReplicationMaxRetries: ReplicationPullTimeout: ReplicationRetryTimeout: RootCAs:[/var/hyperledger/orderer/tls/ca.crt] SendBufferSize:10 ServerCertificate:/var/hyperledger/orderer/tls/server.crt ServerPrivateKey:/var/hyperledger/orderer/tls/server.key TLSHandshakeTimeShift:] ConnectionTimeout: GenesisFile:/var/hyperledger/orderer/orderer.genesis.block GenesisMethod:file GenesisProfile:SampleInsecureSolo Keepalive:map[ServerInterval:7200s ServerMinInterval:60s ServerTimeout:20s] LedgerType:file ListenAddress:0.0.0.0 ListenPort:7050 LocalMSPDir:/var/hyperledger/orderer/msp LocalMSPID:OrdererMSP Profile:map[Address:0.0.0.0:6060 Enabled:false] SystemChannel: TLS:map[Certificate:/var/hyperledger/orderer/tls/server.crt ClientAuthRequired:false ClientRootCAs: Enabled:true PrivateKey:/var/hyperledger/orderer/tls/server.key RootCAs:[/var/hyperledger/orderer/tls/ca.crt]]] kafka:map[Retry:map[Consumer:map[RetryBackoff:2s] LongInterval:5m LongTotal:12h Metadata:map[RetryBackoff:250ms RetryMax:3] NetworkTimeouts:map[DialTimeout:10s ReadTimeout:10s WriteTimeout:10s] Producer:map[RetryBackoff:100ms RetryMax:3] ShortInterval:5s ShortTotal:10m] SASLPlain:map[Enabled:false Password: User:] TLS:map[Certificate: ClientAuthRequired: ClientRootCAs: Enabled:false PrivateKey: RootCAs:] Topic:map[ReplicationFactor:3] Verbose:false Version:] metrics:map[Provider:prometheus Statsd:map[Address:127.0.0.1:8125 Network:udp Prefix: WriteInterval:30s]] operations:map[ListenAddress:0.0.0.0:8443 TLS:map[Certificate: ClientAuthRequired:false ClientRootCAs:[] Enabled:false PrivateKey: RootCAs:]] ramledger:map[HistorySize:1000]] +2020-08-31 20:50:43.122 UTC [localconfig] completeInitialization -> INFO 0d8 Kafka.Version unset, setting to 0.10.2.0 +"2020-08-31 20:50:43.144 UTC [bccsp_sw] openKeyStore -> DEBU 0d9 KeyStore opened at [/var/hyperledger/orderer/msp/keystore]" +"2020-08-31 20:50:43.144 UTC [bccsp] initBCCSP -> DEBU 0da Initialize BCCSP [SW]" +"2020-08-31 20:50:43.144 UTC [msp] getPemMaterialFromDir -> DEBU 0db Reading directory /var/hyperledger/orderer/msp/signcerts" +"2020-08-31 20:50:43.154 UTC [msp] getPemMaterialFromDir -> DEBU 0dc Inspecting file /var/hyperledger/orderer/msp/signcerts/orderer0.example.com-cert.pem" +"2020-08-31 20:50:43.164 UTC [msp] getPemMaterialFromDir -> DEBU 0dd Reading directory /var/hyperledger/orderer/msp/cacerts" +"2020-08-31 20:50:43.190 UTC [msp] getPemMaterialFromDir -> DEBU 0de Inspecting file /var/hyperledger/orderer/msp/cacerts/ca.example.com-cert.pem" +"2020-08-31 20:50:43.196 UTC [msp] getPemMaterialFromDir -> DEBU 0df Reading directory /var/hyperledger/orderer/msp/admincerts" +"2020-08-31 20:50:43.203 UTC [msp] getPemMaterialFromDir -> DEBU 0e0 Reading directory /var/hyperledger/orderer/msp/intermediatecerts" +"2020-08-31 20:50:43.204 UTC [msp] getMspConfig -> DEBU 0e1 Intermediate certs folder not found at [/var/hyperledger/orderer/msp/intermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/intermediatecerts: no such file or directory]" +"2020-08-31 20:50:43.205 UTC [msp] getPemMaterialFromDir -> DEBU 0e2 Reading directory /var/hyperledger/orderer/msp/tlscacerts" +"2020-08-31 20:50:43.218 UTC [msp] getPemMaterialFromDir -> DEBU 0e3 Inspecting file /var/hyperledger/orderer/msp/tlscacerts/tlsca.example.com-cert.pem" +"2020-08-31 20:50:43.227 UTC [msp] getPemMaterialFromDir -> DEBU 0e4 Reading directory /var/hyperledger/orderer/msp/tlsintermediatecerts" +"2020-08-31 20:50:43.229 UTC [msp] getMspConfig -> DEBU 0e5 TLS intermediate certs folder not found at [/var/hyperledger/orderer/msp/tlsintermediatecerts]. Skipping. [stat /var/hyperledger/orderer/msp/tlsintermediatecerts: no such file or directory]" +"2020-08-31 20:50:43.229 UTC [msp] getPemMaterialFromDir -> DEBU 0e6 Reading directory /var/hyperledger/orderer/msp/crls" +"2020-08-31 20:50:43.234 UTC [msp] getMspConfig -> DEBU 0e7 crls folder not found at [/var/hyperledger/orderer/msp/crls]. Skipping. [stat /var/hyperledger/orderer/msp/crls: no such file or directory]" +"2020-08-31 20:50:43.250 UTC [msp] getMspConfig -> DEBU 0e8 Loading NodeOUs" +"2020-08-31 20:50:43.283 UTC [msp] newBccspMsp -> DEBU 0e9 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:43.283 UTC [msp] New -> DEBU 0ea Creating Cache-MSP instance" +"2020-08-31 20:50:43.283 UTC [msp] loadLocaMSP -> DEBU 0eb Created new local MSP" +"2020-08-31 20:50:43.284 UTC [msp] Setup -> DEBU 0ec Setting up MSP instance OrdererMSP" +"2020-08-31 20:50:43.284 UTC [msp.identity] newIdentity -> DEBU 0ed Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:50:43.284 UTC [msp.identity] newIdentity -> DEBU 0ee Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE-----" +"2020-08-31 20:50:43.306 UTC [bccsp_sw] loadPrivateKey -> DEBU 0ef Loading private key [b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd] at [/var/hyperledger/orderer/msp/keystore/b00e687e3173b478115ea654b7f71799659e62b164679c44390c53d30d7e18bd_sk]..." +"2020-08-31 20:50:43.316 UTC [msp.identity] newIdentity -> DEBU 0f0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE-----" +"2020-08-31 20:50:43.317 UTC [msp] setupSigningIdentity -> DEBU 0f1 Signing identity expires at 2030-02-18 18:24:00 +0000 UTC" +"2020-08-31 20:50:43.319 UTC [orderer.common.server] prettyPrintStruct -> INFO 0f2 Orderer config values: + General.LedgerType = "file" + General.ListenAddress = "0.0.0.0" + General.ListenPort = 7050 + General.TLS.Enabled = true + General.TLS.PrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.TLS.Certificate = "/var/hyperledger/orderer/tls/server.crt" + General.TLS.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] + General.TLS.ClientAuthRequired = false + General.TLS.ClientRootCAs = [] + General.Cluster.ListenAddress = "0.0.0.0" + General.Cluster.ListenPort = 7055 + General.Cluster.ServerCertificate = "/var/hyperledger/orderer/tls/server.crt" + General.Cluster.ServerPrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.Cluster.ClientCertificate = "/var/hyperledger/orderer/tls/server.crt" + General.Cluster.ClientPrivateKey = "/var/hyperledger/orderer/tls/server.key" + General.Cluster.RootCAs = [/var/hyperledger/orderer/tls/ca.crt] + General.Cluster.DialTimeout = 5s + General.Cluster.RPCTimeout = 7s + General.Cluster.ReplicationBufferSize = 20971520 + General.Cluster.ReplicationPullTimeout = 5s + General.Cluster.ReplicationRetryTimeout = 5s + General.Cluster.ReplicationBackgroundRefreshInterval = 5m0s + General.Cluster.ReplicationMaxRetries = 12 + General.Cluster.SendBufferSize = 10 + General.Cluster.CertExpirationWarningThreshold = 168h0m0s + General.Cluster.TLSHandshakeTimeShift = 0s + General.Keepalive.ServerMinInterval = 1m0s + General.Keepalive.ServerInterval = 2h0m0s + General.Keepalive.ServerTimeout = 20s + General.ConnectionTimeout = 0s + General.GenesisMethod = "file" + General.GenesisProfile = "SampleInsecureSolo" + General.SystemChannel = "test-system-channel-name" + General.GenesisFile = "/var/hyperledger/orderer/orderer.genesis.block" + General.Profile.Enabled = false + General.Profile.Address = "0.0.0.0:6060" + General.LocalMSPDir = "/var/hyperledger/orderer/msp" + General.LocalMSPID = "OrdererMSP" + General.BCCSP.ProviderName = "SW" + General.BCCSP.SwOpts.SecLevel = 256 + General.BCCSP.SwOpts.HashFamily = "SHA2" + General.BCCSP.SwOpts.Ephemeral = false + General.BCCSP.SwOpts.FileKeystore.KeyStorePath = "/var/hyperledger/orderer/msp/keystore" + General.BCCSP.SwOpts.DummyKeystore = + General.BCCSP.SwOpts.InmemKeystore = + General.BCCSP.PluginOpts = + General.Authentication.TimeWindow = 15m0s + General.Authentication.NoExpirationChecks = false + FileLedger.Location = "/var/hyperledger/production/orderer" + FileLedger.Prefix = "hyperledger-fabric-ordererledger" + RAMLedger.HistorySize = 1000 + Kafka.Retry.ShortInterval = 5s + Kafka.Retry.ShortTotal = 10m0s + Kafka.Retry.LongInterval = 5m0s + Kafka.Retry.LongTotal = 12h0m0s + Kafka.Retry.NetworkTimeouts.DialTimeout = 10s + Kafka.Retry.NetworkTimeouts.ReadTimeout = 10s + Kafka.Retry.NetworkTimeouts.WriteTimeout = 10s + Kafka.Retry.Metadata.RetryMax = 3 + Kafka.Retry.Metadata.RetryBackoff = 250ms + Kafka.Retry.Producer.RetryMax = 3 + Kafka.Retry.Producer.RetryBackoff = 100ms + Kafka.Retry.Consumer.RetryBackoff = 2s + Kafka.Verbose = false + Kafka.Version = 0.10.2.0 + Kafka.TLS.Enabled = false + Kafka.TLS.PrivateKey = "" + Kafka.TLS.Certificate = "" + Kafka.TLS.RootCAs = [] + Kafka.TLS.ClientAuthRequired = false + Kafka.TLS.ClientRootCAs = [] + Kafka.SASLPlain.Enabled = false + Kafka.SASLPlain.User = "" + Kafka.SASLPlain.Password = "" + Kafka.Topic.ReplicationFactor = 3 + Debug.BroadcastTraceDir = "" + Debug.DeliverTraceDir = "" + Consensus = map[SnapDir:/var/hyperledger/production/orderer/etcdraft/snapshot WALDir:/var/hyperledger/production/orderer/etcdraft/wal] + Operations.ListenAddress = "0.0.0.0:8443" + Operations.TLS.Enabled = false + Operations.TLS.PrivateKey = "" + Operations.TLS.Certificate = "" + Operations.TLS.RootCAs = [] + Operations.TLS.ClientAuthRequired = false + Operations.TLS.ClientRootCAs = [] + Metrics.Provider = "prometheus" + Metrics.Statsd.Network = "udp" + Metrics.Statsd.Address = "127.0.0.1:8125" + Metrics.Statsd.WriteInterval = 30s + Metrics.Statsd.Prefix = """ +"2020-08-31 20:50:43.330 UTC [common.channelconfig] NewStandardValues -> DEBU 0f3 Initializing protos for *channelconfig.ChannelProtos" +"2020-08-31 20:50:43.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f4 Processing field: HashingAlgorithm" +"2020-08-31 20:50:43.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f5 Processing field: BlockDataHashingStructure" +"2020-08-31 20:50:43.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f6 Processing field: OrdererAddresses" +"2020-08-31 20:50:43.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f7 Processing field: Consortium" +"2020-08-31 20:50:43.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0f8 Processing field: Capabilities" +"2020-08-31 20:50:43.330 UTC [common.channelconfig] NewStandardValues -> DEBU 0f9 Initializing protos for *channelconfig.ConsortiumProtos" +"2020-08-31 20:50:43.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fa Processing field: ChannelCreationPolicy" +"2020-08-31 20:50:43.330 UTC [common.channelconfig] NewStandardValues -> DEBU 0fb Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:43.330 UTC [common.channelconfig] initializeProtosStruct -> DEBU 0fc Processing field: MSP" +"2020-08-31 20:50:43.331 UTC [common.channelconfig] validateMSP -> DEBU 0fd Setting up MSP for org Org1MSP" +"2020-08-31 20:50:43.331 UTC [msp] newBccspMsp -> DEBU 0fe Creating BCCSP-based MSP instance" +"2020-08-31 20:50:43.331 UTC [msp] New -> DEBU 0ff Creating Cache-MSP instance" +"2020-08-31 20:50:43.331 UTC [msp] Setup -> DEBU 100 Setting up MSP instance Org1MSP" +"2020-08-31 20:50:43.331 UTC [msp.identity] newIdentity -> DEBU 101 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-08-31 20:50:43.331 UTC [common.channelconfig] NewStandardValues -> DEBU 102 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:43.331 UTC [common.channelconfig] initializeProtosStruct -> DEBU 103 Processing field: MSP" +"2020-08-31 20:50:43.331 UTC [common.channelconfig] validateMSP -> DEBU 104 Setting up MSP for org Org2MSP" +"2020-08-31 20:50:43.331 UTC [msp] newBccspMsp -> DEBU 105 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:43.331 UTC [msp] New -> DEBU 106 Creating Cache-MSP instance" +"2020-08-31 20:50:43.331 UTC [msp] Setup -> DEBU 107 Setting up MSP instance Org2MSP" +"2020-08-31 20:50:43.333 UTC [msp.identity] newIdentity -> DEBU 108 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-08-31 20:50:43.334 UTC [common.channelconfig] NewStandardValues -> DEBU 109 Initializing protos for *channelconfig.OrdererProtos" +"2020-08-31 20:50:43.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10a Processing field: ConsensusType" +"2020-08-31 20:50:43.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10b Processing field: BatchSize" +"2020-08-31 20:50:43.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10c Processing field: BatchTimeout" +"2020-08-31 20:50:43.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10d Processing field: KafkaBrokers" +"2020-08-31 20:50:43.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10e Processing field: ChannelRestrictions" +"2020-08-31 20:50:43.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU 10f Processing field: Capabilities" +"2020-08-31 20:50:43.334 UTC [common.channelconfig] NewStandardValues -> DEBU 110 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-08-31 20:50:43.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU 111 Processing field: Endpoints" +"2020-08-31 20:50:43.334 UTC [common.channelconfig] NewStandardValues -> DEBU 112 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:43.334 UTC [common.channelconfig] initializeProtosStruct -> DEBU 113 Processing field: MSP" +"2020-08-31 20:50:43.334 UTC [common.channelconfig] validateMSP -> DEBU 114 Setting up MSP for org OrdererOrg" +"2020-08-31 20:50:43.334 UTC [msp] newBccspMsp -> DEBU 115 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:43.334 UTC [msp] New -> DEBU 116 Creating Cache-MSP instance" +"2020-08-31 20:50:43.334 UTC [msp] Setup -> DEBU 117 Setting up MSP instance OrdererMSP" +"2020-08-31 20:50:43.334 UTC [msp.identity] newIdentity -> DEBU 118 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:50:43.335 UTC [msp] Setup -> DEBU 119 Setting up the MSP manager (3 msps)" +"2020-08-31 20:50:43.335 UTC [msp] Setup -> DEBU 11a MSP manager setup complete, setup 3 msps" +"2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 11b Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 11c Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 11d Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 11e Proposed new policy Readers for Channel/Orderer" +"2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 11f Proposed new policy Writers for Channel/Orderer" +"2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 120 Proposed new policy Admins for Channel/Orderer" +"2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 121 Proposed new policy BlockValidation for Channel/Orderer" +"2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 122 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 123 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 124 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 125 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 126 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 127 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.335 UTC [policies] NewManagerImpl -> DEBU 128 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.345 UTC [policies] NewManagerImpl -> DEBU 129 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.345 UTC [policies] NewManagerImpl -> DEBU 12a Proposed new policy Admins for Channel/Consortiums" +"2020-08-31 20:50:43.345 UTC [policies] GetPolicy -> DEBU 12b Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2020-08-31 20:50:43.345 UTC [policies] NewManagerImpl -> DEBU 12c Proposed new policy Writers for Channel" +"2020-08-31 20:50:43.345 UTC [policies] NewManagerImpl -> DEBU 12d Proposed new policy Admins for Channel" +"2020-08-31 20:50:43.345 UTC [policies] GetPolicy -> DEBU 12e Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2020-08-31 20:50:43.346 UTC [policies] NewManagerImpl -> DEBU 12f Proposed new policy Readers for Channel" +"2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 130 Adding to config map: [Group] /Channel" +"2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 131 Adding to config map: [Group] /Channel/Consortiums" +"2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 132 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 133 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 134 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 135 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 136 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 137 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 138 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 139 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 13a Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 13b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 13c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 13d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 13e Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 13f Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2020-08-31 20:50:43.346 UTC [common.configtx] addToMap -> DEBU 140 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2020-08-31 20:50:43.347 UTC [common.configtx] addToMap -> DEBU 141 Adding to config map: [Group] /Channel/Orderer" +"2020-08-31 20:50:43.347 UTC [common.configtx] addToMap -> DEBU 142 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.347 UTC [common.configtx] addToMap -> DEBU 143 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-08-31 20:50:43.347 UTC [common.configtx] addToMap -> DEBU 144 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:50:43.347 UTC [common.configtx] addToMap -> DEBU 145 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:50:43.347 UTC [common.configtx] addToMap -> DEBU 146 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-08-31 20:50:43.347 UTC [common.configtx] addToMap -> DEBU 147 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 148 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 149 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 14a Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 14b Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 14c Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 14d Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 14e Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 14f Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 150 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 151 Adding to config map: [Value] /Channel/Capabilities" +"2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 152 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 153 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 154 Adding to config map: [Policy] /Channel/Writers" +"2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 155 Adding to config map: [Policy] /Channel/Admins" +"2020-08-31 20:50:43.348 UTC [common.configtx] addToMap -> DEBU 156 Adding to config map: [Policy] /Channel/Readers" +"2020-08-31 20:50:43.348 UTC [orderer.common.server] createLedgerFactory -> DEBU 157 Ledger dir: /var/hyperledger/production/orderer" +"2020-08-31 20:50:43.348 UTC [kvledger.util] CreateDirIfMissing -> DEBU 158 CreateDirIfMissing [/var/hyperledger/production/orderer/index/]" +"2020-08-31 20:50:43.348 UTC [kvledger.util] logDirStatus -> DEBU 159 Before creating dir - [/var/hyperledger/production/orderer/index/] does not exist" +"2020-08-31 20:50:43.348 UTC [kvledger.util] logDirStatus -> DEBU 15a After creating dir - [/var/hyperledger/production/orderer/index/] exists" +"2020-08-31 20:50:43.417 UTC [orderer.common.server] extractSysChanLastConfig -> INFO 15b Bootstrapping because no existing channels" +"2020-08-31 20:50:43.417 UTC [orderer.common.server] selectClusterBootBlock -> DEBU 15c Selected bootstrap block, because system channel last config block is nil" +"2020-08-31 20:50:43.433 UTC [orderer.common.server] initializeServerConfig -> INFO 15d Starting orderer with TLS enabled" +"2020-08-31 20:50:43.434 UTC [common.channelconfig] NewStandardValues -> DEBU 15e Initializing protos for *channelconfig.ChannelProtos" +"2020-08-31 20:50:43.434 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15f Processing field: HashingAlgorithm" +"2020-08-31 20:50:43.434 UTC [common.channelconfig] initializeProtosStruct -> DEBU 160 Processing field: BlockDataHashingStructure" +"2020-08-31 20:50:43.434 UTC [common.channelconfig] initializeProtosStruct -> DEBU 161 Processing field: OrdererAddresses" +"2020-08-31 20:50:43.434 UTC [common.channelconfig] initializeProtosStruct -> DEBU 162 Processing field: Consortium" +"2020-08-31 20:50:43.434 UTC [common.channelconfig] initializeProtosStruct -> DEBU 163 Processing field: Capabilities" +"2020-08-31 20:50:43.434 UTC [common.channelconfig] NewStandardValues -> DEBU 164 Initializing protos for *channelconfig.ConsortiumProtos" +"2020-08-31 20:50:43.434 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165 Processing field: ChannelCreationPolicy" +"2020-08-31 20:50:43.434 UTC [common.channelconfig] NewStandardValues -> DEBU 166 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:43.434 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167 Processing field: MSP" +"2020-08-31 20:50:43.434 UTC [common.channelconfig] validateMSP -> DEBU 168 Setting up MSP for org Org1MSP" +"2020-08-31 20:50:43.434 UTC [msp] newBccspMsp -> DEBU 169 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:43.434 UTC [msp] New -> DEBU 16a Creating Cache-MSP instance" +"2020-08-31 20:50:43.434 UTC [msp] Setup -> DEBU 16b Setting up MSP instance Org1MSP" +"2020-08-31 20:50:43.434 UTC [msp.identity] newIdentity -> DEBU 16c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-08-31 20:50:43.435 UTC [common.channelconfig] NewStandardValues -> DEBU 16d Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:43.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 16e Processing field: MSP" +"2020-08-31 20:50:43.435 UTC [common.channelconfig] validateMSP -> DEBU 16f Setting up MSP for org Org2MSP" +"2020-08-31 20:50:43.435 UTC [msp] newBccspMsp -> DEBU 170 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:43.435 UTC [msp] New -> DEBU 171 Creating Cache-MSP instance" +"2020-08-31 20:50:43.435 UTC [msp] Setup -> DEBU 172 Setting up MSP instance Org2MSP" +"2020-08-31 20:50:43.435 UTC [msp.identity] newIdentity -> DEBU 173 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-08-31 20:50:43.435 UTC [common.channelconfig] NewStandardValues -> DEBU 174 Initializing protos for *channelconfig.OrdererProtos" +"2020-08-31 20:50:43.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175 Processing field: ConsensusType" +"2020-08-31 20:50:43.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 176 Processing field: BatchSize" +"2020-08-31 20:50:43.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 177 Processing field: BatchTimeout" +"2020-08-31 20:50:43.435 UTC [common.channelconfig] initializeProtosStruct -> DEBU 178 Processing field: KafkaBrokers" +"2020-08-31 20:50:43.436 UTC [common.channelconfig] initializeProtosStruct -> DEBU 179 Processing field: ChannelRestrictions" +"2020-08-31 20:50:43.436 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17a Processing field: Capabilities" +"2020-08-31 20:50:43.436 UTC [common.channelconfig] NewStandardValues -> DEBU 17b Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-08-31 20:50:43.436 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17c Processing field: Endpoints" +"2020-08-31 20:50:43.436 UTC [common.channelconfig] NewStandardValues -> DEBU 17d Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:43.436 UTC [common.channelconfig] initializeProtosStruct -> DEBU 17e Processing field: MSP" +"2020-08-31 20:50:43.436 UTC [common.channelconfig] validateMSP -> DEBU 17f Setting up MSP for org OrdererOrg" +"2020-08-31 20:50:43.436 UTC [msp] newBccspMsp -> DEBU 180 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:43.436 UTC [msp] New -> DEBU 181 Creating Cache-MSP instance" +"2020-08-31 20:50:43.436 UTC [msp] Setup -> DEBU 182 Setting up MSP instance OrdererMSP" +"2020-08-31 20:50:43.436 UTC [msp.identity] newIdentity -> DEBU 183 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:50:43.436 UTC [msp] Setup -> DEBU 184 Setting up the MSP manager (3 msps)" +"2020-08-31 20:50:43.436 UTC [msp] Setup -> DEBU 185 MSP manager setup complete, setup 3 msps" +"2020-08-31 20:50:43.436 UTC [policies] NewManagerImpl -> DEBU 186 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.436 UTC [policies] NewManagerImpl -> DEBU 187 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.436 UTC [policies] NewManagerImpl -> DEBU 188 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.436 UTC [policies] NewManagerImpl -> DEBU 189 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 18a Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 18b Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 18c Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 18d Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 18e Proposed new policy Admins for Channel/Consortiums" +"2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 18f Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 190 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 191 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 192 Proposed new policy Readers for Channel/Orderer" +"2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 193 Proposed new policy Writers for Channel/Orderer" +"2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 194 Proposed new policy Admins for Channel/Orderer" +"2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 195 Proposed new policy BlockValidation for Channel/Orderer" +"2020-08-31 20:50:43.437 UTC [policies] GetPolicy -> DEBU 196 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 197 Proposed new policy Writers for Channel" +"2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 198 Proposed new policy Admins for Channel" +"2020-08-31 20:50:43.437 UTC [policies] GetPolicy -> DEBU 199 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2020-08-31 20:50:43.437 UTC [policies] NewManagerImpl -> DEBU 19a Proposed new policy Readers for Channel" +"2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 19b Adding to config map: [Group] /Channel" +"2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 19c Adding to config map: [Group] /Channel/Consortiums" +"2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 19d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 19e Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 19f Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a0 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a1 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a2 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a3 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a4 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a5 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1a9 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1aa Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1ab Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2020-08-31 20:50:43.437 UTC [common.configtx] addToMap -> DEBU 1ac Adding to config map: [Group] /Channel/Orderer" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1ad Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1ae Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1af Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b2 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b3 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b4 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b5 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b6 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b7 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b8 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1b9 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1ba Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1bb Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1bc Adding to config map: [Value] /Channel/Capabilities" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1bd Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1be Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1bf Adding to config map: [Policy] /Channel/Writers" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1c0 Adding to config map: [Policy] /Channel/Admins" +"2020-08-31 20:50:43.438 UTC [common.configtx] addToMap -> DEBU 1c1 Adding to config map: [Policy] /Channel/Readers" +"2020-08-31 20:50:43.439 UTC [common.channelconfig] NewStandardValues -> DEBU 1c2 Initializing protos for *channelconfig.ChannelProtos" +"2020-08-31 20:50:43.439 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c3 Processing field: HashingAlgorithm" +"2020-08-31 20:50:43.439 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c4 Processing field: BlockDataHashingStructure" +"2020-08-31 20:50:43.439 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c5 Processing field: OrdererAddresses" +"2020-08-31 20:50:43.439 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c6 Processing field: Consortium" +"2020-08-31 20:50:43.439 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c7 Processing field: Capabilities" +"2020-08-31 20:50:43.439 UTC [common.channelconfig] NewStandardValues -> DEBU 1c8 Initializing protos for *channelconfig.ConsortiumProtos" +"2020-08-31 20:50:43.439 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1c9 Processing field: ChannelCreationPolicy" +"2020-08-31 20:50:43.439 UTC [common.channelconfig] NewStandardValues -> DEBU 1ca Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:43.439 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1cb Processing field: MSP" +"2020-08-31 20:50:43.439 UTC [common.channelconfig] validateMSP -> DEBU 1cc Setting up MSP for org Org1MSP" +"2020-08-31 20:50:43.439 UTC [msp] newBccspMsp -> DEBU 1cd Creating BCCSP-based MSP instance" +"2020-08-31 20:50:43.439 UTC [msp] New -> DEBU 1ce Creating Cache-MSP instance" +"2020-08-31 20:50:43.439 UTC [msp] Setup -> DEBU 1cf Setting up MSP instance Org1MSP" +"2020-08-31 20:50:43.439 UTC [msp.identity] newIdentity -> DEBU 1d0 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-08-31 20:50:43.440 UTC [common.channelconfig] NewStandardValues -> DEBU 1d1 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:43.440 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d2 Processing field: MSP" +"2020-08-31 20:50:43.440 UTC [common.channelconfig] validateMSP -> DEBU 1d3 Setting up MSP for org Org2MSP" +"2020-08-31 20:50:43.440 UTC [msp] newBccspMsp -> DEBU 1d4 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:43.440 UTC [msp] New -> DEBU 1d5 Creating Cache-MSP instance" +"2020-08-31 20:50:43.440 UTC [msp] Setup -> DEBU 1d6 Setting up MSP instance Org2MSP" +"2020-08-31 20:50:43.440 UTC [msp.identity] newIdentity -> DEBU 1d7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-08-31 20:50:43.440 UTC [common.channelconfig] NewStandardValues -> DEBU 1d8 Initializing protos for *channelconfig.OrdererProtos" +"2020-08-31 20:50:43.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1d9 Processing field: ConsensusType" +"2020-08-31 20:50:43.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1da Processing field: BatchSize" +"2020-08-31 20:50:43.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1db Processing field: BatchTimeout" +"2020-08-31 20:50:43.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dc Processing field: KafkaBrokers" +"2020-08-31 20:50:43.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1dd Processing field: ChannelRestrictions" +"2020-08-31 20:50:43.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1de Processing field: Capabilities" +"2020-08-31 20:50:43.441 UTC [common.channelconfig] NewStandardValues -> DEBU 1df Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-08-31 20:50:43.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e0 Processing field: Endpoints" +"2020-08-31 20:50:43.441 UTC [common.channelconfig] NewStandardValues -> DEBU 1e1 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:43.441 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1e2 Processing field: MSP" +"2020-08-31 20:50:43.441 UTC [common.channelconfig] validateMSP -> DEBU 1e3 Setting up MSP for org OrdererOrg" +"2020-08-31 20:50:43.441 UTC [msp] newBccspMsp -> DEBU 1e4 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:43.441 UTC [msp] New -> DEBU 1e5 Creating Cache-MSP instance" +"2020-08-31 20:50:43.441 UTC [msp] Setup -> DEBU 1e6 Setting up MSP instance OrdererMSP" +"2020-08-31 20:50:43.441 UTC [msp.identity] newIdentity -> DEBU 1e7 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:50:43.442 UTC [msp] Setup -> DEBU 1e8 Setting up the MSP manager (3 msps)" +"2020-08-31 20:50:43.442 UTC [msp] Setup -> DEBU 1e9 MSP manager setup complete, setup 3 msps" +"2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1ea Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1eb Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1ec Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1ed Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1ee Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1ef Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f0 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f1 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f2 Proposed new policy Admins for Channel/Consortiums" +"2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f3 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f4 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f5 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f6 Proposed new policy BlockValidation for Channel/Orderer" +"2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f7 Proposed new policy Readers for Channel/Orderer" +"2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f8 Proposed new policy Writers for Channel/Orderer" +"2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1f9 Proposed new policy Admins for Channel/Orderer" +"2020-08-31 20:50:43.442 UTC [policies] GetPolicy -> DEBU 1fa Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1fb Proposed new policy Writers for Channel" +"2020-08-31 20:50:43.442 UTC [policies] NewManagerImpl -> DEBU 1fc Proposed new policy Admins for Channel" +"2020-08-31 20:50:43.443 UTC [policies] GetPolicy -> DEBU 1fd Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2020-08-31 20:50:43.443 UTC [policies] NewManagerImpl -> DEBU 1fe Proposed new policy Readers for Channel" +"2020-08-31 20:50:43.447 UTC [common.configtx] addToMap -> DEBU 1ff Adding to config map: [Group] /Channel" +"2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 200 Adding to config map: [Group] /Channel/Consortiums" +"2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 201 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 202 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 203 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 204 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 205 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 206 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 207 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 208 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 209 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 20a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2020-08-31 20:50:43.448 UTC [common.configtx] addToMap -> DEBU 20b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 20c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 20d Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 20e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 20f Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 210 Adding to config map: [Group] /Channel/Orderer" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 211 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 212 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 213 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 214 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 215 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 216 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 217 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 218 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 219 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 21a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 21b Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 21c Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 21d Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 21e Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 21f Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 220 Adding to config map: [Value] /Channel/Capabilities" +"2020-08-31 20:50:43.449 UTC [common.configtx] addToMap -> DEBU 221 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-08-31 20:50:43.450 UTC [common.configtx] addToMap -> DEBU 222 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-08-31 20:50:43.450 UTC [common.configtx] addToMap -> DEBU 223 Adding to config map: [Policy] /Channel/Writers" +"2020-08-31 20:50:43.450 UTC [common.configtx] addToMap -> DEBU 224 Adding to config map: [Policy] /Channel/Admins" +"2020-08-31 20:50:43.450 UTC [common.configtx] addToMap -> DEBU 225 Adding to config map: [Policy] /Channel/Readers" +"2020-08-31 20:50:43.450 UTC [orderer.common.server] Start -> INFO 226 Setting up cluster for orderer type etcdraft" +"2020-08-31 20:50:43.468 UTC [orderer.common.cluster] replicateIfNeeded -> DEBU 227 Booted with a genesis block, replication isn't an option" +"2020-08-31 20:50:43.488 UTC [msp] GetDefaultSigningIdentity -> DEBU 228 Obtaining default signing identity" +"2020-08-31 20:50:43.493 UTC [fsblkstorage] newBlockfileMgr -> DEBU 229 newBlockfileMgr() initializing file-based block storage for ledger: testchainid " +"2020-08-31 20:50:43.493 UTC [kvledger.util] CreateDirIfMissing -> DEBU 22a CreateDirIfMissing [/var/hyperledger/production/orderer/chains/testchainid/]" +"2020-08-31 20:50:43.493 UTC [kvledger.util] logDirStatus -> DEBU 22b Before creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] does not exist" +"2020-08-31 20:50:43.493 UTC [kvledger.util] logDirStatus -> DEBU 22c After creating dir - [/var/hyperledger/production/orderer/chains/testchainid/] exists" +"2020-08-31 20:50:43.493 UTC [fsblkstorage] newBlockfileMgr -> INFO 22d Getting block information from block storage" +"2020-08-31 20:50:43.494 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 22e Retrieving checkpoint info from block files" +"2020-08-31 20:50:43.494 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 22f retrieveLastFileSuffix()" +"2020-08-31 20:50:43.494 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 230 retrieveLastFileSuffix() - biggestFileNum = -1" +"2020-08-31 20:50:43.494 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 231 Last file number found = -1" +"2020-08-31 20:50:43.494 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 232 No block file found" +"2020-08-31 20:50:43.494 UTC [fsblkstorage] newBlockfileMgr -> DEBU 233 Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc00033e660)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2020-08-31 20:50:43.498 UTC [fsblkstorage] newBlockIndex -> DEBU 234 newBlockIndex() - indexItems:[[BlockNum]]" +"2020-08-31 20:50:43.509 UTC [fsblkstorage] indexBlock -> DEBU 235 Indexing block [blockNum=0, blockHash=[]byte{0x48, 0x55, 0xad, 0xef, 0x6c, 0xdb, 0x22, 0x69, 0x71, 0xcd, 0x6f, 0x1c, 0x81, 0xaf, 0xc3, 0xaa, 0x9e, 0x4d, 0x72, 0x22, 0x6e, 0xe, 0x6f, 0xf, 0xa7, 0xc9, 0xc6, 0x64, 0xf1, 0x4, 0x22, 0x36} txOffsets= +txId=0b115b661c1dcf99371406616e0debb0da7d4450983e6277a76efe6c1f796f92 locPointer=offset=39, bytesLength=22885 +]" +"2020-08-31 20:50:43.511 UTC [fsblkstorage] updateCheckpoint -> DEBU 236 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[22930], isChainEmpty=[false], lastBlockNumber=[0]" +"2020-08-31 20:50:43.511 UTC [common.channelconfig] NewStandardValues -> DEBU 237 Initializing protos for *channelconfig.ChannelProtos" +"2020-08-31 20:50:43.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 238 Processing field: HashingAlgorithm" +"2020-08-31 20:50:43.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 239 Processing field: BlockDataHashingStructure" +"2020-08-31 20:50:43.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23a Processing field: OrdererAddresses" +"2020-08-31 20:50:43.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23b Processing field: Consortium" +"2020-08-31 20:50:43.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23c Processing field: Capabilities" +"2020-08-31 20:50:43.511 UTC [common.channelconfig] NewStandardValues -> DEBU 23d Initializing protos for *channelconfig.ConsortiumProtos" +"2020-08-31 20:50:43.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 23e Processing field: ChannelCreationPolicy" +"2020-08-31 20:50:43.511 UTC [common.channelconfig] NewStandardValues -> DEBU 23f Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:43.511 UTC [common.channelconfig] initializeProtosStruct -> DEBU 240 Processing field: MSP" +"2020-08-31 20:50:43.511 UTC [common.channelconfig] validateMSP -> DEBU 241 Setting up MSP for org Org1MSP" +"2020-08-31 20:50:43.511 UTC [msp] newBccspMsp -> DEBU 242 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:43.511 UTC [msp] New -> DEBU 243 Creating Cache-MSP instance" +"2020-08-31 20:50:43.511 UTC [msp] Setup -> DEBU 244 Setting up MSP instance Org1MSP" +"2020-08-31 20:50:43.512 UTC [msp.identity] newIdentity -> DEBU 245 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-08-31 20:50:43.512 UTC [common.channelconfig] NewStandardValues -> DEBU 246 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:43.512 UTC [common.channelconfig] initializeProtosStruct -> DEBU 247 Processing field: MSP" +"2020-08-31 20:50:43.512 UTC [common.channelconfig] validateMSP -> DEBU 248 Setting up MSP for org Org2MSP" +"2020-08-31 20:50:43.512 UTC [msp] newBccspMsp -> DEBU 249 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:43.512 UTC [msp] New -> DEBU 24a Creating Cache-MSP instance" +"2020-08-31 20:50:43.512 UTC [msp] Setup -> DEBU 24b Setting up MSP instance Org2MSP" +"2020-08-31 20:50:43.512 UTC [msp.identity] newIdentity -> DEBU 24c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-08-31 20:50:43.513 UTC [common.channelconfig] NewStandardValues -> DEBU 24d Initializing protos for *channelconfig.OrdererProtos" +"2020-08-31 20:50:43.513 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24e Processing field: ConsensusType" +"2020-08-31 20:50:43.513 UTC [common.channelconfig] initializeProtosStruct -> DEBU 24f Processing field: BatchSize" +"2020-08-31 20:50:43.513 UTC [common.channelconfig] initializeProtosStruct -> DEBU 250 Processing field: BatchTimeout" +"2020-08-31 20:50:43.513 UTC [common.channelconfig] initializeProtosStruct -> DEBU 251 Processing field: KafkaBrokers" +"2020-08-31 20:50:43.513 UTC [common.channelconfig] initializeProtosStruct -> DEBU 252 Processing field: ChannelRestrictions" +"2020-08-31 20:50:43.513 UTC [common.channelconfig] initializeProtosStruct -> DEBU 253 Processing field: Capabilities" +"2020-08-31 20:50:43.513 UTC [common.channelconfig] NewStandardValues -> DEBU 254 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-08-31 20:50:43.513 UTC [common.channelconfig] initializeProtosStruct -> DEBU 255 Processing field: Endpoints" +"2020-08-31 20:50:43.513 UTC [common.channelconfig] NewStandardValues -> DEBU 256 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:43.513 UTC [common.channelconfig] initializeProtosStruct -> DEBU 257 Processing field: MSP" +"2020-08-31 20:50:43.513 UTC [common.channelconfig] validateMSP -> DEBU 258 Setting up MSP for org OrdererOrg" +"2020-08-31 20:50:43.513 UTC [msp] newBccspMsp -> DEBU 259 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:43.513 UTC [msp] New -> DEBU 25a Creating Cache-MSP instance" +"2020-08-31 20:50:43.513 UTC [msp] Setup -> DEBU 25b Setting up MSP instance OrdererMSP" +"2020-08-31 20:50:43.513 UTC [msp.identity] newIdentity -> DEBU 25c Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:50:43.514 UTC [msp] Setup -> DEBU 25d Setting up the MSP manager (3 msps)" +"2020-08-31 20:50:43.514 UTC [msp] Setup -> DEBU 25e MSP manager setup complete, setup 3 msps" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 25f Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 260 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 261 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 262 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 263 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 264 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 265 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 266 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 267 Proposed new policy Admins for Channel/Consortiums" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 268 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 269 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 26a Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 26b Proposed new policy BlockValidation for Channel/Orderer" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 26c Proposed new policy Readers for Channel/Orderer" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 26d Proposed new policy Writers for Channel/Orderer" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 26e Proposed new policy Admins for Channel/Orderer" +"2020-08-31 20:50:43.514 UTC [policies] GetPolicy -> DEBU 26f Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 270 Proposed new policy Readers for Channel" +"2020-08-31 20:50:43.514 UTC [policies] GetPolicy -> DEBU 271 Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 272 Proposed new policy Writers for Channel" +"2020-08-31 20:50:43.514 UTC [policies] NewManagerImpl -> DEBU 273 Proposed new policy Admins for Channel" +"2020-08-31 20:50:43.514 UTC [common.configtx] addToMap -> DEBU 274 Adding to config map: [Group] /Channel" +"2020-08-31 20:50:43.514 UTC [common.configtx] addToMap -> DEBU 275 Adding to config map: [Group] /Channel/Consortiums" +"2020-08-31 20:50:43.514 UTC [common.configtx] addToMap -> DEBU 276 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2020-08-31 20:50:43.514 UTC [common.configtx] addToMap -> DEBU 277 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.514 UTC [common.configtx] addToMap -> DEBU 278 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2020-08-31 20:50:43.514 UTC [common.configtx] addToMap -> DEBU 279 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2020-08-31 20:50:43.514 UTC [common.configtx] addToMap -> DEBU 27a Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 27b Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 27c Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 27d Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 27e Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 27f Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 280 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 281 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 282 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 283 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 284 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 285 Adding to config map: [Group] /Channel/Orderer" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 286 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 287 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 288 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 289 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 28a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 28b Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 28c Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 28d Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 28e Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 28f Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 290 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 291 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 292 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 293 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 294 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 295 Adding to config map: [Value] /Channel/Capabilities" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 296 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 297 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 298 Adding to config map: [Policy] /Channel/Readers" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 299 Adding to config map: [Policy] /Channel/Writers" +"2020-08-31 20:50:43.515 UTC [common.configtx] addToMap -> DEBU 29a Adding to config map: [Policy] /Channel/Admins" +"2020-08-31 20:50:43.516 UTC [fsblkstorage] Next -> DEBU 29b Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-08-31 20:50:43.516 UTC [fsblkstorage] newBlockfileStream -> DEBU 29c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-08-31 20:50:43.516 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 29d Remaining bytes=[22930], Going to peek [8] bytes" +"2020-08-31 20:50:43.516 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 29e Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-08-31 20:50:43.516 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 29f blockbytes [22927] read from file [0]" +"2020-08-31 20:50:43.516 UTC [fsblkstorage] Next -> DEBU 2a0 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-08-31 20:50:43.516 UTC [fsblkstorage] newBlockfileStream -> DEBU 2a1 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-08-31 20:50:43.516 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2a2 Remaining bytes=[22930], Going to peek [8] bytes" +"2020-08-31 20:50:43.516 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2a3 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-08-31 20:50:43.516 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 2a4 blockbytes [22927] read from file [0]" +"2020-08-31 20:50:43.516 UTC [common.channelconfig] NewStandardValues -> DEBU 2a5 Initializing protos for *channelconfig.ChannelProtos" +"2020-08-31 20:50:43.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2a6 Processing field: HashingAlgorithm" +"2020-08-31 20:50:43.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2a7 Processing field: BlockDataHashingStructure" +"2020-08-31 20:50:43.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2a8 Processing field: OrdererAddresses" +"2020-08-31 20:50:43.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2a9 Processing field: Consortium" +"2020-08-31 20:50:43.516 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2aa Processing field: Capabilities" +"2020-08-31 20:50:43.517 UTC [common.channelconfig] NewStandardValues -> DEBU 2ab Initializing protos for *channelconfig.OrdererProtos" +"2020-08-31 20:50:43.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ac Processing field: ConsensusType" +"2020-08-31 20:50:43.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ad Processing field: BatchSize" +"2020-08-31 20:50:43.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2ae Processing field: BatchTimeout" +"2020-08-31 20:50:43.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2af Processing field: KafkaBrokers" +"2020-08-31 20:50:43.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b0 Processing field: ChannelRestrictions" +"2020-08-31 20:50:43.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b1 Processing field: Capabilities" +"2020-08-31 20:50:43.517 UTC [common.channelconfig] NewStandardValues -> DEBU 2b2 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-08-31 20:50:43.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b3 Processing field: Endpoints" +"2020-08-31 20:50:43.517 UTC [common.channelconfig] NewStandardValues -> DEBU 2b4 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:43.517 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2b5 Processing field: MSP" +"2020-08-31 20:50:43.517 UTC [common.channelconfig] validateMSP -> DEBU 2b6 Setting up MSP for org OrdererOrg" +"2020-08-31 20:50:43.517 UTC [msp] newBccspMsp -> DEBU 2b7 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:43.517 UTC [msp] New -> DEBU 2b8 Creating Cache-MSP instance" +"2020-08-31 20:50:43.517 UTC [msp] Setup -> DEBU 2b9 Setting up MSP instance OrdererMSP" +"2020-08-31 20:50:43.518 UTC [msp.identity] newIdentity -> DEBU 2ba Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:50:43.519 UTC [common.channelconfig] NewStandardValues -> DEBU 2bb Initializing protos for *channelconfig.ConsortiumProtos" +"2020-08-31 20:50:43.519 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2bc Processing field: ChannelCreationPolicy" +"2020-08-31 20:50:43.519 UTC [common.channelconfig] NewStandardValues -> DEBU 2bd Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:43.519 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2be Processing field: MSP" +"2020-08-31 20:50:43.519 UTC [common.channelconfig] validateMSP -> DEBU 2bf Setting up MSP for org Org1MSP" +"2020-08-31 20:50:43.519 UTC [msp] newBccspMsp -> DEBU 2c0 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:43.519 UTC [msp] New -> DEBU 2c1 Creating Cache-MSP instance" +"2020-08-31 20:50:43.519 UTC [msp] Setup -> DEBU 2c2 Setting up MSP instance Org1MSP" +"2020-08-31 20:50:43.520 UTC [msp.identity] newIdentity -> DEBU 2c3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-08-31 20:50:43.520 UTC [common.channelconfig] NewStandardValues -> DEBU 2c4 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:43.521 UTC [common.channelconfig] initializeProtosStruct -> DEBU 2c5 Processing field: MSP" +"2020-08-31 20:50:43.521 UTC [common.channelconfig] validateMSP -> DEBU 2c6 Setting up MSP for org Org2MSP" +"2020-08-31 20:50:43.521 UTC [msp] newBccspMsp -> DEBU 2c7 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:43.521 UTC [msp] New -> DEBU 2c8 Creating Cache-MSP instance" +"2020-08-31 20:50:43.521 UTC [msp] Setup -> DEBU 2c9 Setting up MSP instance Org2MSP" +"2020-08-31 20:50:43.521 UTC [msp.identity] newIdentity -> DEBU 2ca Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-08-31 20:50:43.522 UTC [msp] Setup -> DEBU 2cb Setting up the MSP manager (3 msps)" +"2020-08-31 20:50:43.522 UTC [msp] Setup -> DEBU 2cc MSP manager setup complete, setup 3 msps" +"2020-08-31 20:50:43.522 UTC [policies] NewManagerImpl -> DEBU 2cd Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.522 UTC [policies] NewManagerImpl -> DEBU 2ce Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.522 UTC [policies] NewManagerImpl -> DEBU 2cf Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.522 UTC [policies] NewManagerImpl -> DEBU 2d0 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.522 UTC [policies] NewManagerImpl -> DEBU 2d1 Proposed new policy Admins for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.522 UTC [policies] NewManagerImpl -> DEBU 2d2 Proposed new policy Endorsement for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.522 UTC [policies] NewManagerImpl -> DEBU 2d3 Proposed new policy Readers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.522 UTC [policies] NewManagerImpl -> DEBU 2d4 Proposed new policy Writers for Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.522 UTC [policies] NewManagerImpl -> DEBU 2d5 Proposed new policy Admins for Channel/Consortiums" +"2020-08-31 20:50:43.523 UTC [policies] NewManagerImpl -> DEBU 2d6 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.523 UTC [policies] NewManagerImpl -> DEBU 2d7 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.525 UTC [policies] NewManagerImpl -> DEBU 2d8 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.525 UTC [policies] NewManagerImpl -> DEBU 2d9 Proposed new policy BlockValidation for Channel/Orderer" +"2020-08-31 20:50:43.525 UTC [policies] NewManagerImpl -> DEBU 2da Proposed new policy Readers for Channel/Orderer" +"2020-08-31 20:50:43.525 UTC [policies] NewManagerImpl -> DEBU 2db Proposed new policy Writers for Channel/Orderer" +"2020-08-31 20:50:43.525 UTC [policies] NewManagerImpl -> DEBU 2dc Proposed new policy Admins for Channel/Orderer" +"2020-08-31 20:50:43.525 UTC [policies] GetPolicy -> DEBU 2dd Returning dummy reject all policy because Writers could not be found in Channel/Consortiums/Writers" +"2020-08-31 20:50:43.525 UTC [policies] NewManagerImpl -> DEBU 2de Proposed new policy Writers for Channel" +"2020-08-31 20:50:43.525 UTC [policies] NewManagerImpl -> DEBU 2df Proposed new policy Admins for Channel" +"2020-08-31 20:50:43.526 UTC [policies] GetPolicy -> DEBU 2e0 Returning dummy reject all policy because Readers could not be found in Channel/Consortiums/Readers" +"2020-08-31 20:50:43.526 UTC [policies] NewManagerImpl -> DEBU 2e1 Proposed new policy Readers for Channel" +"2020-08-31 20:50:43.526 UTC [common.configtx] addToMap -> DEBU 2e2 Adding to config map: [Group] /Channel" +"2020-08-31 20:50:43.526 UTC [common.configtx] addToMap -> DEBU 2e3 Adding to config map: [Group] /Channel/Orderer" +"2020-08-31 20:50:43.526 UTC [common.configtx] addToMap -> DEBU 2e4 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:43.526 UTC [common.configtx] addToMap -> DEBU 2e5 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-08-31 20:50:43.526 UTC [common.configtx] addToMap -> DEBU 2e6 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-08-31 20:50:43.526 UTC [common.configtx] addToMap -> DEBU 2e7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:50:43.526 UTC [common.configtx] addToMap -> DEBU 2e8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2e9 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2ea Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2eb Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2ec Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2ed Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2ee Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2ef Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2f0 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2f1 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2f2 Adding to config map: [Group] /Channel/Consortiums" +"2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2f3 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium" +"2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2f4 Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org1MSP" +"2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2f5 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org1MSP/MSP" +"2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2f6 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Writers" +"2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2f7 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Admins" +"2020-08-31 20:50:43.527 UTC [common.configtx] addToMap -> DEBU 2f8 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Endorsement" +"2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 2f9 Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org1MSP/Readers" +"2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 2fa Adding to config map: [Group] /Channel/Consortiums/SampleConsortium/Org2MSP" +"2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 2fb Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/Org2MSP/MSP" +"2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 2fc Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Endorsement" +"2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 2fd Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Readers" +"2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 2fe Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Writers" +"2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 2ff Adding to config map: [Policy] /Channel/Consortiums/SampleConsortium/Org2MSP/Admins" +"2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 300 Adding to config map: [Value] /Channel/Consortiums/SampleConsortium/ChannelCreationPolicy" +"2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 301 Adding to config map: [Policy] /Channel/Consortiums/Admins" +"2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 302 Adding to config map: [Value] /Channel/Capabilities" +"2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 303 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 304 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 305 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 306 Adding to config map: [Policy] /Channel/Writers" +"2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 307 Adding to config map: [Policy] /Channel/Admins" +"2020-08-31 20:50:43.528 UTC [common.configtx] addToMap -> DEBU 308 Adding to config map: [Policy] /Channel/Readers" +"2020-08-31 20:50:43.528 UTC [common.channelconfig] LogSanityChecks -> DEBU 309 As expected, current configuration has policy '/Channel/Readers'" +"2020-08-31 20:50:43.528 UTC [common.channelconfig] LogSanityChecks -> DEBU 30a As expected, current configuration has policy '/Channel/Writers'" +"2020-08-31 20:50:43.528 UTC [policies] Manager -> DEBU 30b Manager Channel looking up path [Application]" +"2020-08-31 20:50:43.528 UTC [policies] Manager -> DEBU 30c Manager Channel has managers Consortiums" +"2020-08-31 20:50:43.528 UTC [policies] Manager -> DEBU 30d Manager Channel has managers Orderer" +"2020-08-31 20:50:43.528 UTC [policies] Manager -> DEBU 30e Manager Channel looking up path [Orderer]" +"2020-08-31 20:50:43.528 UTC [policies] Manager -> DEBU 30f Manager Channel has managers Consortiums" +"2020-08-31 20:50:43.528 UTC [policies] Manager -> DEBU 310 Manager Channel has managers Orderer" +"2020-08-31 20:50:43.528 UTC [policies] Manager -> DEBU 311 Manager Channel/Orderer looking up path []" +"2020-08-31 20:50:43.528 UTC [policies] Manager -> DEBU 312 Manager Channel/Orderer has managers OrdererOrg" +"2020-08-31 20:50:43.528 UTC [common.channelconfig] LogSanityChecks -> DEBU 313 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-08-31 20:50:43.528 UTC [common.channelconfig] LogSanityChecks -> DEBU 314 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-08-31 20:50:43.528 UTC [common.channelconfig] LogSanityChecks -> DEBU 315 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-08-31 20:50:43.528 UTC [common.channelconfig] LogSanityChecks -> DEBU 316 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-08-31 20:50:43.528 UTC [common.capabilities] Supported -> DEBU 317 Orderer capability V1_4_2 is supported and is enabled" +"2020-08-31 20:50:43.528 UTC [common.capabilities] Supported -> DEBU 318 Channel capability V1_4_3 is supported and is enabled" +"2020-08-31 20:50:43.528 UTC [orderer.common.server] func1 -> DEBU 319 Executing callback to update root CAs" +"2020-08-31 20:50:43.528 UTC [orderer.common.server] updateTrustedRoots -> DEBU 31a updating root CAs for channel [testchainid]" +"2020-08-31 20:50:43.528 UTC [orderer.common.server] updateTrustedRoots -> DEBU 31b adding orderer root CAs for MSP [OrdererMSP]" +"2020-08-31 20:50:43.528 UTC [orderer.common.server] updateTrustedRoots -> DEBU 31c adding app root CAs for MSP [Org1MSP]" +"2020-08-31 20:50:43.529 UTC [orderer.common.server] updateTrustedRoots -> DEBU 31d adding app root CAs for MSP [Org2MSP]" +"2020-08-31 20:50:43.529 UTC [fsblkstorage] Next -> DEBU 31e Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-08-31 20:50:43.529 UTC [fsblkstorage] newBlockfileStream -> DEBU 31f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-08-31 20:50:43.529 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 320 Remaining bytes=[22930], Going to peek [8] bytes" +"2020-08-31 20:50:43.529 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 321 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-08-31 20:50:43.529 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 322 blockbytes [22927] read from file [0]" +"2020-08-31 20:50:43.529 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 323 [channel: testchainid] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=0)" +"2020-08-31 20:50:43.530 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 324 EvictionSuspicion not set, defaulting to 10m0s" +"2020-08-31 20:50:43.530 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 325 No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/testchainid" channel=testchainid node=1 +"2020-08-31 20:50:43.530 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 326 No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/testchainid'" channel=testchainid node=1 +"2020-08-31 20:50:43.541 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 327 Loading WAL at Term 0 and Index 0" channel=testchainid node=1 +"2020-08-31 20:50:43.542 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 328 Setting HardState to {Term: 0, Commit: 0}" channel=testchainid node=1 +"2020-08-31 20:50:43.542 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 329 Appending 0 entries to memory storage" channel=testchainid node=1 +"2020-08-31 20:50:43.542 UTC [fsblkstorage] Next -> DEBU 32a Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-08-31 20:50:43.542 UTC [fsblkstorage] newBlockfileStream -> DEBU 32b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-08-31 20:50:43.542 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 32c Remaining bytes=[22930], Going to peek [8] bytes" +"2020-08-31 20:50:43.542 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 32d Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-08-31 20:50:43.542 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 32e blockbytes [22927] read from file [0]" +"2020-08-31 20:50:43.542 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 32f [channel: testchainid] Done creating channel support resources" +"2020-08-31 20:50:43.542 UTC [orderer.common.msgprocessor] NewSystemChannel -> DEBU 330 Creating system channel msg processor for channel testchainid" +"2020-08-31 20:50:43.542 UTC [fsblkstorage] Next -> DEBU 331 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-08-31 20:50:43.543 UTC [fsblkstorage] newBlockfileStream -> DEBU 332 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-08-31 20:50:43.543 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 333 Remaining bytes=[22930], Going to peek [8] bytes" +"2020-08-31 20:50:43.543 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 334 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-08-31 20:50:43.543 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 335 blockbytes [22927] read from file [0]" +"2020-08-31 20:50:43.543 UTC [orderer.commmon.multichannel] Initialize -> INFO 336 Starting system channel 'testchainid' with genesis block hash 4855adef6cdb226971cd6f1c81afc3aa9e4d72226e0e6f0fa7c9c664f1042236 and orderer type etcdraft" +"2020-08-31 20:50:43.543 UTC [orderer.consensus.etcdraft] Start -> INFO 337 Starting Raft node" channel=testchainid node=1 +"2020-08-31 20:50:43.543 UTC [orderer.common.cluster] Configure -> INFO 338 Entering, channel: testchainid, nodes: [ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- + ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- +]" +"2020-08-31 20:50:43.543 UTC [orderer.common.cluster] updateStubInMapping -> INFO 339 Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel testchainid" +"2020-08-31 20:50:43.543 UTC [orderer.common.cluster] updateStubInMapping -> INFO 33a Deactivating node 2 in channel testchainid with endpoint of orderer1.example.com:7050 due to TLS certificate change" +"2020-08-31 20:50:43.543 UTC [orderer.common.cluster] func1 -> DEBU 33b Connecting to ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- + for channel testchainid" +"2020-08-31 20:50:43.544 UTC [grpc] DialContext -> DEBU 33c parsed scheme: """ +"2020-08-31 20:50:43.544 UTC [grpc] DialContext -> DEBU 33d scheme "" not registered, fallback to default scheme" +"2020-08-31 20:50:43.545 UTC [orderer.common.cluster] updateStubInMapping -> INFO 33e Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel testchainid" +"2020-08-31 20:50:43.545 UTC [orderer.common.cluster] updateStubInMapping -> INFO 33f Deactivating node 3 in channel testchainid with endpoint of orderer2.example.com:7050 due to TLS certificate change" +"2020-08-31 20:50:43.545 UTC [grpc] watcher -> DEBU 340 ccResolverWrapper: sending new addresses to cc: [{orderer1.example.com:7050 0 }]" +"2020-08-31 20:50:43.545 UTC [grpc] switchBalancer -> DEBU 341 ClientConn switching balancer to "pick_first"" +"2020-08-31 20:50:43.545 UTC [orderer.common.cluster] func1 -> DEBU 342 Connecting to ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- + for channel testchainid" +"2020-08-31 20:50:43.545 UTC [grpc] HandleSubConnStateChange -> DEBU 343 pickfirstBalancer: HandleSubConnStateChange: 0xc0003842a0, CONNECTING" +"2020-08-31 20:50:43.545 UTC [grpc] DialContext -> DEBU 344 parsed scheme: """ +"2020-08-31 20:50:43.545 UTC [grpc] DialContext -> DEBU 345 scheme "" not registered, fallback to default scheme" +"2020-08-31 20:50:43.547 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 347 2 exists in both old and new membership for channel testchainid , skipping its deactivation" +"2020-08-31 20:50:43.547 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 348 3 exists in both old and new membership for channel testchainid , skipping its deactivation" +"2020-08-31 20:50:43.547 UTC [grpc] watcher -> DEBU 346 ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }]" +"2020-08-31 20:50:43.547 UTC [orderer.common.cluster] Configure -> INFO 349 Exiting" +"2020-08-31 20:50:43.547 UTC [orderer.consensus.etcdraft] start -> DEBU 34a Starting raft node: #peers: 3" channel=testchainid node=1 +"2020-08-31 20:50:43.547 UTC [grpc] switchBalancer -> DEBU 34b ClientConn switching balancer to "pick_first"" +"2020-08-31 20:50:43.547 UTC [orderer.consensus.etcdraft] start -> INFO 34c Starting raft node as part of a new channel" channel=testchainid node=1 +"2020-08-31 20:50:43.547 UTC [grpc] HandleSubConnStateChange -> DEBU 34d pickfirstBalancer: HandleSubConnStateChange: 0xc000384db0, CONNECTING" +"2020-08-31 20:50:43.547 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 34e 1 became follower at term 0" channel=testchainid node=1 +"2020-08-31 20:50:43.547 UTC [orderer.consensus.etcdraft] newRaft -> INFO 34f newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=testchainid node=1 +"2020-08-31 20:50:43.548 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 350 1 became follower at term 1" channel=testchainid node=1 +"2020-08-31 20:50:43.548 UTC [orderer.common.server] Start -> INFO 351 Starting orderer: + Version: 1.4.8 + Commit SHA: development build + Go version: go1.13.15 + OS/Arch: linux/amd64" +"2020-08-31 20:50:43.548 UTC [orderer.common.server] Start -> INFO 352 Starting cluster listener on [::]:7055" +"2020-08-31 20:50:43.548 UTC [orderer.common.server] Start -> INFO 353 Beginning to serve requests" +"2020-08-31 20:50:43.551 UTC [orderer.consensus.etcdraft] apply -> INFO 354 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2020-08-31 20:50:43.551 UTC [orderer.consensus.etcdraft] apply -> INFO 355 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2020-08-31 20:50:43.551 UTC [orderer.consensus.etcdraft] apply -> INFO 356 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=testchainid node=1 +"2020-08-31 20:50:43.559 UTC [grpc] HandleSubConnStateChange -> DEBU 357 pickfirstBalancer: HandleSubConnStateChange: 0xc0003842a0, READY" +"2020-08-31 20:50:43.565 UTC [grpc] HandleSubConnStateChange -> DEBU 358 pickfirstBalancer: HandleSubConnStateChange: 0xc000384db0, READY" +"2020-08-31 20:50:44.429 UTC [orderer.common.cluster] Step -> DEBU 359 Connection from orderer2.example.com(172.18.0.2:58986)" +"2020-08-31 20:50:44.430 UTC [orderer.common.cluster.step] handleMessage -> DEBU 35a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 36" +"2020-08-31 20:50:44.430 UTC [orderer.consensus.etcdraft] Step -> INFO 35b 1 [term: 1] received a MsgApp message with higher term from 3 [term: 2]" channel=testchainid node=1 +"2020-08-31 20:50:44.430 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 35c 1 became follower at term 2" channel=testchainid node=1 +"2020-08-31 20:50:44.430 UTC [orderer.consensus.etcdraft] run -> INFO 35d raft.node: 1 elected leader 3 at term 2" channel=testchainid node=1 +"2020-08-31 20:50:44.437 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 35e Raft leader changed: 0 -> 3" channel=testchainid node=1 +"2020-08-31 20:50:44.437 UTC [orderer.common.cluster] NewStream -> DEBU 35f Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +"2020-08-31 20:50:44.438 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 360 Sending msg of 28 bytes to 3 on channel testchainid took 243µs" +"2020-08-31 20:50:44.439 UTC [orderer.common.cluster.step] handleMessage -> DEBU 361 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:44.439 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 362 Sending msg of 28 bytes to 3 on channel testchainid took 69.1µs" +"2020-08-31 20:50:44.438 UTC [orderer.common.cluster.step] sendMessage -> DEBU 363 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 304.2µs " +"2020-08-31 20:50:44.442 UTC [orderer.common.cluster.step] sendMessage -> DEBU 364 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.5473ms " +"2020-08-31 20:50:44.910 UTC [orderer.common.cluster.step] handleMessage -> DEBU 365 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:44.911 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 366 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +"2020-08-31 20:50:44.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU 367 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 220.8µs " +"2020-08-31 20:50:45.413 UTC [orderer.common.cluster.step] handleMessage -> DEBU 368 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:45.413 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 369 Sending msg of 28 bytes to 3 on channel testchainid took 15.9µs" +"2020-08-31 20:50:45.413 UTC [orderer.common.cluster.step] sendMessage -> DEBU 36a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.1µs " +"2020-08-31 20:50:45.909 UTC [orderer.common.cluster.step] handleMessage -> DEBU 36b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:45.909 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 36c Sending msg of 28 bytes to 3 on channel testchainid took 17µs" +"2020-08-31 20:50:45.909 UTC [orderer.common.cluster.step] sendMessage -> DEBU 36d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.2µs " +"2020-08-31 20:50:46.408 UTC [orderer.common.cluster.step] handleMessage -> DEBU 36e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:46.408 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 36f Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +"2020-08-31 20:50:46.409 UTC [orderer.common.cluster.step] sendMessage -> DEBU 370 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.9µs " +"2020-08-31 20:50:46.908 UTC [orderer.common.cluster.step] handleMessage -> DEBU 371 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:46.908 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 372 Sending msg of 28 bytes to 3 on channel testchainid took 21.3µs" +"2020-08-31 20:50:46.908 UTC [orderer.common.cluster.step] sendMessage -> DEBU 373 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.6µs " +"2020-08-31 20:50:47.408 UTC [orderer.common.cluster.step] handleMessage -> DEBU 374 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:47.409 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 375 Sending msg of 28 bytes to 3 on channel testchainid took 24.2µs" +"2020-08-31 20:50:47.409 UTC [orderer.common.cluster.step] sendMessage -> DEBU 376 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.2µs " +"2020-08-31 20:50:47.910 UTC [orderer.common.cluster.step] handleMessage -> DEBU 377 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:47.911 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 378 Sending msg of 28 bytes to 3 on channel testchainid took 21.1µs" +"2020-08-31 20:50:47.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU 379 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 158.8µs " +"2020-08-31 20:50:48.409 UTC [orderer.common.cluster.step] handleMessage -> DEBU 37a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:48.409 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 37b Sending msg of 28 bytes to 3 on channel testchainid took 20.3µs" +"2020-08-31 20:50:48.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 37c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 423.7µs " +"2020-08-31 20:50:48.909 UTC [orderer.common.cluster.step] handleMessage -> DEBU 37d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:48.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 37e Sending msg of 28 bytes to 3 on channel testchainid took 189.4µs" +"2020-08-31 20:50:48.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU 37f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.8µs " +"2020-08-31 20:50:49.409 UTC [orderer.common.cluster.step] handleMessage -> DEBU 380 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:49.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 381 Sending msg of 28 bytes to 3 on channel testchainid took 23.8µs" +"2020-08-31 20:50:49.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 382 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.6µs " +"2020-08-31 20:50:49.909 UTC [orderer.common.cluster.step] handleMessage -> DEBU 383 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:49.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 384 Sending msg of 28 bytes to 3 on channel testchainid took 29.2µs" +"2020-08-31 20:50:49.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU 385 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193.2µs " +"2020-08-31 20:50:50.409 UTC [orderer.common.cluster.step] handleMessage -> DEBU 386 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:50.409 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 387 Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" +"2020-08-31 20:50:50.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 388 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 188.2µs " +"2020-08-31 20:50:50.910 UTC [orderer.common.cluster.step] handleMessage -> DEBU 389 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:50.911 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 38a Sending msg of 28 bytes to 3 on channel testchainid took 177.6µs" +"2020-08-31 20:50:50.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU 38b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 709.7µs " +"2020-08-31 20:50:51.410 UTC [orderer.common.cluster.step] handleMessage -> DEBU 38c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:51.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 38d Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" +"2020-08-31 20:50:51.412 UTC [orderer.common.cluster.step] sendMessage -> DEBU 38e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 268.4µs " +"2020-08-31 20:50:51.909 UTC [orderer.common.cluster.step] handleMessage -> DEBU 38f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:51.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 390 Sending msg of 28 bytes to 3 on channel testchainid took 32.6µs" +"2020-08-31 20:50:51.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU 391 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 501.6µs " +"2020-08-31 20:50:52.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU 392 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:52.413 UTC [orderer.common.cluster.step] sendMessage -> DEBU 394 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.7µs " +"2020-08-31 20:50:52.413 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 393 Sending msg of 28 bytes to 3 on channel testchainid took 25.2µs" +"2020-08-31 20:50:52.910 UTC [orderer.common.cluster.step] handleMessage -> DEBU 395 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:52.910 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 396 Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +"2020-08-31 20:50:52.911 UTC [orderer.common.cluster.step] sendMessage -> DEBU 397 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 269µs " +"2020-08-31 20:50:53.409 UTC [orderer.common.cluster.step] handleMessage -> DEBU 398 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:53.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 399 Sending msg of 28 bytes to 3 on channel testchainid took 30.5µs" +"2020-08-31 20:50:53.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 39a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113µs " +"2020-08-31 20:50:53.517 UTC [orderer.common.server] replicateDisabledChains -> DEBU 39b No inactive chains to try to replicate" +"2020-08-31 20:50:53.909 UTC [orderer.common.cluster.step] handleMessage -> DEBU 39c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:53.909 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 39d Sending msg of 28 bytes to 3 on channel testchainid took 28.2µs" +"2020-08-31 20:50:53.909 UTC [orderer.common.cluster.step] sendMessage -> DEBU 39e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 98.9µs " +"2020-08-31 20:50:54.409 UTC [orderer.common.cluster.step] handleMessage -> DEBU 39f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:54.409 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a0 Sending msg of 28 bytes to 3 on channel testchainid took 29.4µs" +"2020-08-31 20:50:54.409 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3a1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 218.8µs " +"2020-08-31 20:50:54.915 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3a2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:54.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a3 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +"2020-08-31 20:50:54.915 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3a4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 68.9µs " +"2020-08-31 20:50:55.409 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3a5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:55.409 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a6 Sending msg of 28 bytes to 3 on channel testchainid took 21.7µs" +"2020-08-31 20:50:55.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3a7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.6µs " +"2020-08-31 20:50:55.908 UTC [orderer.common.cluster.step] handleMessage -> DEBU 3a8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:55.909 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 3a9 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2020-08-31 20:50:55.910 UTC [orderer.common.cluster.step] sendMessage -> DEBU 3aa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 638.7µs " +"2020-08-31 20:50:55.938 UTC [orderer.common.server] Deliver -> DEBU 3ab Starting new Deliver handler" +"2020-08-31 20:50:55.938 UTC [common.deliver] Handle -> DEBU 3ac Starting new deliver loop for 172.18.0.9:50712" +"2020-08-31 20:50:55.938 UTC [common.deliver] Handle -> DEBU 3ad Attempting to read seek info message from 172.18.0.9:50712" +"2020-08-31 20:50:55.967 UTC [orderer.common.server] Broadcast -> DEBU 3ae Starting new Broadcast handler" +"2020-08-31 20:50:55.968 UTC [orderer.common.broadcast] Handle -> DEBU 3af Starting new broadcast loop for 172.18.0.9:50714" +"2020-08-31 20:50:55.969 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 3b0 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:50714" +"2020-08-31 20:50:55.969 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 3b1 Processing config update tx with system channel message processor for channel ID businesschannel" +"2020-08-31 20:50:55.970 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 3b2 Processing channel create tx for channel businesschannel on system channel testchainid" +"2020-08-31 20:50:55.971 UTC [common.channelconfig] NewStandardValues -> DEBU 3b3 Initializing protos for *channelconfig.ChannelProtos" +"2020-08-31 20:50:55.971 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b4 Processing field: HashingAlgorithm" +"2020-08-31 20:50:55.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b5 Processing field: BlockDataHashingStructure" +"2020-08-31 20:50:55.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b6 Processing field: OrdererAddresses" +"2020-08-31 20:50:55.972 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b7 Processing field: Consortium" +"2020-08-31 20:50:55.973 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3b8 Processing field: Capabilities" +"2020-08-31 20:50:55.973 UTC [common.channelconfig] NewStandardValues -> DEBU 3b9 Initializing protos for *channelconfig.OrdererProtos" +"2020-08-31 20:50:55.974 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3ba Processing field: ConsensusType" +"2020-08-31 20:50:55.974 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bb Processing field: BatchSize" +"2020-08-31 20:50:55.974 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bc Processing field: BatchTimeout" +"2020-08-31 20:50:55.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bd Processing field: KafkaBrokers" +"2020-08-31 20:50:55.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3be Processing field: ChannelRestrictions" +"2020-08-31 20:50:55.975 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3bf Processing field: Capabilities" +"2020-08-31 20:50:55.976 UTC [common.channelconfig] NewStandardValues -> DEBU 3c0 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-08-31 20:50:55.976 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c1 Processing field: Endpoints" +"2020-08-31 20:50:55.976 UTC [common.channelconfig] NewStandardValues -> DEBU 3c2 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:55.977 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3c3 Processing field: MSP" +"2020-08-31 20:50:55.977 UTC [common.channelconfig] validateMSP -> DEBU 3c4 Setting up MSP for org OrdererOrg" +"2020-08-31 20:50:55.978 UTC [msp] newBccspMsp -> DEBU 3c5 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:55.978 UTC [msp] New -> DEBU 3c6 Creating Cache-MSP instance" +"2020-08-31 20:50:55.979 UTC [msp] Setup -> DEBU 3c7 Setting up MSP instance OrdererMSP" +"2020-08-31 20:50:55.980 UTC [msp.identity] newIdentity -> DEBU 3c8 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:50:55.981 UTC [common.channelconfig] NewStandardValues -> DEBU 3c9 Initializing protos for *channelconfig.ApplicationProtos" +"2020-08-31 20:50:55.981 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3ca Processing field: ACLs" +"2020-08-31 20:50:55.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3cb Processing field: Capabilities" +"2020-08-31 20:50:55.982 UTC [common.channelconfig] NewStandardValues -> DEBU 3cc Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:50:55.982 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3cd Processing field: AnchorPeers" +"2020-08-31 20:50:55.983 UTC [common.channelconfig] NewStandardValues -> DEBU 3ce Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:55.983 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3cf Processing field: MSP" +"2020-08-31 20:50:55.984 UTC [common.channelconfig] Validate -> DEBU 3d0 Anchor peers for org Org1MSP are " +"2020-08-31 20:50:55.984 UTC [common.channelconfig] validateMSP -> DEBU 3d1 Setting up MSP for org Org1MSP" +"2020-08-31 20:50:55.985 UTC [msp] newBccspMsp -> DEBU 3d2 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:55.985 UTC [msp] New -> DEBU 3d3 Creating Cache-MSP instance" +"2020-08-31 20:50:55.985 UTC [msp] Setup -> DEBU 3d4 Setting up MSP instance Org1MSP" +"2020-08-31 20:50:55.986 UTC [msp.identity] newIdentity -> DEBU 3d5 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-08-31 20:50:55.987 UTC [common.channelconfig] NewStandardValues -> DEBU 3d6 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:50:55.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d7 Processing field: AnchorPeers" +"2020-08-31 20:50:55.987 UTC [common.channelconfig] NewStandardValues -> DEBU 3d8 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:55.987 UTC [common.channelconfig] initializeProtosStruct -> DEBU 3d9 Processing field: MSP" +"2020-08-31 20:50:55.988 UTC [common.channelconfig] Validate -> DEBU 3da Anchor peers for org Org2MSP are " +"2020-08-31 20:50:55.988 UTC [common.channelconfig] validateMSP -> DEBU 3db Setting up MSP for org Org2MSP" +"2020-08-31 20:50:55.988 UTC [msp] newBccspMsp -> DEBU 3dc Creating BCCSP-based MSP instance" +"2020-08-31 20:50:55.988 UTC [msp] New -> DEBU 3dd Creating Cache-MSP instance" +"2020-08-31 20:50:55.989 UTC [msp] Setup -> DEBU 3de Setting up MSP instance Org2MSP" +"2020-08-31 20:50:55.989 UTC [msp.identity] newIdentity -> DEBU 3df Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-08-31 20:50:55.990 UTC [msp] Setup -> DEBU 3e0 Setting up the MSP manager (3 msps)" +"2020-08-31 20:50:55.990 UTC [msp] Setup -> DEBU 3e1 MSP manager setup complete, setup 3 msps" +"2020-08-31 20:50:55.990 UTC [policies] NewManagerImpl -> DEBU 3e2 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:55.991 UTC [policies] NewManagerImpl -> DEBU 3e3 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:55.991 UTC [policies] NewManagerImpl -> DEBU 3e4 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:55.991 UTC [policies] NewManagerImpl -> DEBU 3e5 Proposed new policy BlockValidation for Channel/Orderer" +"2020-08-31 20:50:55.991 UTC [policies] NewManagerImpl -> DEBU 3e6 Proposed new policy Readers for Channel/Orderer" +"2020-08-31 20:50:55.991 UTC [policies] NewManagerImpl -> DEBU 3e7 Proposed new policy Writers for Channel/Orderer" +"2020-08-31 20:50:55.992 UTC [policies] NewManagerImpl -> DEBU 3e8 Proposed new policy Admins for Channel/Orderer" +"2020-08-31 20:50:55.992 UTC [policies] NewManagerImpl -> DEBU 3e9 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-08-31 20:50:55.992 UTC [policies] NewManagerImpl -> DEBU 3ea Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-08-31 20:50:55.993 UTC [policies] NewManagerImpl -> DEBU 3eb Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-08-31 20:50:55.993 UTC [policies] NewManagerImpl -> DEBU 3ec Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-08-31 20:50:55.994 UTC [policies] NewManagerImpl -> DEBU 3ed Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-08-31 20:50:55.994 UTC [policies] NewManagerImpl -> DEBU 3ee Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-08-31 20:50:55.995 UTC [policies] NewManagerImpl -> DEBU 3ef Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2020-08-31 20:50:55.996 UTC [policies] NewManagerImpl -> DEBU 3f0 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-08-31 20:50:55.997 UTC [policies] NewManagerImpl -> DEBU 3f1 Proposed new policy ChannelCreationPolicy for Channel/Application" +"2020-08-31 20:50:55.997 UTC [policies] GetPolicy -> DEBU 3f2 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +"2020-08-31 20:50:55.997 UTC [policies] NewManagerImpl -> DEBU 3f3 Proposed new policy Writers for Channel" +"2020-08-31 20:50:55.998 UTC [policies] GetPolicy -> DEBU 3f4 Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +"2020-08-31 20:50:55.998 UTC [policies] NewManagerImpl -> DEBU 3f5 Proposed new policy Admins for Channel" +"2020-08-31 20:50:55.998 UTC [policies] GetPolicy -> DEBU 3f6 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +"2020-08-31 20:50:55.998 UTC [policies] NewManagerImpl -> DEBU 3f7 Proposed new policy Readers for Channel" +"2020-08-31 20:50:55.999 UTC [common.configtx] addToMap -> DEBU 3f8 Adding to config map: [Group] /Channel" +"2020-08-31 20:50:55.999 UTC [common.configtx] addToMap -> DEBU 3f9 Adding to config map: [Group] /Channel/Orderer" +"2020-08-31 20:50:55.999 UTC [common.configtx] addToMap -> DEBU 3fa Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:56.000 UTC [common.configtx] addToMap -> DEBU 3fb Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-08-31 20:50:56.000 UTC [common.configtx] addToMap -> DEBU 3fc Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:50:56.000 UTC [common.configtx] addToMap -> DEBU 3fd Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:50:56.000 UTC [common.configtx] addToMap -> DEBU 3fe Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-08-31 20:50:56.001 UTC [common.configtx] addToMap -> DEBU 3ff Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-08-31 20:50:56.001 UTC [common.configtx] addToMap -> DEBU 400 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-08-31 20:50:56.001 UTC [common.configtx] addToMap -> DEBU 401 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-08-31 20:50:56.002 UTC [common.configtx] addToMap -> DEBU 402 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-08-31 20:50:56.002 UTC [common.configtx] addToMap -> DEBU 403 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-08-31 20:50:56.002 UTC [common.configtx] addToMap -> DEBU 404 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-08-31 20:50:56.003 UTC [common.configtx] addToMap -> DEBU 405 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-08-31 20:50:56.003 UTC [common.configtx] addToMap -> DEBU 406 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-08-31 20:50:56.003 UTC [common.configtx] addToMap -> DEBU 407 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-08-31 20:50:56.003 UTC [common.configtx] addToMap -> DEBU 408 Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:50:56.004 UTC [common.configtx] addToMap -> DEBU 409 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:50:56.004 UTC [common.configtx] addToMap -> DEBU 40a Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-08-31 20:50:56.005 UTC [common.configtx] addToMap -> DEBU 40b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:50:56.005 UTC [common.configtx] addToMap -> DEBU 40c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:50:56.005 UTC [common.configtx] addToMap -> DEBU 40d Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:50:56.005 UTC [common.configtx] addToMap -> DEBU 40e Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:50:56.005 UTC [common.configtx] addToMap -> DEBU 40f Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:50:56.005 UTC [common.configtx] addToMap -> DEBU 410 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-08-31 20:50:56.006 UTC [common.configtx] addToMap -> DEBU 411 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:50:56.006 UTC [common.configtx] addToMap -> DEBU 412 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:50:56.006 UTC [common.configtx] addToMap -> DEBU 413 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:50:56.006 UTC [common.configtx] addToMap -> DEBU 414 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:50:56.007 UTC [common.configtx] addToMap -> DEBU 415 Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +"2020-08-31 20:50:56.007 UTC [common.configtx] addToMap -> DEBU 416 Adding to config map: [Value] /Channel/Capabilities" +"2020-08-31 20:50:56.007 UTC [common.configtx] addToMap -> DEBU 417 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-08-31 20:50:56.007 UTC [common.configtx] addToMap -> DEBU 418 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-08-31 20:50:56.007 UTC [common.configtx] addToMap -> DEBU 419 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-08-31 20:50:56.008 UTC [common.configtx] addToMap -> DEBU 41a Adding to config map: [Value] /Channel/Consortium" +"2020-08-31 20:50:56.008 UTC [common.configtx] addToMap -> DEBU 41b Adding to config map: [Policy] /Channel/Writers" +"2020-08-31 20:50:56.008 UTC [common.configtx] addToMap -> DEBU 41c Adding to config map: [Policy] /Channel/Admins" +"2020-08-31 20:50:56.008 UTC [common.configtx] addToMap -> DEBU 41d Adding to config map: [Policy] /Channel/Readers" +"2020-08-31 20:50:56.008 UTC [common.configtx] addToMap -> DEBU 41e Adding to config map: [Group] /Channel" +"2020-08-31 20:50:56.009 UTC [common.configtx] addToMap -> DEBU 41f Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:50:56.009 UTC [common.configtx] addToMap -> DEBU 420 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:50:56.009 UTC [common.configtx] addToMap -> DEBU 421 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:50:56.009 UTC [common.configtx] addToMap -> DEBU 422 Adding to config map: [Value] /Channel/Consortium" +"2020-08-31 20:50:56.010 UTC [common.configtx] addToMap -> DEBU 423 Adding to config map: [Group] /Channel" +"2020-08-31 20:50:56.010 UTC [common.configtx] addToMap -> DEBU 424 Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:50:56.010 UTC [common.configtx] addToMap -> DEBU 425 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:50:56.010 UTC [common.configtx] addToMap -> DEBU 426 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:50:56.011 UTC [common.configtx] addToMap -> DEBU 427 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-08-31 20:50:56.011 UTC [common.configtx] addToMap -> DEBU 428 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:50:56.011 UTC [common.configtx] addToMap -> DEBU 429 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-08-31 20:50:56.011 UTC [common.configtx] addToMap -> DEBU 42a Adding to config map: [Policy] /Channel/Application/Admins" +"2020-08-31 20:50:56.012 UTC [common.configtx] addToMap -> DEBU 42b Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:50:56.012 UTC [common.configtx] addToMap -> DEBU 42c Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:50:56.012 UTC [common.configtx] addToMap -> DEBU 42d Adding to config map: [Policy] /Channel/Application/Readers" +"2020-08-31 20:50:56.013 UTC [common.configtx] addToMap -> DEBU 42e Adding to config map: [Value] /Channel/Consortium" +"2020-08-31 20:50:56.013 UTC [common.configtx] verifyDeltaSet -> DEBU 42f Processing change to key: [Policy] /Channel/Application/Admins" +"2020-08-31 20:50:56.013 UTC [common.configtx] verifyDeltaSet -> DEBU 430 Processing change to key: [Value] /Channel/Application/ACLs" +"2020-08-31 20:50:56.014 UTC [common.configtx] verifyDeltaSet -> DEBU 431 Processing change to key: [Policy] /Channel/Application/Writers" +"2020-08-31 20:50:56.014 UTC [common.configtx] verifyDeltaSet -> DEBU 432 Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:50:56.014 UTC [common.configtx] verifyDeltaSet -> DEBU 433 Processing change to key: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:50:56.014 UTC [common.configtx] verifyDeltaSet -> DEBU 434 Processing change to key: [Policy] /Channel/Application/Readers" +"2020-08-31 20:50:56.015 UTC [common.configtx] verifyDeltaSet -> DEBU 435 Processing change to key: [Group] /Channel/Application" +"2020-08-31 20:50:56.016 UTC [common.configtx] policyForItem -> DEBU 436 Getting policy for item Application with mod_policy ChannelCreationPolicy" +"2020-08-31 20:50:56.016 UTC [policies] Manager -> DEBU 437 Manager Channel looking up path []" +"2020-08-31 20:50:56.016 UTC [policies] Manager -> DEBU 438 Manager Channel has managers Application" +"2020-08-31 20:50:56.017 UTC [policies] Manager -> DEBU 439 Manager Channel has managers Orderer" +"2020-08-31 20:50:56.017 UTC [policies] Manager -> DEBU 43a Manager Channel looking up path [Application]" +"2020-08-31 20:50:56.017 UTC [policies] Manager -> DEBU 43b Manager Channel has managers Orderer" +"2020-08-31 20:50:56.017 UTC [policies] Manager -> DEBU 43c Manager Channel has managers Application" +"2020-08-31 20:50:56.017 UTC [policies] Manager -> DEBU 43d Manager Channel/Application looking up path []" +"2020-08-31 20:50:56.018 UTC [policies] Manager -> DEBU 43e Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:50:56.018 UTC [policies] Manager -> DEBU 43f Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:50:56.018 UTC [policies] Evaluate -> DEBU 440 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +"2020-08-31 20:50:56.018 UTC [policies] Evaluate -> DEBU 441 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:50:56.018 UTC [policies] Evaluate -> DEBU 442 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2020-08-31 20:50:56.018 UTC [msp] DeserializeIdentity -> DEBU 443 Obtaining identity" +"2020-08-31 20:50:56.019 UTC [msp.identity] newIdentity -> DEBU 444 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE-----" +"2020-08-31 20:50:56.019 UTC [cauthdsl] func1 -> DEBU 445 0xc0009e8a00 gate 1598907056019312600 evaluation starts" +"2020-08-31 20:50:56.019 UTC [cauthdsl] func2 -> DEBU 446 0xc0009e8a00 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:50:56.019 UTC [cauthdsl] func2 -> DEBU 447 0xc0009e8a00 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:50:56.019 UTC [cauthdsl] func2 -> DEBU 448 0xc0009e8a00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2020-08-31 20:50:56.019 UTC [cauthdsl] func2 -> DEBU 449 0xc0009e8a00 principal evaluation fails" +"2020-08-31 20:50:56.019 UTC [cauthdsl] func1 -> DEBU 44a 0xc0009e8a00 gate 1598907056019312600 evaluation fails" +"2020-08-31 20:50:56.019 UTC [policies] Evaluate -> DEBU 44b Signature set did not satisfy policy /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:50:56.019 UTC [policies] Evaluate -> DEBU 44c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:50:56.019 UTC [policies] Evaluate -> DEBU 44d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2020-08-31 20:50:56.019 UTC [cauthdsl] func1 -> DEBU 44e 0xc0009e9bc0 gate 1598907056019627400 evaluation starts" +"2020-08-31 20:50:56.019 UTC [cauthdsl] func2 -> DEBU 44f 0xc0009e9bc0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:50:56.019 UTC [cauthdsl] func2 -> DEBU 450 0xc0009e9bc0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:50:56.019 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 451 Checking if identity has been named explicitly as an admin for Org1MSP" +"2020-08-31 20:50:56.019 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 452 Checking if identity carries the admin ou for Org1MSP" +"2020-08-31 20:50:56.020 UTC [msp] Validate -> DEBU 453 MSP Org1MSP validating identity" +"2020-08-31 20:50:56.021 UTC [msp] getCertificationChain -> DEBU 454 MSP Org1MSP getting certification chain" +"2020-08-31 20:50:56.022 UTC [msp] hasOURole -> DEBU 455 MSP Org1MSP checking if the identity is a client" +"2020-08-31 20:50:56.022 UTC [msp] getCertificationChain -> DEBU 456 MSP Org1MSP getting certification chain" +"2020-08-31 20:50:56.022 UTC [cauthdsl] func2 -> DEBU 457 0xc0009e9bc0 principal matched by identity 0" +"2020-08-31 20:50:56.022 UTC [msp.identity] Verify -> DEBU 458 Verify: digest = 00000000 7b aa e0 b7 8c 39 88 52 d3 c7 42 36 0c c0 87 77 |{....9.R..B6...w| +00000010 ee 05 17 15 bb 6e d1 44 66 85 79 9d 67 86 ef e3 |.....n.Df.y.g...|" +"2020-08-31 20:50:56.023 UTC [msp.identity] Verify -> DEBU 459 Verify: sig = 00000000 30 45 02 21 00 a2 72 8c e7 15 80 e5 4c e7 66 4a |0E.!..r.....L.fJ| +00000010 9a 9a c3 fd 15 cd 7e 00 02 e9 75 1d 42 fa 91 17 |......~...u.B...| +00000020 49 33 d6 c0 6b 02 20 5e 5b d2 a8 61 f8 27 b2 72 |I3..k. ^[..a.'.r| +00000030 2e 0d 62 b7 ba ef c0 c0 87 90 8a b9 20 a6 de f5 |..b......... ...| +00000040 b1 31 27 56 61 a9 0c |.1'Va..|" +"2020-08-31 20:50:56.023 UTC [cauthdsl] func2 -> DEBU 45a 0xc0009e9bc0 principal evaluation succeeds for identity 0" +"2020-08-31 20:50:56.024 UTC [cauthdsl] func1 -> DEBU 45b 0xc0009e9bc0 gate 1598907056019627400 evaluation succeeds" +"2020-08-31 20:50:56.024 UTC [policies] Evaluate -> DEBU 45c Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:50:56.024 UTC [policies] Evaluate -> DEBU 45d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:50:56.025 UTC [policies] Evaluate -> DEBU 45e Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +"2020-08-31 20:50:56.025 UTC [policies] Evaluate -> DEBU 45f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +"2020-08-31 20:50:56.025 UTC [common.configtx] verifyDeltaSet -> DEBU 460 Processing change to key: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:50:56.026 UTC [common.configtx] recurseConfigMap -> DEBU 461 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.026 UTC [common.configtx] recurseConfigMap -> DEBU 462 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.026 UTC [common.configtx] recurseConfigMap -> DEBU 463 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.027 UTC [common.configtx] recurseConfigMap -> DEBU 464 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.027 UTC [common.configtx] recurseConfigMap -> DEBU 465 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.027 UTC [common.configtx] recurseConfigMap -> DEBU 466 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.028 UTC [common.configtx] recurseConfigMap -> DEBU 467 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.028 UTC [common.configtx] recurseConfigMap -> DEBU 468 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.028 UTC [common.configtx] recurseConfigMap -> DEBU 469 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.028 UTC [common.configtx] recurseConfigMap -> DEBU 46a Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 46b Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 46c Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 46d Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 46e Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 46f Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 470 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 471 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 472 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 473 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 474 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 475 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 476 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.029 UTC [common.configtx] recurseConfigMap -> DEBU 477 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.029 UTC [msp] GetDefaultSigningIdentity -> DEBU 478 Obtaining default signing identity" +"2020-08-31 20:50:56.029 UTC [msp] GetDefaultSigningIdentity -> DEBU 479 Obtaining default signing identity" +"2020-08-31 20:50:56.030 UTC [msp.identity] Sign -> DEBU 47a Sign: plaintext: 0AEA060A1B08011A0608B0C5B5FA0522...0E56BB6710C9F273C601DF91CB8DAD86 " +"2020-08-31 20:50:56.030 UTC [msp.identity] Sign -> DEBU 47b Sign: digest: F84A3513D527AC2AB3DEEA6B9EEFE6320527C75111F6C9EF8BE7F1132AE98C1B " +"2020-08-31 20:50:56.030 UTC [msp] GetDefaultSigningIdentity -> DEBU 47c Obtaining default signing identity" +"2020-08-31 20:50:56.030 UTC [msp] GetDefaultSigningIdentity -> DEBU 47d Obtaining default signing identity" +"2020-08-31 20:50:56.030 UTC [msp.identity] Sign -> DEBU 47e Sign: plaintext: 0AE6060A1708041A0608B0C5B5FA0522...92E1047AA70A4A8656123FAD6A098BED " +"2020-08-31 20:50:56.030 UTC [msp.identity] Sign -> DEBU 47f Sign: digest: A9043439659B475E463C9D4545675D8185BC42AAA1D96F3F4CFE7A6F725B412A " +"2020-08-31 20:50:56.030 UTC [policies] Evaluate -> DEBU 480 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-08-31 20:50:56.030 UTC [policies] Evaluate -> DEBU 481 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:50:56.030 UTC [policies] Evaluate -> DEBU 482 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-08-31 20:50:56.030 UTC [policies] Evaluate -> DEBU 483 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:50:56.030 UTC [policies] Evaluate -> DEBU 484 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-08-31 20:50:56.030 UTC [msp] DeserializeIdentity -> DEBU 485 Obtaining identity" +"2020-08-31 20:50:56.030 UTC [msp.identity] newIdentity -> DEBU 486 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE-----" +"2020-08-31 20:50:56.030 UTC [cauthdsl] func1 -> DEBU 487 0xc000cd0c00 gate 1598907056030976200 evaluation starts" +"2020-08-31 20:50:56.031 UTC [cauthdsl] func2 -> DEBU 488 0xc000cd0c00 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:50:56.031 UTC [cauthdsl] func2 -> DEBU 489 0xc000cd0c00 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:50:56.031 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 48a Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-08-31 20:50:56.031 UTC [msp] Validate -> DEBU 48b MSP OrdererMSP validating identity" +"2020-08-31 20:50:56.031 UTC [msp] getCertificationChain -> DEBU 48c MSP OrdererMSP getting certification chain" +"2020-08-31 20:50:56.031 UTC [cauthdsl] func2 -> DEBU 48d 0xc000cd0c00 principal matched by identity 0" +"2020-08-31 20:50:56.031 UTC [msp.identity] Verify -> DEBU 48e Verify: digest = 00000000 a9 04 34 39 65 9b 47 5e 46 3c 9d 45 45 67 5d 81 |..49e.G^F<.EEg].| +00000010 85 bc 42 aa a1 d9 6f 3f 4c fe 7a 6f 72 5b 41 2a |..B...o?L.zor[A*|" +"2020-08-31 20:50:56.031 UTC [msp.identity] Verify -> DEBU 48f Verify: sig = 00000000 30 45 02 21 00 fc 53 3d 35 42 71 ed d4 81 a3 f5 |0E.!..S=5Bq.....| +00000010 57 8f 1b 24 7f eb 84 9a bf 01 56 3d 14 0a c5 27 |W..$......V=...'| +00000020 e2 59 33 af a5 02 20 7f ee c6 b3 e4 81 81 0c 5a |.Y3... ........Z| +00000030 56 0e 53 bb 01 33 64 d1 9a 5e 2e c1 c0 4f 6a 98 |V.S..3d..^...Oj.| +00000040 cf 8b e5 34 49 dc b7 |...4I..|" +"2020-08-31 20:50:56.031 UTC [cauthdsl] func2 -> DEBU 490 0xc000cd0c00 principal evaluation succeeds for identity 0" +"2020-08-31 20:50:56.031 UTC [cauthdsl] func1 -> DEBU 491 0xc000cd0c00 gate 1598907056030976200 evaluation succeeds" +"2020-08-31 20:50:56.031 UTC [policies] Evaluate -> DEBU 492 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:50:56.031 UTC [policies] Evaluate -> DEBU 493 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:50:56.031 UTC [policies] Evaluate -> DEBU 494 Signature set satisfies policy /Channel/Orderer/Writers" +"2020-08-31 20:50:56.031 UTC [policies] Evaluate -> DEBU 495 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-08-31 20:50:56.031 UTC [policies] Evaluate -> DEBU 496 Signature set satisfies policy /Channel/Writers" +"2020-08-31 20:50:56.031 UTC [policies] Evaluate -> DEBU 497 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-08-31 20:50:56.032 UTC [common.channelconfig] NewStandardValues -> DEBU 498 Initializing protos for *channelconfig.ChannelProtos" +"2020-08-31 20:50:56.032 UTC [common.channelconfig] initializeProtosStruct -> DEBU 499 Processing field: HashingAlgorithm" +"2020-08-31 20:50:56.032 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49a Processing field: BlockDataHashingStructure" +"2020-08-31 20:50:56.032 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49b Processing field: OrdererAddresses" +"2020-08-31 20:50:56.032 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49c Processing field: Consortium" +"2020-08-31 20:50:56.032 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49d Processing field: Capabilities" +"2020-08-31 20:50:56.032 UTC [common.channelconfig] NewStandardValues -> DEBU 49e Initializing protos for *channelconfig.ApplicationProtos" +"2020-08-31 20:50:56.032 UTC [common.channelconfig] initializeProtosStruct -> DEBU 49f Processing field: ACLs" +"2020-08-31 20:50:56.032 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a0 Processing field: Capabilities" +"2020-08-31 20:50:56.032 UTC [common.channelconfig] NewStandardValues -> DEBU 4a1 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:50:56.032 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a2 Processing field: AnchorPeers" +"2020-08-31 20:50:56.032 UTC [common.channelconfig] NewStandardValues -> DEBU 4a3 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:56.032 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4a4 Processing field: MSP" +"2020-08-31 20:50:56.032 UTC [common.channelconfig] Validate -> DEBU 4a5 Anchor peers for org Org1MSP are " +"2020-08-31 20:50:56.032 UTC [common.channelconfig] validateMSP -> DEBU 4a6 Setting up MSP for org Org1MSP" +"2020-08-31 20:50:56.032 UTC [msp] newBccspMsp -> DEBU 4a7 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:56.032 UTC [msp] New -> DEBU 4a8 Creating Cache-MSP instance" +"2020-08-31 20:50:56.032 UTC [msp] Setup -> DEBU 4a9 Setting up MSP instance Org1MSP" +"2020-08-31 20:50:56.032 UTC [msp.identity] newIdentity -> DEBU 4aa Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-08-31 20:50:56.033 UTC [common.channelconfig] NewStandardValues -> DEBU 4ab Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:50:56.033 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ac Processing field: AnchorPeers" +"2020-08-31 20:50:56.034 UTC [common.channelconfig] NewStandardValues -> DEBU 4ad Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:56.034 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ae Processing field: MSP" +"2020-08-31 20:50:56.034 UTC [common.channelconfig] Validate -> DEBU 4af Anchor peers for org Org2MSP are " +"2020-08-31 20:50:56.034 UTC [common.channelconfig] validateMSP -> DEBU 4b0 Setting up MSP for org Org2MSP" +"2020-08-31 20:50:56.034 UTC [msp] newBccspMsp -> DEBU 4b1 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:56.034 UTC [msp] New -> DEBU 4b2 Creating Cache-MSP instance" +"2020-08-31 20:50:56.034 UTC [msp] Setup -> DEBU 4b3 Setting up MSP instance Org2MSP" +"2020-08-31 20:50:56.035 UTC [msp.identity] newIdentity -> DEBU 4b4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-08-31 20:50:56.036 UTC [common.channelconfig] NewStandardValues -> DEBU 4b5 Initializing protos for *channelconfig.OrdererProtos" +"2020-08-31 20:50:56.036 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b6 Processing field: ConsensusType" +"2020-08-31 20:50:56.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b7 Processing field: BatchSize" +"2020-08-31 20:50:56.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b8 Processing field: BatchTimeout" +"2020-08-31 20:50:56.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4b9 Processing field: KafkaBrokers" +"2020-08-31 20:50:56.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4ba Processing field: ChannelRestrictions" +"2020-08-31 20:50:56.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4bb Processing field: Capabilities" +"2020-08-31 20:50:56.037 UTC [common.channelconfig] NewStandardValues -> DEBU 4bc Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-08-31 20:50:56.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4bd Processing field: Endpoints" +"2020-08-31 20:50:56.038 UTC [common.channelconfig] NewStandardValues -> DEBU 4be Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:56.038 UTC [common.channelconfig] initializeProtosStruct -> DEBU 4bf Processing field: MSP" +"2020-08-31 20:50:56.038 UTC [common.channelconfig] validateMSP -> DEBU 4c0 Setting up MSP for org OrdererOrg" +"2020-08-31 20:50:56.038 UTC [msp] newBccspMsp -> DEBU 4c1 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:56.038 UTC [msp] New -> DEBU 4c2 Creating Cache-MSP instance" +"2020-08-31 20:50:56.039 UTC [msp] Setup -> DEBU 4c3 Setting up MSP instance OrdererMSP" +"2020-08-31 20:50:56.039 UTC [msp.identity] newIdentity -> DEBU 4c4 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:50:56.041 UTC [msp] Setup -> DEBU 4c5 Setting up the MSP manager (3 msps)" +"2020-08-31 20:50:56.041 UTC [msp] Setup -> DEBU 4c6 MSP manager setup complete, setup 3 msps" +"2020-08-31 20:50:56.041 UTC [policies] NewManagerImpl -> DEBU 4c7 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:56.041 UTC [policies] NewManagerImpl -> DEBU 4c8 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:56.041 UTC [policies] NewManagerImpl -> DEBU 4c9 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:56.042 UTC [policies] NewManagerImpl -> DEBU 4ca Proposed new policy BlockValidation for Channel/Orderer" +"2020-08-31 20:50:56.042 UTC [policies] NewManagerImpl -> DEBU 4cb Proposed new policy Readers for Channel/Orderer" +"2020-08-31 20:50:56.042 UTC [policies] NewManagerImpl -> DEBU 4cc Proposed new policy Writers for Channel/Orderer" +"2020-08-31 20:50:56.042 UTC [policies] NewManagerImpl -> DEBU 4cd Proposed new policy Admins for Channel/Orderer" +"2020-08-31 20:50:56.043 UTC [policies] NewManagerImpl -> DEBU 4ce Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-08-31 20:50:56.043 UTC [policies] NewManagerImpl -> DEBU 4cf Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2020-08-31 20:50:56.043 UTC [policies] NewManagerImpl -> DEBU 4d0 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-08-31 20:50:56.043 UTC [policies] NewManagerImpl -> DEBU 4d1 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-08-31 20:50:56.044 UTC [policies] NewManagerImpl -> DEBU 4d2 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-08-31 20:50:56.044 UTC [policies] NewManagerImpl -> DEBU 4d3 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-08-31 20:50:56.044 UTC [policies] NewManagerImpl -> DEBU 4d4 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-08-31 20:50:56.044 UTC [policies] NewManagerImpl -> DEBU 4d5 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-08-31 20:50:56.045 UTC [policies] NewManagerImpl -> DEBU 4d6 Proposed new policy ChannelCreationPolicy for Channel/Application" +"2020-08-31 20:50:56.045 UTC [policies] GetPolicy -> DEBU 4d7 Returning dummy reject all policy because Readers could not be found in Channel/Application/Readers" +"2020-08-31 20:50:56.045 UTC [policies] NewManagerImpl -> DEBU 4d8 Proposed new policy Readers for Channel" +"2020-08-31 20:50:56.045 UTC [policies] GetPolicy -> DEBU 4d9 Returning dummy reject all policy because Writers could not be found in Channel/Application/Writers" +"2020-08-31 20:50:56.045 UTC [policies] NewManagerImpl -> DEBU 4da Proposed new policy Writers for Channel" +"2020-08-31 20:50:56.045 UTC [policies] GetPolicy -> DEBU 4db Returning dummy reject all policy because Admins could not be found in Channel/Application/Admins" +"2020-08-31 20:50:56.045 UTC [policies] NewManagerImpl -> DEBU 4dc Proposed new policy Admins for Channel" +"2020-08-31 20:50:56.045 UTC [common.configtx] addToMap -> DEBU 4dd Adding to config map: [Group] /Channel" +"2020-08-31 20:50:56.046 UTC [common.configtx] addToMap -> DEBU 4de Adding to config map: [Group] /Channel/Orderer" +"2020-08-31 20:50:56.046 UTC [common.configtx] addToMap -> DEBU 4df Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:56.046 UTC [common.configtx] addToMap -> DEBU 4e0 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-08-31 20:50:56.046 UTC [common.configtx] addToMap -> DEBU 4e1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:50:56.046 UTC [common.configtx] addToMap -> DEBU 4e2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:50:56.046 UTC [common.configtx] addToMap -> DEBU 4e3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-08-31 20:50:56.046 UTC [common.configtx] addToMap -> DEBU 4e4 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-08-31 20:50:56.047 UTC [common.configtx] addToMap -> DEBU 4e5 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-08-31 20:50:56.048 UTC [common.configtx] addToMap -> DEBU 4e6 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-08-31 20:50:56.048 UTC [common.configtx] addToMap -> DEBU 4e7 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-08-31 20:50:56.048 UTC [common.configtx] addToMap -> DEBU 4e8 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-08-31 20:50:56.048 UTC [common.configtx] addToMap -> DEBU 4e9 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-08-31 20:50:56.048 UTC [common.configtx] addToMap -> DEBU 4ea Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-08-31 20:50:56.048 UTC [common.configtx] addToMap -> DEBU 4eb Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4ec Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4ed Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4ee Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4ef Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f4 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f5 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4f9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4fa Adding to config map: [Policy] /Channel/Application/ChannelCreationPolicy" +"2020-08-31 20:50:56.049 UTC [common.configtx] addToMap -> DEBU 4fb Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-08-31 20:50:56.050 UTC [common.configtx] addToMap -> DEBU 4fc Adding to config map: [Value] /Channel/Consortium" +"2020-08-31 20:50:56.050 UTC [common.configtx] addToMap -> DEBU 4fd Adding to config map: [Value] /Channel/Capabilities" +"2020-08-31 20:50:56.050 UTC [common.configtx] addToMap -> DEBU 4fe Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-08-31 20:50:56.050 UTC [common.configtx] addToMap -> DEBU 4ff Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 500 Adding to config map: [Policy] /Channel/Admins" +"2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 501 Adding to config map: [Policy] /Channel/Readers" +"2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 502 Adding to config map: [Policy] /Channel/Writers" +"2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 503 Adding to config map: [Group] /Channel" +"2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 504 Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 505 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 506 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 507 Adding to config map: [Value] /Channel/Consortium" +"2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 508 Adding to config map: [Group] /Channel" +"2020-08-31 20:50:56.051 UTC [common.configtx] addToMap -> DEBU 509 Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:50:56.052 UTC [common.configtx] addToMap -> DEBU 50a Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:50:56.052 UTC [common.configtx] addToMap -> DEBU 50b Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:50:56.052 UTC [common.configtx] addToMap -> DEBU 50c Adding to config map: [Value] /Channel/Application/ACLs" +"2020-08-31 20:50:56.052 UTC [common.configtx] addToMap -> DEBU 50d Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:50:56.052 UTC [common.configtx] addToMap -> DEBU 50e Adding to config map: [Policy] /Channel/Application/Writers" +"2020-08-31 20:50:56.053 UTC [common.configtx] addToMap -> DEBU 50f Adding to config map: [Policy] /Channel/Application/Admins" +"2020-08-31 20:50:56.053 UTC [common.configtx] addToMap -> DEBU 510 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:50:56.053 UTC [common.configtx] addToMap -> DEBU 511 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:50:56.053 UTC [common.configtx] addToMap -> DEBU 512 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-08-31 20:50:56.053 UTC [common.configtx] addToMap -> DEBU 513 Adding to config map: [Value] /Channel/Consortium" +"2020-08-31 20:50:56.054 UTC [common.configtx] verifyDeltaSet -> DEBU 514 Processing change to key: [Policy] /Channel/Application/Writers" +"2020-08-31 20:50:56.055 UTC [common.configtx] verifyDeltaSet -> DEBU 515 Processing change to key: [Policy] /Channel/Application/Admins" +"2020-08-31 20:50:56.055 UTC [common.configtx] verifyDeltaSet -> DEBU 516 Processing change to key: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:50:56.055 UTC [common.configtx] verifyDeltaSet -> DEBU 517 Processing change to key: [Policy] /Channel/Application/Readers" +"2020-08-31 20:50:56.056 UTC [common.configtx] verifyDeltaSet -> DEBU 518 Processing change to key: [Group] /Channel/Application" +"2020-08-31 20:50:56.056 UTC [common.configtx] policyForItem -> DEBU 519 Getting policy for item Application with mod_policy ChannelCreationPolicy" +"2020-08-31 20:50:56.056 UTC [policies] Manager -> DEBU 51a Manager Channel looking up path []" +"2020-08-31 20:50:56.056 UTC [policies] Manager -> DEBU 51b Manager Channel has managers Orderer" +"2020-08-31 20:50:56.056 UTC [policies] Manager -> DEBU 51c Manager Channel has managers Application" +"2020-08-31 20:50:56.056 UTC [policies] Manager -> DEBU 51d Manager Channel looking up path [Application]" +"2020-08-31 20:50:56.056 UTC [policies] Manager -> DEBU 51e Manager Channel has managers Orderer" +"2020-08-31 20:50:56.058 UTC [policies] Manager -> DEBU 51f Manager Channel has managers Application" +"2020-08-31 20:50:56.058 UTC [policies] Manager -> DEBU 520 Manager Channel/Application looking up path []" +"2020-08-31 20:50:56.058 UTC [policies] Manager -> DEBU 521 Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:50:56.058 UTC [policies] Manager -> DEBU 522 Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:50:56.059 UTC [policies] Evaluate -> DEBU 523 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy ==" +"2020-08-31 20:50:56.059 UTC [policies] Evaluate -> DEBU 524 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:50:56.059 UTC [policies] Evaluate -> DEBU 525 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2020-08-31 20:50:56.059 UTC [msp] DeserializeIdentity -> DEBU 526 Obtaining identity" +"2020-08-31 20:50:56.059 UTC [msp.identity] newIdentity -> DEBU 527 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE-----" +"2020-08-31 20:50:56.059 UTC [cauthdsl] func1 -> DEBU 528 0xc000d89220 gate 1598907056059748400 evaluation starts" +"2020-08-31 20:50:56.059 UTC [cauthdsl] func2 -> DEBU 529 0xc000d89220 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:50:56.059 UTC [cauthdsl] func2 -> DEBU 52a 0xc000d89220 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:50:56.059 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 52b Checking if identity has been named explicitly as an admin for Org1MSP" +"2020-08-31 20:50:56.059 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 52c Checking if identity carries the admin ou for Org1MSP" +"2020-08-31 20:50:56.059 UTC [msp] Validate -> DEBU 52d MSP Org1MSP validating identity" +"2020-08-31 20:50:56.060 UTC [msp] getCertificationChain -> DEBU 52e MSP Org1MSP getting certification chain" +"2020-08-31 20:50:56.060 UTC [msp] hasOURole -> DEBU 52f MSP Org1MSP checking if the identity is a client" +"2020-08-31 20:50:56.060 UTC [msp] getCertificationChain -> DEBU 530 MSP Org1MSP getting certification chain" +"2020-08-31 20:50:56.060 UTC [cauthdsl] func2 -> DEBU 531 0xc000d89220 principal matched by identity 0" +"2020-08-31 20:50:56.061 UTC [msp.identity] Verify -> DEBU 532 Verify: digest = 00000000 7b aa e0 b7 8c 39 88 52 d3 c7 42 36 0c c0 87 77 |{....9.R..B6...w| +00000010 ee 05 17 15 bb 6e d1 44 66 85 79 9d 67 86 ef e3 |.....n.Df.y.g...|" +"2020-08-31 20:50:56.061 UTC [msp.identity] Verify -> DEBU 533 Verify: sig = 00000000 30 45 02 21 00 a2 72 8c e7 15 80 e5 4c e7 66 4a |0E.!..r.....L.fJ| +00000010 9a 9a c3 fd 15 cd 7e 00 02 e9 75 1d 42 fa 91 17 |......~...u.B...| +00000020 49 33 d6 c0 6b 02 20 5e 5b d2 a8 61 f8 27 b2 72 |I3..k. ^[..a.'.r| +00000030 2e 0d 62 b7 ba ef c0 c0 87 90 8a b9 20 a6 de f5 |..b......... ...| +00000040 b1 31 27 56 61 a9 0c |.1'Va..|" +"2020-08-31 20:50:56.061 UTC [cauthdsl] func2 -> DEBU 534 0xc000d89220 principal evaluation succeeds for identity 0" +"2020-08-31 20:50:56.061 UTC [cauthdsl] func1 -> DEBU 535 0xc000d89220 gate 1598907056059748400 evaluation succeeds" +"2020-08-31 20:50:56.062 UTC [policies] Evaluate -> DEBU 536 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:50:56.062 UTC [policies] Evaluate -> DEBU 537 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:50:56.062 UTC [policies] Evaluate -> DEBU 538 Signature set satisfies policy /Channel/Application/ChannelCreationPolicy" +"2020-08-31 20:50:56.063 UTC [policies] Evaluate -> DEBU 539 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/ChannelCreationPolicy" +"2020-08-31 20:50:56.063 UTC [common.configtx] verifyDeltaSet -> DEBU 53a Processing change to key: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:50:56.063 UTC [common.configtx] verifyDeltaSet -> DEBU 53b Processing change to key: [Value] /Channel/Application/ACLs" +"2020-08-31 20:50:56.063 UTC [common.configtx] verifyDeltaSet -> DEBU 53c Processing change to key: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:50:56.064 UTC [common.configtx] recurseConfigMap -> DEBU 53d Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.064 UTC [common.configtx] recurseConfigMap -> DEBU 53e Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 53f Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 540 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 541 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 542 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 543 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 544 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 545 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 546 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 547 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 548 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 549 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 54a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 54b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 54c Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 54d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.065 UTC [common.configtx] recurseConfigMap -> DEBU 54e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.066 UTC [common.configtx] recurseConfigMap -> DEBU 54f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.066 UTC [common.configtx] recurseConfigMap -> DEBU 550 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.066 UTC [common.configtx] recurseConfigMap -> DEBU 551 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.066 UTC [common.configtx] recurseConfigMap -> DEBU 552 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.066 UTC [common.configtx] recurseConfigMap -> DEBU 553 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:50:56.066 UTC [common.channelconfig] NewStandardValues -> DEBU 554 Initializing protos for *channelconfig.ChannelProtos" +"2020-08-31 20:50:56.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 555 Processing field: HashingAlgorithm" +"2020-08-31 20:50:56.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 556 Processing field: BlockDataHashingStructure" +"2020-08-31 20:50:56.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 557 Processing field: OrdererAddresses" +"2020-08-31 20:50:56.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 558 Processing field: Consortium" +"2020-08-31 20:50:56.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 559 Processing field: Capabilities" +"2020-08-31 20:50:56.066 UTC [common.channelconfig] NewStandardValues -> DEBU 55a Initializing protos for *channelconfig.OrdererProtos" +"2020-08-31 20:50:56.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55b Processing field: ConsensusType" +"2020-08-31 20:50:56.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55c Processing field: BatchSize" +"2020-08-31 20:50:56.066 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55d Processing field: BatchTimeout" +"2020-08-31 20:50:56.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55e Processing field: KafkaBrokers" +"2020-08-31 20:50:56.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 55f Processing field: ChannelRestrictions" +"2020-08-31 20:50:56.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 560 Processing field: Capabilities" +"2020-08-31 20:50:56.067 UTC [common.channelconfig] NewStandardValues -> DEBU 561 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-08-31 20:50:56.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 562 Processing field: Endpoints" +"2020-08-31 20:50:56.067 UTC [common.channelconfig] NewStandardValues -> DEBU 563 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:56.067 UTC [common.channelconfig] initializeProtosStruct -> DEBU 564 Processing field: MSP" +"2020-08-31 20:50:56.067 UTC [common.channelconfig] validateMSP -> DEBU 565 Setting up MSP for org OrdererOrg" +"2020-08-31 20:50:56.067 UTC [msp] newBccspMsp -> DEBU 566 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:56.067 UTC [msp] New -> DEBU 567 Creating Cache-MSP instance" +"2020-08-31 20:50:56.067 UTC [msp] Setup -> DEBU 568 Setting up MSP instance OrdererMSP" +"2020-08-31 20:50:56.069 UTC [msp.identity] newIdentity -> DEBU 569 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:50:56.070 UTC [common.channelconfig] NewStandardValues -> DEBU 56a Initializing protos for *channelconfig.ApplicationProtos" +"2020-08-31 20:50:56.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56b Processing field: ACLs" +"2020-08-31 20:50:56.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56c Processing field: Capabilities" +"2020-08-31 20:50:56.070 UTC [common.channelconfig] NewStandardValues -> DEBU 56d Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:50:56.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 56e Processing field: AnchorPeers" +"2020-08-31 20:50:56.070 UTC [common.channelconfig] NewStandardValues -> DEBU 56f Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:56.070 UTC [common.channelconfig] initializeProtosStruct -> DEBU 570 Processing field: MSP" +"2020-08-31 20:50:56.070 UTC [common.channelconfig] Validate -> DEBU 571 Anchor peers for org Org2MSP are " +"2020-08-31 20:50:56.070 UTC [common.channelconfig] validateMSP -> DEBU 572 Setting up MSP for org Org2MSP" +"2020-08-31 20:50:56.070 UTC [msp] newBccspMsp -> DEBU 573 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:56.070 UTC [msp] New -> DEBU 574 Creating Cache-MSP instance" +"2020-08-31 20:50:56.070 UTC [msp] Setup -> DEBU 575 Setting up MSP instance Org2MSP" +"2020-08-31 20:50:56.070 UTC [msp.identity] newIdentity -> DEBU 576 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-08-31 20:50:56.071 UTC [common.channelconfig] NewStandardValues -> DEBU 577 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:50:56.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 578 Processing field: AnchorPeers" +"2020-08-31 20:50:56.071 UTC [common.channelconfig] NewStandardValues -> DEBU 579 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:56.071 UTC [common.channelconfig] initializeProtosStruct -> DEBU 57a Processing field: MSP" +"2020-08-31 20:50:56.071 UTC [common.channelconfig] Validate -> DEBU 57b Anchor peers for org Org1MSP are " +"2020-08-31 20:50:56.071 UTC [common.channelconfig] validateMSP -> DEBU 57c Setting up MSP for org Org1MSP" +"2020-08-31 20:50:56.071 UTC [msp] newBccspMsp -> DEBU 57d Creating BCCSP-based MSP instance" +"2020-08-31 20:50:56.071 UTC [msp] New -> DEBU 57e Creating Cache-MSP instance" +"2020-08-31 20:50:56.071 UTC [msp] Setup -> DEBU 57f Setting up MSP instance Org1MSP" +"2020-08-31 20:50:56.071 UTC [msp.identity] newIdentity -> DEBU 580 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-08-31 20:50:56.072 UTC [msp] Setup -> DEBU 581 Setting up the MSP manager (3 msps)" +"2020-08-31 20:50:56.072 UTC [msp] Setup -> DEBU 582 MSP manager setup complete, setup 3 msps" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 583 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 584 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 585 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 586 Proposed new policy BlockValidation for Channel/Orderer" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 587 Proposed new policy Readers for Channel/Orderer" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 588 Proposed new policy Writers for Channel/Orderer" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 589 Proposed new policy Admins for Channel/Orderer" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 58a Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 58b Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 58c Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 58d Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 58e Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 58f Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 590 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 591 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 592 Proposed new policy Admins for Channel/Application" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 593 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 594 Proposed new policy Endorsement for Channel/Application" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 595 Proposed new policy Readers for Channel/Application" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 596 Proposed new policy Writers for Channel/Application" +"2020-08-31 20:50:56.072 UTC [policies] NewManagerImpl -> DEBU 597 Proposed new policy Readers for Channel" +"2020-08-31 20:50:56.073 UTC [policies] NewManagerImpl -> DEBU 598 Proposed new policy Writers for Channel" +"2020-08-31 20:50:56.073 UTC [policies] NewManagerImpl -> DEBU 599 Proposed new policy Admins for Channel" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 59a Adding to config map: [Group] /Channel" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 59b Adding to config map: [Group] /Channel/Orderer" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 59c Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 59d Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 59e Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 59f Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a0 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a1 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a3 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a4 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a5 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a6 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a7 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a8 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5a9 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5aa Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5ab Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5ac Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5ad Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5ae Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5af Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5b0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:50:56.073 UTC [common.configtx] addToMap -> DEBU 5b1 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5b2 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5b3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5b4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5b5 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5b6 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5b7 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5b8 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5b9 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5ba Adding to config map: [Policy] /Channel/Application/Writers" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5bb Adding to config map: [Policy] /Channel/Application/Admins" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5bc Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5bd Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5be Adding to config map: [Value] /Channel/Capabilities" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5bf Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5c0 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5c1 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5c2 Adding to config map: [Value] /Channel/Consortium" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5c3 Adding to config map: [Policy] /Channel/Readers" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5c4 Adding to config map: [Policy] /Channel/Writers" +"2020-08-31 20:50:56.074 UTC [common.configtx] addToMap -> DEBU 5c5 Adding to config map: [Policy] /Channel/Admins" +"2020-08-31 20:50:56.074 UTC [common.capabilities] Supported -> DEBU 5c6 Orderer capability V1_4_2 is supported and is enabled" +"2020-08-31 20:50:56.075 UTC [common.capabilities] Supported -> DEBU 5c7 Channel capability V1_4_3 is supported and is enabled" +"2020-08-31 20:50:56.075 UTC [orderer.common.cluster] NewStream -> DEBU 5c8 Created new stream to orderer2.example.com:7050 with ID of 2 and buffer size of 10" +"2020-08-31 20:50:56.075 UTC [orderer.consensus.etcdraft] submitSent -> DEBU 5c9 Sending msg of 29304 bytes to 3 on channel testchainid took 126.3µs" +"2020-08-31 20:50:56.075 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 5ca [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:50714" +"2020-08-31 20:50:56.076 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5cb Send of SubmitRequest for channel testchainid with payload of size 29304 to orderer2.example.com(orderer2.example.com:7050) took 142.5µs " +"2020-08-31 20:50:56.077 UTC [common.deliver] deliverBlocks -> DEBU 5cc Rejecting deliver for 172.18.0.9:50712 because channel businesschannel not found" +"2020-08-31 20:50:56.077 UTC [orderer.common.server] func1 -> DEBU 5cd Closing Deliver stream" +"2020-08-31 20:50:56.077 UTC [comm.grpc.server] 1 -> INFO 5ce streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50712 grpc.code=OK grpc.call_duration=140.0339ms +"2020-08-31 20:50:56.078 UTC [orderer.common.broadcast] Handle -> DEBU 5cf Received EOF from 172.18.0.9:50714, hangup" +"2020-08-31 20:50:56.078 UTC [orderer.common.server] func1 -> DEBU 5d0 Closing Broadcast stream" +"2020-08-31 20:50:56.078 UTC [comm.grpc.server] 1 -> INFO 5d1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:50714 grpc.code=OK grpc.call_duration=110.9747ms +"2020-08-31 20:50:56.095 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5d2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 29515" +"2020-08-31 20:50:56.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 5d3 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:56.102 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5d4 Sending msg of 28 bytes to 3 on channel testchainid took 93.4µs" +"2020-08-31 20:50:56.105 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5d5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.8479ms " +"2020-08-31 20:50:56.107 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 5d6 Sending msg of 28 bytes to 3 on channel testchainid took 855.1µs" +"2020-08-31 20:50:56.108 UTC [orderer.common.cluster.step] sendMessage -> DEBU 5d7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0211ms " +"2020-08-31 20:50:56.110 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 5d8 Writing block [1] (Raft index: 5) to ledger" channel=testchainid node=1 +"2020-08-31 20:50:56.112 UTC [common.channelconfig] NewStandardValues -> DEBU 5d9 Initializing protos for *channelconfig.ChannelProtos" +"2020-08-31 20:50:56.112 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5da Processing field: HashingAlgorithm" +"2020-08-31 20:50:56.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5db Processing field: BlockDataHashingStructure" +"2020-08-31 20:50:56.114 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5dc Processing field: OrdererAddresses" +"2020-08-31 20:50:56.115 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5dd Processing field: Consortium" +"2020-08-31 20:50:56.115 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5de Processing field: Capabilities" +"2020-08-31 20:50:56.116 UTC [common.channelconfig] NewStandardValues -> DEBU 5df Initializing protos for *channelconfig.OrdererProtos" +"2020-08-31 20:50:56.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e0 Processing field: ConsensusType" +"2020-08-31 20:50:56.117 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e1 Processing field: BatchSize" +"2020-08-31 20:50:56.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e2 Processing field: BatchTimeout" +"2020-08-31 20:50:56.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e3 Processing field: KafkaBrokers" +"2020-08-31 20:50:56.118 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e4 Processing field: ChannelRestrictions" +"2020-08-31 20:50:56.119 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e5 Processing field: Capabilities" +"2020-08-31 20:50:56.120 UTC [common.channelconfig] NewStandardValues -> DEBU 5e6 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-08-31 20:50:56.120 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e7 Processing field: Endpoints" +"2020-08-31 20:50:56.121 UTC [common.channelconfig] NewStandardValues -> DEBU 5e8 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:56.122 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5e9 Processing field: MSP" +"2020-08-31 20:50:56.122 UTC [common.channelconfig] validateMSP -> DEBU 5ea Setting up MSP for org OrdererOrg" +"2020-08-31 20:50:56.123 UTC [msp] newBccspMsp -> DEBU 5eb Creating BCCSP-based MSP instance" +"2020-08-31 20:50:56.124 UTC [msp] New -> DEBU 5ec Creating Cache-MSP instance" +"2020-08-31 20:50:56.124 UTC [msp] Setup -> DEBU 5ed Setting up MSP instance OrdererMSP" +"2020-08-31 20:50:56.125 UTC [msp.identity] newIdentity -> DEBU 5ee Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:50:56.126 UTC [common.channelconfig] NewStandardValues -> DEBU 5ef Initializing protos for *channelconfig.ApplicationProtos" +"2020-08-31 20:50:56.126 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f0 Processing field: ACLs" +"2020-08-31 20:50:56.126 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f1 Processing field: Capabilities" +"2020-08-31 20:50:56.127 UTC [common.channelconfig] NewStandardValues -> DEBU 5f2 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:50:56.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f3 Processing field: AnchorPeers" +"2020-08-31 20:50:56.128 UTC [common.channelconfig] NewStandardValues -> DEBU 5f4 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:56.128 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5f5 Processing field: MSP" +"2020-08-31 20:50:56.128 UTC [common.channelconfig] Validate -> DEBU 5f6 Anchor peers for org Org1MSP are " +"2020-08-31 20:50:56.129 UTC [common.channelconfig] validateMSP -> DEBU 5f7 Setting up MSP for org Org1MSP" +"2020-08-31 20:50:56.129 UTC [msp] newBccspMsp -> DEBU 5f8 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:56.129 UTC [msp] New -> DEBU 5f9 Creating Cache-MSP instance" +"2020-08-31 20:50:56.129 UTC [msp] Setup -> DEBU 5fa Setting up MSP instance Org1MSP" +"2020-08-31 20:50:56.131 UTC [msp.identity] newIdentity -> DEBU 5fb Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-08-31 20:50:56.132 UTC [common.channelconfig] NewStandardValues -> DEBU 5fc Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:50:56.134 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5fd Processing field: AnchorPeers" +"2020-08-31 20:50:56.134 UTC [common.channelconfig] NewStandardValues -> DEBU 5fe Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:50:56.134 UTC [common.channelconfig] initializeProtosStruct -> DEBU 5ff Processing field: MSP" +"2020-08-31 20:50:56.134 UTC [common.channelconfig] Validate -> DEBU 600 Anchor peers for org Org2MSP are " +"2020-08-31 20:50:56.135 UTC [common.channelconfig] validateMSP -> DEBU 601 Setting up MSP for org Org2MSP" +"2020-08-31 20:50:56.135 UTC [msp] newBccspMsp -> DEBU 602 Creating BCCSP-based MSP instance" +"2020-08-31 20:50:56.135 UTC [msp] New -> DEBU 603 Creating Cache-MSP instance" +"2020-08-31 20:50:56.136 UTC [msp] Setup -> DEBU 604 Setting up MSP instance Org2MSP" +"2020-08-31 20:50:56.137 UTC [msp.identity] newIdentity -> DEBU 605 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-08-31 20:50:56.138 UTC [msp] Setup -> DEBU 606 Setting up the MSP manager (3 msps)" +"2020-08-31 20:50:56.138 UTC [msp] Setup -> DEBU 607 MSP manager setup complete, setup 3 msps" +"2020-08-31 20:50:56.139 UTC [policies] NewManagerImpl -> DEBU 608 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:56.139 UTC [policies] NewManagerImpl -> DEBU 609 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:56.139 UTC [policies] NewManagerImpl -> DEBU 60a Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:56.140 UTC [policies] NewManagerImpl -> DEBU 60b Proposed new policy BlockValidation for Channel/Orderer" +"2020-08-31 20:50:56.140 UTC [policies] NewManagerImpl -> DEBU 60c Proposed new policy Readers for Channel/Orderer" +"2020-08-31 20:50:56.140 UTC [policies] NewManagerImpl -> DEBU 60d Proposed new policy Writers for Channel/Orderer" +"2020-08-31 20:50:56.141 UTC [policies] NewManagerImpl -> DEBU 60e Proposed new policy Admins for Channel/Orderer" +"2020-08-31 20:50:56.141 UTC [policies] NewManagerImpl -> DEBU 60f Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-08-31 20:50:56.142 UTC [policies] NewManagerImpl -> DEBU 610 Proposed new policy Endorsement for Channel/Application/Org1MSP" +"2020-08-31 20:50:56.142 UTC [policies] NewManagerImpl -> DEBU 611 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-08-31 20:50:56.142 UTC [policies] NewManagerImpl -> DEBU 612 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-08-31 20:50:56.143 UTC [policies] NewManagerImpl -> DEBU 613 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-08-31 20:50:56.143 UTC [policies] NewManagerImpl -> DEBU 614 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-08-31 20:50:56.143 UTC [policies] NewManagerImpl -> DEBU 615 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-08-31 20:50:56.144 UTC [policies] NewManagerImpl -> DEBU 616 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-08-31 20:50:56.144 UTC [policies] NewManagerImpl -> DEBU 617 Proposed new policy Readers for Channel/Application" +"2020-08-31 20:50:56.144 UTC [policies] NewManagerImpl -> DEBU 618 Proposed new policy Writers for Channel/Application" +"2020-08-31 20:50:56.148 UTC [orderer.common.server] Deliver -> DEBU 619 Starting new Deliver handler" +"2020-08-31 20:50:56.149 UTC [common.deliver] Handle -> DEBU 61a Starting new deliver loop for 172.18.0.9:50716" +"2020-08-31 20:50:56.149 UTC [common.deliver] Handle -> DEBU 61b Attempting to read seek info message from 172.18.0.9:50716" +"2020-08-31 20:50:56.150 UTC [policies] NewManagerImpl -> DEBU 61c Proposed new policy Admins for Channel/Application" +"2020-08-31 20:50:56.151 UTC [policies] NewManagerImpl -> DEBU 61d Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-08-31 20:50:56.151 UTC [policies] NewManagerImpl -> DEBU 61e Proposed new policy Endorsement for Channel/Application" +"2020-08-31 20:50:56.152 UTC [policies] NewManagerImpl -> DEBU 61f Proposed new policy Admins for Channel" +"2020-08-31 20:50:56.152 UTC [policies] NewManagerImpl -> DEBU 620 Proposed new policy Readers for Channel" +"2020-08-31 20:50:56.153 UTC [policies] NewManagerImpl -> DEBU 621 Proposed new policy Writers for Channel" +"2020-08-31 20:50:56.153 UTC [common.configtx] addToMap -> DEBU 622 Adding to config map: [Group] /Channel" +"2020-08-31 20:50:56.154 UTC [common.configtx] addToMap -> DEBU 623 Adding to config map: [Group] /Channel/Orderer" +"2020-08-31 20:50:56.154 UTC [common.configtx] addToMap -> DEBU 624 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-08-31 20:50:56.154 UTC [common.configtx] addToMap -> DEBU 625 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-08-31 20:50:56.155 UTC [common.configtx] addToMap -> DEBU 626 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:50:56.155 UTC [common.configtx] addToMap -> DEBU 627 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:50:56.155 UTC [common.configtx] addToMap -> DEBU 628 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-08-31 20:50:56.156 UTC [common.configtx] addToMap -> DEBU 629 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-08-31 20:50:56.156 UTC [common.configtx] addToMap -> DEBU 62a Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-08-31 20:50:56.157 UTC [common.configtx] addToMap -> DEBU 62b Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-08-31 20:50:56.157 UTC [common.configtx] addToMap -> DEBU 62c Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-08-31 20:50:56.157 UTC [common.configtx] addToMap -> DEBU 62d Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-08-31 20:50:56.159 UTC [common.configtx] addToMap -> DEBU 62e Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-08-31 20:50:56.160 UTC [common.configtx] addToMap -> DEBU 62f Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-08-31 20:50:56.160 UTC [common.configtx] addToMap -> DEBU 630 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-08-31 20:50:56.163 UTC [common.configtx] addToMap -> DEBU 631 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-08-31 20:50:56.163 UTC [common.configtx] addToMap -> DEBU 632 Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:50:56.163 UTC [common.configtx] addToMap -> DEBU 633 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:50:56.164 UTC [common.configtx] addToMap -> DEBU 634 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-08-31 20:50:56.164 UTC [common.configtx] addToMap -> DEBU 635 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:50:56.165 UTC [common.configtx] addToMap -> DEBU 636 Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:50:56.165 UTC [common.configtx] addToMap -> DEBU 637 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:50:56.165 UTC [common.configtx] addToMap -> DEBU 638 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:50:56.166 UTC [common.configtx] addToMap -> DEBU 639 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:50:56.167 UTC [common.configtx] addToMap -> DEBU 63a Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-08-31 20:50:56.167 UTC [common.configtx] addToMap -> DEBU 63b Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:50:56.167 UTC [common.configtx] addToMap -> DEBU 63c Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:50:56.167 UTC [common.configtx] addToMap -> DEBU 63d Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:50:56.168 UTC [common.configtx] addToMap -> DEBU 63e Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:50:56.168 UTC [common.configtx] addToMap -> DEBU 63f Adding to config map: [Value] /Channel/Application/ACLs" +"2020-08-31 20:50:56.168 UTC [common.configtx] addToMap -> DEBU 640 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:50:56.169 UTC [common.configtx] addToMap -> DEBU 641 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:50:56.169 UTC [common.configtx] addToMap -> DEBU 642 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-08-31 20:50:56.169 UTC [common.configtx] addToMap -> DEBU 643 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-08-31 20:50:56.170 UTC [common.configtx] addToMap -> DEBU 644 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-08-31 20:50:56.170 UTC [common.configtx] addToMap -> DEBU 645 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:50:56.171 UTC [common.configtx] addToMap -> DEBU 646 Adding to config map: [Value] /Channel/Consortium" +"2020-08-31 20:50:56.171 UTC [common.configtx] addToMap -> DEBU 647 Adding to config map: [Value] /Channel/Capabilities" +"2020-08-31 20:50:56.172 UTC [common.configtx] addToMap -> DEBU 648 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-08-31 20:50:56.172 UTC [common.configtx] addToMap -> DEBU 649 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-08-31 20:50:56.172 UTC [common.configtx] addToMap -> DEBU 64a Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-08-31 20:50:56.172 UTC [common.configtx] addToMap -> DEBU 64b Adding to config map: [Policy] /Channel/Writers" +"2020-08-31 20:50:56.173 UTC [common.configtx] addToMap -> DEBU 64c Adding to config map: [Policy] /Channel/Admins" +"2020-08-31 20:50:56.173 UTC [common.configtx] addToMap -> DEBU 64d Adding to config map: [Policy] /Channel/Readers" +"2020-08-31 20:50:56.173 UTC [common.channelconfig] LogSanityChecks -> DEBU 64e As expected, current configuration has policy '/Channel/Readers'" +"2020-08-31 20:50:56.174 UTC [common.channelconfig] LogSanityChecks -> DEBU 64f As expected, current configuration has policy '/Channel/Writers'" +"2020-08-31 20:50:56.174 UTC [policies] Manager -> DEBU 650 Manager Channel looking up path [Application]" +"2020-08-31 20:50:56.174 UTC [policies] Manager -> DEBU 651 Manager Channel has managers Orderer" +"2020-08-31 20:50:56.174 UTC [policies] Manager -> DEBU 652 Manager Channel has managers Application" +"2020-08-31 20:50:56.174 UTC [policies] Manager -> DEBU 653 Manager Channel/Application looking up path []" +"2020-08-31 20:50:56.175 UTC [policies] Manager -> DEBU 654 Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:50:56.175 UTC [policies] Manager -> DEBU 655 Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:50:56.175 UTC [common.channelconfig] LogSanityChecks -> DEBU 656 As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-08-31 20:50:56.175 UTC [common.channelconfig] LogSanityChecks -> DEBU 657 As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-08-31 20:50:56.175 UTC [common.channelconfig] LogSanityChecks -> DEBU 658 As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-08-31 20:50:56.175 UTC [policies] Manager -> DEBU 659 Manager Channel looking up path [Orderer]" +"2020-08-31 20:50:56.175 UTC [policies] Manager -> DEBU 65a Manager Channel has managers Orderer" +"2020-08-31 20:50:56.175 UTC [policies] Manager -> DEBU 65b Manager Channel has managers Application" +"2020-08-31 20:50:56.175 UTC [policies] Manager -> DEBU 65c Manager Channel/Orderer looking up path []" +"2020-08-31 20:50:56.175 UTC [policies] Manager -> DEBU 65d Manager Channel/Orderer has managers OrdererOrg" +"2020-08-31 20:50:56.175 UTC [common.channelconfig] LogSanityChecks -> DEBU 65e As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-08-31 20:50:56.175 UTC [common.channelconfig] LogSanityChecks -> DEBU 65f As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-08-31 20:50:56.175 UTC [common.channelconfig] LogSanityChecks -> DEBU 660 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-08-31 20:50:56.175 UTC [common.channelconfig] LogSanityChecks -> DEBU 661 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-08-31 20:50:56.175 UTC [common.capabilities] Supported -> DEBU 662 Orderer capability V1_4_2 is supported and is enabled" +"2020-08-31 20:50:56.175 UTC [common.capabilities] Supported -> DEBU 663 Channel capability V1_4_3 is supported and is enabled" +"2020-08-31 20:50:56.175 UTC [fsblkstorage] newBlockfileMgr -> DEBU 664 newBlockfileMgr() initializing file-based block storage for ledger: businesschannel " +"2020-08-31 20:50:56.176 UTC [kvledger.util] CreateDirIfMissing -> DEBU 665 CreateDirIfMissing [/var/hyperledger/production/orderer/chains/businesschannel/]" +"2020-08-31 20:50:56.176 UTC [kvledger.util] logDirStatus -> DEBU 666 Before creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] does not exist" +"2020-08-31 20:50:56.176 UTC [kvledger.util] logDirStatus -> DEBU 667 After creating dir - [/var/hyperledger/production/orderer/chains/businesschannel/] exists" +"2020-08-31 20:50:56.176 UTC [fsblkstorage] newBlockfileMgr -> INFO 668 Getting block information from block storage" +"2020-08-31 20:50:56.176 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 669 Retrieving checkpoint info from block files" +"2020-08-31 20:50:56.176 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 66a retrieveLastFileSuffix()" +"2020-08-31 20:50:56.176 UTC [fsblkstorage] retrieveLastFileSuffix -> DEBU 66b retrieveLastFileSuffix() - biggestFileNum = -1" +"2020-08-31 20:50:56.176 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 66c Last file number found = -1" +"2020-08-31 20:50:56.176 UTC [fsblkstorage] constructCheckpointInfoFromBlockFiles -> DEBU 66d No block file found" +"2020-08-31 20:50:56.176 UTC [fsblkstorage] newBlockfileMgr -> DEBU 66e Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc000d55100)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0])" +"2020-08-31 20:50:56.178 UTC [fsblkstorage] newBlockIndex -> DEBU 66f newBlockIndex() - indexItems:[[BlockNum]]" +"2020-08-31 20:50:56.179 UTC [orderer.common.server] func1 -> DEBU 670 Executing callback to update root CAs" +"2020-08-31 20:50:56.179 UTC [orderer.common.server] updateTrustedRoots -> DEBU 671 updating root CAs for channel [businesschannel]" +"2020-08-31 20:50:56.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 672 adding app root CAs for MSP [Org1MSP]" +"2020-08-31 20:50:56.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 673 adding app root CAs for MSP [Org2MSP]" +"2020-08-31 20:50:56.180 UTC [orderer.common.server] updateTrustedRoots -> DEBU 674 adding orderer root CAs for MSP [OrdererMSP]" +"2020-08-31 20:50:56.183 UTC [fsblkstorage] indexBlock -> DEBU 675 Indexing block [blockNum=0, blockHash=[]byte{0x9a, 0x52, 0x4c, 0x2b, 0x43, 0x65, 0xfd, 0x57, 0x33, 0x8e, 0x73, 0xf4, 0x8a, 0x80, 0xa7, 0x23, 0x93, 0x2, 0xb5, 0x41, 0x2, 0x4d, 0xf3, 0x50, 0xe8, 0x90, 0xb1, 0xd5, 0x7a, 0xc7, 0x1e, 0x2e} txOffsets= +txId=fd92ece786eb33a140499e967ed74e3a3bbcb8e88456d50f7454e373b6da94d6 locPointer=offset=39, bytesLength=28430 +]" +"2020-08-31 20:50:56.184 UTC [fsblkstorage] updateCheckpoint -> DEBU 676 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28475], isChainEmpty=[false], lastBlockNumber=[0]" +"2020-08-31 20:50:56.185 UTC [fsblkstorage] Next -> DEBU 677 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-08-31 20:50:56.185 UTC [fsblkstorage] newBlockfileStream -> DEBU 678 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2020-08-31 20:50:56.185 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 679 Remaining bytes=[28475], Going to peek [8] bytes" +"2020-08-31 20:50:56.186 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 67a Returning blockbytes - length=[28472], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-08-31 20:50:56.186 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 67b blockbytes [28472] read from file [0]" +"2020-08-31 20:50:56.186 UTC [orderer.commmon.multichannel] newBlockWriter -> DEBU 67c [channel: businesschannel] Creating block writer for tip of chain (blockNumber=0, lastConfigBlockNum=0, lastConfigSeq=1)" +"2020-08-31 20:50:56.186 UTC [orderer.consensus.etcdraft] HandleChain -> INFO 67d EvictionSuspicion not set, defaulting to 10m0s" +"2020-08-31 20:50:56.186 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 67e No snapshot found at /var/hyperledger/production/orderer/etcdraft/snapshot/businesschannel" channel=businesschannel node=1 +"2020-08-31 20:50:56.187 UTC [orderer.consensus.etcdraft] createOrReadWAL -> INFO 67f No WAL data found, creating new WAL at path '/var/hyperledger/production/orderer/etcdraft/wal/businesschannel'" channel=businesschannel node=1 +"2020-08-31 20:50:56.192 UTC [orderer.consensus.etcdraft] createOrReadWAL -> DEBU 680 Loading WAL at Term 0 and Index 0" channel=businesschannel node=1 +"2020-08-31 20:50:56.193 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 681 Setting HardState to {Term: 0, Commit: 0}" channel=businesschannel node=1 +"2020-08-31 20:50:56.193 UTC [orderer.consensus.etcdraft] CreateStorage -> DEBU 682 Appending 0 entries to memory storage" channel=businesschannel node=1 +"2020-08-31 20:50:56.193 UTC [fsblkstorage] Next -> DEBU 683 Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-08-31 20:50:56.193 UTC [fsblkstorage] newBlockfileStream -> DEBU 684 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2020-08-31 20:50:56.193 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 685 Remaining bytes=[28475], Going to peek [8] bytes" +"2020-08-31 20:50:56.194 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 686 Returning blockbytes - length=[28472], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-08-31 20:50:56.194 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 687 blockbytes [28472] read from file [0]" +"2020-08-31 20:50:56.194 UTC [orderer.commmon.multichannel] newChainSupport -> DEBU 688 [channel: businesschannel] Done creating channel support resources" +"2020-08-31 20:50:56.195 UTC [orderer.commmon.multichannel] newChain -> INFO 689 Created and starting new chain businesschannel" +"2020-08-31 20:50:56.195 UTC [orderer.consensus.etcdraft] Start -> INFO 68a Starting Raft node" channel=businesschannel node=1 +"2020-08-31 20:50:56.195 UTC [orderer.common.cluster] Configure -> INFO 68b Entering, channel: businesschannel, nodes: [ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- + ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- +]" +"2020-08-31 20:50:56.197 UTC [orderer.common.cluster] updateStubInMapping -> INFO 68c Allocating a new stub for node 2 with endpoint of orderer1.example.com:7050 for channel businesschannel" +"2020-08-31 20:50:56.197 UTC [orderer.common.cluster] updateStubInMapping -> INFO 68d Deactivating node 2 in channel businesschannel with endpoint of orderer1.example.com:7050 due to TLS certificate change" +"2020-08-31 20:50:56.197 UTC [orderer.common.cluster] func1 -> DEBU 68e Connecting to ID: 2, +Endpoint: orderer1.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICXTCCAgOgAwIBAgIRAO222dQWXYU8/n7mzmMhUVwwCgYIKoZIzj0EAwIwbDEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRowGAYDVQQDExF0bHNjYS5l +eGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMFkxCzAJ +BgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJh +bmNpc2NvMR0wGwYDVQQDExRvcmRlcmVyMS5leGFtcGxlLmNvbTBZMBMGByqGSM49 +AgEGCCqGSM49AwEHA0IABFfIAxI8OnFM/STHbOgF8skKG7z42EKXdFA+JULQh+x2 +siuMd9adAa6FbusTm2ZIVcdQ+0BVPMD7Isw3GF7gWCGjgZgwgZUwDgYDVR0PAQH/ +BAQDAgWgMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8E +AjAAMCsGA1UdIwQkMCKAIM7PbzesUsW6ZRvp/9DvDBIwTVnQxfu2obdEPu4H4rqc +MCkGA1UdEQQiMCCCFG9yZGVyZXIxLmV4YW1wbGUuY29tgghvcmRlcmVyMTAKBggq +hkjOPQQDAgNIADBFAiEAheIH65PmqKRO76/nilMSjYv9Lzsem4fiQmvka2foEqsC +IG78w8BeZGAGHpd8HTn6VYBMh3796+0dXwRZSD5ZypA7 +-----END CERTIFICATE----- + for channel businesschannel" +"2020-08-31 20:50:56.197 UTC [orderer.common.cluster] updateStubInMapping -> INFO 68f Allocating a new stub for node 3 with endpoint of orderer2.example.com:7050 for channel businesschannel" +"2020-08-31 20:50:56.197 UTC [orderer.common.cluster] updateStubInMapping -> INFO 690 Deactivating node 3 in channel businesschannel with endpoint of orderer2.example.com:7050 due to TLS certificate change" +"2020-08-31 20:50:56.198 UTC [orderer.common.cluster] func1 -> DEBU 691 Connecting to ID: 3, +Endpoint: orderer2.example.com:7050, +ServerTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- +, ClientTLSCert:-----BEGIN CERTIFICATE----- +MIICWzCCAgKgAwIBAgIQS/K7ckX3XbfrDhfzQkVQtTAKBggqhkjOPQQDAjBsMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xGjAYBgNVBAMTEXRsc2NhLmV4 +YW1wbGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowWTELMAkG +A1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFu +Y2lzY28xHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0C +AQYIKoZIzj0DAQcDQgAEYtBpInxRHztfMS6QWwA8TdBwNR/oikWEj3qbLWeQX/cR +f0SmwBRFeMi4PNpWs1+dnqQXHeKOnUiRrhxe1BK2zqOBmDCBlTAOBgNVHQ8BAf8E +BAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQC +MAAwKwYDVR0jBCQwIoAgzs9vN6xSxbplG+n/0O8MEjBNWdDF+7aht0Q+7gfiupww +KQYDVR0RBCIwIIIUb3JkZXJlcjIuZXhhbXBsZS5jb22CCG9yZGVyZXIyMAoGCCqG +SM49BAMCA0cAMEQCIFPZLNYSCNZ5pJp06qE8MeU28B8tilsvIuPusfQVdK8XAiAT +JegFXN+iBZTyphxi4GilcGxYA1CXeJXFKhatFEKceg== +-----END CERTIFICATE----- + for channel businesschannel" +"2020-08-31 20:50:56.198 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 692 2 exists in both old and new membership for channel businesschannel , skipping its deactivation" +"2020-08-31 20:50:56.198 UTC [orderer.common.cluster] applyMembershipConfig -> INFO 693 3 exists in both old and new membership for channel businesschannel , skipping its deactivation" +"2020-08-31 20:50:56.198 UTC [orderer.common.cluster] Configure -> INFO 694 Exiting" +"2020-08-31 20:50:56.198 UTC [orderer.consensus.etcdraft] start -> DEBU 695 Starting raft node: #peers: 3" channel=businesschannel node=1 +"2020-08-31 20:50:56.198 UTC [orderer.consensus.etcdraft] start -> INFO 696 Starting raft node as part of a new channel" channel=businesschannel node=1 +"2020-08-31 20:50:56.198 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 697 1 became follower at term 0" channel=businesschannel node=1 +"2020-08-31 20:50:56.198 UTC [orderer.consensus.etcdraft] newRaft -> INFO 698 newRaft 1 [peers: [], term: 0, commit: 0, applied: 0, lastindex: 0, lastterm: 0]" channel=businesschannel node=1 +"2020-08-31 20:50:56.198 UTC [orderer.consensus.etcdraft] becomeFollower -> INFO 699 1 became follower at term 1" channel=businesschannel node=1 +"2020-08-31 20:50:56.199 UTC [orderer.consensus.etcdraft] run -> INFO 69a This node is picked to start campaign" channel=businesschannel node=1 +"2020-08-31 20:50:56.199 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 69b [channel: testchainid] About to write block, setting its LAST_CONFIG to 0" +"2020-08-31 20:50:56.199 UTC [msp] GetDefaultSigningIdentity -> DEBU 69c Obtaining default signing identity" +"2020-08-31 20:50:56.200 UTC [msp] GetDefaultSigningIdentity -> DEBU 69d Obtaining default signing identity" +"2020-08-31 20:50:56.200 UTC [msp.identity] Sign -> DEBU 69e Sign: plaintext: 0A00120B0A090A03010203100418050A...7C65F39AE8B58335C29B6163B49750E3 " +"2020-08-31 20:50:56.200 UTC [msp.identity] Sign -> DEBU 69f Sign: digest: 409BDDC31A3181E4EE31C0AF30CCF0DD7C987E54114927C9968E1F751F9FE661 " +"2020-08-31 20:50:56.201 UTC [orderer.consensus.etcdraft] apply -> INFO 6a0 Applied config change to add node 1, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2020-08-31 20:50:56.201 UTC [orderer.consensus.etcdraft] apply -> INFO 6a1 Applied config change to add node 2, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2020-08-31 20:50:56.201 UTC [orderer.consensus.etcdraft] apply -> INFO 6a2 Applied config change to add node 3, current nodes in channel: [1 2 3]" channel=businesschannel node=1 +"2020-08-31 20:50:56.203 UTC [fsblkstorage] indexBlock -> DEBU 6a3 Indexing block [blockNum=1, blockHash=[]byte{0xfb, 0xa7, 0xa, 0x71, 0x21, 0x62, 0xcb, 0x58, 0xf3, 0xa3, 0x94, 0xf0, 0x6c, 0x9d, 0xec, 0x84, 0x5a, 0x3b, 0x7c, 0x76, 0xf2, 0x9c, 0x2d, 0xb2, 0xe3, 0xae, 0x89, 0x4e, 0x6c, 0x48, 0xc, 0xae} txOffsets= +txId=207ed8b1e6ee8f7547b19b18954ae7d1f0d7a1b238b7fa2e23a4bff66b838f66 locPointer=offset=71, bytesLength=29384 +]" +"2020-08-31 20:50:56.205 UTC [fsblkstorage] updateCheckpoint -> DEBU 6a4 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[53341], isChainEmpty=[false], lastBlockNumber=[1]" +"2020-08-31 20:50:56.205 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 6a5 [channel: testchainid] Wrote block [1]" +"2020-08-31 20:50:56.357 UTC [common.deliver] deliverBlocks -> WARN 6a6 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:50716 because of consenter error" +"2020-08-31 20:50:56.358 UTC [orderer.common.server] func1 -> DEBU 6a7 Closing Deliver stream" +"2020-08-31 20:50:56.359 UTC [comm.grpc.server] 1 -> INFO 6a8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50716 grpc.code=OK grpc.call_duration=210.8024ms +"2020-08-31 20:50:56.380 UTC [orderer.common.server] Deliver -> DEBU 6a9 Starting new Deliver handler" +"2020-08-31 20:50:56.380 UTC [common.deliver] Handle -> DEBU 6aa Starting new deliver loop for 172.18.0.9:50718" +"2020-08-31 20:50:56.380 UTC [common.deliver] Handle -> DEBU 6ab Attempting to read seek info message from 172.18.0.9:50718" +"2020-08-31 20:50:56.408 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ac Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:56.409 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ad Sending msg of 28 bytes to 3 on channel testchainid took 22.1µs" +"2020-08-31 20:50:56.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ae Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 452µs " +"2020-08-31 20:50:56.587 UTC [common.deliver] deliverBlocks -> WARN 6af [channel: businesschannel] Rejecting deliver request for 172.18.0.9:50718 because of consenter error" +"2020-08-31 20:50:56.587 UTC [orderer.common.server] func1 -> DEBU 6b0 Closing Deliver stream" +"2020-08-31 20:50:56.587 UTC [comm.grpc.server] 1 -> INFO 6b1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50718 grpc.code=OK grpc.call_duration=207.4938ms +"2020-08-31 20:50:56.601 UTC [orderer.common.server] Deliver -> DEBU 6b2 Starting new Deliver handler" +"2020-08-31 20:50:56.601 UTC [common.deliver] Handle -> DEBU 6b3 Starting new deliver loop for 172.18.0.9:50720" +"2020-08-31 20:50:56.601 UTC [common.deliver] Handle -> DEBU 6b4 Attempting to read seek info message from 172.18.0.9:50720" +"2020-08-31 20:50:56.807 UTC [common.deliver] deliverBlocks -> WARN 6b5 [channel: businesschannel] Rejecting deliver request for 172.18.0.9:50720 because of consenter error" +"2020-08-31 20:50:56.808 UTC [orderer.common.server] func1 -> DEBU 6b6 Closing Deliver stream" +"2020-08-31 20:50:56.810 UTC [comm.grpc.server] 1 -> INFO 6b7 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50720 grpc.code=OK grpc.call_duration=211.0551ms +"2020-08-31 20:50:56.827 UTC [orderer.common.server] Deliver -> DEBU 6b8 Starting new Deliver handler" +"2020-08-31 20:50:56.828 UTC [common.deliver] Handle -> DEBU 6b9 Starting new deliver loop for 172.18.0.9:50722" +"2020-08-31 20:50:56.828 UTC [common.deliver] Handle -> DEBU 6ba Attempting to read seek info message from 172.18.0.9:50722" +"2020-08-31 20:50:56.914 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6bb Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:56.915 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6bc Sending msg of 28 bytes to 3 on channel testchainid took 25.2µs" +"2020-08-31 20:50:56.918 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6bd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 219.9µs " +"2020-08-31 20:50:57.035 UTC [common.deliver] deliverBlocks -> WARN 6be [channel: businesschannel] Rejecting deliver request for 172.18.0.9:50722 because of consenter error" +"2020-08-31 20:50:57.037 UTC [orderer.common.server] func1 -> DEBU 6bf Closing Deliver stream" +"2020-08-31 20:50:57.043 UTC [comm.grpc.server] 1 -> INFO 6c0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50722 grpc.code=OK grpc.call_duration=215.7913ms +"2020-08-31 20:50:57.057 UTC [orderer.common.server] Deliver -> DEBU 6c1 Starting new Deliver handler" +"2020-08-31 20:50:57.058 UTC [common.deliver] Handle -> DEBU 6c2 Starting new deliver loop for 172.18.0.9:50724" +"2020-08-31 20:50:57.058 UTC [common.deliver] Handle -> DEBU 6c3 Attempting to read seek info message from 172.18.0.9:50724" +"2020-08-31 20:50:57.200 UTC [orderer.consensus.etcdraft] Step -> INFO 6c4 1 is starting a new election at term 1" channel=businesschannel node=1 +"2020-08-31 20:50:57.202 UTC [orderer.consensus.etcdraft] becomePreCandidate -> INFO 6c5 1 became pre-candidate at term 1" channel=businesschannel node=1 +"2020-08-31 20:50:57.202 UTC [orderer.consensus.etcdraft] poll -> INFO 6c6 1 received MsgPreVoteResp from 1 at term 1" channel=businesschannel node=1 +"2020-08-31 20:50:57.203 UTC [orderer.consensus.etcdraft] campaign -> INFO 6c7 1 [logterm: 1, index: 3] sent MsgPreVote request to 3 at term 1" channel=businesschannel node=1 +"2020-08-31 20:50:57.203 UTC [orderer.consensus.etcdraft] campaign -> INFO 6c8 1 [logterm: 1, index: 3] sent MsgPreVote request to 2 at term 1" channel=businesschannel node=1 +"2020-08-31 20:50:57.204 UTC [orderer.common.cluster] NewStream -> DEBU 6c9 Created new stream to orderer2.example.com:7050 with ID of 1 and buffer size of 10" +"2020-08-31 20:50:57.205 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ca Sending msg of 28 bytes to 3 on channel businesschannel took 960.8µs" +"2020-08-31 20:50:57.205 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6cb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 142.4µs " +"2020-08-31 20:50:57.209 UTC [orderer.common.cluster] Step -> DEBU 6cc Connection from orderer2.example.com(172.18.0.2:58986)" +"2020-08-31 20:50:57.209 UTC [orderer.common.cluster] NewStream -> DEBU 6cd Created new stream to orderer1.example.com:7050 with ID of 1 and buffer size of 10" +"2020-08-31 20:50:57.210 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6cf Sending msg of 28 bytes to 2 on channel businesschannel took 4.5779ms" +"2020-08-31 20:50:57.209 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ce Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:50:57.211 UTC [orderer.consensus.etcdraft] poll -> INFO 6d0 1 received MsgPreVoteResp from 3 at term 1" channel=businesschannel node=1 +"2020-08-31 20:50:57.210 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6d1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.8µs " +"2020-08-31 20:50:57.211 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6d2 1 [quorum:2] has received 2 MsgPreVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +"2020-08-31 20:50:57.213 UTC [orderer.common.cluster] Step -> DEBU 6d3 Connection from orderer1.example.com(172.18.0.4:47136)" +"2020-08-31 20:50:57.213 UTC [orderer.consensus.etcdraft] becomeCandidate -> INFO 6d4 1 became candidate at term 2" channel=businesschannel node=1 +"2020-08-31 20:50:57.213 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6d5 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:50:57.213 UTC [orderer.consensus.etcdraft] poll -> INFO 6d6 1 received MsgVoteResp from 1 at term 2" channel=businesschannel node=1 +"2020-08-31 20:50:57.214 UTC [orderer.consensus.etcdraft] campaign -> INFO 6d7 1 [logterm: 1, index: 3] sent MsgVote request to 2 at term 2" channel=businesschannel node=1 +"2020-08-31 20:50:57.215 UTC [orderer.consensus.etcdraft] campaign -> INFO 6d8 1 [logterm: 1, index: 3] sent MsgVote request to 3 at term 2" channel=businesschannel node=1 +"2020-08-31 20:50:57.217 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6d9 Sending msg of 28 bytes to 2 on channel businesschannel took 22.1µs" +"2020-08-31 20:50:57.218 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6da Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 210.8µs " +"2020-08-31 20:50:57.220 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6db Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:50:57.221 UTC [orderer.consensus.etcdraft] poll -> INFO 6dc 1 received MsgVoteResp from 2 at term 2" channel=businesschannel node=1 +"2020-08-31 20:50:57.221 UTC [orderer.consensus.etcdraft] stepCandidate -> INFO 6dd 1 [quorum:2] has received 2 MsgVoteResp votes and 0 vote rejections" channel=businesschannel node=1 +"2020-08-31 20:50:57.221 UTC [orderer.consensus.etcdraft] becomeLeader -> INFO 6de 1 became leader at term 2" channel=businesschannel node=1 +"2020-08-31 20:50:57.222 UTC [orderer.consensus.etcdraft] run -> INFO 6df raft.node: 1 elected leader 1 at term 2" channel=businesschannel node=1 +"2020-08-31 20:50:57.222 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e0 Sending msg of 28 bytes to 3 on channel businesschannel took 30µs" +"2020-08-31 20:50:57.223 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 517.2µs " +"2020-08-31 20:50:57.226 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:50:57.227 UTC [orderer.consensus.etcdraft] run -> INFO 6e3 Leader 1 is present, quit campaign" channel=businesschannel node=1 +"2020-08-31 20:50:57.227 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e5 Sending msg of 36 bytes to 3 on channel businesschannel took 12.9µs" +"2020-08-31 20:50:57.227 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6e4 Raft leader changed: 0 -> 1" channel=businesschannel node=1 +"2020-08-31 20:50:57.228 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 6e7 There are in flight blocks, new leader should not serve requests" channel=businesschannel node=1 +"2020-08-31 20:50:57.227 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6e6 Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer2.example.com(orderer2.example.com:7050) took 86.7µs " +"2020-08-31 20:50:57.229 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6e8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:50:57.230 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6e9 Sending msg of 36 bytes to 2 on channel businesschannel took 112.6µs" +"2020-08-31 20:50:57.230 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ea Send of ConsensusRequest for channel businesschannel with payload of size 36 to orderer1.example.com(orderer1.example.com:7050) took 60.1µs " +"2020-08-31 20:50:57.233 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6eb Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:50:57.234 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 6ec Start accepting requests as Raft leader at block [0]" channel=businesschannel node=1 +"2020-08-31 20:50:57.237 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6ed Sending msg of 28 bytes to 3 on channel businesschannel took 2.0669ms" +"2020-08-31 20:50:57.238 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 288.2µs " +"2020-08-31 20:50:57.239 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6ef Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:50:57.240 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 6f0 Sending msg of 28 bytes to 2 on channel businesschannel took 343.5µs" +"2020-08-31 20:50:57.241 UTC [orderer.common.cluster.step] sendMessage -> DEBU 6f1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.2µs " +"2020-08-31 20:50:57.242 UTC [orderer.common.cluster.step] handleMessage -> DEBU 6f2 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:50:57.262 UTC [policies] Evaluate -> DEBU 6f3 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:50:57.262 UTC [policies] Evaluate -> DEBU 6f4 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:50:57.262 UTC [policies] Evaluate -> DEBU 6f5 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:50:57.262 UTC [policies] Evaluate -> DEBU 6f6 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:50:57.263 UTC [policies] Evaluate -> DEBU 6f7 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:50:57.263 UTC [msp] DeserializeIdentity -> DEBU 6f8 Obtaining identity" +"2020-08-31 20:50:57.263 UTC [msp.identity] newIdentity -> DEBU 6f9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE-----" +"2020-08-31 20:50:57.264 UTC [cauthdsl] func1 -> DEBU 6fa 0xc000d36e30 gate 1598907057264748800 evaluation starts" +"2020-08-31 20:50:57.264 UTC [cauthdsl] func2 -> DEBU 6fb 0xc000d36e30 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:50:57.264 UTC [cauthdsl] func2 -> DEBU 6fc 0xc000d36e30 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:50:57.265 UTC [cauthdsl] func2 -> DEBU 6fd 0xc000d36e30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2020-08-31 20:50:57.265 UTC [cauthdsl] func2 -> DEBU 6fe 0xc000d36e30 principal evaluation fails" +"2020-08-31 20:50:57.265 UTC [cauthdsl] func1 -> DEBU 6ff 0xc000d36e30 gate 1598907057264748800 evaluation fails" +"2020-08-31 20:50:57.265 UTC [policies] Evaluate -> DEBU 700 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:50:57.265 UTC [policies] Evaluate -> DEBU 701 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:50:57.265 UTC [policies] func1 -> DEBU 702 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +"2020-08-31 20:50:57.265 UTC [policies] Evaluate -> DEBU 703 Signature set did not satisfy policy /Channel/Orderer/Readers" +"2020-08-31 20:50:57.265 UTC [policies] Evaluate -> DEBU 704 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:50:57.265 UTC [policies] Evaluate -> DEBU 705 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-08-31 20:50:57.265 UTC [policies] Evaluate -> DEBU 706 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:50:57.265 UTC [policies] Evaluate -> DEBU 707 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-08-31 20:50:57.265 UTC [cauthdsl] func1 -> DEBU 708 0xc0009bc610 gate 1598907057265712800 evaluation starts" +"2020-08-31 20:50:57.265 UTC [cauthdsl] func2 -> DEBU 709 0xc0009bc610 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:50:57.265 UTC [cauthdsl] func2 -> DEBU 70a 0xc0009bc610 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:50:57.265 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 70b Checking if identity satisfies MEMBER role for Org1MSP" +"2020-08-31 20:50:57.266 UTC [msp] Validate -> DEBU 70c MSP Org1MSP validating identity" +"2020-08-31 20:50:57.266 UTC [msp] getCertificationChain -> DEBU 70d MSP Org1MSP getting certification chain" +"2020-08-31 20:50:57.266 UTC [cauthdsl] func2 -> DEBU 70e 0xc0009bc610 principal matched by identity 0" +"2020-08-31 20:50:57.266 UTC [msp.identity] Verify -> DEBU 70f Verify: digest = 00000000 1d ae 3a ec b1 17 dc 5e fb 9e 21 31 73 0c cb 89 |..:....^..!1s...| +00000010 9c 11 c1 83 64 ed 6b 4c a3 d2 49 dd 6e bf 49 51 |....d.kL..I.n.IQ|" +"2020-08-31 20:50:57.266 UTC [msp.identity] Verify -> DEBU 710 Verify: sig = 00000000 30 44 02 20 67 bc bc 8a 4b 06 00 73 ce 2b 3b 84 |0D. g...K..s.+;.| +00000010 5f 2f d1 ed 4c 8f 3f bf 73 c7 01 85 99 79 6e ca |_/..L.?.s....yn.| +00000020 a2 2b b6 34 02 20 39 b5 72 bc ae 7f 3a e5 97 7d |.+.4. 9.r...:..}| +00000030 72 f4 cc 46 bb ef 29 b7 5b 98 7e 79 20 2a 26 b5 |r..F..).[.~y *&.| +00000040 92 da d1 a7 27 ca |....'.|" +"2020-08-31 20:50:57.267 UTC [cauthdsl] func2 -> DEBU 711 0xc0009bc610 principal evaluation succeeds for identity 0" +"2020-08-31 20:50:57.267 UTC [cauthdsl] func1 -> DEBU 712 0xc0009bc610 gate 1598907057265712800 evaluation succeeds" +"2020-08-31 20:50:57.267 UTC [policies] Evaluate -> DEBU 713 Signature set satisfies policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:50:57.267 UTC [policies] Evaluate -> DEBU 714 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:50:57.267 UTC [policies] Evaluate -> DEBU 715 Signature set satisfies policy /Channel/Application/Readers" +"2020-08-31 20:50:57.267 UTC [policies] Evaluate -> DEBU 716 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-08-31 20:50:57.267 UTC [policies] Evaluate -> DEBU 717 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:50:57.267 UTC [policies] Evaluate -> DEBU 718 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:50:57.267 UTC [common.deliver] deliverBlocks -> DEBU 719 [channel: businesschannel] Received seekInfo (0xc000cae180) start: > stop: > from 172.18.0.9:50724" +"2020-08-31 20:50:57.267 UTC [fsblkstorage] Next -> DEBU 71a Initializing block stream for iterator. itr.maxBlockNumAvailable=0" +"2020-08-31 20:50:57.267 UTC [fsblkstorage] newBlockfileStream -> DEBU 71b newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2020-08-31 20:50:57.267 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 71c Remaining bytes=[28475], Going to peek [8] bytes" +"2020-08-31 20:50:57.268 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 71d Returning blockbytes - length=[28472], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-08-31 20:50:57.268 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 71e blockbytes [28472] read from file [0]" +"2020-08-31 20:50:57.268 UTC [common.deliver] deliverBlocks -> DEBU 71f [channel: businesschannel] Delivering block [0] for (0xc000cae180) for 172.18.0.9:50724" +"2020-08-31 20:50:57.268 UTC [common.deliver] deliverBlocks -> DEBU 720 [channel: businesschannel] Done delivering to 172.18.0.9:50724 for (0xc000cae180)" +"2020-08-31 20:50:57.268 UTC [common.deliver] Handle -> DEBU 721 Waiting for new SeekInfo from 172.18.0.9:50724" +"2020-08-31 20:50:57.268 UTC [common.deliver] Handle -> DEBU 722 Attempting to read seek info message from 172.18.0.9:50724" +"2020-08-31 20:50:57.271 UTC [common.deliver] Handle -> DEBU 723 Received EOF from 172.18.0.9:50724, hangup" +"2020-08-31 20:50:57.271 UTC [orderer.common.server] func1 -> DEBU 724 Closing Deliver stream" +"2020-08-31 20:50:57.271 UTC [comm.grpc.server] 1 -> INFO 725 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50724 grpc.code=OK grpc.call_duration=213.8387ms +"2020-08-31 20:50:57.272 UTC [grpc] infof -> DEBU 726 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:50:57.273 UTC [grpc] infof -> DEBU 727 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:50:57.273 UTC [grpc] infof -> DEBU 728 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:50:57.273 UTC [grpc] warningf -> DEBU 729 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:50724: read: connection reset by peer" +"2020-08-31 20:50:57.273 UTC [grpc] infof -> DEBU 72a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:50:57.273 UTC [grpc] infof -> DEBU 72b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:50:57.273 UTC [grpc] infof -> DEBU 72c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:50:57.273 UTC [grpc] infof -> DEBU 72d transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:50:57.410 UTC [orderer.common.cluster.step] handleMessage -> DEBU 72e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:57.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 72f Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +"2020-08-31 20:50:57.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 730 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " +"2020-08-31 20:50:57.700 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 731 Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +"2020-08-31 20:50:57.700 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 732 Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +"2020-08-31 20:50:57.700 UTC [orderer.common.cluster.step] sendMessage -> DEBU 733 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.2µs " +"2020-08-31 20:50:57.700 UTC [orderer.common.cluster.step] sendMessage -> DEBU 734 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 49.4µs " +"2020-08-31 20:50:57.701 UTC [orderer.common.cluster.step] handleMessage -> DEBU 735 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:50:57.702 UTC [orderer.common.cluster.step] handleMessage -> DEBU 736 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:50:57.910 UTC [orderer.common.cluster.step] handleMessage -> DEBU 737 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:57.911 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 738 Sending msg of 28 bytes to 3 on channel testchainid took 30.1µs" +"2020-08-31 20:50:57.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU 739 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 129.2µs " +"2020-08-31 20:50:58.199 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 73a Sending msg of 28 bytes to 3 on channel businesschannel took 20.7µs" +"2020-08-31 20:50:58.199 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 73b Sending msg of 28 bytes to 2 on channel businesschannel took 8.3µs" +"2020-08-31 20:50:58.200 UTC [orderer.common.cluster.step] sendMessage -> DEBU 73c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.9µs " +"2020-08-31 20:50:58.200 UTC [orderer.common.cluster.step] sendMessage -> DEBU 73d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.3µs " +"2020-08-31 20:50:58.202 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73e Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:50:58.202 UTC [orderer.common.cluster.step] handleMessage -> DEBU 73f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:50:58.409 UTC [orderer.common.cluster.step] handleMessage -> DEBU 740 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:58.410 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 741 Sending msg of 28 bytes to 3 on channel testchainid took 148.9µs" +"2020-08-31 20:50:58.410 UTC [orderer.common.cluster.step] sendMessage -> DEBU 742 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 319.3µs " +"2020-08-31 20:50:58.699 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 743 Sending msg of 28 bytes to 2 on channel businesschannel took 19.1µs" +"2020-08-31 20:50:58.699 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 744 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +"2020-08-31 20:50:58.699 UTC [orderer.common.cluster.step] sendMessage -> DEBU 745 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.7µs " +"2020-08-31 20:50:58.699 UTC [orderer.common.cluster.step] sendMessage -> DEBU 746 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.4µs " +"2020-08-31 20:50:58.700 UTC [orderer.common.cluster.step] handleMessage -> DEBU 747 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:50:58.701 UTC [orderer.common.cluster.step] handleMessage -> DEBU 748 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:50:58.909 UTC [orderer.common.cluster.step] handleMessage -> DEBU 749 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:58.909 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 74a Sending msg of 28 bytes to 3 on channel testchainid took 176.2µs" +"2020-08-31 20:50:58.909 UTC [orderer.common.cluster.step] sendMessage -> DEBU 74b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 166.4µs " +"2020-08-31 20:50:59.199 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 74c Sending msg of 28 bytes to 3 on channel businesschannel took 19.4µs" +"2020-08-31 20:50:59.200 UTC [orderer.common.cluster.step] sendMessage -> DEBU 74d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 117.2µs " +"2020-08-31 20:50:59.201 UTC [orderer.common.cluster.step] handleMessage -> DEBU 751 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:50:59.201 UTC [orderer.common.cluster.step] handleMessage -> DEBU 74e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:50:59.201 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 74f Sending msg of 28 bytes to 2 on channel businesschannel took 14.8µs" +"2020-08-31 20:50:59.201 UTC [orderer.common.cluster.step] sendMessage -> DEBU 750 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.6µs " +"2020-08-31 20:50:59.409 UTC [orderer.common.cluster.step] handleMessage -> DEBU 752 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:59.409 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 753 Sending msg of 28 bytes to 3 on channel testchainid took 10.4µs" +"2020-08-31 20:50:59.409 UTC [orderer.common.cluster.step] sendMessage -> DEBU 754 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.6µs " +"2020-08-31 20:50:59.699 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 755 Sending msg of 28 bytes to 2 on channel businesschannel took 15.9µs" +"2020-08-31 20:50:59.699 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 756 Sending msg of 28 bytes to 3 on channel businesschannel took 11.3µs" +"2020-08-31 20:50:59.700 UTC [orderer.common.cluster.step] sendMessage -> DEBU 757 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 66.6µs " +"2020-08-31 20:50:59.700 UTC [orderer.common.cluster.step] sendMessage -> DEBU 758 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 46.6µs " +"2020-08-31 20:50:59.700 UTC [orderer.common.cluster.step] handleMessage -> DEBU 759 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:50:59.701 UTC [orderer.common.cluster.step] handleMessage -> DEBU 75a Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:50:59.908 UTC [orderer.common.cluster.step] handleMessage -> DEBU 75b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:50:59.909 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 75c Sending msg of 28 bytes to 3 on channel testchainid took 72.5µs" +"2020-08-31 20:50:59.909 UTC [orderer.common.cluster.step] sendMessage -> DEBU 75d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 48.8µs " +"2020-08-31 20:51:00.199 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 75e Sending msg of 28 bytes to 2 on channel businesschannel took 26µs" +"2020-08-31 20:51:00.199 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 75f Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +"2020-08-31 20:51:00.199 UTC [orderer.common.cluster.step] sendMessage -> DEBU 760 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.9µs " +"2020-08-31 20:51:00.200 UTC [orderer.common.cluster.step] sendMessage -> DEBU 761 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 41.3µs " +"2020-08-31 20:51:00.200 UTC [orderer.common.cluster.step] handleMessage -> DEBU 762 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:00.201 UTC [orderer.common.cluster.step] handleMessage -> DEBU 763 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:00.408 UTC [orderer.common.cluster.step] handleMessage -> DEBU 764 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:00.408 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 765 Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +"2020-08-31 20:51:00.408 UTC [orderer.common.cluster.step] sendMessage -> DEBU 766 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.1µs " +"2020-08-31 20:51:00.699 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 767 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +"2020-08-31 20:51:00.700 UTC [orderer.common.cluster.step] sendMessage -> DEBU 768 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 393.6µs " +"2020-08-31 20:51:00.700 UTC [orderer.common.cluster.step] sendMessage -> DEBU 769 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 84.8µs " +"2020-08-31 20:51:00.701 UTC [orderer.common.cluster.step] handleMessage -> DEBU 76a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:00.702 UTC [orderer.common.cluster.step] handleMessage -> DEBU 76b Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:00.700 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 76c Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +"2020-08-31 20:51:00.752 UTC [orderer.common.server] Deliver -> DEBU 76d Starting new Deliver handler" +"2020-08-31 20:51:00.752 UTC [common.deliver] Handle -> DEBU 76e Starting new deliver loop for 172.18.0.9:50750" +"2020-08-31 20:51:00.752 UTC [common.deliver] Handle -> DEBU 76f Attempting to read seek info message from 172.18.0.9:50750" +"2020-08-31 20:51:00.770 UTC [orderer.common.server] Broadcast -> DEBU 770 Starting new Broadcast handler" +"2020-08-31 20:51:00.770 UTC [orderer.common.broadcast] Handle -> DEBU 771 Starting new broadcast loop for 172.18.0.9:50752" +"2020-08-31 20:51:00.770 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 772 [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:50752" +"2020-08-31 20:51:00.770 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 773 Processing config update message for exisitng channel businesschannel" +"2020-08-31 20:51:00.771 UTC [policies] Evaluate -> DEBU 774 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-08-31 20:51:00.771 UTC [policies] Evaluate -> DEBU 775 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:51:00.771 UTC [policies] Evaluate -> DEBU 776 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-08-31 20:51:00.771 UTC [policies] Evaluate -> DEBU 777 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:51:00.771 UTC [policies] Evaluate -> DEBU 778 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-08-31 20:51:00.771 UTC [cauthdsl] func1 -> DEBU 779 0xc000d6dcf0 gate 1598907060771461500 evaluation starts" +"2020-08-31 20:51:00.771 UTC [cauthdsl] func2 -> DEBU 77a 0xc000d6dcf0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:51:00.771 UTC [cauthdsl] func2 -> DEBU 77b 0xc000d6dcf0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:51:00.771 UTC [cauthdsl] func2 -> DEBU 77c 0xc000d6dcf0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2020-08-31 20:51:00.772 UTC [cauthdsl] func2 -> DEBU 77d 0xc000d6dcf0 principal evaluation fails" +"2020-08-31 20:51:00.772 UTC [cauthdsl] func1 -> DEBU 77e 0xc000d6dcf0 gate 1598907060771461500 evaluation fails" +"2020-08-31 20:51:00.772 UTC [policies] Evaluate -> DEBU 77f Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:51:00.772 UTC [policies] Evaluate -> DEBU 780 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:51:00.772 UTC [policies] func1 -> DEBU 781 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2020-08-31 20:51:00.772 UTC [policies] Evaluate -> DEBU 782 Signature set did not satisfy policy /Channel/Orderer/Writers" +"2020-08-31 20:51:00.772 UTC [policies] Evaluate -> DEBU 783 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-08-31 20:51:00.772 UTC [policies] Evaluate -> DEBU 784 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-08-31 20:51:00.772 UTC [policies] Evaluate -> DEBU 785 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:51:00.773 UTC [policies] Evaluate -> DEBU 786 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2020-08-31 20:51:00.773 UTC [cauthdsl] func1 -> DEBU 787 0xc000d429e0 gate 1598907060773172600 evaluation starts" +"2020-08-31 20:51:00.773 UTC [cauthdsl] func2 -> DEBU 788 0xc000d429e0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:51:00.773 UTC [cauthdsl] func2 -> DEBU 789 0xc000d429e0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:51:00.773 UTC [cauthdsl] func2 -> DEBU 78a 0xc000d429e0 principal matched by identity 0" +"2020-08-31 20:51:00.773 UTC [msp.identity] Verify -> DEBU 78b Verify: digest = 00000000 c2 9a 53 de cf 67 f1 04 05 0d ab ca 93 9b 27 4c |..S..g........'L| +00000010 dc 47 52 8b 97 67 45 4b 59 f3 df 86 cd 13 c0 a3 |.GR..gEKY.......|" +"2020-08-31 20:51:00.773 UTC [msp.identity] Verify -> DEBU 78c Verify: sig = 00000000 30 45 02 21 00 90 db 28 2b d6 45 48 84 10 6b 82 |0E.!...(+.EH..k.| +00000010 4f 41 c2 76 49 bc 6d c6 b7 94 67 f2 3b 9b 89 73 |OA.vI.m...g.;..s| +00000020 aa e4 bd c7 83 02 20 3c 65 c3 9d f6 09 6e 5d f9 |...... ..&..?|" +"2020-08-31 20:51:00.774 UTC [cauthdsl] func2 -> DEBU 78d 0xc000d429e0 principal evaluation succeeds for identity 0" +"2020-08-31 20:51:00.774 UTC [cauthdsl] func1 -> DEBU 78e 0xc000d429e0 gate 1598907060773172600 evaluation succeeds" +"2020-08-31 20:51:00.774 UTC [policies] Evaluate -> DEBU 78f Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:51:00.774 UTC [policies] Evaluate -> DEBU 790 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:51:00.774 UTC [policies] Evaluate -> DEBU 791 Signature set satisfies policy /Channel/Application/Writers" +"2020-08-31 20:51:00.774 UTC [policies] Evaluate -> DEBU 792 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-08-31 20:51:00.774 UTC [policies] Evaluate -> DEBU 793 Signature set satisfies policy /Channel/Writers" +"2020-08-31 20:51:00.774 UTC [policies] Evaluate -> DEBU 794 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-08-31 20:51:00.775 UTC [common.configtx] addToMap -> DEBU 795 Adding to config map: [Group] /Channel" +"2020-08-31 20:51:00.775 UTC [common.configtx] addToMap -> DEBU 796 Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:51:00.775 UTC [common.configtx] addToMap -> DEBU 797 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:51:00.775 UTC [common.configtx] addToMap -> DEBU 798 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-08-31 20:51:00.775 UTC [common.configtx] addToMap -> DEBU 799 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:51:00.775 UTC [common.configtx] addToMap -> DEBU 79a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:51:00.775 UTC [common.configtx] addToMap -> DEBU 79b Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:51:00.775 UTC [common.configtx] addToMap -> DEBU 79c Adding to config map: [Group] /Channel" +"2020-08-31 20:51:00.776 UTC [common.configtx] addToMap -> DEBU 79d Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:51:00.776 UTC [common.configtx] addToMap -> DEBU 79e Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:51:00.776 UTC [common.configtx] addToMap -> DEBU 79f Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-08-31 20:51:00.776 UTC [common.configtx] addToMap -> DEBU 7a0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-08-31 20:51:00.776 UTC [common.configtx] addToMap -> DEBU 7a1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:51:00.776 UTC [common.configtx] addToMap -> DEBU 7a2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:51:00.776 UTC [common.configtx] addToMap -> DEBU 7a3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:51:00.777 UTC [common.configtx] verifyDeltaSet -> DEBU 7a4 Processing change to key: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:51:00.777 UTC [common.configtx] policyForItem -> DEBU 7a5 Getting policy for item Org1MSP with mod_policy Admins" +"2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7a6 Manager Channel looking up path [Application]" +"2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7a7 Manager Channel has managers Orderer" +"2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7a8 Manager Channel has managers Application" +"2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7a9 Manager Channel/Application looking up path []" +"2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7aa Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7ab Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7ac Manager Channel/Application looking up path [Org1MSP]" +"2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7ad Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7ae Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:51:00.777 UTC [policies] Manager -> DEBU 7af Manager Channel/Application/Org1MSP looking up path []" +"2020-08-31 20:51:00.777 UTC [policies] Evaluate -> DEBU 7b0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2020-08-31 20:51:00.777 UTC [cauthdsl] func1 -> DEBU 7b1 0xc000d2d570 gate 1598907060777544800 evaluation starts" +"2020-08-31 20:51:00.777 UTC [cauthdsl] func2 -> DEBU 7b2 0xc000d2d570 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:51:00.777 UTC [cauthdsl] func2 -> DEBU 7b3 0xc000d2d570 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:51:00.777 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 7b4 Checking if identity has been named explicitly as an admin for Org1MSP" +"2020-08-31 20:51:00.777 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 7b5 Checking if identity carries the admin ou for Org1MSP" +"2020-08-31 20:51:00.777 UTC [msp] Validate -> DEBU 7b6 MSP Org1MSP validating identity" +"2020-08-31 20:51:00.779 UTC [msp] getCertificationChain -> DEBU 7b7 MSP Org1MSP getting certification chain" +"2020-08-31 20:51:00.779 UTC [msp] hasOURole -> DEBU 7b8 MSP Org1MSP checking if the identity is a client" +"2020-08-31 20:51:00.779 UTC [msp] getCertificationChain -> DEBU 7b9 MSP Org1MSP getting certification chain" +"2020-08-31 20:51:00.780 UTC [cauthdsl] func2 -> DEBU 7ba 0xc000d2d570 principal matched by identity 0" +"2020-08-31 20:51:00.780 UTC [msp.identity] Verify -> DEBU 7bb Verify: digest = 00000000 0a 6a 5e 90 37 00 25 29 cc 2f 3d ec 44 8f 23 98 |.j^.7.%)./=.D.#.| +00000010 40 21 8f 78 1d c2 88 4f 31 16 8b 9b 25 00 fb 20 |@!.x...O1...%.. |" +"2020-08-31 20:51:00.780 UTC [msp.identity] Verify -> DEBU 7bc Verify: sig = 00000000 30 44 02 20 0d d5 10 d0 47 15 e1 14 bb 9f dc b9 |0D. ....G.......| +00000010 21 20 fe 43 aa a5 85 eb 20 91 d3 d3 25 c3 40 6f |! .C.... ...%.@o| +00000020 be ec 7e 52 02 20 3f 97 e3 ab d5 5a 98 c6 78 08 |..~R. ?....Z..x.| +00000030 e3 1a 1c 9b 18 c4 79 e9 08 26 b7 2a 98 01 0e 55 |......y..&.*...U| +00000040 0c af 35 37 61 76 |..57av|" +"2020-08-31 20:51:00.780 UTC [cauthdsl] func2 -> DEBU 7bd 0xc000d2d570 principal evaluation succeeds for identity 0" +"2020-08-31 20:51:00.780 UTC [cauthdsl] func1 -> DEBU 7be 0xc000d2d570 gate 1598907060777544800 evaluation succeeds" +"2020-08-31 20:51:00.780 UTC [policies] Evaluate -> DEBU 7bf Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:51:00.780 UTC [policies] Evaluate -> DEBU 7c0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:51:00.781 UTC [common.configtx] verifyDeltaSet -> DEBU 7c1 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-08-31 20:51:00.781 UTC [common.configtx] recurseConfigMap -> DEBU 7c2 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.781 UTC [common.configtx] recurseConfigMap -> DEBU 7c3 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.781 UTC [common.configtx] recurseConfigMap -> DEBU 7c4 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.781 UTC [common.configtx] recurseConfigMap -> DEBU 7c5 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.781 UTC [common.configtx] recurseConfigMap -> DEBU 7c6 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.781 UTC [common.configtx] recurseConfigMap -> DEBU 7c7 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.781 UTC [common.configtx] recurseConfigMap -> DEBU 7c8 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7c9 Setting policy for key Admins to " +"2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7ca Setting policy for key Readers to " +"2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7cb Setting policy for key Writers to " +"2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7cc Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7cd Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7ce Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7cf Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7d0 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7d1 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7d2 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7d3 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7d4 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.782 UTC [common.configtx] recurseConfigMap -> DEBU 7d5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.783 UTC [common.configtx] recurseConfigMap -> DEBU 7d6 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.783 UTC [common.configtx] recurseConfigMap -> DEBU 7d7 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.783 UTC [common.channelconfig] NewStandardValues -> DEBU 7d8 Initializing protos for *channelconfig.ChannelProtos" +"2020-08-31 20:51:00.783 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7d9 Processing field: HashingAlgorithm" +"2020-08-31 20:51:00.783 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7da Processing field: BlockDataHashingStructure" +"2020-08-31 20:51:00.783 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7db Processing field: OrdererAddresses" +"2020-08-31 20:51:00.783 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7dc Processing field: Consortium" +"2020-08-31 20:51:00.783 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7dd Processing field: Capabilities" +"2020-08-31 20:51:00.783 UTC [common.channelconfig] NewStandardValues -> DEBU 7de Initializing protos for *channelconfig.OrdererProtos" +"2020-08-31 20:51:00.783 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7df Processing field: ConsensusType" +"2020-08-31 20:51:00.783 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e0 Processing field: BatchSize" +"2020-08-31 20:51:00.784 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e1 Processing field: BatchTimeout" +"2020-08-31 20:51:00.784 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e2 Processing field: KafkaBrokers" +"2020-08-31 20:51:00.784 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e3 Processing field: ChannelRestrictions" +"2020-08-31 20:51:00.784 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e4 Processing field: Capabilities" +"2020-08-31 20:51:00.784 UTC [common.channelconfig] NewStandardValues -> DEBU 7e5 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-08-31 20:51:00.785 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e6 Processing field: Endpoints" +"2020-08-31 20:51:00.785 UTC [common.channelconfig] NewStandardValues -> DEBU 7e7 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:51:00.785 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7e8 Processing field: MSP" +"2020-08-31 20:51:00.785 UTC [common.channelconfig] validateMSP -> DEBU 7e9 Setting up MSP for org OrdererOrg" +"2020-08-31 20:51:00.785 UTC [msp] newBccspMsp -> DEBU 7ea Creating BCCSP-based MSP instance" +"2020-08-31 20:51:00.786 UTC [msp] New -> DEBU 7eb Creating Cache-MSP instance" +"2020-08-31 20:51:00.786 UTC [msp] Setup -> DEBU 7ec Setting up MSP instance OrdererMSP" +"2020-08-31 20:51:00.787 UTC [msp.identity] newIdentity -> DEBU 7ed Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:51:00.787 UTC [common.channelconfig] NewStandardValues -> DEBU 7ee Initializing protos for *channelconfig.ApplicationProtos" +"2020-08-31 20:51:00.788 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7ef Processing field: ACLs" +"2020-08-31 20:51:00.788 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f0 Processing field: Capabilities" +"2020-08-31 20:51:00.788 UTC [common.channelconfig] NewStandardValues -> DEBU 7f1 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:51:00.789 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f2 Processing field: AnchorPeers" +"2020-08-31 20:51:00.789 UTC [common.channelconfig] NewStandardValues -> DEBU 7f3 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:51:00.789 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7f4 Processing field: MSP" +"2020-08-31 20:51:00.790 UTC [common.channelconfig] Validate -> DEBU 7f5 Anchor peers for org Org1MSP are anchor_peers: " +"2020-08-31 20:51:00.790 UTC [common.channelconfig] validateMSP -> DEBU 7f6 Setting up MSP for org Org1MSP" +"2020-08-31 20:51:00.790 UTC [msp] newBccspMsp -> DEBU 7f7 Creating BCCSP-based MSP instance" +"2020-08-31 20:51:00.791 UTC [msp] New -> DEBU 7f8 Creating Cache-MSP instance" +"2020-08-31 20:51:00.791 UTC [msp] Setup -> DEBU 7f9 Setting up MSP instance Org1MSP" +"2020-08-31 20:51:00.792 UTC [msp.identity] newIdentity -> DEBU 7fa Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-08-31 20:51:00.793 UTC [common.channelconfig] NewStandardValues -> DEBU 7fb Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:51:00.793 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7fc Processing field: AnchorPeers" +"2020-08-31 20:51:00.793 UTC [common.channelconfig] NewStandardValues -> DEBU 7fd Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:51:00.793 UTC [common.channelconfig] initializeProtosStruct -> DEBU 7fe Processing field: MSP" +"2020-08-31 20:51:00.793 UTC [common.channelconfig] Validate -> DEBU 7ff Anchor peers for org Org2MSP are " +"2020-08-31 20:51:00.793 UTC [common.channelconfig] validateMSP -> DEBU 800 Setting up MSP for org Org2MSP" +"2020-08-31 20:51:00.794 UTC [msp] newBccspMsp -> DEBU 801 Creating BCCSP-based MSP instance" +"2020-08-31 20:51:00.794 UTC [msp] New -> DEBU 802 Creating Cache-MSP instance" +"2020-08-31 20:51:00.794 UTC [msp] Setup -> DEBU 803 Setting up MSP instance Org2MSP" +"2020-08-31 20:51:00.795 UTC [msp.identity] newIdentity -> DEBU 804 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-08-31 20:51:00.796 UTC [msp] Setup -> DEBU 805 Setting up the MSP manager (3 msps)" +"2020-08-31 20:51:00.796 UTC [msp] Setup -> DEBU 806 MSP manager setup complete, setup 3 msps" +"2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 807 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 808 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 809 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 80a Proposed new policy Readers for Channel/Orderer" +"2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 80b Proposed new policy Writers for Channel/Orderer" +"2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 80c Proposed new policy Admins for Channel/Orderer" +"2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 80d Proposed new policy BlockValidation for Channel/Orderer" +"2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 80e Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 80f Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 810 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 811 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 812 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-08-31 20:51:00.796 UTC [policies] NewManagerImpl -> DEBU 813 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-08-31 20:51:00.797 UTC [policies] NewManagerImpl -> DEBU 814 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-08-31 20:51:00.797 UTC [policies] NewManagerImpl -> DEBU 815 Proposed new policy Admins for Channel/Application" +"2020-08-31 20:51:00.797 UTC [policies] GetPolicy -> DEBU 816 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:51:00.797 UTC [policies] NewManagerImpl -> DEBU 817 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-08-31 20:51:00.798 UTC [policies] GetPolicy -> DEBU 818 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:51:00.798 UTC [policies] NewManagerImpl -> DEBU 819 Proposed new policy Endorsement for Channel/Application" +"2020-08-31 20:51:00.798 UTC [policies] NewManagerImpl -> DEBU 81a Proposed new policy Readers for Channel/Application" +"2020-08-31 20:51:00.798 UTC [policies] NewManagerImpl -> DEBU 81b Proposed new policy Writers for Channel/Application" +"2020-08-31 20:51:00.798 UTC [policies] NewManagerImpl -> DEBU 81c Proposed new policy Writers for Channel" +"2020-08-31 20:51:00.798 UTC [policies] NewManagerImpl -> DEBU 81d Proposed new policy Admins for Channel" +"2020-08-31 20:51:00.799 UTC [policies] NewManagerImpl -> DEBU 81e Proposed new policy Readers for Channel" +"2020-08-31 20:51:00.799 UTC [common.configtx] addToMap -> DEBU 81f Adding to config map: [Group] /Channel" +"2020-08-31 20:51:00.800 UTC [common.configtx] addToMap -> DEBU 820 Adding to config map: [Group] /Channel/Orderer" +"2020-08-31 20:51:00.800 UTC [common.configtx] addToMap -> DEBU 821 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:00.800 UTC [common.configtx] addToMap -> DEBU 822 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 823 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 824 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 825 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 826 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 827 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 828 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 829 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 82a Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 82b Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 82c Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 82d Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 82e Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 82f Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 830 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 831 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 832 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 833 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:51:00.801 UTC [common.configtx] addToMap -> DEBU 834 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:51:00.802 UTC [common.configtx] addToMap -> DEBU 835 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:51:00.802 UTC [common.configtx] addToMap -> DEBU 836 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:51:00.802 UTC [common.configtx] addToMap -> DEBU 837 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-08-31 20:51:00.802 UTC [common.configtx] addToMap -> DEBU 838 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:51:00.802 UTC [common.configtx] addToMap -> DEBU 839 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 83a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 83b Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 83c Adding to config map: [Value] /Channel/Application/ACLs" +"2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 83d Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 83e Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 83f Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 840 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 841 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 842 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-08-31 20:51:00.803 UTC [common.configtx] addToMap -> DEBU 843 Adding to config map: [Value] /Channel/Consortium" +"2020-08-31 20:51:00.804 UTC [common.configtx] addToMap -> DEBU 844 Adding to config map: [Value] /Channel/Capabilities" +"2020-08-31 20:51:00.804 UTC [common.configtx] addToMap -> DEBU 845 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-08-31 20:51:00.804 UTC [common.configtx] addToMap -> DEBU 846 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-08-31 20:51:00.804 UTC [common.configtx] addToMap -> DEBU 847 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-08-31 20:51:00.804 UTC [common.configtx] addToMap -> DEBU 848 Adding to config map: [Policy] /Channel/Writers" +"2020-08-31 20:51:00.804 UTC [common.configtx] addToMap -> DEBU 849 Adding to config map: [Policy] /Channel/Admins" +"2020-08-31 20:51:00.804 UTC [common.configtx] addToMap -> DEBU 84a Adding to config map: [Policy] /Channel/Readers" +"2020-08-31 20:51:00.804 UTC [common.channelconfig] LogSanityChecks -> DEBU 84b As expected, current configuration has policy '/Channel/Readers'" +"2020-08-31 20:51:00.804 UTC [common.channelconfig] LogSanityChecks -> DEBU 84c As expected, current configuration has policy '/Channel/Writers'" +"2020-08-31 20:51:00.804 UTC [policies] Manager -> DEBU 84d Manager Channel looking up path [Application]" +"2020-08-31 20:51:00.804 UTC [policies] Manager -> DEBU 84e Manager Channel has managers Orderer" +"2020-08-31 20:51:00.804 UTC [policies] Manager -> DEBU 84f Manager Channel has managers Application" +"2020-08-31 20:51:00.804 UTC [policies] Manager -> DEBU 850 Manager Channel/Application looking up path []" +"2020-08-31 20:51:00.805 UTC [policies] Manager -> DEBU 851 Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:51:00.805 UTC [policies] Manager -> DEBU 852 Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:51:00.805 UTC [common.channelconfig] LogSanityChecks -> DEBU 853 As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-08-31 20:51:00.805 UTC [common.channelconfig] LogSanityChecks -> DEBU 854 As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-08-31 20:51:00.805 UTC [common.channelconfig] LogSanityChecks -> DEBU 855 As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-08-31 20:51:00.805 UTC [policies] Manager -> DEBU 856 Manager Channel looking up path [Orderer]" +"2020-08-31 20:51:00.805 UTC [policies] Manager -> DEBU 857 Manager Channel has managers Orderer" +"2020-08-31 20:51:00.805 UTC [policies] Manager -> DEBU 858 Manager Channel has managers Application" +"2020-08-31 20:51:00.805 UTC [policies] Manager -> DEBU 859 Manager Channel/Orderer looking up path []" +"2020-08-31 20:51:00.805 UTC [policies] Manager -> DEBU 85a Manager Channel/Orderer has managers OrdererOrg" +"2020-08-31 20:51:00.805 UTC [common.channelconfig] LogSanityChecks -> DEBU 85b As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-08-31 20:51:00.805 UTC [common.channelconfig] LogSanityChecks -> DEBU 85c As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-08-31 20:51:00.806 UTC [common.channelconfig] LogSanityChecks -> DEBU 85d As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-08-31 20:51:00.806 UTC [common.channelconfig] LogSanityChecks -> DEBU 85e As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-08-31 20:51:00.806 UTC [common.capabilities] Supported -> DEBU 85f Orderer capability V1_4_2 is supported and is enabled" +"2020-08-31 20:51:00.806 UTC [common.capabilities] Supported -> DEBU 860 Channel capability V1_4_3 is supported and is enabled" +"2020-08-31 20:51:00.806 UTC [msp] GetDefaultSigningIdentity -> DEBU 861 Obtaining default signing identity" +"2020-08-31 20:51:00.806 UTC [msp] GetDefaultSigningIdentity -> DEBU 862 Obtaining default signing identity" +"2020-08-31 20:51:00.806 UTC [msp.identity] Sign -> DEBU 863 Sign: plaintext: 0AEA060A1B08011A0608B4C5B5FA0522...6062CF663D2C2E009C3EBD00268F013F " +"2020-08-31 20:51:00.806 UTC [msp.identity] Sign -> DEBU 864 Sign: digest: 2AC95674D0ACD15326CA8878DDD198E3EEB913912DC52C69EC142A0FF3F154A2 " +"2020-08-31 20:51:00.807 UTC [policies] Evaluate -> DEBU 865 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-08-31 20:51:00.807 UTC [policies] Evaluate -> DEBU 866 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:51:00.807 UTC [policies] Evaluate -> DEBU 867 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-08-31 20:51:00.807 UTC [policies] Evaluate -> DEBU 868 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:51:00.807 UTC [policies] Evaluate -> DEBU 869 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-08-31 20:51:00.807 UTC [msp] DeserializeIdentity -> DEBU 86a Obtaining identity" +"2020-08-31 20:51:00.807 UTC [msp.identity] newIdentity -> DEBU 86b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE-----" +"2020-08-31 20:51:00.808 UTC [cauthdsl] func1 -> DEBU 86c 0xc00096e820 gate 1598907060808536300 evaluation starts" +"2020-08-31 20:51:00.808 UTC [cauthdsl] func2 -> DEBU 86d 0xc00096e820 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:51:00.808 UTC [cauthdsl] func2 -> DEBU 86e 0xc00096e820 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:51:00.808 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 86f Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-08-31 20:51:00.808 UTC [msp] Validate -> DEBU 870 MSP OrdererMSP validating identity" +"2020-08-31 20:51:00.809 UTC [msp] getCertificationChain -> DEBU 871 MSP OrdererMSP getting certification chain" +"2020-08-31 20:51:00.809 UTC [cauthdsl] func2 -> DEBU 872 0xc00096e820 principal matched by identity 0" +"2020-08-31 20:51:00.809 UTC [msp.identity] Verify -> DEBU 873 Verify: digest = 00000000 2a c9 56 74 d0 ac d1 53 26 ca 88 78 dd d1 98 e3 |*.Vt...S&..x....| +00000010 ee b9 13 91 2d c5 2c 69 ec 14 2a 0f f3 f1 54 a2 |....-.,i..*...T.|" +"2020-08-31 20:51:00.809 UTC [msp.identity] Verify -> DEBU 874 Verify: sig = 00000000 30 44 02 20 05 b4 a7 cf 0c d5 ef fc 4a 2d 2b 1c |0D. ........J-+.| +00000010 62 61 50 e5 d5 98 dc d2 14 31 4f 44 6a a4 86 44 |baP......1ODj..D| +00000020 b0 89 10 60 02 20 58 11 e4 1a 38 2d 02 16 fb d0 |...`. X...8-....| +00000030 3e 3a 82 7c a3 2e 16 22 69 6d a8 0c 03 8a 46 67 |>:.|..."im....Fg| +00000040 2d c0 ba 70 a1 eb |-..p..|" +"2020-08-31 20:51:00.810 UTC [cauthdsl] func2 -> DEBU 875 0xc00096e820 principal evaluation succeeds for identity 0" +"2020-08-31 20:51:00.810 UTC [cauthdsl] func1 -> DEBU 876 0xc00096e820 gate 1598907060808536300 evaluation succeeds" +"2020-08-31 20:51:00.810 UTC [policies] Evaluate -> DEBU 877 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:51:00.810 UTC [policies] Evaluate -> DEBU 878 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:51:00.810 UTC [policies] Evaluate -> DEBU 879 Signature set satisfies policy /Channel/Orderer/Writers" +"2020-08-31 20:51:00.810 UTC [policies] Evaluate -> DEBU 87a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-08-31 20:51:00.810 UTC [policies] Evaluate -> DEBU 87b Signature set satisfies policy /Channel/Writers" +"2020-08-31 20:51:00.810 UTC [policies] Evaluate -> DEBU 87c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-08-31 20:51:00.811 UTC [orderer.common.msgprocessor] Apply -> DEBU 87d Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2020-08-31 20:51:00.811 UTC [common.channelconfig] NewStandardValues -> DEBU 87e Initializing protos for *channelconfig.ChannelProtos" +"2020-08-31 20:51:00.811 UTC [common.channelconfig] initializeProtosStruct -> DEBU 87f Processing field: HashingAlgorithm" +"2020-08-31 20:51:00.811 UTC [common.channelconfig] initializeProtosStruct -> DEBU 880 Processing field: BlockDataHashingStructure" +"2020-08-31 20:51:00.811 UTC [common.channelconfig] initializeProtosStruct -> DEBU 881 Processing field: OrdererAddresses" +"2020-08-31 20:51:00.811 UTC [common.channelconfig] initializeProtosStruct -> DEBU 882 Processing field: Consortium" +"2020-08-31 20:51:00.811 UTC [common.channelconfig] initializeProtosStruct -> DEBU 883 Processing field: Capabilities" +"2020-08-31 20:51:00.811 UTC [common.channelconfig] NewStandardValues -> DEBU 884 Initializing protos for *channelconfig.ApplicationProtos" +"2020-08-31 20:51:00.812 UTC [common.channelconfig] initializeProtosStruct -> DEBU 885 Processing field: ACLs" +"2020-08-31 20:51:00.812 UTC [common.channelconfig] initializeProtosStruct -> DEBU 886 Processing field: Capabilities" +"2020-08-31 20:51:00.812 UTC [common.channelconfig] NewStandardValues -> DEBU 887 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:51:00.812 UTC [common.channelconfig] initializeProtosStruct -> DEBU 888 Processing field: AnchorPeers" +"2020-08-31 20:51:00.812 UTC [common.channelconfig] NewStandardValues -> DEBU 889 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:51:00.812 UTC [common.channelconfig] initializeProtosStruct -> DEBU 88a Processing field: MSP" +"2020-08-31 20:51:00.813 UTC [common.channelconfig] Validate -> DEBU 88b Anchor peers for org Org2MSP are " +"2020-08-31 20:51:00.813 UTC [common.channelconfig] validateMSP -> DEBU 88c Setting up MSP for org Org2MSP" +"2020-08-31 20:51:00.813 UTC [msp] newBccspMsp -> DEBU 88d Creating BCCSP-based MSP instance" +"2020-08-31 20:51:00.813 UTC [msp] New -> DEBU 88e Creating Cache-MSP instance" +"2020-08-31 20:51:00.813 UTC [msp] Setup -> DEBU 88f Setting up MSP instance Org2MSP" +"2020-08-31 20:51:00.814 UTC [msp.identity] newIdentity -> DEBU 890 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-08-31 20:51:00.815 UTC [common.channelconfig] NewStandardValues -> DEBU 891 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:51:00.815 UTC [common.channelconfig] initializeProtosStruct -> DEBU 892 Processing field: AnchorPeers" +"2020-08-31 20:51:00.815 UTC [common.channelconfig] NewStandardValues -> DEBU 893 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:51:00.815 UTC [common.channelconfig] initializeProtosStruct -> DEBU 894 Processing field: MSP" +"2020-08-31 20:51:00.815 UTC [common.channelconfig] Validate -> DEBU 895 Anchor peers for org Org1MSP are anchor_peers: " +"2020-08-31 20:51:00.816 UTC [common.channelconfig] validateMSP -> DEBU 896 Setting up MSP for org Org1MSP" +"2020-08-31 20:51:00.816 UTC [msp] newBccspMsp -> DEBU 897 Creating BCCSP-based MSP instance" +"2020-08-31 20:51:00.816 UTC [msp] New -> DEBU 898 Creating Cache-MSP instance" +"2020-08-31 20:51:00.816 UTC [msp] Setup -> DEBU 899 Setting up MSP instance Org1MSP" +"2020-08-31 20:51:00.816 UTC [msp.identity] newIdentity -> DEBU 89a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-08-31 20:51:00.818 UTC [common.channelconfig] NewStandardValues -> DEBU 89b Initializing protos for *channelconfig.OrdererProtos" +"2020-08-31 20:51:00.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89c Processing field: ConsensusType" +"2020-08-31 20:51:00.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89d Processing field: BatchSize" +"2020-08-31 20:51:00.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89e Processing field: BatchTimeout" +"2020-08-31 20:51:00.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 89f Processing field: KafkaBrokers" +"2020-08-31 20:51:00.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a0 Processing field: ChannelRestrictions" +"2020-08-31 20:51:00.818 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a1 Processing field: Capabilities" +"2020-08-31 20:51:00.819 UTC [common.channelconfig] NewStandardValues -> DEBU 8a2 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-08-31 20:51:00.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a3 Processing field: Endpoints" +"2020-08-31 20:51:00.819 UTC [common.channelconfig] NewStandardValues -> DEBU 8a4 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:51:00.819 UTC [common.channelconfig] initializeProtosStruct -> DEBU 8a5 Processing field: MSP" +"2020-08-31 20:51:00.819 UTC [common.channelconfig] validateMSP -> DEBU 8a6 Setting up MSP for org OrdererOrg" +"2020-08-31 20:51:00.819 UTC [msp] newBccspMsp -> DEBU 8a7 Creating BCCSP-based MSP instance" +"2020-08-31 20:51:00.819 UTC [msp] New -> DEBU 8a8 Creating Cache-MSP instance" +"2020-08-31 20:51:00.819 UTC [msp] Setup -> DEBU 8a9 Setting up MSP instance OrdererMSP" +"2020-08-31 20:51:00.821 UTC [msp.identity] newIdentity -> DEBU 8aa Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:51:00.822 UTC [msp] Setup -> DEBU 8ab Setting up the MSP manager (3 msps)" +"2020-08-31 20:51:00.822 UTC [msp] Setup -> DEBU 8ac MSP manager setup complete, setup 3 msps" +"2020-08-31 20:51:00.822 UTC [policies] NewManagerImpl -> DEBU 8ad Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:00.822 UTC [policies] NewManagerImpl -> DEBU 8ae Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:00.822 UTC [policies] NewManagerImpl -> DEBU 8af Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:00.823 UTC [policies] NewManagerImpl -> DEBU 8b0 Proposed new policy Writers for Channel/Orderer" +"2020-08-31 20:51:00.823 UTC [policies] NewManagerImpl -> DEBU 8b1 Proposed new policy Admins for Channel/Orderer" +"2020-08-31 20:51:00.823 UTC [policies] NewManagerImpl -> DEBU 8b2 Proposed new policy BlockValidation for Channel/Orderer" +"2020-08-31 20:51:00.823 UTC [policies] NewManagerImpl -> DEBU 8b3 Proposed new policy Readers for Channel/Orderer" +"2020-08-31 20:51:00.823 UTC [policies] NewManagerImpl -> DEBU 8b4 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-08-31 20:51:00.823 UTC [policies] NewManagerImpl -> DEBU 8b5 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-08-31 20:51:00.824 UTC [policies] NewManagerImpl -> DEBU 8b6 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-08-31 20:51:00.824 UTC [policies] NewManagerImpl -> DEBU 8b7 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-08-31 20:51:00.824 UTC [policies] NewManagerImpl -> DEBU 8b8 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-08-31 20:51:00.824 UTC [policies] NewManagerImpl -> DEBU 8b9 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-08-31 20:51:00.824 UTC [policies] NewManagerImpl -> DEBU 8ba Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-08-31 20:51:00.825 UTC [policies] NewManagerImpl -> DEBU 8bb Proposed new policy Readers for Channel/Application" +"2020-08-31 20:51:00.825 UTC [policies] NewManagerImpl -> DEBU 8bc Proposed new policy Writers for Channel/Application" +"2020-08-31 20:51:00.825 UTC [policies] NewManagerImpl -> DEBU 8bd Proposed new policy Admins for Channel/Application" +"2020-08-31 20:51:00.825 UTC [policies] GetPolicy -> DEBU 8be Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:51:00.825 UTC [policies] NewManagerImpl -> DEBU 8bf Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-08-31 20:51:00.825 UTC [policies] GetPolicy -> DEBU 8c0 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:51:00.825 UTC [policies] NewManagerImpl -> DEBU 8c1 Proposed new policy Endorsement for Channel/Application" +"2020-08-31 20:51:00.826 UTC [policies] NewManagerImpl -> DEBU 8c2 Proposed new policy Writers for Channel" +"2020-08-31 20:51:00.826 UTC [policies] NewManagerImpl -> DEBU 8c3 Proposed new policy Admins for Channel" +"2020-08-31 20:51:00.826 UTC [policies] NewManagerImpl -> DEBU 8c4 Proposed new policy Readers for Channel" +"2020-08-31 20:51:00.826 UTC [common.configtx] addToMap -> DEBU 8c5 Adding to config map: [Group] /Channel" +"2020-08-31 20:51:00.826 UTC [common.configtx] addToMap -> DEBU 8c6 Adding to config map: [Group] /Channel/Orderer" +"2020-08-31 20:51:00.826 UTC [common.configtx] addToMap -> DEBU 8c7 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:00.827 UTC [common.configtx] addToMap -> DEBU 8c8 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-08-31 20:51:00.827 UTC [common.configtx] addToMap -> DEBU 8c9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:51:00.827 UTC [common.configtx] addToMap -> DEBU 8ca Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-08-31 20:51:00.827 UTC [common.configtx] addToMap -> DEBU 8cb Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:51:00.827 UTC [common.configtx] addToMap -> DEBU 8cc Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-08-31 20:51:00.827 UTC [common.configtx] addToMap -> DEBU 8cd Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-08-31 20:51:00.827 UTC [common.configtx] addToMap -> DEBU 8ce Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-08-31 20:51:00.827 UTC [common.configtx] addToMap -> DEBU 8cf Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d0 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d1 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d2 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d3 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d4 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d5 Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d6 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d7 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8d9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:51:00.828 UTC [common.configtx] addToMap -> DEBU 8da Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:51:00.830 UTC [common.configtx] addToMap -> DEBU 8db Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:51:00.830 UTC [common.configtx] addToMap -> DEBU 8dc Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:51:00.831 UTC [common.configtx] addToMap -> DEBU 8dd Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-08-31 20:51:00.831 UTC [common.configtx] addToMap -> DEBU 8de Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-08-31 20:51:00.831 UTC [common.configtx] addToMap -> DEBU 8df Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:51:00.832 UTC [common.configtx] addToMap -> DEBU 8e0 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:51:00.832 UTC [common.configtx] addToMap -> DEBU 8e1 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:51:00.832 UTC [common.configtx] addToMap -> DEBU 8e2 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-08-31 20:51:00.832 UTC [common.configtx] addToMap -> DEBU 8e3 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:51:00.832 UTC [common.configtx] addToMap -> DEBU 8e4 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-08-31 20:51:00.832 UTC [common.configtx] addToMap -> DEBU 8e5 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-08-31 20:51:00.832 UTC [common.configtx] addToMap -> DEBU 8e6 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:51:00.832 UTC [common.configtx] addToMap -> DEBU 8e7 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:51:00.832 UTC [common.configtx] addToMap -> DEBU 8e8 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-08-31 20:51:00.833 UTC [common.configtx] addToMap -> DEBU 8e9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-08-31 20:51:00.833 UTC [common.configtx] addToMap -> DEBU 8ea Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-08-31 20:51:00.833 UTC [common.configtx] addToMap -> DEBU 8eb Adding to config map: [Value] /Channel/Consortium" +"2020-08-31 20:51:00.833 UTC [common.configtx] addToMap -> DEBU 8ec Adding to config map: [Value] /Channel/Capabilities" +"2020-08-31 20:51:00.833 UTC [common.configtx] addToMap -> DEBU 8ed Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-08-31 20:51:00.833 UTC [common.configtx] addToMap -> DEBU 8ee Adding to config map: [Policy] /Channel/Writers" +"2020-08-31 20:51:00.834 UTC [common.configtx] addToMap -> DEBU 8ef Adding to config map: [Policy] /Channel/Admins" +"2020-08-31 20:51:00.834 UTC [common.configtx] addToMap -> DEBU 8f0 Adding to config map: [Policy] /Channel/Readers" +"2020-08-31 20:51:00.834 UTC [orderer.consensus.etcdraft] propose -> INFO 8f1 Created block [1], there are 0 blocks in flight" channel=businesschannel node=1 +"2020-08-31 20:51:00.835 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 8f2 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2020-08-31 20:51:00.836 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 8f3 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:50752" +"2020-08-31 20:51:00.836 UTC [orderer.consensus.etcdraft] 2 -> DEBU 8f4 Proposed block [1] to raft consensus" channel=businesschannel node=1 +"2020-08-31 20:51:00.838 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8f5 Sending msg of 27267 bytes to 2 on channel businesschannel took 17.8µs" +"2020-08-31 20:51:00.839 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8f6 Sending msg of 27267 bytes to 3 on channel businesschannel took 14µs" +"2020-08-31 20:51:00.839 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8f7 Send of ConsensusRequest for channel businesschannel with payload of size 27267 to orderer1.example.com(orderer1.example.com:7050) took 101.5µs " +"2020-08-31 20:51:00.839 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8f8 Send of ConsensusRequest for channel businesschannel with payload of size 27267 to orderer2.example.com(orderer2.example.com:7050) took 91.1µs " +"2020-08-31 20:51:00.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 8f9 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:00.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8fa Sending msg of 28 bytes to 2 on channel businesschannel took 13.2µs" +"2020-08-31 20:51:00.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 8fb Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" +"2020-08-31 20:51:00.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8fc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.4µs " +"2020-08-31 20:51:00.842 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 8fd Writing block [1] (Raft index: 5) to ledger" channel=businesschannel node=1 +"2020-08-31 20:51:00.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 8fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.8µs " +"2020-08-31 20:51:00.842 UTC [common.configtx] addToMap -> DEBU 8ff Adding to config map: [Group] /Channel" +"2020-08-31 20:51:00.842 UTC [common.configtx] addToMap -> DEBU 900 Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:51:00.842 UTC [common.configtx] addToMap -> DEBU 901 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:51:00.842 UTC [common.configtx] addToMap -> DEBU 902 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-08-31 20:51:00.842 UTC [common.configtx] addToMap -> DEBU 903 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:51:00.842 UTC [common.configtx] addToMap -> DEBU 904 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:51:00.842 UTC [common.configtx] addToMap -> DEBU 905 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:51:00.842 UTC [common.configtx] addToMap -> DEBU 906 Adding to config map: [Group] /Channel" +"2020-08-31 20:51:00.842 UTC [common.configtx] addToMap -> DEBU 907 Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:51:00.843 UTC [common.configtx] addToMap -> DEBU 908 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:51:00.843 UTC [common.configtx] addToMap -> DEBU 909 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-08-31 20:51:00.843 UTC [common.configtx] addToMap -> DEBU 90a Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-08-31 20:51:00.843 UTC [common.configtx] addToMap -> DEBU 90b Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:51:00.843 UTC [common.configtx] addToMap -> DEBU 90c Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:51:00.843 UTC [common.configtx] addToMap -> DEBU 90d Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:51:00.843 UTC [common.configtx] verifyDeltaSet -> DEBU 90e Processing change to key: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:51:00.843 UTC [common.configtx] policyForItem -> DEBU 90f Getting policy for item Org1MSP with mod_policy Admins" +"2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 910 Manager Channel looking up path [Application]" +"2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 911 Manager Channel has managers Application" +"2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 912 Manager Channel has managers Orderer" +"2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 913 Manager Channel/Application looking up path []" +"2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 914 Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 915 Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 916 Manager Channel/Application looking up path [Org1MSP]" +"2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 917 Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 918 Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:51:00.843 UTC [policies] Manager -> DEBU 919 Manager Channel/Application/Org1MSP looking up path []" +"2020-08-31 20:51:00.843 UTC [policies] Evaluate -> DEBU 91a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2020-08-31 20:51:00.843 UTC [cauthdsl] func1 -> DEBU 91b 0xc000cb8180 gate 1598907060843553900 evaluation starts" +"2020-08-31 20:51:00.843 UTC [cauthdsl] func2 -> DEBU 91c 0xc000cb8180 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:51:00.843 UTC [cauthdsl] func2 -> DEBU 91d 0xc000cb8180 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:51:00.843 UTC [cauthdsl] func2 -> DEBU 91e 0xc000cb8180 principal matched by identity 0" +"2020-08-31 20:51:00.843 UTC [msp.identity] Verify -> DEBU 91f Verify: digest = 00000000 0a 6a 5e 90 37 00 25 29 cc 2f 3d ec 44 8f 23 98 |.j^.7.%)./=.D.#.| +00000010 40 21 8f 78 1d c2 88 4f 31 16 8b 9b 25 00 fb 20 |@!.x...O1...%.. |" +"2020-08-31 20:51:00.843 UTC [msp.identity] Verify -> DEBU 920 Verify: sig = 00000000 30 44 02 20 0d d5 10 d0 47 15 e1 14 bb 9f dc b9 |0D. ....G.......| +00000010 21 20 fe 43 aa a5 85 eb 20 91 d3 d3 25 c3 40 6f |! .C.... ...%.@o| +00000020 be ec 7e 52 02 20 3f 97 e3 ab d5 5a 98 c6 78 08 |..~R. ?....Z..x.| +00000030 e3 1a 1c 9b 18 c4 79 e9 08 26 b7 2a 98 01 0e 55 |......y..&.*...U| +00000040 0c af 35 37 61 76 |..57av|" +"2020-08-31 20:51:00.843 UTC [cauthdsl] func2 -> DEBU 921 0xc000cb8180 principal evaluation succeeds for identity 0" +"2020-08-31 20:51:00.843 UTC [cauthdsl] func1 -> DEBU 922 0xc000cb8180 gate 1598907060843553900 evaluation succeeds" +"2020-08-31 20:51:00.843 UTC [policies] Evaluate -> DEBU 923 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:51:00.843 UTC [policies] Evaluate -> DEBU 924 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:51:00.843 UTC [common.configtx] verifyDeltaSet -> DEBU 925 Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-08-31 20:51:00.844 UTC [common.configtx] recurseConfigMap -> DEBU 926 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.844 UTC [common.configtx] recurseConfigMap -> DEBU 927 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.844 UTC [common.configtx] recurseConfigMap -> DEBU 928 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.845 UTC [orderer.common.cluster.step] handleMessage -> DEBU 929 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:00.844 UTC [common.configtx] recurseConfigMap -> DEBU 92a Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 92b Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 92c Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 92d Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 92e Setting policy for key Admins to " +"2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 92f Setting policy for key Readers to " +"2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 930 Setting policy for key Writers to " +"2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 931 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 932 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 933 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 934 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 935 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 936 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 937 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 938 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.846 UTC [common.configtx] recurseConfigMap -> DEBU 939 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.846 UTC [orderer.common.cluster.step] handleMessage -> DEBU 93a Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:00.847 UTC [common.configtx] recurseConfigMap -> DEBU 93b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.847 UTC [common.configtx] recurseConfigMap -> DEBU 93c Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.849 UTC [common.configtx] recurseConfigMap -> DEBU 93d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:00.850 UTC [common.channelconfig] NewStandardValues -> DEBU 93e Initializing protos for *channelconfig.ChannelProtos" +"2020-08-31 20:51:00.850 UTC [common.channelconfig] initializeProtosStruct -> DEBU 93f Processing field: HashingAlgorithm" +"2020-08-31 20:51:00.850 UTC [common.channelconfig] initializeProtosStruct -> DEBU 940 Processing field: BlockDataHashingStructure" +"2020-08-31 20:51:00.852 UTC [common.channelconfig] initializeProtosStruct -> DEBU 941 Processing field: OrdererAddresses" +"2020-08-31 20:51:00.852 UTC [common.channelconfig] initializeProtosStruct -> DEBU 942 Processing field: Consortium" +"2020-08-31 20:51:00.853 UTC [common.channelconfig] initializeProtosStruct -> DEBU 943 Processing field: Capabilities" +"2020-08-31 20:51:00.853 UTC [common.channelconfig] NewStandardValues -> DEBU 944 Initializing protos for *channelconfig.OrdererProtos" +"2020-08-31 20:51:00.853 UTC [common.channelconfig] initializeProtosStruct -> DEBU 945 Processing field: ConsensusType" +"2020-08-31 20:51:00.854 UTC [common.channelconfig] initializeProtosStruct -> DEBU 946 Processing field: BatchSize" +"2020-08-31 20:51:00.855 UTC [common.channelconfig] initializeProtosStruct -> DEBU 947 Processing field: BatchTimeout" +"2020-08-31 20:51:00.855 UTC [common.channelconfig] initializeProtosStruct -> DEBU 948 Processing field: KafkaBrokers" +"2020-08-31 20:51:00.856 UTC [common.channelconfig] initializeProtosStruct -> DEBU 949 Processing field: ChannelRestrictions" +"2020-08-31 20:51:00.856 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94a Processing field: Capabilities" +"2020-08-31 20:51:00.857 UTC [common.channelconfig] NewStandardValues -> DEBU 94b Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-08-31 20:51:00.857 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94c Processing field: Endpoints" +"2020-08-31 20:51:00.857 UTC [common.channelconfig] NewStandardValues -> DEBU 94d Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:51:00.858 UTC [common.channelconfig] initializeProtosStruct -> DEBU 94e Processing field: MSP" +"2020-08-31 20:51:00.858 UTC [common.deliver] Handle -> WARN 94f Error reading from 172.18.0.9:50750: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:51:00.858 UTC [orderer.common.server] func1 -> DEBU 950 Closing Deliver stream" +"2020-08-31 20:51:00.858 UTC [common.channelconfig] validateMSP -> DEBU 951 Setting up MSP for org OrdererOrg" +"2020-08-31 20:51:00.858 UTC [comm.grpc.server] 1 -> INFO 952 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50750 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=106.4078ms +"2020-08-31 20:51:00.859 UTC [msp] newBccspMsp -> DEBU 953 Creating BCCSP-based MSP instance" +"2020-08-31 20:51:00.860 UTC [msp] New -> DEBU 954 Creating Cache-MSP instance" +"2020-08-31 20:51:00.860 UTC [orderer.common.cluster.step] handleMessage -> DEBU 957 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:00.860 UTC [msp] Setup -> DEBU 958 Setting up MSP instance OrdererMSP" +"2020-08-31 20:51:00.860 UTC [grpc] warningf -> DEBU 956 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:50752: read: connection reset by peer" +"2020-08-31 20:51:00.861 UTC [orderer.common.broadcast] Handle -> WARN 959 Error reading from 172.18.0.9:50752: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:51:00.861 UTC [orderer.common.server] func1 -> DEBU 95a Closing Broadcast stream" +"2020-08-31 20:51:00.862 UTC [comm.grpc.server] 1 -> INFO 95b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:50752 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=92.3427ms +"2020-08-31 20:51:00.860 UTC [grpc] infof -> DEBU 955 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:51:00.862 UTC [grpc] infof -> DEBU 95c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:51:00.862 UTC [msp.identity] newIdentity -> DEBU 95d Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:51:00.867 UTC [common.channelconfig] NewStandardValues -> DEBU 95e Initializing protos for *channelconfig.ApplicationProtos" +"2020-08-31 20:51:00.867 UTC [common.channelconfig] initializeProtosStruct -> DEBU 95f Processing field: ACLs" +"2020-08-31 20:51:00.867 UTC [common.channelconfig] initializeProtosStruct -> DEBU 960 Processing field: Capabilities" +"2020-08-31 20:51:00.868 UTC [common.channelconfig] NewStandardValues -> DEBU 961 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:51:00.868 UTC [common.channelconfig] initializeProtosStruct -> DEBU 962 Processing field: AnchorPeers" +"2020-08-31 20:51:00.868 UTC [common.channelconfig] NewStandardValues -> DEBU 963 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:51:00.868 UTC [common.channelconfig] initializeProtosStruct -> DEBU 964 Processing field: MSP" +"2020-08-31 20:51:00.869 UTC [common.channelconfig] Validate -> DEBU 965 Anchor peers for org Org2MSP are " +"2020-08-31 20:51:00.869 UTC [common.channelconfig] validateMSP -> DEBU 966 Setting up MSP for org Org2MSP" +"2020-08-31 20:51:00.869 UTC [msp] newBccspMsp -> DEBU 967 Creating BCCSP-based MSP instance" +"2020-08-31 20:51:00.870 UTC [msp] New -> DEBU 968 Creating Cache-MSP instance" +"2020-08-31 20:51:00.871 UTC [msp] Setup -> DEBU 969 Setting up MSP instance Org2MSP" +"2020-08-31 20:51:00.874 UTC [msp.identity] newIdentity -> DEBU 96a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-08-31 20:51:00.876 UTC [common.channelconfig] NewStandardValues -> DEBU 96b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:51:00.876 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96c Processing field: AnchorPeers" +"2020-08-31 20:51:00.877 UTC [common.channelconfig] NewStandardValues -> DEBU 96d Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:51:00.877 UTC [common.channelconfig] initializeProtosStruct -> DEBU 96e Processing field: MSP" +"2020-08-31 20:51:00.878 UTC [common.channelconfig] Validate -> DEBU 96f Anchor peers for org Org1MSP are anchor_peers: " +"2020-08-31 20:51:00.879 UTC [common.channelconfig] validateMSP -> DEBU 970 Setting up MSP for org Org1MSP" +"2020-08-31 20:51:00.879 UTC [msp] newBccspMsp -> DEBU 971 Creating BCCSP-based MSP instance" +"2020-08-31 20:51:00.879 UTC [msp] New -> DEBU 972 Creating Cache-MSP instance" +"2020-08-31 20:51:00.879 UTC [msp] Setup -> DEBU 973 Setting up MSP instance Org1MSP" +"2020-08-31 20:51:00.880 UTC [msp.identity] newIdentity -> DEBU 974 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-08-31 20:51:00.881 UTC [msp] Setup -> DEBU 975 Setting up the MSP manager (3 msps)" +"2020-08-31 20:51:00.881 UTC [msp] Setup -> DEBU 976 MSP manager setup complete, setup 3 msps" +"2020-08-31 20:51:00.882 UTC [policies] NewManagerImpl -> DEBU 977 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:00.882 UTC [policies] NewManagerImpl -> DEBU 978 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:00.882 UTC [policies] NewManagerImpl -> DEBU 979 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:00.882 UTC [policies] NewManagerImpl -> DEBU 97a Proposed new policy Readers for Channel/Orderer" +"2020-08-31 20:51:00.882 UTC [policies] NewManagerImpl -> DEBU 97b Proposed new policy Writers for Channel/Orderer" +"2020-08-31 20:51:00.882 UTC [policies] NewManagerImpl -> DEBU 97c Proposed new policy Admins for Channel/Orderer" +"2020-08-31 20:51:00.884 UTC [policies] NewManagerImpl -> DEBU 97d Proposed new policy BlockValidation for Channel/Orderer" +"2020-08-31 20:51:00.884 UTC [policies] NewManagerImpl -> DEBU 97e Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-08-31 20:51:00.885 UTC [policies] NewManagerImpl -> DEBU 97f Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-08-31 20:51:00.885 UTC [policies] NewManagerImpl -> DEBU 980 Proposed new policy Endorsement for Channel/Application/Org2MSP" +"2020-08-31 20:51:00.885 UTC [policies] NewManagerImpl -> DEBU 981 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-08-31 20:51:00.886 UTC [policies] NewManagerImpl -> DEBU 982 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-08-31 20:51:00.886 UTC [policies] NewManagerImpl -> DEBU 983 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-08-31 20:51:00.886 UTC [policies] NewManagerImpl -> DEBU 984 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-08-31 20:51:00.887 UTC [policies] NewManagerImpl -> DEBU 985 Proposed new policy Admins for Channel/Application" +"2020-08-31 20:51:00.887 UTC [policies] GetPolicy -> DEBU 986 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:51:00.887 UTC [policies] NewManagerImpl -> DEBU 987 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-08-31 20:51:00.887 UTC [policies] GetPolicy -> DEBU 988 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:51:00.888 UTC [policies] NewManagerImpl -> DEBU 989 Proposed new policy Endorsement for Channel/Application" +"2020-08-31 20:51:00.888 UTC [policies] NewManagerImpl -> DEBU 98a Proposed new policy Readers for Channel/Application" +"2020-08-31 20:51:00.888 UTC [policies] NewManagerImpl -> DEBU 98b Proposed new policy Writers for Channel/Application" +"2020-08-31 20:51:00.889 UTC [policies] NewManagerImpl -> DEBU 98c Proposed new policy Writers for Channel" +"2020-08-31 20:51:00.889 UTC [policies] NewManagerImpl -> DEBU 98d Proposed new policy Admins for Channel" +"2020-08-31 20:51:00.890 UTC [policies] NewManagerImpl -> DEBU 98e Proposed new policy Readers for Channel" +"2020-08-31 20:51:00.890 UTC [common.configtx] addToMap -> DEBU 98f Adding to config map: [Group] /Channel" +"2020-08-31 20:51:00.890 UTC [common.configtx] addToMap -> DEBU 990 Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:51:00.891 UTC [common.configtx] addToMap -> DEBU 991 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:51:00.891 UTC [common.configtx] addToMap -> DEBU 992 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-08-31 20:51:00.891 UTC [common.configtx] addToMap -> DEBU 993 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:51:00.892 UTC [common.configtx] addToMap -> DEBU 994 Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:51:00.892 UTC [common.configtx] addToMap -> DEBU 995 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:51:00.892 UTC [common.configtx] addToMap -> DEBU 996 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:51:00.892 UTC [common.configtx] addToMap -> DEBU 997 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:51:00.893 UTC [common.configtx] addToMap -> DEBU 998 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-08-31 20:51:00.893 UTC [common.configtx] addToMap -> DEBU 999 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-08-31 20:51:00.893 UTC [common.configtx] addToMap -> DEBU 99a Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:51:00.893 UTC [common.configtx] addToMap -> DEBU 99b Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:51:00.893 UTC [common.configtx] addToMap -> DEBU 99c Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:51:00.894 UTC [common.configtx] addToMap -> DEBU 99d Adding to config map: [Value] /Channel/Application/ACLs" +"2020-08-31 20:51:00.894 UTC [common.configtx] addToMap -> DEBU 99e Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:51:00.894 UTC [common.configtx] addToMap -> DEBU 99f Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:51:00.894 UTC [common.configtx] addToMap -> DEBU 9a0 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:51:00.894 UTC [common.configtx] addToMap -> DEBU 9a1 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-08-31 20:51:00.895 UTC [common.configtx] addToMap -> DEBU 9a2 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-08-31 20:51:00.895 UTC [common.configtx] addToMap -> DEBU 9a3 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-08-31 20:51:00.895 UTC [common.configtx] addToMap -> DEBU 9a4 Adding to config map: [Group] /Channel/Orderer" +"2020-08-31 20:51:00.896 UTC [common.configtx] addToMap -> DEBU 9a5 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:00.896 UTC [common.configtx] addToMap -> DEBU 9a6 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-08-31 20:51:00.896 UTC [common.configtx] addToMap -> DEBU 9a7 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:51:00.896 UTC [common.configtx] addToMap -> DEBU 9a8 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-08-31 20:51:00.897 UTC [common.configtx] addToMap -> DEBU 9a9 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:51:00.897 UTC [common.configtx] addToMap -> DEBU 9aa Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-08-31 20:51:00.897 UTC [common.configtx] addToMap -> DEBU 9ab Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-08-31 20:51:00.897 UTC [common.configtx] addToMap -> DEBU 9ac Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-08-31 20:51:00.898 UTC [common.configtx] addToMap -> DEBU 9ad Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-08-31 20:51:00.898 UTC [common.configtx] addToMap -> DEBU 9ae Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-08-31 20:51:00.898 UTC [common.configtx] addToMap -> DEBU 9af Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-08-31 20:51:00.899 UTC [common.configtx] addToMap -> DEBU 9b0 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-08-31 20:51:00.899 UTC [common.configtx] addToMap -> DEBU 9b1 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-08-31 20:51:00.899 UTC [common.configtx] addToMap -> DEBU 9b2 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-08-31 20:51:00.899 UTC [common.configtx] addToMap -> DEBU 9b3 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-08-31 20:51:00.900 UTC [common.configtx] addToMap -> DEBU 9b4 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-08-31 20:51:00.900 UTC [common.configtx] addToMap -> DEBU 9b5 Adding to config map: [Value] /Channel/Consortium" +"2020-08-31 20:51:00.900 UTC [common.configtx] addToMap -> DEBU 9b6 Adding to config map: [Value] /Channel/Capabilities" +"2020-08-31 20:51:00.900 UTC [common.configtx] addToMap -> DEBU 9b7 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-08-31 20:51:00.901 UTC [common.configtx] addToMap -> DEBU 9b8 Adding to config map: [Policy] /Channel/Writers" +"2020-08-31 20:51:00.901 UTC [common.configtx] addToMap -> DEBU 9b9 Adding to config map: [Policy] /Channel/Admins" +"2020-08-31 20:51:00.901 UTC [common.configtx] addToMap -> DEBU 9ba Adding to config map: [Policy] /Channel/Readers" +"2020-08-31 20:51:00.901 UTC [common.channelconfig] LogSanityChecks -> DEBU 9bb As expected, current configuration has policy '/Channel/Readers'" +"2020-08-31 20:51:00.901 UTC [common.channelconfig] LogSanityChecks -> DEBU 9bc As expected, current configuration has policy '/Channel/Writers'" +"2020-08-31 20:51:00.902 UTC [policies] Manager -> DEBU 9bd Manager Channel looking up path [Application]" +"2020-08-31 20:51:00.902 UTC [policies] Manager -> DEBU 9be Manager Channel has managers Orderer" +"2020-08-31 20:51:00.902 UTC [policies] Manager -> DEBU 9bf Manager Channel has managers Application" +"2020-08-31 20:51:00.902 UTC [policies] Manager -> DEBU 9c0 Manager Channel/Application looking up path []" +"2020-08-31 20:51:00.903 UTC [policies] Manager -> DEBU 9c1 Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:51:00.903 UTC [policies] Manager -> DEBU 9c2 Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:51:00.903 UTC [common.channelconfig] LogSanityChecks -> DEBU 9c3 As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-08-31 20:51:00.903 UTC [common.channelconfig] LogSanityChecks -> DEBU 9c4 As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-08-31 20:51:00.904 UTC [common.channelconfig] LogSanityChecks -> DEBU 9c5 As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-08-31 20:51:00.904 UTC [policies] Manager -> DEBU 9c6 Manager Channel looking up path [Orderer]" +"2020-08-31 20:51:00.904 UTC [policies] Manager -> DEBU 9c7 Manager Channel has managers Orderer" +"2020-08-31 20:51:00.905 UTC [policies] Manager -> DEBU 9c8 Manager Channel has managers Application" +"2020-08-31 20:51:00.905 UTC [policies] Manager -> DEBU 9c9 Manager Channel/Orderer looking up path []" +"2020-08-31 20:51:00.905 UTC [policies] Manager -> DEBU 9ca Manager Channel/Orderer has managers OrdererOrg" +"2020-08-31 20:51:00.905 UTC [common.channelconfig] LogSanityChecks -> DEBU 9cb As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-08-31 20:51:00.906 UTC [common.channelconfig] LogSanityChecks -> DEBU 9cc As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-08-31 20:51:00.906 UTC [common.channelconfig] LogSanityChecks -> DEBU 9cd As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-08-31 20:51:00.906 UTC [common.channelconfig] LogSanityChecks -> DEBU 9ce As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-08-31 20:51:00.906 UTC [common.capabilities] Supported -> DEBU 9cf Orderer capability V1_4_2 is supported and is enabled" +"2020-08-31 20:51:00.907 UTC [common.capabilities] Supported -> DEBU 9d0 Channel capability V1_4_3 is supported and is enabled" +"2020-08-31 20:51:00.907 UTC [orderer.common.server] func1 -> DEBU 9d1 Executing callback to update root CAs" +"2020-08-31 20:51:00.908 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9d2 updating root CAs for channel [businesschannel]" +"2020-08-31 20:51:00.908 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9d3 adding orderer root CAs for MSP [OrdererMSP]" +"2020-08-31 20:51:00.908 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9d4 adding app root CAs for MSP [Org2MSP]" +"2020-08-31 20:51:00.909 UTC [orderer.common.server] updateTrustedRoots -> DEBU 9d5 adding app root CAs for MSP [Org1MSP]" +"2020-08-31 20:51:00.909 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9d6 [channel: businesschannel] Detected lastConfigSeq transitioning from 1 to 2, setting lastConfigBlockNum from 0 to 1" +"2020-08-31 20:51:00.910 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 9d7 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 1" +"2020-08-31 20:51:00.910 UTC [msp] GetDefaultSigningIdentity -> DEBU 9d8 Obtaining default signing identity" +"2020-08-31 20:51:00.910 UTC [msp] GetDefaultSigningIdentity -> DEBU 9da Obtaining default signing identity" +"2020-08-31 20:51:00.910 UTC [msp.identity] Sign -> DEBU 9db Sign: plaintext: 0A020801120B0A090A03010203100418...9BA90BF45430B1114E959C72D83B225D " +"2020-08-31 20:51:00.911 UTC [msp.identity] Sign -> DEBU 9dc Sign: digest: 58C8443218B198DD013B2A897A892B13F7CE9855E9EC559ECAEC78B451C39063 " +"2020-08-31 20:51:00.910 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9d9 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:00.911 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9dd Sending msg of 28 bytes to 3 on channel testchainid took 12.2µs" +"2020-08-31 20:51:00.912 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9de Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145.3µs " +"2020-08-31 20:51:00.915 UTC [fsblkstorage] indexBlock -> DEBU 9df Indexing block [blockNum=1, blockHash=[]byte{0xe3, 0x22, 0xef, 0xdb, 0x1a, 0xb5, 0x8a, 0x4e, 0xca, 0x29, 0x72, 0xa1, 0x82, 0xd5, 0x73, 0xd2, 0x6c, 0x30, 0x29, 0x25, 0x12, 0x30, 0x2d, 0xc5, 0xc9, 0xfc, 0x53, 0x0, 0x88, 0x62, 0x25, 0xd} txOffsets= +txId=0ab5ac5f1d5a2551b49ec6c24c6da873616029271ac520b4a7140ef88dfe6b38 locPointer=offset=71, bytesLength=27136 +]" +"2020-08-31 20:51:00.918 UTC [fsblkstorage] updateCheckpoint -> DEBU 9e0 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56643], isChainEmpty=[false], lastBlockNumber=[1]" +"2020-08-31 20:51:00.918 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 9e1 [channel: businesschannel] Wrote block [1]" +"2020-08-31 20:51:01.200 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9e2 Sending msg of 28 bytes to 2 on channel businesschannel took 305.3µs" +"2020-08-31 20:51:01.200 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9e3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 413.3µs " +"2020-08-31 20:51:01.200 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9e4 Sending msg of 28 bytes to 3 on channel businesschannel took 54.9µs" +"2020-08-31 20:51:01.201 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9e5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 136.9µs " +"2020-08-31 20:51:01.204 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9e6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:01.205 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9e7 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:01.412 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9e8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:01.412 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9e9 Sending msg of 28 bytes to 3 on channel testchainid took 31µs" +"2020-08-31 20:51:01.414 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9ea Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.5784ms " +"2020-08-31 20:51:01.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9eb Sending msg of 28 bytes to 2 on channel businesschannel took 35.4µs" +"2020-08-31 20:51:01.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9ec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 352.1µs " +"2020-08-31 20:51:01.667 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9ed Sending msg of 28 bytes to 3 on channel businesschannel took 488.4µs" +"2020-08-31 20:51:01.668 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9ee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 224.7µs " +"2020-08-31 20:51:01.669 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9ef Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:01.670 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9f0 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:01.876 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9f1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:01.877 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f2 Sending msg of 28 bytes to 3 on channel testchainid took 118.2µs" +"2020-08-31 20:51:01.878 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9f3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 435.3µs " +"2020-08-31 20:51:02.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f4 Sending msg of 28 bytes to 2 on channel businesschannel took 110.4µs" +"2020-08-31 20:51:02.167 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9f5 Sending msg of 28 bytes to 3 on channel businesschannel took 216.5µs" +"2020-08-31 20:51:02.168 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9f6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 362.7µs " +"2020-08-31 20:51:02.168 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9f7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 440µs " +"2020-08-31 20:51:02.170 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9f8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:02.171 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9f9 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:02.375 UTC [orderer.common.cluster.step] handleMessage -> DEBU 9fa Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:02.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9fb Sending msg of 28 bytes to 3 on channel testchainid took 155.8µs" +"2020-08-31 20:51:02.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9fc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 239.3µs " +"2020-08-31 20:51:02.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9fd Sending msg of 28 bytes to 2 on channel businesschannel took 138.4µs" +"2020-08-31 20:51:02.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU 9fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 224.1µs " +"2020-08-31 20:51:02.668 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 9ff Sending msg of 28 bytes to 3 on channel businesschannel took 987.3µs" +"2020-08-31 20:51:02.668 UTC [orderer.common.cluster.step] sendMessage -> DEBU a00 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.6µs " +"2020-08-31 20:51:02.669 UTC [orderer.common.cluster.step] handleMessage -> DEBU a01 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:02.670 UTC [orderer.common.cluster.step] handleMessage -> DEBU a02 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:02.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU a03 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:02.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU a04 Sending msg of 28 bytes to 3 on channel testchainid took 34.2µs" +"2020-08-31 20:51:02.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU a05 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 47.8µs " +"2020-08-31 20:51:02.985 UTC [orderer.common.server] Deliver -> DEBU a06 Starting new Deliver handler" +"2020-08-31 20:51:02.986 UTC [common.deliver] Handle -> DEBU a07 Starting new deliver loop for 172.18.0.9:50754" +"2020-08-31 20:51:02.986 UTC [common.deliver] Handle -> DEBU a08 Attempting to read seek info message from 172.18.0.9:50754" +"2020-08-31 20:51:03.004 UTC [orderer.common.server] Broadcast -> DEBU a09 Starting new Broadcast handler" +"2020-08-31 20:51:03.004 UTC [orderer.common.broadcast] Handle -> DEBU a0a Starting new broadcast loop for 172.18.0.9:50756" +"2020-08-31 20:51:03.005 UTC [orderer.common.broadcast] ProcessMessage -> DEBU a0b [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:50756" +"2020-08-31 20:51:03.005 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU a0c Processing config update message for exisitng channel businesschannel" +"2020-08-31 20:51:03.006 UTC [policies] Evaluate -> DEBU a0d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-08-31 20:51:03.006 UTC [policies] Evaluate -> DEBU a0e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:51:03.006 UTC [policies] Evaluate -> DEBU a0f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-08-31 20:51:03.007 UTC [policies] Evaluate -> DEBU a10 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:51:03.007 UTC [policies] Evaluate -> DEBU a11 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-08-31 20:51:03.007 UTC [msp] DeserializeIdentity -> DEBU a12 Obtaining identity" +"2020-08-31 20:51:03.008 UTC [msp.identity] newIdentity -> DEBU a13 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +-----END CERTIFICATE-----" +"2020-08-31 20:51:03.008 UTC [cauthdsl] func1 -> DEBU a14 0xc0010b9360 gate 1598907063008917800 evaluation starts" +"2020-08-31 20:51:03.009 UTC [cauthdsl] func2 -> DEBU a15 0xc0010b9360 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:51:03.009 UTC [cauthdsl] func2 -> DEBU a16 0xc0010b9360 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:51:03.009 UTC [cauthdsl] func2 -> DEBU a17 0xc0010b9360 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +"2020-08-31 20:51:03.010 UTC [cauthdsl] func2 -> DEBU a18 0xc0010b9360 principal evaluation fails" +"2020-08-31 20:51:03.010 UTC [cauthdsl] func1 -> DEBU a19 0xc0010b9360 gate 1598907063008917800 evaluation fails" +"2020-08-31 20:51:03.010 UTC [policies] Evaluate -> DEBU a1a Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:51:03.011 UTC [policies] Evaluate -> DEBU a1b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:51:03.011 UTC [policies] func1 -> DEBU a1c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2020-08-31 20:51:03.011 UTC [policies] Evaluate -> DEBU a1d Signature set did not satisfy policy /Channel/Orderer/Writers" +"2020-08-31 20:51:03.011 UTC [policies] Evaluate -> DEBU a1e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-08-31 20:51:03.012 UTC [policies] Evaluate -> DEBU a1f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-08-31 20:51:03.012 UTC [policies] Evaluate -> DEBU a20 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:51:03.012 UTC [policies] Evaluate -> DEBU a21 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2020-08-31 20:51:03.012 UTC [cauthdsl] func1 -> DEBU a22 0xc0011269d0 gate 1598907063012736200 evaluation starts" +"2020-08-31 20:51:03.012 UTC [cauthdsl] func2 -> DEBU a23 0xc0011269d0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:51:03.013 UTC [cauthdsl] func2 -> DEBU a24 0xc0011269d0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:51:03.013 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU a25 Checking if identity satisfies MEMBER role for Org2MSP" +"2020-08-31 20:51:03.013 UTC [msp] Validate -> DEBU a26 MSP Org2MSP validating identity" +"2020-08-31 20:51:03.014 UTC [msp] getCertificationChain -> DEBU a27 MSP Org2MSP getting certification chain" +"2020-08-31 20:51:03.014 UTC [cauthdsl] func2 -> DEBU a28 0xc0011269d0 principal matched by identity 0" +"2020-08-31 20:51:03.015 UTC [msp.identity] Verify -> DEBU a29 Verify: digest = 00000000 3e 05 5b 15 1a 09 ab 32 06 ff 4c 4e 78 b7 57 2f |>.[....2..LNx.W/| +00000010 f6 40 a4 b5 ea 6e 4f 3c b0 8b da 94 bb 64 e1 50 |.@...nO<.....d.P|" +"2020-08-31 20:51:03.015 UTC [msp.identity] Verify -> DEBU a2a Verify: sig = 00000000 30 45 02 21 00 95 43 a6 47 cd 4c 50 cc 6e a3 4a |0E.!..C.G.LP.n.J| +00000010 c0 11 65 e1 9a a2 2a 9f 46 b6 78 d0 12 94 c1 e9 |..e...*.F.x.....| +00000020 0d 59 4e f3 e3 02 20 11 c4 ab 2e bc 31 d5 c0 3f |.YN... .....1..?| +00000030 60 55 3f 88 1f 6d 87 76 14 3f 24 86 ce 51 da d8 |`U?..m.v.?$..Q..| +00000040 b2 44 b8 31 16 64 d5 |.D.1.d.|" +"2020-08-31 20:51:03.016 UTC [cauthdsl] func2 -> DEBU a2b 0xc0011269d0 principal evaluation succeeds for identity 0" +"2020-08-31 20:51:03.016 UTC [cauthdsl] func1 -> DEBU a2c 0xc0011269d0 gate 1598907063012736200 evaluation succeeds" +"2020-08-31 20:51:03.016 UTC [policies] Evaluate -> DEBU a2d Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:51:03.016 UTC [policies] Evaluate -> DEBU a2e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:51:03.017 UTC [policies] Evaluate -> DEBU a2f Signature set satisfies policy /Channel/Application/Writers" +"2020-08-31 20:51:03.017 UTC [policies] Evaluate -> DEBU a30 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-08-31 20:51:03.017 UTC [policies] Evaluate -> DEBU a31 Signature set satisfies policy /Channel/Writers" +"2020-08-31 20:51:03.017 UTC [policies] Evaluate -> DEBU a32 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-08-31 20:51:03.018 UTC [common.configtx] addToMap -> DEBU a33 Adding to config map: [Group] /Channel" +"2020-08-31 20:51:03.018 UTC [common.configtx] addToMap -> DEBU a34 Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:51:03.018 UTC [common.configtx] addToMap -> DEBU a35 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:51:03.019 UTC [common.configtx] addToMap -> DEBU a36 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-08-31 20:51:03.019 UTC [common.configtx] addToMap -> DEBU a37 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:51:03.019 UTC [common.configtx] addToMap -> DEBU a38 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:51:03.020 UTC [common.configtx] addToMap -> DEBU a39 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:51:03.020 UTC [common.configtx] addToMap -> DEBU a3a Adding to config map: [Group] /Channel" +"2020-08-31 20:51:03.021 UTC [common.configtx] addToMap -> DEBU a3b Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:51:03.021 UTC [common.configtx] addToMap -> DEBU a3c Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:51:03.021 UTC [common.configtx] addToMap -> DEBU a3d Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-08-31 20:51:03.021 UTC [common.configtx] addToMap -> DEBU a3e Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-08-31 20:51:03.022 UTC [common.configtx] addToMap -> DEBU a3f Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:51:03.022 UTC [common.configtx] addToMap -> DEBU a40 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:51:03.022 UTC [common.configtx] addToMap -> DEBU a41 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:51:03.022 UTC [common.configtx] verifyDeltaSet -> DEBU a42 Processing change to key: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:51:03.023 UTC [common.configtx] policyForItem -> DEBU a43 Getting policy for item Org2MSP with mod_policy Admins" +"2020-08-31 20:51:03.023 UTC [policies] Manager -> DEBU a44 Manager Channel looking up path [Application]" +"2020-08-31 20:51:03.023 UTC [policies] Manager -> DEBU a45 Manager Channel has managers Orderer" +"2020-08-31 20:51:03.023 UTC [policies] Manager -> DEBU a46 Manager Channel has managers Application" +"2020-08-31 20:51:03.023 UTC [policies] Manager -> DEBU a47 Manager Channel/Application looking up path []" +"2020-08-31 20:51:03.024 UTC [policies] Manager -> DEBU a48 Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:51:03.024 UTC [policies] Manager -> DEBU a49 Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:51:03.024 UTC [policies] Manager -> DEBU a4a Manager Channel/Application looking up path [Org2MSP]" +"2020-08-31 20:51:03.024 UTC [policies] Manager -> DEBU a4b Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:51:03.024 UTC [policies] Manager -> DEBU a4c Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:51:03.024 UTC [policies] Manager -> DEBU a4d Manager Channel/Application/Org2MSP looking up path []" +"2020-08-31 20:51:03.025 UTC [policies] Evaluate -> DEBU a4e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2020-08-31 20:51:03.025 UTC [cauthdsl] func1 -> DEBU a4f 0xc00113b730 gate 1598907063025257800 evaluation starts" +"2020-08-31 20:51:03.025 UTC [cauthdsl] func2 -> DEBU a50 0xc00113b730 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:51:03.025 UTC [cauthdsl] func2 -> DEBU a51 0xc00113b730 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:51:03.025 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU a52 Checking if identity has been named explicitly as an admin for Org2MSP" +"2020-08-31 20:51:03.026 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU a53 Checking if identity carries the admin ou for Org2MSP" +"2020-08-31 20:51:03.026 UTC [msp] Validate -> DEBU a54 MSP Org2MSP validating identity" +"2020-08-31 20:51:03.026 UTC [msp] getCertificationChain -> DEBU a55 MSP Org2MSP getting certification chain" +"2020-08-31 20:51:03.027 UTC [msp] hasOURole -> DEBU a56 MSP Org2MSP checking if the identity is a client" +"2020-08-31 20:51:03.027 UTC [msp] getCertificationChain -> DEBU a57 MSP Org2MSP getting certification chain" +"2020-08-31 20:51:03.027 UTC [cauthdsl] func2 -> DEBU a58 0xc00113b730 principal matched by identity 0" +"2020-08-31 20:51:03.027 UTC [msp.identity] Verify -> DEBU a59 Verify: digest = 00000000 16 3d f8 a1 bf ae 7d e4 fb dc 40 c7 07 6d de 8d |.=....}...@..m..| +00000010 fb 6b e1 2c 0c 1e 66 98 ba 3d 47 90 dc a4 d0 63 |.k.,..f..=G....c|" +"2020-08-31 20:51:03.028 UTC [msp.identity] Verify -> DEBU a5a Verify: sig = 00000000 30 44 02 20 75 27 f4 6f dd 5b 2d 12 b9 82 60 1a |0D. u'.o.[-...`.| +00000010 88 90 67 88 50 b6 97 37 e6 93 6d 8e 20 ca 9f 40 |..g.P..7..m. ..@| +00000020 df d1 ae 7e 02 20 2b 77 8a 7e aa 5c bd fa f5 76 |...~. +w.~.\...v| +00000030 6b bd 3d 49 6e 73 1a 12 7f 30 6c 34 57 c0 06 c4 |k.=Ins...0l4W...| +00000040 56 0c 2b fa b4 c4 |V.+...|" +"2020-08-31 20:51:03.028 UTC [cauthdsl] func2 -> DEBU a5b 0xc00113b730 principal evaluation succeeds for identity 0" +"2020-08-31 20:51:03.029 UTC [cauthdsl] func1 -> DEBU a5c 0xc00113b730 gate 1598907063025257800 evaluation succeeds" +"2020-08-31 20:51:03.029 UTC [policies] Evaluate -> DEBU a5d Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:51:03.029 UTC [policies] Evaluate -> DEBU a5e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:51:03.029 UTC [common.configtx] verifyDeltaSet -> DEBU a5f Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-08-31 20:51:03.030 UTC [common.configtx] recurseConfigMap -> DEBU a60 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.030 UTC [common.configtx] recurseConfigMap -> DEBU a61 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.030 UTC [common.configtx] recurseConfigMap -> DEBU a62 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.031 UTC [common.configtx] recurseConfigMap -> DEBU a63 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.031 UTC [common.configtx] recurseConfigMap -> DEBU a64 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.031 UTC [common.configtx] recurseConfigMap -> DEBU a65 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.032 UTC [common.configtx] recurseConfigMap -> DEBU a66 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.032 UTC [common.configtx] recurseConfigMap -> DEBU a67 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.032 UTC [common.configtx] recurseConfigMap -> DEBU a68 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.033 UTC [common.configtx] recurseConfigMap -> DEBU a69 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.033 UTC [common.configtx] recurseConfigMap -> DEBU a6a Setting policy for key Readers to " +"2020-08-31 20:51:03.034 UTC [common.configtx] recurseConfigMap -> DEBU a6b Setting policy for key Writers to " +"2020-08-31 20:51:03.034 UTC [common.configtx] recurseConfigMap -> DEBU a6c Setting policy for key Admins to " +"2020-08-31 20:51:03.034 UTC [common.configtx] recurseConfigMap -> DEBU a6d Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.034 UTC [common.configtx] recurseConfigMap -> DEBU a6e Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.034 UTC [common.configtx] recurseConfigMap -> DEBU a6f Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.035 UTC [common.configtx] recurseConfigMap -> DEBU a70 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.035 UTC [common.configtx] recurseConfigMap -> DEBU a71 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.035 UTC [common.configtx] recurseConfigMap -> DEBU a72 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.035 UTC [common.configtx] recurseConfigMap -> DEBU a73 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.036 UTC [common.configtx] recurseConfigMap -> DEBU a74 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.036 UTC [common.channelconfig] NewStandardValues -> DEBU a75 Initializing protos for *channelconfig.ChannelProtos" +"2020-08-31 20:51:03.036 UTC [common.channelconfig] initializeProtosStruct -> DEBU a76 Processing field: HashingAlgorithm" +"2020-08-31 20:51:03.036 UTC [common.channelconfig] initializeProtosStruct -> DEBU a77 Processing field: BlockDataHashingStructure" +"2020-08-31 20:51:03.036 UTC [common.channelconfig] initializeProtosStruct -> DEBU a78 Processing field: OrdererAddresses" +"2020-08-31 20:51:03.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU a79 Processing field: Consortium" +"2020-08-31 20:51:03.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU a7a Processing field: Capabilities" +"2020-08-31 20:51:03.037 UTC [common.channelconfig] NewStandardValues -> DEBU a7b Initializing protos for *channelconfig.OrdererProtos" +"2020-08-31 20:51:03.037 UTC [common.channelconfig] initializeProtosStruct -> DEBU a7c Processing field: ConsensusType" +"2020-08-31 20:51:03.038 UTC [common.channelconfig] initializeProtosStruct -> DEBU a7d Processing field: BatchSize" +"2020-08-31 20:51:03.038 UTC [common.channelconfig] initializeProtosStruct -> DEBU a7e Processing field: BatchTimeout" +"2020-08-31 20:51:03.038 UTC [common.channelconfig] initializeProtosStruct -> DEBU a7f Processing field: KafkaBrokers" +"2020-08-31 20:51:03.038 UTC [common.channelconfig] initializeProtosStruct -> DEBU a80 Processing field: ChannelRestrictions" +"2020-08-31 20:51:03.038 UTC [common.channelconfig] initializeProtosStruct -> DEBU a81 Processing field: Capabilities" +"2020-08-31 20:51:03.038 UTC [common.channelconfig] NewStandardValues -> DEBU a82 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-08-31 20:51:03.038 UTC [common.channelconfig] initializeProtosStruct -> DEBU a83 Processing field: Endpoints" +"2020-08-31 20:51:03.038 UTC [common.channelconfig] NewStandardValues -> DEBU a84 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:51:03.038 UTC [common.channelconfig] initializeProtosStruct -> DEBU a85 Processing field: MSP" +"2020-08-31 20:51:03.038 UTC [common.channelconfig] validateMSP -> DEBU a86 Setting up MSP for org OrdererOrg" +"2020-08-31 20:51:03.038 UTC [msp] newBccspMsp -> DEBU a87 Creating BCCSP-based MSP instance" +"2020-08-31 20:51:03.038 UTC [msp] New -> DEBU a88 Creating Cache-MSP instance" +"2020-08-31 20:51:03.038 UTC [msp] Setup -> DEBU a89 Setting up MSP instance OrdererMSP" +"2020-08-31 20:51:03.038 UTC [msp.identity] newIdentity -> DEBU a8a Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:51:03.040 UTC [common.channelconfig] NewStandardValues -> DEBU a8b Initializing protos for *channelconfig.ApplicationProtos" +"2020-08-31 20:51:03.040 UTC [common.channelconfig] initializeProtosStruct -> DEBU a8c Processing field: ACLs" +"2020-08-31 20:51:03.040 UTC [common.channelconfig] initializeProtosStruct -> DEBU a8d Processing field: Capabilities" +"2020-08-31 20:51:03.040 UTC [common.channelconfig] NewStandardValues -> DEBU a8e Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:51:03.040 UTC [common.channelconfig] initializeProtosStruct -> DEBU a8f Processing field: AnchorPeers" +"2020-08-31 20:51:03.040 UTC [common.channelconfig] NewStandardValues -> DEBU a90 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:51:03.040 UTC [common.channelconfig] initializeProtosStruct -> DEBU a91 Processing field: MSP" +"2020-08-31 20:51:03.040 UTC [common.channelconfig] Validate -> DEBU a92 Anchor peers for org Org2MSP are anchor_peers: " +"2020-08-31 20:51:03.040 UTC [common.channelconfig] validateMSP -> DEBU a93 Setting up MSP for org Org2MSP" +"2020-08-31 20:51:03.040 UTC [msp] newBccspMsp -> DEBU a94 Creating BCCSP-based MSP instance" +"2020-08-31 20:51:03.040 UTC [msp] New -> DEBU a95 Creating Cache-MSP instance" +"2020-08-31 20:51:03.040 UTC [msp] Setup -> DEBU a96 Setting up MSP instance Org2MSP" +"2020-08-31 20:51:03.040 UTC [msp.identity] newIdentity -> DEBU a97 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-08-31 20:51:03.041 UTC [common.channelconfig] NewStandardValues -> DEBU a98 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:51:03.041 UTC [common.channelconfig] initializeProtosStruct -> DEBU a99 Processing field: AnchorPeers" +"2020-08-31 20:51:03.041 UTC [common.channelconfig] NewStandardValues -> DEBU a9a Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:51:03.041 UTC [common.channelconfig] initializeProtosStruct -> DEBU a9b Processing field: MSP" +"2020-08-31 20:51:03.042 UTC [common.channelconfig] Validate -> DEBU a9c Anchor peers for org Org1MSP are anchor_peers: " +"2020-08-31 20:51:03.042 UTC [common.channelconfig] validateMSP -> DEBU a9d Setting up MSP for org Org1MSP" +"2020-08-31 20:51:03.043 UTC [msp] newBccspMsp -> DEBU a9e Creating BCCSP-based MSP instance" +"2020-08-31 20:51:03.043 UTC [msp] New -> DEBU a9f Creating Cache-MSP instance" +"2020-08-31 20:51:03.043 UTC [msp] Setup -> DEBU aa0 Setting up MSP instance Org1MSP" +"2020-08-31 20:51:03.043 UTC [msp.identity] newIdentity -> DEBU aa1 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-08-31 20:51:03.044 UTC [msp] Setup -> DEBU aa2 Setting up the MSP manager (3 msps)" +"2020-08-31 20:51:03.044 UTC [msp] Setup -> DEBU aa3 MSP manager setup complete, setup 3 msps" +"2020-08-31 20:51:03.044 UTC [policies] NewManagerImpl -> DEBU aa4 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:03.044 UTC [policies] NewManagerImpl -> DEBU aa5 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:03.044 UTC [policies] NewManagerImpl -> DEBU aa6 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:03.044 UTC [policies] NewManagerImpl -> DEBU aa7 Proposed new policy BlockValidation for Channel/Orderer" +"2020-08-31 20:51:03.044 UTC [policies] NewManagerImpl -> DEBU aa8 Proposed new policy Readers for Channel/Orderer" +"2020-08-31 20:51:03.044 UTC [policies] NewManagerImpl -> DEBU aa9 Proposed new policy Writers for Channel/Orderer" +"2020-08-31 20:51:03.044 UTC [policies] NewManagerImpl -> DEBU aaa Proposed new policy Admins for Channel/Orderer" +"2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU aab Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU aac Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU aad Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU aae Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU aaf Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU ab0 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-08-31 20:51:03.045 UTC [policies] GetPolicy -> DEBU ab1 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:51:03.045 UTC [policies] GetPolicy -> DEBU ab2 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU ab3 Proposed new policy Endorsement for Channel/Application" +"2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU ab4 Proposed new policy Readers for Channel/Application" +"2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU ab5 Proposed new policy Writers for Channel/Application" +"2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU ab6 Proposed new policy Admins for Channel/Application" +"2020-08-31 20:51:03.045 UTC [policies] GetPolicy -> DEBU ab7 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:51:03.045 UTC [policies] GetPolicy -> DEBU ab8 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU ab9 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU aba Proposed new policy Writers for Channel" +"2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU abb Proposed new policy Admins for Channel" +"2020-08-31 20:51:03.045 UTC [policies] NewManagerImpl -> DEBU abc Proposed new policy Readers for Channel" +"2020-08-31 20:51:03.045 UTC [common.configtx] addToMap -> DEBU abd Adding to config map: [Group] /Channel" +"2020-08-31 20:51:03.045 UTC [common.configtx] addToMap -> DEBU abe Adding to config map: [Group] /Channel/Orderer" +"2020-08-31 20:51:03.045 UTC [common.configtx] addToMap -> DEBU abf Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:03.045 UTC [common.configtx] addToMap -> DEBU ac0 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-08-31 20:51:03.045 UTC [common.configtx] addToMap -> DEBU ac1 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:51:03.045 UTC [common.configtx] addToMap -> DEBU ac2 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:51:03.045 UTC [common.configtx] addToMap -> DEBU ac3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-08-31 20:51:03.045 UTC [common.configtx] addToMap -> DEBU ac4 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ac5 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ac6 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ac7 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ac8 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ac9 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU aca Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU acb Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU acc Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU acd Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ace Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU acf Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ad0 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ad1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ad2 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ad3 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ad4 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ad5 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-08-31 20:51:03.046 UTC [common.configtx] addToMap -> DEBU ad6 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ad7 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ad8 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ad9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ada Adding to config map: [Value] /Channel/Application/ACLs" +"2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU adb Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU adc Adding to config map: [Policy] /Channel/Application/Admins" +"2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU add Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ade Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU adf Adding to config map: [Policy] /Channel/Application/Readers" +"2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ae0 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ae1 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ae2 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ae3 Adding to config map: [Value] /Channel/Consortium" +"2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ae4 Adding to config map: [Value] /Channel/Capabilities" +"2020-08-31 20:51:03.047 UTC [common.configtx] addToMap -> DEBU ae5 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-08-31 20:51:03.048 UTC [common.configtx] addToMap -> DEBU ae6 Adding to config map: [Policy] /Channel/Readers" +"2020-08-31 20:51:03.048 UTC [common.configtx] addToMap -> DEBU ae7 Adding to config map: [Policy] /Channel/Writers" +"2020-08-31 20:51:03.048 UTC [common.configtx] addToMap -> DEBU ae8 Adding to config map: [Policy] /Channel/Admins" +"2020-08-31 20:51:03.048 UTC [common.channelconfig] LogSanityChecks -> DEBU ae9 As expected, current configuration has policy '/Channel/Readers'" +"2020-08-31 20:51:03.048 UTC [common.channelconfig] LogSanityChecks -> DEBU aea As expected, current configuration has policy '/Channel/Writers'" +"2020-08-31 20:51:03.048 UTC [policies] Manager -> DEBU aeb Manager Channel looking up path [Application]" +"2020-08-31 20:51:03.049 UTC [policies] Manager -> DEBU aec Manager Channel has managers Orderer" +"2020-08-31 20:51:03.049 UTC [policies] Manager -> DEBU aed Manager Channel has managers Application" +"2020-08-31 20:51:03.049 UTC [policies] Manager -> DEBU aee Manager Channel/Application looking up path []" +"2020-08-31 20:51:03.049 UTC [policies] Manager -> DEBU aef Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:51:03.049 UTC [policies] Manager -> DEBU af0 Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:51:03.049 UTC [common.channelconfig] LogSanityChecks -> DEBU af1 As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-08-31 20:51:03.049 UTC [common.channelconfig] LogSanityChecks -> DEBU af2 As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-08-31 20:51:03.049 UTC [common.channelconfig] LogSanityChecks -> DEBU af3 As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-08-31 20:51:03.050 UTC [policies] Manager -> DEBU af4 Manager Channel looking up path [Orderer]" +"2020-08-31 20:51:03.050 UTC [policies] Manager -> DEBU af5 Manager Channel has managers Orderer" +"2020-08-31 20:51:03.050 UTC [policies] Manager -> DEBU af6 Manager Channel has managers Application" +"2020-08-31 20:51:03.050 UTC [policies] Manager -> DEBU af7 Manager Channel/Orderer looking up path []" +"2020-08-31 20:51:03.050 UTC [policies] Manager -> DEBU af8 Manager Channel/Orderer has managers OrdererOrg" +"2020-08-31 20:51:03.050 UTC [common.channelconfig] LogSanityChecks -> DEBU af9 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-08-31 20:51:03.050 UTC [common.channelconfig] LogSanityChecks -> DEBU afa As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-08-31 20:51:03.050 UTC [common.channelconfig] LogSanityChecks -> DEBU afb As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-08-31 20:51:03.050 UTC [common.channelconfig] LogSanityChecks -> DEBU afc As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-08-31 20:51:03.050 UTC [common.capabilities] Supported -> DEBU afd Orderer capability V1_4_2 is supported and is enabled" +"2020-08-31 20:51:03.050 UTC [common.capabilities] Supported -> DEBU afe Channel capability V1_4_3 is supported and is enabled" +"2020-08-31 20:51:03.050 UTC [msp] GetDefaultSigningIdentity -> DEBU aff Obtaining default signing identity" +"2020-08-31 20:51:03.051 UTC [msp] GetDefaultSigningIdentity -> DEBU b00 Obtaining default signing identity" +"2020-08-31 20:51:03.051 UTC [msp.identity] Sign -> DEBU b01 Sign: plaintext: 0AEA060A1B08011A0608B7C5B5FA0522...76143F2486CE51DAD8B244B8311664D5 " +"2020-08-31 20:51:03.051 UTC [msp.identity] Sign -> DEBU b02 Sign: digest: F0BBF3D349262E3E8871297D0A91007FC6F2A53E3C38D23F9B589EBBC796E44D " +"2020-08-31 20:51:03.053 UTC [policies] Evaluate -> DEBU b03 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-08-31 20:51:03.053 UTC [policies] Evaluate -> DEBU b04 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:51:03.053 UTC [policies] Evaluate -> DEBU b05 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-08-31 20:51:03.054 UTC [policies] Evaluate -> DEBU b06 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:51:03.054 UTC [policies] Evaluate -> DEBU b07 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-08-31 20:51:03.054 UTC [msp] DeserializeIdentity -> DEBU b08 Obtaining identity" +"2020-08-31 20:51:03.055 UTC [msp.identity] newIdentity -> DEBU b09 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE-----" +"2020-08-31 20:51:03.056 UTC [cauthdsl] func1 -> DEBU b0a 0xc001242260 gate 1598907063056702900 evaluation starts" +"2020-08-31 20:51:03.057 UTC [cauthdsl] func2 -> DEBU b0b 0xc001242260 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:51:03.057 UTC [cauthdsl] func2 -> DEBU b0c 0xc001242260 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:51:03.057 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU b0d Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-08-31 20:51:03.057 UTC [msp] Validate -> DEBU b0e MSP OrdererMSP validating identity" +"2020-08-31 20:51:03.057 UTC [msp] getCertificationChain -> DEBU b0f MSP OrdererMSP getting certification chain" +"2020-08-31 20:51:03.057 UTC [cauthdsl] func2 -> DEBU b10 0xc001242260 principal matched by identity 0" +"2020-08-31 20:51:03.058 UTC [msp.identity] Verify -> DEBU b11 Verify: digest = 00000000 f0 bb f3 d3 49 26 2e 3e 88 71 29 7d 0a 91 00 7f |....I&.>.q)}....| +00000010 c6 f2 a5 3e 3c 38 d2 3f 9b 58 9e bb c7 96 e4 4d |...><8.?.X.....M|" +"2020-08-31 20:51:03.058 UTC [msp.identity] Verify -> DEBU b12 Verify: sig = 00000000 30 45 02 21 00 e6 8d d9 5c 84 4b 47 09 13 06 b6 |0E.!....\.KG....| +00000010 45 89 d8 00 01 66 d3 67 41 9b 6b b8 ac 4e 5e 22 |E....f.gA.k..N^"| +00000020 b8 13 f9 48 dd 02 20 05 54 f1 7c ff d1 ca b3 76 |...H.. .T.|....v| +00000030 87 15 bf 1a e7 b1 28 ba a1 6e 04 d2 71 8a 64 10 |......(..n..q.d.| +00000040 f4 9e 1e 26 55 d7 b6 |...&U..|" +"2020-08-31 20:51:03.058 UTC [cauthdsl] func2 -> DEBU b13 0xc001242260 principal evaluation succeeds for identity 0" +"2020-08-31 20:51:03.059 UTC [cauthdsl] func1 -> DEBU b14 0xc001242260 gate 1598907063056702900 evaluation succeeds" +"2020-08-31 20:51:03.059 UTC [policies] Evaluate -> DEBU b15 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:51:03.059 UTC [policies] Evaluate -> DEBU b16 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:51:03.059 UTC [policies] Evaluate -> DEBU b17 Signature set satisfies policy /Channel/Orderer/Writers" +"2020-08-31 20:51:03.059 UTC [policies] Evaluate -> DEBU b18 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-08-31 20:51:03.059 UTC [policies] Evaluate -> DEBU b19 Signature set satisfies policy /Channel/Writers" +"2020-08-31 20:51:03.059 UTC [policies] Evaluate -> DEBU b1a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-08-31 20:51:03.060 UTC [orderer.common.msgprocessor] Apply -> DEBU b1b Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2020-08-31 20:51:03.060 UTC [common.channelconfig] NewStandardValues -> DEBU b1c Initializing protos for *channelconfig.ChannelProtos" +"2020-08-31 20:51:03.060 UTC [common.channelconfig] initializeProtosStruct -> DEBU b1d Processing field: HashingAlgorithm" +"2020-08-31 20:51:03.060 UTC [common.channelconfig] initializeProtosStruct -> DEBU b1e Processing field: BlockDataHashingStructure" +"2020-08-31 20:51:03.061 UTC [common.channelconfig] initializeProtosStruct -> DEBU b1f Processing field: OrdererAddresses" +"2020-08-31 20:51:03.061 UTC [common.channelconfig] initializeProtosStruct -> DEBU b20 Processing field: Consortium" +"2020-08-31 20:51:03.061 UTC [common.channelconfig] initializeProtosStruct -> DEBU b21 Processing field: Capabilities" +"2020-08-31 20:51:03.061 UTC [common.channelconfig] NewStandardValues -> DEBU b22 Initializing protos for *channelconfig.OrdererProtos" +"2020-08-31 20:51:03.061 UTC [common.channelconfig] initializeProtosStruct -> DEBU b23 Processing field: ConsensusType" +"2020-08-31 20:51:03.061 UTC [common.channelconfig] initializeProtosStruct -> DEBU b24 Processing field: BatchSize" +"2020-08-31 20:51:03.061 UTC [common.channelconfig] initializeProtosStruct -> DEBU b25 Processing field: BatchTimeout" +"2020-08-31 20:51:03.061 UTC [common.channelconfig] initializeProtosStruct -> DEBU b26 Processing field: KafkaBrokers" +"2020-08-31 20:51:03.061 UTC [common.channelconfig] initializeProtosStruct -> DEBU b27 Processing field: ChannelRestrictions" +"2020-08-31 20:51:03.062 UTC [common.channelconfig] initializeProtosStruct -> DEBU b28 Processing field: Capabilities" +"2020-08-31 20:51:03.062 UTC [common.channelconfig] NewStandardValues -> DEBU b29 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-08-31 20:51:03.062 UTC [common.channelconfig] initializeProtosStruct -> DEBU b2a Processing field: Endpoints" +"2020-08-31 20:51:03.062 UTC [common.channelconfig] NewStandardValues -> DEBU b2b Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:51:03.062 UTC [common.channelconfig] initializeProtosStruct -> DEBU b2c Processing field: MSP" +"2020-08-31 20:51:03.063 UTC [common.channelconfig] validateMSP -> DEBU b2d Setting up MSP for org OrdererOrg" +"2020-08-31 20:51:03.063 UTC [msp] newBccspMsp -> DEBU b2e Creating BCCSP-based MSP instance" +"2020-08-31 20:51:03.063 UTC [msp] New -> DEBU b2f Creating Cache-MSP instance" +"2020-08-31 20:51:03.064 UTC [msp] Setup -> DEBU b30 Setting up MSP instance OrdererMSP" +"2020-08-31 20:51:03.064 UTC [msp.identity] newIdentity -> DEBU b31 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:51:03.065 UTC [common.channelconfig] NewStandardValues -> DEBU b32 Initializing protos for *channelconfig.ApplicationProtos" +"2020-08-31 20:51:03.065 UTC [common.channelconfig] initializeProtosStruct -> DEBU b33 Processing field: ACLs" +"2020-08-31 20:51:03.065 UTC [common.channelconfig] initializeProtosStruct -> DEBU b34 Processing field: Capabilities" +"2020-08-31 20:51:03.065 UTC [common.channelconfig] NewStandardValues -> DEBU b35 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:51:03.065 UTC [common.channelconfig] initializeProtosStruct -> DEBU b36 Processing field: AnchorPeers" +"2020-08-31 20:51:03.065 UTC [common.channelconfig] NewStandardValues -> DEBU b37 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:51:03.065 UTC [common.channelconfig] initializeProtosStruct -> DEBU b38 Processing field: MSP" +"2020-08-31 20:51:03.066 UTC [common.channelconfig] Validate -> DEBU b39 Anchor peers for org Org2MSP are anchor_peers: " +"2020-08-31 20:51:03.066 UTC [common.channelconfig] validateMSP -> DEBU b3a Setting up MSP for org Org2MSP" +"2020-08-31 20:51:03.066 UTC [msp] newBccspMsp -> DEBU b3b Creating BCCSP-based MSP instance" +"2020-08-31 20:51:03.066 UTC [msp] New -> DEBU b3c Creating Cache-MSP instance" +"2020-08-31 20:51:03.066 UTC [msp] Setup -> DEBU b3d Setting up MSP instance Org2MSP" +"2020-08-31 20:51:03.067 UTC [msp.identity] newIdentity -> DEBU b3e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-08-31 20:51:03.068 UTC [common.channelconfig] NewStandardValues -> DEBU b3f Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:51:03.068 UTC [common.channelconfig] initializeProtosStruct -> DEBU b40 Processing field: AnchorPeers" +"2020-08-31 20:51:03.068 UTC [common.channelconfig] NewStandardValues -> DEBU b41 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:51:03.068 UTC [common.channelconfig] initializeProtosStruct -> DEBU b42 Processing field: MSP" +"2020-08-31 20:51:03.068 UTC [common.channelconfig] Validate -> DEBU b43 Anchor peers for org Org1MSP are anchor_peers: " +"2020-08-31 20:51:03.068 UTC [common.channelconfig] validateMSP -> DEBU b44 Setting up MSP for org Org1MSP" +"2020-08-31 20:51:03.068 UTC [msp] newBccspMsp -> DEBU b45 Creating BCCSP-based MSP instance" +"2020-08-31 20:51:03.068 UTC [msp] New -> DEBU b46 Creating Cache-MSP instance" +"2020-08-31 20:51:03.069 UTC [msp] Setup -> DEBU b47 Setting up MSP instance Org1MSP" +"2020-08-31 20:51:03.069 UTC [msp.identity] newIdentity -> DEBU b48 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-08-31 20:51:03.070 UTC [msp] Setup -> DEBU b49 Setting up the MSP manager (3 msps)" +"2020-08-31 20:51:03.070 UTC [msp] Setup -> DEBU b4a MSP manager setup complete, setup 3 msps" +"2020-08-31 20:51:03.070 UTC [policies] NewManagerImpl -> DEBU b4b Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:03.070 UTC [policies] NewManagerImpl -> DEBU b4c Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:03.070 UTC [policies] NewManagerImpl -> DEBU b4d Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:03.070 UTC [policies] NewManagerImpl -> DEBU b4e Proposed new policy BlockValidation for Channel/Orderer" +"2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b4f Proposed new policy Readers for Channel/Orderer" +"2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b50 Proposed new policy Writers for Channel/Orderer" +"2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b51 Proposed new policy Admins for Channel/Orderer" +"2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b52 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b53 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b54 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b55 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b56 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b57 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-08-31 20:51:03.071 UTC [policies] GetPolicy -> DEBU b58 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:51:03.071 UTC [policies] GetPolicy -> DEBU b59 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b5a Proposed new policy Endorsement for Channel/Application" +"2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b5b Proposed new policy Readers for Channel/Application" +"2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b5c Proposed new policy Writers for Channel/Application" +"2020-08-31 20:51:03.071 UTC [policies] NewManagerImpl -> DEBU b5d Proposed new policy Admins for Channel/Application" +"2020-08-31 20:51:03.071 UTC [policies] GetPolicy -> DEBU b5e Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:51:03.072 UTC [policies] GetPolicy -> DEBU b5f Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:51:03.072 UTC [policies] NewManagerImpl -> DEBU b60 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-08-31 20:51:03.072 UTC [policies] NewManagerImpl -> DEBU b61 Proposed new policy Readers for Channel" +"2020-08-31 20:51:03.072 UTC [policies] NewManagerImpl -> DEBU b62 Proposed new policy Writers for Channel" +"2020-08-31 20:51:03.072 UTC [policies] NewManagerImpl -> DEBU b63 Proposed new policy Admins for Channel" +"2020-08-31 20:51:03.072 UTC [common.configtx] addToMap -> DEBU b64 Adding to config map: [Group] /Channel" +"2020-08-31 20:51:03.072 UTC [common.configtx] addToMap -> DEBU b65 Adding to config map: [Group] /Channel/Orderer" +"2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b66 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b67 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b68 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b69 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b6a Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b6b Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b6c Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b6d Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b6e Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b6f Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b70 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b71 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-08-31 20:51:03.073 UTC [common.configtx] addToMap -> DEBU b72 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-08-31 20:51:03.074 UTC [common.configtx] addToMap -> DEBU b73 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-08-31 20:51:03.074 UTC [common.configtx] addToMap -> DEBU b74 Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:51:03.074 UTC [common.configtx] addToMap -> DEBU b75 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:51:03.074 UTC [common.configtx] addToMap -> DEBU b76 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-08-31 20:51:03.074 UTC [common.configtx] addToMap -> DEBU b77 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-08-31 20:51:03.074 UTC [common.configtx] addToMap -> DEBU b78 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:51:03.075 UTC [common.configtx] addToMap -> DEBU b79 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:51:03.075 UTC [common.configtx] addToMap -> DEBU b7a Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:51:03.075 UTC [common.configtx] addToMap -> DEBU b7b Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:51:03.075 UTC [common.configtx] addToMap -> DEBU b7c Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-08-31 20:51:03.075 UTC [common.configtx] addToMap -> DEBU b7d Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-08-31 20:51:03.075 UTC [common.configtx] addToMap -> DEBU b7e Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:51:03.076 UTC [common.configtx] addToMap -> DEBU b7f Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:51:03.076 UTC [common.configtx] addToMap -> DEBU b80 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:51:03.076 UTC [common.configtx] addToMap -> DEBU b81 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:51:03.076 UTC [common.configtx] addToMap -> DEBU b82 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-08-31 20:51:03.076 UTC [common.configtx] addToMap -> DEBU b83 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-08-31 20:51:03.076 UTC [common.configtx] addToMap -> DEBU b84 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-08-31 20:51:03.077 UTC [common.configtx] addToMap -> DEBU b85 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:51:03.077 UTC [common.configtx] addToMap -> DEBU b86 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:51:03.077 UTC [common.configtx] addToMap -> DEBU b87 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-08-31 20:51:03.077 UTC [common.configtx] addToMap -> DEBU b88 Adding to config map: [Value] /Channel/Consortium" +"2020-08-31 20:51:03.077 UTC [common.configtx] addToMap -> DEBU b89 Adding to config map: [Value] /Channel/Capabilities" +"2020-08-31 20:51:03.077 UTC [common.configtx] addToMap -> DEBU b8a Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-08-31 20:51:03.077 UTC [common.configtx] addToMap -> DEBU b8b Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-08-31 20:51:03.078 UTC [common.configtx] addToMap -> DEBU b8c Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-08-31 20:51:03.078 UTC [common.configtx] addToMap -> DEBU b8d Adding to config map: [Policy] /Channel/Readers" +"2020-08-31 20:51:03.078 UTC [common.configtx] addToMap -> DEBU b8e Adding to config map: [Policy] /Channel/Writers" +"2020-08-31 20:51:03.078 UTC [common.configtx] addToMap -> DEBU b8f Adding to config map: [Policy] /Channel/Admins" +"2020-08-31 20:51:03.079 UTC [orderer.common.broadcast] ProcessMessage -> DEBU b90 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:50756" +"2020-08-31 20:51:03.079 UTC [orderer.consensus.etcdraft] propose -> INFO b91 Created block [2], there are 0 blocks in flight" channel=businesschannel node=1 +"2020-08-31 20:51:03.079 UTC [orderer.consensus.etcdraft] serveRequest -> INFO b92 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2020-08-31 20:51:03.079 UTC [orderer.consensus.etcdraft] 2 -> DEBU b93 Proposed block [2] to raft consensus" channel=businesschannel node=1 +"2020-08-31 20:51:03.082 UTC [grpc] warningf -> DEBU b94 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:50756: read: connection reset by peer" +"2020-08-31 20:51:03.082 UTC [orderer.common.broadcast] Handle -> WARN b95 Error reading from 172.18.0.9:50756: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:51:03.082 UTC [orderer.common.server] func1 -> DEBU b96 Closing Broadcast stream" +"2020-08-31 20:51:03.082 UTC [comm.grpc.server] 1 -> INFO b97 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:50756 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=78.4544ms +"2020-08-31 20:51:03.083 UTC [grpc] infof -> DEBU b98 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:51:03.084 UTC [common.deliver] Handle -> WARN b99 Error reading from 172.18.0.9:50754: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:51:03.084 UTC [orderer.common.server] func1 -> DEBU b9a Closing Deliver stream" +"2020-08-31 20:51:03.084 UTC [comm.grpc.server] 1 -> INFO b9b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50754 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=99.0476ms +"2020-08-31 20:51:03.084 UTC [grpc] infof -> DEBU b9c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:51:03.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b9d Sending msg of 27272 bytes to 2 on channel businesschannel took 21.5µs" +"2020-08-31 20:51:03.088 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU b9e Sending msg of 27272 bytes to 3 on channel businesschannel took 15.5µs" +"2020-08-31 20:51:03.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU b9f Send of ConsensusRequest for channel businesschannel with payload of size 27272 to orderer1.example.com(orderer1.example.com:7050) took 98.8µs " +"2020-08-31 20:51:03.089 UTC [orderer.common.cluster.step] sendMessage -> DEBU ba0 Send of ConsensusRequest for channel businesschannel with payload of size 27272 to orderer2.example.com(orderer2.example.com:7050) took 102µs " +"2020-08-31 20:51:03.093 UTC [orderer.common.cluster.step] handleMessage -> DEBU ba1 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:03.095 UTC [orderer.common.cluster.step] handleMessage -> DEBU ba2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:03.095 UTC [orderer.consensus.etcdraft] writeBlock -> INFO ba3 Writing block [2] (Raft index: 6) to ledger" channel=businesschannel node=1 +"2020-08-31 20:51:03.095 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ba4 Sending msg of 28 bytes to 2 on channel businesschannel took 61.4µs" +"2020-08-31 20:51:03.105 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ba7 Sending msg of 28 bytes to 3 on channel businesschannel took 86.2µs" +"2020-08-31 20:51:03.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU ba5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 785.9µs " +"2020-08-31 20:51:03.098 UTC [common.configtx] addToMap -> DEBU ba6 Adding to config map: [Group] /Channel" +"2020-08-31 20:51:03.107 UTC [orderer.common.cluster.step] sendMessage -> DEBU ba8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 995.1µs " +"2020-08-31 20:51:03.108 UTC [common.configtx] addToMap -> DEBU ba9 Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:51:03.108 UTC [orderer.common.cluster.step] handleMessage -> DEBU baa Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:03.108 UTC [common.configtx] addToMap -> DEBU bab Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:51:03.109 UTC [common.configtx] addToMap -> DEBU bac Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-08-31 20:51:03.110 UTC [common.configtx] addToMap -> DEBU bad Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:51:03.111 UTC [common.configtx] addToMap -> DEBU bae Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:51:03.111 UTC [common.configtx] addToMap -> DEBU baf Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:51:03.111 UTC [common.configtx] addToMap -> DEBU bb0 Adding to config map: [Group] /Channel" +"2020-08-31 20:51:03.112 UTC [common.configtx] addToMap -> DEBU bb1 Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:51:03.112 UTC [common.configtx] addToMap -> DEBU bb2 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:51:03.112 UTC [common.configtx] addToMap -> DEBU bb3 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-08-31 20:51:03.113 UTC [common.configtx] addToMap -> DEBU bb4 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-08-31 20:51:03.113 UTC [common.configtx] addToMap -> DEBU bb5 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:51:03.113 UTC [common.configtx] addToMap -> DEBU bb6 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:51:03.114 UTC [common.configtx] addToMap -> DEBU bb7 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:51:03.114 UTC [common.configtx] verifyDeltaSet -> DEBU bb8 Processing change to key: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:51:03.114 UTC [common.configtx] policyForItem -> DEBU bb9 Getting policy for item Org2MSP with mod_policy Admins" +"2020-08-31 20:51:03.114 UTC [policies] Manager -> DEBU bba Manager Channel looking up path [Application]" +"2020-08-31 20:51:03.115 UTC [policies] Manager -> DEBU bbb Manager Channel has managers Orderer" +"2020-08-31 20:51:03.115 UTC [policies] Manager -> DEBU bbc Manager Channel has managers Application" +"2020-08-31 20:51:03.116 UTC [orderer.common.cluster.step] handleMessage -> DEBU bbd Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:03.115 UTC [policies] Manager -> DEBU bbe Manager Channel/Application looking up path []" +"2020-08-31 20:51:03.117 UTC [policies] Manager -> DEBU bbf Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:51:03.118 UTC [policies] Manager -> DEBU bc0 Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:51:03.118 UTC [policies] Manager -> DEBU bc1 Manager Channel/Application looking up path [Org2MSP]" +"2020-08-31 20:51:03.119 UTC [policies] Manager -> DEBU bc2 Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:51:03.120 UTC [policies] Manager -> DEBU bc3 Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:51:03.120 UTC [policies] Manager -> DEBU bc4 Manager Channel/Application/Org2MSP looking up path []" +"2020-08-31 20:51:03.120 UTC [policies] Evaluate -> DEBU bc5 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2020-08-31 20:51:03.121 UTC [cauthdsl] func1 -> DEBU bc6 0xc0012fdee0 gate 1598907063121067700 evaluation starts" +"2020-08-31 20:51:03.121 UTC [cauthdsl] func2 -> DEBU bc7 0xc0012fdee0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:51:03.121 UTC [cauthdsl] func2 -> DEBU bc8 0xc0012fdee0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:51:03.121 UTC [cauthdsl] func2 -> DEBU bc9 0xc0012fdee0 principal matched by identity 0" +"2020-08-31 20:51:03.122 UTC [msp.identity] Verify -> DEBU bca Verify: digest = 00000000 16 3d f8 a1 bf ae 7d e4 fb dc 40 c7 07 6d de 8d |.=....}...@..m..| +00000010 fb 6b e1 2c 0c 1e 66 98 ba 3d 47 90 dc a4 d0 63 |.k.,..f..=G....c|" +"2020-08-31 20:51:03.122 UTC [msp.identity] Verify -> DEBU bcb Verify: sig = 00000000 30 44 02 20 75 27 f4 6f dd 5b 2d 12 b9 82 60 1a |0D. u'.o.[-...`.| +00000010 88 90 67 88 50 b6 97 37 e6 93 6d 8e 20 ca 9f 40 |..g.P..7..m. ..@| +00000020 df d1 ae 7e 02 20 2b 77 8a 7e aa 5c bd fa f5 76 |...~. +w.~.\...v| +00000030 6b bd 3d 49 6e 73 1a 12 7f 30 6c 34 57 c0 06 c4 |k.=Ins...0l4W...| +00000040 56 0c 2b fa b4 c4 |V.+...|" +"2020-08-31 20:51:03.122 UTC [cauthdsl] func2 -> DEBU bcc 0xc0012fdee0 principal evaluation succeeds for identity 0" +"2020-08-31 20:51:03.122 UTC [cauthdsl] func1 -> DEBU bcd 0xc0012fdee0 gate 1598907063121067700 evaluation succeeds" +"2020-08-31 20:51:03.123 UTC [policies] Evaluate -> DEBU bce Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:51:03.123 UTC [policies] Evaluate -> DEBU bcf == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:51:03.123 UTC [common.configtx] verifyDeltaSet -> DEBU bd0 Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-08-31 20:51:03.124 UTC [common.configtx] recurseConfigMap -> DEBU bd1 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.124 UTC [common.configtx] recurseConfigMap -> DEBU bd2 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.124 UTC [common.configtx] recurseConfigMap -> DEBU bd3 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.125 UTC [common.configtx] recurseConfigMap -> DEBU bd4 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.125 UTC [common.configtx] recurseConfigMap -> DEBU bd5 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.126 UTC [common.configtx] recurseConfigMap -> DEBU bd6 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.126 UTC [common.configtx] recurseConfigMap -> DEBU bd7 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.126 UTC [common.configtx] recurseConfigMap -> DEBU bd8 Setting policy for key Readers to " +"2020-08-31 20:51:03.127 UTC [common.configtx] recurseConfigMap -> DEBU bd9 Setting policy for key Writers to " +"2020-08-31 20:51:03.127 UTC [common.configtx] recurseConfigMap -> DEBU bda Setting policy for key Admins to " +"2020-08-31 20:51:03.128 UTC [common.configtx] recurseConfigMap -> DEBU bdb Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.128 UTC [common.configtx] recurseConfigMap -> DEBU bdc Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.128 UTC [common.configtx] recurseConfigMap -> DEBU bdd Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.128 UTC [common.configtx] recurseConfigMap -> DEBU bde Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.129 UTC [common.configtx] recurseConfigMap -> DEBU bdf Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.129 UTC [common.configtx] recurseConfigMap -> DEBU be0 Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.129 UTC [common.configtx] recurseConfigMap -> DEBU be1 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.130 UTC [common.configtx] recurseConfigMap -> DEBU be2 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.130 UTC [common.configtx] recurseConfigMap -> DEBU be3 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.130 UTC [common.configtx] recurseConfigMap -> DEBU be4 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.130 UTC [common.configtx] recurseConfigMap -> DEBU be5 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:51:03.131 UTC [common.channelconfig] NewStandardValues -> DEBU be6 Initializing protos for *channelconfig.ChannelProtos" +"2020-08-31 20:51:03.131 UTC [common.channelconfig] initializeProtosStruct -> DEBU be7 Processing field: HashingAlgorithm" +"2020-08-31 20:51:03.131 UTC [common.channelconfig] initializeProtosStruct -> DEBU be8 Processing field: BlockDataHashingStructure" +"2020-08-31 20:51:03.131 UTC [common.channelconfig] initializeProtosStruct -> DEBU be9 Processing field: OrdererAddresses" +"2020-08-31 20:51:03.132 UTC [common.channelconfig] initializeProtosStruct -> DEBU bea Processing field: Consortium" +"2020-08-31 20:51:03.132 UTC [common.channelconfig] initializeProtosStruct -> DEBU beb Processing field: Capabilities" +"2020-08-31 20:51:03.132 UTC [common.channelconfig] NewStandardValues -> DEBU bec Initializing protos for *channelconfig.OrdererProtos" +"2020-08-31 20:51:03.132 UTC [common.channelconfig] initializeProtosStruct -> DEBU bed Processing field: ConsensusType" +"2020-08-31 20:51:03.132 UTC [common.channelconfig] initializeProtosStruct -> DEBU bee Processing field: BatchSize" +"2020-08-31 20:51:03.133 UTC [common.channelconfig] initializeProtosStruct -> DEBU bef Processing field: BatchTimeout" +"2020-08-31 20:51:03.133 UTC [common.channelconfig] initializeProtosStruct -> DEBU bf0 Processing field: KafkaBrokers" +"2020-08-31 20:51:03.133 UTC [common.channelconfig] initializeProtosStruct -> DEBU bf1 Processing field: ChannelRestrictions" +"2020-08-31 20:51:03.134 UTC [common.channelconfig] initializeProtosStruct -> DEBU bf2 Processing field: Capabilities" +"2020-08-31 20:51:03.134 UTC [common.channelconfig] NewStandardValues -> DEBU bf3 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-08-31 20:51:03.134 UTC [common.channelconfig] initializeProtosStruct -> DEBU bf4 Processing field: Endpoints" +"2020-08-31 20:51:03.134 UTC [common.channelconfig] NewStandardValues -> DEBU bf5 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:51:03.134 UTC [common.channelconfig] initializeProtosStruct -> DEBU bf6 Processing field: MSP" +"2020-08-31 20:51:03.134 UTC [common.channelconfig] validateMSP -> DEBU bf7 Setting up MSP for org OrdererOrg" +"2020-08-31 20:51:03.134 UTC [msp] newBccspMsp -> DEBU bf8 Creating BCCSP-based MSP instance" +"2020-08-31 20:51:03.134 UTC [msp] New -> DEBU bf9 Creating Cache-MSP instance" +"2020-08-31 20:51:03.134 UTC [msp] Setup -> DEBU bfa Setting up MSP instance OrdererMSP" +"2020-08-31 20:51:03.135 UTC [msp.identity] newIdentity -> DEBU bfb Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:51:03.135 UTC [common.channelconfig] NewStandardValues -> DEBU bfc Initializing protos for *channelconfig.ApplicationProtos" +"2020-08-31 20:51:03.135 UTC [common.channelconfig] initializeProtosStruct -> DEBU bfd Processing field: ACLs" +"2020-08-31 20:51:03.135 UTC [common.channelconfig] initializeProtosStruct -> DEBU bfe Processing field: Capabilities" +"2020-08-31 20:51:03.135 UTC [common.channelconfig] NewStandardValues -> DEBU bff Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:51:03.135 UTC [common.channelconfig] initializeProtosStruct -> DEBU c00 Processing field: AnchorPeers" +"2020-08-31 20:51:03.135 UTC [common.channelconfig] NewStandardValues -> DEBU c01 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:51:03.135 UTC [common.channelconfig] initializeProtosStruct -> DEBU c02 Processing field: MSP" +"2020-08-31 20:51:03.135 UTC [common.channelconfig] Validate -> DEBU c03 Anchor peers for org Org2MSP are anchor_peers: " +"2020-08-31 20:51:03.135 UTC [common.channelconfig] validateMSP -> DEBU c04 Setting up MSP for org Org2MSP" +"2020-08-31 20:51:03.135 UTC [msp] newBccspMsp -> DEBU c05 Creating BCCSP-based MSP instance" +"2020-08-31 20:51:03.135 UTC [msp] New -> DEBU c06 Creating Cache-MSP instance" +"2020-08-31 20:51:03.135 UTC [msp] Setup -> DEBU c07 Setting up MSP instance Org2MSP" +"2020-08-31 20:51:03.136 UTC [msp.identity] newIdentity -> DEBU c08 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-08-31 20:51:03.136 UTC [common.channelconfig] NewStandardValues -> DEBU c09 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:51:03.136 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0a Processing field: AnchorPeers" +"2020-08-31 20:51:03.136 UTC [common.channelconfig] NewStandardValues -> DEBU c0b Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:51:03.136 UTC [common.channelconfig] initializeProtosStruct -> DEBU c0c Processing field: MSP" +"2020-08-31 20:51:03.136 UTC [common.channelconfig] Validate -> DEBU c0d Anchor peers for org Org1MSP are anchor_peers: " +"2020-08-31 20:51:03.136 UTC [common.channelconfig] validateMSP -> DEBU c0e Setting up MSP for org Org1MSP" +"2020-08-31 20:51:03.137 UTC [msp] newBccspMsp -> DEBU c0f Creating BCCSP-based MSP instance" +"2020-08-31 20:51:03.137 UTC [msp] New -> DEBU c10 Creating Cache-MSP instance" +"2020-08-31 20:51:03.137 UTC [msp] Setup -> DEBU c11 Setting up MSP instance Org1MSP" +"2020-08-31 20:51:03.137 UTC [msp.identity] newIdentity -> DEBU c12 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-08-31 20:51:03.137 UTC [msp] Setup -> DEBU c13 Setting up the MSP manager (3 msps)" +"2020-08-31 20:51:03.137 UTC [msp] Setup -> DEBU c14 MSP manager setup complete, setup 3 msps" +"2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c15 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c16 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c17 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c18 Proposed new policy Admins for Channel/Orderer" +"2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c19 Proposed new policy BlockValidation for Channel/Orderer" +"2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c1a Proposed new policy Readers for Channel/Orderer" +"2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c1b Proposed new policy Writers for Channel/Orderer" +"2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c1c Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c1d Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c1e Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c1f Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c20 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c21 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-08-31 20:51:03.138 UTC [policies] GetPolicy -> DEBU c22 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:51:03.138 UTC [policies] GetPolicy -> DEBU c23 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c24 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-08-31 20:51:03.138 UTC [policies] GetPolicy -> DEBU c25 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:51:03.138 UTC [policies] GetPolicy -> DEBU c26 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c27 Proposed new policy Endorsement for Channel/Application" +"2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c28 Proposed new policy Readers for Channel/Application" +"2020-08-31 20:51:03.138 UTC [policies] NewManagerImpl -> DEBU c29 Proposed new policy Writers for Channel/Application" +"2020-08-31 20:51:03.139 UTC [policies] NewManagerImpl -> DEBU c2a Proposed new policy Admins for Channel/Application" +"2020-08-31 20:51:03.139 UTC [policies] NewManagerImpl -> DEBU c2b Proposed new policy Readers for Channel" +"2020-08-31 20:51:03.139 UTC [policies] NewManagerImpl -> DEBU c2c Proposed new policy Writers for Channel" +"2020-08-31 20:51:03.139 UTC [policies] NewManagerImpl -> DEBU c2d Proposed new policy Admins for Channel" +"2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c2e Adding to config map: [Group] /Channel" +"2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c2f Adding to config map: [Group] /Channel/Orderer" +"2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c30 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c31 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c32 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c33 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c34 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c35 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c36 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c37 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c38 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c39 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c3a Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c3b Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c3c Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-08-31 20:51:03.139 UTC [common.configtx] addToMap -> DEBU c3d Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c3e Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c3f Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c40 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c41 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c42 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c43 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c44 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c45 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c46 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c47 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c48 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c49 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c4a Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c4b Adding to config map: [Value] /Channel/Application/ACLs" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c4c Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c4d Adding to config map: [Policy] /Channel/Application/Admins" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c4e Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c4f Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c50 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c51 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-08-31 20:51:03.140 UTC [common.configtx] addToMap -> DEBU c52 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-08-31 20:51:03.141 UTC [common.configtx] addToMap -> DEBU c53 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-08-31 20:51:03.141 UTC [common.configtx] addToMap -> DEBU c54 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-08-31 20:51:03.141 UTC [common.configtx] addToMap -> DEBU c55 Adding to config map: [Value] /Channel/Consortium" +"2020-08-31 20:51:03.141 UTC [common.configtx] addToMap -> DEBU c56 Adding to config map: [Value] /Channel/Capabilities" +"2020-08-31 20:51:03.141 UTC [common.configtx] addToMap -> DEBU c57 Adding to config map: [Policy] /Channel/Readers" +"2020-08-31 20:51:03.141 UTC [common.configtx] addToMap -> DEBU c58 Adding to config map: [Policy] /Channel/Writers" +"2020-08-31 20:51:03.141 UTC [common.configtx] addToMap -> DEBU c59 Adding to config map: [Policy] /Channel/Admins" +"2020-08-31 20:51:03.141 UTC [common.channelconfig] LogSanityChecks -> DEBU c5a As expected, current configuration has policy '/Channel/Readers'" +"2020-08-31 20:51:03.141 UTC [common.channelconfig] LogSanityChecks -> DEBU c5b As expected, current configuration has policy '/Channel/Writers'" +"2020-08-31 20:51:03.141 UTC [policies] Manager -> DEBU c5c Manager Channel looking up path [Application]" +"2020-08-31 20:51:03.141 UTC [policies] Manager -> DEBU c5d Manager Channel has managers Orderer" +"2020-08-31 20:51:03.141 UTC [policies] Manager -> DEBU c5e Manager Channel has managers Application" +"2020-08-31 20:51:03.141 UTC [policies] Manager -> DEBU c5f Manager Channel/Application looking up path []" +"2020-08-31 20:51:03.141 UTC [policies] Manager -> DEBU c60 Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:51:03.141 UTC [policies] Manager -> DEBU c61 Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:51:03.141 UTC [common.channelconfig] LogSanityChecks -> DEBU c62 As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-08-31 20:51:03.141 UTC [common.channelconfig] LogSanityChecks -> DEBU c63 As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-08-31 20:51:03.141 UTC [common.channelconfig] LogSanityChecks -> DEBU c64 As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-08-31 20:51:03.141 UTC [policies] Manager -> DEBU c65 Manager Channel looking up path [Orderer]" +"2020-08-31 20:51:03.142 UTC [policies] Manager -> DEBU c66 Manager Channel has managers Orderer" +"2020-08-31 20:51:03.142 UTC [policies] Manager -> DEBU c67 Manager Channel has managers Application" +"2020-08-31 20:51:03.142 UTC [policies] Manager -> DEBU c68 Manager Channel/Orderer looking up path []" +"2020-08-31 20:51:03.142 UTC [policies] Manager -> DEBU c69 Manager Channel/Orderer has managers OrdererOrg" +"2020-08-31 20:51:03.142 UTC [common.channelconfig] LogSanityChecks -> DEBU c6a As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-08-31 20:51:03.142 UTC [common.channelconfig] LogSanityChecks -> DEBU c6b As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-08-31 20:51:03.142 UTC [common.channelconfig] LogSanityChecks -> DEBU c6c As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-08-31 20:51:03.142 UTC [common.channelconfig] LogSanityChecks -> DEBU c6d As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-08-31 20:51:03.142 UTC [common.capabilities] Supported -> DEBU c6e Orderer capability V1_4_2 is supported and is enabled" +"2020-08-31 20:51:03.142 UTC [common.capabilities] Supported -> DEBU c6f Channel capability V1_4_3 is supported and is enabled" +"2020-08-31 20:51:03.142 UTC [orderer.common.server] func1 -> DEBU c70 Executing callback to update root CAs" +"2020-08-31 20:51:03.142 UTC [orderer.common.server] updateTrustedRoots -> DEBU c71 updating root CAs for channel [businesschannel]" +"2020-08-31 20:51:03.142 UTC [orderer.common.server] updateTrustedRoots -> DEBU c72 adding app root CAs for MSP [Org2MSP]" +"2020-08-31 20:51:03.142 UTC [orderer.common.server] updateTrustedRoots -> DEBU c73 adding app root CAs for MSP [Org1MSP]" +"2020-08-31 20:51:03.142 UTC [orderer.common.server] updateTrustedRoots -> DEBU c74 adding orderer root CAs for MSP [OrdererMSP]" +"2020-08-31 20:51:03.142 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c75 [channel: businesschannel] Detected lastConfigSeq transitioning from 2 to 3, setting lastConfigBlockNum from 1 to 2" +"2020-08-31 20:51:03.142 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU c76 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2020-08-31 20:51:03.142 UTC [msp] GetDefaultSigningIdentity -> DEBU c77 Obtaining default signing identity" +"2020-08-31 20:51:03.142 UTC [msp] GetDefaultSigningIdentity -> DEBU c78 Obtaining default signing identity" +"2020-08-31 20:51:03.143 UTC [msp.identity] Sign -> DEBU c79 Sign: plaintext: 0A020802120B0A090A03010203100418...0AA37327943750B2C7541B8FC5E43804 " +"2020-08-31 20:51:03.143 UTC [msp.identity] Sign -> DEBU c7a Sign: digest: D83B715B21F682EDC18B71680E607CFAF8DF66D528BB605EF1C24C3F47A793FA " +"2020-08-31 20:51:03.145 UTC [fsblkstorage] indexBlock -> DEBU c7b Indexing block [blockNum=2, blockHash=[]byte{0x22, 0x1, 0xdc, 0x78, 0x27, 0xf2, 0x2d, 0xc3, 0x61, 0xf7, 0x88, 0xbc, 0x3b, 0x31, 0x2f, 0x16, 0xf3, 0xa9, 0x7a, 0x3d, 0x6c, 0xaa, 0xbe, 0x10, 0x69, 0xd3, 0x9f, 0xc0, 0xb5, 0xb6, 0x7a, 0xbf} txOffsets= +txId=ed7b76e084105979adee38a130a3cf311c0f2d9b0dc1c2dda158f0d55a15426c locPointer=offset=71, bytesLength=27141 +]" +"2020-08-31 20:51:03.147 UTC [fsblkstorage] updateCheckpoint -> DEBU c7c Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84817], isChainEmpty=[false], lastBlockNumber=[2]" +"2020-08-31 20:51:03.147 UTC [orderer.commmon.multichannel] commitBlock -> DEBU c7d [channel: businesschannel] Wrote block [2]" +"2020-08-31 20:51:03.169 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7e Sending msg of 28 bytes to 2 on channel businesschannel took 31.1µs" +"2020-08-31 20:51:03.169 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c7f Sending msg of 28 bytes to 3 on channel businesschannel took 19.5µs" +"2020-08-31 20:51:03.169 UTC [orderer.common.cluster.step] sendMessage -> DEBU c80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 122.8µs " +"2020-08-31 20:51:03.170 UTC [orderer.common.cluster.step] sendMessage -> DEBU c81 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 102.3µs " +"2020-08-31 20:51:03.172 UTC [orderer.common.cluster.step] handleMessage -> DEBU c82 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:03.172 UTC [orderer.common.cluster.step] handleMessage -> DEBU c83 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:03.376 UTC [orderer.common.cluster.step] handleMessage -> DEBU c84 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:03.377 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c85 Sending msg of 28 bytes to 3 on channel testchainid took 20.6µs" +"2020-08-31 20:51:03.377 UTC [orderer.common.cluster.step] sendMessage -> DEBU c86 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 366.3µs " +"2020-08-31 20:51:03.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c87 Sending msg of 28 bytes to 2 on channel businesschannel took 22µs" +"2020-08-31 20:51:03.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c88 Sending msg of 28 bytes to 3 on channel businesschannel took 17.2µs" +"2020-08-31 20:51:03.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU c89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 389.3µs " +"2020-08-31 20:51:03.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 735.7µs " +"2020-08-31 20:51:03.669 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:03.670 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8c Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:03.875 UTC [orderer.common.cluster.step] handleMessage -> DEBU c8d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:03.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c8e Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +"2020-08-31 20:51:03.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU c8f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.7µs " +"2020-08-31 20:51:04.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c90 Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +"2020-08-31 20:51:04.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c91 Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +"2020-08-31 20:51:04.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU c92 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 409.9µs " +"2020-08-31 20:51:04.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU c93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.9µs " +"2020-08-31 20:51:04.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU c94 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:04.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU c95 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:04.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU c96 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:04.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU c97 Sending msg of 28 bytes to 3 on channel testchainid took 13.3µs" +"2020-08-31 20:51:04.374 UTC [orderer.common.cluster.step] sendMessage -> DEBU c98 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70µs " +"2020-08-31 20:51:04.515 UTC [orderer.common.server] Deliver -> DEBU c99 Starting new Deliver handler" +"2020-08-31 20:51:04.515 UTC [common.deliver] Handle -> DEBU c9a Starting new deliver loop for 172.18.0.5:56650" +"2020-08-31 20:51:04.515 UTC [common.deliver] Handle -> DEBU c9b Attempting to read seek info message from 172.18.0.5:56650" +"2020-08-31 20:51:04.516 UTC [policies] Evaluate -> DEBU c9c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:51:04.516 UTC [policies] Evaluate -> DEBU c9d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:51:04.516 UTC [policies] Evaluate -> DEBU c9e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:51:04.516 UTC [policies] Evaluate -> DEBU c9f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:51:04.516 UTC [policies] Evaluate -> DEBU ca0 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:51:04.516 UTC [msp] DeserializeIdentity -> DEBU ca1 Obtaining identity" +"2020-08-31 20:51:04.517 UTC [msp.identity] newIdentity -> DEBU ca2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +-----END CERTIFICATE-----" +"2020-08-31 20:51:04.517 UTC [cauthdsl] func1 -> DEBU ca3 0xc00004fa30 gate 1598907064517428000 evaluation starts" +"2020-08-31 20:51:04.518 UTC [cauthdsl] func2 -> DEBU ca4 0xc00004fa30 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:51:04.518 UTC [cauthdsl] func2 -> DEBU ca5 0xc00004fa30 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:51:04.518 UTC [cauthdsl] func2 -> DEBU ca6 0xc00004fa30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +"2020-08-31 20:51:04.518 UTC [cauthdsl] func2 -> DEBU ca7 0xc00004fa30 principal evaluation fails" +"2020-08-31 20:51:04.518 UTC [cauthdsl] func1 -> DEBU ca8 0xc00004fa30 gate 1598907064517428000 evaluation fails" +"2020-08-31 20:51:04.518 UTC [policies] Evaluate -> DEBU ca9 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:51:04.518 UTC [policies] Evaluate -> DEBU caa == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:51:04.518 UTC [policies] func1 -> DEBU cab Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Readers ]" +"2020-08-31 20:51:04.518 UTC [policies] Evaluate -> DEBU cac Signature set did not satisfy policy /Channel/Orderer/Readers" +"2020-08-31 20:51:04.519 UTC [policies] Evaluate -> DEBU cad == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:51:04.519 UTC [policies] Evaluate -> DEBU cae == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-08-31 20:51:04.519 UTC [policies] Evaluate -> DEBU caf This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:51:04.519 UTC [policies] Evaluate -> DEBU cb0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-08-31 20:51:04.519 UTC [cauthdsl] func1 -> DEBU cb1 0xc000111e50 gate 1598907064519609200 evaluation starts" +"2020-08-31 20:51:04.519 UTC [cauthdsl] func2 -> DEBU cb2 0xc000111e50 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:51:04.519 UTC [cauthdsl] func2 -> DEBU cb3 0xc000111e50 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:51:04.519 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU cb4 Checking if identity satisfies MEMBER role for Org2MSP" +"2020-08-31 20:51:04.520 UTC [msp] Validate -> DEBU cb5 MSP Org2MSP validating identity" +"2020-08-31 20:51:04.520 UTC [msp] getCertificationChain -> DEBU cb6 MSP Org2MSP getting certification chain" +"2020-08-31 20:51:04.520 UTC [cauthdsl] func2 -> DEBU cb7 0xc000111e50 principal matched by identity 0" +"2020-08-31 20:51:04.520 UTC [msp.identity] Verify -> DEBU cb8 Verify: digest = 00000000 57 5b ee bb f7 e1 76 65 eb 70 21 da ba 1c a8 d0 |W[....ve.p!.....| +00000010 80 fc e8 bc 62 7d 37 2d 90 ae e5 1a a5 f9 38 c9 |....b}7-......8.|" +"2020-08-31 20:51:04.521 UTC [msp.identity] Verify -> DEBU cb9 Verify: sig = 00000000 30 44 02 20 6f 2a 9e 2e 15 ce b3 a9 88 a8 d3 ef |0D. o*..........| +00000010 61 ae 42 1f 51 86 ea d1 b4 ce 06 95 ae 6d 7f 5d |a.B.Q........m.]| +00000020 43 12 01 d0 02 20 02 e3 a8 43 f2 35 bf cf 62 43 |C.... ...C.5..bC| +00000030 c7 53 f2 04 cf 6d a8 32 cd 64 e5 12 82 bd e4 58 |.S...m.2.d.....X| +00000040 48 7d bb cc 85 d0 |H}....|" +"2020-08-31 20:51:04.521 UTC [cauthdsl] func2 -> DEBU cba 0xc000111e50 principal evaluation succeeds for identity 0" +"2020-08-31 20:51:04.521 UTC [cauthdsl] func1 -> DEBU cbb 0xc000111e50 gate 1598907064519609200 evaluation succeeds" +"2020-08-31 20:51:04.521 UTC [policies] Evaluate -> DEBU cbc Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:51:04.521 UTC [policies] Evaluate -> DEBU cbd == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:51:04.521 UTC [policies] Evaluate -> DEBU cbe Signature set satisfies policy /Channel/Application/Readers" +"2020-08-31 20:51:04.521 UTC [policies] Evaluate -> DEBU cbf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-08-31 20:51:04.522 UTC [policies] Evaluate -> DEBU cc0 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:51:04.522 UTC [policies] Evaluate -> DEBU cc1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:51:04.522 UTC [common.deliver] deliverBlocks -> DEBU cc2 [channel: businesschannel] Received seekInfo (0xc000a09280) start: > stop: > from 172.18.0.5:56650" +"2020-08-31 20:51:04.522 UTC [fsblkstorage] Next -> DEBU cc3 Initializing block stream for iterator. itr.maxBlockNumAvailable=2" +"2020-08-31 20:51:04.522 UTC [fsblkstorage] newBlockfileStream -> DEBU cc4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[28475]" +"2020-08-31 20:51:04.522 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cc5 Remaining bytes=[56342], Going to peek [8] bytes" +"2020-08-31 20:51:04.522 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cc6 Returning blockbytes - length=[28165], placementInfo={fileNum=[0], startOffset=[28475], bytesOffset=[28478]}" +"2020-08-31 20:51:04.522 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cc7 blockbytes [28165] read from file [0]" +"2020-08-31 20:51:04.523 UTC [common.deliver] deliverBlocks -> DEBU cc8 [channel: businesschannel] Delivering block [1] for (0xc000a09280) for 172.18.0.5:56650" +"2020-08-31 20:51:04.523 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cc9 Remaining bytes=[28174], Going to peek [8] bytes" +"2020-08-31 20:51:04.523 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU cca Returning blockbytes - length=[28171], placementInfo={fileNum=[0], startOffset=[56643], bytesOffset=[56646]}" +"2020-08-31 20:51:04.523 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU ccb blockbytes [28171] read from file [0]" +"2020-08-31 20:51:04.523 UTC [common.deliver] deliverBlocks -> DEBU ccc [channel: businesschannel] Delivering block [2] for (0xc000a09280) for 172.18.0.5:56650" +"2020-08-31 20:51:04.523 UTC [fsblkstorage] waitForBlock -> DEBU ccd Going to wait for newer blocks. maxAvailaBlockNumber=[2], waitForBlockNum=[3]" +"2020-08-31 20:51:04.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cce Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +"2020-08-31 20:51:04.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ccf Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +"2020-08-31 20:51:04.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 221.7µs " +"2020-08-31 20:51:04.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 211µs " +"2020-08-31 20:51:04.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:04.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd3 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:04.875 UTC [orderer.common.cluster.step] handleMessage -> DEBU cd4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:04.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd5 Sending msg of 28 bytes to 3 on channel testchainid took 119µs" +"2020-08-31 20:51:04.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1025ms " +"2020-08-31 20:51:05.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd7 Sending msg of 28 bytes to 2 on channel businesschannel took 20µs" +"2020-08-31 20:51:05.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cd8 Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +"2020-08-31 20:51:05.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU cd9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146.3µs " +"2020-08-31 20:51:05.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU cda Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146.3µs " +"2020-08-31 20:51:05.166 UTC [orderer.common.cluster.step] handleMessage -> DEBU cdb Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:05.166 UTC [orderer.common.cluster.step] handleMessage -> DEBU cdc Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:05.375 UTC [orderer.common.cluster.step] handleMessage -> DEBU cdd Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:05.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cde Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2020-08-31 20:51:05.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU cdf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 569.9µs " +"2020-08-31 20:51:05.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce0 Sending msg of 28 bytes to 2 on channel businesschannel took 32.5µs" +"2020-08-31 20:51:05.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce1 Sending msg of 28 bytes to 3 on channel businesschannel took 10.1µs" +"2020-08-31 20:51:05.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 285.6µs " +"2020-08-31 20:51:05.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 326.7µs " +"2020-08-31 20:51:05.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce4 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:05.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:05.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU ce6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:05.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce7 Sending msg of 28 bytes to 3 on channel testchainid took 28.2µs" +"2020-08-31 20:51:05.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU ce8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.2µs " +"2020-08-31 20:51:06.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ce9 Sending msg of 28 bytes to 2 on channel businesschannel took 31.8µs" +"2020-08-31 20:51:06.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cea Sending msg of 28 bytes to 3 on channel businesschannel took 22.9µs" +"2020-08-31 20:51:06.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU ceb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.3573ms " +"2020-08-31 20:51:06.168 UTC [orderer.common.cluster.step] sendMessage -> DEBU cec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 83.9µs " +"2020-08-31 20:51:06.170 UTC [orderer.common.cluster.step] handleMessage -> DEBU ced Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:06.171 UTC [orderer.common.cluster.step] handleMessage -> DEBU cee Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:06.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU cef Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:06.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf0 Sending msg of 28 bytes to 3 on channel testchainid took 325.1µs" +"2020-08-31 20:51:06.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 119.9µs " +"2020-08-31 20:51:06.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf2 Sending msg of 28 bytes to 2 on channel businesschannel took 20µs" +"2020-08-31 20:51:06.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf3 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +"2020-08-31 20:51:06.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 325.8µs " +"2020-08-31 20:51:06.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU cf5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 295.9µs " +"2020-08-31 20:51:06.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf6 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:06.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf7 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:06.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU cf8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:06.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cf9 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +"2020-08-31 20:51:06.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 866.3µs " +"2020-08-31 20:51:07.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfb Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +"2020-08-31 20:51:07.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU cfc Sending msg of 28 bytes to 3 on channel businesschannel took 12.2µs" +"2020-08-31 20:51:07.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 906.2µs " +"2020-08-31 20:51:07.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU cfe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 322.6µs " +"2020-08-31 20:51:07.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU cff Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:07.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU d00 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:07.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU d01 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:07.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d02 Sending msg of 28 bytes to 3 on channel testchainid took 20.9µs" +"2020-08-31 20:51:07.374 UTC [orderer.common.cluster.step] sendMessage -> DEBU d03 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52µs " +"2020-08-31 20:51:07.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d04 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +"2020-08-31 20:51:07.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d05 Sending msg of 28 bytes to 3 on channel businesschannel took 8.4µs" +"2020-08-31 20:51:07.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU d06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.7µs " +"2020-08-31 20:51:07.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU d07 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 389.5µs " +"2020-08-31 20:51:07.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU d08 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:07.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU d09 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:07.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU d0a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:07.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0b Sending msg of 28 bytes to 3 on channel testchainid took 10µs" +"2020-08-31 20:51:07.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.1µs " +"2020-08-31 20:51:08.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0d Sending msg of 28 bytes to 2 on channel businesschannel took 32.2µs" +"2020-08-31 20:51:08.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d0e Sending msg of 28 bytes to 3 on channel businesschannel took 19µs" +"2020-08-31 20:51:08.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 153.1µs " +"2020-08-31 20:51:08.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU d10 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 558.6µs " +"2020-08-31 20:51:08.170 UTC [orderer.common.cluster.step] handleMessage -> DEBU d12 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:08.170 UTC [orderer.common.cluster.step] handleMessage -> DEBU d11 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:08.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU d13 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:08.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d14 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +"2020-08-31 20:51:08.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU d15 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 592.4µs " +"2020-08-31 20:51:08.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d16 Sending msg of 28 bytes to 2 on channel businesschannel took 18µs" +"2020-08-31 20:51:08.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d17 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +"2020-08-31 20:51:08.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU d18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 101.7µs " +"2020-08-31 20:51:08.666 UTC [orderer.common.cluster.step] handleMessage -> DEBU d19 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:08.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 109.1µs " +"2020-08-31 20:51:08.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:08.873 UTC [orderer.common.cluster.step] handleMessage -> DEBU d1c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:08.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1d Sending msg of 28 bytes to 3 on channel testchainid took 44.3µs" +"2020-08-31 20:51:08.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU d1e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.1µs " +"2020-08-31 20:51:09.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d1f Sending msg of 28 bytes to 3 on channel businesschannel took 17.3µs" +"2020-08-31 20:51:09.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d20 Sending msg of 28 bytes to 2 on channel businesschannel took 10.4µs" +"2020-08-31 20:51:09.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 50.8µs " +"2020-08-31 20:51:09.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU d22 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:09.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d23 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 333.8µs " +"2020-08-31 20:51:09.170 UTC [orderer.common.cluster.step] handleMessage -> DEBU d24 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:09.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU d25 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:09.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d26 Sending msg of 28 bytes to 3 on channel testchainid took 15.1µs" +"2020-08-31 20:51:09.374 UTC [orderer.common.cluster.step] sendMessage -> DEBU d27 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 319.2µs " +"2020-08-31 20:51:09.402 UTC [orderer.common.server] Broadcast -> DEBU d28 Starting new Broadcast handler" +"2020-08-31 20:51:09.402 UTC [orderer.common.broadcast] Handle -> DEBU d29 Starting new broadcast loop for 172.18.0.9:50818" +"2020-08-31 20:51:09.667 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2a Sending msg of 28 bytes to 2 on channel businesschannel took 49.5µs" +"2020-08-31 20:51:09.667 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d2b Sending msg of 28 bytes to 3 on channel businesschannel took 23.7µs" +"2020-08-31 20:51:09.668 UTC [orderer.common.cluster.step] sendMessage -> DEBU d2c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 827.1µs " +"2020-08-31 20:51:09.670 UTC [orderer.common.cluster.step] sendMessage -> DEBU d2d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.3467ms " +"2020-08-31 20:51:09.671 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:09.672 UTC [orderer.common.cluster.step] handleMessage -> DEBU d2f Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:09.875 UTC [orderer.common.cluster.step] handleMessage -> DEBU d30 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:09.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d31 Sending msg of 28 bytes to 3 on channel testchainid took 28.4µs" +"2020-08-31 20:51:09.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU d32 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.7µs " +"2020-08-31 20:51:10.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d33 Sending msg of 28 bytes to 2 on channel businesschannel took 30.3µs" +"2020-08-31 20:51:10.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d34 Sending msg of 28 bytes to 3 on channel businesschannel took 20.9µs" +"2020-08-31 20:51:10.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU d35 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 172.4µs " +"2020-08-31 20:51:10.169 UTC [orderer.common.cluster.step] handleMessage -> DEBU d36 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:10.170 UTC [orderer.common.cluster.step] sendMessage -> DEBU d37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 4.2719ms " +"2020-08-31 20:51:10.172 UTC [orderer.common.cluster.step] handleMessage -> DEBU d38 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:10.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU d39 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:10.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3a Sending msg of 28 bytes to 3 on channel testchainid took 18.7µs" +"2020-08-31 20:51:10.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 428.2µs " +"2020-08-31 20:51:10.667 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3c Sending msg of 28 bytes to 2 on channel businesschannel took 32.8µs" +"2020-08-31 20:51:10.667 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d3d Sending msg of 28 bytes to 3 on channel businesschannel took 23.4µs" +"2020-08-31 20:51:10.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.3µs " +"2020-08-31 20:51:10.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU d3f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 93.1µs " +"2020-08-31 20:51:10.669 UTC [orderer.common.cluster.step] handleMessage -> DEBU d40 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:10.669 UTC [orderer.common.cluster.step] handleMessage -> DEBU d41 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:10.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU d42 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:10.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d43 Sending msg of 28 bytes to 3 on channel testchainid took 27.4µs" +"2020-08-31 20:51:10.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU d44 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.9µs " +"2020-08-31 20:51:11.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d45 Sending msg of 28 bytes to 2 on channel businesschannel took 32.7µs" +"2020-08-31 20:51:11.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d46 Sending msg of 28 bytes to 3 on channel businesschannel took 23µs" +"2020-08-31 20:51:11.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d47 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.2µs " +"2020-08-31 20:51:11.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU d48 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 189.6µs " +"2020-08-31 20:51:11.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU d49 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:11.169 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4a Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:11.375 UTC [orderer.common.cluster.step] handleMessage -> DEBU d4b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:11.376 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4c Sending msg of 28 bytes to 3 on channel testchainid took 59.5µs" +"2020-08-31 20:51:11.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU d4d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 174.4µs " +"2020-08-31 20:51:11.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4e Sending msg of 28 bytes to 2 on channel businesschannel took 35.5µs" +"2020-08-31 20:51:11.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d4f Sending msg of 28 bytes to 3 on channel businesschannel took 25.7µs" +"2020-08-31 20:51:11.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU d50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 215.9µs " +"2020-08-31 20:51:11.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU d51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 169.1µs " +"2020-08-31 20:51:11.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU d52 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:11.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU d53 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:11.876 UTC [orderer.common.cluster.step] handleMessage -> DEBU d54 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:11.877 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d55 Sending msg of 28 bytes to 3 on channel testchainid took 19.6µs" +"2020-08-31 20:51:11.878 UTC [orderer.common.cluster.step] sendMessage -> DEBU d56 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 291.3µs " +"2020-08-31 20:51:12.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d57 Sending msg of 28 bytes to 2 on channel businesschannel took 47.5µs" +"2020-08-31 20:51:12.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d58 Sending msg of 28 bytes to 3 on channel businesschannel took 17.7µs" +"2020-08-31 20:51:12.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d59 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.4µs " +"2020-08-31 20:51:12.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 552.1µs " +"2020-08-31 20:51:12.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5b Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:12.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:12.379 UTC [orderer.common.cluster.step] handleMessage -> DEBU d5d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:12.379 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d5e Sending msg of 28 bytes to 3 on channel testchainid took 67.7µs" +"2020-08-31 20:51:12.380 UTC [orderer.common.cluster.step] sendMessage -> DEBU d5f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.8µs " +"2020-08-31 20:51:12.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d60 Sending msg of 28 bytes to 2 on channel businesschannel took 25.4µs" +"2020-08-31 20:51:12.667 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d61 Sending msg of 28 bytes to 3 on channel businesschannel took 21.2µs" +"2020-08-31 20:51:12.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU d62 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 120.2µs " +"2020-08-31 20:51:12.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU d63 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 934.3µs " +"2020-08-31 20:51:12.670 UTC [orderer.common.cluster.step] handleMessage -> DEBU d64 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:12.670 UTC [orderer.common.cluster.step] handleMessage -> DEBU d65 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:12.875 UTC [orderer.common.cluster.step] handleMessage -> DEBU d66 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:12.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d67 Sending msg of 28 bytes to 3 on channel testchainid took 22.3µs" +"2020-08-31 20:51:12.877 UTC [orderer.common.cluster.step] sendMessage -> DEBU d68 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 631.3µs " +"2020-08-31 20:51:13.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d69 Sending msg of 28 bytes to 2 on channel businesschannel took 58.1µs" +"2020-08-31 20:51:13.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d6a Sending msg of 28 bytes to 3 on channel businesschannel took 16.9µs" +"2020-08-31 20:51:13.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 102µs " +"2020-08-31 20:51:13.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d6c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 85.2µs " +"2020-08-31 20:51:13.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6d Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:13.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:13.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU d6f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:13.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d70 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +"2020-08-31 20:51:13.374 UTC [orderer.common.cluster.step] sendMessage -> DEBU d71 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.9µs " +"2020-08-31 20:51:13.483 UTC [orderer.common.server] replicateDisabledChains -> DEBU d72 No inactive chains to try to replicate" +"2020-08-31 20:51:13.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d73 Sending msg of 28 bytes to 2 on channel businesschannel took 83.2µs" +"2020-08-31 20:51:13.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d74 Sending msg of 28 bytes to 3 on channel businesschannel took 25.9µs" +"2020-08-31 20:51:13.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU d75 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 400.8µs " +"2020-08-31 20:51:13.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU d76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 413.6µs " +"2020-08-31 20:51:13.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU d77 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:13.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU d78 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:13.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU d79 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:13.876 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7a Sending msg of 28 bytes to 3 on channel testchainid took 33.6µs" +"2020-08-31 20:51:13.876 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 100µs " +"2020-08-31 20:51:14.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7c Sending msg of 28 bytes to 2 on channel businesschannel took 116.9µs" +"2020-08-31 20:51:14.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d7d Sending msg of 28 bytes to 3 on channel businesschannel took 23.4µs" +"2020-08-31 20:51:14.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.6µs " +"2020-08-31 20:51:14.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU d7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 109.2µs " +"2020-08-31 20:51:14.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU d80 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:14.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU d81 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:14.375 UTC [orderer.common.cluster.step] handleMessage -> DEBU d82 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:14.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d83 Sending msg of 28 bytes to 3 on channel testchainid took 37.3µs" +"2020-08-31 20:51:14.384 UTC [orderer.common.cluster.step] sendMessage -> DEBU d84 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 6.7071ms " +"2020-08-31 20:51:14.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d85 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +"2020-08-31 20:51:14.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d86 Sending msg of 28 bytes to 3 on channel businesschannel took 21.3µs" +"2020-08-31 20:51:14.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU d87 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 128.7µs " +"2020-08-31 20:51:14.668 UTC [orderer.common.cluster.step] sendMessage -> DEBU d88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.4508ms " +"2020-08-31 20:51:14.670 UTC [orderer.common.cluster.step] handleMessage -> DEBU d89 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:14.670 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:14.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU d8b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:14.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8c Sending msg of 28 bytes to 3 on channel testchainid took 23.6µs" +"2020-08-31 20:51:14.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU d8d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.4µs " +"2020-08-31 20:51:15.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8e Sending msg of 28 bytes to 2 on channel businesschannel took 22.8µs" +"2020-08-31 20:51:15.167 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d8f Sending msg of 28 bytes to 3 on channel businesschannel took 34µs" +"2020-08-31 20:51:15.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU d90 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133.9µs " +"2020-08-31 20:51:15.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU d91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 113.6µs " +"2020-08-31 20:51:15.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU d92 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:15.169 UTC [orderer.common.cluster.step] handleMessage -> DEBU d93 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:15.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU d94 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:15.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d95 Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" +"2020-08-31 20:51:15.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU d96 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 772.6µs " +"2020-08-31 20:51:15.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d97 Sending msg of 28 bytes to 2 on channel businesschannel took 20.8µs" +"2020-08-31 20:51:15.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d98 Sending msg of 28 bytes to 3 on channel businesschannel took 13.3µs" +"2020-08-31 20:51:15.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU d99 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.6µs " +"2020-08-31 20:51:15.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.2µs " +"2020-08-31 20:51:15.666 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:15.666 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9c Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:15.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU d9d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:15.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU d9e Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2020-08-31 20:51:15.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU d9f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.6µs " +"2020-08-31 20:51:16.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da0 Sending msg of 28 bytes to 2 on channel businesschannel took 53.6µs" +"2020-08-31 20:51:16.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da1 Sending msg of 28 bytes to 3 on channel businesschannel took 56.2µs" +"2020-08-31 20:51:16.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU da2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.6µs " +"2020-08-31 20:51:16.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU da3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 189.7µs " +"2020-08-31 20:51:16.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU da4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:16.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU da5 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:16.375 UTC [orderer.common.cluster.step] handleMessage -> DEBU da6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:16.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da7 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2020-08-31 20:51:16.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU da8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 101.5µs " +"2020-08-31 20:51:16.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU da9 Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +"2020-08-31 20:51:16.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU daa Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +"2020-08-31 20:51:16.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU dab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83µs " +"2020-08-31 20:51:16.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU dac Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 120.8µs " +"2020-08-31 20:51:16.666 UTC [orderer.common.cluster.step] handleMessage -> DEBU dad Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:16.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU dae Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:16.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU daf Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:16.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db0 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +"2020-08-31 20:51:16.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU db1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.3µs " +"2020-08-31 20:51:17.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db2 Sending msg of 28 bytes to 2 on channel businesschannel took 20.9µs" +"2020-08-31 20:51:17.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db3 Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +"2020-08-31 20:51:17.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU db4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 143.3µs " +"2020-08-31 20:51:17.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU db5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.6µs " +"2020-08-31 20:51:17.166 UTC [orderer.common.cluster.step] handleMessage -> DEBU db6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:17.166 UTC [orderer.common.cluster.step] handleMessage -> DEBU db7 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:17.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU db8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:17.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU db9 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2020-08-31 20:51:17.374 UTC [orderer.common.cluster.step] sendMessage -> DEBU dba Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.2µs " +"2020-08-31 20:51:17.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbb Sending msg of 28 bytes to 2 on channel businesschannel took 26.3µs" +"2020-08-31 20:51:17.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dbc Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +"2020-08-31 20:51:17.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.3µs " +"2020-08-31 20:51:17.665 UTC [orderer.common.cluster.step] sendMessage -> DEBU dbe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.6µs " +"2020-08-31 20:51:17.666 UTC [orderer.common.cluster.step] handleMessage -> DEBU dbf Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:17.666 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc0 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:17.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:17.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc2 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2020-08-31 20:51:17.874 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65µs " +"2020-08-31 20:51:18.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc4 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +"2020-08-31 20:51:18.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dc5 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +"2020-08-31 20:51:18.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.7µs " +"2020-08-31 20:51:18.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU dc7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.3µs " +"2020-08-31 20:51:18.166 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:18.166 UTC [orderer.common.cluster.step] handleMessage -> DEBU dc9 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:18.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU dca Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:18.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcb Sending msg of 28 bytes to 3 on channel testchainid took 27.2µs" +"2020-08-31 20:51:18.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.2µs " +"2020-08-31 20:51:18.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dcd Sending msg of 28 bytes to 2 on channel businesschannel took 55.2µs" +"2020-08-31 20:51:18.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dce Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +"2020-08-31 20:51:18.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU dcf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 86µs " +"2020-08-31 20:51:18.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 178µs " +"2020-08-31 20:51:18.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:18.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd2 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:18.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU dd3 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:18.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd4 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2020-08-31 20:51:18.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.3µs " +"2020-08-31 20:51:19.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd6 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +"2020-08-31 20:51:19.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dd7 Sending msg of 28 bytes to 3 on channel businesschannel took 21.1µs" +"2020-08-31 20:51:19.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.3µs " +"2020-08-31 20:51:19.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU dd9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 520.5µs " +"2020-08-31 20:51:19.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU dda Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:19.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddb Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:19.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU ddc Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:19.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddd Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +"2020-08-31 20:51:19.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU dde Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 434.4µs " +"2020-08-31 20:51:19.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ddf Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +"2020-08-31 20:51:19.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de0 Sending msg of 28 bytes to 3 on channel businesschannel took 14.8µs" +"2020-08-31 20:51:19.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU de1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 265.3µs " +"2020-08-31 20:51:19.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU de2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 502.4µs " +"2020-08-31 20:51:19.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU de3 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:19.669 UTC [orderer.common.cluster.step] handleMessage -> DEBU de4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:19.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU de5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:19.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de6 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2020-08-31 20:51:19.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU de7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 289.8µs " +"2020-08-31 20:51:20.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de8 Sending msg of 28 bytes to 2 on channel businesschannel took 27.2µs" +"2020-08-31 20:51:20.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU de9 Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +"2020-08-31 20:51:20.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU dea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.3µs " +"2020-08-31 20:51:20.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU deb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 653.8µs " +"2020-08-31 20:51:20.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU dec Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:20.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU ded Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:20.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU dee Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:20.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU def Sending msg of 28 bytes to 3 on channel testchainid took 78.8µs" +"2020-08-31 20:51:20.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU df0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 424.7µs " +"2020-08-31 20:51:20.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df1 Sending msg of 28 bytes to 2 on channel businesschannel took 25.9µs" +"2020-08-31 20:51:20.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df2 Sending msg of 28 bytes to 3 on channel businesschannel took 9.8µs" +"2020-08-31 20:51:20.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU df3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.3µs " +"2020-08-31 20:51:20.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU df4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.182ms " +"2020-08-31 20:51:20.666 UTC [orderer.common.cluster.step] handleMessage -> DEBU df5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:20.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU df6 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:20.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU df7 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:20.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU df8 Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +"2020-08-31 20:51:20.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU df9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 145µs " +"2020-08-31 20:51:21.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfa Sending msg of 28 bytes to 2 on channel businesschannel took 26.9µs" +"2020-08-31 20:51:21.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU dfb Sending msg of 28 bytes to 3 on channel businesschannel took 15.2µs" +"2020-08-31 20:51:21.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 255.5µs " +"2020-08-31 20:51:21.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU dfd Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:21.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU dfe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 2.1969ms " +"2020-08-31 20:51:21.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU dff Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:21.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU e00 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:21.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e01 Sending msg of 28 bytes to 3 on channel testchainid took 12µs" +"2020-08-31 20:51:21.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU e02 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.6µs " +"2020-08-31 20:51:21.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e03 Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +"2020-08-31 20:51:21.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e04 Sending msg of 28 bytes to 3 on channel businesschannel took 10.1µs" +"2020-08-31 20:51:21.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 272.6µs " +"2020-08-31 20:51:21.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e06 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 294.7µs " +"2020-08-31 20:51:21.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU e07 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:21.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU e08 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:21.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e09 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:21.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0a Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +"2020-08-31 20:51:21.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 698.6µs " +"2020-08-31 20:51:22.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0c Sending msg of 28 bytes to 2 on channel businesschannel took 30.4µs" +"2020-08-31 20:51:22.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e0d Sending msg of 28 bytes to 3 on channel businesschannel took 20µs" +"2020-08-31 20:51:22.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 295.4µs " +"2020-08-31 20:51:22.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e0f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 549.7µs " +"2020-08-31 20:51:22.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU e10 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:22.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU e11 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:22.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU e12 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:22.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e13 Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +"2020-08-31 20:51:22.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU e14 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 242.2µs " +"2020-08-31 20:51:22.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e15 Sending msg of 28 bytes to 2 on channel businesschannel took 84.4µs" +"2020-08-31 20:51:22.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e16 Sending msg of 28 bytes to 3 on channel businesschannel took 6.8µs" +"2020-08-31 20:51:22.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e17 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 577.7µs " +"2020-08-31 20:51:22.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e18 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.303ms " +"2020-08-31 20:51:22.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU e19 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:22.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1a Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:22.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e1b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:22.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1c Sending msg of 28 bytes to 3 on channel testchainid took 57.7µs" +"2020-08-31 20:51:22.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU e1d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 187.6µs " +"2020-08-31 20:51:23.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1e Sending msg of 28 bytes to 2 on channel businesschannel took 90.6µs" +"2020-08-31 20:51:23.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e1f Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +"2020-08-31 20:51:23.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e20 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 331.1µs " +"2020-08-31 20:51:23.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e21 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 373.5µs " +"2020-08-31 20:51:23.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU e22 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:23.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU e23 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:23.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU e24 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:23.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e25 Sending msg of 28 bytes to 3 on channel testchainid took 150.2µs" +"2020-08-31 20:51:23.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU e26 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58µs " +"2020-08-31 20:51:23.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e27 Sending msg of 28 bytes to 2 on channel businesschannel took 22.3µs" +"2020-08-31 20:51:23.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e28 Sending msg of 28 bytes to 3 on channel businesschannel took 15µs" +"2020-08-31 20:51:23.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e29 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 325.4µs " +"2020-08-31 20:51:23.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 287.3µs " +"2020-08-31 20:51:23.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:23.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2c Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:23.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e2d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:23.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e2e Sending msg of 28 bytes to 3 on channel testchainid took 14.4µs" +"2020-08-31 20:51:23.874 UTC [orderer.common.cluster.step] sendMessage -> DEBU e2f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.4µs " +"2020-08-31 20:51:24.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e30 Sending msg of 28 bytes to 2 on channel businesschannel took 25.7µs" +"2020-08-31 20:51:24.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e31 Sending msg of 28 bytes to 3 on channel businesschannel took 16.7µs" +"2020-08-31 20:51:24.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e32 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 665.3µs " +"2020-08-31 20:51:24.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU e34 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:24.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU e35 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:24.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e33 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 367.6µs " +"2020-08-31 20:51:24.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU e36 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:24.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e37 Sending msg of 28 bytes to 3 on channel testchainid took 15.8µs" +"2020-08-31 20:51:24.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU e38 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 232.3µs " +"2020-08-31 20:51:24.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e39 Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +"2020-08-31 20:51:24.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e3a Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +"2020-08-31 20:51:24.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 185.1µs " +"2020-08-31 20:51:24.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e3c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 220.3µs " +"2020-08-31 20:51:24.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3d Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:24.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:24.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e3f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:24.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e40 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +"2020-08-31 20:51:24.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU e41 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 358.8µs " +"2020-08-31 20:51:25.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e42 Sending msg of 28 bytes to 3 on channel businesschannel took 20µs" +"2020-08-31 20:51:25.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e43 Sending msg of 28 bytes to 2 on channel businesschannel took 8.4µs" +"2020-08-31 20:51:25.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e44 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 53.5µs " +"2020-08-31 20:51:25.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e45 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 441µs " +"2020-08-31 20:51:25.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU e46 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:25.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU e47 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:25.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU e48 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:25.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e49 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +"2020-08-31 20:51:25.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 461.2µs " +"2020-08-31 20:51:25.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4b Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +"2020-08-31 20:51:25.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e4c Sending msg of 28 bytes to 3 on channel businesschannel took 7.6µs" +"2020-08-31 20:51:25.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.1µs " +"2020-08-31 20:51:25.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e4e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 372.3µs " +"2020-08-31 20:51:25.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU e4f Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:25.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU e50 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:25.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e51 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:25.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e52 Sending msg of 28 bytes to 3 on channel testchainid took 11.4µs" +"2020-08-31 20:51:25.874 UTC [orderer.common.cluster.step] sendMessage -> DEBU e53 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51.6µs " +"2020-08-31 20:51:26.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e54 Sending msg of 28 bytes to 3 on channel businesschannel took 52.2µs" +"2020-08-31 20:51:26.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e55 Sending msg of 28 bytes to 2 on channel businesschannel took 12.3µs" +"2020-08-31 20:51:26.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e56 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 373.8µs " +"2020-08-31 20:51:26.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e57 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 140.7µs " +"2020-08-31 20:51:26.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU e58 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:26.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU e59 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:26.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU e5a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:26.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5b Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +"2020-08-31 20:51:26.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 559.5µs " +"2020-08-31 20:51:26.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5d Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +"2020-08-31 20:51:26.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e5e Sending msg of 28 bytes to 3 on channel businesschannel took 6.8µs" +"2020-08-31 20:51:26.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e5f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 219.8µs " +"2020-08-31 20:51:26.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e60 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 164.6µs " +"2020-08-31 20:51:26.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU e61 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:26.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU e62 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:26.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e63 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:26.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e64 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +"2020-08-31 20:51:26.874 UTC [orderer.common.cluster.step] sendMessage -> DEBU e65 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 374µs " +"2020-08-31 20:51:27.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e66 Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +"2020-08-31 20:51:27.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e67 Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +"2020-08-31 20:51:27.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e68 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 372.1µs " +"2020-08-31 20:51:27.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU e69 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0752ms " +"2020-08-31 20:51:27.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:27.169 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6b Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:27.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU e6c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:27.380 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6d Sending msg of 28 bytes to 3 on channel testchainid took 19.5µs" +"2020-08-31 20:51:27.381 UTC [orderer.common.cluster.step] sendMessage -> DEBU e6e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 178.3µs " +"2020-08-31 20:51:27.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e6f Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +"2020-08-31 20:51:27.666 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e70 Sending msg of 28 bytes to 3 on channel businesschannel took 13.9µs" +"2020-08-31 20:51:27.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e71 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.5µs " +"2020-08-31 20:51:27.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU e72 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 487.4µs " +"2020-08-31 20:51:27.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU e73 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:27.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU e74 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:27.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e75 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:27.875 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e76 Sending msg of 28 bytes to 3 on channel testchainid took 8.1µs" +"2020-08-31 20:51:27.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU e77 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 170.8µs " +"2020-08-31 20:51:28.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e78 Sending msg of 28 bytes to 2 on channel businesschannel took 50µs" +"2020-08-31 20:51:28.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU e79 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 48.2µs " +"2020-08-31 20:51:28.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7a Sending msg of 28 bytes to 3 on channel businesschannel took 17.9µs" +"2020-08-31 20:51:28.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU e7b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 361.6µs " +"2020-08-31 20:51:28.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:28.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7d Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:28.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU e7e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:28.375 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e7f Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +"2020-08-31 20:51:28.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU e80 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.2µs " +"2020-08-31 20:51:28.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e81 Sending msg of 28 bytes to 2 on channel businesschannel took 26.6µs" +"2020-08-31 20:51:28.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e82 Sending msg of 28 bytes to 3 on channel businesschannel took 101.5µs" +"2020-08-31 20:51:28.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e83 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.5µs " +"2020-08-31 20:51:28.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU e84 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 165.6µs " +"2020-08-31 20:51:28.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU e85 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:28.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU e86 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:28.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e87 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:28.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e88 Sending msg of 28 bytes to 3 on channel testchainid took 11.1µs" +"2020-08-31 20:51:28.874 UTC [orderer.common.cluster.step] sendMessage -> DEBU e89 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.1µs " +"2020-08-31 20:51:29.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8a Sending msg of 28 bytes to 2 on channel businesschannel took 62.6µs" +"2020-08-31 20:51:29.166 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e8b Sending msg of 28 bytes to 3 on channel businesschannel took 20.1µs" +"2020-08-31 20:51:29.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.1µs " +"2020-08-31 20:51:29.167 UTC [orderer.common.cluster.step] sendMessage -> DEBU e8d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.9µs " +"2020-08-31 20:51:29.168 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:29.169 UTC [orderer.common.cluster.step] handleMessage -> DEBU e8f Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:29.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU e90 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:29.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e91 Sending msg of 28 bytes to 3 on channel testchainid took 85.7µs" +"2020-08-31 20:51:29.376 UTC [orderer.common.cluster.step] sendMessage -> DEBU e92 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 801.3µs " +"2020-08-31 20:51:29.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU e93 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 195.5µs " +"2020-08-31 20:51:29.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e94 Sending msg of 28 bytes to 2 on channel businesschannel took 28µs" +"2020-08-31 20:51:29.667 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e95 Sending msg of 28 bytes to 3 on channel businesschannel took 493.3µs" +"2020-08-31 20:51:29.668 UTC [orderer.common.cluster.step] sendMessage -> DEBU e96 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 483.2µs " +"2020-08-31 20:51:29.669 UTC [orderer.common.cluster.step] handleMessage -> DEBU e97 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:29.669 UTC [orderer.common.cluster.step] handleMessage -> DEBU e98 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:29.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU e99 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:29.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9a Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +"2020-08-31 20:51:29.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 644.3µs " +"2020-08-31 20:51:30.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9c Sending msg of 28 bytes to 2 on channel businesschannel took 17.1µs" +"2020-08-31 20:51:30.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU e9d Sending msg of 28 bytes to 3 on channel businesschannel took 33.7µs" +"2020-08-31 20:51:30.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.7µs " +"2020-08-31 20:51:30.165 UTC [orderer.common.cluster.step] sendMessage -> DEBU e9f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 172.9µs " +"2020-08-31 20:51:30.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea0 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:30.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:30.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:30.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea3 Sending msg of 28 bytes to 3 on channel testchainid took 11.4µs" +"2020-08-31 20:51:30.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 546.5µs " +"2020-08-31 20:51:30.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea5 Sending msg of 28 bytes to 2 on channel businesschannel took 25.2µs" +"2020-08-31 20:51:30.665 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ea6 Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +"2020-08-31 20:51:30.666 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 151.6µs " +"2020-08-31 20:51:30.667 UTC [orderer.common.cluster.step] sendMessage -> DEBU ea8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 455.7µs " +"2020-08-31 20:51:30.667 UTC [orderer.common.cluster.step] handleMessage -> DEBU ea9 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:30.668 UTC [orderer.common.cluster.step] handleMessage -> DEBU eaa Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:30.874 UTC [orderer.common.cluster.step] handleMessage -> DEBU eab Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:30.874 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eac Sending msg of 28 bytes to 3 on channel testchainid took 12.1µs" +"2020-08-31 20:51:30.875 UTC [orderer.common.cluster.step] sendMessage -> DEBU ead Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.4µs " +"2020-08-31 20:51:31.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eae Sending msg of 28 bytes to 2 on channel businesschannel took 24.4µs" +"2020-08-31 20:51:31.165 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eaf Sending msg of 28 bytes to 3 on channel businesschannel took 62.1µs" +"2020-08-31 20:51:31.166 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.6µs " +"2020-08-31 20:51:31.167 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:31.168 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.904ms " +"2020-08-31 20:51:31.169 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb3 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:31.374 UTC [orderer.common.cluster.step] handleMessage -> DEBU eb4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:31.374 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb5 Sending msg of 28 bytes to 3 on channel testchainid took 44µs" +"2020-08-31 20:51:31.375 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 457.3µs " +"2020-08-31 20:51:31.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb7 Sending msg of 28 bytes to 2 on channel businesschannel took 25µs" +"2020-08-31 20:51:31.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eb8 Sending msg of 28 bytes to 3 on channel businesschannel took 341.1µs" +"2020-08-31 20:51:31.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU eb9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.5µs " +"2020-08-31 20:51:31.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU eba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 260.5µs " +"2020-08-31 20:51:31.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebb Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:31.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebc Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:31.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU ebd Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:31.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ebe Sending msg of 28 bytes to 3 on channel testchainid took 107.2µs" +"2020-08-31 20:51:31.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU ebf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 312.9µs " +"2020-08-31 20:51:32.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec0 Sending msg of 28 bytes to 2 on channel businesschannel took 51.5µs" +"2020-08-31 20:51:32.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.7µs " +"2020-08-31 20:51:32.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec2 Sending msg of 28 bytes to 3 on channel businesschannel took 8.9µs" +"2020-08-31 20:51:32.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec4 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:32.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:32.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135µs " +"2020-08-31 20:51:32.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU ec6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:32.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec7 Sending msg of 28 bytes to 3 on channel testchainid took 65.2µs" +"2020-08-31 20:51:32.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU ec8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152µs " +"2020-08-31 20:51:32.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ec9 Sending msg of 28 bytes to 3 on channel businesschannel took 56.6µs" +"2020-08-31 20:51:32.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eca Sending msg of 28 bytes to 2 on channel businesschannel took 12µs" +"2020-08-31 20:51:32.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.4µs " +"2020-08-31 20:51:32.633 UTC [orderer.common.cluster.step] sendMessage -> DEBU ecc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 194.7µs " +"2020-08-31 20:51:32.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecd Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:32.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU ece Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:32.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU ecf Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:32.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed0 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2020-08-31 20:51:32.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 300.4µs " +"2020-08-31 20:51:33.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed2 Sending msg of 28 bytes to 3 on channel businesschannel took 54.2µs" +"2020-08-31 20:51:33.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 112.2µs " +"2020-08-31 20:51:33.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed4 Sending msg of 28 bytes to 2 on channel businesschannel took 9µs" +"2020-08-31 20:51:33.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:33.133 UTC [orderer.common.cluster.step] sendMessage -> DEBU ed6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 312.2µs " +"2020-08-31 20:51:33.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed7 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:33.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU ed8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:33.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ed9 Sending msg of 28 bytes to 3 on channel testchainid took 13.4µs" +"2020-08-31 20:51:33.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU eda Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 389.8µs " +"2020-08-31 20:51:33.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edb Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" +"2020-08-31 20:51:33.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU edc Sending msg of 28 bytes to 3 on channel businesschannel took 29.9µs" +"2020-08-31 20:51:33.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU edd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.8µs " +"2020-08-31 20:51:33.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU ede Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 557µs " +"2020-08-31 20:51:33.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU edf Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:33.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee0 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:33.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:33.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee2 Sending msg of 28 bytes to 3 on channel testchainid took 25.5µs" +"2020-08-31 20:51:33.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.9µs " +"2020-08-31 20:51:34.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee4 Sending msg of 28 bytes to 2 on channel businesschannel took 65.4µs" +"2020-08-31 20:51:34.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ee5 Sending msg of 28 bytes to 3 on channel businesschannel took 9.9µs" +"2020-08-31 20:51:34.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 123.8µs " +"2020-08-31 20:51:34.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU ee7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 729.4µs " +"2020-08-31 20:51:34.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:34.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU ee9 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:34.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU eea Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:34.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eeb Sending msg of 28 bytes to 3 on channel testchainid took 14.2µs" +"2020-08-31 20:51:34.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU eec Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 707.7µs " +"2020-08-31 20:51:34.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eed Sending msg of 28 bytes to 2 on channel businesschannel took 50.8µs" +"2020-08-31 20:51:34.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eef Sending msg of 28 bytes to 3 on channel businesschannel took 13.2µs" +"2020-08-31 20:51:34.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.4µs " +"2020-08-31 20:51:34.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU eee Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 111.6µs " +"2020-08-31 20:51:34.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:34.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef2 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:34.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU ef3 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:34.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef4 Sending msg of 28 bytes to 3 on channel testchainid took 26.6µs" +"2020-08-31 20:51:34.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.4µs " +"2020-08-31 20:51:35.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef6 Sending msg of 28 bytes to 2 on channel businesschannel took 25µs" +"2020-08-31 20:51:35.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ef7 Sending msg of 28 bytes to 3 on channel businesschannel took 13.7µs" +"2020-08-31 20:51:35.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 126.6µs " +"2020-08-31 20:51:35.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU ef9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 556.7µs " +"2020-08-31 20:51:35.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU efa Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:35.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU efb Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:35.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU efc Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:35.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU efd Sending msg of 28 bytes to 3 on channel testchainid took 106µs" +"2020-08-31 20:51:35.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU efe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 311.4µs " +"2020-08-31 20:51:35.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU eff Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +"2020-08-31 20:51:35.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f00 Sending msg of 28 bytes to 3 on channel businesschannel took 13.8µs" +"2020-08-31 20:51:35.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU f01 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.9µs " +"2020-08-31 20:51:35.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU f02 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 392.4µs " +"2020-08-31 20:51:35.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU f03 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:35.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU f04 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:35.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU f05 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:35.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f06 Sending msg of 28 bytes to 3 on channel testchainid took 22.8µs" +"2020-08-31 20:51:35.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU f07 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 540.9µs " +"2020-08-31 20:51:36.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f08 Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +"2020-08-31 20:51:36.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU f09 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.3µs " +"2020-08-31 20:51:36.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0a Sending msg of 28 bytes to 3 on channel businesschannel took 12.3µs" +"2020-08-31 20:51:36.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f0b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 99.4µs " +"2020-08-31 20:51:36.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0c Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:36.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:36.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU f0e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:36.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f0f Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +"2020-08-31 20:51:36.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU f10 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 555.9µs " +"2020-08-31 20:51:36.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f11 Sending msg of 28 bytes to 2 on channel businesschannel took 24.7µs" +"2020-08-31 20:51:36.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU f12 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 311.4µs " +"2020-08-31 20:51:36.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f13 Sending msg of 28 bytes to 3 on channel businesschannel took 25.7µs" +"2020-08-31 20:51:36.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU f14 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71µs " +"2020-08-31 20:51:36.632 UTC [orderer.common.cluster.step] handleMessage -> DEBU f15 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:36.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU f16 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:36.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU f17 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:36.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f18 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2020-08-31 20:51:36.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU f19 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 415.3µs " +"2020-08-31 20:51:37.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1a Sending msg of 28 bytes to 2 on channel businesschannel took 25.3µs" +"2020-08-31 20:51:37.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f1b Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +"2020-08-31 20:51:37.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 177.7µs " +"2020-08-31 20:51:37.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f1d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 602.2µs " +"2020-08-31 20:51:37.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:37.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f1f Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:37.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU f20 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:37.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f21 Sending msg of 28 bytes to 3 on channel testchainid took 10.2µs" +"2020-08-31 20:51:37.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU f22 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 821.3µs " +"2020-08-31 20:51:37.634 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f23 Sending msg of 28 bytes to 2 on channel businesschannel took 27.7µs" +"2020-08-31 20:51:37.634 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f24 Sending msg of 28 bytes to 3 on channel businesschannel took 128.3µs" +"2020-08-31 20:51:37.635 UTC [orderer.common.cluster.step] sendMessage -> DEBU f25 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 176.4µs " +"2020-08-31 20:51:37.635 UTC [orderer.common.cluster.step] sendMessage -> DEBU f26 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 498.4µs " +"2020-08-31 20:51:37.636 UTC [orderer.common.cluster.step] handleMessage -> DEBU f27 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:37.637 UTC [orderer.common.cluster.step] handleMessage -> DEBU f28 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:37.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU f29 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:37.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2a Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +"2020-08-31 20:51:37.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.4µs " +"2020-08-31 20:51:38.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2c Sending msg of 28 bytes to 3 on channel businesschannel took 29.4µs" +"2020-08-31 20:51:38.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f2d Sending msg of 28 bytes to 2 on channel businesschannel took 92µs" +"2020-08-31 20:51:38.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 105.1µs " +"2020-08-31 20:51:38.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f2f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2778ms " +"2020-08-31 20:51:38.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f30 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:38.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f31 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:38.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU f32 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:38.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f33 Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +"2020-08-31 20:51:38.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU f34 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 509.6µs " +"2020-08-31 20:51:38.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f35 Sending msg of 28 bytes to 3 on channel businesschannel took 18.2µs" +"2020-08-31 20:51:38.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f36 Sending msg of 28 bytes to 2 on channel businesschannel took 11.4µs" +"2020-08-31 20:51:38.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU f37 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 155.2µs " +"2020-08-31 20:51:38.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU f38 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 219.7µs " +"2020-08-31 20:51:38.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU f39 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:38.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:38.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU f3b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:38.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3c Sending msg of 28 bytes to 3 on channel testchainid took 151.4µs" +"2020-08-31 20:51:38.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU f3d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 662.8µs " +"2020-08-31 20:51:39.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3e Sending msg of 28 bytes to 2 on channel businesschannel took 25.9µs" +"2020-08-31 20:51:39.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f3f Sending msg of 28 bytes to 3 on channel businesschannel took 14.2µs" +"2020-08-31 20:51:39.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f40 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 269.2µs " +"2020-08-31 20:51:39.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f41 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.1163ms " +"2020-08-31 20:51:39.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f42 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:39.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f43 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:39.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU f44 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:39.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f45 Sending msg of 28 bytes to 3 on channel testchainid took 17.7µs" +"2020-08-31 20:51:39.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU f46 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.2µs " +"2020-08-31 20:51:39.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f47 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +"2020-08-31 20:51:39.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f48 Sending msg of 28 bytes to 3 on channel businesschannel took 7.3µs" +"2020-08-31 20:51:39.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU f49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 253.4µs " +"2020-08-31 20:51:39.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 343.1µs " +"2020-08-31 20:51:39.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:39.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4c Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:39.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU f4d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:39.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f4e Sending msg of 28 bytes to 3 on channel testchainid took 16.9µs" +"2020-08-31 20:51:39.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU f4f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.1µs " +"2020-08-31 20:51:40.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f50 Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +"2020-08-31 20:51:40.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f51 Sending msg of 28 bytes to 3 on channel businesschannel took 8.5µs" +"2020-08-31 20:51:40.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU f52 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 343.1µs " +"2020-08-31 20:51:40.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f53 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 506µs " +"2020-08-31 20:51:40.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f54 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:40.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f55 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:40.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU f56 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:40.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f57 Sending msg of 28 bytes to 3 on channel testchainid took 54.7µs" +"2020-08-31 20:51:40.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU f58 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 160.5µs " +"2020-08-31 20:51:40.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f59 Sending msg of 28 bytes to 2 on channel businesschannel took 50.4µs" +"2020-08-31 20:51:40.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.8µs " +"2020-08-31 20:51:40.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f5b Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +"2020-08-31 20:51:40.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU f5c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 114.5µs " +"2020-08-31 20:51:40.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5d Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:40.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:40.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU f5f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:40.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f60 Sending msg of 28 bytes to 3 on channel testchainid took 15µs" +"2020-08-31 20:51:40.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU f61 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 375.4µs " +"2020-08-31 20:51:41.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f62 Sending msg of 28 bytes to 2 on channel businesschannel took 55.9µs" +"2020-08-31 20:51:41.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f63 Sending msg of 28 bytes to 3 on channel businesschannel took 7.6µs" +"2020-08-31 20:51:41.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f64 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 205.8µs " +"2020-08-31 20:51:41.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f65 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 376.9µs " +"2020-08-31 20:51:41.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f66 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:41.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU f67 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:41.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU f68 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:41.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f69 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2020-08-31 20:51:41.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.1µs " +"2020-08-31 20:51:41.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6b Sending msg of 28 bytes to 2 on channel businesschannel took 26.5µs" +"2020-08-31 20:51:41.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f6c Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +"2020-08-31 20:51:41.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 187.7µs " +"2020-08-31 20:51:41.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU f6e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 205.9µs " +"2020-08-31 20:51:41.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU f6f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:41.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU f70 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:41.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU f71 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:41.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f72 Sending msg of 28 bytes to 3 on channel testchainid took 13.7µs" +"2020-08-31 20:51:41.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU f73 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 618.9µs " +"2020-08-31 20:51:42.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f74 Sending msg of 28 bytes to 2 on channel businesschannel took 56.2µs" +"2020-08-31 20:51:42.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f75 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +"2020-08-31 20:51:42.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU f76 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 316.2µs " +"2020-08-31 20:51:42.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f77 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 132.8µs " +"2020-08-31 20:51:42.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f78 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:42.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f79 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:42.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU f7a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:42.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7b Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +"2020-08-31 20:51:42.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 406.3µs " +"2020-08-31 20:51:42.636 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7d Sending msg of 28 bytes to 2 on channel businesschannel took 19.5µs" +"2020-08-31 20:51:42.636 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f7e Sending msg of 28 bytes to 3 on channel businesschannel took 19.2µs" +"2020-08-31 20:51:42.637 UTC [orderer.common.cluster.step] sendMessage -> DEBU f7f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 115µs " +"2020-08-31 20:51:42.637 UTC [orderer.common.cluster.step] sendMessage -> DEBU f80 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 118.5µs " +"2020-08-31 20:51:42.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU f81 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:42.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU f82 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:42.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU f83 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:42.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f84 Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" +"2020-08-31 20:51:42.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU f85 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 255.9µs " +"2020-08-31 20:51:43.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f86 Sending msg of 28 bytes to 2 on channel businesschannel took 19.7µs" +"2020-08-31 20:51:43.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f87 Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +"2020-08-31 20:51:43.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU f88 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.9µs " +"2020-08-31 20:51:43.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f89 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 644.1µs " +"2020-08-31 20:51:43.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8a Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:43.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:43.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU f8c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:43.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8d Sending msg of 28 bytes to 3 on channel testchainid took 11.6µs" +"2020-08-31 20:51:43.342 UTC [orderer.common.cluster.step] sendMessage -> DEBU f8e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 446.2µs " +"2020-08-31 20:51:43.635 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f8f Sending msg of 28 bytes to 2 on channel businesschannel took 26.7µs" +"2020-08-31 20:51:43.635 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f90 Sending msg of 28 bytes to 3 on channel businesschannel took 18µs" +"2020-08-31 20:51:43.637 UTC [orderer.common.cluster.step] sendMessage -> DEBU f91 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 258µs " +"2020-08-31 20:51:43.637 UTC [orderer.common.cluster.step] sendMessage -> DEBU f92 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.2µs " +"2020-08-31 20:51:43.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU f93 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:43.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU f94 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:43.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU f95 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:43.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f96 Sending msg of 28 bytes to 3 on channel testchainid took 10.9µs" +"2020-08-31 20:51:43.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU f97 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 90.6µs " +"2020-08-31 20:51:44.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f98 Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +"2020-08-31 20:51:44.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f99 Sending msg of 28 bytes to 3 on channel businesschannel took 7.6µs" +"2020-08-31 20:51:44.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 124.7µs " +"2020-08-31 20:51:44.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU f9b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 45.2µs " +"2020-08-31 20:51:44.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9c Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:44.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:44.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU f9e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:44.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU f9f Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +"2020-08-31 20:51:44.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 306.6µs " +"2020-08-31 20:51:44.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa1 Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +"2020-08-31 20:51:44.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa2 Sending msg of 28 bytes to 2 on channel businesschannel took 14µs" +"2020-08-31 20:51:44.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 144.7µs " +"2020-08-31 20:51:44.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 113µs " +"2020-08-31 20:51:44.632 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa5 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:44.632 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:44.846 UTC [orderer.common.cluster.step] handleMessage -> DEBU fa7 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:44.848 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fa8 Sending msg of 28 bytes to 3 on channel testchainid took 18.5µs" +"2020-08-31 20:51:44.848 UTC [orderer.common.cluster.step] sendMessage -> DEBU fa9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 299.7µs " +"2020-08-31 20:51:45.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU faa Sending msg of 28 bytes to 2 on channel businesschannel took 57.1µs" +"2020-08-31 20:51:45.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU fab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 171.1µs " +"2020-08-31 20:51:45.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fac Sending msg of 28 bytes to 3 on channel businesschannel took 10.9µs" +"2020-08-31 20:51:45.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU fad Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:45.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU fae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 416.9µs " +"2020-08-31 20:51:45.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU faf Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:45.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb0 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:45.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb1 Sending msg of 28 bytes to 3 on channel testchainid took 20.8µs" +"2020-08-31 20:51:45.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55µs " +"2020-08-31 20:51:45.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb3 Sending msg of 28 bytes to 2 on channel businesschannel took 17.9µs" +"2020-08-31 20:51:45.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fb4 Sending msg of 28 bytes to 3 on channel businesschannel took 7.8µs" +"2020-08-31 20:51:45.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157µs " +"2020-08-31 20:51:45.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU fb6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 358.8µs " +"2020-08-31 20:51:45.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb7 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:45.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:45.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU fb9 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:45.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fba Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +"2020-08-31 20:51:45.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 172.8µs " +"2020-08-31 20:51:46.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbc Sending msg of 28 bytes to 3 on channel businesschannel took 36.3µs" +"2020-08-31 20:51:46.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fbd Sending msg of 28 bytes to 2 on channel businesschannel took 5.6µs" +"2020-08-31 20:51:46.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 274.6µs " +"2020-08-31 20:51:46.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU fbf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.7µs " +"2020-08-31 20:51:46.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc0 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:46.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc1 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:46.341 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:46.342 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc3 Sending msg of 28 bytes to 3 on channel testchainid took 25.7µs" +"2020-08-31 20:51:46.343 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 781.3µs " +"2020-08-31 20:51:46.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc5 Sending msg of 28 bytes to 2 on channel businesschannel took 26.8µs" +"2020-08-31 20:51:46.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fc6 Sending msg of 28 bytes to 3 on channel businesschannel took 31.9µs" +"2020-08-31 20:51:46.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 545.9µs " +"2020-08-31 20:51:46.633 UTC [orderer.common.cluster.step] sendMessage -> DEBU fc8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 656.8µs " +"2020-08-31 20:51:46.636 UTC [orderer.common.cluster.step] handleMessage -> DEBU fc9 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:46.637 UTC [orderer.common.cluster.step] handleMessage -> DEBU fca Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:46.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU fcb Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:46.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fcc Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2020-08-31 20:51:46.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 141.9µs " +"2020-08-31 20:51:47.132 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fce Sending msg of 28 bytes to 2 on channel businesschannel took 37µs" +"2020-08-31 20:51:47.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU fcf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 329.2µs " +"2020-08-31 20:51:47.132 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd0 Sending msg of 28 bytes to 3 on channel businesschannel took 15.5µs" +"2020-08-31 20:51:47.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd1 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:47.135 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.249ms " +"2020-08-31 20:51:47.137 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd3 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:47.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU fd4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:47.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd5 Sending msg of 28 bytes to 3 on channel testchainid took 24.1µs" +"2020-08-31 20:51:47.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 186.6µs " +"2020-08-31 20:51:47.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd7 Sending msg of 28 bytes to 2 on channel businesschannel took 35.3µs" +"2020-08-31 20:51:47.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fd8 Sending msg of 28 bytes to 3 on channel businesschannel took 16.1µs" +"2020-08-31 20:51:47.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU fd9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 135.2µs " +"2020-08-31 20:51:47.633 UTC [orderer.common.cluster.step] sendMessage -> DEBU fda Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 891µs " +"2020-08-31 20:51:47.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU fdb Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:47.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU fdc Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:47.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU fdd Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:47.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fde Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +"2020-08-31 20:51:47.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU fdf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.6µs " +"2020-08-31 20:51:48.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe0 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +"2020-08-31 20:51:48.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe1 Sending msg of 28 bytes to 3 on channel businesschannel took 9.8µs" +"2020-08-31 20:51:48.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 322.6µs " +"2020-08-31 20:51:48.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 254µs " +"2020-08-31 20:51:48.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:48.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe5 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:48.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU fe6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:48.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe7 Sending msg of 28 bytes to 3 on channel testchainid took 66µs" +"2020-08-31 20:51:48.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU fe8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 721.2µs " +"2020-08-31 20:51:48.635 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU fe9 Sending msg of 28 bytes to 2 on channel businesschannel took 27µs" +"2020-08-31 20:51:48.636 UTC [orderer.common.cluster.step] sendMessage -> DEBU fea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.8µs " +"2020-08-31 20:51:48.635 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU feb Sending msg of 28 bytes to 3 on channel businesschannel took 17.9µs" +"2020-08-31 20:51:48.637 UTC [orderer.common.cluster.step] sendMessage -> DEBU fec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.5µs " +"2020-08-31 20:51:48.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU fed Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:48.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU fee Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:48.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU fef Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:48.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff0 Sending msg of 28 bytes to 3 on channel testchainid took 73.6µs" +"2020-08-31 20:51:48.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2334ms " +"2020-08-31 20:51:49.134 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff2 Sending msg of 28 bytes to 3 on channel businesschannel took 39.8µs" +"2020-08-31 20:51:49.134 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff3 Sending msg of 28 bytes to 2 on channel businesschannel took 12.2µs" +"2020-08-31 20:51:49.134 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 194.8µs " +"2020-08-31 20:51:49.135 UTC [orderer.common.cluster.step] sendMessage -> DEBU ff5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57µs " +"2020-08-31 20:51:49.136 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff6 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:49.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff7 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:49.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU ff8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:49.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ff9 Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2020-08-31 20:51:49.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU ffa Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 42.5µs " +"2020-08-31 20:51:49.639 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ffb Sending msg of 28 bytes to 2 on channel businesschannel took 52.9µs" +"2020-08-31 20:51:49.639 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU ffc Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +"2020-08-31 20:51:49.639 UTC [orderer.common.cluster.step] sendMessage -> DEBU ffd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 96.1µs " +"2020-08-31 20:51:49.639 UTC [orderer.common.cluster.step] sendMessage -> DEBU ffe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 135.2µs " +"2020-08-31 20:51:49.640 UTC [orderer.common.cluster.step] handleMessage -> DEBU fff Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:49.641 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1000 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:49.858 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1001 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:49.858 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1002 Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +"2020-08-31 20:51:49.858 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1003 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139.6µs " +"2020-08-31 20:51:50.136 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1004 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 189µs " +"2020-08-31 20:51:50.136 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1005 Sending msg of 28 bytes to 2 on channel businesschannel took 568.4µs" +"2020-08-31 20:51:50.140 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1006 Sending msg of 28 bytes to 3 on channel businesschannel took 147.7µs" +"2020-08-31 20:51:50.140 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1007 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 133µs " +"2020-08-31 20:51:50.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1008 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:50.142 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1009 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:50.341 UTC [orderer.common.cluster.step] handleMessage -> DEBU 100a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:50.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100b Sending msg of 28 bytes to 3 on channel testchainid took 20.7µs" +"2020-08-31 20:51:50.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 54µs " +"2020-08-31 20:51:50.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100d Sending msg of 28 bytes to 2 on channel businesschannel took 21µs" +"2020-08-31 20:51:50.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 100e Sending msg of 28 bytes to 3 on channel businesschannel took 42.6µs" +"2020-08-31 20:51:50.633 UTC [orderer.common.cluster.step] sendMessage -> DEBU 100f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 557.1µs " +"2020-08-31 20:51:50.634 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1010 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 541.8µs " +"2020-08-31 20:51:50.635 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1011 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:50.636 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1012 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:50.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1013 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:50.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1014 Sending msg of 28 bytes to 3 on channel testchainid took 12.9µs" +"2020-08-31 20:51:50.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1015 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51µs " +"2020-08-31 20:51:51.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1016 Sending msg of 28 bytes to 3 on channel businesschannel took 20µs" +"2020-08-31 20:51:51.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1018 Sending msg of 28 bytes to 2 on channel businesschannel took 18.2µs" +"2020-08-31 20:51:51.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1017 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 104.4µs " +"2020-08-31 20:51:51.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1019 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:51.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 157.9µs " +"2020-08-31 20:51:51.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101b Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:51.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU 101c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:51.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101d Sending msg of 28 bytes to 3 on channel testchainid took 17.2µs" +"2020-08-31 20:51:51.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 101e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 161µs " +"2020-08-31 20:51:51.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 101f Sending msg of 28 bytes to 2 on channel businesschannel took 19.2µs" +"2020-08-31 20:51:51.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1020 Sending msg of 28 bytes to 3 on channel businesschannel took 13.9µs" +"2020-08-31 20:51:51.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1021 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 127.7µs " +"2020-08-31 20:51:51.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1022 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 253.3µs " +"2020-08-31 20:51:51.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1023 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:51.635 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1024 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:51.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1025 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:51.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1026 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +"2020-08-31 20:51:51.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1027 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50.4µs " +"2020-08-31 20:51:52.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1028 Sending msg of 28 bytes to 2 on channel businesschannel took 22.7µs" +"2020-08-31 20:51:52.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1029 Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +"2020-08-31 20:51:52.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.7µs " +"2020-08-31 20:51:52.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 102b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.5µs " +"2020-08-31 20:51:52.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102c Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:52.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:52.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU 102e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:52.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 102f Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +"2020-08-31 20:51:52.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1030 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.7µs " +"2020-08-31 20:51:52.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1031 Sending msg of 28 bytes to 2 on channel businesschannel took 260.5µs" +"2020-08-31 20:51:52.633 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1032 Sending msg of 28 bytes to 3 on channel businesschannel took 13.6µs" +"2020-08-31 20:51:52.634 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1033 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 634.3µs " +"2020-08-31 20:51:52.634 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1034 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 184.9µs " +"2020-08-31 20:51:52.637 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1035 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:52.638 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1036 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:52.842 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1037 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:52.844 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1038 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.4µs " +"2020-08-31 20:51:52.843 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1039 Sending msg of 28 bytes to 3 on channel testchainid took 131.9µs" +"2020-08-31 20:51:53.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103a Sending msg of 28 bytes to 2 on channel businesschannel took 31.4µs" +"2020-08-31 20:51:53.132 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 103b Sending msg of 28 bytes to 3 on channel businesschannel took 21.2µs" +"2020-08-31 20:51:53.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111.8µs " +"2020-08-31 20:51:53.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 103d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 380µs " +"2020-08-31 20:51:53.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:53.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU 103f Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:53.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1040 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:53.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1041 Sending msg of 28 bytes to 3 on channel testchainid took 9.9µs" +"2020-08-31 20:51:53.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1042 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 61.7µs " +"2020-08-31 20:51:53.450 UTC [orderer.common.server] replicateDisabledChains -> DEBU 1043 No inactive chains to try to replicate" +"2020-08-31 20:51:53.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1044 Sending msg of 28 bytes to 2 on channel businesschannel took 18.1µs" +"2020-08-31 20:51:53.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1045 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.5µs " +"2020-08-31 20:51:53.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1046 Sending msg of 28 bytes to 3 on channel businesschannel took 6.6µs" +"2020-08-31 20:51:53.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1047 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.1µs " +"2020-08-31 20:51:53.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1048 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:53.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1049 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:53.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU 104a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:53.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104b Sending msg of 28 bytes to 3 on channel testchainid took 10.1µs" +"2020-08-31 20:51:53.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 341.4µs " +"2020-08-31 20:51:54.133 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104d Sending msg of 28 bytes to 2 on channel businesschannel took 37µs" +"2020-08-31 20:51:54.133 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 104e Sending msg of 28 bytes to 3 on channel businesschannel took 20.9µs" +"2020-08-31 20:51:54.134 UTC [orderer.common.cluster.step] sendMessage -> DEBU 104f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 606.3µs " +"2020-08-31 20:51:54.136 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1050 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 2.7363ms " +"2020-08-31 20:51:54.137 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1051 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:54.138 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1052 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:54.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1053 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:54.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1054 Sending msg of 28 bytes to 3 on channel testchainid took 15.4µs" +"2020-08-31 20:51:54.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1055 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.4µs " +"2020-08-31 20:51:54.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1056 Sending msg of 28 bytes to 3 on channel businesschannel took 46.9µs" +"2020-08-31 20:51:54.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1057 Sending msg of 28 bytes to 2 on channel businesschannel took 152.3µs" +"2020-08-31 20:51:54.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1058 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.1µs " +"2020-08-31 20:51:54.633 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1059 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.2µs " +"2020-08-31 20:51:54.633 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105a Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:54.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:54.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 105c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:54.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105d Sending msg of 28 bytes to 3 on channel testchainid took 15.2µs" +"2020-08-31 20:51:54.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 105e Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.7µs " +"2020-08-31 20:51:55.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 105f Sending msg of 28 bytes to 2 on channel businesschannel took 24.2µs" +"2020-08-31 20:51:55.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1060 Sending msg of 28 bytes to 3 on channel businesschannel took 15.7µs" +"2020-08-31 20:51:55.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1061 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95.7µs " +"2020-08-31 20:51:55.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1062 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 73.8µs " +"2020-08-31 20:51:55.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1063 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:55.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1064 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:55.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1065 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:55.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1066 Sending msg of 28 bytes to 3 on channel testchainid took 13.2µs" +"2020-08-31 20:51:55.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1067 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.3µs " +"2020-08-31 20:51:55.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1068 Sending msg of 28 bytes to 2 on channel businesschannel took 25µs" +"2020-08-31 20:51:55.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1069 Sending msg of 28 bytes to 3 on channel businesschannel took 23.7µs" +"2020-08-31 20:51:55.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.6µs " +"2020-08-31 20:51:55.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU 106b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 75.8µs " +"2020-08-31 20:51:55.632 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:55.632 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106d Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:55.839 UTC [orderer.common.cluster.step] handleMessage -> DEBU 106e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:55.840 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 106f Sending msg of 28 bytes to 3 on channel testchainid took 11.9µs" +"2020-08-31 20:51:55.840 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1070 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 235.2µs " +"2020-08-31 20:51:56.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1071 Sending msg of 28 bytes to 2 on channel businesschannel took 16.7µs" +"2020-08-31 20:51:56.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1072 Sending msg of 28 bytes to 3 on channel businesschannel took 5.6µs" +"2020-08-31 20:51:56.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1073 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 116µs " +"2020-08-31 20:51:56.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1074 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 64.6µs " +"2020-08-31 20:51:56.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1075 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:56.135 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1076 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:56.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1077 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:56.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1078 Sending msg of 28 bytes to 3 on channel testchainid took 14µs" +"2020-08-31 20:51:56.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1079 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.2µs " +"2020-08-31 20:51:56.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107a Sending msg of 28 bytes to 2 on channel businesschannel took 28µs" +"2020-08-31 20:51:56.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 107b Sending msg of 28 bytes to 3 on channel businesschannel took 19.2µs" +"2020-08-31 20:51:56.634 UTC [orderer.common.cluster.step] sendMessage -> DEBU 107c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.311ms " +"2020-08-31 20:51:56.635 UTC [orderer.common.cluster.step] sendMessage -> DEBU 107d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 119.4µs " +"2020-08-31 20:51:56.637 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107e Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:56.639 UTC [orderer.common.cluster.step] handleMessage -> DEBU 107f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:56.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1080 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:56.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1081 Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +"2020-08-31 20:51:56.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1082 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 59.9µs " +"2020-08-31 20:51:57.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1083 Sending msg of 28 bytes to 2 on channel businesschannel took 18.9µs" +"2020-08-31 20:51:57.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1084 Sending msg of 28 bytes to 3 on channel businesschannel took 11.6µs" +"2020-08-31 20:51:57.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1085 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.4µs " +"2020-08-31 20:51:57.131 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1086 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 47.4µs " +"2020-08-31 20:51:57.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1087 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:57.132 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1088 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:57.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1089 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:57.340 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 108a Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2020-08-31 20:51:57.340 UTC [orderer.common.cluster.step] sendMessage -> DEBU 108b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60µs " +"2020-08-31 20:51:57.508 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 108c [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:50818 with txid 'd069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a' of type ENDORSER_TRANSACTION" +"2020-08-31 20:51:57.509 UTC [policies] Evaluate -> DEBU 108d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-08-31 20:51:57.509 UTC [policies] Evaluate -> DEBU 108e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:51:57.510 UTC [policies] Evaluate -> DEBU 108f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-08-31 20:51:57.510 UTC [policies] Evaluate -> DEBU 1090 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:51:57.511 UTC [policies] Evaluate -> DEBU 1091 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-08-31 20:51:57.511 UTC [msp] DeserializeIdentity -> DEBU 1092 Obtaining identity" +"2020-08-31 20:51:57.515 UTC [msp.identity] newIdentity -> DEBU 1093 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE-----" +"2020-08-31 20:51:57.517 UTC [cauthdsl] func1 -> DEBU 1094 0xc000e68400 gate 1598907117517135800 evaluation starts" +"2020-08-31 20:51:57.517 UTC [cauthdsl] func2 -> DEBU 1095 0xc000e68400 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:51:57.518 UTC [cauthdsl] func2 -> DEBU 1096 0xc000e68400 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:51:57.535 UTC [cauthdsl] func2 -> DEBU 1097 0xc000e68400 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2020-08-31 20:51:57.536 UTC [cauthdsl] func2 -> DEBU 1098 0xc000e68400 principal evaluation fails" +"2020-08-31 20:51:57.538 UTC [cauthdsl] func1 -> DEBU 1099 0xc000e68400 gate 1598907117517135800 evaluation fails" +"2020-08-31 20:51:57.543 UTC [policies] Evaluate -> DEBU 109a Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:51:57.543 UTC [policies] Evaluate -> DEBU 109b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:51:57.543 UTC [policies] func1 -> DEBU 109c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2020-08-31 20:51:57.543 UTC [policies] Evaluate -> DEBU 109d Signature set did not satisfy policy /Channel/Orderer/Writers" +"2020-08-31 20:51:57.543 UTC [policies] Evaluate -> DEBU 109e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-08-31 20:51:57.543 UTC [policies] Evaluate -> DEBU 109f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-08-31 20:51:57.543 UTC [policies] Evaluate -> DEBU 10a0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:51:57.543 UTC [policies] Evaluate -> DEBU 10a1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2020-08-31 20:51:57.543 UTC [cauthdsl] func1 -> DEBU 10a2 0xc000e69a70 gate 1598907117543752100 evaluation starts" +"2020-08-31 20:51:57.543 UTC [cauthdsl] func2 -> DEBU 10a3 0xc000e69a70 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:51:57.543 UTC [cauthdsl] func2 -> DEBU 10a4 0xc000e69a70 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:51:57.543 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 10a5 Checking if identity satisfies MEMBER role for Org1MSP" +"2020-08-31 20:51:57.544 UTC [msp] Validate -> DEBU 10a6 MSP Org1MSP validating identity" +"2020-08-31 20:51:57.544 UTC [msp] getCertificationChain -> DEBU 10a7 MSP Org1MSP getting certification chain" +"2020-08-31 20:51:57.544 UTC [cauthdsl] func2 -> DEBU 10a8 0xc000e69a70 principal matched by identity 0" +"2020-08-31 20:51:57.544 UTC [msp.identity] Verify -> DEBU 10a9 Verify: digest = 00000000 f4 e7 93 52 4d 20 48 5f 66 91 8b fc cc 39 18 f3 |...RM H_f....9..| +00000010 ab 30 31 6f 86 19 f3 33 c1 37 13 23 32 7f d5 15 |.01o...3.7.#2...|" +"2020-08-31 20:51:57.544 UTC [msp.identity] Verify -> DEBU 10aa Verify: sig = 00000000 30 45 02 21 00 8a 2c 62 ac cb 2a ec 5a fd 13 e7 |0E.!..,b..*.Z...| +00000010 37 92 88 81 15 e1 12 b2 64 18 04 1a 42 b8 ea 7e |7.......d...B..~| +00000020 09 25 0c b1 3f 02 20 73 43 54 f1 e5 d4 0d 2e 2e |.%..?. sCT......| +00000030 08 f9 2b df dd 4b cf cb ee a4 66 5c 1c 4d 8f 79 |..+..K....f\.M.y| +00000040 73 ba e7 6f 4b 96 21 |s..oK.!|" +"2020-08-31 20:51:57.544 UTC [cauthdsl] func2 -> DEBU 10ab 0xc000e69a70 principal evaluation succeeds for identity 0" +"2020-08-31 20:51:57.544 UTC [cauthdsl] func1 -> DEBU 10ac 0xc000e69a70 gate 1598907117543752100 evaluation succeeds" +"2020-08-31 20:51:57.545 UTC [policies] Evaluate -> DEBU 10ad Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:51:57.545 UTC [policies] Evaluate -> DEBU 10ae == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:51:57.545 UTC [policies] Evaluate -> DEBU 10af Signature set satisfies policy /Channel/Application/Writers" +"2020-08-31 20:51:57.545 UTC [policies] Evaluate -> DEBU 10b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-08-31 20:51:57.545 UTC [policies] Evaluate -> DEBU 10b1 Signature set satisfies policy /Channel/Writers" +"2020-08-31 20:51:57.545 UTC [policies] Evaluate -> DEBU 10b2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-08-31 20:51:57.552 UTC [orderer.common.blockcutter] Ordered -> DEBU 10b3 Enqueuing message into batch" +"2020-08-31 20:51:57.552 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 10b4 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:50818" +"2020-08-31 20:51:57.556 UTC [grpc] infof -> DEBU 10b5 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:51:57.557 UTC [orderer.common.broadcast] Handle -> WARN 10b6 Error reading from 172.18.0.9:50818: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:51:57.559 UTC [orderer.common.server] func1 -> DEBU 10b7 Closing Broadcast stream" +"2020-08-31 20:51:57.560 UTC [comm.grpc.server] 1 -> INFO 10b8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:50818 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=48.1929211s +"2020-08-31 20:51:57.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10b9 Sending msg of 28 bytes to 2 on channel businesschannel took 22.4µs" +"2020-08-31 20:51:57.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10ba Sending msg of 28 bytes to 3 on channel businesschannel took 26µs" +"2020-08-31 20:51:57.633 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10bb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 401.5µs " +"2020-08-31 20:51:57.634 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10bc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 321.4µs " +"2020-08-31 20:51:57.637 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10bd Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:57.637 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10be Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:57.840 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10bf Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:57.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c0 Sending msg of 28 bytes to 3 on channel testchainid took 14.7µs" +"2020-08-31 20:51:57.841 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.4µs " +"2020-08-31 20:51:58.133 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c2 Sending msg of 28 bytes to 3 on channel businesschannel took 239.3µs" +"2020-08-31 20:51:58.134 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c4 Sending msg of 28 bytes to 2 on channel businesschannel took 29.9µs" +"2020-08-31 20:51:58.133 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 342.2µs " +"2020-08-31 20:51:58.134 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10c5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 147.4µs " +"2020-08-31 20:51:58.136 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c6 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:58.136 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c7 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:58.341 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10c8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:58.344 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10c9 Sending msg of 28 bytes to 3 on channel testchainid took 24.2µs" +"2020-08-31 20:51:58.344 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ca Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 93.4µs " +"2020-08-31 20:51:58.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cb Sending msg of 28 bytes to 2 on channel businesschannel took 28µs" +"2020-08-31 20:51:58.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10cc Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +"2020-08-31 20:51:58.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10cd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 82µs " +"2020-08-31 20:51:58.633 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 656.8µs " +"2020-08-31 20:51:58.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10cf Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:58.635 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d0 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:58.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:58.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d2 Sending msg of 28 bytes to 3 on channel testchainid took 19.2µs" +"2020-08-31 20:51:58.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.8µs " +"2020-08-31 20:51:59.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d4 Sending msg of 28 bytes to 2 on channel businesschannel took 31.5µs" +"2020-08-31 20:51:59.132 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10d6 Sending msg of 28 bytes to 3 on channel businesschannel took 19.5µs" +"2020-08-31 20:51:59.133 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 125.7µs " +"2020-08-31 20:51:59.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10d5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 168.4µs " +"2020-08-31 20:51:59.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d8 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:59.135 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10d9 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:59.341 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10da Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:59.342 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10db Sending msg of 28 bytes to 3 on channel testchainid took 23µs" +"2020-08-31 20:51:59.343 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10dc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 636.6µs " +"2020-08-31 20:51:59.553 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 10dd Batch timer expired, creating block" channel=businesschannel node=1 +"2020-08-31 20:51:59.553 UTC [orderer.consensus.etcdraft] propose -> INFO 10de Created block [3], there are 0 blocks in flight" channel=businesschannel node=1 +"2020-08-31 20:51:59.554 UTC [orderer.consensus.etcdraft] 2 -> DEBU 10df Proposed block [3] to raft consensus" channel=businesschannel node=1 +"2020-08-31 20:51:59.558 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e0 Sending msg of 3648 bytes to 2 on channel businesschannel took 18.3µs" +"2020-08-31 20:51:59.559 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e1 Sending msg of 3648 bytes to 3 on channel businesschannel took 18.4µs" +"2020-08-31 20:51:59.559 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e2 Send of ConsensusRequest for channel businesschannel with payload of size 3648 to orderer1.example.com(orderer1.example.com:7050) took 187.8µs " +"2020-08-31 20:51:59.559 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e3 Send of ConsensusRequest for channel businesschannel with payload of size 3648 to orderer2.example.com(orderer2.example.com:7050) took 88.6µs " +"2020-08-31 20:51:59.563 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10e4 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:59.564 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e5 Sending msg of 28 bytes to 2 on channel businesschannel took 14.8µs" +"2020-08-31 20:51:59.565 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10e6 Sending msg of 28 bytes to 3 on channel businesschannel took 17.8µs" +"2020-08-31 20:51:59.565 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 180.3µs " +"2020-08-31 20:51:59.565 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 10e8 Writing block [3] (Raft index: 7) to ledger" channel=businesschannel node=1 +"2020-08-31 20:51:59.565 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10e9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 619.7µs " +"2020-08-31 20:51:59.565 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 10ea [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2020-08-31 20:51:59.566 UTC [msp] GetDefaultSigningIdentity -> DEBU 10eb Obtaining default signing identity" +"2020-08-31 20:51:59.567 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ec Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:59.567 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ed Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:59.570 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ee Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:59.572 UTC [msp] GetDefaultSigningIdentity -> DEBU 10ef Obtaining default signing identity" +"2020-08-31 20:51:59.574 UTC [msp.identity] Sign -> DEBU 10f0 Sign: plaintext: 0A020802120B0A090A03010203100418...0F15FDD756F3A82F84C30D706B5B9866 " +"2020-08-31 20:51:59.574 UTC [msp.identity] Sign -> DEBU 10f1 Sign: digest: 816B67D98C669E2F8763EA181B5E989E510C1526E786A4C939F9009CC2410D02 " +"2020-08-31 20:51:59.588 UTC [fsblkstorage] indexBlock -> DEBU 10f2 Indexing block [blockNum=3, blockHash=[]byte{0x62, 0xc8, 0x94, 0xe0, 0x8d, 0xe8, 0xc7, 0x50, 0xec, 0x14, 0xce, 0xf7, 0xf6, 0x41, 0xb9, 0x45, 0x45, 0x74, 0xf1, 0x40, 0xf4, 0xb9, 0x19, 0x48, 0x1a, 0x35, 0x67, 0xf7, 0x3c, 0xf, 0xe3, 0xf2} txOffsets= +txId=d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a locPointer=offset=70, bytesLength=3520 +]" +"2020-08-31 20:51:59.590 UTC [fsblkstorage] updateCheckpoint -> DEBU 10f3 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89369], isChainEmpty=[false], lastBlockNumber=[3]" +"2020-08-31 20:51:59.590 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 10f4 [channel: businesschannel] Wrote block [3]" +"2020-08-31 20:51:59.590 UTC [fsblkstorage] waitForBlock -> DEBU 10f5 Came out of wait. maxAvailaBlockNumber=[3]" +"2020-08-31 20:51:59.591 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10f6 Remaining bytes=[4552], Going to peek [8] bytes" +"2020-08-31 20:51:59.591 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10f7 Returning blockbytes - length=[4550], placementInfo={fileNum=[0], startOffset=[84817], bytesOffset=[84819]}" +"2020-08-31 20:51:59.591 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 10f8 blockbytes [4550] read from file [0]" +"2020-08-31 20:51:59.591 UTC [common.deliver] deliverBlocks -> DEBU 10f9 [channel: businesschannel] Delivering block [3] for (0xc000a09280) for 172.18.0.5:56650" +"2020-08-31 20:51:59.591 UTC [fsblkstorage] waitForBlock -> DEBU 10fa Going to wait for newer blocks. maxAvailaBlockNumber=[3], waitForBlockNum=[4]" +"2020-08-31 20:51:59.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10fb Sending msg of 28 bytes to 2 on channel businesschannel took 16.2µs" +"2020-08-31 20:51:59.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 10fc Sending msg of 28 bytes to 3 on channel businesschannel took 11µs" +"2020-08-31 20:51:59.631 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10fd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.6µs " +"2020-08-31 20:51:59.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU 10fe Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 96.4µs " +"2020-08-31 20:51:59.632 UTC [orderer.common.cluster.step] handleMessage -> DEBU 10ff Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:59.632 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1100 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:51:59.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1101 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:51:59.842 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1102 Sending msg of 28 bytes to 3 on channel testchainid took 26.2µs" +"2020-08-31 20:51:59.843 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1103 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 106.2µs " +"2020-08-31 20:52:00.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1104 Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +"2020-08-31 20:52:00.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1105 Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +"2020-08-31 20:52:00.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1106 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 209.8µs " +"2020-08-31 20:52:00.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1107 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 118.9µs " +"2020-08-31 20:52:00.133 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1108 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:00.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1109 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:00.340 UTC [orderer.common.cluster.step] handleMessage -> DEBU 110a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:00.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 110b Sending msg of 28 bytes to 3 on channel testchainid took 14.5µs" +"2020-08-31 20:52:00.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 110c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 408.9µs " +"2020-08-31 20:52:00.406 UTC [orderer.common.server] Broadcast -> DEBU 110d Starting new Broadcast handler" +"2020-08-31 20:52:00.406 UTC [orderer.common.broadcast] Handle -> DEBU 110e Starting new broadcast loop for 172.18.0.9:50882" +"2020-08-31 20:52:00.427 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 110f [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:50882 with txid 'a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d' of type ENDORSER_TRANSACTION" +"2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 1110 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 1111 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 1112 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 1113 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 1114 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-08-31 20:52:00.427 UTC [cauthdsl] func1 -> DEBU 1115 0xc0010dcad0 gate 1598907120427530200 evaluation starts" +"2020-08-31 20:52:00.427 UTC [cauthdsl] func2 -> DEBU 1116 0xc0010dcad0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:00.427 UTC [cauthdsl] func2 -> DEBU 1117 0xc0010dcad0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:00.427 UTC [cauthdsl] func2 -> DEBU 1118 0xc0010dcad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2020-08-31 20:52:00.427 UTC [cauthdsl] func2 -> DEBU 1119 0xc0010dcad0 principal evaluation fails" +"2020-08-31 20:52:00.427 UTC [cauthdsl] func1 -> DEBU 111a 0xc0010dcad0 gate 1598907120427530200 evaluation fails" +"2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 111b Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 111c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:52:00.427 UTC [policies] func1 -> DEBU 111d Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 111e Signature set did not satisfy policy /Channel/Orderer/Writers" +"2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 111f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 1120 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-08-31 20:52:00.427 UTC [policies] Evaluate -> DEBU 1121 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:00.428 UTC [policies] Evaluate -> DEBU 1122 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2020-08-31 20:52:00.428 UTC [cauthdsl] func1 -> DEBU 1123 0xc0010dd7c0 gate 1598907120428041800 evaluation starts" +"2020-08-31 20:52:00.428 UTC [cauthdsl] func2 -> DEBU 1124 0xc0010dd7c0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:00.428 UTC [cauthdsl] func2 -> DEBU 1125 0xc0010dd7c0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:00.428 UTC [cauthdsl] func2 -> DEBU 1126 0xc0010dd7c0 principal matched by identity 0" +"2020-08-31 20:52:00.428 UTC [msp.identity] Verify -> DEBU 1127 Verify: digest = 00000000 7f 36 4f 61 9a cb be 2c 0e 7c f3 d3 0a ae 63 b0 |.6Oa...,.|....c.| +00000010 cb df 45 66 c7 92 ad 14 79 e7 5b 4f 81 2e ae 1c |..Ef....y.[O....|" +"2020-08-31 20:52:00.428 UTC [msp.identity] Verify -> DEBU 1128 Verify: sig = 00000000 30 44 02 20 2b 6a 46 c8 38 65 ff 3e 84 0d 72 0a |0D. +jF.8e.>..r.| +00000010 1b 71 b6 da 55 29 15 fa 20 ed 85 cd e5 54 13 8e |.q..U).. ....T..| +00000020 73 d7 49 c1 02 20 55 36 0c 7d d4 d5 f6 0a a0 75 |s.I.. U6.}.....u| +00000030 26 3b e5 cd d5 60 48 c1 e0 09 21 1b f6 c1 c2 bb |&;...`H...!.....| +00000040 35 e0 49 3f d9 2c |5.I?.,|" +"2020-08-31 20:52:00.428 UTC [cauthdsl] func2 -> DEBU 1129 0xc0010dd7c0 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:00.429 UTC [cauthdsl] func1 -> DEBU 112a 0xc0010dd7c0 gate 1598907120428041800 evaluation succeeds" +"2020-08-31 20:52:00.430 UTC [policies] Evaluate -> DEBU 112b Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:52:00.430 UTC [policies] Evaluate -> DEBU 112c == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:52:00.430 UTC [policies] Evaluate -> DEBU 112d Signature set satisfies policy /Channel/Application/Writers" +"2020-08-31 20:52:00.430 UTC [policies] Evaluate -> DEBU 112e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-08-31 20:52:00.430 UTC [policies] Evaluate -> DEBU 112f Signature set satisfies policy /Channel/Writers" +"2020-08-31 20:52:00.430 UTC [policies] Evaluate -> DEBU 1130 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-08-31 20:52:00.430 UTC [orderer.common.blockcutter] Ordered -> DEBU 1131 Enqueuing message into batch" +"2020-08-31 20:52:00.430 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1132 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:50882" +"2020-08-31 20:52:00.434 UTC [grpc] infof -> DEBU 1133 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:00.434 UTC [orderer.common.broadcast] Handle -> WARN 1134 Error reading from 172.18.0.9:50882: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:00.434 UTC [orderer.common.server] func1 -> DEBU 1135 Closing Broadcast stream" +"2020-08-31 20:52:00.434 UTC [comm.grpc.server] 1 -> INFO 1136 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:50882 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.6718ms +"2020-08-31 20:52:00.631 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1137 Sending msg of 28 bytes to 2 on channel businesschannel took 18.1µs" +"2020-08-31 20:52:00.632 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1139 Sending msg of 28 bytes to 3 on channel businesschannel took 14µs" +"2020-08-31 20:52:00.633 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91µs " +"2020-08-31 20:52:00.632 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1138 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 160.6µs " +"2020-08-31 20:52:00.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU 113b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:00.634 UTC [orderer.common.cluster.step] handleMessage -> DEBU 113c Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:00.841 UTC [orderer.common.cluster.step] handleMessage -> DEBU 113d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:00.841 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 113e Sending msg of 28 bytes to 3 on channel testchainid took 26.2µs" +"2020-08-31 20:52:00.842 UTC [orderer.common.cluster.step] sendMessage -> DEBU 113f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 507.9µs " +"2020-08-31 20:52:01.131 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1140 Sending msg of 28 bytes to 2 on channel businesschannel took 23µs" +"2020-08-31 20:52:01.132 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1141 Sending msg of 28 bytes to 3 on channel businesschannel took 18.4µs" +"2020-08-31 20:52:01.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1142 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 607.2µs " +"2020-08-31 20:52:01.132 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1143 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.4µs " +"2020-08-31 20:52:01.134 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1144 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:01.135 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1145 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:01.339 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1146 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:01.341 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1147 Sending msg of 28 bytes to 3 on channel testchainid took 40µs" +"2020-08-31 20:52:01.341 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1148 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.9µs " +"2020-08-31 20:52:01.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1149 Sending msg of 28 bytes to 3 on channel businesschannel took 19.7µs" +"2020-08-31 20:52:01.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 114a Sending msg of 28 bytes to 2 on channel businesschannel took 12.2µs" +"2020-08-31 20:52:01.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 114b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 205.8µs " +"2020-08-31 20:52:01.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 114c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 168.9µs " +"2020-08-31 20:52:01.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:01.607 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114e Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:01.810 UTC [orderer.common.cluster.step] handleMessage -> DEBU 114f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:01.811 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1150 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +"2020-08-31 20:52:01.811 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1151 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 205µs " +"2020-08-31 20:52:02.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1152 Sending msg of 28 bytes to 2 on channel businesschannel took 35.8µs" +"2020-08-31 20:52:02.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1153 Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +"2020-08-31 20:52:02.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1154 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 868.3µs " +"2020-08-31 20:52:02.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1155 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 480.2µs " +"2020-08-31 20:52:02.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1156 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:02.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1157 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:02.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1158 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:02.307 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1159 Sending msg of 28 bytes to 3 on channel testchainid took 84.6µs" +"2020-08-31 20:52:02.308 UTC [orderer.common.cluster.step] sendMessage -> DEBU 115a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 677.8µs " +"2020-08-31 20:52:02.397 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 115b Batch timer expired, creating block" channel=businesschannel node=1 +"2020-08-31 20:52:02.397 UTC [orderer.consensus.etcdraft] propose -> INFO 115c Created block [4], there are 0 blocks in flight" channel=businesschannel node=1 +"2020-08-31 20:52:02.397 UTC [orderer.consensus.etcdraft] 2 -> DEBU 115d Proposed block [4] to raft consensus" channel=businesschannel node=1 +"2020-08-31 20:52:02.401 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115e Sending msg of 3109 bytes to 2 on channel businesschannel took 17.8µs" +"2020-08-31 20:52:02.401 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 115f Sending msg of 3109 bytes to 3 on channel businesschannel took 115.3µs" +"2020-08-31 20:52:02.402 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1160 Send of ConsensusRequest for channel businesschannel with payload of size 3109 to orderer2.example.com(orderer2.example.com:7050) took 313.1µs " +"2020-08-31 20:52:02.402 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1161 Send of ConsensusRequest for channel businesschannel with payload of size 3109 to orderer1.example.com(orderer1.example.com:7050) took 159.6µs " +"2020-08-31 20:52:02.405 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1162 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:02.406 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1163 Sending msg of 28 bytes to 2 on channel businesschannel took 19.5µs" +"2020-08-31 20:52:02.406 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1164 Sending msg of 28 bytes to 3 on channel businesschannel took 28.1µs" +"2020-08-31 20:52:02.407 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1165 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 147.7µs " +"2020-08-31 20:52:02.407 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 1166 Writing block [4] (Raft index: 8) to ledger" channel=businesschannel node=1 +"2020-08-31 20:52:02.407 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1167 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2020-08-31 20:52:02.408 UTC [msp] GetDefaultSigningIdentity -> DEBU 1168 Obtaining default signing identity" +"2020-08-31 20:52:02.408 UTC [msp] GetDefaultSigningIdentity -> DEBU 1169 Obtaining default signing identity" +"2020-08-31 20:52:02.408 UTC [msp.identity] Sign -> DEBU 116a Sign: plaintext: 0A020802120B0A090A03010203100418...5AC34A0E14B5221B8599A7B6B53BEA8E " +"2020-08-31 20:52:02.408 UTC [msp.identity] Sign -> DEBU 116b Sign: digest: 12CF8A132D96AF0DA3439AC78AFAFC99347B05A5A54007BD54030C049A7867F8 " +"2020-08-31 20:52:02.409 UTC [orderer.common.cluster.step] sendMessage -> DEBU 116c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 169.8µs " +"2020-08-31 20:52:02.433 UTC [fsblkstorage] indexBlock -> DEBU 116d Indexing block [blockNum=4, blockHash=[]byte{0x81, 0x47, 0x7e, 0x41, 0x1c, 0xad, 0xf5, 0x8b, 0x36, 0x32, 0x94, 0x83, 0x50, 0xc2, 0x29, 0x32, 0xda, 0xd5, 0xc, 0x74, 0xc8, 0x4a, 0xac, 0xd3, 0xc3, 0x82, 0x1e, 0x87, 0x25, 0x9, 0x5, 0x17} txOffsets= +txId=a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d locPointer=offset=70, bytesLength=2981 +]" +"2020-08-31 20:52:02.435 UTC [orderer.common.cluster.step] handleMessage -> DEBU 116e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:02.438 UTC [fsblkstorage] updateCheckpoint -> DEBU 116f Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93381], isChainEmpty=[false], lastBlockNumber=[4]" +"2020-08-31 20:52:02.442 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 1170 [channel: businesschannel] Wrote block [4]" +"2020-08-31 20:52:02.442 UTC [fsblkstorage] waitForBlock -> DEBU 1171 Came out of wait. maxAvailaBlockNumber=[4]" +"2020-08-31 20:52:02.442 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1172 Remaining bytes=[4012], Going to peek [8] bytes" +"2020-08-31 20:52:02.442 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1173 Returning blockbytes - length=[4010], placementInfo={fileNum=[0], startOffset=[89369], bytesOffset=[89371]}" +"2020-08-31 20:52:02.442 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1174 blockbytes [4010] read from file [0]" +"2020-08-31 20:52:02.443 UTC [common.deliver] deliverBlocks -> DEBU 1175 [channel: businesschannel] Delivering block [4] for (0xc000a09280) for 172.18.0.5:56650" +"2020-08-31 20:52:02.443 UTC [fsblkstorage] waitForBlock -> DEBU 1176 Going to wait for newer blocks. maxAvailaBlockNumber=[4], waitForBlockNum=[5]" +"2020-08-31 20:52:02.444 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1177 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:02.448 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1178 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:02.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1179 Sending msg of 28 bytes to 2 on channel businesschannel took 28.3µs" +"2020-08-31 20:52:02.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 117a Sending msg of 28 bytes to 3 on channel businesschannel took 23.4µs" +"2020-08-31 20:52:02.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 232µs " +"2020-08-31 20:52:02.599 UTC [orderer.common.cluster.step] sendMessage -> DEBU 117c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 422.2µs " +"2020-08-31 20:52:02.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117d Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:02.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:02.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 117f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:02.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1180 Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2020-08-31 20:52:02.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1181 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 341.5µs " +"2020-08-31 20:52:02.958 UTC [orderer.common.server] Broadcast -> DEBU 1182 Starting new Broadcast handler" +"2020-08-31 20:52:02.958 UTC [orderer.common.broadcast] Handle -> DEBU 1183 Starting new broadcast loop for 172.18.0.9:50896" +"2020-08-31 20:52:02.968 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 1184 [channel: businesschannel] Broadcast is processing normal message from 172.18.0.9:50896 with txid 'ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b' of type ENDORSER_TRANSACTION" +"2020-08-31 20:52:02.968 UTC [policies] Evaluate -> DEBU 1185 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-08-31 20:52:02.969 UTC [policies] Evaluate -> DEBU 1186 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:02.969 UTC [policies] Evaluate -> DEBU 1187 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-08-31 20:52:02.969 UTC [policies] Evaluate -> DEBU 1188 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:02.969 UTC [policies] Evaluate -> DEBU 1189 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-08-31 20:52:02.969 UTC [msp] DeserializeIdentity -> DEBU 118a Obtaining identity" +"2020-08-31 20:52:02.970 UTC [msp.identity] newIdentity -> DEBU 118b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +-----END CERTIFICATE-----" +"2020-08-31 20:52:02.970 UTC [cauthdsl] func1 -> DEBU 118c 0xc001135a90 gate 1598907122970898800 evaluation starts" +"2020-08-31 20:52:02.971 UTC [cauthdsl] func2 -> DEBU 118d 0xc001135a90 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:02.971 UTC [cauthdsl] func2 -> DEBU 118e 0xc001135a90 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:02.971 UTC [cauthdsl] func2 -> DEBU 118f 0xc001135a90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org2MSP)" +"2020-08-31 20:52:02.971 UTC [cauthdsl] func2 -> DEBU 1190 0xc001135a90 principal evaluation fails" +"2020-08-31 20:52:02.972 UTC [cauthdsl] func1 -> DEBU 1191 0xc001135a90 gate 1598907122970898800 evaluation fails" +"2020-08-31 20:52:02.972 UTC [policies] Evaluate -> DEBU 1192 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:52:02.972 UTC [policies] Evaluate -> DEBU 1193 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:52:02.972 UTC [policies] func1 -> DEBU 1194 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2020-08-31 20:52:02.972 UTC [policies] Evaluate -> DEBU 1195 Signature set did not satisfy policy /Channel/Orderer/Writers" +"2020-08-31 20:52:02.973 UTC [policies] Evaluate -> DEBU 1196 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-08-31 20:52:02.973 UTC [policies] Evaluate -> DEBU 1197 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-08-31 20:52:02.973 UTC [policies] Evaluate -> DEBU 1198 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:02.973 UTC [policies] Evaluate -> DEBU 1199 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2020-08-31 20:52:02.973 UTC [cauthdsl] func1 -> DEBU 119a 0xc001199100 gate 1598907122973812900 evaluation starts" +"2020-08-31 20:52:02.973 UTC [cauthdsl] func2 -> DEBU 119b 0xc001199100 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:02.974 UTC [cauthdsl] func2 -> DEBU 119c 0xc001199100 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:02.974 UTC [cauthdsl] func2 -> DEBU 119d 0xc001199100 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2020-08-31 20:52:02.974 UTC [cauthdsl] func2 -> DEBU 119e 0xc001199100 principal evaluation fails" +"2020-08-31 20:52:02.974 UTC [cauthdsl] func1 -> DEBU 119f 0xc001199100 gate 1598907122973812900 evaluation fails" +"2020-08-31 20:52:02.974 UTC [policies] Evaluate -> DEBU 11a0 Signature set did not satisfy policy /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:52:02.974 UTC [policies] Evaluate -> DEBU 11a1 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:52:02.974 UTC [policies] Evaluate -> DEBU 11a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers ==" +"2020-08-31 20:52:02.974 UTC [cauthdsl] func1 -> DEBU 11a3 0xc001199960 gate 1598907122974319700 evaluation starts" +"2020-08-31 20:52:02.974 UTC [cauthdsl] func2 -> DEBU 11a4 0xc001199960 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:02.974 UTC [cauthdsl] func2 -> DEBU 11a5 0xc001199960 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:02.975 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 11a6 Checking if identity satisfies MEMBER role for Org2MSP" +"2020-08-31 20:52:02.975 UTC [msp] Validate -> DEBU 11a7 MSP Org2MSP validating identity" +"2020-08-31 20:52:02.975 UTC [msp] getCertificationChain -> DEBU 11a8 MSP Org2MSP getting certification chain" +"2020-08-31 20:52:02.976 UTC [cauthdsl] func2 -> DEBU 11a9 0xc001199960 principal matched by identity 0" +"2020-08-31 20:52:02.976 UTC [msp.identity] Verify -> DEBU 11aa Verify: digest = 00000000 60 35 37 a9 79 33 a2 e5 2b 9c 00 24 05 6e 93 3f |`57.y3..+..$.n.?| +00000010 8d d7 90 73 0d 35 87 ae 3b dd 80 ca fa 0e 01 84 |...s.5..;.......|" +"2020-08-31 20:52:02.976 UTC [msp.identity] Verify -> DEBU 11ab Verify: sig = 00000000 30 44 02 20 7c 1e 88 5b 8d 81 cf 0e a2 2f d3 11 |0D. |..[...../..| +00000010 a4 a8 f1 b3 5c 74 52 c0 c6 9d 67 23 3f e7 8d d0 |....\tR...g#?...| +00000020 de 36 b3 af 02 20 14 7b 59 42 5f fc de 82 a4 91 |.6... .{YB_.....| +00000030 9e 10 21 3b 91 48 0d fa dd 17 37 33 ab 68 b1 3b |..!;.H....73.h.;| +00000040 92 ff b4 50 2d 54 |...P-T|" +"2020-08-31 20:52:02.976 UTC [cauthdsl] func2 -> DEBU 11ac 0xc001199960 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:02.976 UTC [cauthdsl] func1 -> DEBU 11ad 0xc001199960 gate 1598907122974319700 evaluation succeeds" +"2020-08-31 20:52:02.977 UTC [policies] Evaluate -> DEBU 11ae Signature set satisfies policy /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:52:02.977 UTC [policies] Evaluate -> DEBU 11af == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:52:02.977 UTC [policies] Evaluate -> DEBU 11b0 Signature set satisfies policy /Channel/Application/Writers" +"2020-08-31 20:52:02.977 UTC [policies] Evaluate -> DEBU 11b1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-08-31 20:52:02.977 UTC [policies] Evaluate -> DEBU 11b2 Signature set satisfies policy /Channel/Writers" +"2020-08-31 20:52:02.977 UTC [policies] Evaluate -> DEBU 11b3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-08-31 20:52:02.977 UTC [orderer.common.blockcutter] Ordered -> DEBU 11b4 Enqueuing message into batch" +"2020-08-31 20:52:02.977 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 11b5 [channel: businesschannel] Broadcast has successfully enqueued message of type ENDORSER_TRANSACTION from 172.18.0.9:50896" +"2020-08-31 20:52:02.980 UTC [orderer.common.broadcast] Handle -> WARN 11b6 Error reading from 172.18.0.9:50896: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:02.980 UTC [orderer.common.server] func1 -> DEBU 11b7 Closing Broadcast stream" +"2020-08-31 20:52:02.980 UTC [comm.grpc.server] 1 -> INFO 11b8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:50896 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.4692ms +"2020-08-31 20:52:02.980 UTC [grpc] infof -> DEBU 11b9 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:03.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ba Sending msg of 28 bytes to 2 on channel businesschannel took 34.5µs" +"2020-08-31 20:52:03.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11bb Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +"2020-08-31 20:52:03.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11bc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 130.8µs " +"2020-08-31 20:52:03.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11bd Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:03.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11be Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.4976ms " +"2020-08-31 20:52:03.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11bf Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:03.308 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c0 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:03.309 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c1 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +"2020-08-31 20:52:03.309 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 195.3µs " +"2020-08-31 20:52:03.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c3 Sending msg of 28 bytes to 2 on channel businesschannel took 32.5µs" +"2020-08-31 20:52:03.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11c4 Sending msg of 28 bytes to 3 on channel businesschannel took 12µs" +"2020-08-31 20:52:03.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 377.2µs " +"2020-08-31 20:52:03.599 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11c6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.162ms " +"2020-08-31 20:52:03.600 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c7 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:03.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:03.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11c9 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:03.807 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11ca Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2020-08-31 20:52:03.807 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11cb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 157.6µs " +"2020-08-31 20:52:04.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11cc Sending msg of 28 bytes to 2 on channel businesschannel took 29.9µs" +"2020-08-31 20:52:04.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11cd Sending msg of 28 bytes to 3 on channel businesschannel took 26.7µs" +"2020-08-31 20:52:04.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 357.4µs " +"2020-08-31 20:52:04.100 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11cf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 791.2µs " +"2020-08-31 20:52:04.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d0 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:04.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d1 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:04.308 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:04.309 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d3 Sending msg of 28 bytes to 3 on channel testchainid took 15.7µs" +"2020-08-31 20:52:04.310 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 193µs " +"2020-08-31 20:52:04.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d5 Sending msg of 28 bytes to 2 on channel businesschannel took 25.1µs" +"2020-08-31 20:52:04.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11d6 Sending msg of 28 bytes to 3 on channel businesschannel took 19.1µs" +"2020-08-31 20:52:04.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 320.8µs " +"2020-08-31 20:52:04.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11d8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 133.5µs " +"2020-08-31 20:52:04.600 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11d9 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:04.600 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11da Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:04.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11db Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:04.807 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11dc Sending msg of 28 bytes to 3 on channel testchainid took 17.5µs" +"2020-08-31 20:52:04.808 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11dd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.3µs " +"2020-08-31 20:52:04.978 UTC [orderer.consensus.etcdraft] serveRequest -> DEBU 11de Batch timer expired, creating block" channel=businesschannel node=1 +"2020-08-31 20:52:04.978 UTC [orderer.consensus.etcdraft] propose -> INFO 11df Created block [5], there are 0 blocks in flight" channel=businesschannel node=1 +"2020-08-31 20:52:04.979 UTC [orderer.consensus.etcdraft] 2 -> DEBU 11e0 Proposed block [5] to raft consensus" channel=businesschannel node=1 +"2020-08-31 20:52:04.981 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e1 Sending msg of 3108 bytes to 2 on channel businesschannel took 22.1µs" +"2020-08-31 20:52:04.982 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e2 Sending msg of 3108 bytes to 3 on channel businesschannel took 18.6µs" +"2020-08-31 20:52:04.982 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11e3 Send of ConsensusRequest for channel businesschannel with payload of size 3108 to orderer2.example.com(orderer2.example.com:7050) took 509.8µs " +"2020-08-31 20:52:04.982 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11e4 Send of ConsensusRequest for channel businesschannel with payload of size 3108 to orderer1.example.com(orderer1.example.com:7050) took 147.2µs " +"2020-08-31 20:52:04.985 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11e5 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:04.986 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11e6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:04.986 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e7 Sending msg of 28 bytes to 2 on channel businesschannel took 15.4µs" +"2020-08-31 20:52:04.987 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11e9 Sending msg of 28 bytes to 3 on channel businesschannel took 84.5µs" +"2020-08-31 20:52:04.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 642.1µs " +"2020-08-31 20:52:04.987 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11eb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 227.6µs " +"2020-08-31 20:52:04.989 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ec Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:04.986 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 11e8 Writing block [5] (Raft index: 9) to ledger" channel=businesschannel node=1 +"2020-08-31 20:52:04.993 UTC [orderer.common.cluster.step] handleMessage -> DEBU 11ed Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:04.993 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 11ee [channel: businesschannel] About to write block, setting its LAST_CONFIG to 2" +"2020-08-31 20:52:04.994 UTC [msp] GetDefaultSigningIdentity -> DEBU 11ef Obtaining default signing identity" +"2020-08-31 20:52:04.995 UTC [msp] GetDefaultSigningIdentity -> DEBU 11f0 Obtaining default signing identity" +"2020-08-31 20:52:04.996 UTC [msp.identity] Sign -> DEBU 11f1 Sign: plaintext: 0A020802120B0A090A03010203100418...59293EB35674F9F4F9A60E9D0E1DE7D5 " +"2020-08-31 20:52:04.996 UTC [msp.identity] Sign -> DEBU 11f2 Sign: digest: E04827E4D82BB30652C470A9E62BE4E0148D7E7558C64E89E94D5ABCC9BC396A " +"2020-08-31 20:52:05.011 UTC [fsblkstorage] indexBlock -> DEBU 11f3 Indexing block [blockNum=5, blockHash=[]byte{0xdc, 0x42, 0xca, 0x8d, 0x6b, 0x16, 0xf2, 0x93, 0x4, 0x29, 0x62, 0xf1, 0xe4, 0x9, 0xe8, 0xbf, 0x83, 0x51, 0xc9, 0xc7, 0x8b, 0xc4, 0x6, 0xa4, 0xd3, 0x7b, 0x3d, 0x42, 0xb5, 0xa5, 0x4, 0x73} txOffsets= +txId=ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b locPointer=offset=70, bytesLength=2980 +]" +"2020-08-31 20:52:05.012 UTC [fsblkstorage] updateCheckpoint -> DEBU 11f4 Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97392], isChainEmpty=[false], lastBlockNumber=[5]" +"2020-08-31 20:52:05.014 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 11f5 [channel: businesschannel] Wrote block [5]" +"2020-08-31 20:52:05.014 UTC [fsblkstorage] waitForBlock -> DEBU 11f6 Came out of wait. maxAvailaBlockNumber=[5]" +"2020-08-31 20:52:05.014 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11f7 Remaining bytes=[4011], Going to peek [8] bytes" +"2020-08-31 20:52:05.015 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11f8 Returning blockbytes - length=[4009], placementInfo={fileNum=[0], startOffset=[93381], bytesOffset=[93383]}" +"2020-08-31 20:52:05.015 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 11f9 blockbytes [4009] read from file [0]" +"2020-08-31 20:52:05.015 UTC [common.deliver] deliverBlocks -> DEBU 11fa [channel: businesschannel] Delivering block [5] for (0xc000a09280) for 172.18.0.5:56650" +"2020-08-31 20:52:05.016 UTC [fsblkstorage] waitForBlock -> DEBU 11fb Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2020-08-31 20:52:05.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11fc Sending msg of 28 bytes to 2 on channel businesschannel took 20.4µs" +"2020-08-31 20:52:05.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 11fe Sending msg of 28 bytes to 3 on channel businesschannel took 13.5µs" +"2020-08-31 20:52:05.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11ff Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.1µs " +"2020-08-31 20:52:05.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 11fd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 138.1µs " +"2020-08-31 20:52:05.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1200 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:05.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1201 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:05.307 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1202 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:05.307 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1203 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2020-08-31 20:52:05.308 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1204 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 269.3µs " +"2020-08-31 20:52:05.599 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1205 Sending msg of 28 bytes to 3 on channel businesschannel took 39.7µs" +"2020-08-31 20:52:05.599 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1206 Sending msg of 28 bytes to 2 on channel businesschannel took 21.4µs" +"2020-08-31 20:52:05.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1207 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110.5µs " +"2020-08-31 20:52:05.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1208 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 58.7µs " +"2020-08-31 20:52:05.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1209 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:05.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:05.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 120b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:05.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120c Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2020-08-31 20:52:05.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 120d Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.8µs " +"2020-08-31 20:52:06.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120e Sending msg of 28 bytes to 2 on channel businesschannel took 96.1µs" +"2020-08-31 20:52:06.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 120f Sending msg of 28 bytes to 3 on channel businesschannel took 34.1µs" +"2020-08-31 20:52:06.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1210 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.2µs " +"2020-08-31 20:52:06.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1211 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 131.6µs " +"2020-08-31 20:52:06.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1212 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:06.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1213 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:06.305 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1214 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:06.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1215 Sending msg of 28 bytes to 3 on channel testchainid took 8.3µs" +"2020-08-31 20:52:06.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1216 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.2µs " +"2020-08-31 20:52:06.596 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1217 Sending msg of 28 bytes to 2 on channel businesschannel took 18.4µs" +"2020-08-31 20:52:06.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1218 Sending msg of 28 bytes to 3 on channel businesschannel took 11.8µs" +"2020-08-31 20:52:06.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1219 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 103.8µs " +"2020-08-31 20:52:06.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 121a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 369.5µs " +"2020-08-31 20:52:06.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 121b Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:06.600 UTC [orderer.common.cluster.step] handleMessage -> DEBU 121c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:06.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 121d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:06.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 121e Sending msg of 28 bytes to 3 on channel testchainid took 13.8µs" +"2020-08-31 20:52:06.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 121f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.4µs " +"2020-08-31 20:52:07.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1220 Sending msg of 28 bytes to 2 on channel businesschannel took 18.6µs" +"2020-08-31 20:52:07.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1222 Sending msg of 28 bytes to 3 on channel businesschannel took 14.9µs" +"2020-08-31 20:52:07.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1223 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:07.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1221 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 180.1µs " +"2020-08-31 20:52:07.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1224 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.4µs " +"2020-08-31 20:52:07.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1225 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:07.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1226 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:07.307 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1227 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 139µs " +"2020-08-31 20:52:07.308 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1228 Sending msg of 28 bytes to 3 on channel testchainid took 218.9µs" +"2020-08-31 20:52:07.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1229 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 146µs " +"2020-08-31 20:52:07.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 122a Sending msg of 28 bytes to 3 on channel businesschannel took 25.1µs" +"2020-08-31 20:52:07.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 122b Sending msg of 28 bytes to 2 on channel businesschannel took 21.3µs" +"2020-08-31 20:52:07.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 122c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 76.7µs " +"2020-08-31 20:52:07.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 122d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:07.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 122e Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:07.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 122f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:07.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1230 Sending msg of 28 bytes to 3 on channel testchainid took 13.6µs" +"2020-08-31 20:52:07.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1231 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.1µs " +"2020-08-31 20:52:08.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1232 Sending msg of 28 bytes to 2 on channel businesschannel took 51µs" +"2020-08-31 20:52:08.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1234 Sending msg of 28 bytes to 3 on channel businesschannel took 15.8µs" +"2020-08-31 20:52:08.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1235 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:08.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1233 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 184.2µs " +"2020-08-31 20:52:08.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1236 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 176.4µs " +"2020-08-31 20:52:08.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1237 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:08.305 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1238 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:08.305 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1239 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +"2020-08-31 20:52:08.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 123a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 50µs " +"2020-08-31 20:52:08.479 UTC [orderer.common.server] Deliver -> DEBU 123b Starting new Deliver handler" +"2020-08-31 20:52:08.479 UTC [common.deliver] Handle -> DEBU 123c Starting new deliver loop for 172.18.0.9:50942" +"2020-08-31 20:52:08.480 UTC [common.deliver] Handle -> DEBU 123d Attempting to read seek info message from 172.18.0.9:50942" +"2020-08-31 20:52:08.481 UTC [policies] Evaluate -> DEBU 123e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:08.481 UTC [policies] Evaluate -> DEBU 123f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:08.481 UTC [policies] Evaluate -> DEBU 1240 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:08.482 UTC [policies] Evaluate -> DEBU 1241 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:08.482 UTC [policies] Evaluate -> DEBU 1242 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:08.482 UTC [msp] DeserializeIdentity -> DEBU 1243 Obtaining identity" +"2020-08-31 20:52:08.482 UTC [msp.identity] newIdentity -> DEBU 1244 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P ++8n2/IwosEtn+wHpdsRI +-----END CERTIFICATE-----" +"2020-08-31 20:52:08.483 UTC [cauthdsl] func1 -> DEBU 1245 0xc00124ef90 gate 1598907128483673300 evaluation starts" +"2020-08-31 20:52:08.483 UTC [cauthdsl] func2 -> DEBU 1246 0xc00124ef90 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:08.484 UTC [cauthdsl] func2 -> DEBU 1247 0xc00124ef90 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:08.484 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 1248 Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-08-31 20:52:08.484 UTC [msp] Validate -> DEBU 1249 MSP OrdererMSP validating identity" +"2020-08-31 20:52:08.485 UTC [msp] getCertificationChain -> DEBU 124a MSP OrdererMSP getting certification chain" +"2020-08-31 20:52:08.485 UTC [cauthdsl] func2 -> DEBU 124b 0xc00124ef90 principal matched by identity 0" +"2020-08-31 20:52:08.485 UTC [msp.identity] Verify -> DEBU 124c Verify: digest = 00000000 41 a1 40 ee 52 68 80 4d 76 92 c7 9f d0 ab 88 f7 |A.@.Rh.Mv.......| +00000010 a8 72 1f d3 d2 9f 18 4f 5b 69 fd 0b 95 97 cd a1 |.r.....O[i......|" +"2020-08-31 20:52:08.486 UTC [msp.identity] Verify -> DEBU 124d Verify: sig = 00000000 30 45 02 21 00 cd 87 6d 59 c6 07 2a 96 d3 6d eb |0E.!...mY..*..m.| +00000010 43 03 20 e7 b0 a6 7b 14 90 df 7a 5a 61 fa 55 81 |C. ...{...zZa.U.| +00000020 3e 06 12 51 a1 02 20 1e e2 e9 aa 22 d1 7b 34 0e |>..Q.. ....".{4.| +00000030 0d 07 53 a5 f1 45 05 1d 22 e4 a3 5f 0d dc 27 4c |..S..E..".._..'L| +00000040 a7 97 62 ef db e6 db |..b....|" +"2020-08-31 20:52:08.486 UTC [cauthdsl] func2 -> DEBU 124e 0xc00124ef90 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:08.486 UTC [cauthdsl] func1 -> DEBU 124f 0xc00124ef90 gate 1598907128483673300 evaluation succeeds" +"2020-08-31 20:52:08.487 UTC [policies] Evaluate -> DEBU 1250 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:08.487 UTC [policies] Evaluate -> DEBU 1251 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:08.488 UTC [policies] Evaluate -> DEBU 1252 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:08.488 UTC [policies] Evaluate -> DEBU 1253 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:08.488 UTC [policies] Evaluate -> DEBU 1254 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:08.489 UTC [policies] Evaluate -> DEBU 1255 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:08.489 UTC [common.deliver] deliverBlocks -> DEBU 1256 [channel: businesschannel] Received seekInfo (0xc0011f2fc0) start: > stop: > from 172.18.0.9:50942" +"2020-08-31 20:52:08.489 UTC [fsblkstorage] Next -> DEBU 1257 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-08-31 20:52:08.490 UTC [fsblkstorage] newBlockfileStream -> DEBU 1258 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93381]" +"2020-08-31 20:52:08.490 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1259 Remaining bytes=[4011], Going to peek [8] bytes" +"2020-08-31 20:52:08.490 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 125a Returning blockbytes - length=[4009], placementInfo={fileNum=[0], startOffset=[93381], bytesOffset=[93383]}" +"2020-08-31 20:52:08.490 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 125b blockbytes [4009] read from file [0]" +"2020-08-31 20:52:08.491 UTC [common.deliver] deliverBlocks -> DEBU 125c [channel: businesschannel] Delivering block [5] for (0xc0011f2fc0) for 172.18.0.9:50942" +"2020-08-31 20:52:08.491 UTC [common.deliver] deliverBlocks -> DEBU 125d [channel: businesschannel] Done delivering to 172.18.0.9:50942 for (0xc0011f2fc0)" +"2020-08-31 20:52:08.491 UTC [common.deliver] Handle -> DEBU 125e Waiting for new SeekInfo from 172.18.0.9:50942" +"2020-08-31 20:52:08.491 UTC [fsblkstorage] waitForBlock -> DEBU 125f Came out of wait. maxAvailaBlockNumber=[5]" +"2020-08-31 20:52:08.492 UTC [fsblkstorage] waitForBlock -> DEBU 1260 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2020-08-31 20:52:08.492 UTC [common.deliver] Handle -> DEBU 1261 Attempting to read seek info message from 172.18.0.9:50942" +"2020-08-31 20:52:08.497 UTC [grpc] warningf -> DEBU 1262 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:50942: read: connection reset by peer" +"2020-08-31 20:52:08.497 UTC [common.deliver] Handle -> WARN 1263 Error reading from 172.18.0.9:50942: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:08.497 UTC [orderer.common.server] func1 -> DEBU 1264 Closing Deliver stream" +"2020-08-31 20:52:08.498 UTC [comm.grpc.server] 1 -> INFO 1265 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50942 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.0261ms +"2020-08-31 20:52:08.499 UTC [grpc] infof -> DEBU 1266 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:08.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1267 Sending msg of 28 bytes to 2 on channel businesschannel took 121.8µs" +"2020-08-31 20:52:08.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1269 Sending msg of 28 bytes to 3 on channel businesschannel took 18.5µs" +"2020-08-31 20:52:08.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1268 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 198.8µs " +"2020-08-31 20:52:08.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 126a Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:08.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 126b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0569ms " +"2020-08-31 20:52:08.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 126c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:08.701 UTC [orderer.common.server] Deliver -> DEBU 126d Starting new Deliver handler" +"2020-08-31 20:52:08.701 UTC [common.deliver] Handle -> DEBU 126e Starting new deliver loop for 172.18.0.9:50944" +"2020-08-31 20:52:08.702 UTC [common.deliver] Handle -> DEBU 126f Attempting to read seek info message from 172.18.0.9:50944" +"2020-08-31 20:52:08.704 UTC [policies] Evaluate -> DEBU 1270 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:08.704 UTC [policies] Evaluate -> DEBU 1271 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:08.705 UTC [policies] Evaluate -> DEBU 1272 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:08.705 UTC [policies] Evaluate -> DEBU 1273 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:08.706 UTC [policies] Evaluate -> DEBU 1274 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:08.706 UTC [cauthdsl] func1 -> DEBU 1275 0xc001291610 gate 1598907128706724800 evaluation starts" +"2020-08-31 20:52:08.707 UTC [cauthdsl] func2 -> DEBU 1276 0xc001291610 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:08.707 UTC [cauthdsl] func2 -> DEBU 1277 0xc001291610 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:08.707 UTC [cauthdsl] func2 -> DEBU 1278 0xc001291610 principal matched by identity 0" +"2020-08-31 20:52:08.707 UTC [msp.identity] Verify -> DEBU 1279 Verify: digest = 00000000 6a f5 5a f3 f6 22 99 1b f6 3d ed 7a 98 77 53 91 |j.Z.."...=.z.wS.| +00000010 1a 7f 01 f2 cb 0b 12 f8 5f 88 68 71 e8 f3 86 9c |........_.hq....|" +"2020-08-31 20:52:08.708 UTC [msp.identity] Verify -> DEBU 127a Verify: sig = 00000000 30 44 02 20 45 20 89 10 b5 73 88 93 c3 fa 7e 39 |0D. E ...s....~9| +00000010 38 de 1c 59 ed b7 05 eb d4 2a f0 4e 8d c0 57 35 |8..Y.....*.N..W5| +00000020 54 b5 14 bb 02 20 04 2d 16 60 45 fb eb fc 9d f1 |T.... .-.`E.....| +00000030 a5 c1 fe ab 10 f7 45 1e 1a 5f b7 df 12 4f 81 ab |......E.._...O..| +00000040 75 c5 e2 70 13 f8 |u..p..|" +"2020-08-31 20:52:08.709 UTC [cauthdsl] func2 -> DEBU 127b 0xc001291610 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:08.709 UTC [cauthdsl] func1 -> DEBU 127c 0xc001291610 gate 1598907128706724800 evaluation succeeds" +"2020-08-31 20:52:08.709 UTC [policies] Evaluate -> DEBU 127d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:08.709 UTC [policies] Evaluate -> DEBU 127e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:08.710 UTC [policies] Evaluate -> DEBU 127f Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:08.710 UTC [policies] Evaluate -> DEBU 1280 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:08.710 UTC [policies] Evaluate -> DEBU 1281 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:08.710 UTC [policies] Evaluate -> DEBU 1282 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:08.711 UTC [common.deliver] deliverBlocks -> DEBU 1283 [channel: businesschannel] Received seekInfo (0xc0011fe980) start: > stop: > from 172.18.0.9:50944" +"2020-08-31 20:52:08.711 UTC [fsblkstorage] Next -> DEBU 1284 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-08-31 20:52:08.711 UTC [fsblkstorage] newBlockfileStream -> DEBU 1285 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93381]" +"2020-08-31 20:52:08.713 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1286 Remaining bytes=[4011], Going to peek [8] bytes" +"2020-08-31 20:52:08.713 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1287 Returning blockbytes - length=[4009], placementInfo={fileNum=[0], startOffset=[93381], bytesOffset=[93383]}" +"2020-08-31 20:52:08.714 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1288 blockbytes [4009] read from file [0]" +"2020-08-31 20:52:08.715 UTC [common.deliver] deliverBlocks -> DEBU 1289 [channel: businesschannel] Delivering block [5] for (0xc0011fe980) for 172.18.0.9:50944" +"2020-08-31 20:52:08.715 UTC [common.deliver] deliverBlocks -> DEBU 128a [channel: businesschannel] Done delivering to 172.18.0.9:50944 for (0xc0011fe980)" +"2020-08-31 20:52:08.716 UTC [common.deliver] Handle -> DEBU 128b Waiting for new SeekInfo from 172.18.0.9:50944" +"2020-08-31 20:52:08.716 UTC [common.deliver] Handle -> DEBU 128c Attempting to read seek info message from 172.18.0.9:50944" +"2020-08-31 20:52:08.717 UTC [fsblkstorage] waitForBlock -> DEBU 128d Came out of wait. maxAvailaBlockNumber=[5]" +"2020-08-31 20:52:08.717 UTC [fsblkstorage] waitForBlock -> DEBU 128e Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2020-08-31 20:52:08.720 UTC [policies] Evaluate -> DEBU 128f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:08.720 UTC [policies] Evaluate -> DEBU 1290 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:08.720 UTC [policies] Evaluate -> DEBU 1291 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:08.720 UTC [policies] Evaluate -> DEBU 1292 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:08.721 UTC [policies] Evaluate -> DEBU 1293 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:08.721 UTC [cauthdsl] func1 -> DEBU 1294 0xc000d8ea90 gate 1598907128721467900 evaluation starts" +"2020-08-31 20:52:08.721 UTC [cauthdsl] func2 -> DEBU 1295 0xc000d8ea90 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:08.721 UTC [cauthdsl] func2 -> DEBU 1296 0xc000d8ea90 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:08.722 UTC [cauthdsl] func2 -> DEBU 1297 0xc000d8ea90 principal matched by identity 0" +"2020-08-31 20:52:08.722 UTC [msp.identity] Verify -> DEBU 1298 Verify: digest = 00000000 d8 18 8c 00 7a 33 31 bb b0 09 51 cb 09 75 ac db |....z31...Q..u..| +00000010 32 3e 73 1c 95 08 a2 1c d1 9f 0a f7 3d 5f 8d 01 |2>s.........=_..|" +"2020-08-31 20:52:08.722 UTC [msp.identity] Verify -> DEBU 1299 Verify: sig = 00000000 30 44 02 20 1e 51 02 0c 2f 2b e6 eb d1 e2 d2 03 |0D. .Q../+......| +00000010 a9 f5 c2 9f 71 06 b0 f8 d1 43 7a 65 71 a3 6d dc |....q....Czeq.m.| +00000020 bb a1 a2 0f 02 20 62 8a c7 51 e8 d0 ad af aa 2f |..... b..Q...../| +00000030 09 3a d6 75 20 8c 7d ad f3 92 c5 26 5e 2b 6a 53 |.:.u .}....&^+jS| +00000040 33 92 05 2a 4f 0c |3..*O.|" +"2020-08-31 20:52:08.722 UTC [cauthdsl] func2 -> DEBU 129a 0xc000d8ea90 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:08.723 UTC [cauthdsl] func1 -> DEBU 129b 0xc000d8ea90 gate 1598907128721467900 evaluation succeeds" +"2020-08-31 20:52:08.723 UTC [policies] Evaluate -> DEBU 129c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:08.723 UTC [policies] Evaluate -> DEBU 129d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:08.723 UTC [policies] Evaluate -> DEBU 129e Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:08.723 UTC [policies] Evaluate -> DEBU 129f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:08.725 UTC [policies] Evaluate -> DEBU 12a0 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:08.725 UTC [policies] Evaluate -> DEBU 12a1 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:08.726 UTC [common.deliver] deliverBlocks -> DEBU 12a2 [channel: businesschannel] Received seekInfo (0xc0013860c0) start: > stop: > from 172.18.0.9:50944" +"2020-08-31 20:52:08.727 UTC [fsblkstorage] Next -> DEBU 12a3 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-08-31 20:52:08.727 UTC [fsblkstorage] newBlockfileStream -> DEBU 12a4 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[56643]" +"2020-08-31 20:52:08.728 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12a5 Remaining bytes=[40749], Going to peek [8] bytes" +"2020-08-31 20:52:08.731 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12a6 Returning blockbytes - length=[28171], placementInfo={fileNum=[0], startOffset=[56643], bytesOffset=[56646]}" +"2020-08-31 20:52:08.731 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12a7 blockbytes [28171] read from file [0]" +"2020-08-31 20:52:08.731 UTC [common.deliver] deliverBlocks -> DEBU 12a8 [channel: businesschannel] Delivering block [2] for (0xc0013860c0) for 172.18.0.9:50944" +"2020-08-31 20:52:08.732 UTC [common.deliver] deliverBlocks -> DEBU 12a9 [channel: businesschannel] Done delivering to 172.18.0.9:50944 for (0xc0013860c0)" +"2020-08-31 20:52:08.732 UTC [common.deliver] Handle -> DEBU 12aa Waiting for new SeekInfo from 172.18.0.9:50944" +"2020-08-31 20:52:08.732 UTC [common.deliver] Handle -> DEBU 12ab Attempting to read seek info message from 172.18.0.9:50944" +"2020-08-31 20:52:08.733 UTC [fsblkstorage] waitForBlock -> DEBU 12ac Came out of wait. maxAvailaBlockNumber=[5]" +"2020-08-31 20:52:08.733 UTC [fsblkstorage] waitForBlock -> DEBU 12ad Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2020-08-31 20:52:08.741 UTC [grpc] infof -> DEBU 12ae transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:08.743 UTC [common.deliver] Handle -> WARN 12af Error reading from 172.18.0.9:50944: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:08.743 UTC [orderer.common.server] func1 -> DEBU 12b0 Closing Deliver stream" +"2020-08-31 20:52:08.743 UTC [comm.grpc.server] 1 -> INFO 12b1 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50944 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=42.3918ms +"2020-08-31 20:52:08.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 12b2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:08.805 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 12b3 Sending msg of 28 bytes to 3 on channel testchainid took 14.3µs" +"2020-08-31 20:52:08.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 12b4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 95µs " +"2020-08-31 20:52:08.880 UTC [orderer.common.server] Deliver -> DEBU 12b5 Starting new Deliver handler" +"2020-08-31 20:52:08.881 UTC [common.deliver] Handle -> DEBU 12b6 Starting new deliver loop for 172.18.0.9:50946" +"2020-08-31 20:52:08.881 UTC [common.deliver] Handle -> DEBU 12b7 Attempting to read seek info message from 172.18.0.9:50946" +"2020-08-31 20:52:08.881 UTC [policies] Evaluate -> DEBU 12b8 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:08.882 UTC [policies] Evaluate -> DEBU 12b9 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:08.882 UTC [policies] Evaluate -> DEBU 12ba == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:08.882 UTC [policies] Evaluate -> DEBU 12bb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:08.882 UTC [policies] Evaluate -> DEBU 12bc == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:08.882 UTC [cauthdsl] func1 -> DEBU 12bd 0xc000a996d0 gate 1598907128882923600 evaluation starts" +"2020-08-31 20:52:08.883 UTC [cauthdsl] func2 -> DEBU 12be 0xc000a996d0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:08.883 UTC [cauthdsl] func2 -> DEBU 12bf 0xc000a996d0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:08.883 UTC [cauthdsl] func2 -> DEBU 12c0 0xc000a996d0 principal matched by identity 0" +"2020-08-31 20:52:08.883 UTC [msp.identity] Verify -> DEBU 12c1 Verify: digest = 00000000 02 24 64 91 b4 40 45 16 ee 2b 68 af fa 60 46 ca |.$d..@E..+h..`F.| +00000010 4c cc 1f cf 1e e1 92 38 63 6d 69 4e 96 db ed ae |L......8cmiN....|" +"2020-08-31 20:52:08.884 UTC [msp.identity] Verify -> DEBU 12c2 Verify: sig = 00000000 30 45 02 21 00 80 83 41 f9 0e 58 4c 29 4a 34 48 |0E.!...A..XL)J4H| +00000010 a1 0a 5d f6 14 0e 47 2d 71 64 28 f0 24 49 d7 5e |..]...G-qd(.$I.^| +00000020 9c 17 ba 7b 3a 02 20 03 ea ae 9a 15 e0 df 22 3e |...{:. .......">| +00000030 b0 8d 6f 5f c1 9a 43 78 61 33 88 42 f4 fb 1a a8 |..o_..Cxa3.B....| +00000040 4a 57 cf 36 b4 a1 62 |JW.6..b|" +"2020-08-31 20:52:08.884 UTC [cauthdsl] func2 -> DEBU 12c3 0xc000a996d0 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:08.884 UTC [cauthdsl] func1 -> DEBU 12c4 0xc000a996d0 gate 1598907128882923600 evaluation succeeds" +"2020-08-31 20:52:08.884 UTC [policies] Evaluate -> DEBU 12c5 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:08.885 UTC [policies] Evaluate -> DEBU 12c6 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:08.885 UTC [policies] Evaluate -> DEBU 12c7 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:08.885 UTC [policies] Evaluate -> DEBU 12c8 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:08.885 UTC [policies] Evaluate -> DEBU 12c9 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:08.886 UTC [policies] Evaluate -> DEBU 12ca == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:08.886 UTC [common.deliver] deliverBlocks -> DEBU 12cb [channel: businesschannel] Received seekInfo (0xc000d6e4c0) start: > stop: > from 172.18.0.9:50946" +"2020-08-31 20:52:08.886 UTC [fsblkstorage] Next -> DEBU 12cc Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-08-31 20:52:08.887 UTC [fsblkstorage] newBlockfileStream -> DEBU 12cd newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2020-08-31 20:52:08.887 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12ce Remaining bytes=[97392], Going to peek [8] bytes" +"2020-08-31 20:52:08.887 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12cf Returning blockbytes - length=[28472], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-08-31 20:52:08.888 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12d0 blockbytes [28472] read from file [0]" +"2020-08-31 20:52:08.888 UTC [common.deliver] deliverBlocks -> DEBU 12d1 [channel: businesschannel] Delivering block [0] for (0xc000d6e4c0) for 172.18.0.9:50946" +"2020-08-31 20:52:08.889 UTC [common.deliver] deliverBlocks -> DEBU 12d2 [channel: businesschannel] Done delivering to 172.18.0.9:50946 for (0xc000d6e4c0)" +"2020-08-31 20:52:08.889 UTC [common.deliver] Handle -> DEBU 12d3 Waiting for new SeekInfo from 172.18.0.9:50946" +"2020-08-31 20:52:08.889 UTC [common.deliver] Handle -> DEBU 12d5 Attempting to read seek info message from 172.18.0.9:50946" +"2020-08-31 20:52:08.889 UTC [fsblkstorage] waitForBlock -> DEBU 12d4 Came out of wait. maxAvailaBlockNumber=[5]" +"2020-08-31 20:52:08.890 UTC [fsblkstorage] waitForBlock -> DEBU 12d6 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2020-08-31 20:52:08.897 UTC [grpc] infof -> DEBU 12d7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:08.897 UTC [common.deliver] Handle -> WARN 12d8 Error reading from 172.18.0.9:50946: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:08.897 UTC [orderer.common.server] func1 -> DEBU 12d9 Closing Deliver stream" +"2020-08-31 20:52:08.897 UTC [comm.grpc.server] 1 -> INFO 12da streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50946 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.155ms +"2020-08-31 20:52:09.053 UTC [orderer.common.server] Deliver -> DEBU 12db Starting new Deliver handler" +"2020-08-31 20:52:09.053 UTC [common.deliver] Handle -> DEBU 12dc Starting new deliver loop for 172.18.0.9:50948" +"2020-08-31 20:52:09.053 UTC [common.deliver] Handle -> DEBU 12dd Attempting to read seek info message from 172.18.0.9:50948" +"2020-08-31 20:52:09.054 UTC [policies] Evaluate -> DEBU 12de == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:09.054 UTC [policies] Evaluate -> DEBU 12df This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:09.054 UTC [policies] Evaluate -> DEBU 12e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:09.054 UTC [policies] Evaluate -> DEBU 12e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:09.055 UTC [policies] Evaluate -> DEBU 12e2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:09.055 UTC [cauthdsl] func1 -> DEBU 12e3 0xc0009bd730 gate 1598907129055313500 evaluation starts" +"2020-08-31 20:52:09.055 UTC [cauthdsl] func2 -> DEBU 12e4 0xc0009bd730 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:09.055 UTC [cauthdsl] func2 -> DEBU 12e5 0xc0009bd730 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:09.056 UTC [cauthdsl] func2 -> DEBU 12e6 0xc0009bd730 principal matched by identity 0" +"2020-08-31 20:52:09.056 UTC [msp.identity] Verify -> DEBU 12e7 Verify: digest = 00000000 ab 00 eb 9d 0d f4 38 b8 17 b5 a4 e0 90 2f 53 29 |......8....../S)| +00000010 ac b5 9e 31 8e 25 37 3a 52 f9 cf 26 3d 64 5c 92 |...1.%7:R..&=d\.|" +"2020-08-31 20:52:09.056 UTC [msp.identity] Verify -> DEBU 12e8 Verify: sig = 00000000 30 45 02 21 00 ac 47 8d 6e 70 db 42 96 86 43 3d |0E.!..G.np.B..C=| +00000010 fb e1 5e 2e 66 d7 af 21 54 15 e5 92 51 bf c8 58 |..^.f..!T...Q..X| +00000020 29 5a 8a ad b0 02 20 0e 56 75 df ca f5 dd 75 0c |)Z.... .Vu....u.| +00000030 1a 36 83 6e 33 9a c2 57 f8 2b f9 dc e8 47 58 66 |.6.n3..W.+...GXf| +00000040 e8 ae c2 6f 00 e6 24 |...o..$|" +"2020-08-31 20:52:09.056 UTC [cauthdsl] func2 -> DEBU 12e9 0xc0009bd730 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:09.057 UTC [cauthdsl] func1 -> DEBU 12ea 0xc0009bd730 gate 1598907129055313500 evaluation succeeds" +"2020-08-31 20:52:09.057 UTC [policies] Evaluate -> DEBU 12eb Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:09.057 UTC [policies] Evaluate -> DEBU 12ec == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:09.057 UTC [policies] Evaluate -> DEBU 12ed Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:09.058 UTC [policies] Evaluate -> DEBU 12ee == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:09.058 UTC [policies] Evaluate -> DEBU 12ef Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:09.058 UTC [policies] Evaluate -> DEBU 12f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:09.058 UTC [common.deliver] deliverBlocks -> DEBU 12f1 [channel: businesschannel] Received seekInfo (0xc0013867c0) start: > stop: > from 172.18.0.9:50948" +"2020-08-31 20:52:09.059 UTC [fsblkstorage] Next -> DEBU 12f2 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-08-31 20:52:09.059 UTC [fsblkstorage] newBlockfileStream -> DEBU 12f3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[28475]" +"2020-08-31 20:52:09.059 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12f4 Remaining bytes=[68917], Going to peek [8] bytes" +"2020-08-31 20:52:09.061 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12f5 Returning blockbytes - length=[28165], placementInfo={fileNum=[0], startOffset=[28475], bytesOffset=[28478]}" +"2020-08-31 20:52:09.062 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 12f6 blockbytes [28165] read from file [0]" +"2020-08-31 20:52:09.062 UTC [common.deliver] deliverBlocks -> DEBU 12f7 [channel: businesschannel] Delivering block [1] for (0xc0013867c0) for 172.18.0.9:50948" +"2020-08-31 20:52:09.062 UTC [common.deliver] deliverBlocks -> DEBU 12f8 [channel: businesschannel] Done delivering to 172.18.0.9:50948 for (0xc0013867c0)" +"2020-08-31 20:52:09.063 UTC [fsblkstorage] waitForBlock -> DEBU 12f9 Came out of wait. maxAvailaBlockNumber=[5]" +"2020-08-31 20:52:09.063 UTC [fsblkstorage] waitForBlock -> DEBU 12fa Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2020-08-31 20:52:09.063 UTC [common.deliver] Handle -> DEBU 12fb Waiting for new SeekInfo from 172.18.0.9:50948" +"2020-08-31 20:52:09.064 UTC [common.deliver] Handle -> DEBU 12fc Attempting to read seek info message from 172.18.0.9:50948" +"2020-08-31 20:52:09.070 UTC [grpc] infof -> DEBU 12fd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:09.070 UTC [common.deliver] Handle -> WARN 12fe Error reading from 172.18.0.9:50948: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:09.071 UTC [orderer.common.server] func1 -> DEBU 12ff Closing Deliver stream" +"2020-08-31 20:52:09.071 UTC [comm.grpc.server] 1 -> INFO 1300 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50948 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.8143ms +"2020-08-31 20:52:09.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1301 Sending msg of 28 bytes to 2 on channel businesschannel took 19.3µs" +"2020-08-31 20:52:09.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1302 Sending msg of 28 bytes to 3 on channel businesschannel took 13.4µs" +"2020-08-31 20:52:09.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1303 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.3µs " +"2020-08-31 20:52:09.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1304 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.4µs " +"2020-08-31 20:52:09.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1305 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:09.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1306 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:09.279 UTC [orderer.common.server] Deliver -> DEBU 1307 Starting new Deliver handler" +"2020-08-31 20:52:09.279 UTC [common.deliver] Handle -> DEBU 1308 Starting new deliver loop for 172.18.0.9:50950" +"2020-08-31 20:52:09.280 UTC [common.deliver] Handle -> DEBU 1309 Attempting to read seek info message from 172.18.0.9:50950" +"2020-08-31 20:52:09.280 UTC [policies] Evaluate -> DEBU 130a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:09.280 UTC [policies] Evaluate -> DEBU 130b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:09.280 UTC [policies] Evaluate -> DEBU 130c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:09.281 UTC [policies] Evaluate -> DEBU 130d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:09.281 UTC [policies] Evaluate -> DEBU 130e == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:09.281 UTC [cauthdsl] func1 -> DEBU 130f 0xc000cd05a0 gate 1598907129281525600 evaluation starts" +"2020-08-31 20:52:09.281 UTC [cauthdsl] func2 -> DEBU 1310 0xc000cd05a0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:09.281 UTC [cauthdsl] func2 -> DEBU 1311 0xc000cd05a0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:09.282 UTC [cauthdsl] func2 -> DEBU 1312 0xc000cd05a0 principal matched by identity 0" +"2020-08-31 20:52:09.282 UTC [msp.identity] Verify -> DEBU 1313 Verify: digest = 00000000 7b 5f 4a c6 12 d5 5d 92 df 61 5e b0 d6 18 e9 6d |{_J...]..a^....m| +00000010 9e c8 b0 a9 a6 b5 21 e4 cb 5e d6 b0 26 c2 5d e5 |......!..^..&.].|" +"2020-08-31 20:52:09.282 UTC [msp.identity] Verify -> DEBU 1314 Verify: sig = 00000000 30 45 02 21 00 c6 97 0e 0d 31 8e 87 c9 d6 b8 57 |0E.!.....1.....W| +00000010 e9 4c 69 a0 5c 61 54 89 47 ff c9 6e 3e 90 e3 13 |.Li.\aT.G..n>...| +00000020 92 ce 68 0c 19 02 20 77 85 5b 5f ab ff 52 7b 37 |..h... w.[_..R{7| +00000030 52 5b b8 41 26 f3 1a c3 ed d4 ee e2 88 7f fc 87 |R[.A&...........| +00000040 82 92 28 25 f0 42 71 |..(%.Bq|" +"2020-08-31 20:52:09.283 UTC [cauthdsl] func2 -> DEBU 1315 0xc000cd05a0 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:09.283 UTC [cauthdsl] func1 -> DEBU 1316 0xc000cd05a0 gate 1598907129281525600 evaluation succeeds" +"2020-08-31 20:52:09.283 UTC [policies] Evaluate -> DEBU 1317 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:09.283 UTC [policies] Evaluate -> DEBU 1318 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:09.283 UTC [policies] Evaluate -> DEBU 1319 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:09.283 UTC [policies] Evaluate -> DEBU 131a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:09.284 UTC [policies] Evaluate -> DEBU 131b Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:09.284 UTC [policies] Evaluate -> DEBU 131c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:09.284 UTC [common.deliver] deliverBlocks -> DEBU 131d [channel: businesschannel] Received seekInfo (0xc000d6ed40) start: > stop: > from 172.18.0.9:50950" +"2020-08-31 20:52:09.284 UTC [fsblkstorage] Next -> DEBU 131e Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-08-31 20:52:09.285 UTC [fsblkstorage] newBlockfileStream -> DEBU 131f newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[56643]" +"2020-08-31 20:52:09.285 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1320 Remaining bytes=[40749], Going to peek [8] bytes" +"2020-08-31 20:52:09.285 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1321 Returning blockbytes - length=[28171], placementInfo={fileNum=[0], startOffset=[56643], bytesOffset=[56646]}" +"2020-08-31 20:52:09.286 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1322 blockbytes [28171] read from file [0]" +"2020-08-31 20:52:09.286 UTC [common.deliver] deliverBlocks -> DEBU 1323 [channel: businesschannel] Delivering block [2] for (0xc000d6ed40) for 172.18.0.9:50950" +"2020-08-31 20:52:09.286 UTC [common.deliver] deliverBlocks -> DEBU 1324 [channel: businesschannel] Done delivering to 172.18.0.9:50950 for (0xc000d6ed40)" +"2020-08-31 20:52:09.286 UTC [common.deliver] Handle -> DEBU 1325 Waiting for new SeekInfo from 172.18.0.9:50950" +"2020-08-31 20:52:09.287 UTC [common.deliver] Handle -> DEBU 1326 Attempting to read seek info message from 172.18.0.9:50950" +"2020-08-31 20:52:09.287 UTC [fsblkstorage] waitForBlock -> DEBU 1327 Came out of wait. maxAvailaBlockNumber=[5]" +"2020-08-31 20:52:09.287 UTC [fsblkstorage] waitForBlock -> DEBU 1328 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2020-08-31 20:52:09.295 UTC [common.deliver] Handle -> WARN 1329 Error reading from 172.18.0.9:50950: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:09.295 UTC [grpc] infof -> DEBU 132a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:09.295 UTC [orderer.common.server] func1 -> DEBU 132b Closing Deliver stream" +"2020-08-31 20:52:09.295 UTC [comm.grpc.server] 1 -> INFO 132c streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50950 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.9489ms +"2020-08-31 20:52:09.305 UTC [orderer.common.cluster.step] handleMessage -> DEBU 132d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:09.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 132e Sending msg of 28 bytes to 3 on channel testchainid took 18.2µs" +"2020-08-31 20:52:09.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 132f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.4µs " +"2020-08-31 20:52:09.536 UTC [orderer.common.server] Deliver -> DEBU 1330 Starting new Deliver handler" +"2020-08-31 20:52:09.536 UTC [common.deliver] Handle -> DEBU 1331 Starting new deliver loop for 172.18.0.9:50952" +"2020-08-31 20:52:09.537 UTC [common.deliver] Handle -> DEBU 1332 Attempting to read seek info message from 172.18.0.9:50952" +"2020-08-31 20:52:09.537 UTC [policies] Evaluate -> DEBU 1333 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:09.537 UTC [policies] Evaluate -> DEBU 1334 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:09.538 UTC [policies] Evaluate -> DEBU 1335 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:09.538 UTC [policies] Evaluate -> DEBU 1336 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:09.538 UTC [policies] Evaluate -> DEBU 1337 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:09.539 UTC [cauthdsl] func1 -> DEBU 1338 0xc000385130 gate 1598907129539058000 evaluation starts" +"2020-08-31 20:52:09.539 UTC [cauthdsl] func2 -> DEBU 1339 0xc000385130 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:09.539 UTC [cauthdsl] func2 -> DEBU 133a 0xc000385130 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:09.539 UTC [cauthdsl] func2 -> DEBU 133b 0xc000385130 principal matched by identity 0" +"2020-08-31 20:52:09.539 UTC [msp.identity] Verify -> DEBU 133c Verify: digest = 00000000 8d d1 d5 4f 7e 0d 6c c8 d6 fc 69 e8 67 03 f9 43 |...O~.l...i.g..C| +00000010 5f 20 c5 1a 9d a9 e3 31 c0 6d 4a 32 ed 68 94 3b |_ .....1.mJ2.h.;|" +"2020-08-31 20:52:09.540 UTC [msp.identity] Verify -> DEBU 133d Verify: sig = 00000000 30 45 02 21 00 8f 2c c4 4c 44 fa 7e 77 86 d2 07 |0E.!..,.LD.~w...| +00000010 2a fa 3d 33 04 e6 78 2c f5 8b 14 52 19 2a b6 43 |*.=3..x,...R.*.C| +00000020 db 22 b6 07 41 02 20 0c 11 56 bd b4 bb 41 56 c7 |."..A. ..V...AV.| +00000030 98 12 a6 eb 35 c5 2b bd 8e 3e df f4 cd f6 44 f1 |....5.+..>....D.| +00000040 14 39 e8 37 93 b5 ff |.9.7...|" +"2020-08-31 20:52:09.540 UTC [cauthdsl] func2 -> DEBU 133e 0xc000385130 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:09.540 UTC [cauthdsl] func1 -> DEBU 133f 0xc000385130 gate 1598907129539058000 evaluation succeeds" +"2020-08-31 20:52:09.540 UTC [policies] Evaluate -> DEBU 1340 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:09.541 UTC [policies] Evaluate -> DEBU 1341 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:09.541 UTC [policies] Evaluate -> DEBU 1342 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:09.541 UTC [policies] Evaluate -> DEBU 1343 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:09.541 UTC [policies] Evaluate -> DEBU 1344 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:09.542 UTC [policies] Evaluate -> DEBU 1345 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:09.542 UTC [common.deliver] deliverBlocks -> DEBU 1346 [channel: businesschannel] Received seekInfo (0xc001387bc0) start: > stop: > from 172.18.0.9:50952" +"2020-08-31 20:52:09.542 UTC [fsblkstorage] Next -> DEBU 1347 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-08-31 20:52:09.543 UTC [fsblkstorage] newBlockfileStream -> DEBU 1348 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[84817]" +"2020-08-31 20:52:09.543 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1349 Remaining bytes=[12575], Going to peek [8] bytes" +"2020-08-31 20:52:09.543 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 134a Returning blockbytes - length=[4550], placementInfo={fileNum=[0], startOffset=[84817], bytesOffset=[84819]}" +"2020-08-31 20:52:09.543 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 134b blockbytes [4550] read from file [0]" +"2020-08-31 20:52:09.544 UTC [common.deliver] deliverBlocks -> DEBU 134c [channel: businesschannel] Delivering block [3] for (0xc001387bc0) for 172.18.0.9:50952" +"2020-08-31 20:52:09.544 UTC [common.deliver] deliverBlocks -> DEBU 134d [channel: businesschannel] Done delivering to 172.18.0.9:50952 for (0xc001387bc0)" +"2020-08-31 20:52:09.544 UTC [common.deliver] Handle -> DEBU 134e Waiting for new SeekInfo from 172.18.0.9:50952" +"2020-08-31 20:52:09.544 UTC [common.deliver] Handle -> DEBU 1350 Attempting to read seek info message from 172.18.0.9:50952" +"2020-08-31 20:52:09.544 UTC [fsblkstorage] waitForBlock -> DEBU 134f Came out of wait. maxAvailaBlockNumber=[5]" +"2020-08-31 20:52:09.545 UTC [fsblkstorage] waitForBlock -> DEBU 1351 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2020-08-31 20:52:09.550 UTC [grpc] infof -> DEBU 1352 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:09.550 UTC [common.deliver] Handle -> WARN 1353 Error reading from 172.18.0.9:50952: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:09.550 UTC [orderer.common.server] func1 -> DEBU 1354 Closing Deliver stream" +"2020-08-31 20:52:09.551 UTC [comm.grpc.server] 1 -> INFO 1355 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50952 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.5379ms +"2020-08-31 20:52:09.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1356 Sending msg of 28 bytes to 2 on channel businesschannel took 17.7µs" +"2020-08-31 20:52:09.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1357 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +"2020-08-31 20:52:09.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1358 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 100.5µs " +"2020-08-31 20:52:09.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1359 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 149.6µs " +"2020-08-31 20:52:09.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:09.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 135b Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:09.767 UTC [orderer.common.server] Deliver -> DEBU 135c Starting new Deliver handler" +"2020-08-31 20:52:09.768 UTC [common.deliver] Handle -> DEBU 135d Starting new deliver loop for 172.18.0.9:50954" +"2020-08-31 20:52:09.768 UTC [common.deliver] Handle -> DEBU 135e Attempting to read seek info message from 172.18.0.9:50954" +"2020-08-31 20:52:09.768 UTC [policies] Evaluate -> DEBU 135f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:09.768 UTC [policies] Evaluate -> DEBU 1360 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:09.769 UTC [policies] Evaluate -> DEBU 1361 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:09.769 UTC [policies] Evaluate -> DEBU 1362 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:09.769 UTC [policies] Evaluate -> DEBU 1363 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:09.769 UTC [cauthdsl] func1 -> DEBU 1364 0xc000c9d750 gate 1598907129769856000 evaluation starts" +"2020-08-31 20:52:09.770 UTC [cauthdsl] func2 -> DEBU 1365 0xc000c9d750 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:09.770 UTC [cauthdsl] func2 -> DEBU 1366 0xc000c9d750 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:09.770 UTC [cauthdsl] func2 -> DEBU 1367 0xc000c9d750 principal matched by identity 0" +"2020-08-31 20:52:09.770 UTC [msp.identity] Verify -> DEBU 1368 Verify: digest = 00000000 92 ee b6 af ff 1c c0 13 9a 07 5f a1 23 62 5b 46 |.........._.#b[F| +00000010 7c 32 a0 f7 27 8f df 2e c8 1f 75 84 21 cc 4e 7b ||2..'.....u.!.N{|" +"2020-08-31 20:52:09.770 UTC [msp.identity] Verify -> DEBU 1369 Verify: sig = 00000000 30 45 02 21 00 a5 e8 f0 8a 02 e9 08 ba 07 56 8e |0E.!..........V.| +00000010 6d ae ce 25 bc e5 e6 a8 93 bc 0a 1a 61 4e 0a 86 |m..%........aN..| +00000020 d6 74 1b 37 42 02 20 4a 97 80 f3 04 00 ca 87 12 |.t.7B. J........| +00000030 1a d8 ce bd 84 b5 03 1a 99 40 0c 87 18 37 b5 6a |.........@...7.j| +00000040 00 c4 f6 71 1d 1b 59 |...q..Y|" +"2020-08-31 20:52:09.771 UTC [cauthdsl] func2 -> DEBU 136a 0xc000c9d750 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:09.771 UTC [cauthdsl] func1 -> DEBU 136b 0xc000c9d750 gate 1598907129769856000 evaluation succeeds" +"2020-08-31 20:52:09.771 UTC [policies] Evaluate -> DEBU 136c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:09.771 UTC [policies] Evaluate -> DEBU 136d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:09.772 UTC [policies] Evaluate -> DEBU 136e Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:09.772 UTC [policies] Evaluate -> DEBU 136f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:09.772 UTC [policies] Evaluate -> DEBU 1370 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:09.772 UTC [policies] Evaluate -> DEBU 1371 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:09.772 UTC [common.deliver] deliverBlocks -> DEBU 1372 [channel: businesschannel] Received seekInfo (0xc000d6f600) start: > stop: > from 172.18.0.9:50954" +"2020-08-31 20:52:09.773 UTC [fsblkstorage] Next -> DEBU 1373 Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-08-31 20:52:09.773 UTC [fsblkstorage] newBlockfileStream -> DEBU 1374 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89369]" +"2020-08-31 20:52:09.773 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1375 Remaining bytes=[8023], Going to peek [8] bytes" +"2020-08-31 20:52:09.774 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1376 Returning blockbytes - length=[4010], placementInfo={fileNum=[0], startOffset=[89369], bytesOffset=[89371]}" +"2020-08-31 20:52:09.774 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1377 blockbytes [4010] read from file [0]" +"2020-08-31 20:52:09.774 UTC [common.deliver] deliverBlocks -> DEBU 1378 [channel: businesschannel] Delivering block [4] for (0xc000d6f600) for 172.18.0.9:50954" +"2020-08-31 20:52:09.774 UTC [common.deliver] deliverBlocks -> DEBU 1379 [channel: businesschannel] Done delivering to 172.18.0.9:50954 for (0xc000d6f600)" +"2020-08-31 20:52:09.775 UTC [common.deliver] Handle -> DEBU 137a Waiting for new SeekInfo from 172.18.0.9:50954" +"2020-08-31 20:52:09.775 UTC [common.deliver] Handle -> DEBU 137b Attempting to read seek info message from 172.18.0.9:50954" +"2020-08-31 20:52:09.775 UTC [fsblkstorage] waitForBlock -> DEBU 137c Came out of wait. maxAvailaBlockNumber=[5]" +"2020-08-31 20:52:09.775 UTC [fsblkstorage] waitForBlock -> DEBU 137d Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2020-08-31 20:52:09.782 UTC [grpc] infof -> DEBU 137e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:09.783 UTC [common.deliver] Handle -> WARN 137f Error reading from 172.18.0.9:50954: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:09.784 UTC [orderer.common.server] func1 -> DEBU 1380 Closing Deliver stream" +"2020-08-31 20:52:09.785 UTC [comm.grpc.server] 1 -> INFO 1381 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50954 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.8358ms +"2020-08-31 20:52:09.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1382 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:09.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1383 Sending msg of 28 bytes to 3 on channel testchainid took 26.3µs" +"2020-08-31 20:52:09.807 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1384 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 538.7µs " +"2020-08-31 20:52:09.998 UTC [orderer.common.server] Deliver -> DEBU 1385 Starting new Deliver handler" +"2020-08-31 20:52:09.999 UTC [common.deliver] Handle -> DEBU 1386 Starting new deliver loop for 172.18.0.9:50956" +"2020-08-31 20:52:09.999 UTC [common.deliver] Handle -> DEBU 1387 Attempting to read seek info message from 172.18.0.9:50956" +"2020-08-31 20:52:09.999 UTC [policies] Evaluate -> DEBU 1388 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:10.000 UTC [policies] Evaluate -> DEBU 1389 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:10.000 UTC [policies] Evaluate -> DEBU 138a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:10.000 UTC [policies] Evaluate -> DEBU 138b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:10.000 UTC [policies] Evaluate -> DEBU 138c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:10.000 UTC [cauthdsl] func1 -> DEBU 138d 0xc00004fe30 gate 1598907130000976400 evaluation starts" +"2020-08-31 20:52:10.001 UTC [cauthdsl] func2 -> DEBU 138e 0xc00004fe30 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:10.001 UTC [cauthdsl] func2 -> DEBU 138f 0xc00004fe30 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:10.001 UTC [cauthdsl] func2 -> DEBU 1390 0xc00004fe30 principal matched by identity 0" +"2020-08-31 20:52:10.001 UTC [msp.identity] Verify -> DEBU 1391 Verify: digest = 00000000 cc 07 c0 e9 08 a1 53 f6 0a 2a fb a0 84 ea 79 e7 |......S..*....y.| +00000010 b2 5d d9 52 81 ed 88 bd 72 7a 47 f9 7c 8c 91 28 |.].R....rzG.|..(|" +"2020-08-31 20:52:10.002 UTC [msp.identity] Verify -> DEBU 1392 Verify: sig = 00000000 30 45 02 21 00 c8 04 a0 81 7e ef 22 17 41 26 bf |0E.!.....~.".A&.| +00000010 62 72 4f a5 80 fa c1 16 9b 4a d1 72 7b de 3c 56 |brO......J.r{. DEBU 1393 0xc00004fe30 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:10.002 UTC [cauthdsl] func1 -> DEBU 1394 0xc00004fe30 gate 1598907130000976400 evaluation succeeds" +"2020-08-31 20:52:10.002 UTC [policies] Evaluate -> DEBU 1395 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:10.003 UTC [policies] Evaluate -> DEBU 1396 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:10.003 UTC [policies] Evaluate -> DEBU 1397 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:10.003 UTC [policies] Evaluate -> DEBU 1398 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:10.003 UTC [policies] Evaluate -> DEBU 1399 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:10.003 UTC [policies] Evaluate -> DEBU 139a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:10.004 UTC [common.deliver] deliverBlocks -> DEBU 139b [channel: businesschannel] Received seekInfo (0xc00012cc80) start: > stop: > from 172.18.0.9:50956" +"2020-08-31 20:52:10.004 UTC [fsblkstorage] Next -> DEBU 139c Initializing block stream for iterator. itr.maxBlockNumAvailable=5" +"2020-08-31 20:52:10.004 UTC [fsblkstorage] newBlockfileStream -> DEBU 139d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93381]" +"2020-08-31 20:52:10.004 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 139e Remaining bytes=[4011], Going to peek [8] bytes" +"2020-08-31 20:52:10.005 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 139f Returning blockbytes - length=[4009], placementInfo={fileNum=[0], startOffset=[93381], bytesOffset=[93383]}" +"2020-08-31 20:52:10.005 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13a0 blockbytes [4009] read from file [0]" +"2020-08-31 20:52:10.005 UTC [common.deliver] deliverBlocks -> DEBU 13a1 [channel: businesschannel] Delivering block [5] for (0xc00012cc80) for 172.18.0.9:50956" +"2020-08-31 20:52:10.005 UTC [common.deliver] deliverBlocks -> DEBU 13a2 [channel: businesschannel] Done delivering to 172.18.0.9:50956 for (0xc00012cc80)" +"2020-08-31 20:52:10.006 UTC [fsblkstorage] waitForBlock -> DEBU 13a3 Came out of wait. maxAvailaBlockNumber=[5]" +"2020-08-31 20:52:10.006 UTC [fsblkstorage] waitForBlock -> DEBU 13a5 Going to wait for newer blocks. maxAvailaBlockNumber=[5], waitForBlockNum=[6]" +"2020-08-31 20:52:10.006 UTC [common.deliver] Handle -> DEBU 13a4 Waiting for new SeekInfo from 172.18.0.9:50956" +"2020-08-31 20:52:10.006 UTC [common.deliver] Handle -> DEBU 13a6 Attempting to read seek info message from 172.18.0.9:50956" +"2020-08-31 20:52:10.015 UTC [grpc] infof -> DEBU 13a7 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:10.015 UTC [common.deliver] Handle -> WARN 13a8 Error reading from 172.18.0.9:50956: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:10.016 UTC [orderer.common.server] func1 -> DEBU 13a9 Closing Deliver stream" +"2020-08-31 20:52:10.016 UTC [comm.grpc.server] 1 -> INFO 13aa streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50956 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.6325ms +"2020-08-31 20:52:10.096 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ab Sending msg of 28 bytes to 2 on channel businesschannel took 13.5µs" +"2020-08-31 20:52:10.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13ac Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +"2020-08-31 20:52:10.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ad Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 60.3µs " +"2020-08-31 20:52:10.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13ae Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73.8µs " +"2020-08-31 20:52:10.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13af Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:10.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13b0 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:10.263 UTC [orderer.common.server] Deliver -> DEBU 13b1 Starting new Deliver handler" +"2020-08-31 20:52:10.263 UTC [common.deliver] Handle -> DEBU 13b2 Starting new deliver loop for 172.18.0.9:50958" +"2020-08-31 20:52:10.263 UTC [common.deliver] Handle -> DEBU 13b3 Attempting to read seek info message from 172.18.0.9:50958" +"2020-08-31 20:52:10.265 UTC [policies] Evaluate -> DEBU 13b4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:10.265 UTC [policies] Evaluate -> DEBU 13b5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:10.265 UTC [policies] Evaluate -> DEBU 13b6 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:10.266 UTC [policies] Evaluate -> DEBU 13b7 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:10.266 UTC [policies] Evaluate -> DEBU 13b8 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:10.266 UTC [msp] DeserializeIdentity -> DEBU 13b9 Obtaining identity" +"2020-08-31 20:52:10.267 UTC [msp.identity] newIdentity -> DEBU 13ba Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P ++8n2/IwosEtn+wHpdsRI +-----END CERTIFICATE-----" +"2020-08-31 20:52:10.267 UTC [cauthdsl] func1 -> DEBU 13bb 0xc000369ba0 gate 1598907130267567900 evaluation starts" +"2020-08-31 20:52:10.267 UTC [cauthdsl] func2 -> DEBU 13bc 0xc000369ba0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:10.267 UTC [cauthdsl] func2 -> DEBU 13bd 0xc000369ba0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:10.267 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 13be Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-08-31 20:52:10.267 UTC [msp] Validate -> DEBU 13bf MSP OrdererMSP validating identity" +"2020-08-31 20:52:10.267 UTC [msp] getCertificationChain -> DEBU 13c0 MSP OrdererMSP getting certification chain" +"2020-08-31 20:52:10.268 UTC [cauthdsl] func2 -> DEBU 13c1 0xc000369ba0 principal matched by identity 0" +"2020-08-31 20:52:10.268 UTC [msp.identity] Verify -> DEBU 13c2 Verify: digest = 00000000 1d 48 57 35 8b ed ac 2b d8 dd b6 61 82 72 cc a2 |.HW5...+...a.r..| +00000010 db 03 d6 a6 eb 7d 39 45 c0 32 36 11 a0 29 0a b3 |.....}9E.26..)..|" +"2020-08-31 20:52:10.268 UTC [msp.identity] Verify -> DEBU 13c3 Verify: sig = 00000000 30 45 02 21 00 cc 52 46 ef f3 a8 35 7b 9f 57 01 |0E.!..RF...5{.W.| +00000010 c3 cc 5c 5a 02 8a f9 8d 96 14 bf 7b 38 9e 93 60 |..\Z.......{8..`| +00000020 be a7 bf 00 bd 02 20 2e 2d c7 26 16 e3 e8 95 41 |...... .-.&....A| +00000030 7a 8b be 89 13 ad a6 53 a6 9e 0f 0a 64 c7 96 b4 |z......S....d...| +00000040 01 d2 ad a5 b9 9b 1b |.......|" +"2020-08-31 20:52:10.268 UTC [cauthdsl] func2 -> DEBU 13c4 0xc000369ba0 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:10.268 UTC [cauthdsl] func1 -> DEBU 13c5 0xc000369ba0 gate 1598907130267567900 evaluation succeeds" +"2020-08-31 20:52:10.268 UTC [policies] Evaluate -> DEBU 13c6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:10.268 UTC [policies] Evaluate -> DEBU 13c7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:10.268 UTC [policies] Evaluate -> DEBU 13c8 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:10.268 UTC [policies] Evaluate -> DEBU 13c9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:10.268 UTC [policies] Evaluate -> DEBU 13ca Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:10.268 UTC [policies] Evaluate -> DEBU 13cb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:10.269 UTC [common.deliver] deliverBlocks -> DEBU 13cc [channel: testchainid] Received seekInfo (0xc000d6fe40) start: > stop: > from 172.18.0.9:50958" +"2020-08-31 20:52:10.269 UTC [fsblkstorage] Next -> DEBU 13cd Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-08-31 20:52:10.269 UTC [fsblkstorage] newBlockfileStream -> DEBU 13ce newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +"2020-08-31 20:52:10.269 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13cf Remaining bytes=[30411], Going to peek [8] bytes" +"2020-08-31 20:52:10.272 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13d0 Returning blockbytes - length=[30408], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +"2020-08-31 20:52:10.272 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13d1 blockbytes [30408] read from file [0]" +"2020-08-31 20:52:10.272 UTC [common.deliver] deliverBlocks -> DEBU 13d2 [channel: testchainid] Delivering block [1] for (0xc000d6fe40) for 172.18.0.9:50958" +"2020-08-31 20:52:10.272 UTC [common.deliver] deliverBlocks -> DEBU 13d3 [channel: testchainid] Done delivering to 172.18.0.9:50958 for (0xc000d6fe40)" +"2020-08-31 20:52:10.272 UTC [common.deliver] Handle -> DEBU 13d4 Waiting for new SeekInfo from 172.18.0.9:50958" +"2020-08-31 20:52:10.272 UTC [common.deliver] Handle -> DEBU 13d5 Attempting to read seek info message from 172.18.0.9:50958" +"2020-08-31 20:52:10.285 UTC [grpc] infof -> DEBU 13d6 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:10.285 UTC [common.deliver] Handle -> WARN 13d7 Error reading from 172.18.0.9:50958: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:10.285 UTC [orderer.common.server] func1 -> DEBU 13d8 Closing Deliver stream" +"2020-08-31 20:52:10.285 UTC [comm.grpc.server] 1 -> INFO 13d9 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50958 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=22.2438ms +"2020-08-31 20:52:10.305 UTC [orderer.common.cluster.step] handleMessage -> DEBU 13da Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:10.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 13db Sending msg of 28 bytes to 3 on channel testchainid took 8.3µs" +"2020-08-31 20:52:10.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 13dc Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.7µs " +"2020-08-31 20:52:10.498 UTC [orderer.common.server] Deliver -> DEBU 13dd Starting new Deliver handler" +"2020-08-31 20:52:10.498 UTC [common.deliver] Handle -> DEBU 13de Starting new deliver loop for 172.18.0.9:50960" +"2020-08-31 20:52:10.498 UTC [common.deliver] Handle -> DEBU 13df Attempting to read seek info message from 172.18.0.9:50960" +"2020-08-31 20:52:10.518 UTC [policies] Evaluate -> DEBU 13e0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:10.518 UTC [policies] Evaluate -> DEBU 13e1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:10.519 UTC [policies] Evaluate -> DEBU 13e2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:10.519 UTC [policies] Evaluate -> DEBU 13e3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:10.519 UTC [policies] Evaluate -> DEBU 13e4 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:10.519 UTC [cauthdsl] func1 -> DEBU 13e5 0xc000958150 gate 1598907130519393900 evaluation starts" +"2020-08-31 20:52:10.519 UTC [cauthdsl] func2 -> DEBU 13e6 0xc000958150 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:10.519 UTC [cauthdsl] func2 -> DEBU 13e7 0xc000958150 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:10.519 UTC [cauthdsl] func2 -> DEBU 13e8 0xc000958150 principal matched by identity 0" +"2020-08-31 20:52:10.519 UTC [msp.identity] Verify -> DEBU 13e9 Verify: digest = 00000000 6c b8 6f 55 7b 2e 7a fc 1a b3 b4 2f 74 b9 a4 4a |l.oU{.z..../t..J| +00000010 71 94 96 76 a9 e2 92 d4 f7 3b 89 73 5d 22 cb e7 |q..v.....;.s]"..|" +"2020-08-31 20:52:10.519 UTC [msp.identity] Verify -> DEBU 13ea Verify: sig = 00000000 30 44 02 20 73 4a 8a 2d a5 33 23 ba fb 27 d3 34 |0D. sJ.-.3#..'.4| +00000010 59 17 c7 4c d2 cd 1c d0 b7 46 a3 6d f1 41 ed 53 |Y..L.....F.m.A.S| +00000020 97 69 82 9c 02 20 7f fc 5f e8 56 d7 11 da 9d 78 |.i... .._.V....x| +00000030 8f 9f 89 af bd 08 6e f0 6d 15 3b 68 69 a7 a8 62 |......n.m.;hi..b| +00000040 99 0c d9 6d 95 10 |...m..|" +"2020-08-31 20:52:10.520 UTC [cauthdsl] func2 -> DEBU 13eb 0xc000958150 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:10.520 UTC [cauthdsl] func1 -> DEBU 13ec 0xc000958150 gate 1598907130519393900 evaluation succeeds" +"2020-08-31 20:52:10.520 UTC [policies] Evaluate -> DEBU 13ed Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:10.520 UTC [policies] Evaluate -> DEBU 13ee == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:10.520 UTC [policies] Evaluate -> DEBU 13ef Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:10.520 UTC [policies] Evaluate -> DEBU 13f0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:10.520 UTC [policies] Evaluate -> DEBU 13f1 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:10.520 UTC [policies] Evaluate -> DEBU 13f2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:10.520 UTC [common.deliver] deliverBlocks -> DEBU 13f3 [channel: testchainid] Received seekInfo (0xc000d905c0) start: > stop: > from 172.18.0.9:50960" +"2020-08-31 20:52:10.520 UTC [fsblkstorage] Next -> DEBU 13f4 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-08-31 20:52:10.520 UTC [fsblkstorage] newBlockfileStream -> DEBU 13f5 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +"2020-08-31 20:52:10.521 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13f6 Remaining bytes=[30411], Going to peek [8] bytes" +"2020-08-31 20:52:10.521 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13f7 Returning blockbytes - length=[30408], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +"2020-08-31 20:52:10.521 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 13f8 blockbytes [30408] read from file [0]" +"2020-08-31 20:52:10.521 UTC [common.deliver] deliverBlocks -> DEBU 13f9 [channel: testchainid] Delivering block [1] for (0xc000d905c0) for 172.18.0.9:50960" +"2020-08-31 20:52:10.522 UTC [common.deliver] deliverBlocks -> DEBU 13fa [channel: testchainid] Done delivering to 172.18.0.9:50960 for (0xc000d905c0)" +"2020-08-31 20:52:10.523 UTC [common.deliver] Handle -> DEBU 13fb Waiting for new SeekInfo from 172.18.0.9:50960" +"2020-08-31 20:52:10.523 UTC [common.deliver] Handle -> DEBU 13fc Attempting to read seek info message from 172.18.0.9:50960" +"2020-08-31 20:52:10.530 UTC [policies] Evaluate -> DEBU 13fd == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:10.530 UTC [policies] Evaluate -> DEBU 13fe This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:10.530 UTC [policies] Evaluate -> DEBU 13ff == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:10.530 UTC [policies] Evaluate -> DEBU 1400 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:10.530 UTC [policies] Evaluate -> DEBU 1401 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:10.530 UTC [cauthdsl] func1 -> DEBU 1402 0xc00096e720 gate 1598907130530798900 evaluation starts" +"2020-08-31 20:52:10.530 UTC [cauthdsl] func2 -> DEBU 1403 0xc00096e720 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:10.531 UTC [cauthdsl] func2 -> DEBU 1404 0xc00096e720 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:10.531 UTC [cauthdsl] func2 -> DEBU 1405 0xc00096e720 principal matched by identity 0" +"2020-08-31 20:52:10.531 UTC [msp.identity] Verify -> DEBU 1406 Verify: digest = 00000000 4b c1 9c e9 62 ed 8d 23 ab 0e 27 e8 d7 e9 81 f8 |K...b..#..'.....| +00000010 d5 61 55 2d 67 a1 24 be 7f 89 9a 38 b8 b5 98 eb |.aU-g.$....8....|" +"2020-08-31 20:52:10.531 UTC [msp.identity] Verify -> DEBU 1407 Verify: sig = 00000000 30 44 02 20 40 df 18 43 d6 17 5c 95 de 35 4c 55 |0D. @..C..\..5LU| +00000010 f3 f6 43 aa 90 0c b7 04 a6 d6 6b 4d 91 ac 1c 22 |..C.......kM..."| +00000020 c8 8e b9 0d 02 20 16 20 77 a0 75 97 b0 92 bc f5 |..... . w.u.....| +00000030 0c 05 cc 9e 81 6f 41 48 27 52 68 64 50 d9 15 bc |.....oAH'RhdP...| +00000040 8d d4 be f6 9e 42 |.....B|" +"2020-08-31 20:52:10.531 UTC [cauthdsl] func2 -> DEBU 1408 0xc00096e720 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:10.531 UTC [cauthdsl] func1 -> DEBU 1409 0xc00096e720 gate 1598907130530798900 evaluation succeeds" +"2020-08-31 20:52:10.531 UTC [policies] Evaluate -> DEBU 140a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:10.532 UTC [policies] Evaluate -> DEBU 140b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:10.532 UTC [policies] Evaluate -> DEBU 140c Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:10.532 UTC [policies] Evaluate -> DEBU 140d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:10.532 UTC [policies] Evaluate -> DEBU 140e Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:10.532 UTC [policies] Evaluate -> DEBU 140f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:10.532 UTC [common.deliver] deliverBlocks -> DEBU 1410 [channel: testchainid] Received seekInfo (0xc00012d580) start: > stop: > from 172.18.0.9:50960" +"2020-08-31 20:52:10.532 UTC [fsblkstorage] Next -> DEBU 1411 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-08-31 20:52:10.533 UTC [fsblkstorage] newBlockfileStream -> DEBU 1412 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-08-31 20:52:10.533 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1413 Remaining bytes=[53341], Going to peek [8] bytes" +"2020-08-31 20:52:10.533 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1414 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-08-31 20:52:10.533 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1415 blockbytes [22927] read from file [0]" +"2020-08-31 20:52:10.534 UTC [common.deliver] deliverBlocks -> DEBU 1416 [channel: testchainid] Delivering block [0] for (0xc00012d580) for 172.18.0.9:50960" +"2020-08-31 20:52:10.534 UTC [common.deliver] deliverBlocks -> DEBU 1417 [channel: testchainid] Done delivering to 172.18.0.9:50960 for (0xc00012d580)" +"2020-08-31 20:52:10.534 UTC [common.deliver] Handle -> DEBU 1418 Waiting for new SeekInfo from 172.18.0.9:50960" +"2020-08-31 20:52:10.534 UTC [common.deliver] Handle -> DEBU 1419 Attempting to read seek info message from 172.18.0.9:50960" +"2020-08-31 20:52:10.547 UTC [grpc] infof -> DEBU 141a transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:10.547 UTC [common.deliver] Handle -> WARN 141b Error reading from 172.18.0.9:50960: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:10.548 UTC [orderer.common.server] func1 -> DEBU 141c Closing Deliver stream" +"2020-08-31 20:52:10.548 UTC [comm.grpc.server] 1 -> INFO 141d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50960 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=50.3003ms +"2020-08-31 20:52:10.596 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141e Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +"2020-08-31 20:52:10.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 141f Sending msg of 28 bytes to 3 on channel businesschannel took 9µs" +"2020-08-31 20:52:10.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1420 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79µs " +"2020-08-31 20:52:10.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1421 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 178.8µs " +"2020-08-31 20:52:10.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1422 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:10.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1423 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:10.676 UTC [orderer.common.server] Deliver -> DEBU 1424 Starting new Deliver handler" +"2020-08-31 20:52:10.676 UTC [common.deliver] Handle -> DEBU 1425 Starting new deliver loop for 172.18.0.9:50962" +"2020-08-31 20:52:10.676 UTC [common.deliver] Handle -> DEBU 1426 Attempting to read seek info message from 172.18.0.9:50962" +"2020-08-31 20:52:10.677 UTC [policies] Evaluate -> DEBU 1427 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:10.677 UTC [policies] Evaluate -> DEBU 1428 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:10.677 UTC [policies] Evaluate -> DEBU 1429 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:10.677 UTC [policies] Evaluate -> DEBU 142a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:10.677 UTC [policies] Evaluate -> DEBU 142b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:10.677 UTC [cauthdsl] func1 -> DEBU 142c 0xc0009e0de0 gate 1598907130677645100 evaluation starts" +"2020-08-31 20:52:10.677 UTC [cauthdsl] func2 -> DEBU 142d 0xc0009e0de0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:10.677 UTC [cauthdsl] func2 -> DEBU 142e 0xc0009e0de0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:10.678 UTC [cauthdsl] func2 -> DEBU 142f 0xc0009e0de0 principal matched by identity 0" +"2020-08-31 20:52:10.678 UTC [msp.identity] Verify -> DEBU 1430 Verify: digest = 00000000 f8 20 77 7b 2e ea 6d b9 08 38 81 13 22 78 ae 17 |. w{..m..8.."x..| +00000010 33 4c 1b 9c 48 93 11 c3 95 90 3d a8 6f 59 55 b2 |3L..H.....=.oYU.|" +"2020-08-31 20:52:10.678 UTC [msp.identity] Verify -> DEBU 1431 Verify: sig = 00000000 30 44 02 20 65 93 58 a9 24 d2 42 3f c3 ce 66 71 |0D. e.X.$.B?..fq| +00000010 2a a0 46 62 3f 92 28 f5 87 31 63 51 83 55 38 82 |*.Fb?.(..1cQ.U8.| +00000020 87 fd e6 c3 02 20 16 99 16 ad 72 7d ac 67 62 9c |..... ....r}.gb.| +00000030 8e 55 71 72 96 c8 d8 a6 77 8b b0 ce d0 76 85 a3 |.Uqr....w....v..| +00000040 5e 2a 6c 78 61 4f |^*lxaO|" +"2020-08-31 20:52:10.678 UTC [cauthdsl] func2 -> DEBU 1432 0xc0009e0de0 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:10.678 UTC [cauthdsl] func1 -> DEBU 1433 0xc0009e0de0 gate 1598907130677645100 evaluation succeeds" +"2020-08-31 20:52:10.678 UTC [policies] Evaluate -> DEBU 1434 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:10.678 UTC [policies] Evaluate -> DEBU 1435 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:10.678 UTC [policies] Evaluate -> DEBU 1436 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:10.679 UTC [policies] Evaluate -> DEBU 1437 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:10.679 UTC [policies] Evaluate -> DEBU 1438 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:10.679 UTC [policies] Evaluate -> DEBU 1439 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:10.679 UTC [common.deliver] deliverBlocks -> DEBU 143a [channel: testchainid] Received seekInfo (0xc000d90c80) start: > stop: > from 172.18.0.9:50962" +"2020-08-31 20:52:10.679 UTC [fsblkstorage] Next -> DEBU 143b Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-08-31 20:52:10.679 UTC [fsblkstorage] newBlockfileStream -> DEBU 143c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-08-31 20:52:10.679 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 143d Remaining bytes=[53341], Going to peek [8] bytes" +"2020-08-31 20:52:10.679 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 143e Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-08-31 20:52:10.679 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 143f blockbytes [22927] read from file [0]" +"2020-08-31 20:52:10.680 UTC [common.deliver] deliverBlocks -> DEBU 1440 [channel: testchainid] Delivering block [0] for (0xc000d90c80) for 172.18.0.9:50962" +"2020-08-31 20:52:10.680 UTC [common.deliver] deliverBlocks -> DEBU 1441 [channel: testchainid] Done delivering to 172.18.0.9:50962 for (0xc000d90c80)" +"2020-08-31 20:52:10.680 UTC [common.deliver] Handle -> DEBU 1442 Waiting for new SeekInfo from 172.18.0.9:50962" +"2020-08-31 20:52:10.680 UTC [common.deliver] Handle -> DEBU 1443 Attempting to read seek info message from 172.18.0.9:50962" +"2020-08-31 20:52:10.687 UTC [grpc] infof -> DEBU 1444 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:10.687 UTC [common.deliver] Handle -> WARN 1445 Error reading from 172.18.0.9:50962: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:10.687 UTC [orderer.common.server] func1 -> DEBU 1446 Closing Deliver stream" +"2020-08-31 20:52:10.687 UTC [comm.grpc.server] 1 -> INFO 1447 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50962 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=11.2299ms +"2020-08-31 20:52:10.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1448 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:10.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1449 Sending msg of 28 bytes to 3 on channel testchainid took 10.5µs" +"2020-08-31 20:52:10.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 144a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 280.2µs " +"2020-08-31 20:52:10.862 UTC [orderer.common.server] Deliver -> DEBU 144b Starting new Deliver handler" +"2020-08-31 20:52:10.862 UTC [common.deliver] Handle -> DEBU 144c Starting new deliver loop for 172.18.0.9:50964" +"2020-08-31 20:52:10.862 UTC [common.deliver] Handle -> DEBU 144d Attempting to read seek info message from 172.18.0.9:50964" +"2020-08-31 20:52:10.863 UTC [policies] Evaluate -> DEBU 144e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:10.863 UTC [policies] Evaluate -> DEBU 144f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:10.863 UTC [policies] Evaluate -> DEBU 1450 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:10.863 UTC [policies] Evaluate -> DEBU 1451 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:10.863 UTC [policies] Evaluate -> DEBU 1452 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:10.863 UTC [cauthdsl] func1 -> DEBU 1453 0xc000431c60 gate 1598907130863950100 evaluation starts" +"2020-08-31 20:52:10.863 UTC [cauthdsl] func2 -> DEBU 1454 0xc000431c60 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:10.864 UTC [cauthdsl] func2 -> DEBU 1455 0xc000431c60 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:10.864 UTC [cauthdsl] func2 -> DEBU 1456 0xc000431c60 principal matched by identity 0" +"2020-08-31 20:52:10.864 UTC [msp.identity] Verify -> DEBU 1457 Verify: digest = 00000000 73 26 10 59 cc 4f 90 b8 f2 09 88 63 d8 f2 13 1b |s&.Y.O.....c....| +00000010 cf 8a 5f fa a3 90 d5 c9 8f bc e1 8c 15 5c 15 68 |.._..........\.h|" +"2020-08-31 20:52:10.864 UTC [msp.identity] Verify -> DEBU 1458 Verify: sig = 00000000 30 45 02 21 00 e7 7d 70 5e 0d a0 08 1f bb f7 5f |0E.!..}p^......_| +00000010 4a c9 2b 7c 89 b0 0f e7 c6 06 4d 2d e5 69 ae 3f |J.+|......M-.i.?| +00000020 e3 b3 1e bb 49 02 20 33 af f3 26 ba c1 06 f2 b9 |....I. 3..&.....| +00000030 b3 d2 14 d7 ce 52 b6 31 54 3e 29 c6 f0 5b c9 06 |.....R.1T>)..[..| +00000040 70 e0 63 b3 67 5b 85 |p.c.g[.|" +"2020-08-31 20:52:10.864 UTC [cauthdsl] func2 -> DEBU 1459 0xc000431c60 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:10.864 UTC [cauthdsl] func1 -> DEBU 145a 0xc000431c60 gate 1598907130863950100 evaluation succeeds" +"2020-08-31 20:52:10.864 UTC [policies] Evaluate -> DEBU 145b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:10.864 UTC [policies] Evaluate -> DEBU 145c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:10.865 UTC [policies] Evaluate -> DEBU 145d Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:10.865 UTC [policies] Evaluate -> DEBU 145e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:10.865 UTC [policies] Evaluate -> DEBU 145f Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:10.865 UTC [policies] Evaluate -> DEBU 1460 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:10.865 UTC [common.deliver] deliverBlocks -> DEBU 1461 [channel: testchainid] Received seekInfo (0xc000d91400) start: > stop: > from 172.18.0.9:50964" +"2020-08-31 20:52:10.865 UTC [fsblkstorage] Next -> DEBU 1462 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-08-31 20:52:10.865 UTC [fsblkstorage] newBlockfileStream -> DEBU 1463 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +"2020-08-31 20:52:10.866 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1464 Remaining bytes=[30411], Going to peek [8] bytes" +"2020-08-31 20:52:10.866 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1465 Returning blockbytes - length=[30408], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +"2020-08-31 20:52:10.866 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1466 blockbytes [30408] read from file [0]" +"2020-08-31 20:52:10.866 UTC [common.deliver] deliverBlocks -> DEBU 1467 [channel: testchainid] Delivering block [1] for (0xc000d91400) for 172.18.0.9:50964" +"2020-08-31 20:52:10.866 UTC [common.deliver] deliverBlocks -> DEBU 1468 [channel: testchainid] Done delivering to 172.18.0.9:50964 for (0xc000d91400)" +"2020-08-31 20:52:10.866 UTC [common.deliver] Handle -> DEBU 1469 Waiting for new SeekInfo from 172.18.0.9:50964" +"2020-08-31 20:52:10.866 UTC [common.deliver] Handle -> DEBU 146a Attempting to read seek info message from 172.18.0.9:50964" +"2020-08-31 20:52:10.874 UTC [grpc] infof -> DEBU 146b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:10.874 UTC [common.deliver] Handle -> WARN 146c Error reading from 172.18.0.9:50964: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:10.874 UTC [orderer.common.server] func1 -> DEBU 146d Closing Deliver stream" +"2020-08-31 20:52:10.875 UTC [comm.grpc.server] 1 -> INFO 146e streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50964 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.7893ms +"2020-08-31 20:52:11.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 146f Sending msg of 28 bytes to 2 on channel businesschannel took 52.4µs" +"2020-08-31 20:52:11.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1470 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 239.3µs " +"2020-08-31 20:52:11.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1471 Sending msg of 28 bytes to 3 on channel businesschannel took 554.4µs" +"2020-08-31 20:52:11.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1472 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:11.100 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1473 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 173.1µs " +"2020-08-31 20:52:11.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1474 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:11.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1475 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:11.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1476 Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +"2020-08-31 20:52:11.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1477 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.4µs " +"2020-08-31 20:52:11.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1478 Sending msg of 28 bytes to 2 on channel businesschannel took 24.9µs" +"2020-08-31 20:52:11.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1479 Sending msg of 28 bytes to 3 on channel businesschannel took 18.8µs" +"2020-08-31 20:52:11.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 147a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 92.8µs " +"2020-08-31 20:52:11.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 147b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.8µs " +"2020-08-31 20:52:11.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 147c Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:11.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 147d Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:11.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 147e Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:11.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 147f Sending msg of 28 bytes to 3 on channel testchainid took 16.5µs" +"2020-08-31 20:52:11.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1480 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.8µs " +"2020-08-31 20:52:12.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1481 Sending msg of 28 bytes to 2 on channel businesschannel took 51.9µs" +"2020-08-31 20:52:12.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1482 Sending msg of 28 bytes to 3 on channel businesschannel took 21.5µs" +"2020-08-31 20:52:12.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1483 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 104.6µs " +"2020-08-31 20:52:12.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1484 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.1µs " +"2020-08-31 20:52:12.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1485 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:12.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1486 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:12.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1487 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:12.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1488 Sending msg of 28 bytes to 3 on channel testchainid took 15.3µs" +"2020-08-31 20:52:12.307 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1489 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 150.6µs " +"2020-08-31 20:52:12.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 148a Sending msg of 28 bytes to 2 on channel businesschannel took 24.8µs" +"2020-08-31 20:52:12.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 148b Sending msg of 28 bytes to 3 on channel businesschannel took 15.9µs" +"2020-08-31 20:52:12.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 148c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 190.9µs " +"2020-08-31 20:52:12.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 148d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 68µs " +"2020-08-31 20:52:12.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 148e Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:12.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 148f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:12.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1490 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:12.805 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1491 Sending msg of 28 bytes to 3 on channel testchainid took 17.6µs" +"2020-08-31 20:52:12.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1492 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 76.6µs " +"2020-08-31 20:52:13.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1493 Sending msg of 28 bytes to 2 on channel businesschannel took 63µs" +"2020-08-31 20:52:13.100 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1495 Sending msg of 28 bytes to 3 on channel businesschannel took 11.9µs" +"2020-08-31 20:52:13.100 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1496 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.8µs " +"2020-08-31 20:52:13.100 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1494 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 88.6µs " +"2020-08-31 20:52:13.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1497 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:13.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1498 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:13.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1499 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:13.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 149a Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +"2020-08-31 20:52:13.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 149b Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.8µs " +"2020-08-31 20:52:13.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 149c Sending msg of 28 bytes to 2 on channel businesschannel took 15.5µs" +"2020-08-31 20:52:13.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 149d Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +"2020-08-31 20:52:13.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 149e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72µs " +"2020-08-31 20:52:13.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 149f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 41.9µs " +"2020-08-31 20:52:13.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a0 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:13.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a1 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:13.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:13.805 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a3 Sending msg of 28 bytes to 3 on channel testchainid took 14.8µs" +"2020-08-31 20:52:13.805 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.9µs " +"2020-08-31 20:52:14.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a5 Sending msg of 28 bytes to 2 on channel businesschannel took 18.1µs" +"2020-08-31 20:52:14.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14a6 Sending msg of 28 bytes to 3 on channel businesschannel took 12.8µs" +"2020-08-31 20:52:14.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.8µs " +"2020-08-31 20:52:14.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14a8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 110µs " +"2020-08-31 20:52:14.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14a9 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:14.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14aa Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:14.305 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ab Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:14.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ac Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2020-08-31 20:52:14.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ad Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.7µs " +"2020-08-31 20:52:14.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ae Sending msg of 28 bytes to 2 on channel businesschannel took 22.2µs" +"2020-08-31 20:52:14.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14af Sending msg of 28 bytes to 3 on channel businesschannel took 12.9µs" +"2020-08-31 20:52:14.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86µs " +"2020-08-31 20:52:14.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 57.6µs " +"2020-08-31 20:52:14.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:14.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b3 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:14.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14b4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:14.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b5 Sending msg of 28 bytes to 3 on channel testchainid took 18.8µs" +"2020-08-31 20:52:14.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.8µs " +"2020-08-31 20:52:15.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b7 Sending msg of 28 bytes to 3 on channel businesschannel took 27.7µs" +"2020-08-31 20:52:15.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14b8 Sending msg of 28 bytes to 2 on channel businesschannel took 9.8µs" +"2020-08-31 20:52:15.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14b9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 117.5µs " +"2020-08-31 20:52:15.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ba Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 154.6µs " +"2020-08-31 20:52:15.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14bb Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:15.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14bc Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:15.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14bd Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:15.309 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14be Sending msg of 28 bytes to 3 on channel testchainid took 121.4µs" +"2020-08-31 20:52:15.311 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14bf Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 516.7µs " +"2020-08-31 20:52:15.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c0 Sending msg of 28 bytes to 2 on channel businesschannel took 18.8µs" +"2020-08-31 20:52:15.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c1 Sending msg of 28 bytes to 3 on channel businesschannel took 11.1µs" +"2020-08-31 20:52:15.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 71.2µs " +"2020-08-31 20:52:15.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 44.6µs " +"2020-08-31 20:52:15.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:15.600 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c5 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:15.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14c6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:15.805 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c7 Sending msg of 28 bytes to 3 on channel testchainid took 20.4µs" +"2020-08-31 20:52:15.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14c8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 108.7µs " +"2020-08-31 20:52:16.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14c9 Sending msg of 28 bytes to 2 on channel businesschannel took 20.2µs" +"2020-08-31 20:52:16.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ca Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 81.8µs " +"2020-08-31 20:52:16.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14cb Sending msg of 28 bytes to 3 on channel businesschannel took 40.4µs" +"2020-08-31 20:52:16.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14cc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 62.2µs " +"2020-08-31 20:52:16.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14cd Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:16.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ce Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:16.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14cf Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:16.307 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d0 Sending msg of 28 bytes to 3 on channel testchainid took 20.2µs" +"2020-08-31 20:52:16.308 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d1 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 115.8µs " +"2020-08-31 20:52:16.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d2 Sending msg of 28 bytes to 2 on channel businesschannel took 52.2µs" +"2020-08-31 20:52:16.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d3 Sending msg of 28 bytes to 3 on channel businesschannel took 24.1µs" +"2020-08-31 20:52:16.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 801.3µs " +"2020-08-31 20:52:16.599 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14d5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 414.4µs " +"2020-08-31 20:52:16.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d6 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:16.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d7 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:16.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14d8 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:16.807 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14d9 Sending msg of 28 bytes to 3 on channel testchainid took 28.7µs" +"2020-08-31 20:52:16.808 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14da Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 305.4µs " +"2020-08-31 20:52:17.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14db Sending msg of 28 bytes to 2 on channel businesschannel took 24.6µs" +"2020-08-31 20:52:17.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14dc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 121.1µs " +"2020-08-31 20:52:17.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14dd Sending msg of 28 bytes to 3 on channel businesschannel took 16µs" +"2020-08-31 20:52:17.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14de Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 72.9µs " +"2020-08-31 20:52:17.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14df Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:17.109 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e0 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:17.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:17.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e2 Sending msg of 28 bytes to 3 on channel testchainid took 24.9µs" +"2020-08-31 20:52:17.307 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 89.8µs " +"2020-08-31 20:52:17.599 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e4 Sending msg of 28 bytes to 2 on channel businesschannel took 27µs" +"2020-08-31 20:52:17.599 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14e5 Sending msg of 28 bytes to 3 on channel businesschannel took 14.6µs" +"2020-08-31 20:52:17.599 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83µs " +"2020-08-31 20:52:17.599 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14e7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 59.2µs " +"2020-08-31 20:52:17.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e8 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:17.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14e9 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:17.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14ea Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:17.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14eb Sending msg of 28 bytes to 3 on channel testchainid took 18.2µs" +"2020-08-31 20:52:17.807 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ec Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.8µs " +"2020-08-31 20:52:18.096 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ed Sending msg of 28 bytes to 2 on channel businesschannel took 21.2µs" +"2020-08-31 20:52:18.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ee Sending msg of 28 bytes to 3 on channel businesschannel took 24.7µs" +"2020-08-31 20:52:18.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14ef Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 123.2µs " +"2020-08-31 20:52:18.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 218.7µs " +"2020-08-31 20:52:18.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f1 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:18.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:18.305 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14f3 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:18.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f4 Sending msg of 28 bytes to 3 on channel testchainid took 18.1µs" +"2020-08-31 20:52:18.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f5 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.1µs " +"2020-08-31 20:52:18.596 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f6 Sending msg of 28 bytes to 2 on channel businesschannel took 20.7µs" +"2020-08-31 20:52:18.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14f7 Sending msg of 28 bytes to 3 on channel businesschannel took 25.6µs" +"2020-08-31 20:52:18.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 70.4µs " +"2020-08-31 20:52:18.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14f9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 56.3µs " +"2020-08-31 20:52:18.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14fa Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:18.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14fb Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:18.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 14fc Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:18.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14fd Sending msg of 28 bytes to 3 on channel testchainid took 140.7µs" +"2020-08-31 20:52:18.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 14fe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 301.9µs " +"2020-08-31 20:52:19.096 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 14ff Sending msg of 28 bytes to 2 on channel businesschannel took 19.5µs" +"2020-08-31 20:52:19.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1500 Sending msg of 28 bytes to 3 on channel businesschannel took 12.4µs" +"2020-08-31 20:52:19.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1501 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.8µs " +"2020-08-31 20:52:19.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1502 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 103.3µs " +"2020-08-31 20:52:19.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1503 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:19.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1504 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:19.206 UTC [orderer.common.server] Deliver -> DEBU 1505 Starting new Deliver handler" +"2020-08-31 20:52:19.206 UTC [common.deliver] Handle -> DEBU 1506 Starting new deliver loop for 172.18.0.9:50966" +"2020-08-31 20:52:19.206 UTC [common.deliver] Handle -> DEBU 1507 Attempting to read seek info message from 172.18.0.9:50966" +"2020-08-31 20:52:19.218 UTC [orderer.common.server] Broadcast -> DEBU 1508 Starting new Broadcast handler" +"2020-08-31 20:52:19.218 UTC [orderer.common.broadcast] Handle -> DEBU 1509 Starting new broadcast loop for 172.18.0.9:50968" +"2020-08-31 20:52:19.219 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 150a [channel: businesschannel] Broadcast is processing config update message from 172.18.0.9:50968" +"2020-08-31 20:52:19.219 UTC [orderer.common.msgprocessor] ProcessConfigUpdateMsg -> DEBU 150b Processing config update message for exisitng channel businesschannel" +"2020-08-31 20:52:19.220 UTC [policies] Evaluate -> DEBU 150c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-08-31 20:52:19.220 UTC [policies] Evaluate -> DEBU 150d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:19.220 UTC [policies] Evaluate -> DEBU 150e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-08-31 20:52:19.221 UTC [policies] Evaluate -> DEBU 150f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:19.222 UTC [policies] Evaluate -> DEBU 1510 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-08-31 20:52:19.222 UTC [cauthdsl] func1 -> DEBU 1511 0xc000e69a60 gate 1598907139222371400 evaluation starts" +"2020-08-31 20:52:19.222 UTC [cauthdsl] func2 -> DEBU 1512 0xc000e69a60 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:19.222 UTC [cauthdsl] func2 -> DEBU 1513 0xc000e69a60 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:19.223 UTC [cauthdsl] func2 -> DEBU 1514 0xc000e69a60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected OrdererMSP, got Org1MSP)" +"2020-08-31 20:52:19.223 UTC [cauthdsl] func2 -> DEBU 1515 0xc000e69a60 principal evaluation fails" +"2020-08-31 20:52:19.223 UTC [cauthdsl] func1 -> DEBU 1516 0xc000e69a60 gate 1598907139222371400 evaluation fails" +"2020-08-31 20:52:19.223 UTC [policies] Evaluate -> DEBU 1517 Signature set did not satisfy policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:52:19.226 UTC [policies] Evaluate -> DEBU 1518 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:52:19.226 UTC [policies] func1 -> DEBU 1519 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ OrdererOrg/Writers ]" +"2020-08-31 20:52:19.227 UTC [policies] Evaluate -> DEBU 151a Signature set did not satisfy policy /Channel/Orderer/Writers" +"2020-08-31 20:52:19.228 UTC [policies] Evaluate -> DEBU 151b == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-08-31 20:52:19.228 UTC [policies] Evaluate -> DEBU 151c == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers ==" +"2020-08-31 20:52:19.228 UTC [policies] Evaluate -> DEBU 151d This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:19.229 UTC [policies] Evaluate -> DEBU 151e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers ==" +"2020-08-31 20:52:19.229 UTC [cauthdsl] func1 -> DEBU 151f 0xc000e94750 gate 1598907139229477700 evaluation starts" +"2020-08-31 20:52:19.229 UTC [cauthdsl] func2 -> DEBU 1520 0xc000e94750 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:19.229 UTC [cauthdsl] func2 -> DEBU 1521 0xc000e94750 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:19.230 UTC [cauthdsl] func2 -> DEBU 1522 0xc000e94750 principal matched by identity 0" +"2020-08-31 20:52:19.230 UTC [msp.identity] Verify -> DEBU 1523 Verify: digest = 00000000 d5 c0 2e 39 73 77 a2 28 e0 3c 68 35 af 9b e5 44 |...9sw.(. DEBU 1524 Verify: sig = 00000000 30 45 02 21 00 95 8a f4 c5 fe e2 6f ba 64 c8 4e |0E.!.......o.d.N| +00000010 d2 20 1e 9b e8 f5 b8 6c ed a8 f0 76 7f 21 1e 89 |. .....l...v.!..| +00000020 f8 3d e7 cb a0 02 20 02 e6 c7 cb db b7 14 e9 de |.=.... .........| +00000030 9f a7 0c 36 ae 1a b9 71 ac c9 1c 0b ee 2a d2 5c |...6...q.....*.\| +00000040 1a 10 43 da 27 44 a3 |..C.'D.|" +"2020-08-31 20:52:19.231 UTC [cauthdsl] func2 -> DEBU 1525 0xc000e94750 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:19.231 UTC [cauthdsl] func1 -> DEBU 1526 0xc000e94750 gate 1598907139229477700 evaluation succeeds" +"2020-08-31 20:52:19.231 UTC [policies] Evaluate -> DEBU 1527 Signature set satisfies policy /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:52:19.232 UTC [policies] Evaluate -> DEBU 1528 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:52:19.232 UTC [policies] Evaluate -> DEBU 1529 Signature set satisfies policy /Channel/Application/Writers" +"2020-08-31 20:52:19.232 UTC [policies] Evaluate -> DEBU 152a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers" +"2020-08-31 20:52:19.233 UTC [policies] Evaluate -> DEBU 152b Signature set satisfies policy /Channel/Writers" +"2020-08-31 20:52:19.233 UTC [policies] Evaluate -> DEBU 152c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-08-31 20:52:19.233 UTC [common.configtx] addToMap -> DEBU 152d Adding to config map: [Group] /Channel" +"2020-08-31 20:52:19.233 UTC [common.configtx] addToMap -> DEBU 152e Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:52:19.234 UTC [common.configtx] addToMap -> DEBU 152f Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:52:19.234 UTC [common.configtx] addToMap -> DEBU 1530 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:52:19.234 UTC [common.configtx] addToMap -> DEBU 1531 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-08-31 20:52:19.234 UTC [common.configtx] addToMap -> DEBU 1532 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:52:19.235 UTC [common.configtx] addToMap -> DEBU 1533 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-08-31 20:52:19.235 UTC [common.configtx] addToMap -> DEBU 1534 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:52:19.235 UTC [common.configtx] addToMap -> DEBU 1535 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:52:19.235 UTC [common.configtx] addToMap -> DEBU 1536 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-08-31 20:52:19.235 UTC [common.configtx] addToMap -> DEBU 1537 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-08-31 20:52:19.241 UTC [common.configtx] addToMap -> DEBU 1538 Adding to config map: [Group] /Channel" +"2020-08-31 20:52:19.242 UTC [common.configtx] addToMap -> DEBU 1539 Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:52:19.242 UTC [common.configtx] addToMap -> DEBU 153a Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:52:19.242 UTC [common.configtx] addToMap -> DEBU 153b Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:52:19.242 UTC [common.configtx] addToMap -> DEBU 153c Adding to config map: [Group] /Channel/Application/Org3MSP" +"2020-08-31 20:52:19.243 UTC [common.configtx] addToMap -> DEBU 153d Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2020-08-31 20:52:19.244 UTC [common.configtx] addToMap -> DEBU 153e Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-08-31 20:52:19.244 UTC [common.configtx] addToMap -> DEBU 153f Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-08-31 20:52:19.244 UTC [common.configtx] addToMap -> DEBU 1540 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:19.244 UTC [common.configtx] addToMap -> DEBU 1541 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-08-31 20:52:19.245 UTC [common.configtx] addToMap -> DEBU 1542 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-08-31 20:52:19.245 UTC [common.configtx] addToMap -> DEBU 1543 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:52:19.245 UTC [common.configtx] addToMap -> DEBU 1544 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-08-31 20:52:19.245 UTC [common.configtx] addToMap -> DEBU 1545 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:52:19.245 UTC [common.configtx] addToMap -> DEBU 1546 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:52:19.245 UTC [common.configtx] addToMap -> DEBU 1547 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-08-31 20:52:19.246 UTC [common.configtx] addToMap -> DEBU 1548 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-08-31 20:52:19.246 UTC [common.configtx] verifyDeltaSet -> DEBU 1549 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2020-08-31 20:52:19.246 UTC [common.configtx] verifyDeltaSet -> DEBU 154a Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-08-31 20:52:19.246 UTC [common.configtx] verifyDeltaSet -> DEBU 154b Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-08-31 20:52:19.247 UTC [common.configtx] verifyDeltaSet -> DEBU 154c Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:19.247 UTC [common.configtx] verifyDeltaSet -> DEBU 154d Processing change to key: [Group] /Channel/Application/Org3MSP" +"2020-08-31 20:52:19.247 UTC [common.configtx] verifyDeltaSet -> DEBU 154e Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-08-31 20:52:19.247 UTC [common.configtx] verifyDeltaSet -> DEBU 154f Processing change to key: [Group] /Channel/Application" +"2020-08-31 20:52:19.247 UTC [common.configtx] policyForItem -> DEBU 1550 Getting policy for item Application with mod_policy Admins" +"2020-08-31 20:52:19.248 UTC [policies] Manager -> DEBU 1551 Manager Channel looking up path []" +"2020-08-31 20:52:19.248 UTC [policies] Manager -> DEBU 1552 Manager Channel has managers Orderer" +"2020-08-31 20:52:19.248 UTC [policies] Manager -> DEBU 1553 Manager Channel has managers Application" +"2020-08-31 20:52:19.248 UTC [policies] Manager -> DEBU 1554 Manager Channel looking up path [Application]" +"2020-08-31 20:52:19.248 UTC [policies] Manager -> DEBU 1555 Manager Channel has managers Orderer" +"2020-08-31 20:52:19.248 UTC [policies] Manager -> DEBU 1556 Manager Channel has managers Application" +"2020-08-31 20:52:19.249 UTC [policies] Manager -> DEBU 1557 Manager Channel/Application looking up path []" +"2020-08-31 20:52:19.249 UTC [policies] Manager -> DEBU 1558 Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:52:19.249 UTC [policies] Manager -> DEBU 1559 Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:52:19.249 UTC [policies] Evaluate -> DEBU 155a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2020-08-31 20:52:19.249 UTC [policies] Evaluate -> DEBU 155b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:19.249 UTC [policies] Evaluate -> DEBU 155c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2020-08-31 20:52:19.249 UTC [cauthdsl] deduplicate -> WARN 155d De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +"2020-08-31 20:52:19.249 UTC [cauthdsl] func1 -> DEBU 155e 0xc0009893e0 gate 1598907139249941000 evaluation starts" +"2020-08-31 20:52:19.249 UTC [cauthdsl] func2 -> DEBU 155f 0xc0009893e0 signed by 0 principal evaluation starts (used [false false false])" +"2020-08-31 20:52:19.250 UTC [cauthdsl] func2 -> DEBU 1560 0xc0009893e0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:19.250 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1561 Checking if identity has been named explicitly as an admin for Org1MSP" +"2020-08-31 20:52:19.250 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1562 Checking if identity carries the admin ou for Org1MSP" +"2020-08-31 20:52:19.250 UTC [msp] Validate -> DEBU 1563 MSP Org1MSP validating identity" +"2020-08-31 20:52:19.250 UTC [msp] getCertificationChain -> DEBU 1564 MSP Org1MSP getting certification chain" +"2020-08-31 20:52:19.251 UTC [msp] hasOURole -> DEBU 1565 MSP Org1MSP checking if the identity is a client" +"2020-08-31 20:52:19.251 UTC [msp] getCertificationChain -> DEBU 1566 MSP Org1MSP getting certification chain" +"2020-08-31 20:52:19.251 UTC [cauthdsl] func2 -> DEBU 1567 0xc0009893e0 principal matched by identity 0" +"2020-08-31 20:52:19.252 UTC [msp.identity] Verify -> DEBU 1568 Verify: digest = 00000000 74 79 4d e9 a3 71 1d 24 0f fe ed 23 9d 11 9b 00 |tyM..q.$...#....| +00000010 3e 25 10 29 78 cb 07 bc 16 8a c0 53 e9 e3 ae 76 |>%.)x......S...v|" +"2020-08-31 20:52:19.252 UTC [msp.identity] Verify -> DEBU 1569 Verify: sig = 00000000 30 45 02 21 00 ed 6e 97 55 ce e1 8f 4a 2e 44 e9 |0E.!..n.U...J.D.| +00000010 86 cc c7 d8 15 32 92 11 5c 0f ae 9c 24 1e e3 31 |.....2..\...$..1| +00000020 b0 8c 3d 39 f2 02 20 6c 7f 82 68 b5 f7 a9 fc 04 |..=9.. l..h.....| +00000030 9c c0 f7 ee 68 f9 99 1d 35 23 c7 b2 62 e6 51 30 |....h...5#..b.Q0| +00000040 4f f1 8e 15 f4 64 79 |O....dy|" +"2020-08-31 20:52:19.252 UTC [cauthdsl] func2 -> DEBU 156a 0xc0009893e0 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:19.253 UTC [cauthdsl] func1 -> DEBU 156b 0xc0009893e0 gate 1598907139249941000 evaluation succeeds" +"2020-08-31 20:52:19.253 UTC [policies] Evaluate -> DEBU 156c Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:52:19.253 UTC [policies] Evaluate -> DEBU 156d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:52:19.253 UTC [policies] Evaluate -> DEBU 156e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2020-08-31 20:52:19.253 UTC [cauthdsl] deduplicate -> WARN 156f De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +"2020-08-31 20:52:19.253 UTC [cauthdsl] func1 -> DEBU 1570 0xc0009ac1b0 gate 1598907139253522800 evaluation starts" +"2020-08-31 20:52:19.253 UTC [cauthdsl] func2 -> DEBU 1571 0xc0009ac1b0 signed by 0 principal evaluation starts (used [false false false])" +"2020-08-31 20:52:19.253 UTC [cauthdsl] func2 -> DEBU 1572 0xc0009ac1b0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:19.253 UTC [cauthdsl] func2 -> DEBU 1573 0xc0009ac1b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2020-08-31 20:52:19.253 UTC [cauthdsl] func2 -> DEBU 1574 0xc0009ac1b0 processing identity 1 with bytes of fe10e0" +"2020-08-31 20:52:19.253 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1575 Checking if identity has been named explicitly as an admin for Org2MSP" +"2020-08-31 20:52:19.253 UTC [msp] satisfiesPrincipalInternalV143 -> DEBU 1576 Checking if identity carries the admin ou for Org2MSP" +"2020-08-31 20:52:19.253 UTC [msp] Validate -> DEBU 1577 MSP Org2MSP validating identity" +"2020-08-31 20:52:19.253 UTC [msp] getCertificationChain -> DEBU 1578 MSP Org2MSP getting certification chain" +"2020-08-31 20:52:19.253 UTC [msp] hasOURole -> DEBU 1579 MSP Org2MSP checking if the identity is a client" +"2020-08-31 20:52:19.254 UTC [msp] getCertificationChain -> DEBU 157a MSP Org2MSP getting certification chain" +"2020-08-31 20:52:19.254 UTC [cauthdsl] func2 -> DEBU 157b 0xc0009ac1b0 principal matched by identity 1" +"2020-08-31 20:52:19.254 UTC [msp.identity] Verify -> DEBU 157c Verify: digest = 00000000 1c 16 ac 57 86 d3 c3 21 1e c6 7b f6 f4 33 15 53 |...W...!..{..3.S| +00000010 51 0a 12 8c c9 dc af 08 54 64 1f 16 1c 10 79 1c |Q.......Td....y.|" +"2020-08-31 20:52:19.254 UTC [msp.identity] Verify -> DEBU 157d Verify: sig = 00000000 30 45 02 21 00 fd 5d cb e8 72 66 8f d2 c7 ff a3 |0E.!..]..rf.....| +00000010 aa d3 dc 46 c5 bd 34 a5 d8 7d dc a8 35 2c d6 29 |...F..4..}..5,.)| +00000020 07 b0 75 b1 d5 02 20 0a ef 18 c5 de bf be 2c 7c |..u... .......,|| +00000030 16 ea 9e 3a ba 4b 56 95 85 92 21 ee 94 17 ad 3b |...:.KV...!....;| +00000040 78 aa 13 9c c2 d4 33 |x.....3|" +"2020-08-31 20:52:19.254 UTC [cauthdsl] func2 -> DEBU 157e 0xc0009ac1b0 principal evaluation succeeds for identity 1" +"2020-08-31 20:52:19.254 UTC [cauthdsl] func1 -> DEBU 157f 0xc0009ac1b0 gate 1598907139253522800 evaluation succeeds" +"2020-08-31 20:52:19.254 UTC [policies] Evaluate -> DEBU 1580 Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:52:19.255 UTC [policies] Evaluate -> DEBU 1581 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:52:19.255 UTC [policies] Evaluate -> DEBU 1582 Signature set satisfies policy /Channel/Application/Admins" +"2020-08-31 20:52:19.255 UTC [policies] Evaluate -> DEBU 1583 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2020-08-31 20:52:19.256 UTC [common.configtx] recurseConfigMap -> DEBU 1584 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.256 UTC [common.configtx] recurseConfigMap -> DEBU 1585 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.256 UTC [common.configtx] recurseConfigMap -> DEBU 1586 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.256 UTC [common.configtx] recurseConfigMap -> DEBU 1587 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.257 UTC [common.configtx] recurseConfigMap -> DEBU 1588 Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.257 UTC [common.configtx] recurseConfigMap -> DEBU 1589 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.257 UTC [common.configtx] recurseConfigMap -> DEBU 158a Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.257 UTC [common.configtx] recurseConfigMap -> DEBU 158b Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.258 UTC [common.configtx] recurseConfigMap -> DEBU 158c Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.258 UTC [common.configtx] recurseConfigMap -> DEBU 158d Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.259 UTC [common.configtx] recurseConfigMap -> DEBU 158e Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.259 UTC [common.configtx] recurseConfigMap -> DEBU 158f Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.259 UTC [common.configtx] recurseConfigMap -> DEBU 1590 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.260 UTC [common.configtx] recurseConfigMap -> DEBU 1591 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.260 UTC [common.configtx] recurseConfigMap -> DEBU 1592 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.260 UTC [common.configtx] recurseConfigMap -> DEBU 1593 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.260 UTC [common.configtx] recurseConfigMap -> DEBU 1594 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.260 UTC [common.configtx] recurseConfigMap -> DEBU 1595 Setting policy for key Admins to " +"2020-08-31 20:52:19.260 UTC [common.configtx] recurseConfigMap -> DEBU 1596 Setting policy for key Endorsement to " +"2020-08-31 20:52:19.261 UTC [common.configtx] recurseConfigMap -> DEBU 1597 Setting policy for key LifecycleEndorsement to " +"2020-08-31 20:52:19.261 UTC [common.configtx] recurseConfigMap -> DEBU 1598 Setting policy for key Readers to " +"2020-08-31 20:52:19.261 UTC [common.configtx] recurseConfigMap -> DEBU 1599 Setting policy for key Writers to " +"2020-08-31 20:52:19.261 UTC [common.configtx] recurseConfigMap -> DEBU 159a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.262 UTC [common.configtx] recurseConfigMap -> DEBU 159b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.262 UTC [common.configtx] recurseConfigMap -> DEBU 159c Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.262 UTC [common.channelconfig] NewStandardValues -> DEBU 159d Initializing protos for *channelconfig.ChannelProtos" +"2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159e Processing field: HashingAlgorithm" +"2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 159f Processing field: BlockDataHashingStructure" +"2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a0 Processing field: OrdererAddresses" +"2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a1 Processing field: Consortium" +"2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a2 Processing field: Capabilities" +"2020-08-31 20:52:19.262 UTC [common.channelconfig] NewStandardValues -> DEBU 15a3 Initializing protos for *channelconfig.OrdererProtos" +"2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a4 Processing field: ConsensusType" +"2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a5 Processing field: BatchSize" +"2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a6 Processing field: BatchTimeout" +"2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a7 Processing field: KafkaBrokers" +"2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a8 Processing field: ChannelRestrictions" +"2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15a9 Processing field: Capabilities" +"2020-08-31 20:52:19.262 UTC [common.channelconfig] NewStandardValues -> DEBU 15aa Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ab Processing field: Endpoints" +"2020-08-31 20:52:19.262 UTC [common.channelconfig] NewStandardValues -> DEBU 15ac Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:52:19.262 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15ad Processing field: MSP" +"2020-08-31 20:52:19.263 UTC [common.channelconfig] validateMSP -> DEBU 15ae Setting up MSP for org OrdererOrg" +"2020-08-31 20:52:19.263 UTC [msp] newBccspMsp -> DEBU 15af Creating BCCSP-based MSP instance" +"2020-08-31 20:52:19.264 UTC [msp] New -> DEBU 15b0 Creating Cache-MSP instance" +"2020-08-31 20:52:19.264 UTC [msp] Setup -> DEBU 15b1 Setting up MSP instance OrdererMSP" +"2020-08-31 20:52:19.264 UTC [msp.identity] newIdentity -> DEBU 15b2 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:52:19.266 UTC [common.channelconfig] NewStandardValues -> DEBU 15b3 Initializing protos for *channelconfig.ApplicationProtos" +"2020-08-31 20:52:19.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b4 Processing field: ACLs" +"2020-08-31 20:52:19.266 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b5 Processing field: Capabilities" +"2020-08-31 20:52:19.266 UTC [common.channelconfig] NewStandardValues -> DEBU 15b6 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:52:19.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b7 Processing field: AnchorPeers" +"2020-08-31 20:52:19.267 UTC [common.channelconfig] NewStandardValues -> DEBU 15b8 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:52:19.267 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15b9 Processing field: MSP" +"2020-08-31 20:52:19.267 UTC [common.channelconfig] Validate -> DEBU 15ba Anchor peers for org Org3MSP are " +"2020-08-31 20:52:19.268 UTC [common.channelconfig] validateMSP -> DEBU 15bb Setting up MSP for org Org3MSP" +"2020-08-31 20:52:19.268 UTC [msp] newBccspMsp -> DEBU 15bc Creating BCCSP-based MSP instance" +"2020-08-31 20:52:19.268 UTC [msp] New -> DEBU 15bd Creating Cache-MSP instance" +"2020-08-31 20:52:19.268 UTC [msp] Setup -> DEBU 15be Setting up MSP instance Org3MSP" +"2020-08-31 20:52:19.268 UTC [msp.identity] newIdentity -> DEBU 15bf Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE-----" +"2020-08-31 20:52:19.268 UTC [common.channelconfig] NewStandardValues -> DEBU 15c0 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:52:19.268 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c1 Processing field: AnchorPeers" +"2020-08-31 20:52:19.268 UTC [common.channelconfig] NewStandardValues -> DEBU 15c2 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:52:19.268 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15c3 Processing field: MSP" +"2020-08-31 20:52:19.268 UTC [common.channelconfig] Validate -> DEBU 15c4 Anchor peers for org Org1MSP are anchor_peers: " +"2020-08-31 20:52:19.268 UTC [common.channelconfig] validateMSP -> DEBU 15c5 Setting up MSP for org Org1MSP" +"2020-08-31 20:52:19.268 UTC [msp] newBccspMsp -> DEBU 15c6 Creating BCCSP-based MSP instance" +"2020-08-31 20:52:19.268 UTC [msp] New -> DEBU 15c7 Creating Cache-MSP instance" +"2020-08-31 20:52:19.268 UTC [msp] Setup -> DEBU 15c8 Setting up MSP instance Org1MSP" +"2020-08-31 20:52:19.270 UTC [msp.identity] newIdentity -> DEBU 15c9 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-08-31 20:52:19.270 UTC [common.channelconfig] NewStandardValues -> DEBU 15ca Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:52:19.270 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15cb Processing field: AnchorPeers" +"2020-08-31 20:52:19.270 UTC [common.channelconfig] NewStandardValues -> DEBU 15cc Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:52:19.270 UTC [common.channelconfig] initializeProtosStruct -> DEBU 15cd Processing field: MSP" +"2020-08-31 20:52:19.271 UTC [common.channelconfig] Validate -> DEBU 15ce Anchor peers for org Org2MSP are anchor_peers: " +"2020-08-31 20:52:19.271 UTC [common.channelconfig] validateMSP -> DEBU 15cf Setting up MSP for org Org2MSP" +"2020-08-31 20:52:19.271 UTC [msp] newBccspMsp -> DEBU 15d0 Creating BCCSP-based MSP instance" +"2020-08-31 20:52:19.271 UTC [msp] New -> DEBU 15d1 Creating Cache-MSP instance" +"2020-08-31 20:52:19.271 UTC [msp] Setup -> DEBU 15d2 Setting up MSP instance Org2MSP" +"2020-08-31 20:52:19.271 UTC [msp.identity] newIdentity -> DEBU 15d3 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-08-31 20:52:19.272 UTC [msp] Setup -> DEBU 15d4 Setting up the MSP manager (4 msps)" +"2020-08-31 20:52:19.272 UTC [msp] Setup -> DEBU 15d5 MSP manager setup complete, setup 4 msps" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15d6 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15d7 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15d8 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15d9 Proposed new policy Readers for Channel/Orderer" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15da Proposed new policy Writers for Channel/Orderer" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15db Proposed new policy Admins for Channel/Orderer" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15dc Proposed new policy BlockValidation for Channel/Orderer" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15dd Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15de Proposed new policy Readers for Channel/Application/Org3MSP" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15df Proposed new policy Writers for Channel/Application/Org3MSP" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15e0 Proposed new policy Admins for Channel/Application/Org3MSP" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15e1 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15e2 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15e3 Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15e4 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15e5 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15e6 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15e7 Proposed new policy Admins for Channel/Application" +"2020-08-31 20:52:19.272 UTC [policies] GetPolicy -> DEBU 15e8 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:52:19.272 UTC [policies] GetPolicy -> DEBU 15e9 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:52:19.272 UTC [policies] NewManagerImpl -> DEBU 15ea Proposed new policy Endorsement for Channel/Application" +"2020-08-31 20:52:19.272 UTC [policies] GetPolicy -> DEBU 15eb Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:52:19.273 UTC [policies] GetPolicy -> DEBU 15ec Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:52:19.273 UTC [policies] NewManagerImpl -> DEBU 15ed Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-08-31 20:52:19.273 UTC [policies] NewManagerImpl -> DEBU 15ee Proposed new policy Readers for Channel/Application" +"2020-08-31 20:52:19.273 UTC [policies] NewManagerImpl -> DEBU 15ef Proposed new policy Writers for Channel/Application" +"2020-08-31 20:52:19.273 UTC [policies] NewManagerImpl -> DEBU 15f0 Proposed new policy Readers for Channel" +"2020-08-31 20:52:19.273 UTC [policies] NewManagerImpl -> DEBU 15f1 Proposed new policy Writers for Channel" +"2020-08-31 20:52:19.273 UTC [policies] NewManagerImpl -> DEBU 15f2 Proposed new policy Admins for Channel" +"2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15f3 Adding to config map: [Group] /Channel" +"2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15f4 Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15f5 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15f6 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15f7 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15f8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15f9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15fa Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15fb Adding to config map: [Group] /Channel/Application/Org3MSP" +"2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15fc Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15fd Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15fe Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 15ff Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 1600 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 1601 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:52:19.273 UTC [common.configtx] addToMap -> DEBU 1602 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1603 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1604 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1605 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1606 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1607 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1608 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1609 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 160a Adding to config map: [Policy] /Channel/Application/Admins" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 160b Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 160c Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 160d Adding to config map: [Policy] /Channel/Application/Readers" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 160e Adding to config map: [Group] /Channel/Orderer" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 160f Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1610 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1611 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1612 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1613 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1614 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1615 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1616 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1617 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-08-31 20:52:19.274 UTC [common.configtx] addToMap -> DEBU 1618 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 1619 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 161a Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 161b Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 161c Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 161d Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 161e Adding to config map: [Value] /Channel/Consortium" +"2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 161f Adding to config map: [Value] /Channel/Capabilities" +"2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 1620 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 1621 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 1622 Adding to config map: [Policy] /Channel/Writers" +"2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 1623 Adding to config map: [Policy] /Channel/Admins" +"2020-08-31 20:52:19.275 UTC [common.configtx] addToMap -> DEBU 1624 Adding to config map: [Policy] /Channel/Readers" +"2020-08-31 20:52:19.275 UTC [common.channelconfig] LogSanityChecks -> DEBU 1625 As expected, current configuration has policy '/Channel/Readers'" +"2020-08-31 20:52:19.275 UTC [common.channelconfig] LogSanityChecks -> DEBU 1626 As expected, current configuration has policy '/Channel/Writers'" +"2020-08-31 20:52:19.275 UTC [policies] Manager -> DEBU 1627 Manager Channel looking up path [Application]" +"2020-08-31 20:52:19.275 UTC [policies] Manager -> DEBU 1628 Manager Channel has managers Application" +"2020-08-31 20:52:19.275 UTC [policies] Manager -> DEBU 1629 Manager Channel has managers Orderer" +"2020-08-31 20:52:19.275 UTC [policies] Manager -> DEBU 162a Manager Channel/Application looking up path []" +"2020-08-31 20:52:19.275 UTC [policies] Manager -> DEBU 162b Manager Channel/Application has managers Org3MSP" +"2020-08-31 20:52:19.276 UTC [policies] Manager -> DEBU 162c Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:52:19.276 UTC [policies] Manager -> DEBU 162d Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:52:19.276 UTC [common.channelconfig] LogSanityChecks -> DEBU 162e As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-08-31 20:52:19.276 UTC [common.channelconfig] LogSanityChecks -> DEBU 162f As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-08-31 20:52:19.276 UTC [common.channelconfig] LogSanityChecks -> DEBU 1630 As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-08-31 20:52:19.276 UTC [policies] Manager -> DEBU 1631 Manager Channel looking up path [Orderer]" +"2020-08-31 20:52:19.276 UTC [policies] Manager -> DEBU 1632 Manager Channel has managers Orderer" +"2020-08-31 20:52:19.276 UTC [policies] Manager -> DEBU 1633 Manager Channel has managers Application" +"2020-08-31 20:52:19.276 UTC [policies] Manager -> DEBU 1634 Manager Channel/Orderer looking up path []" +"2020-08-31 20:52:19.276 UTC [policies] Manager -> DEBU 1635 Manager Channel/Orderer has managers OrdererOrg" +"2020-08-31 20:52:19.276 UTC [common.channelconfig] LogSanityChecks -> DEBU 1636 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-08-31 20:52:19.276 UTC [common.channelconfig] LogSanityChecks -> DEBU 1637 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-08-31 20:52:19.276 UTC [common.channelconfig] LogSanityChecks -> DEBU 1638 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-08-31 20:52:19.276 UTC [common.channelconfig] LogSanityChecks -> DEBU 1639 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-08-31 20:52:19.276 UTC [common.capabilities] Supported -> DEBU 163a Orderer capability V1_4_2 is supported and is enabled" +"2020-08-31 20:52:19.276 UTC [common.capabilities] Supported -> DEBU 163b Channel capability V1_4_3 is supported and is enabled" +"2020-08-31 20:52:19.276 UTC [msp] GetDefaultSigningIdentity -> DEBU 163c Obtaining default signing identity" +"2020-08-31 20:52:19.277 UTC [msp] GetDefaultSigningIdentity -> DEBU 163d Obtaining default signing identity" +"2020-08-31 20:52:19.277 UTC [msp.identity] Sign -> DEBU 163e Sign: plaintext: 0AEA060A1B08011A060883C6B5FA0522...71ACC91C0BEE2AD25C1A1043DA2744A3 " +"2020-08-31 20:52:19.277 UTC [msp.identity] Sign -> DEBU 163f Sign: digest: 7091492267D4215AC55DBAB653954A0EEEFD0A4B0BB3B039D04F7A032F68D72B " +"2020-08-31 20:52:19.279 UTC [policies] Evaluate -> DEBU 1640 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers ==" +"2020-08-31 20:52:19.279 UTC [policies] Evaluate -> DEBU 1641 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:19.279 UTC [policies] Evaluate -> DEBU 1642 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers ==" +"2020-08-31 20:52:19.279 UTC [policies] Evaluate -> DEBU 1643 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:19.279 UTC [policies] Evaluate -> DEBU 1644 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers ==" +"2020-08-31 20:52:19.279 UTC [msp] DeserializeIdentity -> DEBU 1645 Obtaining identity" +"2020-08-31 20:52:19.279 UTC [msp.identity] newIdentity -> DEBU 1646 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE-----" +"2020-08-31 20:52:19.280 UTC [cauthdsl] func1 -> DEBU 1647 0xc0011b5640 gate 1598907139280152900 evaluation starts" +"2020-08-31 20:52:19.280 UTC [cauthdsl] func2 -> DEBU 1648 0xc0011b5640 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:19.280 UTC [cauthdsl] func2 -> DEBU 1649 0xc0011b5640 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:19.280 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 164a Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-08-31 20:52:19.280 UTC [msp] Validate -> DEBU 164b MSP OrdererMSP validating identity" +"2020-08-31 20:52:19.280 UTC [msp] getCertificationChain -> DEBU 164c MSP OrdererMSP getting certification chain" +"2020-08-31 20:52:19.281 UTC [cauthdsl] func2 -> DEBU 164d 0xc0011b5640 principal matched by identity 0" +"2020-08-31 20:52:19.281 UTC [msp.identity] Verify -> DEBU 164e Verify: digest = 00000000 70 91 49 22 67 d4 21 5a c5 5d ba b6 53 95 4a 0e |p.I"g.!Z.]..S.J.| +00000010 ee fd 0a 4b 0b b3 b0 39 d0 4f 7a 03 2f 68 d7 2b |...K...9.Oz./h.+|" +"2020-08-31 20:52:19.281 UTC [msp.identity] Verify -> DEBU 164f Verify: sig = 00000000 30 44 02 20 0b 0e 7b 4c 2d fb 5c 6a 92 7b 58 8b |0D. ..{L-.\j.{X.| +00000010 0a 94 e5 5d d9 f6 e0 78 df 56 82 b4 e5 6a e7 97 |...]...x.V...j..| +00000020 4a d7 3d d0 02 20 37 8c 68 5f 50 c0 44 97 70 a1 |J.=.. 7.h_P.D.p.| +00000030 6d 73 fc 0e d0 ba 0e f6 ad 2a 7d 93 67 93 90 59 |ms.......*}.g..Y| +00000040 46 c7 bb 03 af ad |F.....|" +"2020-08-31 20:52:19.281 UTC [cauthdsl] func2 -> DEBU 1650 0xc0011b5640 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:19.281 UTC [cauthdsl] func1 -> DEBU 1651 0xc0011b5640 gate 1598907139280152900 evaluation succeeds" +"2020-08-31 20:52:19.281 UTC [policies] Evaluate -> DEBU 1652 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:52:19.281 UTC [policies] Evaluate -> DEBU 1653 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:52:19.281 UTC [policies] Evaluate -> DEBU 1654 Signature set satisfies policy /Channel/Orderer/Writers" +"2020-08-31 20:52:19.281 UTC [policies] Evaluate -> DEBU 1655 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Writers" +"2020-08-31 20:52:19.281 UTC [policies] Evaluate -> DEBU 1656 Signature set satisfies policy /Channel/Writers" +"2020-08-31 20:52:19.281 UTC [policies] Evaluate -> DEBU 1657 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Writers" +"2020-08-31 20:52:19.281 UTC [orderer.common.msgprocessor] Apply -> DEBU 1658 Going to inspect maintenance mode transition rules" ConsensusState=STATE_NORMAL channel=businesschannel +"2020-08-31 20:52:19.281 UTC [common.channelconfig] NewStandardValues -> DEBU 1659 Initializing protos for *channelconfig.ChannelProtos" +"2020-08-31 20:52:19.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165a Processing field: HashingAlgorithm" +"2020-08-31 20:52:19.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165b Processing field: BlockDataHashingStructure" +"2020-08-31 20:52:19.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165c Processing field: OrdererAddresses" +"2020-08-31 20:52:19.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165d Processing field: Consortium" +"2020-08-31 20:52:19.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 165e Processing field: Capabilities" +"2020-08-31 20:52:19.281 UTC [common.channelconfig] NewStandardValues -> DEBU 165f Initializing protos for *channelconfig.OrdererProtos" +"2020-08-31 20:52:19.281 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1660 Processing field: ConsensusType" +"2020-08-31 20:52:19.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1661 Processing field: BatchSize" +"2020-08-31 20:52:19.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1662 Processing field: BatchTimeout" +"2020-08-31 20:52:19.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1663 Processing field: KafkaBrokers" +"2020-08-31 20:52:19.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1664 Processing field: ChannelRestrictions" +"2020-08-31 20:52:19.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1665 Processing field: Capabilities" +"2020-08-31 20:52:19.282 UTC [common.channelconfig] NewStandardValues -> DEBU 1666 Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-08-31 20:52:19.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1667 Processing field: Endpoints" +"2020-08-31 20:52:19.282 UTC [common.channelconfig] NewStandardValues -> DEBU 1668 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:52:19.282 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1669 Processing field: MSP" +"2020-08-31 20:52:19.282 UTC [common.channelconfig] validateMSP -> DEBU 166a Setting up MSP for org OrdererOrg" +"2020-08-31 20:52:19.282 UTC [msp] newBccspMsp -> DEBU 166b Creating BCCSP-based MSP instance" +"2020-08-31 20:52:19.282 UTC [msp] New -> DEBU 166c Creating Cache-MSP instance" +"2020-08-31 20:52:19.282 UTC [msp] Setup -> DEBU 166d Setting up MSP instance OrdererMSP" +"2020-08-31 20:52:19.282 UTC [msp.identity] newIdentity -> DEBU 166e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:52:19.283 UTC [common.channelconfig] NewStandardValues -> DEBU 166f Initializing protos for *channelconfig.ApplicationProtos" +"2020-08-31 20:52:19.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1670 Processing field: ACLs" +"2020-08-31 20:52:19.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1671 Processing field: Capabilities" +"2020-08-31 20:52:19.283 UTC [common.channelconfig] NewStandardValues -> DEBU 1672 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:52:19.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1673 Processing field: AnchorPeers" +"2020-08-31 20:52:19.283 UTC [common.channelconfig] NewStandardValues -> DEBU 1674 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:52:19.283 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1675 Processing field: MSP" +"2020-08-31 20:52:19.283 UTC [common.channelconfig] Validate -> DEBU 1676 Anchor peers for org Org3MSP are " +"2020-08-31 20:52:19.283 UTC [common.channelconfig] validateMSP -> DEBU 1677 Setting up MSP for org Org3MSP" +"2020-08-31 20:52:19.283 UTC [msp] newBccspMsp -> DEBU 1678 Creating BCCSP-based MSP instance" +"2020-08-31 20:52:19.283 UTC [msp] New -> DEBU 1679 Creating Cache-MSP instance" +"2020-08-31 20:52:19.283 UTC [msp] Setup -> DEBU 167a Setting up MSP instance Org3MSP" +"2020-08-31 20:52:19.283 UTC [msp.identity] newIdentity -> DEBU 167b Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE-----" +"2020-08-31 20:52:19.284 UTC [common.channelconfig] NewStandardValues -> DEBU 167c Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:52:19.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167d Processing field: AnchorPeers" +"2020-08-31 20:52:19.284 UTC [common.channelconfig] NewStandardValues -> DEBU 167e Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:52:19.284 UTC [common.channelconfig] initializeProtosStruct -> DEBU 167f Processing field: MSP" +"2020-08-31 20:52:19.284 UTC [common.channelconfig] Validate -> DEBU 1680 Anchor peers for org Org1MSP are anchor_peers: " +"2020-08-31 20:52:19.284 UTC [common.channelconfig] validateMSP -> DEBU 1681 Setting up MSP for org Org1MSP" +"2020-08-31 20:52:19.284 UTC [msp] newBccspMsp -> DEBU 1682 Creating BCCSP-based MSP instance" +"2020-08-31 20:52:19.284 UTC [msp] New -> DEBU 1683 Creating Cache-MSP instance" +"2020-08-31 20:52:19.284 UTC [msp] Setup -> DEBU 1684 Setting up MSP instance Org1MSP" +"2020-08-31 20:52:19.284 UTC [msp.identity] newIdentity -> DEBU 1685 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-08-31 20:52:19.285 UTC [common.channelconfig] NewStandardValues -> DEBU 1686 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:52:19.285 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1687 Processing field: AnchorPeers" +"2020-08-31 20:52:19.285 UTC [common.channelconfig] NewStandardValues -> DEBU 1688 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:52:19.285 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1689 Processing field: MSP" +"2020-08-31 20:52:19.285 UTC [common.channelconfig] Validate -> DEBU 168a Anchor peers for org Org2MSP are anchor_peers: " +"2020-08-31 20:52:19.285 UTC [common.channelconfig] validateMSP -> DEBU 168b Setting up MSP for org Org2MSP" +"2020-08-31 20:52:19.285 UTC [msp] newBccspMsp -> DEBU 168c Creating BCCSP-based MSP instance" +"2020-08-31 20:52:19.285 UTC [msp] New -> DEBU 168d Creating Cache-MSP instance" +"2020-08-31 20:52:19.285 UTC [msp] Setup -> DEBU 168e Setting up MSP instance Org2MSP" +"2020-08-31 20:52:19.286 UTC [msp.identity] newIdentity -> DEBU 168f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-08-31 20:52:19.287 UTC [msp] Setup -> DEBU 1690 Setting up the MSP manager (4 msps)" +"2020-08-31 20:52:19.287 UTC [msp] Setup -> DEBU 1691 MSP manager setup complete, setup 4 msps" +"2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 1692 Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 1693 Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 1694 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 1695 Proposed new policy BlockValidation for Channel/Orderer" +"2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 1696 Proposed new policy Readers for Channel/Orderer" +"2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 1697 Proposed new policy Writers for Channel/Orderer" +"2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 1698 Proposed new policy Admins for Channel/Orderer" +"2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 1699 Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 169a Proposed new policy Readers for Channel/Application/Org3MSP" +"2020-08-31 20:52:19.287 UTC [policies] NewManagerImpl -> DEBU 169b Proposed new policy Writers for Channel/Application/Org3MSP" +"2020-08-31 20:52:19.288 UTC [policies] NewManagerImpl -> DEBU 169c Proposed new policy Admins for Channel/Application/Org3MSP" +"2020-08-31 20:52:19.288 UTC [policies] NewManagerImpl -> DEBU 169d Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-08-31 20:52:19.288 UTC [policies] NewManagerImpl -> DEBU 169e Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-08-31 20:52:19.288 UTC [policies] NewManagerImpl -> DEBU 169f Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-08-31 20:52:19.288 UTC [policies] NewManagerImpl -> DEBU 16a0 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-08-31 20:52:19.288 UTC [policies] NewManagerImpl -> DEBU 16a1 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-08-31 20:52:19.288 UTC [policies] NewManagerImpl -> DEBU 16a2 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-08-31 20:52:19.288 UTC [policies] NewManagerImpl -> DEBU 16a3 Proposed new policy Admins for Channel/Application" +"2020-08-31 20:52:19.288 UTC [policies] GetPolicy -> DEBU 16a4 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:52:19.288 UTC [policies] GetPolicy -> DEBU 16a5 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:52:19.288 UTC [policies] NewManagerImpl -> DEBU 16a6 Proposed new policy Endorsement for Channel/Application" +"2020-08-31 20:52:19.289 UTC [policies] GetPolicy -> DEBU 16a7 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:52:19.289 UTC [policies] GetPolicy -> DEBU 16a8 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:52:19.289 UTC [policies] NewManagerImpl -> DEBU 16a9 Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-08-31 20:52:19.289 UTC [policies] NewManagerImpl -> DEBU 16aa Proposed new policy Readers for Channel/Application" +"2020-08-31 20:52:19.289 UTC [policies] NewManagerImpl -> DEBU 16ab Proposed new policy Writers for Channel/Application" +"2020-08-31 20:52:19.289 UTC [policies] NewManagerImpl -> DEBU 16ac Proposed new policy Admins for Channel" +"2020-08-31 20:52:19.289 UTC [policies] NewManagerImpl -> DEBU 16ad Proposed new policy Readers for Channel" +"2020-08-31 20:52:19.289 UTC [policies] NewManagerImpl -> DEBU 16ae Proposed new policy Writers for Channel" +"2020-08-31 20:52:19.289 UTC [common.configtx] addToMap -> DEBU 16af Adding to config map: [Group] /Channel" +"2020-08-31 20:52:19.289 UTC [common.configtx] addToMap -> DEBU 16b0 Adding to config map: [Group] /Channel/Orderer" +"2020-08-31 20:52:19.289 UTC [common.configtx] addToMap -> DEBU 16b1 Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-08-31 20:52:19.289 UTC [common.configtx] addToMap -> DEBU 16b2 Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-08-31 20:52:19.289 UTC [common.configtx] addToMap -> DEBU 16b3 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-08-31 20:52:19.289 UTC [common.configtx] addToMap -> DEBU 16b4 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16b5 Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16b6 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16b7 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16b8 Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16b9 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16ba Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16bb Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16bc Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16bd Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16be Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16bf Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16c0 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16c1 Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2020-08-31 20:52:19.290 UTC [common.configtx] addToMap -> DEBU 16c2 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-08-31 20:52:19.294 UTC [common.configtx] addToMap -> DEBU 16c3 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:19.294 UTC [common.configtx] addToMap -> DEBU 16c4 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-08-31 20:52:19.297 UTC [common.configtx] addToMap -> DEBU 16c5 Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-08-31 20:52:19.297 UTC [common.configtx] addToMap -> DEBU 16c6 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:52:19.297 UTC [common.configtx] addToMap -> DEBU 16c7 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-08-31 20:52:19.297 UTC [common.configtx] addToMap -> DEBU 16c8 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-08-31 20:52:19.297 UTC [common.configtx] addToMap -> DEBU 16c9 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:52:19.297 UTC [common.configtx] addToMap -> DEBU 16ca Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:52:19.297 UTC [common.configtx] addToMap -> DEBU 16cb Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:19.297 UTC [common.configtx] addToMap -> DEBU 16cc Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:52:19.297 UTC [common.configtx] addToMap -> DEBU 16cd Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16ce Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16cf Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16d0 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16d1 Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16d2 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16d3 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16d4 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16d5 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16d6 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16d7 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:52:19.298 UTC [common.configtx] addToMap -> DEBU 16d8 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:52:19.299 UTC [common.configtx] addToMap -> DEBU 16d9 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-08-31 20:52:19.299 UTC [common.configtx] addToMap -> DEBU 16da Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-08-31 20:52:19.299 UTC [common.configtx] addToMap -> DEBU 16db Adding to config map: [Value] /Channel/Consortium" +"2020-08-31 20:52:19.299 UTC [common.configtx] addToMap -> DEBU 16dc Adding to config map: [Value] /Channel/Capabilities" +"2020-08-31 20:52:19.299 UTC [common.configtx] addToMap -> DEBU 16dd Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-08-31 20:52:19.299 UTC [common.configtx] addToMap -> DEBU 16de Adding to config map: [Policy] /Channel/Readers" +"2020-08-31 20:52:19.299 UTC [common.configtx] addToMap -> DEBU 16df Adding to config map: [Policy] /Channel/Writers" +"2020-08-31 20:52:19.299 UTC [common.configtx] addToMap -> DEBU 16e0 Adding to config map: [Policy] /Channel/Admins" +"2020-08-31 20:52:19.300 UTC [orderer.consensus.etcdraft] propose -> INFO 16e1 Created block [6], there are 0 blocks in flight" channel=businesschannel node=1 +"2020-08-31 20:52:19.300 UTC [orderer.consensus.etcdraft] serveRequest -> INFO 16e2 Received config transaction, pause accepting transaction till it is committed" channel=businesschannel node=1 +"2020-08-31 20:52:19.304 UTC [orderer.consensus.etcdraft] 2 -> DEBU 16e3 Proposed block [6] to raft consensus" channel=businesschannel node=1 +"2020-08-31 20:52:19.304 UTC [orderer.common.broadcast] ProcessMessage -> DEBU 16e4 [channel: businesschannel] Broadcast has successfully enqueued message of type CONFIG_UPDATE from 172.18.0.9:50968" +"2020-08-31 20:52:19.305 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16e5 Sending msg of 40278 bytes to 2 on channel businesschannel took 14.4µs" +"2020-08-31 20:52:19.305 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16e6 Sending msg of 40278 bytes to 3 on channel businesschannel took 117.4µs" +"2020-08-31 20:52:19.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16e7 Send of ConsensusRequest for channel businesschannel with payload of size 40278 to orderer2.example.com(orderer2.example.com:7050) took 272.7µs " +"2020-08-31 20:52:19.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16e8 Send of ConsensusRequest for channel businesschannel with payload of size 40278 to orderer1.example.com(orderer1.example.com:7050) took 59.6µs " +"2020-08-31 20:52:19.312 UTC [orderer.common.cluster.step] handleMessage -> DEBU 16e9 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:19.312 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16ea Sending msg of 28 bytes to 2 on channel businesschannel took 14.4µs" +"2020-08-31 20:52:19.312 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 16eb Sending msg of 28 bytes to 3 on channel businesschannel took 6.3µs" +"2020-08-31 20:52:19.312 UTC [orderer.common.cluster.step] sendMessage -> DEBU 16ec Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.5µs " +"2020-08-31 20:52:19.312 UTC [orderer.consensus.etcdraft] writeBlock -> INFO 16ed Writing block [6] (Raft index: 10) to ledger" channel=businesschannel node=1 +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16ee Adding to config map: [Group] /Channel" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16ef Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f0 Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f1 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f2 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f3 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f4 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f5 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f6 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f7 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f8 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16f9 Adding to config map: [Group] /Channel" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16fa Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16fb Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16fc Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16fd Adding to config map: [Group] /Channel/Application/Org3MSP" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16fe Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 16ff Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 1700 Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 1701 Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 1702 Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 1703 Adding to config map: [Value] /Channel/Application/ACLs" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 1704 Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 1705 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 1706 Adding to config map: [Policy] /Channel/Application/Readers" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 1707 Adding to config map: [Policy] /Channel/Application/Writers" +"2020-08-31 20:52:19.313 UTC [common.configtx] addToMap -> DEBU 1708 Adding to config map: [Policy] /Channel/Application/Admins" +"2020-08-31 20:52:19.314 UTC [common.configtx] addToMap -> DEBU 1709 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:52:19.314 UTC [common.configtx] verifyDeltaSet -> DEBU 170a Processing change to key: [Group] /Channel/Application" +"2020-08-31 20:52:19.314 UTC [common.configtx] policyForItem -> DEBU 170b Getting policy for item Application with mod_policy Admins" +"2020-08-31 20:52:19.314 UTC [policies] Manager -> DEBU 170c Manager Channel looking up path []" +"2020-08-31 20:52:19.314 UTC [policies] Manager -> DEBU 170d Manager Channel has managers Orderer" +"2020-08-31 20:52:19.314 UTC [policies] Manager -> DEBU 170e Manager Channel has managers Application" +"2020-08-31 20:52:19.314 UTC [policies] Manager -> DEBU 170f Manager Channel looking up path [Application]" +"2020-08-31 20:52:19.314 UTC [policies] Manager -> DEBU 1710 Manager Channel has managers Orderer" +"2020-08-31 20:52:19.314 UTC [policies] Manager -> DEBU 1711 Manager Channel has managers Application" +"2020-08-31 20:52:19.314 UTC [policies] Manager -> DEBU 1712 Manager Channel/Application looking up path []" +"2020-08-31 20:52:19.314 UTC [policies] Manager -> DEBU 1713 Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:52:19.314 UTC [policies] Manager -> DEBU 1714 Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:52:19.314 UTC [policies] Evaluate -> DEBU 1715 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins ==" +"2020-08-31 20:52:19.314 UTC [policies] Evaluate -> DEBU 1716 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:19.314 UTC [policies] Evaluate -> DEBU 1717 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins ==" +"2020-08-31 20:52:19.314 UTC [cauthdsl] deduplicate -> WARN 1718 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +"2020-08-31 20:52:19.314 UTC [cauthdsl] func1 -> DEBU 1719 0xc0010f97a0 gate 1598907139314689500 evaluation starts" +"2020-08-31 20:52:19.314 UTC [cauthdsl] func2 -> DEBU 171a 0xc0010f97a0 signed by 0 principal evaluation starts (used [false false false])" +"2020-08-31 20:52:19.314 UTC [cauthdsl] func2 -> DEBU 171b 0xc0010f97a0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:19.314 UTC [cauthdsl] func2 -> DEBU 171c 0xc0010f97a0 principal matched by identity 0" +"2020-08-31 20:52:19.314 UTC [msp.identity] Verify -> DEBU 171d Verify: digest = 00000000 74 79 4d e9 a3 71 1d 24 0f fe ed 23 9d 11 9b 00 |tyM..q.$...#....| +00000010 3e 25 10 29 78 cb 07 bc 16 8a c0 53 e9 e3 ae 76 |>%.)x......S...v|" +"2020-08-31 20:52:19.314 UTC [msp.identity] Verify -> DEBU 171e Verify: sig = 00000000 30 45 02 21 00 ed 6e 97 55 ce e1 8f 4a 2e 44 e9 |0E.!..n.U...J.D.| +00000010 86 cc c7 d8 15 32 92 11 5c 0f ae 9c 24 1e e3 31 |.....2..\...$..1| +00000020 b0 8c 3d 39 f2 02 20 6c 7f 82 68 b5 f7 a9 fc 04 |..=9.. l..h.....| +00000030 9c c0 f7 ee 68 f9 99 1d 35 23 c7 b2 62 e6 51 30 |....h...5#..b.Q0| +00000040 4f f1 8e 15 f4 64 79 |O....dy|" +"2020-08-31 20:52:19.315 UTC [cauthdsl] func2 -> DEBU 171f 0xc0010f97a0 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:19.315 UTC [cauthdsl] func1 -> DEBU 1720 0xc0010f97a0 gate 1598907139314689500 evaluation succeeds" +"2020-08-31 20:52:19.315 UTC [policies] Evaluate -> DEBU 1721 Signature set satisfies policy /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:52:19.315 UTC [policies] Evaluate -> DEBU 1722 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:52:19.315 UTC [policies] Evaluate -> DEBU 1723 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins ==" +"2020-08-31 20:52:19.315 UTC [cauthdsl] deduplicate -> WARN 1724 De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set" +"2020-08-31 20:52:19.315 UTC [cauthdsl] func1 -> DEBU 1725 0xc0010f9d70 gate 1598907139315431400 evaluation starts" +"2020-08-31 20:52:19.315 UTC [cauthdsl] func2 -> DEBU 1726 0xc0010f9d70 signed by 0 principal evaluation starts (used [false false false])" +"2020-08-31 20:52:19.315 UTC [cauthdsl] func2 -> DEBU 1727 0xc0010f9d70 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:19.315 UTC [cauthdsl] func2 -> DEBU 1728 0xc0010f9d70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP)" +"2020-08-31 20:52:19.315 UTC [cauthdsl] func2 -> DEBU 1729 0xc0010f9d70 processing identity 1 with bytes of fe10e0" +"2020-08-31 20:52:19.315 UTC [cauthdsl] func2 -> DEBU 172a 0xc0010f9d70 principal matched by identity 1" +"2020-08-31 20:52:19.315 UTC [msp.identity] Verify -> DEBU 172b Verify: digest = 00000000 1c 16 ac 57 86 d3 c3 21 1e c6 7b f6 f4 33 15 53 |...W...!..{..3.S| +00000010 51 0a 12 8c c9 dc af 08 54 64 1f 16 1c 10 79 1c |Q.......Td....y.|" +"2020-08-31 20:52:19.315 UTC [msp.identity] Verify -> DEBU 172c Verify: sig = 00000000 30 45 02 21 00 fd 5d cb e8 72 66 8f d2 c7 ff a3 |0E.!..]..rf.....| +00000010 aa d3 dc 46 c5 bd 34 a5 d8 7d dc a8 35 2c d6 29 |...F..4..}..5,.)| +00000020 07 b0 75 b1 d5 02 20 0a ef 18 c5 de bf be 2c 7c |..u... .......,|| +00000030 16 ea 9e 3a ba 4b 56 95 85 92 21 ee 94 17 ad 3b |...:.KV...!....;| +00000040 78 aa 13 9c c2 d4 33 |x.....3|" +"2020-08-31 20:52:19.315 UTC [cauthdsl] func2 -> DEBU 172d 0xc0010f9d70 principal evaluation succeeds for identity 1" +"2020-08-31 20:52:19.315 UTC [cauthdsl] func1 -> DEBU 172e 0xc0010f9d70 gate 1598907139315431400 evaluation succeeds" +"2020-08-31 20:52:19.315 UTC [policies] Evaluate -> DEBU 172f Signature set satisfies policy /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:52:19.316 UTC [policies] Evaluate -> DEBU 1730 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:52:19.316 UTC [policies] Evaluate -> DEBU 1731 Signature set satisfies policy /Channel/Application/Admins" +"2020-08-31 20:52:19.316 UTC [policies] Evaluate -> DEBU 1732 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins" +"2020-08-31 20:52:19.316 UTC [common.configtx] verifyDeltaSet -> DEBU 1733 Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:19.316 UTC [common.configtx] verifyDeltaSet -> DEBU 1734 Processing change to key: [Group] /Channel/Application/Org3MSP" +"2020-08-31 20:52:19.316 UTC [common.configtx] verifyDeltaSet -> DEBU 1735 Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-08-31 20:52:19.316 UTC [common.configtx] verifyDeltaSet -> DEBU 1736 Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-08-31 20:52:19.316 UTC [common.configtx] verifyDeltaSet -> DEBU 1737 Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-08-31 20:52:19.316 UTC [common.configtx] verifyDeltaSet -> DEBU 1738 Processing change to key: [Value] /Channel/Application/Org3MSP/MSP" +"2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 1739 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 173a Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 173b Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 173c Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 173d Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 173e Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 173f Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 1740 Setting policy for key Endorsement to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 1741 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 1742 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 1743 Setting policy for key Admins to " +"2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 1744 Setting policy for key Endorsement to " +"2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 1745 Setting policy for key LifecycleEndorsement to " +"2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 1746 Setting policy for key Readers to " +"2020-08-31 20:52:19.316 UTC [common.configtx] recurseConfigMap -> DEBU 1747 Setting policy for key Writers to " +"2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 1748 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 1749 Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 174a Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 174b Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 174c Setting policy for key BlockValidation to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 174d Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 174e Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 174f Setting policy for key Readers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 1750 Setting policy for key Writers to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.317 UTC [common.configtx] recurseConfigMap -> DEBU 1751 Setting policy for key Admins to policy: mod_policy:"Admins" " +"2020-08-31 20:52:19.317 UTC [common.channelconfig] NewStandardValues -> DEBU 1752 Initializing protos for *channelconfig.ChannelProtos" +"2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1753 Processing field: HashingAlgorithm" +"2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1754 Processing field: BlockDataHashingStructure" +"2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1755 Processing field: OrdererAddresses" +"2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1756 Processing field: Consortium" +"2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1757 Processing field: Capabilities" +"2020-08-31 20:52:19.317 UTC [common.channelconfig] NewStandardValues -> DEBU 1758 Initializing protos for *channelconfig.OrdererProtos" +"2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1759 Processing field: ConsensusType" +"2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175a Processing field: BatchSize" +"2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175b Processing field: BatchTimeout" +"2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175c Processing field: KafkaBrokers" +"2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175d Processing field: ChannelRestrictions" +"2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 175e Processing field: Capabilities" +"2020-08-31 20:52:19.317 UTC [common.channelconfig] NewStandardValues -> DEBU 175f Initializing protos for *channelconfig.OrdererOrgProtos" +"2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1760 Processing field: Endpoints" +"2020-08-31 20:52:19.317 UTC [common.channelconfig] NewStandardValues -> DEBU 1761 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:52:19.317 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1762 Processing field: MSP" +"2020-08-31 20:52:19.317 UTC [common.channelconfig] validateMSP -> DEBU 1763 Setting up MSP for org OrdererOrg" +"2020-08-31 20:52:19.318 UTC [msp] newBccspMsp -> DEBU 1764 Creating BCCSP-based MSP instance" +"2020-08-31 20:52:19.318 UTC [msp] New -> DEBU 1765 Creating Cache-MSP instance" +"2020-08-31 20:52:19.318 UTC [msp] Setup -> DEBU 1766 Setting up MSP instance OrdererMSP" +"2020-08-31 20:52:19.318 UTC [msp.identity] newIdentity -> DEBU 1767 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE-----" +"2020-08-31 20:52:19.318 UTC [common.channelconfig] NewStandardValues -> DEBU 1768 Initializing protos for *channelconfig.ApplicationProtos" +"2020-08-31 20:52:19.319 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1769 Processing field: ACLs" +"2020-08-31 20:52:19.319 UTC [common.channelconfig] initializeProtosStruct -> DEBU 176a Processing field: Capabilities" +"2020-08-31 20:52:19.319 UTC [common.channelconfig] NewStandardValues -> DEBU 176b Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:52:19.319 UTC [common.channelconfig] initializeProtosStruct -> DEBU 176c Processing field: AnchorPeers" +"2020-08-31 20:52:19.319 UTC [common.channelconfig] NewStandardValues -> DEBU 176d Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:52:19.319 UTC [common.channelconfig] initializeProtosStruct -> DEBU 176e Processing field: MSP" +"2020-08-31 20:52:19.319 UTC [common.channelconfig] Validate -> DEBU 176f Anchor peers for org Org3MSP are " +"2020-08-31 20:52:19.319 UTC [common.channelconfig] validateMSP -> DEBU 1770 Setting up MSP for org Org3MSP" +"2020-08-31 20:52:19.319 UTC [msp] newBccspMsp -> DEBU 1771 Creating BCCSP-based MSP instance" +"2020-08-31 20:52:19.319 UTC [msp] New -> DEBU 1772 Creating Cache-MSP instance" +"2020-08-31 20:52:19.319 UTC [msp] Setup -> DEBU 1773 Setting up MSP instance Org3MSP" +"2020-08-31 20:52:19.319 UTC [msp.identity] newIdentity -> DEBU 1774 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE-----" +"2020-08-31 20:52:19.319 UTC [common.channelconfig] NewStandardValues -> DEBU 1775 Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:52:19.319 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1776 Processing field: AnchorPeers" +"2020-08-31 20:52:19.319 UTC [common.channelconfig] NewStandardValues -> DEBU 1777 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:52:19.319 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1778 Processing field: MSP" +"2020-08-31 20:52:19.319 UTC [common.channelconfig] Validate -> DEBU 1779 Anchor peers for org Org1MSP are anchor_peers: " +"2020-08-31 20:52:19.319 UTC [common.channelconfig] validateMSP -> DEBU 177a Setting up MSP for org Org1MSP" +"2020-08-31 20:52:19.319 UTC [msp] newBccspMsp -> DEBU 177b Creating BCCSP-based MSP instance" +"2020-08-31 20:52:19.320 UTC [msp] New -> DEBU 177c Creating Cache-MSP instance" +"2020-08-31 20:52:19.320 UTC [msp] Setup -> DEBU 177d Setting up MSP instance Org1MSP" +"2020-08-31 20:52:19.320 UTC [msp.identity] newIdentity -> DEBU 177e Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE-----" +"2020-08-31 20:52:19.320 UTC [common.channelconfig] NewStandardValues -> DEBU 177f Initializing protos for *channelconfig.ApplicationOrgProtos" +"2020-08-31 20:52:19.321 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1780 Processing field: AnchorPeers" +"2020-08-31 20:52:19.321 UTC [common.channelconfig] NewStandardValues -> DEBU 1781 Initializing protos for *channelconfig.OrganizationProtos" +"2020-08-31 20:52:19.321 UTC [common.channelconfig] initializeProtosStruct -> DEBU 1782 Processing field: MSP" +"2020-08-31 20:52:19.321 UTC [common.channelconfig] Validate -> DEBU 1783 Anchor peers for org Org2MSP are anchor_peers: " +"2020-08-31 20:52:19.321 UTC [common.channelconfig] validateMSP -> DEBU 1784 Setting up MSP for org Org2MSP" +"2020-08-31 20:52:19.321 UTC [msp] newBccspMsp -> DEBU 1785 Creating BCCSP-based MSP instance" +"2020-08-31 20:52:19.321 UTC [msp] New -> DEBU 1786 Creating Cache-MSP instance" +"2020-08-31 20:52:19.322 UTC [msp] Setup -> DEBU 1787 Setting up MSP instance Org2MSP" +"2020-08-31 20:52:19.322 UTC [msp.identity] newIdentity -> DEBU 1788 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE-----" +"2020-08-31 20:52:19.322 UTC [msp] Setup -> DEBU 1789 Setting up the MSP manager (4 msps)" +"2020-08-31 20:52:19.322 UTC [msp] Setup -> DEBU 178a MSP manager setup complete, setup 4 msps" +"2020-08-31 20:52:19.322 UTC [policies] NewManagerImpl -> DEBU 178b Proposed new policy Endorsement for Channel/Application/Org3MSP" +"2020-08-31 20:52:19.322 UTC [policies] NewManagerImpl -> DEBU 178c Proposed new policy Readers for Channel/Application/Org3MSP" +"2020-08-31 20:52:19.322 UTC [policies] NewManagerImpl -> DEBU 178d Proposed new policy Writers for Channel/Application/Org3MSP" +"2020-08-31 20:52:19.322 UTC [policies] NewManagerImpl -> DEBU 178e Proposed new policy Admins for Channel/Application/Org3MSP" +"2020-08-31 20:52:19.322 UTC [policies] NewManagerImpl -> DEBU 178f Proposed new policy Admins for Channel/Application/Org1MSP" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 1790 Proposed new policy Readers for Channel/Application/Org1MSP" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 1791 Proposed new policy Writers for Channel/Application/Org1MSP" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 1792 Proposed new policy Writers for Channel/Application/Org2MSP" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 1793 Proposed new policy Admins for Channel/Application/Org2MSP" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 1794 Proposed new policy Readers for Channel/Application/Org2MSP" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 1795 Proposed new policy Admins for Channel/Application" +"2020-08-31 20:52:19.323 UTC [policies] GetPolicy -> DEBU 1796 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:52:19.323 UTC [policies] GetPolicy -> DEBU 1797 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 1798 Proposed new policy Endorsement for Channel/Application" +"2020-08-31 20:52:19.323 UTC [policies] GetPolicy -> DEBU 1799 Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement" +"2020-08-31 20:52:19.323 UTC [policies] GetPolicy -> DEBU 179a Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 179b Proposed new policy LifecycleEndorsement for Channel/Application" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 179c Proposed new policy Readers for Channel/Application" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 179d Proposed new policy Writers for Channel/Application" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 179e Proposed new policy Admins for Channel/Orderer/OrdererOrg" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 179f Proposed new policy Readers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 17a0 Proposed new policy Writers for Channel/Orderer/OrdererOrg" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 17a1 Proposed new policy Admins for Channel/Orderer" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 17a2 Proposed new policy BlockValidation for Channel/Orderer" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 17a3 Proposed new policy Readers for Channel/Orderer" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 17a4 Proposed new policy Writers for Channel/Orderer" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 17a5 Proposed new policy Readers for Channel" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 17a6 Proposed new policy Writers for Channel" +"2020-08-31 20:52:19.323 UTC [policies] NewManagerImpl -> DEBU 17a7 Proposed new policy Admins for Channel" +"2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17a8 Adding to config map: [Group] /Channel" +"2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17a9 Adding to config map: [Group] /Channel/Orderer" +"2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17aa Adding to config map: [Group] /Channel/Orderer/OrdererOrg" +"2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17ab Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP" +"2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17ac Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins" +"2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17ad Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17ae Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers" +"2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17af Adding to config map: [Value] /Channel/Orderer/BatchTimeout" +"2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17b0 Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions" +"2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17b1 Adding to config map: [Value] /Channel/Orderer/Capabilities" +"2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17b2 Adding to config map: [Value] /Channel/Orderer/ConsensusType" +"2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17b3 Adding to config map: [Value] /Channel/Orderer/BatchSize" +"2020-08-31 20:52:19.323 UTC [common.configtx] addToMap -> DEBU 17b4 Adding to config map: [Policy] /Channel/Orderer/Readers" +"2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17b5 Adding to config map: [Policy] /Channel/Orderer/Writers" +"2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17b6 Adding to config map: [Policy] /Channel/Orderer/Admins" +"2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17b7 Adding to config map: [Policy] /Channel/Orderer/BlockValidation" +"2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17b8 Adding to config map: [Group] /Channel/Application" +"2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17b9 Adding to config map: [Group] /Channel/Application/Org3MSP" +"2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17ba Adding to config map: [Value] /Channel/Application/Org3MSP/MSP" +"2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17bb Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17bc Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers" +"2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17bd Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins" +"2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17be Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement" +"2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17bf Adding to config map: [Group] /Channel/Application/Org1MSP" +"2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17c0 Adding to config map: [Value] /Channel/Application/Org1MSP/MSP" +"2020-08-31 20:52:19.324 UTC [common.configtx] addToMap -> DEBU 17c1 Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17c2 Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17c3 Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17c4 Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17c5 Adding to config map: [Group] /Channel/Application/Org2MSP" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17c6 Adding to config map: [Value] /Channel/Application/Org2MSP/MSP" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17c7 Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17c8 Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17c9 Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17ca Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17cb Adding to config map: [Value] /Channel/Application/ACLs" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17cc Adding to config map: [Value] /Channel/Application/Capabilities" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17cd Adding to config map: [Policy] /Channel/Application/Readers" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17ce Adding to config map: [Policy] /Channel/Application/Writers" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17cf Adding to config map: [Policy] /Channel/Application/Admins" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17d0 Adding to config map: [Policy] /Channel/Application/Endorsement" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17d1 Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17d2 Adding to config map: [Value] /Channel/Consortium" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17d3 Adding to config map: [Value] /Channel/Capabilities" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17d4 Adding to config map: [Value] /Channel/HashingAlgorithm" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17d5 Adding to config map: [Value] /Channel/BlockDataHashingStructure" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17d6 Adding to config map: [Value] /Channel/OrdererAddresses" +"2020-08-31 20:52:19.325 UTC [common.deliver] Handle -> WARN 17d7 Error reading from 172.18.0.9:50966: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17d8 Adding to config map: [Policy] /Channel/Readers" +"2020-08-31 20:52:19.325 UTC [orderer.common.server] func1 -> DEBU 17d9 Closing Deliver stream" +"2020-08-31 20:52:19.325 UTC [common.configtx] addToMap -> DEBU 17da Adding to config map: [Policy] /Channel/Writers" +"2020-08-31 20:52:19.326 UTC [common.configtx] addToMap -> DEBU 17db Adding to config map: [Policy] /Channel/Admins" +"2020-08-31 20:52:19.325 UTC [comm.grpc.server] 1 -> INFO 17dc streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50966 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=120.048ms +"2020-08-31 20:52:19.326 UTC [common.channelconfig] LogSanityChecks -> DEBU 17dd As expected, current configuration has policy '/Channel/Readers'" +"2020-08-31 20:52:19.326 UTC [common.channelconfig] LogSanityChecks -> DEBU 17de As expected, current configuration has policy '/Channel/Writers'" +"2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17df Manager Channel looking up path [Application]" +"2020-08-31 20:52:19.326 UTC [grpc] warningf -> DEBU 17e0 transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.3:7050->172.18.0.9:50968: read: connection reset by peer" +"2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17e1 Manager Channel has managers Orderer" +"2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17e2 Manager Channel has managers Application" +"2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17e3 Manager Channel/Application looking up path []" +"2020-08-31 20:52:19.326 UTC [orderer.common.broadcast] Handle -> WARN 17e4 Error reading from 172.18.0.9:50968: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17e5 Manager Channel/Application has managers Org3MSP" +"2020-08-31 20:52:19.326 UTC [orderer.common.server] func1 -> DEBU 17e6 Closing Broadcast stream" +"2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17e7 Manager Channel/Application has managers Org1MSP" +"2020-08-31 20:52:19.326 UTC [comm.grpc.server] 1 -> INFO 17e8 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Broadcast grpc.peer_address=172.18.0.9:50968 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=107.4013ms +"2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17e9 Manager Channel/Application has managers Org2MSP" +"2020-08-31 20:52:19.326 UTC [common.channelconfig] LogSanityChecks -> DEBU 17ea As expected, current configuration has policy '/Channel/Application/Readers'" +"2020-08-31 20:52:19.326 UTC [common.channelconfig] LogSanityChecks -> DEBU 17eb As expected, current configuration has policy '/Channel/Application/Writers'" +"2020-08-31 20:52:19.326 UTC [common.channelconfig] LogSanityChecks -> DEBU 17ec As expected, current configuration has policy '/Channel/Application/Admins'" +"2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17ed Manager Channel looking up path [Orderer]" +"2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17ee Manager Channel has managers Application" +"2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17ef Manager Channel has managers Orderer" +"2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17f0 Manager Channel/Orderer looking up path []" +"2020-08-31 20:52:19.326 UTC [policies] Manager -> DEBU 17f1 Manager Channel/Orderer has managers OrdererOrg" +"2020-08-31 20:52:19.326 UTC [common.channelconfig] LogSanityChecks -> DEBU 17f2 As expected, current configuration has policy '/Channel/Orderer/BlockValidation'" +"2020-08-31 20:52:19.326 UTC [common.channelconfig] LogSanityChecks -> DEBU 17f3 As expected, current configuration has policy '/Channel/Orderer/Admins'" +"2020-08-31 20:52:19.326 UTC [common.channelconfig] LogSanityChecks -> DEBU 17f4 As expected, current configuration has policy '/Channel/Orderer/Writers'" +"2020-08-31 20:52:19.326 UTC [common.channelconfig] LogSanityChecks -> DEBU 17f5 As expected, current configuration has policy '/Channel/Orderer/Readers'" +"2020-08-31 20:52:19.326 UTC [common.capabilities] Supported -> DEBU 17f6 Orderer capability V1_4_2 is supported and is enabled" +"2020-08-31 20:52:19.326 UTC [common.capabilities] Supported -> DEBU 17f7 Channel capability V1_4_3 is supported and is enabled" +"2020-08-31 20:52:19.326 UTC [grpc] infof -> DEBU 17f8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:19.326 UTC [orderer.common.server] func1 -> DEBU 17f9 Executing callback to update root CAs" +"2020-08-31 20:52:19.326 UTC [grpc] infof -> DEBU 17fa transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:19.326 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17fb updating root CAs for channel [businesschannel]" +"2020-08-31 20:52:19.326 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17fc adding app root CAs for MSP [Org1MSP]" +"2020-08-31 20:52:19.326 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17fd adding app root CAs for MSP [Org2MSP]" +"2020-08-31 20:52:19.326 UTC [orderer.common.cluster.step] handleMessage -> DEBU 17fe Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:19.326 UTC [orderer.common.server] updateTrustedRoots -> DEBU 17ff adding orderer root CAs for MSP [OrdererMSP]" +"2020-08-31 20:52:19.327 UTC [orderer.common.server] updateTrustedRoots -> DEBU 1800 adding app root CAs for MSP [Org3MSP]" +"2020-08-31 20:52:19.327 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1801 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:19.327 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1802 Sending msg of 28 bytes to 3 on channel testchainid took 12.8µs" +"2020-08-31 20:52:19.327 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1803 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.4µs " +"2020-08-31 20:52:19.327 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1804 [channel: businesschannel] Detected lastConfigSeq transitioning from 3 to 4, setting lastConfigBlockNum from 2 to 6" +"2020-08-31 20:52:19.327 UTC [orderer.commmon.multichannel] addLastConfigSignature -> DEBU 1805 [channel: businesschannel] About to write block, setting its LAST_CONFIG to 6" +"2020-08-31 20:52:19.327 UTC [msp] GetDefaultSigningIdentity -> DEBU 1806 Obtaining default signing identity" +"2020-08-31 20:52:19.327 UTC [msp] GetDefaultSigningIdentity -> DEBU 1807 Obtaining default signing identity" +"2020-08-31 20:52:19.327 UTC [msp.identity] Sign -> DEBU 1808 Sign: plaintext: 0A020806120B0A090A03010203100418...97167A35BC2EF596E841A44977FE0063 " +"2020-08-31 20:52:19.327 UTC [msp.identity] Sign -> DEBU 1809 Sign: digest: 4DE366B00743C9C1649D7F395138D479CEB4AAC9626E44526CECE2DE78BACD1F " +"2020-08-31 20:52:19.330 UTC [fsblkstorage] indexBlock -> DEBU 180a Indexing block [blockNum=6, blockHash=[]byte{0xee, 0x50, 0x5e, 0x32, 0xbb, 0x9a, 0x52, 0xe4, 0xd5, 0xa5, 0xcd, 0xd8, 0x92, 0x7, 0xb9, 0x48, 0x99, 0xcf, 0x4a, 0x4f, 0xd4, 0x14, 0x2, 0xe7, 0xd3, 0xba, 0x81, 0x57, 0xfe, 0x38, 0x65, 0xd} txOffsets= +txId=7f1fe83799f527adf316dfcd38e1f157d571d6adfecc0451fce63bd20f6fd24b locPointer=offset=71, bytesLength=40147 +]" +"2020-08-31 20:52:19.331 UTC [fsblkstorage] updateCheckpoint -> DEBU 180b Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138571], isChainEmpty=[false], lastBlockNumber=[6]" +"2020-08-31 20:52:19.331 UTC [orderer.commmon.multichannel] commitBlock -> DEBU 180c [channel: businesschannel] Wrote block [6]" +"2020-08-31 20:52:19.331 UTC [fsblkstorage] waitForBlock -> DEBU 180d Came out of wait. maxAvailaBlockNumber=[6]" +"2020-08-31 20:52:19.332 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 180e Remaining bytes=[41179], Going to peek [8] bytes" +"2020-08-31 20:52:19.332 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 180f Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97392], bytesOffset=[97395]}" +"2020-08-31 20:52:19.332 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1810 blockbytes [41176] read from file [0]" +"2020-08-31 20:52:19.332 UTC [policies] Evaluate -> DEBU 1811 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:19.332 UTC [policies] Evaluate -> DEBU 1812 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:19.332 UTC [policies] Evaluate -> DEBU 1813 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-08-31 20:52:19.332 UTC [policies] Evaluate -> DEBU 1814 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:19.334 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1815 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 146µs " +"2020-08-31 20:52:19.332 UTC [policies] Evaluate -> DEBU 1816 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-08-31 20:52:19.335 UTC [msp] DeserializeIdentity -> DEBU 1817 Obtaining identity" +"2020-08-31 20:52:19.335 UTC [msp.identity] newIdentity -> DEBU 1818 Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +-----END CERTIFICATE-----" +"2020-08-31 20:52:19.336 UTC [cauthdsl] func1 -> DEBU 1819 0xc000385f10 gate 1598907139336002200 evaluation starts" +"2020-08-31 20:52:19.336 UTC [cauthdsl] func2 -> DEBU 181a 0xc000385f10 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:19.336 UTC [cauthdsl] func2 -> DEBU 181b 0xc000385f10 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:19.336 UTC [cauthdsl] func2 -> DEBU 181c 0xc000385f10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP)" +"2020-08-31 20:52:19.336 UTC [cauthdsl] func2 -> DEBU 181d 0xc000385f10 principal evaluation fails" +"2020-08-31 20:52:19.336 UTC [cauthdsl] func1 -> DEBU 181e 0xc000385f10 gate 1598907139336002200 evaluation fails" +"2020-08-31 20:52:19.336 UTC [policies] Evaluate -> DEBU 181f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:19.336 UTC [policies] Evaluate -> DEBU 1820 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:19.343 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1821 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:19.344 UTC [policies] Evaluate -> DEBU 1822 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-08-31 20:52:19.344 UTC [cauthdsl] func1 -> DEBU 1823 0xc00124f0e0 gate 1598907139344639700 evaluation starts" +"2020-08-31 20:52:19.345 UTC [cauthdsl] func2 -> DEBU 1824 0xc00124f0e0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:19.345 UTC [cauthdsl] func2 -> DEBU 1825 0xc00124f0e0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:19.345 UTC [cauthdsl] func2 -> DEBU 1826 0xc00124f0e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP)" +"2020-08-31 20:52:19.345 UTC [cauthdsl] func2 -> DEBU 1827 0xc00124f0e0 principal evaluation fails" +"2020-08-31 20:52:19.345 UTC [cauthdsl] func1 -> DEBU 1828 0xc00124f0e0 gate 1598907139344639700 evaluation fails" +"2020-08-31 20:52:19.345 UTC [policies] Evaluate -> DEBU 1829 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:19.345 UTC [policies] Evaluate -> DEBU 182a == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:19.345 UTC [policies] Evaluate -> DEBU 182b == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-08-31 20:52:19.345 UTC [cauthdsl] func1 -> DEBU 182c 0xc00124fa60 gate 1598907139345865500 evaluation starts" +"2020-08-31 20:52:19.345 UTC [cauthdsl] func2 -> DEBU 182d 0xc00124fa60 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:19.345 UTC [cauthdsl] func2 -> DEBU 182e 0xc00124fa60 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:19.345 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 182f Checking if identity satisfies MEMBER role for Org2MSP" +"2020-08-31 20:52:19.345 UTC [msp] Validate -> DEBU 1830 MSP Org2MSP validating identity" +"2020-08-31 20:52:19.346 UTC [msp] getCertificationChain -> DEBU 1831 MSP Org2MSP getting certification chain" +"2020-08-31 20:52:19.346 UTC [cauthdsl] func2 -> DEBU 1832 0xc00124fa60 principal matched by identity 0" +"2020-08-31 20:52:19.346 UTC [msp.identity] Verify -> DEBU 1833 Verify: digest = 00000000 57 5b ee bb f7 e1 76 65 eb 70 21 da ba 1c a8 d0 |W[....ve.p!.....| +00000010 80 fc e8 bc 62 7d 37 2d 90 ae e5 1a a5 f9 38 c9 |....b}7-......8.|" +"2020-08-31 20:52:19.346 UTC [msp.identity] Verify -> DEBU 1834 Verify: sig = 00000000 30 44 02 20 6f 2a 9e 2e 15 ce b3 a9 88 a8 d3 ef |0D. o*..........| +00000010 61 ae 42 1f 51 86 ea d1 b4 ce 06 95 ae 6d 7f 5d |a.B.Q........m.]| +00000020 43 12 01 d0 02 20 02 e3 a8 43 f2 35 bf cf 62 43 |C.... ...C.5..bC| +00000030 c7 53 f2 04 cf 6d a8 32 cd 64 e5 12 82 bd e4 58 |.S...m.2.d.....X| +00000040 48 7d bb cc 85 d0 |H}....|" +"2020-08-31 20:52:19.346 UTC [cauthdsl] func2 -> DEBU 1835 0xc00124fa60 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:19.346 UTC [cauthdsl] func1 -> DEBU 1836 0xc00124fa60 gate 1598907139345865500 evaluation succeeds" +"2020-08-31 20:52:19.346 UTC [policies] Evaluate -> DEBU 1837 Signature set satisfies policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:19.346 UTC [policies] Evaluate -> DEBU 1838 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:19.346 UTC [policies] Evaluate -> DEBU 1839 Signature set satisfies policy /Channel/Application/Readers" +"2020-08-31 20:52:19.346 UTC [policies] Evaluate -> DEBU 183a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-08-31 20:52:19.346 UTC [policies] Evaluate -> DEBU 183b Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:19.346 UTC [policies] Evaluate -> DEBU 183c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:19.346 UTC [common.deliver] deliverBlocks -> DEBU 183d [channel: businesschannel] Delivering block [6] for (0xc000a09280) for 172.18.0.5:56650" +"2020-08-31 20:52:19.347 UTC [fsblkstorage] waitForBlock -> DEBU 183e Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2020-08-31 20:52:19.362 UTC [orderer.common.cluster.step] handleMessage -> DEBU 183f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:19.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1840 Sending msg of 28 bytes to 2 on channel businesschannel took 20.5µs" +"2020-08-31 20:52:19.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1841 Sending msg of 28 bytes to 3 on channel businesschannel took 12.1µs" +"2020-08-31 20:52:19.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1842 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 742µs " +"2020-08-31 20:52:19.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1843 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 371.5µs " +"2020-08-31 20:52:19.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1844 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:19.603 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1845 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:19.808 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1846 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:19.809 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1847 Sending msg of 28 bytes to 3 on channel testchainid took 439.8µs" +"2020-08-31 20:52:19.809 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1848 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 163.9µs " +"2020-08-31 20:52:20.096 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1849 Sending msg of 28 bytes to 2 on channel businesschannel took 23.2µs" +"2020-08-31 20:52:20.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 184a Sending msg of 28 bytes to 3 on channel businesschannel took 13.1µs" +"2020-08-31 20:52:20.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 184b Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 80µs " +"2020-08-31 20:52:20.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 184c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 111µs " +"2020-08-31 20:52:20.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 184d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:20.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 184e Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:20.305 UTC [orderer.common.cluster.step] handleMessage -> DEBU 184f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:20.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1850 Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" +"2020-08-31 20:52:20.307 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1851 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 808.7µs " +"2020-08-31 20:52:20.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1852 Sending msg of 28 bytes to 2 on channel businesschannel took 32.7µs" +"2020-08-31 20:52:20.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1854 Sending msg of 28 bytes to 3 on channel businesschannel took 31.5µs" +"2020-08-31 20:52:20.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1853 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 258.2µs " +"2020-08-31 20:52:20.600 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1855 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:20.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1856 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.6729ms " +"2020-08-31 20:52:20.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1857 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:20.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1858 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:20.808 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1859 Sending msg of 28 bytes to 3 on channel testchainid took 16.4µs" +"2020-08-31 20:52:20.808 UTC [orderer.common.cluster.step] sendMessage -> DEBU 185a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 94.7µs " +"2020-08-31 20:52:21.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 185b Sending msg of 28 bytes to 2 on channel businesschannel took 17.6µs" +"2020-08-31 20:52:21.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 185c Sending msg of 28 bytes to 3 on channel businesschannel took 14.1µs" +"2020-08-31 20:52:21.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 185d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 164.3µs " +"2020-08-31 20:52:21.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 185e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 648.1µs " +"2020-08-31 20:52:21.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 185f Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:21.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1860 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:21.307 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1861 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:21.307 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1862 Sending msg of 28 bytes to 3 on channel testchainid took 24.6µs" +"2020-08-31 20:52:21.307 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1863 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.8µs " +"2020-08-31 20:52:21.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1864 Sending msg of 28 bytes to 2 on channel businesschannel took 77.7µs" +"2020-08-31 20:52:21.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1865 Sending msg of 28 bytes to 3 on channel businesschannel took 24.1µs" +"2020-08-31 20:52:21.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1866 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 189.5µs " +"2020-08-31 20:52:21.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1867 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.5513ms " +"2020-08-31 20:52:21.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1868 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:21.604 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1869 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:21.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 186a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:21.807 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 186b Sending msg of 28 bytes to 3 on channel testchainid took 22.5µs" +"2020-08-31 20:52:21.807 UTC [orderer.common.cluster.step] sendMessage -> DEBU 186c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 97.9µs " +"2020-08-31 20:52:22.099 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 186d Sending msg of 28 bytes to 2 on channel businesschannel took 33.3µs" +"2020-08-31 20:52:22.100 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 186e Sending msg of 28 bytes to 3 on channel businesschannel took 103.2µs" +"2020-08-31 20:52:22.100 UTC [orderer.common.cluster.step] sendMessage -> DEBU 186f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 398.9µs " +"2020-08-31 20:52:22.101 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1870 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 801.2µs " +"2020-08-31 20:52:22.103 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1871 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:22.103 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1872 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:22.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1873 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:22.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1874 Sending msg of 28 bytes to 3 on channel testchainid took 19.5µs" +"2020-08-31 20:52:22.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1875 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 81.1µs " +"2020-08-31 20:52:22.515 UTC [orderer.common.server] Deliver -> DEBU 1876 Starting new Deliver handler" +"2020-08-31 20:52:22.515 UTC [common.deliver] Handle -> DEBU 1877 Starting new deliver loop for 172.18.0.9:50994" +"2020-08-31 20:52:22.515 UTC [common.deliver] Handle -> DEBU 1878 Attempting to read seek info message from 172.18.0.9:50994" +"2020-08-31 20:52:22.516 UTC [policies] Evaluate -> DEBU 1879 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:22.516 UTC [policies] Evaluate -> DEBU 187a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:22.516 UTC [policies] Evaluate -> DEBU 187b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-08-31 20:52:22.516 UTC [policies] Evaluate -> DEBU 187c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:22.516 UTC [policies] Evaluate -> DEBU 187d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-08-31 20:52:22.516 UTC [msp] DeserializeIdentity -> DEBU 187e Obtaining identity" +"2020-08-31 20:52:22.516 UTC [msp.identity] newIdentity -> DEBU 187f Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICGzCCAcGgAwIBAgIRAPu1Ez3ZVNp5pC42pWluRA0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGYxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMQ4wDAYDVQQLEwVhZG1pbjEaMBgGA1UEAwwRQWRtaW5AZXhhbXBsZS5jb20w +WTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAST/L3Ehef2zVbsBUv5ntESr5KoFOBf +jE5ZFF3hq+JwTwhnjqNz8jEz24zEaPOcN6euphJCx82fOkNl2ukWuz7to00wSzAO +BgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNVHSMEJDAigCBuUTFIPHfw +0niNdypXk1OlTzKgswdvi9OMJxnJOdvGsDAKBggqhkjOPQQDAgNIADBFAiEA3kLG +1XnnnLwHDTsdI2JA+iYNJ7qR/ELUBsZo5ElSknoCIGYUukBfbN2HwRxcCZrefM7P ++8n2/IwosEtn+wHpdsRI +-----END CERTIFICATE-----" +"2020-08-31 20:52:22.517 UTC [cauthdsl] func1 -> DEBU 1880 0xc000e95e90 gate 1598907142517574900 evaluation starts" +"2020-08-31 20:52:22.517 UTC [cauthdsl] func2 -> DEBU 1881 0xc000e95e90 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:22.517 UTC [cauthdsl] func2 -> DEBU 1882 0xc000e95e90 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:22.517 UTC [cauthdsl] func2 -> DEBU 1883 0xc000e95e90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-08-31 20:52:22.517 UTC [cauthdsl] func2 -> DEBU 1884 0xc000e95e90 principal evaluation fails" +"2020-08-31 20:52:22.517 UTC [cauthdsl] func1 -> DEBU 1885 0xc000e95e90 gate 1598907142517574900 evaluation fails" +"2020-08-31 20:52:22.517 UTC [policies] Evaluate -> DEBU 1886 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:22.517 UTC [policies] Evaluate -> DEBU 1887 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:22.517 UTC [policies] Evaluate -> DEBU 1888 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-08-31 20:52:22.517 UTC [cauthdsl] func1 -> DEBU 1889 0xc000e69280 gate 1598907142517977600 evaluation starts" +"2020-08-31 20:52:22.518 UTC [cauthdsl] func2 -> DEBU 188a 0xc000e69280 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:22.518 UTC [cauthdsl] func2 -> DEBU 188b 0xc000e69280 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:22.518 UTC [cauthdsl] func2 -> DEBU 188c 0xc000e69280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-08-31 20:52:22.518 UTC [cauthdsl] func2 -> DEBU 188d 0xc000e69280 principal evaluation fails" +"2020-08-31 20:52:22.518 UTC [cauthdsl] func1 -> DEBU 188e 0xc000e69280 gate 1598907142517977600 evaluation fails" +"2020-08-31 20:52:22.518 UTC [policies] Evaluate -> DEBU 188f Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:22.518 UTC [policies] Evaluate -> DEBU 1890 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:22.518 UTC [policies] Evaluate -> DEBU 1891 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-08-31 20:52:22.519 UTC [cauthdsl] func1 -> DEBU 1892 0xc000e69ae0 gate 1598907142518987300 evaluation starts" +"2020-08-31 20:52:22.519 UTC [cauthdsl] func2 -> DEBU 1893 0xc000e69ae0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:22.519 UTC [cauthdsl] func2 -> DEBU 1894 0xc000e69ae0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:22.519 UTC [cauthdsl] func2 -> DEBU 1895 0xc000e69ae0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-08-31 20:52:22.519 UTC [cauthdsl] func2 -> DEBU 1896 0xc000e69ae0 principal evaluation fails" +"2020-08-31 20:52:22.519 UTC [cauthdsl] func1 -> DEBU 1897 0xc000e69ae0 gate 1598907142518987300 evaluation fails" +"2020-08-31 20:52:22.519 UTC [policies] Evaluate -> DEBU 1898 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:22.519 UTC [policies] Evaluate -> DEBU 1899 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:22.519 UTC [policies] func1 -> DEBU 189a Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2020-08-31 20:52:22.519 UTC [policies] Evaluate -> DEBU 189b Signature set did not satisfy policy /Channel/Application/Readers" +"2020-08-31 20:52:22.519 UTC [policies] Evaluate -> DEBU 189c == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-08-31 20:52:22.519 UTC [policies] Evaluate -> DEBU 189d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:22.519 UTC [policies] Evaluate -> DEBU 189e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:22.519 UTC [policies] Evaluate -> DEBU 189f == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:22.520 UTC [cauthdsl] func1 -> DEBU 18a0 0xc000e2c7f0 gate 1598907142520001300 evaluation starts" +"2020-08-31 20:52:22.520 UTC [cauthdsl] func2 -> DEBU 18a1 0xc000e2c7f0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:22.520 UTC [cauthdsl] func2 -> DEBU 18a2 0xc000e2c7f0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:22.520 UTC [msp] satisfiesPrincipalInternalPreV13 -> DEBU 18a3 Checking if identity satisfies MEMBER role for OrdererMSP" +"2020-08-31 20:52:22.520 UTC [msp] Validate -> DEBU 18a4 MSP OrdererMSP validating identity" +"2020-08-31 20:52:22.521 UTC [msp] getCertificationChain -> DEBU 18a5 MSP OrdererMSP getting certification chain" +"2020-08-31 20:52:22.521 UTC [cauthdsl] func2 -> DEBU 18a6 0xc000e2c7f0 principal matched by identity 0" +"2020-08-31 20:52:22.521 UTC [msp.identity] Verify -> DEBU 18a7 Verify: digest = 00000000 98 89 f8 50 4b 43 3d fa a8 a4 e0 1e ab 2e 42 4b |...PKC=.......BK| +00000010 d6 f9 72 62 f6 11 6b 2f c7 a2 e4 f7 c6 d6 7a b7 |..rb..k/......z.|" +"2020-08-31 20:52:22.521 UTC [msp.identity] Verify -> DEBU 18a8 Verify: sig = 00000000 30 44 02 20 0b 96 14 c3 87 7d c5 58 6e f5 9f e5 |0D. .....}.Xn...| +00000010 1d f0 79 39 2f 48 ee 9c 1c 2f 4a 30 cf 6e 7d 0a |..y9/H.../J0.n}.| +00000020 d5 2b da aa 02 20 79 d6 08 e8 9b de 47 b2 22 af |.+... y.....G.".| +00000030 32 a0 3a 6d 67 41 c1 34 7f f2 4e 0f 10 f4 a8 e5 |2.:mgA.4..N.....| +00000040 ae 5e c2 96 be 20 |.^... |" +"2020-08-31 20:52:22.521 UTC [cauthdsl] func2 -> DEBU 18a9 0xc000e2c7f0 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:22.521 UTC [cauthdsl] func1 -> DEBU 18aa 0xc000e2c7f0 gate 1598907142520001300 evaluation succeeds" +"2020-08-31 20:52:22.521 UTC [policies] Evaluate -> DEBU 18ab Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:22.522 UTC [policies] Evaluate -> DEBU 18ac == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:22.522 UTC [policies] Evaluate -> DEBU 18ad Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:22.522 UTC [policies] Evaluate -> DEBU 18ae == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:22.522 UTC [policies] Evaluate -> DEBU 18af Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:22.522 UTC [policies] Evaluate -> DEBU 18b0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:22.522 UTC [common.deliver] deliverBlocks -> DEBU 18b1 [channel: businesschannel] Received seekInfo (0xc000d6ec80) start: > stop: > from 172.18.0.9:50994" +"2020-08-31 20:52:22.522 UTC [fsblkstorage] Next -> DEBU 18b2 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-08-31 20:52:22.522 UTC [fsblkstorage] newBlockfileStream -> DEBU 18b3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97392]" +"2020-08-31 20:52:22.522 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18b4 Remaining bytes=[41179], Going to peek [8] bytes" +"2020-08-31 20:52:22.522 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18b5 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97392], bytesOffset=[97395]}" +"2020-08-31 20:52:22.522 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 18b6 blockbytes [41176] read from file [0]" +"2020-08-31 20:52:22.523 UTC [common.deliver] deliverBlocks -> DEBU 18b7 [channel: businesschannel] Delivering block [6] for (0xc000d6ec80) for 172.18.0.9:50994" +"2020-08-31 20:52:22.523 UTC [common.deliver] deliverBlocks -> DEBU 18b8 [channel: businesschannel] Done delivering to 172.18.0.9:50994 for (0xc000d6ec80)" +"2020-08-31 20:52:22.523 UTC [common.deliver] Handle -> DEBU 18b9 Waiting for new SeekInfo from 172.18.0.9:50994" +"2020-08-31 20:52:22.523 UTC [common.deliver] Handle -> DEBU 18ba Attempting to read seek info message from 172.18.0.9:50994" +"2020-08-31 20:52:22.523 UTC [fsblkstorage] waitForBlock -> DEBU 18bb Came out of wait. maxAvailaBlockNumber=[6]" +"2020-08-31 20:52:22.523 UTC [fsblkstorage] waitForBlock -> DEBU 18bc Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2020-08-31 20:52:22.528 UTC [common.deliver] Handle -> WARN 18bd Error reading from 172.18.0.9:50994: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:22.528 UTC [orderer.common.server] func1 -> DEBU 18be Closing Deliver stream" +"2020-08-31 20:52:22.528 UTC [comm.grpc.server] 1 -> INFO 18bf streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50994 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.7273ms +"2020-08-31 20:52:22.528 UTC [grpc] infof -> DEBU 18c0 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:22.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18c1 Sending msg of 28 bytes to 2 on channel businesschannel took 23.6µs" +"2020-08-31 20:52:22.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 18c2 Sending msg of 28 bytes to 3 on channel businesschannel took 14.4µs" +"2020-08-31 20:52:22.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18c3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 247.7µs " +"2020-08-31 20:52:22.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 18c4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.0131ms " +"2020-08-31 20:52:22.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18c5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:22.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 18c6 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:22.658 UTC [orderer.common.server] Deliver -> DEBU 18c7 Starting new Deliver handler" +"2020-08-31 20:52:22.658 UTC [common.deliver] Handle -> DEBU 18c8 Starting new deliver loop for 172.18.0.9:50996" +"2020-08-31 20:52:22.658 UTC [common.deliver] Handle -> DEBU 18c9 Attempting to read seek info message from 172.18.0.9:50996" +"2020-08-31 20:52:22.659 UTC [policies] Evaluate -> DEBU 18ca == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:22.659 UTC [policies] Evaluate -> DEBU 18cb This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:22.659 UTC [policies] Evaluate -> DEBU 18cc == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-08-31 20:52:22.659 UTC [policies] Evaluate -> DEBU 18cd This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:22.659 UTC [policies] Evaluate -> DEBU 18ce == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-08-31 20:52:22.659 UTC [cauthdsl] func1 -> DEBU 18cf 0xc001135e80 gate 1598907142659785300 evaluation starts" +"2020-08-31 20:52:22.660 UTC [cauthdsl] func2 -> DEBU 18d0 0xc001135e80 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:22.660 UTC [cauthdsl] func2 -> DEBU 18d1 0xc001135e80 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:22.660 UTC [cauthdsl] func2 -> DEBU 18d2 0xc001135e80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-08-31 20:52:22.660 UTC [cauthdsl] func2 -> DEBU 18d3 0xc001135e80 principal evaluation fails" +"2020-08-31 20:52:22.660 UTC [cauthdsl] func1 -> DEBU 18d4 0xc001135e80 gate 1598907142659785300 evaluation fails" +"2020-08-31 20:52:22.660 UTC [policies] Evaluate -> DEBU 18d5 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:22.660 UTC [policies] Evaluate -> DEBU 18d6 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:22.660 UTC [policies] Evaluate -> DEBU 18d7 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-08-31 20:52:22.660 UTC [cauthdsl] func1 -> DEBU 18d8 0xc000d867c0 gate 1598907142660830000 evaluation starts" +"2020-08-31 20:52:22.660 UTC [cauthdsl] func2 -> DEBU 18d9 0xc000d867c0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:22.660 UTC [cauthdsl] func2 -> DEBU 18da 0xc000d867c0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:22.660 UTC [cauthdsl] func2 -> DEBU 18db 0xc000d867c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-08-31 20:52:22.660 UTC [cauthdsl] func2 -> DEBU 18dc 0xc000d867c0 principal evaluation fails" +"2020-08-31 20:52:22.661 UTC [cauthdsl] func1 -> DEBU 18dd 0xc000d867c0 gate 1598907142660830000 evaluation fails" +"2020-08-31 20:52:22.661 UTC [policies] Evaluate -> DEBU 18de Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:22.661 UTC [policies] Evaluate -> DEBU 18df == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:22.661 UTC [policies] Evaluate -> DEBU 18e0 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-08-31 20:52:22.661 UTC [cauthdsl] func1 -> DEBU 18e1 0xc000d87000 gate 1598907142661440500 evaluation starts" +"2020-08-31 20:52:22.661 UTC [cauthdsl] func2 -> DEBU 18e2 0xc000d87000 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:22.661 UTC [cauthdsl] func2 -> DEBU 18e3 0xc000d87000 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:22.661 UTC [cauthdsl] func2 -> DEBU 18e4 0xc000d87000 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-08-31 20:52:22.661 UTC [cauthdsl] func2 -> DEBU 18e5 0xc000d87000 principal evaluation fails" +"2020-08-31 20:52:22.661 UTC [cauthdsl] func1 -> DEBU 18e6 0xc000d87000 gate 1598907142661440500 evaluation fails" +"2020-08-31 20:52:22.661 UTC [policies] Evaluate -> DEBU 18e7 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:22.661 UTC [policies] Evaluate -> DEBU 18e8 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:22.661 UTC [policies] func1 -> DEBU 18e9 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2020-08-31 20:52:22.662 UTC [policies] Evaluate -> DEBU 18ea Signature set did not satisfy policy /Channel/Application/Readers" +"2020-08-31 20:52:22.662 UTC [policies] Evaluate -> DEBU 18eb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-08-31 20:52:22.662 UTC [policies] Evaluate -> DEBU 18ec == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:22.662 UTC [policies] Evaluate -> DEBU 18ed This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:22.662 UTC [policies] Evaluate -> DEBU 18ee == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:22.662 UTC [cauthdsl] func1 -> DEBU 18ef 0xc000d87cf0 gate 1598907142662796400 evaluation starts" +"2020-08-31 20:52:22.662 UTC [cauthdsl] func2 -> DEBU 18f0 0xc000d87cf0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:22.662 UTC [cauthdsl] func2 -> DEBU 18f1 0xc000d87cf0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:22.662 UTC [cauthdsl] func2 -> DEBU 18f2 0xc000d87cf0 principal matched by identity 0" +"2020-08-31 20:52:22.663 UTC [msp.identity] Verify -> DEBU 18f3 Verify: digest = 00000000 ca ee 6a b5 1b 1a c4 aa 54 86 b7 46 3b 9b 87 60 |..j.....T..F;..`| +00000010 eb 6d c2 df 22 a8 6a 4c d9 78 a9 f2 f9 13 6d 45 |.m..".jL.x....mE|" +"2020-08-31 20:52:22.663 UTC [msp.identity] Verify -> DEBU 18f4 Verify: sig = 00000000 30 45 02 21 00 d8 02 31 d5 0f e6 a4 19 50 87 3f |0E.!...1.....P.?| +00000010 f6 0d 8e 75 3b 31 26 01 ae 00 4b 2e 94 a7 07 16 |...u;1&...K.....| +00000020 47 2b 33 58 db 02 20 0f 98 94 1c 77 b0 d8 a4 79 |G+3X.. ....w...y| +00000030 1a 3b 13 c8 15 e2 e4 9e 03 4a 97 ec f9 ba 70 ef |.;.......J....p.| +00000040 d3 ef 6c c5 26 45 de |..l.&E.|" +"2020-08-31 20:52:22.663 UTC [cauthdsl] func2 -> DEBU 18f5 0xc000d87cf0 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:22.663 UTC [cauthdsl] func1 -> DEBU 18f6 0xc000d87cf0 gate 1598907142662796400 evaluation succeeds" +"2020-08-31 20:52:22.663 UTC [policies] Evaluate -> DEBU 18f7 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:22.663 UTC [policies] Evaluate -> DEBU 18f8 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:22.663 UTC [policies] Evaluate -> DEBU 18f9 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:22.663 UTC [policies] Evaluate -> DEBU 18fa == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:22.664 UTC [policies] Evaluate -> DEBU 18fb Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:22.664 UTC [policies] Evaluate -> DEBU 18fc == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:22.664 UTC [common.deliver] deliverBlocks -> DEBU 18fd [channel: businesschannel] Received seekInfo (0xc000caf440) start: > stop: > from 172.18.0.9:50996" +"2020-08-31 20:52:22.664 UTC [fsblkstorage] Next -> DEBU 18fe Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-08-31 20:52:22.665 UTC [fsblkstorage] newBlockfileStream -> DEBU 18ff newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97392]" +"2020-08-31 20:52:22.665 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1900 Remaining bytes=[41179], Going to peek [8] bytes" +"2020-08-31 20:52:22.665 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1901 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97392], bytesOffset=[97395]}" +"2020-08-31 20:52:22.665 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1902 blockbytes [41176] read from file [0]" +"2020-08-31 20:52:22.665 UTC [common.deliver] deliverBlocks -> DEBU 1903 [channel: businesschannel] Delivering block [6] for (0xc000caf440) for 172.18.0.9:50996" +"2020-08-31 20:52:22.666 UTC [common.deliver] deliverBlocks -> DEBU 1904 [channel: businesschannel] Done delivering to 172.18.0.9:50996 for (0xc000caf440)" +"2020-08-31 20:52:22.666 UTC [common.deliver] Handle -> DEBU 1905 Waiting for new SeekInfo from 172.18.0.9:50996" +"2020-08-31 20:52:22.666 UTC [common.deliver] Handle -> DEBU 1906 Attempting to read seek info message from 172.18.0.9:50996" +"2020-08-31 20:52:22.666 UTC [fsblkstorage] waitForBlock -> DEBU 1907 Came out of wait. maxAvailaBlockNumber=[6]" +"2020-08-31 20:52:22.666 UTC [fsblkstorage] waitForBlock -> DEBU 1908 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2020-08-31 20:52:22.675 UTC [common.deliver] Handle -> WARN 1909 Error reading from 172.18.0.9:50996: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:22.675 UTC [orderer.common.server] func1 -> DEBU 190a Closing Deliver stream" +"2020-08-31 20:52:22.675 UTC [comm.grpc.server] 1 -> INFO 190b streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50996 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.1972ms +"2020-08-31 20:52:22.675 UTC [grpc] infof -> DEBU 190c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:22.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 190d Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:22.805 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 190e Sending msg of 28 bytes to 3 on channel testchainid took 16.3µs" +"2020-08-31 20:52:22.805 UTC [orderer.common.cluster.step] sendMessage -> DEBU 190f Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 91.5µs " +"2020-08-31 20:52:23.041 UTC [orderer.common.server] Deliver -> DEBU 1910 Starting new Deliver handler" +"2020-08-31 20:52:23.042 UTC [common.deliver] Handle -> DEBU 1911 Starting new deliver loop for 172.18.0.9:50998" +"2020-08-31 20:52:23.042 UTC [common.deliver] Handle -> DEBU 1912 Attempting to read seek info message from 172.18.0.9:50998" +"2020-08-31 20:52:23.043 UTC [policies] Evaluate -> DEBU 1913 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:23.043 UTC [policies] Evaluate -> DEBU 1914 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.043 UTC [policies] Evaluate -> DEBU 1915 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-08-31 20:52:23.043 UTC [policies] Evaluate -> DEBU 1916 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.043 UTC [policies] Evaluate -> DEBU 1917 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-08-31 20:52:23.043 UTC [cauthdsl] func1 -> DEBU 1918 0xc0009a0ac0 gate 1598907143043680700 evaluation starts" +"2020-08-31 20:52:23.043 UTC [cauthdsl] func2 -> DEBU 1919 0xc0009a0ac0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.043 UTC [cauthdsl] func2 -> DEBU 191a 0xc0009a0ac0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.043 UTC [cauthdsl] func2 -> DEBU 191b 0xc0009a0ac0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-08-31 20:52:23.044 UTC [cauthdsl] func2 -> DEBU 191c 0xc0009a0ac0 principal evaluation fails" +"2020-08-31 20:52:23.044 UTC [cauthdsl] func1 -> DEBU 191d 0xc0009a0ac0 gate 1598907143043680700 evaluation fails" +"2020-08-31 20:52:23.044 UTC [policies] Evaluate -> DEBU 191e Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:23.044 UTC [policies] Evaluate -> DEBU 191f == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:23.044 UTC [policies] Evaluate -> DEBU 1920 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-08-31 20:52:23.044 UTC [cauthdsl] func1 -> DEBU 1921 0xc0009a1440 gate 1598907143044842500 evaluation starts" +"2020-08-31 20:52:23.044 UTC [cauthdsl] func2 -> DEBU 1922 0xc0009a1440 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.044 UTC [cauthdsl] func2 -> DEBU 1923 0xc0009a1440 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.045 UTC [cauthdsl] func2 -> DEBU 1924 0xc0009a1440 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-08-31 20:52:23.045 UTC [cauthdsl] func2 -> DEBU 1925 0xc0009a1440 principal evaluation fails" +"2020-08-31 20:52:23.045 UTC [cauthdsl] func1 -> DEBU 1926 0xc0009a1440 gate 1598907143044842500 evaluation fails" +"2020-08-31 20:52:23.045 UTC [policies] Evaluate -> DEBU 1927 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:23.045 UTC [policies] Evaluate -> DEBU 1928 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:23.045 UTC [policies] Evaluate -> DEBU 1929 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-08-31 20:52:23.045 UTC [cauthdsl] func1 -> DEBU 192a 0xc0009a1df0 gate 1598907143045466800 evaluation starts" +"2020-08-31 20:52:23.045 UTC [cauthdsl] func2 -> DEBU 192b 0xc0009a1df0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.045 UTC [cauthdsl] func2 -> DEBU 192c 0xc0009a1df0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.045 UTC [cauthdsl] func2 -> DEBU 192d 0xc0009a1df0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-08-31 20:52:23.045 UTC [cauthdsl] func2 -> DEBU 192e 0xc0009a1df0 principal evaluation fails" +"2020-08-31 20:52:23.045 UTC [cauthdsl] func1 -> DEBU 192f 0xc0009a1df0 gate 1598907143045466800 evaluation fails" +"2020-08-31 20:52:23.046 UTC [policies] Evaluate -> DEBU 1930 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:23.046 UTC [policies] Evaluate -> DEBU 1931 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:23.046 UTC [policies] func1 -> DEBU 1932 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2020-08-31 20:52:23.046 UTC [policies] Evaluate -> DEBU 1933 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-08-31 20:52:23.046 UTC [policies] Evaluate -> DEBU 1934 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-08-31 20:52:23.046 UTC [policies] Evaluate -> DEBU 1935 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:23.046 UTC [policies] Evaluate -> DEBU 1936 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.046 UTC [policies] Evaluate -> DEBU 1937 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:23.046 UTC [cauthdsl] func1 -> DEBU 1938 0xc000468b20 gate 1598907143046711200 evaluation starts" +"2020-08-31 20:52:23.046 UTC [cauthdsl] func2 -> DEBU 1939 0xc000468b20 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.046 UTC [cauthdsl] func2 -> DEBU 193a 0xc000468b20 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.046 UTC [cauthdsl] func2 -> DEBU 193b 0xc000468b20 principal matched by identity 0" +"2020-08-31 20:52:23.047 UTC [msp.identity] Verify -> DEBU 193c Verify: digest = 00000000 fb 3e 2b 07 d8 6d ab fe f2 fe 33 c9 03 19 1c bc |.>+..m....3.....| +00000010 be 67 05 9f 72 99 77 d8 e6 44 b4 d3 d9 d9 53 2c |.g..r.w..D....S,|" +"2020-08-31 20:52:23.047 UTC [msp.identity] Verify -> DEBU 193d Verify: sig = 00000000 30 45 02 21 00 8d a1 08 1a 7f 4e 30 10 f0 69 f9 |0E.!......N0..i.| +00000010 5c 60 84 b1 fb 77 46 aa 35 fa cb 8f 4f 98 7d 55 |\`...wF.5...O.}U| +00000020 db f9 75 25 41 02 20 05 c1 67 83 5d ac 2c 7a 6b |..u%A. ..g.].,zk| +00000030 49 09 37 23 35 c4 2b ce 6b cb 19 50 9e 2a 8e 73 |I.7#5.+.k..P.*.s| +00000040 07 da e4 05 63 3b df |....c;.|" +"2020-08-31 20:52:23.047 UTC [cauthdsl] func2 -> DEBU 193e 0xc000468b20 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:23.047 UTC [cauthdsl] func1 -> DEBU 193f 0xc000468b20 gate 1598907143046711200 evaluation succeeds" +"2020-08-31 20:52:23.047 UTC [policies] Evaluate -> DEBU 1940 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:23.047 UTC [policies] Evaluate -> DEBU 1941 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:23.048 UTC [policies] Evaluate -> DEBU 1942 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:23.048 UTC [policies] Evaluate -> DEBU 1943 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:23.048 UTC [policies] Evaluate -> DEBU 1944 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:23.048 UTC [policies] Evaluate -> DEBU 1945 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:23.048 UTC [common.deliver] deliverBlocks -> DEBU 1946 [channel: businesschannel] Received seekInfo (0xc000d6f8c0) start: > stop: > from 172.18.0.9:50998" +"2020-08-31 20:52:23.048 UTC [fsblkstorage] Next -> DEBU 1947 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-08-31 20:52:23.048 UTC [fsblkstorage] newBlockfileStream -> DEBU 1948 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97392]" +"2020-08-31 20:52:23.049 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1949 Remaining bytes=[41179], Going to peek [8] bytes" +"2020-08-31 20:52:23.049 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 194a Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97392], bytesOffset=[97395]}" +"2020-08-31 20:52:23.049 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 194b blockbytes [41176] read from file [0]" +"2020-08-31 20:52:23.049 UTC [common.deliver] deliverBlocks -> DEBU 194c [channel: businesschannel] Delivering block [6] for (0xc000d6f8c0) for 172.18.0.9:50998" +"2020-08-31 20:52:23.049 UTC [common.deliver] deliverBlocks -> DEBU 194d [channel: businesschannel] Done delivering to 172.18.0.9:50998 for (0xc000d6f8c0)" +"2020-08-31 20:52:23.050 UTC [common.deliver] Handle -> DEBU 194e Waiting for new SeekInfo from 172.18.0.9:50998" +"2020-08-31 20:52:23.050 UTC [common.deliver] Handle -> DEBU 194f Attempting to read seek info message from 172.18.0.9:50998" +"2020-08-31 20:52:23.050 UTC [fsblkstorage] waitForBlock -> DEBU 1950 Came out of wait. maxAvailaBlockNumber=[6]" +"2020-08-31 20:52:23.050 UTC [fsblkstorage] waitForBlock -> DEBU 1951 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2020-08-31 20:52:23.054 UTC [common.deliver] Handle -> WARN 1952 Error reading from 172.18.0.9:50998: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:23.054 UTC [orderer.common.server] func1 -> DEBU 1953 Closing Deliver stream" +"2020-08-31 20:52:23.054 UTC [comm.grpc.server] 1 -> INFO 1954 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:50998 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=12.8181ms +"2020-08-31 20:52:23.054 UTC [grpc] infof -> DEBU 1955 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:23.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1956 Sending msg of 28 bytes to 2 on channel businesschannel took 19.4µs" +"2020-08-31 20:52:23.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1957 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +"2020-08-31 20:52:23.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1958 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 342µs " +"2020-08-31 20:52:23.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1959 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 458.4µs " +"2020-08-31 20:52:23.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 195a Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:23.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 195b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:23.195 UTC [orderer.common.server] Deliver -> DEBU 195c Starting new Deliver handler" +"2020-08-31 20:52:23.195 UTC [common.deliver] Handle -> DEBU 195d Starting new deliver loop for 172.18.0.9:51000" +"2020-08-31 20:52:23.195 UTC [common.deliver] Handle -> DEBU 195e Attempting to read seek info message from 172.18.0.9:51000" +"2020-08-31 20:52:23.196 UTC [policies] Evaluate -> DEBU 195f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:23.196 UTC [policies] Evaluate -> DEBU 1960 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.196 UTC [policies] Evaluate -> DEBU 1961 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-08-31 20:52:23.196 UTC [policies] Evaluate -> DEBU 1962 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.196 UTC [policies] Evaluate -> DEBU 1963 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-08-31 20:52:23.196 UTC [cauthdsl] func1 -> DEBU 1964 0xc0009e0ab0 gate 1598907143196854700 evaluation starts" +"2020-08-31 20:52:23.197 UTC [cauthdsl] func2 -> DEBU 1965 0xc0009e0ab0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.197 UTC [cauthdsl] func2 -> DEBU 1966 0xc0009e0ab0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.197 UTC [cauthdsl] func2 -> DEBU 1967 0xc0009e0ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-08-31 20:52:23.197 UTC [cauthdsl] func2 -> DEBU 1968 0xc0009e0ab0 principal evaluation fails" +"2020-08-31 20:52:23.197 UTC [cauthdsl] func1 -> DEBU 1969 0xc0009e0ab0 gate 1598907143196854700 evaluation fails" +"2020-08-31 20:52:23.197 UTC [policies] Evaluate -> DEBU 196a Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:23.197 UTC [policies] Evaluate -> DEBU 196b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:23.197 UTC [policies] Evaluate -> DEBU 196c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-08-31 20:52:23.197 UTC [cauthdsl] func1 -> DEBU 196d 0xc0009e1460 gate 1598907143197611900 evaluation starts" +"2020-08-31 20:52:23.197 UTC [cauthdsl] func2 -> DEBU 196e 0xc0009e1460 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.197 UTC [cauthdsl] func2 -> DEBU 196f 0xc0009e1460 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.197 UTC [cauthdsl] func2 -> DEBU 1970 0xc0009e1460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-08-31 20:52:23.198 UTC [cauthdsl] func2 -> DEBU 1971 0xc0009e1460 principal evaluation fails" +"2020-08-31 20:52:23.198 UTC [cauthdsl] func1 -> DEBU 1972 0xc0009e1460 gate 1598907143197611900 evaluation fails" +"2020-08-31 20:52:23.198 UTC [policies] Evaluate -> DEBU 1973 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:23.198 UTC [policies] Evaluate -> DEBU 1974 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:23.198 UTC [policies] Evaluate -> DEBU 1975 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-08-31 20:52:23.198 UTC [cauthdsl] func1 -> DEBU 1976 0xc00098c010 gate 1598907143198782300 evaluation starts" +"2020-08-31 20:52:23.199 UTC [cauthdsl] func2 -> DEBU 1977 0xc00098c010 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.199 UTC [cauthdsl] func2 -> DEBU 1978 0xc00098c010 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.199 UTC [cauthdsl] func2 -> DEBU 1979 0xc00098c010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-08-31 20:52:23.199 UTC [cauthdsl] func2 -> DEBU 197a 0xc00098c010 principal evaluation fails" +"2020-08-31 20:52:23.199 UTC [cauthdsl] func1 -> DEBU 197b 0xc00098c010 gate 1598907143198782300 evaluation fails" +"2020-08-31 20:52:23.199 UTC [policies] Evaluate -> DEBU 197c Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:23.199 UTC [policies] Evaluate -> DEBU 197d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:23.199 UTC [policies] func1 -> DEBU 197e Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2020-08-31 20:52:23.199 UTC [policies] Evaluate -> DEBU 197f Signature set did not satisfy policy /Channel/Application/Readers" +"2020-08-31 20:52:23.200 UTC [policies] Evaluate -> DEBU 1980 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-08-31 20:52:23.200 UTC [policies] Evaluate -> DEBU 1981 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:23.200 UTC [policies] Evaluate -> DEBU 1982 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.200 UTC [policies] Evaluate -> DEBU 1983 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:23.200 UTC [cauthdsl] func1 -> DEBU 1984 0xc00098cd00 gate 1598907143200537000 evaluation starts" +"2020-08-31 20:52:23.200 UTC [cauthdsl] func2 -> DEBU 1985 0xc00098cd00 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.200 UTC [cauthdsl] func2 -> DEBU 1986 0xc00098cd00 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.200 UTC [cauthdsl] func2 -> DEBU 1987 0xc00098cd00 principal matched by identity 0" +"2020-08-31 20:52:23.200 UTC [msp.identity] Verify -> DEBU 1988 Verify: digest = 00000000 68 41 3f c1 ad 71 6d 9f 80 fa d2 39 4b 2c ce 5e |hA?..qm....9K,.^| +00000010 fe 72 e2 bd 34 b2 8b 8e fd 3d c5 36 4b f8 07 85 |.r..4....=.6K...|" +"2020-08-31 20:52:23.201 UTC [msp.identity] Verify -> DEBU 1989 Verify: sig = 00000000 30 45 02 21 00 fe 95 ca 30 c1 aa f3 57 ac 30 8a |0E.!....0...W.0.| +00000010 2e 5d b7 86 a3 32 06 76 51 2b f3 ea 93 20 16 72 |.]...2.vQ+... .r| +00000020 c2 20 d9 54 67 02 20 7e a9 59 67 f1 30 e0 1a fc |. .Tg. ~.Yg.0...| +00000030 85 67 5b 9b 43 fb 1e 99 c3 b2 e2 77 17 9f 85 7d |.g[.C......w...}| +00000040 8a 6c c4 6d 5c d3 84 |.l.m\..|" +"2020-08-31 20:52:23.201 UTC [cauthdsl] func2 -> DEBU 198a 0xc00098cd00 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:23.201 UTC [cauthdsl] func1 -> DEBU 198b 0xc00098cd00 gate 1598907143200537000 evaluation succeeds" +"2020-08-31 20:52:23.201 UTC [policies] Evaluate -> DEBU 198c Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:23.201 UTC [policies] Evaluate -> DEBU 198d == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:23.201 UTC [policies] Evaluate -> DEBU 198e Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:23.201 UTC [policies] Evaluate -> DEBU 198f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:23.201 UTC [policies] Evaluate -> DEBU 1990 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:23.201 UTC [policies] Evaluate -> DEBU 1991 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:23.201 UTC [common.deliver] deliverBlocks -> DEBU 1992 [channel: businesschannel] Received seekInfo (0xc000da5b80) start: > stop: > from 172.18.0.9:51000" +"2020-08-31 20:52:23.202 UTC [fsblkstorage] Next -> DEBU 1993 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-08-31 20:52:23.202 UTC [fsblkstorage] newBlockfileStream -> DEBU 1994 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97392]" +"2020-08-31 20:52:23.202 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1995 Remaining bytes=[41179], Going to peek [8] bytes" +"2020-08-31 20:52:23.202 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1996 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97392], bytesOffset=[97395]}" +"2020-08-31 20:52:23.203 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1997 blockbytes [41176] read from file [0]" +"2020-08-31 20:52:23.203 UTC [common.deliver] deliverBlocks -> DEBU 1998 [channel: businesschannel] Delivering block [6] for (0xc000da5b80) for 172.18.0.9:51000" +"2020-08-31 20:52:23.203 UTC [common.deliver] deliverBlocks -> DEBU 1999 [channel: businesschannel] Done delivering to 172.18.0.9:51000 for (0xc000da5b80)" +"2020-08-31 20:52:23.203 UTC [common.deliver] Handle -> DEBU 199a Waiting for new SeekInfo from 172.18.0.9:51000" +"2020-08-31 20:52:23.203 UTC [common.deliver] Handle -> DEBU 199b Attempting to read seek info message from 172.18.0.9:51000" +"2020-08-31 20:52:23.203 UTC [fsblkstorage] waitForBlock -> DEBU 199c Came out of wait. maxAvailaBlockNumber=[6]" +"2020-08-31 20:52:23.203 UTC [fsblkstorage] waitForBlock -> DEBU 199d Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2020-08-31 20:52:23.211 UTC [policies] Evaluate -> DEBU 199e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:23.211 UTC [policies] Evaluate -> DEBU 199f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.212 UTC [policies] Evaluate -> DEBU 19a0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-08-31 20:52:23.212 UTC [policies] Evaluate -> DEBU 19a1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.212 UTC [policies] Evaluate -> DEBU 19a2 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-08-31 20:52:23.212 UTC [cauthdsl] func1 -> DEBU 19a3 0xc000431cd0 gate 1598907143212581300 evaluation starts" +"2020-08-31 20:52:23.212 UTC [cauthdsl] func2 -> DEBU 19a4 0xc000431cd0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.212 UTC [cauthdsl] func2 -> DEBU 19a5 0xc000431cd0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.213 UTC [cauthdsl] func2 -> DEBU 19a6 0xc000431cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-08-31 20:52:23.213 UTC [cauthdsl] func2 -> DEBU 19a7 0xc000431cd0 principal evaluation fails" +"2020-08-31 20:52:23.213 UTC [cauthdsl] func1 -> DEBU 19a8 0xc000431cd0 gate 1598907143212581300 evaluation fails" +"2020-08-31 20:52:23.213 UTC [policies] Evaluate -> DEBU 19a9 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:23.213 UTC [policies] Evaluate -> DEBU 19aa == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:23.213 UTC [policies] Evaluate -> DEBU 19ab == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-08-31 20:52:23.213 UTC [cauthdsl] func1 -> DEBU 19ac 0xc000958550 gate 1598907143213975800 evaluation starts" +"2020-08-31 20:52:23.214 UTC [cauthdsl] func2 -> DEBU 19ad 0xc000958550 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.214 UTC [cauthdsl] func2 -> DEBU 19ae 0xc000958550 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.214 UTC [cauthdsl] func2 -> DEBU 19af 0xc000958550 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-08-31 20:52:23.214 UTC [cauthdsl] func2 -> DEBU 19b0 0xc000958550 principal evaluation fails" +"2020-08-31 20:52:23.214 UTC [cauthdsl] func1 -> DEBU 19b1 0xc000958550 gate 1598907143213975800 evaluation fails" +"2020-08-31 20:52:23.214 UTC [policies] Evaluate -> DEBU 19b2 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:23.215 UTC [policies] Evaluate -> DEBU 19b3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:23.215 UTC [policies] Evaluate -> DEBU 19b4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-08-31 20:52:23.215 UTC [cauthdsl] func1 -> DEBU 19b5 0xc000958d90 gate 1598907143215455500 evaluation starts" +"2020-08-31 20:52:23.215 UTC [cauthdsl] func2 -> DEBU 19b6 0xc000958d90 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.215 UTC [cauthdsl] func2 -> DEBU 19b7 0xc000958d90 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.216 UTC [cauthdsl] func2 -> DEBU 19b8 0xc000958d90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-08-31 20:52:23.216 UTC [cauthdsl] func2 -> DEBU 19b9 0xc000958d90 principal evaluation fails" +"2020-08-31 20:52:23.216 UTC [cauthdsl] func1 -> DEBU 19ba 0xc000958d90 gate 1598907143215455500 evaluation fails" +"2020-08-31 20:52:23.216 UTC [policies] Evaluate -> DEBU 19bb Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:23.217 UTC [policies] Evaluate -> DEBU 19bc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:23.217 UTC [policies] func1 -> DEBU 19bd Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2020-08-31 20:52:23.217 UTC [policies] Evaluate -> DEBU 19be Signature set did not satisfy policy /Channel/Application/Readers" +"2020-08-31 20:52:23.217 UTC [policies] Evaluate -> DEBU 19bf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-08-31 20:52:23.218 UTC [policies] Evaluate -> DEBU 19c0 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:23.218 UTC [policies] Evaluate -> DEBU 19c1 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.218 UTC [policies] Evaluate -> DEBU 19c2 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:23.218 UTC [cauthdsl] func1 -> DEBU 19c3 0xc000959a80 gate 1598907143218569900 evaluation starts" +"2020-08-31 20:52:23.218 UTC [cauthdsl] func2 -> DEBU 19c4 0xc000959a80 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.218 UTC [cauthdsl] func2 -> DEBU 19c5 0xc000959a80 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.219 UTC [cauthdsl] func2 -> DEBU 19c6 0xc000959a80 principal matched by identity 0" +"2020-08-31 20:52:23.219 UTC [msp.identity] Verify -> DEBU 19c7 Verify: digest = 00000000 85 32 2d ab 33 7e df dd c8 61 00 5b 74 e7 53 b2 |.2-.3~...a.[t.S.| +00000010 ae 8f af a3 f0 eb 6d 45 ee 26 01 e0 75 78 13 86 |......mE.&..ux..|" +"2020-08-31 20:52:23.219 UTC [msp.identity] Verify -> DEBU 19c8 Verify: sig = 00000000 30 45 02 21 00 ed 87 0a 29 24 83 cc 01 d2 59 76 |0E.!....)$....Yv| +00000010 c3 7e 4f d3 4f af fd 9a fc 62 dd f5 55 1a 32 7f |.~O.O....b..U.2.| +00000020 74 9f 17 dd 82 02 20 51 77 2c 6b 78 18 d2 d3 3a |t..... Qw,kx...:| +00000030 7d 7d dd d7 d8 42 f9 7e 53 dc 04 57 2b 87 7a f5 |}}...B.~S..W+.z.| +00000040 37 21 00 cb 20 fe c3 |7!.. ..|" +"2020-08-31 20:52:23.220 UTC [cauthdsl] func2 -> DEBU 19c9 0xc000959a80 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:23.220 UTC [cauthdsl] func1 -> DEBU 19ca 0xc000959a80 gate 1598907143218569900 evaluation succeeds" +"2020-08-31 20:52:23.220 UTC [policies] Evaluate -> DEBU 19cb Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:23.220 UTC [policies] Evaluate -> DEBU 19cc == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:23.220 UTC [policies] Evaluate -> DEBU 19cd Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:23.220 UTC [policies] Evaluate -> DEBU 19ce == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:23.221 UTC [policies] Evaluate -> DEBU 19cf Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:23.221 UTC [policies] Evaluate -> DEBU 19d0 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:23.221 UTC [common.deliver] deliverBlocks -> DEBU 19d1 [channel: businesschannel] Received seekInfo (0xc000a08000) start: > stop: > from 172.18.0.9:51000" +"2020-08-31 20:52:23.221 UTC [fsblkstorage] Next -> DEBU 19d2 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-08-31 20:52:23.221 UTC [fsblkstorage] newBlockfileStream -> DEBU 19d3 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97392]" +"2020-08-31 20:52:23.222 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19d4 Remaining bytes=[41179], Going to peek [8] bytes" +"2020-08-31 20:52:23.222 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19d5 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97392], bytesOffset=[97395]}" +"2020-08-31 20:52:23.222 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 19d6 blockbytes [41176] read from file [0]" +"2020-08-31 20:52:23.222 UTC [common.deliver] deliverBlocks -> DEBU 19d7 [channel: businesschannel] Delivering block [6] for (0xc000a08000) for 172.18.0.9:51000" +"2020-08-31 20:52:23.223 UTC [common.deliver] deliverBlocks -> DEBU 19d8 [channel: businesschannel] Done delivering to 172.18.0.9:51000 for (0xc000a08000)" +"2020-08-31 20:52:23.223 UTC [fsblkstorage] waitForBlock -> DEBU 19d9 Came out of wait. maxAvailaBlockNumber=[6]" +"2020-08-31 20:52:23.223 UTC [fsblkstorage] waitForBlock -> DEBU 19da Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2020-08-31 20:52:23.223 UTC [common.deliver] Handle -> DEBU 19db Waiting for new SeekInfo from 172.18.0.9:51000" +"2020-08-31 20:52:23.224 UTC [common.deliver] Handle -> DEBU 19dc Attempting to read seek info message from 172.18.0.9:51000" +"2020-08-31 20:52:23.230 UTC [grpc] infof -> DEBU 19dd transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:23.230 UTC [common.deliver] Handle -> WARN 19de Error reading from 172.18.0.9:51000: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:23.230 UTC [orderer.common.server] func1 -> DEBU 19df Closing Deliver stream" +"2020-08-31 20:52:23.230 UTC [comm.grpc.server] 1 -> INFO 19e0 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51000 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.3532ms +"2020-08-31 20:52:23.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 19e1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:23.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 19e2 Sending msg of 28 bytes to 3 on channel testchainid took 8.8µs" +"2020-08-31 20:52:23.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 19e3 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 75.8µs " +"2020-08-31 20:52:23.369 UTC [orderer.common.server] Deliver -> DEBU 19e4 Starting new Deliver handler" +"2020-08-31 20:52:23.369 UTC [common.deliver] Handle -> DEBU 19e5 Starting new deliver loop for 172.18.0.9:51002" +"2020-08-31 20:52:23.369 UTC [common.deliver] Handle -> DEBU 19e6 Attempting to read seek info message from 172.18.0.9:51002" +"2020-08-31 20:52:23.370 UTC [policies] Evaluate -> DEBU 19e7 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:23.370 UTC [policies] Evaluate -> DEBU 19e8 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.370 UTC [policies] Evaluate -> DEBU 19e9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-08-31 20:52:23.370 UTC [policies] Evaluate -> DEBU 19ea This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.370 UTC [policies] Evaluate -> DEBU 19eb == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-08-31 20:52:23.370 UTC [cauthdsl] func1 -> DEBU 19ec 0xc000376590 gate 1598907143370876800 evaluation starts" +"2020-08-31 20:52:23.371 UTC [cauthdsl] func2 -> DEBU 19ed 0xc000376590 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.371 UTC [cauthdsl] func2 -> DEBU 19ee 0xc000376590 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.371 UTC [cauthdsl] func2 -> DEBU 19ef 0xc000376590 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-08-31 20:52:23.371 UTC [cauthdsl] func2 -> DEBU 19f0 0xc000376590 principal evaluation fails" +"2020-08-31 20:52:23.371 UTC [cauthdsl] func1 -> DEBU 19f1 0xc000376590 gate 1598907143370876800 evaluation fails" +"2020-08-31 20:52:23.372 UTC [policies] Evaluate -> DEBU 19f2 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:23.372 UTC [policies] Evaluate -> DEBU 19f3 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:23.372 UTC [policies] Evaluate -> DEBU 19f4 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-08-31 20:52:23.372 UTC [cauthdsl] func1 -> DEBU 19f5 0xc000376f20 gate 1598907143372661800 evaluation starts" +"2020-08-31 20:52:23.372 UTC [cauthdsl] func2 -> DEBU 19f6 0xc000376f20 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.372 UTC [cauthdsl] func2 -> DEBU 19f7 0xc000376f20 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.373 UTC [cauthdsl] func2 -> DEBU 19f8 0xc000376f20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-08-31 20:52:23.373 UTC [cauthdsl] func2 -> DEBU 19f9 0xc000376f20 principal evaluation fails" +"2020-08-31 20:52:23.373 UTC [cauthdsl] func1 -> DEBU 19fa 0xc000376f20 gate 1598907143372661800 evaluation fails" +"2020-08-31 20:52:23.373 UTC [policies] Evaluate -> DEBU 19fb Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:23.373 UTC [policies] Evaluate -> DEBU 19fc == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:23.374 UTC [policies] Evaluate -> DEBU 19fd == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-08-31 20:52:23.374 UTC [cauthdsl] func1 -> DEBU 19fe 0xc0003779f0 gate 1598907143374311300 evaluation starts" +"2020-08-31 20:52:23.374 UTC [cauthdsl] func2 -> DEBU 19ff 0xc0003779f0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.374 UTC [cauthdsl] func2 -> DEBU 1a00 0xc0003779f0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.374 UTC [cauthdsl] func2 -> DEBU 1a01 0xc0003779f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-08-31 20:52:23.374 UTC [cauthdsl] func2 -> DEBU 1a02 0xc0003779f0 principal evaluation fails" +"2020-08-31 20:52:23.375 UTC [cauthdsl] func1 -> DEBU 1a03 0xc0003779f0 gate 1598907143374311300 evaluation fails" +"2020-08-31 20:52:23.375 UTC [policies] Evaluate -> DEBU 1a04 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:23.375 UTC [policies] Evaluate -> DEBU 1a05 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:23.375 UTC [policies] func1 -> DEBU 1a06 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2020-08-31 20:52:23.375 UTC [policies] Evaluate -> DEBU 1a07 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-08-31 20:52:23.375 UTC [policies] Evaluate -> DEBU 1a08 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-08-31 20:52:23.376 UTC [policies] Evaluate -> DEBU 1a09 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:23.376 UTC [policies] Evaluate -> DEBU 1a0a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.376 UTC [policies] Evaluate -> DEBU 1a0b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:23.376 UTC [cauthdsl] func1 -> DEBU 1a0c 0xc0003689f0 gate 1598907143376500400 evaluation starts" +"2020-08-31 20:52:23.376 UTC [cauthdsl] func2 -> DEBU 1a0d 0xc0003689f0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.376 UTC [cauthdsl] func2 -> DEBU 1a0e 0xc0003689f0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.377 UTC [cauthdsl] func2 -> DEBU 1a0f 0xc0003689f0 principal matched by identity 0" +"2020-08-31 20:52:23.377 UTC [msp.identity] Verify -> DEBU 1a10 Verify: digest = 00000000 70 8a 93 ee fc 64 b4 7c f6 5f 91 3c 32 f8 ef c7 |p....d.|._.<2...| +00000010 9c 48 ab 86 65 f0 39 0b 8a 33 dc d0 e7 f3 55 20 |.H..e.9..3....U |" +"2020-08-31 20:52:23.377 UTC [msp.identity] Verify -> DEBU 1a11 Verify: sig = 00000000 30 45 02 21 00 e4 d1 fb 9d 32 6c f9 f6 ab 7f bd |0E.!.....2l.....| +00000010 3f 76 cc 26 34 e0 95 86 72 09 ab 52 f5 74 9e 31 |?v.&4...r..R.t.1| +00000020 c6 30 de 3c 5e 02 20 5d 1f 40 1e ac e0 08 93 e0 |.0.<^. ].@......| +00000030 b6 a3 a5 d3 e1 e0 5c 1a 4f 07 d3 19 c1 17 78 1d |......\.O.....x.| +00000040 41 f1 3b 09 d0 f7 24 |A.;...$|" +"2020-08-31 20:52:23.377 UTC [cauthdsl] func2 -> DEBU 1a12 0xc0003689f0 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:23.377 UTC [cauthdsl] func1 -> DEBU 1a13 0xc0003689f0 gate 1598907143376500400 evaluation succeeds" +"2020-08-31 20:52:23.378 UTC [policies] Evaluate -> DEBU 1a14 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:23.378 UTC [policies] Evaluate -> DEBU 1a15 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:23.378 UTC [policies] Evaluate -> DEBU 1a16 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:23.378 UTC [policies] Evaluate -> DEBU 1a17 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:23.378 UTC [policies] Evaluate -> DEBU 1a18 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:23.378 UTC [policies] Evaluate -> DEBU 1a19 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:23.378 UTC [common.deliver] deliverBlocks -> DEBU 1a1a [channel: businesschannel] Received seekInfo (0xc000a085c0) start: > stop: > from 172.18.0.9:51002" +"2020-08-31 20:52:23.379 UTC [fsblkstorage] Next -> DEBU 1a1b Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-08-31 20:52:23.379 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a1c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[0]" +"2020-08-31 20:52:23.379 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a1d Remaining bytes=[138571], Going to peek [8] bytes" +"2020-08-31 20:52:23.379 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a1e Returning blockbytes - length=[28472], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-08-31 20:52:23.379 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a1f blockbytes [28472] read from file [0]" +"2020-08-31 20:52:23.380 UTC [common.deliver] deliverBlocks -> DEBU 1a20 [channel: businesschannel] Delivering block [0] for (0xc000a085c0) for 172.18.0.9:51002" +"2020-08-31 20:52:23.380 UTC [common.deliver] deliverBlocks -> DEBU 1a21 [channel: businesschannel] Done delivering to 172.18.0.9:51002 for (0xc000a085c0)" +"2020-08-31 20:52:23.380 UTC [common.deliver] Handle -> DEBU 1a22 Waiting for new SeekInfo from 172.18.0.9:51002" +"2020-08-31 20:52:23.380 UTC [common.deliver] Handle -> DEBU 1a23 Attempting to read seek info message from 172.18.0.9:51002" +"2020-08-31 20:52:23.381 UTC [fsblkstorage] waitForBlock -> DEBU 1a24 Came out of wait. maxAvailaBlockNumber=[6]" +"2020-08-31 20:52:23.381 UTC [fsblkstorage] waitForBlock -> DEBU 1a25 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2020-08-31 20:52:23.392 UTC [grpc] infof -> DEBU 1a26 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:23.394 UTC [common.deliver] Handle -> WARN 1a27 Error reading from 172.18.0.9:51002: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:23.394 UTC [orderer.common.server] func1 -> DEBU 1a28 Closing Deliver stream" +"2020-08-31 20:52:23.396 UTC [comm.grpc.server] 1 -> INFO 1a29 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51002 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=27.522ms +"2020-08-31 20:52:23.558 UTC [orderer.common.server] Deliver -> DEBU 1a2a Starting new Deliver handler" +"2020-08-31 20:52:23.558 UTC [common.deliver] Handle -> DEBU 1a2b Starting new deliver loop for 172.18.0.9:51004" +"2020-08-31 20:52:23.558 UTC [common.deliver] Handle -> DEBU 1a2c Attempting to read seek info message from 172.18.0.9:51004" +"2020-08-31 20:52:23.559 UTC [policies] Evaluate -> DEBU 1a2d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:23.559 UTC [policies] Evaluate -> DEBU 1a2e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.559 UTC [policies] Evaluate -> DEBU 1a2f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-08-31 20:52:23.560 UTC [policies] Evaluate -> DEBU 1a30 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.560 UTC [policies] Evaluate -> DEBU 1a31 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-08-31 20:52:23.560 UTC [cauthdsl] func1 -> DEBU 1a32 0xc00004f930 gate 1598907143560161700 evaluation starts" +"2020-08-31 20:52:23.560 UTC [cauthdsl] func2 -> DEBU 1a33 0xc00004f930 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.560 UTC [cauthdsl] func2 -> DEBU 1a34 0xc00004f930 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.560 UTC [cauthdsl] func2 -> DEBU 1a35 0xc00004f930 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-08-31 20:52:23.560 UTC [cauthdsl] func2 -> DEBU 1a36 0xc00004f930 principal evaluation fails" +"2020-08-31 20:52:23.560 UTC [cauthdsl] func1 -> DEBU 1a37 0xc00004f930 gate 1598907143560161700 evaluation fails" +"2020-08-31 20:52:23.561 UTC [policies] Evaluate -> DEBU 1a38 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:23.561 UTC [policies] Evaluate -> DEBU 1a39 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:23.561 UTC [policies] Evaluate -> DEBU 1a3a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-08-31 20:52:23.561 UTC [cauthdsl] func1 -> DEBU 1a3b 0xc000110ce0 gate 1598907143561501900 evaluation starts" +"2020-08-31 20:52:23.561 UTC [cauthdsl] func2 -> DEBU 1a3c 0xc000110ce0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.561 UTC [cauthdsl] func2 -> DEBU 1a3d 0xc000110ce0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.562 UTC [cauthdsl] func2 -> DEBU 1a3e 0xc000110ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-08-31 20:52:23.562 UTC [cauthdsl] func2 -> DEBU 1a3f 0xc000110ce0 principal evaluation fails" +"2020-08-31 20:52:23.562 UTC [cauthdsl] func1 -> DEBU 1a40 0xc000110ce0 gate 1598907143561501900 evaluation fails" +"2020-08-31 20:52:23.562 UTC [policies] Evaluate -> DEBU 1a41 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:23.562 UTC [policies] Evaluate -> DEBU 1a42 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:23.562 UTC [policies] Evaluate -> DEBU 1a43 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-08-31 20:52:23.562 UTC [cauthdsl] func1 -> DEBU 1a44 0xc000111850 gate 1598907143562867800 evaluation starts" +"2020-08-31 20:52:23.562 UTC [cauthdsl] func2 -> DEBU 1a45 0xc000111850 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.563 UTC [cauthdsl] func2 -> DEBU 1a46 0xc000111850 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.563 UTC [cauthdsl] func2 -> DEBU 1a47 0xc000111850 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-08-31 20:52:23.563 UTC [cauthdsl] func2 -> DEBU 1a48 0xc000111850 principal evaluation fails" +"2020-08-31 20:52:23.563 UTC [cauthdsl] func1 -> DEBU 1a49 0xc000111850 gate 1598907143562867800 evaluation fails" +"2020-08-31 20:52:23.563 UTC [policies] Evaluate -> DEBU 1a4a Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:23.563 UTC [policies] Evaluate -> DEBU 1a4b == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:23.564 UTC [policies] func1 -> DEBU 1a4c Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2020-08-31 20:52:23.564 UTC [policies] Evaluate -> DEBU 1a4d Signature set did not satisfy policy /Channel/Application/Readers" +"2020-08-31 20:52:23.564 UTC [policies] Evaluate -> DEBU 1a4e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-08-31 20:52:23.564 UTC [policies] Evaluate -> DEBU 1a4f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:23.564 UTC [policies] Evaluate -> DEBU 1a50 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.564 UTC [policies] Evaluate -> DEBU 1a51 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:23.564 UTC [cauthdsl] func1 -> DEBU 1a52 0xc00035e820 gate 1598907143564675700 evaluation starts" +"2020-08-31 20:52:23.565 UTC [cauthdsl] func2 -> DEBU 1a53 0xc00035e820 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.565 UTC [cauthdsl] func2 -> DEBU 1a54 0xc00035e820 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.565 UTC [cauthdsl] func2 -> DEBU 1a55 0xc00035e820 principal matched by identity 0" +"2020-08-31 20:52:23.565 UTC [msp.identity] Verify -> DEBU 1a56 Verify: digest = 00000000 7c 90 27 c0 43 71 ee e3 20 08 3e 10 ad 1e 27 85 ||.'.Cq.. .>...'.| +00000010 4d 2d 99 0e 4c 13 28 ae 10 25 08 c2 85 91 3c dd |M-..L.(..%....<.|" +"2020-08-31 20:52:23.565 UTC [msp.identity] Verify -> DEBU 1a57 Verify: sig = 00000000 30 44 02 20 08 00 4e 3c bf cd 0b 0b ee 05 0d 24 |0D. ..N<.......$| +00000010 84 52 64 d1 83 0a be 84 a1 75 28 3e 01 b6 28 fa |.Rd......u(>..(.| +00000020 35 aa 5e e7 02 20 34 35 79 fc ca 04 ea 51 5a 4f |5.^.. 45y....QZO| +00000030 1c e3 72 c5 a3 82 06 5f 60 85 23 06 8e 18 57 35 |..r...._`.#...W5| +00000040 e5 da 92 01 63 6d |....cm|" +"2020-08-31 20:52:23.566 UTC [cauthdsl] func2 -> DEBU 1a58 0xc00035e820 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:23.566 UTC [cauthdsl] func1 -> DEBU 1a59 0xc00035e820 gate 1598907143564675700 evaluation succeeds" +"2020-08-31 20:52:23.566 UTC [policies] Evaluate -> DEBU 1a5a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:23.566 UTC [policies] Evaluate -> DEBU 1a5b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:23.566 UTC [policies] Evaluate -> DEBU 1a5c Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:23.566 UTC [policies] Evaluate -> DEBU 1a5d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:23.566 UTC [policies] Evaluate -> DEBU 1a5e Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:23.566 UTC [policies] Evaluate -> DEBU 1a5f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:23.566 UTC [common.deliver] deliverBlocks -> DEBU 1a60 [channel: businesschannel] Received seekInfo (0xc000a088c0) start: > stop: > from 172.18.0.9:51004" +"2020-08-31 20:52:23.567 UTC [fsblkstorage] Next -> DEBU 1a61 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-08-31 20:52:23.567 UTC [fsblkstorage] newBlockfileStream -> DEBU 1a62 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[28475]" +"2020-08-31 20:52:23.567 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a63 Remaining bytes=[110096], Going to peek [8] bytes" +"2020-08-31 20:52:23.567 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a64 Returning blockbytes - length=[28165], placementInfo={fileNum=[0], startOffset=[28475], bytesOffset=[28478]}" +"2020-08-31 20:52:23.568 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1a65 blockbytes [28165] read from file [0]" +"2020-08-31 20:52:23.569 UTC [common.deliver] deliverBlocks -> DEBU 1a66 [channel: businesschannel] Delivering block [1] for (0xc000a088c0) for 172.18.0.9:51004" +"2020-08-31 20:52:23.569 UTC [common.deliver] deliverBlocks -> DEBU 1a67 [channel: businesschannel] Done delivering to 172.18.0.9:51004 for (0xc000a088c0)" +"2020-08-31 20:52:23.569 UTC [common.deliver] Handle -> DEBU 1a68 Waiting for new SeekInfo from 172.18.0.9:51004" +"2020-08-31 20:52:23.570 UTC [common.deliver] Handle -> DEBU 1a69 Attempting to read seek info message from 172.18.0.9:51004" +"2020-08-31 20:52:23.570 UTC [fsblkstorage] waitForBlock -> DEBU 1a6a Came out of wait. maxAvailaBlockNumber=[6]" +"2020-08-31 20:52:23.571 UTC [fsblkstorage] waitForBlock -> DEBU 1a6b Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2020-08-31 20:52:23.577 UTC [grpc] infof -> DEBU 1a6c transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:23.577 UTC [common.deliver] Handle -> WARN 1a6d Error reading from 172.18.0.9:51004: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:23.577 UTC [orderer.common.server] func1 -> DEBU 1a6e Closing Deliver stream" +"2020-08-31 20:52:23.577 UTC [comm.grpc.server] 1 -> INFO 1a6f streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51004 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.5749ms +"2020-08-31 20:52:23.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a70 Sending msg of 28 bytes to 2 on channel businesschannel took 18.7µs" +"2020-08-31 20:52:23.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a71 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 151µs " +"2020-08-31 20:52:23.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1a72 Sending msg of 28 bytes to 3 on channel businesschannel took 10.4µs" +"2020-08-31 20:52:23.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1a73 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 439.7µs " +"2020-08-31 20:52:23.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a74 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:23.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1a75 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:23.740 UTC [orderer.common.server] Deliver -> DEBU 1a76 Starting new Deliver handler" +"2020-08-31 20:52:23.740 UTC [common.deliver] Handle -> DEBU 1a77 Starting new deliver loop for 172.18.0.9:51006" +"2020-08-31 20:52:23.741 UTC [common.deliver] Handle -> DEBU 1a78 Attempting to read seek info message from 172.18.0.9:51006" +"2020-08-31 20:52:23.741 UTC [policies] Evaluate -> DEBU 1a79 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:23.741 UTC [policies] Evaluate -> DEBU 1a7a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.741 UTC [policies] Evaluate -> DEBU 1a7b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-08-31 20:52:23.741 UTC [policies] Evaluate -> DEBU 1a7c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.741 UTC [policies] Evaluate -> DEBU 1a7d == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-08-31 20:52:23.742 UTC [cauthdsl] func1 -> DEBU 1a7e 0xc000e775c0 gate 1598907143741943800 evaluation starts" +"2020-08-31 20:52:23.742 UTC [cauthdsl] func2 -> DEBU 1a7f 0xc000e775c0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.742 UTC [cauthdsl] func2 -> DEBU 1a80 0xc000e775c0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.742 UTC [cauthdsl] func2 -> DEBU 1a81 0xc000e775c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-08-31 20:52:23.742 UTC [cauthdsl] func2 -> DEBU 1a82 0xc000e775c0 principal evaluation fails" +"2020-08-31 20:52:23.742 UTC [cauthdsl] func1 -> DEBU 1a83 0xc000e775c0 gate 1598907143741943800 evaluation fails" +"2020-08-31 20:52:23.743 UTC [policies] Evaluate -> DEBU 1a84 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:23.743 UTC [policies] Evaluate -> DEBU 1a85 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:23.743 UTC [policies] Evaluate -> DEBU 1a86 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-08-31 20:52:23.743 UTC [cauthdsl] func1 -> DEBU 1a87 0xc000e77e00 gate 1598907143743536100 evaluation starts" +"2020-08-31 20:52:23.743 UTC [cauthdsl] func2 -> DEBU 1a88 0xc000e77e00 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.743 UTC [cauthdsl] func2 -> DEBU 1a89 0xc000e77e00 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.743 UTC [cauthdsl] func2 -> DEBU 1a8a 0xc000e77e00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-08-31 20:52:23.744 UTC [cauthdsl] func2 -> DEBU 1a8b 0xc000e77e00 principal evaluation fails" +"2020-08-31 20:52:23.744 UTC [cauthdsl] func1 -> DEBU 1a8c 0xc000e77e00 gate 1598907143743536100 evaluation fails" +"2020-08-31 20:52:23.744 UTC [policies] Evaluate -> DEBU 1a8d Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:23.744 UTC [policies] Evaluate -> DEBU 1a8e == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:23.744 UTC [policies] Evaluate -> DEBU 1a8f == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-08-31 20:52:23.744 UTC [cauthdsl] func1 -> DEBU 1a90 0xc00101a640 gate 1598907143744828100 evaluation starts" +"2020-08-31 20:52:23.745 UTC [cauthdsl] func2 -> DEBU 1a91 0xc00101a640 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.745 UTC [cauthdsl] func2 -> DEBU 1a92 0xc00101a640 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.745 UTC [cauthdsl] func2 -> DEBU 1a93 0xc00101a640 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-08-31 20:52:23.745 UTC [cauthdsl] func2 -> DEBU 1a94 0xc00101a640 principal evaluation fails" +"2020-08-31 20:52:23.746 UTC [cauthdsl] func1 -> DEBU 1a95 0xc00101a640 gate 1598907143744828100 evaluation fails" +"2020-08-31 20:52:23.746 UTC [policies] Evaluate -> DEBU 1a96 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:23.746 UTC [policies] Evaluate -> DEBU 1a97 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:23.746 UTC [policies] func1 -> DEBU 1a98 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2020-08-31 20:52:23.747 UTC [policies] Evaluate -> DEBU 1a99 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-08-31 20:52:23.747 UTC [policies] Evaluate -> DEBU 1a9a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-08-31 20:52:23.747 UTC [policies] Evaluate -> DEBU 1a9b == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:23.747 UTC [policies] Evaluate -> DEBU 1a9c This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.747 UTC [policies] Evaluate -> DEBU 1a9d == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:23.747 UTC [cauthdsl] func1 -> DEBU 1a9e 0xc00101b330 gate 1598907143747824900 evaluation starts" +"2020-08-31 20:52:23.747 UTC [cauthdsl] func2 -> DEBU 1a9f 0xc00101b330 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.748 UTC [cauthdsl] func2 -> DEBU 1aa0 0xc00101b330 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.748 UTC [cauthdsl] func2 -> DEBU 1aa1 0xc00101b330 principal matched by identity 0" +"2020-08-31 20:52:23.748 UTC [msp.identity] Verify -> DEBU 1aa2 Verify: digest = 00000000 f9 57 77 5b 2d d8 c8 76 d4 f3 7f 88 25 43 30 f6 |.Ww[-..v....%C0.| +00000010 90 86 bb 55 fe 7e 66 e9 54 44 12 71 8c e0 9e 49 |...U.~f.TD.q...I|" +"2020-08-31 20:52:23.748 UTC [msp.identity] Verify -> DEBU 1aa3 Verify: sig = 00000000 30 45 02 21 00 c0 2d af 37 32 82 1a 66 d7 04 72 |0E.!..-.72..f..r| +00000010 0a 41 f2 26 e1 e8 fb 6e e9 ab 0f 75 61 b0 f3 80 |.A.&...n...ua...| +00000020 9f d3 7a ad 9f 02 20 55 79 ab 6a bc c1 31 40 d2 |..z... Uy.j..1@.| +00000030 82 06 81 b2 8d 80 05 3f 98 77 4e c3 3b 23 5f cf |.......?.wN.;#_.| +00000040 7f f0 3c c6 15 1c 61 |..<...a|" +"2020-08-31 20:52:23.749 UTC [cauthdsl] func2 -> DEBU 1aa4 0xc00101b330 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:23.749 UTC [cauthdsl] func1 -> DEBU 1aa5 0xc00101b330 gate 1598907143747824900 evaluation succeeds" +"2020-08-31 20:52:23.749 UTC [policies] Evaluate -> DEBU 1aa6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:23.749 UTC [policies] Evaluate -> DEBU 1aa7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:23.749 UTC [policies] Evaluate -> DEBU 1aa8 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:23.749 UTC [policies] Evaluate -> DEBU 1aa9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:23.749 UTC [policies] Evaluate -> DEBU 1aaa Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:23.750 UTC [policies] Evaluate -> DEBU 1aab == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:23.750 UTC [common.deliver] deliverBlocks -> DEBU 1aac [channel: businesschannel] Received seekInfo (0xc000a091c0) start: > stop: > from 172.18.0.9:51006" +"2020-08-31 20:52:23.750 UTC [fsblkstorage] Next -> DEBU 1aad Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-08-31 20:52:23.750 UTC [fsblkstorage] newBlockfileStream -> DEBU 1aae newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[56643]" +"2020-08-31 20:52:23.750 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1aaf Remaining bytes=[81928], Going to peek [8] bytes" +"2020-08-31 20:52:23.751 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab0 Returning blockbytes - length=[28171], placementInfo={fileNum=[0], startOffset=[56643], bytesOffset=[56646]}" +"2020-08-31 20:52:23.751 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1ab1 blockbytes [28171] read from file [0]" +"2020-08-31 20:52:23.751 UTC [common.deliver] deliverBlocks -> DEBU 1ab2 [channel: businesschannel] Delivering block [2] for (0xc000a091c0) for 172.18.0.9:51006" +"2020-08-31 20:52:23.751 UTC [common.deliver] deliverBlocks -> DEBU 1ab3 [channel: businesschannel] Done delivering to 172.18.0.9:51006 for (0xc000a091c0)" +"2020-08-31 20:52:23.752 UTC [fsblkstorage] waitForBlock -> DEBU 1ab4 Came out of wait. maxAvailaBlockNumber=[6]" +"2020-08-31 20:52:23.752 UTC [fsblkstorage] waitForBlock -> DEBU 1ab5 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2020-08-31 20:52:23.752 UTC [common.deliver] Handle -> DEBU 1ab6 Waiting for new SeekInfo from 172.18.0.9:51006" +"2020-08-31 20:52:23.753 UTC [common.deliver] Handle -> DEBU 1ab7 Attempting to read seek info message from 172.18.0.9:51006" +"2020-08-31 20:52:23.760 UTC [grpc] infof -> DEBU 1ab8 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:23.760 UTC [common.deliver] Handle -> WARN 1ab9 Error reading from 172.18.0.9:51006: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:23.760 UTC [orderer.common.server] func1 -> DEBU 1aba Closing Deliver stream" +"2020-08-31 20:52:23.760 UTC [comm.grpc.server] 1 -> INFO 1abb streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51006 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=19.9235ms +"2020-08-31 20:52:23.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1abc Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:23.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1abd Sending msg of 28 bytes to 3 on channel testchainid took 13.1µs" +"2020-08-31 20:52:23.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1abe Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 217.5µs " +"2020-08-31 20:52:23.920 UTC [orderer.common.server] Deliver -> DEBU 1abf Starting new Deliver handler" +"2020-08-31 20:52:23.921 UTC [common.deliver] Handle -> DEBU 1ac0 Starting new deliver loop for 172.18.0.9:51008" +"2020-08-31 20:52:23.921 UTC [common.deliver] Handle -> DEBU 1ac1 Attempting to read seek info message from 172.18.0.9:51008" +"2020-08-31 20:52:23.921 UTC [policies] Evaluate -> DEBU 1ac2 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:23.921 UTC [policies] Evaluate -> DEBU 1ac3 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.921 UTC [policies] Evaluate -> DEBU 1ac4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-08-31 20:52:23.922 UTC [policies] Evaluate -> DEBU 1ac5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.922 UTC [policies] Evaluate -> DEBU 1ac6 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-08-31 20:52:23.922 UTC [cauthdsl] func1 -> DEBU 1ac7 0xc0010eba30 gate 1598907143922536500 evaluation starts" +"2020-08-31 20:52:23.922 UTC [cauthdsl] func2 -> DEBU 1ac8 0xc0010eba30 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.922 UTC [cauthdsl] func2 -> DEBU 1ac9 0xc0010eba30 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.922 UTC [cauthdsl] func2 -> DEBU 1aca 0xc0010eba30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-08-31 20:52:23.923 UTC [cauthdsl] func2 -> DEBU 1acb 0xc0010eba30 principal evaluation fails" +"2020-08-31 20:52:23.923 UTC [cauthdsl] func1 -> DEBU 1acc 0xc0010eba30 gate 1598907143922536500 evaluation fails" +"2020-08-31 20:52:23.923 UTC [policies] Evaluate -> DEBU 1acd Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:23.923 UTC [policies] Evaluate -> DEBU 1ace == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:23.923 UTC [policies] Evaluate -> DEBU 1acf == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-08-31 20:52:23.923 UTC [cauthdsl] func1 -> DEBU 1ad0 0xc001106270 gate 1598907143923820000 evaluation starts" +"2020-08-31 20:52:23.923 UTC [cauthdsl] func2 -> DEBU 1ad1 0xc001106270 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.924 UTC [cauthdsl] func2 -> DEBU 1ad2 0xc001106270 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.924 UTC [cauthdsl] func2 -> DEBU 1ad3 0xc001106270 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-08-31 20:52:23.924 UTC [cauthdsl] func2 -> DEBU 1ad4 0xc001106270 principal evaluation fails" +"2020-08-31 20:52:23.924 UTC [cauthdsl] func1 -> DEBU 1ad5 0xc001106270 gate 1598907143923820000 evaluation fails" +"2020-08-31 20:52:23.924 UTC [policies] Evaluate -> DEBU 1ad6 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:23.924 UTC [policies] Evaluate -> DEBU 1ad7 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:23.925 UTC [policies] Evaluate -> DEBU 1ad8 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-08-31 20:52:23.925 UTC [cauthdsl] func1 -> DEBU 1ad9 0xc001106ab0 gate 1598907143925278900 evaluation starts" +"2020-08-31 20:52:23.925 UTC [cauthdsl] func2 -> DEBU 1ada 0xc001106ab0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.925 UTC [cauthdsl] func2 -> DEBU 1adb 0xc001106ab0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.925 UTC [cauthdsl] func2 -> DEBU 1adc 0xc001106ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-08-31 20:52:23.926 UTC [cauthdsl] func2 -> DEBU 1add 0xc001106ab0 principal evaluation fails" +"2020-08-31 20:52:23.926 UTC [cauthdsl] func1 -> DEBU 1ade 0xc001106ab0 gate 1598907143925278900 evaluation fails" +"2020-08-31 20:52:23.926 UTC [policies] Evaluate -> DEBU 1adf Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:23.926 UTC [policies] Evaluate -> DEBU 1ae0 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:23.926 UTC [policies] func1 -> DEBU 1ae1 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2020-08-31 20:52:23.926 UTC [policies] Evaluate -> DEBU 1ae2 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-08-31 20:52:23.926 UTC [policies] Evaluate -> DEBU 1ae3 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-08-31 20:52:23.926 UTC [policies] Evaluate -> DEBU 1ae4 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:23.926 UTC [policies] Evaluate -> DEBU 1ae5 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:23.926 UTC [policies] Evaluate -> DEBU 1ae6 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:23.927 UTC [cauthdsl] func1 -> DEBU 1ae7 0xc0011077a0 gate 1598907143927023800 evaluation starts" +"2020-08-31 20:52:23.927 UTC [cauthdsl] func2 -> DEBU 1ae8 0xc0011077a0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:23.927 UTC [cauthdsl] func2 -> DEBU 1ae9 0xc0011077a0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:23.927 UTC [cauthdsl] func2 -> DEBU 1aea 0xc0011077a0 principal matched by identity 0" +"2020-08-31 20:52:23.927 UTC [msp.identity] Verify -> DEBU 1aeb Verify: digest = 00000000 0c cb 5e 3f 86 69 5a 75 42 42 88 5e e1 4e e8 d2 |..^?.iZuBB.^.N..| +00000010 5e 02 8d 9f 11 da 10 53 df e6 fb 41 cb 72 3a 76 |^......S...A.r:v|" +"2020-08-31 20:52:23.927 UTC [msp.identity] Verify -> DEBU 1aec Verify: sig = 00000000 30 44 02 20 29 8d 11 49 12 fb 66 d6 b2 e5 c4 2e |0D. )..I..f.....| +00000010 fb 28 2c af b8 97 a8 98 c9 cc ac 3e f2 12 27 72 |.(,........>..'r| +00000020 60 13 1c f5 02 20 5d 12 4d 28 2e 0e df 31 4d ed |`.... ].M(...1M.| +00000030 7d b1 ee 39 46 a3 5c f4 f7 8d 8b a7 6d e8 11 54 |}..9F.\.....m..T| +00000040 3f b2 6b cd 73 0b |?.k.s.|" +"2020-08-31 20:52:23.928 UTC [cauthdsl] func2 -> DEBU 1aed 0xc0011077a0 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:23.928 UTC [cauthdsl] func1 -> DEBU 1aee 0xc0011077a0 gate 1598907143927023800 evaluation succeeds" +"2020-08-31 20:52:23.928 UTC [policies] Evaluate -> DEBU 1aef Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:23.928 UTC [policies] Evaluate -> DEBU 1af0 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:23.928 UTC [policies] Evaluate -> DEBU 1af1 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:23.928 UTC [policies] Evaluate -> DEBU 1af2 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:23.928 UTC [policies] Evaluate -> DEBU 1af3 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:23.929 UTC [policies] Evaluate -> DEBU 1af4 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:23.929 UTC [common.deliver] deliverBlocks -> DEBU 1af5 [channel: businesschannel] Received seekInfo (0xc000a09800) start: > stop: > from 172.18.0.9:51008" +"2020-08-31 20:52:23.929 UTC [fsblkstorage] Next -> DEBU 1af6 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-08-31 20:52:23.929 UTC [fsblkstorage] newBlockfileStream -> DEBU 1af7 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[84817]" +"2020-08-31 20:52:23.929 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1af8 Remaining bytes=[53754], Going to peek [8] bytes" +"2020-08-31 20:52:23.929 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1af9 Returning blockbytes - length=[4550], placementInfo={fileNum=[0], startOffset=[84817], bytesOffset=[84819]}" +"2020-08-31 20:52:23.930 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1afa blockbytes [4550] read from file [0]" +"2020-08-31 20:52:23.930 UTC [common.deliver] deliverBlocks -> DEBU 1afb [channel: businesschannel] Delivering block [3] for (0xc000a09800) for 172.18.0.9:51008" +"2020-08-31 20:52:23.930 UTC [common.deliver] deliverBlocks -> DEBU 1afc [channel: businesschannel] Done delivering to 172.18.0.9:51008 for (0xc000a09800)" +"2020-08-31 20:52:23.930 UTC [common.deliver] Handle -> DEBU 1afd Waiting for new SeekInfo from 172.18.0.9:51008" +"2020-08-31 20:52:23.930 UTC [common.deliver] Handle -> DEBU 1afe Attempting to read seek info message from 172.18.0.9:51008" +"2020-08-31 20:52:23.930 UTC [fsblkstorage] waitForBlock -> DEBU 1aff Came out of wait. maxAvailaBlockNumber=[6]" +"2020-08-31 20:52:23.931 UTC [fsblkstorage] waitForBlock -> DEBU 1b00 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2020-08-31 20:52:23.937 UTC [common.deliver] Handle -> WARN 1b01 Error reading from 172.18.0.9:51008: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:23.937 UTC [orderer.common.server] func1 -> DEBU 1b03 Closing Deliver stream" +"2020-08-31 20:52:23.937 UTC [comm.grpc.server] 1 -> INFO 1b04 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51008 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=17.036ms +"2020-08-31 20:52:23.937 UTC [grpc] infof -> DEBU 1b02 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:24.081 UTC [orderer.common.server] Deliver -> DEBU 1b05 Starting new Deliver handler" +"2020-08-31 20:52:24.081 UTC [common.deliver] Handle -> DEBU 1b06 Starting new deliver loop for 172.18.0.9:51010" +"2020-08-31 20:52:24.081 UTC [common.deliver] Handle -> DEBU 1b07 Attempting to read seek info message from 172.18.0.9:51010" +"2020-08-31 20:52:24.083 UTC [policies] Evaluate -> DEBU 1b08 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:24.083 UTC [policies] Evaluate -> DEBU 1b09 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:24.083 UTC [policies] Evaluate -> DEBU 1b0a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-08-31 20:52:24.083 UTC [policies] Evaluate -> DEBU 1b0b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:24.083 UTC [policies] Evaluate -> DEBU 1b0c == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-08-31 20:52:24.084 UTC [cauthdsl] func1 -> DEBU 1b0d 0xc0011ca1c0 gate 1598907144084096300 evaluation starts" +"2020-08-31 20:52:24.084 UTC [cauthdsl] func2 -> DEBU 1b0e 0xc0011ca1c0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:24.084 UTC [cauthdsl] func2 -> DEBU 1b0f 0xc0011ca1c0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:24.084 UTC [cauthdsl] func2 -> DEBU 1b10 0xc0011ca1c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-08-31 20:52:24.084 UTC [cauthdsl] func2 -> DEBU 1b11 0xc0011ca1c0 principal evaluation fails" +"2020-08-31 20:52:24.084 UTC [cauthdsl] func1 -> DEBU 1b12 0xc0011ca1c0 gate 1598907144084096300 evaluation fails" +"2020-08-31 20:52:24.085 UTC [policies] Evaluate -> DEBU 1b13 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:24.085 UTC [policies] Evaluate -> DEBU 1b14 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:24.085 UTC [policies] Evaluate -> DEBU 1b15 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-08-31 20:52:24.085 UTC [cauthdsl] func1 -> DEBU 1b16 0xc0011caa00 gate 1598907144085493500 evaluation starts" +"2020-08-31 20:52:24.085 UTC [cauthdsl] func2 -> DEBU 1b17 0xc0011caa00 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:24.085 UTC [cauthdsl] func2 -> DEBU 1b18 0xc0011caa00 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:24.085 UTC [cauthdsl] func2 -> DEBU 1b19 0xc0011caa00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-08-31 20:52:24.086 UTC [cauthdsl] func2 -> DEBU 1b1a 0xc0011caa00 principal evaluation fails" +"2020-08-31 20:52:24.086 UTC [cauthdsl] func1 -> DEBU 1b1b 0xc0011caa00 gate 1598907144085493500 evaluation fails" +"2020-08-31 20:52:24.086 UTC [policies] Evaluate -> DEBU 1b1c Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:24.086 UTC [policies] Evaluate -> DEBU 1b1d == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:24.086 UTC [policies] Evaluate -> DEBU 1b1e == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-08-31 20:52:24.086 UTC [cauthdsl] func1 -> DEBU 1b1f 0xc0011cb240 gate 1598907144086826300 evaluation starts" +"2020-08-31 20:52:24.087 UTC [cauthdsl] func2 -> DEBU 1b20 0xc0011cb240 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:24.087 UTC [cauthdsl] func2 -> DEBU 1b21 0xc0011cb240 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:24.087 UTC [cauthdsl] func2 -> DEBU 1b22 0xc0011cb240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-08-31 20:52:24.087 UTC [cauthdsl] func2 -> DEBU 1b23 0xc0011cb240 principal evaluation fails" +"2020-08-31 20:52:24.087 UTC [cauthdsl] func1 -> DEBU 1b24 0xc0011cb240 gate 1598907144086826300 evaluation fails" +"2020-08-31 20:52:24.088 UTC [policies] Evaluate -> DEBU 1b25 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:24.088 UTC [policies] Evaluate -> DEBU 1b26 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:24.088 UTC [policies] func1 -> DEBU 1b27 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org2MSP/Readers Org3MSP/Readers Org1MSP/Readers ]" +"2020-08-31 20:52:24.088 UTC [policies] Evaluate -> DEBU 1b28 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-08-31 20:52:24.088 UTC [policies] Evaluate -> DEBU 1b29 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-08-31 20:52:24.088 UTC [policies] Evaluate -> DEBU 1b2a == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:24.088 UTC [policies] Evaluate -> DEBU 1b2b This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:24.089 UTC [policies] Evaluate -> DEBU 1b2c == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:24.089 UTC [cauthdsl] func1 -> DEBU 1b2d 0xc0011cbf30 gate 1598907144089326400 evaluation starts" +"2020-08-31 20:52:24.089 UTC [cauthdsl] func2 -> DEBU 1b2e 0xc0011cbf30 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:24.089 UTC [cauthdsl] func2 -> DEBU 1b2f 0xc0011cbf30 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:24.089 UTC [cauthdsl] func2 -> DEBU 1b30 0xc0011cbf30 principal matched by identity 0" +"2020-08-31 20:52:24.089 UTC [msp.identity] Verify -> DEBU 1b31 Verify: digest = 00000000 8b f8 34 72 49 dd 35 2d 09 df 3f 84 27 74 13 eb |..4rI.5-..?.'t..| +00000010 34 a2 bb a0 b8 1e a5 1f e2 eb a2 45 51 8e d3 1c |4..........EQ...|" +"2020-08-31 20:52:24.090 UTC [msp.identity] Verify -> DEBU 1b32 Verify: sig = 00000000 30 44 02 20 23 c0 c8 28 25 03 cd b9 21 63 fc 98 |0D. #..(%...!c..| +00000010 5d d6 49 ba db c8 c0 c2 94 94 39 0b c0 b4 20 fb |].I.......9... .| +00000020 e6 ef 85 c9 02 20 0e be 23 e1 29 b3 12 a5 a8 27 |..... ..#.)....'| +00000030 c0 ff 13 3a 07 98 63 44 9e a7 3c 18 b2 ca 52 d7 |...:..cD..<...R.| +00000040 66 5a dc 1b 01 71 |fZ...q|" +"2020-08-31 20:52:24.090 UTC [cauthdsl] func2 -> DEBU 1b33 0xc0011cbf30 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:24.090 UTC [cauthdsl] func1 -> DEBU 1b34 0xc0011cbf30 gate 1598907144089326400 evaluation succeeds" +"2020-08-31 20:52:24.091 UTC [policies] Evaluate -> DEBU 1b35 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:24.091 UTC [policies] Evaluate -> DEBU 1b36 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:24.091 UTC [policies] Evaluate -> DEBU 1b37 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:24.091 UTC [policies] Evaluate -> DEBU 1b38 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:24.091 UTC [policies] Evaluate -> DEBU 1b39 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:24.091 UTC [policies] Evaluate -> DEBU 1b3a == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:24.092 UTC [common.deliver] deliverBlocks -> DEBU 1b3b [channel: businesschannel] Received seekInfo (0xc000444180) start: > stop: > from 172.18.0.9:51010" +"2020-08-31 20:52:24.092 UTC [fsblkstorage] Next -> DEBU 1b3c Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-08-31 20:52:24.092 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b3d newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[89369]" +"2020-08-31 20:52:24.092 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b3e Remaining bytes=[49202], Going to peek [8] bytes" +"2020-08-31 20:52:24.093 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b3f Returning blockbytes - length=[4010], placementInfo={fileNum=[0], startOffset=[89369], bytesOffset=[89371]}" +"2020-08-31 20:52:24.093 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b40 blockbytes [4010] read from file [0]" +"2020-08-31 20:52:24.094 UTC [common.deliver] deliverBlocks -> DEBU 1b41 [channel: businesschannel] Delivering block [4] for (0xc000444180) for 172.18.0.9:51010" +"2020-08-31 20:52:24.095 UTC [common.deliver] deliverBlocks -> DEBU 1b42 [channel: businesschannel] Done delivering to 172.18.0.9:51010 for (0xc000444180)" +"2020-08-31 20:52:24.095 UTC [common.deliver] Handle -> DEBU 1b43 Waiting for new SeekInfo from 172.18.0.9:51010" +"2020-08-31 20:52:24.095 UTC [common.deliver] Handle -> DEBU 1b44 Attempting to read seek info message from 172.18.0.9:51010" +"2020-08-31 20:52:24.095 UTC [fsblkstorage] waitForBlock -> DEBU 1b45 Came out of wait. maxAvailaBlockNumber=[6]" +"2020-08-31 20:52:24.095 UTC [fsblkstorage] waitForBlock -> DEBU 1b46 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2020-08-31 20:52:24.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b47 Sending msg of 28 bytes to 2 on channel businesschannel took 13.4µs" +"2020-08-31 20:52:24.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b48 Sending msg of 28 bytes to 3 on channel businesschannel took 6.6µs" +"2020-08-31 20:52:24.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b49 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 141.5µs " +"2020-08-31 20:52:24.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b4a Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.0837ms " +"2020-08-31 20:52:24.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4b Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:24.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b4c Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:24.104 UTC [grpc] infof -> DEBU 1b4e transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:24.104 UTC [common.deliver] Handle -> WARN 1b4d Error reading from 172.18.0.9:51010: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:24.104 UTC [orderer.common.server] func1 -> DEBU 1b4f Closing Deliver stream" +"2020-08-31 20:52:24.104 UTC [comm.grpc.server] 1 -> INFO 1b50 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51010 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=23.1691ms +"2020-08-31 20:52:24.282 UTC [orderer.common.server] Deliver -> DEBU 1b51 Starting new Deliver handler" +"2020-08-31 20:52:24.282 UTC [common.deliver] Handle -> DEBU 1b52 Starting new deliver loop for 172.18.0.9:51012" +"2020-08-31 20:52:24.282 UTC [common.deliver] Handle -> DEBU 1b53 Attempting to read seek info message from 172.18.0.9:51012" +"2020-08-31 20:52:24.283 UTC [policies] Evaluate -> DEBU 1b54 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:24.283 UTC [policies] Evaluate -> DEBU 1b55 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:24.283 UTC [policies] Evaluate -> DEBU 1b56 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-08-31 20:52:24.283 UTC [policies] Evaluate -> DEBU 1b57 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:24.284 UTC [policies] Evaluate -> DEBU 1b58 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-08-31 20:52:24.284 UTC [cauthdsl] func1 -> DEBU 1b59 0xc00127acc0 gate 1598907144284150400 evaluation starts" +"2020-08-31 20:52:24.284 UTC [cauthdsl] func2 -> DEBU 1b5a 0xc00127acc0 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:24.284 UTC [cauthdsl] func2 -> DEBU 1b5b 0xc00127acc0 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:24.285 UTC [cauthdsl] func2 -> DEBU 1b5c 0xc00127acc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-08-31 20:52:24.285 UTC [cauthdsl] func2 -> DEBU 1b5d 0xc00127acc0 principal evaluation fails" +"2020-08-31 20:52:24.285 UTC [cauthdsl] func1 -> DEBU 1b5e 0xc00127acc0 gate 1598907144284150400 evaluation fails" +"2020-08-31 20:52:24.285 UTC [policies] Evaluate -> DEBU 1b5f Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:24.285 UTC [policies] Evaluate -> DEBU 1b60 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:24.285 UTC [policies] Evaluate -> DEBU 1b61 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-08-31 20:52:24.285 UTC [cauthdsl] func1 -> DEBU 1b62 0xc00127b500 gate 1598907144285748900 evaluation starts" +"2020-08-31 20:52:24.286 UTC [cauthdsl] func2 -> DEBU 1b63 0xc00127b500 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:24.286 UTC [cauthdsl] func2 -> DEBU 1b64 0xc00127b500 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:24.286 UTC [cauthdsl] func2 -> DEBU 1b65 0xc00127b500 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-08-31 20:52:24.286 UTC [cauthdsl] func2 -> DEBU 1b66 0xc00127b500 principal evaluation fails" +"2020-08-31 20:52:24.286 UTC [cauthdsl] func1 -> DEBU 1b67 0xc00127b500 gate 1598907144285748900 evaluation fails" +"2020-08-31 20:52:24.286 UTC [policies] Evaluate -> DEBU 1b68 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:24.286 UTC [policies] Evaluate -> DEBU 1b69 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:24.286 UTC [policies] Evaluate -> DEBU 1b6a == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-08-31 20:52:24.287 UTC [cauthdsl] func1 -> DEBU 1b6b 0xc00127bd40 gate 1598907144287332300 evaluation starts" +"2020-08-31 20:52:24.287 UTC [cauthdsl] func2 -> DEBU 1b6c 0xc00127bd40 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:24.287 UTC [cauthdsl] func2 -> DEBU 1b6d 0xc00127bd40 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:24.287 UTC [cauthdsl] func2 -> DEBU 1b6e 0xc00127bd40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-08-31 20:52:24.287 UTC [cauthdsl] func2 -> DEBU 1b6f 0xc00127bd40 principal evaluation fails" +"2020-08-31 20:52:24.287 UTC [cauthdsl] func1 -> DEBU 1b70 0xc00127bd40 gate 1598907144287332300 evaluation fails" +"2020-08-31 20:52:24.287 UTC [policies] Evaluate -> DEBU 1b71 Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:24.288 UTC [policies] Evaluate -> DEBU 1b72 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:24.288 UTC [policies] func1 -> DEBU 1b73 Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org3MSP/Readers Org1MSP/Readers Org2MSP/Readers ]" +"2020-08-31 20:52:24.288 UTC [policies] Evaluate -> DEBU 1b74 Signature set did not satisfy policy /Channel/Application/Readers" +"2020-08-31 20:52:24.288 UTC [policies] Evaluate -> DEBU 1b75 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-08-31 20:52:24.288 UTC [policies] Evaluate -> DEBU 1b76 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:24.288 UTC [policies] Evaluate -> DEBU 1b77 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:24.288 UTC [policies] Evaluate -> DEBU 1b78 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:24.288 UTC [cauthdsl] func1 -> DEBU 1b79 0xc0012b4a30 gate 1598907144288560100 evaluation starts" +"2020-08-31 20:52:24.288 UTC [cauthdsl] func2 -> DEBU 1b7a 0xc0012b4a30 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:24.288 UTC [cauthdsl] func2 -> DEBU 1b7b 0xc0012b4a30 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:24.289 UTC [cauthdsl] func2 -> DEBU 1b7c 0xc0012b4a30 principal matched by identity 0" +"2020-08-31 20:52:24.289 UTC [msp.identity] Verify -> DEBU 1b7d Verify: digest = 00000000 29 a9 65 d8 4a 1f 7d e9 8c 2b 7f bf a2 be 21 18 |).e.J.}..+....!.| +00000010 0e 2d 6e 75 24 6f 33 71 24 b8 87 78 d6 0f fb 83 |.-nu$o3q$..x....|" +"2020-08-31 20:52:24.289 UTC [msp.identity] Verify -> DEBU 1b7e Verify: sig = 00000000 30 45 02 21 00 bd 59 9c 24 e6 0b 01 15 f2 d8 ac |0E.!..Y.$.......| +00000010 94 00 a3 43 0b 13 b6 f1 99 7f 2c 94 f8 b9 ac 08 |...C......,.....| +00000020 ea 3c 49 bc 90 02 20 2e 52 da 6c 53 9d b6 a2 6c |. DEBU 1b7f 0xc0012b4a30 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:24.290 UTC [cauthdsl] func1 -> DEBU 1b80 0xc0012b4a30 gate 1598907144288560100 evaluation succeeds" +"2020-08-31 20:52:24.290 UTC [policies] Evaluate -> DEBU 1b81 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:24.290 UTC [policies] Evaluate -> DEBU 1b82 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:24.290 UTC [policies] Evaluate -> DEBU 1b83 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:24.290 UTC [policies] Evaluate -> DEBU 1b84 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:24.290 UTC [policies] Evaluate -> DEBU 1b85 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:24.290 UTC [policies] Evaluate -> DEBU 1b86 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:24.291 UTC [common.deliver] deliverBlocks -> DEBU 1b87 [channel: businesschannel] Received seekInfo (0xc0004448c0) start: > stop: > from 172.18.0.9:51012" +"2020-08-31 20:52:24.291 UTC [fsblkstorage] Next -> DEBU 1b88 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-08-31 20:52:24.291 UTC [fsblkstorage] newBlockfileStream -> DEBU 1b89 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[93381]" +"2020-08-31 20:52:24.291 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b8a Remaining bytes=[45190], Going to peek [8] bytes" +"2020-08-31 20:52:24.291 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b8b Returning blockbytes - length=[4009], placementInfo={fileNum=[0], startOffset=[93381], bytesOffset=[93383]}" +"2020-08-31 20:52:24.291 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1b8c blockbytes [4009] read from file [0]" +"2020-08-31 20:52:24.291 UTC [common.deliver] deliverBlocks -> DEBU 1b8d [channel: businesschannel] Delivering block [5] for (0xc0004448c0) for 172.18.0.9:51012" +"2020-08-31 20:52:24.292 UTC [common.deliver] deliverBlocks -> DEBU 1b8e [channel: businesschannel] Done delivering to 172.18.0.9:51012 for (0xc0004448c0)" +"2020-08-31 20:52:24.292 UTC [common.deliver] Handle -> DEBU 1b8f Waiting for new SeekInfo from 172.18.0.9:51012" +"2020-08-31 20:52:24.292 UTC [common.deliver] Handle -> DEBU 1b90 Attempting to read seek info message from 172.18.0.9:51012" +"2020-08-31 20:52:24.292 UTC [fsblkstorage] waitForBlock -> DEBU 1b91 Came out of wait. maxAvailaBlockNumber=[6]" +"2020-08-31 20:52:24.292 UTC [fsblkstorage] waitForBlock -> DEBU 1b92 Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2020-08-31 20:52:24.298 UTC [grpc] infof -> DEBU 1b93 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:24.298 UTC [common.deliver] Handle -> WARN 1b94 Error reading from 172.18.0.9:51012: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:24.298 UTC [orderer.common.server] func1 -> DEBU 1b95 Closing Deliver stream" +"2020-08-31 20:52:24.298 UTC [comm.grpc.server] 1 -> INFO 1b96 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51012 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=16.9316ms +"2020-08-31 20:52:24.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1b97 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:24.307 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1b98 Sending msg of 28 bytes to 3 on channel testchainid took 29.2µs" +"2020-08-31 20:52:24.308 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1b99 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 588.8µs " +"2020-08-31 20:52:24.479 UTC [orderer.common.server] Deliver -> DEBU 1b9a Starting new Deliver handler" +"2020-08-31 20:52:24.480 UTC [common.deliver] Handle -> DEBU 1b9b Starting new deliver loop for 172.18.0.9:51014" +"2020-08-31 20:52:24.480 UTC [common.deliver] Handle -> DEBU 1b9c Attempting to read seek info message from 172.18.0.9:51014" +"2020-08-31 20:52:24.480 UTC [policies] Evaluate -> DEBU 1b9d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:24.480 UTC [policies] Evaluate -> DEBU 1b9e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:24.480 UTC [policies] Evaluate -> DEBU 1b9f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers ==" +"2020-08-31 20:52:24.481 UTC [policies] Evaluate -> DEBU 1ba0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:24.481 UTC [policies] Evaluate -> DEBU 1ba1 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers ==" +"2020-08-31 20:52:24.481 UTC [cauthdsl] func1 -> DEBU 1ba2 0xc001384d00 gate 1598907144481531200 evaluation starts" +"2020-08-31 20:52:24.481 UTC [cauthdsl] func2 -> DEBU 1ba3 0xc001384d00 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:24.481 UTC [cauthdsl] func2 -> DEBU 1ba4 0xc001384d00 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:24.482 UTC [cauthdsl] func2 -> DEBU 1ba5 0xc001384d00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got OrdererMSP)" +"2020-08-31 20:52:24.482 UTC [cauthdsl] func2 -> DEBU 1ba6 0xc001384d00 principal evaluation fails" +"2020-08-31 20:52:24.482 UTC [cauthdsl] func1 -> DEBU 1ba7 0xc001384d00 gate 1598907144481531200 evaluation fails" +"2020-08-31 20:52:24.482 UTC [policies] Evaluate -> DEBU 1ba8 Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:24.483 UTC [policies] Evaluate -> DEBU 1ba9 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers" +"2020-08-31 20:52:24.483 UTC [policies] Evaluate -> DEBU 1baa == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers ==" +"2020-08-31 20:52:24.483 UTC [cauthdsl] func1 -> DEBU 1bab 0xc001385540 gate 1598907144483476800 evaluation starts" +"2020-08-31 20:52:24.483 UTC [cauthdsl] func2 -> DEBU 1bac 0xc001385540 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:24.483 UTC [cauthdsl] func2 -> DEBU 1bad 0xc001385540 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:24.484 UTC [cauthdsl] func2 -> DEBU 1bae 0xc001385540 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got OrdererMSP)" +"2020-08-31 20:52:24.484 UTC [cauthdsl] func2 -> DEBU 1baf 0xc001385540 principal evaluation fails" +"2020-08-31 20:52:24.484 UTC [cauthdsl] func1 -> DEBU 1bb0 0xc001385540 gate 1598907144483476800 evaluation fails" +"2020-08-31 20:52:24.484 UTC [policies] Evaluate -> DEBU 1bb1 Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:24.484 UTC [policies] Evaluate -> DEBU 1bb2 == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers" +"2020-08-31 20:52:24.485 UTC [policies] Evaluate -> DEBU 1bb3 == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers ==" +"2020-08-31 20:52:24.491 UTC [cauthdsl] func1 -> DEBU 1bb4 0xc001385d80 gate 1598907144491747100 evaluation starts" +"2020-08-31 20:52:24.492 UTC [cauthdsl] func2 -> DEBU 1bb5 0xc001385d80 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:24.492 UTC [cauthdsl] func2 -> DEBU 1bb6 0xc001385d80 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:24.492 UTC [cauthdsl] func2 -> DEBU 1bb7 0xc001385d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got OrdererMSP)" +"2020-08-31 20:52:24.492 UTC [cauthdsl] func2 -> DEBU 1bb8 0xc001385d80 principal evaluation fails" +"2020-08-31 20:52:24.492 UTC [cauthdsl] func1 -> DEBU 1bb9 0xc001385d80 gate 1598907144491747100 evaluation fails" +"2020-08-31 20:52:24.492 UTC [policies] Evaluate -> DEBU 1bba Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:24.493 UTC [policies] Evaluate -> DEBU 1bbb == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers" +"2020-08-31 20:52:24.493 UTC [policies] func1 -> DEBU 1bbc Evaluation Failed: Only 0 policies were satisfied, but needed 1 of [ Org1MSP/Readers Org2MSP/Readers Org3MSP/Readers ]" +"2020-08-31 20:52:24.493 UTC [policies] Evaluate -> DEBU 1bbd Signature set did not satisfy policy /Channel/Application/Readers" +"2020-08-31 20:52:24.493 UTC [policies] Evaluate -> DEBU 1bbe == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers" +"2020-08-31 20:52:24.493 UTC [policies] Evaluate -> DEBU 1bbf == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:24.493 UTC [policies] Evaluate -> DEBU 1bc0 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:24.493 UTC [policies] Evaluate -> DEBU 1bc1 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:24.494 UTC [cauthdsl] func1 -> DEBU 1bc2 0xc001384c80 gate 1598907144494368500 evaluation starts" +"2020-08-31 20:52:24.494 UTC [cauthdsl] func2 -> DEBU 1bc3 0xc001384c80 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:24.494 UTC [cauthdsl] func2 -> DEBU 1bc4 0xc001384c80 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:24.494 UTC [cauthdsl] func2 -> DEBU 1bc5 0xc001384c80 principal matched by identity 0" +"2020-08-31 20:52:24.494 UTC [msp.identity] Verify -> DEBU 1bc6 Verify: digest = 00000000 73 b4 7f 7b 48 4a ab 35 c6 2a 01 a7 16 87 ac 7b |s..{HJ.5.*.....{| +00000010 d3 29 65 3a 6a f2 e2 85 b7 1e 06 eb 90 6c 60 32 |.)e:j........l`2|" +"2020-08-31 20:52:24.494 UTC [msp.identity] Verify -> DEBU 1bc7 Verify: sig = 00000000 30 45 02 21 00 e6 b5 c6 4d 9e 3a 88 39 f3 9b fe |0E.!....M.:.9...| +00000010 28 3e 45 4f ab 07 02 84 2e d5 da 7d 9a 11 95 16 |(>EO.......}....| +00000020 d0 9d 0f 32 9c 02 20 1e dd d1 f9 67 a2 e7 34 ea |...2.. ....g..4.| +00000030 53 36 44 05 bb 33 f2 7b 56 87 77 b2 7c a3 a5 80 |S6D..3.{V.w.|...| +00000040 1b 7e 62 6d 7f e8 0f |.~bm...|" +"2020-08-31 20:52:24.495 UTC [cauthdsl] func2 -> DEBU 1bc8 0xc001384c80 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:24.495 UTC [cauthdsl] func1 -> DEBU 1bc9 0xc001384c80 gate 1598907144494368500 evaluation succeeds" +"2020-08-31 20:52:24.495 UTC [policies] Evaluate -> DEBU 1bca Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:24.495 UTC [policies] Evaluate -> DEBU 1bcb == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:24.495 UTC [policies] Evaluate -> DEBU 1bcc Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:24.495 UTC [policies] Evaluate -> DEBU 1bcd == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:24.495 UTC [policies] Evaluate -> DEBU 1bce Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:24.495 UTC [policies] Evaluate -> DEBU 1bcf == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:24.495 UTC [common.deliver] deliverBlocks -> DEBU 1bd0 [channel: businesschannel] Received seekInfo (0xc00093ff40) start: > stop: > from 172.18.0.9:51014" +"2020-08-31 20:52:24.495 UTC [fsblkstorage] Next -> DEBU 1bd1 Initializing block stream for iterator. itr.maxBlockNumAvailable=6" +"2020-08-31 20:52:24.496 UTC [fsblkstorage] newBlockfileStream -> DEBU 1bd2 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/businesschannel/blockfile_000000], startOffset=[97392]" +"2020-08-31 20:52:24.496 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bd3 Remaining bytes=[41179], Going to peek [8] bytes" +"2020-08-31 20:52:24.496 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bd4 Returning blockbytes - length=[41176], placementInfo={fileNum=[0], startOffset=[97392], bytesOffset=[97395]}" +"2020-08-31 20:52:24.496 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bd5 blockbytes [41176] read from file [0]" +"2020-08-31 20:52:24.496 UTC [common.deliver] deliverBlocks -> DEBU 1bd6 [channel: businesschannel] Delivering block [6] for (0xc00093ff40) for 172.18.0.9:51014" +"2020-08-31 20:52:24.496 UTC [common.deliver] deliverBlocks -> DEBU 1bd7 [channel: businesschannel] Done delivering to 172.18.0.9:51014 for (0xc00093ff40)" +"2020-08-31 20:52:24.497 UTC [common.deliver] Handle -> DEBU 1bd8 Waiting for new SeekInfo from 172.18.0.9:51014" +"2020-08-31 20:52:24.497 UTC [common.deliver] Handle -> DEBU 1bd9 Attempting to read seek info message from 172.18.0.9:51014" +"2020-08-31 20:52:24.497 UTC [fsblkstorage] waitForBlock -> DEBU 1bda Came out of wait. maxAvailaBlockNumber=[6]" +"2020-08-31 20:52:24.497 UTC [fsblkstorage] waitForBlock -> DEBU 1bdb Going to wait for newer blocks. maxAvailaBlockNumber=[6], waitForBlockNum=[7]" +"2020-08-31 20:52:24.505 UTC [common.deliver] Handle -> WARN 1bdc Error reading from 172.18.0.9:51014: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:24.505 UTC [orderer.common.server] func1 -> DEBU 1bdd Closing Deliver stream" +"2020-08-31 20:52:24.506 UTC [grpc] infof -> DEBU 1bde transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:24.505 UTC [comm.grpc.server] 1 -> INFO 1bdf streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51014 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=28.7422ms +"2020-08-31 20:52:24.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be0 Sending msg of 28 bytes to 2 on channel businesschannel took 33.6µs" +"2020-08-31 20:52:24.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 449.6µs " +"2020-08-31 20:52:24.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1be2 Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +"2020-08-31 20:52:24.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1be3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 392.8µs " +"2020-08-31 20:52:24.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1be4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:24.600 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1be5 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:24.669 UTC [orderer.common.server] Deliver -> DEBU 1be6 Starting new Deliver handler" +"2020-08-31 20:52:24.669 UTC [common.deliver] Handle -> DEBU 1be7 Starting new deliver loop for 172.18.0.9:51016" +"2020-08-31 20:52:24.669 UTC [common.deliver] Handle -> DEBU 1be8 Attempting to read seek info message from 172.18.0.9:51016" +"2020-08-31 20:52:24.671 UTC [policies] Evaluate -> DEBU 1be9 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:24.671 UTC [policies] Evaluate -> DEBU 1bea This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:24.671 UTC [policies] Evaluate -> DEBU 1beb == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:24.671 UTC [policies] Evaluate -> DEBU 1bec This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:24.671 UTC [policies] Evaluate -> DEBU 1bed == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:24.672 UTC [cauthdsl] func1 -> DEBU 1bee 0xc0012eda00 gate 1598907144672053400 evaluation starts" +"2020-08-31 20:52:24.672 UTC [cauthdsl] func2 -> DEBU 1bef 0xc0012eda00 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:24.672 UTC [cauthdsl] func2 -> DEBU 1bf0 0xc0012eda00 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:24.672 UTC [cauthdsl] func2 -> DEBU 1bf1 0xc0012eda00 principal matched by identity 0" +"2020-08-31 20:52:24.673 UTC [msp.identity] Verify -> DEBU 1bf2 Verify: digest = 00000000 d0 b5 6a 11 9d f9 47 cf 05 d0 3e e8 95 8b c4 84 |..j...G...>.....| +00000010 34 f3 40 98 07 4e ab e3 b9 6d 9c 3d 91 65 30 82 |4.@..N...m.=.e0.|" +"2020-08-31 20:52:24.673 UTC [msp.identity] Verify -> DEBU 1bf3 Verify: sig = 00000000 30 44 02 20 01 f9 43 d6 4b a0 51 46 b7 db c2 fa |0D. ..C.K.QF....| +00000010 23 bd a9 a3 6d 18 b8 fb 92 4b 3d c4 ca da c7 89 |#...m....K=.....| +00000020 99 94 95 96 02 20 74 8c d4 dc 11 e8 73 17 6a e3 |..... t.....s.j.| +00000030 f3 b6 e0 14 4c a8 20 d8 51 8e 1e c1 1f 20 b0 66 |....L. .Q.... .f| +00000040 96 3e 90 49 b1 e9 |.>.I..|" +"2020-08-31 20:52:24.674 UTC [cauthdsl] func2 -> DEBU 1bf4 0xc0012eda00 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:24.674 UTC [cauthdsl] func1 -> DEBU 1bf5 0xc0012eda00 gate 1598907144672053400 evaluation succeeds" +"2020-08-31 20:52:24.674 UTC [policies] Evaluate -> DEBU 1bf6 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:24.674 UTC [policies] Evaluate -> DEBU 1bf7 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:24.674 UTC [policies] Evaluate -> DEBU 1bf8 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:24.674 UTC [policies] Evaluate -> DEBU 1bf9 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:24.675 UTC [policies] Evaluate -> DEBU 1bfa Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:24.675 UTC [policies] Evaluate -> DEBU 1bfb == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:24.675 UTC [common.deliver] deliverBlocks -> DEBU 1bfc [channel: testchainid] Received seekInfo (0xc000dee600) start: > stop: > from 172.18.0.9:51016" +"2020-08-31 20:52:24.676 UTC [fsblkstorage] Next -> DEBU 1bfd Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-08-31 20:52:24.676 UTC [fsblkstorage] newBlockfileStream -> DEBU 1bfe newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +"2020-08-31 20:52:24.676 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1bff Remaining bytes=[30411], Going to peek [8] bytes" +"2020-08-31 20:52:24.676 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c00 Returning blockbytes - length=[30408], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +"2020-08-31 20:52:24.677 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c01 blockbytes [30408] read from file [0]" +"2020-08-31 20:52:24.677 UTC [common.deliver] deliverBlocks -> DEBU 1c02 [channel: testchainid] Delivering block [1] for (0xc000dee600) for 172.18.0.9:51016" +"2020-08-31 20:52:24.677 UTC [common.deliver] deliverBlocks -> DEBU 1c03 [channel: testchainid] Done delivering to 172.18.0.9:51016 for (0xc000dee600)" +"2020-08-31 20:52:24.678 UTC [common.deliver] Handle -> DEBU 1c04 Waiting for new SeekInfo from 172.18.0.9:51016" +"2020-08-31 20:52:24.678 UTC [common.deliver] Handle -> DEBU 1c05 Attempting to read seek info message from 172.18.0.9:51016" +"2020-08-31 20:52:24.684 UTC [common.deliver] Handle -> WARN 1c06 Error reading from 172.18.0.9:51016: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:24.684 UTC [orderer.common.server] func1 -> DEBU 1c07 Closing Deliver stream" +"2020-08-31 20:52:24.684 UTC [comm.grpc.server] 1 -> INFO 1c08 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51016 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=15.446ms +"2020-08-31 20:52:24.684 UTC [grpc] infof -> DEBU 1c09 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:24.816 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c0a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:24.816 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c0b Sending msg of 28 bytes to 3 on channel testchainid took 18.4µs" +"2020-08-31 20:52:24.817 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c0c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 356.5µs " +"2020-08-31 20:52:24.940 UTC [orderer.common.server] Deliver -> DEBU 1c0d Starting new Deliver handler" +"2020-08-31 20:52:24.941 UTC [common.deliver] Handle -> DEBU 1c0e Starting new deliver loop for 172.18.0.9:51018" +"2020-08-31 20:52:24.941 UTC [common.deliver] Handle -> DEBU 1c0f Attempting to read seek info message from 172.18.0.9:51018" +"2020-08-31 20:52:24.942 UTC [policies] Evaluate -> DEBU 1c10 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:24.942 UTC [policies] Evaluate -> DEBU 1c11 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:24.943 UTC [policies] Evaluate -> DEBU 1c12 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:24.943 UTC [policies] Evaluate -> DEBU 1c13 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:24.943 UTC [policies] Evaluate -> DEBU 1c14 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:24.944 UTC [cauthdsl] func1 -> DEBU 1c15 0xc001232420 gate 1598907144944472600 evaluation starts" +"2020-08-31 20:52:24.944 UTC [cauthdsl] func2 -> DEBU 1c16 0xc001232420 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:24.944 UTC [cauthdsl] func2 -> DEBU 1c17 0xc001232420 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:24.944 UTC [cauthdsl] func2 -> DEBU 1c18 0xc001232420 principal matched by identity 0" +"2020-08-31 20:52:24.944 UTC [msp.identity] Verify -> DEBU 1c19 Verify: digest = 00000000 58 bc e0 61 9b ab 65 73 57 75 56 f8 67 00 bc 9b |X..a..esWuV.g...| +00000010 e6 2a 5e ae 8a 07 c8 11 87 77 fb 15 bf 83 4f 85 |.*^......w....O.|" +"2020-08-31 20:52:24.945 UTC [msp.identity] Verify -> DEBU 1c1a Verify: sig = 00000000 30 45 02 21 00 c0 3e e0 9c 44 c8 8b 81 a2 5c ca |0E.!..>..D....\.| +00000010 2b 93 92 2c 37 80 dd 63 31 5b 1f 08 03 f6 55 e2 |+..,7..c1[....U.| +00000020 63 49 42 30 f9 02 20 22 a7 66 22 b6 e7 af 32 3c |cIB0.. ".f"...2<| +00000030 46 61 6f 2b c2 16 e6 f2 31 6c 56 33 87 31 9b c6 |Fao+....1lV3.1..| +00000040 b3 38 70 0a a7 45 91 |.8p..E.|" +"2020-08-31 20:52:24.945 UTC [cauthdsl] func2 -> DEBU 1c1b 0xc001232420 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:24.945 UTC [cauthdsl] func1 -> DEBU 1c1c 0xc001232420 gate 1598907144944472600 evaluation succeeds" +"2020-08-31 20:52:24.945 UTC [policies] Evaluate -> DEBU 1c1d Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:24.945 UTC [policies] Evaluate -> DEBU 1c1e == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:24.945 UTC [policies] Evaluate -> DEBU 1c1f Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:24.946 UTC [policies] Evaluate -> DEBU 1c20 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:24.946 UTC [policies] Evaluate -> DEBU 1c21 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:24.946 UTC [policies] Evaluate -> DEBU 1c22 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:24.946 UTC [common.deliver] deliverBlocks -> DEBU 1c23 [channel: testchainid] Received seekInfo (0xc000deec00) start: > stop: > from 172.18.0.9:51018" +"2020-08-31 20:52:24.946 UTC [fsblkstorage] Next -> DEBU 1c24 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-08-31 20:52:24.946 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c25 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +"2020-08-31 20:52:24.946 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c26 Remaining bytes=[30411], Going to peek [8] bytes" +"2020-08-31 20:52:24.947 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c27 Returning blockbytes - length=[30408], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +"2020-08-31 20:52:24.947 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c28 blockbytes [30408] read from file [0]" +"2020-08-31 20:52:24.947 UTC [common.deliver] deliverBlocks -> DEBU 1c29 [channel: testchainid] Delivering block [1] for (0xc000deec00) for 172.18.0.9:51018" +"2020-08-31 20:52:24.947 UTC [common.deliver] deliverBlocks -> DEBU 1c2a [channel: testchainid] Done delivering to 172.18.0.9:51018 for (0xc000deec00)" +"2020-08-31 20:52:24.947 UTC [common.deliver] Handle -> DEBU 1c2b Waiting for new SeekInfo from 172.18.0.9:51018" +"2020-08-31 20:52:24.947 UTC [common.deliver] Handle -> DEBU 1c2c Attempting to read seek info message from 172.18.0.9:51018" +"2020-08-31 20:52:24.963 UTC [policies] Evaluate -> DEBU 1c2d == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:24.963 UTC [policies] Evaluate -> DEBU 1c2e This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:24.963 UTC [policies] Evaluate -> DEBU 1c2f == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:24.963 UTC [policies] Evaluate -> DEBU 1c30 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:24.963 UTC [policies] Evaluate -> DEBU 1c31 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:24.964 UTC [cauthdsl] func1 -> DEBU 1c32 0xc0012dfa30 gate 1598907144964099100 evaluation starts" +"2020-08-31 20:52:24.964 UTC [cauthdsl] func2 -> DEBU 1c33 0xc0012dfa30 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:24.964 UTC [cauthdsl] func2 -> DEBU 1c34 0xc0012dfa30 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:24.964 UTC [cauthdsl] func2 -> DEBU 1c35 0xc0012dfa30 principal matched by identity 0" +"2020-08-31 20:52:24.964 UTC [msp.identity] Verify -> DEBU 1c36 Verify: digest = 00000000 50 6d 7a 56 f1 2e 6d 00 31 29 76 ad b9 9c 30 78 |PmzV..m.1)v...0x| +00000010 54 50 19 5c a0 a7 71 f6 86 04 46 8a 43 aa 35 f2 |TP.\..q...F.C.5.|" +"2020-08-31 20:52:24.965 UTC [msp.identity] Verify -> DEBU 1c37 Verify: sig = 00000000 30 45 02 21 00 86 ff 3a 8f 3a 4f f6 40 f4 1e 39 |0E.!...:.:O.@..9| +00000010 06 66 59 f3 52 d7 2f 6f be 73 b4 bc 1d 47 80 9f |.fY.R./o.s...G..| +00000020 e2 38 d1 03 c8 02 20 5b fb c1 22 76 5d 57 53 9f |.8.... [.."v]WS.| +00000030 85 c5 06 be b8 1e 4b fe 64 3d 39 0b a3 d2 2d b9 |......K.d=9...-.| +00000040 b6 d2 f1 3f 68 3d 91 |...?h=.|" +"2020-08-31 20:52:24.965 UTC [cauthdsl] func2 -> DEBU 1c38 0xc0012dfa30 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:24.965 UTC [cauthdsl] func1 -> DEBU 1c39 0xc0012dfa30 gate 1598907144964099100 evaluation succeeds" +"2020-08-31 20:52:24.965 UTC [policies] Evaluate -> DEBU 1c3a Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:24.965 UTC [policies] Evaluate -> DEBU 1c3b == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:24.966 UTC [policies] Evaluate -> DEBU 1c3c Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:24.966 UTC [policies] Evaluate -> DEBU 1c3d == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:24.966 UTC [policies] Evaluate -> DEBU 1c3e Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:24.966 UTC [policies] Evaluate -> DEBU 1c3f == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:24.966 UTC [common.deliver] deliverBlocks -> DEBU 1c40 [channel: testchainid] Received seekInfo (0xc000e48740) start: > stop: > from 172.18.0.9:51018" +"2020-08-31 20:52:24.967 UTC [fsblkstorage] Next -> DEBU 1c41 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-08-31 20:52:24.967 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c42 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-08-31 20:52:24.967 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c43 Remaining bytes=[53341], Going to peek [8] bytes" +"2020-08-31 20:52:24.968 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c44 Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-08-31 20:52:24.968 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c45 blockbytes [22927] read from file [0]" +"2020-08-31 20:52:24.968 UTC [common.deliver] deliverBlocks -> DEBU 1c46 [channel: testchainid] Delivering block [0] for (0xc000e48740) for 172.18.0.9:51018" +"2020-08-31 20:52:24.969 UTC [common.deliver] deliverBlocks -> DEBU 1c47 [channel: testchainid] Done delivering to 172.18.0.9:51018 for (0xc000e48740)" +"2020-08-31 20:52:24.969 UTC [common.deliver] Handle -> DEBU 1c48 Waiting for new SeekInfo from 172.18.0.9:51018" +"2020-08-31 20:52:24.969 UTC [common.deliver] Handle -> DEBU 1c49 Attempting to read seek info message from 172.18.0.9:51018" +"2020-08-31 20:52:24.976 UTC [common.deliver] Handle -> WARN 1c4a Error reading from 172.18.0.9:51018: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:24.978 UTC [orderer.common.server] func1 -> DEBU 1c4c Closing Deliver stream" +"2020-08-31 20:52:24.978 UTC [comm.grpc.server] 1 -> INFO 1c4d streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51018 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=38.0964ms +"2020-08-31 20:52:24.978 UTC [grpc] infof -> DEBU 1c4b transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:25.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4e Sending msg of 28 bytes to 2 on channel businesschannel took 22.8µs" +"2020-08-31 20:52:25.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c4f Sending msg of 28 bytes to 3 on channel businesschannel took 12.5µs" +"2020-08-31 20:52:25.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c50 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.6µs " +"2020-08-31 20:52:25.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c51 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 1.6657ms " +"2020-08-31 20:52:25.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c52 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:25.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c53 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:25.201 UTC [orderer.common.server] Deliver -> DEBU 1c54 Starting new Deliver handler" +"2020-08-31 20:52:25.201 UTC [common.deliver] Handle -> DEBU 1c55 Starting new deliver loop for 172.18.0.9:51020" +"2020-08-31 20:52:25.201 UTC [common.deliver] Handle -> DEBU 1c56 Attempting to read seek info message from 172.18.0.9:51020" +"2020-08-31 20:52:25.201 UTC [policies] Evaluate -> DEBU 1c57 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:25.201 UTC [policies] Evaluate -> DEBU 1c58 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:25.202 UTC [policies] Evaluate -> DEBU 1c59 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:25.202 UTC [policies] Evaluate -> DEBU 1c5a This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:25.202 UTC [policies] Evaluate -> DEBU 1c5b == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:25.202 UTC [cauthdsl] func1 -> DEBU 1c5c 0xc000d8e680 gate 1598907145202306400 evaluation starts" +"2020-08-31 20:52:25.202 UTC [cauthdsl] func2 -> DEBU 1c5d 0xc000d8e680 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:25.202 UTC [cauthdsl] func2 -> DEBU 1c5e 0xc000d8e680 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:25.202 UTC [cauthdsl] func2 -> DEBU 1c5f 0xc000d8e680 principal matched by identity 0" +"2020-08-31 20:52:25.202 UTC [msp.identity] Verify -> DEBU 1c60 Verify: digest = 00000000 85 03 31 8e 58 ec 5a fc 15 4f 1e 8d 8a 97 9a 95 |..1.X.Z..O......| +00000010 b1 5e 06 a6 d0 7d f7 84 2c 6d 3a b4 f9 d6 5a 5d |.^...}..,m:...Z]|" +"2020-08-31 20:52:25.202 UTC [msp.identity] Verify -> DEBU 1c61 Verify: sig = 00000000 30 45 02 21 00 b1 41 8b 7a 58 b0 e4 ae 68 05 0c |0E.!..A.zX...h..| +00000010 91 fb 4d f2 04 17 6a 85 fb a0 09 4e c1 52 b5 58 |..M...j....N.R.X| +00000020 01 04 7e e0 44 02 20 6c ac 0e a5 81 d5 d9 51 b3 |..~.D. l......Q.| +00000030 d1 bc a6 99 93 b5 86 f5 29 c4 b9 0a a1 41 24 b7 |........)....A$.| +00000040 1e 5c 64 e3 dd e3 ad |.\d....|" +"2020-08-31 20:52:25.203 UTC [cauthdsl] func2 -> DEBU 1c62 0xc000d8e680 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:25.203 UTC [cauthdsl] func1 -> DEBU 1c63 0xc000d8e680 gate 1598907145202306400 evaluation succeeds" +"2020-08-31 20:52:25.203 UTC [policies] Evaluate -> DEBU 1c64 Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:25.203 UTC [policies] Evaluate -> DEBU 1c65 == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:25.203 UTC [policies] Evaluate -> DEBU 1c66 Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:25.203 UTC [policies] Evaluate -> DEBU 1c67 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:25.204 UTC [policies] Evaluate -> DEBU 1c68 Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:25.204 UTC [policies] Evaluate -> DEBU 1c69 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:25.204 UTC [common.deliver] deliverBlocks -> DEBU 1c6a [channel: testchainid] Received seekInfo (0xc000e48e00) start: > stop: > from 172.18.0.9:51020" +"2020-08-31 20:52:25.204 UTC [fsblkstorage] Next -> DEBU 1c6b Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-08-31 20:52:25.204 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c6c newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[0]" +"2020-08-31 20:52:25.205 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c6d Remaining bytes=[53341], Going to peek [8] bytes" +"2020-08-31 20:52:25.205 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c6e Returning blockbytes - length=[22927], placementInfo={fileNum=[0], startOffset=[0], bytesOffset=[3]}" +"2020-08-31 20:52:25.205 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c6f blockbytes [22927] read from file [0]" +"2020-08-31 20:52:25.205 UTC [common.deliver] deliverBlocks -> DEBU 1c70 [channel: testchainid] Delivering block [0] for (0xc000e48e00) for 172.18.0.9:51020" +"2020-08-31 20:52:25.205 UTC [common.deliver] deliverBlocks -> DEBU 1c71 [channel: testchainid] Done delivering to 172.18.0.9:51020 for (0xc000e48e00)" +"2020-08-31 20:52:25.205 UTC [common.deliver] Handle -> DEBU 1c72 Waiting for new SeekInfo from 172.18.0.9:51020" +"2020-08-31 20:52:25.206 UTC [common.deliver] Handle -> DEBU 1c73 Attempting to read seek info message from 172.18.0.9:51020" +"2020-08-31 20:52:25.214 UTC [common.deliver] Handle -> WARN 1c74 Error reading from 172.18.0.9:51020: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:25.214 UTC [orderer.common.server] func1 -> DEBU 1c75 Closing Deliver stream" +"2020-08-31 20:52:25.214 UTC [comm.grpc.server] 1 -> INFO 1c76 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51020 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=14.0493ms +"2020-08-31 20:52:25.215 UTC [grpc] infof -> DEBU 1c77 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:25.305 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c78 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:25.307 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c79 Sending msg of 28 bytes to 3 on channel testchainid took 1.0498ms" +"2020-08-31 20:52:25.308 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c7a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 74.9µs " +"2020-08-31 20:52:25.589 UTC [orderer.common.server] Deliver -> DEBU 1c7b Starting new Deliver handler" +"2020-08-31 20:52:25.589 UTC [common.deliver] Handle -> DEBU 1c7c Starting new deliver loop for 172.18.0.9:51022" +"2020-08-31 20:52:25.590 UTC [common.deliver] Handle -> DEBU 1c7d Attempting to read seek info message from 172.18.0.9:51022" +"2020-08-31 20:52:25.590 UTC [policies] Evaluate -> DEBU 1c7e == Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers ==" +"2020-08-31 20:52:25.590 UTC [policies] Evaluate -> DEBU 1c7f This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:25.590 UTC [policies] Evaluate -> DEBU 1c80 == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers ==" +"2020-08-31 20:52:25.591 UTC [policies] Evaluate -> DEBU 1c81 This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign" +"2020-08-31 20:52:25.591 UTC [policies] Evaluate -> DEBU 1c82 == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers ==" +"2020-08-31 20:52:25.591 UTC [cauthdsl] func1 -> DEBU 1c83 0xc000a99280 gate 1598907145591174500 evaluation starts" +"2020-08-31 20:52:25.591 UTC [cauthdsl] func2 -> DEBU 1c84 0xc000a99280 signed by 0 principal evaluation starts (used [false])" +"2020-08-31 20:52:25.591 UTC [cauthdsl] func2 -> DEBU 1c85 0xc000a99280 processing identity 0 with bytes of fe10e0" +"2020-08-31 20:52:25.591 UTC [cauthdsl] func2 -> DEBU 1c86 0xc000a99280 principal matched by identity 0" +"2020-08-31 20:52:25.591 UTC [msp.identity] Verify -> DEBU 1c87 Verify: digest = 00000000 40 08 f0 00 f4 fb 95 e7 69 fd 1d 0c c5 c7 9e 12 |@.......i.......| +00000010 26 ef 54 f9 c2 e5 38 3a 8a 5f 1c ea 9d e9 8a a5 |&.T...8:._......|" +"2020-08-31 20:52:25.591 UTC [msp.identity] Verify -> DEBU 1c88 Verify: sig = 00000000 30 45 02 21 00 90 e7 2d 1b 78 6c 85 8f 7b 9c 7e |0E.!...-.xl..{.~| +00000010 95 da 9e 89 76 f1 e5 ea 81 15 60 3b 87 9b 1c 8c |....v.....`;....| +00000020 80 31 90 de 79 02 20 41 2b 0b 8b ba fa 94 a5 1b |.1..y. A+.......| +00000030 d7 ed e5 c9 3f e4 df fc 65 44 11 bb 24 47 80 10 |....?...eD..$G..| +00000040 e0 f1 29 ce ad 3e 39 |..)..>9|" +"2020-08-31 20:52:25.592 UTC [cauthdsl] func2 -> DEBU 1c89 0xc000a99280 principal evaluation succeeds for identity 0" +"2020-08-31 20:52:25.592 UTC [cauthdsl] func1 -> DEBU 1c8a 0xc000a99280 gate 1598907145591174500 evaluation succeeds" +"2020-08-31 20:52:25.592 UTC [policies] Evaluate -> DEBU 1c8b Signature set satisfies policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:25.592 UTC [policies] Evaluate -> DEBU 1c8c == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Readers" +"2020-08-31 20:52:25.593 UTC [policies] Evaluate -> DEBU 1c8d Signature set satisfies policy /Channel/Orderer/Readers" +"2020-08-31 20:52:25.593 UTC [policies] Evaluate -> DEBU 1c8e == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/Readers" +"2020-08-31 20:52:25.593 UTC [policies] Evaluate -> DEBU 1c8f Signature set satisfies policy /Channel/Readers" +"2020-08-31 20:52:25.593 UTC [policies] Evaluate -> DEBU 1c90 == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Readers" +"2020-08-31 20:52:25.593 UTC [common.deliver] deliverBlocks -> DEBU 1c91 [channel: testchainid] Received seekInfo (0xc000def400) start: > stop: > from 172.18.0.9:51022" +"2020-08-31 20:52:25.594 UTC [fsblkstorage] Next -> DEBU 1c92 Initializing block stream for iterator. itr.maxBlockNumAvailable=1" +"2020-08-31 20:52:25.594 UTC [fsblkstorage] newBlockfileStream -> DEBU 1c93 newBlockfileStream(): filePath=[/var/hyperledger/production/orderer/chains/testchainid/blockfile_000000], startOffset=[22930]" +"2020-08-31 20:52:25.594 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c94 Remaining bytes=[30411], Going to peek [8] bytes" +"2020-08-31 20:52:25.594 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c95 Returning blockbytes - length=[30408], placementInfo={fileNum=[0], startOffset=[22930], bytesOffset=[22933]}" +"2020-08-31 20:52:25.594 UTC [fsblkstorage] nextBlockBytesAndPlacementInfo -> DEBU 1c96 blockbytes [30408] read from file [0]" +"2020-08-31 20:52:25.594 UTC [common.deliver] deliverBlocks -> DEBU 1c97 [channel: testchainid] Delivering block [1] for (0xc000def400) for 172.18.0.9:51022" +"2020-08-31 20:52:25.595 UTC [common.deliver] deliverBlocks -> DEBU 1c98 [channel: testchainid] Done delivering to 172.18.0.9:51022 for (0xc000def400)" +"2020-08-31 20:52:25.595 UTC [common.deliver] Handle -> DEBU 1c99 Waiting for new SeekInfo from 172.18.0.9:51022" +"2020-08-31 20:52:25.595 UTC [common.deliver] Handle -> DEBU 1c9a Attempting to read seek info message from 172.18.0.9:51022" +"2020-08-31 20:52:25.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c9b Sending msg of 28 bytes to 2 on channel businesschannel took 16.2µs" +"2020-08-31 20:52:25.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1c9c Sending msg of 28 bytes to 3 on channel businesschannel took 7.3µs" +"2020-08-31 20:52:25.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c9d Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 110.5µs " +"2020-08-31 20:52:25.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1c9e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 192.9µs " +"2020-08-31 20:52:25.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1c9f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:25.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ca0 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:25.644 UTC [common.deliver] Handle -> WARN 1ca1 Error reading from 172.18.0.9:51022: rpc error: code = Canceled desc = context canceled" +"2020-08-31 20:52:25.644 UTC [orderer.common.server] func1 -> DEBU 1ca2 Closing Deliver stream" +"2020-08-31 20:52:25.644 UTC [comm.grpc.server] 1 -> INFO 1ca3 streaming call completed" grpc.service=orderer.AtomicBroadcast grpc.method=Deliver grpc.peer_address=172.18.0.9:51022 error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=54.6806ms +"2020-08-31 20:52:25.644 UTC [grpc] infof -> DEBU 1ca4 transport: loopyWriter.run returning. connection error: desc = "transport is closing"" +"2020-08-31 20:52:25.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ca5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:25.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca6 Sending msg of 28 bytes to 3 on channel testchainid took 15.5µs" +"2020-08-31 20:52:25.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ca7 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 65.9µs " +"2020-08-31 20:52:26.096 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca8 Sending msg of 28 bytes to 2 on channel businesschannel took 18.3µs" +"2020-08-31 20:52:26.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ca9 Sending msg of 28 bytes to 3 on channel businesschannel took 11.4µs" +"2020-08-31 20:52:26.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1caa Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 79.1µs " +"2020-08-31 20:52:26.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cab Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 194.6µs " +"2020-08-31 20:52:26.097 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cac Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:26.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cad Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:26.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cae Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:26.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1caf Sending msg of 28 bytes to 3 on channel testchainid took 13.9µs" +"2020-08-31 20:52:26.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb0 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.3µs " +"2020-08-31 20:52:26.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb1 Sending msg of 28 bytes to 2 on channel businesschannel took 19.8µs" +"2020-08-31 20:52:26.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb2 Sending msg of 28 bytes to 3 on channel businesschannel took 11.7µs" +"2020-08-31 20:52:26.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 73µs " +"2020-08-31 20:52:26.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb4 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 975.7µs " +"2020-08-31 20:52:26.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cb5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:26.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cb6 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:26.809 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cb7 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:26.809 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cb8 Sending msg of 28 bytes to 3 on channel testchainid took 13µs" +"2020-08-31 20:52:26.809 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cb9 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 86.5µs " +"2020-08-31 20:52:27.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cba Sending msg of 28 bytes to 2 on channel businesschannel took 25.5µs" +"2020-08-31 20:52:27.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cbb Sending msg of 28 bytes to 3 on channel businesschannel took 14.7µs" +"2020-08-31 20:52:27.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cbc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 83.1µs " +"2020-08-31 20:52:27.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cbd Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 131.7µs " +"2020-08-31 20:52:27.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cbe Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:27.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cbf Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:27.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc0 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:27.306 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cc1 Sending msg of 28 bytes to 3 on channel testchainid took 22µs" +"2020-08-31 20:52:27.307 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc2 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 63.7µs " +"2020-08-31 20:52:27.598 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cc3 Sending msg of 28 bytes to 2 on channel businesschannel took 41.2µs" +"2020-08-31 20:52:27.599 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cc4 Sending msg of 28 bytes to 3 on channel businesschannel took 22.2µs" +"2020-08-31 20:52:27.600 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc5 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 211.2µs " +"2020-08-31 20:52:27.599 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cc6 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 126.9µs " +"2020-08-31 20:52:27.601 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc7 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:27.602 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc8 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:27.807 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cc9 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:27.808 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cca Sending msg of 28 bytes to 3 on channel testchainid took 19.9µs" +"2020-08-31 20:52:27.810 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ccb Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 123.6µs " +"2020-08-31 20:52:28.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ccc Sending msg of 28 bytes to 3 on channel businesschannel took 38.5µs" +"2020-08-31 20:52:28.098 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ccd Sending msg of 28 bytes to 2 on channel businesschannel took 25.6µs" +"2020-08-31 20:52:28.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cce Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 122.7µs " +"2020-08-31 20:52:28.099 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ccf Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 1.2147ms " +"2020-08-31 20:52:28.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd0 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:28.101 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd1 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:28.307 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:28.308 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd3 Sending msg of 28 bytes to 3 on channel testchainid took 17.4µs" +"2020-08-31 20:52:28.309 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd4 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 201.8µs " +"2020-08-31 20:52:28.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd5 Sending msg of 28 bytes to 2 on channel businesschannel took 57.3µs" +"2020-08-31 20:52:28.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cd6 Sending msg of 28 bytes to 3 on channel businesschannel took 14.5µs" +"2020-08-31 20:52:28.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd7 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 164.7µs " +"2020-08-31 20:52:28.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cd8 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 69.5µs " +"2020-08-31 20:52:28.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cd9 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:28.598 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cda Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:28.805 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cdb Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:28.805 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cdc Sending msg of 28 bytes to 3 on channel testchainid took 16µs" +"2020-08-31 20:52:28.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cdd Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 55.1µs " +"2020-08-31 20:52:29.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cde Sending msg of 28 bytes to 2 on channel businesschannel took 40.9µs" +"2020-08-31 20:52:29.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cdf Sending msg of 28 bytes to 3 on channel businesschannel took 15.1µs" +"2020-08-31 20:52:29.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce0 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 333.3µs " +"2020-08-31 20:52:29.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce1 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 210.7µs " +"2020-08-31 20:52:29.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce2 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:29.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce3 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:29.305 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ce4 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:29.305 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce5 Sending msg of 28 bytes to 3 on channel testchainid took 12.7µs" +"2020-08-31 20:52:29.306 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce6 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.3µs " +"2020-08-31 20:52:29.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce7 Sending msg of 28 bytes to 3 on channel businesschannel took 13.9µs" +"2020-08-31 20:52:29.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1ce8 Sending msg of 28 bytes to 2 on channel businesschannel took 12.7µs" +"2020-08-31 20:52:29.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1ce9 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 241.4µs " +"2020-08-31 20:52:29.598 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cea Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 165.7µs " +"2020-08-31 20:52:29.600 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cec Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:29.600 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ceb Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:29.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1ced Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:29.806 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cee Sending msg of 28 bytes to 3 on channel testchainid took 595.8µs" +"2020-08-31 20:52:29.806 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cef Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 51µs " +"2020-08-31 20:52:30.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf0 Sending msg of 28 bytes to 2 on channel businesschannel took 22.5µs" +"2020-08-31 20:52:30.097 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf1 Sending msg of 28 bytes to 3 on channel businesschannel took 16.3µs" +"2020-08-31 20:52:30.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf2 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 300.9µs " +"2020-08-31 20:52:30.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf3 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 144.8µs " +"2020-08-31 20:52:30.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf4 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:30.100 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf5 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:30.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cf6 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:30.307 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf7 Sending msg of 28 bytes to 3 on channel testchainid took 13.5µs" +"2020-08-31 20:52:30.307 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cf8 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 57.1µs " +"2020-08-31 20:52:30.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cf9 Sending msg of 28 bytes to 3 on channel businesschannel took 44.3µs" +"2020-08-31 20:52:30.597 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1cfa Sending msg of 28 bytes to 2 on channel businesschannel took 12.8µs" +"2020-08-31 20:52:30.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cfb Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 84.8µs " +"2020-08-31 20:52:30.597 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1cfc Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 53.7µs " +"2020-08-31 20:52:30.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfd Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:30.599 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cfe Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:30.806 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1cff Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:30.807 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d00 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 56.5µs " +"2020-08-31 20:52:30.807 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d01 Sending msg of 28 bytes to 3 on channel testchainid took 18.6µs" +"2020-08-31 20:52:31.096 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d02 Sending msg of 28 bytes to 2 on channel businesschannel took 18.5µs" +"2020-08-31 20:52:31.096 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d03 Sending msg of 28 bytes to 3 on channel businesschannel took 11.5µs" +"2020-08-31 20:52:31.097 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d04 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 360.6µs " +"2020-08-31 20:52:31.098 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d05 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 259.4µs " +"2020-08-31 20:52:31.098 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d06 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:31.099 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d07 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:31.306 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d08 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:31.307 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d09 Sending msg of 28 bytes to 3 on channel testchainid took 14.6µs" +"2020-08-31 20:52:31.307 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d0a Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 52.2µs " +"2020-08-31 20:52:31.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d0b Sending msg of 28 bytes to 3 on channel businesschannel took 19.8µs" +"2020-08-31 20:52:31.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d0c Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 274.6µs " +"2020-08-31 20:52:31.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d0d Sending msg of 28 bytes to 2 on channel businesschannel took 12.8µs" +"2020-08-31 20:52:31.564 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d0e Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 824.7µs " +"2020-08-31 20:52:31.564 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d0f Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:31.565 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d10 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:31.773 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d11 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:31.774 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d12 Sending msg of 28 bytes to 3 on channel testchainid took 15.6µs" +"2020-08-31 20:52:31.774 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d13 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 152.8µs " +"2020-08-31 20:52:32.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d14 Sending msg of 28 bytes to 2 on channel businesschannel took 22.6µs" +"2020-08-31 20:52:32.062 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d15 Sending msg of 28 bytes to 3 on channel businesschannel took 11.2µs" +"2020-08-31 20:52:32.062 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d16 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 78.6µs " +"2020-08-31 20:52:32.063 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d17 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 52.6µs " +"2020-08-31 20:52:32.064 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d18 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:32.064 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d19 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:32.271 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d1a Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:32.271 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d1b Sending msg of 28 bytes to 3 on channel testchainid took 28.6µs" +"2020-08-31 20:52:32.271 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d1c Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 77.8µs " +"2020-08-31 20:52:32.562 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d1d Sending msg of 28 bytes to 2 on channel businesschannel took 22.2µs" +"2020-08-31 20:52:32.563 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d1e Sending msg of 28 bytes to 3 on channel businesschannel took 15.3µs" +"2020-08-31 20:52:32.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d1f Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 64.8µs " +"2020-08-31 20:52:32.563 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d20 Send of ConsensusRequest for channel businesschannel with payload of size 28 to orderer1.example.com(orderer1.example.com:7050) took 106.3µs " +"2020-08-31 20:52:32.563 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d21 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:32.564 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d22 Received message from orderer1.example.com(172.18.0.4:47136): ConsensusRequest for channel businesschannel with payload of size 28" +"2020-08-31 20:52:32.771 UTC [orderer.common.cluster.step] handleMessage -> DEBU 1d23 Received message from orderer2.example.com(172.18.0.2:58986): ConsensusRequest for channel testchainid with payload of size 28" +"2020-08-31 20:52:32.771 UTC [orderer.consensus.etcdraft] consensusSent -> DEBU 1d24 Sending msg of 28 bytes to 3 on channel testchainid took 9.6µs" +"2020-08-31 20:52:32.771 UTC [orderer.common.cluster.step] sendMessage -> DEBU 1d25 Send of ConsensusRequest for channel testchainid with payload of size 28 to orderer2.example.com(orderer2.example.com:7050) took 60.4µs " diff --git a/hyperledger_fabric/v1.4.8/raft/logs/dev_peer0.log b/hyperledger_fabric/v1.4.8/raft/logs/dev_peer0.log new file mode 100644 index 00000000..e4e37958 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/raft/logs/dev_peer0.log @@ -0,0 +1,23622 @@ +[001 08-31 20:50:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP +[002 08-31 20:50:45.11 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +[003 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.Default setting to string SW +[004 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW +[005 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'S' looking for beginning of value +[006 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Hash setting to string SHA2 +[007 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: 256 +[008 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.Security setting to int 256 +[009 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.SW.FileKeyStore +[00a 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: unexpected end of JSON input +[00b 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.SW.FileKeyStore.KeyStore setting to string +[00c 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11 +[00d 08-31 20:50:45.12 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[00e 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Hash setting to +[00f 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[010 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Security setting to +[011 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.BCCSP.PKCS11.FileKeyStore +[012 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[013 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.FileKeyStore.KeyStore setting to +[014 08-31 20:50:45.13 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[015 08-31 20:50:45.14 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Library setting to +[016 08-31 20:50:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[017 08-31 20:50:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Label setting to +[018 08-31 20:50:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[019 08-31 20:50:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.BCCSP.PKCS11.Pin setting to +[01a 08-31 20:50:45.15 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.BCCSP:map[Default:SW PKCS11:map[FileKeyStore:map[KeyStore:] Hash: Label: Library: Pin: Security:] SW:map[FileKeyStore:map[KeyStore:] Hash:SHA2 Security:256]]] +[01b 08-31 20:50:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU KeyStore opened at [/etc/hyperledger/fabric/msp/keystore] +[01c 08-31 20:50:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Initialize BCCSP [SW] +[01d 08-31 20:50:45.17 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/signcerts +[01e 08-31 20:50:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/signcerts/peer0.org1.example.com-cert.pem +[01f 08-31 20:50:45.18 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/cacerts +[020 08-31 20:50:45.19 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/cacerts/ca.org1.example.com-cert.pem +[021 08-31 20:50:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/admincerts +[022 08-31 20:50:45.20 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/intermediatecerts +[023 08-31 20:50:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Intermediate certs folder not found at [/etc/hyperledger/fabric/msp/intermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/intermediatecerts: no such file or directory] +[024 08-31 20:50:45.21 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlscacerts +[025 08-31 20:50:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Inspecting file /etc/hyperledger/fabric/msp/tlscacerts/tlsca.org1.example.com-cert.pem +[026 08-31 20:50:45.22 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/tlsintermediatecerts +[027 08-31 20:50:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU TLS intermediate certs folder not found at [/etc/hyperledger/fabric/msp/tlsintermediatecerts]. Skipping. [stat /etc/hyperledger/fabric/msp/tlsintermediatecerts: no such file or directory] +[028 08-31 20:50:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Reading directory /etc/hyperledger/fabric/msp/crls +[029 08-31 20:50:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU crls folder not found at [/etc/hyperledger/fabric/msp/crls]. Skipping. [stat /etc/hyperledger/fabric/msp/crls: no such file or directory] +[02a 08-31 20:50:45.23 UTC] [%{longpkg}] %{callpath} -> DEBU Loading NodeOUs +[02b 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[02c 08-31 20:50:45.26 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[02d 08-31 20:50:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Created new local MSP +[02e 08-31 20:50:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[02f 08-31 20:50:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- +[030 08-31 20:50:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +-----END CERTIFICATE----- +[031 08-31 20:50:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Loading private key [935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce] at [/etc/hyperledger/fabric/msp/keystore/935dee1f8ea455b088b0f8422598fd3458c92d192d8a381c49d890c16384f7ce_sk]... +[032 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +-----END CERTIFICATE----- +[033 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Signing identity expires at 2030-02-18 18:24:00 +0000 UTC +[034 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer: + Version: 1.4.8 + Commit SHA: development build + Go version: go1.13.15 + OS/Arch: linux/amd64 + Chaincode: + Base Image Version: 0.4.21 + Base Docker Namespace: hyperledger + Base Docker Label: org.hyperledger.fabric + Docker Namespace: hyperledger +[035 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[036 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +[037 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +[038 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger mgmt +[039 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> INFO Initializing ledger provider +[03a 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/ledgerProvider/] +[03b 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] does not exist +[03c 08-31 20:50:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/ledgerProvider/] exists +[03d 08-31 20:50:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU constructing HistoryDBProvider dbPath=/var/hyperledger/production/ledgersData/historyLeveldb +[03e 08-31 20:50:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/historyLeveldb/] +[03f 08-31 20:50:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] does not exist +[040 08-31 20:50:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/historyLeveldb/] exists +[041 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/fileLock/] +[042 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/fileLock/] does not exist +[043 08-31 20:50:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/fileLock/] exists +[044 08-31 20:50:45.34 UTC] [%{longpkg}] %{callpath} -> INFO ledger provider Initialized +[045 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Opening db for config history: db path = /var/hyperledger/production/ledgersData/configHistory +[046 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/configHistory/] +[047 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/configHistory/] does not exist +[048 08-31 20:50:45.35 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/configHistory/] exists +[049 08-31 20:50:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/index/] +[04a 08-31 20:50:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/index/] does not exist +[04b 08-31 20:50:45.37 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/index/] exists +[04c 08-31 20:50:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/pvtdataStore/] +[04d 08-31 20:50:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] does not exist +[04e 08-31 20:50:45.39 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/pvtdataStore/] exists +[04f 08-31 20:50:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/bookkeeper/] +[050 08-31 20:50:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] does not exist +[051 08-31 20:50:45.40 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/bookkeeper/] exists +[052 08-31 20:50:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU constructing VersionedDBProvider dbPath=/var/hyperledger/production/ledgersData/stateLeveldb +[053 08-31 20:50:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/stateLeveldb/] +[054 08-31 20:50:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] does not exist +[055 08-31 20:50:45.42 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/stateLeveldb/] exists +[056 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Recovering under construction ledger +[057 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU No under construction ledger found. Quitting recovery +[058 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> INFO ledger mgmt initialized +[059 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.7:7051 +[05a 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +[05b 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> INFO Auto-detected peer address: 172.18.0.7:7051 +[05c 08-31 20:50:45.43 UTC] [%{longpkg}] %{callpath} -> INFO Returning peer0.org1.example.com:7051 +[05d 08-31 20:50:45.46 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with TLS enabled +[05e 08-31 20:50:45.47 UTC] [%{longpkg}] %{callpath} -> INFO Entering computeChaincodeEndpoint with peerHostname: peer0.org1.example.com +[05f 08-31 20:50:45.47 UTC] [%{longpkg}] %{callpath} -> INFO Exit with ccEndpoint: peer0.org1.example.com:7052 +[060 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: lscc-1.4.8 +[061 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc(github.com/hyperledger/fabric/core/scc/lscc) registered +[062 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: cscc-1.4.8 +[063 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc(github.com/hyperledger/fabric/core/scc/cscc) registered +[064 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Registering chaincode instance: qscc-1.4.8 +[065 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc(github.com/hyperledger/fabric/core/scc/qscc) registered +[066 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle,true) disabled +[067 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Running peer +[068 08-31 20:50:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[069 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers +[06a 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultAuth] map[name:ExpirationCheck]] +[06b 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.authFilters setting to []interface {} [map[name:DefaultAuth] map[name:ExpirationCheck]] +[06c 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: [map[name:DefaultDecorator]] +[06d 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.decorators setting to []interface {} [map[name:DefaultDecorator]] +[06e 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers +[06f 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.endorsers.escc +[070 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +[071 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.name setting to string DefaultEndorsement +[072 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[073 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.endorsers.escc.library setting to +[074 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators +[075 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found map[string]interface{} value for peer.handlers.validators.vscc +[076 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value cannot be unmarshalled: invalid character 'D' looking for beginning of value +[077 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.name setting to string DefaultValidation +[078 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Unmarshal JSON: value is not a string: +[079 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Found real value for peer.handlers.validators.vscc.library setting to +[07a 08-31 20:50:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU map[peer.handlers:map[authFilters:[map[name:DefaultAuth] map[name:ExpirationCheck]] decorators:[map[name:DefaultDecorator]] endorsers:map[escc:map[library: name:DefaultEndorsement]] validators:map[vscc:map[library: name:DefaultValidation]]]] +[07b 08-31 20:50:45.52 UTC] [%{longpkg}] %{callpath} -> INFO Initialize gossip with endpoint peer0.org1.example.com:7051 and bootstrap set [127.0.0.1:7051] +[07c 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[07d 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +-----END CERTIFICATE----- +[07e 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[07f 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[080 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[081 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[082 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> INFO Creating gossip service with self membership of Endpoint: peer0.org1.example.com:7051, InternalEndpoint: peer0.org1.example.com:7051, PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: +[083 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[084 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 1801AA01DB060A209901CDE7C48A747A...455254494649434154452D2D2D2D2D0A +[085 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EF186C4BF240BED45F0BBCF7135C6BDC1830908603084DC2B567543C23E28B78 +[086 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Added ���Ċtz0�P�zP˹�{� ��w��kqu-<, total items: 1 +[087 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> INFO Gossip instance peer0.org1.example.com:7051 started +[088 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=lscc:1.4.8,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +[08a 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU start container: lscc:1.4.8 +[089 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering discovery sync with interval 4s +[08b 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[08c 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=lscc:1.4.8 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +[08d 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[08e 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.8) lock +[08f 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.8) lock +[090 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[091 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for lscc-1.4.8 +[092 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3116A93E1916F1DF9DF6078911A78BD7A0E8CB94CE3ABD03C2FC7EE9E78E1D80 +[093 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.8) +[094 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(lscc-1.4.8) lock +[095 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU got container (lscc-1.4.8) lock +[096 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(lscc-1.4.8) +[097 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping connecting to myself +[098 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for lscc-1.4.8 +[099 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for lscc-1.4.8 +[09a 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[09b 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[09c 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +[09d 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[09e 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +[09f 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode lscc:1.4.8 +[0a0 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"lscc:1.4.8" , sending back REGISTERED +[0a1 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"lscc:1.4.8" +[0a2 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"lscc:1.4.8" +[0a3 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"lscc:1.4.8" +[0a4 08-31 20:50:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +[0a5 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[0a6 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU [d790770a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[0a7 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU [d790770a] notifying Txid:d790770a-e297-441a-b320-80157d3e39af, channelID: +[0a8 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[0a9 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/(github.com/hyperledger/fabric/core/scc/lscc) deployed +[0aa 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=cscc:1.4.8,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +[0ab 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU start container: cscc:1.4.8 +[0ac 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[0ad 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=cscc:1.4.8 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +[0ae 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.8) lock +[0af 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.8) lock +[0b0 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for cscc-1.4.8 +[0b1 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.8) +[0b2 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(cscc-1.4.8) lock +[0b3 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU got container (cscc-1.4.8) lock +[0b4 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(cscc-1.4.8) +[0b5 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for cscc-1.4.8 +[0b6 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for cscc-1.4.8 +[0b7 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +[0b8 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +[0b9 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode cscc:1.4.8 +[0ba 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"cscc:1.4.8" , sending back REGISTERED +[0bb 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"cscc:1.4.8" +[0bc 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"cscc:1.4.8" +[0bd 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"cscc:1.4.8" +[0be 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +[0bf 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[0c0 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +[0c1 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU [dd3add6c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[0c2 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU [dd3add6c] notifying Txid:dd3add6c-459a-4cf7-9627-1cfb5abf9145, channelID: +[0c3 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[0c4 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/(github.com/hyperledger/fabric/core/scc/cscc) deployed +[0c5 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=qscc:1.4.8,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +[0c6 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU start container: qscc:1.4.8 +[0c7 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[0c8 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=qscc:1.4.8 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +[0c9 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.8) lock +[0ca 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.8) lock +[0cb 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode instance created for qscc-1.4.8 +[0cc 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.8) +[0cd 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(qscc-1.4.8) lock +[0ce 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU got container (qscc-1.4.8) lock +[0cf 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(qscc-1.4.8) +[0d0 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode-support started for qscc-1.4.8 +[0d1 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU chaincode started for qscc-1.4.8 +[0d2 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +[0d3 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +[0d4 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode qscc:1.4.8 +[0d5 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"qscc:1.4.8" , sending back REGISTERED +[0d6 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"qscc:1.4.8" +[0d7 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"qscc:1.4.8" +[0d8 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"qscc:1.4.8" +[0d9 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +[0da 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[0db 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +[0dc 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU [9c94cd6b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[0dd 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU [9c94cd6b] notifying Txid:9c94cd6b-f32c-454f-b3c3-eaa279cea14e, channelID: +[0de 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[0df 08-31 20:50:45.54 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/(github.com/hyperledger/fabric/core/scc/qscc) deployed +[0e0 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +[0e1 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Deployed system chaincodes +[0e2 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +[0e3 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Created with config TLS: true, authCacheMaxSize: 1000, authCachePurgeRatio: 0.750000 +[0e4 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Discovery service activated +[0e5 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Starting peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +[0e6 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Started peer with ID=[name:"peer0.org1.example.com" ], network ID=[dev], address=[peer0.org1.example.com:7051] +[0e7 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Loading prereset height from path [/var/hyperledger/production/ledgersData/chains] +[0e8 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Loading Pre-reset heights +[0e9 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Dir [/var/hyperledger/production/ledgersData/chains/chains] missing... exiting +[0ea 08-31 20:50:45.55 UTC] [%{longpkg}] %{callpath} -> INFO Pre-reset heights loaded +[0eb 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:50:48.373Z grpc.peer_address=172.18.0.8:53918 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=150.9µs +[0ec 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[0ed 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[0ee 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[0ef 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.8:53918 +[0f0 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:53918 +[0f1 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[0f2 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +-----END CERTIFICATE----- +[0f3 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[0f4 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[0f5 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[0f6 08-31 20:50:46.37 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 01 cc d1 2a 7d e5 33 5a 6a 28 55 |0D. J...*}.3Zj(U| +00000010 2c fb c0 ef 18 86 a9 ad ed 9b ab 64 d0 4e 1a 19 |,..........d.N..| +00000020 8b d5 81 14 02 20 7d 07 86 01 ca 2a d6 78 89 7b |..... }....*.x.{| +00000030 87 b5 6b 35 81 e5 c0 2e 75 7b 80 e3 34 5e 7c 35 |..k5....u{..4^|5| +00000040 b8 8e 8e d5 bb e8 |......| +[0f7 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:53918 +[0f8 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:53918 +[0f9 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[0fa 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:53918 disconnected +[0fb 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:50:56.375Z grpc.peer_address=172.18.0.8:53918 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=7.1104ms +[0fc 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[0fd 08-31 20:50:46.38 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[0fe 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:50:48.391Z grpc.peer_address=172.18.0.8:53920 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=154.1µs +[0ff 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[100 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[101 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[102 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:53920 +[103 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:53920 +[104 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[105 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 31 bf 56 09 8c 84 17 91 6a 28 9c 8f |0D. 1.V.....j(..| +00000010 bb fc 74 67 dd 44 e2 44 d5 a9 66 82 36 5a 4c f9 |..tg.D.D..f.6ZL.| +00000020 a0 4e ac b7 02 20 55 52 d2 32 3c a0 df d5 3c ff |.N... UR.2<...<.| +00000030 30 ea 15 b3 f8 69 60 8c 37 99 50 8d ef ce 38 1f |0....i`.7.P...8.| +00000040 24 f1 4e 33 4d 55 |$.N3MU| +[106 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:53920 +[107 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:53920 +[108 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:5199577545387710782 tag:EMPTY mem_req: > > , Envelope: 1109 bytes, Signature: 0 bytes +[109 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10a 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:5199577545387710782 tag:EMPTY mem_req: > > , Envelope: 1109 bytes, Signature: 0 bytes +[10b 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 6f 55 3d db b5 8c 9f 86 e4 de e5 8c 65 25 a9 |.oU=.........e%.| +00000010 6c e9 68 63 82 9f 0f 28 9e 2c 8f 2b 0a b7 1c c1 |l.hc...(.,.+....| +[10c 08-31 20:50:46.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 94 3a 88 b3 6b d2 8a 1e 7b f3 |0E.!...:..k...{.| +00000010 5c a5 e8 1c ef 6c a0 37 38 cb fc ae fe 7f 27 9e |\....l.78.....'.| +00000020 3d ce 4c 9c fd 02 20 13 62 ac 79 98 61 41 82 00 |=.L... .b.y.aA..| +00000030 b5 c6 1f c4 29 e2 ac b2 cf dd 8a 98 2c ac 50 c1 |....).......,.P.| +00000040 fc 65 09 14 07 e8 fb |.e.....| +[10d 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[10e 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef ec 3a 9f f2 9a 9a 17 c0 0b 35 |0E.!...:.......5| +00000010 3b 13 d3 4a 99 97 88 79 64 26 12 dd 74 c8 56 b7 |;..J...yd&..t.V.| +00000020 3a 0f 63 3c 9e 02 20 2a 21 a9 05 29 3d 56 88 e5 |:.c<.. *!..)=V..| +00000030 b1 9b 21 67 4a ba e6 c5 cd 26 13 47 0e 27 86 e9 |..!gJ....&.G.'..| +00000040 e9 2f ca 77 34 52 01 |./.w4R.| +[10f 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[110 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]}, deadMembers={[]} +[111 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[112 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[113 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[114 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[115 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[116 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[117 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[118 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 091B16D621614325C42E7353D9C14E267DF21920F15E58FB00848C61528CA7F6 +[119 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[11a 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[11b 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[11c 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 5199577545387710782, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2202 bytes, Signature: 0 bytes to 1 peers +[11d 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +[11e 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 5199577545387710782, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2202 bytes, Signature: 0 bytes +[11f 08-31 20:50:46.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[120 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[121 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[122 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[123 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[124 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes +[125 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[126 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes +[127 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b3 c6 21 fa f4 ec 97 02 68 bd 3d 0e c9 64 e2 68 |..!.....h.=..d.h| +00000010 11 c9 93 2f 34 9e 94 a4 02 8b 6f a1 70 ea 3e 40 |.../4.....o.p.>@| +[128 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b ba e6 c6 6c 38 df 8d fc 45 1a |0E.!.....l8...E.| +00000010 48 0d ee b0 a9 aa 25 f9 43 29 9a 50 73 34 c8 39 |H.....%.C).Ps4.9| +00000020 ba 4c e8 19 dc 02 20 22 f0 5e a5 c9 36 f9 d9 c7 |.L.... ".^..6...| +00000030 64 d8 e3 72 cf aa 22 ae f2 fb 1d 92 59 72 77 17 |d..r..".....Yrw.| +00000040 15 0d 8a 71 4f 42 66 |...qOBf| +[129 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[12a 08-31 20:50:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 01 e4 0f f6 f0 1c 01 15 7a 3d 82 3b |0D. ........z=.;| +00000010 c2 1f 2f 75 3c 06 58 b0 6b d6 c5 de f7 aa 07 32 |../u<.X.k......2| +00000020 42 cc 24 b3 02 20 4f 00 ef bc ee 4d 40 f0 8f 74 |B.$.. O....M@..t| +00000030 2a 0b 28 75 69 9e ee 50 b4 a6 de d7 fd df 4e da |*.(ui..P......N.| +00000040 ce e0 5c 7b 18 40 |..\{.@| +[12b 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[12c 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[12d 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[12e 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[12f 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[130 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[131 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[132 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[133 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[134 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[135 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[136 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4CCD27BCF4471B5C13E13D60F4428CDCDDAFCCFD9FD7DF889D9512177DC5B998 +[137 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[138 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[139 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[13a 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes to 1 peers +[13b 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\272O\345\200" secret_envelope:G0\215=uX\003\020\377\313\357;\377\3438\362\231\2749=pY\211\266\303\361\036\244\262\002 \001\320\345\r\010.(\275\223j8\314>3\354\245\243\t\326\022O\032\373k@\004\216\257RCX\332" > > +[13c 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +[13d 08-31 20:50:49.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13e 08-31 20:50:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[13f 08-31 20:50:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[140 08-31 20:50:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[141 08-31 20:50:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[142 08-31 20:50:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[143 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[144 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A18D7B17F4FEC7717B799AA37834AAE88DFAE4ACBA13CBF2314C5011DD62BD7C +[145 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +[146 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 50 bytes, Signature: 0 bytes +[147 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[148 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[149 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[14a 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[14b 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1097 bytes, Signature: 0 bytes to 1 peers +[14c 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1097 bytes, Signature: 0 bytes +[14d 08-31 20:50:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14e 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +[14f 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[150 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2191 bytes, Signature: 0 bytes +[151 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a1 8d 7b 17 f4 fe c7 71 7b 79 9a a3 78 34 aa e8 |..{....q{y..x4..| +00000010 8d fa e4 ac ba 13 cb f2 31 4c 50 11 dd 62 bd 7c |........1LP..b.|| +[152 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 2e 39 a2 80 83 f7 26 77 41 b0 76 |0D. ..9....&wA.v| +00000010 da 71 dd d0 4a a5 f1 ec ba 7d dc 1e 26 c9 2f 4e |.q..J....}..&./N| +00000020 0b ff 82 9a 02 20 04 66 5d b9 f2 df b2 3c 5a 08 |..... .f].... DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[154 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d e5 99 40 7b f1 4f 56 cb 47 6f eb |0D. M..@{.OV.Go.| +00000010 ac a6 63 08 c3 b0 2c c7 b4 94 4e e1 5e 99 29 69 |..c...,...N.^.)i| +00000020 b8 5c 95 3d 02 20 1c e7 ab ea 8d 6f 72 cc 0a 05 |.\.=. .....or...| +00000030 94 dd 96 55 86 42 29 15 3c a1 ae 6e 2a 7a e8 4f |...U.B).<..n*z.O| +00000040 4c 16 91 5b 1b 28 |L..[.(| +[155 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[156 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[157 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[158 08-31 20:50:49.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 54 dd b5 ea 3e 3c 67 4d 6f 6d d4 65 21 b3 4e f4 |T...> DEBU Verify: sig = 00000000 30 45 02 21 00 b5 3c 38 bf 49 24 0b 64 e2 e3 b0 |0E.!..<8.I$.d...| +00000010 27 fc 87 66 7e ce e6 cc 8a 23 a7 00 7e 21 ac d3 |'..f~....#..~!..| +00000020 e7 8f 1e c6 72 02 20 24 7a bc 2c 73 03 2e 43 53 |....r. $z.,s..CS| +00000030 50 5a 17 ac 22 ed ed 2c 2c fb 62 1c 8f 1b ef 45 |PZ.."..,,.b....E| +00000040 41 e3 8a 2f c2 ff 4a |A../..J| +[15a 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[15b 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 b6 3e a2 c5 35 c8 40 fa d6 a2 |0E.!...>..5.@...| +00000010 81 1d 0b 70 6f 52 dd 08 15 72 da 3f 92 3c a8 a3 |...poR...r.?.<..| +00000020 27 5c 6a 68 ab 02 20 50 7e 14 a5 51 69 5a 57 d2 |'\jh.. P~..QiZW.| +00000030 25 0c 98 f8 29 1b 01 43 0d dc b3 69 88 89 fb 32 |%...)..C...i...2| +00000040 94 c3 79 60 15 36 2a |..y`.6*| +[15c 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[15d 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[15e 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[15f 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[160 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[161 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[162 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[163 08-31 20:50:49.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[164 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +[165 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +[166 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[167 08-31 20:50:50.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[168 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[169 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16a 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[16b 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 24 d4 83 2d e6 b8 24 a2 da c6 a5 3c 75 f0 74 49 |$..-..$.... DEBU Verify: sig = 00000000 30 45 02 21 00 d6 8a c2 e7 c7 13 8e a1 41 4c 66 |0E.!.........ALf| +00000010 30 41 3e 4f 23 cd 4f c0 b7 eb 99 49 4c 8b 56 ae |0A>O#.O....IL.V.| +00000020 d4 33 8c 50 64 02 20 4e 96 36 14 6b 18 33 c0 5c |.3.Pd. N.6.k.3.\| +00000030 d0 e5 c3 5a e8 b8 01 d7 70 ef 2e 7c ef bf 5b 12 |...Z....p..|..[.| +00000040 32 9e ed 60 32 b5 7c |2..`2.|| +[16d 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[16e 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b f3 ef ce ac 19 90 17 fd 35 36 15 |0D. .........56.| +00000010 18 7f db ab 3f 8a 2b 37 e4 89 45 d8 a2 25 82 cc |....?.+7..E..%..| +00000020 2e 06 47 c5 02 20 78 d8 66 21 d0 f3 d3 24 61 9d |..G.. x.f!...$a.| +00000030 51 00 24 65 7b 9c bc 51 6f fa 47 9d f1 8f b1 5b |Q.$e{..Qo.G....[| +00000040 bb a9 04 e6 64 aa |....d.| +[16f 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[170 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[171 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[172 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[173 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[174 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[175 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[176 08-31 20:50:50.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[177 08-31 20:50:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to peer1.org1.example.com:7051 +[179 08-31 20:50:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes to 1 peers +[17a 08-31 20:50:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +[17b 08-31 20:50:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[178 08-31 20:50:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[17c 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[17d 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 34C5FD22B642F5F36D6403A73B770B868071DFE4A1092A5E1D4122032CA98823 +[17e 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[17f 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[180 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[181 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[182 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8874356403793367540, Envelope: 961 bytes, Signature: 0 bytes +[183 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 4b 7a 1c f7 72 7d 98 69 35 3d b5 df d3 65 1b |IKz..r}.i5=...e.| +00000010 92 b9 33 b2 38 d6 6e 7c de 50 99 3b 20 ac 8a ca |..3.8.n|.P.; ...| +[184 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac 23 6c 2d c7 a0 da 5a c3 f0 f7 |0E.!..#l-...Z...| +00000010 d6 40 8a e2 7b 6c 69 7c f4 58 f0 6d c6 b6 8e 66 |.@..{li|.X.m...f| +00000020 19 b3 29 15 9c 02 20 3e 5c 45 a5 b4 f1 29 ac c4 |..)... >\E...)..| +00000030 48 f4 26 46 a0 5d 02 4b 61 2a f5 68 69 6c 69 63 |H.&F.].Ka*.hilic| +00000040 6a cc 13 36 bf 11 76 |j..6..v| +[185 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 8874356403793367540, Envelope: 961 bytes, Signature: 0 bytes +[186 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 54 103 65 119 73 66 65 103 73 81 86 55 55 54 110 52 72 121 77 106 104 56 53 74 78 83 53 49 103 84 50 106 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 120 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 65 68 78 102 66 47 108 56 79 74 113 49 10 89 50 65 114 110 84 82 43 74 114 97 65 97 67 49 53 43 84 81 68 79 51 114 109 99 80 43 53 112 122 106 72 43 77 80 69 77 109 105 110 80 48 53 111 47 121 81 50 48 56 109 117 119 113 107 120 100 84 90 100 108 118 72 90 10 107 109 73 73 52 52 104 101 43 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 110 98 111 104 114 104 56 113 100 119 49 50 88 83 118 43 68 68 71 85 79 98 89 56 110 67 98 66 72 43 97 55 108 79 113 83 68 111 88 65 48 122 99 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 83 65 65 119 82 81 73 104 65 80 103 118 111 81 111 79 69 43 49 115 85 114 69 120 47 120 70 115 47 122 107 70 106 103 82 53 79 87 119 117 74 112 105 120 54 75 57 56 110 70 115 122 65 105 65 51 66 80 98 110 10 88 101 112 122 72 86 82 119 103 73 69 84 109 121 66 87 85 101 81 88 73 101 107 89 72 105 48 51 83 120 113 88 109 99 107 50 77 119 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +[187 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Added � �0��U�n�����##~J�9���o�R=� to the in memory item map, total items: 2 +[188 08-31 20:50:50.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[189 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +[18a 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[18b 08-31 20:50:50.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18c 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[18d 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[18e 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[18f 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[190 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes +[191 08-31 20:50:53.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[192 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 1098 bytes, Signature: 0 bytes +[193 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 d2 bb d7 9f 63 e7 08 02 c8 b5 26 6f 21 08 aa |.....c.....&o!..| +00000010 e3 71 f2 c1 ac 72 9a ba 00 23 a9 23 fc 4b d3 1c |.q...r...#.#.K..| +[194 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 97 33 95 87 65 34 46 21 d7 69 |0E.!...3..e4F!.i| +00000010 11 19 1f f4 fb e8 93 17 bd cd eb 02 d4 0d 2c 1b |..............,.| +00000020 9a 50 4c b9 ea 02 20 33 d3 bb f9 c1 4e 63 8c 0e |.PL... 3....Nc..| +00000030 4f 6c 17 ea 15 ef 80 c1 62 dc 95 f2 b7 0a bb 66 |Ol......b......f| +00000040 77 a6 76 ee 90 57 de |w.v..W.| +[195 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[196 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 52 1b c3 5e 3a 2a f7 45 cf 25 7b |0D. xR..^:*.E.%{| +00000010 0a 40 4e f1 e1 9b 66 e7 99 ce 80 c8 d8 2e 3f c1 |.@N...f.......?.| +00000020 43 14 b9 4e 02 20 65 f5 f1 cd c4 d9 09 50 45 35 |C..N. e......PE5| +00000030 d6 fb c5 7c b1 df 1e 3f 55 fb 06 a6 3b ce 07 cc |...|...?U...;...| +00000040 26 32 cf 0b 87 b3 |&2....| +[197 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx\nLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1\nY2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ\nkmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j\nBCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E\nAwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[198 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[199 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[19a 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" +[19b 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[19c 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19d 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19e 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19f 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1a0 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2192 bytes, Signature: 0 bytes to 1 peers +[1a1 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\347ggq\311\237\336\364\037\215\022g|\035" secret_envelope: > +[1a2 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2192 bytes, Signature: 0 bytes +[1a3 08-31 20:50:53.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a4 08-31 20:50:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1a5 08-31 20:50:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1a6 08-31 20:50:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1a7 08-31 20:50:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a8 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[1a9 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[1aa 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ab 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1ac 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A88070A3F0A1B70656572302E6F...455254494649434154452D2D2D2D2D0A +[1ad 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3649826F40B1A862D7AD8842DCBFEB1DAE7FFF924183182AAFCBCF5CF56C377E +[1ae 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1af 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1b0 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1b1 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\250\265D\233'wD\366\255\346\356\224\270\213\306\036\2759\374\005\024\002 \037\202\366=\247u\021\336F\273\241\205\246o\036\237\304\023\320p\310:\221\241\220\006\271\271r\224\377\221" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes to 1 peers +[1b2 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\250\265D\233'wD\366\255\346\356\224\270\213\306\036\2759\374\005\024\002 \037\202\366=\247u\021\336F\273\241\205\246o\036\237\304\023\320p\310:\221\241\220\006\271\271r\224\377\221" secret_envelope: > > , Envelope: 1099 bytes, Signature: 0 bytes +[1b3 08-31 20:50:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b4 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2192 bytes, Signature: 0 bytes +[1b5 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b6 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 2192 bytes, Signature: 0 bytes +[1b7 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 36 49 82 6f 40 b1 a8 62 d7 ad 88 42 dc bf eb 1d |6I.o@..b...B....| +00000010 ae 7f ff 92 41 83 18 2a af cb cf 5c f5 6c 37 7e |....A..*...\.l7~| +[1b8 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 69 37 4b 52 9c 1a 15 de ea 3e |0E.!..i7KR.....>| +00000010 a8 b5 44 9b 27 77 44 f6 ad e6 ee 94 b8 8b c6 1e |..D.'wD.........| +00000020 bd 39 fc 05 14 02 20 1f 82 f6 3d a7 75 11 de 46 |.9.... ...=.u..F| +00000030 bb a1 85 a6 6f 1e 9f c4 13 d0 70 c8 3a 91 a1 90 |....o.....p.:...| +00000040 06 b9 b9 72 94 ff 91 |...r...| +[1b9 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[1ba 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 79 23 65 79 93 cf 14 f9 81 a4 |0E.!..y#ey......| +00000010 bf e1 dd 68 24 44 7b 6c f1 67 c0 5e 40 d6 c4 3c |...h$D{l.g.^@..<| +00000020 1d 06 0c 92 ba 02 20 60 6c 69 34 26 72 45 06 31 |...... `li4&rE.1| +00000030 e6 92 b0 35 73 37 a7 98 08 33 9e 20 09 b7 46 f7 |...5s7...3. ..F.| +00000040 03 02 b5 7d 4a 99 b7 |...}J..| +[1bb 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1bc 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1bd 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1be 08-31 20:50:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bf 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1c0 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c1 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1c2 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1c3 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 84 48 f2 2a 89 5c 46 d0 51 89 1a 11 4e 23 ac 0f |.H.*.\F.Q...N#..| +00000010 4f 48 52 db e0 92 b4 d7 8e 0e bc db 31 71 d2 36 |OHR.........1q.6| +[1c4 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 47 62 f2 4b 74 fd f7 42 cf 84 35 14 |0D. Gb.Kt..B..5.| +00000010 5a 85 38 23 35 a1 1d 88 63 bf 67 58 95 74 0f 26 |Z.8#5...c.gX.t.&| +00000020 f2 f9 be 7f 02 20 16 1e 8d 25 53 fc 19 fc cd f1 |..... ...%S.....| +00000030 a4 75 e6 01 60 a9 dc 0c 9b 44 8d 8f e5 6e c6 c9 |.u..`....D...n..| +00000040 ee 92 bb cf 6e 86 |....n.| +[1c5 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1c6 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b 7b ff c4 37 9d d5 2f 39 3f d6 d9 |0D. +{..7../9?..| +00000010 b2 e4 7c 9c ed f9 6d ac ff 4d fc c5 0d 42 8e e5 |..|...m..M...B..| +00000020 03 09 92 50 02 20 1a 5f 5e df c0 51 36 cb 74 1e |...P. ._^..Q6.t.| +00000030 6d a7 ce 14 a3 d9 26 ef d3 02 17 6e 78 f2 cc 96 |m.....&....nx...| +00000040 39 94 c0 fb bc 7c |9....|| +[1c7 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1c8 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[1c9 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1ca 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1cb 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > , Envelope: 909 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[1cc 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cd 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ce 08-31 20:50:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cf 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1d0 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161008 +[1d1 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CCDCABDD134EBD909D8C941F1D19FC990CEC215E8A699A83808D6188D056724C +[1d2 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1d3 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1d4 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1d5 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1d6 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +[1d7 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1d8 08-31 20:50:55.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d9 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1da 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1db 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1dc 08-31 20:50:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dd 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[1de 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1df 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[1e0 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1e1 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d c8 ae 7a f7 e8 26 b5 d0 6a be 90 52 a1 da ad |...z..&..j..R...| +00000010 fa 91 96 fb 3b a5 fa 6b 2c db 23 4c 92 89 f4 84 |....;..k,.#L....| +[1e2 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 10 25 6f de 0b 24 70 96 f0 b2 0a 6d |0D. .%o..$p....m| +00000010 51 05 aa 74 ad 9c c0 8b d2 8c 59 e1 9d 35 92 41 |Q..t......Y..5.A| +00000020 1b 55 34 df 02 20 08 69 fc ec b6 dd ce cd d5 3b |.U4.. .i.......;| +00000030 bc 03 fd 45 47 0d 8f 5d 2a 77 56 aa 7e 0c f5 69 |...EG..]*wV.~..i| +00000040 8f 2b ec 25 e0 53 |.+.%.S| +[1e3 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1e4 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c 59 40 08 6d 32 7d 73 fc d1 da 35 |0D. |Y@.m2}s...5| +00000010 fd 22 5e 96 4e f2 8a b8 d7 9c f0 f1 94 23 24 30 |."^.N........#$0| +00000020 96 cd 83 89 02 20 1c 38 c8 4e a6 68 84 9a 70 a5 |..... .8.N.h..p.| +00000030 72 e9 93 b3 c0 1f e7 75 eb 41 f7 2f 0f fb 5a 62 |r......u.A./..Zb| +00000040 48 c1 a9 c5 71 5c |H...q\| +[1e5 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1e6 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[1e7 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1e8 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1e9 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[1ea 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1eb 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ec 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ed 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1ee 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers +[1ef 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +[1f0 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: > +[1f1 08-31 20:50:57.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f2 08-31 20:50:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1f3 08-31 20:50:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1f4 08-31 20:50:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1f5 08-31 20:50:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f6 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[1f7 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 84 bytes, Signature: 0 bytes +[1f8 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f9 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1fa 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161009 +[1fb 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 158521178DBB44080E8983A747F7E50E0F211D84F8087B975C4D03D33F715ACC +[1fc 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1fd 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1fe 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1ff 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[200 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[201 08-31 20:50:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[202 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +[203 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[204 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +[205 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[206 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 85 21 17 8d bb 44 08 0e 89 83 a7 47 f7 e5 0e |..!...D.....G...| +00000010 0f 21 1d 84 f8 08 7b 97 5c 4d 03 d3 3f 71 5a cc |.!....{.\M..?qZ.| +[207 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 b7 fa d8 51 1b 9c f5 2d 5b c8 |0E.!.....Q...-[.| +00000010 60 49 0e 65 19 e9 4c 24 8a 1b 16 c4 97 f0 0b 81 |`I.e..L$........| +00000020 38 d1 f9 33 95 02 20 4b 46 5c f0 ad 2a 2f 0a d9 |8..3.. KF\..*/..| +00000030 8b 03 25 ab a6 0a 60 19 33 5e 69 bb f3 35 b9 db |..%...`.3^i..5..| +00000040 7b 88 aa cd 4d 00 98 |{...M..| +[208 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[209 08-31 20:50:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 34 e0 c2 0f c2 c8 a0 a0 8d 38 |0E.!..4........8| +00000010 9d b3 b8 a4 6c 4d e6 19 36 57 d8 11 81 e6 da ee |....lM..6W......| +00000020 5d b6 f8 32 4b 02 20 32 b7 2a b1 07 c7 8f e5 f6 |]..2K. 2.*......| +00000030 2d 48 c6 21 55 a3 e4 ee 18 ab 6a a1 44 dd 9a 0d |-H.!U.....j.D...| +00000040 ed cc 32 a6 84 3f 79 |..2..?y| +[20a 08-31 20:50:57.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[20b 08-31 20:50:57.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[20c 08-31 20:50:57.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20d 08-31 20:50:57.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20e 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36692 +[20f 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00284f630 +[210 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +[211 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[212 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[213 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE----- +[214 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[215 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[216 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[217 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[218 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c f6 5e 9d 16 3c 10 6b 55 7b a4 ab 18 dc e8 54 |..^..<.kU{.....T| +00000010 03 88 27 d9 dc 5d 79 d6 5e 10 86 1a d1 d9 07 b9 |..'..]y.^.......| +[219 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 45 ee 27 6d 63 34 39 bd 84 e6 6b |0D. jE.'mc49...k| +00000010 45 4b 02 54 19 22 73 4f 43 04 71 b0 de 24 3e 60 |EK.T."sOC.q..$>`| +00000020 85 78 94 68 02 20 46 a2 f3 f7 64 a5 51 9d fe e2 |.x.h. F...d.Q...| +00000030 53 15 5e b2 8d 9d 78 51 c2 42 c8 fc 26 30 e0 58 |S.^...xQ.B..&0.X| +00000040 44 9b 1b 1a b1 3b |D....;| +[21a 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[21b 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001d50a0, header 0xc00284ff40 +[21c 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[21d 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU [][06112b95] processing txid: 06112b950bc851abedd0a38297e055c4ca2219e7de0f29e8a2e16bd4f82d0b72 +[21e 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU [][06112b95] Entry chaincode: name:"cscc" +[21f 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> INFO [][06112b95] Entry chaincode: name:"cscc" +[220 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[221 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: JoinChain +[222 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +[223 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +[224 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[225 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[226 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +[227 08-31 20:50:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[228 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c f6 5e 9d 16 3c 10 6b 55 7b a4 ab 18 dc e8 54 |..^..<.kU{.....T| +00000010 03 88 27 d9 dc 5d 79 d6 5e 10 86 1a d1 d9 07 b9 |..'..]y.^.......| +[229 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 45 ee 27 6d 63 34 39 bd 84 e6 6b |0D. jE.'mc49...k| +00000010 45 4b 02 54 19 22 73 4f 43 04 71 b0 de 24 3e 60 |EK.T."sOC.q..$>`| +00000020 85 78 94 68 02 20 46 a2 f3 f7 64 a5 51 9d fe e2 |.x.h. F...d.Q...| +00000030 53 15 5e b2 8d 9d 78 51 c2 42 c8 fc 26 30 e0 58 |S.^...xQ.B..&0.X| +00000040 44 9b 1b 1a b1 3b |D....;| +[22a 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> INFO Creating ledger [businesschannel] with genesis block +[22b 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileMgr() initializing file-based block storage for ledger: businesschannel +[22c 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] +[22d 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] does not exist +[22e 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/ledgersData/chains/chains/businesschannel/] exists +[22f 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> INFO Getting block information from block storage +[230 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving checkpoint info from block files +[231 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() +[232 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveLastFileSuffix() - biggestFileNum = -1 +[233 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Last file number found = -1 +[234 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU No block file found +[235 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Info constructed by scanning the blocks dir = (*fsblkstorage.checkpointInfo)(0xc0029d1680)(latestFileChunkSuffixNum=[0], latestFileChunksize=[0], isChainEmpty=[true], lastBlockNumber=[0]) +[236 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockIndex() - indexItems:[[BlockHash BlockNum TxID BlockNumTranNum BlockTxID TxValidationCode]] +[238 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Starting to process collection eligibility events +[239 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6, 0x8}] +[23a 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Converted [0] inelligible mising data entries to elligible +[23b 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for collection eligibility event +[237 08-31 20:50:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Pvtdata store opened. Initial state: isEmpty [true], lastCommittedBlock [0], batchPending [false] +[23c 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x31, 0x1}] +[23d 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Creating KVLedger ledgerID=businesschannel: +[23e 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Chain is empty +[23f 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Register state db for chaincode lifecycle events: false +[240 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering recoverDB() +[241 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Block storage is empty. +[242 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Filtering pvtData of invalidation transactions +[243 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Committing pvtData of [0] old blocks to the stateDB +[244 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[245 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing pvtData of old blocks to state database +[246 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Constructing unique pvtData by removing duplicate entries +[247 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel:] Clearing the bookkeeping information from pvtdatastore +[248 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [0] +[249 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[24a 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[24b 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[24c 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [0] +[24d 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[24e 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +[24f 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +[250 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +[251 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[252 08-31 20:50:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +[253 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +[254 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:1 channel_group: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +[255 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[256 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +[257 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Block [0] Transaction index [0] TxId [] marked as valid by state validator +[258 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc002a53480)} +[259 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[25a 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[25b 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[25c 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [0] +[25d 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] to storage +[25e 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [0] to pvt block store +[25f 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [0] +[260 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=0, blockHash=[]byte{0x9a, 0x52, 0x4c, 0x2b, 0x43, 0x65, 0xfd, 0x57, 0x33, 0x8e, 0x73, 0xf4, 0x8a, 0x80, 0xa7, 0x23, 0x93, 0x2, 0xb5, 0x41, 0x2, 0x4d, 0xf3, 0x50, 0xe8, 0x90, 0xb1, 0xd5, 0x7a, 0xc7, 0x1e, 0x2e} txOffsets= +txId=fd92ece786eb33a140499e967ed74e3a3bbcb8e88456d50f7454e373b6da94d6 locPointer=offset=39, bytesLength=28430 +] +[261 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28430] for tx ID: [fd92ece786eb33a140499e967ed74e3a3bbcb8e88456d50f7454e373b6da94d6] to txid-index +[262 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=39, bytesLength=28430] for tx number:[0] ID: [fd92ece786eb33a140499e967ed74e3a3bbcb8e88456d50f7454e373b6da94d6] to blockNumTranNum index +[263 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[28476], isChainEmpty=[false], lastBlockNumber=[0] +[264 08-31 20:50:57.74 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [0] +[265 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [0] +[266 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to state database +[267 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Purger started: Purging expired private data till block number [0] +[268 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveExpiryEntries(): startKey=[]byte{0x3, 0x0, 0x0}, endKey=[]byte{0x3, 0x1, 0x1, 0x0} +[269 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x3, 0x1, 0x1, 0x0}] +[26a 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Purger finished +[26b 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[26c 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [0] +[26d 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x0, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] +[26f 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[26e 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [0] +[270 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[271 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[272 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +[273 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[274 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [1] +[276 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x1, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] +[277 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [1] +[275 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[278 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [0] transactions to history database +[279 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [0] with [1] transactions +[27a 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +[27b 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [0] +[27c 08-31 20:50:57.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [0] with 1 transaction(s) in 22ms (state_validation=7ms block_and_pvtdata_commit=8ms state_commit=4ms) commitHash=[] +[27d 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> INFO Created ledger [businesschannel] with genesis block +[27e 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [805bb9d3-d762-4cc4-9490-4bacd6ad389e] +[27f 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=, key=resourcesconfigtx.CHANNEL_CONFIG_KEY +[280 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [805bb9d3-d762-4cc4-9490-4bacd6ad389e] +[281 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +[282 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +[283 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +[284 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +[285 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +[286 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[287 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +[288 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +[289 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +[28a 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +[28b 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +[28c 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +[28d 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[28e 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +[28f 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +[290 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[291 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[292 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +[293 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[294 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[295 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +[296 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- +[297 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +[298 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +[299 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[29a 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[29b 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[29c 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[29d 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[29e 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +[29f 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +[2a0 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[2a1 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[2a2 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +[2a3 08-31 20:50:57.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- +[2a4 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[2a5 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[2a6 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[2a7 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[2a8 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are +[2a9 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +[2aa 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[2ab 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[2ac 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[2ad 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- +[2ae 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +[2af 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +[2b0 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +[2b1 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +[2b2 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +[2b3 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +[2b4 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +[2b5 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +[2b6 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +[2b7 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +[2b8 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +[2b9 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +[2ba 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +[2bb 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +[2bc 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org1MSP +[2bd 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +[2be 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +[2bf 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +[2c0 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +[2c1 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +[2c2 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +[2c3 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +[2c4 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +[2c5 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +[2c6 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +[2c7 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[2c8 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +[2c9 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +[2ca 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +[2cb 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +[2cc 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +[2cd 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +[2ce 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +[2cf 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +[2d0 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +[2d1 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +[2d2 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +[2d3 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +[2d4 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +[2d5 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +[2d6 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +[2d7 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[2d8 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[2d9 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[2da 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[2db 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Endorsement +[2dc 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[2dd 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[2de 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[2df 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[2e0 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[2e1 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[2e2 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[2e3 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +[2e4 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[2e5 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[2e6 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[2e7 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[2e8 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[2e9 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[2ea 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[2eb 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +[2ec 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +[2ed 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +[2ee 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +[2ef 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +[2f0 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +[2f1 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +[2f2 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +[2f3 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +[2f4 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +[2f5 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +[2f6 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +[2f7 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[2f8 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[2f9 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[2fa 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[2fb 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[2fc 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[2fd 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +[2fe 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +[2ff 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +[300 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +[301 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[302 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[303 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +[304 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +[305 08-31 20:50:57.77 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +[306 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +[307 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +[308 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +[309 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +[30a 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +[30b 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +[30c 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [] +[30d 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[30e 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +[30f 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +[310 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org1MSP for channel businesschannel to learn about +[311 08-31 20:50:57.78 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +[312 08-31 20:50:57.79 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +[313 08-31 20:50:57.79 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +[314 08-31 20:50:57.79 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +[315 08-31 20:50:57.79 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +[316 08-31 20:50:57.79 UTC] [%{longpkg}] %{callpath} -> DEBU CreateDirIfMissing [/var/hyperledger/production/transientStore/] +[317 08-31 20:50:57.79 UTC] [%{longpkg}] %{callpath} -> DEBU Before creating dir - [/var/hyperledger/production/transientStore/] does not exist +[318 08-31 20:50:57.79 UTC] [%{longpkg}] %{callpath} -> DEBU After creating dir - [/var/hyperledger/production/transientStore/] exists +[319 08-31 20:50:57.80 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[31a 08-31 20:50:57.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[31b 08-31 20:50:57.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 00000000000000000000000000000000...00000000000000000000000000000000 +[31c 08-31 20:50:57.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 66687AADF862BD776C8FC18B8E9F8E20089714856EE233B3902A591D0D5F2925 +[31d 08-31 20:50:57.80 UTC] [%{longpkg}] %{callpath} -> DEBU Private data reconciliation is enabled +[31e 08-31 20:50:57.80 UTC] [%{longpkg}] %{callpath} -> INFO Updating metadata information for channel businesschannel, current ledger sequence is at = 0, next expected block is = 1 +[31f 08-31 20:50:57.80 UTC] [%{longpkg}] %{callpath} -> DEBU Updating gossip ledger height to 1 +[320 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[321 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408A8CFEFBEF6AF9D9816...096D8DADEA4206176416CB532A020801 +[322 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0334B40F401EAF1BDBDDA56DF36DA4D05B4B08479256359EDFD1595952CAD655 +[323 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Delivery uses dynamic leader election mechanism, channel businesschannel +[324 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing channel businesschannel +[325 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[326 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[327 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Deploying system CC, for channel +[328 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[329 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [fe2220aa-e2f5-4af1-8dfb-194d5dd142a5] +[32a 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[32b 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU [fe2220aa] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[32c 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU [fe2220aa] notifying Txid:fe2220aa-e2f5-4af1-8dfb-194d5dd142a5, channelID:businesschannel +[32d 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[32e 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode lscc/businesschannel(github.com/hyperledger/fabric/core/scc/lscc) deployed +[32f 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [fe2220aa-e2f5-4af1-8dfb-194d5dd142a5] +[330 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[331 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [0ab1a7cd-e502-4075-96a2-2fe9d206bfa5] +[332 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[333 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> INFO Init CSCC +[334 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU [0ab1a7cd] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[335 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU [0ab1a7cd] notifying Txid:0ab1a7cd-e502-4075-96a2-2fe9d206bfa5, channelID:businesschannel +[336 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[337 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode cscc/businesschannel(github.com/hyperledger/fabric/core/scc/cscc) deployed +[338 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [0ab1a7cd-e502-4075-96a2-2fe9d206bfa5] +[339 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[33a 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [878f767b-fd16-40bd-bbc5-8ab2aa83f73c] +[33b 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[33c 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> INFO Init QSCC +[33d 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU [878f767b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[33e 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU [878f767b] notifying Txid:878f767b-fd16-40bd-bbc5-8ab2aa83f73c, channelID:businesschannel +[33f 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[340 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode qscc/businesschannel(github.com/hyperledger/fabric/core/scc/qscc) deployed +[341 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [878f767b-fd16-40bd-bbc5-8ab2aa83f73c] +[342 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> INFO system chaincode (+lifecycle,github.com/hyperledger/fabric/core/chaincode/lifecycle) disabled +[343 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [d21280aa-c271-417c-b0cd-721345e46807] +[344 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [] +[345 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d21280aa-c271-417c-b0cd-721345e46807] +[346 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[347 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408A8CFEFBEF6AF9D9816...096D8DADEA4206176416CB532A020801 +[348 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7DDBF73028F351BD6A240C999670B203E26B44EF08FCF0FD1C63D8D3DDE8C111 +[349 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +[34a 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU [06112b95] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[34b 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU [06112b95] notifying Txid:06112b950bc851abedd0a38297e055c4ca2219e7de0f29e8a2e16bd4f82d0b72, channelID: +[34c 08-31 20:50:57.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[34d 08-31 20:50:57.82 UTC] [%{longpkg}] %{callpath} -> INFO [][06112b95] Exit chaincode: name:"cscc" (104ms) +[34e 08-31 20:50:57.82 UTC] [%{longpkg}] %{callpath} -> DEBU [][06112b95] Exit +[34f 08-31 20:50:57.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36692 +[350 08-31 20:50:57.82 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36692 grpc.code=OK grpc.call_duration=110.5382ms +[351 08-31 20:50:57.82 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[352 08-31 20:50:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting, peers found 0 +[353 08-31 20:50:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[354 08-31 20:50:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[355 08-31 20:50:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[356 08-31 20:50:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[357 08-31 20:50:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...2D3C120C08D0DCBCCDF6AF9D98161001 +[358 08-31 20:50:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3CD1450C3FF3F940A90526DBAD5868B370E699F4DF7B68D6AE241C6B49DC0EAF +[359 08-31 20:50:58.81 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[35a 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36700 +[35b 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0031b67d0 +[35c 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[35d 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[35e 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[35f 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[360 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc 91 a7 f6 18 80 89 66 21 eb 8a d7 b8 73 f1 71 |.......f!....s.q| +00000010 49 73 dd 40 63 f1 e1 e4 9c cd 9c 13 4b 66 81 6b |Is.@c.......Kf.k| +[361 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 9e 60 e0 9f 55 65 29 e5 c7 19 |0E.!...`..Ue)...| +00000010 2f 8f b4 33 1c 4d f2 c2 6d a0 ef d9 47 a0 5e c6 |/..3.M..m...G.^.| +00000020 95 da a3 b8 83 02 20 74 8e dc 8f 92 3a 59 16 12 |...... t....:Y..| +00000030 b0 a4 3d b2 5f 18 76 66 b1 9d fa aa f1 4f 7e ee |..=._.vf.....O~.| +00000040 e4 0d 4f ec 2b dc 88 |..O.+..| +[362 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[363 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00015fe30, header 0xc0031b6be0 +[364 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[365 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU [][d22acefe] processing txid: d22acefea6dc93765745aed6e15aaadb9bca1cb8c9cb52d9925a1ee7881380d0 +[366 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU [][d22acefe] Entry chaincode: name:"cscc" +[367 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> INFO [][d22acefe] Entry chaincode: name:"cscc" +[368 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[369 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +[36a 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[36b 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[36c 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[36d 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc 91 a7 f6 18 80 89 66 21 eb 8a d7 b8 73 f1 71 |.......f!....s.q| +00000010 49 73 dd 40 63 f1 e1 e4 9c cd 9c 13 4b 66 81 6b |Is.@c.......Kf.k| +[36e 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 9e 60 e0 9f 55 65 29 e5 c7 19 |0E.!...`..Ue)...| +00000010 2f 8f b4 33 1c 4d f2 c2 6d a0 ef d9 47 a0 5e c6 |/..3.M..m...G.^.| +00000020 95 da a3 b8 83 02 20 74 8e dc 8f 92 3a 59 16 12 |...... t....:Y..| +00000030 b0 a4 3d b2 5f 18 76 66 b1 9d fa aa f1 4f 7e ee |..=._.vf.....O~.| +00000040 e4 0d 4f ec 2b dc 88 |..O.+..| +[36f 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU [d22acefe] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[370 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU [d22acefe] notifying Txid:d22acefea6dc93765745aed6e15aaadb9bca1cb8c9cb52d9925a1ee7881380d0, channelID: +[371 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[372 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> INFO [][d22acefe] Exit chaincode: name:"cscc" (2ms) +[373 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU [][d22acefe] Exit +[374 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36700 +[375 08-31 20:50:58.95 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36700 grpc.code=OK grpc.call_duration=4.1337ms +[376 08-31 20:50:58.97 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[377 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36708 +[378 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003188fa0 +[379 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[37a 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[37b 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[37c 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[37d 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 7f 72 66 32 cc 24 0b 8c d9 f0 25 aa 64 8f 0b |o.rf2.$....%.d..| +00000010 d6 86 2c 41 50 0a 15 be 9b ef 02 c3 a5 4a 02 58 |..,AP........J.X| +[37e 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 17 78 77 40 53 b2 5d 12 f5 67 cd |0D. k.xw@S.]..g.| +00000010 e6 f6 01 2b 65 22 7f ae 18 b5 70 3f f8 54 14 76 |...+e"....p?.T.v| +00000020 6c 5e d6 22 02 20 62 a9 f6 a4 ca 91 ac 68 73 60 |l^.". b......hs`| +00000030 a9 9e f1 8d 5e 9a 04 9a 98 10 5a d5 f5 e4 fb 20 |....^.....Z.... | +00000040 a5 77 e5 63 fd 1e |.w.c..| +[37f 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[380 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc002c5df80, header 0xc0031893b0 +[381 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[382 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU [][61f15dda] processing txid: 61f15dda710fe8ad8b98f3c6ae58ecc57ca157b30ade1b0f6949a32b0453dc04 +[383 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU [][61f15dda] Entry chaincode: name:"qscc" +[384 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> INFO [][61f15dda] Entry chaincode: name:"qscc" +[385 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[386 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +[387 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +[388 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[389 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[38a 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[38b 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[38c 08-31 20:50:59.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38d 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE----- +[38e 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227270 gate 1598907059840897700 evaluation starts +[38f 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227270 signed by 0 principal evaluation starts (used [false]) +[390 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227270 processing identity 0 with bytes of 115a4b0 +[391 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[392 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[393 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[394 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227270 principal matched by identity 0 +[395 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f 7f 72 66 32 cc 24 0b 8c d9 f0 25 aa 64 8f 0b |o.rf2.$....%.d..| +00000010 d6 86 2c 41 50 0a 15 be 9b ef 02 c3 a5 4a 02 58 |..,AP........J.X| +[396 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 17 78 77 40 53 b2 5d 12 f5 67 cd |0D. k.xw@S.]..g.| +00000010 e6 f6 01 2b 65 22 7f ae 18 b5 70 3f f8 54 14 76 |...+e"....p?.T.v| +00000020 6c 5e d6 22 02 20 62 a9 f6 a4 ca 91 ac 68 73 60 |l^.". b......hs`| +00000030 a9 9e f1 8d 5e 9a 04 9a 98 10 5a d5 f5 e4 fb 20 |....^.....Z.... | +00000040 a5 77 e5 63 fd 1e |.w.c..| +[397 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227270 principal evaluation succeeds for identity 0 +[398 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227270 gate 1598907059840897700 evaluation succeeds +[399 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[39a 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[39b 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[39c 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[39d 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU [61f15dda] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[39e 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU [61f15dda] notifying Txid:61f15dda710fe8ad8b98f3c6ae58ecc57ca157b30ade1b0f6949a32b0453dc04, channelID: +[39f 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[3a0 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> INFO [][61f15dda] Exit chaincode: name:"qscc" (9ms) +[3a1 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU [][61f15dda] Exit +[3a2 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36708 +[3a3 08-31 20:50:59.84 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36708 grpc.code=OK grpc.call_duration=13.018ms +[3a4 08-31 20:50:59.85 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3a5 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3a6 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a7 08-31 20:51:00.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3a8 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3a9 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c8 46 01 24 25 33 38 e8 fe 5b 5f ae 48 11 eb 80 |.F.$%38..[_.H...| +00000010 5c c1 b0 8a af 2a 11 ab c2 69 4f dd bc 9a 1e d5 |\....*...iO.....| +[3aa 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 42 bd c4 70 c1 e5 fc a1 3c b5 |0E.!..B..p....<.| +00000010 0d 1d 56 e9 86 a2 6b 81 84 71 ed 83 40 df 93 4a |..V...k..q..@..J| +00000020 7d bc 25 c0 32 02 20 34 4c e8 bf 4a 2d 71 fa 76 |}.%.2. 4L..J-q.v| +00000030 ba 8b e5 cd 23 d4 75 8e 13 0f 0c 39 9a 97 45 13 |....#.u....9..E.| +00000040 c8 4d 0b 9c ed f3 4b |.M....K| +[3ab 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[3ac 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 2a 37 79 c8 8e 70 c9 e5 2c 9b 34 |0D. x*7y..p..,.4| +00000010 27 13 b7 9f da 2b 4b 05 8f 5b d0 06 1c 35 f8 ee |'....+K..[...5..| +00000020 6a 1f d7 07 02 20 52 9c 8c 27 cc bc e4 5d 93 c2 |j.... R..'...]..| +00000030 41 1f df 83 d7 f5 82 d5 10 36 2f 03 5d 67 c5 17 |A........6/.]g..| +00000040 47 af a7 69 5b 84 |G..i[.| +[3ad 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3ae 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[3af 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3b0 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3b1 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[3b2 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b3 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b4 08-31 20:51:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b5 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3b6 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816100A +[3b7 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 560566BE9EF2E799DB13B1A332517DD555DD9A893BA48F851F20E69F1FE885D4 +[3b8 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3b9 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3ba 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3bb 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[3bc 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +[3bd 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[3be 08-31 20:51:00.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3bf 08-31 20:51:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3c0 08-31 20:51:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3c1 08-31 20:51:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3c2 08-31 20:51:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c3 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[3c4 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c5 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[3c6 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3c7 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 9a ae 9c 60 24 3e 80 19 fa 06 53 c1 74 5e 2c |....`$>....S.t^,| +00000010 43 71 7b 46 51 7d 90 51 eb fc 1b 67 fa 12 6c 6e |Cq{FQ}.Q...g..ln| +[3c8 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 9b b9 c1 d8 3f 75 22 d4 90 16 |0E.!......?u"...| +00000010 85 9e 5c 63 f8 44 a1 f6 7f 6e 86 8e 41 ee 32 67 |..\c.D...n..A.2g| +00000020 1f 5d ef 87 81 02 20 59 b9 0d 2e e5 e0 b5 b8 95 |.].... Y........| +00000030 37 84 96 66 08 85 49 66 ef 14 c9 81 9f 15 d1 a6 |7..f..If........| +00000040 fb 0f 63 6b 35 30 2a |..ck50*| +[3c9 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[3ca 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 6f 99 1c f6 0b 93 db d7 07 1c |0E.!..o.........| +00000010 bf e7 34 41 9d cb 30 67 fc 85 b0 3f d5 1d 44 7d |..4A..0g...?..D}| +00000020 97 27 4d 53 da 02 20 68 af ed 2b fb 41 c6 d4 4e |.'MS.. h..+.A..N| +00000030 49 89 b6 53 82 f8 9d c3 8a 08 ef 1d 44 22 b5 da |I..S........D"..| +00000040 04 1e 84 e3 0c d8 32 |......2| +[3cb 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[3cc 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[3cd 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3ce 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3cf 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[3d0 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d1 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d2 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d3 08-31 20:51:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[3d4 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes to 1 peers +[3d5 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\017I\2254Dn" > > +[3d6 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 538 bytes, Signature: 0 bytes +[3d7 08-31 20:51:01.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3d8 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[3d9 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[3da 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3db 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3dc 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[3dd 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[3de 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3df 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3e0 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816100B +[3e1 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E29C81FDB53FE676F77B94DB5381962F32BDEF8F8230EDF7AE6839CB770D65CA +[3e2 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3e3 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3e4 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3e5 08-31 20:51:01.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\020\025\362Y\0343z)\270\035t5\237\202\330{\256\277e*bB" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[3e6 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\020\025\362Y\0343z)\270\035t5\237\202\330{\256\277e*bB" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[3e7 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e8 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +[3e9 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ea 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 537 bytes, Signature: 0 bytes +[3eb 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3ec 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 9c 81 fd b5 3f e6 76 f7 7b 94 db 53 81 96 2f |.....?.v.{..S../| +00000010 32 bd ef 8f 82 30 ed f7 ae 68 39 cb 77 0d 65 ca |2....0...h9.w.e.| +[3ed 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a8 c8 b9 66 cb b0 21 18 97 a8 90 |0E.!....f..!....| +00000010 00 f7 53 51 15 e9 81 62 76 1f 74 99 25 3f f9 8b |..SQ...bv.t.%?..| +00000020 e6 4e 83 7d 9e 02 20 78 48 34 c0 b7 72 34 b8 65 |.N.}.. xH4..r4.e| +00000030 3e 10 15 f2 59 1c 33 7a 29 b8 1d 74 35 9f 82 d8 |>...Y.3z)..t5...| +00000040 7b ae bf 65 2a 62 42 |{..e*bB| +[3ee 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[3ef 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a ba 77 00 cd 70 eb d3 8a 6e 10 ca |0D. Z.w..p...n..| +00000010 d2 fa 28 d7 03 2c 08 dc e5 c3 7c 58 39 23 ca b1 |..(..,....|X9#..| +00000020 fd da 6f 40 02 20 1d 5c f7 fc bb d8 e2 e0 19 90 |..o@. .\........| +00000030 eb 2a c8 db 7e 55 16 42 16 f8 0e c7 5c 47 ce 94 |.*..~U.B....\G..| +00000040 c4 ab c8 4b 55 6b |...KUk| +[3f0 08-31 20:51:01.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3f1 08-31 20:51:01.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3f2 08-31 20:51:01.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f3 08-31 20:51:01.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f4 08-31 20:51:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 1 peers +[3f5 08-31 20:51:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3f6 08-31 20:51:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f7 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 198 bytes, Signature: 0 bytes +[3f8 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 2d 0f 93 fa 5a 38 ea 1e a6 97 9b 85 21 70 63 |.-...Z8......!pc| +00000010 6d cc 60 e1 07 c2 ed a8 09 44 22 22 bd 46 b1 10 |m.`......D"".F..| +[3f9 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b a9 f8 b1 8d 68 b8 c3 5a 96 2e d2 |0D. k....h..Z...| +00000010 4d 57 70 40 2f 28 0c 43 57 5f c2 00 c3 7d f0 87 |MWp@/(.CW_...}..| +00000020 a9 76 21 13 02 20 76 bd 5e 18 6f e2 bd 3d 0e e4 |.v!.. v.^.o..=..| +00000030 68 62 d6 ef 08 e3 5d 5c eb 6b c4 b5 f3 9d 3b 8c |hb....]\.k....;.| +00000040 d3 68 59 f1 33 fd |.hY.3.| +[3fa 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3fb 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3fc 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3fd 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3fe 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3ff 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[400 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +-----END CERTIFICATE----- +[401 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265ec0 gate 1598907061755097400 evaluation starts +[402 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265ec0 signed by 0 principal evaluation starts (used [false]) +[403 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265ec0 processing identity 0 with bytes of 115a4b0 +[404 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[405 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[406 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[407 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265ec0 principal matched by identity 0 +[408 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 2d 0f 93 fa 5a 38 ea 1e a6 97 9b 85 21 70 63 |.-...Z8......!pc| +00000010 6d cc 60 e1 07 c2 ed a8 09 44 22 22 bd 46 b1 10 |m.`......D"".F..| +[409 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b a9 f8 b1 8d 68 b8 c3 5a 96 2e d2 |0D. k....h..Z...| +00000010 4d 57 70 40 2f 28 0c 43 57 5f c2 00 c3 7d f0 87 |MWp@/(.CW_...}..| +00000020 a9 76 21 13 02 20 76 bd 5e 18 6f e2 bd 3d 0e e4 |.v!.. v.^.o..=..| +00000030 68 62 d6 ef 08 e3 5d 5c eb 6b c4 b5 f3 9d 3b 8c |hb....]\.k....;.| +00000040 d3 68 59 f1 33 fd |.hY.3.| +[40a 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265ec0 principal evaluation succeeds for identity 0 +[40b 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265ec0 gate 1598907061755097400 evaluation succeeds +[40c 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[40d 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[40e 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[40f 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[410 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[411 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 69 bytes to 1 peers +[412 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 69 bytes +[413 08-31 20:51:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[414 08-31 20:51:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[415 08-31 20:51:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[416 08-31 20:51:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[417 08-31 20:51:01.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[418 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[419 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:53920 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[41a 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 2d 0f 93 fa 5a 38 ea 1e a6 97 9b 85 21 70 63 |.-...Z8......!pc| +00000010 6d cc 60 e1 07 c2 ed a8 09 44 22 22 bd 46 b1 10 |m.`......D"".F..| +[41b 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b a9 f8 b1 8d 68 b8 c3 5a 96 2e d2 |0D. k....h..Z...| +00000010 4d 57 70 40 2f 28 0c 43 57 5f c2 00 c3 7d f0 87 |MWp@/(.CW_...}..| +00000020 a9 76 21 13 02 20 76 bd 5e 18 6f e2 bd 3d 0e e4 |.v!.. v.^.o..=..| +00000030 68 62 d6 ef 08 e3 5d 5c eb 6b c4 b5 f3 9d 3b 8c |hb....]\.k....;.| +00000040 d3 68 59 f1 33 fd |.hY.3.| +[41c 08-31 20:51:02.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41d 08-31 20:51:02.74 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer1.org1.example.com:7051]] , current view: [[peer1.org1.example.com:7051]] +[41e 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[41f 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> INFO 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Becoming a leader +[420 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> INFO Elected as a leader, starting delivery service for channel businesschannel +[421 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> INFO This peer will retrieve blocks from ordering service and disseminate to other peers in the organization for channel businesschannel +[422 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[423 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[424 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[425 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610021801 +[426 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU Creating a new connection +[427 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B68737AFD6A1B7060D2E09D64DB17C441B4CCA83A3528856C65B2C1580984308 +[428 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[429 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[42a 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[42b 08-31 20:51:03.78 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{orderer2.example.com:7050 0 }] +[42c 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[42d 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00330d110, CONNECTING +[42e 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[42f 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[430 08-31 20:51:03.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[431 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00330d110, READY +[432 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to {orderer2.example.com:7050 [OrdererMSP]} +[433 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Connected to orderer2.example.com:7050 +[434 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Establishing gRPC stream with orderer2.example.com:7050 ... +[435 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering +[436 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> INFO Starting deliver with block [1] for channel businesschannel +[437 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[438 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[439 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A95070A3D08051A0608B7C5B5FA0522...01120D1A0B08FFFFFFFFFFFFFFFFFF01 +[43a 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 54765BDADC6694A8BF3CEBA789D219A4687109CA4AE0D413F1FC6BE0748F1527 +[43b 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43c 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[43d 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[43e 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[43f 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[440 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[441 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[442 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHjCCAcWgAwIBAgIQUak2hDd8j2SLaQNMbXpZRDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUu +Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET8B7vvN/rxdMqWGK+yqvj2vj +zcoh0PNOTfowTjKzggxnGNjm57Tabe8mSEp3J79IN+Z0BUjlRX7ePe1Y9MnQP6NN +MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +MQtqMO2tIswbOnZ/EyE1ZgEdzPAma23Urf8qNS+mD/ACICsZIm7LFxHSrXc9AD5h +WFUnXFrrWMedpv6WCUtVYuZy +-----END CERTIFICATE----- +[443 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b82e0 gate 1598907063808281300 evaluation starts +[444 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b82e0 signed by 0 principal evaluation starts (used [false]) +[445 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b82e0 processing identity 0 with bytes of 115a4b0 +[446 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +[447 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[448 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +[449 08-31 20:51:03.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b82e0 principal matched by identity 0 +[44a 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 4e 02 62 d8 ce 08 d6 21 32 3c 63 e0 2f cb f3 |.N.b....!2 DEBU Verify: sig = 00000000 30 44 02 20 65 5c b1 94 00 fb 6c 86 4f 01 bd 14 |0D. e\....l.O...| +00000010 78 85 5b 30 e2 c4 da 3d ab 42 97 95 e8 5d 25 ea |x.[0...=.B...]%.| +00000020 30 0e 43 9b 02 20 75 a0 a3 5b da cb 12 76 2a 73 |0.C.. u..[...v*s| +00000030 7e d8 d6 e1 fe 07 28 d4 40 eb 54 bc 28 0f 7f 71 |~.....(.@.T.(..q| +00000040 81 38 7b e9 17 2a |.8{..*| +[44c 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b82e0 principal evaluation succeeds for identity 0 +[44d 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b82e0 gate 1598907063808281300 evaluation succeeds +[44e 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[44f 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[450 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[451 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[452 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +[453 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [1] +[454 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[455 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [1], peers number [1] +[456 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28177 bytes, seq: 1}, Envelope: 28210 bytes, Signature: 0 bytes to the block puller +[457 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Added 1, total items: 1 +[458 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[459 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[45a 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[45b 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[45c 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[45d 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9dd0 gate 1598907063814615500 evaluation starts +[45e 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9dd0 signed by 0 principal evaluation starts (used [false]) +[45f 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9dd0 processing identity 0 with bytes of 115a4b0 +[460 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9dd0 principal matched by identity 0 +[461 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ec df f2 ac 7d f3 0f 90 97 c6 fa 5a 88 ae 1a c5 |....}......Z....| +00000010 5a bb 6f b7 33 60 d2 91 59 2b 32 e5 3e 80 d5 1a |Z.o.3`..Y+2.>...| +[462 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a5 72 3d 11 03 5c aa ca 61 05 2f |0E.!..r=..\..a./| +00000010 c5 ac 3d 38 a9 1d 8a 39 b0 a1 eb af c4 32 23 b8 |..=8...9.....2#.| +00000020 a0 82 2f dd 97 02 20 1d 25 fc 05 ba 0c ff 88 fe |../... .%.......| +00000030 64 89 ec 28 d5 2f d6 34 18 78 cb f5 d2 cc 91 36 |d..(./.4.x.....6| +00000040 b5 6e 94 36 fc dd 04 |.n.6...| +[463 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9dd0 principal evaluation succeeds for identity 0 +[464 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9dd0 gate 1598907063814615500 evaluation succeeds +[465 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[466 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[467 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[468 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[469 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28177 bytes, seq: 1}, Envelope: 28210 bytes, Signature: 0 bytes to 1 peers +[46a 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +[46b 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [2] +[46c 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 2 blocks +[46d 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28177 bytes, seq: 1}, Envelope: 28210 bytes, Signature: 0 bytes +[46f 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[470 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [1] +[46e 08-31 20:51:03.81 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [2], peers number [1] +[471 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes to the block puller +[472 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Added 2, total items: 2 +[473 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [1] with 1 transaction(s) to the ledger +[474 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [1] from buffer +[475 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [1] +[476 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [1] +[477 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[478 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0031c0000 env 0xc000252000 txn 0 +[479 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc000252000 +[47a 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\264\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----\nMIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt\ncGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV\nBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp\nc2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl\nLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt\n2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj\nTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R\nMUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC\nIAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\0305\231\256\356\005\207\177s\320\333\2161g\250g\375\0331i\366p\262\234\235" +[47b 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +[47c 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[47d 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[47e 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47f 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE----- +[480 08-31 20:51:03.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes to 1 peers +[481 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 28183 bytes, seq: 2}, Envelope: 28216 bytes, Signature: 0 bytes +[482 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[483 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +[484 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[485 08-31 20:51:03.84 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +[486 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[487 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a c9 56 74 d0 ac d1 53 26 ca 88 78 dd d1 98 e3 |*.Vt...S&..x....| +00000010 ee b9 13 91 2d c5 2c 69 ec 14 2a 0f f3 f1 54 a2 |....-.,i..*...T.| +[488 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 05 b4 a7 cf 0c d5 ef fc 4a 2d 2b 1c |0D. ........J-+.| +00000010 62 61 50 e5 d5 98 dc d2 14 31 4f 44 6a a4 86 44 |baP......1ODj..D| +00000020 b0 89 10 60 02 20 58 11 e4 1a 38 2d 02 16 fb d0 |...`. X...8-....| +00000030 3e 3a 82 7c a3 2e 16 22 69 6d a8 0c 03 8a 46 67 |>:.|..."im....Fg| +00000040 2d c0 ba 70 a1 eb |-..p..| +[489 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[48a 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc003386a80, header channel_header:"\010\001\032\006\010\264\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\0305\231\256\356\005\207\177s\320\333\2161g\250g\375\0331i\366p\262\234\235" +[48b 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[48c 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[48d 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[48e 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[48f 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[490 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[491 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[492 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[493 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[494 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[495 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[496 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +[497 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[498 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[499 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[49a 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[49b 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org1MSP +[49c 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org1MSP with mod_policy Admins +[49d 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[49e 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[49f 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[4a0 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[4a1 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[4a2 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[4a3 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org1MSP] +[4a4 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[4a5 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[4a6 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org1MSP looking up path [] +[4a7 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +[4a8 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00019f980 gate 1598907063857382600 evaluation starts +[4a9 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00019f980 signed by 0 principal evaluation starts (used [false]) +[4aa 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00019f980 processing identity 0 with bytes of 115a4b0 +[4ab 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +[4ac 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +[4ad 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[4ae 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[4af 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +[4b0 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[4b1 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00019f980 principal matched by identity 0 +[4b2 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0a 6a 5e 90 37 00 25 29 cc 2f 3d ec 44 8f 23 98 |.j^.7.%)./=.D.#.| +00000010 40 21 8f 78 1d c2 88 4f 31 16 8b 9b 25 00 fb 20 |@!.x...O1...%.. | +[4b3 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d d5 10 d0 47 15 e1 14 bb 9f dc b9 |0D. ....G.......| +00000010 21 20 fe 43 aa a5 85 eb 20 91 d3 d3 25 c3 40 6f |! .C.... ...%.@o| +00000020 be ec 7e 52 02 20 3f 97 e3 ab d5 5a 98 c6 78 08 |..~R. ?....Z..x.| +00000030 e3 1a 1c 9b 18 c4 79 e9 08 26 b7 2a 98 01 0e 55 |......y..&.*...U| +00000040 0c af 35 37 61 76 |..57av| +[4b4 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00019f980 principal evaluation succeeds for identity 0 +[4b5 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00019f980 gate 1598907063857382600 evaluation succeeds +[4b6 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +[4b7 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +[4b8 08-31 20:51:03.85 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org1MSP/AnchorPeers +[4b9 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4ba 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4bb 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4bc 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4bd 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +[4be 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4bf 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4c0 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4c1 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4c2 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4c3 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +[4c4 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +[4c5 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +[4c6 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +[4c7 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +[4c8 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4c9 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4ca 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4cb 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +[4cc 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[4cd 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[4ce 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[4cf 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +[4d0 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +[4d1 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +[4d2 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +[4d3 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +[4d4 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[4d5 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +[4d6 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +[4d7 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +[4d8 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +[4d9 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +[4da 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +[4db 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[4dc 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +[4dd 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +[4de 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[4df 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[4e0 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +[4e1 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[4e2 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[4e3 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +[4e4 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- +[4e5 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +[4e6 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +[4e7 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[4e8 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[4e9 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[4ea 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[4eb 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[4ec 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are +[4ed 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +[4ee 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[4ef 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[4f0 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +[4f1 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- +[4f2 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[4f3 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[4f4 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[4f5 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[4f6 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +[4f7 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +[4f8 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[4f9 08-31 20:51:03.86 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[4fa 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[4fb 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- +[4fc 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +[4fd 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +[4fe 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +[4ff 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +[500 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +[501 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +[502 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +[503 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +[504 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +[505 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +[506 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org2MSP +[507 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +[508 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +[509 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +[50a 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +[50b 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +[50c 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[50d 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +[50e 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +[50f 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +[510 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +[511 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[512 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +[513 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +[514 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +[515 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +[516 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[517 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +[518 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +[519 08-31 20:51:03.87 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +[51a 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +[51b 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +[51c 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +[51d 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +[51e 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +[51f 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +[520 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +[521 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +[522 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +[523 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +[524 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +[525 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +[526 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[527 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[528 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +[529 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[52a 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[52b 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[52c 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[52d 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[52e 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[52f 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[530 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Endorsement +[531 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[532 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[533 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[534 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[535 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[536 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[537 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[538 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[539 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[53a 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +[53b 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +[53c 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +[53d 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +[53e 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +[53f 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +[540 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +[541 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +[542 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +[543 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +[544 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[545 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[546 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[547 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[548 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[549 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[54a 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +[54b 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +[54c 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +[54d 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +[54e 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[54f 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[550 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +[551 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +[552 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +[553 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +[554 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +[555 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +[556 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +[557 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +[558 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +[559 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +[55a 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [] +[55b 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +[55c 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[55d 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[55e 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[55f 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[560 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[561 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[562 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca210 gate 1598907063888309400 evaluation starts +[563 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca210 signed by 0 principal evaluation starts (used [false]) +[564 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca210 processing identity 0 with bytes of 115a4b0 +[565 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca210 principal matched by identity 0 +[566 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 2d 0f 93 fa 5a 38 ea 1e a6 97 9b 85 21 70 63 |.-...Z8......!pc| +00000010 6d cc 60 e1 07 c2 ed a8 09 44 22 22 bd 46 b1 10 |m.`......D"".F..| +[567 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b a9 f8 b1 8d 68 b8 c3 5a 96 2e d2 |0D. k....h..Z...| +00000010 4d 57 70 40 2f 28 0c 43 57 5f c2 00 c3 7d f0 87 |MWp@/(.CW_...}..| +00000020 a9 76 21 13 02 20 76 bd 5e 18 6f e2 bd 3d 0e e4 |.v!.. v.^.o..=..| +00000030 68 62 d6 ef 08 e3 5d 5c eb 6b c4 b5 f3 9d 3b 8c |hb....]\.k....;.| +00000040 d3 68 59 f1 33 fd |.hY.3.| +[568 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca210 principal evaluation succeeds for identity 0 +[569 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002ca210 gate 1598907063888309400 evaluation succeeds +[56a 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[56b 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[56c 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[56d 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[56e 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +[56f 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org2MSP for channel businesschannel to learn about +[570 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +[571 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer for channel businesschannel with same endpoint, skipping connecting to myself +[572 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +[573 08-31 20:51:03.88 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +[574 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +[575 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +[576 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +[577 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +[578 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +[579 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0031c0000 env 0xc000252000 txn 0 +[57a 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[57b 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [1] in 67ms +[57c 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[57d 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[57e 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +[57f 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [1] +[580 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[581 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[582 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[583 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [1] +[584 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[585 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +[586 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +[587 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +[588 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[589 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +[58a 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +[58b 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:2 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +[58c 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[58d 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +[58e 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Block [1] Transaction index [0] TxId [] marked as valid by state validator +[58f 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc0026d3240)} +[590 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[591 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[592 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[593 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [1] +[594 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] to storage +[595 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [1] to pvt block store +[596 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [1] +[597 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=1, blockHash=[]byte{0xe3, 0x22, 0xef, 0xdb, 0x1a, 0xb5, 0x8a, 0x4e, 0xca, 0x29, 0x72, 0xa1, 0x82, 0xd5, 0x73, 0xd2, 0x6c, 0x30, 0x29, 0x25, 0x12, 0x30, 0x2d, 0xc5, 0xc9, 0xfc, 0x53, 0x0, 0x88, 0x62, 0x25, 0xd} txOffsets= +txId=0ab5ac5f1d5a2551b49ec6c24c6da873616029271ac520b4a7140ef88dfe6b38 locPointer=offset=71, bytesLength=27136 +] +[598 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28547, bytesLength=27136] for tx ID: [0ab5ac5f1d5a2551b49ec6c24c6da873616029271ac520b4a7140ef88dfe6b38] to txid-index +[599 08-31 20:51:03.90 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=28547, bytesLength=27136] for tx number:[0] ID: [0ab5ac5f1d5a2551b49ec6c24c6da873616029271ac520b4a7140ef88dfe6b38] to blockNumTranNum index +[59a 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[56675], isChainEmpty=[false], lastBlockNumber=[1] +[59b 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [1] +[59c 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [1] +[59d 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to state database +[59e 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[59f 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[5a0 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[5a1 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[5a2 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +[5a3 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:05.917Z grpc.peer_address=172.18.0.8:53970 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=228.5µs +[5a4 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[5a5 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[5a6 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[5a7 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:53970 +[5a8 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:53970 +[5a9 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[5aa 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 3e eb d0 74 2b 10 a6 95 27 00 |0E.!..>..t+...'.| +00000010 5a 3a cc e6 6f 90 b2 6b b9 b1 84 ae 3b be 47 94 |Z:..o..k....;.G.| +00000020 7b 69 b5 cb c3 02 20 7e 8f 67 d2 6b 07 26 90 0d |{i.... ~.g.k.&..| +00000030 8e 8c 65 6c f4 07 94 23 53 77 73 82 9f aa f0 0d |..el...#Sws.....| +00000040 27 df a7 88 a6 7c bf |'....|.| +[5ab 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:53970 +[5ac 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:53970 +[5ad 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[5ae 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:53920 disconnected +[5af 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:53920 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=17.5665106s +[5b0 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:53970 disconnected +[5b3 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:51:13.921Z grpc.peer_address=172.18.0.8:53970 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=5.7853ms +[5b4 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b canceling read because closing +[5b2 08-31 20:51:03.91 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[5b5 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [2] +[5b7 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x2, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] +[5b1 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[5b6 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[5b8 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [2] +[5ba 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[5b9 08-31 20:51:03.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [1] transactions to history database +[5bb 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [1] with [1] transactions +[5bc 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +[5bd 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [1] +[5be 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [1] with 1 transaction(s) in 32ms (state_validation=1ms block_and_pvtdata_commit=8ms state_commit=16ms) commitHash=[47dc540c94ceb704a23875c11273e16bb0b8a87aed84de911f2133568115f254] +[5bf 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[5c0 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408A8CFEFBEF6AF9D9816...096D8DADEA4206176416CB532A020802 +[5c1 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 677563607E0DC87C82F66FCACAF6D692883AC6E34D584C41D4EC9C435A1CF9EF +[5c2 08-31 20:51:03.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [1] with 1 transaction(s) +[5c3 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [2] with 1 transaction(s) to the ledger +[5c4 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [2] from buffer +[5c5 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [2] +[5c6 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [2] +[5c7 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[5c8 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0026d3dc0 env 0xc0004c4d20 txn 0 +[5c9 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0004c4d20 +[5ca 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\267\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030>\316\004\035\247\263T!\025\236\244\230\014\355k\242EsT\003\377-\204\213" +[5cb 08-31 20:51:03.94 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +[5cc 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[5cd 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[5ce 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5cf 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE----- +[5d0 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +[5d1 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[5d2 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +[5d3 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[5d4 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 bb f3 d3 49 26 2e 3e 88 71 29 7d 0a 91 00 7f |....I&.>.q)}....| +00000010 c6 f2 a5 3e 3c 38 d2 3f 9b 58 9e bb c7 96 e4 4d |...><8.?.X.....M| +[5d5 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 8d d9 5c 84 4b 47 09 13 06 b6 |0E.!....\.KG....| +00000010 45 89 d8 00 01 66 d3 67 41 9b 6b b8 ac 4e 5e 22 |E....f.gA.k..N^"| +00000020 b8 13 f9 48 dd 02 20 05 54 f1 7c ff d1 ca b3 76 |...H.. .T.|....v| +00000030 87 15 bf 1a e7 b1 28 ba a1 6e 04 d2 71 8a 64 10 |......(..n..q.d.| +00000040 f4 9e 1e 26 55 d7 b6 |...&U..| +[5d6 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[5d7 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc002806a80, header channel_header:"\010\001\032\006\010\267\305\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030>\316\004\035\247\263T!\025\236\244\230\014\355k\242EsT\003\377-\204\213" +[5d8 08-31 20:51:03.95 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[5d9 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[5da 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[5db 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[5dc 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[5dd 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[5de 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[5df 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[5e0 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[5e1 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[5e2 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[5e3 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[5e4 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +[5e5 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[5e6 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[5e7 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[5e8 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org2MSP/AnchorPeers +[5e9 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org2MSP +[5ea 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Org2MSP with mod_policy Admins +[5eb 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[5ec 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[5ed 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[5ee 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[5ef 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[5f0 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[5f1 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [Org2MSP] +[5f2 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[5f3 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[5f4 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application/Org2MSP looking up path [] +[5f5 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +[5f6 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[5f7 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +-----END CERTIFICATE----- +[5f8 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9500 gate 1598907063967326300 evaluation starts +[5f9 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9500 signed by 0 principal evaluation starts (used [false]) +[5fa 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9500 processing identity 0 with bytes of 115a4b0 +[5fb 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +[5fc 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +[5fd 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[5fe 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[5ff 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +[600 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[601 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9500 principal matched by identity 0 +[602 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 16 3d f8 a1 bf ae 7d e4 fb dc 40 c7 07 6d de 8d |.=....}...@..m..| +00000010 fb 6b e1 2c 0c 1e 66 98 ba 3d 47 90 dc a4 d0 63 |.k.,..f..=G....c| +[603 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 27 f4 6f dd 5b 2d 12 b9 82 60 1a |0D. u'.o.[-...`.| +00000010 88 90 67 88 50 b6 97 37 e6 93 6d 8e 20 ca 9f 40 |..g.P..7..m. ..@| +00000020 df d1 ae 7e 02 20 2b 77 8a 7e aa 5c bd fa f5 76 |...~. +w.~.\...v| +00000030 6b bd 3d 49 6e 73 1a 12 7f 30 6c 34 57 c0 06 c4 |k.=Ins...0l4W...| +00000040 56 0c 2b fa b4 c4 |V.+...| +[604 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9500 principal evaluation succeeds for identity 0 +[605 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9500 gate 1598907063967326300 evaluation succeeds +[606 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +[607 08-31 20:51:03.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +[608 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[609 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[60a 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[60b 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[60c 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[60d 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[60e 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +[60f 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[610 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[611 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[612 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +[613 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +[614 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +[615 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +[616 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[617 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[618 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[619 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to policy: mod_policy:"Admins" +[61a 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[61b 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[61c 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[61d 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +[61e 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +[61f 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +[620 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +[621 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +[622 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[623 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +[624 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +[625 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +[626 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +[627 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +[628 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +[629 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[62a 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +[62b 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +[62c 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[62d 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[62e 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +[62f 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[630 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[631 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +[632 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- +[633 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +[634 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +[635 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[636 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[637 08-31 20:51:03.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[638 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[639 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[63a 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +[63b 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +[63c 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[63d 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[63e 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +[63f 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- +[640 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[641 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[642 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[643 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[644 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +[645 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +[646 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[647 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[648 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[649 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- +[64a 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (3 msps) +[64b 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 3 msps +[64c 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +[64d 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +[64e 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +[64f 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +[650 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +[651 08-31 20:51:03.98 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +[652 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +[653 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +[654 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +[655 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +[656 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +[657 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +[658 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +[659 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +[65a 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[65b 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +[65c 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +[65d 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[65e 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +[65f 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +[660 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +[661 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +[662 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +[663 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +[664 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +[665 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[666 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +[667 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +[668 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +[669 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +[66a 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +[66b 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +[66c 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +[66d 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +[66e 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +[66f 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +[670 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +[671 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +[672 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +[673 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +[674 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +[675 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[676 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[677 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +[678 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[679 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[67a 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[67b 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[67c 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[67d 08-31 20:51:03.99 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[67e 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +[67f 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[680 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[681 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[682 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[683 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[684 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[685 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[686 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[687 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[688 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[689 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +[68a 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +[68b 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +[68c 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +[68d 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +[68e 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +[68f 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +[690 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +[691 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +[692 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +[693 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[694 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[695 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[696 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[697 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[698 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[699 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +[69a 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +[69b 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +[69c 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +[69d 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[69e 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[69f 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +[6a0 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +[6a1 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +[6a2 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +[6a3 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +[6a4 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +[6a5 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +[6a6 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +[6a7 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +[6a8 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +[6a9 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +[6aa 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +[6ab 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[6ac 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[6ad 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[6ae 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[6af 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[6b0 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[6b1 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[6b2 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +-----END CERTIFICATE----- +[6b3 08-31 20:51:04.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ed90 gate 1598907064009977200 evaluation starts +[6b4 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ed90 signed by 0 principal evaluation starts (used [false]) +[6b5 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ed90 processing identity 0 with bytes of 115a4b0 +[6b6 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ed90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[6b7 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ed90 principal evaluation fails +[6b8 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265ed90 gate 1598907064009977200 evaluation fails +[6b9 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[6ba 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[6bb 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[6bc 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026cad50 gate 1598907064011561000 evaluation starts +[6bd 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026cad50 signed by 0 principal evaluation starts (used [false]) +[6be 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026cad50 processing identity 0 with bytes of 115a4b0 +[6bf 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[6c0 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[6c1 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[6c2 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026cad50 principal matched by identity 0 +[6c3 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bf 2d 0f 93 fa 5a 38 ea 1e a6 97 9b 85 21 70 63 |.-...Z8......!pc| +00000010 6d cc 60 e1 07 c2 ed a8 09 44 22 22 bd 46 b1 10 |m.`......D"".F..| +[6c4 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b a9 f8 b1 8d 68 b8 c3 5a 96 2e d2 |0D. k....h..Z...| +00000010 4d 57 70 40 2f 28 0c 43 57 5f c2 00 c3 7d f0 87 |MWp@/(.CW_...}..| +00000020 a9 76 21 13 02 20 76 bd 5e 18 6f e2 bd 3d 0e e4 |.v!.. v.^.o..=..| +00000030 68 62 d6 ef 08 e3 5d 5c eb 6b c4 b5 f3 9d 3b 8c |hb....]\.k....;.| +00000040 d3 68 59 f1 33 fd |.hY.3.| +[6c5 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026cad50 principal evaluation succeeds for identity 0 +[6c6 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026cad50 gate 1598907064011561000 evaluation succeeds +[6c7 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[6c8 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[6c9 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[6ca 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[6cb 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 2 organizations +[6cc 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +[6cd 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +[6ce 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[6cf 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[6d0 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[6d1 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[6d2 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[6d3 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002783410, CONNECTING +[6d4 08-31 20:51:04.01 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +[6d6 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer for channel businesschannel with same endpoint, skipping connecting to myself +[6d5 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002783410, READY +[6d7 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +[6d8 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +[6d9 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[6da 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[6db 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[6dc 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:7051 +[6dd 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:7051 +[6de 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[6df 08-31 20:51:04.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[6e0 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +-----END CERTIFICATE----- +[6e1 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[6e2 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[6e3 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[6e4 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[6e5 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[6e6 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[6e7 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[6e8 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[6e9 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[6ea 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[6eb 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[6ec 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[6ed 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[6ee 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e530 gate 1598907064034128300 evaluation starts +[6ef 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e530 signed by 0 principal evaluation starts (used [false]) +[6f0 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e530 processing identity 0 with bytes of 115a4b0 +[6f1 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[6f2 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[6f3 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[6f4 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e530 principal matched by identity 0 +[6f5 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[6f6 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c e1 48 1b a9 bc f5 4d 2f 45 ed 0d |0D. L.H....M/E..| +00000010 b7 2e 15 c3 f9 10 6b 7b 5c e9 06 76 60 80 68 28 |......k{\..v`.h(| +00000020 46 da 77 59 02 20 55 42 62 69 81 fe 3b 56 b9 14 |F.wY. UBbi..;V..| +00000030 7f cc 49 69 60 29 0a e8 fc 25 a4 65 39 a9 5f cc |..Ii`)...%.e9._.| +00000040 c7 40 3d 66 5c 29 |.@=f\)| +[6f7 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e530 principal evaluation succeeds for identity 0 +[6f8 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e530 gate 1598907064034128300 evaluation succeeds +[6f9 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[6fa 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[6fb 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[6fc 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[6fd 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +[6fe 08-31 20:51:04.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[6ff 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[700 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161011 +[701 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 82EE7B72F478CE93CDCB23149144A8B1CAD1C3091F1DCB186D90BCF0B618ED0A +[702 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[703 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[704 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[705 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[706 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[707 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:9492522150986590262 tag:EMPTY mem_req:?\0008\034\252\023\307" > > , Envelope: 176 bytes, Signature: 0 bytes to 1 peers +[708 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:9492522150986590262 tag:EMPTY mem_req:?\0008\034\252\023\307" > > , Envelope: 176 bytes, Signature: 0 bytes +[709 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[70a 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[70b 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[70c 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[70d 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[70e 08-31 20:51:04.04 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002ac5050, CONNECTING +[70f 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +[710 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +[711 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +[712 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +[713 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +[714 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0026d3dc0 env 0xc0004c4d20 txn 0 +[715 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[716 08-31 20:51:04.05 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [2] in 113ms +[717 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[718 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[719 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +[71a 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [2] +[71b 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[71c 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[71d 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[71e 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [2] +[71f 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[720 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +[721 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +[722 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +[723 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[724 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +[725 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +[726 08-31 20:51:04.06 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc002ac5050, READY +[727 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[728 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[729 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[72a 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:7051 +[72b 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:3 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +[72c 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[72d 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +[72e 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Block [2] Transaction index [0] TxId [] marked as valid by state validator +[72f 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc003289200)} +[730 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[731 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[732 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[733 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [2] +[734 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] to storage +[735 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [2] to pvt block store +[736 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:7051 +[737 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[738 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[739 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +-----END CERTIFICATE----- +[73a 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [2] +[73b 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[73c 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[73d 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=2, blockHash=[]byte{0x22, 0x1, 0xdc, 0x78, 0x27, 0xf2, 0x2d, 0xc3, 0x61, 0xf7, 0x88, 0xbc, 0x3b, 0x31, 0x2f, 0x16, 0xf3, 0xa9, 0x7a, 0x3d, 0x6c, 0xaa, 0xbe, 0x10, 0x69, 0xd3, 0x9f, 0xc0, 0xb5, 0xb6, 0x7a, 0xbf} txOffsets= +txId=ed7b76e084105979adee38a130a3cf311c0f2d9b0dc1c2dda158f0d55a15426c locPointer=offset=71, bytesLength=27141 +] +[73e 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56746, bytesLength=27141] for tx ID: [ed7b76e084105979adee38a130a3cf311c0f2d9b0dc1c2dda158f0d55a15426c] to txid-index +[73f 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=56746, bytesLength=27141] for tx number:[0] ID: [ed7b76e084105979adee38a130a3cf311c0f2d9b0dc1c2dda158f0d55a15426c] to blockNumTranNum index +[740 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[741 08-31 20:51:04.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[742 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[744 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[743 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[84880], isChainEmpty=[false], lastBlockNumber=[2] +[745 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [2] +[746 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[747 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[748 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[749 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[74a 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[74b 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[74c 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c11ca0 gate 1598907064082520500 evaluation starts +[74d 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c11ca0 signed by 0 principal evaluation starts (used [false]) +[74e 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c11ca0 processing identity 0 with bytes of 115a4b0 +[74f 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[750 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[751 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[752 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c11ca0 principal matched by identity 0 +[753 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[754 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 bd f4 34 65 48 b1 57 9c 57 79 4f |0D. ...4eH.W.WyO| +00000010 80 8f de 67 5a 2c 84 34 d1 d4 65 55 02 ed ac 4d |...gZ,.4..eU...M| +00000020 55 7e fd e6 02 20 66 bc 46 6b 20 e6 ed 31 e2 82 |U~... f.Fk ..1..| +00000030 94 cc 36 ed 20 c5 8d df e1 b0 e8 2e f0 d1 12 18 |..6. ...........| +00000040 77 08 5c 6b 25 4e |w.\k%N| +[755 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c11ca0 principal evaluation succeeds for identity 0 +[756 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c11ca0 gate 1598907064082520500 evaluation succeeds +[757 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[758 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[759 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[75a 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[75b 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +[75c 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[75d 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[75e 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[75f 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [2] +[760 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to state database +[761 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[762 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[763 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[764 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[765 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +[766 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[767 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [3] +[768 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x3, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] +[769 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [3] +[76a 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[76b 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [2] transactions to history database +[76c 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [2] with [1] transactions +[76d 08-31 20:51:04.08 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +[76e 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [2] +[76f 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [2] with 1 transaction(s) in 29ms (state_validation=11ms block_and_pvtdata_commit=14ms state_commit=2ms) commitHash=[5f88b61407b149a48413433f4670c46531e5c4a8febdc339a9536ff8716a559e] +[770 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[771 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A5E121408A8CFEFBEF6AF9D9816...096D8DADEA4206176416CB532A020803 +[772 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B4FD8B149153DB333D1D7784771D0CD6F00C52DA6F22A150F68573D08B489EE2 +[773 08-31 20:51:04.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [2] with 1 transaction(s) +[774 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 9492522150986590262, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +[775 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 9492522150986590262, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +[776 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[777 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 9492522150986590262, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 336 bytes, Signature: 0 bytes +[778 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[779 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 ee 7b 72 f4 78 ce 93 cd cb 23 14 91 44 a8 b1 |..{r.x....#..D..| +00000010 ca d1 c3 09 1f 1d cb 18 6d 90 bc f0 b6 18 ed 0a |........m.......| +[77a 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 54 00 e9 d9 95 16 75 e4 02 b0 83 |0D. .T.....u....| +00000010 95 cf 52 86 07 f2 ae 92 7c d6 3a c9 15 3c 1b 5e |..R.....|.:..<.^| +00000020 37 7a 5d 53 02 20 6f 65 cb 88 cc ec dc 94 ea c7 |7z]S. oe........| +00000030 f5 09 51 14 98 c3 6c 80 57 78 c8 6a 12 ce 3e 3f |..Q...l.Wx.j..>?| +00000040 00 38 1c aa 13 c7 |.8....| +[77b 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[77c 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[77d 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[77e 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[77f 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[780 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[781 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[782 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[783 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[784 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[785 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[786 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e200 gate 1598907064105917900 evaluation starts +[787 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e200 signed by 0 principal evaluation starts (used [false]) +[788 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e200 processing identity 0 with bytes of 115a4b0 +[789 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e200 principal matched by identity 0 +[78a 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 50 2e e4 89 b9 81 19 76 dd 41 80 da 2a 67 84 fd |P......v.A..*g..| +00000010 7e c3 3c 00 ef f3 d8 ed 6d 02 28 46 35 82 fd 01 |~.<.....m.(F5...| +[78b 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1b fb ec 1e 5e bd 7f 28 24 c1 31 1b |0D. ....^..($.1.| +00000010 b0 dc 4e 24 33 24 b0 45 76 af c2 2c 01 63 b7 54 |..N$3$.Ev..,.c.T| +00000020 5a 5f 5f 8e 02 20 2f c2 21 e4 eb 53 8d 07 f4 56 |Z__.. /.!..S...V| +00000030 fd 6e 90 22 e6 3d c9 ad ac 93 63 33 33 f1 20 2e |.n.".=....c33. .| +00000040 f5 29 06 76 35 7b |.).v5{| +[78c 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e200 principal evaluation succeeds for identity 0 +[78d 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002c9e200 gate 1598907064105917900 evaluation succeeds +[78e 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[78f 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[790 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[791 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[792 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[793 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +[794 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[795 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[796 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[797 08-31 20:51:04.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[798 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.129Z grpc.peer_address=172.18.0.8:53978 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=287.6µs +[799 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[79a 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[79b 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[79c 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.8:53978 +[79d 08-31 20:51:04.13 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:53978 +[79e 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[79f 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f 67 f9 18 63 8d 80 a1 02 b9 33 0f |0D. og..c.....3.| +00000010 a3 13 05 68 75 76 8d 31 7e 7d e9 36 0a f6 4a 7b |...huv.1~}.6..J{| +00000020 e2 08 39 48 02 20 2c 2b 6b 47 60 aa 09 fe 05 58 |..9H. ,+kG`....X| +00000030 d0 44 2e fb 0d 51 af 88 14 63 d8 05 8d 22 37 6a |.D...Q...c..."7j| +00000040 f3 db a4 4c 1c 1e |...L..| +[7a0 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:53978 +[7a1 08-31 20:51:04.14 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:53978 +[7a2 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[7a3 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[7a4 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:53978 disconnected +[7a5 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:51:14.133Z grpc.peer_address=172.18.0.8:53978 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=20.0098ms +[7a6 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[7a7 08-31 20:51:04.15 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[7a8 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.321Z grpc.peer_address=172.18.0.6:54886 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=108.8µs +[7a9 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[7aa 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[7ab 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[7ac 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:54886 +[7ad 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:54886 +[7ae 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7af 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7b0 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7b1 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7b2 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7b3 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7b4 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[7b5 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[7b6 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[7b7 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[7b8 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[7b9 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d3910 gate 1598907064325986700 evaluation starts +[7ba 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d3910 signed by 0 principal evaluation starts (used [false]) +[7bb 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d3910 processing identity 0 with bytes of 115a4b0 +[7bc 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d3910 principal matched by identity 0 +[7bd 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[7be 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 f7 64 51 44 99 fd 8f c6 0d 6d |0E.!...dQD.....m| +00000010 fb 97 4b ad c0 a5 31 1c dc 9b bd f7 0c 24 88 13 |..K...1......$..| +00000020 e5 6a 12 e6 9c 02 20 46 50 79 d2 2f 70 d8 a6 53 |.j.... FPy./p..S| +00000030 c8 ff 35 2e ff 4f 5c bb a1 ed 82 30 38 23 d5 0c |..5..O\....08#..| +00000040 96 df 28 50 40 29 c1 |..(P@).| +[7bf 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d3910 principal evaluation succeeds for identity 0 +[7c0 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d3910 gate 1598907064325986700 evaluation succeeds +[7c1 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[7c2 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[7c3 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[7c4 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[7c5 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:54886 +[7c6 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:54886 +[7c7 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[7c8 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[7c9 08-31 20:51:04.32 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 canceling read because closing +[7ca 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[7cb 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[7cc 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:54886 disconnected +[7cd 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:51:14.324Z grpc.peer_address=172.18.0.6:54886 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=21.7663ms +[7ce 08-31 20:51:04.34 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[7cf 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.362Z grpc.peer_address=172.18.0.6:54888 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=319.1µs +[7d0 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[7d1 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[7d2 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[7d3 08-31 20:51:04.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:54888 +[7d4 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:54888 +[7d5 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7d6 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7d7 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7d8 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7d9 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7da 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7db 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[7dc 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[7dd 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[7de 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[7df 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[7e0 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198960 gate 1598907064383216200 evaluation starts +[7e1 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198960 signed by 0 principal evaluation starts (used [false]) +[7e2 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198960 processing identity 0 with bytes of 115a4b0 +[7e3 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198960 principal matched by identity 0 +[7e4 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[7e5 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 28 55 32 7a 05 ca 84 c3 07 5e c6 b4 |0D. (U2z.....^..| +00000010 5c dd 41 ee 45 c3 03 83 b2 04 6a 6a ad 8b 01 f2 |\.A.E.....jj....| +00000020 3a 92 bf c3 02 20 6e 08 f3 aa 47 ce 22 c9 72 ea |:.... n...G.".r.| +00000030 5d 3c d8 9a e6 57 b0 68 52 1c c5 d4 a7 77 ae 4d |]<...W.hR....w.M| +00000040 07 fe 22 d3 5e 02 |..".^.| +[7e6 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198960 principal evaluation succeeds for identity 0 +[7e7 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198960 gate 1598907064383216200 evaluation succeeds +[7e8 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[7e9 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[7ea 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[7eb 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[7ec 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:54888 +[7ed 08-31 20:51:04.38 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:54888 +[7ee 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:54888 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: nonce:7651936313432245060 tag:EMPTY mem_req:\310\027~\352\216\253>" > > , Envelope: 176 bytes, Signature: 0 bytes +[7ef 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[7f0 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:7651936313432245060 tag:EMPTY mem_req:\310\027~\352\216\253>" > > , Envelope: 176 bytes, Signature: 0 bytes +[7f1 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[7f2 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[7f3 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[7f4 08-31 20:51:04.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[7f5 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[7f6 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[7f7 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[7f8 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[7f9 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003199410 gate 1598907064401738000 evaluation starts +[7fa 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003199410 signed by 0 principal evaluation starts (used [false]) +[7fb 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003199410 processing identity 0 with bytes of 115a4b0 +[7fc 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003199410 principal matched by identity 0 +[7fd 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f 43 86 1c 03 e4 99 e3 91 b6 a7 ae a6 7f 53 45 |.C............SE| +00000010 a7 5e d1 90 cb bc ec 0f f6 8d 46 10 94 85 64 4c |.^........F...dL| +[7fe 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c6 03 5a 2c 42 53 7a d0 e2 6e 62 |0E.!...Z,BSz..nb| +00000010 e4 8d 68 0c fe 4d 10 37 e3 bf 91 53 cd 9f 2d af |..h..M.7...S..-.| +00000020 e7 2a 98 74 8c 02 20 7a 87 10 12 60 42 fa 6a 82 |.*.t.. z...`B.j.| +00000030 d7 62 c2 40 47 21 b2 80 a2 37 92 42 52 1c 9b 3e |.b.@G!...7.BR..>| +00000040 c8 17 7e ea 8e ab 3e |..~...>| +[7ff 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003199410 principal evaluation succeeds for identity 0 +[800 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003199410 gate 1598907064401738000 evaluation succeeds +[801 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[802 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[803 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[804 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[805 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[806 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[807 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[808 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[809 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[80a 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[80b 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[80c 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[80d 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[80e 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[80f 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[810 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 7651936313432245060, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes to 1 peers +[811 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 7651936313432245060, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 497 bytes, Signature: 0 bytes +[812 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[813 08-31 20:51:04.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\310\027~\352\216\253>" > alive: +[814 08-31 20:51:04.45 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.453Z grpc.peer_address=172.18.0.6:54890 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=201.7µs +[815 08-31 20:51:04.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[816 08-31 20:51:04.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[817 08-31 20:51:04.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[818 08-31 20:51:04.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:54890 +[819 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:54890 +[81a 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[81b 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[81c 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[81d 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[81e 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[81f 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[820 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[821 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[822 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[823 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[824 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[825 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003226630 gate 1598907064464371200 evaluation starts +[826 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003226630 signed by 0 principal evaluation starts (used [false]) +[827 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003226630 processing identity 0 with bytes of 115a4b0 +[828 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003226630 principal matched by identity 0 +[829 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[82a 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 48 08 d2 fa 5a c6 ec ea 43 87 82 |0D. HH...Z...C..| +00000010 ef 17 9b 39 81 a6 23 d5 3a 92 a3 86 3a e8 7d 64 |...9..#.:...:.}d| +00000020 e6 7b e2 b6 02 20 53 59 c4 58 d9 6f b1 35 41 23 |.{... SY.X.o.5A#| +00000030 ed 69 28 ad c4 04 6f 12 2a ca 35 44 11 07 7f f2 |.i(...o.*.5D....| +00000040 a3 8f 53 6f 7f 47 |..So.G| +[82b 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003226630 principal evaluation succeeds for identity 0 +[82c 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003226630 gate 1598907064464371200 evaluation succeeds +[82d 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[82e 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[82f 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[830 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[831 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[832 08-31 20:51:04.46 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:54890 +[833 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:54890 +[835 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:54888 disconnected +[836 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.6:54888 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=105.9213ms +[837 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[838 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:54890 disconnected +[839 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:51:14.457Z grpc.peer_address=172.18.0.6:54890 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=15.2633ms +[834 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[83a 08-31 20:51:04.47 UTC] [%{longpkg}] %{callpath} -> DEBU a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 canceling read because closing +[83b 08-31 20:51:04.57 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.573Z grpc.peer_address=172.18.0.5:39432 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=251.4µs +[83c 08-31 20:51:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[83d 08-31 20:51:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[83e 08-31 20:51:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[83f 08-31 20:51:04.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:39432 +[840 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.5:39432 +[841 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[842 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[843 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +-----END CERTIFICATE----- +[844 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[845 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[846 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[847 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[848 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[849 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[84a 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[84b 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[84c 08-31 20:51:04.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[84d 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[84e 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[84f 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[850 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[851 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 gate 1598907064591937500 evaluation starts +[852 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 signed by 0 principal evaluation starts (used [false]) +[853 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 processing identity 0 with bytes of 115a4b0 +[854 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[855 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[856 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[857 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 principal matched by identity 0 +[858 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[859 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4f 0d 5a 0c 3e 23 5e d7 8d 78 ee 08 |0D. O.Z.>#^..x..| +00000010 0a 56 93 cf 71 19 e3 c7 60 68 11 26 0e 21 16 72 |.V..q...`h.&.!.r| +00000020 d5 ef 2f 40 02 20 09 56 d8 5c 42 ca b8 38 ab 80 |../@. .V.\B..8..| +00000030 45 3e b8 b6 00 56 9a 2e 58 b9 05 de 74 97 ba ca |E>...V..X...t...| +00000040 51 e6 f0 29 92 43 |Q..).C| +[85a 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 principal evaluation succeeds for identity 0 +[85b 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 gate 1598907064591937500 evaluation succeeds +[85c 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[85d 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[85e 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[85f 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[860 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:39432 +[861 08-31 20:51:04.59 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:39432 +[862 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[863 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:39432 disconnected +[864 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:51:14.578Z grpc.peer_address=172.18.0.5:39432 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=35.5216ms +[865 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[866 08-31 20:51:04.61 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[867 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.636Z grpc.peer_address=172.18.0.5:39434 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=92.1µs +[868 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[869 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[86a 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[86b 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.5:39434 +[86c 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.5:39434 +[86d 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[86e 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[86f 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[870 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[871 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[872 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[873 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[874 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[875 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[876 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[877 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[878 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1140 gate 1598907064638442800 evaluation starts +[879 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1140 signed by 0 principal evaluation starts (used [false]) +[87a 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1140 processing identity 0 with bytes of 115a4b0 +[87b 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1140 principal matched by identity 0 +[87c 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[87d 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 bd c8 ac 44 98 69 a3 a2 f8 1e 0c |0D. 5...D.i.....| +00000010 bb a5 9b e7 9c 75 5d 0e 53 29 b7 10 35 67 b0 ac |.....u].S)..5g..| +00000020 89 b6 30 b0 02 20 08 ca a3 10 f9 01 ae 49 8f 6c |..0.. .......I.l| +00000030 1e 68 f4 06 77 26 e6 11 61 d2 ef 67 4d e4 8c 1d |.h..w&..a..gM...| +00000040 2f d5 e3 e9 a6 13 |/.....| +[87e 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1140 principal evaluation succeeds for identity 0 +[87f 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1140 gate 1598907064638442800 evaluation succeeds +[880 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[881 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[882 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[883 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[884 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:39434 +[885 08-31 20:51:04.63 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:39434 +[886 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:39434 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:11251703883015026869 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +[887 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[888 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:11251703883015026869 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +[889 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[88a 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[88b 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[88c 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[88d 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[88e 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[88f 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[890 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[891 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1bb0 gate 1598907064651929900 evaluation starts +[892 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1bb0 signed by 0 principal evaluation starts (used [false]) +[893 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1bb0 processing identity 0 with bytes of 115a4b0 +[894 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1bb0 principal matched by identity 0 +[895 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 70 e2 2e 5c 34 59 f3 22 a7 70 f5 fc ce f7 ec |.p..\4Y.".p.....| +00000010 bc d6 a3 b9 a4 9d 04 36 d3 30 ae d8 8d 5c a9 58 |.......6.0...\.X| +[896 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 b6 42 78 d4 f5 83 c2 21 50 a5 44 |0D. A.Bx....!P.D| +00000010 49 b8 79 18 95 42 81 66 1f fe 0b 82 89 13 7e 1f |I.y..B.f......~.| +00000020 89 91 19 7b 02 20 37 6a 3a c9 d8 d4 8d f4 8a fc |...{. 7j:.......| +00000030 4b 67 7c 16 b0 d7 7c 55 75 f9 35 77 64 47 a9 ea |Kg|...|Uu.5wdG..| +00000040 b5 96 22 af d8 89 |.."...| +[897 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1bb0 principal evaluation succeeds for identity 0 +[898 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1bb0 gate 1598907064651929900 evaluation succeeds +[899 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[89a 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[89b 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[89c 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[89d 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[89e 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]}, deadMembers={[]} +[89f 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Learned about a new alive member: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[8a0 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8a1 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8a2 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8a3 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[8a4 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8a5 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8a6 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8a7 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 11251703883015026869, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers +[8a8 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\310\027~\352\216\253>" > alive: alive: +[8a9 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 11251703883015026869, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +[8aa 08-31 20:51:04.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8ab 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:06.672Z grpc.peer_address=172.18.0.5:39436 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=129.5µs +[8ac 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[8ad 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[8ae 08-31 20:51:04.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[8af 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:39436 +[8b0 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.5:39436 +[8b1 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8b2 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[8b3 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8b4 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[8b5 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8b6 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[8b7 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[8b8 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[8b9 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[8ba 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[8bb 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[8bc 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033029e0 gate 1598907064686009600 evaluation starts +[8bd 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033029e0 signed by 0 principal evaluation starts (used [false]) +[8be 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033029e0 processing identity 0 with bytes of 115a4b0 +[8bf 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033029e0 principal matched by identity 0 +[8c0 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[8c1 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 98 97 dd 03 93 8d d2 0d cc 7c |0E.!...........|| +00000010 90 df c3 e3 f1 19 c0 1a 1b 14 9d 68 76 81 99 9b |...........hv...| +00000020 68 c9 18 3b 95 02 20 61 5e c2 36 b5 bc 0d 6f 5f |h..;.. a^.6...o_| +00000030 5b 4c 75 0b 52 8d 42 93 1d 46 a1 da f1 a4 7b f4 |[Lu.R.B..F....{.| +00000040 4e 6d 94 6d 15 cd 01 |Nm.m...| +[8c2 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033029e0 principal evaluation succeeds for identity 0 +[8c3 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033029e0 gate 1598907064686009600 evaluation succeeds +[8c4 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[8c5 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[8c6 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[8c7 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[8c8 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:39436 +[8c9 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:39436 +[8ca 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[8cb 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:39434 disconnected +[8cc 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[8ce 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:39436 disconnected +[8cf 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:51:14.675Z grpc.peer_address=172.18.0.5:39436 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=12.7899ms +[8d0 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +[8cd 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:39434 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=51.7646ms +[8d1 08-31 20:51:04.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +[8d2 08-31 20:51:04.70 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[8d3 08-31 20:51:04.71 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[8d4 08-31 20:51:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[8d5 08-31 20:51:05.31 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:51:07.317Z grpc.peer_address=172.18.0.8:54002 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=135.5µs +[8d6 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[8d7 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[8d8 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[8d9 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:54002 +[8da 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:54002 +[8db 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[8dc 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 35 b3 76 95 fe 4a fe 06 c0 ff |0E.!..5.v..J....| +00000010 a8 ce a2 ad 54 f4 b9 d7 8e 3f d9 2a 3b 63 20 50 |....T....?.*;c P| +00000020 7a 6a a8 d9 b7 02 20 52 1a ad a7 f0 ab b8 8c fd |zj.... R........| +00000030 52 a1 b2 a8 19 79 6e 62 15 04 87 e9 7e d2 db e9 |R....ynb....~...| +00000040 94 f6 ac 77 5c 7e f4 |...w\~.| +[8dd 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:54002 +[8de 08-31 20:51:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:54002 +[8df 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[8e0 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[8e1 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[8e2 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8e3 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[8e4 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8e5 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[8e6 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[8e7 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[8e8 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 a1 6e 8e 0a 84 2f 6e 0b 58 2e 74 48 a3 1d a5 |..n.../n.X.tH...| +00000010 c9 42 d4 63 e9 67 22 a5 66 e9 2f cf e9 bd fb e6 |.B.c.g".f./.....| +[8e9 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e e3 2c 3b ae 3d 43 bb 64 bb 66 cb |0D. ..,;.=C.d.f.| +00000010 3d 4c 23 e1 e0 3c 37 ee 10 9b 88 eb e7 d3 0a e0 |=L#..<7.........| +00000020 30 99 40 64 02 20 26 89 16 12 13 cf 5f bc f4 b3 |0.@d. &....._...| +00000030 dd 90 3b 09 8c 38 a2 16 ad 94 f3 ef 32 3f be e4 |..;..8......2?..| +00000040 96 81 f6 d1 25 38 |....%8| +[8ea 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[8eb 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 7d 22 b0 05 20 c2 9a 61 22 34 90 |0D. U}".. ..a"4.| +00000010 3b 00 f2 55 41 27 cf a3 4f b3 68 07 24 7d ce d6 |;..UA'..O.h.$}..| +00000020 32 1f 00 ed 02 20 57 b4 96 70 3b b4 71 03 8a 98 |2.... W..p;.q...| +00000030 2d e3 85 ed ad 53 23 87 1a 20 6d fb eb cf fd a3 |-....S#.. m.....| +00000040 3f ac 55 0d 6a 77 |?.U.jw| +[8ec 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[8ed 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[8ee 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[8ef 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[8f0 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[8f1 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8f2 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8f3 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8f5 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[8f6 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8f4 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[8f7 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8f8 08-31 20:51:05.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[8f9 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes to 1 peers +[8fa 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[8fb 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\017I\2254Dn" > > +[8fc 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 536 bytes, Signature: 0 bytes +[8fd 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[8fe 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f7 67 2b 54 7c 62 9e 9a 8d 1a 61 9c 2e f9 93 78 |.g+T|b....a....x| +00000010 fb ca be 63 be 09 ee 03 34 85 3c f9 44 63 66 7a |...c....4.<.Dcfz| +[8ff 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d 48 0d 46 1d 66 43 70 4f 7f 88 87 |0D. }H.F.fCpO...| +00000010 a3 ad ba 14 26 70 7e 1c bc 43 a7 84 35 24 a3 01 |....&p~..C..5$..| +00000020 3e 0a ef b0 02 20 53 bc 1f 56 ea 4b 37 33 70 61 |>.... S..V.K73pa| +00000030 72 d5 0d 3f 4e af 85 36 5c e2 85 78 32 8d a3 9b |r..?N..6\..x2...| +00000040 3e f0 4e 3e e8 d7 |>.N>..| +[900 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[901 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" lastAliveTS: 1598907045315872200, 23 but got ts: inc_num:1598907045315872200 seq_num:22 +[902 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[903 08-31 20:51:05.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[904 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[905 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[906 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[907 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[908 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[909 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[90a 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[90b 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[90c 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[90d 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer0.org2.example.com:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[90e 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[90f 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[910 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +[911 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[912 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003279e30, CONNECTING +[913 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[914 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[915 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[916 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[917 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003359870, CONNECTING +[918 08-31 20:51:05.35 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003279e30, READY +[919 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[91a 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[91b 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[91c 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:7051 +[91d 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc003359870, READY +[91e 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[91f 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[920 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[921 08-31 20:51:05.36 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:7051 +[922 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:7051 +[923 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[924 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[925 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.5:7051 +[926 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[928 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[927 08-31 20:51:05.37 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[929 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[92b 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[92c 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[92a 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[92d 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[92e 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[92f 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[930 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[931 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[932 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[933 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cdb10 gate 1598907065387983700 evaluation starts +[934 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cdb10 signed by 0 principal evaluation starts (used [false]) +[935 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cdb10 processing identity 0 with bytes of 115a4b0 +[936 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cdb10 principal matched by identity 0 +[937 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[938 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac cb e3 d5 99 a9 b4 75 8d 8e 73 |0E.!........u..s| +00000010 22 fa 4c 16 8e 5d b8 85 57 32 e9 f1 43 0e d2 3b |".L..]..W2..C..;| +00000020 42 f4 16 78 a0 02 20 6e 62 e0 ec 4a d3 5d 4e a5 |B..x.. nb..J.]N.| +00000030 9a 94 24 e2 22 23 ed 52 0f 53 3a 9a f2 53 81 9a |..$."#.R.S:..S..| +00000040 f1 20 63 4a 2a dd db |. cJ*..| +[939 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cdb10 principal evaluation succeeds for identity 0 +[93a 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033cdb10 gate 1598907065387983700 evaluation succeeds +[93b 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[93c 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[93d 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[93e 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[93f 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +[940 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[941 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[942 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[943 08-31 20:51:05.38 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[944 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[945 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[946 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[947 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[948 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[949 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[94a 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0f30 gate 1598907065397216100 evaluation starts +[94b 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0f30 signed by 0 principal evaluation starts (used [false]) +[94c 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0f30 processing identity 0 with bytes of 115a4b0 +[94d 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0f30 principal matched by identity 0 +[94e 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[94f 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 9e 3b cd c8 92 b0 5b 57 d9 94 |0E.!...;....[W..| +00000010 e5 91 8e a1 3c 60 81 70 b5 c4 b3 ce 3f cb 8b 1e |....<`.p....?...| +00000020 91 90 c6 6d 29 02 20 7a 9b dc 43 35 43 02 71 d8 |...m). z..C5C.q.| +00000030 9b e1 8a 4e 8f 42 bb 03 7d b5 88 6f 97 0e fd 82 |...N.B..}..o....| +00000040 7c 8f 4b 3a 83 00 71 ||.K:..q| +[950 08-31 20:51:05.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0f30 principal evaluation succeeds for identity 0 +[951 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034d0f30 gate 1598907065397216100 evaluation succeeds +[952 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[953 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[954 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[955 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[956 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +[957 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[958 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer0.org2.example.com:7051, a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[959 08-31 20:51:05.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[95a 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[95b 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[95c 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[95d 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[95e 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[95f 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[960 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[961 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[962 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[963 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[964 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[965 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fa5d0 gate 1598907065498531900 evaluation starts +[966 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fa5d0 signed by 0 principal evaluation starts (used [false]) +[967 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fa5d0 processing identity 0 with bytes of 115a4b0 +[968 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fa5d0 principal matched by identity 0 +[969 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 11 16 86 03 a9 c2 f9 09 da 67 b3 32 d1 55 f8 e9 |.........g.2.U..| +00000010 5d ec db a2 72 bf 7c 18 82 c4 01 38 af 3e ee b8 |]...r.|....8.>..| +[96a 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4d 1c 3f df 9d c6 bb 74 0b 35 7b 46 |0D. M.?....t.5{F| +00000010 1b 7d 4e 16 2b 4c fb 26 e8 af 49 12 79 5f 30 59 |.}N.+L.&..I.y_0Y| +00000020 c2 64 2d 3c 02 20 36 40 3d e0 ff 09 4c e4 bf 12 |.d-<. 6@=...L...| +00000030 92 1b c0 99 9b d1 9b c5 ce 14 0c bf 18 be 6d 1e |..............m.| +00000040 de 3c 61 a0 d3 7e |. DEBU 0xc0034fa5d0 principal evaluation succeeds for identity 0 +[96c 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034fa5d0 gate 1598907065498531900 evaluation succeeds +[96d 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[96e 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[96f 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[970 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[971 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[972 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[973 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[974 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[975 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[976 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[977 08-31 20:51:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[978 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[979 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[97a 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[97b 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[97c 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[97d 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[97e 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[97f 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[980 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[981 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[982 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[983 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[984 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[985 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[986 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[987 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[988 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[989 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[98a 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[98b 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[98c 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[98d 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[98e 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[98f 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[990 08-31 20:51:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[991 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[992 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[993 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[994 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[995 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[996 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[997 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[998 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[999 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161012 +[99a 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6457BF6DB34E55FD885D68BA350E178477B656AA4AF8C86E7E80C4258844C6B9 +[99b 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[99c 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[99d 08-31 20:51:05.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[99e 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[99f 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[9a3 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[9a2 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161013 +[9a4 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9a5 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E5DF239BA56A7C8535B0955B138E7A410AA014EAE59E2172DF90F347D1BEE180 +[9a0 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[9a1 08-31 20:51:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[9a6 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[9a7 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[9a8 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9a9 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[9aa 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[9ab 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[9ac 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[9ae 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +[9af 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9ad 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9b0 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[9b1 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." > > , Envelope: 166 bytes, Signature: 0 bytes +[9b2 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9b3 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9b4 08-31 20:51:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9b5 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9b6 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +[9b7 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9b8 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[9b9 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9ba 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[9bb 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[9bc 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9bd 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[9be 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9bf 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[9c0 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9c1 08-31 20:51:05.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[9c2 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\241\230\300'\333\005$O\344.\251\245v\365\234&\265\327." > > , Envelope: 166 bytes, Signature: 0 bytes +[9c3 08-31 20:51:05.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9c4 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[9c5 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9c6 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[9c7 08-31 20:51:05.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[9c8 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 df 23 9b a5 6a 7c 85 35 b0 95 5b 13 8e 7a 41 |..#..j|.5..[..zA| +00000010 0a a0 14 ea e5 9e 21 72 df 90 f3 47 d1 be e1 80 |......!r...G....| +[9c9 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 eb e4 06 cf 12 30 36 e7 e3 c8 |0E.!.......06...| +00000010 cd 9e fe 53 d2 87 a2 b3 48 46 59 da 58 96 fa 72 |...S....HFY.X..r| +00000020 0c 73 41 95 3b 02 20 18 4e 90 1b c7 45 0a 2b ed |.sA.;. .N...E.+.| +00000030 4b 34 be 3e a1 98 c0 27 db 05 24 4f e4 2e a9 a5 |K4.>...'..$O....| +00000040 76 f5 9c 26 b5 d7 2e |v..&...| +[9ca 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[9cb 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 f8 ac 8f c9 98 55 fd 74 cd fa |0E.!.......U.t..| +00000010 92 df fd aa df 51 c7 bf 91 b1 9e 17 91 52 40 93 |.....Q.......R@.| +00000020 37 af b2 31 a2 02 20 52 a4 db 2a a7 fe 07 39 1a |7..1.. R..*...9.| +00000030 d7 93 67 7f 77 2d b5 6f 16 d5 4e 3f d1 62 25 60 |..g.w-.o..N?.b%`| +00000040 a5 0e 1b 91 5a dc ee |....Z..| +[9cc 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[9cd 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[9ce 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9cf 08-31 20:51:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9d0 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +[9d1 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +[9d2 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9d3 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 487 bytes, Signature: 0 bytes +[9d4 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[9d5 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9d6 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[9d7 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[9d8 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[9d9 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[9da 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[9db 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[9dc 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567440 gate 1598907065607909700 evaluation starts +[9dd 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567440 signed by 0 principal evaluation starts (used [false]) +[9de 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567440 processing identity 0 with bytes of 115a4b0 +[9df 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567440 principal matched by identity 0 +[9e0 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb 77 49 82 df 02 61 02 72 88 8e 81 72 83 a8 26 |.wI...a.r...r..&| +00000010 40 55 f1 dd 5b cd 7a 30 06 81 f2 4a 19 ab 60 fe |@U..[.z0...J..`.| +[9e1 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 d6 75 03 22 db e7 7f b6 0c 45 57 |0D. h.u.".....EW| +00000010 33 14 47 82 79 65 68 d2 2d 67 7a c0 03 2c cf f9 |3.G.yeh.-gz..,..| +00000020 87 c1 0e af 02 20 0e 51 64 e0 1e 68 06 33 78 3b |..... .Qd..h.3x;| +00000030 21 c8 9b ec 7d 38 1e 6b a0 93 0a d6 49 6a 20 a0 |!...}8.k....Ij .| +00000040 2c 5f 3d cf 1d 39 |,_=..9| +[9e2 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567440 principal evaluation succeeds for identity 0 +[9e3 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003567440 gate 1598907065607909700 evaluation succeeds +[9e4 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[9e5 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[9e6 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[9e7 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[9e8 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[9e9 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[9ea 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[9eb 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[9ec 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[9ed 08-31 20:51:05.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9ee 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9ef 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[9f0 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 df 23 9b a5 6a 7c 85 35 b0 95 5b 13 8e 7a 41 |..#..j|.5..[..zA| +00000010 0a a0 14 ea e5 9e 21 72 df 90 f3 47 d1 be e1 80 |......!r...G....| +[9f1 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 eb e4 06 cf 12 30 36 e7 e3 c8 |0E.!.......06...| +00000010 cd 9e fe 53 d2 87 a2 b3 48 46 59 da 58 96 fa 72 |...S....HFY.X..r| +00000020 0c 73 41 95 3b 02 20 18 4e 90 1b c7 45 0a 2b ed |.sA.;. .N...E.+.| +00000030 4b 34 be 3e a1 98 c0 27 db 05 24 4f e4 2e a9 a5 |K4.>...'..$O....| +00000040 76 f5 9c 26 b5 d7 2e |v..&...| +[9f2 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[9f3 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[9f4 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[9f5 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[9f6 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[9f7 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[9f8 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[9f9 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[9fa 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[9fb 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[9fc 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[9fd 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357f420 gate 1598907065612609800 evaluation starts +[9fe 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357f420 signed by 0 principal evaluation starts (used [false]) +[9ff 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357f420 processing identity 0 with bytes of 115a4b0 +[a00 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357f420 principal matched by identity 0 +[a01 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 4a 50 23 f4 a4 67 b4 77 df a4 65 44 c6 86 39 |.JP#..g.w..eD..9| +00000010 ea b6 02 bb 01 eb 36 db 28 b6 f5 50 97 0c 24 2c |......6.(..P..$,| +[a02 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 9c 95 07 1a 92 05 94 f0 47 65 |0E.!..........Ge| +00000010 bf 57 61 8d 3d b2 1a b1 d0 f5 8a ef 70 af b6 dd |.Wa.=.......p...| +00000020 fb d8 32 88 2c 02 20 01 fe 05 2b 66 a8 e3 37 d0 |..2.,. ...+f..7.| +00000030 30 6c a1 fe 90 89 ae 1b d8 1d 8a 05 14 31 e9 fe |0l...........1..| +00000040 01 fe fa 78 82 10 d2 |...x...| +[a03 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357f420 principal evaluation succeeds for identity 0 +[a04 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00357f420 gate 1598907065612609800 evaluation succeeds +[a05 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[a06 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[a07 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[a08 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[a09 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[a0a 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[a0b 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[a0c 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[a0d 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[a0e 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a0f 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a10 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a11 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[a12 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[a13 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a14 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[a15 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[a16 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e3 a1 6e 8e 0a 84 2f 6e 0b 58 2e 74 48 a3 1d a5 |..n.../n.X.tH...| +00000010 c9 42 d4 63 e9 67 22 a5 66 e9 2f cf e9 bd fb e6 |.B.c.g".f./.....| +[a17 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2e e3 2c 3b ae 3d 43 bb 64 bb 66 cb |0D. ..,;.=C.d.f.| +00000010 3d 4c 23 e1 e0 3c 37 ee 10 9b 88 eb e7 d3 0a e0 |=L#..<7.........| +00000020 30 99 40 64 02 20 26 89 16 12 13 cf 5f bc f4 b3 |0.@d. &....._...| +00000030 dd 90 3b 09 8c 38 a2 16 ad 94 f3 ef 32 3f be e4 |..;..8......2?..| +00000040 96 81 f6 d1 25 38 |....%8| +[a18 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[a19 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a1a 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[a1b 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a1c 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[a1d 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[a1e 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[a1f 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[a20 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[a21 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[a22 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a3760 gate 1598907065617137200 evaluation starts +[a23 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a3760 signed by 0 principal evaluation starts (used [false]) +[a24 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a3760 processing identity 0 with bytes of 115a4b0 +[a25 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a3760 principal matched by identity 0 +[a26 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2a e1 70 71 3b f2 e3 7b ae 26 bb 0f ce 2d 39 5e |*.pq;..{.&...-9^| +00000010 b2 00 38 e7 0d 72 78 85 56 85 19 ef 28 92 45 8f |..8..rx.V...(.E.| +[a27 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 29 2c 3e 0a e0 90 3a 51 ac bd 2d 37 |0D. ),>...:Q..-7| +00000010 51 51 63 5e a9 c7 21 b4 8c 5c 15 e6 5c 0a e9 c4 |QQc^..!..\..\...| +00000020 3a e3 ab d7 02 20 11 c8 69 9d 5f 3f 44 93 f8 28 |:.... ..i._?D..(| +00000030 3e 55 15 7a 3e 08 81 e6 67 d7 4e b6 7f 5b a7 50 |>U.z>...g.N..[.P| +00000040 8a 5a b2 55 4a bd |.Z.UJ.| +[a28 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a3760 principal evaluation succeeds for identity 0 +[a29 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035a3760 gate 1598907065617137200 evaluation succeeds +[a2a 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[a2b 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[a2c 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[a2d 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[a2e 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[a2f 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[a30 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[a31 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[a32 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[a33 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a34 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a35 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[a36 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 df 23 9b a5 6a 7c 85 35 b0 95 5b 13 8e 7a 41 |..#..j|.5..[..zA| +00000010 0a a0 14 ea e5 9e 21 72 df 90 f3 47 d1 be e1 80 |......!r...G....| +[a37 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 eb e4 06 cf 12 30 36 e7 e3 c8 |0E.!.......06...| +00000010 cd 9e fe 53 d2 87 a2 b3 48 46 59 da 58 96 fa 72 |...S....HFY.X..r| +00000020 0c 73 41 95 3b 02 20 18 4e 90 1b c7 45 0a 2b ed |.sA.;. .N...E.+.| +00000030 4b 34 be 3e a1 98 c0 27 db 05 24 4f e4 2e a9 a5 |K4.>...'..$O....| +00000040 76 f5 9c 26 b5 d7 2e |v..&...| +[a38 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[a39 08-31 20:51:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[a3a 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a3b 08-31 20:51:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a3c 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a3d 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a3e 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[a3f 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[a40 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a41 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[a42 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a43 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[a44 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a45 08-31 20:51:05.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes +[a46 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes +[a47 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a48 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a49 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a4a 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[a4b 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[a4c 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[a4d 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[a4e 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[a4f 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[a50 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7bd0 gate 1598907065752678900 evaluation starts +[a51 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7bd0 signed by 0 principal evaluation starts (used [false]) +[a52 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7bd0 processing identity 0 with bytes of 115a4b0 +[a53 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7bd0 principal matched by identity 0 +[a54 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[a55 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[a56 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7bd0 principal evaluation succeeds for identity 0 +[a57 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035b7bd0 gate 1598907065752678900 evaluation succeeds +[a58 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[a59 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[a5a 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[a5b 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[a5c 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a5d 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[a5e 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[a5f 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[a60 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[a61 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[a62 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614710 gate 1598907065754494600 evaluation starts +[a63 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614710 signed by 0 principal evaluation starts (used [false]) +[a64 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614710 processing identity 0 with bytes of 115a4b0 +[a65 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614710 principal matched by identity 0 +[a66 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[a67 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[a68 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614710 principal evaluation succeeds for identity 0 +[a6a 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614710 gate 1598907065754494600 evaluation succeeds +[a6b 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[a6c 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[a6d 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[a6e 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[a6f 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a70 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 2 items, Envelope: 373 bytes, Signature: 0 bytes +[a71 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7d db f7 30 28 f3 51 bd 6a 24 0c 99 96 70 b2 03 |}..0(.Q.j$...p..| +00000010 e2 6b 44 ef 08 fc f0 fd 1c 63 d8 d3 dd e8 c1 11 |.kD......c......| +[a72 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 43 02 20 68 c4 26 6f 7b 21 ed a9 a5 3f 84 a8 |0C. h.&o{!...?..| +00000010 b1 40 99 63 b5 07 70 86 b7 94 7b d1 f4 fc db 60 |.@.c..p...{....`| +00000020 a2 47 34 74 02 1f 07 d1 39 67 f0 4d d1 ef fd 7a |.G4t....9g.M...z| +00000030 e2 38 7c ac 12 5e 64 36 2f e3 b0 37 8c cb da 35 |.8|..^d6/..7...5| +00000040 bf eb 50 e7 b3 |..P..| +[a73 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[a74 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[a75 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[a76 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[a77 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[a78 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[a79 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[a7a 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a7b 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +-----END CERTIFICATE----- +[a69 08-31 20:51:05.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes +[a7c 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362a240 gate 1598907065761110600 evaluation starts +[a7d 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362a240 signed by 0 principal evaluation starts (used [false]) +[a7e 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362a240 processing identity 0 with bytes of 115a4b0 +[a7f 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362a240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[a82 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362a240 principal evaluation fails +[a80 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a84 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[a85 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a86 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[a83 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362a240 gate 1598907065761110600 evaluation fails +[a87 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[a88 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[a81 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a89 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[a8c 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a8a 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[a8d 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362b240 gate 1598907065764256400 evaluation starts +[a8e 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362b240 signed by 0 principal evaluation starts (used [false]) +[a8f 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362b240 processing identity 0 with bytes of 115a4b0 +[a90 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[a8b 08-31 20:51:05.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a91 08-31 20:51:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[a93 08-31 20:51:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[a94 08-31 20:51:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362b240 principal matched by identity 0 +[a95 08-31 20:51:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[a96 08-31 20:51:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[a97 08-31 20:51:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362b240 principal evaluation succeeds for identity 0 +[a98 08-31 20:51:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00362b240 gate 1598907065764256400 evaluation succeeds +[a99 08-31 20:51:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[a9a 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[a9b 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[a9c 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[a9d 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[a9e 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 1 items, Envelope: 199 bytes, Signature: 0 bytes +[a9f 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[aa0 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[aa1 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[a92 08-31 20:51:05.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes to 3 peers +[aa2 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[aa3 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[aa4 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[aa5 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[aa6 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[aa7 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[aa8 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[aa9 08-31 20:51:05.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[aaa 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[aab 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[aac 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[aad 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[aae 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[aaf 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[ab0 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003654ff0 gate 1598907065792201400 evaluation starts +[ab1 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003654ff0 signed by 0 principal evaluation starts (used [false]) +[ab2 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003654ff0 processing identity 0 with bytes of 115a4b0 +[ab3 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003654ff0 principal matched by identity 0 +[ab4 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[ab5 08-31 20:51:05.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[ab6 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003654ff0 principal evaluation succeeds for identity 0 +[ab7 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003654ff0 gate 1598907065792201400 evaluation succeeds +[ab8 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[ab9 08-31 20:51:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[aba 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[abb 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[abc 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[abd 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[abe 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[abf 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[ac0 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[ac1 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[ac2 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003655b30 gate 1598907065812435700 evaluation starts +[ac3 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003655b30 signed by 0 principal evaluation starts (used [false]) +[ac4 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003655b30 processing identity 0 with bytes of 115a4b0 +[ac5 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003655b30 principal matched by identity 0 +[ac6 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[ac7 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[ac8 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003655b30 principal evaluation succeeds for identity 0 +[ac9 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003655b30 gate 1598907065812435700 evaluation succeeds +[aca 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[acb 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[acc 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[acd 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[ace 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[acf 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[ad0 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[ad1 08-31 20:51:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ad2 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[ad3 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > , Envelope: 98 bytes, Signature: 70 bytes +[ad4 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[ad5 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[ad6 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ad7 08-31 20:51:05.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ad8 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[ad9 08-31 20:51:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ada 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[adb 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[adc 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[add 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[ade 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[adf 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ae0 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[ae1 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[ae2 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[ae3 08-31 20:51:06.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ae4 08-31 20:51:06.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[ae5 08-31 20:51:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[ae6 08-31 20:51:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[ae7 08-31 20:51:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[ae8 08-31 20:51:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ae9 08-31 20:51:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[aea 08-31 20:51:06.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[aeb 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[aec 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[aed 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[aee 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[aef 08-31 20:51:06.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[af0 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[af1 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[af2 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[af3 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[af4 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[af5 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[af6 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[af7 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[af8 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[af9 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac970 gate 1598907066243733700 evaluation starts +[afa 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac970 signed by 0 principal evaluation starts (used [false]) +[afb 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac970 processing identity 0 with bytes of 115a4b0 +[afc 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac970 principal matched by identity 0 +[afd 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[afe 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[aff 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac970 principal evaluation succeeds for identity 0 +[b00 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036ac970 gate 1598907066243733700 evaluation succeeds +[b01 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[b02 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[b03 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[b04 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[b05 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b06 08-31 20:51:06.24 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b07 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[b08 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > , Envelope: 98 bytes, Signature: 71 bytes +[b09 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b0a 08-31 20:51:06.25 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b0b 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[b0c 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[b0d 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[b0e 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[b0f 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[b10 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c42d0 gate 1598907066260554700 evaluation starts +[b11 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c42d0 signed by 0 principal evaluation starts (used [false]) +[b12 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c42d0 processing identity 0 with bytes of 115a4b0 +[b13 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c42d0 principal matched by identity 0 +[b14 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[b15 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[b16 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c42d0 principal evaluation succeeds for identity 0 +[b17 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c42d0 gate 1598907066260554700 evaluation succeeds +[b18 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[b19 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[b1a 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[b1b 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[b1c 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b1d 08-31 20:51:06.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b1e 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[b1f 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[b20 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b21 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b22 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b23 08-31 20:51:06.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b24 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +[b25 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > , Envelope: 98 bytes, Signature: 71 bytes +[b26 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b27 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b28 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[b29 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[b2a 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[b2b 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[b2c 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[b2d 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5b60 gate 1598907066495163300 evaluation starts +[b2e 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5b60 signed by 0 principal evaluation starts (used [false]) +[b2f 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5b60 processing identity 0 with bytes of 115a4b0 +[b30 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5b60 principal matched by identity 0 +[b31 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[b32 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[b33 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5b60 principal evaluation succeeds for identity 0 +[b34 08-31 20:51:06.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036c5b60 gate 1598907066495163300 evaluation succeeds +[b35 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[b36 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[b37 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[b38 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[b39 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b3a 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b3b 08-31 20:51:06.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to peer1.org2.example.com:7051 +[b3c 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +[b3d 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to peer0.org2.example.com:7051 +[b3e 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes to 1 peers +[b3f 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +[b40 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b41 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +[b42 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b43 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16864709295300465862, Envelope: 958 bytes, Signature: 0 bytes +[b44 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16864709295300465862, Envelope: 958 bytes, Signature: 0 bytes +[b45 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b46 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b47 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[b48 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[b49 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[b4a 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[b4b 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[b4c 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036adef0 gate 1598907066516246000 evaluation starts +[b4d 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036adef0 signed by 0 principal evaluation starts (used [false]) +[b4e 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036adef0 processing identity 0 with bytes of 115a4b0 +[b50 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17496144708945142343, Envelope: 962 bytes, Signature: 0 bytes +[b4f 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036adef0 principal matched by identity 0 +[b51 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 ea 79 63 7f 04 88 19 83 be cb 2d 77 29 da 67 |..yc.......-w).g| +00000010 71 a3 58 87 1c ba 8b be 44 c8 a4 39 47 38 cb 9b |q.X.....D..9G8..| +[b52 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8f 33 8c 2c fe 58 22 8c a8 e4 91 |0E.!..3.,.X"....| +00000010 88 90 ce c8 fc 50 7a 0b b0 78 9c 29 7b f6 3d 93 |.....Pz..x.){.=.| +00000020 57 1a 9e b3 e6 02 20 62 19 16 58 7c f8 0f 8c 96 |W..... b..X|....| +00000030 d3 36 65 f9 ec 7c 8f ac 08 e1 33 26 1d 93 16 63 |.6e..|....3&...c| +00000040 30 89 11 53 29 96 fa |0..S)..| +[b53 08-31 20:51:06.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036adef0 principal evaluation succeeds for identity 0 +[b54 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036adef0 gate 1598907066516246000 evaluation succeeds +[b55 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[b56 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[b57 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[b58 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[b59 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b5a 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b5b 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 16864709295300465862, Envelope: 958 bytes, Signature: 0 bytes +[b5c 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b5d 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b5e 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b5f 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b60 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 166 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 74 122 67 67 65 99 54 103 65 119 73 66 65 103 73 81 75 47 48 75 66 88 106 53 54 48 88 50 52 104 73 76 107 50 57 115 51 68 65 75 66 103 103 113 104 107 106 79 80 81 81 68 65 106 66 122 77 81 115 119 10 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 85 50 70 117 73 69 90 121 10 89 87 53 106 97 88 78 106 98 122 69 90 77 66 99 71 65 49 85 69 67 104 77 81 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 69 99 77 66 111 71 65 49 85 69 65 120 77 84 89 50 69 117 10 98 51 74 110 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 65 101 70 119 48 121 77 68 65 121 77 106 69 120 79 68 73 48 77 68 66 97 70 119 48 122 77 68 65 121 77 84 103 120 79 68 73 48 77 68 66 97 10 77 71 111 120 67 122 65 74 66 103 78 86 66 65 89 84 65 108 86 84 77 82 77 119 69 81 89 68 86 81 81 73 69 119 112 68 89 87 120 112 90 109 57 121 98 109 108 104 77 82 89 119 70 65 89 68 86 81 81 72 69 119 49 84 10 89 87 52 103 82 110 74 104 98 109 78 112 99 50 78 118 77 81 48 119 67 119 89 68 86 81 81 76 69 119 82 119 90 87 86 121 77 82 56 119 72 81 89 68 86 81 81 68 69 120 90 119 90 87 86 121 77 83 53 118 99 109 99 121 10 76 109 86 52 89 87 49 119 98 71 85 117 89 50 57 116 77 70 107 119 69 119 89 72 75 111 90 73 122 106 48 67 65 81 89 73 75 111 90 73 122 106 48 68 65 81 99 68 81 103 65 69 97 100 106 84 100 70 104 47 53 100 55 65 10 110 56 48 120 68 68 114 104 114 53 103 109 83 115 119 47 55 82 105 68 114 68 83 84 72 109 103 71 113 55 72 90 78 120 89 89 53 82 85 109 71 102 111 43 118 83 73 43 121 55 77 85 98 73 103 113 103 114 90 105 97 106 80 50 10 122 43 52 55 116 74 84 43 104 97 78 78 77 69 115 119 68 103 89 68 86 82 48 80 65 81 72 47 66 65 81 68 65 103 101 65 77 65 119 71 65 49 85 100 69 119 69 66 47 119 81 67 77 65 65 119 75 119 89 68 86 82 48 106 10 66 67 81 119 73 111 65 103 75 102 97 84 82 51 49 121 113 83 90 111 112 89 55 114 80 101 118 118 86 52 67 122 53 81 113 85 116 73 79 67 81 65 65 90 115 75 110 82 86 84 48 119 67 103 89 73 75 111 90 73 122 106 48 69 10 65 119 73 68 82 119 65 119 82 65 73 103 102 84 70 55 51 101 57 100 122 81 43 98 72 116 49 87 86 105 54 43 84 65 97 115 109 113 81 68 52 79 85 103 100 105 121 70 117 77 52 108 116 99 81 67 73 66 120 67 73 119 122 43 10 51 120 73 103 115 51 115 121 99 97 47 86 101 122 101 57 121 118 76 48 77 111 81 57 82 101 112 115 67 97 51 86 103 118 117 118 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +[b61 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Added N�@�����9�\F���`�y(כ���Jt� to the in memory item map, total items: 3 +[b62 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b63 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17496144708945142343, Envelope: 962 bytes, Signature: 0 bytes +[b64 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b65 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b66 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[b67 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[b68 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[b69 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[b6a 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[b6b 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003720880 gate 1598907066526177900 evaluation starts +[b6c 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003720880 signed by 0 principal evaluation starts (used [false]) +[b6d 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003720880 processing identity 0 with bytes of 115a4b0 +[b6e 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003720880 principal matched by identity 0 +[b6f 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 25 f6 22 1c d3 e4 fd 28 6d f6 b0 4b 35 35 b6 |.%."....(m..K55.| +00000010 b7 57 78 91 67 e7 fe 5a cf 4c 44 4e 25 37 10 23 |.Wx.g..Z.LDN%7.#| +[b70 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 08 73 47 bc f3 8c 1f 9f 8d bd |0E.!...sG.......| +00000010 52 c7 75 74 c8 ca c9 e7 5a 06 db ef 9f ab c9 6a |R.ut....Z......j| +00000020 2a 06 27 12 e5 02 20 57 7e 9f be cb 71 bb 2d f5 |*.'... W~...q.-.| +00000030 a1 a2 a0 f8 13 3e 6d 22 eb 81 2f 3a b2 ac 63 57 |.....>m"../:..cW| +00000040 cd 6a 32 a0 2d 76 78 |.j2.-vx| +[b71 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003720880 principal evaluation succeeds for identity 0 +[b72 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003720880 gate 1598907066526177900 evaluation succeeds +[b73 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[b74 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[b75 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[b76 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[b77 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b78 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b79 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: Channel: , nonce: 0, tag: EMPTY DataUpdate: Type: IDENTITY_MSG, items: 1, nonce: 17496144708945142343, Envelope: 962 bytes, Signature: 0 bytes +[b7a 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b7b 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b7c 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[b7d 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[b7e 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Learned of a new certificate: [10 7 79 114 103 50 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 77 114 85 53 109 108 114 103 84 49 82 104 120 79 108 113 83 65 121 80 83 99 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 73 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 105 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 70 102 72 121 75 118 101 70 56 113 81 10 52 54 73 90 51 80 88 97 97 57 49 118 101 113 83 111 97 99 98 86 119 52 69 80 106 120 111 47 118 43 70 105 86 50 50 108 101 86 114 86 80 98 88 47 109 82 86 104 69 52 86 67 78 51 69 122 113 49 109 112 43 66 79 81 10 83 80 110 55 109 77 86 43 74 50 50 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 67 110 50 107 48 100 57 99 113 107 109 97 75 87 79 54 122 51 114 55 49 101 65 115 43 85 75 108 76 83 68 103 107 65 65 71 98 67 112 48 86 85 57 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 66 115 112 70 108 117 53 110 90 88 109 49 83 112 49 70 85 72 69 47 89 111 108 57 68 117 102 85 104 115 54 79 109 76 102 82 75 117 83 83 119 121 106 65 105 65 97 88 107 87 87 10 104 98 89 77 116 53 73 103 68 97 77 51 83 70 86 47 107 54 49 71 77 120 84 112 75 68 103 90 71 71 117 103 72 78 68 68 108 103 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] +[b7f 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Added ����)�����H�5���K��q���2���( to the in memory item map, total items: 4 +[b80 08-31 20:51:06.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[b81 08-31 20:51:07.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36764 +[b82 08-31 20:51:07.22 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0036b7180 +[b83 08-31 20:51:07.22 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[b84 08-31 20:51:07.22 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[b85 08-31 20:51:07.22 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[b86 08-31 20:51:07.22 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[b87 08-31 20:51:07.22 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f b7 ce de d4 72 ca 97 07 e5 d9 e9 d3 08 a3 d9 |.....r..........| +00000010 a6 9a ab 80 96 d1 5d 0d 59 ac 17 4d 98 3b dd 26 |......].Y..M.;.&| +[b88 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 1e 24 de 7a 17 3a 4e 5a d6 70 da |0D. k.$.z.:NZ.p.| +00000010 c2 7f 1e c0 54 2d e0 63 4f 7a 5a 91 75 11 d8 ab |....T-.cOzZ.u...| +00000020 1f 14 66 af 02 20 02 3f 96 7a 76 0e c5 87 d2 9a |..f.. .?.zv.....| +00000030 2b f7 73 59 75 19 45 77 12 b5 94 d4 6d c1 76 31 |+.sYu.Ew....m.v1| +00000040 41 4d e6 96 38 e3 |AM..8.| +[b89 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[b8a 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003519180, header 0xc0036b7590 +[b8b 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[b8c 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU [][3e6121d1] processing txid: 3e6121d142f3532efc3688fd85c8ec47e09ff474db3bf327d3ff33291c4fe50d +[b8d 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU [][3e6121d1] Entry chaincode: name:"lscc" +[b8e 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> INFO [][3e6121d1] Entry chaincode: name:"lscc" +[b8f 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[b90 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f b7 ce de d4 72 ca 97 07 e5 d9 e9 d3 08 a3 d9 |.....r..........| +00000010 a6 9a ab 80 96 d1 5d 0d 59 ac 17 4d 98 3b dd 26 |......].Y..M.;.&| +[b91 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 1e 24 de 7a 17 3a 4e 5a d6 70 da |0D. k.$.z.:NZ.p.| +00000010 c2 7f 1e c0 54 2d e0 63 4f 7a 5a 91 75 11 d8 ab |....T-.cOzZ.u...| +00000020 1f 14 66 af 02 20 02 3f 96 7a 76 0e c5 87 d2 9a |..f.. .?.zv.....| +00000030 2b f7 73 59 75 19 45 77 12 b5 94 d4 6d c1 76 31 |+.sYu.Ew....m.v1| +00000040 41 4d e6 96 38 e3 |AM..8.| +[b92 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +[b93 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU HandleChaincodeInstall() - chaincodeDefinition=&cceventmgmt.ChaincodeDefinition{Name:"exp02", Hash:[]uint8{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}, Version:"1.0", CollectionConfigs:(*common.CollectionConfigPackage)(nil)} +[b94 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode install event for chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] +[b95 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [0755046a-dc1b-411f-9854-c2fc6e4cc255] +[b96 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[b97 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [0755046a-dc1b-411f-9854-c2fc6e4cc255] +[b98 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Chaincode [Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}] is not deployed on channel hence not creating chaincode artifacts. +[b99 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> INFO Installed Chaincode [exp02] Version [1.0] to peer +[b9a 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU [3e6121d1] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[b9b 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU [3e6121d1] notifying Txid:3e6121d142f3532efc3688fd85c8ec47e09ff474db3bf327d3ff33291c4fe50d, channelID: +[b9c 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[b9d 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> INFO [][3e6121d1] Exit chaincode: name:"lscc" (5ms) +[b9e 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU [][3e6121d1] Exit +[b9f 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36764 +[ba0 08-31 20:51:07.23 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36764 grpc.code=OK grpc.call_duration=9.6895ms +[ba1 08-31 20:51:07.24 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[ba2 08-31 20:51:07.24 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[ba3 08-31 20:51:07.74 UTC] [%{longpkg}] %{callpath} -> INFO Membership view has changed. peers went online: [[peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] , current view: [[peer1.org1.example.com:7051] [peer0.org2.example.com:7051 ] [peer1.org2.example.com:7051 ]] +[ba4 08-31 20:51:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[ba5 08-31 20:51:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[ba6 08-31 20:51:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[ba7 08-31 20:51:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610031801 +[ba8 08-31 20:51:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DA8F68E0E7CBB31B65C02DE254870FF302622F128327D88D1FD719D41AD6CF19 +[ba9 08-31 20:51:08.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[baa 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bab 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bac 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bad 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bae 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[baf 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bb1 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bb0 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[bb2 08-31 20:51:08.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bb3 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[bb4 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[bb5 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[bb6 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bb7 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bb8 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bb9 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bba 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bbb 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bbc 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[bbd 08-31 20:51:08.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bbe 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[bbf 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[bc0 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bc1 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[bc2 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[bc3 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bc4 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[bc5 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[bc6 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[bc7 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[bc8 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[bc9 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[bca 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373dff0 gate 1598907069024573200 evaluation starts +[bcb 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373dff0 signed by 0 principal evaluation starts (used [false]) +[bcc 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373dff0 processing identity 0 with bytes of 115a4b0 +[bcd 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373dff0 principal matched by identity 0 +[bce 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 45 23 3a 25 15 88 da 8f 53 4a 1b 00 79 c1 f8 |.E#:%....SJ..y..| +00000010 61 47 17 a6 05 0c 7c a5 2c 8e 32 89 cd d4 ab 53 |aG....|.,.2....S| +[bcf 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 96 2d 33 a9 0f 8e 0a 58 ac e1 |0E.!...-3....X..| +00000010 e1 cf dd 39 bc 9a 6b 4a b8 24 7d a8 d8 5f 60 13 |...9..kJ.$}.._`.| +00000020 1f 92 ed c4 6b 02 20 52 28 b2 cc d3 6c ac c0 78 |....k. R(...l..x| +00000030 6b 85 f8 08 54 72 4f 15 e4 be 07 d9 0e 2d 45 61 |k...TrO......-Ea| +00000040 67 ba 52 10 74 ab 11 |g.R.t..| +[bd0 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373dff0 principal evaluation succeeds for identity 0 +[bd1 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00373dff0 gate 1598907069024573200 evaluation succeeds +[bd2 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[bd3 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[bd4 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[bd5 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[bd6 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[bd7 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[bd8 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[bd9 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[bda 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[bdb 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bdc 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bdd 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bde 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[bdf 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[be0 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[be1 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[be2 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[be3 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[be4 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[be5 08-31 20:51:09.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[be6 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[be7 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[be8 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[be9 08-31 20:51:09.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bea 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[beb 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[bec 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[bed 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 6a b4 86 66 e3 dd f1 1d 07 16 02 fe cc e3 e9 |Wj..f...........| +00000010 18 8b 7e 5d 68 d0 13 49 fd 21 b3 e5 aa ca 4f 08 |..~]h..I.!....O.| +[bee 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 92 7d f2 a4 f9 89 e7 88 b7 2c 69 |0D. ..}.......,i| +00000010 6e b8 79 6d 59 07 0a 7f 8f e3 34 86 c7 7f 4e e2 |n.ymY.....4...N.| +00000020 51 3f cb d5 02 20 43 20 38 fe 37 27 3f 36 a7 91 |Q?... C 8.7'?6..| +00000030 a7 12 05 38 8c e3 f9 76 39 bb 31 a6 6b 37 03 bc |...8...v9.1.k7..| +00000040 b9 60 49 bc 66 f3 |.`I.f.| +[bef 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bf0 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[bf1 08-31 20:51:09.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 09 26 23 44 48 87 5e b9 35 e1 9b 44 |0D. .&#DH.^.5..D| +00000010 01 14 42 3a e3 4b 78 6c 3c 13 20 32 51 a3 0e 7d |..B:.Kxl<. 2Q..}| +00000020 a1 07 98 9a 02 20 39 ae 9c 30 23 03 68 6b 79 d4 |..... 9..0#.hky.| +00000030 6f 39 8c d3 ab 93 f7 12 bd 73 85 c5 22 a8 6a 8e |o9.......s..".j.| +00000040 8b 20 a6 c9 37 49 |. ..7I| +[bf2 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[bf3 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[bf4 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[bf5 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[bf6 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[bf7 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bf8 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bf9 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[bfa 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[bfb 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bfc 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[bfd 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[bfe 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[bff 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c00 08-31 20:51:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[c01 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36780 +[c02 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0037b07d0 +[c03 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[c04 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[c05 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[c06 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c07 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE----- +[c08 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[c09 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[c0a 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[c0b 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[c0c 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 5f 52 bb d1 40 68 8c ea 33 51 a6 c7 dc 40 72 |._R..@h..3Q...@r| +00000010 3b a5 f2 ec 77 ad b7 12 d2 70 75 eb bd 7b 02 4c |;...w....pu..{.L| +[c0d 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 73 7a fb b7 87 ef 5e 36 5a 8e |0E.!..sz....^6Z.| +00000010 1e 7e 9c 8c 38 da a5 5f 0f 72 d2 24 0b 64 ab 31 |.~..8.._.r.$.d.1| +00000020 db f7 ca cd 66 02 20 26 32 cb 10 84 78 42 e6 cf |....f. &2...xB..| +00000030 e1 03 6f 11 2c 17 53 37 9e 2b c3 38 29 3e 18 4d |..o.,.S7.+.8)>.M| +00000040 d6 e3 fa c2 d8 60 18 |.....`.| +[c0e 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[c0f 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0037a6540, header 0xc0037b0be0 +[c10 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[c11 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d0697242] processing txid: d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a +[c12 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] +[c13 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[c14 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] +[c15 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d0697242] Entry chaincode: name:"lscc" +[c16 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][d0697242] Entry chaincode: name:"lscc" +[c17 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[c18 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[c19 08-31 20:51:09.39 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] handling GET_STATE from chaincode +[c1a 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] getting state for chaincode lscc, key exp02, channel businesschannel +[c1b 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[c1c 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] No state associated with key: exp02. Sending RESPONSE with an empty payload +[c1d 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Completed GET_STATE. Sending RESPONSE +[c1e 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[c1f 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003847a10 gate 1598907069400889200 evaluation starts +[c20 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003847a10 signed by 0 principal evaluation starts (used [false]) +[c21 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003847a10 processing identity 0 with bytes of 115a4b0 +[c22 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org1MSP +[c23 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org1MSP +[c24 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[c25 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[c26 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP checking if the identity is a client +[c27 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[c28 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003847a10 principal matched by identity 0 +[c29 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 5f 52 bb d1 40 68 8c ea 33 51 a6 c7 dc 40 72 |._R..@h..3Q...@r| +00000010 3b a5 f2 ec 77 ad b7 12 d2 70 75 eb bd 7b 02 4c |;...w....pu..{.L| +[c2a 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 73 7a fb b7 87 ef 5e 36 5a 8e |0E.!..sz....^6Z.| +00000010 1e 7e 9c 8c 38 da a5 5f 0f 72 d2 24 0b 64 ab 31 |.~..8.._.r.$.d.1| +00000020 db f7 ca cd 66 02 20 26 32 cb 10 84 78 42 e6 cf |....f. &2...xB..| +00000030 e1 03 6f 11 2c 17 53 37 9e 2b c3 38 29 3e 18 4d |..o.,.S7.+.8)>.M| +00000040 d6 e3 fa c2 d8 60 18 |.....`.| +[c2b 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003847a10 principal evaluation succeeds for identity 0 +[c2c 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003847a10 signed by 1 principal evaluation starts (used [true]) +[c2d 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003847a10 skipping identity 0 because it has already been used +[c2e 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003847a10 principal evaluation fails +[c2f 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003847a10 gate 1598907069400889200 evaluation succeeds +[c30 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[c31 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] handling PUT_STATE from chaincode +[c32 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Completed PUT_STATE. Sending RESPONSE +[c33 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU No collection configuration specified +[c34 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[c35 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] notifying Txid:d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a, channelID:businesschannel +[c36 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[c37 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU launchConfig: executable:"chaincode",Args:[chaincode,-peer.address=peer0.org1.example.com:7052],Envs:[CORE_CHAINCODE_LOGGING_LEVEL=info,CORE_CHAINCODE_LOGGING_SHIM=warning,CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message},CORE_CHAINCODE_ID_NAME=exp02:1.0,CORE_PEER_TLS_ENABLED=true,CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key,CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt,CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt],Files:[/etc/hyperledger/fabric/client.crt /etc/hyperledger/fabric/client.key /etc/hyperledger/fabric/peer.crt] +[c38 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU start container: exp02:1.0 +[c39 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU start container with args: chaincode -peer.address=peer0.org1.example.com:7052 +[c3a 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU start container with env: + CORE_CHAINCODE_LOGGING_LEVEL=info + CORE_CHAINCODE_LOGGING_SHIM=warning + CORE_CHAINCODE_LOGGING_FORMAT=%{color}%{time:2006-01-02 15:04:05.000 MST} [%{module}] %{shortfunc} -> %{level:.4s} %{id:03x}%{color:reset} %{message} + CORE_CHAINCODE_ID_NAME=exp02:1.0 + CORE_PEER_TLS_ENABLED=true + CORE_TLS_CLIENT_KEY_PATH=/etc/hyperledger/fabric/client.key + CORE_TLS_CLIENT_CERT_PATH=/etc/hyperledger/fabric/client.crt + CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/peer.crt +[c3b 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(exp02-1.0) lock +[c3c 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU got container (exp02-1.0) lock +[c3d 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU stopping container id=dev-peer0.org1.example.com-exp02-1.0 +[c3e 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU stop container result error="No such container: dev-peer0.org1.example.com-exp02-1.0" +[c3f 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU killing container id=dev-peer0.org1.example.com-exp02-1.0 +[c40 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU kill container result id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +[c41 08-31 20:51:09.40 UTC] [%{longpkg}] %{callpath} -> DEBU removing container id=dev-peer0.org1.example.com-exp02-1.0 +[c42 08-31 20:51:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU remove container result id=dev-peer0.org1.example.com-exp02-1.0 error="No such container: dev-peer0.org1.example.com-exp02-1.0" +[c43 08-31 20:51:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU create container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +[c44 08-31 20:51:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +[c45 08-31 20:51:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU +FROM hyperledger/fabric-baseos:amd64-0.4.21 +ADD binpackage.tar /usr/local/bin +LABEL org.hyperledger.fabric.chaincode.id.name="exp02" \ + org.hyperledger.fabric.chaincode.id.version="1.0" \ + org.hyperledger.fabric.chaincode.type="GOLANG" \ + org.hyperledger.fabric.version="1.4.8" \ + org.hyperledger.fabric.base.version="0.4.21" +ENV CORE_CHAINCODE_BUILDLEVEL=1.4.8 +[c46 08-31 20:51:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +[c47 08-31 20:51:09.43 UTC] [%{longpkg}] %{callpath} -> INFO building chaincode with ldflagsOpt: '-ldflags "-linkmode external -extldflags '-static'"' +[c48 08-31 20:51:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Attempting build with image hyperledger/fabric-ccenv:1.4 +[c49 08-31 20:51:09.43 UTC] [%{longpkg}] %{callpath} -> DEBU Image hyperledger/fabric-ccenv:1.4 does not exist locally, attempt pull +[c4a 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[c4b 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[c4c 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[c4d 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c4e 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c4f 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c50 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c51 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c52 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c53 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[c54 08-31 20:51:09.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c55 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[c56 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[c57 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c58 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[c59 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[c5a 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c5b 08-31 20:51:09.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[c5c 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[c5d 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[c5e 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[c5f 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[c60 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[c61 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f8420 gate 1598907069480303400 evaluation starts +[c62 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f8420 signed by 0 principal evaluation starts (used [false]) +[c63 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f8420 processing identity 0 with bytes of 115a4b0 +[c64 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f8420 principal matched by identity 0 +[c65 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 a7 64 a1 59 2f 08 ef 19 da 91 37 9a b5 49 98 |I.d.Y/.....7..I.| +00000010 15 63 00 ab 9c 13 83 36 60 dc 57 6d df 31 1b 11 |.c.....6`.Wm.1..| +[c66 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 9d 53 bd aa 48 cc 88 5a 1c 15 |0E.!...S..H..Z..| +00000010 83 dc d6 95 46 d4 65 0b a5 5b 92 6e 2f 70 c0 8b |....F.e..[.n/p..| +00000020 d8 0a 17 fe c0 02 20 14 9a 17 05 81 a7 93 ce c9 |...... .........| +00000030 0b 18 48 d1 e0 56 16 62 4c e8 73 fd c9 21 7a 62 |..H..V.bL.s..!zb| +00000040 ee d4 2f 0e c1 8b 64 |../...d| +[c67 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f8420 principal evaluation succeeds for identity 0 +[c68 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0039f8420 gate 1598907069480303400 evaluation succeeds +[c69 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[c6a 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[c6b 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[c6c 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[c6d 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[c6e 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[c6f 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[c70 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[c71 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[c72 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c73 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c74 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c75 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[c76 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c77 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c78 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c79 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[c7a 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[c7b 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[c7c 08-31 20:51:09.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c7d 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[c7e 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[c7f 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[c80 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[c81 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[c82 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[c83 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[c84 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c85 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[c86 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c87 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[c88 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c89 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[c8b 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[c8a 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[c8c 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 85 bytes, Signature: 0 bytes +[c8d 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c8e 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +[c8f 08-31 20:51:09.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 119 bytes, Signature: 0 bytes +[c90 08-31 20:51:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c91 08-31 20:51:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[c92 08-31 20:51:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[c93 08-31 20:51:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[c94 08-31 20:51:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[c95 08-31 20:51:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161014 +[c96 08-31 20:51:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9F9B70869C218C0461A8970F345137A88CB8FE8EDF8CF92904CBA269CE909422 +[c97 08-31 20:51:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[c98 08-31 20:51:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[c99 08-31 20:51:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[c9a 08-31 20:51:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[c9b 08-31 20:51:09.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c9c 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[c9d 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[c9e 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[c9f 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[ca0 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ca1 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[ca2 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ca3 08-31 20:51:09.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[ca4 08-31 20:51:09.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ca5 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[ca6 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[ca7 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ca8 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[ca9 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[caa 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cab 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[cac 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[cad 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[cae 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[caf 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[cb0 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[cb1 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a25820 gate 1598907069581523500 evaluation starts +[cb2 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a25820 signed by 0 principal evaluation starts (used [false]) +[cb3 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a25820 processing identity 0 with bytes of 115a4b0 +[cb4 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a25820 principal matched by identity 0 +[cb5 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b8 45 23 3a 25 15 88 da 8f 53 4a 1b 00 79 c1 f8 |.E#:%....SJ..y..| +00000010 61 47 17 a6 05 0c 7c a5 2c 8e 32 89 cd d4 ab 53 |aG....|.,.2....S| +[cb6 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de 96 2d 33 a9 0f 8e 0a 58 ac e1 |0E.!...-3....X..| +00000010 e1 cf dd 39 bc 9a 6b 4a b8 24 7d a8 d8 5f 60 13 |...9..kJ.$}.._`.| +00000020 1f 92 ed c4 6b 02 20 52 28 b2 cc d3 6c ac c0 78 |....k. R(...l..x| +00000030 6b 85 f8 08 54 72 4f 15 e4 be 07 d9 0e 2d 45 61 |k...TrO......-Ea| +00000040 67 ba 52 10 74 ab 11 |g.R.t..| +[cb7 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a25820 principal evaluation succeeds for identity 0 +[cb8 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a25820 gate 1598907069581523500 evaluation succeeds +[cb9 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[cba 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[cbb 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[cbc 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[cbd 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[cbe 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cbf 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[cc0 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f 9b 70 86 9c 21 8c 04 61 a8 97 0f 34 51 37 a8 |..p..!..a...4Q7.| +00000010 8c b8 fe 8e df 8c f9 29 04 cb a2 69 ce 90 94 22 |.......)...i..."| +[cc1 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 50 cd 21 f6 c0 4c f9 23 4e ec |0E.!..P.!..L.#N.| +00000010 40 3a 91 75 e8 8c 2e 5c cc 24 be 30 ad d6 e2 f2 |@:.u...\.$.0....| +00000020 81 13 ba f1 62 02 20 22 84 86 fa c4 db b9 6f e1 |....b. "......o.| +00000030 47 27 9d 59 2e 0d 70 78 03 93 59 69 54 ba 48 1c |G'.Y..px..YiT.H.| +00000040 f7 07 5a 5f 3b 73 3c |..Z_;s<| +[cc2 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[cc3 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[cc4 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cc5 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[cc6 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 6a b4 86 66 e3 dd f1 1d 07 16 02 fe cc e3 e9 |Wj..f...........| +00000010 18 8b 7e 5d 68 d0 13 49 fd 21 b3 e5 aa ca 4f 08 |..~]h..I.!....O.| +[cc7 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0f 92 7d f2 a4 f9 89 e7 88 b7 2c 69 |0D. ..}.......,i| +00000010 6e b8 79 6d 59 07 0a 7f 8f e3 34 86 c7 7f 4e e2 |n.ymY.....4...N.| +00000020 51 3f cb d5 02 20 43 20 38 fe 37 27 3f 36 a7 91 |Q?... C 8.7'?6..| +00000030 a7 12 05 38 8c e3 f9 76 39 bb 31 a6 6b 37 03 bc |...8...v9.1.k7..| +00000040 b9 60 49 bc 66 f3 |.`I.f.| +[cc8 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[cc9 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cca 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ccb 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[ccc 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ccd 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[cce 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes +[ccf 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes +[cd0 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[cd1 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f 9b 70 86 9c 21 8c 04 61 a8 97 0f 34 51 37 a8 |..p..!..a...4Q7.| +00000010 8c b8 fe 8e df 8c f9 29 04 cb a2 69 ce 90 94 22 |.......)...i..."| +[cd2 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 50 cd 21 f6 c0 4c f9 23 4e ec |0E.!..P.!..L.#N.| +00000010 40 3a 91 75 e8 8c 2e 5c cc 24 be 30 ad d6 e2 f2 |@:.u...\.$.0....| +00000020 81 13 ba f1 62 02 20 22 84 86 fa c4 db b9 6f e1 |....b. "......o.| +00000030 47 27 9d 59 2e 0d 70 78 03 93 59 69 54 ba 48 1c |G'.Y..px..YiT.H.| +00000040 f7 07 5a 5f 3b 73 3c |..Z_;s<| +[cd3 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[cd4 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9f b9 9d 07 c3 6c a9 f4 bd 66 2c |0E.!......l...f,| +00000010 c4 ed 50 fa 67 31 5d c3 55 47 bc e1 c4 e1 3f 10 |..P.g1].UG....?.| +00000020 8f b2 8d 96 64 02 20 17 b1 cd 04 18 ca da 4b 21 |....d. .......K!| +00000030 57 b4 da b4 b9 cd 52 87 1a f3 ed d1 7c 5a 14 3b |W.....R.....|Z.;| +00000040 2a 02 8a 22 27 c8 4b |*.."'.K| +[cd5 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[cd6 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[cd7 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cd8 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cd9 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 3, Dead: 0, Envelope: 488 bytes, Signature: 0 bytes +[cda 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[cdb 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cdc 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cdd 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[cde 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[cdf 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[ce0 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[ce1 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[ce2 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[ce3 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a59a30 gate 1598907069588236800 evaluation starts +[ce4 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a59a30 signed by 0 principal evaluation starts (used [false]) +[ce5 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a59a30 processing identity 0 with bytes of 115a4b0 +[ce6 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a59a30 principal matched by identity 0 +[ce7 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 49 a7 64 a1 59 2f 08 ef 19 da 91 37 9a b5 49 98 |I.d.Y/.....7..I.| +00000010 15 63 00 ab 9c 13 83 36 60 dc 57 6d df 31 1b 11 |.c.....6`.Wm.1..| +[ce8 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 9d 53 bd aa 48 cc 88 5a 1c 15 |0E.!...S..H..Z..| +00000010 83 dc d6 95 46 d4 65 0b a5 5b 92 6e 2f 70 c0 8b |....F.e..[.n/p..| +00000020 d8 0a 17 fe c0 02 20 14 9a 17 05 81 a7 93 ce c9 |...... .........| +00000030 0b 18 48 d1 e0 56 16 62 4c e8 73 fd c9 21 7a 62 |..H..V.bL.s..!zb| +00000040 ee d4 2f 0e c1 8b 64 |../...d| +[ce9 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a59a30 principal evaluation succeeds for identity 0 +[cea 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a59a30 gate 1598907069588236800 evaluation succeeds +[ceb 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[cec 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[ced 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[cee 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[cef 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[cf0 08-31 20:51:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cf1 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[cf2 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9f 9b 70 86 9c 21 8c 04 61 a8 97 0f 34 51 37 a8 |..p..!..a...4Q7.| +00000010 8c b8 fe 8e df 8c f9 29 04 cb a2 69 ce 90 94 22 |.......)...i..."| +[cf3 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 50 cd 21 f6 c0 4c f9 23 4e ec |0E.!..P.!..L.#N.| +00000010 40 3a 91 75 e8 8c 2e 5c cc 24 be 30 ad d6 e2 f2 |@:.u...\.$.0....| +00000020 81 13 ba f1 62 02 20 22 84 86 fa c4 db b9 6f e1 |....b. "......o.| +00000030 47 27 9d 59 2e 0d 70 78 03 93 59 69 54 ba 48 1c |G'.Y..px..YiT.H.| +00000040 f7 07 5a 5f 3b 73 3c |..Z_;s<| +[cf4 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[cf5 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[cf6 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[cf7 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[cf8 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[cf9 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[cfa 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[cfb 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[cfc 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[cfd 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[cfe 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[cff 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6f6e0 gate 1598907069592125300 evaluation starts +[d00 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6f6e0 signed by 0 principal evaluation starts (used [false]) +[d01 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6f6e0 processing identity 0 with bytes of 115a4b0 +[d02 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6f6e0 principal matched by identity 0 +[d03 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 4a 50 23 f4 a4 67 b4 77 df a4 65 44 c6 86 39 |.JP#..g.w..eD..9| +00000010 ea b6 02 bb 01 eb 36 db 28 b6 f5 50 97 0c 24 2c |......6.(..P..$,| +[d04 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 9c 95 07 1a 92 05 94 f0 47 65 |0E.!..........Ge| +00000010 bf 57 61 8d 3d b2 1a b1 d0 f5 8a ef 70 af b6 dd |.Wa.=.......p...| +00000020 fb d8 32 88 2c 02 20 01 fe 05 2b 66 a8 e3 37 d0 |..2.,. ...+f..7.| +00000030 30 6c a1 fe 90 89 ae 1b d8 1d 8a 05 14 31 e9 fe |0l...........1..| +00000040 01 fe fa 78 82 10 d2 |...x...| +[d05 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6f6e0 principal evaluation succeeds for identity 0 +[d06 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a6f6e0 gate 1598907069592125300 evaluation succeeds +[d07 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[d08 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[d09 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[d0a 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[d0b 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[d0c 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" lastAliveTS: 1598907045014135600, 23 but got ts: inc_num:1598907045014135600 seq_num:21 +[d0d 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d0e 08-31 20:51:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d0f 08-31 20:51:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d10 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d11 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[d12 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[d13 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d14 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[d15 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d16 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[d17 08-31 20:51:09.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d18 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +[d19 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +[d1a 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d1b 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d1c 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d1d 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[d1e 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[d1f 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[d20 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[d21 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[d22 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[d23 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94a80 gate 1598907069764221600 evaluation starts +[d24 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94a80 signed by 0 principal evaluation starts (used [false]) +[d25 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94a80 processing identity 0 with bytes of 115a4b0 +[d26 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94a80 principal matched by identity 0 +[d27 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[d28 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[d29 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94a80 principal evaluation succeeds for identity 0 +[d2a 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a94a80 gate 1598907069764221600 evaluation succeeds +[d2b 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[d2c 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[d2d 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[d2e 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[d2f 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[d30 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[d31 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d32 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d33 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[d34 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[d35 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[d36 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[d37 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[d38 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[d39 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab4370 gate 1598907069765653500 evaluation starts +[d3a 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab4370 signed by 0 principal evaluation starts (used [false]) +[d3b 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab4370 processing identity 0 with bytes of 115a4b0 +[d3c 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab4370 principal matched by identity 0 +[d3d 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[d3e 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[d3f 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab4370 principal evaluation succeeds for identity 0 +[d40 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ab4370 gate 1598907069765653500 evaluation succeeds +[d41 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[d42 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[d43 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d44 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d45 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[d46 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d47 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d48 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[d49 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[d4a 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d4b 08-31 20:51:09.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[d4c 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[d4d 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[d4e 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d4f 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +[d50 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[d51 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[d52 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[d53 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[d54 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d55 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d56 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[d57 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[d58 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[d59 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[d5a 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[d5b 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[d5c 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae04f0 gate 1598907069779399800 evaluation starts +[d5d 08-31 20:51:09.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae04f0 signed by 0 principal evaluation starts (used [false]) +[d5e 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae04f0 processing identity 0 with bytes of 115a4b0 +[d5f 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae04f0 principal matched by identity 0 +[d60 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[d61 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[d62 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae04f0 principal evaluation succeeds for identity 0 +[d63 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae04f0 gate 1598907069779399800 evaluation succeeds +[d64 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[d65 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[d66 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[d67 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[d68 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d69 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[d6a 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d6b 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d6c 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d6d 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[d6e 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[d6f 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[d70 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[d71 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[d72 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[d73 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1940 gate 1598907069783987200 evaluation starts +[d74 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1940 signed by 0 principal evaluation starts (used [false]) +[d75 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1940 processing identity 0 with bytes of 115a4b0 +[d76 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1940 principal matched by identity 0 +[d77 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[d78 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[d79 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1940 principal evaluation succeeds for identity 0 +[d7a 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ae1940 gate 1598907069783987200 evaluation succeeds +[d7b 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[d7c 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[d7d 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[d7e 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[d7f 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[d80 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[d81 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[d82 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[d83 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d84 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d85 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[d86 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[d87 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[d88 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[d89 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[d8a 08-31 20:51:09.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[d8b 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afb920 gate 1598907069790222300 evaluation starts +[d8c 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afb920 signed by 0 principal evaluation starts (used [false]) +[d8d 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afb920 processing identity 0 with bytes of 115a4b0 +[d8e 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afb920 principal matched by identity 0 +[d8f 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[d90 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[d91 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afb920 principal evaluation succeeds for identity 0 +[d92 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003afb920 gate 1598907069790222300 evaluation succeeds +[d93 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[d94 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[d95 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[d96 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[d97 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d98 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[d99 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[d9a 08-31 20:51:09.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[d9b 08-31 20:51:10.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +[d9c 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +[d9d 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 51 bytes, Signature: 0 bytes +[d9e 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[d9f 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[da0 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[da1 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[da2 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[da3 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[da4 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[da5 08-31 20:51:10.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[da6 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[da7 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[da8 08-31 20:51:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[da9 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[daa 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dab 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dac 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dad 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[dae 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[daf 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[db0 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[db1 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[db2 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[db3 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[db4 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[db5 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b30040 gate 1598907070046567700 evaluation starts +[db6 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b30040 signed by 0 principal evaluation starts (used [false]) +[db7 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b30040 processing identity 0 with bytes of 115a4b0 +[db8 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b30040 principal matched by identity 0 +[db9 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 8f ca 88 75 8b 7c 36 a5 18 4b 1c 19 7c 3b 5a |....u.|6..K..|;Z| +00000010 a7 b0 45 ab e4 20 b7 46 39 04 47 b6 1e 2e fb 8b |..E.. .F9.G.....| +[dba 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef 03 81 18 c8 42 fb f5 0c b9 92 |0E.!......B.....| +00000010 12 50 72 ef 20 07 76 b4 f9 17 57 62 57 a6 33 4d |.Pr. .v...WbW.3M| +00000020 4a b2 ef 50 9d 02 20 6b 3f 0c 5d e8 27 04 4c 8a |J..P.. k?.].'.L.| +00000030 ee 77 82 93 fc 33 2b 69 d0 d1 8c 09 0f 43 f4 28 |.w...3+i.....C.(| +00000040 5b 4d 29 44 01 01 0b |[M)D...| +[dbb 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b30040 principal evaluation succeeds for identity 0 +[dbc 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b30040 gate 1598907070046567700 evaluation succeeds +[dbd 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[dbe 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[dbf 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[dc0 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[dc1 08-31 20:51:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dc2 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dc3 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dc4 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[dc5 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[dc6 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[dc7 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[dc8 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dc9 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dca 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dcb 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dcc 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dcd 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dce 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dcf 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dd0 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dd1 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dd2 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dd3 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dd4 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[dd5 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dd6 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dd7 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[dd8 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dd9 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dda 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[ddb 08-31 20:51:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ddc 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[ddd 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[dde 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ddf 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[de0 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[de1 08-31 20:51:10.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[de2 08-31 20:51:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +[de3 08-31 20:51:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_req: , Envelope: 50 bytes, Signature: 0 bytes +[de4 08-31 20:51:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[de5 08-31 20:51:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending 1 IDENTITY_MSG items to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[de6 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[de7 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[de8 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[de9 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[dea 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 68 91 20 92 8e 48 a6 b6 19 57 df 95 3d 88 3d e5 |h. ..H...W..=.=.| +00000010 66 b4 0b 81 d5 85 0b e6 77 2d 0e b6 d4 68 63 44 |f.......w-...hcD| +[deb 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b4 c6 d4 3b 78 e3 47 4a 19 13 74 |0E.!....;x.GJ..t| +00000010 dd fe ae e6 cb b5 19 c9 92 3e e4 18 a0 b7 e7 5d |.........>.....]| +00000020 5d 0f 89 3e 4f 02 20 51 46 80 04 71 34 63 ef 88 |]..>O. QF..q4c..| +00000030 94 e4 49 d8 a3 f7 16 c1 4d 18 80 30 f4 8e f8 ef |..I.....M..0....| +00000040 3e da 85 85 b9 2a 3a |>....*:| +[dec 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[ded 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[dee 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[def 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[df0 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[df1 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[df2 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[df3 08-31 20:51:10.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[df4 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[df5 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[df6 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[df7 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[df8 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[df9 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dfa 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dfb 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[dfc 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[dfd 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[dfe 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[dff 08-31 20:51:10.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e00 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[e01 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e02 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e03 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e04 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e05 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e06 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e07 08-31 20:51:10.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e08 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e09 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e0a 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e0b 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e0c 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[e0d 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e0e 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[e0f 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[e10 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[e11 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[e12 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[e13 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[e14 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b11ce0 gate 1598907070479412600 evaluation starts +[e15 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b11ce0 signed by 0 principal evaluation starts (used [false]) +[e16 08-31 20:51:10.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b11ce0 processing identity 0 with bytes of 115a4b0 +[e17 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b11ce0 principal matched by identity 0 +[e18 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 95 5e 83 6c 57 7a f0 82 e6 4d 59 21 74 46 ca |..^.lWz...MY!tF.| +00000010 85 f7 1a 34 5a 8f 38 60 46 51 d8 a4 fe 6a 94 35 |...4Z.8`FQ...j.5| +[e19 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ae 8c 8c 80 ad 9c 55 38 8c a4 b4 |0E.!.......U8...| +00000010 fd db 68 47 c5 5c a3 3a 2e 03 08 73 79 90 ff 63 |..hG.\.:...sy..c| +00000020 37 58 62 04 e5 02 20 45 70 6e 12 cc a2 f7 ae 91 |7Xb... Epn......| +00000030 c4 e6 b4 9d b4 c8 5d 1a 07 90 5f fd 72 2d 3b d9 |......]..._.r-;.| +00000040 db 49 3c 1c c6 f5 d4 |.I<....| +[e1a 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b11ce0 principal evaluation succeeds for identity 0 +[e1b 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b11ce0 gate 1598907070479412600 evaluation succeeds +[e1c 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[e1d 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[e1e 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[e1f 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[e20 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e21 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[e22 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[e23 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[e24 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[e25 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e26 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e27 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e28 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e29 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e2a 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e2b 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e2c 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e2d 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e2e 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e2f 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[e30 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e31 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[e32 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e33 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e34 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e35 08-31 20:51:10.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e36 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e37 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e38 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e39 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e3a 08-31 20:51:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e3b 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[e3c 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[e3d 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[e3e 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e3f 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e40 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e41 08-31 20:51:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e42 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[e43 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161015 +[e44 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 05BAFE89F027887E5B8E762A4DCD4FCC8ED6A9E0D0F15737F2B5E08AEE5D9BC6 +[e45 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[e46 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[e47 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[e48 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[e49 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e4a 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e4b 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e4c 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[e4d 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[e4e 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e4f 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[e50 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e52 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e51 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e53 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e54 08-31 20:51:10.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[e55 08-31 20:51:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e56 08-31 20:51:12.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[e57 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[e58 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[e59 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e5a 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e5b 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e5c 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e5d 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e5e 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e5f 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[e60 08-31 20:51:13.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e61 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[e62 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[e63 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e64 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[e65 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[e66 08-31 20:51:13.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e67 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[e68 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[e69 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[e6a 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[e6b 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[e6c 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[e6d 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be2b50 gate 1598907073030229100 evaluation starts +[e6e 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be2b50 signed by 0 principal evaluation starts (used [false]) +[e6f 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be2b50 processing identity 0 with bytes of 115a4b0 +[e70 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be2b50 principal matched by identity 0 +[e71 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 62 52 2f a0 7a a2 5f f5 b0 4e 19 86 d1 11 1b |.bR/.z._..N.....| +00000010 46 16 b9 bb 1a 0a 30 86 a8 1a 6d fd a4 fd 6c 81 |F.....0...m...l.| +[e72 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 f4 4b d8 b1 26 7a 12 19 fc 48 0f |0D. ".K..&z...H.| +00000010 23 96 b6 1c b0 4a 29 77 64 3c 44 db 5e d8 f8 29 |#....J)wd DEBU 0xc003be2b50 principal evaluation succeeds for identity 0 +[e74 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003be2b50 gate 1598907073030229100 evaluation succeeds +[e75 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[e76 08-31 20:51:13.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[e77 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[e78 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[e79 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[e7a 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[e7b 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[e7c 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[e7d 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[e7e 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e7f 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e80 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e81 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[e82 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e83 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e84 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e85 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[e86 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[e87 08-31 20:51:13.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e88 08-31 20:51:13.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\344\030\240\267\347]]\017\211>O\002 QF\200\004q4c\357\210\224\344I\330\243\367\026\301M\030\2000\364\216\370\357>\332\205\205\271*:" > alive: alive: +[e89 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[e8a 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[e8b 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[e8c 08-31 20:51:13.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e8d 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[e8e 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e8f 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[e90 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[e91 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 d9 6b 09 8c aa 7e bd ab 1a a7 55 c5 2b 89 51 |3.k...~....U.+.Q| +00000010 7e 5f 9c 3d 57 20 a0 1a 04 81 ec 7e b2 8a 7b b9 |~_.=W .....~..{.| +[e92 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 e2 5d 94 fc ae 8f 76 e8 23 1c b9 |0D. y.]....v.#..| +00000010 d9 60 be 1f 03 e6 e7 c3 47 91 9b 77 b9 3b df cb |.`......G..w.;..| +00000020 7d a7 69 90 02 20 2e 72 62 ff 22 9f 3d dd 2e 9c |}.i.. .rb.".=...| +00000030 d9 97 80 77 23 79 e2 32 f9 1f 00 1c 06 55 fb ac |...w#y.2.....U..| +00000040 cd ca ca 0b bb f5 |......| +[e93 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[e94 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a 19 7e 9a 8d 2b 03 8c 58 95 61 2f |0D. :.~..+..X.a/| +00000010 66 6e 76 92 d8 ac fd 2b 7d 67 3b 42 4d 3a 57 26 |fnv....+}g;BM:W&| +00000020 a6 e1 27 7c 02 20 00 f0 b7 c6 02 58 cc 21 34 88 |..'|. .....X.!4.| +00000030 39 39 be 72 fa 1d 0e ab 04 ac 8d 65 14 a9 38 ec |99.r.......e..8.| +00000040 16 b5 9e d4 a2 8a |......| +[e95 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[e96 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[e97 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[e98 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[e99 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[e9a 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e9b 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e9c 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[e9d 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[e9e 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[e9f 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ea0 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[ea1 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[ea2 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[ea3 08-31 20:51:13.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ea4 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[ea5 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[ea6 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[ea7 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ea8 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ea9 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[eaa 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[eab 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[eac 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ead 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[eae 08-31 20:51:13.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[eaf 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[eb0 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[eb1 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[eb2 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[eb3 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[eb4 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[eb5 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[eb6 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[eb7 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[eb8 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[eb9 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[eba 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[ebb 08-31 20:51:13.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ab90 gate 1598907073489952000 evaluation starts +[ebc 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ab90 signed by 0 principal evaluation starts (used [false]) +[ebd 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ab90 processing identity 0 with bytes of 115a4b0 +[ebe 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ab90 principal matched by identity 0 +[ebf 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 d6 ed 84 b2 eb d3 92 e8 ad 8a a9 48 e8 44 42 |............H.DB| +00000010 4e 4d db 72 61 e4 55 ce ce e0 93 dd 0a 6c bf 8b |NM.ra.U......l..| +[ec0 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 6f e0 4e 37 ca de e7 13 97 27 e9 |0D. .o.N7.....'.| +00000010 a8 ec 75 e2 19 aa f6 5d 81 00 bb ea e6 d9 d3 81 |..u....]........| +00000020 82 fe df b9 02 20 53 53 53 3a 2f 80 e0 0b 20 c9 |..... SSS:/... .| +00000030 45 9b 9f 22 f0 43 60 a0 71 76 ec da db 98 b8 53 |E..".C`.qv.....S| +00000040 a0 60 9b 29 94 3c |.`.).<| +[ec1 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ab90 principal evaluation succeeds for identity 0 +[ec2 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c3ab90 gate 1598907073489952000 evaluation succeeds +[ec3 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[ec4 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[ec5 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[ec6 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[ec7 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[ec8 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[ec9 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[eca 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[ecb 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[ecc 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ecd 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ece 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[ecf 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ed0 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ed1 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ed2 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[ed3 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[ed4 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[ed5 08-31 20:51:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ed6 08-31 20:51:13.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ed7 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[ed8 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[ed9 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[eda 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[edb 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[edc 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[edd 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[ede 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[edf 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[ee0 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ee1 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[ee2 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ee3 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[ee4 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[ee5 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ee6 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[ee7 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[ee8 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[ee9 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[eea 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[eeb 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[eec 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[eed 08-31 20:51:13.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[eee 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[eef 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161016 +[ef0 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 427B4B5E5C7DFC0EFF8C54B1230CCE272A0260E1F129D1A59EF3B6CB3B47840B +[ef1 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[ef2 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[ef3 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[ef4 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[ef5 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ef6 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[ef7 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ef8 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[ef9 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[efa 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[efb 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[efc 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[efd 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[efe 08-31 20:51:13.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[eff 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[f00 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[f01 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f02 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[f03 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[f04 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f05 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[f06 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[f07 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[f08 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[f09 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[f0a 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[f0b 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c82dd0 gate 1598907073574253300 evaluation starts +[f0c 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c82dd0 signed by 0 principal evaluation starts (used [false]) +[f0d 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c82dd0 processing identity 0 with bytes of 115a4b0 +[f0e 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c82dd0 principal matched by identity 0 +[f0f 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 d6 ed 84 b2 eb d3 92 e8 ad 8a a9 48 e8 44 42 |............H.DB| +00000010 4e 4d db 72 61 e4 55 ce ce e0 93 dd 0a 6c bf 8b |NM.ra.U......l..| +[f10 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 6f e0 4e 37 ca de e7 13 97 27 e9 |0D. .o.N7.....'.| +00000010 a8 ec 75 e2 19 aa f6 5d 81 00 bb ea e6 d9 d3 81 |..u....]........| +00000020 82 fe df b9 02 20 53 53 53 3a 2f 80 e0 0b 20 c9 |..... SSS:/... .| +00000030 45 9b 9f 22 f0 43 60 a0 71 76 ec da db 98 b8 53 |E..".C`.qv.....S| +00000040 a0 60 9b 29 94 3c |.`.).<| +[f11 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c82dd0 principal evaluation succeeds for identity 0 +[f12 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c82dd0 gate 1598907073574253300 evaluation succeeds +[f13 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[f14 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[f15 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[f16 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[f17 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[f18 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f19 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[f1a 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 7b 4b 5e 5c 7d fc 0e ff 8c 54 b1 23 0c ce 27 |B{K^\}....T.#..'| +00000010 2a 02 60 e1 f1 29 d1 a5 9e f3 b6 cb 3b 47 84 0b |*.`..)......;G..| +[f1b 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d ca 98 86 2f 16 ad de 8b a3 52 01 |0D. ].../.....R.| +00000010 1e 50 64 87 e8 df f8 f1 f2 81 c1 91 16 ca 28 21 |.Pd...........(!| +00000020 e9 ce a8 40 02 20 60 43 80 ab 5e 48 0a c4 ba 20 |...@. `C..^H... | +00000030 c1 61 7e f2 86 b1 92 f7 94 f4 97 3f fc e9 34 9e |.a~........?..4.| +00000040 7c bf f1 d1 ce 6b ||....k| +[f1c 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[f1d 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[f1e 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[f1f 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f20 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[f21 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 d9 6b 09 8c aa 7e bd ab 1a a7 55 c5 2b 89 51 |3.k...~....U.+.Q| +00000010 7e 5f 9c 3d 57 20 a0 1a 04 81 ec 7e b2 8a 7b b9 |~_.=W .....~..{.| +[f22 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 e2 5d 94 fc ae 8f 76 e8 23 1c b9 |0D. y.]....v.#..| +00000010 d9 60 be 1f 03 e6 e7 c3 47 91 9b 77 b9 3b df cb |.`......G..w.;..| +00000020 7d a7 69 90 02 20 2e 72 62 ff 22 9f 3d dd 2e 9c |}.i.. .rb.".=...| +00000030 d9 97 80 77 23 79 e2 32 f9 1f 00 1c 06 55 fb ac |...w#y.2.....U..| +00000040 cd ca ca 0b bb f5 |......| +[f23 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[f24 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f25 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f26 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[f27 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f28 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[f29 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 7b 4b 5e 5c 7d fc 0e ff 8c 54 b1 23 0c ce 27 |B{K^\}....T.#..'| +00000010 2a 02 60 e1 f1 29 d1 a5 9e f3 b6 cb 3b 47 84 0b |*.`..)......;G..| +[f2a 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d ca 98 86 2f 16 ad de 8b a3 52 01 |0D. ].../.....R.| +00000010 1e 50 64 87 e8 df f8 f1 f2 81 c1 91 16 ca 28 21 |.Pd...........(!| +00000020 e9 ce a8 40 02 20 60 43 80 ab 5e 48 0a c4 ba 20 |...@. `C..^H... | +00000030 c1 61 7e f2 86 b1 92 f7 94 f4 97 3f fc e9 34 9e |.a~........?..4.| +00000040 7c bf f1 d1 ce 6b ||....k| +[f2b 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[f2c 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 90 33 fe 3d 42 5d 49 1e f6 11 de |0D. ..3.=B]I....| +00000010 10 89 7f 5c c6 50 e5 71 ec 2f 96 98 94 2c 3f 5d |...\.P.q./...,?]| +00000020 80 20 3b 48 02 20 5f 83 03 99 57 98 6d 69 b6 20 |. ;H. _...W.mi. | +00000030 ab a9 28 33 93 6a 27 83 e0 4d 4b 97 b7 d5 f9 a3 |..(3.j'..MK.....| +00000040 92 43 bc 77 c0 26 |.C.w.&| +[f2d 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[f2e 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[f2f 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f30 08-31 20:51:13.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f31 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[f32 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[f33 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f34 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[f35 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[f36 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 7b 4b 5e 5c 7d fc 0e ff 8c 54 b1 23 0c ce 27 |B{K^\}....T.#..'| +00000010 2a 02 60 e1 f1 29 d1 a5 9e f3 b6 cb 3b 47 84 0b |*.`..)......;G..| +[f37 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5d ca 98 86 2f 16 ad de 8b a3 52 01 |0D. ].../.....R.| +00000010 1e 50 64 87 e8 df f8 f1 f2 81 c1 91 16 ca 28 21 |.Pd...........(!| +00000020 e9 ce a8 40 02 20 60 43 80 ab 5e 48 0a c4 ba 20 |...@. `C..^H... | +00000030 c1 61 7e f2 86 b1 92 f7 94 f4 97 3f fc e9 34 9e |.a~........?..4.| +00000040 7c bf f1 d1 ce 6b ||....k| +[f38 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[f39 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[f3a 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f3b 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[f3c 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 33 d9 6b 09 8c aa 7e bd ab 1a a7 55 c5 2b 89 51 |3.k...~....U.+.Q| +00000010 7e 5f 9c 3d 57 20 a0 1a 04 81 ec 7e b2 8a 7b b9 |~_.=W .....~..{.| +[f3d 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 79 e2 5d 94 fc ae 8f 76 e8 23 1c b9 |0D. y.]....v.#..| +00000010 d9 60 be 1f 03 e6 e7 c3 47 91 9b 77 b9 3b df cb |.`......G..w.;..| +00000020 7d a7 69 90 02 20 2e 72 62 ff 22 9f 3d dd 2e 9c |}.i.. .rb.".=...| +00000030 d9 97 80 77 23 79 e2 32 f9 1f 00 1c 06 55 fb ac |...w#y.2.....U..| +00000040 cd ca ca 0b bb f5 |......| +[f3e 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[f3f 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f40 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[f41 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f42 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[f43 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[f44 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[f45 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[f46 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[f47 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[f48 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb9bf0 gate 1598907073587787500 evaluation starts +[f49 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb9bf0 signed by 0 principal evaluation starts (used [false]) +[f4a 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb9bf0 processing identity 0 with bytes of 115a4b0 +[f4b 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb9bf0 principal matched by identity 0 +[f4c 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 62 52 2f a0 7a a2 5f f5 b0 4e 19 86 d1 11 1b |.bR/.z._..N.....| +00000010 46 16 b9 bb 1a 0a 30 86 a8 1a 6d fd a4 fd 6c 81 |F.....0...m...l.| +[f4d 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 22 f4 4b d8 b1 26 7a 12 19 fc 48 0f |0D. ".K..&z...H.| +00000010 23 96 b6 1c b0 4a 29 77 64 3c 44 db 5e d8 f8 29 |#....J)wd DEBU 0xc003cb9bf0 principal evaluation succeeds for identity 0 +[f4f 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cb9bf0 gate 1598907073587787500 evaluation succeeds +[f50 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[f51 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[f52 08-31 20:51:13.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[f53 08-31 20:51:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[f54 08-31 20:51:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[f55 08-31 20:51:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f56 08-31 20:51:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f57 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f58 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f59 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[f5a 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[f5b 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f5c 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[f5d 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f5e 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[f5f 08-31 20:51:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f60 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 3 items, Envelope: 550 bytes, Signature: 0 bytes +[f61 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[f62 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[f63 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[f64 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[f65 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f66 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f67 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[f68 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[f69 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[f6a 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[f6b 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[f6c 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[f6d 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf0480 gate 1598907073768126200 evaluation starts +[f6e 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf0480 signed by 0 principal evaluation starts (used [false]) +[f6f 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf0480 processing identity 0 with bytes of 115a4b0 +[f70 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf0480 principal matched by identity 0 +[f71 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[f72 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[f73 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf0480 principal evaluation succeeds for identity 0 +[f74 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf0480 gate 1598907073768126200 evaluation succeeds +[f75 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[f76 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[f77 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[f78 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[f79 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[f7a 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[f7b 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[f7c 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f7d 08-31 20:51:13.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f7e 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f7f 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[f80 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[f81 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[f82 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[f83 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[f84 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[f85 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf19e0 gate 1598907073770569700 evaluation starts +[f86 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf19e0 signed by 0 principal evaluation starts (used [false]) +[f87 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf19e0 processing identity 0 with bytes of 115a4b0 +[f88 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf19e0 principal matched by identity 0 +[f89 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[f8a 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[f8b 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf19e0 principal evaluation succeeds for identity 0 +[f8c 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cf19e0 gate 1598907073770569700 evaluation succeeds +[f8d 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[f8e 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[f8f 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[f90 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[f91 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[f92 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[f93 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f94 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f95 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[f96 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[f97 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[f98 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[f99 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[f9a 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f9b 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f9c 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[f9d 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f9e 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[f9f 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[fa0 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[fa1 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fa2 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[fa3 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[fa4 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d092d0 gate 1598907073773898500 evaluation starts +[fa5 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d092d0 signed by 0 principal evaluation starts (used [false]) +[fa6 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d092d0 processing identity 0 with bytes of 115a4b0 +[fa7 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d092d0 principal matched by identity 0 +[fa8 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[fa9 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[faa 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d092d0 principal evaluation succeeds for identity 0 +[fab 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d092d0 gate 1598907073773898500 evaluation succeeds +[fac 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[fad 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[fae 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[faf 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[fb0 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[fb1 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[fb2 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fb3 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[fb4 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fb5 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fb6 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fb7 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[fb8 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[fb9 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[fba 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[fbb 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[fbc 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[fbd 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34e10 gate 1598907073776263600 evaluation starts +[fbe 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34e10 signed by 0 principal evaluation starts (used [false]) +[fbf 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34e10 processing identity 0 with bytes of 115a4b0 +[fc0 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34e10 principal matched by identity 0 +[fc1 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[fc2 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[fc3 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34e10 principal evaluation succeeds for identity 0 +[fc4 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d34e10 gate 1598907073776263600 evaluation succeeds +[fc5 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[fc6 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[fc7 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[fc8 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[fc9 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[fca 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[fcb 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[fcc 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[fcd 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fce 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fcf 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[fd0 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[fd1 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[fd2 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[fd3 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[fd4 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[fd5 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4edf0 gate 1598907073778261600 evaluation starts +[fd6 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4edf0 signed by 0 principal evaluation starts (used [false]) +[fd7 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4edf0 processing identity 0 with bytes of 115a4b0 +[fd8 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4edf0 principal matched by identity 0 +[fd9 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[fda 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[fdb 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4edf0 principal evaluation succeeds for identity 0 +[fdc 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d4edf0 gate 1598907073778261600 evaluation succeeds +[fdd 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[fde 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[fdf 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[fe0 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[fe1 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fe2 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[fe3 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[fe4 08-31 20:51:13.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[fe5 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[fe6 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[fe7 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[fe8 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610041801 +[fe9 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 65E08FD1E24ED6E36AE854D0A3BB1E5BA9F7FB13C1EE557441806586FFC9E822 +[fea 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[feb 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fec 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fed 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fee 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fef 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[ff0 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ff1 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ff2 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[ff3 08-31 20:51:13.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ff4 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[ff5 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ff6 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[ff7 08-31 20:51:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ff8 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[ff9 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[ffa 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[ffb 08-31 20:51:14.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[ffc 08-31 20:51:14.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[ffd 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[ffe 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[fff 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1000 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1001 08-31 20:51:14.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1002 08-31 20:51:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1003 08-31 20:51:14.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1004 08-31 20:51:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1005 08-31 20:51:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1006 08-31 20:51:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1007 08-31 20:51:14.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1008 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1009 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[100a 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[100b 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[100c 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[100d 08-31 20:51:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[100e 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[100f 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1010 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1011 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1012 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1013 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1014 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75890 gate 1598907075040390000 evaluation starts +[1015 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75890 signed by 0 principal evaluation starts (used [false]) +[1016 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75890 processing identity 0 with bytes of 115a4b0 +[1017 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75890 principal matched by identity 0 +[1018 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 c6 fb 04 b1 1e 80 82 72 6e bf d9 28 84 cf 03 |........rn..(...| +00000010 0e 80 24 0c ba b4 14 1a 78 3f 46 4e 70 66 38 e5 |..$.....x?FNpf8.| +[1019 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7d f5 02 25 29 ca 0d 64 ab d7 23 cc |0D. }..%)..d..#.| +00000010 ca 13 e4 4a bd 7f f8 de 48 ca 70 22 62 6c 6b 06 |...J....H.p"blk.| +00000020 02 dc 34 52 02 20 0e cd 6e 16 69 05 64 06 a6 4e |..4R. ..n.i.d..N| +00000030 af 00 35 af 03 26 e1 bb 33 ff 38 84 c0 00 53 37 |..5..&..3.8...S7| +00000040 86 f9 8a 35 5d a0 |...5].| +[101a 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75890 principal evaluation succeeds for identity 0 +[101b 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d75890 gate 1598907075040390000 evaluation succeeds +[101c 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[101d 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[101e 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[101f 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1020 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1021 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1022 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1023 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1024 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1025 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1026 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1027 08-31 20:51:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1028 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1029 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[102a 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[102b 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[102c 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[102d 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[102e 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[102f 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1030 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1031 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1032 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1033 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1034 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1035 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1036 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1037 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1038 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1039 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[103a 08-31 20:51:15.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[103b 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[103c 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[103d 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[103e 08-31 20:51:15.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[103f 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1040 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1041 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1042 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1043 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9d 74 b0 06 ce c2 7f fa 34 95 97 c9 2a 7d 70 83 |.t......4...*}p.| +00000010 79 ff fb 88 19 6d b1 4c bb b7 43 c7 ef ae 4d f1 |y....m.L..C...M.| +[1044 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 68 3b 65 7b 43 94 98 d4 c8 84 d0 34 |0D. h;e{C......4| +00000010 be 0c 38 1e 49 55 8b 2d e7 57 78 c4 72 4e c7 dd |..8.IU.-.Wx.rN..| +00000020 2a 04 1e d7 02 20 3a 9c a0 d5 4e cc 45 3e 65 8b |*.... :...N.E>e.| +00000030 8b 16 ac f4 52 05 d2 6f e7 64 58 78 8c 04 5e a5 |....R..o.dXx..^.| +00000040 3a d1 88 c7 52 c1 |:...R.| +[1045 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1046 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1047 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1048 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1049 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[104a 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[104b 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[104c 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[104d 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[104e 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[104f 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1050 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1051 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1052 08-31 20:51:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1053 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1054 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1055 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1056 08-31 20:51:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1057 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1058 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1059 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[105a 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[105b 08-31 20:51:15.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[105c 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[105d 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[105e 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[105f 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1060 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1061 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1062 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1063 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1064 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1065 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1066 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1067 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1068 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da39c0 gate 1598907075472798600 evaluation starts +[1069 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da39c0 signed by 0 principal evaluation starts (used [false]) +[106a 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da39c0 processing identity 0 with bytes of 115a4b0 +[106b 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da39c0 principal matched by identity 0 +[106c 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 18 1f 34 d8 0a 1b 64 bf 99 6e d1 d9 23 93 8d 9b |..4...d..n..#...| +00000010 2f 5d 01 fb 17 fd 46 02 76 f8 40 fa 52 a2 9e fe |/]....F.v.@.R...| +[106d 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ca 81 aa 57 a4 fa 87 e8 c8 7d 0e |0E.!....W.....}.| +00000010 54 95 10 9a 24 ac 12 47 e9 3e 6a 70 ac 54 ab 5d |T...$..G.>jp.T.]| +00000020 98 31 54 f8 ef 02 20 5b c0 d9 0f 61 bc 51 16 75 |.1T... [...a.Q.u| +00000030 99 0b 98 d5 e0 e9 7e 54 47 47 0e 91 c2 df 38 ef |......~TGG....8.| +00000040 75 87 e9 bc 32 a7 55 |u...2.U| +[106e 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da39c0 principal evaluation succeeds for identity 0 +[106f 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003da39c0 gate 1598907075472798600 evaluation succeeds +[1070 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1071 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1072 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1073 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1074 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1075 08-31 20:51:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1076 08-31 20:51:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1077 08-31 20:51:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1078 08-31 20:51:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1079 08-31 20:51:15.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[107a 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[107b 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[107c 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[107d 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[107e 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[107f 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1080 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1081 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1082 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1083 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1084 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1085 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1086 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1087 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1088 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1089 08-31 20:51:15.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[108a 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[108b 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[108c 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[108d 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[108e 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[108f 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1090 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1091 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1092 08-31 20:51:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1093 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1094 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161017 +[1095 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4D6C7F1B65579ABCC3E323196654D90F5E15810A9A123A31B081257F881649A3 +[1096 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1097 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1098 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1099 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[109a 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[109b 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[109c 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +[109d 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[109f 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[10a0 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10a1 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[10a2 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10a3 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[109e 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[10a4 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10a5 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10a6 08-31 20:51:15.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10a7 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10a8 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10a9 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10aa 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[10ab 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 6c 7f 1b 65 57 9a bc c3 e3 23 19 66 54 d9 0f |Ml..eW....#.fT..| +00000010 5e 15 81 0a 9a 12 3a 31 b0 81 25 7f 88 16 49 a3 |^.....:1..%...I.| +[10ac 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 be 25 48 43 49 2c 8d 94 5c ca d9 |0E.!..%HCI,..\..| +00000010 3a a2 94 06 4c d9 7c 97 55 ad fa e9 b8 31 a4 08 |:...L.|.U....1..| +00000020 30 fb 43 01 97 02 20 6b 9d d4 3b c4 d7 b5 43 4d |0.C... k..;...CM| +00000030 f2 ff 5d 8a d6 c1 f1 55 a4 0d 8f 93 8c de 1b 1f |..]....U........| +00000040 f8 4b de 15 20 ff 3a |.K.. .:| +[10ad 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10ae 08-31 20:51:15.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10af 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[10b0 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[10b1 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[10b2 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10b3 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10b4 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10b5 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10b6 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10b7 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10b8 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[10b9 08-31 20:51:17.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10ba 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[10bb 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[10bc 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10bd 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[10be 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[10bf 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10c0 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[10c1 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[10c2 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[10c3 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[10c4 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[10c5 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[10c6 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27f80 gate 1598907077033514500 evaluation starts +[10c7 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27f80 signed by 0 principal evaluation starts (used [false]) +[10c8 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27f80 processing identity 0 with bytes of 115a4b0 +[10c9 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27f80 principal matched by identity 0 +[10ca 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 4f 62 6e f8 51 b2 b9 7a 89 a1 94 93 43 19 a1 |tObn.Q..z....C..| +00000010 e1 30 a3 49 45 27 56 4c 01 81 42 14 62 f0 c4 bf |.0.IE'VL..B.b...| +[10cb 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 4c 56 6b dd 24 ae 93 da c4 0d |0E.!..LVk.$.....| +00000010 34 59 24 07 9d eb 5d d4 90 ae 99 d7 00 49 bd 50 |4Y$...]......I.P| +00000020 97 b1 3a eb 68 02 20 7c b3 d6 f6 1c cf 91 b2 30 |..:.h. |.......0| +00000030 b2 77 db bc bc 9f b5 b7 b2 42 30 82 2e d9 85 95 |.w.......B0.....| +00000040 b9 ce 81 9e 49 97 68 |....I.h| +[10cc 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27f80 principal evaluation succeeds for identity 0 +[10cd 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e27f80 gate 1598907077033514500 evaluation succeeds +[10ce 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[10cf 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[10d0 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[10d1 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[10d2 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[10d3 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[10d4 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[10d5 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[10d6 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[10d7 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10d8 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10d9 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10da 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[10db 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10dc 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10dd 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10de 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[10df 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[10e0 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10e1 08-31 20:51:17.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:e\213\213\026\254\364R\005\322o\347dXx\214\004^\245:\321\210\307R\301" > alive:jp\254T\253]\2301T\370\357\002 [\300\331\017a\274Q\026u\231\013\230\325\340\351~TGG\016\221\302\3378\357u\207\351\2742\247U" > alive: alive: +[10e2 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[10e3 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[10e4 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[10e5 08-31 20:51:17.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10e6 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\202J\341\206\345Rj\274\002 t\353\343\003H\222;\354\274C6,9W\215\360\361s\264\367\205\315\241\250\270\247\017\000yd\244\247" > > > , Envelope: 272 bytes, Signature: 0 bytes +[10e7 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10e8 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\202J\341\206\345Rj\274\002 t\353\343\003H\222;\354\274C6,9W\215\360\361s\264\367\205\315\241\250\270\247\017\000yd\244\247" > > > , Envelope: 272 bytes, Signature: 0 bytes +[10e9 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[10ea 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 7b 55 40 22 53 fb bd b2 ea 57 b6 c3 68 bf 11 |.{U@"S....W..h..| +00000010 b7 47 2f 6d 7f cd 9a 57 86 c2 3c 49 73 3d 5f d5 |.G/m...W.. DEBU Verify: sig = 00000000 30 45 02 21 00 8d 65 c2 3a e7 ad bd 89 c0 57 ec |0E.!..e.:.....W.| +00000010 3f 8c 8c db 68 8e 65 97 24 b6 db cb 05 11 40 b6 |?...h.e.$.....@.| +00000020 ac c0 db 55 9c 02 20 25 da 0e f6 bb 23 97 81 1d |...U.. %....#...| +00000030 de 28 62 07 23 09 5e 9e b8 af 62 cc 86 15 b4 83 |.(b.#.^...b.....| +00000040 4d e4 d5 c3 33 24 8f |M...3$.| +[10ec 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[10ed 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a3 55 81 71 5e 64 65 29 9b 22 83 |0E.!..U.q^de).".| +00000010 f8 74 9b b2 8c 0e 58 a3 23 22 30 d4 3e 82 4a e1 |.t....X.#"0.>.J.| +00000020 86 e5 52 6a bc 02 20 74 eb e3 03 48 92 3b ec bc |..Rj.. t...H.;..| +00000030 43 36 2c 39 57 8d f0 f1 73 b4 f7 85 cd a1 a8 b8 |C6,9W...s.......| +00000040 a7 0f 00 79 64 a4 a7 |...yd..| +[10ee 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[10ef 08-31 20:51:17.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[10f0 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[10f1 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[10f2 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[10f3 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10f4 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10f5 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10f6 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[10f7 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10f8 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[10f9 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +[10fa 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[10fb 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[10fc 08-31 20:51:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\202J\341\206\345Rj\274\002 t\353\343\003H\222;\354\274C6,9W\215\360\361s\264\367\205\315\241\250\270\247\017\000yd\244\247" > > alive: +[10fd 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[10fe 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[10ff 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1100 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1101 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1102 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1103 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1104 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1105 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1106 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[1107 08-31 20:51:17.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1108 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" > > , Envelope: 166 bytes, Signature: 0 bytes +[1109 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" > > , Envelope: 166 bytes, Signature: 0 bytes +[110a 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[110b 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" > > , Envelope: 166 bytes, Signature: 0 bytes +[110c 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[110d 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[110e 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[110f 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1110 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1111 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1112 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1113 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1114 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e77d20 gate 1598907077477382100 evaluation starts +[1115 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e77d20 signed by 0 principal evaluation starts (used [false]) +[1116 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e77d20 processing identity 0 with bytes of 115a4b0 +[1117 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e77d20 principal matched by identity 0 +[1118 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 a9 f7 2c a0 f6 b3 39 b4 40 60 70 02 0d 8d db |f..,...9.@`p....| +00000010 fa d7 ae 80 29 9c cd 1c 4a e0 65 7b 8e c0 ca 13 |....)...J.e{....| +[1119 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 5b cf fe d5 c5 4b c6 f2 a2 15 |0E.!..[....K....| +00000010 6b a2 72 5b 8b 94 46 8a 0a 7b 9d 5d 6f 89 e7 bf |k.r[..F..{.]o...| +00000020 8c cf 76 f6 7b 02 20 65 0e 52 94 55 59 f3 3e 78 |..v.{. e.R.UY.>x| +00000030 26 ea 4a 41 5e 47 da 63 17 44 ed 6f 7d cc 6f 57 |&.JA^G.c.D.o}.oW| +00000040 f0 81 92 96 a6 e0 6b |......k| +[111a 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e77d20 principal evaluation succeeds for identity 0 +[111b 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e77d20 gate 1598907077477382100 evaluation succeeds +[111c 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[111d 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[111e 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[111f 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1120 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1121 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1122 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1123 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1124 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1125 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1126 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1127 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1128 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[1129 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[112a 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[112b 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[112c 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +[112d 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:x&\352JA^G\332c\027D\355o}\314oW\360\201\222\226\246\340k" > alive: alive: +[112e 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[112f 08-31 20:51:17.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1130 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1131 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1132 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[1133 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1134 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[1135 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1136 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1137 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1138 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1139 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[113a 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[113b 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[113c 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[113d 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[113e 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[113f 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1140 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1141 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1142 08-31 20:51:17.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1143 08-31 20:51:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1144 08-31 20:51:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1145 08-31 20:51:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1146 08-31 20:51:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1147 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1148 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161018 +[1149 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D532C2FF639050FC8A0230EC418AE2122451BD9029CD37F0496207C3A4DB691F +[114a 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[114b 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[114c 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[114d 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[114e 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[114f 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[1150 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1151 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1152 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1153 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1154 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1155 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1156 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1157 08-31 20:51:17.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1158 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[1159 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[115a 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[115b 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[115c 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[115d 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 32 c2 ff 63 90 50 fc 8a 02 30 ec 41 8a e2 12 |.2..c.P...0.A...| +00000010 24 51 bd 90 29 cd 37 f0 49 62 07 c3 a4 db 69 1f |$Q..).7.Ib....i.| +[115e 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d af 77 90 ed aa a9 66 05 e0 0f |0E.!...w....f...| +00000010 fb c7 a9 89 84 a4 47 54 18 d6 44 61 7a d4 2a 80 |......GT..Daz.*.| +00000020 18 27 f0 9e 74 02 20 22 29 d3 31 f0 eb ac af 9b |.'..t. ").1.....| +00000030 e5 39 79 0a b9 f9 12 5e be 3b 52 d3 d5 c9 68 90 |.9y....^.;R...h.| +00000040 ee 6f fa 73 27 58 c7 |.o.s'X.| +[115f 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1160 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1161 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1162 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1163 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 7b 55 40 22 53 fb bd b2 ea 57 b6 c3 68 bf 11 |.{U@"S....W..h..| +00000010 b7 47 2f 6d 7f cd 9a 57 86 c2 3c 49 73 3d 5f d5 |.G/m...W.. DEBU Verify: sig = 00000000 30 45 02 21 00 8d 65 c2 3a e7 ad bd 89 c0 57 ec |0E.!..e.:.....W.| +00000010 3f 8c 8c db 68 8e 65 97 24 b6 db cb 05 11 40 b6 |?...h.e.$.....@.| +00000020 ac c0 db 55 9c 02 20 25 da 0e f6 bb 23 97 81 1d |...U.. %....#...| +00000030 de 28 62 07 23 09 5e 9e b8 af 62 cc 86 15 b4 83 |.(b.#.^...b.....| +00000040 4d e4 d5 c3 33 24 8f |M...3$.| +[1165 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1166 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1167 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1168 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1169 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[116a 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[116b 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[116c 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[116d 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[116e 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[116f 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eddc30 gate 1598907077562076200 evaluation starts +[1170 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eddc30 signed by 0 principal evaluation starts (used [false]) +[1171 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eddc30 processing identity 0 with bytes of 115a4b0 +[1172 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eddc30 principal matched by identity 0 +[1173 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 4f 62 6e f8 51 b2 b9 7a 89 a1 94 93 43 19 a1 |tObn.Q..z....C..| +00000010 e1 30 a3 49 45 27 56 4c 01 81 42 14 62 f0 c4 bf |.0.IE'VL..B.b...| +[1174 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 4c 56 6b dd 24 ae 93 da c4 0d |0E.!..LVk.$.....| +00000010 34 59 24 07 9d eb 5d d4 90 ae 99 d7 00 49 bd 50 |4Y$...]......I.P| +00000020 97 b1 3a eb 68 02 20 7c b3 d6 f6 1c cf 91 b2 30 |..:.h. |.......0| +00000030 b2 77 db bc bc 9f b5 b7 b2 42 30 82 2e d9 85 95 |.w.......B0.....| +00000040 b9 ce 81 9e 49 97 68 |....I.h| +[1175 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eddc30 principal evaluation succeeds for identity 0 +[1176 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003eddc30 gate 1598907077562076200 evaluation succeeds +[1177 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1178 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1179 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[117a 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[117b 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[117c 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[117d 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[117e 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[117f 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1180 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1181 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1182 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1183 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1184 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1185 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1186 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1187 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1188 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1189 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[118a 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec5530 gate 1598907077566026800 evaluation starts +[118b 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec5530 signed by 0 principal evaluation starts (used [false]) +[118c 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec5530 processing identity 0 with bytes of 115a4b0 +[118d 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec5530 principal matched by identity 0 +[118e 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 66 a9 f7 2c a0 f6 b3 39 b4 40 60 70 02 0d 8d db |f..,...9.@`p....| +00000010 fa d7 ae 80 29 9c cd 1c 4a e0 65 7b 8e c0 ca 13 |....)...J.e{....| +[118f 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 5b cf fe d5 c5 4b c6 f2 a2 15 |0E.!..[....K....| +00000010 6b a2 72 5b 8b 94 46 8a 0a 7b 9d 5d 6f 89 e7 bf |k.r[..F..{.]o...| +00000020 8c cf 76 f6 7b 02 20 65 0e 52 94 55 59 f3 3e 78 |..v.{. e.R.UY.>x| +00000030 26 ea 4a 41 5e 47 da 63 17 44 ed 6f 7d cc 6f 57 |&.JA^G.c.D.o}.oW| +00000040 f0 81 92 96 a6 e0 6b |......k| +[1190 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec5530 principal evaluation succeeds for identity 0 +[1191 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ec5530 gate 1598907077566026800 evaluation succeeds +[1192 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1193 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1194 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1195 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1196 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1197 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1198 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1199 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 32 c2 ff 63 90 50 fc 8a 02 30 ec 41 8a e2 12 |.2..c.P...0.A...| +00000010 24 51 bd 90 29 cd 37 f0 49 62 07 c3 a4 db 69 1f |$Q..).7.Ib....i.| +[119a 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d af 77 90 ed aa a9 66 05 e0 0f |0E.!...w....f...| +00000010 fb c7 a9 89 84 a4 47 54 18 d6 44 61 7a d4 2a 80 |......GT..Daz.*.| +00000020 18 27 f0 9e 74 02 20 22 29 d3 31 f0 eb ac af 9b |.'..t. ").1.....| +00000030 e5 39 79 0a b9 f9 12 5e be 3b 52 d3 d5 c9 68 90 |.9y....^.;R...h.| +00000040 ee 6f fa 73 27 58 c7 |.o.s'X.| +[119b 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[119c 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[119d 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[119e 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[119f 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 80 7b 55 40 22 53 fb bd b2 ea 57 b6 c3 68 bf 11 |.{U@"S....W..h..| +00000010 b7 47 2f 6d 7f cd 9a 57 86 c2 3c 49 73 3d 5f d5 |.G/m...W.. DEBU Verify: sig = 00000000 30 45 02 21 00 8d 65 c2 3a e7 ad bd 89 c0 57 ec |0E.!..e.:.....W.| +00000010 3f 8c 8c db 68 8e 65 97 24 b6 db cb 05 11 40 b6 |?...h.e.$.....@.| +00000020 ac c0 db 55 9c 02 20 25 da 0e f6 bb 23 97 81 1d |...U.. %....#...| +00000030 de 28 62 07 23 09 5e 9e b8 af 62 cc 86 15 b4 83 |.(b.#.^...b.....| +00000040 4d e4 d5 c3 33 24 8f |M...3$.| +[11a1 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[11a2 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11a3 08-31 20:51:17.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[11a4 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11a5 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[11a6 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11a7 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[11a8 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 32 c2 ff 63 90 50 fc 8a 02 30 ec 41 8a e2 12 |.2..c.P...0.A...| +00000010 24 51 bd 90 29 cd 37 f0 49 62 07 c3 a4 db 69 1f |$Q..).7.Ib....i.| +[11a9 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d af 77 90 ed aa a9 66 05 e0 0f |0E.!...w....f...| +00000010 fb c7 a9 89 84 a4 47 54 18 d6 44 61 7a d4 2a 80 |......GT..Daz.*.| +00000020 18 27 f0 9e 74 02 20 22 29 d3 31 f0 eb ac af 9b |.'..t. ").1.....| +00000030 e5 39 79 0a b9 f9 12 5e be 3b 52 d3 d5 c9 68 90 |.9y....^.;R...h.| +00000040 ee 6f fa 73 27 58 c7 |.o.s'X.| +[11aa 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[11ab 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 a6 6a 78 5c b3 e6 ac ad de 38 |0E.!...jx\.....8| +00000010 03 16 76 64 53 ff b5 6f 16 00 a6 ea 01 f5 64 53 |..vdS..o......dS| +00000020 28 6a 39 88 6a 02 20 27 fe 88 8d fc c0 74 4e 7d |(j9.j. '.....tN}| +00000030 15 7d 92 bf 45 ef f7 f2 b9 7d 99 91 16 89 4c 1e |.}..E....}....L.| +00000040 b9 d9 56 55 69 96 9c |..VUi..| +[11ac 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[11ad 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[11ae 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11af 08-31 20:51:17.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11b0 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11b1 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11b2 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[11b3 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[11b4 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11b5 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[11b6 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11b7 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[11b8 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11b9 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[11ba 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[11bb 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11bc 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11bd 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11be 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[11bf 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[11c0 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[11c1 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[11c2 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[11c3 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[11c4 08-31 20:51:17.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef7b90 gate 1598907077749966200 evaluation starts +[11c5 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef7b90 signed by 0 principal evaluation starts (used [false]) +[11c6 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef7b90 processing identity 0 with bytes of 115a4b0 +[11c7 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef7b90 principal matched by identity 0 +[11c8 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[11c9 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[11ca 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef7b90 principal evaluation succeeds for identity 0 +[11cb 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ef7b90 gate 1598907077749966200 evaluation succeeds +[11cc 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[11cd 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[11ce 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[11cf 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[11d0 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[11d1 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[11d2 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[11d3 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[11d4 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11d5 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11d6 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[11d7 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[11d8 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[11d9 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[11da 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[11db 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[11dc 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f43b70 gate 1598907077752146700 evaluation starts +[11dd 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f43b70 signed by 0 principal evaluation starts (used [false]) +[11de 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f43b70 processing identity 0 with bytes of 115a4b0 +[11df 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f43b70 principal matched by identity 0 +[11e0 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[11e1 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[11e2 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f43b70 principal evaluation succeeds for identity 0 +[11e3 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f43b70 gate 1598907077752146700 evaluation succeeds +[11e4 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[11e5 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[11e6 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[11e7 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[11e8 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[11e9 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[11ea 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[11eb 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11ec 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11ed 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[11ee 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[11ef 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[11f0 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[11f1 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[11f2 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[11f3 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[11f4 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5b0d0 gate 1598907077754765600 evaluation starts +[11f5 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5b0d0 signed by 0 principal evaluation starts (used [false]) +[11f6 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5b0d0 processing identity 0 with bytes of 115a4b0 +[11f7 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5b0d0 principal matched by identity 0 +[11f8 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[11f9 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[11fa 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5b0d0 principal evaluation succeeds for identity 0 +[11fb 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f5b0d0 gate 1598907077754765600 evaluation succeeds +[11fc 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[11fd 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[11fe 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[11ff 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1200 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[1201 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[1202 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1203 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1204 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1205 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1206 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1207 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1208 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1209 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[120a 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f7c9c0 gate 1598907077756437600 evaluation starts +[120b 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f7c9c0 signed by 0 principal evaluation starts (used [false]) +[120c 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f7c9c0 processing identity 0 with bytes of 115a4b0 +[120d 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f7c9c0 principal matched by identity 0 +[120e 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[120f 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[1210 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f7c9c0 principal evaluation succeeds for identity 0 +[1211 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f7c9c0 gate 1598907077756437600 evaluation succeeds +[1212 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1213 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1214 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1215 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1216 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[1217 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[1218 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1219 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[121a 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[121b 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[121c 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[121d 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[121e 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[121f 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1220 08-31 20:51:17.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1221 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1222 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1223 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1224 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1225 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1226 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1260 gate 1598907077760295500 evaluation starts +[1227 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1260 signed by 0 principal evaluation starts (used [false]) +[1228 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1260 processing identity 0 with bytes of 115a4b0 +[1229 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1260 principal matched by identity 0 +[122a 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[122b 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[122c 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1260 principal evaluation succeeds for identity 0 +[122d 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fa1260 gate 1598907077760295500 evaluation succeeds +[122e 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[122f 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1230 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1231 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1232 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1233 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1234 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1235 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1236 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1237 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1238 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1239 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[123a 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba460 gate 1598907077764745000 evaluation starts +[123b 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba460 signed by 0 principal evaluation starts (used [false]) +[123c 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba460 processing identity 0 with bytes of 115a4b0 +[123d 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba460 principal matched by identity 0 +[123e 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[123f 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[1240 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba460 principal evaluation succeeds for identity 0 +[1241 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fba460 gate 1598907077764745000 evaluation succeeds +[1242 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1243 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1244 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1245 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1246 08-31 20:51:17.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1247 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1248 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1249 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[124a 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[124b 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[124c 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[124d 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[124e 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[124f 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1250 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1251 08-31 20:51:17.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1252 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1253 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1254 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1255 08-31 20:51:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1256 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1257 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1258 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [2 1] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1259 08-31 20:51:18.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[125a 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[125b 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[125c 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[125d 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[125e 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[125f 08-31 20:51:18.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1260 08-31 20:51:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +[1261 08-31 20:51:18.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1262 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1263 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1264 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1265 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1266 08-31 20:51:18.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1267 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[1268 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[1269 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[126a 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610051801 +[126b 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5D4AA0FA5E6E5C391DBCD4ACB59731590AA17B1B08E5D2FED87DFAB641547323 +[126c 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[126d 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[126e 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[126f 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1270 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1271 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[1272 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1273 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1274 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[1275 08-31 20:51:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1276 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1277 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1278 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1279 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[127a 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[127b 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[127c 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[127d 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[127e 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[127f 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1280 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1281 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1282 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040707f0 gate 1598907080042949100 evaluation starts +[1283 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040707f0 signed by 0 principal evaluation starts (used [false]) +[1284 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040707f0 processing identity 0 with bytes of 115a4b0 +[1285 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040707f0 principal matched by identity 0 +[1286 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 4c 7a d8 1b 8a 9f d6 1e 22 8b c1 41 b1 fb 53 |BLz......"..A..S| +00000010 ad 8b c4 d9 af 7a da 60 9b 62 ca dc c4 20 cc 84 |.....z.`.b... ..| +[1287 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c f2 d8 98 c8 e6 fc b4 42 93 7a 69 |0D. L.......B.zi| +00000010 ed dc 18 ef 86 58 17 3f 0b 24 76 76 43 31 6d 31 |.....X.?.$vvC1m1| +00000020 b2 78 3f 90 02 20 4c 0f f7 d5 18 88 4b 6e 68 65 |.x?.. L.....Knhe| +00000030 8f 04 04 a6 57 ab a8 28 71 11 18 e8 49 6f 7a 82 |....W..(q...Ioz.| +00000040 bc 6c 6a d7 f4 92 |.lj...| +[1288 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040707f0 principal evaluation succeeds for identity 0 +[1289 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040707f0 gate 1598907080042949100 evaluation succeeds +[128a 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[128b 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[128c 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[128d 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[128e 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[128f 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1290 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1291 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1292 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1293 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1294 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1295 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1296 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1297 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1298 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1299 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[129a 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[129b 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[129c 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[129d 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[129e 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12a0 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[129f 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12a1 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12a2 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12a3 08-31 20:51:20.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12a4 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12a5 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12a6 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12a7 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12a8 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12a9 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12aa 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12ab 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12ac 08-31 20:51:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12ad 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12ae 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12af 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12b0 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[12b1 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 4d 1d dd ca 1c c9 e4 80 12 51 aa 7a a4 bb 5d |.M........Q.z..]| +00000010 86 b7 22 55 be 3d ab 3a 5e 77 7b 7e 19 ed 39 99 |.."U.=.:^w{~..9.| +[12b2 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 00 df cf e7 48 6a be 12 05 d9 fc 4a |0D. ....Hj.....J| +00000010 c9 a2 be 74 56 35 0f 37 62 29 d8 d5 cd 85 13 7b |...tV5.7b).....{| +00000020 f1 e3 99 bd 02 20 67 02 25 88 aa 82 ba 0f 66 33 |..... g.%.....f3| +00000030 df a6 19 48 59 ac be 87 fa 94 8c 84 5b 9e 9e e9 |...HY.......[...| +00000040 a0 53 73 e1 0a 19 |.Ss...| +[12b3 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12b4 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[12b5 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[12b6 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[12b7 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[12b8 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12b9 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12ba 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12bb 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12bc 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12bd 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12be 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[12bf 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12c0 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[12c1 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12c2 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12c3 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12c4 08-31 20:51:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12c5 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12c6 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12c7 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12c8 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12c9 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12ca 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12cb 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12cc 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12cd 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[12ce 08-31 20:51:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12cf 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12d0 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12d1 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12d2 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12d3 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[12d4 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12d5 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[12d6 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[12d7 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[12d8 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[12d9 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[12da 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[12db 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a3450 gate 1598907080471337000 evaluation starts +[12dc 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a3450 signed by 0 principal evaluation starts (used [false]) +[12dd 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a3450 processing identity 0 with bytes of 115a4b0 +[12de 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a3450 principal matched by identity 0 +[12df 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 14 58 d4 ea 29 6a 97 0b 2d 01 c0 5f f5 74 8e f0 |.X..)j..-.._.t..| +00000010 0b 2f 60 7d 52 6e a7 2f 35 87 98 2f 22 2c 8b bb |./`}Rn./5../",..| +[12e0 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 81 e4 aa 2b 18 37 8d c9 58 99 |0E.!.....+.7..X.| +00000010 d0 81 42 79 e1 e7 83 38 50 08 38 6a 45 ee 51 4a |..By...8P.8jE.QJ| +00000020 39 53 9d 40 49 02 20 48 4e 0a db 1b 0a 41 f9 59 |9S.@I. HN....A.Y| +00000030 9e 40 7e 3e dc 7c b2 6c cc d6 c1 04 5e 21 32 67 |.@~>.|.l....^!2g| +00000040 dc 23 a5 15 9d f8 2c |.#....,| +[12e1 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a3450 principal evaluation succeeds for identity 0 +[12e2 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040a3450 gate 1598907080471337000 evaluation succeeds +[12e3 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[12e4 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[12e5 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[12e6 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[12e7 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12e8 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[12e9 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[12ea 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[12eb 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12ec 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12ed 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[12ee 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12ef 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12f0 08-31 20:51:20.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12f1 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12f2 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12f3 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[12f4 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12f5 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12f6 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12f7 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12f8 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12f9 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12fa 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12fb 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[12fc 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[12fd 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[12fe 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[12ff 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1300 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1301 08-31 20:51:20.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1302 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1303 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1304 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1305 08-31 20:51:20.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1306 08-31 20:51:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1307 08-31 20:51:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161019 +[1308 08-31 20:51:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 139F1AA0036C05E9997DD13B72BF810935B9628E3CA39F7178CB17FD0252EFBB +[1309 08-31 20:51:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[130a 08-31 20:51:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[130b 08-31 20:51:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[130c 08-31 20:51:20.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[130d 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[130e 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[130f 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +[1310 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1311 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1312 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1313 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1314 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1315 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1316 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1317 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1318 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1319 08-31 20:51:20.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[131a 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[131b 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[131c 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[131d 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[131e 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[131f 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1320 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1321 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1322 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1323 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[1324 08-31 20:51:21.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1325 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1326 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1327 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1328 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1329 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[132a 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[132b 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[132c 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[132d 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[132e 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[132f 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1330 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1331 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004116250 gate 1598907081039443400 evaluation starts +[1332 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004116250 signed by 0 principal evaluation starts (used [false]) +[1333 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004116250 processing identity 0 with bytes of 115a4b0 +[1334 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004116250 principal matched by identity 0 +[1335 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df de a9 43 65 43 25 6a a9 bb 70 39 02 4a c3 d1 |...CeC%j..p9.J..| +00000010 91 a5 f0 a4 db 56 e5 75 fe af c3 2e 3a b6 9e 72 |.....V.u....:..r| +[1336 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 a3 4c 3c b8 49 5b c9 1f 66 87 44 |0D. R.L<.I[..f.D| +00000010 c0 f8 5c 9d 06 ba d4 5e cc ac 06 f6 41 41 44 00 |..\....^....AAD.| +00000020 58 b4 5d ed 02 20 38 4f fb 61 35 b5 8a 69 7d 8a |X.].. 8O.a5..i}.| +00000030 c1 4e 97 95 22 c4 50 ea f5 c9 87 09 42 66 f8 90 |.N..".P.....Bf..| +00000040 06 15 8a 5e 70 be |...^p.| +[1337 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004116250 principal evaluation succeeds for identity 0 +[1338 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004116250 gate 1598907081039443400 evaluation succeeds +[1339 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[133a 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[133b 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[133c 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[133d 08-31 20:51:21.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[133e 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[133f 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1340 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1341 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1342 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1343 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1344 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1345 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[1346 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1347 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1348 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1349 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[134a 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[134b 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[134c 08-31 20:51:21.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\334|\262l\314\326\301\004^!2g\334#\245\025\235\370," > alive: alive:\005\307\340" > +[134d 08-31 20:51:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[134e 08-31 20:51:21.29 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[134f 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1350 08-31 20:51:21.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1351 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[1352 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1353 08-31 20:51:21.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[1354 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1355 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 94 f1 67 52 fd 9c dc e6 2b 61 ab 86 41 85 d1 |...gR....+a..A..| +00000010 cb 16 a3 f7 7d 4f 3b ba bd 8c 6b fb 15 b6 11 25 |....}O;...k....%| +[1356 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 cb 11 89 70 22 07 b7 9f 3b b0 |0E.!.....p"...;.| +00000010 64 aa d2 66 cb e9 ac 80 49 b6 df f2 f2 3d 7e 24 |d..f....I....=~$| +00000020 d6 a3 37 8e 22 02 20 5a 23 26 9b b5 f6 5c 25 cc |..7.". Z#&...\%.| +00000030 01 74 0e 34 c6 ce f4 6a 65 bc e0 56 e6 bc 46 48 |.t.4...je..V..FH| +00000040 39 32 11 6a dc 78 d8 |92.j.x.| +[1357 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1358 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b 64 65 2e 7d d5 60 3b 32 e1 0a |0E.!..de.}.`;2..| +00000010 f1 9c 8e 3f 35 3d cb 09 e4 0b 4e b4 f0 31 66 74 |...?5=....N..1ft| +00000020 4b 2f f2 b8 f0 02 20 6b 78 3c d4 bd 22 5a 4e 9e |K/.... kx<.."ZN.| +00000030 52 38 8a 2d d9 7b 4c 5a 1b 37 02 a3 f3 c8 ec 7a |R8.-.{LZ.7.....z| +00000040 5c 83 ae 7d 5b 61 76 |\..}[av| +[1359 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[135a 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[135b 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[135c 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[135d 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[135e 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[135f 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1360 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1361 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1362 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1363 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1364 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[1365 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\005\307\340" > +[1366 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1367 08-31 20:51:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1368 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1369 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[136a 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[136b 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[136c 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[136d 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[136e 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[136f 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1370 08-31 20:51:21.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1371 08-31 20:51:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[1372 08-31 20:51:21.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1373 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1374 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1375 08-31 20:51:21.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1376 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1377 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1378 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1379 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[137a 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[137b 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[137c 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[137d 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[137e 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[137f 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415aca0 gate 1598907081489239200 evaluation starts +[1380 08-31 20:51:21.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415aca0 signed by 0 principal evaluation starts (used [false]) +[1381 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415aca0 processing identity 0 with bytes of 115a4b0 +[1382 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415aca0 principal matched by identity 0 +[1383 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 f6 e0 95 9d 1c 80 eb 6f 79 9d 8c c2 7a 8d de |........oy...z..| +00000010 da 6f f9 1c c5 fd 67 d2 7d e2 fb 29 31 35 fb 13 |.o....g.}..)15..| +[1384 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 d8 36 b5 43 13 f8 35 49 b2 51 b7 |0D. c.6.C..5I.Q.| +00000010 15 9d 4f d9 24 7e a7 1b 2e 89 03 83 43 2b 46 5c |..O.$~......C+F\| +00000020 98 eb ea a7 02 20 24 28 40 8c 46 12 16 47 b9 d1 |..... $(@.F..G..| +00000030 04 c1 0c b9 5d b5 94 a6 ff 22 8a f5 a4 d7 fe 80 |....]...."......| +00000040 09 37 12 fb 78 cf |.7..x.| +[1385 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415aca0 principal evaluation succeeds for identity 0 +[1386 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00415aca0 gate 1598907081489239200 evaluation succeeds +[1387 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1388 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1389 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[138a 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[138b 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[138c 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[138d 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[138e 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[138f 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1390 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1391 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1392 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1393 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[1394 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1395 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1396 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1397 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[1398 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\005\307\340" > +[1399 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[139a 08-31 20:51:21.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[139b 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[139c 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[139d 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[139e 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[13a0 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[139f 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[13a1 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[13a2 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[13a3 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[13a4 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13a5 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[13a7 08-31 20:51:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[13a8 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13a6 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[13a9 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13aa 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[13ab 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[13ac 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[13ad 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13ae 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[13af 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[13b0 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[13b1 08-31 20:51:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13b2 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[13b3 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816101A +[13b4 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1D2C0ABBE86257E51C199FCC51E1BDDEF63D7AA497E433AACC3A8F5407EA742B +[13b5 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[13b6 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[13b7 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[13b8 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[13b9 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13ba 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[13bb 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13bc 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[13bd 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13be 08-31 20:51:21.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[13bf 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[13c0 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13c1 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[13c2 08-31 20:51:21.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13c3 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[13c4 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[13c5 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13c6 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[13c7 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[13c8 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 2c 0a bb e8 62 57 e5 1c 19 9f cc 51 e1 bd de |.,...bW.....Q...| +00000010 f6 3d 7a a4 97 e4 33 aa cc 3a 8f 54 07 ea 74 2b |.=z...3..:.T..t+| +[13c9 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe 34 9c 55 9b 9b 7d a8 c5 8b 33 |0E.!..4.U..}...3| +00000010 7b 7f 35 92 85 b2 39 dc e2 de a5 3d f4 7f 7b 8f |{.5...9....=..{.| +00000020 de d6 7a fd 95 02 20 0a 8d d1 de 7a 04 47 e8 cd |..z... ....z.G..| +00000030 45 fa d7 16 c6 0d f6 df be 09 17 89 c2 ae ef 58 |E..............X| +00000040 84 b4 f1 55 a1 6f a8 |...U.o.| +[13ca 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[13cb 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[13cc 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[13cd 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13ce 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[13cf 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 94 f1 67 52 fd 9c dc e6 2b 61 ab 86 41 85 d1 |...gR....+a..A..| +00000010 cb 16 a3 f7 7d 4f 3b ba bd 8c 6b fb 15 b6 11 25 |....}O;...k....%| +[13d0 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 cb 11 89 70 22 07 b7 9f 3b b0 |0E.!.....p"...;.| +00000010 64 aa d2 66 cb e9 ac 80 49 b6 df f2 f2 3d 7e 24 |d..f....I....=~$| +00000020 d6 a3 37 8e 22 02 20 5a 23 26 9b b5 f6 5c 25 cc |..7.". Z#&...\%.| +00000030 01 74 0e 34 c6 ce f4 6a 65 bc e0 56 e6 bc 46 48 |.t.4...je..V..FH| +00000040 39 32 11 6a dc 78 d8 |92.j.x.| +[13d1 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[13d2 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13d3 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[13d4 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13d5 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[13d6 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[13d7 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[13d8 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[13d9 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[13da 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[13db 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b8970 gate 1598907081577330300 evaluation starts +[13dc 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b8970 signed by 0 principal evaluation starts (used [false]) +[13dd 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b8970 processing identity 0 with bytes of 115a4b0 +[13de 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b8970 principal matched by identity 0 +[13df 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 df de a9 43 65 43 25 6a a9 bb 70 39 02 4a c3 d1 |...CeC%j..p9.J..| +00000010 91 a5 f0 a4 db 56 e5 75 fe af c3 2e 3a b6 9e 72 |.....V.u....:..r| +[13e0 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 52 a3 4c 3c b8 49 5b c9 1f 66 87 44 |0D. R.L<.I[..f.D| +00000010 c0 f8 5c 9d 06 ba d4 5e cc ac 06 f6 41 41 44 00 |..\....^....AAD.| +00000020 58 b4 5d ed 02 20 38 4f fb 61 35 b5 8a 69 7d 8a |X.].. 8O.a5..i}.| +00000030 c1 4e 97 95 22 c4 50 ea f5 c9 87 09 42 66 f8 90 |.N..".P.....Bf..| +00000040 06 15 8a 5e 70 be |...^p.| +[13e1 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b8970 principal evaluation succeeds for identity 0 +[13e2 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041b8970 gate 1598907081577330300 evaluation succeeds +[13e3 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[13e4 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[13e5 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[13e6 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[13e7 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[13e8 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[13e9 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13ea 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13eb 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[13ec 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[13ed 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 2c 0a bb e8 62 57 e5 1c 19 9f cc 51 e1 bd de |.,...bW.....Q...| +00000010 f6 3d 7a a4 97 e4 33 aa cc 3a 8f 54 07 ea 74 2b |.=z...3..:.T..t+| +[13ee 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe 34 9c 55 9b 9b 7d a8 c5 8b 33 |0E.!..4.U..}...3| +00000010 7b 7f 35 92 85 b2 39 dc e2 de a5 3d f4 7f 7b 8f |{.5...9....=..{.| +00000020 de d6 7a fd 95 02 20 0a 8d d1 de 7a 04 47 e8 cd |..z... ....z.G..| +00000030 45 fa d7 16 c6 0d f6 df be 09 17 89 c2 ae ef 58 |E..............X| +00000040 84 b4 f1 55 a1 6f a8 |...U.o.| +[13ef 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13f0 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[13f1 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[13f2 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 c6 79 15 a3 71 60 30 7c f8 19 |0E.!...y..q`0|..| +00000010 49 d4 a7 d8 f6 25 cb 44 58 6a c4 c1 74 34 cf 41 |I....%.DXj..t4.A| +00000020 8c d9 b1 6f 4d 02 20 59 0b 31 dd fa 3f d3 bd 94 |...oM. Y.1..?...| +00000030 b9 cf f4 e0 79 4c b1 6f c5 c9 dc b7 29 e3 6f 1d |....yL.o....).o.| +00000040 e1 8b af 4e f5 e9 44 |...N..D| +[13f3 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[13f4 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[13f5 08-31 20:51:21.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13f6 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13f7 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[13f8 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[13f9 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[13fa 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[13fb 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[13fc 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[13fd 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[13fe 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[13ff 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1400 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1401 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cd060 gate 1598907081580538500 evaluation starts +[1402 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cd060 signed by 0 principal evaluation starts (used [false]) +[1403 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cd060 processing identity 0 with bytes of 115a4b0 +[1404 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cd060 principal matched by identity 0 +[1405 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c1 f6 e0 95 9d 1c 80 eb 6f 79 9d 8c c2 7a 8d de |........oy...z..| +00000010 da 6f f9 1c c5 fd 67 d2 7d e2 fb 29 31 35 fb 13 |.o....g.}..)15..| +[1406 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 d8 36 b5 43 13 f8 35 49 b2 51 b7 |0D. c.6.C..5I.Q.| +00000010 15 9d 4f d9 24 7e a7 1b 2e 89 03 83 43 2b 46 5c |..O.$~......C+F\| +00000020 98 eb ea a7 02 20 24 28 40 8c 46 12 16 47 b9 d1 |..... $(@.F..G..| +00000030 04 c1 0c b9 5d b5 94 a6 ff 22 8a f5 a4 d7 fe 80 |....]...."......| +00000040 09 37 12 fb 78 cf |.7..x.| +[1407 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cd060 principal evaluation succeeds for identity 0 +[1408 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041cd060 gate 1598907081580538500 evaluation succeeds +[1409 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[140a 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[140b 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[140c 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[140d 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[140e 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[140f 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1410 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 2c 0a bb e8 62 57 e5 1c 19 9f cc 51 e1 bd de |.,...bW.....Q...| +00000010 f6 3d 7a a4 97 e4 33 aa cc 3a 8f 54 07 ea 74 2b |.=z...3..:.T..t+| +[1411 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fe 34 9c 55 9b 9b 7d a8 c5 8b 33 |0E.!..4.U..}...3| +00000010 7b 7f 35 92 85 b2 39 dc e2 de a5 3d f4 7f 7b 8f |{.5...9....=..{.| +00000020 de d6 7a fd 95 02 20 0a 8d d1 de 7a 04 47 e8 cd |..z... ....z.G..| +00000030 45 fa d7 16 c6 0d f6 df be 09 17 89 c2 ae ef 58 |E..............X| +00000040 84 b4 f1 55 a1 6f a8 |...U.o.| +[1412 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1413 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1414 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1415 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1416 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a6 94 f1 67 52 fd 9c dc e6 2b 61 ab 86 41 85 d1 |...gR....+a..A..| +00000010 cb 16 a3 f7 7d 4f 3b ba bd 8c 6b fb 15 b6 11 25 |....}O;...k....%| +[1417 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 cb 11 89 70 22 07 b7 9f 3b b0 |0E.!.....p"...;.| +00000010 64 aa d2 66 cb e9 ac 80 49 b6 df f2 f2 3d 7e 24 |d..f....I....=~$| +00000020 d6 a3 37 8e 22 02 20 5a 23 26 9b b5 f6 5c 25 cc |..7.". Z#&...\%.| +00000030 01 74 0e 34 c6 ce f4 6a 65 bc e0 56 e6 bc 46 48 |.t.4...je..V..FH| +00000040 39 32 11 6a dc 78 d8 |92.j.x.| +[1418 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1419 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[141a 08-31 20:51:21.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[141b 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[141c 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[141d 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[141e 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[141f 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1420 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1421 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1422 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1423 08-31 20:51:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1424 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1425 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1426 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1427 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1428 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1429 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[142a 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[142b 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[142c 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[142d 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[142e 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[142f 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004197600 gate 1598907081753856100 evaluation starts +[1430 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004197600 signed by 0 principal evaluation starts (used [false]) +[1431 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004197600 processing identity 0 with bytes of 115a4b0 +[1432 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004197600 principal matched by identity 0 +[1433 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[1434 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[1435 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004197600 principal evaluation succeeds for identity 0 +[1436 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004197600 gate 1598907081753856100 evaluation succeeds +[1437 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1438 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1439 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[143a 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[143b 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[143c 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[143d 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[143e 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[143f 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1440 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1441 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1442 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1443 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1444 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1445 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004206ef0 gate 1598907081755327100 evaluation starts +[1446 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004206ef0 signed by 0 principal evaluation starts (used [false]) +[1447 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004206ef0 processing identity 0 with bytes of 115a4b0 +[1448 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004206ef0 principal matched by identity 0 +[1449 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[144a 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[144b 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004206ef0 principal evaluation succeeds for identity 0 +[144c 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004206ef0 gate 1598907081755327100 evaluation succeeds +[144d 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[144e 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[144f 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1450 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1451 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[1452 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[1453 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1454 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1455 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[1456 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[1457 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[1458 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[1459 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[145a 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[145b 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[145c 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[145d 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[145e 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[145f 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1460 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1461 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004232c80 gate 1598907081758949800 evaluation starts +[1462 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004232c80 signed by 0 principal evaluation starts (used [false]) +[1463 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004232c80 processing identity 0 with bytes of 115a4b0 +[1464 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004232c80 principal matched by identity 0 +[1465 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[1466 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[1467 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004232c80 principal evaluation succeeds for identity 0 +[1468 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004232c80 gate 1598907081758949800 evaluation succeeds +[1469 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[146a 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[146b 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[146c 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[146d 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[146e 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[146f 08-31 20:51:21.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1471 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1472 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1473 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1474 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1470 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1475 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1476 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004233e90 gate 1598907081762766200 evaluation starts +[1477 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004233e90 signed by 0 principal evaluation starts (used [false]) +[1478 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004233e90 processing identity 0 with bytes of 115a4b0 +[1479 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004233e90 principal matched by identity 0 +[147a 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[147b 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[147c 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004233e90 principal evaluation succeeds for identity 0 +[147d 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004233e90 gate 1598907081762766200 evaluation succeeds +[147e 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[147f 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1480 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1481 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1482 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1483 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1484 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1485 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1486 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1487 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1488 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1489 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[148a 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[148b 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[148c 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[148d 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424f2e0 gate 1598907081766474800 evaluation starts +[148e 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424f2e0 signed by 0 principal evaluation starts (used [false]) +[148f 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424f2e0 processing identity 0 with bytes of 115a4b0 +[1490 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424f2e0 principal matched by identity 0 +[1491 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[1492 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[1493 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424f2e0 principal evaluation succeeds for identity 0 +[1494 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00424f2e0 gate 1598907081766474800 evaluation succeeds +[1495 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1496 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1497 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1498 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1499 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[149a 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[149b 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[149c 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[149d 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[149e 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[149f 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[14a0 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[14a1 08-31 20:51:21.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[14a2 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[14a3 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[14a4 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[14a5 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426b2c0 gate 1598907081771873700 evaluation starts +[14a6 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426b2c0 signed by 0 principal evaluation starts (used [false]) +[14a7 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426b2c0 processing identity 0 with bytes of 115a4b0 +[14a8 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426b2c0 principal matched by identity 0 +[14a9 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[14aa 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[14ab 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426b2c0 principal evaluation succeeds for identity 0 +[14ac 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00426b2c0 gate 1598907081771873700 evaluation succeeds +[14ad 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[14af 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[14b0 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[14b1 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[14b2 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14ae 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14b3 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14b4 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[14b5 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14b6 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14b7 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[14b8 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[14b9 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14ba 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[14bb 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[14bc 08-31 20:51:21.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14bd 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[14be 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14bf 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14c0 08-31 20:51:21.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14c1 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[14c2 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[14c3 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[14c4 08-31 20:51:22.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14c5 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[14c6 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[14c7 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14c8 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14c9 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14ca 08-31 20:51:22.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14cb 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[14cc 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[14cd 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14ce 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14cf 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14d0 08-31 20:51:22.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14d1 08-31 20:51:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[14d2 08-31 20:51:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[14d3 08-31 20:51:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[14d4 08-31 20:51:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610061801 +[14d5 08-31 20:51:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3972E3552C57E9CE8000D9DD850FA1951AF6374F5021CEDA027F6B0F0CB73DCB +[14d6 08-31 20:51:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[14d7 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14d8 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14d9 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14da 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14db 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[14dc 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14dd 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[14de 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14df 08-31 20:51:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14e0 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[14e1 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[14e2 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[14e3 08-31 20:51:25.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14e4 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14e5 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14e6 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14e7 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14e8 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14e9 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[14ea 08-31 20:51:25.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14eb 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[14ec 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[14ed 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[14ee 08-31 20:51:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[14ef 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[14f0 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[14f1 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[14f2 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[14f3 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[14f4 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[14f5 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[14f6 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[14f7 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cc560 gate 1598907085043903800 evaluation starts +[14f8 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cc560 signed by 0 principal evaluation starts (used [false]) +[14f9 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cc560 processing identity 0 with bytes of 115a4b0 +[14fa 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cc560 principal matched by identity 0 +[14fb 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2d 78 b1 56 21 54 82 a3 15 9f 65 87 70 4e 71 ee |-x.V!T....e.pNq.| +00000010 6e af 81 e5 06 61 13 20 3f bc 54 41 a3 6c be 75 |n....a. ?.TA.l.u| +[14fc 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 78 d3 7c e4 56 2b ee 75 a3 62 76 1a |0D. x.|.V+.u.bv.| +00000010 69 cf fc d2 08 bc 7a 74 86 c5 04 e4 6d db 11 a7 |i.....zt....m...| +00000020 76 7a ac 35 02 20 4a f3 65 b0 31 3a 0f 41 a1 22 |vz.5. J.e.1:.A."| +00000030 f9 b6 7b c1 e2 07 d5 b7 07 18 82 4a b3 4a 83 e0 |..{........J.J..| +00000040 d6 f4 9b 74 25 1b |...t%.| +[14fd 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cc560 principal evaluation succeeds for identity 0 +[14fe 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042cc560 gate 1598907085043903800 evaluation succeeds +[14ff 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1500 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1501 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1502 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1503 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1504 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1505 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1506 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1507 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1508 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1509 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[150a 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[150b 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[150c 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[150d 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[150e 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[150f 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[1510 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\005\307\340" > +[1511 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1512 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1513 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1514 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1515 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1516 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1517 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1518 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1519 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[151a 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[151b 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[151c 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[151d 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291ab0 gate 1598907085054113300 evaluation starts +[151e 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291ab0 signed by 0 principal evaluation starts (used [false]) +[151f 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291ab0 processing identity 0 with bytes of 115a4b0 +[1520 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291ab0 principal matched by identity 0 +[1521 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 a3 41 c5 d2 d4 ab cc 1a c6 9f 72 79 14 fc ef |..A........ry...| +00000010 86 15 2b 54 c2 39 73 0f a4 fa 82 3e 2d ea e4 f5 |..+T.9s....>-...| +[1522 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 97 fb 3d c9 61 8f 63 a5 f3 a4 0b |0D. F..=.a.c....| +00000010 e5 20 c6 b6 02 41 38 57 31 36 82 2b e7 bc 5a cb |. ...A8W16.+..Z.| +00000020 08 f4 62 b8 02 20 64 69 ae 76 ee 69 9b 5f 4e eb |..b.. di.v.i._N.| +00000030 1f 1c 6b 75 83 b8 ba ae 78 fe 7c 67 c9 22 55 bb |..ku....x.|g."U.| +00000040 10 fa 29 a1 75 51 |..).uQ| +[1523 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291ab0 principal evaluation succeeds for identity 0 +[1524 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004291ab0 gate 1598907085054113300 evaluation succeeds +[1525 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1526 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1527 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1528 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1529 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[152a 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[152b 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[152c 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[152d 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[152e 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[152f 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1530 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1531 08-31 20:51:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1532 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1533 08-31 20:51:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1534 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1535 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1536 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1537 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1538 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1539 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[153a 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[153b 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[153c 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[153d 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[153e 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[153f 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1540 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1541 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1542 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1543 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1544 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1545 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1546 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1547 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1548 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1549 08-31 20:51:25.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[154a 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[154b 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[154c 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[154d 08-31 20:51:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[154e 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[154f 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1550 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[1551 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1552 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d8 6c fb 8b b4 bb 1e 3d 37 36 65 ac 75 a1 ab |D.l.....=76e.u..| +00000010 d6 a9 39 2d c0 86 11 7a 78 b0 38 50 42 86 02 0c |..9-...zx.8PB...| +[1553 08-31 20:51:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c cc 0d 20 6f 76 e1 8c d0 cb c7 |0E.!.... ov.....| +00000010 1b d5 69 4c 6d 69 9c 90 b7 33 ef e3 3e b6 ad 35 |..iLmi...3..>..5| +00000020 88 66 a7 0f c2 02 20 36 d5 b9 d9 13 ff 20 2c 0e |.f.... 6..... ,.| +00000030 d5 6c e0 aa 03 16 06 7e 75 b9 95 a8 7d b7 5a 26 |.l.....~u...}.Z&| +00000040 16 85 87 b4 f2 37 4f |.....7O| +[1554 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1555 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 44 2b a5 fa 8a 29 5c da 9c e1 2d f4 |0D. D+...)\...-.| +00000010 20 53 3f 44 46 fb 35 f9 09 5a e3 ae 28 fa 4a 17 | S?DF.5..Z..(.J.| +00000020 f6 3d 4e a3 02 20 39 3c c5 dd bb ba d8 37 9f ac |.=N.. 9<.....7..| +00000030 5b d6 24 e2 83 7a f1 c6 ad a8 8e fa e6 9b 54 e7 |[.$..z........T.| +00000040 95 c9 b8 ed ac ba |......| +[1556 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1557 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[1558 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1559 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[155a 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[155b 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[155c 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[155d 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[155e 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[155f 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1560 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1561 08-31 20:51:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[1562 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" secret_envelope: > alive:\005\307\340" > +[1563 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[1564 08-31 20:51:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1565 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1566 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1567 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1568 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1569 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a9 01 23 82 bf 60 b9 df a5 a4 87 79 a9 c0 93 8f |..#..`.....y....| +00000010 96 b1 1d bc 55 99 23 1b a1 68 c3 43 6d 81 5a c2 |....U.#..h.Cm.Z.| +[156a 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b1 95 0a 7c 82 f3 8a 52 4f 41 85 |0E.!....|...ROA.| +00000010 07 e5 ae 36 59 aa ea 29 35 a5 e8 8c 74 b1 2a 72 |...6Y..)5...t.*r| +00000020 d4 44 6f 0a ce 02 20 59 64 55 00 21 05 6c 9f d0 |.Do... YdU.!.l..| +00000030 a2 80 94 34 ce 87 24 fa 0f 23 98 7a b6 35 33 5c |...4..$..#.z.53\| +00000040 c5 9b c7 ec 3c e2 04 |....<..| +[156b 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[156c 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" lastAliveTS: 1598907045315872200, 32 but got ts: inc_num:1598907045315872200 seq_num:31 +[156d 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[156e 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[156f 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1570 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1571 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1572 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1573 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1574 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1575 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1576 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1577 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1578 08-31 20:51:25.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1579 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[157a 08-31 20:51:25.36 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[157b 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[157c 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[157d 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[157e 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[157f 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1580 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1581 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1582 08-31 20:51:25.37 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1583 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1584 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1585 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1586 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1587 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1588 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1589 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[158a 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[158b 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[158c 08-31 20:51:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[158d 08-31 20:51:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[158e 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[158f 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1590 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1591 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1592 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1593 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1594 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1595 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1596 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1597 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1598 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1599 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[159a 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329f10 gate 1598907085478703500 evaluation starts +[159b 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329f10 signed by 0 principal evaluation starts (used [false]) +[159c 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329f10 processing identity 0 with bytes of 115a4b0 +[159d 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329f10 principal matched by identity 0 +[159e 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c5 34 87 21 be 85 71 4e 5a 88 3d 3b 3b 75 ef 2c |.4.!..qNZ.=;;u.,| +00000010 90 5b 49 5f 8c 7e d6 5f f8 12 28 23 b5 b9 60 99 |.[I_.~._..(#..`.| +[159f 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 97 0c cb c2 a7 b7 57 f8 3d 0e d4 |0E.!.......W.=..| +00000010 28 40 8f cb de 89 02 72 a2 df 9e 17 52 91 af 8b |(@.....r....R...| +00000020 0d 55 d4 e1 66 02 20 02 b2 a6 44 60 3d 64 27 1c |.U..f. ...D`=d'.| +00000030 d7 4d 29 d0 26 64 5d 7c a1 f9 29 23 ae b3 c8 af |.M).&d]|..)#....| +00000040 c5 2b 4f be 87 14 e0 |.+O....| +[15a0 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329f10 principal evaluation succeeds for identity 0 +[15a1 08-31 20:51:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004329f10 gate 1598907085478703500 evaluation succeeds +[15a2 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[15a3 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[15a4 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[15a5 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[15a6 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15a7 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[15a8 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[15a9 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[15aa 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[15ab 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15ac 08-31 20:51:25.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15ad 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15ae 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15af 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15b0 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15b1 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15b2 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15b3 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15b4 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15b5 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15b6 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15b7 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15b8 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15b9 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15ba 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[15bb 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15bc 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[15bd 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15be 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15bf 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15c0 08-31 20:51:25.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15c1 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[15c2 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[15c3 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15c4 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[15c5 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[15c6 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15c7 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[15c8 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[15c9 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[15ca 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[15cb 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[15cc 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[15cd 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043885e0 gate 1598907085506402100 evaluation starts +[15ce 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043885e0 signed by 0 principal evaluation starts (used [false]) +[15cf 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043885e0 processing identity 0 with bytes of 115a4b0 +[15d0 08-31 20:51:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043885e0 principal matched by identity 0 +[15d1 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 a0 91 8f c9 0d 9a f3 64 cb 73 56 41 2a fd a4 |u.......d.sVA*..| +00000010 c7 23 c5 80 ec 5e 5b 08 28 f6 66 94 65 25 e1 08 |.#...^[.(.f.e%..| +[15d2 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f e5 1a c4 4d 07 23 7a d3 a5 2a 6d |0D. ....M.#z..*m| +00000010 54 39 77 79 3c dd 18 bb da d5 1d 5a b7 96 d1 f6 |T9wy<......Z....| +00000020 58 ac 39 61 02 20 2e 9c ef 20 ce ea cd 18 31 0e |X.9a. ... ....1.| +00000030 91 1b f5 29 b4 2a d7 16 7c 4b 6b a0 ec d5 98 a4 |...).*..|Kk.....| +00000040 82 7c 41 43 5c 48 |.|AC\H| +[15d3 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043885e0 principal evaluation succeeds for identity 0 +[15d4 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043885e0 gate 1598907085506402100 evaluation succeeds +[15d5 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[15d6 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[15d7 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[15d8 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[15d9 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[15da 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[15db 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[15dc 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[15dd 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[15de 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15e0 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15e1 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15df 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[15e3 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[15e2 08-31 20:51:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[15e5 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15e4 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[15e7 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15e8 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[15ea 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[15e6 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[15eb 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[15ec 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[15ed 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[15ee 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15e9 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[15f0 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15f1 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[15f2 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15f3 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15f4 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15f5 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[15f6 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15f7 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[15f8 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15ef 08-31 20:51:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" > alive: alive: alive:\005\307\340" > +[15f9 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[15fb 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[15fa 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[15fc 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[15fd 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[15fe 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[15ff 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1600 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1601 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816101B +[1602 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4B954C047E5E5C635988954CE2A8B6A2AC86D1F0DFD8C45E37B4486863E9AFC8 +[1603 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1604 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1605 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1606 08-31 20:51:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1607 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1608 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1609 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[160a 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[160b 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +[160c 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[160d 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[160e 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[160f 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1610 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1611 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1612 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1613 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1614 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1615 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1616 08-31 20:51:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1617 08-31 20:51:25.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1618 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1619 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816101C +[161a 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E5CAE688E91F0D72FB1C1383E08F83B157FC355C161954698F56C29D27018DD0 +[161b 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[161c 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[161d 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[161e 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[161f 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1620 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1621 08-31 20:51:25.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1622 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1623 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1624 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1625 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[1627 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1628 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1626 08-31 20:51:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1629 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[162a 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[162b 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[162c 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[162d 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 ca e6 88 e9 1f 0d 72 fb 1c 13 83 e0 8f 83 b1 |.......r........| +00000010 57 fc 35 5c 16 19 54 69 8f 56 c2 9d 27 01 8d d0 |W.5\..Ti.V..'...| +[162e 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd ac 23 c8 ff 53 ce 34 53 b2 93 |0E.!...#..S.4S..| +00000010 79 9c 19 ec 7e 77 ef 6e 89 d5 14 b6 e1 5a ae d6 |y...~w.n.....Z..| +00000020 34 7c 56 46 09 02 20 30 7c 31 0c 0b 85 09 f8 e6 |4|VF.. 0|1......| +00000030 18 47 58 fb 2e da be 0b 60 94 5b 70 d5 1e 4e d8 |.GX.....`.[p..N.| +00000040 01 53 b1 76 32 c0 87 |.S.v2..| +[162f 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[1630 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a 00 24 5c d4 1a 07 cc 43 23 5d ab |0D. J.$\....C#].| +00000010 b4 9b b7 a8 cf 8b 28 20 be d7 6a b9 07 bf 15 0f |......( ..j.....| +00000020 db bb 4a 77 02 20 21 07 e0 05 cf 36 83 02 62 f6 |..Jw. !....6..b.| +00000030 b5 d9 1b 09 63 5a b0 d5 97 da 63 4e 84 e7 ad 84 |....cZ....cN....| +00000040 2e e5 cc 59 9b 37 |...Y.7| +[1631 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1632 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1633 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1634 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1635 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1636 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1637 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1638 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1639 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[163a 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[163b 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[163c 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[163d 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[163e 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[163f 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1640 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1641 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044060e0 gate 1598907085608961100 evaluation starts +[1642 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044060e0 signed by 0 principal evaluation starts (used [false]) +[1643 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044060e0 processing identity 0 with bytes of 115a4b0 +[1644 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044060e0 principal matched by identity 0 +[1645 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 75 a0 91 8f c9 0d 9a f3 64 cb 73 56 41 2a fd a4 |u.......d.sVA*..| +00000010 c7 23 c5 80 ec 5e 5b 08 28 f6 66 94 65 25 e1 08 |.#...^[.(.f.e%..| +[1646 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7f e5 1a c4 4d 07 23 7a d3 a5 2a 6d |0D. ....M.#z..*m| +00000010 54 39 77 79 3c dd 18 bb da d5 1d 5a b7 96 d1 f6 |T9wy<......Z....| +00000020 58 ac 39 61 02 20 2e 9c ef 20 ce ea cd 18 31 0e |X.9a. ... ....1.| +00000030 91 1b f5 29 b4 2a d7 16 7c 4b 6b a0 ec d5 98 a4 |...).*..|Kk.....| +00000040 82 7c 41 43 5c 48 |.|AC\H| +[1647 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044060e0 principal evaluation succeeds for identity 0 +[1648 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044060e0 gate 1598907085608961100 evaluation succeeds +[1649 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[164a 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[164b 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[164c 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[164d 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[164e 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[164f 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1650 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 ca e6 88 e9 1f 0d 72 fb 1c 13 83 e0 8f 83 b1 |.......r........| +00000010 57 fc 35 5c 16 19 54 69 8f 56 c2 9d 27 01 8d d0 |W.5\..Ti.V..'...| +[1651 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd ac 23 c8 ff 53 ce 34 53 b2 93 |0E.!...#..S.4S..| +00000010 79 9c 19 ec 7e 77 ef 6e 89 d5 14 b6 e1 5a ae d6 |y...~w.n.....Z..| +00000020 34 7c 56 46 09 02 20 30 7c 31 0c 0b 85 09 f8 e6 |4|VF.. 0|1......| +00000030 18 47 58 fb 2e da be 0b 60 94 5b 70 d5 1e 4e d8 |.GX.....`.[p..N.| +00000040 01 53 b1 76 32 c0 87 |.S.v2..| +[1652 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1653 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1654 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1655 08-31 20:51:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1656 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d8 6c fb 8b b4 bb 1e 3d 37 36 65 ac 75 a1 ab |D.l.....=76e.u..| +00000010 d6 a9 39 2d c0 86 11 7a 78 b0 38 50 42 86 02 0c |..9-...zx.8PB...| +[1657 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c cc 0d 20 6f 76 e1 8c d0 cb c7 |0E.!.... ov.....| +00000010 1b d5 69 4c 6d 69 9c 90 b7 33 ef e3 3e b6 ad 35 |..iLmi...3..>..5| +00000020 88 66 a7 0f c2 02 20 36 d5 b9 d9 13 ff 20 2c 0e |.f.... 6..... ,.| +00000030 d5 6c e0 aa 03 16 06 7e 75 b9 95 a8 7d b7 5a 26 |.l.....~u...}.Z&| +00000040 16 85 87 b4 f2 37 4f |.....7O| +[1658 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1659 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[165a 08-31 20:51:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[165b 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[165c 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[165d 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[165e 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[165f 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1660 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 44 d8 6c fb 8b b4 bb 1e 3d 37 36 65 ac 75 a1 ab |D.l.....=76e.u..| +00000010 d6 a9 39 2d c0 86 11 7a 78 b0 38 50 42 86 02 0c |..9-...zx.8PB...| +[1661 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9c cc 0d 20 6f 76 e1 8c d0 cb c7 |0E.!.... ov.....| +00000010 1b d5 69 4c 6d 69 9c 90 b7 33 ef e3 3e b6 ad 35 |..iLmi...3..>..5| +00000020 88 66 a7 0f c2 02 20 36 d5 b9 d9 13 ff 20 2c 0e |.f.... 6..... ,.| +00000030 d5 6c e0 aa 03 16 06 7e 75 b9 95 a8 7d b7 5a 26 |.l.....~u...}.Z&| +00000040 16 85 87 b4 f2 37 4f |.....7O| +[1662 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1663 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1664 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1665 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 ca e6 88 e9 1f 0d 72 fb 1c 13 83 e0 8f 83 b1 |.......r........| +00000010 57 fc 35 5c 16 19 54 69 8f 56 c2 9d 27 01 8d d0 |W.5\..Ti.V..'...| +[1666 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd ac 23 c8 ff 53 ce 34 53 b2 93 |0E.!...#..S.4S..| +00000010 79 9c 19 ec 7e 77 ef 6e 89 d5 14 b6 e1 5a ae d6 |y...~w.n.....Z..| +00000020 34 7c 56 46 09 02 20 30 7c 31 0c 0b 85 09 f8 e6 |4|VF.. 0|1......| +00000030 18 47 58 fb 2e da be 0b 60 94 5b 70 d5 1e 4e d8 |.GX.....`.[p..N.| +00000040 01 53 b1 76 32 c0 87 |.S.v2..| +[1667 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1668 08-31 20:51:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1669 08-31 20:51:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[166a 08-31 20:51:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[166b 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[166c 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[166d 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[166e 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1670 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[166f 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1671 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1672 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1673 08-31 20:51:25.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1674 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1675 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1676 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1677 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1678 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1679 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[167b 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[167c 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[167d 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[167e 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[167a 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[167f 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1680 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c580 gate 1598907085754326900 evaluation starts +[1681 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c580 signed by 0 principal evaluation starts (used [false]) +[1682 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c580 processing identity 0 with bytes of 115a4b0 +[1683 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c580 principal matched by identity 0 +[1684 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[1685 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[1686 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c580 principal evaluation succeeds for identity 0 +[1687 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00443c580 gate 1598907085754326900 evaluation succeeds +[1688 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1689 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[168a 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[168b 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[168c 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[168d 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[168e 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[168f 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[1690 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1691 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1692 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1693 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1694 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1695 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1696 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1697 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1698 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446c560 gate 1598907085759680700 evaluation starts +[1699 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446c560 signed by 0 principal evaluation starts (used [false]) +[169a 08-31 20:51:25.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446c560 processing identity 0 with bytes of 115a4b0 +[169b 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446c560 principal matched by identity 0 +[169c 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[169d 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[169e 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446c560 principal evaluation succeeds for identity 0 +[169f 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446c560 gate 1598907085759680700 evaluation succeeds +[16a0 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[16a1 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[16a2 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[16a3 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[16a4 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16a5 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[16a6 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[16a7 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[16a8 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[16a9 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[16aa 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16ab 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16ac 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[16ad 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[16ae 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[16af 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[16b0 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[16b1 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[16b2 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044846e0 gate 1598907085764937700 evaluation starts +[16b3 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044846e0 signed by 0 principal evaluation starts (used [false]) +[16b4 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044846e0 processing identity 0 with bytes of 115a4b0 +[16b5 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044846e0 principal matched by identity 0 +[16b6 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[16b7 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[16b8 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044846e0 principal evaluation succeeds for identity 0 +[16b9 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044846e0 gate 1598907085764937700 evaluation succeeds +[16ba 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[16bb 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[16bc 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[16bd 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[16be 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16bf 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16c0 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[16c1 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[16c2 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[16c3 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[16c4 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[16c5 08-31 20:51:25.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[16c6 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044858e0 gate 1598907085770249900 evaluation starts +[16c7 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044858e0 signed by 0 principal evaluation starts (used [false]) +[16c8 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044858e0 processing identity 0 with bytes of 115a4b0 +[16c9 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044858e0 principal matched by identity 0 +[16ca 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[16cb 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[16cc 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044858e0 principal evaluation succeeds for identity 0 +[16cd 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044858e0 gate 1598907085770249900 evaluation succeeds +[16ce 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[16cf 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[16d0 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[16d1 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[16d2 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16d3 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[16d4 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16d5 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16d6 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16d7 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[16d8 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[16d9 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[16da 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[16db 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[16dc 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[16dd 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a2d30 gate 1598907085774473000 evaluation starts +[16de 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a2d30 signed by 0 principal evaluation starts (used [false]) +[16df 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a2d30 processing identity 0 with bytes of 115a4b0 +[16e0 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a2d30 principal matched by identity 0 +[16e1 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[16e2 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[16e3 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a2d30 principal evaluation succeeds for identity 0 +[16e4 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044a2d30 gate 1598907085774473000 evaluation succeeds +[16e5 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[16e6 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[16e7 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[16e8 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[16e9 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[16ea 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[16eb 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16ec 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16ed 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[16ee 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16ef 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16f0 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[16f1 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[16f2 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[16f3 08-31 20:51:25.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16f4 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[16f5 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[16f6 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[16f7 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[16f8 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[16f9 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[16fa 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[16fb 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cc620 gate 1598907085784540400 evaluation starts +[16fc 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cc620 signed by 0 principal evaluation starts (used [false]) +[16fd 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cc620 processing identity 0 with bytes of 115a4b0 +[16fe 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cc620 principal matched by identity 0 +[16ff 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[1700 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[1701 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cc620 principal evaluation succeeds for identity 0 +[1702 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044cc620 gate 1598907085784540400 evaluation succeeds +[1703 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1704 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1705 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1706 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1707 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[1708 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[1709 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[170a 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[170b 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[170c 08-31 20:51:25.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[170d 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[170e 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[170f 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1710 08-31 20:51:25.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1711 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1712 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1713 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1714 08-31 20:51:26.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1715 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1716 08-31 20:51:26.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1717 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1718 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1719 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[171a 08-31 20:51:26.23 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[171b 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[171c 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[171d 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[171e 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[171f 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1720 08-31 20:51:26.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1721 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[1722 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[1723 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1724 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610071801 +[1725 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 052313E7F356FF3943EC700DE9AAE6D514E9FD96FD6FF30E01A56CB57F84EF14 +[1726 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[1727 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1728 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1729 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[172a 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[172b 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[172c 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[172d 08-31 20:51:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[172e 08-31 20:51:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[172f 08-31 20:51:28.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1730 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1731 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1732 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1733 08-31 20:51:29.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1734 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1735 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1736 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1737 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1738 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1739 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[173a 08-31 20:51:29.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[173b 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[173c 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[173d 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[173e 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[173f 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1740 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1741 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1742 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1743 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1744 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1745 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1746 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1747 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044eb9d0 gate 1598907089057742900 evaluation starts +[1748 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044eb9d0 signed by 0 principal evaluation starts (used [false]) +[1749 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044eb9d0 processing identity 0 with bytes of 115a4b0 +[174a 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044eb9d0 principal matched by identity 0 +[174b 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 f4 c4 ab 64 23 45 dc 18 92 58 28 0c 4c 34 74 |"...d#E...X(.L4t| +00000010 79 c7 7f 57 0f b8 7f 32 d5 d9 e7 51 2f 15 27 48 |y..W...2...Q/.'H| +[174c 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 5c 24 30 37 87 8d a5 03 50 26 ce |0D. .\$07....P&.| +00000010 07 8d 52 a6 96 61 57 31 55 3d 02 7c 44 87 a4 3f |..R..aW1U=.|D..?| +00000020 5f 58 b6 03 02 20 0f 46 f1 a2 01 af 47 40 2d 56 |_X... .F....G@-V| +00000030 7b 99 35 f1 a5 b0 45 ac 68 00 c3 c2 2a d5 71 ce |{.5...E.h...*.q.| +00000040 51 95 21 29 db 9e |Q.!)..| +[174d 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044eb9d0 principal evaluation succeeds for identity 0 +[174e 08-31 20:51:29.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044eb9d0 gate 1598907089057742900 evaluation succeeds +[174f 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1750 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1751 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1752 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1753 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1754 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1755 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1756 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1757 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1758 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1759 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[175a 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[175b 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[175c 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[175d 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[175e 08-31 20:51:29.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[175f 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[1760 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[1761 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1762 08-31 20:51:29.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\266\2555\210f\247\017\302\002 6\325\271\331\023\377 ,\016\325l\340\252\003\026\006~u\271\225\250}\267Z&\026\205\207\264\3627O" > alive: alive: alive:A\346|\221\361\027\034\\$,\020\256\210\032\326\351y\021\207\020\301\"\326\023X\276\2439\250\002 f\031Y8\336$ofm\300k\256\220\245x\213\340\335u\025\205\014\351\\\007\210\376\033\330L}\370" > +[1763 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1764 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1765 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1766 08-31 20:51:29.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1767 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:r\364w\023\306\254\330\223\256\215+VdF" > > > , Envelope: 272 bytes, Signature: 0 bytes +[1768 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1769 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:r\364w\023\306\254\330\223\256\215+VdF" > > > , Envelope: 272 bytes, Signature: 0 bytes +[176a 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[176b 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 3d c9 53 d4 5c ce a4 15 c7 67 1c 7b 3d 79 3f |.=.S.\....g.{=y?| +00000010 8f 66 12 7b 70 0e 8c 4e d8 3e c0 03 f9 07 bc fb |.f.{p..N.>......| +[176c 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b4 9e 4e 9a fd 5d 98 e5 dd 2b |0E.!....N..]...+| +00000010 b2 70 9a 63 1e 86 43 04 0e aa db 15 c3 6a 46 67 |.p.c..C......jFg| +00000020 5b 3b 73 67 9c 02 20 7c a1 34 d7 9f ec b4 0d b9 |[;sg.. |.4......| +00000030 6f b7 6a 5b a2 db 7a d9 fd 8c 84 8b c6 b9 a5 8d |o.j[..z.........| +00000040 6f 71 81 be fc ea d6 |oq.....| +[176d 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[176e 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f6 09 47 16 09 f7 d5 d5 a3 b7 05 |0E.!...G........| +00000010 be 49 d6 05 56 33 55 56 bc 99 2a cb ae ab e6 5e |.I..V3UV..*....^| +00000020 15 2f 0f 0f 83 02 20 37 d9 db ad 52 f7 8c 22 e6 |./.... 7...R..".| +00000030 74 f6 69 1a ca 72 4f d0 3e 72 f4 77 13 c6 ac d8 |t.i..rO.>r.w....| +00000040 93 ae 8d 2b 56 64 46 |...+VdF| +[176f 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1770 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[1771 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1772 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1773 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[1774 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1775 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1776 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1777 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1778 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1779 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[177a 08-31 20:51:29.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[177b 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[177c 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:r\364w\023\306\254\330\223\256\215+VdF" > > alive:A\346|\221\361\027\034\\$,\020\256\210\032\326\351y\021\207\020\301\"\326\023X\276\2439\250\002 f\031Y8\336$ofm\300k\256\220\245x\213\340\335u\025\205\014\351\\\007\210\376\033\330L}\370" > +[177d 08-31 20:51:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[177e 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[177f 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1780 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1781 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1782 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1783 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1784 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1785 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1786 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1787 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[1788 08-31 20:51:29.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1789 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[178a 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[178b 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[178c 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[178d 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[178e 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[178f 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1790 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1791 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1792 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1793 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1794 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1795 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455ad40 gate 1598907089517367500 evaluation starts +[1796 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455ad40 signed by 0 principal evaluation starts (used [false]) +[1797 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455ad40 processing identity 0 with bytes of 115a4b0 +[1798 08-31 20:51:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455ad40 principal matched by identity 0 +[1799 08-31 20:51:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 44 e3 35 38 16 92 51 96 79 50 78 35 12 6b 97 |.D.58..Q.yPx5.k.| +00000010 04 a2 7c 72 ff 35 9d 57 a3 4f db ff 36 34 fc 0a |..|r.5.W.O..64..| +[179a 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef de 13 18 e3 79 74 64 07 10 b0 |0E.!......ytd...| +00000010 99 82 b0 12 15 ce 05 96 11 6c c4 99 31 59 33 0e |.........l..1Y3.| +00000020 8c e5 d0 bf 8b 02 20 1b 48 9b 5c 88 9c 3c 02 38 |...... .H.\..<.8| +00000030 fc b2 8a db 39 ca 2e 1a 5b 89 6a 92 df a1 4c 92 |....9...[.j...L.| +00000040 6a 7e 5a 52 3c 85 a1 |j~ZR<..| +[179b 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455ad40 principal evaluation succeeds for identity 0 +[179c 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00455ad40 gate 1598907089517367500 evaluation succeeds +[179d 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[179e 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[179f 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[17a0 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[17a1 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[17a2 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[17a3 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[17a4 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[17a5 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[17a6 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17a7 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17a8 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[17aa 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[17ac 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[17ad 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[17af 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[17b0 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[17b1 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[17ae 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[17b3 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[17b2 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17ab 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17b4 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17b5 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17b6 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17b7 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[17b8 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:A\346|\221\361\027\034\\$,\020\256\210\032\326\351y\021\207\020\301\"\326\023X\276\2439\250\002 f\031Y8\336$ofm\300k\256\220\245x\213\340\335u\025\205\014\351\\\007\210\376\033\330L}\370" > +[17b9 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[17ba 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[17bc 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17a9 08-31 20:51:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17bb 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17bd 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[17be 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[17bf 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[17c0 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17c1 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[17c2 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[17c3 08-31 20:51:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17c4 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[17c5 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[17c6 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[17c7 08-31 20:51:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17c8 08-31 20:51:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[17c9 08-31 20:51:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816101D +[17ca 08-31 20:51:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7EA2B3D26F0F00F38D612FD7765D1E76E4C11D48CA3034A807381024B8E71CBE +[17cb 08-31 20:51:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[17cc 08-31 20:51:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[17cd 08-31 20:51:29.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[17ce 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[17cf 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17d0 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[17d1 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17d2 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[17d3 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[17d4 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[17d5 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17d6 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17d7 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[17d8 08-31 20:51:29.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17d9 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[17da 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[17db 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17dc 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[17dd 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[17de 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[17df 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[17e0 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[17e1 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[17e2 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[17e3 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[17e4 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[17e5 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d8b0 gate 1598907089604577100 evaluation starts +[17e6 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d8b0 signed by 0 principal evaluation starts (used [false]) +[17e7 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d8b0 processing identity 0 with bytes of 115a4b0 +[17e8 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d8b0 principal matched by identity 0 +[17e9 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 44 e3 35 38 16 92 51 96 79 50 78 35 12 6b 97 |.D.58..Q.yPx5.k.| +00000010 04 a2 7c 72 ff 35 9d 57 a3 4f db ff 36 34 fc 0a |..|r.5.W.O..64..| +[17ea 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ef de 13 18 e3 79 74 64 07 10 b0 |0E.!......ytd...| +00000010 99 82 b0 12 15 ce 05 96 11 6c c4 99 31 59 33 0e |.........l..1Y3.| +00000020 8c e5 d0 bf 8b 02 20 1b 48 9b 5c 88 9c 3c 02 38 |...... .H.\..<.8| +00000030 fc b2 8a db 39 ca 2e 1a 5b 89 6a 92 df a1 4c 92 |....9...[.j...L.| +00000040 6a 7e 5a 52 3c 85 a1 |j~ZR<..| +[17eb 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d8b0 principal evaluation succeeds for identity 0 +[17ec 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00458d8b0 gate 1598907089604577100 evaluation succeeds +[17ed 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[17ee 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[17ef 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[17f0 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[17f1 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[17f2 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17f3 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[17f4 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e a2 b3 d2 6f 0f 00 f3 8d 61 2f d7 76 5d 1e 76 |~...o....a/.v].v| +00000010 e4 c1 1d 48 ca 30 34 a8 07 38 10 24 b8 e7 1c be |...H.04..8.$....| +[17f5 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 ff c2 cc 3b ff 9d 47 d4 86 4d 78 |0D. P...;..G..Mx| +00000010 7c dc 23 cf d9 25 91 2b 0a 97 78 ed a8 f5 6f 4b ||.#..%.+..x...oK| +00000020 5d f4 97 7a 02 20 4f 31 2a 25 d9 48 5d b9 d3 6d |]..z. O1*%.H]..m| +00000030 b9 b2 7f 59 9b 4b 02 8f 1c 6a 6a 0f 80 d7 76 96 |...Y.K...jj...v.| +00000040 7f 18 8f f4 23 38 |....#8| +[17f6 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[17f7 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[17f8 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17f9 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[17fa 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 3d c9 53 d4 5c ce a4 15 c7 67 1c 7b 3d 79 3f |.=.S.\....g.{=y?| +00000010 8f 66 12 7b 70 0e 8c 4e d8 3e c0 03 f9 07 bc fb |.f.{p..N.>......| +[17fb 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b4 9e 4e 9a fd 5d 98 e5 dd 2b |0E.!....N..]...+| +00000010 b2 70 9a 63 1e 86 43 04 0e aa db 15 c3 6a 46 67 |.p.c..C......jFg| +00000020 5b 3b 73 67 9c 02 20 7c a1 34 d7 9f ec b4 0d b9 |[;sg.. |.4......| +00000030 6f b7 6a 5b a2 db 7a d9 fd 8c 84 8b c6 b9 a5 8d |o.j[..z.........| +00000040 6f 71 81 be fc ea d6 |oq.....| +[17fc 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[17fd 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17fe 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[17ff 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[1800 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1801 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[1802 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1803 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1804 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e a2 b3 d2 6f 0f 00 f3 8d 61 2f d7 76 5d 1e 76 |~...o....a/.v].v| +00000010 e4 c1 1d 48 ca 30 34 a8 07 38 10 24 b8 e7 1c be |...H.04..8.$....| +[1805 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1806 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 ff c2 cc 3b ff 9d 47 d4 86 4d 78 |0D. P...;..G..Mx| +00000010 7c dc 23 cf d9 25 91 2b 0a 97 78 ed a8 f5 6f 4b ||.#..%.+..x...oK| +00000020 5d f4 97 7a 02 20 4f 31 2a 25 d9 48 5d b9 d3 6d |]..z. O1*%.H]..m| +00000030 b9 b2 7f 59 9b 4b 02 8f 1c 6a 6a 0f 80 d7 76 96 |...Y.K...jj...v.| +00000040 7f 18 8f f4 23 38 |....#8| +[1807 08-31 20:51:29.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[1808 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 45 a7 2b 2f cb 3f e1 a0 92 90 52 9c |0D. E.+/.?....R.| +00000010 9b a4 fe e3 5e 4d dc eb 2c 15 83 42 1c 8a 65 b5 |....^M..,..B..e.| +00000020 bd 67 05 0d 02 20 45 11 d1 c7 24 b6 97 39 16 3d |.g... E...$..9.=| +00000030 c0 cc 89 e5 06 c8 4c f3 37 e8 eb 21 9d 64 f8 9f |......L.7..!.d..| +00000040 67 b4 66 68 90 38 |g.fh.8| +[1809 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[180a 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[180b 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[180c 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[180d 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[180e 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[180f 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1810 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7e a2 b3 d2 6f 0f 00 f3 8d 61 2f d7 76 5d 1e 76 |~...o....a/.v].v| +00000010 e4 c1 1d 48 ca 30 34 a8 07 38 10 24 b8 e7 1c be |...H.04..8.$....| +[1811 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 50 ff c2 cc 3b ff 9d 47 d4 86 4d 78 |0D. P...;..G..Mx| +00000010 7c dc 23 cf d9 25 91 2b 0a 97 78 ed a8 f5 6f 4b ||.#..%.+..x...oK| +00000020 5d f4 97 7a 02 20 4f 31 2a 25 d9 48 5d b9 d3 6d |]..z. O1*%.H]..m| +00000030 b9 b2 7f 59 9b 4b 02 8f 1c 6a 6a 0f 80 d7 76 96 |...Y.K...jj...v.| +00000040 7f 18 8f f4 23 38 |....#8| +[1812 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1813 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1814 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1815 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1816 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 3d c9 53 d4 5c ce a4 15 c7 67 1c 7b 3d 79 3f |.=.S.\....g.{=y?| +00000010 8f 66 12 7b 70 0e 8c 4e d8 3e c0 03 f9 07 bc fb |.f.{p..N.>......| +[1817 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b4 9e 4e 9a fd 5d 98 e5 dd 2b |0E.!....N..]...+| +00000010 b2 70 9a 63 1e 86 43 04 0e aa db 15 c3 6a 46 67 |.p.c..C......jFg| +00000020 5b 3b 73 67 9c 02 20 7c a1 34 d7 9f ec b4 0d b9 |[;sg.. |.4......| +00000030 6f b7 6a 5b a2 db 7a d9 fd 8c 84 8b c6 b9 a5 8d |o.j[..z.........| +00000040 6f 71 81 be fc ea d6 |oq.....| +[1818 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1819 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[181a 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[181b 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[181c 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[181d 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[181e 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[181f 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1820 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1821 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1822 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2600 gate 1598907089618600100 evaluation starts +[1823 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2600 signed by 0 principal evaluation starts (used [false]) +[1824 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2600 processing identity 0 with bytes of 115a4b0 +[1825 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2600 principal matched by identity 0 +[1826 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 f4 c4 ab 64 23 45 dc 18 92 58 28 0c 4c 34 74 |"...d#E...X(.L4t| +00000010 79 c7 7f 57 0f b8 7f 32 d5 d9 e7 51 2f 15 27 48 |y..W...2...Q/.'H| +[1827 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c 5c 24 30 37 87 8d a5 03 50 26 ce |0D. .\$07....P&.| +00000010 07 8d 52 a6 96 61 57 31 55 3d 02 7c 44 87 a4 3f |..R..aW1U=.|D..?| +00000020 5f 58 b6 03 02 20 0f 46 f1 a2 01 af 47 40 2d 56 |_X... .F....G@-V| +00000030 7b 99 35 f1 a5 b0 45 ac 68 00 c3 c2 2a d5 71 ce |{.5...E.h...*.q.| +00000040 51 95 21 29 db 9e |Q.!)..| +[1828 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2600 principal evaluation succeeds for identity 0 +[1829 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045e2600 gate 1598907089618600100 evaluation succeeds +[182a 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[182b 08-31 20:51:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[182c 08-31 20:51:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[182d 08-31 20:51:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[182e 08-31 20:51:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[182f 08-31 20:51:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1830 08-31 20:51:29.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1831 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1832 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1833 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[1834 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1835 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1836 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1837 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1838 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1839 08-31 20:51:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[183a 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[183b 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[183c 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[183d 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[183e 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[183f 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[1840 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[1841 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1842 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1843 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1844 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1845 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1846 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1847 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1848 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1849 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460ca80 gate 1598907089756422300 evaluation starts +[184a 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460ca80 signed by 0 principal evaluation starts (used [false]) +[184b 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460ca80 processing identity 0 with bytes of 115a4b0 +[184c 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460ca80 principal matched by identity 0 +[184d 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[184e 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[184f 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460ca80 principal evaluation succeeds for identity 0 +[1850 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460ca80 gate 1598907089756422300 evaluation succeeds +[1851 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1852 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1853 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1854 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1855 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1856 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1857 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1858 08-31 20:51:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1859 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[185a 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[185b 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[185c 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[185d 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460dc80 gate 1598907089760792800 evaluation starts +[185e 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460dc80 signed by 0 principal evaluation starts (used [false]) +[185f 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460dc80 processing identity 0 with bytes of 115a4b0 +[1860 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460dc80 principal matched by identity 0 +[1861 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[1862 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[1863 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460dc80 principal evaluation succeeds for identity 0 +[1864 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00460dc80 gate 1598907089760792800 evaluation succeeds +[1865 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1866 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1867 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1868 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1869 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[186a 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[186b 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[186c 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[186d 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[186e 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[186f 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1870 08-31 20:51:29.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1871 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1872 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1873 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1874 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00462f0d0 gate 1598907089771986800 evaluation starts +[1875 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00462f0d0 signed by 0 principal evaluation starts (used [false]) +[1876 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00462f0d0 processing identity 0 with bytes of 115a4b0 +[1877 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00462f0d0 principal matched by identity 0 +[1878 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[1879 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[187a 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00462f0d0 principal evaluation succeeds for identity 0 +[187b 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00462f0d0 gate 1598907089771986800 evaluation succeeds +[187c 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[187d 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[187e 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[187f 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1880 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[1881 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[1882 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1883 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1884 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1885 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1886 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1887 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1888 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1889 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[188a 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464c9c0 gate 1598907089778916900 evaluation starts +[188b 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464c9c0 signed by 0 principal evaluation starts (used [false]) +[188c 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464c9c0 processing identity 0 with bytes of 115a4b0 +[188d 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464c9c0 principal matched by identity 0 +[188e 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[1890 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[1891 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464c9c0 principal evaluation succeeds for identity 0 +[1892 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00464c9c0 gate 1598907089778916900 evaluation succeeds +[188f 08-31 20:51:29.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1893 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1894 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1896 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1897 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1895 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1898 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[1899 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[189a 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[189c 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[189b 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[189d 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[189e 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[189f 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18a0 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18a1 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[18a2 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18a3 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18a4 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18a5 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[18a6 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[18a7 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[18a8 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[18a9 08-31 20:51:29.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[18aa 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[18ab 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004676500 gate 1598907089790346200 evaluation starts +[18ac 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004676500 signed by 0 principal evaluation starts (used [false]) +[18ad 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004676500 processing identity 0 with bytes of 115a4b0 +[18ae 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004676500 principal matched by identity 0 +[18af 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[18b0 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[18b1 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004676500 principal evaluation succeeds for identity 0 +[18b2 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004676500 gate 1598907089790346200 evaluation succeeds +[18b3 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[18b4 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[18b5 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[18b6 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[18b7 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[18b8 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[18b9 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[18ba 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[18bb 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18bc 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18bd 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[18be 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[18bf 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[18c0 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[18c1 08-31 20:51:29.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[18c2 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[18c3 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046944e0 gate 1598907089800244100 evaluation starts +[18c4 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046944e0 signed by 0 principal evaluation starts (used [false]) +[18c5 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046944e0 processing identity 0 with bytes of 115a4b0 +[18c6 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046944e0 principal matched by identity 0 +[18c7 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[18c8 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[18c9 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046944e0 principal evaluation succeeds for identity 0 +[18ca 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046944e0 gate 1598907089800244100 evaluation succeeds +[18cb 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[18cc 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[18cd 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[18ce 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[18cf 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18d0 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[18d1 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[18d2 08-31 20:51:29.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18d3 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[18d4 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18d5 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18d6 08-31 20:51:29.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18d7 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[18d8 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[18d9 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[18da 08-31 20:51:30.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18db 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[18dc 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[18dd 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18de 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[18df 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[18e0 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[18e1 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[18e2 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[18e3 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[18e4 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[18e5 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[18e6 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[18e7 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004695bd0 gate 1598907090047233800 evaluation starts +[18e8 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004695bd0 signed by 0 principal evaluation starts (used [false]) +[18e9 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004695bd0 processing identity 0 with bytes of 115a4b0 +[18ea 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004695bd0 principal matched by identity 0 +[18eb 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 20 ef c5 6b 52 32 b6 34 b6 2c ed f0 2f e9 6f 9b | ..kR2.4.,../.o.| +00000010 da 4b 4f 0c fb 16 0e d2 10 ad d3 a9 1c 3f 49 ba |.KO..........?I.| +[18ec 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5a ab d8 49 54 34 8c 63 5d 47 4e 8d |0D. Z..IT4.c]GN.| +00000010 e3 7d eb 56 47 3a 43 25 7f db 6f d6 71 3e c1 64 |.}.VG:C%..o.q>.d| +00000020 f8 2d 64 48 02 20 65 1c 28 34 38 e1 96 bb af 9d |.-dH. e.(48.....| +00000030 ad 26 80 c8 d3 c3 39 ab b4 6c 2c c7 e6 72 86 83 |.&....9..l,..r..| +00000040 15 47 d2 5b 48 62 |.G.[Hb| +[18ed 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004695bd0 principal evaluation succeeds for identity 0 +[18ee 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004695bd0 gate 1598907090047233800 evaluation succeeds +[18ef 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[18f0 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[18f1 08-31 20:51:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[18f2 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[18f3 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[18f4 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[18f5 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[18f6 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[18f7 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[18f8 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18f9 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18fa 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18fb 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[18fc 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[18fd 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[18fe 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[18ff 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1900 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1901 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1902 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1903 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1904 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1905 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1906 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1907 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1908 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1909 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[190a 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[190b 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[190d 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[190e 08-31 20:51:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[190c 08-31 20:51:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[190f 08-31 20:51:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1910 08-31 20:51:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1911 08-31 20:51:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1912 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1913 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1914 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1915 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1916 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1917 08-31 20:51:30.22 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1918 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1919 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[191a 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[191b 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[191c 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1e cd ab ed 1a fc af ba 52 93 0a 47 92 bf 8c ce |........R..G....| +00000010 01 61 a6 a6 03 a3 47 c7 f5 1f b4 8e a5 18 0e 75 |.a....G........u| +[191d 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 3a 28 c3 ba 72 b3 a2 51 bc 00 |0E.!..:(..r..Q..| +00000010 a3 86 3e d4 ef 98 31 9f 20 ab 5c 31 69 bf 31 45 |..>...1. .\1i.1E| +00000020 d0 65 0d be 6f 02 20 64 ad 90 72 89 7d aa 3d e3 |.e..o. d..r.}.=.| +00000030 b1 1c 6b 54 63 be 93 71 80 d8 42 e9 29 0d d4 94 |..kTc..q..B.)...| +00000040 e2 03 56 08 f5 76 a0 |..V..v.| +[191e 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[191f 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1920 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1921 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1922 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[1923 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1924 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1925 08-31 20:51:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1926 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1927 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1928 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1929 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[192a 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[192b 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[192c 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[192d 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[192e 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[192f 08-31 20:51:30.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1930 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1931 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1932 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1933 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1934 08-31 20:51:30.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1935 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1936 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1937 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1938 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1939 08-31 20:51:30.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[193a 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[193b 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[193c 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[193d 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[193e 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[193f 08-31 20:51:30.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1940 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1941 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1942 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1943 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1944 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1945 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1946 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f1280 gate 1598907090484768400 evaluation starts +[1947 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f1280 signed by 0 principal evaluation starts (used [false]) +[1948 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f1280 processing identity 0 with bytes of 115a4b0 +[1949 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f1280 principal matched by identity 0 +[194a 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a2 02 a8 09 99 42 10 8d ff 3a 85 67 e0 15 cf 13 |.....B...:.g....| +00000010 c1 55 6a bd ce 35 00 d7 ca dc c7 58 4b 35 11 55 |.Uj..5.....XK5.U| +[194b 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f b6 f2 75 ff 13 25 9b 7d d4 e1 f0 |0D. /..u..%.}...| +00000010 a1 f1 83 08 50 a7 58 55 50 24 c1 7d b0 58 95 c4 |....P.XUP$.}.X..| +00000020 96 ce aa 9d 02 20 43 6d 1b 37 e6 58 ec d9 b1 18 |..... Cm.7.X....| +00000030 4c 77 a1 ea 51 96 0a 43 e0 9a 30 9d d2 27 55 16 |Lw..Q..C..0..'U.| +00000040 16 db b7 33 68 13 |...3h.| +[194c 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f1280 principal evaluation succeeds for identity 0 +[194d 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046f1280 gate 1598907090484768400 evaluation succeeds +[194e 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[194f 08-31 20:51:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1950 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1951 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1952 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1953 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1954 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1955 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1956 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1957 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1958 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1959 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[195a 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[195b 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[195c 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[195d 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[195e 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[195f 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1960 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1961 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1962 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1963 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1964 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1965 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1966 08-31 20:51:30.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1967 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1968 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1969 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[196a 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[196b 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[196c 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[196d 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[196e 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[196f 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1970 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1971 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1972 08-31 20:51:30.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1973 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1974 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1975 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1976 08-31 20:51:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1977 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1978 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816101E +[1979 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 225CF3F8A5FDD1B8DC55E7A508A796DDC2AF808DD406864503B2F9B1C2D22ED7 +[197a 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[197b 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[197c 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[197d 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[197e 08-31 20:51:30.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[197f 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1980 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1981 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1982 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1983 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1984 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1985 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1986 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1987 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1988 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1989 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[198a 08-31 20:51:30.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[198b 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[198c 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[198d 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[198e 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[198f 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1990 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1991 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1992 08-31 20:51:32.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1993 08-31 20:51:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1994 08-31 20:51:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[1995 08-31 20:51:32.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1996 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1997 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1998 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1999 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[199a 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[199b 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[199c 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[199d 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[199e 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[199f 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[19a0 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[19a1 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[19a2 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004741bc0 gate 1598907093015670500 evaluation starts +[19a3 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004741bc0 signed by 0 principal evaluation starts (used [false]) +[19a4 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004741bc0 processing identity 0 with bytes of 115a4b0 +[19a5 08-31 20:51:33.01 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004741bc0 principal matched by identity 0 +[19a6 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 6b 8d 84 9c 5e 54 fd d2 47 1d 20 69 43 4d fe |.k...^T..G. iCM.| +00000010 3f 62 5a 35 2f b7 98 f5 9f 3d 5c 78 23 88 16 ac |?bZ5/....=\x#...| +[19a7 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 4f b9 fe ed 90 40 8a 5d 97 0f |0E.!..O....@.]..| +00000010 e7 9f bb 16 f0 5c 78 9d 1f e1 3b 86 8f 6d fa 71 |.....\x...;..m.q| +00000020 2e df 67 7c 3f 02 20 1e b2 61 f8 d3 85 bc a8 47 |..g|?. ..a.....G| +00000030 6f d8 27 5f 77 e4 c5 e9 7e 55 bf 24 04 8d 63 1b |o.'_w...~U.$..c.| +00000040 06 92 b3 98 47 ca 24 |....G.$| +[19a8 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004741bc0 principal evaluation succeeds for identity 0 +[19a9 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004741bc0 gate 1598907093015670500 evaluation succeeds +[19aa 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[19ab 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[19ac 08-31 20:51:33.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[19ad 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[19ae 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[19af 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[19b0 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[19b1 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[19b2 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[19b3 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19b4 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19b5 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19b6 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[19b7 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19b8 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19b9 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19ba 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[19bb 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[19bc 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19bd 08-31 20:51:33.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\324\357\2301\237 \253\\1i\2771E\320e\r\276o\002 d\255\220r\211}\252=\343\261\034kTc\276\223q\200\330B\351)\r\324\224\342\003V\010\365v\240" > alive: alive: alive: +[19be 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[19bf 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[19c0 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[19c1 08-31 20:51:33.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19c2 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:&,>\361\337_\206\356l\2308\303M\001,}\330\266$\213" > > > , Envelope: 271 bytes, Signature: 0 bytes +[19c3 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19c4 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:&,>\361\337_\206\356l\2308\303M\001,}\330\266$\213" > > > , Envelope: 271 bytes, Signature: 0 bytes +[19c5 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[19c6 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 38 f7 03 a3 ec c8 c5 a0 53 a1 da 5d a5 c9 ac |.8.......S..]...| +00000010 a1 e9 6a d5 e6 30 d3 4d 91 a8 d0 0b b9 77 a2 aa |..j..0.M.....w..| +[19c7 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 c8 1b d1 fb 63 f4 f3 dd 45 18 eb |0D. .....c...E..| +00000010 06 98 a8 95 67 20 9c 17 b8 9d 9d 27 99 53 87 f4 |....g .....'.S..| +00000020 24 56 74 78 02 20 1d b3 30 63 83 e3 0b 49 db 56 |$Vtx. ..0c...I.V| +00000030 2f 0b da 29 a4 5d b7 e6 b7 34 08 b5 23 50 30 0c |/..).]...4..#P0.| +00000040 37 ca 78 54 76 bb |7.xTv.| +[19c8 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[19c9 08-31 20:51:33.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 7a c0 ca f2 3b 7b e1 2f 19 e8 |0E.!..z...;{./..| +00000010 0b 00 d3 a4 29 45 b5 29 cd e4 ff 1c ec ac 03 01 |....)E.)........| +00000020 09 8a 05 ed 6d 02 20 2a e6 89 26 e1 27 92 05 eb |....m. *..&.'...| +00000030 f8 8a 3e 26 2c 3e f1 df 5f 86 ee 6c 98 38 c3 4d |..>&,>.._..l.8.M| +00000040 01 2c 7d d8 b6 24 8b |.,}..$.| +[19ca 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[19cb 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[19cc 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[19cd 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[19ce 08-31 20:51:33.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[19cf 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19d0 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19d1 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[19d2 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19d3 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19d4 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[19d5 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:&,>\361\337_\206\356l\2308\303M\001,}\330\266$\213" > > alive: +[19d6 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[19d7 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19d8 08-31 20:51:33.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19d9 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[19da 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[19db 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[19dc 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19dd 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19de 08-31 20:51:33.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19df 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19e0 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19e1 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19e2 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[19e3 08-31 20:51:33.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19e4 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[19e5 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[19e6 08-31 20:51:33.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[19e7 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[19e8 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[19e9 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[19ea 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[19eb 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[19ec 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[19ed 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[19ee 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[19ef 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[19f0 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047858f0 gate 1598907093494390200 evaluation starts +[19f1 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047858f0 signed by 0 principal evaluation starts (used [false]) +[19f2 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047858f0 processing identity 0 with bytes of 115a4b0 +[19f3 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047858f0 principal matched by identity 0 +[19f4 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 b3 5c 42 54 25 30 be b4 7c 78 b0 29 0c aa |...\BT%0..|x.)..| +00000010 90 ce 7f 27 82 1e a3 94 11 f2 89 16 2f a4 cd 3c |...'......../..<| +[19f5 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 d3 29 2b 65 f1 14 85 3c 04 39 |0E.!...)+e...<.9| +00000010 e3 96 d4 c0 95 94 3b c7 9d bf 68 83 8d 46 4e ac |......;...h..FN.| +00000020 d8 3b 75 e3 90 02 20 0b e2 04 10 ce d3 d7 98 df |.;u... .........| +00000030 70 5c 55 cc c1 a8 89 82 51 0a 97 83 5a b9 c6 62 |p\U.....Q...Z..b| +00000040 a5 2a 5c 68 25 20 91 |.*\h% .| +[19f6 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047858f0 principal evaluation succeeds for identity 0 +[19f7 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047858f0 gate 1598907093494390200 evaluation succeeds +[19f8 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[19f9 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[19fa 08-31 20:51:33.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[19fb 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[19fc 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[19fd 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[19fe 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[19ff 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1a00 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1a01 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a02 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a03 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a04 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[1a05 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a06 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a07 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a08 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[1a09 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1a0a 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1a0b 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a0c 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1a0d 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1a0e 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[1a0f 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1a10 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[1a11 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1a12 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1a13 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a14 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1a15 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a16 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1a17 08-31 20:51:33.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a18 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1a19 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1a1a 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1a1b 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a1c 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1a1d 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1a1e 08-31 20:51:33.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a1f 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1a20 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1a21 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1a22 08-31 20:51:33.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a23 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1a24 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816101F +[1a25 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4684F7ECDC255FE83AACCC14E720637FBFF47BDDEBBD85D7F14B2E1BF20766C2 +[1a26 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1a27 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1a28 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1a29 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[1a2a 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a2c 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[1a2d 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a2b 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1a2e 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a2f 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1a30 08-31 20:51:33.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a31 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[1a32 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a33 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[1a34 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1a36 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 84 f7 ec dc 25 5f e8 3a ac cc 14 e7 20 63 7f |F....%_.:.... c.| +00000010 bf f4 7b dd eb bd 85 d7 f1 4b 2e 1b f2 07 66 c2 |..{......K....f.| +[1a37 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 42 ab 9c 92 48 18 a7 24 e9 47 |0E.!..B...H..$.G| +00000010 c6 37 fc ec 20 b0 30 09 e1 29 6e 6c c1 fb b3 88 |.7.. .0..)nl....| +00000020 95 81 0c 1c ad 02 20 1e 53 3a 70 63 5f f2 25 11 |...... .S:pc_.%.| +00000030 52 20 86 d3 eb 20 49 ed 11 15 64 ec 97 d7 43 f6 |R ... I...d...C.| +00000040 d3 a8 8d 04 6f dd b1 |....o..| +[1a35 08-31 20:51:33.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1a38 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[1a3a 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8e 08 f2 9e 49 68 32 32 66 20 1a |0E.!.....Ih22f .| +00000010 bf 2f 46 9b c1 e4 6f d7 56 3f 86 35 a4 99 f7 e6 |./F...o.V?.5....| +00000020 09 a2 20 f2 88 02 20 74 61 0e 14 ca ba 9f f3 bf |.. ... ta.......| +00000030 02 12 c3 76 c6 9f ea a6 d7 c4 1a 9f a9 d6 7a d4 |...v..........z.| +00000040 cf ee 67 a6 16 d2 0b |..g....| +[1a39 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1a3b 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a3c 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1a3d 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1a3e 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a3f 08-31 20:51:33.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a40 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1a41 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1a42 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a43 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1a44 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1a45 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a46 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1a47 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1a48 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1a49 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1a4a 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1a4b 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1a4c 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047db380 gate 1598907093584325400 evaluation starts +[1a4d 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047db380 signed by 0 principal evaluation starts (used [false]) +[1a4e 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047db380 processing identity 0 with bytes of 115a4b0 +[1a4f 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047db380 principal matched by identity 0 +[1a50 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 90 b3 5c 42 54 25 30 be b4 7c 78 b0 29 0c aa |...\BT%0..|x.)..| +00000010 90 ce 7f 27 82 1e a3 94 11 f2 89 16 2f a4 cd 3c |...'......../..<| +[1a51 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 d3 29 2b 65 f1 14 85 3c 04 39 |0E.!...)+e...<.9| +00000010 e3 96 d4 c0 95 94 3b c7 9d bf 68 83 8d 46 4e ac |......;...h..FN.| +00000020 d8 3b 75 e3 90 02 20 0b e2 04 10 ce d3 d7 98 df |.;u... .........| +00000030 70 5c 55 cc c1 a8 89 82 51 0a 97 83 5a b9 c6 62 |p\U.....Q...Z..b| +00000040 a5 2a 5c 68 25 20 91 |.*\h% .| +[1a52 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047db380 principal evaluation succeeds for identity 0 +[1a53 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047db380 gate 1598907093584325400 evaluation succeeds +[1a54 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1a55 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1a56 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1a57 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1a58 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1a59 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a5a 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1a5b 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 84 f7 ec dc 25 5f e8 3a ac cc 14 e7 20 63 7f |F....%_.:.... c.| +00000010 bf f4 7b dd eb bd 85 d7 f1 4b 2e 1b f2 07 66 c2 |..{......K....f.| +[1a5c 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 42 ab 9c 92 48 18 a7 24 e9 47 |0E.!..B...H..$.G| +00000010 c6 37 fc ec 20 b0 30 09 e1 29 6e 6c c1 fb b3 88 |.7.. .0..)nl....| +00000020 95 81 0c 1c ad 02 20 1e 53 3a 70 63 5f f2 25 11 |...... .S:pc_.%.| +00000030 52 20 86 d3 eb 20 49 ed 11 15 64 ec 97 d7 43 f6 |R ... I...d...C.| +00000040 d3 a8 8d 04 6f dd b1 |....o..| +[1a5d 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1a5e 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1a5f 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a60 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1a61 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 38 f7 03 a3 ec c8 c5 a0 53 a1 da 5d a5 c9 ac |.8.......S..]...| +00000010 a1 e9 6a d5 e6 30 d3 4d 91 a8 d0 0b b9 77 a2 aa |..j..0.M.....w..| +[1a62 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 c8 1b d1 fb 63 f4 f3 dd 45 18 eb |0D. .....c...E..| +00000010 06 98 a8 95 67 20 9c 17 b8 9d 9d 27 99 53 87 f4 |....g .....'.S..| +00000020 24 56 74 78 02 20 1d b3 30 63 83 e3 0b 49 db 56 |$Vtx. ..0c...I.V| +00000030 2f 0b da 29 a4 5d b7 e6 b7 34 08 b5 23 50 30 0c |/..).]...4..#P0.| +00000040 37 ca 78 54 76 bb |7.xTv.| +[1a63 08-31 20:51:33.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1a64 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a65 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a66 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1a67 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1a68 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a69 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1a6a 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1a6b 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 46 84 f7 ec dc 25 5f e8 3a ac cc 14 e7 20 63 7f |F....%_.:.... c.| +00000010 bf f4 7b dd eb bd 85 d7 f1 4b 2e 1b f2 07 66 c2 |..{......K....f.| +[1a6c 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 42 ab 9c 92 48 18 a7 24 e9 47 |0E.!..B...H..$.G| +00000010 c6 37 fc ec 20 b0 30 09 e1 29 6e 6c c1 fb b3 88 |.7.. .0..)nl....| +00000020 95 81 0c 1c ad 02 20 1e 53 3a 70 63 5f f2 25 11 |...... .S:pc_.%.| +00000030 52 20 86 d3 eb 20 49 ed 11 15 64 ec 97 d7 43 f6 |R ... I...d...C.| +00000040 d3 a8 8d 04 6f dd b1 |....o..| +[1a6d 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1a6e 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1a6f 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a70 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1a71 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e4 38 f7 03 a3 ec c8 c5 a0 53 a1 da 5d a5 c9 ac |.8.......S..]...| +00000010 a1 e9 6a d5 e6 30 d3 4d 91 a8 d0 0b b9 77 a2 aa |..j..0.M.....w..| +[1a72 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 c8 1b d1 fb 63 f4 f3 dd 45 18 eb |0D. .....c...E..| +00000010 06 98 a8 95 67 20 9c 17 b8 9d 9d 27 99 53 87 f4 |....g .....'.S..| +00000020 24 56 74 78 02 20 1d b3 30 63 83 e3 0b 49 db 56 |$Vtx. ..0c...I.V| +00000030 2f 0b da 29 a4 5d b7 e6 b7 34 08 b5 23 50 30 0c |/..).]...4..#P0.| +00000040 37 ca 78 54 76 bb |7.xTv.| +[1a73 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1a74 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a75 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1a76 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a77 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1a78 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1a79 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1a7a 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1a7b 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1a7c 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1a7d 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482ef70 gate 1598907093596947600 evaluation starts +[1a7e 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482ef70 signed by 0 principal evaluation starts (used [false]) +[1a7f 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482ef70 processing identity 0 with bytes of 115a4b0 +[1a80 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482ef70 principal matched by identity 0 +[1a81 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d6 6b 8d 84 9c 5e 54 fd d2 47 1d 20 69 43 4d fe |.k...^T..G. iCM.| +00000010 3f 62 5a 35 2f b7 98 f5 9f 3d 5c 78 23 88 16 ac |?bZ5/....=\x#...| +[1a82 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c9 4f b9 fe ed 90 40 8a 5d 97 0f |0E.!..O....@.]..| +00000010 e7 9f bb 16 f0 5c 78 9d 1f e1 3b 86 8f 6d fa 71 |.....\x...;..m.q| +00000020 2e df 67 7c 3f 02 20 1e b2 61 f8 d3 85 bc a8 47 |..g|?. ..a.....G| +00000030 6f d8 27 5f 77 e4 c5 e9 7e 55 bf 24 04 8d 63 1b |o.'_w...~U.$..c.| +00000040 06 92 b3 98 47 ca 24 |....G.$| +[1a83 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482ef70 principal evaluation succeeds for identity 0 +[1a84 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00482ef70 gate 1598907093596947600 evaluation succeeds +[1a85 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1a86 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1a87 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1a88 08-31 20:51:33.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1a89 08-31 20:51:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1a8a 08-31 20:51:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a8b 08-31 20:51:33.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a8c 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a8d 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a8e 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[1a8f 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1a91 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a90 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1a93 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a92 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1a94 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1a95 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1a96 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1a97 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a98 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1a99 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a9a 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1a9b 08-31 20:51:33.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1a9c 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1a9d 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1a9e 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1a9f 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1aa0 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1aa1 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004854590 gate 1598907093720843300 evaluation starts +[1aa2 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004854590 signed by 0 principal evaluation starts (used [false]) +[1aa3 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004854590 processing identity 0 with bytes of 115a4b0 +[1aa4 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004854590 principal matched by identity 0 +[1aa5 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[1aa6 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[1aa7 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004854590 principal evaluation succeeds for identity 0 +[1aa8 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004854590 gate 1598907093720843300 evaluation succeeds +[1aa9 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1aaa 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1aab 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1aac 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1aad 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[1aae 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[1aaf 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[1ab0 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[1ab1 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ab2 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ab3 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1ab4 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1ab5 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1ab6 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1ab7 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1ab8 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1ab9 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004872570 gate 1598907093729206500 evaluation starts +[1aba 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004872570 signed by 0 principal evaluation starts (used [false]) +[1abb 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004872570 processing identity 0 with bytes of 115a4b0 +[1abc 08-31 20:51:33.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004872570 principal matched by identity 0 +[1abd 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[1abe 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[1abf 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004872570 principal evaluation succeeds for identity 0 +[1ac0 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004872570 gate 1598907093729206500 evaluation succeeds +[1ac1 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1ac2 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1ac3 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1ac4 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1ac5 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ac6 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1ac7 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[1ac8 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[1ac9 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[1aca 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[1acb 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1acc 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1acd 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1ace 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1acf 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1ad0 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1ad1 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1ad2 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1ad3 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c6f0 gate 1598907093736100300 evaluation starts +[1ad4 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c6f0 signed by 0 principal evaluation starts (used [false]) +[1ad5 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c6f0 processing identity 0 with bytes of 115a4b0 +[1ad6 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c6f0 principal matched by identity 0 +[1ad7 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[1ad8 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[1ad9 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c6f0 principal evaluation succeeds for identity 0 +[1ada 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488c6f0 gate 1598907093736100300 evaluation succeeds +[1adb 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1adc 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1add 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1ade 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1adf 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ae0 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ae1 08-31 20:51:33.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1ae2 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1ae3 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1ae4 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1ae5 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1ae6 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1ae7 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488d8f0 gate 1598907093741284000 evaluation starts +[1ae8 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488d8f0 signed by 0 principal evaluation starts (used [false]) +[1ae9 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488d8f0 processing identity 0 with bytes of 115a4b0 +[1aea 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488d8f0 principal matched by identity 0 +[1aeb 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[1aec 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[1aed 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488d8f0 principal evaluation succeeds for identity 0 +[1aee 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00488d8f0 gate 1598907093741284000 evaluation succeeds +[1aef 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1af0 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1af1 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1af2 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1af3 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1af4 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1af5 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1af6 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1af7 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1af8 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1af9 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1afa 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1afb 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1afc 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1afd 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1afe 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a6d40 gate 1598907093748593100 evaluation starts +[1aff 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a6d40 signed by 0 principal evaluation starts (used [false]) +[1b00 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a6d40 processing identity 0 with bytes of 115a4b0 +[1b01 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a6d40 principal matched by identity 0 +[1b02 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[1b03 08-31 20:51:33.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[1b04 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a6d40 principal evaluation succeeds for identity 0 +[1b05 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048a6d40 gate 1598907093748593100 evaluation succeeds +[1b06 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1b07 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1b08 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1b0a 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b09 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1b0b 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b0c 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[1b0d 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[1b0f 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[1b10 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b11 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b0e 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b12 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1b13 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1b14 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1b16 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1b17 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1b18 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1b19 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cc630 gate 1598907093753575600 evaluation starts +[1b1a 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cc630 signed by 0 principal evaluation starts (used [false]) +[1b1b 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cc630 processing identity 0 with bytes of 115a4b0 +[1b15 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b1c 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cc630 principal matched by identity 0 +[1b1e 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[1b1f 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[1b20 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cc630 principal evaluation succeeds for identity 0 +[1b21 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cc630 gate 1598907093753575600 evaluation succeeds +[1b22 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1b23 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1b24 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1b1d 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[1b25 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1b26 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1b27 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b28 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[1b29 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[1b2a 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b2b 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1b2c 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1b2d 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b2e 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[1b2f 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[1b30 08-31 20:51:33.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1b31 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610081801 +[1b32 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DA39B9D5BD5A60DF005FA9CE709D7CD351AF2DBEC1C1FE32E1BA800D0E48973B +[1b33 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[1b34 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b35 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b36 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b37 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b38 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[1b39 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b3a 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b3b 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[1b3c 08-31 20:51:33.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b3d 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:11080509220039814310 tag:EMPTY mem_req:\302\216S\276\256bY\002 \0215\226\376\354\221X\201\002\031\262Y\225\352\345I\331\351\215\362?\352\272\262\ti\027\310\256m\273c" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes +[1b3e 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b3f 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:11080509220039814310 tag:EMPTY mem_req:\302\216S\276\256bY\002 \0215\226\376\354\221X\201\002\031\262Y\225\352\345I\331\351\215\362?\352\272\262\ti\027\310\256m\273c" secret_envelope: > > , Envelope: 282 bytes, Signature: 0 bytes +[1b40 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1b41 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 39 51 92 e1 81 19 3b bc 95 bd de 3e d0 c2 91 97 |9Q....;....>....| +00000010 f4 77 46 a2 d5 6a 83 a5 81 8a 7c 24 a2 23 2a a0 |.wF..j....|$.#*.| +[1b42 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 36 a9 b5 76 7a a8 39 ff df c5 89 |0D. `6..vz.9....| +00000010 cc 47 6a 2c ad 46 e5 73 ab a5 1a 44 3e c2 8e 53 |.Gj,.F.s...D>..S| +00000020 be ae 62 59 02 20 11 35 96 fe ec 91 58 81 02 19 |..bY. .5....X...| +00000030 b2 59 95 ea e5 49 d9 e9 8d f2 3f ea ba b2 09 69 |.Y...I....?....i| +00000040 17 c8 ae 6d bb 63 |...m.c| +[1b43 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1b44 08-31 20:51:33.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 b3 61 b5 6f ee 48 23 84 ef 7b |0E.!...a.o.H#..{| +00000010 c9 ab 19 96 09 a1 fe fc 35 b8 ef 3a 97 a7 91 56 |........5..:...V| +00000020 ae 5a 64 eb d9 02 20 12 e8 e5 db 05 71 aa 8f 98 |.Zd... .....q...| +00000030 81 79 76 41 2b 83 fe e2 76 6c 11 af 2c ff 23 9e |.yvA+...vl..,.#.| +00000040 3b b3 07 0c e4 ae 3f |;.....?| +[1b45 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b46 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1b47 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b48 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b49 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 11080509220039814310, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes to 1 peers +[1b4a 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 11080509220039814310, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 443 bytes, Signature: 0 bytes +[1b4c 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b4b 08-31 20:51:33.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:&,>\361\337_\206\356l\2308\303M\001,}\330\266$\213" > > alive: +[1b4d 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1b4e 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b4f 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b50 08-31 20:51:33.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b51 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[1b52 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[1b53 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1b54 08-31 20:51:33.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b55 08-31 20:51:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: nonce:270579457140118257 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes +[1b56 08-31 20:51:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b57 08-31 20:51:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:270579457140118257 tag:EMPTY mem_req: > > , Envelope: 282 bytes, Signature: 0 bytes +[1b58 08-31 20:51:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1b59 08-31 20:51:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 08 a3 c6 ca c4 cc 18 ce 24 c3 1e 75 a7 13 3d 4b |........$..u..=K| +00000010 b4 1a be b9 83 40 08 c8 90 ad 9d a8 42 de 89 71 |.....@......B..q| +[1b5a 08-31 20:51:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c7 2a b2 90 d2 c8 c5 b4 94 1d ea |0E.!..*.........| +00000010 12 3d ec e0 16 1c 4a f5 b6 fd 26 51 33 6e 48 4f |.=....J...&Q3nHO| +00000020 4e 73 ac 8d c1 02 20 12 1c 60 c9 8f e7 08 24 e1 |Ns.... ..`....$.| +00000030 26 29 22 88 01 7f 7a 26 27 d3 b1 19 b4 9f 54 14 |&)"...z&'.....T.| +00000040 11 84 8f 0e 46 3f 1f |....F?.| +[1b5b 08-31 20:51:34.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1b5c 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e5 b2 fc d5 9d e3 db 5f cd 7d b7 |0E.!........_.}.| +00000010 4f 9a bd 90 4e e3 c0 58 26 40 e6 a6 6e e9 6b f9 |O...N..X&@..n.k.| +00000020 c3 f4 5d c1 6c 02 20 6f 20 97 19 b0 68 5c 50 6d |..].l. o ...h\Pm| +00000030 99 da bb 5e 10 70 75 85 fa 5b 15 85 38 18 0a db |...^.pu..[..8...| +00000040 cc df d9 9c bc 31 fe |.....1.| +[1b5d 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b5e 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1b5f 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b60 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b61 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 270579457140118257, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes to 1 peers +[1b62 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:&,>\361\337_\206\356l\2308\303M\001,}\330\266$\213" > > alive: +[1b63 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 270579457140118257, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 442 bytes, Signature: 0 bytes +[1b64 08-31 20:51:34.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b65 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1b66 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1b67 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b68 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b69 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b6a 08-31 20:51:34.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b6b 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:9094981273582956271 tag:EMPTY mem_req:\322\327\217\322\373\014SX+\002 `\022\355\361\274\256\226\021\311\312\037\325\240\003\257\374\235\177T\356\007S\276\210\th^\367\322\010\317\366" > > , Envelope: 175 bytes, Signature: 0 bytes +[1b6c 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: nonce:9094981273582956271 tag:EMPTY mem_req:\322\327\217\322\373\014SX+\002 `\022\355\361\274\256\226\021\311\312\037\325\240\003\257\374\235\177T\356\007S\276\210\th^\367\322\010\317\366" > > , Envelope: 175 bytes, Signature: 0 bytes +[1b6d 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b6e 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:9094981273582956271 tag:EMPTY mem_req:\322\327\217\322\373\014SX+\002 `\022\355\361\274\256\226\021\311\312\037\325\240\003\257\374\235\177T\356\007S\276\210\th^\367\322\010\317\366" > > , Envelope: 175 bytes, Signature: 0 bytes +[1b6f 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1b70 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b71 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1b72 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1b73 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1b74 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1b75 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1b76 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1b77 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492edd0 gate 1598907094439652900 evaluation starts +[1b78 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492edd0 signed by 0 principal evaluation starts (used [false]) +[1b79 08-31 20:51:34.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492edd0 processing identity 0 with bytes of 115a4b0 +[1b7a 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492edd0 principal matched by identity 0 +[1b7b 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 61 06 fe f8 db b4 d7 7f 1b 2a ce d8 a8 3a 1e 5e |a........*...:.^| +00000010 3a fa 98 74 01 5a 87 27 5f a8 e4 a0 84 7b b7 ec |:..t.Z.'_....{..| +[1b7c 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 60 04 af cc 95 ac 59 5e 55 d0 68 6e |0D. `.....Y^U.hn| +00000010 5c ba dd a6 62 d7 5a 70 d6 66 3e d2 d7 8f d2 fb |\...b.Zp.f>.....| +00000020 0c 53 58 2b 02 20 60 12 ed f1 bc ae 96 11 c9 ca |.SX+. `.........| +00000030 1f d5 a0 03 af fc 9d 7f 54 ee 07 53 be 88 09 68 |........T..S...h| +00000040 5e f7 d2 08 cf f6 |^.....| +[1b7d 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492edd0 principal evaluation succeeds for identity 0 +[1b7e 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492edd0 gate 1598907094439652900 evaluation succeeds +[1b7f 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1b80 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1b81 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1b82 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1b83 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b84 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[1b85 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b86 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b87 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b88 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 9094981273582956271, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers +[1b89 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1b8a 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 9094981273582956271, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +[1b8b 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b8c 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1b8d 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1b8e 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b8f 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b90 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b91 08-31 20:51:34.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b92 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:14031637786944006989 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +[1b93 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:14031637786944006989 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +[1b94 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1b95 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:14031637786944006989 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +[1b96 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1b97 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1b98 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1b99 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1b9a 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1b9b 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1b9c 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1b9d 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1b9e 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049664d0 gate 1598907094676786100 evaluation starts +[1b9f 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049664d0 signed by 0 principal evaluation starts (used [false]) +[1ba0 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049664d0 processing identity 0 with bytes of 115a4b0 +[1ba1 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049664d0 principal matched by identity 0 +[1ba2 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 99 66 fd 9c c9 b8 d9 32 a5 2b 55 1b 0e 4b 55 ee |.f.....2.+U..KU.| +00000010 ae 75 42 51 6d ff ad 4d f6 ea 73 a8 19 99 e8 9e |.uBQm..M..s.....| +[1ba3 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1c b1 7b 15 b4 de 75 18 d5 54 84 50 |0D. ..{...u..T.P| +00000010 95 fd ed 9a 20 e9 44 98 92 74 4b 8d 04 98 29 30 |.... .D..tK...)0| +00000020 c8 11 0c 77 02 20 16 5f 7d 7d 70 bb ed b4 7a d1 |...w. ._}}p...z.| +00000030 8f 51 d7 a5 cd 39 ff bc 44 d3 bf a8 f3 5f 55 55 |.Q...9..D...._UU| +00000040 ee 2f 6a 72 8b 69 |./jr.i| +[1ba4 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049664d0 principal evaluation succeeds for identity 0 +[1ba5 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049664d0 gate 1598907094676786100 evaluation succeeds +[1ba6 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1ba7 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1ba8 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1ba9 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1baa 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bab 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[1bac 08-31 20:51:34.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bad 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bae 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1baf 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 14031637786944006989, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes to 1 peers +[1bb0 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1bb1 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 14031637786944006989, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 659 bytes, Signature: 0 bytes +[1bb2 08-31 20:51:34.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bb3 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bb4 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bb5 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bb6 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bb7 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1bb8 08-31 20:51:35.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bb9 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1bba 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1bbb 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1bbc 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1bbd 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1bbe 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1bbf 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495f360 gate 1598907095021532200 evaluation starts +[1bc0 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495f360 signed by 0 principal evaluation starts (used [false]) +[1bc1 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495f360 processing identity 0 with bytes of 115a4b0 +[1bc2 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495f360 principal matched by identity 0 +[1bc3 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 e3 df 1d 27 0f 55 03 7e 01 74 87 d8 0a fe 96 |5...'.U.~.t.....| +00000010 2e 95 46 dc 04 49 32 1c 78 38 93 a5 a0 97 29 f6 |..F..I2.x8....).| +[1bc4 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 a9 9b 8a 91 6a 3e 56 6c 67 49 b3 |0D. .....j>VlgI.| +00000010 0d 69 fb cd 57 09 79 4e c5 1a 8d 7e fe 97 23 6c |.i..W.yN...~..#l| +00000020 ae c6 ce 98 02 20 10 4c be d9 39 a2 eb 13 95 3b |..... .L..9....;| +00000030 b3 50 90 2d bf 6d f4 f8 3c e4 50 c0 a6 34 2b 3c |.P.-.m..<.P..4+<| +00000040 d1 d9 a3 e4 03 bf |......| +[1bc5 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495f360 principal evaluation succeeds for identity 0 +[1bc6 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00495f360 gate 1598907095021532200 evaluation succeeds +[1bc7 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1bc8 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1bc9 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1bca 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1bcb 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bcc 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1bcd 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1bce 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1bcf 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1bd0 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bd1 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bd2 08-31 20:51:35.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bd3 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bd4 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bd5 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bd6 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bd7 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bd8 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bd9 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bda 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bdc 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bdb 08-31 20:51:35.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bdd 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bde 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bdf 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1be0 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1be1 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1be2 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1be3 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1be5 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1be4 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1be6 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1be7 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1be8 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1be9 08-31 20:51:35.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bea 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1beb 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bec 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bed 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1bee 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9e 68 e1 9f 6a cf 4b 51 94 26 3d f3 b4 96 65 0e |.h..j.KQ.&=...e.| +00000010 83 18 51 0d 1e 95 21 8c 2b 87 c2 30 e0 b7 7c 36 |..Q...!.+..0..|6| +[1bef 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e d6 c1 ed a6 6a 4d 7c 26 09 1f 1a |0D. .....jM|&...| +00000010 5d 34 72 e2 9e 77 a4 01 73 c6 f2 8d 2d 6d 0c cb |]4r..w..s...-m..| +00000020 f5 a4 16 2b 02 20 66 ec 64 f0 96 5d af 46 e1 72 |...+. f.d..].F.r| +00000030 cf 93 fc 30 61 ec c3 64 cb 6b 6e 43 25 28 1b 0d |...0a..d.knC%(..| +00000040 e9 d1 03 99 53 02 |....S.| +[1bf0 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bf1 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1bf2 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1bf3 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1bf4 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[1bf5 08-31 20:51:35.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bf6 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bf7 08-31 20:51:35.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1bf8 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bf9 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bfa 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bfb 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1bfc 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1bfd 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1bfe 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1bff 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c00 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c01 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c02 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c03 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c04 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c05 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c06 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c07 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c08 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c09 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c0a 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c0b 08-31 20:51:35.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c0c 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c0d 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c0e 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c0f 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c10 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1c11 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c12 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1c13 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1c14 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1c15 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1c16 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1c17 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1c18 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c6b30 gate 1598907095448051500 evaluation starts +[1c19 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c6b30 signed by 0 principal evaluation starts (used [false]) +[1c1a 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c6b30 processing identity 0 with bytes of 115a4b0 +[1c1b 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c6b30 principal matched by identity 0 +[1c1c 08-31 20:51:35.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 24 6e 9e 14 7d e7 b2 c9 08 af 03 12 73 c3 09 |.$n..}.......s..| +00000010 df 45 1c 2a 6e 2f f1 cb 11 9b f8 40 fa dd bd 55 |.E.*n/.....@...U| +[1c1d 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 30 4d 48 5d ac 09 38 f7 9f 1b 6f 61 |0D. 0MH]..8...oa| +00000010 c2 9e bf f7 85 a9 31 70 9e a5 87 ff 3c 66 70 06 |......1p.... DEBU 0xc0049c6b30 principal evaluation succeeds for identity 0 +[1c1f 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049c6b30 gate 1598907095448051500 evaluation succeeds +[1c20 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1c21 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1c22 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1c23 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1c25 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c26 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1c24 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c27 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1c28 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c29 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1c2a 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1c2b 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c2c 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c2d 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c2e 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c2f 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c30 08-31 20:51:35.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c31 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c32 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c33 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c34 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c35 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c36 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c37 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c38 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1c3a 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c3b 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c39 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c3c 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1c3d 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c3e 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c3f 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c40 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c41 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1c42 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c43 08-31 20:51:35.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[1c44 08-31 20:51:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1c45 08-31 20:51:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161020 +[1c46 08-31 20:51:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AD78A854DEEC8259918DFF7043227932B8E30C0866D6083D793236166F13B9F0 +[1c47 08-31 20:51:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1c48 08-31 20:51:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1c49 08-31 20:51:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1c4a 08-31 20:51:35.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1c4b 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c4c 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c4d 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c4e 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1c4f 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1c50 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c51 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c52 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c53 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1c54 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c55 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c56 08-31 20:51:35.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c57 08-31 20:51:35.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c58 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1c59 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1c5a 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1c5b 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c5c 08-31 20:51:36.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c5d 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c5e 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c5f 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c60 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c61 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[1c62 08-31 20:51:36.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c63 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1c64 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1c65 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c66 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1c67 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1c68 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c69 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1c6a 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1c6b 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1c6c 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1c6d 08-31 20:51:37.01 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1c6e 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1c6f 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a28650 gate 1598907097020124200 evaluation starts +[1c70 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a28650 signed by 0 principal evaluation starts (used [false]) +[1c71 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a28650 processing identity 0 with bytes of 115a4b0 +[1c72 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a28650 principal matched by identity 0 +[1c73 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db a1 0a ad 45 ca e7 06 61 d1 7b dd bc 70 48 93 |....E...a.{..pH.| +00000010 ac c2 56 d7 f0 1b 15 fb 3e 41 97 96 03 b1 89 27 |..V.....>A.....'| +[1c74 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 d2 c1 83 d8 f9 44 42 c5 99 b6 |0E.!.......DB...| +00000010 02 bd 14 01 a5 d8 28 32 e8 19 e9 38 4d 49 90 40 |......(2...8MI.@| +00000020 58 3b 4d c5 16 02 20 51 03 82 01 fc 09 e9 1e a6 |X;M... Q........| +00000030 96 87 c3 cd a1 48 e1 e9 d5 c0 77 64 5f ed be e3 |.....H....wd_...| +00000040 40 62 d3 e0 07 67 c5 |@b...g.| +[1c75 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a28650 principal evaluation succeeds for identity 0 +[1c76 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a28650 gate 1598907097020124200 evaluation succeeds +[1c77 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1c78 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1c79 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1c7a 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1c7b 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1c7c 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1c7d 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1c7e 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1c7f 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1c80 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c81 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c82 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c83 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[1c84 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c85 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c86 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1c87 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[1c88 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1c89 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1c8a 08-31 20:51:37.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c8b 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1c8c 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1c8d 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1c8e 08-31 20:51:37.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c8f 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[1c90 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c91 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[1c92 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1c93 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 4d b1 e5 64 ab 5d 7d 73 b3 77 98 b1 c0 2e 87 |.M..d.]}s.w.....| +00000010 dc 4e 7c d3 dc 21 20 be 6e 87 78 44 ba b2 41 76 |.N|..! .n.xD..Av| +[1c94 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 65 31 6f 20 db 46 d8 e7 4c 79 |0E.!..e1o .F..Ly| +00000010 a2 db ea ac 1f 1d cc 90 dd e0 6d 70 f6 a0 c9 bd |..........mp....| +00000020 f4 3a 59 bb 3c 02 20 42 04 8a ac e4 a8 9d d6 79 |.:Y.<. B.......y| +00000030 c1 7c de 43 b2 e5 dd aa 1c 9e 71 9a e0 8f 9d 72 |.|.C......q....r| +00000040 58 a1 ce a7 d4 b6 03 |X......| +[1c95 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1c96 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9b a5 f8 28 0b f2 9c 43 78 e1 a2 |0E.!....(...Cx..| +00000010 85 22 96 b4 ad 5d df 46 ac 96 f9 d3 04 18 14 4c |."...].F.......L| +00000020 0b 07 70 3a f3 02 20 55 c8 f0 d3 9a 93 84 dd d9 |..p:.. U........| +00000030 07 82 37 54 7f db 62 f9 64 57 5b 5d d1 54 75 7b |..7T..b.dW[].Tu{| +00000040 b5 50 08 be 15 2b f4 |.P...+.| +[1c97 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1c98 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[1c99 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1c9a 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1c9b 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1c9c 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c9d 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c9e 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1c9f 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1ca0 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ca1 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ca2 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +[1ca3 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[1ca4 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[1ca5 08-31 20:51:37.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ca6 08-31 20:51:37.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1ca7 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1ca8 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1ca9 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1caa 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cab 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cac 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cad 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cae 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1caf 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[1cb0 08-31 20:51:37.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cb1 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1cb2 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1cb3 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cb4 08-31 20:51:37.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1cb5 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1cb6 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cb7 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1cb8 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1cb9 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1cba 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1cbb 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1cbc 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1cbd 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a68e40 gate 1598907097492117600 evaluation starts +[1cbe 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a68e40 signed by 0 principal evaluation starts (used [false]) +[1cbf 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a68e40 processing identity 0 with bytes of 115a4b0 +[1cc0 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a68e40 principal matched by identity 0 +[1cc1 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 3c 08 3d bc c6 89 79 ba 4a ac 99 82 f1 fa 4d |.<.=...y.J.....M| +00000010 0f a6 dd 71 2d 6b 0f d5 9b b2 82 ad 5e 80 da c8 |...q-k......^...| +[1cc2 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 55 55 55 3f 7d 18 aa 53 15 e1 |0E.!..UUU?}..S..| +00000010 cc 53 46 31 e9 7c 18 3a 50 d2 cd d0 a0 44 0d fe |.SF1.|.:P....D..| +00000020 03 0f 29 76 0d 02 20 2f bd ba c1 eb 6b 9f 2d 86 |..)v.. /....k.-.| +00000030 a9 e4 eb 8f fc 4f 76 ee e0 64 f2 97 8f 9c 1a 3a |.....Ov..d.....:| +00000040 5e 1d 64 1d 25 85 81 |^.d.%..| +[1cc3 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a68e40 principal evaluation succeeds for identity 0 +[1cc4 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004a68e40 gate 1598907097492117600 evaluation succeeds +[1cc5 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1cc6 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1cc7 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1cc8 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1cc9 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1cca 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1ccb 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1ccc 08-31 20:51:37.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1ccd 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1cce 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ccf 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cd0 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cd1 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[1cd2 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cd3 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cd4 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cd5 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +[1cd6 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[1cd7 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1cd8 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[1cd9 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1cda 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1cdd 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1cde 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1ce1 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cdf 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1ce3 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cdc 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[1ce4 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ce0 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1ce5 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cdb 08-31 20:51:37.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[1ce2 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1ce6 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1ce7 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ce8 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1ce9 08-31 20:51:37.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1cea 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1ceb 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cec 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1ced 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1cee 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1cef 08-31 20:51:37.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cf0 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1cf1 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161021 +[1cf2 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E8C5901C2389B1557B43264AB8D6705AB628A6938D2B0A0D7C58E6F0727DE636 +[1cf3 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1cf4 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1cf5 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1cf6 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[1cf7 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cf9 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[1cfa 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1cfc 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[1cfd 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1cf8 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[1cfb 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[1d00 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cfe 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1cff 08-31 20:51:37.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d01 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1d02 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1d03 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d04 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1d05 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1d06 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 c5 90 1c 23 89 b1 55 7b 43 26 4a b8 d6 70 5a |....#..U{C&J..pZ| +00000010 b6 28 a6 93 8d 2b 0a 0d 7c 58 e6 f0 72 7d e6 36 |.(...+..|X..r}.6| +[1d07 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 37 11 34 5e 7c bc 37 64 82 1b 45 |0D. ,7.4^|.7d..E| +00000010 11 dc 71 6e 82 b7 d1 51 2a d8 d1 d9 47 36 94 5a |..qn...Q*...G6.Z| +00000020 67 d1 73 de 02 20 67 86 18 97 66 53 75 a1 da 19 |g.s.. g...fSu...| +00000030 61 5e 5c 2b f1 16 bc ab 13 78 7c c6 83 90 87 63 |a^\+.....x|....c| +00000040 41 01 da cb e5 e6 |A.....| +[1d08 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1d09 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1d0a 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d0b 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1d0c 08-31 20:51:37.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 4d b1 e5 64 ab 5d 7d 73 b3 77 98 b1 c0 2e 87 |.M..d.]}s.w.....| +00000010 dc 4e 7c d3 dc 21 20 be 6e 87 78 44 ba b2 41 76 |.N|..! .n.xD..Av| +[1d0d 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 65 31 6f 20 db 46 d8 e7 4c 79 |0E.!..e1o .F..Ly| +00000010 a2 db ea ac 1f 1d cc 90 dd e0 6d 70 f6 a0 c9 bd |..........mp....| +00000020 f4 3a 59 bb 3c 02 20 42 04 8a ac e4 a8 9d d6 79 |.:Y.<. B.......y| +00000030 c1 7c de 43 b2 e5 dd aa 1c 9e 71 9a e0 8f 9d 72 |.|.C......q....r| +00000040 58 a1 ce a7 d4 b6 03 |X......| +[1d0e 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1d0f 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d10 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1d11 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d12 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1d13 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1d14 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1d15 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1d16 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1d17 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1d18 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad0850 gate 1598907097591780700 evaluation starts +[1d19 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad0850 signed by 0 principal evaluation starts (used [false]) +[1d1a 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad0850 processing identity 0 with bytes of 115a4b0 +[1d1b 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad0850 principal matched by identity 0 +[1d1c 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 db a1 0a ad 45 ca e7 06 61 d1 7b dd bc 70 48 93 |....E...a.{..pH.| +00000010 ac c2 56 d7 f0 1b 15 fb 3e 41 97 96 03 b1 89 27 |..V.....>A.....'| +[1d1d 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 d2 c1 83 d8 f9 44 42 c5 99 b6 |0E.!.......DB...| +00000010 02 bd 14 01 a5 d8 28 32 e8 19 e9 38 4d 49 90 40 |......(2...8MI.@| +00000020 58 3b 4d c5 16 02 20 51 03 82 01 fc 09 e9 1e a6 |X;M... Q........| +00000030 96 87 c3 cd a1 48 e1 e9 d5 c0 77 64 5f ed be e3 |.....H....wd_...| +00000040 40 62 d3 e0 07 67 c5 |@b...g.| +[1d1e 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad0850 principal evaluation succeeds for identity 0 +[1d1f 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ad0850 gate 1598907097591780700 evaluation succeeds +[1d20 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1d21 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1d22 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1d23 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1d24 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1d25 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d26 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d27 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[1d28 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d29 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[1d2a 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1d2b 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 c5 90 1c 23 89 b1 55 7b 43 26 4a b8 d6 70 5a |....#..U{C&J..pZ| +00000010 b6 28 a6 93 8d 2b 0a 0d 7c 58 e6 f0 72 7d e6 36 |.(...+..|X..r}.6| +[1d2c 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 37 11 34 5e 7c bc 37 64 82 1b 45 |0D. ,7.4^|.7d..E| +00000010 11 dc 71 6e 82 b7 d1 51 2a d8 d1 d9 47 36 94 5a |..qn...Q*...G6.Z| +00000020 67 d1 73 de 02 20 67 86 18 97 66 53 75 a1 da 19 |g.s.. g...fSu...| +00000030 61 5e 5c 2b f1 16 bc ab 13 78 7c c6 83 90 87 63 |a^\+.....x|....c| +00000040 41 01 da cb e5 e6 |A.....| +[1d2d 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[1d2e 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 4f 11 48 ff 5b 23 51 29 3b 44 f7 |0D. .O.H.[#Q);D.| +00000010 b7 1a be d1 e9 02 db 39 fe 27 24 d9 24 1c b5 a2 |.......9.'$.$...| +00000020 0a ad 7b ac 02 20 70 74 8b 9f d0 5b 25 91 0a dc |..{.. pt...[%...| +00000030 46 4e b2 3d 2f 65 db d3 ee 05 83 49 33 04 f1 4a |FN.=/e.....I3..J| +00000040 f5 bd 47 66 8f 2f |..Gf./| +[1d30 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1d2f 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1d31 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1d32 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1d33 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d34 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d35 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1d36 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1d37 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d38 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1d39 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1d3a 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1d3b 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1d3c 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1d3d 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1d3e 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ae7660 gate 1598907097598537900 evaluation starts +[1d3f 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ae7660 signed by 0 principal evaluation starts (used [false]) +[1d40 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ae7660 processing identity 0 with bytes of 115a4b0 +[1d41 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ae7660 principal matched by identity 0 +[1d42 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fd 3c 08 3d bc c6 89 79 ba 4a ac 99 82 f1 fa 4d |.<.=...y.J.....M| +00000010 0f a6 dd 71 2d 6b 0f d5 9b b2 82 ad 5e 80 da c8 |...q-k......^...| +[1d43 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 55 55 55 3f 7d 18 aa 53 15 e1 |0E.!..UUU?}..S..| +00000010 cc 53 46 31 e9 7c 18 3a 50 d2 cd d0 a0 44 0d fe |.SF1.|.:P....D..| +00000020 03 0f 29 76 0d 02 20 2f bd ba c1 eb 6b 9f 2d 86 |..)v.. /....k.-.| +00000030 a9 e4 eb 8f fc 4f 76 ee e0 64 f2 97 8f 9c 1a 3a |.....Ov..d.....:| +00000040 5e 1d 64 1d 25 85 81 |^.d.%..| +[1d44 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ae7660 principal evaluation succeeds for identity 0 +[1d45 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ae7660 gate 1598907097598537900 evaluation succeeds +[1d46 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1d47 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1d48 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1d49 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1d4a 08-31 20:51:37.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1d4b 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d4c 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d4d 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1d4e 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 c5 90 1c 23 89 b1 55 7b 43 26 4a b8 d6 70 5a |....#..U{C&J..pZ| +00000010 b6 28 a6 93 8d 2b 0a 0d 7c 58 e6 f0 72 7d e6 36 |.(...+..|X..r}.6| +[1d4f 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 37 11 34 5e 7c bc 37 64 82 1b 45 |0D. ,7.4^|.7d..E| +00000010 11 dc 71 6e 82 b7 d1 51 2a d8 d1 d9 47 36 94 5a |..qn...Q*...G6.Z| +00000020 67 d1 73 de 02 20 67 86 18 97 66 53 75 a1 da 19 |g.s.. g...fSu...| +00000030 61 5e 5c 2b f1 16 bc ab 13 78 7c c6 83 90 87 63 |a^\+.....x|....c| +00000040 41 01 da cb e5 e6 |A.....| +[1d50 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1d51 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1d52 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d53 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1d54 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 4d b1 e5 64 ab 5d 7d 73 b3 77 98 b1 c0 2e 87 |.M..d.]}s.w.....| +00000010 dc 4e 7c d3 dc 21 20 be 6e 87 78 44 ba b2 41 76 |.N|..! .n.xD..Av| +[1d55 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e0 65 31 6f 20 db 46 d8 e7 4c 79 |0E.!..e1o .F..Ly| +00000010 a2 db ea ac 1f 1d cc 90 dd e0 6d 70 f6 a0 c9 bd |..........mp....| +00000020 f4 3a 59 bb 3c 02 20 42 04 8a ac e4 a8 9d d6 79 |.:Y.<. B.......y| +00000030 c1 7c de 43 b2 e5 dd aa 1c 9e 71 9a e0 8f 9d 72 |.|.C......q....r| +00000040 58 a1 ce a7 d4 b6 03 |X......| +[1d56 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1d57 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d58 08-31 20:51:37.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d59 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d5a 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d5b 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[1d5c 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1d5d 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d5e 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1d5f 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d60 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1d61 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d62 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1d63 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[1d64 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[1d65 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1d66 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[1d67 08-31 20:51:37.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1d68 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[1d69 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d6a 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d6b 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1d6c 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1d6d 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1d6e 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1d6f 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1d70 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1d71 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30270 gate 1598907097723057200 evaluation starts +[1d72 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30270 signed by 0 principal evaluation starts (used [false]) +[1d73 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30270 processing identity 0 with bytes of 115a4b0 +[1d74 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30270 principal matched by identity 0 +[1d75 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[1d76 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[1d77 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30270 principal evaluation succeeds for identity 0 +[1d78 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b30270 gate 1598907097723057200 evaluation succeeds +[1d79 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1d7a 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1d7b 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1d7c 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1d7d 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d7e 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d7f 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1d80 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1d81 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1d82 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1d83 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1d84 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1d85 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b31470 gate 1598907097727299000 evaluation starts +[1d86 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b31470 signed by 0 principal evaluation starts (used [false]) +[1d87 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b31470 processing identity 0 with bytes of 115a4b0 +[1d88 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b31470 principal matched by identity 0 +[1d89 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[1d8a 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[1d8b 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b31470 principal evaluation succeeds for identity 0 +[1d8c 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b31470 gate 1598907097727299000 evaluation succeeds +[1d8d 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1d8e 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1d8f 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1d90 08-31 20:51:37.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1d91 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1d92 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1d93 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d94 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d95 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1d96 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1d97 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1d98 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1d99 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1d9a 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1d9b 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1d9c 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b528c0 gate 1598907097733120100 evaluation starts +[1d9d 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b528c0 signed by 0 principal evaluation starts (used [false]) +[1d9e 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b528c0 processing identity 0 with bytes of 115a4b0 +[1d9f 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b528c0 principal matched by identity 0 +[1da0 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[1da1 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[1da2 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b528c0 principal evaluation succeeds for identity 0 +[1da3 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b528c0 gate 1598907097733120100 evaluation succeeds +[1da4 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1da5 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1da6 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1da7 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1da8 08-31 20:51:37.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[1da9 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[1daa 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[1dab 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[1dac 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dad 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dae 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1daf 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1db0 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1db1 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1db2 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1db3 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1db4 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6a8a0 gate 1598907097744095500 evaluation starts +[1db5 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6a8a0 signed by 0 principal evaluation starts (used [false]) +[1db6 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6a8a0 processing identity 0 with bytes of 115a4b0 +[1db7 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6a8a0 principal matched by identity 0 +[1db8 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[1db9 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[1dba 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6a8a0 principal evaluation succeeds for identity 0 +[1dbb 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6a8a0 gate 1598907097744095500 evaluation succeeds +[1dbc 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1dbd 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1dbe 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1dbf 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1dc0 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dc1 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1dc2 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dc3 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dc4 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dc5 08-31 20:51:37.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1dc6 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1dc7 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1dc8 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1dc9 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1dca 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1dcb 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6bcf0 gate 1598907097751901200 evaluation starts +[1dcc 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6bcf0 signed by 0 principal evaluation starts (used [false]) +[1dcd 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6bcf0 processing identity 0 with bytes of 115a4b0 +[1dce 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6bcf0 principal matched by identity 0 +[1dcf 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[1dd0 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[1dd1 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6bcf0 principal evaluation succeeds for identity 0 +[1dd2 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b6bcf0 gate 1598907097751901200 evaluation succeeds +[1dd3 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1dd4 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1dd5 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1dd6 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1dd7 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[1dd8 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[1dd9 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dda 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ddb 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1ddc 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1dde 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1ddf 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1ddd 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1de0 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1de1 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[1de2 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1de3 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1de5 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1de6 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b895e0 gate 1598907097759897500 evaluation starts +[1de4 08-31 20:51:37.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1de7 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b895e0 signed by 0 principal evaluation starts (used [false]) +[1de9 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b895e0 processing identity 0 with bytes of 115a4b0 +[1dea 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b895e0 principal matched by identity 0 +[1deb 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[1dec 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[1ded 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b895e0 principal evaluation succeeds for identity 0 +[1dee 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b895e0 gate 1598907097759897500 evaluation succeeds +[1de8 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[1def 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1df0 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1df1 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1df2 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1df3 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[1df4 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[1df5 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1df6 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[1df7 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1df8 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1df9 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 39 bytes, Signature: 0 bytes +[1dfa 08-31 20:51:37.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dfb 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1dfc 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dfd 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1dfe 08-31 20:51:37.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1dff 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[1e00 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[1e01 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1e02 08-31 20:51:37.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e03 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1e04 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1e05 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e06 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e07 08-31 20:51:38.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e08 08-31 20:51:38.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e09 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1e0a 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1e0b 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e0c 08-31 20:51:38.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e0d 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e0e 08-31 20:51:38.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e0f 08-31 20:51:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[1e10 08-31 20:51:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[1e11 08-31 20:51:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1e12 08-31 20:51:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610091801 +[1e13 08-31 20:51:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3E871C64DCE9A227BC0B084E760FDBB9D98086AF802AB758F75419B287BD4C2D +[1e14 08-31 20:51:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[1e15 08-31 20:51:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e16 08-31 20:51:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e17 08-31 20:51:38.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e18 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e19 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[1e1a 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e1b 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e1c 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[1e1d 08-31 20:51:38.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e1e 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e1f 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e20 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e21 08-31 20:51:40.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e22 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1e23 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e24 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1e25 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1e26 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1e27 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1e28 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1e29 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1e2a 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bd8e00 gate 1598907100023336700 evaluation starts +[1e2b 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bd8e00 signed by 0 principal evaluation starts (used [false]) +[1e2c 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bd8e00 processing identity 0 with bytes of 115a4b0 +[1e2d 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bd8e00 principal matched by identity 0 +[1e2e 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4d 7d 67 74 97 c6 df f9 86 6f 84 a2 33 2a 87 87 |M}gt.....o..3*..| +00000010 08 a0 10 ee 46 b1 dc 81 63 a5 59 92 b1 4b e4 69 |....F...c.Y..K.i| +[1e2f 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cf 96 49 6c 76 ad e9 2f e3 fb 97 |0E.!...Ilv../...| +00000010 b2 7c 15 39 77 ab d3 03 2f 3e b2 7a 2d 96 b1 a0 |.|.9w.../>.z-...| +00000020 cd a6 1c 1d 89 02 20 0f ad 0b a2 ee 1a 30 66 88 |...... ......0f.| +00000030 46 20 58 f3 53 f2 09 9a 2b 5a 26 4c 00 79 18 ce |F X.S...+Z&L.y..| +00000040 7f f2 be 5a 8a 9d c6 |...Z...| +[1e30 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bd8e00 principal evaluation succeeds for identity 0 +[1e31 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004bd8e00 gate 1598907100023336700 evaluation succeeds +[1e32 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1e33 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1e34 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1e35 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1e36 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e37 08-31 20:51:40.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e38 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e39 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1e3a 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1e3b 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1e3c 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1e3d 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e3e 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e3f 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e40 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e41 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e42 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e43 08-31 20:51:40.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e44 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e45 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e46 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e47 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e48 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e49 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1e4a 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e4b 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e4c 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1e4d 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e4e 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e4f 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e50 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e51 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e52 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e53 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e54 08-31 20:51:40.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e55 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e56 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e57 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e58 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1e59 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4a e1 40 6b d4 cf b4 c3 0c e0 54 3f fe 70 3b bb |J.@k......T?.p;.| +00000010 47 a3 10 69 29 01 50 d2 ac ed 74 75 df ec 4d 0c |G..i).P...tu..M.| +[1e5a 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 04 59 90 7b bb ca 94 33 40 80 e0 e0 |0D. .Y.{...3@...| +00000010 34 da 7f 8d bc 17 22 cb 0f 9b 44 41 a3 2a 04 d4 |4....."...DA.*..| +00000020 ea 89 5c c7 02 20 70 7d c3 ff c5 be b2 29 8d a7 |..\.. p}.....)..| +00000030 1c f6 ed 56 24 b3 e8 4c f2 6d 49 90 11 65 72 97 |...V$..L.mI..er.| +00000040 23 6f cf 7b 34 3d |#o.{4=| +[1e5b 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e5c 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1e5d 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1e5e 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1e5f 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[1e60 08-31 20:51:40.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e61 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e62 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e63 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e64 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e65 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e66 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1e67 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e68 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[1e69 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e6a 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e6b 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e6c 08-31 20:51:40.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e6d 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e6e 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e6f 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e70 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e71 08-31 20:51:40.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e72 08-31 20:51:40.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e73 08-31 20:51:40.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e74 08-31 20:51:40.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e75 08-31 20:51:40.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1e76 08-31 20:51:40.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e77 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e78 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e79 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e7a 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e7b 08-31 20:51:40.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1e7c 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e7d 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1e7e 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1e7f 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1e80 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1e81 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1e82 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1e83 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c22dc0 gate 1598907100454286800 evaluation starts +[1e84 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c22dc0 signed by 0 principal evaluation starts (used [false]) +[1e85 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c22dc0 processing identity 0 with bytes of 115a4b0 +[1e86 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c22dc0 principal matched by identity 0 +[1e87 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f0 08 be 1a 2c d9 b5 c0 87 97 94 01 ef 54 9c f7 |....,........T..| +00000010 02 e3 0b 24 d8 d0 cd e6 e8 75 80 d7 0a 97 0c 3e |...$.....u.....>| +[1e88 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 a6 ce d8 49 0e 83 c3 2b 66 98 |0E.!.....I...+f.| +00000010 62 f4 32 46 4b 01 a4 da 89 81 4d ab 54 84 ef d2 |b.2FK.....M.T...| +00000020 ad 61 e4 ee 27 02 20 38 83 5a ce 83 bd 7b 41 f3 |.a..'. 8.Z...{A.| +00000030 47 2b 89 ad 80 4c 95 78 6a 6d 26 c9 6c 28 ad d9 |G+...L.xjm&.l(..| +00000040 5f c1 1c 4c e8 33 50 |_..L.3P| +[1e89 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c22dc0 principal evaluation succeeds for identity 0 +[1e8a 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c22dc0 gate 1598907100454286800 evaluation succeeds +[1e8b 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1e8c 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1e8d 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1e8e 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1e8f 08-31 20:51:40.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e90 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e91 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e92 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1e93 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1e94 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1e95 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1e96 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e97 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e98 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e99 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e9a 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1e9b 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1e9c 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e9d 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e9e 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1e9f 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ea0 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ea1 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ea2 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ea3 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1ea4 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ea6 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1ea5 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ea7 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ea8 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ea9 08-31 20:51:40.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1eaa 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1eab 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1eac 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ead 08-31 20:51:40.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1eae 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1eaf 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161022 +[1eb0 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: BEBC57E56FB62E8FA65695405DEAB84DA7033F7ACF28B5430D4C6875B9D918C2 +[1eb1 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1eb2 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1eb3 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1eb4 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[1eb5 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1eb6 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1eb7 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +[1eb8 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1eba 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1eb9 08-31 20:51:40.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1ebb 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ebc 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ebd 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ebe 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[1ebf 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ec0 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ec1 08-31 20:51:40.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ec2 08-31 20:51:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1ec3 08-31 20:51:40.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1ec4 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1ec5 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ec6 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ec7 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ec8 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ec9 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1eca 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ecb 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[1ecc 08-31 20:51:40.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ecd 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1ece 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1ecf 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ed0 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1ed1 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1ed2 08-31 20:51:41.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ed3 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1ed4 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1ed5 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1ed6 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1ed7 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1ed8 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1ed9 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78740 gate 1598907101030936500 evaluation starts +[1eda 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78740 signed by 0 principal evaluation starts (used [false]) +[1edb 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78740 processing identity 0 with bytes of 115a4b0 +[1edc 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78740 principal matched by identity 0 +[1edd 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef a0 d0 0f d5 8c b6 eb 36 4d af 12 a7 c3 89 3b |........6M.....;| +00000010 7d 82 e8 7f de 1f b2 da 14 18 48 82 58 48 51 5f |}.........H.XHQ_| +[1ede 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 c5 94 1a 88 b1 52 36 24 bc ae |0E.!.......R6$..| +00000010 b3 c7 b0 17 8a 81 ec e9 c1 f8 90 e6 30 64 de 41 |............0d.A| +00000020 a7 59 21 e7 e3 02 20 18 a5 c5 c5 03 be ed b6 82 |.Y!... .........| +00000030 f3 cf 18 ab 15 44 5c b3 9b bd 89 50 a7 13 d3 d1 |.....D\....P....| +00000040 b9 0f 00 91 aa f9 bd |.......| +[1edf 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78740 principal evaluation succeeds for identity 0 +[1ee0 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c78740 gate 1598907101030936500 evaluation succeeds +[1ee1 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1ee2 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1ee3 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1ee4 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1ee5 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1ee6 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[1ee7 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1ee8 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1ee9 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1eea 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1eeb 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1eec 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1eed 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[1eee 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1eef 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ef0 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ef1 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[1ef2 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1ef3 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ef4 08-31 20:51:41.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: +[1ef5 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1ef6 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1ef7 08-31 20:51:41.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[1ef8 08-31 20:51:41.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ef9 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\232\346\342\300\374&\224_\030\t\002 c9F7{\262I\227\201z\233\317\013\343\320\221f\337\203}\211\361\315\213\320\203\264\344\231\226\367k" > > > , Envelope: 270 bytes, Signature: 0 bytes +[1efa 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1efb 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\232\346\342\300\374&\224_\030\t\002 c9F7{\262I\227\201z\233\317\013\343\320\221f\337\203}\211\361\315\213\320\203\264\344\231\226\367k" > > > , Envelope: 270 bytes, Signature: 0 bytes +[1efc 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1efd 08-31 20:51:41.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f 5f 38 0e 3a cd 26 b2 84 99 ae e0 4b 2e ba f7 |._8.:.&.....K...| +00000010 af 1c 33 83 1d fb c0 82 9c 23 25 73 b8 2e 01 56 |..3......#%s...V| +[1efe 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 19 c6 ba fc ef 63 dd da 44 91 11 |0D. ......c..D..| +00000010 f4 81 f0 f6 e7 9d 38 b2 3a 03 7c 47 a1 03 71 4c |......8.:.|G..qL| +00000020 bf 96 cd ea 02 20 56 95 26 f5 41 44 36 e9 8f d6 |..... V.&.AD6...| +00000030 e1 0a ec 08 9d a4 60 b1 83 68 b7 36 0b 27 5e df |......`..h.6.'^.| +00000040 83 5c 3a 4d 55 d3 |.\:MU.| +[1eff 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[1f00 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d ad 3a 08 be 79 5d 40 d1 ae bc 57 |0D. ..:..y]@...W| +00000010 23 51 a7 95 3c 64 b4 d2 88 3e 9a e6 e2 c0 fc 26 |#Q.......&| +00000020 94 5f 18 09 02 20 63 39 46 37 7b b2 49 97 81 7a |._... c9F7{.I..z| +00000030 9b cf 0b e3 d0 91 66 df 83 7d 89 f1 cd 8b d0 83 |......f..}......| +00000040 b4 e4 99 96 f7 6b |.....k| +[1f01 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[1f02 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[1f03 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1f04 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1f05 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[1f06 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f07 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f08 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f09 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[1f0a 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f0b 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f0c 08-31 20:51:41.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[1f0d 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\232\346\342\300\374&\224_\030\t\002 c9F7{\262I\227\201z\233\317\013\343\320\221f\337\203}\211\361\315\213\320\203\264\344\231\226\367k" > > alive: +[1f0e 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[1f0f 08-31 20:51:41.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f10 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1f11 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1f12 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1f13 08-31 20:51:41.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f14 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f15 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f16 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f17 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f18 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f19 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[1f1a 08-31 20:51:41.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f1b 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\334\242K\221\363\267\335\373;\t|" > > , Envelope: 165 bytes, Signature: 0 bytes +[1f1c 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\334\242K\221\363\267\335\373;\t|" > > , Envelope: 165 bytes, Signature: 0 bytes +[1f1d 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f1e 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\334\242K\221\363\267\335\373;\t|" > > , Envelope: 165 bytes, Signature: 0 bytes +[1f1f 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1f20 08-31 20:51:41.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f21 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1f22 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1f23 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1f24 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1f25 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1f26 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1f27 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb53b0 gate 1598907101492682000 evaluation starts +[1f28 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb53b0 signed by 0 principal evaluation starts (used [false]) +[1f29 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb53b0 processing identity 0 with bytes of 115a4b0 +[1f2a 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb53b0 principal matched by identity 0 +[1f2b 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 8d 52 50 7b d2 bd 2a 77 dd a7 3e 56 c3 8d 92 |..RP{..*w..>V...| +00000010 ef 2f 0b 8f 57 79 79 89 ec e1 2d 1d c5 12 2a a2 |./..Wyy...-...*.| +[1f2c 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 a2 27 cf ab c8 68 2b 25 85 10 a2 |0D. c.'...h+%...| +00000010 30 65 e5 f6 dc a4 65 9c 6d d8 94 de 82 83 c6 08 |0e....e.m.......| +00000020 80 f3 d4 49 02 20 55 e1 01 85 32 08 d0 36 d5 87 |...I. U...2..6..| +00000030 08 54 28 98 11 1d 4b 5f c1 38 3e dc a2 4b 91 f3 |.T(...K_.8>..K..| +00000040 b7 dd fb 3b 09 7c |...;.|| +[1f2d 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb53b0 principal evaluation succeeds for identity 0 +[1f2e 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004cb53b0 gate 1598907101492682000 evaluation succeeds +[1f2f 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1f30 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1f31 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1f32 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1f33 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1f34 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[1f35 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[1f36 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[1f37 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[1f38 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f39 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f3a 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f3b 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[1f3c 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f3d 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f3e 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f3f 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[1f40 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\334\242K\221\363\267\335\373;\t|" > alive: alive: +[1f41 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1f42 08-31 20:51:41.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f43 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[1f44 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1f45 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[1f46 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[1f47 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1f49 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f48 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[1f4a 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[1f4c 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[1f4d 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f4b 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[1f4f 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f4e 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1f50 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1f51 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f52 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1f53 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1f54 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[1f55 08-31 20:51:41.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f56 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1f57 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1f58 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[1f59 08-31 20:51:41.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f5a 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1f5b 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161023 +[1f5c 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 37EB45CA97604A9CC3ED09623343769831698E7CBDA646FE97CD2A0DB98D2DE2 +[1f5d 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[1f5e 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[1f5f 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[1f60 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[1f61 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f62 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[1f63 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1f64 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f65 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f67 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[1f68 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1f66 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[1f69 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f6a 08-31 20:51:41.57 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f6b 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1f6c 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1f6d 08-31 20:51:41.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f6e 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[1f6f 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[1f70 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1f71 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1f72 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1f73 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1f74 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1f75 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1f76 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1f77 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d16320 gate 1598907101591529600 evaluation starts +[1f78 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d16320 signed by 0 principal evaluation starts (used [false]) +[1f79 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d16320 processing identity 0 with bytes of 115a4b0 +[1f7a 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d16320 principal matched by identity 0 +[1f7b 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 8d 52 50 7b d2 bd 2a 77 dd a7 3e 56 c3 8d 92 |..RP{..*w..>V...| +00000010 ef 2f 0b 8f 57 79 79 89 ec e1 2d 1d c5 12 2a a2 |./..Wyy...-...*.| +[1f7c 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 a2 27 cf ab c8 68 2b 25 85 10 a2 |0D. c.'...h+%...| +00000010 30 65 e5 f6 dc a4 65 9c 6d d8 94 de 82 83 c6 08 |0e....e.m.......| +00000020 80 f3 d4 49 02 20 55 e1 01 85 32 08 d0 36 d5 87 |...I. U...2..6..| +00000030 08 54 28 98 11 1d 4b 5f c1 38 3e dc a2 4b 91 f3 |.T(...K_.8>..K..| +00000040 b7 dd fb 3b 09 7c |...;.|| +[1f7d 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d16320 principal evaluation succeeds for identity 0 +[1f7e 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d16320 gate 1598907101591529600 evaluation succeeds +[1f7f 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1f80 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1f81 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1f82 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1f83 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1f84 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f85 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1f86 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 eb 45 ca 97 60 4a 9c c3 ed 09 62 33 43 76 98 |7.E..`J....b3Cv.| +00000010 31 69 8e 7c bd a6 46 fe 97 cd 2a 0d b9 8d 2d e2 |1i.|..F...*...-.| +[1f87 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab f4 bc e5 60 7e 5d 7a 40 a1 77 |0E.!.....`~]z@.w| +00000010 72 25 07 1a aa 90 d0 13 67 09 8c 41 0c 0b 44 db |r%......g..A..D.| +00000020 0e b0 a6 ea c0 02 20 75 18 74 45 d7 ef 3c 5a 29 |...... u.tE.. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1f89 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1f8a 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f8b 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1f8c 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f 5f 38 0e 3a cd 26 b2 84 99 ae e0 4b 2e ba f7 |._8.:.&.....K...| +00000010 af 1c 33 83 1d fb c0 82 9c 23 25 73 b8 2e 01 56 |..3......#%s...V| +[1f8d 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 19 c6 ba fc ef 63 dd da 44 91 11 |0D. ......c..D..| +00000010 f4 81 f0 f6 e7 9d 38 b2 3a 03 7c 47 a1 03 71 4c |......8.:.|G..qL| +00000020 bf 96 cd ea 02 20 56 95 26 f5 41 44 36 e9 8f d6 |..... V.&.AD6...| +00000030 e1 0a ec 08 9d a4 60 b1 83 68 b7 36 0b 27 5e df |......`..h.6.'^.| +00000040 83 5c 3a 4d 55 d3 |.\:MU.| +[1f8e 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1f8f 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f90 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f91 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1f92 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f93 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[1f94 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1f95 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 eb 45 ca 97 60 4a 9c c3 ed 09 62 33 43 76 98 |7.E..`J....b3Cv.| +00000010 31 69 8e 7c bd a6 46 fe 97 cd 2a 0d b9 8d 2d e2 |1i.|..F...*...-.| +[1f96 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab f4 bc e5 60 7e 5d 7a 40 a1 77 |0E.!.....`~]z@.w| +00000010 72 25 07 1a aa 90 d0 13 67 09 8c 41 0c 0b 44 db |r%......g..A..D.| +00000020 0e b0 a6 ea c0 02 20 75 18 74 45 d7 ef 3c 5a 29 |...... u.tE.. DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[1f98 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c5 a9 a0 5a 2c 52 a9 ff 6a 6c af |0E.!....Z,R..jl.| +00000010 26 de 8e 2f f5 d3 12 45 07 06 2c f8 ab a3 09 9f |&../...E..,.....| +00000020 35 08 e0 bb 4b 02 20 18 64 58 e8 c2 a7 2c 0d 0b |5...K. .dX...,..| +00000030 75 0b 0f 7e 3c 6a 97 5c c4 3a 96 a2 73 59 4d a2 |u..~ DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1f9a 08-31 20:51:41.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[1f9b 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f9c 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1f9d 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1f9e 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1f9f 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fa0 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[1fa1 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[1fa2 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 37 eb 45 ca 97 60 4a 9c c3 ed 09 62 33 43 76 98 |7.E..`J....b3Cv.| +00000010 31 69 8e 7c bd a6 46 fe 97 cd 2a 0d b9 8d 2d e2 |1i.|..F...*...-.| +[1fa3 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab f4 bc e5 60 7e 5d 7a 40 a1 77 |0E.!.....`~]z@.w| +00000010 72 25 07 1a aa 90 d0 13 67 09 8c 41 0c 0b 44 db |r%......g..A..D.| +00000020 0e b0 a6 ea c0 02 20 75 18 74 45 d7 ef 3c 5a 29 |...... u.tE.. DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1fa5 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1fa6 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fa7 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[1fa8 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1f 5f 38 0e 3a cd 26 b2 84 99 ae e0 4b 2e ba f7 |._8.:.&.....K...| +00000010 af 1c 33 83 1d fb c0 82 9c 23 25 73 b8 2e 01 56 |..3......#%s...V| +[1fa9 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 19 c6 ba fc ef 63 dd da 44 91 11 |0D. ......c..D..| +00000010 f4 81 f0 f6 e7 9d 38 b2 3a 03 7c 47 a1 03 71 4c |......8.:.|G..qL| +00000020 bf 96 cd ea 02 20 56 95 26 f5 41 44 36 e9 8f d6 |..... V.&.AD6...| +00000030 e1 0a ec 08 9d a4 60 b1 83 68 b7 36 0b 27 5e df |......`..h.6.'^.| +00000040 83 5c 3a 4d 55 d3 |.\:MU.| +[1faa 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[1fab 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fac 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[1fad 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fae 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1faf 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1fb0 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1fb1 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1fb2 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1fb3 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1fb4 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d4d140 gate 1598907101608064200 evaluation starts +[1fb5 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d4d140 signed by 0 principal evaluation starts (used [false]) +[1fb6 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d4d140 processing identity 0 with bytes of 115a4b0 +[1fb7 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d4d140 principal matched by identity 0 +[1fb8 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef a0 d0 0f d5 8c b6 eb 36 4d af 12 a7 c3 89 3b |........6M.....;| +00000010 7d 82 e8 7f de 1f b2 da 14 18 48 82 58 48 51 5f |}.........H.XHQ_| +[1fb9 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 c5 94 1a 88 b1 52 36 24 bc ae |0E.!.......R6$..| +00000010 b3 c7 b0 17 8a 81 ec e9 c1 f8 90 e6 30 64 de 41 |............0d.A| +00000020 a7 59 21 e7 e3 02 20 18 a5 c5 c5 03 be ed b6 82 |.Y!... .........| +00000030 f3 cf 18 ab 15 44 5c b3 9b bd 89 50 a7 13 d3 d1 |.....D\....P....| +00000040 b9 0f 00 91 aa f9 bd |.......| +[1fba 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d4d140 principal evaluation succeeds for identity 0 +[1fbb 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d4d140 gate 1598907101608064200 evaluation succeeds +[1fbc 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1fbd 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1fbe 08-31 20:51:41.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1fbf 08-31 20:51:41.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1fc0 08-31 20:51:41.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[1fc1 08-31 20:51:41.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fc2 08-31 20:51:41.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fc3 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fc4 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fc5 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[1fc6 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1fc7 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fc8 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1fc9 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fca 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[1fcb 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1fcc 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1fcd 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[1fce 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[1fcf 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[1fd0 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[1fd1 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fd2 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fd3 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1fd4 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1fd5 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1fd6 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1fd7 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1fd8 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1fd9 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6b800 gate 1598907101718840400 evaluation starts +[1fda 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6b800 signed by 0 principal evaluation starts (used [false]) +[1fdb 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6b800 processing identity 0 with bytes of 115a4b0 +[1fdc 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6b800 principal matched by identity 0 +[1fdd 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[1fde 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[1fdf 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6b800 principal evaluation succeeds for identity 0 +[1fe0 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d6b800 gate 1598907101718840400 evaluation succeeds +[1fe1 08-31 20:51:41.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1fe2 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1fe3 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1fe4 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1fe5 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fe6 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fe7 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[1fe8 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1fe9 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[1fea 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[1feb 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[1fec 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[1fed 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d84a00 gate 1598907101722029200 evaluation starts +[1fee 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d84a00 signed by 0 principal evaluation starts (used [false]) +[1fef 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d84a00 processing identity 0 with bytes of 115a4b0 +[1ff0 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d84a00 principal matched by identity 0 +[1ff1 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[1ff2 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[1ff3 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d84a00 principal evaluation succeeds for identity 0 +[1ff4 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d84a00 gate 1598907101722029200 evaluation succeeds +[1ff5 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1ff6 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[1ff8 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[1ff9 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[1ffa 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[1ffb 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[1ffc 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[1ffd 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1ffe 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[1fff 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2000 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2001 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[1ff7 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[2002 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2003 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2004 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2005 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2006 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d85e50 gate 1598907101729622900 evaluation starts +[2007 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d85e50 signed by 0 principal evaluation starts (used [false]) +[2008 08-31 20:51:41.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d85e50 processing identity 0 with bytes of 115a4b0 +[2009 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d85e50 principal matched by identity 0 +[200a 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[200b 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[200c 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d85e50 principal evaluation succeeds for identity 0 +[200d 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004d85e50 gate 1598907101729622900 evaluation succeeds +[200e 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[200f 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2010 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2011 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2012 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[2013 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[2014 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2015 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2016 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2017 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2018 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2019 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[201a 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[201b 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[201c 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9740 gate 1598907101733666700 evaluation starts +[201d 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9740 signed by 0 principal evaluation starts (used [false]) +[201e 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9740 processing identity 0 with bytes of 115a4b0 +[201f 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9740 principal matched by identity 0 +[2020 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[2021 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[2022 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9740 principal evaluation succeeds for identity 0 +[2023 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004da9740 gate 1598907101733666700 evaluation succeeds +[2024 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2025 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2026 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2027 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2028 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[2029 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[202a 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[202b 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[202c 08-31 20:51:41.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[202d 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[202e 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[202f 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2030 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2031 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2032 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2033 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2034 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2035 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc5280 gate 1598907101741346200 evaluation starts +[2036 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc5280 signed by 0 principal evaluation starts (used [false]) +[2037 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc5280 processing identity 0 with bytes of 115a4b0 +[2038 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc5280 principal matched by identity 0 +[2039 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[203a 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[203b 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc5280 principal evaluation succeeds for identity 0 +[203c 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004dc5280 gate 1598907101741346200 evaluation succeeds +[203d 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[203e 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[203f 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2040 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2041 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[2042 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[2043 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[2044 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[2045 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2046 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2047 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2048 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2049 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[204a 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[204b 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[204c 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[204d 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de5260 gate 1598907101749013300 evaluation starts +[204e 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de5260 signed by 0 principal evaluation starts (used [false]) +[204f 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de5260 processing identity 0 with bytes of 115a4b0 +[2050 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de5260 principal matched by identity 0 +[2051 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[2052 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[2053 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de5260 principal evaluation succeeds for identity 0 +[2054 08-31 20:51:41.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004de5260 gate 1598907101749013300 evaluation succeeds +[2055 08-31 20:51:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2056 08-31 20:51:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2057 08-31 20:51:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2058 08-31 20:51:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2059 08-31 20:51:41.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[205a 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[205b 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[205c 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[205d 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[205e 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[205f 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[2060 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2061 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2062 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[2063 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[2064 08-31 20:51:41.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2065 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2066 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2067 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2068 08-31 20:51:41.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2069 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[206a 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[206b 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[206c 08-31 20:51:41.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[206d 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[206e 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[206f 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2070 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2071 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2072 08-31 20:51:42.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2073 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2074 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2075 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2076 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2077 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2078 08-31 20:51:42.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2079 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[207a 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[207b 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[207c 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D9816100A1801 +[207d 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E4A6A9FB158ED26002033D4254B609744DD55531E12D8F4008327574B73537DA +[207e 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[207f 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2080 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2081 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2082 08-31 20:51:43.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2083 08-31 20:51:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[2084 08-31 20:51:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2085 08-31 20:51:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2086 08-31 20:51:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[2087 08-31 20:51:43.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2088 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2089 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[208a 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[208b 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[208c 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[208d 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[208e 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[208f 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2090 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2091 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[2092 08-31 20:51:44.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2093 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2094 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2095 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2096 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2097 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2098 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2099 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[209a 08-31 20:51:45.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[209b 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[209c 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[209d 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[209f 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[20a0 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e214f0 gate 1598907105033699700 evaluation starts +[20a1 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e214f0 signed by 0 principal evaluation starts (used [false]) +[209e 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20a2 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e214f0 processing identity 0 with bytes of 115a4b0 +[20a4 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e214f0 principal matched by identity 0 +[20a5 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 00 5e 32 f1 4e 63 4a 59 bf 46 8f 12 89 5e 9c |..^2.NcJY.F...^.| +00000010 f8 46 db ee 1d b4 2b 09 bc 0f 30 d5 87 9a 6f fd |.F....+...0...o.| +[20a6 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1a cf 17 e8 00 29 88 f4 17 92 b9 48 |0D. .....).....H| +00000010 d6 11 14 84 87 62 8a c9 1e 7c 52 fa aa 10 b1 12 |.....b...|R.....| +00000020 21 1f 8d b1 02 20 4f 16 05 64 35 27 b8 38 99 b3 |!.... O..d5'.8..| +00000030 01 78 cb c9 27 d3 45 12 b0 0c c5 60 35 3b 9b 0e |.x..'.E....`5;..| +00000040 0d 8a 22 30 43 52 |.."0CR| +[20a7 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e214f0 principal evaluation succeeds for identity 0 +[20a8 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e214f0 gate 1598907105033699700 evaluation succeeds +[20a9 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[20aa 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[20ab 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[20ac 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[20ad 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20ae 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[20af 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[20b0 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[20b1 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[20b2 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20b3 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20b4 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20a3 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20b5 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20b6 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20b7 08-31 20:51:45.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20b8 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20b9 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20ba 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20bb 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20bc 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20bd 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20be 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20bf 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20c0 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20c1 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20c2 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[20c3 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20c4 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20c5 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[20c6 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20c7 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20c8 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20c9 08-31 20:51:45.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20ca 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > > , Envelope: 165 bytes, Signature: 0 bytes +[20cb 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > > , Envelope: 165 bytes, Signature: 0 bytes +[20cc 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20cd 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > > , Envelope: 165 bytes, Signature: 0 bytes +[20ce 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[20cf 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20d0 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[20d1 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[20d2 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[20d3 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[20d4 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[20d5 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[20d6 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e6e5f0 gate 1598907105067159800 evaluation starts +[20d7 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e6e5f0 signed by 0 principal evaluation starts (used [false]) +[20d8 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e6e5f0 processing identity 0 with bytes of 115a4b0 +[20d9 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e6e5f0 principal matched by identity 0 +[20da 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 45 06 e0 3d 9c 66 bc 90 53 b2 a5 53 47 0c 30 |.E..=.f..S..SG.0| +00000010 60 e5 a7 b0 a8 36 c4 ee b1 84 4a f2 05 1e 53 eb |`....6....J...S.| +[20db 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 87 1d 29 5e 79 f2 7f 60 bc 9c c4 |0D. V..)^y..`...| +00000010 b7 35 c2 46 5c 8a 97 3e b8 93 24 9d dc c6 0b 16 |.5.F\..>..$.....| +00000020 f8 1f ef 3f 02 20 07 e9 b8 33 0f 23 cc 21 d3 98 |...?. ...3.#.!..| +00000030 9e 12 53 11 24 1d c1 d9 3b 7e eb e5 22 6f 74 cb |..S.$...;~.."ot.| +00000040 80 5e 69 15 de 32 |.^i..2| +[20dc 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e6e5f0 principal evaluation succeeds for identity 0 +[20dd 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e6e5f0 gate 1598907105067159800 evaluation succeeds +[20de 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[20df 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[20e0 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[20e1 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[20e2 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20e3 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[20e4 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[20e5 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[20e6 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[20e7 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20e8 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20e9 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20ea 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[20eb 08-31 20:51:45.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20ec 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20ed 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[20ee 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[20ef 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[20f0 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20f1 08-31 20:51:45.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\334\242K\221\363\267\335\373;\t|" > alive:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > alive: +[20f2 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[20f3 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[20f4 08-31 20:51:45.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[20f5 08-31 20:51:45.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20f6 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20f7 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[20f8 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20f9 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[20fa 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 97 34 2b 8c 86 00 9f 4f d6 c5 44 c7 6a 58 39 2f |.4+....O..D.jX9/| +00000010 f4 9a d0 6e 2d 4b 7d 9c ad 4f e1 9b e1 07 64 01 |...n-K}..O....d.| +[20fb 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b 89 a0 2c 30 68 ba 18 58 fe aa bf |0D. k..,0h..X...| +00000010 dd 82 fd 0b 62 9d cf f0 4f 4a 41 89 2f 92 df df |....b...OJA./...| +00000020 b6 fe 05 b9 02 20 71 5b 28 f1 3f 80 5d 50 f1 75 |..... q[(.?.]P.u| +00000030 24 4e de ff f0 5a 21 f5 68 0e 3b 01 2f ab 21 b1 |$N...Z!.h.;./.!.| +00000040 2a ce 67 76 aa 82 |*.gv..| +[20fc 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[20fd 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[20fe 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[20ff 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2100 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[2101 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2102 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2103 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2104 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2105 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2106 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2107 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2108 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2109 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[210a 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[210b 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[210c 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[210d 08-31 20:51:45.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[210e 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[210f 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2110 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2111 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2112 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2113 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2114 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2115 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2116 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2117 08-31 20:51:45.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2118 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:T-\006" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[2119 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[211a 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:T-\006" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[211b 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[211c 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 86 51 90 ad 70 39 60 4b a4 ce 69 bc 9d c6 9b |..Q..p9`K..i....| +00000010 92 89 7c 96 ff 00 06 3e 22 f3 ba 2c 28 d2 d0 80 |..|....>"..,(...| +[211d 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 4d 3b 6d 79 7e 60 c6 00 9e e3 a2 |0D. .M;my~`.....| +00000010 c1 52 21 aa 00 cf 02 e4 e2 9a dc c7 3d ae c4 ca |.R!.........=...| +00000020 c6 ca 5e 8f 02 20 45 ee 63 2b 12 6c 2f 55 f7 9b |..^.. E.c+.l/U..| +00000030 42 59 0d 6f e6 76 a7 61 35 5f 65 35 45 20 a6 e9 |BY.o.v.a5_e5E ..| +00000040 2c 3d 3e 54 2d 06 |,=>T-.| +[211e 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[211f 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 74 8e c6 be 2b 4b 62 59 df a9 |0E.!..t...+KbY..| +00000010 c8 b8 a9 6b 31 e5 e0 08 03 8b a3 9d 7f 26 8c 0f |...k1........&..| +00000020 3c 9c 03 87 dd 02 20 5f cb 47 1d 09 9f 23 2d 99 |<..... _.G...#-.| +00000030 9a 24 5e 22 7a e5 c6 ab ac 6b d3 51 68 58 eb 79 |.$^"z....k.QhX.y| +00000040 4c 6d 48 b5 94 7e 92 |LmH..~.| +[2120 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2121 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[2122 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2123 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2124 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2125 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2126 08-31 20:51:45.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2127 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2128 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[2129 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[212a 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[212b 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[212c 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[212d 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[212e 08-31 20:51:45.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:T-\006" secret_envelope: > alive: +[212f 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2130 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2131 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2132 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2133 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2134 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2135 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2136 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2137 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2138 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[2139 08-31 20:51:45.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[213a 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[213b 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[213c 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[213d 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[213e 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[213f 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2140 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2141 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2142 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2143 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2144 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2145 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed1400 gate 1598907105448335700 evaluation starts +[2146 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed1400 signed by 0 principal evaluation starts (used [false]) +[2147 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed1400 processing identity 0 with bytes of 115a4b0 +[2148 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed1400 principal matched by identity 0 +[2149 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa fe 02 df ac 8e 5b 38 f0 d3 c6 dc 8c 90 06 64 |......[8.......d| +00000010 7e 48 02 36 2b 57 9c c3 9f 16 46 01 5d 89 cc c4 |~H.6+W....F.]...| +[214a 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3a e3 1a ae 03 7f c1 a2 c4 2c 71 53 |0D. :........,qS| +00000010 a0 3f 52 95 f2 81 8a 14 a0 71 8a 8b ed 13 d1 9e |.?R......q......| +00000020 9c 5d 3b 9a 02 20 35 39 df a2 92 f6 90 5c 4f 26 |.];.. 59.....\O&| +00000030 23 ca bb 19 03 6f f9 d6 fc 4e d7 07 11 69 7d 0a |#....o...N...i}.| +00000040 0f dc 03 bf 09 6f |.....o| +[214b 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed1400 principal evaluation succeeds for identity 0 +[214c 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ed1400 gate 1598907105448335700 evaluation succeeds +[214d 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[214e 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[214f 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2150 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2151 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2152 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2153 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2154 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2155 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2156 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2157 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2158 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2159 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[215a 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[215b 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[215c 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[215d 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[215e 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[215f 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2160 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2161 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2162 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2163 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2164 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2165 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2166 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2167 08-31 20:51:45.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2168 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2169 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[216a 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[216b 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[216c 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[216d 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[216e 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[216f 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2170 08-31 20:51:45.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2171 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2172 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2173 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[2174 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2175 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2176 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2177 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2178 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2179 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[217a 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[217b 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[217c 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef3610 gate 1598907105501034000 evaluation starts +[217d 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef3610 signed by 0 principal evaluation starts (used [false]) +[217e 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef3610 processing identity 0 with bytes of 115a4b0 +[217f 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef3610 principal matched by identity 0 +[2180 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 01 f2 a8 1a fe 38 30 2f 92 2c 1f e6 ec cf d6 |".....80/.,.....| +00000010 40 94 76 c2 fa 5b 56 3c 39 87 5c 94 dd 39 1a 76 |@.v..[V<9.\..9.v| +[2181 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 9c 20 56 6e 86 9d 70 90 c4 13 d6 |0D. 5. Vn..p....| +00000010 ce ad df 3d e2 b0 cc bb cf fe 7c 09 f9 8a b1 31 |...=......|....1| +00000020 b9 8d 40 50 02 20 4b fb 92 04 ec 2f ec 3b 1e 52 |..@P. K..../.;.R| +00000030 94 89 4a 5d 1a 09 b8 5a e4 69 1b 24 1c 7b 91 2d |..J]...Z.i.$.{.-| +00000040 be 9e 68 21 12 b8 |..h!..| +[2182 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef3610 principal evaluation succeeds for identity 0 +[2183 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ef3610 gate 1598907105501034000 evaluation succeeds +[2184 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2185 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2186 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2187 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2188 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2189 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[218a 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[218b 08-31 20:51:45.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[218c 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[218d 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[218e 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[218f 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2190 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[2191 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2192 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2193 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2194 08-31 20:51:45.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[2195 08-31 20:51:45.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2196 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:T-\006" > alive: alive:\270\223$\235\334\306\013\026\370\037\357?\002 \007\351\2703\017#\314!\323\230\236\022S\021$\035\301\331;~\353\345\"ot\313\200^i\025\3362" > alive: +[2197 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[219a 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2198 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[219b 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[2199 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[219c 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161024 +[219d 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B02C22888487BC2FD08639C12FD5E68F5CC5FC299964931ECF559AFE97FD20E3 +[219e 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[219f 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[21a0 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[21a1 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[21a2 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[21a4 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[21a5 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[21a7 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[21a3 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[21a6 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[21a8 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21a9 08-31 20:51:45.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21aa 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21ab 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21ac 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21ad 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[21ae 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21b0 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[21b1 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[21b2 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[21b3 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21b4 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21b5 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[21b6 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21b7 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21b8 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21b9 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21af 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[21ba 08-31 20:51:45.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21bb 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[21bc 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[21bd 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[21be 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21bf 08-31 20:51:45.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21c0 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[21c1 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[21c2 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[21c3 08-31 20:51:45.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21c4 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[21c5 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161025 +[21c6 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 4EF6C958D0FE08F524CA0EC3C1E45DA396AB659CE2450B51C9E839B0A305FA0F +[21c7 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[21c8 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[21c9 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[21ca 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[21cb 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21cc 08-31 20:51:45.57 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" secret_envelope: > > , Envelope: 270 bytes, Signature: 0 bytes +[21cd 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21ce 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[21cf 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21d0 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" > > , Envelope: 165 bytes, Signature: 0 bytes +[21d1 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21d2 08-31 20:51:45.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[21d3 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:V\370\204!l\243\276" > > , Envelope: 165 bytes, Signature: 0 bytes +[21d4 08-31 20:51:45.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21d5 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[21d6 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21d7 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[21d8 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[21d9 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[21da 08-31 20:51:45.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[21db 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e f6 c9 58 d0 fe 08 f5 24 ca 0e c3 c1 e4 5d a3 |N..X....$.....].| +00000010 96 ab 65 9c e2 45 0b 51 c9 e8 39 b0 a3 05 fa 0f |..e..E.Q..9.....| +[21dc 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 8e c8 4f 6a 51 b2 20 05 07 49 f0 |0D. u..OjQ. ..I.| +00000010 e2 7c 00 d5 f8 fa 7b fa 96 fe 1f 0c 3a 9a 55 39 |.|....{.....:.U9| +00000020 96 51 b1 5c 02 20 27 5b 08 bb 01 54 3a 27 0c 38 |.Q.\. '[...T:'.8| +00000030 1d 3a db 7f 80 c9 96 03 3c ee ec 81 91 22 3e 56 |.:......<....">V| +00000040 f8 84 21 6c a3 be |..!l..| +[21dd 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[21de 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[21df 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 4c 8b 9d 35 e2 df 5b 11 d0 11 2b |0D. .L..5..[...+| +00000010 58 73 fb c9 a9 ef e4 61 71 26 15 fe 29 f8 aa 5d |Xs.....aq&..)..]| +00000020 0d df c5 7b 02 20 02 a3 4e 47 2f 39 64 75 21 3f |...{. ..NG/9du!?| +00000030 32 3f af 2d 49 b0 8e 08 74 05 9c ce 24 8a 90 c3 |2?.-I...t...$...| +00000040 5b d8 e3 9e df 15 |[.....| +[21e0 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[21e1 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[21e2 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21e3 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21e4 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[21e5 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[21e6 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e f6 c9 58 d0 fe 08 f5 24 ca 0e c3 c1 e4 5d a3 |N..X....$.....].| +00000010 96 ab 65 9c e2 45 0b 51 c9 e8 39 b0 a3 05 fa 0f |..e..E.Q..9.....| +[21e7 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 8e c8 4f 6a 51 b2 20 05 07 49 f0 |0D. u..OjQ. ..I.| +00000010 e2 7c 00 d5 f8 fa 7b fa 96 fe 1f 0c 3a 9a 55 39 |.|....{.....:.U9| +00000020 96 51 b1 5c 02 20 27 5b 08 bb 01 54 3a 27 0c 38 |.Q.\. '[...T:'.8| +00000030 1d 3a db 7f 80 c9 96 03 3c ee ec 81 91 22 3e 56 |.:......<....">V| +00000040 f8 84 21 6c a3 be |..!l..| +[21e8 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21e9 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21ea 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21eb 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[21ec 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21ee 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[21ed 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 86 51 90 ad 70 39 60 4b a4 ce 69 bc 9d c6 9b |..Q..p9`K..i....| +00000010 92 89 7c 96 ff 00 06 3e 22 f3 ba 2c 28 d2 d0 80 |..|....>"..,(...| +[21ef 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 4d 3b 6d 79 7e 60 c6 00 9e e3 a2 |0D. .M;my~`.....| +00000010 c1 52 21 aa 00 cf 02 e4 e2 9a dc c7 3d ae c4 ca |.R!.........=...| +00000020 c6 ca 5e 8f 02 20 45 ee 63 2b 12 6c 2f 55 f7 9b |..^.. E.c+.l/U..| +00000030 42 59 0d 6f e6 76 a7 61 35 5f 65 35 45 20 a6 e9 |BY.o.v.a5_e5E ..| +00000040 2c 3d 3e 54 2d 06 |,=>T-.| +[21f0 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[21f1 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[21f2 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[21f3 08-31 20:51:45.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[21f4 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[21f5 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[21f6 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[21f7 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[21f8 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[21f9 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[21fa 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f09180 gate 1598907105631568400 evaluation starts +[21fb 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f09180 signed by 0 principal evaluation starts (used [false]) +[21fc 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f09180 processing identity 0 with bytes of 115a4b0 +[21fd 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f09180 principal matched by identity 0 +[21fe 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 45 06 e0 3d 9c 66 bc 90 53 b2 a5 53 47 0c 30 |.E..=.f..S..SG.0| +00000010 60 e5 a7 b0 a8 36 c4 ee b1 84 4a f2 05 1e 53 eb |`....6....J...S.| +[21ff 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 56 87 1d 29 5e 79 f2 7f 60 bc 9c c4 |0D. V..)^y..`...| +00000010 b7 35 c2 46 5c 8a 97 3e b8 93 24 9d dc c6 0b 16 |.5.F\..>..$.....| +00000020 f8 1f ef 3f 02 20 07 e9 b8 33 0f 23 cc 21 d3 98 |...?. ...3.#.!..| +00000030 9e 12 53 11 24 1d c1 d9 3b 7e eb e5 22 6f 74 cb |..S.$...;~.."ot.| +00000040 80 5e 69 15 de 32 |.^i..2| +[2200 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f09180 principal evaluation succeeds for identity 0 +[2201 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f09180 gate 1598907105631568400 evaluation succeeds +[2202 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2203 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2204 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2205 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2206 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2207 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2208 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2209 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[220b 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[220a 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[220c 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 86 51 90 ad 70 39 60 4b a4 ce 69 bc 9d c6 9b |..Q..p9`K..i....| +00000010 92 89 7c 96 ff 00 06 3e 22 f3 ba 2c 28 d2 d0 80 |..|....>"..,(...| +[220d 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0e 4d 3b 6d 79 7e 60 c6 00 9e e3 a2 |0D. .M;my~`.....| +00000010 c1 52 21 aa 00 cf 02 e4 e2 9a dc c7 3d ae c4 ca |.R!.........=...| +00000020 c6 ca 5e 8f 02 20 45 ee 63 2b 12 6c 2f 55 f7 9b |..^.. E.c+.l/U..| +00000030 42 59 0d 6f e6 76 a7 61 35 5f 65 35 45 20 a6 e9 |BY.o.v.a5_e5E ..| +00000040 2c 3d 3e 54 2d 06 |,=>T-.| +[220e 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[220f 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2210 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2211 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2212 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2213 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2214 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2215 08-31 20:51:45.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2216 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2217 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2218 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9290 gate 1598907105640396000 evaluation starts +[2219 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9290 signed by 0 principal evaluation starts (used [false]) +[221a 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9290 processing identity 0 with bytes of 115a4b0 +[221b 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9290 principal matched by identity 0 +[221c 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 01 f2 a8 1a fe 38 30 2f 92 2c 1f e6 ec cf d6 |".....80/.,.....| +00000010 40 94 76 c2 fa 5b 56 3c 39 87 5c 94 dd 39 1a 76 |@.v..[V<9.\..9.v| +[221d 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 9c 20 56 6e 86 9d 70 90 c4 13 d6 |0D. 5. Vn..p....| +00000010 ce ad df 3d e2 b0 cc bb cf fe 7c 09 f9 8a b1 31 |...=......|....1| +00000020 b9 8d 40 50 02 20 4b fb 92 04 ec 2f ec 3b 1e 52 |..@P. K..../.;.R| +00000030 94 89 4a 5d 1a 09 b8 5a e4 69 1b 24 1c 7b 91 2d |..J]...Z.i.$.{.-| +00000040 be 9e 68 21 12 b8 |..h!..| +[221e 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9290 principal evaluation succeeds for identity 0 +[221f 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b9290 gate 1598907105640396000 evaluation succeeds +[2220 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2221 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2222 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2223 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2224 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2225 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2226 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2227 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4e f6 c9 58 d0 fe 08 f5 24 ca 0e c3 c1 e4 5d a3 |N..X....$.....].| +00000010 96 ab 65 9c e2 45 0b 51 c9 e8 39 b0 a3 05 fa 0f |..e..E.Q..9.....| +[2228 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 75 8e c8 4f 6a 51 b2 20 05 07 49 f0 |0D. u..OjQ. ..I.| +00000010 e2 7c 00 d5 f8 fa 7b fa 96 fe 1f 0c 3a 9a 55 39 |.|....{.....:.U9| +00000020 96 51 b1 5c 02 20 27 5b 08 bb 01 54 3a 27 0c 38 |.Q.\. '[...T:'.8| +00000030 1d 3a db 7f 80 c9 96 03 3c ee ec 81 91 22 3e 56 |.:......<....">V| +00000040 f8 84 21 6c a3 be |..!l..| +[2229 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[222a 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[222b 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[222c 08-31 20:51:45.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[222d 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[222e 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[222f 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[2230 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2231 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2232 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2233 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2234 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2235 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2236 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[2237 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[2238 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[2239 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[223a 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[223b 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[223c 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[223d 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[223f 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2240 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2241 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2242 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2243 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2244 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e60d0 gate 1598907105719248000 evaluation starts +[2245 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e60d0 signed by 0 principal evaluation starts (used [false]) +[2246 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e60d0 processing identity 0 with bytes of 115a4b0 +[2247 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e60d0 principal matched by identity 0 +[2248 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[2249 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[224a 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e60d0 principal evaluation succeeds for identity 0 +[224b 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e60d0 gate 1598907105719248000 evaluation succeeds +[224c 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[224d 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[224e 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[224f 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2250 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2251 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2252 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2253 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2254 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2255 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2256 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2257 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2258 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e7610 gate 1598907105721411300 evaluation starts +[2259 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e7610 signed by 0 principal evaluation starts (used [false]) +[225a 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e7610 processing identity 0 with bytes of 115a4b0 +[225b 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e7610 principal matched by identity 0 +[225c 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[225d 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[225e 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e7610 principal evaluation succeeds for identity 0 +[225f 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032e7610 gate 1598907105721411300 evaluation succeeds +[2260 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2261 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2262 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2263 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2264 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[223e 08-31 20:51:45.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[2265 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[2266 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2267 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2268 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2269 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[226a 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[226b 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[226c 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[226d 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[226e 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[226f 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032decc0 gate 1598907105723806200 evaluation starts +[2270 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032decc0 signed by 0 principal evaluation starts (used [false]) +[2271 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032decc0 processing identity 0 with bytes of 115a4b0 +[2272 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032decc0 principal matched by identity 0 +[2273 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[2274 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[2275 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032decc0 principal evaluation succeeds for identity 0 +[2276 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032decc0 gate 1598907105723806200 evaluation succeeds +[2277 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2278 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2279 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[227a 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[227b 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[227c 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[227d 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[227e 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[227f 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2280 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2281 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2282 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[2283 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2284 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2285 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2286 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2287 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2288 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0ca0 gate 1598907105726808200 evaluation starts +[2289 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0ca0 signed by 0 principal evaluation starts (used [false]) +[228a 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0ca0 processing identity 0 with bytes of 115a4b0 +[228b 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0ca0 principal matched by identity 0 +[228c 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[228d 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[228e 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0ca0 principal evaluation succeeds for identity 0 +[228f 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0ca0 gate 1598907105726808200 evaluation succeeds +[2290 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2291 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2292 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2293 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2294 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2295 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[2296 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2297 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2298 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2299 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[229a 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[229b 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[229c 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[229d 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[229e 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[229f 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003264110 gate 1598907105727851600 evaluation starts +[22a0 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003264110 signed by 0 principal evaluation starts (used [false]) +[22a1 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003264110 processing identity 0 with bytes of 115a4b0 +[22a2 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003264110 principal matched by identity 0 +[22a3 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[22a4 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[22a5 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003264110 principal evaluation succeeds for identity 0 +[22a6 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003264110 gate 1598907105727851600 evaluation succeeds +[22a7 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[22a8 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[22a9 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[22aa 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[22ab 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[22ac 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[22ad 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22ae 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22af 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[22b0 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[22b1 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[22b2 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[22b3 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[22b4 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[22b5 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265a30 gate 1598907105729276700 evaluation starts +[22b6 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265a30 signed by 0 principal evaluation starts (used [false]) +[22b7 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265a30 processing identity 0 with bytes of 115a4b0 +[22b8 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265a30 principal matched by identity 0 +[22b9 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[22ba 08-31 20:51:45.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[22bb 08-31 20:51:45.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265a30 principal evaluation succeeds for identity 0 +[22bc 08-31 20:51:45.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003265a30 gate 1598907105729276700 evaluation succeeds +[22bd 08-31 20:51:45.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[22be 08-31 20:51:45.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[22bf 08-31 20:51:45.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[22c0 08-31 20:51:45.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[22c1 08-31 20:51:45.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[22c2 08-31 20:51:45.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[22c3 08-31 20:51:45.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22c4 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22c5 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22c6 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[22c7 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22c8 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22c9 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[22ca 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[22cb 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22cc 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[22cd 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[22ce 08-31 20:51:45.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22cf 08-31 20:51:45.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[22d0 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22d1 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22d2 08-31 20:51:45.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22d3 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[22d4 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[22d5 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[22d6 08-31 20:51:46.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22d7 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[22d8 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[22d9 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22da 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22db 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22dc 08-31 20:51:46.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22dd 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[22de 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[22df 08-31 20:51:46.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22e0 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22e1 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22e2 08-31 20:51:46.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22e3 08-31 20:51:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[22e4 08-31 20:51:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[22e5 08-31 20:51:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[22e6 08-31 20:51:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D9816100B1801 +[22e7 08-31 20:51:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2BE928562D5A2E5EE6158FD2265AE28E0D9E77FFF244742B350CD02DED5DF7B0 +[22e8 08-31 20:51:48.76 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[22e9 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22ea 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22eb 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22ec 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22ed 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[22ee 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22ef 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22f0 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[22f1 08-31 20:51:48.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22f2 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[22f3 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[22f4 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[22f5 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22f6 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22f7 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22f8 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22f9 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22fa 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[22fb 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[22fc 08-31 20:51:48.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[22fd 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[22fe 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[22ff 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2300 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2301 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2302 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2303 08-31 20:51:49.06 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2304 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2305 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2306 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2307 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2308 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2309 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227ad0 gate 1598907109071890000 evaluation starts +[230a 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227ad0 signed by 0 principal evaluation starts (used [false]) +[230b 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227ad0 processing identity 0 with bytes of 115a4b0 +[230c 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227ad0 principal matched by identity 0 +[230d 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 81 8a 58 31 78 c0 66 1a e1 b8 c8 6f 59 ee a7 |...X1x.f....oY..| +00000010 98 7e 6d 00 a7 1c 52 e5 f9 51 65 50 33 33 39 b3 |.~m...R..QeP339.| +[230e 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d8 b0 ee dd 6f 61 1b b4 e3 cf |0E.!......oa....| +00000010 b2 4a 6d 5f b8 7b 34 5b 5f fa b2 4c 25 4c fe 0e |.Jm_.{4[_..L%L..| +00000020 10 60 cf 0d ac 02 20 4a 6c 54 28 40 f3 26 2c cc |.`.... JlT(@.&,.| +00000030 a4 02 dc 4c ad 76 f2 71 6b 11 64 d5 5e c1 39 f4 |...L.v.qk.d.^.9.| +00000040 84 66 1b 38 4d ee 50 |.f.8M.P| +[230f 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227ad0 principal evaluation succeeds for identity 0 +[2310 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003227ad0 gate 1598907109071890000 evaluation succeeds +[2311 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2312 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2313 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2314 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2315 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2316 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2317 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2318 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2319 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[231a 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[231b 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[231c 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[231d 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[231e 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[231f 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2320 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2321 08-31 20:51:49.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[2322 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:T-\006" > alive: alive: alive: +[2323 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2324 08-31 20:51:49.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2325 08-31 20:51:49.14 UTC] [%{longpkg}] %{callpath} -> DEBU Build output is # examples/chaincode/go/chaincode_example02 +/tmp/go-link-922081282/000001.o: In function `pluginOpen': +/workdir/go/src/plugin/plugin_dlopen.go:19: warning: Using 'dlopen' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-922081282/000021.o: In function `mygetgrouplist': +/workdir/go/src/os/user/getgrouplist_unix.go:16: warning: Using 'getgrouplist' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-922081282/000020.o: In function `mygetgrgid_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:38: warning: Using 'getgrgid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-922081282/000020.o: In function `mygetgrnam_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:43: warning: Using 'getgrnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-922081282/000020.o: In function `mygetpwnam_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:33: warning: Using 'getpwnam_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-922081282/000020.o: In function `mygetpwuid_r': +/workdir/go/src/os/user/cgo_lookup_unix.go:28: warning: Using 'getpwuid_r' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +/tmp/go-link-922081282/000006.o: In function `_cgo_26061493d47f_C2func_getaddrinfo': +/tmp/go-build/cgo-gcc-prolog:58: warning: Using 'getaddrinfo' in statically linked applications requires at runtime the shared libraries from the glibc version used for linking +[2326 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2327 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2328 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2329 08-31 20:51:49.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[232a 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[232b 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[232c 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[232d 08-31 20:51:49.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[232e 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e1 ad 29 18 79 ab 40 6a e9 8e 72 aa e7 f3 82 |...).y.@j..r....| +00000010 c5 74 7f 2d d1 9d 8b d1 21 31 f7 e5 45 4a f1 bc |.t.-....!1..EJ..| +[232f 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 cc 45 75 d1 90 0d ae 8f b3 b9 00 |0D. '.Eu........| +00000010 eb 7a bf d7 c1 d2 9b aa 08 e6 29 54 aa d1 49 a6 |.z........)T..I.| +00000020 45 28 ed cb 02 20 42 99 45 f1 b0 c4 5c 25 51 a1 |E(... B.E...\%Q.| +00000030 6c 01 8d a7 37 8c e3 55 09 ee 7d 91 68 d1 f1 f9 |l...7..U..}.h...| +00000040 b9 a7 ad c3 90 cd |......| +[2330 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[2331 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 99 14 1e e3 48 5d 73 92 96 81 |0E.!......H]s...| +00000010 59 be 9b 17 b3 67 0b 82 9f cf 18 a8 e9 11 39 c5 |Y....g........9.| +00000020 d8 a5 7e a2 cc 02 20 13 f2 b6 22 cc 22 4a a7 e1 |..~... ..."."J..| +00000030 1a 2e ba 68 8e 3a d5 f4 87 9f 83 35 b3 ca 05 b6 |...h.:.....5....| +00000040 15 2d 56 60 73 a4 9d |.-V`s..| +[2332 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2333 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[2334 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2335 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2336 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[2337 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2338 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2339 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[233a 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[233b 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[233c 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[233d 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[233e 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[233f 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[2340 08-31 20:51:49.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2341 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2342 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2343 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2344 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2345 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2346 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2347 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2348 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2349 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[234a 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[234b 08-31 20:51:49.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[234c 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" > > , Envelope: 165 bytes, Signature: 0 bytes +[234d 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" > > , Envelope: 165 bytes, Signature: 0 bytes +[234e 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[234f 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" > > , Envelope: 165 bytes, Signature: 0 bytes +[2350 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2351 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2352 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2353 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2354 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2355 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2356 08-31 20:51:49.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2357 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2358 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1750 gate 1598907109521391400 evaluation starts +[2359 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1750 signed by 0 principal evaluation starts (used [false]) +[235a 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1750 processing identity 0 with bytes of 115a4b0 +[235b 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1750 principal matched by identity 0 +[235c 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d 58 de 29 3e 89 57 1e 44 8a f7 fb 53 91 ab 73 |]X.)>.W.D...S..s| +00000010 32 3e 69 99 79 39 d4 ef 41 34 e8 2c 5d 92 5c a4 |2>i.y9..A4.,].\.| +[235d 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 f8 55 a0 2b 98 7e 58 e5 5c 40 2e |0D. 4.U.+.~X.\@.| +00000010 50 fe 7c d2 67 3e 14 14 2e a5 16 3c 90 40 d9 07 |P.|.g>.....<.@..| +00000020 3f 9f b1 93 02 20 36 2b 3b 7d ab 73 f8 23 89 74 |?.... 6+;}.s.#.t| +00000030 9b d6 f2 88 bc 63 45 b0 8e 0f 16 db 35 57 42 35 |.....cE.....5WB5| +00000040 f3 3d cc 8c 1f c9 |.=....| +[235e 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1750 principal evaluation succeeds for identity 0 +[235f 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0031b1750 gate 1598907109521391400 evaluation succeeds +[2360 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2361 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2362 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2363 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2364 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2365 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2366 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2367 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2368 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2369 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[236a 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[236b 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[236c 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[236d 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[236e 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[236f 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2370 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[2371 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\024\024.\245\026<\220@\331\007?\237\261\223\002 6+;}\253s\370#\211t\233\326\362\210\274cE\260\216\017\026\3335WB5\363=\314\214\037\311" > alive: alive: +[2372 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[2373 08-31 20:51:49.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2374 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[2375 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[2376 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[2377 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[2378 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[2379 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[237a 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[237b 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[237c 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[237d 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[237e 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[237f 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2380 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2381 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2382 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2383 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2384 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2385 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2386 08-31 20:51:49.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2387 08-31 20:51:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2388 08-31 20:51:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2389 08-31 20:51:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[238a 08-31 20:51:49.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[238b 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[238c 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161026 +[238d 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D3800AF6AAFBBDB318AE59A2307861C67C1E7D03C716A07BA49872543FADE9E2 +[238e 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[238f 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2390 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2391 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2392 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[2393 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2394 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[2395 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[2396 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[2397 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2398 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2399 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[239a 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[239b 08-31 20:51:49.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[239c 08-31 20:51:49.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[239d 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[239e 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[239f 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[23a0 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 80 0a f6 aa fb bd b3 18 ae 59 a2 30 78 61 c6 |..........Y.0xa.| +00000010 7c 1e 7d 03 c7 16 a0 7b a4 98 72 54 3f ad e9 e2 ||.}....{..rT?...| +[23a1 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 7e 5a 07 d9 fb df 7e 8d ef 75 |0E.!..~Z....~..u| +00000010 91 40 9e cb a0 79 92 ac 54 36 64 4e 02 a8 1b 60 |.@...y..T6dN...`| +00000020 f8 0d 64 95 c3 02 20 1a 00 42 49 20 68 2c cd 66 |..d... ..BI h,.f| +00000030 b3 96 bd ba a8 a7 82 1e aa 97 ea f8 5e 1f 45 d7 |............^.E.| +00000040 65 ef e7 0f 4e 88 1f |e...N..| +[23a2 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[23a3 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 94 aa 01 b3 f2 e0 f4 89 7a 81 71 |0E.!.........z.q| +00000010 7d 1e de 8f 40 ae ac 2e 5b 2d c8 28 10 00 6e 93 |}...@...[-.(..n.| +00000020 86 42 e4 11 05 02 20 45 d0 6f 2e cb c9 32 c1 30 |.B.... E.o...2.0| +00000030 a3 58 4b 40 7c 56 cd 1b 7f f8 e6 4d 87 e3 1d b0 |.XK@|V.....M....| +00000040 81 b9 af 1c 67 bd 8c |....g..| +[23a4 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[23a5 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[23a6 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23a7 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23a8 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[23a9 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[23aa 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23ab 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[23ac 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[23ad 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 80 0a f6 aa fb bd b3 18 ae 59 a2 30 78 61 c6 |..........Y.0xa.| +00000010 7c 1e 7d 03 c7 16 a0 7b a4 98 72 54 3f ad e9 e2 ||.}....{..rT?...| +[23ae 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 7e 5a 07 d9 fb df 7e 8d ef 75 |0E.!..~Z....~..u| +00000010 91 40 9e cb a0 79 92 ac 54 36 64 4e 02 a8 1b 60 |.@...y..T6dN...`| +00000020 f8 0d 64 95 c3 02 20 1a 00 42 49 20 68 2c cd 66 |..d... ..BI h,.f| +00000030 b3 96 bd ba a8 a7 82 1e aa 97 ea f8 5e 1f 45 d7 |............^.E.| +00000040 65 ef e7 0f 4e 88 1f |e...N..| +[23af 08-31 20:51:49.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[23b0 08-31 20:51:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[23b1 08-31 20:51:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23b3 08-31 20:51:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[23b4 08-31 20:51:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e1 ad 29 18 79 ab 40 6a e9 8e 72 aa e7 f3 82 |...).y.@j..r....| +00000010 c5 74 7f 2d d1 9d 8b d1 21 31 f7 e5 45 4a f1 bc |.t.-....!1..EJ..| +[23b5 08-31 20:51:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 cc 45 75 d1 90 0d ae 8f b3 b9 00 |0D. '.Eu........| +00000010 eb 7a bf d7 c1 d2 9b aa 08 e6 29 54 aa d1 49 a6 |.z........)T..I.| +00000020 45 28 ed cb 02 20 42 99 45 f1 b0 c4 5c 25 51 a1 |E(... B.E...\%Q.| +00000030 6c 01 8d a7 37 8c e3 55 09 ee 7d 91 68 d1 f1 f9 |l...7..U..}.h...| +00000040 b9 a7 ad c3 90 cd |......| +[23b6 08-31 20:51:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[23b7 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23b8 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[23b9 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23ba 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[23bb 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[23bc 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[23b2 08-31 20:51:49.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[23bd 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[23be 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[23bf 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[23c0 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[23c1 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 gate 1598907109634480700 evaluation starts +[23c2 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 signed by 0 principal evaluation starts (used [false]) +[23c3 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 processing identity 0 with bytes of 115a4b0 +[23c4 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 principal matched by identity 0 +[23c5 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5d 58 de 29 3e 89 57 1e 44 8a f7 fb 53 91 ab 73 |]X.)>.W.D...S..s| +00000010 32 3e 69 99 79 39 d4 ef 41 34 e8 2c 5d 92 5c a4 |2>i.y9..A4.,].\.| +[23c6 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 34 f8 55 a0 2b 98 7e 58 e5 5c 40 2e |0D. 4.U.+.~X.\@.| +00000010 50 fe 7c d2 67 3e 14 14 2e a5 16 3c 90 40 d9 07 |P.|.g>.....<.@..| +00000020 3f 9f b1 93 02 20 36 2b 3b 7d ab 73 f8 23 89 74 |?.... 6+;}.s.#.t| +00000030 9b d6 f2 88 bc 63 45 b0 8e 0f 16 db 35 57 42 35 |.....cE.....5WB5| +00000040 f3 3d cc 8c 1f c9 |.=....| +[23c7 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 principal evaluation succeeds for identity 0 +[23c8 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003249cc0 gate 1598907109634480700 evaluation succeeds +[23c9 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[23ca 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[23cb 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[23cc 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[23cd 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[23ce 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23cf 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23d0 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[23d1 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23d2 08-31 20:51:49.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[23d3 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 80 0a f6 aa fb bd b3 18 ae 59 a2 30 78 61 c6 |..........Y.0xa.| +00000010 7c 1e 7d 03 c7 16 a0 7b a4 98 72 54 3f ad e9 e2 ||.}....{..rT?...| +[23d4 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 7e 5a 07 d9 fb df 7e 8d ef 75 |0E.!..~Z....~..u| +00000010 91 40 9e cb a0 79 92 ac 54 36 64 4e 02 a8 1b 60 |.@...y..T6dN...`| +00000020 f8 0d 64 95 c3 02 20 1a 00 42 49 20 68 2c cd 66 |..d... ..BI h,.f| +00000030 b3 96 bd ba a8 a7 82 1e aa 97 ea f8 5e 1f 45 d7 |............^.E.| +00000040 65 ef e7 0f 4e 88 1f |e...N..| +[23d5 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[23d6 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[23d7 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23d8 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[23d9 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b e1 ad 29 18 79 ab 40 6a e9 8e 72 aa e7 f3 82 |...).y.@j..r....| +00000010 c5 74 7f 2d d1 9d 8b d1 21 31 f7 e5 45 4a f1 bc |.t.-....!1..EJ..| +[23da 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 27 cc 45 75 d1 90 0d ae 8f b3 b9 00 |0D. '.Eu........| +00000010 eb 7a bf d7 c1 d2 9b aa 08 e6 29 54 aa d1 49 a6 |.z........)T..I.| +00000020 45 28 ed cb 02 20 42 99 45 f1 b0 c4 5c 25 51 a1 |E(... B.E...\%Q.| +00000030 6c 01 8d a7 37 8c e3 55 09 ee 7d 91 68 d1 f1 f9 |l...7..U..}.h...| +00000040 b9 a7 ad c3 90 cd |......| +[23db 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[23dc 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23dd 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[23de 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23df 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[23e0 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[23e1 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[23e2 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[23e3 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[23e4 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[23e5 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0410 gate 1598907109645201400 evaluation starts +[23e6 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0410 signed by 0 principal evaluation starts (used [false]) +[23e7 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0410 processing identity 0 with bytes of 115a4b0 +[23e8 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0410 principal matched by identity 0 +[23e9 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 95 81 8a 58 31 78 c0 66 1a e1 b8 c8 6f 59 ee a7 |...X1x.f....oY..| +00000010 98 7e 6d 00 a7 1c 52 e5 f9 51 65 50 33 33 39 b3 |.~m...R..QeP339.| +[23ea 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 d8 b0 ee dd 6f 61 1b b4 e3 cf |0E.!......oa....| +00000010 b2 4a 6d 5f b8 7b 34 5b 5f fa b2 4c 25 4c fe 0e |.Jm_.{4[_..L%L..| +00000020 10 60 cf 0d ac 02 20 4a 6c 54 28 40 f3 26 2c cc |.`.... JlT(@.&,.| +00000030 a4 02 dc 4c ad 76 f2 71 6b 11 64 d5 5e c1 39 f4 |...L.v.qk.d.^.9.| +00000040 84 66 1b 38 4d ee 50 |.f.8M.P| +[23eb 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0410 principal evaluation succeeds for identity 0 +[23ec 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c0410 gate 1598907109645201400 evaluation succeeds +[23ed 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[23ee 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[23ef 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[23f0 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[23f1 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[23f2 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23f3 08-31 20:51:49.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23f4 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23f5 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[23f6 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[23f7 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[23f8 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23f9 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[23fa 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23fb 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[23fd 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[23fc 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[23fe 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[23ff 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2400 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2401 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2402 08-31 20:51:49.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2403 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2404 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2405 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2406 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2407 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2408 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1be0 gate 1598907109740396400 evaluation starts +[2409 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1be0 signed by 0 principal evaluation starts (used [false]) +[240a 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1be0 processing identity 0 with bytes of 115a4b0 +[240b 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1be0 principal matched by identity 0 +[240c 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[240d 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[240e 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1be0 principal evaluation succeeds for identity 0 +[240f 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032c1be0 gate 1598907109740396400 evaluation succeeds +[2410 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2411 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2412 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2413 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2414 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[2415 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[2416 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2417 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2418 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2419 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[241a 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[241b 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[241c 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[241d 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[241e 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032df510 gate 1598907109746357800 evaluation starts +[241f 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032df510 signed by 0 principal evaluation starts (used [false]) +[2420 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032df510 processing identity 0 with bytes of 115a4b0 +[2421 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032df510 principal matched by identity 0 +[2422 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[2423 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[2424 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032df510 principal evaluation succeeds for identity 0 +[2425 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0032df510 gate 1598907109746357800 evaluation succeeds +[2426 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2427 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2428 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2429 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[242a 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[242b 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[242c 08-31 20:51:49.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[242d 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[242e 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[242f 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[2430 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[2431 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[2432 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2433 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2434 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2435 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2436 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2437 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2438 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2439 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[243a 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003302300 gate 1598907109759350600 evaluation starts +[243b 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003302300 signed by 0 principal evaluation starts (used [false]) +[243c 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003302300 processing identity 0 with bytes of 115a4b0 +[243d 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003302300 principal matched by identity 0 +[243e 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[243f 08-31 20:51:49.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[2440 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003302300 principal evaluation succeeds for identity 0 +[2441 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003302300 gate 1598907109759350600 evaluation succeeds +[2442 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2443 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2444 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2445 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2446 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2447 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2448 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2449 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[244a 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[244b 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[244c 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[244d 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[244e 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003303500 gate 1598907109765220500 evaluation starts +[244f 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003303500 signed by 0 principal evaluation starts (used [false]) +[2450 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003303500 processing identity 0 with bytes of 115a4b0 +[2451 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003303500 principal matched by identity 0 +[2452 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[2453 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[2454 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003303500 principal evaluation succeeds for identity 0 +[2455 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003303500 gate 1598907109765220500 evaluation succeeds +[2456 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2457 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2458 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2459 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[245a 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[245b 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[245c 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[245d 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[245e 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[245f 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2460 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2461 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2462 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2463 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2464 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2465 08-31 20:51:49.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2466 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b8ba0 gate 1598907109771682100 evaluation starts +[2467 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b8ba0 signed by 0 principal evaluation starts (used [false]) +[2468 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b8ba0 processing identity 0 with bytes of 115a4b0 +[2469 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b8ba0 principal matched by identity 0 +[246a 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[246b 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[246c 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b8ba0 principal evaluation succeeds for identity 0 +[246d 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0033b8ba0 gate 1598907109771682100 evaluation succeeds +[246e 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[246f 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2470 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2471 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2472 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[2473 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[2474 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[2475 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[2476 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2477 08-31 20:51:49.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2478 08-31 20:51:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2479 08-31 20:51:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[247a 08-31 20:51:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[247b 08-31 20:51:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[247c 08-31 20:51:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[247d 08-31 20:51:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[247e 08-31 20:51:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330cc20 gate 1598907109789810900 evaluation starts +[247f 08-31 20:51:49.78 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330cc20 signed by 0 principal evaluation starts (used [false]) +[2480 08-31 20:51:49.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330cc20 processing identity 0 with bytes of 115a4b0 +[2482 08-31 20:51:49.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330cc20 principal matched by identity 0 +[2483 08-31 20:51:49.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[2484 08-31 20:51:49.82 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[2485 08-31 20:51:49.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330cc20 principal evaluation succeeds for identity 0 +[2486 08-31 20:51:49.82 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00330cc20 gate 1598907109789810900 evaluation succeeds +[2481 08-31 20:51:49.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2488 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2489 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[248a 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[248b 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[248c 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[248d 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[248e 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2487 08-31 20:51:49.82 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[248f 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2490 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2491 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2492 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2493 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[2494 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[2495 08-31 20:51:49.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2496 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2497 08-31 20:51:49.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2498 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2499 08-31 20:51:49.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[249a 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[249b 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[249c 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[249d 08-31 20:51:50.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[249e 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[249f 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24a0 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24a1 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24a2 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[24a3 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24a4 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[24a5 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[24a6 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[24a7 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[24a8 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[24a9 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[24aa 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198bc0 gate 1598907110033719700 evaluation starts +[24ab 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198bc0 signed by 0 principal evaluation starts (used [false]) +[24ac 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198bc0 processing identity 0 with bytes of 115a4b0 +[24ad 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198bc0 principal matched by identity 0 +[24ae 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7a 61 cd e7 ff d3 e4 b7 be b6 86 08 ad e3 97 ee |za..............| +00000010 e3 3e 66 14 fb c0 ad 4e 8c c9 e3 30 32 02 cc cf |.>f....N...02...| +[24af 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bd 5f 4e e2 29 37 5a 41 a1 48 71 |0E.!.._N.)7ZA.Hq| +00000010 88 17 37 03 dc b5 58 2d 3b 38 d3 c8 b5 97 48 1a |..7...X-;8....H.| +00000020 25 ed c9 3f 71 02 20 4c ef 68 36 b5 a1 d4 d6 03 |%..?q. L.h6.....| +00000030 83 11 cb 13 9d 7f 4f b1 52 e3 04 a9 cb f0 9a 27 |......O.R......'| +00000040 e8 51 53 9a c6 82 28 |.QS...(| +[24b0 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198bc0 principal evaluation succeeds for identity 0 +[24b1 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003198bc0 gate 1598907110033719700 evaluation succeeds +[24b2 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[24b3 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[24b4 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[24b5 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[24b6 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24b7 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[24b8 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[24b9 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[24ba 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[24bb 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24bc 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24bd 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24be 08-31 20:51:50.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24bf 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24c0 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24c1 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24c2 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24c3 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24c4 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24c5 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[24c6 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24c7 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[24c8 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24c9 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24ca 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24cb 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24cc 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24cd 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24ce 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24cf 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24d0 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24d1 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24d2 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24d3 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24d4 08-31 20:51:50.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24d5 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[24d6 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[24d7 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24d8 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24d9 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24da 08-31 20:51:50.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24db 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24dc 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24dd 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24de 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[24df 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 42 18 dd 8d c0 6e e2 a3 25 7a 13 c8 3f a9 40 ce |B....n..%z..?.@.| +00000010 12 7b f2 2f cd 44 ab f9 58 25 58 61 fc c7 d1 41 |.{./.D..X%Xa...A| +[24e0 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 46 24 2b e4 77 40 b0 5e bf 20 9c 49 |0D. F$+.w@.^. .I| +00000010 3e cc 09 eb 17 b3 c5 ef 28 fb 8f c6 8c eb dc 52 |>.......(......R| +00000020 9f b7 b3 8c 02 20 5f 9c 9a 99 59 b5 a5 4a 61 c3 |..... _...Y..Ja.| +00000030 ba c5 68 4b 57 80 c3 d0 c8 ce 35 fc 35 82 29 2b |..hKW.....5.5.)+| +00000040 e8 6f 02 c0 c7 35 |.o...5| +[24e1 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24e2 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[24e3 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[24e4 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[24e5 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[24e6 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24e7 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24e8 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24e9 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24ea 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24eb 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24ec 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[24ed 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[24ee 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[24ef 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24f0 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24f1 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24f2 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24f3 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24f4 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24f5 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24f6 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24f7 08-31 20:51:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24f8 08-31 20:51:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24f9 08-31 20:51:50.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24fa 08-31 20:51:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[24fb 08-31 20:51:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24fc 08-31 20:51:50.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[24fd 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24fe 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[24ff 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2500 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2501 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2502 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2503 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2504 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2505 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2506 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2507 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2508 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2509 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ca83a0 gate 1598907110471947700 evaluation starts +[250a 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ca83a0 signed by 0 principal evaluation starts (used [false]) +[250b 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ca83a0 processing identity 0 with bytes of 115a4b0 +[250c 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ca83a0 principal matched by identity 0 +[250d 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1b d7 f9 e6 15 ef a0 e3 cb ea ba b8 0b 8d f8 21 |...............!| +00000010 5b 0c 17 c6 f9 f3 2a 85 b2 02 00 f5 df eb d4 d3 |[.....*.........| +[250e 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ea f3 db c0 3c df a8 ae b8 ca 39 |0E.!.....<.....9| +00000010 1a d8 21 e2 95 2e 93 27 d5 8f ed b5 0c e5 47 69 |..!....'......Gi| +00000020 4f 0a af 71 77 02 20 03 78 de 82 f1 d1 78 7c 8b |O..qw. .x....x|.| +00000030 a7 b1 56 b3 a9 e6 ef be 5d 24 89 d2 a0 8f 87 9b |..V.....]$......| +00000040 bc ca 48 4c a1 34 c7 |..HL.4.| +[250f 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ca83a0 principal evaluation succeeds for identity 0 +[2510 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002ca83a0 gate 1598907110471947700 evaluation succeeds +[2511 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2512 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2513 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2514 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2515 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2516 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2517 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2518 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2519 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[251a 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[251b 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[251c 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[251d 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[251e 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[251f 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2520 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2521 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2522 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2523 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2524 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2525 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2526 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2527 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2528 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2529 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[252a 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[252b 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[252c 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[252d 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[252e 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[252f 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2530 08-31 20:51:50.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2531 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2532 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2533 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2534 08-31 20:51:50.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2535 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2536 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2537 08-31 20:51:50.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2538 08-31 20:51:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2539 08-31 20:51:50.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[253a 08-31 20:51:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[253b 08-31 20:51:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161027 +[253c 08-31 20:51:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CE80EE8E7A3015CA52727981C83F87F11186D9FCE272CE6D4E23E07DB851BED4 +[253d 08-31 20:51:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[253e 08-31 20:51:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[253f 08-31 20:51:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2540 08-31 20:51:50.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[2541 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2542 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2543 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2544 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2545 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2546 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2547 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2548 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2549 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[254a 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[254b 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[254c 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[254d 08-31 20:51:50.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[254e 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[254f 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2550 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2551 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2552 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2553 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2554 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2555 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2556 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2557 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[2558 08-31 20:51:52.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2559 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:)b\021/\226\350\330T\177" > > , Envelope: 165 bytes, Signature: 0 bytes +[255a 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req:)b\021/\226\350\330T\177" > > , Envelope: 165 bytes, Signature: 0 bytes +[255b 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[255c 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:)b\021/\226\350\330T\177" > > , Envelope: 165 bytes, Signature: 0 bytes +[255d 08-31 20:51:53.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[255e 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[255f 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2560 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2561 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2562 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2563 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2564 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2565 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d30c0 gate 1598907113094289700 evaluation starts +[2566 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d30c0 signed by 0 principal evaluation starts (used [false]) +[2567 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d30c0 processing identity 0 with bytes of 115a4b0 +[2568 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d30c0 principal matched by identity 0 +[2569 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c aa a5 5a 6c 4e f5 3d 4f b2 61 f4 2a 5b 12 81 |...ZlN.=O.a.*[..| +00000010 cb 7e 57 55 cd aa 59 d5 f2 c9 38 c9 21 b6 d5 fe |.~WU..Y...8.!...| +[256a 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 67 b2 ff a9 ff 61 ec 7b a5 ba 8d |0D. )b.| +00000040 2f 96 e8 d8 54 7f |/...T.| +[256b 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d30c0 principal evaluation succeeds for identity 0 +[256c 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0030d30c0 gate 1598907113094289700 evaluation succeeds +[256d 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[256e 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[256f 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2570 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2571 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2572 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2573 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2574 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2575 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2576 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2577 08-31 20:51:53.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2578 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2579 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[257a 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[257b 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[257c 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[257d 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[257e 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:)b\021/\226\350\330T\177" > alive:\314\t\353\027\263\305\357(\373\217\306\214\353\334R\237\267\263\214\002 _\234\232\231Y\265\245Ja\303\272\305hKW\200\303\320\310\3165\3745\202)+\350o\002\300\3075" > alive: alive: +[257f 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2580 08-31 20:51:53.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2581 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2582 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2583 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2584 08-31 20:51:53.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2585 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[2586 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2587 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[2588 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2589 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 f3 24 d0 88 ad 43 07 03 12 e3 c5 30 1b 19 d1 |..$...C.....0...| +00000010 84 d1 56 df 11 8b 08 1c 71 9d 70 84 1e a1 1b af |..V.....q.p.....| +[258a 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 60 fd b0 91 5a 9b 66 62 0b 56 |0E.!..`...Z.fb.V| +00000010 e0 3a 51 e4 10 99 41 d7 ba 6a 21 d9 e6 f7 d8 a0 |.:Q...A..j!.....| +00000020 ed 1b 9b b9 41 02 20 35 4b ce d5 03 3a f2 93 b1 |....A. 5K...:...| +00000030 1c bb 3e 6a cb a6 91 c0 22 77 7a bd 90 b5 ca bc |..>j...."wz.....| +00000040 7f bd 8a 24 ee e7 20 |...$.. | +[258b 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[258c 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6f c7 68 2f 2f 78 c0 db dd 53 12 fc |0D. o.h//x...S..| +00000010 80 76 c6 7f b6 c8 cc 51 ae 66 4f 4c 0f b4 86 86 |.v.....Q.fOL....| +00000020 b9 15 e4 d7 02 20 22 81 92 ec 3b 98 e1 64 92 f9 |..... "...;..d..| +00000030 82 cf d0 6e a9 85 53 27 8c e1 7a dd 27 f1 d0 fd |...n..S'..z.'...| +00000040 16 ba 8c d4 25 d1 |....%.| +[258d 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[258e 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[258f 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2590 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2591 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2592 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2593 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2594 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2595 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[2596 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2597 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2598 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[2599 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " secret_envelope: > alive: +[259a 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[259b 08-31 20:51:53.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[259c 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[259d 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[259e 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[259f 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25a0 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25a1 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25a2 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25a3 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25a4 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25a5 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[25a6 08-31 20:51:53.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25a7 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[25a8 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[25a9 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25aa 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[25ab 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[25ac 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25ad 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[25ae 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[25af 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[25b0 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[25b1 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[25b2 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[25b3 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bd6f10 gate 1598907113518211100 evaluation starts +[25b4 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bd6f10 signed by 0 principal evaluation starts (used [false]) +[25b5 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bd6f10 processing identity 0 with bytes of 115a4b0 +[25b6 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bd6f10 principal matched by identity 0 +[25b7 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 25 ef a4 57 76 c6 2c a0 ca 69 20 fd 35 fd 3d |5%..Wv.,..i .5.=| +00000010 bb a2 d6 4e af a3 21 78 39 46 88 fe 26 f6 e9 13 |...N..!x9F..&...| +[25b8 08-31 20:51:53.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 75 86 1e ea b0 26 fd 6f 71 10 |0E.!..u....&.oq.| +00000010 de 47 71 6a 39 e5 36 95 47 56 f7 27 5c 34 8c 5b |.Gqj9.6.GV.'\4.[| +00000020 36 34 ea 45 75 02 20 11 fd a8 8f 1a 32 ab 10 77 |64.Eu. .....2..w| +00000030 5e 18 50 0a c8 a7 9e 69 67 4f 0b 9d df b8 99 16 |^.P....igO......| +00000040 56 9e 51 af 23 b4 97 |V.Q.#..| +[25b9 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bd6f10 principal evaluation succeeds for identity 0 +[25ba 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002bd6f10 gate 1598907113518211100 evaluation succeeds +[25bb 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[25bc 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[25bd 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[25be 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[25bf 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[25c0 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[25c1 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[25c2 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[25c3 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[25c4 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25c5 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25c6 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25c7 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[25c8 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25c9 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25ca 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25cb 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[25cc 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[25cd 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25ce 08-31 20:51:53.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:j\313\246\221\300\"wz\275\220\265\312\274\177\275\212$\356\347 " > alive: alive:)b\021/\226\350\330T\177" > alive: +[25cf 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[25d0 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[25d1 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[25d2 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[25d3 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[25d4 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[25d5 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[25d6 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25d7 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[25d8 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25d9 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[25da 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25db 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[25dc 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[25dd 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[25de 08-31 20:51:53.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25df 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[25e0 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[25e1 08-31 20:51:53.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25e2 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[25e3 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[25e4 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[25e5 08-31 20:51:53.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25e6 08-31 20:51:53.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[25e7 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161028 +[25e8 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 47577C95E3E5D9B8524AD75B1B7F2ACA5736EAE032DEB56DAC333F9AF032C87A +[25e9 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[25ea 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[25eb 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[25ec 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes to 1 peers +[25ed 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25ef 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[25ee 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 270 bytes, Signature: 0 bytes +[25f0 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25f1 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[25f2 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25f3 08-31 20:51:53.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[25f4 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[25f5 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[25f6 08-31 20:51:53.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25f7 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[25f8 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[25f9 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[25fa 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[25fb 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 57 7c 95 e3 e5 d9 b8 52 4a d7 5b 1b 7f 2a ca |GW|.....RJ.[..*.| +00000010 57 36 ea e0 32 de b5 6d ac 33 3f 9a f0 32 c8 7a |W6..2..m.3?..2.z| +[25fc 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 98 06 f9 87 d9 60 5f 06 9e 17 1a |0D. c.....`_....| +00000010 03 1d 48 68 b2 76 ec 51 36 72 75 cb e0 2c b5 a7 |..Hh.v.Q6ru..,..| +00000020 59 f1 2f 50 02 20 00 ff 95 08 39 9c bc f8 e9 15 |Y./P. ....9.....| +00000030 a6 53 67 72 e9 b6 df 11 56 90 e8 92 32 40 4f 45 |.Sgr....V...2@OE| +00000040 62 28 71 bf 24 e7 |b(q.$.| +[25fd 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[25fe 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 13 b5 d3 7a 97 35 f8 c3 86 a1 1d |0D. ....z.5.....| +00000010 b7 c2 65 d0 5f 2d 86 64 b3 99 56 db 75 e4 4b b3 |..e._-.d..V.u.K.| +00000020 c8 e0 fb 6e 02 20 7d d9 48 1f 82 c4 39 84 52 34 |...n. }.H...9.R4| +00000030 8f a8 33 ba c8 c6 a3 7c c2 60 5e b7 0e 35 ab fa |..3....|.`^..5..| +00000040 31 6e ed 11 e4 55 |1n...U| +[25ff 08-31 20:51:53.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[2600 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[2601 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2602 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2603 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2604 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2605 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2606 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2607 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2608 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 f3 24 d0 88 ad 43 07 03 12 e3 c5 30 1b 19 d1 |..$...C.....0...| +00000010 84 d1 56 df 11 8b 08 1c 71 9d 70 84 1e a1 1b af |..V.....q.p.....| +[2609 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 60 fd b0 91 5a 9b 66 62 0b 56 |0E.!..`...Z.fb.V| +00000010 e0 3a 51 e4 10 99 41 d7 ba 6a 21 d9 e6 f7 d8 a0 |.:Q...A..j!.....| +00000020 ed 1b 9b b9 41 02 20 35 4b ce d5 03 3a f2 93 b1 |....A. 5K...:...| +00000030 1c bb 3e 6a cb a6 91 c0 22 77 7a bd 90 b5 ca bc |..>j...."wz.....| +00000040 7f bd 8a 24 ee e7 20 |...$.. | +[260a 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[260b 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[260c 08-31 20:51:53.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[260d 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[260e 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[260f 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2610 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2611 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2612 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2613 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2614 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49890 gate 1598907113641711300 evaluation starts +[2615 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49890 signed by 0 principal evaluation starts (used [false]) +[2616 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49890 processing identity 0 with bytes of 115a4b0 +[2617 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49890 principal matched by identity 0 +[2618 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 35 25 ef a4 57 76 c6 2c a0 ca 69 20 fd 35 fd 3d |5%..Wv.,..i .5.=| +00000010 bb a2 d6 4e af a3 21 78 39 46 88 fe 26 f6 e9 13 |...N..!x9F..&...| +[2619 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 75 86 1e ea b0 26 fd 6f 71 10 |0E.!..u....&.oq.| +00000010 de 47 71 6a 39 e5 36 95 47 56 f7 27 5c 34 8c 5b |.Gqj9.6.GV.'\4.[| +00000020 36 34 ea 45 75 02 20 11 fd a8 8f 1a 32 ab 10 77 |64.Eu. .....2..w| +00000030 5e 18 50 0a c8 a7 9e 69 67 4f 0b 9d df b8 99 16 |^.P....igO......| +00000040 56 9e 51 af 23 b4 97 |V.Q.#..| +[261a 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49890 principal evaluation succeeds for identity 0 +[261c 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[261d 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[261b 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002b49890 gate 1598907113641711300 evaluation succeeds +[261e 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[261f 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2620 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2621 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2622 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2623 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2624 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2625 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 57 7c 95 e3 e5 d9 b8 52 4a d7 5b 1b 7f 2a ca |GW|.....RJ.[..*.| +00000010 57 36 ea e0 32 de b5 6d ac 33 3f 9a f0 32 c8 7a |W6..2..m.3?..2.z| +[2626 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 98 06 f9 87 d9 60 5f 06 9e 17 1a |0D. c.....`_....| +00000010 03 1d 48 68 b2 76 ec 51 36 72 75 cb e0 2c b5 a7 |..Hh.v.Q6ru..,..| +00000020 59 f1 2f 50 02 20 00 ff 95 08 39 9c bc f8 e9 15 |Y./P. ....9.....| +00000030 a6 53 67 72 e9 b6 df 11 56 90 e8 92 32 40 4f 45 |.Sgr....V...2@OE| +00000040 62 28 71 bf 24 e7 |b(q.$.| +[2627 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2628 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2629 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[262a 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[262b 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[262c 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[262d 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[262e 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 f3 24 d0 88 ad 43 07 03 12 e3 c5 30 1b 19 d1 |..$...C.....0...| +00000010 84 d1 56 df 11 8b 08 1c 71 9d 70 84 1e a1 1b af |..V.....q.p.....| +[262f 08-31 20:51:53.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d9 60 fd b0 91 5a 9b 66 62 0b 56 |0E.!..`...Z.fb.V| +00000010 e0 3a 51 e4 10 99 41 d7 ba 6a 21 d9 e6 f7 d8 a0 |.:Q...A..j!.....| +00000020 ed 1b 9b b9 41 02 20 35 4b ce d5 03 3a f2 93 b1 |....A. 5K...:...| +00000030 1c bb 3e 6a cb a6 91 c0 22 77 7a bd 90 b5 ca bc |..>j...."wz.....| +00000040 7f bd 8a 24 ee e7 20 |...$.. | +[2630 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2631 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2632 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2633 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2634 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2635 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2636 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2637 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2638 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2639 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[263a 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d8100 gate 1598907113652445000 evaluation starts +[263b 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d8100 signed by 0 principal evaluation starts (used [false]) +[263c 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d8100 processing identity 0 with bytes of 115a4b0 +[263d 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d8100 principal matched by identity 0 +[263e 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 9c aa a5 5a 6c 4e f5 3d 4f b2 61 f4 2a 5b 12 81 |...ZlN.=O.a.*[..| +00000010 cb 7e 57 55 cd aa 59 d5 f2 c9 38 c9 21 b6 d5 fe |.~WU..Y...8.!...| +[263f 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 67 b2 ff a9 ff 61 ec 7b a5 ba 8d |0D. )b.| +00000040 2f 96 e8 d8 54 7f |/...T.| +[2640 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d8100 principal evaluation succeeds for identity 0 +[2641 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0029d8100 gate 1598907113652445000 evaluation succeeds +[2642 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2643 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2644 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2645 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2646 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2647 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2648 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2649 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 57 7c 95 e3 e5 d9 b8 52 4a d7 5b 1b 7f 2a ca |GW|.....RJ.[..*.| +00000010 57 36 ea e0 32 de b5 6d ac 33 3f 9a f0 32 c8 7a |W6..2..m.3?..2.z| +[264a 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 63 98 06 f9 87 d9 60 5f 06 9e 17 1a |0D. c.....`_....| +00000010 03 1d 48 68 b2 76 ec 51 36 72 75 cb e0 2c b5 a7 |..Hh.v.Q6ru..,..| +00000020 59 f1 2f 50 02 20 00 ff 95 08 39 9c bc f8 e9 15 |Y./P. ....9.....| +00000030 a6 53 67 72 e9 b6 df 11 56 90 e8 92 32 40 4f 45 |.Sgr....V...2@OE| +00000040 62 28 71 bf 24 e7 |b(q.$.| +[264b 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[264c 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[264d 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[264e 08-31 20:51:53.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[264f 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2650 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2651 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[2652 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2653 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2654 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2655 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2656 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2657 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2658 08-31 20:51:53.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[2659 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[265a 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[265b 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[265c 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[265d 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[265e 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[265f 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2660 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2661 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2662 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2663 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002952800 gate 1598907113725670400 evaluation starts +[2664 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002952800 signed by 0 principal evaluation starts (used [false]) +[2665 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002952800 processing identity 0 with bytes of 115a4b0 +[2666 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002952800 principal matched by identity 0 +[2667 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[2668 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[2669 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002952800 principal evaluation succeeds for identity 0 +[266a 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002952800 gate 1598907113725670400 evaluation succeeds +[266b 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[266c 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[266d 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[266e 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[266f 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[2670 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[2671 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[2672 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[2673 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2674 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2675 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2676 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2677 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2678 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2679 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[267a 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[267b 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e840 gate 1598907113727204500 evaluation starts +[267c 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e840 signed by 0 principal evaluation starts (used [false]) +[267d 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e840 processing identity 0 with bytes of 115a4b0 +[267e 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e840 principal matched by identity 0 +[267f 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[2680 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[2681 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e840 principal evaluation succeeds for identity 0 +[2682 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00293e840 gate 1598907113727204500 evaluation succeeds +[2683 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2684 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2685 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2686 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2687 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2688 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[2689 08-31 20:51:53.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[268a 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[268b 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[268c 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[268d 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[268e 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[268f 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2690 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2691 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2692 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2693 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2694 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2695 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2696 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002878a50 gate 1598907113733917100 evaluation starts +[2697 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002878a50 signed by 0 principal evaluation starts (used [false]) +[2698 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002878a50 processing identity 0 with bytes of 115a4b0 +[2699 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002878a50 principal matched by identity 0 +[269a 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[269b 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[269c 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002878a50 principal evaluation succeeds for identity 0 +[269d 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002878a50 gate 1598907113733917100 evaluation succeeds +[269e 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[269f 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[26a0 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[26a1 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[26a2 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26a3 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26a4 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[26a5 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[26a6 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[26a7 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[26a8 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[26a9 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[26aa 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002879c60 gate 1598907113734743800 evaluation starts +[26ab 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002879c60 signed by 0 principal evaluation starts (used [false]) +[26ac 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002879c60 processing identity 0 with bytes of 115a4b0 +[26ad 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002879c60 principal matched by identity 0 +[26ae 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[26af 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[26b0 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002879c60 principal evaluation succeeds for identity 0 +[26b1 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc002879c60 gate 1598907113734743800 evaluation succeeds +[26b2 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[26b3 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[26b4 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[26b5 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[26b6 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26b7 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[26b8 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26b9 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26ba 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26bb 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[26bc 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[26bd 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[26be 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[26bf 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[26c0 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[26c1 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282b0d0 gate 1598907113735591000 evaluation starts +[26c2 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282b0d0 signed by 0 principal evaluation starts (used [false]) +[26c3 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282b0d0 processing identity 0 with bytes of 115a4b0 +[26c4 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282b0d0 principal matched by identity 0 +[26c5 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[26c6 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[26c7 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282b0d0 principal evaluation succeeds for identity 0 +[26c8 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00282b0d0 gate 1598907113735591000 evaluation succeeds +[26c9 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[26ca 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[26cb 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[26cc 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[26cd 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[26ce 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[26cf 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26d0 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26d1 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[26d2 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[26d3 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[26d4 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[26d5 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[26d6 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[26d7 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027829d0 gate 1598907113739898200 evaluation starts +[26d8 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027829d0 signed by 0 principal evaluation starts (used [false]) +[26d9 08-31 20:51:53.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027829d0 processing identity 0 with bytes of 115a4b0 +[26da 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027829d0 principal matched by identity 0 +[26db 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[26dc 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[26dd 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027829d0 principal evaluation succeeds for identity 0 +[26de 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0027829d0 gate 1598907113739898200 evaluation succeeds +[26df 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[26e0 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[26e1 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[26e2 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[26e3 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[26e4 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[26e5 08-31 20:51:53.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26e6 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[26e7 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[26e8 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[26e9 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D9816100C1801 +[26ea 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: EF15E766FEBEC26025B398829F21C3E26A58694F87BA153B5317C1F7A8B94937 +[26eb 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[26ec 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26ed 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26ee 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26ef 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26f0 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[26f1 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26f2 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26f3 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[26f4 08-31 20:51:53.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26f5 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26f6 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26f7 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[26f8 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26f9 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[26fa 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[26fb 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[26fc 08-31 20:51:53.83 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[26fd 08-31 20:51:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[26fe 08-31 20:51:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[26ff 08-31 20:51:53.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2700 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2701 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2702 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2703 08-31 20:51:53.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2704 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2705 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2706 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2707 08-31 20:51:54.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2708 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2709 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[270a 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[270b 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[270c 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[270d 08-31 20:51:54.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[270e 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[270f 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2710 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2711 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2712 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2713 08-31 20:51:54.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2714 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2715 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2716 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2717 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2718 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2719 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[271a 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[271b 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[271c 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[271d 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[271e 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[271f 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2720 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ca710 gate 1598907115021303700 evaluation starts +[2721 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ca710 signed by 0 principal evaluation starts (used [false]) +[2722 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ca710 processing identity 0 with bytes of 115a4b0 +[2723 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ca710 principal matched by identity 0 +[2724 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 c8 32 ef fe 9a 69 05 20 ae d9 27 8e 0f 69 47 |..2...i. ..'..iG| +00000010 02 5f b9 cd c5 2b a7 49 61 f7 24 bb fa 48 e0 ad |._...+.Ia.$..H..| +[2725 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 76 37 74 52 30 80 40 0d 28 5c 4f 8a |0D. v7tR0.@.(\O.| +00000010 bd 5f 9c 26 41 ce 57 85 0b 28 62 5d 9a 38 b4 bc |._.&A.W..(b].8..| +00000020 1c 16 c8 51 02 20 3a 42 cd 07 18 b2 55 13 62 45 |...Q. :B....U.bE| +00000030 b3 0e e1 df 64 36 46 51 b8 1e 1c 57 29 7a 15 34 |....d6FQ...W)z.4| +00000040 b4 90 4c 49 0a 58 |..LI.X| +[2726 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ca710 principal evaluation succeeds for identity 0 +[2727 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0026ca710 gate 1598907115021303700 evaluation succeeds +[2728 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2729 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[272a 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[272b 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[272c 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[272d 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[272e 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[272f 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2730 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2731 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2732 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2733 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2734 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2735 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2736 08-31 20:51:55.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2737 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2738 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2739 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[273a 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[273b 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[273c 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[273d 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[273e 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[273f 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2740 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2741 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2742 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2743 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2744 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2745 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2746 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2747 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2748 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2749 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[274a 08-31 20:51:55.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[274b 08-31 20:51:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[274c 08-31 20:51:55.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[274d 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[274e 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[274f 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c e0 9d 52 a9 d6 99 9f c0 d3 b5 fc 72 61 5b 2f |...R........ra[/| +00000010 fd 9b a9 a2 91 4d 62 ca 74 7a 7a cd 4d e9 ce ac |.....Mb.tzz.M...| +[2750 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f7 d9 08 57 cc 6a e0 dc 50 64 5a |0E.!....W.j..PdZ| +00000010 5f f9 e8 62 02 02 00 b8 27 89 cd 47 b2 e7 d1 01 |_..b....'..G....| +00000020 32 c0 25 97 91 02 20 0c ff a9 87 17 dc e4 53 56 |2.%... .......SV| +00000030 67 82 d4 ed 0e 69 90 6b 2f 35 bd 73 32 94 99 c7 |g....i.k/5.s2...| +00000040 15 2d 57 e0 5a 92 40 |.-W.Z.@| +[2751 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2752 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2753 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2754 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2755 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[2756 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2757 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2758 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2759 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[275a 08-31 20:51:55.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[275b 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[275c 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[275d 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[275e 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[275f 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2760 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2761 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2762 08-31 20:51:55.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2763 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2764 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2765 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2766 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2767 08-31 20:51:55.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2768 08-31 20:51:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2769 08-31 20:51:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[276a 08-31 20:51:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[276b 08-31 20:51:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[276c 08-31 20:51:55.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[276d 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[276e 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[276f 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2770 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2771 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2772 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2773 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2774 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2775 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2776 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2777 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2778 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2779 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f490 gate 1598907115455768600 evaluation starts +[277a 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f490 signed by 0 principal evaluation starts (used [false]) +[277b 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f490 processing identity 0 with bytes of 115a4b0 +[277c 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f490 principal matched by identity 0 +[277d 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 77 44 48 28 c9 7a 8c 15 b4 95 05 73 94 af 1c fa |wDH(.z.....s....| +00000010 52 b0 8e 96 e0 be 46 87 b6 ca a3 92 82 67 b3 cc |R.....F......g..| +[277e 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a0 e7 cf c8 3f 2c 21 aa c4 62 9f |0E.!.....?,!..b.| +00000010 49 7c cf 61 b1 50 5d 9e e7 5a ee ab 14 5e 7b 59 |I|.a.P]..Z...^{Y| +00000020 65 63 40 3b 50 02 20 11 fd 26 3b ae e6 a2 7d 72 |ec@;P. ..&;...}r| +00000030 89 0f 22 76 26 ed 1b 89 d9 9a 80 ea d4 57 ab 2a |.."v&........W.*| +00000040 55 a6 da 90 08 08 7c |U.....|| +[277f 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f490 principal evaluation succeeds for identity 0 +[2780 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00265f490 gate 1598907115455768600 evaluation succeeds +[2781 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2782 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2783 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2784 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2785 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2786 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2787 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2788 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2789 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[278a 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[278b 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[278c 08-31 20:51:55.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[278d 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[278e 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[278f 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2790 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2791 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2792 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2793 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2794 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2795 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2796 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2797 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2798 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2799 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[279a 08-31 20:51:55.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[279b 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[279c 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[279d 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[279e 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[279f 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[27a0 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[27a1 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27a2 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[27a3 08-31 20:51:55.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27a4 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[27a5 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161029 +[27a6 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 25DD373AAC4D6D59036C4C70040CAF2AA2CCCBBA0C5FF5AD3C011787A9003405 +[27a7 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[27a8 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[27a9 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[27aa 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[27ab 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27ac 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27ad 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27ae 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[27af 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27b0 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[27b1 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[27b2 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[27b3 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27b4 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[27b5 08-31 20:51:55.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27b6 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[27b7 08-31 20:51:55.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27b8 08-31 20:51:56.97 UTC] [%{longpkg}] %{callpath} -> DEBU Created image: dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 +[27b9 08-31 20:51:56.97 UTC] [%{longpkg}] %{callpath} -> DEBU create container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +[27ba 08-31 20:51:56.97 UTC] [%{longpkg}] %{callpath} -> DEBU docker container hostconfig NetworkMode: hlf_net +[27bb 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[27bc 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[27bd 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[27be 08-31 20:51:56.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27bf 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27c0 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27c1 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27c2 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27c3 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27c4 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[27c5 08-31 20:51:56.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27c6 08-31 20:51:57.02 UTC] [%{longpkg}] %{callpath} -> DEBU created container imageID=dev-peer0.org1.example.com-exp02-1.0-207541cceae707183f8108fcfc8ad03b450411570fb69827d3d40dc2ffdddbb4 containerID=dev-peer0.org1.example.com-exp02-1.0 +[27c7 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[27c8 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[27c9 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27ca 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[27cb 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[27cc 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27cd 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[27ce 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[27cf 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[27d0 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[27d1 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[27d2 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[27d3 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263bce0 gate 1598907117093455200 evaluation starts +[27d4 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263bce0 signed by 0 principal evaluation starts (used [false]) +[27d5 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263bce0 processing identity 0 with bytes of 115a4b0 +[27d6 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263bce0 principal matched by identity 0 +[27d7 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 82 19 b7 35 14 1a b4 75 5e 2d 23 8c 90 9d 66 |....5...u^-#...f| +00000010 a7 f8 43 2c 0d cb 12 68 89 9e 50 10 9c 6e 54 0b |..C,...h..P..nT.| +[27d8 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 7b b0 97 a6 f0 53 6a 3c 08 79 be |0D. s{....Sj<.y.| +00000010 39 82 04 0d 36 ee cd b4 91 dc 92 d3 4c 29 fe 90 |9...6.......L)..| +00000020 42 71 d4 40 02 20 7a 9d 60 11 4e 87 9e 1b 2e ef |Bq.@. z.`.N.....| +00000030 5b 01 77 10 24 49 6d 4b b2 f3 d3 3a 6e 52 9b f7 |[.w.$ImK...:nR..| +00000040 40 0c 97 d8 27 4b |@...'K| +[27d9 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263bce0 principal evaluation succeeds for identity 0 +[27da 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00263bce0 gate 1598907117093455200 evaluation succeeds +[27db 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[27dc 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[27dd 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[27de 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[27df 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[27e0 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[27e1 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[27e2 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[27e3 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[27e4 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27e5 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27e6 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27e7 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[27e8 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27e9 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27ea 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[27eb 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[27ec 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[27ed 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[27ee 08-31 20:51:57.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27ef 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[27f0 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[27f1 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[27f2 08-31 20:51:57.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27f3 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\342\022`\377\r\013C\365\235<\253w\20629\355:T\t\003\377\343]\033\233\372\336\374Wa\002 \"}\010\266\363\247Vu7\205\216\201\177\021\374?=\216\367k\326\250\215\255q\231\024u\364\021,\362" > > > , Envelope: 272 bytes, Signature: 0 bytes +[27f4 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[27f5 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\342\022`\377\r\013C\365\235<\253w\20629\355:T\t\003\377\343]\033\233\372\336\374Wa\002 \"}\010\266\363\247Vu7\205\216\201\177\021\374?=\216\367k\326\250\215\255q\231\024u\364\021,\362" > > > , Envelope: 272 bytes, Signature: 0 bytes +[27f6 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[27f7 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 4b 69 75 4b ad d9 ae c0 56 5c f3 7d 58 82 72 |.KiuK....V\.}X.r| +00000010 13 5b a2 cb e9 63 ba 7b ef 62 bb 14 58 42 74 fe |.[...c.{.b..XBt.| +[27f8 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 00 5a 2d 8c 2e 35 13 26 0f a2 |0E.!...Z-..5.&..| +00000010 d9 56 a6 42 fd 09 6e fc e5 0d a2 ca e1 f9 85 3b |.V.B..n........;| +00000020 77 03 0a b8 29 02 20 2f 5a 54 73 bb 4e 1d f4 b9 |w...). /ZTs.N...| +00000030 f6 b8 ba 99 24 05 24 b1 56 88 9d f9 1c 66 1f 92 |....$.$.V....f..| +00000040 2b 90 ed 4b 23 73 bd |+..K#s.| +[27f9 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[27fa 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f0 3e e2 12 60 ff 0d 0b 43 f5 9d |0E.!..>..`...C..| +00000010 3c ab 77 86 32 39 ed 3a 54 09 03 ff e3 5d 1b 9b |<.w.29.:T....]..| +00000020 fa de fc 57 61 02 20 22 7d 08 b6 f3 a7 56 75 37 |...Wa. "}....Vu7| +00000030 85 8e 81 7f 11 fc 3f 3d 8e f7 6b d6 a8 8d ad 71 |......?=..k....q| +00000040 99 14 75 f4 11 2c f2 |..u..,.| +[27fb 08-31 20:51:57.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[27fc 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[27fd 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[27fe 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[27ff 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2800 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2801 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2802 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[2803 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2804 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2805 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[2806 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\342\022`\377\r\013C\365\235<\253w\20629\355:T\t\003\377\343]\033\233\372\336\374Wa\002 \"}\010\266\363\247Vu7\205\216\201\177\021\374?=\216\367k\326\250\215\255q\231\024u\364\021,\362" > > alive: +[2807 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[2808 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2809 08-31 20:51:57.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[280a 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[280b 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[280c 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[280d 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[280e 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[280f 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2810 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2811 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2812 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2813 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[2814 08-31 20:51:57.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2815 08-31 20:51:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU Started container dev-peer0.org1.example.com-exp02-1.0 +[2816 08-31 20:51:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(exp02-1.0) +[2817 08-31 20:51:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU waiting for container(exp02-1.0) lock +[2818 08-31 20:51:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU got container (exp02-1.0) lock +[2819 08-31 20:51:57.44 UTC] [%{longpkg}] %{callpath} -> DEBU container lock deleted(exp02-1.0) +[281a 08-31 20:51:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode exp02:1.0 's authentication is authorized +[281b 08-31 20:51:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU [] Fabric side handling ChaincodeMessage of type: REGISTER in state created +[281c 08-31 20:51:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Received REGISTER in state created +[281d 08-31 20:51:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU registered handler complete for chaincode exp02:1.0 +[281e 08-31 20:51:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got REGISTER for chaincodeID = name:"exp02:1.0" , sending back REGISTERED +[281f 08-31 20:51:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Changed state to established for name:"exp02:1.0" +[2820 08-31 20:51:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU sending READY for chaincode name:"exp02:1.0" +[2821 08-31 20:51:57.49 UTC] [%{longpkg}] %{callpath} -> DEBU Changed to state ready for chaincode name:"exp02:1.0" +[2822 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU launch complete +[2823 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2824 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[2825 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] handling PUT_STATE from chaincode +[2826 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Completed PUT_STATE. Sending RESPONSE +[2827 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[2828 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] handling PUT_STATE from chaincode +[2829 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Completed PUT_STATE. Sending RESPONSE +[282a 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[282b 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [d0697242] notifying Txid:d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a, channelID:businesschannel +[282c 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[282d 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][d0697242] Exit chaincode: name:"lscc" (48140ms) +[282e 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[282f 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] +[2830 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d0697242] Exit +[2831 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d0697242] Entry chaincode: name:"lscc" +[2832 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d0697242] escc for chaincode name:"lscc" is escc +[2833 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a, chaincode: lscc} +[2834 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20C19CA11B4D20AEF4AF6611CB0F74...455254494649434154452D2D2D2D2D0A +[2835 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: AFEB7FA3DB22E80D9AD4D120960F3CA16D3CB56C57739B9F1494E8BBE2630F70 +[2836 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a, chaincode: lscc} +[2837 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d0697242] Exit +[2838 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] +[2839 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36780 +[283a 08-31 20:51:57.50 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36780 grpc.code=OK grpc.call_duration=48.1469173s +[283b 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[283c 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[283d 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[283e 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[283f 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2840 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2841 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2842 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2843 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2844 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2845 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2846 08-31 20:51:57.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2847 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9060 gate 1598907117530135900 evaluation starts +[2848 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9060 signed by 0 principal evaluation starts (used [false]) +[2849 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9060 processing identity 0 with bytes of 115a4b0 +[284a 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9060 principal matched by identity 0 +[284b 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 95 58 59 84 9d 85 53 3a 08 e7 42 d4 42 4e dc |..XY...S:..B.BN.| +00000010 e7 60 1a 2a 99 59 8b a6 77 7a 03 e3 01 91 67 21 |.`.*.Y..wz....g!| +[284c 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 33 09 e9 75 72 52 c7 87 68 8e |0E.!..3..urR..h.| +00000010 f6 30 18 ec 2e a6 f0 ab 2f b7 f7 47 f9 05 b2 d5 |.0....../..G....| +00000020 fe 05 9d 54 8f 02 20 7d c0 8b f9 59 8d fd dd cd |...T.. }...Y....| +00000030 4e 65 c0 2c c8 0f c6 17 11 70 e1 05 3f 18 21 24 |Ne.,.....p..?.!$| +00000040 df ab ad 6f e0 b1 11 |...o...| +[284d 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9060 principal evaluation succeeds for identity 0 +[284e 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004b9060 gate 1598907117530135900 evaluation succeeds +[284f 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2850 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2851 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2852 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2853 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2854 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2855 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2856 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2857 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2858 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2859 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[285a 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[285b 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[285c 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[285d 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[285e 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[285f 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[2860 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[2861 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2862 08-31 20:51:57.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2863 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[2864 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2865 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[2866 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2867 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[2868 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2869 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[286a 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[286b 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[286c 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[286d 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[286e 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[286f 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2870 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2871 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2872 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2873 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2874 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2875 08-31 20:51:57.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2876 08-31 20:51:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2877 08-31 20:51:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2878 08-31 20:51:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2879 08-31 20:51:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[287a 08-31 20:51:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[287b 08-31 20:51:57.55 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[287c 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[287d 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816102A +[287e 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DD1B21A6698DD8DEE140B259447D93B24EF5F541DDFDB8C0372057AE33B850ED +[287f 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2880 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2881 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2882 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[2883 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2884 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[2885 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" secret_envelope: > > , Envelope: 272 bytes, Signature: 0 bytes +[2886 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2887 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2888 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[2889 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" > > , Envelope: 166 bytes, Signature: 0 bytes +[288a 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[288b 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\231\303\330\n?\275|\327\310&\267\244\330(\373\324;Z\222K" > > , Envelope: 166 bytes, Signature: 0 bytes +[288c 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[288d 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[288e 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[288f 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2890 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2891 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2892 08-31 20:51:57.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2893 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2894 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2895 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2896 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2897 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2898 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2899 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f6860 gate 1598907117620324200 evaluation starts +[289a 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f6860 signed by 0 principal evaluation starts (used [false]) +[289b 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[289c 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f6860 processing identity 0 with bytes of 115a4b0 +[289d 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f6860 principal matched by identity 0 +[289e 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[289f 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c4 95 58 59 84 9d 85 53 3a 08 e7 42 d4 42 4e dc |..XY...S:..B.BN.| +00000010 e7 60 1a 2a 99 59 8b a6 77 7a 03 e3 01 91 67 21 |.`.*.Y..wz....g!| +[28a0 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d3 33 09 e9 75 72 52 c7 87 68 8e |0E.!..3..urR..h.| +00000010 f6 30 18 ec 2e a6 f0 ab 2f b7 f7 47 f9 05 b2 d5 |.0....../..G....| +00000020 fe 05 9d 54 8f 02 20 7d c0 8b f9 59 8d fd dd cd |...T.. }...Y....| +00000030 4e 65 c0 2c c8 0f c6 17 11 70 e1 05 3f 18 21 24 |Ne.,.....p..?.!$| +00000040 df ab ad 6f e0 b1 11 |...o...| +[28a1 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f6860 principal evaluation succeeds for identity 0 +[28a2 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003f6860 gate 1598907117620324200 evaluation succeeds +[28a3 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[28a4 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[28a5 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[28a6 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[28a7 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[28a8 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28a9 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[28aa 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 1b 21 a6 69 8d d8 de e1 40 b2 59 44 7d 93 b2 |..!.i....@.YD}..| +00000010 4e f5 f5 41 dd fd b8 c0 37 20 57 ae 33 b8 50 ed |N..A....7 W.3.P.| +[28ab 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 17 39 ee e4 bb 52 28 6b 8b 5e |0E.!...9...R(k.^| +00000010 8a b8 eb 99 1f e1 27 3f 0b 4c b6 79 c5 78 87 bb |......'?.L.y.x..| +00000020 50 be b3 a5 ad 02 20 5d ff 0e 7f 36 86 89 6b f8 |P..... ]...6..k.| +00000030 d9 70 3e 99 c3 d8 0a 3f bd 7c d7 c8 26 b7 a4 d8 |.p>....?.|..&...| +00000040 28 fb d4 3b 5a 92 4b |(..;Z.K| +[28ac 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[28ad 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[28ae 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28af 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[28b0 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 4b 69 75 4b ad d9 ae c0 56 5c f3 7d 58 82 72 |.KiuK....V\.}X.r| +00000010 13 5b a2 cb e9 63 ba 7b ef 62 bb 14 58 42 74 fe |.[...c.{.b..XBt.| +[28b1 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 00 5a 2d 8c 2e 35 13 26 0f a2 |0E.!...Z-..5.&..| +00000010 d9 56 a6 42 fd 09 6e fc e5 0d a2 ca e1 f9 85 3b |.V.B..n........;| +00000020 77 03 0a b8 29 02 20 2f 5a 54 73 bb 4e 1d f4 b9 |w...). /ZTs.N...| +00000030 f6 b8 ba 99 24 05 24 b1 56 88 9d f9 1c 66 1f 92 |....$.$.V....f..| +00000040 2b 90 ed 4b 23 73 bd |+..K#s.| +[28b2 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[28b3 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28b4 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28b5 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[28b6 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[28b7 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 1b 21 a6 69 8d d8 de e1 40 b2 59 44 7d 93 b2 |..!.i....@.YD}..| +00000010 4e f5 f5 41 dd fd b8 c0 37 20 57 ae 33 b8 50 ed |N..A....7 W.3.P.| +[28b8 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 17 39 ee e4 bb 52 28 6b 8b 5e |0E.!...9...R(k.^| +00000010 8a b8 eb 99 1f e1 27 3f 0b 4c b6 79 c5 78 87 bb |......'?.L.y.x..| +00000020 50 be b3 a5 ad 02 20 5d ff 0e 7f 36 86 89 6b f8 |P..... ]...6..k.| +00000030 d9 70 3e 99 c3 d8 0a 3f bd 7c d7 c8 26 b7 a4 d8 |.p>....?.|..&...| +00000040 28 fb d4 3b 5a 92 4b |(..;Z.K| +[28b9 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[28ba 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 41 1d e3 06 bc 96 67 09 11 f7 |0E.!..A.....g...| +00000010 2b 59 9a 90 11 fd 5d a7 07 b5 73 d8 81 9c bd e2 |+Y....]...s.....| +00000020 c4 c9 6c ca e1 02 20 0f 23 2c 87 ed 67 d7 05 22 |..l... .#,..g.."| +00000030 0b 64 c2 5c a8 56 53 c9 3f 4b 63 eb 55 43 e7 b7 |.d.\.VS.?Kc.UC..| +00000040 e9 80 50 1d 78 6e af |..P.xn.| +[28bb 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[28bc 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[28bd 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28be 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28bf 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28c0 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[28c1 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28c2 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[28c3 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[28c4 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 1b 21 a6 69 8d d8 de e1 40 b2 59 44 7d 93 b2 |..!.i....@.YD}..| +00000010 4e f5 f5 41 dd fd b8 c0 37 20 57 ae 33 b8 50 ed |N..A....7 W.3.P.| +[28c5 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 17 39 ee e4 bb 52 28 6b 8b 5e |0E.!...9...R(k.^| +00000010 8a b8 eb 99 1f e1 27 3f 0b 4c b6 79 c5 78 87 bb |......'?.L.y.x..| +00000020 50 be b3 a5 ad 02 20 5d ff 0e 7f 36 86 89 6b f8 |P..... ]...6..k.| +00000030 d9 70 3e 99 c3 d8 0a 3f bd 7c d7 c8 26 b7 a4 d8 |.p>....?.|..&...| +00000040 28 fb d4 3b 5a 92 4b |(..;Z.K| +[28c6 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[28c7 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[28c8 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28c9 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[28ca 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 dd 4b 69 75 4b ad d9 ae c0 56 5c f3 7d 58 82 72 |.KiuK....V\.}X.r| +00000010 13 5b a2 cb e9 63 ba 7b ef 62 bb 14 58 42 74 fe |.[...c.{.b..XBt.| +[28cb 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ba 00 5a 2d 8c 2e 35 13 26 0f a2 |0E.!...Z-..5.&..| +00000010 d9 56 a6 42 fd 09 6e fc e5 0d a2 ca e1 f9 85 3b |.V.B..n........;| +00000020 77 03 0a b8 29 02 20 2f 5a 54 73 bb 4e 1d f4 b9 |w...). /ZTs.N...| +00000030 f6 b8 ba 99 24 05 24 b1 56 88 9d f9 1c 66 1f 92 |....$.$.V....f..| +00000040 2b 90 ed 4b 23 73 bd |+..K#s.| +[28cc 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[28cd 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28ce 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[28cf 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28d0 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[28d1 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[28d2 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[28d3 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[28d4 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[28d5 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[28d6 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030d9e0 gate 1598907117623861400 evaluation starts +[28d7 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030d9e0 signed by 0 principal evaluation starts (used [false]) +[28d8 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030d9e0 processing identity 0 with bytes of 115a4b0 +[28d9 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030d9e0 principal matched by identity 0 +[28da 08-31 20:51:57.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 83 82 19 b7 35 14 1a b4 75 5e 2d 23 8c 90 9d 66 |....5...u^-#...f| +00000010 a7 f8 43 2c 0d cb 12 68 89 9e 50 10 9c 6e 54 0b |..C,...h..P..nT.| +[28db 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 73 7b b0 97 a6 f0 53 6a 3c 08 79 be |0D. s{....Sj<.y.| +00000010 39 82 04 0d 36 ee cd b4 91 dc 92 d3 4c 29 fe 90 |9...6.......L)..| +00000020 42 71 d4 40 02 20 7a 9d 60 11 4e 87 9e 1b 2e ef |Bq.@. z.`.N.....| +00000030 5b 01 77 10 24 49 6d 4b b2 f3 d3 3a 6e 52 9b f7 |[.w.$ImK...:nR..| +00000040 40 0c 97 d8 27 4b |@...'K| +[28dc 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030d9e0 principal evaluation succeeds for identity 0 +[28dd 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00030d9e0 gate 1598907117623861400 evaluation succeeds +[28de 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[28df 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[28e0 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[28e1 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[28e2 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[28e3 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28e4 08-31 20:51:57.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28e5 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28e6 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28e7 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[28e8 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[28e9 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28ea 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[28eb 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28ec 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[28ed 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[28ee 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[28ef 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[28f0 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[28f1 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[28f2 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[28f3 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28f4 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[28f5 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[28f6 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[28f7 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[28f8 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[28f9 08-31 20:51:57.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[28fa 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[28fb 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cb110 gate 1598907117720118700 evaluation starts +[28fc 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cb110 signed by 0 principal evaluation starts (used [false]) +[28fd 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cb110 processing identity 0 with bytes of 115a4b0 +[28fe 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cb110 principal matched by identity 0 +[28ff 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[2900 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[2901 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cb110 principal evaluation succeeds for identity 0 +[2902 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002cb110 gate 1598907117720118700 evaluation succeeds +[2903 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2904 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2905 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2906 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2907 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2908 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2909 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[290b 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[290c 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[290d 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[290e 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[290f 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2910 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027c470 gate 1598907117724536400 evaluation starts +[2911 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027c470 signed by 0 principal evaluation starts (used [false]) +[2912 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027c470 processing identity 0 with bytes of 115a4b0 +[2913 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027c470 principal matched by identity 0 +[2914 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[2915 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[2916 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027c470 principal evaluation succeeds for identity 0 +[2917 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027c470 gate 1598907117724536400 evaluation succeeds +[2918 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2919 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[291a 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[291b 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[291c 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[290a 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[291d 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[291e 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[291f 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2920 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2921 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2922 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2923 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2924 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2925 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2926 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2927 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027d930 gate 1598907117725432400 evaluation starts +[2928 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027d930 signed by 0 principal evaluation starts (used [false]) +[2929 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027d930 processing identity 0 with bytes of 115a4b0 +[292a 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027d930 principal matched by identity 0 +[292b 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[292c 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[292d 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027d930 principal evaluation succeeds for identity 0 +[292e 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027d930 gate 1598907117725432400 evaluation succeeds +[292f 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2930 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2931 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2932 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2933 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[2934 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[2935 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[2936 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[2937 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2938 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2939 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[293a 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[293b 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[293c 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[293d 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[293e 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[293f 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000519ef0 gate 1598907117727970100 evaluation starts +[2940 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000519ef0 signed by 0 principal evaluation starts (used [false]) +[2941 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000519ef0 processing identity 0 with bytes of 115a4b0 +[2942 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000519ef0 principal matched by identity 0 +[2943 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[2944 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[2945 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[2946 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000519ef0 principal evaluation succeeds for identity 0 +[2947 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc000519ef0 gate 1598907117727970100 evaluation succeeds +[2948 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2949 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[294a 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[294b 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[294c 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[294d 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 726 bytes, Signature: 0 bytes +[294e 08-31 20:51:57.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[294f 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2950 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2951 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2952 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2953 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2954 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2955 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2956 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2957 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ef70 gate 1598907117731020600 evaluation starts +[2958 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ef70 signed by 0 principal evaluation starts (used [false]) +[2959 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ef70 processing identity 0 with bytes of 115a4b0 +[295a 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ef70 principal matched by identity 0 +[295b 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[295c 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[295d 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ef70 principal evaluation succeeds for identity 0 +[295e 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00004ef70 gate 1598907117731020600 evaluation succeeds +[295f 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2960 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2961 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2962 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2963 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[2964 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[2965 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2966 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2967 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2968 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2969 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[296a 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[296b 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[296c 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[296d 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027fd10 gate 1598907117737946300 evaluation starts +[296e 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027fd10 signed by 0 principal evaluation starts (used [false]) +[296f 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027fd10 processing identity 0 with bytes of 115a4b0 +[2970 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027fd10 principal matched by identity 0 +[2971 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[2972 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[2973 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Start reconcile missing private info +[2974 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x7, 0xfd}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x4, 0x8}] +[2975 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Reconciliation cycle finished successfully. no items to reconcile +[2976 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027fd10 principal evaluation succeeds for identity 0 +[2977 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00027fd10 gate 1598907117737946300 evaluation succeeds +[2978 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2979 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[297a 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[297b 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[297c 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[297d 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[297e 08-31 20:51:57.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[297f 08-31 20:51:57.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2980 08-31 20:51:57.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2981 08-31 20:51:57.83 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[2982 08-31 20:51:57.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2983 08-31 20:51:57.83 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2984 08-31 20:51:57.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[2985 08-31 20:51:57.83 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2986 08-31 20:51:57.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2987 08-31 20:51:57.84 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[2988 08-31 20:51:57.84 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 40 bytes, Signature: 0 bytes +[2989 08-31 20:51:57.84 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[298a 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36836 +[298b 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc002654230 +[298c 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[298d 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[298e 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[298f 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[2990 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2991 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 4a 4c 41 71 76 81 f2 de 55 2e 8e 07 25 40 65 |EJLAqv...U...%@e| +00000010 d0 79 0b 18 53 e3 2e f2 94 58 f4 ea 4f 27 4c f8 |.y..S....X..O'L.| +[2992 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 a5 de b9 b2 21 bc b4 45 63 53 |0E.!......!..EcS| +00000010 2e 3c f5 b2 b7 c7 8c b8 2c 99 38 e3 6c 22 96 e5 |.<......,.8.l"..| +00000020 e0 c9 af 2d 49 02 20 4a 4b d1 f7 e5 3c 09 a4 d0 |...-I. JK...<...| +00000030 d5 81 6f ee 1d 00 07 03 54 27 58 85 97 c9 1f 0b |..o.....T'X.....| +00000040 2b 7e 37 73 59 53 2c |+~7sYS,| +[2993 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2994 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc000159180, header 0xc002654640 +[2995 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[2996 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][026b9efc] processing txid: 026b9efc38f04af4bf9b73d889ae9f9074f1b1d5e8e40e00c49af84dadf552c9 +[2997 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [026b9efc38f04af4bf9b73d889ae9f9074f1b1d5e8e40e00c49af84dadf552c9] +[2998 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[2999 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[299a 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[299b 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[299c 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[299d 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a82c0 gate 1598907117952004700 evaluation starts +[299e 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a82c0 signed by 0 principal evaluation starts (used [false]) +[299f 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a82c0 processing identity 0 with bytes of 115a4b0 +[29a0 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a82c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[29a1 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a82c0 principal evaluation fails +[29a2 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a82c0 gate 1598907117952004700 evaluation fails +[29a3 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +[29a4 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[29a5 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[29a6 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a8890 gate 1598907117952352600 evaluation starts +[29a7 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a8890 signed by 0 principal evaluation starts (used [false]) +[29a8 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a8890 processing identity 0 with bytes of 115a4b0 +[29a9 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[29aa 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[29ab 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[29ac 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a8890 principal matched by identity 0 +[29ad 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 4a 4c 41 71 76 81 f2 de 55 2e 8e 07 25 40 65 |EJLAqv...U...%@e| +00000010 d0 79 0b 18 53 e3 2e f2 94 58 f4 ea 4f 27 4c f8 |.y..S....X..O'L.| +[29ae 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 91 a5 de b9 b2 21 bc b4 45 63 53 |0E.!......!..EcS| +00000010 2e 3c f5 b2 b7 c7 8c b8 2c 99 38 e3 6c 22 96 e5 |.<......,.8.l"..| +00000020 e0 c9 af 2d 49 02 20 4a 4b d1 f7 e5 3c 09 a4 d0 |...-I. JK...<...| +00000030 d5 81 6f ee 1d 00 07 03 54 27 58 85 97 c9 1f 0b |..o.....T'X.....| +00000040 2b 7e 37 73 59 53 2c |+~7sYS,| +[29af 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a8890 principal evaluation succeeds for identity 0 +[29b0 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002a8890 gate 1598907117952352600 evaluation succeeds +[29b1 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[29b2 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[29b3 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[29b4 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[29b5 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[29b6 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [026b9efc38f04af4bf9b73d889ae9f9074f1b1d5e8e40e00c49af84dadf552c9] +[29b7 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][026b9efc] Entry chaincode: name:"exp02" +[29b8 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[29b9 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][026b9efc] Exit +[29ba 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [026b9efc38f04af4bf9b73d889ae9f9074f1b1d5e8e40e00c49af84dadf552c9] +[29bb 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36836 +[29bc 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36836 grpc.code=OK grpc.call_duration=3.0569ms +[29bd 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[29be 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:36836: read: connection reset by peer +[29bf 08-31 20:51:57.95 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[29c0 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[29c1 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29c2 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29c3 08-31 20:51:57.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[29c4 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[29c5 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[29c6 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[29c7 08-31 20:51:58.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[29c8 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[29c9 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[29ca 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29cb 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29cc 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29cd 08-31 20:51:58.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[29ce 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[29cf 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[29d0 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29d1 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29d2 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29d3 08-31 20:51:58.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[29d4 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[29d5 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[29d6 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[29d7 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D9816100D1801 +[29d8 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 65562A3DB5C8E18A837615B0593C0626C33470D21563866A267E586FA9AF6121 +[29d9 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[29da 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29db 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29dc 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29dd 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29de 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[29df 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29e0 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29e1 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[29e2 08-31 20:51:58.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[29e3 08-31 20:51:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[29e4 08-31 20:51:59.57 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[29e5 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[29e6 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[29e7 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[29e8 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[29e9 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHjCCAcWgAwIBAgIQUak2hDd8j2SLaQNMbXpZRDAKBggqhkjOPQQDAjBpMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEUMBIGA1UEChMLZXhhbXBsZS5jb20xFzAVBgNVBAMTDmNhLmV4YW1w +bGUuY29tMB4XDTIwMDIyMTE4MjQwMFoXDTMwMDIxODE4MjQwMFowazELMAkGA1UE +BhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBGcmFuY2lz +Y28xEDAOBgNVBAsTB29yZGVyZXIxHTAbBgNVBAMTFG9yZGVyZXIyLmV4YW1wbGUu +Y29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAET8B7vvN/rxdMqWGK+yqvj2vj +zcoh0PNOTfowTjKzggxnGNjm57Tabe8mSEp3J79IN+Z0BUjlRX7ePe1Y9MnQP6NN +MEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0jBCQwIoAgblEx +SDx38NJ4jXcqV5NTpU8yoLMHb4vTjCcZyTnbxrAwCgYIKoZIzj0EAwIDRwAwRAIg +MQtqMO2tIswbOnZ/EyE1ZgEdzPAma23Urf8qNS+mD/ACICsZIm7LFxHSrXc9AD5h +WFUnXFrrWMedpv6WCUtVYuZy +-----END CERTIFICATE----- +[29ea 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003080e0 gate 1598907119581979100 evaluation starts +[29eb 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003080e0 signed by 0 principal evaluation starts (used [false]) +[29ec 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003080e0 processing identity 0 with bytes of 115a4b0 +[29ed 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for OrdererMSP +[29ee 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[29ef 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +[29f0 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003080e0 principal matched by identity 0 +[29f1 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 6f d7 71 07 9c f1 8d b4 ca 12 b3 86 b4 ae 99 |.o.q............| +00000010 f2 9e ec e8 be df 8d 65 1a aa ac 78 b5 1d 35 cb |.......e...x..5.| +[29f2 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 00 9c cc bd fb 05 17 8a df 3a d7 bd |0D. .........:..| +00000010 94 1f fb 58 60 b1 0d 38 96 cf 63 f7 99 59 68 d8 |...X`..8..c..Yh.| +00000020 e4 f5 91 55 02 20 3a b4 c2 15 fb bf a9 12 45 df |...U. :.......E.| +00000030 e2 06 33 33 87 d6 d9 12 7d f5 53 d3 15 e2 f4 a2 |..33....}.S.....| +00000040 24 8f eb fd 52 bb |$...R.| +[29f3 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003080e0 principal evaluation succeeds for identity 0 +[29f4 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0003080e0 gate 1598907119581979100 evaluation succeeds +[29f5 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[29f6 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[29f7 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[29f8 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[29f9 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +[29fa 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [3] +[29fb 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[29fc 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [3], peers number [3] +[29fd 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4560 bytes, seq: 3}, Envelope: 4590 bytes, Signature: 0 bytes to the block puller +[29fe 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU Added 3, total items: 3 +[29ff 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [3] +[2a00 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [3] with 1 transaction(s) to the ledger +[2a01 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [3] from buffer +[2a02 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [3] +[2a03 08-31 20:51:59.58 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [3] +[2a04 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[2a05 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002bb59c0 env 0xc0025d8000 txn 0 +[2a06 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0025d8000 +[2a07 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\275\305\265\372\005\020\330\242\350\273\001\"\017businesschannel*@d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw\nCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy\nYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu\nb3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa\nMGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T\nYW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn\nMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa\nrhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM\nxI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49\nBAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030V\355\313\252\261:\202\005\2106Z\035\206\003\300n\302A\335 \223\315\362\315" +[2a08 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2a09 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2a0a 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2a0b 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[2a0c 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2a0d 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 e7 93 52 4d 20 48 5f 66 91 8b fc cc 39 18 f3 |...RM H_f....9..| +00000010 ab 30 31 6f 86 19 f3 33 c1 37 13 23 32 7f d5 15 |.01o...3.7.#2...| +[2a0e 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 2c 62 ac cb 2a ec 5a fd 13 e7 |0E.!..,b..*.Z...| +00000010 37 92 88 81 15 e1 12 b2 64 18 04 1a 42 b8 ea 7e |7.......d...B..~| +00000020 09 25 0c b1 3f 02 20 73 43 54 f1 e5 d4 0d 2e 2e |.%..?. sCT......| +00000030 08 f9 2b df dd 4b cf cb ee a4 66 5c 1c 4d 8f 79 |..+..K....f\.M.y| +00000040 73 ba e7 6f 4b 96 21 |s..oK.!| +[2a0f 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2a10 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc002a10a80, header channel_header:"\010\003\032\014\010\275\305\265\372\005\020\330\242\350\273\001\"\017businesschannel*@d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a:\010\022\006\022\004lscc" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030V\355\313\252\261:\202\005\2106Z\035\206\003\300n\302A\335 \223\315\362\315" +[2a11 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +[2a12 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +[2a13 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +[2a14 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[2a15 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] +[2a16 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +[2a17 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc002a13000 +[2a18 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a, seq 0 out of 1 in block 3 for channel businesschannel with validation plugin vscc with plugin +[2a19 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [26e9379f-70d7-47af-93a2-f8c9670aa57b] +[2a1a 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [26e9379f-70d7-47af-93a2-f8c9670aa57b] +[2a1b 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a1c 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +-----END CERTIFICATE----- +[2a1d 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bab00 gate 1598907119593247100 evaluation starts +[2a1e 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bab00 signed by 0 principal evaluation starts (used [false]) +[2a1f 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bab00 processing identity 0 with bytes of 115a4b0 +[2a20 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[2a21 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[2a22 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[2a23 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bab00 principal matched by identity 0 +[2a24 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af eb 7f a3 db 22 e8 0d 9a d4 d1 20 96 0f 3c a1 |....."..... ..<.| +00000010 6d 3c b5 6c 57 73 9b 9f 14 94 e8 bb e2 63 0f 70 |m<.lWs.......c.p| +[2a25 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0d 9e de 14 79 6b bb 35 05 3c 5e 10 |0D. ....yk.5.<^.| +00000010 a4 a7 85 1b 9d 1a cd 2f 44 6a f8 e7 d1 d9 09 57 |......./Dj.....W| +00000020 86 77 95 7f 02 20 58 40 5c 3a 8a 19 c9 55 67 dc |.w... X@\:...Ug.| +00000030 08 c2 c0 81 54 ed 1d 24 ff 27 23 be f1 bd 82 74 |....T..$.'#....t| +00000040 b6 99 5b 8b f1 bd |..[...| +[2a26 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bab00 principal evaluation succeeds for identity 0 +[2a27 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bab00 signed by 1 principal evaluation starts (used [true]) +[2a28 08-31 20:51:59.59 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bab00 skipping identity 0 because it has already been used +[2a29 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bab00 principal evaluation fails +[2a2a 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0004bab00 gate 1598907119593247100 evaluation succeeds +[2a2b 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: doing special validation for LSCC +[2a2c 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: ValidateLSCCInvocation acting on deploy [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +[2a2d 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU VSCC info: validating invocation of lscc function deploy on arguments [][]uint8{[]uint8{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c}, []uint8{0xa, 0x28, 0x8, 0x1, 0x12, 0xc, 0x12, 0x5, 0x65, 0x78, 0x70, 0x30, 0x32, 0x1a, 0x3, 0x31, 0x2e, 0x30, 0x1a, 0x16, 0xa, 0x4, 0x69, 0x6e, 0x69, 0x74, 0xa, 0x1, 0x61, 0xa, 0x3, 0x31, 0x30, 0x30, 0xa, 0x1, 0x62, 0xa, 0x3, 0x32, 0x30, 0x30}, []uint8{0x12, 0xc, 0x12, 0xa, 0x8, 0x1, 0x12, 0x2, 0x8, 0x0, 0x12, 0x2, 0x8, 0x1, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x31, 0x4d, 0x53, 0x50, 0x1a, 0xb, 0x12, 0x9, 0xa, 0x7, 0x4f, 0x72, 0x67, 0x32, 0x4d, 0x53, 0x50}, []uint8{0x65, 0x73, 0x63, 0x63}, []uint8{0x76, 0x73, 0x63, 0x63}} +[2a2e 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace exp02 +[2a30 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Namespace lscc +[2a31 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [1961a69a-af6b-4377-bb35-1304ce0e0cd2] +[2a2f 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a32 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2a34 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [1961a69a-af6b-4377-bb35-1304ce0e0cd2] +[2a35 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validating deploy for cc exp02 version 1.0 +[2a36 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [affc5732-4938-4c57-8bad-8407ffe71a12] +[2a37 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +[2a38 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [affc5732-4938-4c57-8bad-8407ffe71a12] +[2a39 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e3330 gate 1598907119604936400 evaluation starts +[2a3a 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e3330 signed by 0 principal evaluation starts (used [false]) +[2a3b 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e3330 processing identity 0 with bytes of 115a4b0 +[2a3c 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e3330 principal matched by identity 0 +[2a3d 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f4 e7 93 52 4d 20 48 5f 66 91 8b fc cc 39 18 f3 |...RM H_f....9..| +00000010 ab 30 31 6f 86 19 f3 33 c1 37 13 23 32 7f d5 15 |.01o...3.7.#2...| +[2a3e 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8a 2c 62 ac cb 2a ec 5a fd 13 e7 |0E.!..,b..*.Z...| +00000010 37 92 88 81 15 e1 12 b2 64 18 04 1a 42 b8 ea 7e |7.......d...B..~| +00000020 09 25 0c b1 3f 02 20 73 43 54 f1 e5 d4 0d 2e 2e |.%..?. sCT......| +00000030 08 f9 2b df dd 4b cf cb ee a4 66 5c 1c 4d 8f 79 |..+..K....f\.M.y| +00000040 73 ba e7 6f 4b 96 21 |s..oK.!| +[2a3f 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e3330 principal evaluation succeeds for identity 0 +[2a40 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e3330 signed by 1 principal evaluation starts (used [true]) +[2a41 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e3330 skipping identity 0 because it has already been used +[2a42 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e3330 principal evaluation fails +[2a43 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0002e3330 gate 1598907119604936400 evaluation succeeds +[2a44 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU block 3, namespace: lscc, tx 0 validation results is: +[2a45 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a appears to be valid +[2a46 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc002a13000 +[2a47 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002bb59c0 env 0xc0025d8000 txn 0 +[2a48 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[2a49 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [3] in 15ms +[2a4a 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[2a4b 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[2a4c 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [3] +[2a4d 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[2a4e 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[2a4f 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[2a50 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [3] +[2a51 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[2a52 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +[2a53 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2a54 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=(*version.Height)(nil) and read version=(*version.Height)(nil) +[2a55 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Block [3] Transaction index [0] TxId [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] marked as valid by state validator +[2a56 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00294e9c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00294ea00), internal.compositeKey{ns:"lscc", coll:"", key:"exp02"}:(*internal.keyOps)(0xc00294ea40)} +[2a57 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[2a58 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[2a59 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[2a5a 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling state updates in LSCC namespace - stateUpdates=map[string][]*kvrwset.KVWrite{"lscc":[]*kvrwset.KVWrite{(*kvrwset.KVWrite)(0xc00045ab40)}} +[2a5b 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> INFO Channel [businesschannel]: Handling deploy or update of chaincode [exp02] +[2a5c 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +[2a5d 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handling chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +[2a5e 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Created metadata tar +[2a5f 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Channel businesschannel got a new deployment: Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30} +[2a60 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Handled chaincode deploy event for chaincode [[Name=exp02, Version=1.0, Hash=[]byte{0x8, 0xca, 0x67, 0x5c, 0x39, 0xa8, 0xba, 0xe2, 0x63, 0x18, 0x47, 0xa5, 0x21, 0xfc, 0x92, 0xe1, 0x29, 0x69, 0xfe, 0x12, 0x2b, 0xd4, 0xa9, 0xdf, 0xa, 0x70, 0x7c, 0xf1, 0x5, 0x9e, 0x87, 0x30}]] +[2a61 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{})} +[2a62 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2a63 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*privdata.MembershipProvider=&{Org1MSP {[0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0] [10 7 79 114 103 49 77 83 80 18 170 6 45 45 45 45 45 66 69 71 73 78 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10 77 73 73 67 75 68 67 67 65 99 43 103 65 119 73 66 65 103 73 82 65 76 106 80 76 72 86 83 114 120 66 108 57 51 88 84 65 106 67 68 97 89 65 119 67 103 89 73 75 111 90 73 122 106 48 69 65 119 73 119 99 122 69 76 10 77 65 107 71 65 49 85 69 66 104 77 67 86 86 77 120 69 122 65 82 66 103 78 86 66 65 103 84 67 107 78 104 98 71 108 109 98 51 74 117 97 87 69 120 70 106 65 85 66 103 78 86 66 65 99 84 68 86 78 104 98 105 66 71 10 99 109 70 117 89 50 108 122 89 50 56 120 71 84 65 88 66 103 78 86 66 65 111 84 69 71 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 120 72 68 65 97 66 103 78 86 66 65 77 84 69 50 78 104 10 76 109 57 121 90 122 69 117 90 88 104 104 98 88 66 115 90 83 53 106 98 50 48 119 72 104 99 78 77 106 65 119 77 106 73 120 77 84 103 121 78 68 65 119 87 104 99 78 77 122 65 119 77 106 69 52 77 84 103 121 78 68 65 119 10 87 106 66 113 77 81 115 119 67 81 89 68 86 81 81 71 69 119 74 86 85 122 69 84 77 66 69 71 65 49 85 69 67 66 77 75 81 50 70 115 97 87 90 118 99 109 53 112 89 84 69 87 77 66 81 71 65 49 85 69 66 120 77 78 10 85 50 70 117 73 69 90 121 89 87 53 106 97 88 78 106 98 122 69 78 77 65 115 71 65 49 85 69 67 120 77 69 99 71 86 108 99 106 69 102 77 66 48 71 65 49 85 69 65 120 77 87 99 71 86 108 99 106 65 117 98 51 74 110 10 77 83 53 108 101 71 70 116 99 71 120 108 76 109 78 118 98 84 66 90 77 66 77 71 66 121 113 71 83 77 52 57 65 103 69 71 67 67 113 71 83 77 52 57 65 119 69 72 65 48 73 65 66 71 107 103 76 50 121 65 76 107 104 55 10 98 117 68 121 84 105 67 66 122 52 120 84 82 98 78 66 67 65 103 87 110 110 105 74 56 76 119 89 113 111 86 89 98 97 78 66 102 98 84 51 90 73 106 104 115 107 105 50 69 70 57 100 110 121 117 110 85 68 108 119 85 99 47 102 10 86 88 81 121 49 80 122 53 86 55 101 106 84 84 66 76 77 65 52 71 65 49 85 100 68 119 69 66 47 119 81 69 65 119 73 72 103 68 65 77 66 103 78 86 72 82 77 66 65 102 56 69 65 106 65 65 77 67 115 71 65 49 85 100 10 73 119 81 107 77 67 75 65 73 74 50 54 73 97 52 102 75 110 99 78 100 108 48 114 47 103 119 120 108 68 109 50 80 74 119 109 119 82 47 109 117 53 84 113 107 103 54 70 119 78 77 51 77 65 111 71 67 67 113 71 83 77 52 57 10 66 65 77 67 65 48 99 65 77 69 81 67 73 67 115 66 82 84 100 76 105 105 102 69 86 65 85 117 117 101 113 52 100 81 114 55 98 81 49 43 88 120 70 112 101 87 86 72 51 49 69 99 84 110 43 107 65 105 66 86 98 119 68 120 10 80 103 109 75 77 83 88 118 56 118 49 47 108 72 117 120 86 52 87 80 77 99 53 102 86 48 110 85 83 53 89 115 73 106 83 54 108 65 61 61 10 45 45 45 45 45 69 78 68 32 67 69 82 84 73 70 73 67 65 84 69 45 45 45 45 45 10] [48 69 2 33 0 150 87 14 97 128 123 16 201 80 180 78 36 71 122 168 150 145 114 206 77 55 33 127 7 49 91 44 98 167 255 29 178 2 32 80 215 11 116 58 88 133 87 240 72 4 251 228 83 187 104 243 110 3 245 115 107 120 26 92 46 50 115 251 203 7 144]} 0x151a150}) map[businesschannel:%!s(*ledgerstorage.Store=&{0xc0029e1e30 0xc0029cb200 {{0 0} 0 0 0 0} {false}})]} +[2a64 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02~collection +[2a65 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Invoking listener for state changes:&{%!s(*lscc.DeployedCCInfoProvider=&{}) %!s(*confighistory.dbProvider=&{0xc000100280})} +[2a66 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [3] +[2a67 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] to storage +[2a68 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [3] to pvt block store +[2a33 08-31 20:51:59.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a69 08-31 20:51:59.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a6a 08-31 20:51:59.62 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [3] +[2a6b 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a6c 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4560 bytes, seq: 3}, Envelope: 4590 bytes, Signature: 0 bytes to 1 peers +[2a6d 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a6e 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a6f 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4560 bytes, seq: 3}, Envelope: 4590 bytes, Signature: 0 bytes +[2a70 08-31 20:51:59.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a71 08-31 20:51:59.64 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=3, blockHash=[]byte{0x62, 0xc8, 0x94, 0xe0, 0x8d, 0xe8, 0xc7, 0x50, 0xec, 0x14, 0xce, 0xf7, 0xf6, 0x41, 0xb9, 0x45, 0x45, 0x74, 0xf1, 0x40, 0xf4, 0xb9, 0x19, 0x48, 0x1a, 0x35, 0x67, 0xf7, 0x3c, 0xf, 0xe3, 0xf2} txOffsets= +txId=d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a locPointer=offset=70, bytesLength=3520 +] +[2a72 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84950, bytesLength=3520] for tx ID: [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] to txid-index +[2a73 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=84950, bytesLength=3520] for tx number:[0] ID: [d069724267c1e8d6fe9e9973fae3059e1a9790415df9c104d14c7e9891d6fc3a] to blockNumTranNum index +[2a74 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[89462], isChainEmpty=[false], lastBlockNumber=[3] +[2a75 08-31 20:51:59.65 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [3] +[2a76 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [3] +[2a77 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to state database +[2a78 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[2a79 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[2a7a 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[2a7b 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[2a7c 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +[2a7d 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +[2a7e 08-31 20:51:59.66 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[lsccexp02] key(bytes)=[[]byte{0x6c, 0x73, 0x63, 0x63, 0x0, 0x65, 0x78, 0x70, 0x30, 0x32}] +[2a7f 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[2a80 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [4] +[2a81 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [6d21f743-a096-4708-a7ee-6f3453af394c] +[2a83 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Chaincode {exp02 1.0 [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48]} 's version is 1.0 and Id is [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] +[2a84 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2a85 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Returning [{exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []}] +[2a86 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [6d21f743-a096-4708-a7ee-6f3453af394c] +[2a87 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Updating channel businesschannel with [name:"exp02" version:"1.0" ] +[2a88 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2a89 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8CFEFBEF6AF9D9816...08031A0C0A0565787030321203312E30 +[2a8a 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 205D2DFEB7491BA0238A6C476E3CDA946094DC80544D737047B2D8D30B82FE7C +[2a8b 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Listeners for channel businesschannel invoked +[2a82 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x4, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] +[2a8c 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [4] +[2a8d 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[2a8e 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [3] transactions to history database +[2a8f 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [3] with [1] transactions +[2a90 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [3] +[2a91 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [3] with 1 transaction(s) in 68ms (state_validation=8ms block_and_pvtdata_commit=47ms state_commit=10ms) commitHash=[0866877db6db70d65568f374042a13b8fc21b93468b33610a5a9e1e14a0f6e81] +[2a92 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2a93 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8CFEFBEF6AF9D9816...08041A0C0A0565787030321203312E30 +[2a94 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5846ADD5566DADCEE4200C83787F6835BC31CEDC61FA087CEA35A061DEB0DB4F +[2a95 08-31 20:51:59.67 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [3] with 1 transaction(s) +[2a96 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2a97 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2a98 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2a99 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2a9a 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2a9b 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2a9c 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2a9d 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2a9e 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2a9f 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2aa0 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2aa1 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2aa2 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003358e10 gate 1598907120028098300 evaluation starts +[2aa3 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003358e10 signed by 0 principal evaluation starts (used [false]) +[2aa4 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003358e10 processing identity 0 with bytes of 115a4b0 +[2aa5 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003358e10 principal matched by identity 0 +[2aa6 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8d 4a 59 80 bf f6 e9 23 49 e1 8b 23 95 c6 f2 df |.JY....#I..#....| +00000010 5a ca db 3c 6a ed 08 ab 3b 3c 88 f7 07 06 a1 f1 |Z.. DEBU Verify: sig = 00000000 30 45 02 21 00 ab cb 40 e8 42 ee 4e 0c f8 8a 6a |0E.!...@.B.N...j| +00000010 dd 71 e2 81 d1 85 f4 2f d0 f5 0d f4 51 72 d2 9b |.q...../....Qr..| +00000020 ce a7 b1 81 a3 02 20 0d a2 9c 0a a2 6d 1f 0b 7c |...... .....m..|| +00000030 48 c3 20 ab 22 14 8d ef 09 aa 62 5e 64 74 cc e2 |H. .".....b^dt..| +00000040 8d ce db f4 c1 a1 7d |......}| +[2aa8 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003358e10 principal evaluation succeeds for identity 0 +[2aa9 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003358e10 gate 1598907120028098300 evaluation succeeds +[2aaa 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2aab 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2aac 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2aad 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2aae 08-31 20:52:00.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2aaf 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2ab0 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2ab1 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2ab2 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2ab3 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ab4 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ab5 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ab6 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2ab7 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2ab8 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ab9 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2aba 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2abb 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2abc 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2abd 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2abe 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2abf 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ac0 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ac1 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ac2 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2ac3 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ac4 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2ac5 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2ac6 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ac7 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2ac8 08-31 20:52:00.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ac9 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2aca 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2acb 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2acc 08-31 20:52:00.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2acd 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36840 +[2ace 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00045b5e0 +[2acf 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2ad0 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2ad1 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2ad2 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[2ad3 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2ad4 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 73 5d 58 bd c8 fd eb 48 4b 97 44 fd 00 99 f3 |vs]X....HK.D....| +00000010 e2 96 78 6d eb 27 38 e2 c5 03 b3 b1 4c a6 d3 e2 |..xm.'8.....L...| +[2ad5 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d1 8c 5c 35 42 b6 00 4e 3d d1 f1 |0D. 3..\5B..N=..| +00000010 e1 b4 d0 a5 56 8d 7b b7 4a 81 b1 9d 40 0e 1c bc |....V.{.J...@...| +00000020 5c 3d 9e c1 02 20 66 41 10 38 5f f4 7e 7a 42 75 |\=... fA.8_.~zBu| +00000030 b2 63 47 82 7d c5 47 a4 06 94 37 77 e9 6d ee 09 |.cG.}.G...7w.m..| +00000040 44 07 3f 1d e1 3a |D.?..:| +[2ad6 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2ad7 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00015e690, header 0xc00045b9f0 +[2ad8 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[2ad9 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9a544a6a] processing txid: 9a544a6a63926b96506078a36f26878d5183bf12097cfaae612843d06e9ddc12 +[2ada 08-31 20:52:00.18 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [9a544a6a63926b96506078a36f26878d5183bf12097cfaae612843d06e9ddc12] +[2adb 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[2adc 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[2add 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[2ade 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2adf 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[2ae0 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003279f40 gate 1598907120191759500 evaluation starts +[2ae1 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003279f40 signed by 0 principal evaluation starts (used [false]) +[2ae2 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003279f40 processing identity 0 with bytes of 115a4b0 +[2ae3 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003279f40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2ae4 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003279f40 principal evaluation fails +[2ae5 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003279f40 gate 1598907120191759500 evaluation fails +[2ae6 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +[2ae7 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[2ae8 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[2ae9 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034804b0 gate 1598907120195078100 evaluation starts +[2aea 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034804b0 signed by 0 principal evaluation starts (used [false]) +[2aeb 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034804b0 processing identity 0 with bytes of 115a4b0 +[2aec 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034804b0 principal matched by identity 0 +[2aed 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 76 73 5d 58 bd c8 fd eb 48 4b 97 44 fd 00 99 f3 |vs]X....HK.D....| +00000010 e2 96 78 6d eb 27 38 e2 c5 03 b3 b1 4c a6 d3 e2 |..xm.'8.....L...| +[2aee 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 d1 8c 5c 35 42 b6 00 4e 3d d1 f1 |0D. 3..\5B..N=..| +00000010 e1 b4 d0 a5 56 8d 7b b7 4a 81 b1 9d 40 0e 1c bc |....V.{.J...@...| +00000020 5c 3d 9e c1 02 20 66 41 10 38 5f f4 7e 7a 42 75 |\=... fA.8_.~zBu| +00000030 b2 63 47 82 7d c5 47 a4 06 94 37 77 e9 6d ee 09 |.cG.}.G...7w.m..| +00000040 44 07 3f 1d e1 3a |D.?..:| +[2aef 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034804b0 principal evaluation succeeds for identity 0 +[2af0 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034804b0 gate 1598907120195078100 evaluation succeeds +[2af1 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[2af2 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[2af3 08-31 20:52:00.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[2af4 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[2af5 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2af6 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [9a544a6a63926b96506078a36f26878d5183bf12097cfaae612843d06e9ddc12] +[2af7 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9a544a6a] Entry chaincode: name:"exp02" +[2af8 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2af9 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[2afa 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9a544a6a] Entry chaincode: name:"exp02" +[2afb 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2afc 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [9a544a6a] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2afd 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [9a544a6a] handling GET_STATE from chaincode +[2afe 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [9a544a6a] getting state for chaincode exp02, key a, channel businesschannel +[2aff 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[2b00 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [9a544a6a] Completed GET_STATE. Sending RESPONSE +[2b01 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [9a544a6a] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2b02 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [9a544a6a] notifying Txid:9a544a6a63926b96506078a36f26878d5183bf12097cfaae612843d06e9ddc12, channelID:businesschannel +[2b03 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2b04 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][9a544a6a] Exit chaincode: name:"exp02" (3ms) +[2b05 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2b06 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [9a544a6a63926b96506078a36f26878d5183bf12097cfaae612843d06e9ddc12] +[2b07 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9a544a6a] Exit +[2b08 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9a544a6a] Entry chaincode: name:"exp02" +[2b09 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9a544a6a] escc for chaincode name:"exp02" is escc +[2b0a 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 9a544a6a63926b96506078a36f26878d5183bf12097cfaae612843d06e9ddc12, chaincode: exp02} +[2b0b 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20A0F8A6FFFFA98EA11AE7D1A48694...455254494649434154452D2D2D2D2D0A +[2b0c 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1BBAE54D7DE48A5E9F4A7F0DEB0948ABF022A40185FC540A5A39A48AFB6FC993 +[2b0d 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 9a544a6a63926b96506078a36f26878d5183bf12097cfaae612843d06e9ddc12, chaincode: exp02} +[2b0e 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][9a544a6a] Exit +[2b0f 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [9a544a6a63926b96506078a36f26878d5183bf12097cfaae612843d06e9ddc12] +[2b10 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36840 +[2b11 08-31 20:52:00.20 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36840 grpc.code=OK grpc.call_duration=22.1574ms +[2b12 08-31 20:52:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2b13 08-31 20:52:00.21 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2b14 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2b15 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b16 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2b17 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2b18 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 cb a9 e5 9d 18 1a f9 4f 64 2e 97 bd 6d 8b 9a 14 |.......Od...m...| +00000010 1c cd 93 93 b8 ef ce f5 70 5d d8 43 42 d7 92 41 |........p].CB..A| +[2b19 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 eb ac 70 4b 10 24 5c 54 64 f0 ff |0E.!...pK.$\Td..| +00000010 f8 51 bb a2 78 d4 97 29 15 da e8 c8 5a a3 ba 4c |.Q..x..)....Z..L| +00000020 73 1c f3 07 33 02 20 69 f5 a7 f1 70 42 00 28 fe |s...3. i...pB.(.| +00000030 ad 0d bf a9 c5 4f 53 eb 33 df ee 95 00 95 f6 a1 |.....OS.3.......| +00000040 c0 09 7e 8f ad e2 9b |..~....| +[2b1a 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2b1b 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2b1c 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2b1d 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2b1e 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[2b1f 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b20 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b21 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b22 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b23 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b24 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b25 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2b26 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b27 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[2b28 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2b29 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b2a 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2b2b 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b2c 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2b2d 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2b2e 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b2f 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2b30 08-31 20:52:00.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b31 08-31 20:52:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2b32 08-31 20:52:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2b33 08-31 20:52:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b34 08-31 20:52:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2b35 08-31 20:52:00.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b36 08-31 20:52:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36844 +[2b37 08-31 20:52:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc000409180 +[2b38 08-31 20:52:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2b39 08-31 20:52:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2b3a 08-31 20:52:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2b3b 08-31 20:52:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[2b3c 08-31 20:52:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2b3d 08-31 20:52:00.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 41 cd e0 84 3b 02 2e 99 fa db 78 ec b1 0c 97 |.A...;.....x....| +00000010 32 2e b2 64 17 57 6b 57 28 52 ba 81 87 d5 33 ea |2..d.WkW(R....3.| +[2b3e 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 4f 46 5d 64 d4 4f 08 00 15 66 |0E.!..OF]d.O...f| +00000010 14 32 a4 bd 21 7e fd f4 65 4c d7 a5 51 50 c8 5e |.2..!~..eL..QP.^| +00000020 10 30 f8 a3 fa 02 20 33 67 7c d1 57 54 4d 24 44 |.0.... 3g|.WTM$D| +00000030 a9 4f f0 c8 3a c6 1f e3 12 52 3e 32 32 9a 3d d7 |.O..:....R>22.=.| +00000040 b3 0d e9 d4 77 ba 6e |....w.n| +[2b3f 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2b40 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0001d4c40, header 0xc000409590 +[2b41 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[2b42 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a1550261] processing txid: a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d +[2b43 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] +[2b44 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[2b45 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[2b46 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[2b47 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2b48 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[2b49 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e14b0 gate 1598907120413146500 evaluation starts +[2b4a 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e14b0 signed by 0 principal evaluation starts (used [false]) +[2b4b 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e14b0 processing identity 0 with bytes of 115a4b0 +[2b4c 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e14b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2b4d 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e14b0 principal evaluation fails +[2b4e 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e14b0 gate 1598907120413146500 evaluation fails +[2b4f 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +[2b50 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[2b51 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[2b52 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e1a20 gate 1598907120415610500 evaluation starts +[2b53 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e1a20 signed by 0 principal evaluation starts (used [false]) +[2b54 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e1a20 processing identity 0 with bytes of 115a4b0 +[2b55 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e1a20 principal matched by identity 0 +[2b56 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d0 41 cd e0 84 3b 02 2e 99 fa db 78 ec b1 0c 97 |.A...;.....x....| +00000010 32 2e b2 64 17 57 6b 57 28 52 ba 81 87 d5 33 ea |2..d.WkW(R....3.| +[2b57 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fc 4f 46 5d 64 d4 4f 08 00 15 66 |0E.!..OF]d.O...f| +00000010 14 32 a4 bd 21 7e fd f4 65 4c d7 a5 51 50 c8 5e |.2..!~..eL..QP.^| +00000020 10 30 f8 a3 fa 02 20 33 67 7c d1 57 54 4d 24 44 |.0.... 3g|.WTM$D| +00000030 a9 4f f0 c8 3a c6 1f e3 12 52 3e 32 32 9a 3d d7 |.O..:....R>22.=.| +00000040 b3 0d e9 d4 77 ba 6e |....w.n| +[2b58 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e1a20 principal evaluation succeeds for identity 0 +[2b59 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0034e1a20 gate 1598907120415610500 evaluation succeeds +[2b5a 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[2b5b 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[2b5c 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[2b5d 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[2b5e 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2b5f 08-31 20:52:00.41 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] +[2b60 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a1550261] Entry chaincode: name:"exp02" +[2b61 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2b62 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[2b63 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][a1550261] Entry chaincode: name:"exp02" +[2b64 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2b65 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2b66 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] handling GET_STATE from chaincode +[2b67 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] getting state for chaincode exp02, key a, channel businesschannel +[2b68 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[2b69 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] Completed GET_STATE. Sending RESPONSE +[2b6a 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2b6b 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] handling GET_STATE from chaincode +[2b6c 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] getting state for chaincode exp02, key b, channel businesschannel +[2b6d 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +[2b6e 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] Completed GET_STATE. Sending RESPONSE +[2b6f 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[2b70 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] handling PUT_STATE from chaincode +[2b71 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] Completed PUT_STATE. Sending RESPONSE +[2b72 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[2b73 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] handling PUT_STATE from chaincode +[2b74 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] Completed PUT_STATE. Sending RESPONSE +[2b75 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2b76 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [a1550261] notifying Txid:a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d, channelID:businesschannel +[2b77 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2b78 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][a1550261] Exit chaincode: name:"exp02" (4ms) +[2b79 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2b7a 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] +[2b7b 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a1550261] Exit +[2b7c 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a1550261] Entry chaincode: name:"exp02" +[2b7d 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a1550261] escc for chaincode name:"exp02" is escc +[2b7e 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d, chaincode: exp02} +[2b7f 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20728A436653456C1F2BC550D3CB71...455254494649434154452D2D2D2D2D0A +[2b80 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0CD14F8E8345BC08E972BF23622D37EDC8E04D7AA257F94D8ABAEF95BB588C53 +[2b81 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d, chaincode: exp02} +[2b82 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][a1550261] Exit +[2b83 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] +[2b84 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36844 +[2b85 08-31 20:52:00.42 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36844 grpc.code=OK grpc.call_duration=18.1187ms +[2b86 08-31 20:52:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2b87 08-31 20:52:00.43 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2b88 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2b89 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2b8a 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2b8b 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2b8c 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2b8d 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2b8e 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2b8f 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2b90 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2b91 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2b92 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2b93 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2b94 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614680 gate 1598907120459673700 evaluation starts +[2b95 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614680 signed by 0 principal evaluation starts (used [false]) +[2b96 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614680 processing identity 0 with bytes of 115a4b0 +[2b97 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614680 principal matched by identity 0 +[2b98 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 5d 4f ff 4a 19 f7 f0 ef 39 07 3b 45 81 3a 23 |.]O.J....9.;E.:#| +00000010 f8 71 e5 47 35 7e 57 86 69 08 d4 d9 31 6b a7 fb |.q.G5~W.i...1k..| +[2b99 08-31 20:52:00.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 11 b4 db d3 29 b5 df 6e ed 88 09 27 |0D. ....)..n...'| +00000010 ad d1 96 85 b4 8c 4c 6e 48 60 ee ad 21 ef da 1d |......LnH`..!...| +00000020 82 96 92 b0 02 20 68 8f 6f 51 48 f8 35 4d b0 ca |..... h.oQH.5M..| +00000030 a7 31 97 0b 58 9c 91 42 0c 61 db b7 8b 26 ae de |.1..X..B.a...&..| +00000040 3b 1a dd b7 2b df |;...+.| +[2b9a 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614680 principal evaluation succeeds for identity 0 +[2b9b 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003614680 gate 1598907120459673700 evaluation succeeds +[2b9c 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2b9d 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2b9e 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2b9f 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2ba0 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2ba1 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[2ba2 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2ba3 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2ba4 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2ba5 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ba6 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ba7 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ba8 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ba9 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2baa 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bab 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bac 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bad 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bae 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2baf 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2bb0 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bb1 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2bb2 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2bb3 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bb4 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2bb5 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bb6 08-31 20:52:00.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[2bb7 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2bb8 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2bb9 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bba 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2bbb 08-31 20:52:00.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bbc 08-31 20:52:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2bbd 08-31 20:52:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816102B +[2bbe 08-31 20:52:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 97B46D502BC31A96C36C69C241537B0DD34EA4987A84AD1975CC5C94EEA58C8A +[2bbf 08-31 20:52:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2bc0 08-31 20:52:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2bc1 08-31 20:52:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2bc2 08-31 20:52:00.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[2bc3 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bc4 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bc5 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bc6 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2bc7 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2bc8 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bc9 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[2bca 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2bcb 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bcc 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2bcd 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bce 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[2bcf 08-31 20:52:00.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2bd0 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36850 +[2bd1 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0003c5180 +[2bd2 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2bd3 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2bd4 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2bd5 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2bd6 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y +ZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r +uN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE +yIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV +HSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO +PQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g +DPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s= +-----END CERTIFICATE----- +[2bd7 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +[2bd8 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[2bd9 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[2bda 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2bdb 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b 24 91 3f 39 da 07 ce d2 08 88 8f 3d 7a 8f 4e |.$.?9.......=z.N| +00000010 36 11 3b 45 cc cb 2b 32 06 f7 6a 9f 24 66 46 80 |6.;E..+2..j.$fF.| +[2bdc 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 62 ea cc cb c4 a1 02 b5 f7 70 49 |0D. Hb........pI| +00000010 ee cc a1 13 63 55 a2 45 9b 07 99 43 b2 68 9b e8 |....cU.E...C.h..| +00000020 08 95 d8 ff 02 20 05 3f 4b 33 b5 5b 8e a4 99 4f |..... .?K3.[...O| +00000030 38 ed 11 bf cb 3e 61 5f e0 3c 27 db df bb b7 12 |8....>a_.<'.....| +00000040 05 bb 9c d4 49 ac |....I.| +[2bdd 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2bde 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00015f030, header 0xc0003c5680 +[2bdf 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[2be0 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][abfcbde7] processing txid: abfcbde7407588aaa6ba500b4637c233487e6a3942bdc4ab70cc8b2e65630312 +[2be1 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [abfcbde7407588aaa6ba500b4637c233487e6a3942bdc4ab70cc8b2e65630312] +[2be2 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[2be3 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[2be4 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[2be5 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2be6 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[2be7 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e9600 gate 1598907120649298700 evaluation starts +[2be8 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e9600 signed by 0 principal evaluation starts (used [false]) +[2be9 08-31 20:52:00.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e9600 processing identity 0 with bytes of 115a4b0 +[2bea 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[2beb 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[2bec 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[2bed 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e9600 principal matched by identity 0 +[2bee 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 8b 24 91 3f 39 da 07 ce d2 08 88 8f 3d 7a 8f 4e |.$.?9.......=z.N| +00000010 36 11 3b 45 cc cb 2b 32 06 f7 6a 9f 24 66 46 80 |6.;E..+2..j.$fF.| +[2bef 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 62 ea cc cb c4 a1 02 b5 f7 70 49 |0D. Hb........pI| +00000010 ee cc a1 13 63 55 a2 45 9b 07 99 43 b2 68 9b e8 |....cU.E...C.h..| +00000020 08 95 d8 ff 02 20 05 3f 4b 33 b5 5b 8e a4 99 4f |..... .?K3.[...O| +00000030 38 ed 11 bf cb 3e 61 5f e0 3c 27 db df bb b7 12 |8....>a_.<'.....| +00000040 05 bb 9c d4 49 ac |....I.| +[2bf0 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e9600 principal evaluation succeeds for identity 0 +[2bf1 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e9600 gate 1598907120649298700 evaluation succeeds +[2bf2 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +[2bf3 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[2bf4 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[2bf5 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[2bf6 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2bf7 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [abfcbde7407588aaa6ba500b4637c233487e6a3942bdc4ab70cc8b2e65630312] +[2bf8 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][abfcbde7] Entry chaincode: name:"exp02" +[2bf9 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2bfa 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[2bfb 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][abfcbde7] Entry chaincode: name:"exp02" +[2bfc 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2bfd 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [abfcbde7] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2bfe 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [abfcbde7] handling GET_STATE from chaincode +[2bff 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [abfcbde7] getting state for chaincode exp02, key a, channel businesschannel +[2c00 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[2c01 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [abfcbde7] Completed GET_STATE. Sending RESPONSE +[2c02 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [abfcbde7] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2c03 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [abfcbde7] notifying Txid:abfcbde7407588aaa6ba500b4637c233487e6a3942bdc4ab70cc8b2e65630312, channelID:businesschannel +[2c04 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2c05 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][abfcbde7] Exit chaincode: name:"exp02" (3ms) +[2c06 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2c07 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [abfcbde7407588aaa6ba500b4637c233487e6a3942bdc4ab70cc8b2e65630312] +[2c08 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][abfcbde7] Exit +[2c09 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][abfcbde7] Entry chaincode: name:"exp02" +[2c0a 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][abfcbde7] escc for chaincode name:"exp02" is escc +[2c0b 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: abfcbde7407588aaa6ba500b4637c233487e6a3942bdc4ab70cc8b2e65630312, chaincode: exp02} +[2c0c 08-31 20:52:00.65 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A202F69E5C292594DB42A60970762DE...455254494649434154452D2D2D2D2D0A +[2c0d 08-31 20:52:00.66 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 04F20CE6D769BCE3DB89965A6EE6D917E2DFE028C138E716AB63FBA8A587F9C2 +[2c0e 08-31 20:52:00.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: abfcbde7407588aaa6ba500b4637c233487e6a3942bdc4ab70cc8b2e65630312, chaincode: exp02} +[2c0f 08-31 20:52:00.66 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][abfcbde7] Exit +[2c10 08-31 20:52:00.66 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [abfcbde7407588aaa6ba500b4637c233487e6a3942bdc4ab70cc8b2e65630312] +[2c11 08-31 20:52:00.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36850 +[2c12 08-31 20:52:00.66 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36850 grpc.code=OK grpc.call_duration=18.8598ms +[2c13 08-31 20:52:00.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:36850: read: connection reset by peer +[2c14 08-31 20:52:00.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2c15 08-31 20:52:00.66 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2c16 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2c17 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2c18 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2c19 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c1a 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c1b 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c1c 08-31 20:52:00.99 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c1d 08-31 20:52:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c1e 08-31 20:52:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c1f 08-31 20:52:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[2c20 08-31 20:52:01.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c21 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2c22 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2c23 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c24 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2c25 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2c26 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c27 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2c28 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2c29 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2c2a 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2c2b 08-31 20:52:01.10 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2c2c 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2c2d 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037203b0 gate 1598907121110268800 evaluation starts +[2c2e 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037203b0 signed by 0 principal evaluation starts (used [false]) +[2c2f 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037203b0 processing identity 0 with bytes of 115a4b0 +[2c30 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037203b0 principal matched by identity 0 +[2c31 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 5b 37 f3 59 2a 3d 1c 8c 82 f6 83 f7 e7 f3 1e |=[7.Y*=.........| +00000010 f4 28 26 0f 02 53 00 aa 05 07 d0 da 3f 7a 06 41 |.(&..S......?z.A| +[2c32 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de ee 1b dc b7 1a e2 1b 53 7f 16 |0E.!.........S..| +00000010 a3 38 34 24 60 fd 7a 03 5c 53 7f 2a ef 00 95 34 |.84$`.z.\S.*...4| +00000020 46 26 d9 e2 46 02 20 6c 4a a0 18 ef 6f 2c 50 d4 |F&..F. lJ...o,P.| +00000030 d4 66 95 9f 6e 41 79 68 aa 6e dc b2 5f c9 cf df |.f..nAyh.n.._...| +00000040 4d 02 bb 49 8f 8c 3c |M..I..<| +[2c33 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037203b0 principal evaluation succeeds for identity 0 +[2c34 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037203b0 gate 1598907121110268800 evaluation succeeds +[2c35 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2c36 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2c37 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2c38 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2c39 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2c3a 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2c3b 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2c3c 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2c3d 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2c3e 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c3f 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c40 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c41 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[2c42 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c43 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c44 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c45 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[2c46 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[2c47 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c48 08-31 20:52:01.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[2c49 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2c4a 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2c4b 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2c4c 08-31 20:52:01.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c4d 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[2c4e 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c4f 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[2c50 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2c51 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 f8 9b e4 72 34 12 af 1e 59 64 6f 0d 8a c1 60 |....r4...Ydo...`| +00000010 90 df 35 e3 f0 30 73 f6 1b f0 ab 1c 65 d5 17 e0 |..5..0s.....e...| +[2c52 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 52 69 8a 68 62 3a 2f 6e 03 e8 |0E.!..Ri.hb:/n..| +00000010 4c 2e 14 0b f5 82 38 bb e3 47 31 24 d1 ef a4 35 |L.....8..G1$...5| +00000020 d6 2f 24 69 da 02 20 68 de cb 59 e9 9d a8 cd 04 |./$i.. h..Y.....| +00000030 fa 70 d6 f6 14 21 7c 03 a6 83 99 8d 03 f9 e2 09 |.p...!|.........| +00000040 cc ff 9c a0 c7 ef 71 |......q| +[2c53 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[2c54 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 e2 b0 83 f3 4e 66 83 d3 26 df |0E.!......Nf..&.| +00000010 e5 a1 c0 e1 27 7e 73 09 31 37 5c b8 ca 52 4e 5a |....'~s.17\..RNZ| +00000020 72 c3 c1 14 12 02 20 11 3b 2b c5 bb 8a 3d b2 5a |r..... .;+...=.Z| +00000030 f3 ca 50 78 c8 11 43 08 2b 70 3b e6 cc e8 38 62 |..Px..C.+p;...8b| +00000040 73 66 d1 4d 25 49 17 |sf.M%I.| +[2c55 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[2c56 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[2c57 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2c58 08-31 20:52:01.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2c59 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[2c5a 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c5b 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c5c 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c5d 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[2c5e 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c5f 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c60 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[2c61 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[2c62 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[2c63 08-31 20:52:01.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c64 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2c65 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2c66 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2c67 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c68 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c69 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c6a 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c6b 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c6c 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c6d 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[2c6e 08-31 20:52:01.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c6f 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2c70 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2c71 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c72 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[2c73 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2c74 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c75 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2c76 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2c77 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2c78 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2c79 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2c7a 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2c7b 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037761e0 gate 1598907121501943400 evaluation starts +[2c7c 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037761e0 signed by 0 principal evaluation starts (used [false]) +[2c7d 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037761e0 processing identity 0 with bytes of 115a4b0 +[2c7e 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037761e0 principal matched by identity 0 +[2c7f 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 e2 6c 42 f2 a8 e2 3f 70 70 87 06 55 06 f1 1c |..lB...?pp..U...| +00000010 0d d9 f7 7e a8 3b 92 34 16 5f fe d2 69 f8 7c a6 |...~.;.4._..i.|.| +[2c80 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 d3 ec 39 b0 40 f0 97 91 21 35 |0E.!....9.@...!5| +00000010 7d 64 7f f8 31 b9 cd 11 e8 6d 70 50 41 d5 f3 58 |}d..1....mpPA..X| +00000020 7e 04 66 4a a2 02 20 2a b7 16 58 02 a4 c6 82 b9 |~.fJ.. *..X.....| +00000030 a0 eb 2f 01 26 3d 0f 66 2e 59 14 44 9c a3 ad bf |../.&=.f.Y.D....| +00000040 a0 8f b9 51 b3 d2 b5 |...Q...| +[2c81 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037761e0 principal evaluation succeeds for identity 0 +[2c82 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037761e0 gate 1598907121501943400 evaluation succeeds +[2c83 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2c84 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2c85 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2c86 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2c87 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2c88 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[2c89 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[2c8a 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[2c8b 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[2c8c 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c8d 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c8e 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c8f 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[2c90 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c91 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c92 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2c93 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[2c94 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[2c95 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2c96 08-31 20:52:01.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c97 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[2c98 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[2c99 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[2c9a 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[2c9b 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[2c9c 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[2c9d 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2c9e 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2c9f 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[2ca0 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ca1 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2ca2 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ca3 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2ca4 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2ca5 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2ca6 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ca7 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2ca8 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2ca9 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[2caa 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cab 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2cac 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[2cad 08-31 20:52:01.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cae 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2caf 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816102C +[2cb0 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 286745E2B2B6DDCBC61726F9C3804C6178F06FF2463EDFCF0AD13D63217182B9 +[2cb1 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2cb2 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[2cb3 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[2cb4 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[2cb5 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cb6 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[2cb7 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cb8 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" > > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[2cb9 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" > > , Envelope: 166 bytes, Signature: 0 bytes +[2cba 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cbb 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[2cbc 08-31 20:52:01.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cbd 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\305\002\010\336o\365xK\233\365\311\330\002 p\277K[\2642a\212\306\320\367OB\2068k\204\337$q\252pD\001I\217\214\310\327C\227Q" > > , Envelope: 166 bytes, Signature: 0 bytes +[2cbe 08-31 20:52:01.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cbf 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[2cc0 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[2cc1 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cc2 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[2cc3 08-31 20:52:01.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2cc4 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 67 45 e2 b2 b6 dd cb c6 17 26 f9 c3 80 4c 61 |(gE.......&...La| +00000010 78 f0 6f f2 46 3e df cf 0a d1 3d 63 21 71 82 b9 |x.o.F>....=c!q..| +[2cc5 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 37 c0 99 e0 4d 4b c6 43 5c 1b |0E.!..7...MK.C\.| +00000010 f3 b5 30 5a 1c 66 ae 7e 3e c5 02 08 de 6f f5 78 |..0Z.f.~>....o.x| +00000020 4b 9b f5 c9 d8 02 20 70 bf 4b 5b b4 32 61 8a c6 |K..... p.K[.2a..| +00000030 d0 f7 4f 42 86 38 6b 84 df 24 71 aa 70 44 01 49 |..OB.8k..$q.pD.I| +00000040 8f 8c c8 d7 43 97 51 |....C.Q| +[2cc6 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2cc7 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2cc8 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cc9 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2cca 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 f8 9b e4 72 34 12 af 1e 59 64 6f 0d 8a c1 60 |....r4...Ydo...`| +00000010 90 df 35 e3 f0 30 73 f6 1b f0 ab 1c 65 d5 17 e0 |..5..0s.....e...| +[2ccb 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 52 69 8a 68 62 3a 2f 6e 03 e8 |0E.!..Ri.hb:/n..| +00000010 4c 2e 14 0b f5 82 38 bb e3 47 31 24 d1 ef a4 35 |L.....8..G1$...5| +00000020 d6 2f 24 69 da 02 20 68 de cb 59 e9 9d a8 cd 04 |./$i.. h..Y.....| +00000030 fa 70 d6 f6 14 21 7c 03 a6 83 99 8d 03 f9 e2 09 |.p...!|.........| +00000040 cc ff 9c a0 c7 ef 71 |......q| +[2ccc 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2ccd 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2cce 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2ccf 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cd0 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[2cd1 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cd2 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2cd3 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2cd4 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2cd5 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2cd6 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2cd7 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2cd8 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003846590 gate 1598907121616298600 evaluation starts +[2cd9 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003846590 signed by 0 principal evaluation starts (used [false]) +[2cda 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003846590 processing identity 0 with bytes of 115a4b0 +[2cdb 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003846590 principal matched by identity 0 +[2cdc 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f8 e2 6c 42 f2 a8 e2 3f 70 70 87 06 55 06 f1 1c |..lB...?pp..U...| +00000010 0d d9 f7 7e a8 3b 92 34 16 5f fe d2 69 f8 7c a6 |...~.;.4._..i.|.| +[2cdd 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 d3 ec 39 b0 40 f0 97 91 21 35 |0E.!....9.@...!5| +00000010 7d 64 7f f8 31 b9 cd 11 e8 6d 70 50 41 d5 f3 58 |}d..1....mpPA..X| +00000020 7e 04 66 4a a2 02 20 2a b7 16 58 02 a4 c6 82 b9 |~.fJ.. *..X.....| +00000030 a0 eb 2f 01 26 3d 0f 66 2e 59 14 44 9c a3 ad bf |../.&=.f.Y.D....| +00000040 a0 8f b9 51 b3 d2 b5 |...Q...| +[2cde 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003846590 principal evaluation succeeds for identity 0 +[2cdf 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003846590 gate 1598907121616298600 evaluation succeeds +[2ce0 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2ce1 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2ce2 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2ce3 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2ce4 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2ce5 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ce6 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ce7 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[2ce8 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ce9 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[2cea 08-31 20:52:01.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2ceb 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 67 45 e2 b2 b6 dd cb c6 17 26 f9 c3 80 4c 61 |(gE.......&...La| +00000010 78 f0 6f f2 46 3e df cf 0a d1 3d 63 21 71 82 b9 |x.o.F>....=c!q..| +[2cec 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 37 c0 99 e0 4d 4b c6 43 5c 1b |0E.!..7...MK.C\.| +00000010 f3 b5 30 5a 1c 66 ae 7e 3e c5 02 08 de 6f f5 78 |..0Z.f.~>....o.x| +00000020 4b 9b f5 c9 d8 02 20 70 bf 4b 5b b4 32 61 8a c6 |K..... p.K[.2a..| +00000030 d0 f7 4f 42 86 38 6b 84 df 24 71 aa 70 44 01 49 |..OB.8k..$q.pD.I| +00000040 8f 8c c8 d7 43 97 51 |....C.Q| +[2ced 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2cee 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2cef 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cf0 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[2cf1 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c0 f8 9b e4 72 34 12 af 1e 59 64 6f 0d 8a c1 60 |....r4...Ydo...`| +00000010 90 df 35 e3 f0 30 73 f6 1b f0 ab 1c 65 d5 17 e0 |..5..0s.....e...| +[2cf2 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e2 52 69 8a 68 62 3a 2f 6e 03 e8 |0E.!..Ri.hb:/n..| +00000010 4c 2e 14 0b f5 82 38 bb e3 47 31 24 d1 ef a4 35 |L.....8..G1$...5| +00000020 d6 2f 24 69 da 02 20 68 de cb 59 e9 9d a8 cd 04 |./$i.. h..Y.....| +00000030 fa 70 d6 f6 14 21 7c 03 a6 83 99 8d 03 f9 e2 09 |.p...!|.........| +00000040 cc ff 9c a0 c7 ef 71 |......q| +[2cf3 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2cf4 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2cf5 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[2cf6 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2cf7 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2cf8 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2cf9 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2cfa 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2cfb 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2cfc 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2cfd 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003864fd0 gate 1598907121625612500 evaluation starts +[2cfe 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003864fd0 signed by 0 principal evaluation starts (used [false]) +[2cff 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003864fd0 processing identity 0 with bytes of 115a4b0 +[2d00 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003864fd0 principal matched by identity 0 +[2d01 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3d 5b 37 f3 59 2a 3d 1c 8c 82 f6 83 f7 e7 f3 1e |=[7.Y*=.........| +00000010 f4 28 26 0f 02 53 00 aa 05 07 d0 da 3f 7a 06 41 |.(&..S......?z.A| +[2d02 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 de ee 1b dc b7 1a e2 1b 53 7f 16 |0E.!.........S..| +00000010 a3 38 34 24 60 fd 7a 03 5c 53 7f 2a ef 00 95 34 |.84$`.z.\S.*...4| +00000020 46 26 d9 e2 46 02 20 6c 4a a0 18 ef 6f 2c 50 d4 |F&..F. lJ...o,P.| +00000030 d4 66 95 9f 6e 41 79 68 aa 6e dc b2 5f c9 cf df |.f..nAyh.n.._...| +00000040 4d 02 bb 49 8f 8c 3c |M..I..<| +[2d03 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003864fd0 principal evaluation succeeds for identity 0 +[2d04 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003864fd0 gate 1598907121625612500 evaluation succeeds +[2d05 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2d06 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2d07 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2d08 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2d09 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[2d0a 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d0b 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d0c 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[2d0e 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[2d0d 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d0f 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 28 67 45 e2 b2 b6 dd cb c6 17 26 f9 c3 80 4c 61 |(gE.......&...La| +00000010 78 f0 6f f2 46 3e df cf 0a d1 3d 63 21 71 82 b9 |x.o.F>....=c!q..| +[2d10 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f2 37 c0 99 e0 4d 4b c6 43 5c 1b |0E.!..7...MK.C\.| +00000010 f3 b5 30 5a 1c 66 ae 7e 3e c5 02 08 de 6f f5 78 |..0Z.f.~>....o.x| +00000020 4b 9b f5 c9 d8 02 20 70 bf 4b 5b b4 32 61 8a c6 |K..... p.K[.2a..| +00000030 d0 f7 4f 42 86 38 6b 84 df 24 71 aa 70 44 01 49 |..OB.8k..$q.pD.I| +00000040 8f 8c c8 d7 43 97 51 |....C.Q| +[2d11 08-31 20:52:01.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[2d12 08-31 20:52:01.63 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7a 69 1f e4 ae cc 59 74 ab f5 21 3a |0D. zi....Yt..!:| +00000010 ab 85 04 2f 4c 15 74 4e 36 ee 48 91 f6 27 0d e8 |.../L.tN6.H..'..| +00000020 9a 18 53 a8 02 20 0b dd df 7d cf 08 d1 c3 d7 ac |..S.. ...}......| +00000030 2e f4 70 ea 00 bc bd c9 19 39 ff 22 5c 1c b3 54 |..p......9."\..T| +00000040 11 58 e0 54 16 31 |.X.T.1| +[2d13 08-31 20:52:01.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[2d14 08-31 20:52:01.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[2d15 08-31 20:52:01.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d16 08-31 20:52:01.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d17 08-31 20:52:01.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d18 08-31 20:52:01.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d19 08-31 20:52:01.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[2d1a 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2d1b 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d1c 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2d1d 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d1e 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2d1f 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d20 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes +[2d21 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes +[2d22 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d23 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[2d24 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[2d25 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[2d26 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[2d27 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d28 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d29 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2d2a 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2d2b 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2d2c 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2d2d 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2d2e 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2d2f 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a4d00 gate 1598907121691679800 evaluation starts +[2d30 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a4d00 signed by 0 principal evaluation starts (used [false]) +[2d31 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a4d00 processing identity 0 with bytes of 115a4b0 +[2d32 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a4d00 principal matched by identity 0 +[2d33 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[2d34 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[2d35 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a4d00 principal evaluation succeeds for identity 0 +[2d36 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038a4d00 gate 1598907121691679800 evaluation succeeds +[2d37 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2d38 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2d39 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2d3a 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2d3b 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d3c 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d3d 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2d3e 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2d3f 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2d40 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2d41 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2d42 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2d43 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0000 gate 1598907121694082600 evaluation starts +[2d44 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0000 signed by 0 principal evaluation starts (used [false]) +[2d45 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0000 processing identity 0 with bytes of 115a4b0 +[2d46 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0000 principal matched by identity 0 +[2d47 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +[2d48 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +00000040 b8 e5 d0 6d 1c 3c |...m.<| +[2d49 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes +[2d4a 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0000 principal evaluation succeeds for identity 0 +[2d4b 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0000 gate 1598907121694082600 evaluation succeeds +[2d4c 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2d4d 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2d4e 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2d50 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2d51 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d52 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2d53 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2d54 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2d55 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2d56 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2d57 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0b40 gate 1598907121696787000 evaluation starts +[2d58 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0b40 signed by 0 principal evaluation starts (used [false]) +[2d59 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0b40 processing identity 0 with bytes of 115a4b0 +[2d5a 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0b40 principal matched by identity 0 +[2d5b 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +[2d5c 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +00000040 b8 e5 d0 6d 1c 3c |...m.<| +[2d5d 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0b40 principal evaluation succeeds for identity 0 +[2d5e 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038f0b40 gate 1598907121696787000 evaluation succeeds +[2d5f 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2d60 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2d61 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2d62 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2d63 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d64 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes +[2d65 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d66 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[2d67 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[2d68 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d4f 08-31 20:52:01.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d69 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d6a 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2d6b 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2d6c 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d6d 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2d6e 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2d6f 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2d70 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2d71 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +[2d72 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bac730 gate 1598907121699385900 evaluation starts +[2d73 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bac730 signed by 0 principal evaluation starts (used [false]) +[2d74 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bac730 processing identity 0 with bytes of 115a4b0 +[2d75 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bac730 principal matched by identity 0 +[2d76 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d77 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[2d78 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[2d79 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d7a 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2d7b 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bac730 principal evaluation succeeds for identity 0 +[2d7c 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003bac730 gate 1598907121699385900 evaluation succeeds +[2d7d 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d7e 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2d7f 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2d80 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2d81 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2d82 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2d83 08-31 20:52:01.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d84 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2d85 08-31 20:52:01.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2d86 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 bc 88 5e 52 8e ec d4 25 2b b9 00 77 7a 49 01 ae |..^R...%+..wzI..| +00000010 20 8e 81 6a 8c e8 e1 43 07 30 ad 9b c5 53 c8 d3 | ..j...C.0...S..| +[2d87 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e1 2f f6 ce 92 ff fe 7f 18 22 5e |0E.!../......."^| +00000010 78 bf 03 90 cf c8 96 f2 ad b7 54 be 72 ef 22 20 |x.........T.r." | +00000020 de 06 60 db e5 02 20 12 37 24 19 e2 c2 ec 09 c1 |..`... .7$......| +00000030 1d 51 f6 15 bb 07 0f ea 0c 7f 40 da b5 7e 0c 91 |.Q........@..~..| +00000040 60 c8 49 33 05 26 8a |`.I3.&.| +[2d88 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d89 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d8a 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2d8b 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2d8c 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2d8d 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2d8e 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2d8f 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2d90 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e200c0 gate 1598907121728368100 evaluation starts +[2d91 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e200c0 signed by 0 principal evaluation starts (used [false]) +[2d92 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e200c0 processing identity 0 with bytes of 115a4b0 +[2d93 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e200c0 principal matched by identity 0 +[2d94 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +[2d95 08-31 20:52:01.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +00000040 95 10 dc 3c 55 b0 |... DEBU 0xc004e200c0 principal evaluation succeeds for identity 0 +[2d97 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e200c0 gate 1598907121728368100 evaluation succeeds +[2d98 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2d99 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2d9a 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2d9b 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2d9c 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2d9d 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2d9e 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2d9f 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2da0 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2da1 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2da2 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e20c10 gate 1598907121738849100 evaluation starts +[2da3 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e20c10 signed by 0 principal evaluation starts (used [false]) +[2da4 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e20c10 processing identity 0 with bytes of 115a4b0 +[2da5 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e20c10 principal matched by identity 0 +[2da6 08-31 20:52:01.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +[2da7 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +00000040 95 10 dc 3c 55 b0 |... DEBU 0xc004e20c10 principal evaluation succeeds for identity 0 +[2da9 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e20c10 gate 1598907121738849100 evaluation succeeds +[2daa 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2dab 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2dac 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2dad 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2dae 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2daf 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 739 bytes, Signature: 0 bytes +[2db0 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 fd 8b 14 91 53 db 33 3d 1d 77 84 77 1d 0c d6 |.....S.3=.w.w...| +00000010 f0 0c 52 da 6f 22 a1 50 f6 85 73 d0 8b 48 9e e2 |..R.o".P..s..H..| +[2db1 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 72 e2 8f 8e 10 92 da f8 ef 4f 3a 03 |0D. r........O:.| +00000010 d6 ad a3 d8 35 da 21 01 e7 4c 29 88 da 30 cd df |....5.!..L)..0..| +00000020 21 9d 71 dd 02 20 65 cc 19 cf 8f 92 03 fa b8 22 |!.q.. e........"| +00000030 ae bb 45 65 b6 e2 94 26 61 a8 86 7e 4f b0 87 1d |..Ee...&a..~O...| +00000040 9f dc 4e 54 20 46 |..NT F| +[2db2 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2db3 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2db4 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2db5 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2db6 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2db7 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2db8 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2db9 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2dba 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e566b0 gate 1598907121745817400 evaluation starts +[2dbb 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e566b0 signed by 0 principal evaluation starts (used [false]) +[2dbc 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e566b0 processing identity 0 with bytes of 115a4b0 +[2dbd 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e566b0 principal matched by identity 0 +[2dbe 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ef 9b 25 01 80 a1 97 e4 16 92 b3 17 8b fd 47 4e |..%...........GN| +00000010 90 fe 2b bf 34 87 c4 55 ce d1 41 2f 51 0a 2d bc |..+.4..U..A/Q.-.| +[2dbf 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f3 84 cb 44 3a 94 16 ec 77 28 1d |0E.!....D:...w(.| +00000010 d2 44 08 d7 a6 b2 dd 40 e4 1e d6 ab 79 0f 28 8f |.D.....@....y.(.| +00000020 27 82 9f 78 c0 02 20 58 f9 af 19 83 40 a5 35 43 |'..x.. X....@.5C| +00000030 4d 91 13 87 35 80 24 06 b7 68 b7 5a 22 e4 27 67 |M...5.$..h.Z".'g| +00000040 e9 2d 78 61 6b 67 e5 |.-xakg.| +[2dc0 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e566b0 principal evaluation succeeds for identity 0 +[2dc1 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e566b0 gate 1598907121745817400 evaluation succeeds +[2dc2 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2dc3 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2dc4 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2dc5 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2dc6 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dc7 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dc8 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2dc9 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2dca 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2dcb 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2dcc 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2dcd 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2dce 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e578c0 gate 1598907121748896000 evaluation starts +[2dcf 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e578c0 signed by 0 principal evaluation starts (used [false]) +[2dd0 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e578c0 processing identity 0 with bytes of 115a4b0 +[2dd1 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e578c0 principal matched by identity 0 +[2dd2 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b5 06 77 c3 7b 1d ac 82 d7 0e 67 e7 c2 ea cd 61 |..w.{.....g....a| +00000010 0a bd 34 87 4b 73 3f 87 ed 4a 64 b0 e1 4c de 33 |..4.Ks?..Jd..L.3| +[2dd3 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 81 62 73 7a 83 87 39 8b b0 7a b1 |0E.!..bsz..9..z.| +00000010 08 b4 27 8d e0 bb e1 a4 c0 5b 49 14 fa 02 b9 a2 |..'......[I.....| +00000020 28 49 5b 56 5c 02 20 2d 83 07 be 6c 63 33 c3 b4 |(I[V\. -...lc3..| +00000030 b7 12 4f 87 0a 38 de 95 0a bd 9c f4 a7 54 19 2b |..O..8.......T.+| +00000040 a1 f9 a7 3e a1 dd 9c |...>...| +[2dd4 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e578c0 principal evaluation succeeds for identity 0 +[2dd5 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e578c0 gate 1598907121748896000 evaluation succeeds +[2dd6 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2dd7 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2dd8 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2dd9 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2dda 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +[2ddb 08-31 20:52:01.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +00000040 b0 b6 9e bd e0 6f |.....o| +[2ddc 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2ddd 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2dde 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2ddf 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2de0 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2de1 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580a40 gate 1598907121750706700 evaluation starts +[2de2 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580a40 signed by 0 principal evaluation starts (used [false]) +[2de3 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580a40 processing identity 0 with bytes of 115a4b0 +[2de4 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580a40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2de5 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580a40 principal evaluation fails +[2de6 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580a40 gate 1598907121750706700 evaluation fails +[2de7 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[2de8 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2de9 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[2dea 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580fb0 gate 1598907121751474400 evaluation starts +[2deb 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580fb0 signed by 0 principal evaluation starts (used [false]) +[2dec 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580fb0 processing identity 0 with bytes of 115a4b0 +[2ded 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580fb0 principal matched by identity 0 +[2dee 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +[2def 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +00000040 b0 b6 9e bd e0 6f |.....o| +[2df0 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580fb0 principal evaluation succeeds for identity 0 +[2df1 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003580fb0 gate 1598907121751474400 evaluation succeeds +[2df2 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[2df3 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[2df4 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2df5 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2df6 08-31 20:52:01.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2df7 08-31 20:52:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2df8 08-31 20:52:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2df9 08-31 20:52:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[2dfa 08-31 20:52:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dfb 08-31 20:52:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2dfc 08-31 20:52:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[2dfd 08-31 20:52:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[2dfe 08-31 20:52:01.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2dff 08-31 20:52:01.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 43 bytes, Signature: 0 bytes +[2e00 08-31 20:52:01.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 43 bytes, Signature: 0 bytes +[2e01 08-31 20:52:01.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e02 08-31 20:52:01.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2e03 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e04 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e05 08-31 20:52:01.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e06 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2e07 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2e08 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2e09 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +[2e0a 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +00000040 b0 b6 9e bd e0 6f |.....o| +[2e0b 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e0c 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2e0d 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +[2e0e 08-31 20:52:01.96 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +00000040 b0 b6 9e bd e0 6f |.....o| +[2e0f 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e10 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e11 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2e12 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +[2e13 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +00000040 b0 b6 9e bd e0 6f |.....o| +[2e14 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e15 08-31 20:52:01.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e16 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2e17 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[2e18 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[2e19 08-31 20:52:01.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e1a 08-31 20:52:02.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2e1b 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2e1c 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e1d 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e1e 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e1f 08-31 20:52:02.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e20 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2e21 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2e22 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e23 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2e24 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2e25 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2e26 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2e27 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2e28 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2e29 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035da4d0 gate 1598907122177582900 evaluation starts +[2e2a 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035da4d0 signed by 0 principal evaluation starts (used [false]) +[2e2b 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035da4d0 processing identity 0 with bytes of 115a4b0 +[2e2c 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035da4d0 principal matched by identity 0 +[2e2d 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +[2e2e 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +00000040 b8 e5 d0 6d 1c 3c |...m.<| +[2e2f 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035da4d0 principal evaluation succeeds for identity 0 +[2e30 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035da4d0 gate 1598907122177582900 evaluation succeeds +[2e31 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2e32 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2e33 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2e34 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2e35 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e36 08-31 20:52:02.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e37 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2e38 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[2e39 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e3a 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2e3b 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2e3c 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2e3d 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2e3e 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2e3f 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2e40 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff9f80 gate 1598907122191165100 evaluation starts +[2e41 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff9f80 signed by 0 principal evaluation starts (used [false]) +[2e42 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff9f80 processing identity 0 with bytes of 115a4b0 +[2e43 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff9f80 principal matched by identity 0 +[2e44 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +[2e45 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +00000040 b8 e5 d0 6d 1c 3c |...m.<| +[2e46 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff9f80 principal evaluation succeeds for identity 0 +[2e47 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ff9f80 gate 1598907122191165100 evaluation succeeds +[2e48 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2e49 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2e4a 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2e4b 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2e4c 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2e4d 08-31 20:52:02.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2e4e 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2e4f 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[2e50 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[2e51 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2e52 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[2e53 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f0b90 gate 1598907122417833300 evaluation starts +[2e54 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f0b90 signed by 0 principal evaluation starts (used [false]) +[2e55 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f0b90 processing identity 0 with bytes of 115a4b0 +[2e56 08-31 20:52:02.41 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f0b90 principal matched by identity 0 +[2e57 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5c 57 82 7c 99 56 4d b0 0d 98 c4 b7 3a 1b 64 2e |\W.|.VM.....:.d.| +00000010 95 f3 97 e3 ee 1e f0 5e e5 b8 b8 71 94 6c a7 5f |.......^...q.l._| +[2e58 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5e 87 15 e0 00 30 28 5e ff 32 4b d1 |0D. ^....0(^.2K.| +00000010 94 29 83 39 a6 b4 28 0d f1 a3 52 1f ce 3a cb a0 |.).9..(...R..:..| +00000020 77 98 25 ec 02 20 1c 42 af 3d d4 28 56 75 01 b9 |w.%.. .B.=.(Vu..| +00000030 2a 07 1b 15 77 67 97 e5 81 ad a6 52 66 12 72 36 |*...wg.....Rf.r6| +00000040 aa c0 42 33 fb 79 |..B3.y| +[2e59 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f0b90 principal evaluation succeeds for identity 0 +[2e5a 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0035f0b90 gate 1598907122417833300 evaluation succeeds +[2e5b 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[2e5c 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[2e5d 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[2e5e 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[2e5f 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +[2e60 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [4] +[2e61 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[2e63 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [4], peers number [3] +[2e62 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [4] +[2e64 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [4] with 1 transaction(s) to the ledger +[2e65 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [4] from buffer +[2e66 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [4] +[2e67 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [4] +[2e68 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[2e69 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc00008a5c0 env 0xc00377c960 txn 0 +[2e6a 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc00377c960 +[2e6b 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\360\305\265\372\005\020\214\243\205\302\001\"\017businesschannel*@a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\027\010\177\221psw\030\236\237*T\302`\367\254+Q\2323-$v\360" +[2e6c 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2e6d 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2e6e 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2e6f 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[2e70 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2e71 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f 36 4f 61 9a cb be 2c 0e 7c f3 d3 0a ae 63 b0 |.6Oa...,.|....c.| +00000010 cb df 45 66 c7 92 ad 14 79 e7 5b 4f 81 2e ae 1c |..Ef....y.[O....| +[2e72 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2b 6a 46 c8 38 65 ff 3e 84 0d 72 0a |0D. +jF.8e.>..r.| +00000010 1b 71 b6 da 55 29 15 fa 20 ed 85 cd e5 54 13 8e |.q..U).. ....T..| +00000020 73 d7 49 c1 02 20 55 36 0c 7d d4 d5 f6 0a a0 75 |s.I.. U6.}.....u| +00000030 26 3b e5 cd d5 60 48 c1 e0 09 21 1b f6 c1 c2 bb |&;...`H...!.....| +00000040 35 e0 49 3f d9 2c |5.I?.,| +[2e73 08-31 20:52:02.42 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2e74 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0027b4000, header channel_header:"\010\003\032\014\010\360\305\265\372\005\020\214\243\205\302\001\"\017businesschannel*@a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nGBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0=\n-----END CERTIFICATE-----\n\022\030\027\010\177\221psw\030\236\237*T\302`\367\254+Q\2323-$v\360" +[2e75 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +[2e76 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +[2e77 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +[2e78 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[2e79 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] +[2e7a 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +[2e7b 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc003620000 +[2e7c 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [7df37376-30d2-463b-a4a0-d09fea2bb220] +[2e7d 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2e7e 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [7df37376-30d2-463b-a4a0-d09fea2bb220] +[2e7f 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d, seq 0 out of 1 in block 4 for channel businesschannel with validation plugin vscc with plugin +[2e80 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [73a41de1-5241-456b-8560-d7800c2a4c1b] +[2e81 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [73a41de1-5241-456b-8560-d7800c2a4c1b] +[2e82 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361c240 gate 1598907122433131900 evaluation starts +[2e83 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361c240 signed by 0 principal evaluation starts (used [false]) +[2e84 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361c240 processing identity 0 with bytes of 115a4b0 +[2e85 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361c240 principal matched by identity 0 +[2e86 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c d1 4f 8e 83 45 bc 08 e9 72 bf 23 62 2d 37 ed |..O..E...r.#b-7.| +00000010 c8 e0 4d 7a a2 57 f9 4d 8a ba ef 95 bb 58 8c 53 |..Mz.W.M.....X.S| +[2e87 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e6 06 0c 41 8e ee ef 15 ef 93 13 |0E.!....A.......| +00000010 7c 65 7d 52 64 ed d7 c8 0e 65 27 49 00 5b 7d 28 ||e}Rd....e'I.[}(| +00000020 0e f5 f9 19 61 02 20 40 2b bc 92 d7 d4 6d cf c9 |....a. @+....m..| +00000030 d6 0e 22 a0 7e f6 ca 0f b1 46 b6 f5 ff a4 df 94 |..".~....F......| +00000040 74 af d9 d4 da 20 6d |t.... m| +[2e88 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361c240 principal evaluation succeeds for identity 0 +[2e89 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361c240 signed by 1 principal evaluation starts (used [true]) +[2e8a 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361c240 skipping identity 0 because it has already been used +[2e8b 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361c240 principal evaluation fails +[2e8c 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00361c240 gate 1598907122433131900 evaluation succeeds +[2e8d 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [6446b274-e342-494b-b809-c3bd2fe87b51] +[2e8e 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [6446b274-e342-494b-b809-c3bd2fe87b51] +[2e8f 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU block 4, namespace: exp02, tx 0 validation results is: +[2e90 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d appears to be valid +[2e91 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc003620000 +[2e92 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc00008a5c0 env 0xc00377c960 txn 0 +[2e93 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[2e94 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [4] in 12ms +[2e95 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[2e96 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[2e97 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [4] +[2e98 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[2e99 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[2e9a 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[2e9b 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [4] +[2e9c 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[2e9d 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +[2e9e 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[2e9f 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +[2ea0 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +[2ea1 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +[2ea2 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2ea3 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +[2ea4 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU Block [4] Transaction index [0] TxId [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] marked as valid by state validator +[2ea5 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc00028ac80), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc00028acc0)} +[2ea6 08-31 20:52:02.43 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[2ea7 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[2ea8 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[2ea9 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [4] +[2eaa 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] to storage +[2eab 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [4] to pvt block store +[2eac 08-31 20:52:02.44 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4021 bytes, seq: 4}, Envelope: 4051 bytes, Signature: 0 bytes to the block puller +[2ead 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Added 4, total items: 4 +[2eae 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2eaf 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2eb0 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2eb1 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2eb2 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4021 bytes, seq: 4}, Envelope: 4051 bytes, Signature: 0 bytes to 1 peers +[2eb3 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2eb7 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2eb4 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [4] +[2eb5 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2eb8 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[2eb9 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[2eba 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ebb 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ebc 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ebd 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ebe 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[2ebf 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ec0 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[2ec1 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2ec2 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[2ec3 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[2ec4 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2ec5 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[2ec6 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367ced0 gate 1598907122455302300 evaluation starts +[2ec7 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367ced0 signed by 0 principal evaluation starts (used [false]) +[2ec8 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367ced0 processing identity 0 with bytes of 115a4b0 +[2ec9 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367ced0 principal matched by identity 0 +[2eca 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +[2ecb 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +00000040 95 10 dc 3c 55 b0 |... DEBU 0xc00367ced0 principal evaluation succeeds for identity 0 +[2ecd 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00367ced0 gate 1598907122455302300 evaluation succeeds +[2ece 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[2ecf 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[2ed0 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[2ed1 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[2ed2 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2ed3 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2eb6 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4021 bytes, seq: 4}, Envelope: 4051 bytes, Signature: 0 bytes +[2ed4 08-31 20:52:02.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2ed5 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=4, blockHash=[]byte{0x81, 0x47, 0x7e, 0x41, 0x1c, 0xad, 0xf5, 0x8b, 0x36, 0x32, 0x94, 0x83, 0x50, 0xc2, 0x29, 0x32, 0xda, 0xd5, 0xc, 0x74, 0xc8, 0x4a, 0xac, 0xd3, 0xc3, 0x82, 0x1e, 0x87, 0x25, 0x9, 0x5, 0x17} txOffsets= +txId=a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d locPointer=offset=70, bytesLength=2981 +] +[2ed6 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89532, bytesLength=2981] for tx ID: [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] to txid-index +[2ed7 08-31 20:52:02.46 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=89532, bytesLength=2981] for tx number:[0] ID: [a1550261d2b4603e9bcd0c0e4ac99bfdfc66075421089bba51d6560ca667b81d] to blockNumTranNum index +[2ed8 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[93505], isChainEmpty=[false], lastBlockNumber=[4] +[2ed9 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [4] +[2eda 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [4] +[2edb 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to state database +[2edc 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[2edd 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[2ede 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[2edf 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[2ee0 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +[2ee1 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +[2ee2 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[2ee3 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [5] +[2ee4 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x5, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] +[2ee5 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [5] +[2ee6 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[2ee7 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [4] transactions to history database +[2ee8 08-31 20:52:02.47 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [4] with [1] transactions +[2ee9 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [4] +[2eea 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [4] with 1 transaction(s) in 45ms (state_validation=11ms block_and_pvtdata_commit=26ms state_commit=1ms) commitHash=[9dd3f9ae053b5cef2a0bcdb8a16be48c425d0b3f1625b0c412f7814b08fca710] +[2eeb 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2eec 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8CFEFBEF6AF9D9816...08051A0C0A0565787030321203312E30 +[2eed 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9A455C5AC52AD928C03D2B2270BCA0C688A58CAA9C1CF476A9543DD6C6F40F3B +[2eee 08-31 20:52:02.48 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [4] with 1 transaction(s) +[2eef 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36854 +[2ef0 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0037b1770 +[2ef1 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2ef2 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2ef3 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2ef4 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +[2ef5 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2ef6 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 00 4a 92 0f 3b 99 04 39 d3 52 52 ac b5 1c f9 b4 |.J..;..9.RR.....| +00000010 5c 65 2c 8f 13 c4 3b 35 39 5c 57 60 e3 51 fd 56 |\e,...;59\W`.Q.V| +[2ef7 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 38 e7 4f b7 38 4d af df 4c 30 |0E.!..8.O.8M..L0| +00000010 65 6b 43 e1 97 13 00 76 43 4e 99 51 b6 2c 08 80 |ekC....vCN.Q.,..| +00000020 a2 84 2e f8 59 02 20 0a 2c be c4 e3 2f b1 b0 7c |....Y. .,.../..|| +00000030 7e f1 26 b5 29 69 19 7b a6 4b ea 4f c5 95 ad df |~.&.)i.{.K.O....| +00000040 6b 73 fa e1 5f 37 4d |ks.._7M| +[2ef8 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2ef9 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0037a70a0, header 0xc0037b1bd0 +[2efa 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[2efb 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][02b91c03] processing txid: 02b91c03172fe63e56e1288d76718ecf9ba4eec41aea754c7016d98bbeb227b1 +[2efc 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [02b91c03172fe63e56e1288d76718ecf9ba4eec41aea754c7016d98bbeb227b1] +[2efd 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[2efe 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[2eff 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[2f00 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2f01 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[2f02 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e6bf0 gate 1598907122791757400 evaluation starts +[2f03 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e6bf0 signed by 0 principal evaluation starts (used [false]) +[2f04 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e6bf0 processing identity 0 with bytes of 115a4b0 +[2f05 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e6bf0 principal matched by identity 0 +[2f06 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 00 4a 92 0f 3b 99 04 39 d3 52 52 ac b5 1c f9 b4 |.J..;..9.RR.....| +00000010 5c 65 2c 8f 13 c4 3b 35 39 5c 57 60 e3 51 fd 56 |\e,...;59\W`.Q.V| +[2f07 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 99 38 e7 4f b7 38 4d af df 4c 30 |0E.!..8.O.8M..L0| +00000010 65 6b 43 e1 97 13 00 76 43 4e 99 51 b6 2c 08 80 |ekC....vCN.Q.,..| +00000020 a2 84 2e f8 59 02 20 0a 2c be c4 e3 2f b1 b0 7c |....Y. .,.../..|| +00000030 7e f1 26 b5 29 69 19 7b a6 4b ea 4f c5 95 ad df |~.&.)i.{.K.O....| +00000040 6b 73 fa e1 5f 37 4d |ks.._7M| +[2f08 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e6bf0 principal evaluation succeeds for identity 0 +[2f09 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0036e6bf0 gate 1598907122791757400 evaluation succeeds +[2f0a 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +[2f0b 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[2f0c 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[2f0d 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[2f0e 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2f0f 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [02b91c03172fe63e56e1288d76718ecf9ba4eec41aea754c7016d98bbeb227b1] +[2f10 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][02b91c03] Entry chaincode: name:"exp02" +[2f11 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2f12 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[2f13 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][02b91c03] Entry chaincode: name:"exp02" +[2f14 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2f15 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [02b91c03] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2f16 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [02b91c03] handling GET_STATE from chaincode +[2f17 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [02b91c03] getting state for chaincode exp02, key a, channel businesschannel +[2f18 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[2f19 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [02b91c03] Completed GET_STATE. Sending RESPONSE +[2f1a 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [02b91c03] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2f1b 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [02b91c03] notifying Txid:02b91c03172fe63e56e1288d76718ecf9ba4eec41aea754c7016d98bbeb227b1, channelID:businesschannel +[2f1c 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2f1d 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][02b91c03] Exit chaincode: name:"exp02" (4ms) +[2f1e 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2f1f 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [02b91c03172fe63e56e1288d76718ecf9ba4eec41aea754c7016d98bbeb227b1] +[2f20 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][02b91c03] Exit +[2f21 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][02b91c03] Entry chaincode: name:"exp02" +[2f22 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][02b91c03] escc for chaincode name:"exp02" is escc +[2f23 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 02b91c03172fe63e56e1288d76718ecf9ba4eec41aea754c7016d98bbeb227b1, chaincode: exp02} +[2f24 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A2077CFDCB4A217656ACA5FB1D076D7...455254494649434154452D2D2D2D2D0A +[2f25 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 610CD9C979F56373765FD2D000B3F6B19BC7FE80CF1259B69740F180C639B289 +[2f26 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 02b91c03172fe63e56e1288d76718ecf9ba4eec41aea754c7016d98bbeb227b1, chaincode: exp02} +[2f27 08-31 20:52:02.79 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][02b91c03] Exit +[2f28 08-31 20:52:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [02b91c03172fe63e56e1288d76718ecf9ba4eec41aea754c7016d98bbeb227b1] +[2f29 08-31 20:52:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36854 +[2f2a 08-31 20:52:02.80 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36854 grpc.code=OK grpc.call_duration=10.07ms +[2f2b 08-31 20:52:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2f2c 08-31 20:52:02.80 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2f2d 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36858 +[2f2e 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00386a6e0 +[2f2f 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2f30 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2f31 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2f32 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +[2f33 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2f34 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 95 68 f4 10 aa 39 3b c0 45 a2 77 fc 48 07 c0 |..h...9;.E.w.H..| +00000010 27 dd 80 a8 7b d8 97 fe 57 75 75 fb 80 e0 00 c5 |'...{...Wuu.....| +[2f35 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 c4 62 13 e0 41 08 2b 43 20 24 |0E.!...b..A.+C $| +00000010 dc 1d 14 27 cc 1a 85 a4 d1 0c c5 b8 ed 87 26 29 |...'..........&)| +00000020 25 79 05 11 91 02 20 4f 7e 4d 18 cf 00 1c 8e c3 |%y.... O~M......| +00000030 74 47 56 98 4d bb 99 95 87 ac 69 dc f1 a9 99 0d |tGV.M.....i.....| +00000040 50 8c 85 01 1e 53 63 |P....Sc| +[2f36 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2f37 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0035185b0, header 0xc00386ab90 +[2f38 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[2f39 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ba76c229] processing txid: ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b +[2f3a 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] +[2f3b 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[2f3c 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[2f3d 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[2f3e 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2f3f 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[2f40 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003730a90 gate 1598907122959737000 evaluation starts +[2f41 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003730a90 signed by 0 principal evaluation starts (used [false]) +[2f42 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003730a90 processing identity 0 with bytes of 115a4b0 +[2f43 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003730a90 principal matched by identity 0 +[2f44 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b9 95 68 f4 10 aa 39 3b c0 45 a2 77 fc 48 07 c0 |..h...9;.E.w.H..| +00000010 27 dd 80 a8 7b d8 97 fe 57 75 75 fb 80 e0 00 c5 |'...{...Wuu.....| +[2f45 08-31 20:52:02.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e3 c4 62 13 e0 41 08 2b 43 20 24 |0E.!...b..A.+C $| +00000010 dc 1d 14 27 cc 1a 85 a4 d1 0c c5 b8 ed 87 26 29 |...'..........&)| +00000020 25 79 05 11 91 02 20 4f 7e 4d 18 cf 00 1c 8e c3 |%y.... O~M......| +00000030 74 47 56 98 4d bb 99 95 87 ac 69 dc f1 a9 99 0d |tGV.M.....i.....| +00000040 50 8c 85 01 1e 53 63 |P....Sc| +[2f46 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003730a90 principal evaluation succeeds for identity 0 +[2f47 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003730a90 gate 1598907122959737000 evaluation succeeds +[2f48 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Writers +[2f49 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[2f4a 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[2f4b 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[2f4c 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2f4d 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] +[2f4e 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ba76c229] Entry chaincode: name:"exp02" +[2f4f 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2f50 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[2f51 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ba76c229] Entry chaincode: name:"exp02" +[2f52 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2f53 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2f54 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] handling GET_STATE from chaincode +[2f55 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] getting state for chaincode exp02, key a, channel businesschannel +[2f56 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[2f57 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] Completed GET_STATE. Sending RESPONSE +[2f58 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2f59 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] handling GET_STATE from chaincode +[2f5a 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] getting state for chaincode exp02, key b, channel businesschannel +[2f5b 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +[2f5c 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] Completed GET_STATE. Sending RESPONSE +[2f5d 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[2f5e 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] handling PUT_STATE from chaincode +[2f5f 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] Completed PUT_STATE. Sending RESPONSE +[2f60 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] Fabric side handling ChaincodeMessage of type: PUT_STATE in state ready +[2f61 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] handling PUT_STATE from chaincode +[2f62 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] Completed PUT_STATE. Sending RESPONSE +[2f63 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2f64 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [ba76c229] notifying Txid:ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b, channelID:businesschannel +[2f65 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2f66 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][ba76c229] Exit chaincode: name:"exp02" (6ms) +[2f67 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2f68 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] +[2f69 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ba76c229] Exit +[2f6a 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ba76c229] Entry chaincode: name:"exp02" +[2f6b 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ba76c229] escc for chaincode name:"exp02" is escc +[2f6c 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b, chaincode: exp02} +[2f6d 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A208019E9F420CFC5CE9CDA57A863EB...455254494649434154452D2D2D2D2D0A +[2f6e 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DE467A9A545BD801BE17F9FB54659BC26A2D25202A18AAF1B2E3B947DB8EAB25 +[2f6f 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b, chaincode: exp02} +[2f70 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][ba76c229] Exit +[2f71 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] +[2f72 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36858 +[2f73 08-31 20:52:02.96 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36858 grpc.code=OK grpc.call_duration=8.2112ms +[2f74 08-31 20:52:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2f75 08-31 20:52:02.98 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2f76 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36864 +[2f77 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00386bae0 +[2f78 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2f79 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2f7a 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2f7b 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[2f7c 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2f7d 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e bd 1e 52 74 1d 6b 73 8d 7e 77 bb 1b 10 4a ec |^..Rt.ks.~w...J.| +00000010 ca 17 01 7f a7 9a f3 48 7b c9 b7 8d 44 94 73 bc |.......H{...D.s.| +[2f7e 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 7f 97 8a 6d a5 c4 66 de f6 8e f2 |0D. ....m..f....| +00000010 49 06 23 ea 13 31 b2 6b 59 8a 94 66 c1 23 0f 2e |I.#..1.kY..f.#..| +00000020 71 8f 0e 06 02 20 1d 3b 4e 82 de b7 68 fb b4 28 |q.... .;N...h..(| +00000030 c6 97 05 70 1a 3c c5 1a 46 d0 83 52 e9 a3 20 33 |...p.<..F..R.. 3| +00000040 3e 61 d5 7f 2f fa |>a../.| +[2f7f 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2f80 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003518a10, header 0xc00386bef0 +[2f81 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[2f82 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3a630a55] processing txid: 3a630a5566e3f31b5e91ed358e9242d8f5ca204320f9fc6d3f9339754aebaa3e +[2f83 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [3a630a5566e3f31b5e91ed358e9242d8f5ca204320f9fc6d3f9339754aebaa3e] +[2f84 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[2f85 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[2f86 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[2f87 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2f88 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[2f89 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003771ce0 gate 1598907123158475800 evaluation starts +[2f8a 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003771ce0 signed by 0 principal evaluation starts (used [false]) +[2f8b 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003771ce0 processing identity 0 with bytes of 115a4b0 +[2f8c 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003771ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[2f8d 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003771ce0 principal evaluation fails +[2f8e 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003771ce0 gate 1598907123158475800 evaluation fails +[2f8f 08-31 20:52:03.15 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +[2f90 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[2f91 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[2f92 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c4250 gate 1598907123160511900 evaluation starts +[2f93 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c4250 signed by 0 principal evaluation starts (used [false]) +[2f94 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c4250 processing identity 0 with bytes of 115a4b0 +[2f95 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c4250 principal matched by identity 0 +[2f96 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e bd 1e 52 74 1d 6b 73 8d 7e 77 bb 1b 10 4a ec |^..Rt.ks.~w...J.| +00000010 ca 17 01 7f a7 9a f3 48 7b c9 b7 8d 44 94 73 bc |.......H{...D.s.| +[2f97 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 1d 7f 97 8a 6d a5 c4 66 de f6 8e f2 |0D. ....m..f....| +00000010 49 06 23 ea 13 31 b2 6b 59 8a 94 66 c1 23 0f 2e |I.#..1.kY..f.#..| +00000020 71 8f 0e 06 02 20 1d 3b 4e 82 de b7 68 fb b4 28 |q.... .;N...h..(| +00000030 c6 97 05 70 1a 3c c5 1a 46 d0 83 52 e9 a3 20 33 |...p.<..F..R.. 3| +00000040 3e 61 d5 7f 2f fa |>a../.| +[2f98 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c4250 principal evaluation succeeds for identity 0 +[2f99 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0037c4250 gate 1598907123160511900 evaluation succeeds +[2f9a 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[2f9b 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[2f9c 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[2f9d 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[2f9e 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[2f9f 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [3a630a5566e3f31b5e91ed358e9242d8f5ca204320f9fc6d3f9339754aebaa3e] +[2fa0 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3a630a55] Entry chaincode: name:"exp02" +[2fa1 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[2fa2 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[2fa3 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3a630a55] Entry chaincode: name:"exp02" +[2fa4 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[2fa5 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [3a630a55] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[2fa6 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [3a630a55] handling GET_STATE from chaincode +[2fa7 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [3a630a55] getting state for chaincode exp02, key a, channel businesschannel +[2fa8 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[2fa9 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [3a630a55] Completed GET_STATE. Sending RESPONSE +[2faa 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [3a630a55] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[2fab 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [3a630a55] notifying Txid:3a630a5566e3f31b5e91ed358e9242d8f5ca204320f9fc6d3f9339754aebaa3e, channelID:businesschannel +[2fac 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[2fad 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][3a630a55] Exit chaincode: name:"exp02" (2ms) +[2fae 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[2faf 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3a630a5566e3f31b5e91ed358e9242d8f5ca204320f9fc6d3f9339754aebaa3e] +[2fb0 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3a630a55] Exit +[2fb1 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3a630a55] Entry chaincode: name:"exp02" +[2fb2 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3a630a55] escc for chaincode name:"exp02" is escc +[2fb3 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 3a630a5566e3f31b5e91ed358e9242d8f5ca204320f9fc6d3f9339754aebaa3e, chaincode: exp02} +[2fb4 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20965651423C120628239C2F972927...455254494649434154452D2D2D2D2D0A +[2fb5 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 24E3FBE05E2A09C347FD6C804DAF1A0B30E14448D318F73DD01730E9A45E816A +[2fb6 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 3a630a5566e3f31b5e91ed358e9242d8f5ca204320f9fc6d3f9339754aebaa3e, chaincode: exp02} +[2fb7 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][3a630a55] Exit +[2fb8 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [3a630a5566e3f31b5e91ed358e9242d8f5ca204320f9fc6d3f9339754aebaa3e] +[2fb9 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36864 +[2fba 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36864 grpc.code=OK grpc.call_duration=12.6766ms +[2fbb 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2fbc 08-31 20:52:03.16 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[2fbd 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[2fbe 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[2fbf 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[2fc0 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D9816100E1801 +[2fc1 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: B638D092E639E4F83DBACE3A1CCE7AF87DF2F72349BDFC5F501D8BBCD17D8FBE +[2fc2 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[2fc3 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fc4 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fc5 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fc6 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fc7 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[2fc8 08-31 20:52:03.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fc9 08-31 20:52:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fca 08-31 20:52:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[2fcb 08-31 20:52:03.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2fcc 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2fcd 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2fce 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[2fcf 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fd0 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fd1 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fd2 08-31 20:52:04.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fd3 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fd4 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[2fd5 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[2fd6 08-31 20:52:04.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[2fd7 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[2fd8 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[2fd9 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[2fda 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[2fdb 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[2fdc 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371f450 gate 1598907124997468900 evaluation starts +[2fdd 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371f450 signed by 0 principal evaluation starts (used [false]) +[2fde 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371f450 processing identity 0 with bytes of 115a4b0 +[2fdf 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371f450 principal matched by identity 0 +[2fe0 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 90 d8 f5 0f 48 65 c8 f4 0c cd 0e 2e 8f ad 75 8f |....He........u.| +00000010 ab 85 7b f4 d3 8b 3b 99 75 1d a4 43 c3 f9 55 94 |..{...;.u..C..U.| +[2fe1 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8b 8e 3b ef a4 f2 de 25 6b ad 88 |0E.!...;....%k..| +00000010 74 2e 8c b8 4d 18 ee 72 ed 27 2d a4 49 8a db 08 |t...M..r.'-.I...| +00000020 de 88 c3 21 7f 02 20 2b 42 c2 70 ca 56 7a 28 40 |...!.. +B.p.Vz(@| +00000030 7f 0d 90 23 8e 19 ae 18 e2 85 e9 57 ac 12 83 ce |...#.......W....| +00000040 cc 76 ef 31 10 24 d4 |.v.1.$.| +[2fe2 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371f450 principal evaluation succeeds for identity 0 +[2fe3 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00371f450 gate 1598907124997468900 evaluation succeeds +[2fe4 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[2fe5 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[2fe6 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[2fe7 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[2fe8 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +[2fe9 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [5] +[2fea 08-31 20:52:04.99 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[2fec 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [5], peers number [3] +[2feb 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [5] +[2fed 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [5] with 1 transaction(s) to the ledger +[2fee 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [5] from buffer +[2fef 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [5] +[2ff0 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [5] +[2ff1 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[2ff2 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc002794e00 env 0xc004b21540 txn 0 +[2ff3 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc004b21540 +[2ff4 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\003\032\014\010\362\305\265\372\005\020\330\366\336\310\003\"\017businesschannel*@ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030}\357\315\302\232\007\257\034BQH\017\351&]\"\010\252\276J\270\353\250@" +[2ff5 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[2ff6 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[2ff7 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[2ff8 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org2MSP f9a58b9ec3858275dfd07e4159f8baa26db89c848f308e9f0825fe33bbeb438a} +[2ff9 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[2ffa 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 60 35 37 a9 79 33 a2 e5 2b 9c 00 24 05 6e 93 3f |`57.y3..+..$.n.?| +00000010 8d d7 90 73 0d 35 87 ae 3b dd 80 ca fa 0e 01 84 |...s.5..;.......| +[2ffb 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c 1e 88 5b 8d 81 cf 0e a2 2f d3 11 |0D. |..[...../..| +00000010 a4 a8 f1 b3 5c 74 52 c0 c6 9d 67 23 3f e7 8d d0 |....\tR...g#?...| +00000020 de 36 b3 af 02 20 14 7b 59 42 5f fc de 82 a4 91 |.6... .{YB_.....| +00000030 9e 10 21 3b 91 48 0d fa dd 17 37 33 ab 68 b1 3b |..!;.H....73.h.;| +00000040 92 ff b4 50 2d 54 |...P-T| +[2ffc 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[2ffd 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction starts for data 0xc0036b0800, header channel_header:"\010\003\032\014\010\362\305\265\372\005\020\330\366\336\310\003\"\017businesschannel*@ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b:\t\022\007\022\005exp02" signature_header:"\n\266\006\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKTCCAdCgAwIBAgIRAKPzR69GyG/CXVxUaGrVJlcwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBrMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzEOMAwGA1UECxMFYWRtaW4xHzAdBgNVBAMMFkFkbWluQG9y\nZzIuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAQWt9+MdW1r\nuN7ScmOfWSBnWnu2vV5hrDK4svwsliZv1WGHucdhGD+7WcVt5MXV/A/YNIhunuRE\nyIHuT5XoWWeFo00wSzAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADArBgNV\nHSMEJDAigCAp9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjO\nPQQDAgNHADBEAiBDr57EOc+mY9BxXJhpC3YDECplsoBocflc1+24mj3/jAIgV+0g\nDPH5FiMo67WdO9PBJmfCYSaPs+25t2IBvPs3x0s=\n-----END CERTIFICATE-----\n\022\030}\357\315\302\232\007\257\034BQH\017\351&]\"\010\252\276J\270\353\250@" +[2ffe 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: there are 1 actions +[2fff 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU validateEndorserTransaction info: signature header is valid +[3000 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope returns err %!s() +[3001 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[3002 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] +[3003 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validating transaction vscc tx validate +[3004 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx starts for bytes 0xc0036ab800 +[3005 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [436465a6-d99c-4f4c-b263-faff8801c1d9] +[3006 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[3007 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [436465a6-d99c-4f4c-b263-faff8801c1d9] +[3008 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Validating Tx ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b, seq 0 out of 1 in block 5 for channel businesschannel with validation plugin vscc with plugin +[3009 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [b6816ba1-7b1b-47d3-bb29-068a704241ac] +[300a 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [b6816ba1-7b1b-47d3-bb29-068a704241ac] +[300b 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2460 gate 1598907125006500600 evaluation starts +[300c 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2460 signed by 0 principal evaluation starts (used [false]) +[300d 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2460 processing identity 0 with bytes of 115a4b0 +[300e 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2460 principal matched by identity 0 +[300f 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 46 7a 9a 54 5b d8 01 be 17 f9 fb 54 65 9b c2 |.Fz.T[......Te..| +00000010 6a 2d 25 20 2a 18 aa f1 b2 e3 b9 47 db 8e ab 25 |j-% *......G...%| +[3010 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3b 02 52 70 3b fc a7 0c 50 fb f7 a0 |0D. ;.Rp;...P...| +00000010 bc e1 53 83 eb c9 a5 d8 aa 9b 1b 5b 91 4c a8 2d |..S........[.L.-| +00000020 61 25 a5 ec 02 20 21 e1 95 52 28 ef ca c0 87 1b |a%... !..R(.....| +00000030 c4 b9 39 15 3e 7c 4e e2 b1 b4 5b 4f d7 2e 24 8d |..9.>|N...[O..$.| +00000040 9f 7f eb 94 e9 29 |.....)| +[3012 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2460 principal evaluation succeeds for identity 0 +[3013 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2460 signed by 1 principal evaluation starts (used [true]) +[3014 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2460 skipping identity 0 because it has already been used +[3015 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2460 principal evaluation fails +[3011 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4021 bytes, seq: 5}, Envelope: 4051 bytes, Signature: 0 bytes to the block puller +[3016 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0038d2460 gate 1598907125006500600 evaluation succeeds +[3018 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new query executor txid = [f17ddf0c-9d36-4748-b63f-97cc36d32036] +[3019 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [f17ddf0c-9d36-4748-b63f-97cc36d32036] +[301a 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU block 5, namespace: exp02, tx 0 validation results is: +[3017 08-31 20:52:05.00 UTC] [%{longpkg}] %{callpath} -> DEBU Added 5, total items: 5 +[301b 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b appears to be valid +[301c 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] VSCCValidateTx completes env bytes 0xc0036ab800 +[301d 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3020 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[301e 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc002794e00 env 0xc004b21540 txn 0 +[301f 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[3022 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [5] in 13ms +[3021 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3023 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3024 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4021 bytes, seq: 5}, Envelope: 4051 bytes, Signature: 0 bytes to 1 peers +[3025 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[3026 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[3027 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3028 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[302a 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 4021 bytes, seq: 5}, Envelope: 4051 bytes, Signature: 0 bytes +[302b 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3029 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [5] +[302c 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[302d 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[302e 08-31 20:52:05.01 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[302f 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [5] +[3030 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[3031 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU txType=ENDORSER_TRANSACTION +[3032 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[3033 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [a]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +[3034 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=b +[3035 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [b]: committed version=&version.Height{BlockNum:0x4, TxNum:0x0} and read version=&version.Height{BlockNum:0x4, TxNum:0x0} +[3036 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[3037 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Comparing versions for key [exp02]: committed version=&version.Height{BlockNum:0x3, TxNum:0x0} and read version=&version.Height{BlockNum:0x3, TxNum:0x0} +[3038 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Block [5] Transaction index [0] TxId [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] marked as valid by state validator +[3039 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"exp02", coll:"", key:"a"}:(*internal.keyOps)(0xc0027959c0), internal.compositeKey{ns:"exp02", coll:"", key:"b"}:(*internal.keyOps)(0xc002795a00)} +[303a 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[303b 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[303c 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[303d 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [5] +[303e 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] to storage +[303f 08-31 20:52:05.02 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [5] to pvt block store +[3040 08-31 20:52:05.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3041 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3042 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3043 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3044 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[3045 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3046 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3047 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3048 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3049 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[304a 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[304b 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[304c 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42e10 gate 1598907125041061800 evaluation starts +[304d 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42e10 signed by 0 principal evaluation starts (used [false]) +[304e 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42e10 processing identity 0 with bytes of 115a4b0 +[304f 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42e10 principal matched by identity 0 +[3050 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4f c6 c4 e1 15 cf cc 1c 60 63 d0 7b a3 8e 99 33 |O.......`c.{...3| +00000010 d1 2e f8 33 b8 58 69 18 fb 93 4e 34 6e 55 52 13 |...3.Xi...N4nUR.| +[3051 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e8 ca 6b f5 11 7c d3 ad ea a2 91 |0E.!...k..|.....| +00000010 c5 90 bd 9a 4f 50 b0 6d e6 39 cc a1 5d 23 8c b6 |....OP.m.9..]#..| +00000020 8d 6b 62 36 c8 02 20 5c f5 1f f7 c0 ab 13 da c4 |.kb6.. \........| +00000030 71 d6 00 98 84 08 89 a8 9c d0 7f bf 7e 91 03 6c |q...........~..l| +00000040 9d 77 b0 d8 73 84 be |.w..s..| +[3052 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42e10 principal evaluation succeeds for identity 0 +[3053 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a42e10 gate 1598907125041061800 evaluation succeeds +[3054 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3055 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3056 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3057 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3058 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3059 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[305a 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[305b 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[305c 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[305d 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[305e 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[305f 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3060 08-31 20:52:05.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3062 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3061 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3063 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3066 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3064 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3067 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3068 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3069 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3065 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [5] +[306a 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[306b 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=5, blockHash=[]byte{0xdc, 0x42, 0xca, 0x8d, 0x6b, 0x16, 0xf2, 0x93, 0x4, 0x29, 0x62, 0xf1, 0xe4, 0x9, 0xe8, 0xbf, 0x83, 0x51, 0xc9, 0xc7, 0x8b, 0xc4, 0x6, 0xa4, 0xd3, 0x7b, 0x3d, 0x42, 0xb5, 0xa5, 0x4, 0x73} txOffsets= +txId=ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b locPointer=offset=70, bytesLength=2980 +] +[306c 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[306e 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[306d 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93575, bytesLength=2980] for tx ID: [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] to txid-index +[306f 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=93575, bytesLength=2980] for tx number:[0] ID: [ba76c229b054cc680ef275fcd98597b9933f0bfac96bd839e10829bacd999e1b] to blockNumTranNum index +[3070 08-31 20:52:05.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3071 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3072 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[97548], isChainEmpty=[false], lastBlockNumber=[5] +[3073 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [5] +[3074 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3075 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [5] +[3076 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to state database +[3077 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[3079 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[307a 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[307b 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[307c 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02a] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x61}] +[307d 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[exp02b] key(bytes)=[[]byte{0x65, 0x78, 0x70, 0x30, 0x32, 0x0, 0x62}] +[3078 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[307f 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[307e 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[3080 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [6] +[3081 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x6, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] +[3082 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [6] +[3083 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[3084 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [5] transactions to history database +[3085 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [5] with [1] transactions +[3086 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3087 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3088 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3089 08-31 20:52:05.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[308a 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[308b 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[308c 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [5] +[308d 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [5] with 1 transaction(s) in 57ms (state_validation=7ms block_and_pvtdata_commit=38ms state_commit=3ms) commitHash=[5abbf81c5b01c9bcde441b511d482f253569812e638239c9427074d8bc7ea489] +[308e 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[308f 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8CFEFBEF6AF9D9816...08061A0C0A0565787030321203312E30 +[3090 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: DE37101E8731D4588E15F55EC1C717E44ADED98CA6284A0406499042F874AB06 +[3091 08-31 20:52:05.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [5] with 1 transaction(s) +[3092 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3093 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3094 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3095 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3096 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[3097 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3098 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3099 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[309a 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[309b 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[309c 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[309d 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[309e 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a657a0 gate 1598907125082705400 evaluation starts +[309f 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a657a0 signed by 0 principal evaluation starts (used [false]) +[30a0 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a657a0 processing identity 0 with bytes of 115a4b0 +[30a1 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a657a0 principal matched by identity 0 +[30a2 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e 74 70 5f 69 da ef 58 05 f1 9d 10 2e d6 70 |..tp_i..X......p| +00000010 3a de 14 88 17 ee d0 42 51 d5 a6 46 8d f5 8c 3d |:......BQ..F...=| +[30a3 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a c0 56 b6 72 65 1b f5 d5 29 c0 a2 |0D. *.V.re...)..| +00000010 58 56 5c 65 a7 0b 2c 94 80 c5 ce 83 ac be f6 54 |XV\e..,........T| +00000020 2f 31 e3 48 02 20 5b 2a ae cd 07 ba a2 8e 32 f3 |/1.H. [*......2.| +00000030 dd 1c 0d 2d 4b c6 ed e9 22 79 c7 aa 01 3d 20 6f |...-K..."y...= o| +00000040 8b 81 64 ef ec 80 |..d...| +[30a4 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a657a0 principal evaluation succeeds for identity 0 +[30a5 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a657a0 gate 1598907125082705400 evaluation succeeds +[30a6 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[30a7 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[30a8 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[30a9 08-31 20:52:05.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[30aa 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[30ab 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[30ac 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[30ad 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[30ae 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[30af 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30b0 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30b1 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30b2 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[30b3 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30b4 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30b5 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30b6 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[30b7 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[30b8 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[30b9 08-31 20:52:05.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30ba 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[30bb 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[30bc 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[30bd 08-31 20:52:05.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30be 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[30bf 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30c0 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[30c1 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[30c2 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 e5 e9 a6 fb 05 57 8b d3 8e 51 f7 68 a5 7e 34 |......W...Q.h.~4| +00000010 b6 76 b4 12 be 3b bf 81 92 39 f3 26 08 8e 3d f9 |.v...;...9.&..=.| +[30c3 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 24 bc 8b 48 51 d1 a7 f4 4e 90 17 b0 |0D. $..HQ...N...| +00000010 99 35 8b 1a f5 b3 d0 ea df 36 6c 2a ac 9b 9a c6 |.5.......6l*....| +00000020 75 1b 64 53 02 20 56 08 1f 62 ca c4 b4 51 85 eb |u.dS. V..b...Q..| +00000030 70 95 38 d7 bd ce c4 65 f6 21 5c 79 f5 17 7e 57 |p.8....e.!\y..~W| +00000040 55 69 e5 10 d3 6b |Ui...k| +[30c4 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[30c5 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[30c6 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[30c7 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[30c8 08-31 20:52:05.26 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[30c9 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30ca 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30cb 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30cc 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30cd 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30ce 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30cf 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[30d0 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30d2 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[30d1 08-31 20:52:05.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[30d3 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30d4 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[30d5 08-31 20:52:05.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30d6 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" secret_envelope:*\013\311\005\177A\351\327t" > > > , Envelope: 270 bytes, Signature: 0 bytes +[30d7 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30d8 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" secret_envelope:*\013\311\005\177A\351\327t" > > > , Envelope: 270 bytes, Signature: 0 bytes +[30d9 08-31 20:52:05.29 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[30da 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 10 07 8f e4 2b 02 2d 3e fc 47 48 d6 8f 49 ad |.....+.->.GH..I.| +00000010 f2 d8 41 ea bd 99 65 15 93 84 fb f2 3e 69 8d 88 |..A...e.....>i..| +[30db 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 ee 06 3e b8 e0 d4 82 23 2c 60 aa |0D. C..>....#,`.| +00000010 9d e7 9e 39 08 8f b3 1f 87 55 47 87 62 d9 88 a3 |...9.....UG.b...| +00000020 5f 1f ee 65 02 20 1d 6c fd 2c 4b 23 d7 eb bc 62 |_..e. .l.,K#...b| +00000030 be 76 b0 77 85 48 ce da cd 6f d0 2b 60 ab bc 00 |.v.w.H...o.+`...| +00000040 5c 73 bc 0e 0d 58 |\s...X| +[30dc 08-31 20:52:05.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[30dd 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 77 51 d2 f7 b4 ec 1e c3 49 1e 33 |0D. HwQ......I.3| +00000010 de 2c b1 b1 7a f1 1b ff 39 12 8b 6e a4 d2 a7 0a |.,..z...9..n....| +00000020 8d 45 52 d3 02 20 1d 73 59 b9 0c 86 8a 0b 28 e1 |.ER.. .sY.....(.| +00000030 2d f2 2e 52 bc 7a 23 10 ba e6 8a 68 3e 2a 0b c9 |-..R.z#....h>*..| +00000040 05 7f 41 e9 d7 74 |..A..t| +[30de 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[30df 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[30e0 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[30e1 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[30e2 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[30e3 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30e4 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30e5 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30e6 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[30e7 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30e8 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30e9 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes to 1 peers +[30eb 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 430 bytes, Signature: 0 bytes +[30ec 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30ea 08-31 20:52:05.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" secret_envelope:*\013\311\005\177A\351\327t" > > alive: +[30ed 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[30ee 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[30ef 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30f0 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[30f1 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30f2 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[30f3 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[30f4 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30f5 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[30f6 08-31 20:52:05.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[30f7 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[30f8 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[30f9 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[30fa 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30fb 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30fc 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30fd 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30fe 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[30ff 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3100 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[3101 08-31 20:52:05.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3102 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3103 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3104 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3105 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3106 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3107 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3108 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3109 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[310a 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[310b 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[310c 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[310d 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[310e 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8bf00 gate 1598907125427425800 evaluation starts +[310f 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8bf00 signed by 0 principal evaluation starts (used [false]) +[3110 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8bf00 processing identity 0 with bytes of 115a4b0 +[3111 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8bf00 principal matched by identity 0 +[3112 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 89 3f 53 55 af 41 40 b7 82 ca 7c 32 ff b8 ce 68 |.?SU.A@...|2...h| +00000010 a0 98 99 06 03 79 e7 70 7e b8 92 8a 48 f0 61 0f |.....y.p~...H.a.| +[3113 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 63 a9 d0 da c0 f3 7c df 1c 0a e6 |0D. .c.....|....| +00000010 2d 8f 30 9d fe 80 91 12 60 de c7 9e 6e e4 e3 0d |-.0.....`...n...| +00000020 70 8f 44 d2 02 20 03 f0 52 44 15 4e 3f 59 be 57 |p.D.. ..RD.N?Y.W| +00000030 21 15 2d 79 db bb 32 86 b8 86 ef 10 c0 c1 43 07 |!.-y..2.......C.| +00000040 58 64 34 c7 d0 61 |Xd4..a| +[3114 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8bf00 principal evaluation succeeds for identity 0 +[3115 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003a8bf00 gate 1598907125427425800 evaluation succeeds +[3116 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3117 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3118 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3119 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[311a 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[311b 08-31 20:52:05.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[311c 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[311d 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[311e 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[311f 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3120 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3121 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3122 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3123 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3124 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3125 08-31 20:52:05.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3126 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3127 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3128 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3129 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[312a 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[312b 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[312c 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[312d 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[312e 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[312f 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3130 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3131 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3132 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3133 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3134 08-31 20:52:05.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3135 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3136 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3137 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3138 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3139 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36868 +[313a 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003aa17c0 +[313b 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[313c 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[313d 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[313e 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[313f 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3140 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 29 27 20 a2 34 fe ab 1f 4e f6 70 e6 4a 1b 4d |.)' .4...N.p.J.M| +00000010 0e 20 2d 68 79 7e 04 d6 33 26 d1 8b 9e b2 2a 88 |. -hy~..3&....*.| +[3141 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0c 93 83 04 d2 70 f7 84 2f 98 75 7b |0D. .....p../.u{| +00000010 d0 14 a3 69 94 60 e4 38 22 68 26 be 30 b8 9f e7 |...i.`.8"h&.0...| +00000020 09 b2 38 60 02 20 79 3b c7 0d 06 9a 92 db aa 70 |..8`. y;.......p| +00000030 cb 34 22 11 d2 98 8b cf 0e 57 27 24 1a d1 0e dc |.4"......W'$....| +00000040 66 8a 1f e3 fe bf |f.....| +[3142 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3143 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ad0380, header 0xc003aa1bd0 +[3144 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"exp02" +[3145 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c33c7397] processing txid: c33c7397fe3ff8a72d4b7f9b7e7df02d38f0cb736d5662f3adf546d7988de3a1 +[3146 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [c33c7397fe3ff8a72d4b7f9b7e7df02d38f0cb736d5662f3adf546d7988de3a1] +[3147 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Writers found in config for resource peer/Propose +[3148 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Writers) +[3149 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[314a 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[314b 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers == +[314c 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b50d00 gate 1598907125455460300 evaluation starts +[314d 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b50d00 signed by 0 principal evaluation starts (used [false]) +[314e 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b50d00 processing identity 0 with bytes of 115a4b0 +[314f 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b50d00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3150 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b50d00 principal evaluation fails +[3151 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b50d00 gate 1598907125455460300 evaluation fails +[3152 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Writers +[3153 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Writers +[3154 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[3155 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51270 gate 1598907125456109700 evaluation starts +[3156 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51270 signed by 0 principal evaluation starts (used [false]) +[3157 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51270 processing identity 0 with bytes of 115a4b0 +[3158 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51270 principal matched by identity 0 +[3159 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 29 27 20 a2 34 fe ab 1f 4e f6 70 e6 4a 1b 4d |.)' .4...N.p.J.M| +00000010 0e 20 2d 68 79 7e 04 d6 33 26 d1 8b 9e b2 2a 88 |. -hy~..3&....*.| +[315a 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0c 93 83 04 d2 70 f7 84 2f 98 75 7b |0D. .....p../.u{| +00000010 d0 14 a3 69 94 60 e4 38 22 68 26 be 30 b8 9f e7 |...i.`.8"h&.0...| +00000020 09 b2 38 60 02 20 79 3b c7 0d 06 9a 92 db aa 70 |..8`. y;.......p| +00000030 cb 34 22 11 d2 98 8b cf 0e 57 27 24 1a d1 0e dc |.4"......W'$....| +00000040 66 8a 1f e3 fe bf |f.....| +[315b 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51270 principal evaluation succeeds for identity 0 +[315c 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b51270 gate 1598907125456109700 evaluation succeeds +[315d 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[315e 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[315f 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[3160 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[3161 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[3162 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [c33c7397fe3ff8a72d4b7f9b7e7df02d38f0cb736d5662f3adf546d7988de3a1] +[3163 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c33c7397] Entry chaincode: name:"exp02" +[3164 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[3165 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Getting chaincode data for from cache +[3166 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c33c7397] Entry chaincode: name:"exp02" +[3167 08-31 20:52:05.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3168 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [c33c7397] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[3169 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [c33c7397] handling GET_STATE from chaincode +[316a 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [c33c7397] getting state for chaincode exp02, key a, channel businesschannel +[316b 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=exp02, key=a +[316c 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [c33c7397] Completed GET_STATE. Sending RESPONSE +[316d 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [c33c7397] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[316e 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [c33c7397] notifying Txid:c33c7397fe3ff8a72d4b7f9b7e7df02d38f0cb736d5662f3adf546d7988de3a1, channelID:businesschannel +[316f 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[3170 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c33c7397] Exit chaincode: name:"exp02" (3ms) +[3171 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[3172 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c33c7397fe3ff8a72d4b7f9b7e7df02d38f0cb736d5662f3adf546d7988de3a1] +[3173 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c33c7397] Exit +[3174 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c33c7397] Entry chaincode: name:"exp02" +[3175 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c33c7397] escc for chaincode name:"exp02" is escc +[3176 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: c33c7397fe3ff8a72d4b7f9b7e7df02d38f0cb736d5662f3adf546d7988de3a1, chaincode: exp02} +[3177 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A203FA0A534EAD19FFFB31D3F1FF5D4...455254494649434154452D2D2D2D2D0A +[3178 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: CA30532DB47998C6EEC21E9FCC70B765E7D01062479B1DBC5DE1D8F5B34619B9 +[3179 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: c33c7397fe3ff8a72d4b7f9b7e7df02d38f0cb736d5662f3adf546d7988de3a1, chaincode: exp02} +[317a 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c33c7397] Exit +[317b 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c33c7397fe3ff8a72d4b7f9b7e7df02d38f0cb736d5662f3adf546d7988de3a1] +[317c 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36868 +[317d 08-31 20:52:05.46 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36868 grpc.code=OK grpc.call_duration=13.8011ms +[317e 08-31 20:52:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[317f 08-31 20:52:05.47 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3180 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3181 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3182 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3183 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3184 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3185 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3186 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3187 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3188 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3189 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[318a 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[318b 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[318c 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b70e90 gate 1598907125493165200 evaluation starts +[318d 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b70e90 signed by 0 principal evaluation starts (used [false]) +[318e 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b70e90 processing identity 0 with bytes of 115a4b0 +[318f 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b70e90 principal matched by identity 0 +[3190 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3191 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816102D +[3192 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5CE14C4C554EE32AFAA75F9ACA3055D9B15579034EB2A0D3B8902486CBCA59DB +[3193 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3194 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3196 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3197 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[3195 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f bf 80 35 88 b4 5b e6 9f 32 d4 41 b7 09 ed 0f |o..5..[..2.A....| +00000010 34 d7 bd f8 6b 0e 06 76 63 fa 7a 7c a3 3e 80 3a |4...k..vc.z|.>.:| +[3198 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fa 65 3f 1e 10 70 c0 a9 4e 51 b4 |0D. U.e?..p..NQ.| +00000010 f3 2c 93 90 53 d0 9b d0 7f 62 a7 f1 0c ef 07 c6 |.,..S....b......| +00000020 a9 50 fc c6 02 20 18 c8 87 be b7 06 63 1b 8d 96 |.P... ......c...| +00000030 82 62 c7 68 41 b0 2c f4 c0 09 14 96 16 92 01 a0 |.b.hA.,.........| +00000040 71 35 0c 02 1b 23 |q5...#| +[3199 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b70e90 principal evaluation succeeds for identity 0 +[319a 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003b70e90 gate 1598907125493165200 evaluation succeeds +[319b 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[319c 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[319d 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[319e 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[319f 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[31a0 08-31 20:52:05.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[31a1 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[31a2 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[31a3 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[31a4 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31a5 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31a6 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31a7 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[31a8 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31a9 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31aa 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31ab 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +[31ac 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[31ad 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31ae 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" > alive: alive: alive: +[31af 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31b0 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31b1 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +[31b2 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31b3 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[31b4 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31b5 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[31b7 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[31b8 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31b9 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[31ba 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31b6 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[31bb 08-31 20:52:05.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31bc 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[31bd 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[31be 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[31bf 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[31c0 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[31c1 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[31c2 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[31c3 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31c4 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[31c5 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31c6 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[31c7 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31c8 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[31c9 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[31ca 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31cb 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[31cc 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[31cd 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[31ce 08-31 20:52:05.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31cf 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[31d0 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[31d1 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[31d2 08-31 20:52:05.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31d3 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[31d4 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816102E +[31d5 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1D32A5085B5D36890C4A2207F8C0BBAF815EC635D50C8FF9285B93D51D823147 +[31d6 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[31d7 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[31d8 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[31d9 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:C\010" secret_envelope:q/\205\240;\014\002 O\263\261\343\310\266r<_\026L\250\033~&\233\n\243\226Y\024S\026\221I\250'7\354\306\000\251" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[31da 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31db 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:C\010" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[31dc 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31dd 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:C\010" secret_envelope:q/\205\240;\014\002 O\263\261\343\310\266r<_\026L\250\033~&\233\n\243\226Y\024S\026\221I\250'7\354\306\000\251" > > > , Envelope: 271 bytes, Signature: 0 bytes +[31de 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31df 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:C\010" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[31e0 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:C\010" > > , Envelope: 165 bytes, Signature: 0 bytes +[31e1 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31e2 08-31 20:52:05.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:C\010" > > , Envelope: 165 bytes, Signature: 0 bytes +[31e4 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31e3 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[31e5 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31e6 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[31e7 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[31e8 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[31e9 08-31 20:52:05.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[31ea 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 32 a5 08 5b 5d 36 89 0c 4a 22 07 f8 c0 bb af |.2..[]6..J".....| +00000010 81 5e c6 35 d5 0c 8f f9 28 5b 93 d5 1d 82 31 47 |.^.5....([....1G| +[31eb 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 20 4b 9b 56 37 47 b1 a7 58 68 4a |0D. m K.V7G..XhJ| +00000010 2c a7 0e f2 23 b6 f7 9c c2 4f 95 09 80 b0 47 a0 |,...#....O....G.| +00000020 ca d7 85 94 02 20 27 8e 25 2e 24 47 56 b3 2a 69 |..... '.%.$GV.*i| +00000030 9d 97 17 a3 9e f6 07 c2 c3 cb a1 47 2f c5 b7 e2 |...........G/...| +00000040 b6 71 55 3e 43 08 |.qU>C.| +[31ec 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[31ed 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[31ee 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b3 b1 7a 89 d9 8f 68 24 b0 8b 6d |0E.!...z...h$..m| +00000010 25 2f 64 84 35 a7 70 19 b8 ee e2 06 8a a0 3e 71 |%/d.5.p.......>q| +00000020 2f 85 a0 3b 0c 02 20 4f b3 b1 e3 c8 b6 72 3c 5f |/..;.. O.....r<_| +00000030 16 4c a8 1b 7e 26 9b 0a a3 96 59 14 53 16 91 49 |.L..~&....Y.S..I| +00000040 a8 27 37 ec c6 00 a9 |.'7....| +[31ef 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[31f0 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[31f1 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31f2 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31f3 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[31f4 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[31f5 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[31f6 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[31f7 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[31f8 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[31f9 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[31fa 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[31fb 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[31fc 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[31fd 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[31fe 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8d930 gate 1598907125612601000 evaluation starts +[31ff 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8d930 signed by 0 principal evaluation starts (used [false]) +[3200 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8d930 processing identity 0 with bytes of 115a4b0 +[3201 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8d930 principal matched by identity 0 +[3202 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6f bf 80 35 88 b4 5b e6 9f 32 d4 41 b7 09 ed 0f |o..5..[..2.A....| +00000010 34 d7 bd f8 6b 0e 06 76 63 fa 7a 7c a3 3e 80 3a |4...k..vc.z|.>.:| +[3203 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 55 fa 65 3f 1e 10 70 c0 a9 4e 51 b4 |0D. U.e?..p..NQ.| +00000010 f3 2c 93 90 53 d0 9b d0 7f 62 a7 f1 0c ef 07 c6 |.,..S....b......| +00000020 a9 50 fc c6 02 20 18 c8 87 be b7 06 63 1b 8d 96 |.P... ......c...| +00000030 82 62 c7 68 41 b0 2c f4 c0 09 14 96 16 92 01 a0 |.b.hA.,.........| +00000040 71 35 0c 02 1b 23 |q5...#| +[3204 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8d930 principal evaluation succeeds for identity 0 +[3205 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c8d930 gate 1598907125612601000 evaluation succeeds +[3206 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3207 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3208 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3209 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[320a 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[320b 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[320c 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[320d 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 32 a5 08 5b 5d 36 89 0c 4a 22 07 f8 c0 bb af |.2..[]6..J".....| +00000010 81 5e c6 35 d5 0c 8f f9 28 5b 93 d5 1d 82 31 47 |.^.5....([....1G| +[320e 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 20 4b 9b 56 37 47 b1 a7 58 68 4a |0D. m K.V7G..XhJ| +00000010 2c a7 0e f2 23 b6 f7 9c c2 4f 95 09 80 b0 47 a0 |,...#....O....G.| +00000020 ca d7 85 94 02 20 27 8e 25 2e 24 47 56 b3 2a 69 |..... '.%.$GV.*i| +00000030 9d 97 17 a3 9e f6 07 c2 c3 cb a1 47 2f c5 b7 e2 |...........G/...| +00000040 b6 71 55 3e 43 08 |.qU>C.| +[320f 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3210 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3211 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3212 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3213 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 10 07 8f e4 2b 02 2d 3e fc 47 48 d6 8f 49 ad |.....+.->.GH..I.| +00000010 f2 d8 41 ea bd 99 65 15 93 84 fb f2 3e 69 8d 88 |..A...e.....>i..| +[3214 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 ee 06 3e b8 e0 d4 82 23 2c 60 aa |0D. C..>....#,`.| +00000010 9d e7 9e 39 08 8f b3 1f 87 55 47 87 62 d9 88 a3 |...9.....UG.b...| +00000020 5f 1f ee 65 02 20 1d 6c fd 2c 4b 23 d7 eb bc 62 |_..e. .l.,K#...b| +00000030 be 76 b0 77 85 48 ce da cd 6f d0 2b 60 ab bc 00 |.v.w.H...o.+`...| +00000040 5c 73 bc 0e 0d 58 |\s...X| +[3215 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3216 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3217 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3218 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[3219 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[321a 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[321b 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[321c 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[321d 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[321e 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[321f 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3220 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3221 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3222 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe040 gate 1598907125614713500 evaluation starts +[3223 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe040 signed by 0 principal evaluation starts (used [false]) +[3224 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe040 processing identity 0 with bytes of 115a4b0 +[3225 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe040 principal matched by identity 0 +[3226 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 82 9e 74 70 5f 69 da ef 58 05 f1 9d 10 2e d6 70 |..tp_i..X......p| +00000010 3a de 14 88 17 ee d0 42 51 d5 a6 46 8d f5 8c 3d |:......BQ..F...=| +[3227 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2a c0 56 b6 72 65 1b f5 d5 29 c0 a2 |0D. *.V.re...)..| +00000010 58 56 5c 65 a7 0b 2c 94 80 c5 ce 83 ac be f6 54 |XV\e..,........T| +00000020 2f 31 e3 48 02 20 5b 2a ae cd 07 ba a2 8e 32 f3 |/1.H. [*......2.| +00000030 dd 1c 0d 2d 4b c6 ed e9 22 79 c7 aa 01 3d 20 6f |...-K..."y...= o| +00000040 8b 81 64 ef ec 80 |..d...| +[3228 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe040 principal evaluation succeeds for identity 0 +[3229 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cbe040 gate 1598907125614713500 evaluation succeeds +[322a 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[322b 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[322c 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[322d 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[322e 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[322f 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3230 08-31 20:52:05.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3231 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1d 32 a5 08 5b 5d 36 89 0c 4a 22 07 f8 c0 bb af |.2..[]6..J".....| +00000010 81 5e c6 35 d5 0c 8f f9 28 5b 93 d5 1d 82 31 47 |.^.5....([....1G| +[3232 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6d 20 4b 9b 56 37 47 b1 a7 58 68 4a |0D. m K.V7G..XhJ| +00000010 2c a7 0e f2 23 b6 f7 9c c2 4f 95 09 80 b0 47 a0 |,...#....O....G.| +00000020 ca d7 85 94 02 20 27 8e 25 2e 24 47 56 b3 2a 69 |..... '.%.$GV.*i| +00000030 9d 97 17 a3 9e f6 07 c2 c3 cb a1 47 2f c5 b7 e2 |...........G/...| +00000040 b6 71 55 3e 43 08 |.qU>C.| +[3233 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3234 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3235 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3236 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3237 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af 10 07 8f e4 2b 02 2d 3e fc 47 48 d6 8f 49 ad |.....+.->.GH..I.| +00000010 f2 d8 41 ea bd 99 65 15 93 84 fb f2 3e 69 8d 88 |..A...e.....>i..| +[3238 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 43 ee 06 3e b8 e0 d4 82 23 2c 60 aa |0D. C..>....#,`.| +00000010 9d e7 9e 39 08 8f b3 1f 87 55 47 87 62 d9 88 a3 |...9.....UG.b...| +00000020 5f 1f ee 65 02 20 1d 6c fd 2c 4b 23 d7 eb bc 62 |_..e. .l.,K#...b| +00000030 be 76 b0 77 85 48 ce da cd 6f d0 2b 60 ab bc 00 |.v.w.H...o.+`...| +00000040 5c 73 bc 0e 0d 58 |\s...X| +[3239 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[323a 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[323b 08-31 20:52:05.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[323c 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[323d 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[323e 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[323f 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3240 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3241 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3242 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3243 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3244 08-31 20:52:05.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3245 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[3246 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[3247 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +[3248 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +[3249 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +00000040 86 ca 58 09 73 c4 |..X.s.| +[324a 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[324b 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[324c 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[324d 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[324e 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[324f 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3250 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3251 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3252 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91c90 gate 1598907125682547100 evaluation starts +[3253 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91c90 signed by 0 principal evaluation starts (used [false]) +[3254 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91c90 processing identity 0 with bytes of 115a4b0 +[3255 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91c90 principal matched by identity 0 +[3256 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +[3257 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +00000040 b8 e5 d0 6d 1c 3c |...m.<| +[3258 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91c90 principal evaluation succeeds for identity 0 +[3259 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003c91c90 gate 1598907125682547100 evaluation succeeds +[325a 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[325b 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[325c 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[325d 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[325e 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[325f 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3260 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3261 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3262 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3263 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3264 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3265 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3266 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfae90 gate 1598907125683299900 evaluation starts +[3267 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfae90 signed by 0 principal evaluation starts (used [false]) +[3268 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfae90 processing identity 0 with bytes of 115a4b0 +[3269 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfae90 principal matched by identity 0 +[326a 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +[326b 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +00000040 95 10 dc 3c 55 b0 |... DEBU 0xc003cfae90 principal evaluation succeeds for identity 0 +[326d 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003cfae90 gate 1598907125683299900 evaluation succeeds +[326e 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[326f 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3270 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3271 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3272 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +[3273 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +00000040 8d 22 17 b0 af d9 4b |."....K| +[3274 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3275 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3276 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3277 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3278 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3279 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14010 gate 1598907125684475700 evaluation starts +[327a 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14010 signed by 0 principal evaluation starts (used [false]) +[327b 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14010 processing identity 0 with bytes of 115a4b0 +[327c 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14010 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[327d 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14010 principal evaluation fails +[327e 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14010 gate 1598907125684475700 evaluation fails +[327f 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3280 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3281 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3282 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14580 gate 1598907125684852700 evaluation starts +[3283 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14580 signed by 0 principal evaluation starts (used [false]) +[3284 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14580 processing identity 0 with bytes of 115a4b0 +[3285 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14580 principal matched by identity 0 +[3286 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +[3287 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +00000040 8d 22 17 b0 af d9 4b |."....K| +[3288 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3289 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[328a 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14580 principal evaluation succeeds for identity 0 +[328b 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d14580 gate 1598907125684852700 evaluation succeeds +[328c 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes to 3 peers +[328d 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[328e 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[328f 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3290 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3291 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3292 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3293 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3294 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3295 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3296 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3297 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3298 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 780 bytes, Signature: 0 bytes +[3299 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[329a 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +[329b 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +00000040 86 ca 58 09 73 c4 |..X.s.| +[329c 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[329d 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[329e 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +[329f 08-31 20:52:05.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +00000040 b0 b6 9e bd e0 6f |.....o| +[32a0 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32a1 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32a2 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[32a3 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[32a4 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[32a5 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[32a6 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[32a7 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[32a8 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d367b0 gate 1598907125693416100 evaluation starts +[32a9 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d367b0 signed by 0 principal evaluation starts (used [false]) +[32aa 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d367b0 processing identity 0 with bytes of 115a4b0 +[32ab 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d367b0 principal matched by identity 0 +[32ac 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ab 56 bf e6 5f 4b 48 ed 15 3c 93 f6 22 e0 c2 b0 |.V.._KH..<.."...| +00000010 9c f3 b2 dc b5 cf b3 a2 85 9f 34 9e 72 c4 c9 c6 |..........4.r...| +[32ad 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 12 bc 7f 9e 53 e9 b2 e6 68 7f f8 0b |0D. ....S...h...| +00000010 ef 8a 15 2d e7 8e 2b 3d a6 07 bf 26 4f eb 06 c2 |...-..+=...&O...| +00000020 9b 9c 66 ef 02 20 05 20 ea c8 17 d6 23 80 72 43 |..f.. . ....#.rC| +00000030 c1 0b 0c 22 6d 29 ac 17 b1 e6 4c 76 85 70 ac 3c |..."m)....Lv.p.<| +00000040 95 10 dc 3c 55 b0 |... DEBU 0xc003d367b0 principal evaluation succeeds for identity 0 +[32af 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d367b0 gate 1598907125693416100 evaluation succeeds +[32b0 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[32b1 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[32b2 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[32b3 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[32b4 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32b5 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32b6 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[32b7 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[32b8 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[32b9 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[32ba 08-31 20:52:05.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[32bb 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[32bc 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d379b0 gate 1598907125700147700 evaluation starts +[32bd 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d379b0 signed by 0 principal evaluation starts (used [false]) +[32be 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d379b0 processing identity 0 with bytes of 115a4b0 +[32bf 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d379b0 principal matched by identity 0 +[32c0 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +[32c1 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +00000040 41 a3 44 15 ec f1 bb |A.D....| +[32c2 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d379b0 principal evaluation succeeds for identity 0 +[32c3 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d379b0 gate 1598907125700147700 evaluation succeeds +[32c4 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[32c5 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[32c6 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[32c7 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[32c8 08-31 20:52:05.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[32c9 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32ca 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[32cb 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[32cc 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[32cd 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[32ce 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[32cf 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d564f0 gate 1598907125712702600 evaluation starts +[32d0 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d564f0 signed by 0 principal evaluation starts (used [false]) +[32d1 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d564f0 processing identity 0 with bytes of 115a4b0 +[32d2 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d564f0 principal matched by identity 0 +[32d3 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +[32d4 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +00000040 41 a3 44 15 ec f1 bb |A.D....| +[32d5 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d564f0 principal evaluation succeeds for identity 0 +[32d6 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d564f0 gate 1598907125712702600 evaluation succeeds +[32d7 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[32d8 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[32d9 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[32da 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[32db 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[32dc 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 779 bytes, Signature: 0 bytes +[32dd 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32de 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 58 46 ad d5 56 6d ad ce e4 20 0c 83 78 7f 68 35 |XF..Vm... ..x.h5| +00000010 bc 31 ce dc 61 fa 08 7c ea 35 a0 61 de b0 db 4f |.1..a..|.5.a...O| +[32df 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 02 34 4b 3a 7a 31 b4 1d 7b b8 04 cc |0D. .4K:z1..{...| +00000010 93 39 df d6 d3 24 72 9e 9f 2d b6 47 72 9a 84 d5 |.9...$r..-.Gr...| +00000020 c0 43 1a 48 02 20 0d 4a 49 b2 c6 e6 5b 31 71 b4 |.C.H. .JI...[1q.| +00000030 05 77 6c 36 3e f5 d7 f7 1b 9a 4b af 5a 09 de e1 |.wl6>.....K.Z...| +00000040 86 ca 58 09 73 c4 |..X.s.| +[32e0 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0c b3 c9 51 46 1c 39 44 36 c1 18 59 27 01 1f 09 |...QF.9D6..Y'...| +00000010 95 f6 34 09 0f 12 7e f6 ff b5 d7 af b0 67 55 dc |..4...~......gU.| +[32e1 08-31 20:52:05.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 37 8c 5b 28 6d 55 be 94 47 56 68 |0D. .7.[(mU..GVh| +00000010 e4 55 07 d7 cd 1f 64 9d 3f ff f0 32 21 55 3a 59 |.U....d.?..2!U:Y| +00000020 e2 d3 66 fb 02 20 7b d4 32 4a 0d 26 ce 8d 43 35 |..f.. {.2J.&..C5| +00000030 3d 29 34 46 fb 67 13 36 cf 3f f9 66 88 3d 8c 4e |=)4F.g.6.?.f.=.N| +00000040 b0 b6 9e bd e0 6f |.....o| +[32e2 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32e3 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32e4 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[32e5 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[32e6 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[32e7 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[32e8 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[32e9 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[32ea 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d72720 gate 1598907125721071700 evaluation starts +[32eb 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d72720 signed by 0 principal evaluation starts (used [false]) +[32ec 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d72720 processing identity 0 with bytes of 115a4b0 +[32ed 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d72720 principal matched by identity 0 +[32ee 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 04 bf bf 42 d6 00 cc 11 f8 b6 75 2f 5c 1c bc d7 |...B......u/\...| +00000010 0a a3 ce eb 31 1b ea 53 5a 74 29 79 ae 15 9a 87 |....1..SZt)y....| +[32ef 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6a 63 2b 16 b2 62 79 a8 65 65 64 eb |0D. jc+..by.eed.| +00000010 00 99 a7 7f d3 3d 69 77 ad 6c 5b 74 22 a1 9b 58 |.....=iw.l[t"..X| +00000020 90 b4 3d 2e 02 20 73 61 87 b2 68 b6 35 e9 29 cb |..=.. sa..h.5.).| +00000030 04 20 52 ac 9e 78 c4 67 7d f9 75 ba 7a 00 b4 e8 |. R..x.g}.u.z...| +00000040 b8 e5 d0 6d 1c 3c |...m.<| +[32f0 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d72720 principal evaluation succeeds for identity 0 +[32f1 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d72720 gate 1598907125721071700 evaluation succeeds +[32f2 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[32f3 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[32f4 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[32f5 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[32f6 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32f7 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[32f8 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[32f9 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[32fa 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[32fb 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[32fc 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[32fd 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[32fe 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d73920 gate 1598907125726743100 evaluation starts +[32ff 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d73920 signed by 0 principal evaluation starts (used [false]) +[3300 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d73920 processing identity 0 with bytes of 115a4b0 +[3301 08-31 20:52:05.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d73920 principal matched by identity 0 +[3302 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +[3303 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +00000040 9c 30 13 97 0e fc |.0....| +[3304 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d73920 principal evaluation succeeds for identity 0 +[3305 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d73920 gate 1598907125726743100 evaluation succeeds +[3306 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3307 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3308 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3309 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[330a 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[330b 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[330c 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[330d 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[330e 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[330f 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3310 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d86460 gate 1598907125731466700 evaluation starts +[3311 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d86460 signed by 0 principal evaluation starts (used [false]) +[3312 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d86460 processing identity 0 with bytes of 115a4b0 +[3313 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d86460 principal matched by identity 0 +[3314 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +[3315 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +00000040 9c 30 13 97 0e fc |.0....| +[3316 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d86460 principal evaluation succeeds for identity 0 +[3317 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003d86460 gate 1598907125731466700 evaluation succeeds +[3318 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3319 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[331a 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[331b 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[331c 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[331d 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[331e 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +[331f 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +00000040 aa cd d6 30 b0 82 e3 |...0...| +[3320 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3321 08-31 20:52:05.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3322 08-31 20:52:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3323 08-31 20:52:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3324 08-31 20:52:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[3325 08-31 20:52:05.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3326 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3327 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[3328 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3329 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[332a 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[332b 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[332c 08-31 20:52:05.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[332d 08-31 20:52:05.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[332e 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[332f 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3330 08-31 20:52:05.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3331 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3332 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3333 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +[3334 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +00000040 8d 22 17 b0 af d9 4b |."....K| +[3335 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3336 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3337 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +[3338 08-31 20:52:05.94 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +00000040 8d 22 17 b0 af d9 4b |."....K| +[3339 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[333a 08-31 20:52:05.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[333b 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[333c 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[333d 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[333e 08-31 20:52:05.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[333f 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3340 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3341 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +[3342 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +00000040 8d 22 17 b0 af d9 4b |."....K| +[3343 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3344 08-31 20:52:06.01 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3345 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36872 +[3346 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003d94820 +[3347 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3348 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3349 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[334a 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[334b 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[334c 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 e8 fc 9e c8 58 2b e8 a4 2a 74 f4 e4 e5 90 bd |2....X+..*t.....| +00000010 6f ea c0 53 56 10 b7 89 04 ee 90 f1 53 7c a3 8f |o..SV.......S|..| +[334d 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 51 6c be 92 96 2e f8 65 a3 f4 |0E.!..Ql.....e..| +00000010 4d 35 57 83 f6 1d 31 cc 13 61 c7 ed 3f 9c a8 d5 |M5W...1..a..?...| +00000020 9d e7 43 ea 90 02 20 32 7d f2 e3 46 9b 9e 93 90 |..C... 2}..F....| +00000030 93 3f 74 49 d9 ba d2 00 e6 59 03 15 8a 0e ac 96 |.?tI.....Y......| +00000040 7d 8a 3e 1c f7 92 49 |}.>...I| +[334e 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[334f 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003b37420, header 0xc003d94c30 +[3350 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[3351 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][56716c61] processing txid: 56716c6173a161fcd343f3906acba073428ece07d80c8eba3888fc963cb28e46 +[3352 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [56716c6173a161fcd343f3906acba073428ece07d80c8eba3888fc963cb28e46] +[3353 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[3354 08-31 20:52:06.05 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [56716c6173a161fcd343f3906acba073428ece07d80c8eba3888fc963cb28e46] +[3355 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][56716c61] Entry chaincode: name:"lscc" +[3356 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][56716c61] Entry chaincode: name:"lscc" +[3357 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3358 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/ChaincodeExists +[3359 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[335a 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[335b 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[335c 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[335d 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddced0 gate 1598907126062830700 evaluation starts +[335e 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddced0 signed by 0 principal evaluation starts (used [false]) +[335f 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddced0 processing identity 0 with bytes of 115a4b0 +[3360 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddced0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3361 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddced0 principal evaluation fails +[3362 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddced0 gate 1598907126062830700 evaluation fails +[3363 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3364 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3365 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3366 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd440 gate 1598907126065692600 evaluation starts +[3367 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd440 signed by 0 principal evaluation starts (used [false]) +[3368 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd440 processing identity 0 with bytes of 115a4b0 +[3369 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd440 principal matched by identity 0 +[336a 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 e8 fc 9e c8 58 2b e8 a4 2a 74 f4 e4 e5 90 bd |2....X+..*t.....| +00000010 6f ea c0 53 56 10 b7 89 04 ee 90 f1 53 7c a3 8f |o..SV.......S|..| +[336b 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d1 51 6c be 92 96 2e f8 65 a3 f4 |0E.!..Ql.....e..| +00000010 4d 35 57 83 f6 1d 31 cc 13 61 c7 ed 3f 9c a8 d5 |M5W...1..a..?...| +00000020 9d e7 43 ea 90 02 20 32 7d f2 e3 46 9b 9e 93 90 |..C... 2}..F....| +00000030 93 3f 74 49 d9 ba d2 00 e6 59 03 15 8a 0e ac 96 |.?tI.....Y......| +00000040 7d 8a 3e 1c f7 92 49 |}.>...I| +[336c 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd440 principal evaluation succeeds for identity 0 +[336d 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ddd440 gate 1598907126065692600 evaluation succeeds +[336e 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[336f 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3370 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3371 08-31 20:52:06.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3372 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [56716c61] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[3373 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [56716c61] handling GET_STATE from chaincode +[3374 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [56716c61] getting state for chaincode lscc, key exp02, channel businesschannel +[3375 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[3376 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [56716c61] Completed GET_STATE. Sending RESPONSE +[3377 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [56716c61] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[3378 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [56716c61] notifying Txid:56716c6173a161fcd343f3906acba073428ece07d80c8eba3888fc963cb28e46, channelID:businesschannel +[3379 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[337a 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][56716c61] Exit chaincode: name:"lscc" (12ms) +[337b 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[337c 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [56716c6173a161fcd343f3906acba073428ece07d80c8eba3888fc963cb28e46] +[337d 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][56716c61] Exit +[337e 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][56716c61] Entry chaincode: name:"lscc" +[337f 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][56716c61] escc for chaincode name:"lscc" is escc +[3380 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 56716c6173a161fcd343f3906acba073428ece07d80c8eba3888fc963cb28e46, chaincode: lscc} +[3381 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A209918ADE5503D7FC7833E6D9A864B...455254494649434154452D2D2D2D2D0A +[3382 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 942653D2B584F184A4ACF1653554A49218DF3C6D5753E950E1D2FAF631D1EA4C +[3383 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 56716c6173a161fcd343f3906acba073428ece07d80c8eba3888fc963cb28e46, chaincode: lscc} +[3384 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][56716c61] Exit +[3385 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [56716c6173a161fcd343f3906acba073428ece07d80c8eba3888fc963cb28e46] +[3386 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36872 +[3387 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36872 grpc.code=OK grpc.call_duration=21.9862ms +[3388 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3389 08-31 20:52:06.07 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[338a 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[338b 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[338c 08-31 20:52:06.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[338d 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[338e 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[338f 08-31 20:52:06.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3390 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3391 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[3392 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3393 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3394 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3395 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3396 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3397 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3398 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3399 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3d80 gate 1598907126174129500 evaluation starts +[339a 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3d80 signed by 0 principal evaluation starts (used [false]) +[339b 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3d80 processing identity 0 with bytes of 115a4b0 +[339c 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3d80 principal matched by identity 0 +[339d 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +[339e 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +00000040 41 a3 44 15 ec f1 bb |A.D....| +[339f 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3d80 principal evaluation succeeds for identity 0 +[33a0 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003dc3d80 gate 1598907126174129500 evaluation succeeds +[33a1 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[33a2 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[33a3 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[33a4 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[33a5 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33a6 08-31 20:52:06.17 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33a7 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[33a8 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[33a9 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33aa 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[33ab 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[33ac 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[33ad 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[33ae 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[33af 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[33b0 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45190 gate 1598907126183548400 evaluation starts +[33b1 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45190 signed by 0 principal evaluation starts (used [false]) +[33b2 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45190 processing identity 0 with bytes of 115a4b0 +[33b3 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45190 principal matched by identity 0 +[33b4 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +[33b5 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +00000040 41 a3 44 15 ec f1 bb |A.D....| +[33b6 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45190 principal evaluation succeeds for identity 0 +[33b7 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e45190 gate 1598907126183548400 evaluation succeeds +[33b8 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[33b9 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[33ba 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[33bb 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[33bc 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[33bd 08-31 20:52:06.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[33be 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36876 +[33bf 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003e8e0a0 +[33c0 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[33c1 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[33c2 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[33c3 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[33c4 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[33c5 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 a0 b7 0f 2f 59 0d 1c e0 ba 62 db 85 1e e1 20 |..../Y....b.... | +00000010 73 36 b0 25 0f 53 69 90 fe 76 09 cf 8b 66 b9 7c |s6.%.Si..v...f.|| +[33c6 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 ce f7 ee 8e 9b 19 cd 91 81 52 |0E.!...........R| +00000010 08 06 33 93 26 de bd 25 3b 1e 96 fc a9 ef 55 47 |..3.&..%;.....UG| +00000020 68 b1 11 f5 0e 02 20 20 80 77 1c 84 2b 69 2b 20 |h..... .w..+i+ | +00000030 be 8e fb 23 61 0b 19 99 5d 9d 89 d1 0c 5c 0c 6b |...#a...]....\.k| +00000040 09 d6 9f f2 07 42 75 |.....Bu| +[33c7 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[33c8 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ad1f80, header 0xc003e8e4b0 +[33c9 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[33ca 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][db35a7ec] processing txid: db35a7ece469990b46ba41a885c4c0cae95fa6461125a349a4ad573225bbe5f8 +[33cb 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [db35a7ece469990b46ba41a885c4c0cae95fa6461125a349a4ad573225bbe5f8] +[33cc 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[33cd 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [db35a7ece469990b46ba41a885c4c0cae95fa6461125a349a4ad573225bbe5f8] +[33ce 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][db35a7ec] Entry chaincode: name:"lscc" +[33cf 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][db35a7ec] Entry chaincode: name:"lscc" +[33d0 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[33d1 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetDeploymentSpec +[33d2 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[33d3 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[33d4 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[33d5 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[33d6 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e930d0 gate 1598907126323084100 evaluation starts +[33d7 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e930d0 signed by 0 principal evaluation starts (used [false]) +[33d8 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e930d0 processing identity 0 with bytes of 115a4b0 +[33d9 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e930d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[33da 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e930d0 principal evaluation fails +[33db 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e930d0 gate 1598907126323084100 evaluation fails +[33dc 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[33dd 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[33de 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[33df 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e93640 gate 1598907126323949100 evaluation starts +[33e0 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e93640 signed by 0 principal evaluation starts (used [false]) +[33e1 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e93640 processing identity 0 with bytes of 115a4b0 +[33e2 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e93640 principal matched by identity 0 +[33e3 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 15 a0 b7 0f 2f 59 0d 1c e0 ba 62 db 85 1e e1 20 |..../Y....b.... | +00000010 73 36 b0 25 0f 53 69 90 fe 76 09 cf 8b 66 b9 7c |s6.%.Si..v...f.|| +[33e4 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 85 ce f7 ee 8e 9b 19 cd 91 81 52 |0E.!...........R| +00000010 08 06 33 93 26 de bd 25 3b 1e 96 fc a9 ef 55 47 |..3.&..%;.....UG| +00000020 68 b1 11 f5 0e 02 20 20 80 77 1c 84 2b 69 2b 20 |h..... .w..+i+ | +00000030 be 8e fb 23 61 0b 19 99 5d 9d 89 d1 0c 5c 0c 6b |...#a...]....\.k| +00000040 09 d6 9f f2 07 42 75 |.....Bu| +[33e5 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e93640 principal evaluation succeeds for identity 0 +[33e6 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003e93640 gate 1598907126323949100 evaluation succeeds +[33e7 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[33e8 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[33e9 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[33ea 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[33eb 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [db35a7ec] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[33ec 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [db35a7ec] handling GET_STATE from chaincode +[33ed 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [db35a7ec] getting state for chaincode lscc, key exp02, channel businesschannel +[33ee 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[33ef 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [db35a7ec] Completed GET_STATE. Sending RESPONSE +[33f0 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [db35a7ec] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[33f1 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [db35a7ec] notifying Txid:db35a7ece469990b46ba41a885c4c0cae95fa6461125a349a4ad573225bbe5f8, channelID:businesschannel +[33f2 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[33f3 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][db35a7ec] Exit chaincode: name:"lscc" (4ms) +[33f4 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[33f5 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [db35a7ece469990b46ba41a885c4c0cae95fa6461125a349a4ad573225bbe5f8] +[33f6 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][db35a7ec] Exit +[33f7 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][db35a7ec] Entry chaincode: name:"lscc" +[33f8 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][db35a7ec] escc for chaincode name:"lscc" is escc +[33f9 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: db35a7ece469990b46ba41a885c4c0cae95fa6461125a349a4ad573225bbe5f8, chaincode: lscc} +[33fa 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A201993BF853B06EC32B1AFCAD1110A...455254494649434154452D2D2D2D2D0A +[33fb 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 6EB2493F2E1FA3C0404602304C14436F8D87DF10F0BB05DC99694A030E64DC18 +[33fc 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: db35a7ece469990b46ba41a885c4c0cae95fa6461125a349a4ad573225bbe5f8, chaincode: lscc} +[33fd 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][db35a7ec] Exit +[33fe 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [db35a7ece469990b46ba41a885c4c0cae95fa6461125a349a4ad573225bbe5f8] +[33ff 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36876 +[3400 08-31 20:52:06.32 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36876 grpc.code=OK grpc.call_duration=8.2115ms +[3401 08-31 20:52:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:36876: read: connection reset by peer +[3402 08-31 20:52:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3403 08-31 20:52:06.33 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3404 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3405 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3406 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3407 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3408 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3409 08-31 20:52:06.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[340a 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[340b 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 70 bytes +[340c 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[340d 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[340e 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[340f 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3410 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3411 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3412 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3413 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede000 gate 1598907126423824100 evaluation starts +[3414 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede000 signed by 0 principal evaluation starts (used [false]) +[3415 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede000 processing identity 0 with bytes of 115a4b0 +[3416 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede000 principal matched by identity 0 +[3417 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +[3418 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +00000040 9c 30 13 97 0e fc |.0....| +[3419 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede000 principal evaluation succeeds for identity 0 +[341a 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003ede000 gate 1598907126423824100 evaluation succeeds +[341b 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[341c 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[341d 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[341e 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[341f 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3420 08-31 20:52:06.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3421 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36880 +[3422 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003e8f9f0 +[3423 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3424 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3425 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3426 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[3427 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3428 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 77 f3 b5 73 60 e6 e1 2b 56 24 06 3e f4 d4 35 |Ew..s`..+V$.>..5| +00000010 91 05 4d 1c 79 d5 d4 87 76 93 0c 89 7b eb 74 6a |..M.y...v...{.tj| +[3429 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 9c 12 fc b4 e5 d4 c1 a1 63 8a |0E.!..........c.| +00000010 7a 39 53 1d 5a 07 28 6f 67 f5 df e9 be d9 a1 17 |z9S.Z.(og.......| +00000020 28 6c 8b e4 f3 02 20 4d f6 9b d1 70 a9 67 09 d3 |(l.... M...p.g..| +00000030 af c9 a9 52 7c bc e4 77 bb c9 66 58 7b a7 9c 31 |...R|..w..fX{..1| +00000040 5e 2d d8 4f 2d f7 c1 |^-.O-..| +[342a 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[342b 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ea24d0, header 0xc003e8fe00 +[342c 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[342d 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][dd274571] processing txid: dd2745714853c43e29317f362cbd48b27477b29ae236e0a4c7bfaf13f02512e0 +[342e 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [dd2745714853c43e29317f362cbd48b27477b29ae236e0a4c7bfaf13f02512e0] +[342f 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[3430 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [dd2745714853c43e29317f362cbd48b27477b29ae236e0a4c7bfaf13f02512e0] +[3431 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][dd274571] Entry chaincode: name:"lscc" +[3432 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][dd274571] Entry chaincode: name:"lscc" +[3433 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3434 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetChaincodeData +[3435 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[3436 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3437 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3438 08-31 20:52:06.54 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3439 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f32c00 gate 1598907126550042800 evaluation starts +[343a 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f32c00 signed by 0 principal evaluation starts (used [false]) +[343b 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f32c00 processing identity 0 with bytes of 115a4b0 +[343c 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f32c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[343d 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f32c00 principal evaluation fails +[343e 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f32c00 gate 1598907126550042800 evaluation fails +[343f 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3440 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3441 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3442 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f33170 gate 1598907126550818600 evaluation starts +[3443 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f33170 signed by 0 principal evaluation starts (used [false]) +[3444 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f33170 processing identity 0 with bytes of 115a4b0 +[3445 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f33170 principal matched by identity 0 +[3446 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 45 77 f3 b5 73 60 e6 e1 2b 56 24 06 3e f4 d4 35 |Ew..s`..+V$.>..5| +00000010 91 05 4d 1c 79 d5 d4 87 76 93 0c 89 7b eb 74 6a |..M.y...v...{.tj| +[3447 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 90 9c 12 fc b4 e5 d4 c1 a1 63 8a |0E.!..........c.| +00000010 7a 39 53 1d 5a 07 28 6f 67 f5 df e9 be d9 a1 17 |z9S.Z.(og.......| +00000020 28 6c 8b e4 f3 02 20 4d f6 9b d1 70 a9 67 09 d3 |(l.... M...p.g..| +00000030 af c9 a9 52 7c bc e4 77 bb c9 66 58 7b a7 9c 31 |...R|..w..fX{..1| +00000040 5e 2d d8 4f 2d f7 c1 |^-.O-..| +[3448 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f33170 principal evaluation succeeds for identity 0 +[3449 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003f33170 gate 1598907126550818600 evaluation succeeds +[344a 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[344b 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[344c 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[344d 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[344e 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [dd274571] Fabric side handling ChaincodeMessage of type: GET_STATE in state ready +[344f 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [dd274571] handling GET_STATE from chaincode +[3450 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [dd274571] getting state for chaincode lscc, key exp02, channel businesschannel +[3451 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU GetState(). ns=lscc, key=exp02 +[3452 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [dd274571] Completed GET_STATE. Sending RESPONSE +[3453 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [dd274571] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[3454 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [dd274571] notifying Txid:dd2745714853c43e29317f362cbd48b27477b29ae236e0a4c7bfaf13f02512e0, channelID:businesschannel +[3455 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[3456 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][dd274571] Exit chaincode: name:"lscc" (4ms) +[3457 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[3458 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [dd2745714853c43e29317f362cbd48b27477b29ae236e0a4c7bfaf13f02512e0] +[3459 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][dd274571] Exit +[345a 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][dd274571] Entry chaincode: name:"lscc" +[345b 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][dd274571] escc for chaincode name:"lscc" is escc +[345c 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: dd2745714853c43e29317f362cbd48b27477b29ae236e0a4c7bfaf13f02512e0, chaincode: lscc} +[345d 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20D91120761BFE729A8A1D4FE88520...455254494649434154452D2D2D2D2D0A +[345e 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 90DD5C88FD4DDA23497AB69ABD268E8EFBAA98EBC443706D47D070AA8993901A +[345f 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: dd2745714853c43e29317f362cbd48b27477b29ae236e0a4c7bfaf13f02512e0, chaincode: lscc} +[3460 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][dd274571] Exit +[3461 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [dd2745714853c43e29317f362cbd48b27477b29ae236e0a4c7bfaf13f02512e0] +[3462 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36880 +[3463 08-31 20:52:06.55 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36880 grpc.code=OK grpc.call_duration=10.0123ms +[3464 08-31 20:52:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3465 08-31 20:52:06.56 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3466 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36884 +[3467 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003f34f00 +[3468 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3469 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[346a 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[346b 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[346c 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[346d 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 1a a3 54 75 12 55 1d 3f 10 bc 14 79 09 19 78 |...Tu.U.?...y..x| +00000010 6b a8 c8 36 b2 60 2c 2c 91 2d c3 d5 f9 45 98 fc |k..6.`,,.-...E..| +[346e 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 4c a8 c1 13 1e 38 55 6c 7e dd 13 |0D. HL....8Ul~..| +00000010 6d 19 ae c1 c6 1c 7a 73 f7 5a 01 f6 93 6d 69 36 |m.....zs.Z...mi6| +00000020 e1 30 a8 9a 02 20 4b 8d d0 d8 3c 8b 9a 01 bf 05 |.0... K...<.....| +00000030 39 1f ec 92 12 7d d4 e1 02 98 0b bd 21 8a cf 27 |9....}......!..'| +00000040 52 27 e5 88 3b 1e |R'..;.| +[346f 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3470 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ea29a0, header 0xc003f35310 +[3471 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[3472 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5cee7c51] processing txid: 5cee7c516122522850a820f8e2dc9d4bce8375cf872b117d790feb01976178b4 +[3473 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [5cee7c516122522850a820f8e2dc9d4bce8375cf872b117d790feb01976178b4] +[3474 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[3475 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [5cee7c516122522850a820f8e2dc9d4bce8375cf872b117d790feb01976178b4] +[3476 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5cee7c51] Entry chaincode: name:"lscc" +[3477 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5cee7c51] Entry chaincode: name:"lscc" +[3478 08-31 20:52:06.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3479 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e5 1a a3 54 75 12 55 1d 3f 10 bc 14 79 09 19 78 |...Tu.U.?...y..x| +00000010 6b a8 c8 36 b2 60 2c 2c 91 2d c3 d5 f9 45 98 fc |k..6.`,,.-...E..| +[347a 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 48 4c a8 c1 13 1e 38 55 6c 7e dd 13 |0D. HL....8Ul~..| +00000010 6d 19 ae c1 c6 1c 7a 73 f7 5a 01 f6 93 6d 69 36 |m.....zs.Z...mi6| +00000020 e1 30 a8 9a 02 20 4b 8d d0 d8 3c 8b 9a 01 bf 05 |.0... K...<.....| +00000030 39 1f ec 92 12 7d d4 e1 02 98 0b bd 21 8a cf 27 |9....}......!..'| +00000040 52 27 e5 88 3b 1e |R'..;.| +[347b 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU [5cee7c51] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[347c 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU [5cee7c51] notifying Txid:5cee7c516122522850a820f8e2dc9d4bce8375cf872b117d790feb01976178b4, channelID:businesschannel +[347d 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[347e 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][5cee7c51] Exit chaincode: name:"lscc" (2ms) +[347f 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[3480 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5cee7c516122522850a820f8e2dc9d4bce8375cf872b117d790feb01976178b4] +[3481 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5cee7c51] Exit +[3482 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5cee7c51] Entry chaincode: name:"lscc" +[3483 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5cee7c51] escc for chaincode name:"lscc" is escc +[3484 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 5cee7c516122522850a820f8e2dc9d4bce8375cf872b117d790feb01976178b4, chaincode: lscc} +[3485 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20569C9345DAF555408A4FBDD638CE...455254494649434154452D2D2D2D2D0A +[3486 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 9FAE9B2C08D241F4289535CC25DAE229403CF8D94F347361E3AF5B1F19E6883A +[3487 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 5cee7c516122522850a820f8e2dc9d4bce8375cf872b117d790feb01976178b4, chaincode: lscc} +[3488 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][5cee7c51] Exit +[3489 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [5cee7c516122522850a820f8e2dc9d4bce8375cf872b117d790feb01976178b4] +[348a 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36884 +[348b 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36884 grpc.code=OK grpc.call_duration=8.7433ms +[348c 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[348d 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:36884: read: connection reset by peer +[348e 08-31 20:52:06.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[348f 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36888 +[3490 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003fbe5a0 +[3491 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3492 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3493 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3494 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[3495 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3496 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 4b dc 69 3a 70 e3 9b ba ae d4 fe 49 40 df 74 |.K.i:p......I@.t| +00000010 f5 4d 1c 77 27 61 e7 dc 2e 70 5a f9 35 18 ec 9e |.M.w'a...pZ.5...| +[3497 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 a9 a7 5a 95 fc ba 93 01 ec 89 34 |0D. 8..Z.......4| +00000010 cd 31 9e a2 dc e5 c2 ac 18 c2 d6 24 a3 04 b2 8d |.1.........$....| +00000020 c7 c7 40 99 02 20 78 0a 85 6d 0b 22 18 4d 09 69 |..@.. x..m.".M.i| +00000030 97 d4 1d 88 ef 02 9b 6e 61 2a 2d 1e cb c4 9e ce |.......na*-.....| +00000040 75 fd 27 b2 e3 2b |u.'..+| +[3498 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3499 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ea2ee0, header 0xc003fbe9b0 +[349a 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"lscc" +[349b 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c2151b8f] processing txid: c2151b8f71c928893ff3b85aa6e51394cbe8ea916fed172463b5e58ddf295e1d +[349c 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [c2151b8f71c928893ff3b85aa6e51394cbe8ea916fed172463b5e58ddf295e1d] +[349d 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[349e 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [c2151b8f71c928893ff3b85aa6e51394cbe8ea916fed172463b5e58ddf295e1d] +[349f 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c2151b8f] Entry chaincode: name:"lscc" +[34a0 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c2151b8f] Entry chaincode: name:"lscc" +[34a1 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[34a2 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource lscc/GetInstantiatedChaincodes +[34a3 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[34a4 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[34a5 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[34a6 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[34a7 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fec4b0 gate 1598907126929679700 evaluation starts +[34a8 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fec4b0 signed by 0 principal evaluation starts (used [false]) +[34a9 08-31 20:52:06.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fec4b0 processing identity 0 with bytes of 115a4b0 +[34aa 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fec4b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[34ab 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fec4b0 principal evaluation fails +[34ac 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003fec4b0 gate 1598907126929679700 evaluation fails +[34ad 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[34ae 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[34af 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[34b0 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003feca20 gate 1598907126931768300 evaluation starts +[34b1 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003feca20 signed by 0 principal evaluation starts (used [false]) +[34b2 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003feca20 processing identity 0 with bytes of 115a4b0 +[34b3 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003feca20 principal matched by identity 0 +[34b4 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b4 4b dc 69 3a 70 e3 9b ba ae d4 fe 49 40 df 74 |.K.i:p......I@.t| +00000010 f5 4d 1c 77 27 61 e7 dc 2e 70 5a f9 35 18 ec 9e |.M.w'a...pZ.5...| +[34b5 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 38 a9 a7 5a 95 fc ba 93 01 ec 89 34 |0D. 8..Z.......4| +00000010 cd 31 9e a2 dc e5 c2 ac 18 c2 d6 24 a3 04 b2 8d |.1.........$....| +00000020 c7 c7 40 99 02 20 78 0a 85 6d 0b 22 18 4d 09 69 |..@.. x..m.".M.i| +00000030 97 d4 1d 88 ef 02 9b 6e 61 2a 2d 1e cb c4 9e ce |.......na*-.....| +00000040 75 fd 27 b2 e3 2b |u.'..+| +[34b6 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003feca20 principal evaluation succeeds for identity 0 +[34b7 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc003feca20 gate 1598907126931768300 evaluation succeeds +[34b8 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[34b9 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[34ba 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[34bb 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[34bc 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [c2151b8f] Fabric side handling ChaincodeMessage of type: GET_STATE_BY_RANGE in state ready +[34bd 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [c2151b8f] handling GET_STATE_BY_RANGE from chaincode +[34be 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x0, 0x1}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x0, 0x6c, 0x73, 0x63, 0x63, 0x1}] +[34bf 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Adding a result +[34c0 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got keys and values. Sending RESPONSE +[34c1 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [c2151b8f] Completed GET_STATE_BY_RANGE. Sending RESPONSE +[34c2 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [c2151b8f] Fabric side handling ChaincodeMessage of type: QUERY_STATE_CLOSE in state ready +[34c3 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [c2151b8f] handling QUERY_STATE_CLOSE from chaincode +[34c4 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [c2151b8f] Completed QUERY_STATE_CLOSE. Sending RESPONSE +[34c5 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [c2151b8f] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[34c6 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [c2151b8f] notifying Txid:c2151b8f71c928893ff3b85aa6e51394cbe8ea916fed172463b5e58ddf295e1d, channelID:businesschannel +[34c7 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[34c8 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][c2151b8f] Exit chaincode: name:"lscc" (10ms) +[34c9 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[34ca 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c2151b8f71c928893ff3b85aa6e51394cbe8ea916fed172463b5e58ddf295e1d] +[34cb 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c2151b8f] Exit +[34cc 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c2151b8f] Entry chaincode: name:"lscc" +[34cd 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c2151b8f] escc for chaincode name:"lscc" is escc +[34ce 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: c2151b8f71c928893ff3b85aa6e51394cbe8ea916fed172463b5e58ddf295e1d, chaincode: lscc} +[34cf 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20DF4175E6B3B790D9C2741C78F2F4...455254494649434154452D2D2D2D2D0A +[34d0 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E1A0ABD05DE6DF1E18C0ACA5FC17E5FF0D343B1A32937E70F127449886AA475A +[34d1 08-31 20:52:06.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: c2151b8f71c928893ff3b85aa6e51394cbe8ea916fed172463b5e58ddf295e1d, chaincode: lscc} +[34d2 08-31 20:52:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][c2151b8f] Exit +[34d3 08-31 20:52:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [c2151b8f71c928893ff3b85aa6e51394cbe8ea916fed172463b5e58ddf295e1d] +[34d4 08-31 20:52:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36888 +[34d5 08-31 20:52:06.94 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36888 grpc.code=OK grpc.call_duration=17.3837ms +[34d6 08-31 20:52:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[34d7 08-31 20:52:06.94 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[34d8 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36892 +[34d9 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc003fbf6d0 +[34da 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[34db 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[34dc 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[34dd 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[34de 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[34df 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 4f 6f ff cb 9a aa f8 77 e0 33 ef 37 8f ad 90 |.Oo.....w.3.7...| +00000010 da 9e 36 02 a3 a8 c6 7c fc ee 47 82 c1 24 12 0a |..6....|..G..$..| +[34e0 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 1f cf 76 b7 43 97 2b ab 14 ad |0E.!....v.C.+...| +00000010 3a 34 36 85 af 4c 3d ee a5 a9 12 10 58 f0 fa 47 |:46..L=.....X..G| +00000020 1d 5b ca a3 e9 02 20 2d 02 dc ee 68 b8 e7 c6 de |.[.... -...h....| +00000030 70 5d 43 2d 7c b0 29 66 bd 4c a0 6a 98 62 4e e5 |p]C-|.)f.L.j.bN.| +00000040 00 f7 51 40 4b d2 46 |..Q@K.F| +[34e1 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[34e2 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ea3420, header 0xc003fbfae0 +[34e3 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[34e4 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4e57ca63] processing txid: 4e57ca6355883f9de4e2bdd856260effc05c6255435f9201bbf04e8441849f9d +[34e5 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [4e57ca6355883f9de4e2bdd856260effc05c6255435f9201bbf04e8441849f9d] +[34e6 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4e57ca63] Entry chaincode: name:"qscc" +[34e7 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][4e57ca63] Entry chaincode: name:"qscc" +[34e8 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[34e9 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +[34ea 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +[34eb 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[34ec 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[34ed 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[34ee 08-31 20:52:07.33 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[34ef 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054d80 gate 1598907127339993700 evaluation starts +[34f0 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054d80 signed by 0 principal evaluation starts (used [false]) +[34f1 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054d80 processing identity 0 with bytes of 115a4b0 +[34f2 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054d80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[34f3 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054d80 principal evaluation fails +[34f4 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004054d80 gate 1598907127339993700 evaluation fails +[34f5 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[34f6 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[34f7 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[34f8 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040552f0 gate 1598907127340639400 evaluation starts +[34f9 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040552f0 signed by 0 principal evaluation starts (used [false]) +[34fa 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040552f0 processing identity 0 with bytes of 115a4b0 +[34fb 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040552f0 principal matched by identity 0 +[34fc 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 4f 6f ff cb 9a aa f8 77 e0 33 ef 37 8f ad 90 |.Oo.....w.3.7...| +00000010 da 9e 36 02 a3 a8 c6 7c fc ee 47 82 c1 24 12 0a |..6....|..G..$..| +[34fd 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d5 1f cf 76 b7 43 97 2b ab 14 ad |0E.!....v.C.+...| +00000010 3a 34 36 85 af 4c 3d ee a5 a9 12 10 58 f0 fa 47 |:46..L=.....X..G| +00000020 1d 5b ca a3 e9 02 20 2d 02 dc ee 68 b8 e7 c6 de |.[.... -...h....| +00000030 70 5d 43 2d 7c b0 29 66 bd 4c a0 6a 98 62 4e e5 |p]C-|.)f.L.j.bN.| +00000040 00 f7 51 40 4b d2 46 |..Q@K.F| +[34fe 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040552f0 principal evaluation succeeds for identity 0 +[34ff 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040552f0 gate 1598907127340639400 evaluation succeeds +[3500 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3501 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3502 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3503 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3504 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU [4e57ca63] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[3505 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU [4e57ca63] notifying Txid:4e57ca6355883f9de4e2bdd856260effc05c6255435f9201bbf04e8441849f9d, channelID:businesschannel +[3506 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[3507 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][4e57ca63] Exit chaincode: name:"qscc" (2ms) +[3508 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4e57ca63] Exit +[3509 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4e57ca63] Entry chaincode: name:"qscc" +[350a 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4e57ca63] escc for chaincode name:"qscc" is escc +[350b 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 4e57ca6355883f9de4e2bdd856260effc05c6255435f9201bbf04e8441849f9d, chaincode: qscc} +[350c 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A20D095FBC68ED0E8B61A0C596C1DD3...455254494649434154452D2D2D2D2D0A +[350d 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 7F0A520CEC1E9169A4A87FBB8B8F7200B5D91B84599E6E0FFE0776A3D2734580 +[350e 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 4e57ca6355883f9de4e2bdd856260effc05c6255435f9201bbf04e8441849f9d, chaincode: qscc} +[350f 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][4e57ca63] Exit +[3510 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36892 +[3511 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36892 grpc.code=OK grpc.call_duration=4.7573ms +[3512 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3513 08-31 20:52:07.34 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3514 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36896 +[3515 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc0040aea50 +[3516 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3517 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3518 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3519 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[351a 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[351b 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 b1 99 7c 77 71 65 bc 1b c3 cd ba 4d 39 4a 11 |G..|wqe.....M9J.| +00000010 07 94 1d fb 81 d3 d7 67 9d 52 5d 78 bc 49 87 04 |.......g.R]x.I..| +[351c 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 94 9c 86 7b c7 7d f1 72 97 df e8 |0D. f...{.}.r...| +00000010 42 dd 2e 6f 78 d8 b1 22 4d d8 19 64 eb 1f 90 a2 |B..ox.."M..d....| +00000020 43 0c bc 06 02 20 61 85 26 13 bf 36 49 9c da 82 |C.... a.&..6I...| +00000030 4a fd b9 2b 67 39 e2 e6 87 6a 2b 62 09 17 e3 8c |J..+g9...j+b....| +00000040 cf 76 69 fe 63 18 |.vi.c.| +[351d 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[351e 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc003ea3880, header 0xc0040aee60 +[351f 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[3520 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d1e7aa33] processing txid: d1e7aa33601650943f6b3e1229428b2a639b8ac3f18ca81c64731f2d2800a685 +[3521 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [d1e7aa33601650943f6b3e1229428b2a639b8ac3f18ca81c64731f2d2800a685] +[3522 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d1e7aa33] Entry chaincode: name:"qscc" +[3523 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][d1e7aa33] Entry chaincode: name:"qscc" +[3524 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3525 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetBlockByNumber on chain: businesschannel +[3526 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetBlockByNumber +[3527 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[3528 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3529 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[352a 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[352b 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bdc20 gate 1598907127518406100 evaluation starts +[352c 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bdc20 signed by 0 principal evaluation starts (used [false]) +[352d 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bdc20 processing identity 0 with bytes of 115a4b0 +[352e 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bdc20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[352f 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bdc20 principal evaluation fails +[3530 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0040bdc20 gate 1598907127518406100 evaluation fails +[3531 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3532 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3533 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3534 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004118190 gate 1598907127518807600 evaluation starts +[3535 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004118190 signed by 0 principal evaluation starts (used [false]) +[3536 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004118190 processing identity 0 with bytes of 115a4b0 +[3537 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004118190 principal matched by identity 0 +[3538 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 47 b1 99 7c 77 71 65 bc 1b c3 cd ba 4d 39 4a 11 |G..|wqe.....M9J.| +00000010 07 94 1d fb 81 d3 d7 67 9d 52 5d 78 bc 49 87 04 |.......g.R]x.I..| +[3539 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 66 94 9c 86 7b c7 7d f1 72 97 df e8 |0D. f...{.}.r...| +00000010 42 dd 2e 6f 78 d8 b1 22 4d d8 19 64 eb 1f 90 a2 |B..ox.."M..d....| +00000020 43 0c bc 06 02 20 61 85 26 13 bf 36 49 9c da 82 |C.... a.&..6I...| +00000030 4a fd b9 2b 67 39 e2 e6 87 6a 2b 62 09 17 e3 8c |J..+g9...j+b....| +00000040 cf 76 69 fe 63 18 |.vi.c.| +[353a 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004118190 principal evaluation succeeds for identity 0 +[353b 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004118190 gate 1598907127518807600 evaluation succeeds +[353c 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[353d 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[353e 08-31 20:52:07.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[353f 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3540 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveBlockByNumber() - blockNum = [2] +[3541 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU newBlockfileStream(): filePath=[/var/hyperledger/production/ledgersData/chains/chains/businesschannel/blockfile_000000], startOffset=[56675] +[3542 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU Remaining bytes=[40873], Going to peek [8] bytes +[3543 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU Returning blockbytes - length=[28202], placementInfo={fileNum=[0], startOffset=[56675], bytesOffset=[56678]} +[3544 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU [d1e7aa33] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[3545 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU [d1e7aa33] notifying Txid:d1e7aa33601650943f6b3e1229428b2a639b8ac3f18ca81c64731f2d2800a685, channelID:businesschannel +[3546 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[3547 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][d1e7aa33] Exit chaincode: name:"qscc" (5ms) +[3548 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d1e7aa33] Exit +[3549 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d1e7aa33] Entry chaincode: name:"qscc" +[354a 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d1e7aa33] escc for chaincode name:"qscc" is escc +[354b 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: d1e7aa33601650943f6b3e1229428b2a639b8ac3f18ca81c64731f2d2800a685, chaincode: qscc} +[354c 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A208599ABA728B09F1B4C14F33DC942...455254494649434154452D2D2D2D2D0A +[354d 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C854528D7203032B8A296434F93ECFC16680B9770B152CEBFC532C28FF2B5A4B +[354e 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: d1e7aa33601650943f6b3e1229428b2a639b8ac3f18ca81c64731f2d2800a685, chaincode: qscc} +[354f 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][d1e7aa33] Exit +[3550 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36896 +[3551 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36896 grpc.code=OK grpc.call_duration=7.532ms +[3552 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3553 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:36896: read: connection reset by peer +[3554 08-31 20:52:07.52 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3555 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36900 +[3556 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00402c960 +[3557 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3558 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3559 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[355a 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[355b 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[355c 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 2e c1 bc 73 b1 d9 c8 f6 0d 58 a4 46 87 59 18 |....s.....X.F.Y.| +00000010 5b ec 7e 8b 9c 4b 47 f5 eb b0 d9 da 15 9b 0b de |[.~..KG.........| +[355d 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 d8 bf 3d f1 a7 56 70 c4 44 53 ad |0D. q..=..Vp.DS.| +00000010 96 03 39 47 04 74 64 05 c9 ff 10 95 87 b7 c8 38 |..9G.td........8| +00000020 33 79 80 95 02 20 26 bf 74 1b c3 60 a0 d3 8d 78 |3y... &.t..`...x| +00000030 d2 e2 e6 84 44 9f 06 e7 05 63 28 be 6e 36 ed 10 |....D....c(.n6..| +00000040 a7 b3 26 94 73 8f |..&.s.| +[355e 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[355f 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00400e310, header 0xc00402cd70 +[3560 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[3561 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8ab9f882] processing txid: 8ab9f882c8efc65f7bf8ccc10b9fb72400ff6044eeb276be0d5cb1e51dd06403 +[3562 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [8ab9f882c8efc65f7bf8ccc10b9fb72400ff6044eeb276be0d5cb1e51dd06403] +[3563 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8ab9f882] Entry chaincode: name:"cscc" +[3564 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8ab9f882] Entry chaincode: name:"cscc" +[3565 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[3566 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetConfigBlock +[3567 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource cscc/GetConfigBlock +[3568 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[3569 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[356a 08-31 20:52:07.91 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[356b 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[356c 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004011e50 gate 1598907127920110100 evaluation starts +[356d 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004011e50 signed by 0 principal evaluation starts (used [false]) +[356e 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004011e50 processing identity 0 with bytes of 115a4b0 +[356f 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004011e50 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3570 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004011e50 principal evaluation fails +[3571 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004011e50 gate 1598907127920110100 evaluation fails +[3572 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3573 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3574 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3575 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d03c0 gate 1598907127920754300 evaluation starts +[3576 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d03c0 signed by 0 principal evaluation starts (used [false]) +[3577 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d03c0 processing identity 0 with bytes of 115a4b0 +[3578 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d03c0 principal matched by identity 0 +[3579 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 2e c1 bc 73 b1 d9 c8 f6 0d 58 a4 46 87 59 18 |....s.....X.F.Y.| +00000010 5b ec 7e 8b 9c 4b 47 f5 eb b0 d9 da 15 9b 0b de |[.~..KG.........| +[357a 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 71 d8 bf 3d f1 a7 56 70 c4 44 53 ad |0D. q..=..Vp.DS.| +00000010 96 03 39 47 04 74 64 05 c9 ff 10 95 87 b7 c8 38 |..9G.td........8| +00000020 33 79 80 95 02 20 26 bf 74 1b c3 60 a0 d3 8d 78 |3y... &.t..`...x| +00000030 d2 e2 e6 84 44 9f 06 e7 05 63 28 be 6e 36 ed 10 |....D....c(.n6..| +00000040 a7 b3 26 94 73 8f |..&.s.| +[357b 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d03c0 principal evaluation succeeds for identity 0 +[357c 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0041d03c0 gate 1598907127920754300 evaluation succeeds +[357d 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[357e 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[357f 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3580 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3581 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU [8ab9f882] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[3582 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU [8ab9f882] notifying Txid:8ab9f882c8efc65f7bf8ccc10b9fb72400ff6044eeb276be0d5cb1e51dd06403, channelID:businesschannel +[3583 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[3584 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][8ab9f882] Exit chaincode: name:"cscc" (3ms) +[3585 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8ab9f882] Exit +[3586 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8ab9f882] Entry chaincode: name:"cscc" +[3587 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8ab9f882] escc for chaincode name:"cscc" is escc +[3588 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: 8ab9f882c8efc65f7bf8ccc10b9fb72400ff6044eeb276be0d5cb1e51dd06403, chaincode: cscc} +[3589 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A206DCAF70A573A8AA93AB0A861A803...455254494649434154452D2D2D2D2D0A +[358a 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0EF91D50E248A1B498302A623ED4026F433A0413B4D3815B1DDE9A38D40EACDE +[358b 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: 8ab9f882c8efc65f7bf8ccc10b9fb72400ff6044eeb276be0d5cb1e51dd06403, chaincode: cscc} +[358c 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][8ab9f882] Exit +[358d 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36900 +[358e 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36900 grpc.code=OK grpc.call_duration=5.2333ms +[358f 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3590 08-31 20:52:07.92 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3591 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36904 +[3592 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00402ddb0 +[3593 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[3594 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3595 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3596 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[3597 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3598 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 3a 1e ab 06 7c d4 07 79 13 de d4 43 74 bd b9 |.:...|..y...Ct..| +00000010 96 df 4b 20 9d 22 30 80 fb d4 03 e7 70 c6 bb f9 |..K ."0.....p...| +[3599 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 0d 7f 9a 22 1e 1b 87 e6 60 f9 60 |0D. /..."....`.`| +00000010 f2 39 8a 6c 1b 01 11 8c ac fc d1 08 fd 6d 19 ed |.9.l.........m..| +00000020 67 4d 1b 45 02 20 14 af d9 81 91 4c fe dd 82 4d |gM.E. .....L...M| +00000030 8d 9f 68 53 c8 97 8d 02 f9 48 62 f0 f0 ef 6c 74 |..hS.....Hb...lt| +00000040 00 03 d5 54 af 8d |...T..| +[359a 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[359b 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00400e770, header 0xc00429e1e0 +[359c 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[359d 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e547306b] processing txid: e547306bf13a2744398c078227f797d756a0566d90a73d32cefdc86f6f5b1ed9 +[359e 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU retrieveTransactionByID() - txId = [e547306bf13a2744398c078227f797d756a0566d90a73d32cefdc86f6f5b1ed9] +[359f 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e547306b] Entry chaincode: name:"cscc" +[35a0 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e547306b] Entry chaincode: name:"cscc" +[35a1 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[35a2 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +[35a3 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a3 3a 1e ab 06 7c d4 07 79 13 de d4 43 74 bd b9 |.:...|..y...Ct..| +00000010 96 df 4b 20 9d 22 30 80 fb d4 03 e7 70 c6 bb f9 |..K ."0.....p...| +[35a4 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2f 0d 7f 9a 22 1e 1b 87 e6 60 f9 60 |0D. /..."....`.`| +00000010 f2 39 8a 6c 1b 01 11 8c ac fc d1 08 fd 6d 19 ed |.9.l.........m..| +00000020 67 4d 1b 45 02 20 14 af d9 81 91 4c fe dd 82 4d |gM.E. .....L...M| +00000030 8d 9f 68 53 c8 97 8d 02 f9 48 62 f0 f0 ef 6c 74 |..hS.....Hb...lt| +00000040 00 03 d5 54 af 8d |...T..| +[35a5 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU [e547306b] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[35a6 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU [e547306b] notifying Txid:e547306bf13a2744398c078227f797d756a0566d90a73d32cefdc86f6f5b1ed9, channelID:businesschannel +[35a7 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[35a8 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel][e547306b] Exit chaincode: name:"cscc" (1ms) +[35a9 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e547306b] Exit +[35aa 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e547306b] Entry chaincode: name:"cscc" +[35ab 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e547306b] escc for chaincode name:"cscc" is escc +[35ac 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endorsement for {plugin: escc, channel: businesschannel, tx: e547306bf13a2744398c078227f797d756a0566d90a73d32cefdc86f6f5b1ed9, chaincode: cscc} +[35ad 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A207D162BA32AD69B45A803103D2475...455254494649434154452D2D2D2D2D0A +[35ae 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 47D827293931F1DB0C30CEE6EE0DBB05DAAE1001BF631C415E00F9551511A370 +[35af 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting {plugin: escc, channel: businesschannel, tx: e547306bf13a2744398c078227f797d756a0566d90a73d32cefdc86f6f5b1ed9, chaincode: cscc} +[35b0 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel][e547306b] Exit +[35b1 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36904 +[35b2 08-31 20:52:08.09 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36904 grpc.code=OK grpc.call_duration=3.5879ms +[35b3 08-31 20:52:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[35b4 08-31 20:52:08.10 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[35b5 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[35b6 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[35b7 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[35b8 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D9816100F1801 +[35b9 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 47E4FAAE42F91C8B22F7E9B1D12B60BABBF90BA0538C28124F4F28ED072D6CF5 +[35ba 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[35bb 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35bc 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35bd 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35be 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35bf 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[35c0 08-31 20:52:08.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35c1 08-31 20:52:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35c2 08-31 20:52:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[35c3 08-31 20:52:08.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35c4 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[35c5 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[35c6 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[35c7 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35c8 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35c9 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35ca 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35cb 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35cc 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35cd 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[35ce 08-31 20:52:08.96 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35cf 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[35d0 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[35d1 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35d2 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[35d3 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[35d4 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35d5 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[35d6 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[35d7 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[35d8 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[35d9 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[35da 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[35db 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7030 gate 1598907129085575100 evaluation starts +[35dc 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7030 signed by 0 principal evaluation starts (used [false]) +[35dd 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7030 processing identity 0 with bytes of 115a4b0 +[35de 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7030 principal matched by identity 0 +[35df 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 cb 52 a0 a2 f6 de b7 15 19 d2 31 4d 82 0d 79 |..R........1M..y| +00000010 99 e7 0c 97 22 b0 e1 d0 79 bf 2d 9f 60 8f 9d cb |...."...y.-.`...| +[35e0 08-31 20:52:09.08 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 6d df 71 b4 35 38 08 9f e7 a0 |0E.!..m.q.58....| +00000010 de 81 34 e7 e9 91 39 0b f5 91 c5 d9 cc 09 34 16 |..4...9.......4.| +00000020 c7 cc 75 05 d6 02 20 3b d3 12 d9 a9 6f 2e 45 83 |..u... ;....o.E.| +00000030 75 66 75 c2 b4 c0 85 4e f5 0f 4b 08 00 0f aa 65 |ufu....N..K....e| +00000040 f5 c9 e8 c5 e9 88 8c |.......| +[35e1 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7030 principal evaluation succeeds for identity 0 +[35e2 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0042e7030 gate 1598907129085575100 evaluation succeeds +[35e3 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[35e4 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[35e5 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[35e6 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[35e7 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[35e8 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[35e9 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[35ea 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[35eb 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[35ec 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35ed 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35ee 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35ef 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[35f0 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35f1 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35f2 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[35f3 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[35f4 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\270\340\324\202#,`\252\235\347\2369\010\217\263\037\207UG\207b\331\210\243_\037\356e\002 \035l\375,K#\327\353\274b\276v\260w\205H\316\332\315o\320+`\253\274\000\\s\274\016\rX" > alive: alive: alive: +[35f5 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[35f6 08-31 20:52:09.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35f7 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[35f8 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[35f9 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[35fa 08-31 20:52:09.25 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35fb 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[35fc 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[35fd 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[35fe 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[35ff 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 f0 25 be b1 a9 b8 a2 4c ee 74 ba 53 5a 73 bd |..%.....L.t.SZs.| +00000010 cc 26 d3 03 49 c0 ea 6c 60 02 2e a5 ac bf 56 bc |.&..I..l`.....V.| +[3600 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 34 95 95 dd 93 d5 d3 09 4e 7c |0E.!..4.......N|| +00000010 47 80 d0 dd 35 b9 ad cd b7 f1 8e dd 28 0e 8f f9 |G...5.......(...| +00000020 07 17 f4 9b be 02 20 0f 5b 32 cb a3 4a 81 47 ec |...... .[2..J.G.| +00000030 4d fd ed 3d 64 4e c2 92 14 e4 4c ef 74 e3 1e 0d |M..=dN....L.t...| +00000040 ba 5a 6a 99 92 7c 40 |.Zj..|@| +[3601 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[3602 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 20 7d 3f 58 5c 72 9b 8a 36 d7 7a 80 |0D. }?X\r..6.z.| +00000010 60 29 24 e5 fd 4f ba 42 38 6f c6 71 b4 40 0d fd |`)$..O.B8o.q.@..| +00000020 bd 40 88 03 02 20 0f 22 fd 57 aa 0c 70 98 da 05 |.@... .".W..p...| +00000030 08 3b 9e 34 fb e7 7e 0d dc b2 b2 ca 11 0b cc c6 |.;.4..~.........| +00000040 e0 a2 e7 5e c8 a9 |...^..| +[3603 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[3604 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[3605 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3606 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3607 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[3608 08-31 20:52:09.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3609 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[360a 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[360b 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[360c 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[360d 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[360e 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[360f 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[3610 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[3611 08-31 20:52:09.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3612 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3613 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3614 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3615 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3616 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3617 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3618 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3619 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[361a 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[361b 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[361c 08-31 20:52:09.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[361d 08-31 20:52:09.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" > > , Envelope: 165 bytes, Signature: 0 bytes +[361e 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" > > , Envelope: 165 bytes, Signature: 0 bytes +[361f 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3620 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" > > , Envelope: 165 bytes, Signature: 0 bytes +[3621 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3622 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3623 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3624 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3625 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3626 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3627 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3628 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3629 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004343280 gate 1598907129502013100 evaluation starts +[362a 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004343280 signed by 0 principal evaluation starts (used [false]) +[362b 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004343280 processing identity 0 with bytes of 115a4b0 +[362c 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004343280 principal matched by identity 0 +[362d 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 64 4f 9f 3f 47 05 95 4c 76 9b 7e 67 42 75 e2 |kdO.?G..Lv.~gBu.| +00000010 18 b4 8b c8 5e 17 a9 b1 0c 4a 23 68 e1 a1 3c 58 |....^....J#h.. DEBU Verify: sig = 00000000 30 44 02 20 0f 51 8f 83 be 9f 3f ee c6 d8 d0 2e |0D. .Q....?.....| +00000010 37 b6 9d b1 c0 ae 81 b6 32 9b 15 fc a0 5a bc bd |7.......2....Z..| +00000020 d1 74 8d f6 02 20 22 77 6b 3e 04 16 45 93 9c 46 |.t... "wk>..E..F| +00000030 3c 2a 4e 79 3f 5f 8d ba 44 48 69 96 13 68 d3 b8 |<*Ny?_..DHi..h..| +00000040 f0 df e3 34 7a ba |...4z.| +[362f 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004343280 principal evaluation succeeds for identity 0 +[3630 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004343280 gate 1598907129502013100 evaluation succeeds +[3631 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3632 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3633 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3634 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3635 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3636 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3637 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3638 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3639 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[363a 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[363b 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[363c 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[363d 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[363e 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[363f 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3640 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3641 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[3642 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:\004\026E\223\234F<*Ny?_\215\272DHi\226\023h\323\270\360\337\3434z\272" > alive: alive: +[3643 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3644 08-31 20:52:09.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3645 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[3646 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[3647 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[3648 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[3649 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[364a 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[364b 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[364c 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[364d 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[364e 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[364f 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3650 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3651 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3652 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3653 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3654 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3655 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3656 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3657 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3658 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3659 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[365a 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[365b 08-31 20:52:09.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[365c 08-31 20:52:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[365d 08-31 20:52:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816102F +[365e 08-31 20:52:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E9064F122FCF2426DF5168231AB6C55A0810EDED8150A6973512B468CC9D22D7 +[365f 08-31 20:52:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3660 08-31 20:52:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3661 08-31 20:52:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3662 08-31 20:52:09.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:[\333\034\315" > > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[3663 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3664 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:[\333\034\315" > > > , Envelope: 271 bytes, Signature: 0 bytes +[3665 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3666 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[3667 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3668 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[3669 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[366a 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[366b 08-31 20:52:09.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[366d 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[366c 08-31 20:52:09.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[366e 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[366f 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3670 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3671 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[3672 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3673 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 06 4f 12 2f cf 24 26 df 51 68 23 1a b6 c5 5a |..O./.$&.Qh#...Z| +00000010 08 10 ed ed 81 50 a6 97 35 12 b4 68 cc 9d 22 d7 |.....P..5..h..".| +[3674 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 45 bc 61 d7 d7 cf 88 66 0b 98 16 |0D. pE.a....f...| +00000010 c0 92 8e 80 c2 1b 41 50 4d f4 ef b2 8e dd d8 49 |......APM......I| +00000020 26 4b c2 46 02 20 76 75 57 5d 83 f8 b2 a2 e4 e3 |&K.F. vuW]......| +00000030 ae f4 cb ca de 0f c0 1d 93 bc fe d7 68 e9 04 cc |............h...| +00000040 c7 2f 8b 38 64 c7 |./.8d.| +[3675 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[3676 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 d4 22 31 18 03 fb 8d fd d8 17 |0E.!..."1.......| +00000010 b8 50 28 72 db 1d 38 8f 39 d0 4a 8a 80 a1 47 aa |.P(r..8.9.J...G.| +00000020 9f b8 e0 7b eb 02 20 05 aa 79 3c b6 9c 2c 85 19 |...{.. ..y<..,..| +00000030 a0 fb c3 d4 61 81 65 ca d2 0d 29 3c a3 32 93 ed |....a.e...)<.2..| +00000040 22 f5 3e 5b db 1c cd |".>[...| +[3677 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[3678 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[3679 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[367a 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[367b 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[367d 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[367e 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[367c 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[367f 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3680 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3681 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3682 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3683 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3684 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3685 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004395880 gate 1598907129615290900 evaluation starts +[3686 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004395880 signed by 0 principal evaluation starts (used [false]) +[3687 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004395880 processing identity 0 with bytes of 115a4b0 +[3688 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004395880 principal matched by identity 0 +[3689 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 6b 64 4f 9f 3f 47 05 95 4c 76 9b 7e 67 42 75 e2 |kdO.?G..Lv.~gBu.| +00000010 18 b4 8b c8 5e 17 a9 b1 0c 4a 23 68 e1 a1 3c 58 |....^....J#h.. DEBU Verify: sig = 00000000 30 44 02 20 0f 51 8f 83 be 9f 3f ee c6 d8 d0 2e |0D. .Q....?.....| +00000010 37 b6 9d b1 c0 ae 81 b6 32 9b 15 fc a0 5a bc bd |7.......2....Z..| +00000020 d1 74 8d f6 02 20 22 77 6b 3e 04 16 45 93 9c 46 |.t... "wk>..E..F| +00000030 3c 2a 4e 79 3f 5f 8d ba 44 48 69 96 13 68 d3 b8 |<*Ny?_..DHi..h..| +00000040 f0 df e3 34 7a ba |...4z.| +[368b 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004395880 principal evaluation succeeds for identity 0 +[368c 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004395880 gate 1598907129615290900 evaluation succeeds +[368d 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[368e 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[368f 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3690 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3691 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3692 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3693 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3694 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 06 4f 12 2f cf 24 26 df 51 68 23 1a b6 c5 5a |..O./.$&.Qh#...Z| +00000010 08 10 ed ed 81 50 a6 97 35 12 b4 68 cc 9d 22 d7 |.....P..5..h..".| +[3695 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 45 bc 61 d7 d7 cf 88 66 0b 98 16 |0D. pE.a....f...| +00000010 c0 92 8e 80 c2 1b 41 50 4d f4 ef b2 8e dd d8 49 |......APM......I| +00000020 26 4b c2 46 02 20 76 75 57 5d 83 f8 b2 a2 e4 e3 |&K.F. vuW]......| +00000030 ae f4 cb ca de 0f c0 1d 93 bc fe d7 68 e9 04 cc |............h...| +00000040 c7 2f 8b 38 64 c7 |./.8d.| +[3696 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3697 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3698 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3699 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[369a 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[369b 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[369c 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 f0 25 be b1 a9 b8 a2 4c ee 74 ba 53 5a 73 bd |..%.....L.t.SZs.| +00000010 cc 26 d3 03 49 c0 ea 6c 60 02 2e a5 ac bf 56 bc |.&..I..l`.....V.| +[369d 08-31 20:52:09.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 34 95 95 dd 93 d5 d3 09 4e 7c |0E.!..4.......N|| +00000010 47 80 d0 dd 35 b9 ad cd b7 f1 8e dd 28 0e 8f f9 |G...5.......(...| +00000020 07 17 f4 9b be 02 20 0f 5b 32 cb a3 4a 81 47 ec |...... .[2..J.G.| +00000030 4d fd ed 3d 64 4e c2 92 14 e4 4c ef 74 e3 1e 0d |M..=dN....L.t...| +00000040 ba 5a 6a 99 92 7c 40 |.Zj..|@| +[369e 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[369f 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36a0 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36a1 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[36a2 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[36a3 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e9 06 4f 12 2f cf 24 26 df 51 68 23 1a b6 c5 5a |..O./.$&.Qh#...Z| +00000010 08 10 ed ed 81 50 a6 97 35 12 b4 68 cc 9d 22 d7 |.....P..5..h..".| +[36a4 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 70 45 bc 61 d7 d7 cf 88 66 0b 98 16 |0D. pE.a....f...| +00000010 c0 92 8e 80 c2 1b 41 50 4d f4 ef b2 8e dd d8 49 |......APM......I| +00000020 26 4b c2 46 02 20 76 75 57 5d 83 f8 b2 a2 e4 e3 |&K.F. vuW]......| +00000030 ae f4 cb ca de 0f c0 1d 93 bc fe d7 68 e9 04 cc |............h...| +00000040 c7 2f 8b 38 64 c7 |./.8d.| +[36a5 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[36a6 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[36a7 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36a8 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[36a9 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 02 f0 25 be b1 a9 b8 a2 4c ee 74 ba 53 5a 73 bd |..%.....L.t.SZs.| +00000010 cc 26 d3 03 49 c0 ea 6c 60 02 2e a5 ac bf 56 bc |.&..I..l`.....V.| +[36aa 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d4 34 95 95 dd 93 d5 d3 09 4e 7c |0E.!..4.......N|| +00000010 47 80 d0 dd 35 b9 ad cd b7 f1 8e dd 28 0e 8f f9 |G...5.......(...| +00000020 07 17 f4 9b be 02 20 0f 5b 32 cb a3 4a 81 47 ec |...... .[2..J.G.| +00000030 4d fd ed 3d 64 4e c2 92 14 e4 4c ef 74 e3 1e 0d |M..=dN....L.t...| +00000040 ba 5a 6a 99 92 7c 40 |.Zj..|@| +[36ab 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36ac 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[36ad 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36ae 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[36af 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36b0 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[36b1 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[36b2 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[36b3 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[36b4 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[36b5 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[36b6 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd1e0 gate 1598907129623062100 evaluation starts +[36b7 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd1e0 signed by 0 principal evaluation starts (used [false]) +[36b8 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd1e0 processing identity 0 with bytes of 115a4b0 +[36b9 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd1e0 principal matched by identity 0 +[36ba 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 98 cb 52 a0 a2 f6 de b7 15 19 d2 31 4d 82 0d 79 |..R........1M..y| +00000010 99 e7 0c 97 22 b0 e1 d0 79 bf 2d 9f 60 8f 9d cb |...."...y.-.`...| +[36bb 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b0 6d df 71 b4 35 38 08 9f e7 a0 |0E.!..m.q.58....| +00000010 de 81 34 e7 e9 91 39 0b f5 91 c5 d9 cc 09 34 16 |..4...9.......4.| +00000020 c7 cc 75 05 d6 02 20 3b d3 12 d9 a9 6f 2e 45 83 |..u... ;....o.E.| +00000030 75 66 75 c2 b4 c0 85 4e f5 0f 4b 08 00 0f aa 65 |ufu....N..K....e| +00000040 f5 c9 e8 c5 e9 88 8c |.......| +[36bc 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd1e0 principal evaluation succeeds for identity 0 +[36bd 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043cd1e0 gate 1598907129623062100 evaluation succeeds +[36be 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[36bf 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[36c0 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[36c1 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[36c2 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[36c3 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36c4 08-31 20:52:09.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36c5 08-31 20:52:09.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36c6 08-31 20:52:09.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36c7 08-31 20:52:09.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[36c8 08-31 20:52:09.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[36ca 08-31 20:52:09.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[36c9 08-31 20:52:09.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[36cb 08-31 20:52:09.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36cc 08-31 20:52:09.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36cd 08-31 20:52:09.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36ce 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[36cf 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[36d0 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36d1 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36d2 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36d3 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[36d4 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[36d5 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[36d6 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[36d7 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[36d8 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[36d9 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f2290 gate 1598907129686486900 evaluation starts +[36da 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f2290 signed by 0 principal evaluation starts (used [false]) +[36db 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f2290 processing identity 0 with bytes of 115a4b0 +[36dc 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f2290 principal matched by identity 0 +[36dd 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +[36de 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +00000040 9c 30 13 97 0e fc |.0....| +[36df 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f2290 principal evaluation succeeds for identity 0 +[36e0 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0043f2290 gate 1598907129686486900 evaluation succeeds +[36e1 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[36e2 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[36e3 08-31 20:52:09.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[36e4 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[36e5 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +[36e6 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +00000040 aa cd d6 30 b0 82 e3 |...0...| +[36e7 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[36e8 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +[36e9 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +00000040 8d 22 17 b0 af d9 4b |."....K| +[36ea 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36eb 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[36ec 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[36ed 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[36ee 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[36ef 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[36f0 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[36f1 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[36f2 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044142d0 gate 1598907129697710900 evaluation starts +[36f3 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044142d0 signed by 0 principal evaluation starts (used [false]) +[36f4 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044142d0 processing identity 0 with bytes of 115a4b0 +[36f5 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044142d0 principal matched by identity 0 +[36f6 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +[36f7 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +00000040 41 a3 44 15 ec f1 bb |A.D....| +[36f8 08-31 20:52:09.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044142d0 principal evaluation succeeds for identity 0 +[36f9 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044142d0 gate 1598907129697710900 evaluation succeeds +[36fa 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[36fb 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[36fc 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[36fd 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[36fe 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[36ff 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3700 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +[3701 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +00000040 8d 22 17 b0 af d9 4b |."....K| +[3702 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +[3703 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +00000040 aa cd d6 30 b0 82 e3 |...0...| +[3704 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3705 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3706 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3707 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3708 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3709 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[370a 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[370b 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[370c 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442a450 gate 1598907129708925200 evaluation starts +[370d 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442a450 signed by 0 principal evaluation starts (used [false]) +[370e 08-31 20:52:09.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442a450 processing identity 0 with bytes of 115a4b0 +[370f 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442a450 principal matched by identity 0 +[3710 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +[3711 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +00000040 9c 30 13 97 0e fc |.0....| +[3712 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442a450 principal evaluation succeeds for identity 0 +[3713 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442a450 gate 1598907129708925200 evaluation succeeds +[3714 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3715 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3716 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3717 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3718 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3719 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[371a 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[371b 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[371c 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[371d 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[371e 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[371f 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3720 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b650 gate 1598907129717852300 evaluation starts +[3721 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b650 signed by 0 principal evaluation starts (used [false]) +[3722 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b650 processing identity 0 with bytes of 115a4b0 +[3723 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b650 principal matched by identity 0 +[3724 08-31 20:52:09.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +[3725 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +00000040 41 a3 44 15 ec f1 bb |A.D....| +[3726 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b650 principal evaluation succeeds for identity 0 +[3727 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00442b650 gate 1598907129717852300 evaluation succeeds +[3728 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3729 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[372a 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[372b 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[372c 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[372d 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[372e 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[372f 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3730 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3731 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3732 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3733 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3734 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3735 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3736 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3737 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004448aa0 gate 1598907129728558700 evaluation starts +[3738 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004448aa0 signed by 0 principal evaluation starts (used [false]) +[3739 08-31 20:52:09.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004448aa0 processing identity 0 with bytes of 115a4b0 +[373a 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004448aa0 principal matched by identity 0 +[373b 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +[373c 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +00000040 41 a3 44 15 ec f1 bb |A.D....| +[373d 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004448aa0 principal evaluation succeeds for identity 0 +[373e 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004448aa0 gate 1598907129728558700 evaluation succeeds +[373f 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3740 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3741 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3742 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3743 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +[3744 08-31 20:52:09.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +00000040 aa cd d6 30 b0 82 e3 |...0...| +[3745 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +[3746 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +00000040 8d 22 17 b0 af d9 4b |."....K| +[3747 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3748 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3749 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[374a 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[374b 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[374c 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[374d 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[374e 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[374f 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446ca80 gate 1598907129745516400 evaluation starts +[3750 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446ca80 signed by 0 principal evaluation starts (used [false]) +[3751 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446ca80 processing identity 0 with bytes of 115a4b0 +[3752 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446ca80 principal matched by identity 0 +[3753 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +[3754 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +00000040 9c 30 13 97 0e fc |.0....| +[3755 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446ca80 principal evaluation succeeds for identity 0 +[3756 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00446ca80 gate 1598907129745516400 evaluation succeeds +[3757 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3758 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3759 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[375a 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[375b 08-31 20:52:09.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[375c 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[375d 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[375e 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[375f 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3760 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3761 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[3762 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3763 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3764 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3765 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 48 bytes, Signature: 0 bytes +[3766 08-31 20:52:09.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3767 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3768 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3769 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[376a 08-31 20:52:09.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[376b 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[376c 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[376d 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[376e 08-31 20:52:09.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[376f 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3770 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3771 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3772 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3773 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[3774 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3775 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3776 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3777 08-31 20:52:10.02 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3778 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3779 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[377a 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[377b 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448d0c0 gate 1598907130031354200 evaluation starts +[377c 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448d0c0 signed by 0 principal evaluation starts (used [false]) +[377d 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448d0c0 processing identity 0 with bytes of 115a4b0 +[377e 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448d0c0 principal matched by identity 0 +[377f 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 4c 7c 08 a4 94 c3 b5 ea c7 0d 64 6c e7 c3 24 df |L|........dl..$.| +00000010 99 6e 10 6e 61 e2 62 d3 ec e1 85 fb 8c 50 fe 89 |.n.na.b......P..| +[3780 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 49 7e 45 3d 5c 74 87 d9 bc 0c 1a |0D. ,I~E=\t.....| +00000010 13 ee 79 12 62 a4 ea 93 c8 0a ae e4 5b 81 b8 2f |..y.b.......[../| +00000020 b7 55 c1 07 02 20 75 cd 01 55 b3 bf e4 c5 06 34 |.U... u..U.....4| +00000030 bd 38 fd cb 52 48 08 b6 06 0d b6 a4 84 b0 9f 8d |.8..RH..........| +00000040 4e eb 2b a1 90 cc |N.+...| +[3781 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448d0c0 principal evaluation succeeds for identity 0 +[3782 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00448d0c0 gate 1598907130031354200 evaluation succeeds +[3783 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3784 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3785 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3786 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3787 08-31 20:52:10.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3788 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3789 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[378b 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[378c 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[378d 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[378e 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[378f 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3790 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[378a 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3791 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3792 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3793 08-31 20:52:10.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3794 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3795 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3796 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3797 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3798 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3799 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[379a 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[379b 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[379c 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[379d 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[379e 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[379f 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37a0 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37a1 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37a2 08-31 20:52:10.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37a3 08-31 20:52:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37a4 08-31 20:52:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37a5 08-31 20:52:10.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37a6 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[37a7 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[37a8 08-31 20:52:10.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37a9 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37aa 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37ab 08-31 20:52:10.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37ac 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37ad 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37ae 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37af 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[37b0 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 1a 64 11 3f c3 8d 28 fa 7e 8c 29 bb e8 69 72 |Q.d.?..(.~.)..ir| +00000010 c2 7c fa d0 15 71 24 71 48 38 16 3e 1a 87 45 a9 |.|...q$qH8.>..E.| +[37b1 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 33 27 2b ab 42 71 9b 91 52 60 15 30 |0D. 3'+.Bq..R`.0| +00000010 bd f8 5e 24 43 56 4a 86 6f b2 3b 2c 21 bb c9 92 |..^$CVJ.o.;,!...| +00000020 6a 32 d9 a1 02 20 7c 1a 38 39 03 75 8d 83 20 30 |j2... |.89.u.. 0| +00000030 c0 25 73 b2 03 da 95 ea 5d 16 2a c8 76 d6 9c fa |.%s.....].*.v...| +00000040 54 56 d3 3a ce cb |TV.:..| +[37b2 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37b3 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[37b4 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[37b5 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[37b6 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[37b7 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37b8 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37b9 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37ba 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37bb 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37bc 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37bd 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[37be 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37bf 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[37c0 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37c1 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37c2 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37c3 08-31 20:52:10.27 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37c4 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37c5 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37c6 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37c7 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37c8 08-31 20:52:10.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37c9 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37ca 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37cb 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37cc 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37cd 08-31 20:52:10.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37ce 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[37cf 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[37d0 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37d1 08-31 20:52:10.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37d2 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37d3 08-31 20:52:10.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37d4 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37d5 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37d6 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37d7 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37d8 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[37d9 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37da 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[37db 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[37dc 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[37dd 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[37de 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[37df 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[37e0 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e27f0 gate 1598907130432449800 evaluation starts +[37e1 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e27f0 signed by 0 principal evaluation starts (used [false]) +[37e2 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e27f0 processing identity 0 with bytes of 115a4b0 +[37e3 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e27f0 principal matched by identity 0 +[37e4 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e2 d6 b5 0a 35 7c 05 ec fa 46 2d fc 01 a1 62 dd |....5|...F-...b.| +00000010 e4 e2 99 8a 64 93 bd f5 88 d5 13 08 d0 a2 12 b7 |....d...........| +[37e5 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 15 7d 29 44 e5 60 46 db c4 93 d8 31 |0D. .})D.`F....1| +00000010 34 1c 07 ca 79 2a cb e9 ce b7 8d a6 43 d0 ac 50 |4...y*......C..P| +00000020 4c 9a e5 c0 02 20 6b af 68 b0 cb 56 b4 f6 98 a4 |L.... k.h..V....| +00000030 bc 9e 29 a1 5e 31 c0 80 ad e2 47 5a af f9 c2 79 |..).^1....GZ...y| +00000040 16 da 1a e2 02 40 |.....@| +[37e6 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e27f0 principal evaluation succeeds for identity 0 +[37e7 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0044e27f0 gate 1598907130432449800 evaluation succeeds +[37e8 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[37e9 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[37ea 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[37eb 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[37ec 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37ed 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[37ee 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[37ef 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[37f0 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[37f1 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37f2 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37f3 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[37f4 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37f5 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37f6 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37f7 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37f8 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37f9 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37fa 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37fb 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[37fc 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[37fd 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[37fe 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[37ff 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3800 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3801 08-31 20:52:10.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3802 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3803 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3804 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3805 08-31 20:52:10.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3806 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3807 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161030 +[3808 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 5B359ADD9F542E35D9EB408202E8A76D1410C62059E3E01DE447CF39F1C43B66 +[3809 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[380a 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[380b 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[380c 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[380d 08-31 20:52:10.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[380e 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[380f 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes to 1 peers +[3810 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3811 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3812 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3813 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3814 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3815 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3816 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3817 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3818 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3819 08-31 20:52:10.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[381a 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[381b 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[381c 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[381d 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[381e 08-31 20:52:10.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[381f 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3820 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3821 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3822 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3823 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3824 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3825 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3826 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3827 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3828 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[3829 08-31 20:52:12.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[382a 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[382b 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[382c 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[382d 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[382e 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[382f 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3830 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3831 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3832 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3833 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3834 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3835 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3836 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004517270 gate 1598907133094071300 evaluation starts +[3837 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004517270 signed by 0 principal evaluation starts (used [false]) +[3838 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004517270 processing identity 0 with bytes of 115a4b0 +[3839 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004517270 principal matched by identity 0 +[383a 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 5c a2 78 e0 1f 04 7e 3b 4f 8e b8 2b c1 1e af |Q\.x...~;O..+...| +00000010 06 66 70 37 7b a7 be 74 db 4c 83 18 71 e0 de 96 |.fp7{..t.L..q...| +[383b 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 59 0f 8f d3 2c 9f a8 ea 33 65 98 |0D. dY...,...3e.| +00000010 5d d4 d4 a8 74 a7 52 d2 5f 2c 06 5d 35 0a d0 59 |]...t.R._,.]5..Y| +00000020 6e 38 f0 42 02 20 7d f5 47 0a 5e ed 53 b1 f6 05 |n8.B. }.G.^.S...| +00000030 af e0 d7 06 d5 32 67 41 93 83 c4 06 e7 9d 18 31 |.....2gA.......1| +00000040 0e fe 14 61 d9 19 |...a..| +[383c 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004517270 principal evaluation succeeds for identity 0 +[383d 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004517270 gate 1598907133094071300 evaluation succeeds +[383e 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[383f 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3840 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3841 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3842 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3843 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3844 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3845 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3846 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3847 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3848 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3849 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[384a 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[384b 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[384c 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[384d 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[384e 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes to 1 peers +[384f 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[3850 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 645 bytes, Signature: 0 bytes +[3851 08-31 20:52:13.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3852 08-31 20:52:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3853 08-31 20:52:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3854 08-31 20:52:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3855 08-31 20:52:13.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3856 08-31 20:52:13.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[3857 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3858 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[3859 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[385a 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 27 bc e0 21 ac 9f 49 12 2b cb f7 70 85 98 71 |W'..!..I.+..p..q| +00000010 12 35 bd 3c 32 7c cc 4a 6e f0 0a dc c2 0c e9 e6 |.5.<2|.Jn.......| +[385b 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 21 fc 14 f8 3c 39 da 81 0f b6 |0E.!..!...<9....| +00000010 17 d5 a3 68 c7 e5 c4 03 fc 86 a5 b4 ec f8 54 d2 |...h..........T.| +00000020 d2 86 34 73 52 02 20 77 42 50 c8 3e 6b ff f9 75 |..4sR. wBP.>k..u| +00000030 a4 4b 8d 4f a8 db 54 d3 dd d3 bf 5c 87 26 8d 67 |.K.O..T....\.&.g| +00000040 01 c0 b7 05 c0 2a a2 |.....*.| +[385c 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[385d 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 37 29 a7 ba ae 3d 8a bc 03 5e fe ad |0D. 7)...=...^..| +00000010 70 3d f4 2a 4e cc f7 9f ea ee 08 56 28 74 46 bd |p=.*N......V(tF.| +00000020 d9 43 cb 02 02 20 26 7c 06 c0 3b 23 04 08 11 0a |.C... &|..;#....| +00000030 f4 3f 61 b3 fc a1 e4 07 75 1e 5e cf 5f 2f 7c 7e |.?a.....u.^._/|~| +00000040 48 82 29 3c e0 dc |H.)<..| +[385e 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[385f 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[3860 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3861 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3862 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3863 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3864 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3865 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3866 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[3867 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3868 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3869 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes to 1 peers +[386a 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" secret_envelope: > alive: +[386b 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[386c 08-31 20:52:13.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[386d 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[386e 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[386f 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3870 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3871 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3872 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3873 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3874 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3875 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3876 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[3877 08-31 20:52:13.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3878 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[3879 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[387a 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[387b 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[387c 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[387d 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[387e 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[387f 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3880 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3881 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3882 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3883 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3884 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454f680 gate 1598907133506299700 evaluation starts +[3885 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454f680 signed by 0 principal evaluation starts (used [false]) +[3886 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454f680 processing identity 0 with bytes of 115a4b0 +[3887 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454f680 principal matched by identity 0 +[3888 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 64 7e f1 14 ff 7a d5 17 09 62 b0 ee a6 f3 26 |.d~...z...b....&| +00000010 76 71 60 f0 e6 6e 2f 81 71 8a e5 72 12 24 f0 f4 |vq`..n/.q..r.$..| +[3889 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ca e1 de ed fe 90 29 a7 dd a3 |0E.!........)...| +00000010 d8 d7 99 68 c9 ea 25 46 b4 e2 f5 4b d1 07 e4 cb |...h..%F...K....| +00000020 b1 5c 45 19 cc 02 20 1b de fc ab b1 41 37 4a 60 |.\E... .....A7J`| +00000030 8e 23 cc fb d9 74 16 25 d0 b0 1b e1 f6 68 7c f6 |.#...t.%.....h|.| +00000040 5f a9 cd 66 bc 1d 77 |_..f..w| +[388a 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454f680 principal evaluation succeeds for identity 0 +[388b 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00454f680 gate 1598907133506299700 evaluation succeeds +[388c 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[388d 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[388e 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[388f 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3890 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3891 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3892 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3893 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3894 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3895 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3896 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3897 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3898 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[3899 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[389a 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[389b 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[389c 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes to 1 peers +[389d 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive:k\377\371u\244K\215O\250\333T\323\335\323\277\\\207&\215g\001\300\267\005\300*\242" > alive: +[389e 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[389f 08-31 20:52:13.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38a0 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[38a1 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[38a2 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[38a3 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[38a4 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[38a5 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[38a6 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[38a7 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38a8 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[38a9 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38aa 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[38ab 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38ac 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[38ad 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[38ae 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[38af 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38b0 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[38b1 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[38b2 08-31 20:52:13.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38b3 08-31 20:52:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[38b4 08-31 20:52:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[38b5 08-31 20:52:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[38b6 08-31 20:52:13.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38b7 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[38b8 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161031 +[38b9 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 1259DAF7DB4B11AE2EA3BF73620E99F3AAE82683F3CBAC1D7BFB5FAEAD42A8D9 +[38ba 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[38bb 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[38bc 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[38bd 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[38be 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38bf 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[38c0 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38c1 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[38c2 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[38c3 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38c4 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[38c5 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38c6 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[38c7 08-31 20:52:13.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38c8 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[38c9 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[38ca 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38cb 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[38cc 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[38cd 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 59 da f7 db 4b 11 ae 2e a3 bf 73 62 0e 99 f3 |.Y...K.....sb...| +00000010 aa e8 26 83 f3 cb ac 1d 7b fb 5f ae ad 42 a8 d9 |..&.....{._..B..| +[38ce 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 0e af 30 1c bb 42 56 cf 80 59 |0E.!....0..BV..Y| +00000010 ba 36 fe f0 69 9d b6 6d 0f b8 cf a3 5d 8d 02 60 |.6..i..m....]..`| +00000020 a5 85 1e 5e 6e 02 20 77 58 41 bc a4 ad 85 b9 1b |...^n. wXA......| +00000030 f5 e5 4f 19 90 f9 b4 dc 6c 49 15 5f c2 44 0d 88 |..O.....lI._.D..| +00000040 62 e2 03 69 56 23 93 |b..iV#.| +[38cf 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[38d0 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[38d1 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38d2 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[38d3 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 27 bc e0 21 ac 9f 49 12 2b cb f7 70 85 98 71 |W'..!..I.+..p..q| +00000010 12 35 bd 3c 32 7c cc 4a 6e f0 0a dc c2 0c e9 e6 |.5.<2|.Jn.......| +[38d4 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 21 fc 14 f8 3c 39 da 81 0f b6 |0E.!..!...<9....| +00000010 17 d5 a3 68 c7 e5 c4 03 fc 86 a5 b4 ec f8 54 d2 |...h..........T.| +00000020 d2 86 34 73 52 02 20 77 42 50 c8 3e 6b ff f9 75 |..4sR. wBP.>k..u| +00000030 a4 4b 8d 4f a8 db 54 d3 dd d3 bf 5c 87 26 8d 67 |.K.O..T....\.&.g| +00000040 01 c0 b7 05 c0 2a a2 |.....*.| +[38d5 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[38d6 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38d7 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[38d8 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[38d9 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[38da 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[38db 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[38dc 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[38dd 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[38de 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[38df 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7700 gate 1598907133602253900 evaluation starts +[38e0 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7700 signed by 0 principal evaluation starts (used [false]) +[38e1 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7700 processing identity 0 with bytes of 115a4b0 +[38e2 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7700 principal matched by identity 0 +[38e3 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 64 7e f1 14 ff 7a d5 17 09 62 b0 ee a6 f3 26 |.d~...z...b....&| +00000010 76 71 60 f0 e6 6e 2f 81 71 8a e5 72 12 24 f0 f4 |vq`..n/.q..r.$..| +[38e4 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[38e5 08-31 20:52:13.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab ca e1 de ed fe 90 29 a7 dd a3 |0E.!........)...| +00000010 d8 d7 99 68 c9 ea 25 46 b4 e2 f5 4b d1 07 e4 cb |...h..%F...K....| +00000020 b1 5c 45 19 cc 02 20 1b de fc ab b1 41 37 4a 60 |.\E... .....A7J`| +00000030 8e 23 cc fb d9 74 16 25 d0 b0 1b e1 f6 68 7c f6 |.#...t.%.....h|.| +00000040 5f a9 cd 66 bc 1d 77 |_..f..w| +[38e6 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7700 principal evaluation succeeds for identity 0 +[38e7 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0045d7700 gate 1598907133602253900 evaluation succeeds +[38e8 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[38e9 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[38ea 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[38eb 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[38ec 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[38ed 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38ee 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38ef 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[38f0 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38f1 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[38f2 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 59 da f7 db 4b 11 ae 2e a3 bf 73 62 0e 99 f3 |.Y...K.....sb...| +00000010 aa e8 26 83 f3 cb ac 1d 7b fb 5f ae ad 42 a8 d9 |..&.....{._..B..| +[38f3 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 0e af 30 1c bb 42 56 cf 80 59 |0E.!....0..BV..Y| +00000010 ba 36 fe f0 69 9d b6 6d 0f b8 cf a3 5d 8d 02 60 |.6..i..m....]..`| +00000020 a5 85 1e 5e 6e 02 20 77 58 41 bc a4 ad 85 b9 1b |...^n. wXA......| +00000030 f5 e5 4f 19 90 f9 b4 dc 6c 49 15 5f c2 44 0d 88 |..O.....lI._.D..| +00000040 62 e2 03 69 56 23 93 |b..iV#.| +[38f4 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[38f5 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab b5 ac f4 98 50 d7 bb 0d 69 e4 |0E.!......P...i.| +00000010 76 6a a8 11 45 32 bb b7 ea 81 33 9b 8a 07 69 e8 |vj..E2....3...i.| +00000020 1c 65 85 16 6d 02 20 40 f5 aa e3 e1 ed fa ce da |.e..m. @........| +00000030 c6 cf e0 83 4d af 21 8b d5 80 31 8c 88 7a b3 88 |....M.!...1..z..| +00000040 32 a0 e1 66 32 bd 8f |2..f2..| +[38f6 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[38f7 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[38f8 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38f9 08-31 20:52:13.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38fa 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[38fb 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[38fc 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[38fd 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[38fe 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[38ff 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 12 59 da f7 db 4b 11 ae 2e a3 bf 73 62 0e 99 f3 |.Y...K.....sb...| +00000010 aa e8 26 83 f3 cb ac 1d 7b fb 5f ae ad 42 a8 d9 |..&.....{._..B..| +[3900 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 0e af 30 1c bb 42 56 cf 80 59 |0E.!....0..BV..Y| +00000010 ba 36 fe f0 69 9d b6 6d 0f b8 cf a3 5d 8d 02 60 |.6..i..m....]..`| +00000020 a5 85 1e 5e 6e 02 20 77 58 41 bc a4 ad 85 b9 1b |...^n. wXA......| +00000030 f5 e5 4f 19 90 f9 b4 dc 6c 49 15 5f c2 44 0d 88 |..O.....lI._.D..| +00000040 62 e2 03 69 56 23 93 |b..iV#.| +[3901 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3902 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3903 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3904 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3905 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 57 27 bc e0 21 ac 9f 49 12 2b cb f7 70 85 98 71 |W'..!..I.+..p..q| +00000010 12 35 bd 3c 32 7c cc 4a 6e f0 0a dc c2 0c e9 e6 |.5.<2|.Jn.......| +[3906 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 21 fc 14 f8 3c 39 da 81 0f b6 |0E.!..!...<9....| +00000010 17 d5 a3 68 c7 e5 c4 03 fc 86 a5 b4 ec f8 54 d2 |...h..........T.| +00000020 d2 86 34 73 52 02 20 77 42 50 c8 3e 6b ff f9 75 |..4sR. wBP.>k..u| +00000030 a4 4b 8d 4f a8 db 54 d3 dd d3 bf 5c 87 26 8d 67 |.K.O..T....\.&.g| +00000040 01 c0 b7 05 c0 2a a2 |.....*.| +[3907 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3908 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3909 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[390a 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[390b 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[390c 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[390d 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[390e 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[390f 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3910 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3911 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046072d0 gate 1598907133622057800 evaluation starts +[3912 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046072d0 signed by 0 principal evaluation starts (used [false]) +[3913 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046072d0 processing identity 0 with bytes of 115a4b0 +[3914 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046072d0 principal matched by identity 0 +[3915 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 51 5c a2 78 e0 1f 04 7e 3b 4f 8e b8 2b c1 1e af |Q\.x...~;O..+...| +00000010 06 66 70 37 7b a7 be 74 db 4c 83 18 71 e0 de 96 |.fp7{..t.L..q...| +[3916 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 64 59 0f 8f d3 2c 9f a8 ea 33 65 98 |0D. dY...,...3e.| +00000010 5d d4 d4 a8 74 a7 52 d2 5f 2c 06 5d 35 0a d0 59 |]...t.R._,.]5..Y| +00000020 6e 38 f0 42 02 20 7d f5 47 0a 5e ed 53 b1 f6 05 |n8.B. }.G.^.S...| +00000030 af e0 d7 06 d5 32 67 41 93 83 c4 06 e7 9d 18 31 |.....2gA.......1| +00000040 0e fe 14 61 d9 19 |...a..| +[3917 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046072d0 principal evaluation succeeds for identity 0 +[3918 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046072d0 gate 1598907133622057800 evaluation succeeds +[3919 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[391a 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[391b 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[391c 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[391d 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[391e 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[391f 08-31 20:52:13.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3920 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3921 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3922 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[3923 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3924 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3925 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3926 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3927 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3928 08-31 20:52:13.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3929 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[392a 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[392b 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[392c 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[392d 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[392e 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[392f 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3930 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3931 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3932 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3933 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3934 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004623050 gate 1598907133681700800 evaluation starts +[3935 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004623050 signed by 0 principal evaluation starts (used [false]) +[3936 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004623050 processing identity 0 with bytes of 115a4b0 +[3937 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004623050 principal matched by identity 0 +[3938 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +[3939 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +00000040 9c 30 13 97 0e fc |.0....| +[393a 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004623050 principal evaluation succeeds for identity 0 +[393b 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004623050 gate 1598907133681700800 evaluation succeeds +[393c 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[393d 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[393e 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[393f 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3940 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +[3941 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +00000040 aa cd d6 30 b0 82 e3 |...0...| +[3942 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +[3943 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +00000040 8d 22 17 b0 af d9 4b |."....K| +[3944 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3945 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3946 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3947 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3948 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3949 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[394a 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[394b 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[394c 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004643030 gate 1598907133683180100 evaluation starts +[394d 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004643030 signed by 0 principal evaluation starts (used [false]) +[394e 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004643030 processing identity 0 with bytes of 115a4b0 +[394f 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004643030 principal matched by identity 0 +[3950 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +[3951 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3952 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +00000040 41 a3 44 15 ec f1 bb |A.D....| +[3953 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004643030 principal evaluation succeeds for identity 0 +[3954 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004643030 gate 1598907133683180100 evaluation succeeds +[3955 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3956 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3957 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3958 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3959 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[395a 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[395b 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +[395c 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +00000040 8d 22 17 b0 af d9 4b |."....K| +[395d 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +[395e 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +00000040 aa cd d6 30 b0 82 e3 |...0...| +[395f 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3960 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3961 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3962 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3963 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3964 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3965 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3966 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3967 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046631b0 gate 1598907133685141500 evaluation starts +[3968 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046631b0 signed by 0 principal evaluation starts (used [false]) +[3969 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046631b0 processing identity 0 with bytes of 115a4b0 +[396a 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046631b0 principal matched by identity 0 +[396b 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +[396c 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +00000040 9c 30 13 97 0e fc |.0....| +[396d 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046631b0 principal evaluation succeeds for identity 0 +[396e 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046631b0 gate 1598907133685141500 evaluation succeeds +[396f 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3970 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3971 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3972 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3973 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3974 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3975 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3976 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3977 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3978 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3979 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[397a 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[397b 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046823b0 gate 1598907133685956900 evaluation starts +[397c 08-31 20:52:13.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046823b0 signed by 0 principal evaluation starts (used [false]) +[397d 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046823b0 processing identity 0 with bytes of 115a4b0 +[397e 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046823b0 principal matched by identity 0 +[397f 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +[3980 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +00000040 41 a3 44 15 ec f1 bb |A.D....| +[3981 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046823b0 principal evaluation succeeds for identity 0 +[3982 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046823b0 gate 1598907133685956900 evaluation succeeds +[3983 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3984 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3985 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3986 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3987 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3988 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3989 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[398a 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[398b 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[398c 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[398d 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[398e 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[398f 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3990 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3991 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3992 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004683800 gate 1598907133692490100 evaluation starts +[3993 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004683800 signed by 0 principal evaluation starts (used [false]) +[3994 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004683800 processing identity 0 with bytes of 115a4b0 +[3995 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004683800 principal matched by identity 0 +[3996 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +[3997 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +00000040 41 a3 44 15 ec f1 bb |A.D....| +[3998 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004683800 principal evaluation succeeds for identity 0 +[3999 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004683800 gate 1598907133692490100 evaluation succeeds +[399a 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[399b 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[399c 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[399d 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[399e 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +[399f 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +00000040 aa cd d6 30 b0 82 e3 |...0...| +[39a0 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +[39a1 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +00000040 8d 22 17 b0 af d9 4b |."....K| +[39a2 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39a3 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39a4 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[39a5 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[39a6 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[39a7 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[39a8 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[39a9 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[39aa 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469f7e0 gate 1598907133693856500 evaluation starts +[39ab 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469f7e0 signed by 0 principal evaluation starts (used [false]) +[39ac 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469f7e0 processing identity 0 with bytes of 115a4b0 +[39ad 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469f7e0 principal matched by identity 0 +[39ae 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +[39af 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +00000040 9c 30 13 97 0e fc |.0....| +[39b0 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469f7e0 principal evaluation succeeds for identity 0 +[39b1 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00469f7e0 gate 1598907133693856500 evaluation succeeds +[39b2 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[39b3 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[39b4 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[39b5 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[39b6 08-31 20:52:13.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39b7 08-31 20:52:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[39b8 08-31 20:52:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[39b9 08-31 20:52:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[39ba 08-31 20:52:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610101801 +[39bb 08-31 20:52:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 20AF7D61E0F901E526F3E4D8280CC72657EAEAEDA0D454DE0C892B1FD4ADB0E8 +[39bc 08-31 20:52:13.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[39bd 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39be 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39bf 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39c0 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39c1 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[39c2 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39c3 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39c4 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[39c5 08-31 20:52:13.75 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39c6 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39c7 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39c8 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[39c9 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39ca 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39cb 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[39cc 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[39cd 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39ce 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +[39cf 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +[39d0 08-31 20:52:13.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39d1 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[39d2 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39d3 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39d4 08-31 20:52:13.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39d5 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[39d6 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[39d7 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[39d8 08-31 20:52:13.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39d9 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[39da 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[39db 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39dc 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39dd 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39de 08-31 20:52:14.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39df 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[39e0 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[39e1 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39e2 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39e3 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39e4 08-31 20:52:14.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39e5 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[39e6 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[39e7 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[39e8 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[39e9 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[39ea 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[39eb 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[39ec 08-31 20:52:15.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[39ed 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[39ee 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[39ef 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[39f0 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[39f1 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fe4b0 gate 1598907135040801000 evaluation starts +[39f2 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fe4b0 signed by 0 principal evaluation starts (used [false]) +[39f3 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fe4b0 processing identity 0 with bytes of 115a4b0 +[39f4 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fe4b0 principal matched by identity 0 +[39f5 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ff e3 09 84 f3 a2 0e a4 c9 6b 29 4a 9f a6 d7 c1 |.........k)J....| +00000010 fa 43 9a e5 c6 d1 66 47 34 7a 48 71 77 43 83 82 |.C....fG4zHqwC..| +[39f6 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 52 c6 39 30 34 23 76 dd 90 6f |0E.!..R.904#v..o| +00000010 99 a9 38 4b b8 01 c0 e2 7c ee 8e fe 2f ae e6 88 |..8K....|.../...| +00000020 bf f2 6b 81 92 02 20 67 41 a5 91 f2 38 4f ff a8 |..k... gA...8O..| +00000030 0e 43 54 c3 54 b0 67 20 0f b4 88 85 19 54 62 6b |.CT.T.g .....Tbk| +00000040 f8 18 2b cc 12 b9 6d |..+...m| +[39f7 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fe4b0 principal evaluation succeeds for identity 0 +[39f8 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0046fe4b0 gate 1598907135040801000 evaluation succeeds +[39f9 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[39fa 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[39fb 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[39fc 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[39fd 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[39fe 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[39ff 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3a00 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3a01 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3a02 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a03 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a04 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a05 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a06 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a07 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a08 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a09 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a0a 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a0b 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a0c 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a0d 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a0e 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a0f 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a10 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a11 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3a12 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a13 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3a14 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a15 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a16 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a17 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a18 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a19 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a1a 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a1b 08-31 20:52:15.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a1c 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3a1d 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a1e 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3a1f 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3a20 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ea 22 7d a8 75 eb 64 0c e8 bf 3b 87 b4 87 16 63 |."}.u.d...;....c| +00000010 c4 ab a7 84 58 2b f5 5f 87 74 1c 13 c0 1a 22 21 |....X+._.t...."!| +[3a21 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 06 b3 f2 a6 31 57 10 a9 ae e4 cb 9e |0D. ....1W......| +00000010 a5 8d 94 82 49 64 ac 44 14 43 74 02 5a 7a da 96 |....Id.D.Ct.Zz..| +00000020 eb 21 a5 40 02 20 58 52 e1 be 34 53 83 9a cc c7 |.!.@. XR..4S....| +00000030 2d a6 17 3b 30 7d 4e c7 83 9f 5e e4 c3 de 13 0e |-..;0}N...^.....| +00000040 79 35 3a 99 cd df |y5:...| +[3a22 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3a23 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3a24 08-31 20:52:15.28 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3a25 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3a27 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[3a28 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a29 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a26 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3a2a 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a2b 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3a2c 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a2d 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3a2e 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a2f 08-31 20:52:15.29 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a30 08-31 20:52:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a31 08-31 20:52:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a32 08-31 20:52:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3a33 08-31 20:52:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a34 08-31 20:52:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3a35 08-31 20:52:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3a36 08-31 20:52:15.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a37 08-31 20:52:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3a38 08-31 20:52:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3a39 08-31 20:52:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a3a 08-31 20:52:15.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3a3b 08-31 20:52:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3a3d 08-31 20:52:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a3c 08-31 20:52:15.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a3e 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a3f 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a40 08-31 20:52:15.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a41 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a42 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a43 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a44 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3a45 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a46 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3a47 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3a48 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3a49 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3a4a 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3a4b 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3a4c 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047445b0 gate 1598907135467109700 evaluation starts +[3a4d 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047445b0 signed by 0 principal evaluation starts (used [false]) +[3a4e 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047445b0 processing identity 0 with bytes of 115a4b0 +[3a4f 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047445b0 principal matched by identity 0 +[3a50 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 af b2 10 8a be 07 43 03 c5 53 59 74 3f 2b 84 bb |......C..SYt?+..| +00000010 eb 3f 1d 1e b1 3f 26 f7 1a 82 b3 69 0b 46 e5 11 |.?...?&....i.F..| +[3a51 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b6 84 cf 51 90 23 91 bd dc ab 79 |0E.!....Q.#....y| +00000010 3b 5d 3b e1 35 2f 28 9c 70 66 78 b3 34 c7 bc 50 |;];.5/(.pfx.4..P| +00000020 92 b4 0e 1b 03 02 20 58 37 d4 56 13 28 d1 3a 50 |...... X7.V.(.:P| +00000030 c6 d3 a3 6b 9a 18 12 c5 ae a9 af 46 7d e5 30 bc |...k.......F}.0.| +00000040 48 dc 90 2d 63 89 92 |H..-c..| +[3a52 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047445b0 principal evaluation succeeds for identity 0 +[3a53 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047445b0 gate 1598907135467109700 evaluation succeeds +[3a54 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3a55 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3a56 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3a57 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3a58 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a59 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3a5a 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3a5b 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3a5c 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3a5d 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a5e 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a5f 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a60 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a61 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a62 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a63 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a64 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a65 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a66 08-31 20:52:15.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a67 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a68 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a69 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a6a 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a6b 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a6c 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a6d 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3a6e 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a6f 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a70 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[3a71 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a72 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a73 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3a74 08-31 20:52:15.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a75 08-31 20:52:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3a76 08-31 20:52:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161032 +[3a77 08-31 20:52:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FD24C849EFC373D9C924288E37D6832FBE5DDD532DEBF41450232449AABBD220 +[3a78 08-31 20:52:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3a79 08-31 20:52:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3a7a 08-31 20:52:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3a7b 08-31 20:52:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[3a7c 08-31 20:52:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a7d 08-31 20:52:15.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a7e 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a7f 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3a80 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a81 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3a82 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3a83 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3a84 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a85 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3a86 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a87 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3a88 08-31 20:52:15.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a89 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3a8a 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3a8b 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3a8c 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a8d 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a8e 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a8f 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a90 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a91 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a92 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[3a93 08-31 20:52:16.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a94 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3a95 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3a96 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3a97 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3a98 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[3a99 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3a9a 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3a9b 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3a9c 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3a9d 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3a9e 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3a9f 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3aa0 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004772fc0 gate 1598907137095690400 evaluation starts +[3aa1 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004772fc0 signed by 0 principal evaluation starts (used [false]) +[3aa2 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004772fc0 processing identity 0 with bytes of 115a4b0 +[3aa3 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004772fc0 principal matched by identity 0 +[3aa4 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 22 75 ee d7 b7 5f ef ef 01 a6 d3 9f c4 26 19 |i"u..._.......&.| +00000010 dc 92 50 99 03 d9 71 4a 23 fa 01 75 71 b1 ba 7c |..P...qJ#..uq..|| +[3aa5 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 5c bc b9 d0 e9 32 c4 85 69 fd 8a |0D. .\....2..i..| +00000010 86 a2 14 bc 8f d4 11 6d f3 1b 94 0e ed e8 dc 12 |.......m........| +00000020 b1 d4 3a 0d 02 20 6a 63 7e ed 6d 99 28 6f 2e c0 |..:.. jc~.m.(o..| +00000030 e0 7e 50 e0 55 4c cf 50 1a ee 99 07 49 aa e3 ee |.~P.UL.P....I...| +00000040 43 44 ef 85 57 69 |CD..Wi| +[3aa6 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004772fc0 principal evaluation succeeds for identity 0 +[3aa7 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004772fc0 gate 1598907137095690400 evaluation succeeds +[3aa8 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3aa9 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3aaa 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3aab 08-31 20:52:17.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3aac 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3aad 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3aae 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3aaf 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3ab0 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3ab1 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ab2 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ab3 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ab4 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[3ab5 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ab6 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ab7 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ab8 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[3ab9 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3aba 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3abb 08-31 20:52:17.10 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[3abc 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3abd 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3abe 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3abf 08-31 20:52:17.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ac0 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[3ac1 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ac2 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[3ac3 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3ac4 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e0 5b ad 9b cf 6e 40 c0 f1 40 11 cb 74 25 eb |..[...n@..@..t%.| +00000010 c1 ba 77 23 51 12 91 bf 1f c3 b4 cd 49 6e bc 28 |..w#Q.......In.(| +[3ac5 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 11 9b 13 4b 9c 6c fc a8 d4 78 |0E.!.....K.l...x| +00000010 76 89 ae 84 b1 25 60 5c 18 f4 05 22 ef f7 5e 24 |v....%`\..."..^$| +00000020 da 0e 69 39 5d 02 20 33 c3 49 af 4c d1 cd 87 ad |..i9]. 3.I.L....| +00000030 c0 da 6c 1f 69 0c 99 cb 76 c8 42 6d 5e f6 4c e0 |..l.i...v.Bm^.L.| +00000040 d7 4d 22 89 0c ad 87 |.M"....| +[3ac6 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[3ac7 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c0 c6 67 15 31 52 79 be be e8 56 |0E.!...g.1Ry...V| +00000010 64 8c 19 3a 92 d4 b4 be 57 ac 5f f0 dd 35 77 83 |d..:....W._..5w.| +00000020 e0 04 72 7a 7c 02 20 01 06 42 09 26 6e 4f b0 4e |..rz|. ..B.&nO.N| +00000030 90 17 21 94 7b 7a 47 bf ab b8 c9 81 80 32 49 ad |..!.{zG......2I.| +00000040 95 c6 11 be 78 4b d4 |....xK.| +[3ac8 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[3ac9 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[3aca 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3acb 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3acc 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3acd 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ace 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3acf 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ad0 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[3ad1 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ad2 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ad3 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[3ad4 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[3ad5 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[3ad6 08-31 20:52:17.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ad7 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3ad8 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3ad9 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3ada 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3adb 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3adc 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3add 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ade 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3adf 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ae0 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[3ae1 08-31 20:52:17.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ae2 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3ae3 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3ae4 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ae5 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[3ae6 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3ae7 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ae8 08-31 20:52:17.49 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ae9 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3aea 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3aeb 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3aec 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3aed 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3aee 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cf120 gate 1598907137500386300 evaluation starts +[3aef 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cf120 signed by 0 principal evaluation starts (used [false]) +[3af0 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cf120 processing identity 0 with bytes of 115a4b0 +[3af1 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cf120 principal matched by identity 0 +[3af2 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a d6 45 b8 d3 22 dd e5 7e a8 88 56 61 c5 0c 0b |..E.."..~..Va...| +00000010 b2 c7 e3 7c ec b2 ab 8a a3 4b b3 50 99 fc cd f9 |...|.....K.P....| +[3af3 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a df 5d bf 7e 74 a9 28 a5 f6 2b be |0D. J.].~t.(..+.| +00000010 9c 6a 08 bc b8 9b cb c9 fa 11 1c a7 6b 8c d8 ff |.j..........k...| +00000020 35 76 a0 1b 02 20 32 4d 85 2d 6e 53 fc c7 18 7a |5v... 2M.-nS...z| +00000030 b7 d2 42 de 2a 9e 7a cf 2c 00 f6 b6 b4 2c 7c 02 |..B.*.z.,....,|.| +00000040 3d 3c f7 3d 17 da |=<.=..| +[3af4 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cf120 principal evaluation succeeds for identity 0 +[3af5 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0047cf120 gate 1598907137500386300 evaluation succeeds +[3af6 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3af7 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3af8 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3af9 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3afa 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3afb 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3afc 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3afd 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3afe 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3aff 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b00 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b01 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b02 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[3b03 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b04 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b05 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b06 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes to 1 peers +[3b07 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[3b08 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[3b09 08-31 20:52:17.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b0a 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[3b0b 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[3b0c 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[3b0d 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[3b0e 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[3b0f 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[3b10 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[3b11 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b12 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3b13 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b14 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[3b15 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b16 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3b17 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3b18 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[3b19 08-31 20:52:17.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b1a 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3b1b 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3b1c 08-31 20:52:17.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b1d 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3b1e 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3b1f 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[3b20 08-31 20:52:17.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b21 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3b22 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161033 +[3b23 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E6DA9559CED7FE407CA70A118B6D52832DBEB8A294B089D745A7E59AE9AFACB5 +[3b24 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3b25 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3b26 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3b27 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\362(\330/" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[3b28 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b29 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\362(\330/" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[3b2a 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b2b 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\362(\330/" > > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[3b2c 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\362(\330/" > > , Envelope: 165 bytes, Signature: 0 bytes +[3b2d 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b2e 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\362(\330/" secret_envelope: > > , Envelope: 271 bytes, Signature: 0 bytes +[3b2f 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b30 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\362(\330/" > > , Envelope: 165 bytes, Signature: 0 bytes +[3b31 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b32 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[3b33 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b34 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[3b35 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3b36 08-31 20:52:17.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 da 95 59 ce d7 fe 40 7c a7 0a 11 8b 6d 52 83 |...Y...@|....mR.| +00000010 2d be b8 a2 94 b0 89 d7 45 a7 e5 9a e9 af ac b5 |-.......E.......| +[3b37 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 2f 13 1a f1 c2 e8 a9 04 93 83 c5 |0D. A/..........| +00000010 2a 5c 62 67 80 5a 77 68 97 90 5d f1 44 b4 54 1e |*\bg.Zwh..].D.T.| +00000020 28 da c0 4c 02 20 31 cd ee 59 6c 01 74 19 e1 9e |(..L. 1..Yl.t...| +00000030 87 29 cf 3c 72 70 90 58 15 c2 3c 7f 85 47 fa 36 |.)..(./| +[3b38 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[3b39 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 84 bc d0 f7 c8 5e 81 96 33 f1 5a |0E.!......^..3.Z| +00000010 34 f5 bb 6b d7 e3 6b 57 50 73 60 0c 69 dc 53 f9 |4..k..kWPs`.i.S.| +00000020 8c bd f9 63 62 02 20 64 93 b7 84 37 92 c8 0e cf |...cb. d...7....| +00000030 5a 74 ea a8 dd c4 f8 b6 f9 b0 44 2f fd ea aa 10 |Zt........D/....| +00000040 ee 70 d3 79 07 04 b5 |.p.y...| +[3b3a 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[3b3b 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[3b3c 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b3d 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b3e 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3b3f 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3b40 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b41 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3b42 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3b43 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b44 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3b45 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3b46 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3b47 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3b48 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3b49 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3b4a 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483c2c0 gate 1598907137606775800 evaluation starts +[3b4b 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483c2c0 signed by 0 principal evaluation starts (used [false]) +[3b4c 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483c2c0 processing identity 0 with bytes of 115a4b0 +[3b4d 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483c2c0 principal matched by identity 0 +[3b4e 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1a d6 45 b8 d3 22 dd e5 7e a8 88 56 61 c5 0c 0b |..E.."..~..Va...| +00000010 b2 c7 e3 7c ec b2 ab 8a a3 4b b3 50 99 fc cd f9 |...|.....K.P....| +[3b4f 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4a df 5d bf 7e 74 a9 28 a5 f6 2b be |0D. J.].~t.(..+.| +00000010 9c 6a 08 bc b8 9b cb c9 fa 11 1c a7 6b 8c d8 ff |.j..........k...| +00000020 35 76 a0 1b 02 20 32 4d 85 2d 6e 53 fc c7 18 7a |5v... 2M.-nS...z| +00000030 b7 d2 42 de 2a 9e 7a cf 2c 00 f6 b6 b4 2c 7c 02 |..B.*.z.,....,|.| +00000040 3d 3c f7 3d 17 da |=<.=..| +[3b50 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483c2c0 principal evaluation succeeds for identity 0 +[3b51 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00483c2c0 gate 1598907137606775800 evaluation succeeds +[3b52 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3b53 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3b54 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3b55 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3b56 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3b57 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b58 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3b59 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 da 95 59 ce d7 fe 40 7c a7 0a 11 8b 6d 52 83 |...Y...@|....mR.| +00000010 2d be b8 a2 94 b0 89 d7 45 a7 e5 9a e9 af ac b5 |-.......E.......| +[3b5a 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 2f 13 1a f1 c2 e8 a9 04 93 83 c5 |0D. A/..........| +00000010 2a 5c 62 67 80 5a 77 68 97 90 5d f1 44 b4 54 1e |*\bg.Zwh..].D.T.| +00000020 28 da c0 4c 02 20 31 cd ee 59 6c 01 74 19 e1 9e |(..L. 1..Yl.t...| +00000030 87 29 cf 3c 72 70 90 58 15 c2 3c 7f 85 47 fa 36 |.)..(./| +[3b5b 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3b5c 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3b5d 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b5e 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3b5f 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e0 5b ad 9b cf 6e 40 c0 f1 40 11 cb 74 25 eb |..[...n@..@..t%.| +00000010 c1 ba 77 23 51 12 91 bf 1f c3 b4 cd 49 6e bc 28 |..w#Q.......In.(| +[3b60 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 11 9b 13 4b 9c 6c fc a8 d4 78 |0E.!.....K.l...x| +00000010 76 89 ae 84 b1 25 60 5c 18 f4 05 22 ef f7 5e 24 |v....%`\..."..^$| +00000020 da 0e 69 39 5d 02 20 33 c3 49 af 4c d1 cd 87 ad |..i9]. 3.I.L....| +00000030 c0 da 6c 1f 69 0c 99 cb 76 c8 42 6d 5e f6 4c e0 |..l.i...v.Bm^.L.| +00000040 d7 4d 22 89 0c ad 87 |.M"....| +[3b61 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3b62 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b63 08-31 20:52:17.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b64 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3b65 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3b66 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b67 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 647 bytes, Signature: 0 bytes +[3b68 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3b69 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e6 da 95 59 ce d7 fe 40 7c a7 0a 11 8b 6d 52 83 |...Y...@|....mR.| +00000010 2d be b8 a2 94 b0 89 d7 45 a7 e5 9a e9 af ac b5 |-.......E.......| +[3b6a 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 41 2f 13 1a f1 c2 e8 a9 04 93 83 c5 |0D. A/..........| +00000010 2a 5c 62 67 80 5a 77 68 97 90 5d f1 44 b4 54 1e |*\bg.Zwh..].D.T.| +00000020 28 da c0 4c 02 20 31 cd ee 59 6c 01 74 19 e1 9e |(..L. 1..Yl.t...| +00000030 87 29 cf 3c 72 70 90 58 15 c2 3c 7f 85 47 fa 36 |.)..(./| +[3b6b 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3b6c 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3b6d 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b6e 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3b6f 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e0 5b ad 9b cf 6e 40 c0 f1 40 11 cb 74 25 eb |..[...n@..@..t%.| +00000010 c1 ba 77 23 51 12 91 bf 1f c3 b4 cd 49 6e bc 28 |..w#Q.......In.(| +[3b70 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 11 9b 13 4b 9c 6c fc a8 d4 78 |0E.!.....K.l...x| +00000010 76 89 ae 84 b1 25 60 5c 18 f4 05 22 ef f7 5e 24 |v....%`\..."..^$| +00000020 da 0e 69 39 5d 02 20 33 c3 49 af 4c d1 cd 87 ad |..i9]. 3.I.L....| +00000030 c0 da 6c 1f 69 0c 99 cb 76 c8 42 6d 5e f6 4c e0 |..l.i...v.Bm^.L.| +00000040 d7 4d 22 89 0c ad 87 |.M"....| +[3b71 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3b72 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b73 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[3b74 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b75 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3b76 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3b77 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3b78 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3b79 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3b7a 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3b7b 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004853eb0 gate 1598907137615100100 evaluation starts +[3b7c 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004853eb0 signed by 0 principal evaluation starts (used [false]) +[3b7d 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004853eb0 processing identity 0 with bytes of 115a4b0 +[3b7e 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004853eb0 principal matched by identity 0 +[3b7f 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 22 75 ee d7 b7 5f ef ef 01 a6 d3 9f c4 26 19 |i"u..._.......&.| +00000010 dc 92 50 99 03 d9 71 4a 23 fa 01 75 71 b1 ba 7c |..P...qJ#..uq..|| +[3b80 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 5c bc b9 d0 e9 32 c4 85 69 fd 8a |0D. .\....2..i..| +00000010 86 a2 14 bc 8f d4 11 6d f3 1b 94 0e ed e8 dc 12 |.......m........| +00000020 b1 d4 3a 0d 02 20 6a 63 7e ed 6d 99 28 6f 2e c0 |..:.. jc~.m.(o..| +00000030 e0 7e 50 e0 55 4c cf 50 1a ee 99 07 49 aa e3 ee |.~P.UL.P....I...| +00000040 43 44 ef 85 57 69 |CD..Wi| +[3b81 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004853eb0 principal evaluation succeeds for identity 0 +[3b82 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004853eb0 gate 1598907137615100100 evaluation succeeds +[3b83 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3b84 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3b85 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3b86 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3b87 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3b88 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b89 08-31 20:52:17.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b8a 08-31 20:52:17.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b8b 08-31 20:52:17.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b8c 08-31 20:52:17.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[3b8e 08-31 20:52:17.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3b8f 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b90 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3b91 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b8d 08-31 20:52:17.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3b92 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3b93 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3b94 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +[3b95 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +00000040 8d 22 17 b0 af d9 4b |."....K| +[3b96 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +[3b97 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +00000040 aa cd d6 30 b0 82 e3 |...0...| +[3b98 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b99 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3b9a 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3b9b 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3b9c 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3b9d 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3b9e 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3b9f 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3ba0 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048924f0 gate 1598907137685054400 evaluation starts +[3ba1 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048924f0 signed by 0 principal evaluation starts (used [false]) +[3ba2 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048924f0 processing identity 0 with bytes of 115a4b0 +[3ba3 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048924f0 principal matched by identity 0 +[3ba4 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +[3ba5 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +00000040 9c 30 13 97 0e fc |.0....| +[3ba6 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048924f0 principal evaluation succeeds for identity 0 +[3ba7 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048924f0 gate 1598907137685054400 evaluation succeeds +[3ba8 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3ba9 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3baa 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3bab 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3bac 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bad 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bae 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3baf 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3bb0 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3bb1 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3bb2 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3bb3 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3bb4 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048936f0 gate 1598907137688478800 evaluation starts +[3bb5 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048936f0 signed by 0 principal evaluation starts (used [false]) +[3bb6 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048936f0 processing identity 0 with bytes of 115a4b0 +[3bb7 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048936f0 principal matched by identity 0 +[3bb8 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +[3bb9 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +00000040 41 a3 44 15 ec f1 bb |A.D....| +[3bba 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048936f0 principal evaluation succeeds for identity 0 +[3bbb 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048936f0 gate 1598907137688478800 evaluation succeeds +[3bbc 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3bbd 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3bbe 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3bbf 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3bc0 08-31 20:52:17.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3bc1 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3bc2 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3bc3 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bc4 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bc5 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bc6 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3bc7 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3bc8 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3bc9 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3bca 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3bcb 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3bcc 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b4310 gate 1598907137693752800 evaluation starts +[3bcd 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b4310 signed by 0 principal evaluation starts (used [false]) +[3bce 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b4310 processing identity 0 with bytes of 115a4b0 +[3bcf 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b4310 principal matched by identity 0 +[3bd0 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +[3bd1 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +00000040 9c 30 13 97 0e fc |.0....| +[3bd2 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b4310 principal evaluation succeeds for identity 0 +[3bd3 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048b4310 gate 1598907137693752800 evaluation succeeds +[3bd4 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3bd5 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3bd6 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3bd7 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3bd8 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3bd9 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +[3bda 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +00000040 aa cd d6 30 b0 82 e3 |...0...| +[3bdb 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +[3bdc 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +00000040 8d 22 17 b0 af d9 4b |."....K| +[3bdd 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bde 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bdf 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3be0 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3be1 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3be2 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3be3 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3be4 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3be5 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ce2f0 gate 1598907137698386800 evaluation starts +[3be6 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ce2f0 signed by 0 principal evaluation starts (used [false]) +[3be7 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ce2f0 processing identity 0 with bytes of 115a4b0 +[3be8 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ce2f0 principal matched by identity 0 +[3be9 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +[3bea 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +00000040 41 a3 44 15 ec f1 bb |A.D....| +[3beb 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ce2f0 principal evaluation succeeds for identity 0 +[3bec 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048ce2f0 gate 1598907137698386800 evaluation succeeds +[3bed 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3bee 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3bef 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3bf0 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3bf1 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3bf2 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[3bf3 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bf4 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bf5 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3bf6 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3bf7 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3bf8 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3bf9 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3bfa 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3bfb 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3bfc 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cf740 gate 1598907137699423800 evaluation starts +[3bfd 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cf740 signed by 0 principal evaluation starts (used [false]) +[3bfe 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cf740 processing identity 0 with bytes of 115a4b0 +[3bff 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cf740 principal matched by identity 0 +[3c00 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +[3c01 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +00000040 41 a3 44 15 ec f1 bb |A.D....| +[3c02 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cf740 principal evaluation succeeds for identity 0 +[3c03 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048cf740 gate 1598907137699423800 evaluation succeeds +[3c04 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3c05 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3c06 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3c07 08-31 20:52:17.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3c08 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +[3c09 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +00000040 aa cd d6 30 b0 82 e3 |...0...| +[3c0a 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +[3c0b 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +00000040 8d 22 17 b0 af d9 4b |."....K| +[3c0c 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c0d 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c0e 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3c0f 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3c10 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3c11 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3c12 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3c13 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3c14 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e9720 gate 1598907137706575900 evaluation starts +[3c15 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e9720 signed by 0 principal evaluation starts (used [false]) +[3c16 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e9720 processing identity 0 with bytes of 115a4b0 +[3c17 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e9720 principal matched by identity 0 +[3c18 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +[3c19 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +00000040 9c 30 13 97 0e fc |.0....| +[3c1a 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e9720 principal evaluation succeeds for identity 0 +[3c1b 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0048e9720 gate 1598907137706575900 evaluation succeeds +[3c1c 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3c1d 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3c1e 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3c1f 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3c20 08-31 20:52:17.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c21 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c22 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c23 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[3c24 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c25 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c26 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[3c27 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[3c28 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c29 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +[3c2a 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 49 bytes, Signature: 0 bytes +[3c2b 08-31 20:52:17.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c2c 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3c2d 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c2e 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c2f 08-31 20:52:17.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c30 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3c31 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[3c32 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [5 1 2 3 4] to 172.18.0.8:54002 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3c33 08-31 20:52:17.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c34 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3c35 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3c36 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c37 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c38 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c39 08-31 20:52:18.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c3a 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3c3b 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[3c3c 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c3d 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c3e 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c3f 08-31 20:52:18.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c40 08-31 20:52:18.74 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[3c41 08-31 20:52:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[3c42 08-31 20:52:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3c43 08-31 20:52:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610111801 +[3c44 08-31 20:52:18.75 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 3B1B63190DBB5D2190F38D81472897477D17B3DEC5AD01463486B10985BDB96F +[3c45 08-31 20:52:18.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[3c46 08-31 20:52:18.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c47 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c48 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c49 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c4a 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[3c4b 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c4c 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[3c4d 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3c4e 08-31 20:52:18.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c4f 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3c50 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Got block validation policy for channel [businesschannel] with flag [true] +[3c51 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation == +[3c52 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3c53 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers == +[3c54 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492e530 gate 1598907139393850900 evaluation starts +[3c55 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492e530 signed by 0 principal evaluation starts (used [false]) +[3c56 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492e530 processing identity 0 with bytes of 115a4b0 +[3c57 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492e530 principal matched by identity 0 +[3c58 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 56 31 5f 42 ab c1 88 47 d7 5c e3 57 9c b2 4a a9 |V1_B...G.\.W..J.| +00000010 c7 3d 74 e2 1b 6b f5 64 fc 8f fe d9 3b 04 0c 9b |.=t..k.d....;...| +[3c59 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4b 71 4a d0 06 df 4f ae e8 1d 8c 46 |0D. KqJ...O....F| +00000010 e2 2e 17 30 72 48 e6 56 24 87 15 73 86 50 5f 1a |...0rH.V$..s.P_.| +00000020 34 03 0e f8 02 20 64 d6 50 26 22 c3 4b f8 73 fa |4.... d.P&".K.s.| +00000030 1b d8 f5 80 26 90 8f c4 63 ec f9 e8 c4 b8 4a d2 |....&...c.....J.| +00000040 99 25 90 f7 6e a5 |.%..n.| +[3c5a 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492e530 principal evaluation succeeds for identity 0 +[3c5b 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00492e530 gate 1598907139393850900 evaluation succeeds +[3c5c 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/OrdererOrg/Writers +[3c5d 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Orderer/OrdererOrg/Writers +[3c5e 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Orderer/BlockValidation +[3c5f 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Orderer/BlockValidation +[3c60 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +[3c61 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding payload to local buffer, blockNum = [6] +[3c62 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Blocks payloads buffer size for channel [businesschannel] is 1 blocks +[3c63 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Gossiping block [6], peers number [3] +[3c64 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41188 bytes, seq: 6}, Envelope: 41221 bytes, Signature: 0 bytes to the block puller +[3c65 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Added 6, total items: 6 +[3c66 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Ready to transfer payloads (blocks) to the ledger, next block number is = [6] +[3c67 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Transferring block [6] with 1 transaction(s) to the ledger +[3c68 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Received block [6] from buffer +[3c69 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating block [6] +[3c6a 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] START Block Validation for block [6] +[3c6b 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU expecting 1 block validation responses +[3c6c 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx starts for block 0xc0046fb640 env 0xc0048e14f0 txn 0 +[3c6d 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateTransactionEnvelope starts for envelope 0xc0048e14f0 +[3c6e 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Header is channel_header:"\010\001\032\006\010\203\306\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\350c\034\327\214\356\327|\351\320\253\304j\r0\333\310\276\276\324\377\007\237t" +[3c6f 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 1 +[3c70 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[3c71 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Returning existing manager for channel 'businesschannel' +[3c72 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3c73 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICHzCCAcagAwIBAgIRAMn7qlgFsm5Fgf1nCwzkNmMwCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGsxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRAwDgYDVQQLEwdvcmRlcmVyMR0wGwYDVQQDExRvcmRlcmVyMC5leGFtcGxl +LmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABLs9md+OWM+yyDfdtG7j3YPt +2PmfAqYGKv/aWg97LVUsivwM2EfEBznAY1itOQ9saFPa/6b5E5sTdJ8hOWdGB6aj +TTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1UdIwQkMCKAIG5R +MUg8d/DSeI13KleTU6VPMqCzB2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQC +IAL39dmJ3fjOcTbRp2haVEFYZTdkuhl92/0o9FvwzH5JAiBYRMr0bWD00thP0giN +WJ3lSBQ/BUZnxtqUKZb5f082AQ== +-----END CERTIFICATE----- +[3c74 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{OrdererMSP a888a9669f85c95b88e25d16f12db8d8742ff079ff93ca960e399e4e7b9764d2} +[3c75 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP validating identity +[3c76 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU MSP OrdererMSP getting certification chain +[3c77 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[3c78 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 70 91 49 22 67 d4 21 5a c5 5d ba b6 53 95 4a 0e |p.I"g.!Z.]..S.J.| +00000010 ee fd 0a 4b 0b b3 b0 39 d0 4f 7a 03 2f 68 d7 2b |...K...9.Oz./h.+| +[3c79 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 0b 0e 7b 4c 2d fb 5c 6a 92 7b 58 8b |0D. ..{L-.\j.{X.| +00000010 0a 94 e5 5d d9 f6 e0 78 df 56 82 b4 e5 6a e7 97 |...]...x.V...j..| +00000020 4a d7 3d d0 02 20 37 8c 68 5f 50 c0 44 97 70 a1 |J.=.. 7.h_P.D.p.| +00000030 6d 73 fc 0e d0 ba 0e f6 ad 2a 7d 93 67 93 90 59 |ms.......*}.g..Y| +00000040 46 c7 bb 03 af ad |F.....| +[3c7a 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[3c7b 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU validateConfigTransaction starts for data 0xc0049c0000, header channel_header:"\010\001\032\006\010\203\306\265\372\005\"\017businesschannel" signature_header:"\n\255\006\n\nOrdererMSP\022\236\006-----BEGIN CERTIFICATE-----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\nWJ3lSBQ/BUZnxtqUKZb5f082AQ==\n-----END CERTIFICATE-----\n\022\030\350c\034\327\214\356\327|\351\320\253\304j\r0\333\310\276\276\324\377\007\237t" +[3c7c 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Transaction is for channel businesschannel +[3c7d 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[3c7e 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[3c7f 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[3c80 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[3c81 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[3c82 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[3c83 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[3c84 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[3c85 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[3c86 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[3c87 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[3c88 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[3c89 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[3c8a 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[3c8b 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[3c8c 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +[3c8d 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +[3c8e 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +[3c8f 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +[3c90 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +[3c91 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +[3c92 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[3c93 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[3c94 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[3c95 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[3c96 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[3c97 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[3c98 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[3c99 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Writers +[3c9a 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application/Org3MSP +[3c9b 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Value] /Channel/Application/Org3MSP/MSP +[3c9c 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Readers +[3c9d 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Admins +[3c9e 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Policy] /Channel/Application/Org3MSP/Endorsement +[3c9f 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Processing change to key: [Group] /Channel/Application +[3ca0 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Getting policy for item Application with mod_policy Admins +[3ca1 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [] +[3ca2 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[3ca3 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[3ca4 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[3ca5 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[3ca6 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[3ca7 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[3ca8 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[3ca9 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[3caa 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins == +[3cab 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3cac 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins == +[3cad 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +[3cae 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ff440 gate 1598907139399451500 evaluation starts +[3caf 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ff440 signed by 0 principal evaluation starts (used [false false false]) +[3cb0 08-31 20:52:19.39 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ff440 processing identity 0 with bytes of 115a4b0 +[3cb1 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ff440 principal matched by identity 0 +[3cb2 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 79 4d e9 a3 71 1d 24 0f fe ed 23 9d 11 9b 00 |tyM..q.$...#....| +00000010 3e 25 10 29 78 cb 07 bc 16 8a c0 53 e9 e3 ae 76 |>%.)x......S...v| +[3cb3 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ed 6e 97 55 ce e1 8f 4a 2e 44 e9 |0E.!..n.U...J.D.| +00000010 86 cc c7 d8 15 32 92 11 5c 0f ae 9c 24 1e e3 31 |.....2..\...$..1| +00000020 b0 8c 3d 39 f2 02 20 6c 7f 82 68 b5 f7 a9 fc 04 |..=9.. l..h.....| +00000030 9c c0 f7 ee 68 f9 99 1d 35 23 c7 b2 62 e6 51 30 |....h...5#..b.Q0| +00000040 4f f1 8e 15 f4 64 79 |O....dy| +[3cb4 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cb5 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cb6 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cb7 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cb8 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41188 bytes, seq: 6}, Envelope: 41221 bytes, Signature: 0 bytes to 1 peers +[3cb9 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cba 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3cbb 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_AND_ORG Block message: {Data: 41188 bytes, seq: 6}, Envelope: 41221 bytes, Signature: 0 bytes +[3cbc 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3cbd 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ff440 principal evaluation succeeds for identity 0 +[3cbe 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ff440 gate 1598907139399451500 evaluation succeeds +[3cbf 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Admins +[3cc0 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Admins +[3cc1 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins == +[3cc2 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> WARN De-duplicating identity [Org1MSPacc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5] at index 2 in signature set +[3cc3 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffa70 gate 1598907139403192100 evaluation starts +[3cc4 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffa70 signed by 0 principal evaluation starts (used [false false false]) +[3cc5 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffa70 processing identity 0 with bytes of 115a4b0 +[3cc6 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffa70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3cc7 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffa70 processing identity 1 with bytes of 115a4b0 +[3cc8 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity has been named explicitly as an admin for Org2MSP +[3cc9 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity carries the admin ou for Org2MSP +[3cca 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[3ccb 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[3ccc 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP checking if the identity is a client +[3ccd 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[3cce 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffa70 principal matched by identity 1 +[3ccf 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 1c 16 ac 57 86 d3 c3 21 1e c6 7b f6 f4 33 15 53 |...W...!..{..3.S| +00000010 51 0a 12 8c c9 dc af 08 54 64 1f 16 1c 10 79 1c |Q.......Td....y.| +[3cd0 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fd 5d cb e8 72 66 8f d2 c7 ff a3 |0E.!..]..rf.....| +00000010 aa d3 dc 46 c5 bd 34 a5 d8 7d dc a8 35 2c d6 29 |...F..4..}..5,.)| +00000020 07 b0 75 b1 d5 02 20 0a ef 18 c5 de bf be 2c 7c |..u... .......,|| +00000030 16 ea 9e 3a ba 4b 56 95 85 92 21 ee 94 17 ad 3b |...:.KV...!....;| +00000040 78 aa 13 9c c2 d4 33 |x.....3| +[3cd1 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffa70 principal evaluation succeeds for identity 1 +[3cd2 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0049ffa70 gate 1598907139403192100 evaluation succeeds +[3cd3 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Admins +[3cd4 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Admins +[3cd5 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Admins +[3cd6 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Admins +[3cd7 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[3cd8 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[3cd9 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[3cda 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[3cdb 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key BlockValidation to policy: mod_policy:"Admins" +[3cdc 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[3cdd 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[3cde 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[3cdf 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[3ce0 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[3ce1 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[3ce2 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[3ce3 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[3ce4 08-31 20:52:19.40 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[3ce5 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to policy: mod_policy:"Admins" +[3ce6 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[3ce7 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[3ce8 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Endorsement to +[3ce9 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key LifecycleEndorsement to +[3cea 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to +[3ceb 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to +[3cec 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to +[3ced 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Readers to policy: mod_policy:"Admins" +[3cee 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Writers to policy: mod_policy:"Admins" +[3cef 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting policy for key Admins to policy: mod_policy:"Admins" +[3cf0 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ChannelProtos +[3cf1 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: HashingAlgorithm +[3cf2 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BlockDataHashingStructure +[3cf3 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: OrdererAddresses +[3cf4 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Consortium +[3cf5 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[3cf6 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationProtos +[3cf7 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ACLs +[3cf8 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[3cf9 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[3cfa 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[3cfb 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[3cfc 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[3cfd 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org3MSP are +[3cfe 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org3MSP +[3cff 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[3d00 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[3d01 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org3MSP +[3d02 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQN0rYKGQHiMYCGw2fEoXj1TAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMy5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMy5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmczLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmczLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +fKS9cNA5b9kL4Z+v7pzYVoo7HZzPO85mHfrAKG4QzShPWw+NQGA4gk8G+wJyyAjV +WZZpz/PoDGtQmQ4Amkn9oqNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCBr +X8Mi8jTbZ3hDSYRZay84uuOvR4JOUXBezWqmtOLTRTAKBggqhkjOPQQDAgNIADBF +AiEAvA6XxI2ZdKda6vqQPIlCnWgaD+41oubzHLpGStEzn3gCIFUgi2BTn1UjMwUr +Cn9MH6oeCY2L1BpZpd3WSl88UmRk +-----END CERTIFICATE----- +[3d03 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[3d04 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[3d05 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[3d06 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[3d07 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org1MSP are anchor_peers: +[3d08 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org1MSP +[3d09 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[3d0a 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[3d0b 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org1MSP +[3d0c 08-31 20:52:19.41 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUTCCAfegAwIBAgIQH0iY6ZX+WVT82WGxiAA4YjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcxLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +WDdBRJKiVPBcjs4ZcLzfQvL86uCjSTSVEhqBnZVy3qWX4uqhY5cBTKoi3otAfsod +6n0wkDek2fzBaMC8nP+v+qNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCCd +uiGuHyp3DXZdK/4MMZQ5tjycJsEf5ruU6pIOhcDTNzAKBggqhkjOPQQDAgNIADBF +AiEAj/F9Xao7men8Nonph16bfVf9g9dkSX576eqUJzKEqmYCICamzePwL0Gr/CKK +7Kfo8/fWjMqJeM6BBjBoqbvfvJsf +-----END CERTIFICATE----- +[3d0d 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.ApplicationOrgProtos +[3d0e 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: AnchorPeers +[3d0f 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[3d10 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[3d11 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Anchor peers for org Org2MSP are anchor_peers: +[3d12 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org Org2MSP +[3d13 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[3d14 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[3d15 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance Org2MSP +[3d16 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICUDCCAfegAwIBAgIQTke0jRlyjxXqwxoQR/S7QjAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MHMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMRwwGgYDVQQD +ExNjYS5vcmcyLmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE +szmr5dhoh1blSz8OT+6AtL2kL3VKA7y0gohro7Qj8QB6lQa3sBIDgCkakqpi9Bo0 +gOjMQfmfjxza/iq6C9qNvKNtMGswDgYDVR0PAQH/BAQDAgGmMB0GA1UdJQQWMBQG +CCsGAQUFBwMCBggrBgEFBQcDATAPBgNVHRMBAf8EBTADAQH/MCkGA1UdDgQiBCAp +9pNHfXKpJmiljus96+9XgLPlCpS0g4JAABmwqdFVPTAKBggqhkjOPQQDAgNHADBE +AiA1SNXH3zhNmHBSBjuU0EhhJ+GP7uMUKMjNKq3quaj0jAIgCpBGto4MeDf0DYpa +C/Ss9LR+jThkl1qHzVQYXujczlU= +-----END CERTIFICATE----- +[3d17 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererProtos +[3d18 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ConsensusType +[3d19 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchSize +[3d1a 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: BatchTimeout +[3d1b 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: KafkaBrokers +[3d1c 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: ChannelRestrictions +[3d1d 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Capabilities +[3d1e 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrdererOrgProtos +[3d1f 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: Endpoints +[3d20 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Initializing protos for *channelconfig.OrganizationProtos +[3d21 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Processing field: MSP +[3d22 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP for org OrdererOrg +[3d23 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating BCCSP-based MSP instance +[3d24 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating Cache-MSP instance +[3d25 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up MSP instance OrdererMSP +[3d26 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICPTCCAeSgAwIBAgIRAOPBj2n5jgUxLZF4vVAHwX0wCgYIKoZIzj0EAwIwaTEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xFDASBgNVBAoTC2V4YW1wbGUuY29tMRcwFQYDVQQDEw5jYS5leGFt +cGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBaMGkxCzAJBgNV +BAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMRQwEgYDVQQKEwtleGFtcGxlLmNvbTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5j +b20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATS6dielFhgzyrdDwU8IRpzPgyL +E50PN3nfnl84CBkPFUHdU9DRh8xOe2swC0ltJur/fxqNzw/xwu7TLVVEA8JAo20w +azAOBgNVHQ8BAf8EBAMCAaYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMB +MA8GA1UdEwEB/wQFMAMBAf8wKQYDVR0OBCIEIG5RMUg8d/DSeI13KleTU6VPMqCz +B2+L04wnGck528awMAoGCCqGSM49BAMCA0cAMEQCIAec6MuUnRc3lKEz8QN8njsl +K+5aSMRJW3T/9OfRa1TIAiBdgUkUhFYm3hBtuTW4Qpz89brRXEJgVfDmzhmyaqEA +nw== +-----END CERTIFICATE----- +[3d27 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Setting up the MSP manager (4 msps) +[3d28 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU MSP manager setup complete, setup 4 msps +[3d29 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer/OrdererOrg +[3d2a 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer/OrdererOrg +[3d2b 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer/OrdererOrg +[3d2c 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Orderer +[3d2d 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Orderer +[3d2e 08-31 20:52:19.42 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Orderer +[3d2f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy BlockValidation for Channel/Orderer +[3d30 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application/Org3MSP +[3d31 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org3MSP +[3d32 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org3MSP +[3d33 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org3MSP +[3d34 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org1MSP +[3d35 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org1MSP +[3d36 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org1MSP +[3d37 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application/Org2MSP +[3d38 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application/Org2MSP +[3d39 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application/Org2MSP +[3d3a 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel/Application +[3d3b 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel/Application +[3d3c 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[3d3d 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +[3d3e 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Endorsement for Channel/Application +[3d3f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org1MSP/Endorsement +[3d40 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Returning dummy reject all policy because Endorsement could not be found in Channel/Application/Org2MSP/Endorsement +[3d41 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy LifecycleEndorsement for Channel/Application +[3d42 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel/Application +[3d43 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Readers for Channel +[3d44 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Writers for Channel +[3d45 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Proposed new policy Admins for Channel +[3d46 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel +[3d47 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer +[3d48 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Orderer/OrdererOrg +[3d49 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/OrdererOrg/MSP +[3d4a 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Writers +[3d4b 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Admins +[3d4c 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/OrdererOrg/Readers +[3d4d 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchSize +[3d4e 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/BatchTimeout +[3d4f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ChannelRestrictions +[3d50 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/Capabilities +[3d51 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Orderer/ConsensusType +[3d52 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/BlockValidation +[3d53 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Readers +[3d54 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Writers +[3d55 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Orderer/Admins +[3d56 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application +[3d57 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org3MSP +[3d58 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org3MSP/MSP +[3d59 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Endorsement +[3d5a 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Readers +[3d5b 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Writers +[3d5c 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org3MSP/Admins +[3d5d 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org1MSP +[3d5e 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/MSP +[3d5f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org1MSP/AnchorPeers +[3d60 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Readers +[3d61 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Writers +[3d62 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org1MSP/Admins +[3d63 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Group] /Channel/Application/Org2MSP +[3d64 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/AnchorPeers +[3d65 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Org2MSP/MSP +[3d66 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Readers +[3d67 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Writers +[3d68 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Org2MSP/Admins +[3d69 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/ACLs +[3d6a 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Application/Capabilities +[3d6b 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Writers +[3d6c 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Admins +[3d6d 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Endorsement +[3d6e 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/LifecycleEndorsement +[3d6f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Application/Readers +[3d70 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/HashingAlgorithm +[3d71 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/BlockDataHashingStructure +[3d72 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/OrdererAddresses +[3d73 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Consortium +[3d74 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Value] /Channel/Capabilities +[3d75 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Readers +[3d76 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Writers +[3d77 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Adding to config map: [Policy] /Channel/Admins +[3d78 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Readers' +[3d79 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Writers' +[3d7a 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Application] +[3d7b 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[3d7c 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[3d7d 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application looking up path [] +[3d7e 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org3MSP +[3d7f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org1MSP +[3d80 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Application has managers Org2MSP +[3d81 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Readers' +[3d82 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Writers' +[3d83 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Application/Admins' +[3d84 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel looking up path [Orderer] +[3d85 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Orderer +[3d86 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel has managers Application +[3d87 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer looking up path [] +[3d88 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Manager Channel/Orderer has managers OrdererOrg +[3d89 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/BlockValidation' +[3d8a 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Admins' +[3d8b 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Writers' +[3d8c 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU As expected, current configuration has policy '/Channel/Orderer/Readers' +[3d8d 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Application capability V1_4_2 is supported and is enabled +[3d8e 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Channel capability V1_4_3 is supported and is enabled +[3d8f 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Processing new config for channel businesschannel +[3d90 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Calling out because config was updated for channel businesschannel +[3d91 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Org3MSP anchor peers: [] +[3d92 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Org1MSP anchor peers: [host:"peer0.org1.example.com" port:7051 ] +[3d93 08-31 20:52:19.43 UTC] [%{longpkg}] %{callpath} -> DEBU Org2MSP anchor peers: [host:"peer0.org2.example.com" port:7051 ] +[3d94 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Creating state provider for chainID businesschannel +[3d95 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3d96 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3d97 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3d98 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3d99 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3d9a 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4d800 gate 1598907139442614800 evaluation starts +[3d9b 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4d800 signed by 0 principal evaluation starts (used [false]) +[3d9c 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4d800 processing identity 0 with bytes of 115a4b0 +[3d9d 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4d800 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[3d9e 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4d800 principal evaluation fails +[3d9f 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4d800 gate 1598907139442614800 evaluation fails +[3da0 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org2MSP/Readers +[3da1 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3da2 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3da3 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4dd70 gate 1598907139442892800 evaluation starts +[3da4 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4dd70 signed by 0 principal evaluation starts (used [false]) +[3da5 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4dd70 processing identity 0 with bytes of 115a4b0 +[3da6 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4dd70 principal matched by identity 0 +[3da7 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +[3da8 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +00000040 8d 22 17 b0 af d9 4b |."....K| +[3da9 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4dd70 principal evaluation succeeds for identity 0 +[3daa 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b4dd70 gate 1598907139442892800 evaluation succeeds +[3dab 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[3dac 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3dad 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3dae 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3daf 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3db0 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3db1 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3db2 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3db3 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3db4 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3db5 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b648b0 gate 1598907139443638000 evaluation starts +[3db6 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b648b0 signed by 0 principal evaluation starts (used [false]) +[3db7 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b648b0 processing identity 0 with bytes of 115a4b0 +[3db8 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b648b0 principal matched by identity 0 +[3db9 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +[3dba 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +00000040 41 a3 44 15 ec f1 bb |A.D....| +[3dbb 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b648b0 principal evaluation succeeds for identity 0 +[3dbc 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b648b0 gate 1598907139443638000 evaluation succeeds +[3dbd 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3dbe 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3dbf 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3dc0 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3dc1 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dc2 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3dc3 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3dc4 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3dc5 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3dc6 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3dc7 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b653f0 gate 1598907139444311500 evaluation starts +[3dc8 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b653f0 signed by 0 principal evaluation starts (used [false]) +[3dc9 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b653f0 processing identity 0 with bytes of 115a4b0 +[3dca 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b653f0 principal matched by identity 0 +[3dcb 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +[3dcc 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +00000040 9c 30 13 97 0e fc |.0....| +[3dcd 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b653f0 principal evaluation succeeds for identity 0 +[3dce 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004b653f0 gate 1598907139444311500 evaluation succeeds +[3dcf 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3dd0 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3dd1 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3dd2 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3dd3 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> INFO Joining gossip network of channel businesschannel with 3 organizations +[3dd4 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> INFO No configured anchor peers of Org3MSP for channel businesschannel to learn about +[3dd5 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org1MSP for channel businesschannel: [{peer0.org1.example.com 7051}] +[3dd6 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> INFO Anchor peer for channel businesschannel with same endpoint, skipping connecting to myself +[3dd7 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> INFO Learning about the configured anchor peers of Org2MSP for channel businesschannel: [{peer0.org2.example.com 7051}] +[3dd8 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering Endpoint: peer0.org2.example.com:7051, InternalEndpoint: peer0.org2.example.com:7051, PKI-ID: , Metadata: +[3dd9 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3dda 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating endpoints for chainID%!(EXTRA string=businesschannel) +[3ddb 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ddc 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ddd 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dde 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ddf 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU Updating trusted root authorities for channel businesschannel +[3de0 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[3de1 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[3de2 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer0.org2.example.com:7051 0 }] +[3de3 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[3de4 08-31 20:52:19.44 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004b93d70, CONNECTING +[3de5 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc004b93d70, READY +[3de6 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3de7 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[3de8 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[3de9 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.6:7051 +[3dea 08-31 20:52:19.47 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:7051 +[3deb 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dec 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ded 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3dee 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3def 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3df0 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3df1 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3df2 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3df3 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3df4 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3df5 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3df6 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26fb0 gate 1598907139481854300 evaluation starts +[3df7 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26fb0 signed by 0 principal evaluation starts (used [false]) +[3df8 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26fb0 processing identity 0 with bytes of 115a4b0 +[3df9 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26fb0 principal matched by identity 0 +[3dfa 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[3dfb 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2c 29 6b 50 7a ae f5 55 f4 bd d5 80 |0D. ,)kPz..U....| +00000010 53 4d e3 97 c1 50 76 7d 66 64 94 83 04 12 4f d0 |SM...Pv}fd....O.| +00000020 63 80 e5 7d 02 20 50 86 bf 83 90 b9 9a 88 55 ae |c..}. P.......U.| +00000030 dc 6c 5d bf fb a0 e4 62 ee ec d5 41 91 6c d9 38 |.l]....b...A.l.8| +00000040 42 66 fb f1 79 be |Bf..y.| +[3dfc 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26fb0 principal evaluation succeeds for identity 0 +[3dfd 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c26fb0 gate 1598907139481854300 evaluation succeeds +[3dfe 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3dff 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3e00 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3e01 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3e02 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:7051 +[3e03 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e04 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3e05 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161038 +[3e06 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: D9A95FE759FEFD5D7D15D58103CB54F945F77F6B8B613E6A067A1FCEB4CC52B6 +[3e07 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3e08 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[3e09 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[3e0a 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e0b 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: nonce:4083847945516476258 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes to 1 peers +[3e0c 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: nonce:4083847945516476258 tag:EMPTY mem_req: > , Envelope: 175 bytes, Signature: 0 bytes +[3e0d 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e0e 08-31 20:52:19.48 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3e0f 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: EOF +[3e10 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 4083847945516476258, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +[3e11 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:7051 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 4083847945516476258, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +[3e12 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e13 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 4083847945516476258, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +[3e14 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[3e15 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e16 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3e17 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3e18 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3e19 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3e1a 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3e1b 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3e1c 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c07200 gate 1598907139518412800 evaluation starts +[3e1d 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c07200 signed by 0 principal evaluation starts (used [false]) +[3e1e 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c07200 processing identity 0 with bytes of 115a4b0 +[3e1f 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c07200 principal matched by identity 0 +[3e20 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 69 22 75 ee d7 b7 5f ef ef 01 a6 d3 9f c4 26 19 |i"u..._.......&.| +00000010 dc 92 50 99 03 d9 71 4a 23 fa 01 75 71 b1 ba 7c |..P...qJ#..uq..|| +[3e21 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 19 5c bc b9 d0 e9 32 c4 85 69 fd 8a |0D. .\....2..i..| +00000010 86 a2 14 bc 8f d4 11 6d f3 1b 94 0e ed e8 dc 12 |.......m........| +00000020 b1 d4 3a 0d 02 20 6a 63 7e ed 6d 99 28 6f 2e c0 |..:.. jc~.m.(o..| +00000030 e0 7e 50 e0 55 4c cf 50 1a ee 99 07 49 aa e3 ee |.~P.UL.P....I...| +00000040 43 44 ef 85 57 69 |CD..Wi| +[3e22 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c07200 principal evaluation succeeds for identity 0 +[3e23 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004c07200 gate 1598907139518412800 evaluation succeeds +[3e24 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3e25 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3e26 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3e27 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3e28 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e29 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e2a 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[3e2b 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d9 a9 5f e7 59 fe fd 5d 7d 15 d5 81 03 cb 54 f9 |.._.Y..]}.....T.| +00000010 45 f7 7f 6b 8b 61 3e 6a 06 7a 1f ce b4 cc 52 b6 |E..k.a>j.z....R.| +[3e2c 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3c 23 c7 1c 19 ec 8e 68 fc 5c f3 ed |0D. <#.....h.\..| +00000010 e5 1b 3d e5 03 56 05 68 af a6 18 0c cb 08 15 fb |..=..V.h........| +00000020 d6 c4 7c e3 02 20 6a 25 7a 85 7e 1f 7a bc c5 0f |..|.. j%z.~.z...| +00000030 9c 00 1a 7a 7f 16 92 d4 89 20 8a a2 60 2e 51 2e |...z..... ..`.Q.| +00000040 bf 57 b9 87 f7 4d |.W...M| +[3e2d 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e2e 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3e2f 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e30 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[3e31 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d3 e0 5b ad 9b cf 6e 40 c0 f1 40 11 cb 74 25 eb |..[...n@..@..t%.| +00000010 c1 ba 77 23 51 12 91 bf 1f c3 b4 cd 49 6e bc 28 |..w#Q.......In.(| +[3e32 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e7 11 9b 13 4b 9c 6c fc a8 d4 78 |0E.!.....K.l...x| +00000010 76 89 ae 84 b1 25 60 5c 18 f4 05 22 ef f7 5e 24 |v....%`\..."..^$| +00000020 da 0e 69 39 5d 02 20 33 c3 49 af 4c d1 cd 87 ad |..i9]. 3.I.L....| +00000030 c0 da 6c 1f 69 0c 99 cb 76 c8 42 6d 5e f6 4c e0 |..l.i...v.Bm^.L.| +00000040 d7 4d 22 89 0c ad 87 |.M"....| +[3e33 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3e34 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e35 08-31 20:52:19.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3e36 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating root CAs for channel [businesschannel] +[3e37 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU adding orderer root CAs for MSP [OrdererMSP] +[3e38 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org3MSP] +[3e39 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org1MSP] +[3e3a 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU adding app root CAs for MSP [Org2MSP] +[3e3b 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU config transaction received for chain businesschannel +[3e3c 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] validateTx completes for block 0xc0046fb640 env 0xc0048e14f0 txn 0 +[3e3d 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU got result for idx 0, code 0 +[3e3e 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Validated block [6] in 133ms +[3e3f 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Retrieving private write sets for 0 transactions from transient store +[3e40 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] No missing collection private write sets to fetch from remote peers +[3e41 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Received configuration update, calling CSCC ConfigUpdate +[3e42 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Validating state for block [6] +[3e43 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Waiting for purge mgr to finish the background job of computing expirying keys for the block +[3e44 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for validating read set version against the committed version +[3e45 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Validating new block with num trans = [1] +[3e46 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() for block number = [6] +[3e47 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU preprocessing ProtoBlock... +[3e48 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU txType=CONFIG +[3e49 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Performing custom processing for transaction [txid=], [txType=CONFIG] +[3e4a 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processor for custom tx processing:&peer.configtxProcessor{} +[3e4b 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator +[3e4c 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU constructing new tx simulator txid = [] +[3e4d 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Processing CONFIG +[3e4e 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU channelConfig=sequence:4 channel_group: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > groups: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > > values: > values: > values: > values: > values: > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > policies: mod_policy:"Admins" > > mod_policy:"Admins" > +[3e4f 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Simulation completed, getting simulation results +[3e50 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Done with transaction simulation / query execution [] +[3e51 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Block [6] Transaction index [0] TxId [] marked as valid by state validator +[3e52 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU txops=internal.txOps{internal.compositeKey{ns:"", coll:"", key:"resourcesconfigtx.CHANNEL_CONFIG_KEY"}:(*internal.keyOps)(0xc004c49300)} +[3e53 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU validating rwset... +[3e54 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU postprocessing ProtoBlock... +[3e55 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateAndPrepareBatch() complete +[3e56 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Adding CommitHash to the block [6] +[3e57 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] to storage +[3e58 08-31 20:52:19.52 UTC] [%{longpkg}] %{callpath} -> DEBU Writing block [6] to pvt block store +[3e59 08-31 20:52:19.54 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:52:21.546Z grpc.peer_address=172.18.0.5:39624 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=126µs +[3e5a 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Saved 0 private data write sets for block [6] +[3e5b 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Indexing block [blockNum=6, blockHash=[]byte{0xee, 0x50, 0x5e, 0x32, 0xbb, 0x9a, 0x52, 0xe4, 0xd5, 0xa5, 0xcd, 0xd8, 0x92, 0x7, 0xb9, 0x48, 0x99, 0xcf, 0x4a, 0x4f, 0xd4, 0x14, 0x2, 0xe7, 0xd3, 0xba, 0x81, 0x57, 0xfe, 0x38, 0x65, 0xd} txOffsets= +txId=7f1fe83799f527adf316dfcd38e1f157d571d6adfecc0451fce63bd20f6fd24b locPointer=offset=71, bytesLength=40147 +] +[3e5c 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97619, bytesLength=40147] for tx ID: [7f1fe83799f527adf316dfcd38e1f157d571d6adfecc0451fce63bd20f6fd24b] to txid-index +[3e5d 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Adding txLoc [fileSuffixNum=0, offset=97619, bytesLength=40147] for tx number:[0] ID: [7f1fe83799f527adf316dfcd38e1f157d571d6adfecc0451fce63bd20f6fd24b] to blockNumTranNum index +[3e5e 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3e5f 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[3e60 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[3e61 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:39624 +[3e62 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Broadcasting about update checkpointInfo: latestFileChunkSuffixNum=[0], latestFileChunksize=[138758], isChainEmpty=[false], lastBlockNumber=[6] +[3e63 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Committing private data for block [6] +[3e64 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Committed private data for block [6] +[3e65 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to state database +[3e66 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU lock acquired on oldBlockCommit for committing regular updates to state database +[3e67 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Committing updates to state database +[3e68 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Building the expiry schedules based on the update batch +[3e69 08-31 20:52:19.55 UTC] [%{longpkg}] %{callpath} -> DEBU Write lock acquired for committing updates to state database +[3e6a 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Applying key(string)=[resourcesconfigtx.CHANNEL_CONFIG_KEY] key(bytes)=[[]byte{0x0, 0x72, 0x65, 0x73, 0x6f, 0x75, 0x72, 0x63, 0x65, 0x73, 0x63, 0x6f, 0x6e, 0x66, 0x69, 0x67, 0x74, 0x78, 0x2e, 0x43, 0x48, 0x41, 0x4e, 0x4e, 0x45, 0x4c, 0x5f, 0x43, 0x4f, 0x4e, 0x46, 0x49, 0x47, 0x5f, 0x4b, 0x45, 0x59}] +[3e6b 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Updates committed to state database and the write lock is released +[3e6c 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Preparing potential purge list working-set for expiringAtBlk [7] +[3e6d 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU launched the background routine for preparing keys to purge with the next block +[3e6e 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committing block [6] transactions to history database +[3e6f 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updating history database for blockNo [6] with [1] transactions +[3e70 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Skipping transaction [0] since it is not an endorsement transaction +[3e72 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.5:39624 +[3e73 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e74 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e71 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Getting iterator for range [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x7, 0x0}] - [[]byte{0x62, 0x75, 0x73, 0x69, 0x6e, 0x65, 0x73, 0x73, 0x63, 0x68, 0x61, 0x6e, 0x6e, 0x65, 0x6c, 0x2f, 0x30, 0x0, 0x31, 0x1, 0x8, 0x0}] +[3e77 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU No expiry entry found for expiringAtBlk [7] +[3e75 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICJzCCAc6gAwIBAgIQK/0KBXj560X24hILk29s3DAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMi5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcy +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEadjTdFh/5d7A +n80xDDrhr5gmSsw/7RiDrDSTHmgGq7HZNxYY5RUmGfo+vSI+y7MUbIgqgrZiajP2 +z+47tJT+haNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgKfaTR31yqSZopY7rPevvV4Cz5QqUtIOCQAAZsKnRVT0wCgYIKoZIzj0E +AwIDRwAwRAIgfTF73e9dzQ+bHt1WVi6+TAasmqQD4OUgdiyFuM4ltcQCIBxCIwz+ +3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv +-----END CERTIFICATE----- +[3e76 08-31 20:52:19.56 UTC] [%{longpkg}] %{callpath} -> DEBU Channel [businesschannel]: Updates committed to history database for blockNo [6] +[3e78 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> INFO [businesschannel] Committed block [6] with 1 transaction(s) in 45ms (state_validation=1ms block_and_pvtdata_commit=30ms state_commit=4ms) commitHash=[e9f144cae24c378a94f813609079c2b2b1fe4608aee6f8f9e8c5858b1ee912fc] +[3e79 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3e7a 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18057A6C121408A8CFEFBEF6AF9D9816...08071A0C0A0565787030321203312E30 +[3e7b 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 0183774F2188C91A6BA5B5494C1202FAFDBEC69701BF34E9CD13F159E99125BB +[3e7c 08-31 20:52:19.57 UTC] [%{longpkg}] %{callpath} -> DEBU [businesschannel] Committed block [6] with 1 transaction(s) +[3e7d 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[3e7e 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:52:21.578Z grpc.peer_address=172.18.0.8:54186 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=91.2µs +[3e7f 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[3e80 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3e83 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e81 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3e84 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[3e85 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[3e86 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:54186 +[3e87 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:54186 +[3e88 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[3e89 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 cc b9 5b 2c c8 a4 ff ed 54 f0 d2 |0E.!...[,....T..| +00000010 aa f1 1e 4b af e1 a6 a6 dd 16 e6 46 09 95 49 f3 |...K.......F..I.| +00000020 42 59 7b 99 d3 02 20 24 13 6e f4 b2 42 a1 76 2c |BY{... $.n..B.v,| +00000030 0c e7 73 02 ed 3b 11 63 10 d1 6f 56 21 a0 e3 6f |..s..;.c..oV!..o| +00000040 a2 79 bf 37 8d a7 5a |.y.7..Z| +[3e8a 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:54186 +[3e8b 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.8:54186 +[3e82 08-31 20:52:19.58 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:52:21.588Z grpc.peer_address=172.18.0.6:55090 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=101.1µs +[3e8c 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3e8d 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3e8e 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:54002 disconnected +[3e8f 08-31 20:52:19.59 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.8:54002 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=1m14.3473111s +[3e90 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3e91 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.8:54186 disconnected +[3e93 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:52:29.587Z grpc.peer_address=172.18.0.8:54186 grpc.peer_subject="CN=peer1.org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=17.9765ms +[3e92 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b canceling read because closing +[3e94 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b canceling read because closing +[3e95 08-31 20:52:19.60 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3e96 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3e97 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[3e98 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[3e99 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:55090 +[3e9a 08-31 20:52:19.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3e9b 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3e9c 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3e9d 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3e9e 08-31 20:52:19.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3ea0 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3e9f 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:1288765530053796509 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +[3ea2 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: nonce:1288765530053796509 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +[3ea3 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ea4 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:1288765530053796509 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +[3ea5 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[3ea6 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ea7 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ea8 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3ea9 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3eaa 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3eab 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3eac 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[3ead 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3050 gate 1598907139644284100 evaluation starts +[3eae 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3050 signed by 0 principal evaluation starts (used [false]) +[3eaf 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3050 processing identity 0 with bytes of 115a4b0 +[3eb0 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3050 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[3eb1 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3050 principal evaluation fails +[3eb2 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3050 gate 1598907139644284100 evaluation fails +[3eb3 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[3eb4 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[3eb5 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3eb6 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec35e0 gate 1598907139646806800 evaluation starts +[3eb7 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec35e0 signed by 0 principal evaluation starts (used [false]) +[3eb8 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec35e0 processing identity 0 with bytes of 115a4b0 +[3eb9 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec35e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3eba 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec35e0 principal evaluation fails +[3ebb 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec35e0 gate 1598907139646806800 evaluation fails +[3ebc 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3ebd 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3ebe 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3ebf 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3b70 gate 1598907139649687900 evaluation starts +[3ec0 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3b70 signed by 0 principal evaluation starts (used [false]) +[3ec1 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3b70 processing identity 0 with bytes of 115a4b0 +[3ec2 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[3ec3 08-31 20:52:19.64 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[3ec4 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[3ec5 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3b70 principal matched by identity 0 +[3ec6 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 79 b0 a3 b7 3b f4 53 44 01 cd 5e 1f a5 4f 39 33 |y...;.SD..^..O93| +00000010 eb cc 59 36 9e 6c c7 14 c0 03 08 ce b3 4b ef f5 |..Y6.l.......K..| +[3ec7 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ac 58 f5 ef 7b 5d fc 10 49 b1 bc |0E.!..X..{]..I..| +00000010 38 22 c1 41 f6 5e 66 29 53 24 99 0f e3 d1 63 5f |8".A.^f)S$....c_| +00000020 71 a6 76 fb 07 02 20 3f 4e 7b 47 02 54 eb 7b ce |q.v... ?N{G.T.{.| +00000030 d4 1b 2b ff d7 c0 44 4e 95 8c e0 16 6f 3a f0 bf |..+...DN....o:..| +00000040 54 50 f5 5c 03 f2 68 |TP.\..h| +[3ec8 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3b70 principal evaluation succeeds for identity 0 +[3ec9 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004ec3b70 gate 1598907139649687900 evaluation succeeds +[3eca 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3ecb 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3ecc 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3ecd 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3ece 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[3ecf 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[3ed0 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3ed1 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3ed2 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3ed3 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ed4 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ed5 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ed6 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[3ed7 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ed8 08-31 20:52:19.65 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ed9 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3eda 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ +46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ +SPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49 +BAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW +hbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg== +-----END CERTIFICATE----- +[3edb 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3edc 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:55090 +[3ea1 08-31 20:52:19.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3edf 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[3edd 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ede 08-31 20:52:19.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 1288765530053796509, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes to 1 peers +[3ee0 08-31 20:52:19.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e659c0 gate 1598907139676513400 evaluation starts +[3ee1 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[3ee2 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 1288765530053796509, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 657 bytes, Signature: 0 bytes +[3ee4 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3ee3 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e659c0 signed by 0 principal evaluation starts (used [false]) +[3ee5 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e659c0 processing identity 0 with bytes of 115a4b0 +[3ee6 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e659c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[3ee7 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e659c0 principal evaluation fails +[3ee8 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004e659c0 gate 1598907139676513400 evaluation fails +[3ee9 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[3eea 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[3eeb 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3eec 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eedde0 gate 1598907139681889800 evaluation starts +[3eed 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eedde0 signed by 0 principal evaluation starts (used [false]) +[3eee 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eedde0 processing identity 0 with bytes of 115a4b0 +[3eef 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eedde0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3ef0 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eedde0 principal evaluation fails +[3ef1 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004eedde0 gate 1598907139681889800 evaluation fails +[3ef2 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3ef3 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3ef4 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3ef5 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f14350 gate 1598907139682410300 evaluation starts +[3ef6 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f14350 signed by 0 principal evaluation starts (used [false]) +[3ef7 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f14350 processing identity 0 with bytes of 115a4b0 +[3ef8 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f14350 principal matched by identity 0 +[3ef9 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[3efa 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 26 83 55 23 2d 8d bf d6 da 57 7b 8c |0D. &.U#-....W{.| +00000010 6c 66 0c 6c ee c5 14 a2 5e e8 01 ca 06 68 92 a2 |lf.l....^....h..| +00000020 94 16 ca a1 02 20 1e de 7c 18 04 80 89 01 ba 03 |..... ..|.......| +00000030 0d 31 4a d6 75 b3 9d 1e 40 52 fe 4b a5 74 f1 3a |.1J.u...@R.K.t.:| +00000040 3f 06 67 7d e4 2a |?.g}.*| +[3efb 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f14350 principal evaluation succeeds for identity 0 +[3efc 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f14350 gate 1598907139682410300 evaluation succeeds +[3efd 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3efe 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3eff 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3f00 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3f01 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:39624 +[3f02 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:39624 +[3f03 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3f04 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 canceling read because closing +[3f05 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[3f06 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:39624 disconnected +[3f07 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:52:29.553Z grpc.peer_address=172.18.0.5:39624 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=132.2024ms +[3f08 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3f09 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3f0a 08-31 20:52:19.68 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[3f0b 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[3f0c 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3f0d 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f0e 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3f0f 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f10 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3f11 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3f12 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3f13 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3f14 08-31 20:52:19.69 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3f15 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3f16 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[3f17 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15310 gate 1598907139705081900 evaluation starts +[3f18 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15310 signed by 0 principal evaluation starts (used [false]) +[3f19 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15310 processing identity 0 with bytes of 115a4b0 +[3f1a 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[3f1b 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15310 principal evaluation fails +[3f1c 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15310 gate 1598907139705081900 evaluation fails +[3f1d 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[3f1e 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[3f1f 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3f20 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f158a0 gate 1598907139708523700 evaluation starts +[3f21 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f158a0 signed by 0 principal evaluation starts (used [false]) +[3f22 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f158a0 processing identity 0 with bytes of 115a4b0 +[3f23 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f158a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3f24 08-31 20:52:19.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f158a0 principal evaluation fails +[3f25 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f158a0 gate 1598907139708523700 evaluation fails +[3f26 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3f27 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3f28 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3f29 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15e30 gate 1598907139715041400 evaluation starts +[3f2a 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15e30 signed by 0 principal evaluation starts (used [false]) +[3f2b 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15e30 processing identity 0 with bytes of 115a4b0 +[3f2c 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org2MSP +[3f2d 08-31 20:52:19.71 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP validating identity +[3f2e 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org2MSP getting certification chain +[3f2f 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15e30 principal matched by identity 0 +[3f30 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[3f31 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3d c8 31 dc 98 e2 bf 3f 93 39 58 6a |0D. =.1....?.9Xj| +00000010 4d af f3 d1 f5 c6 53 36 a5 e9 dc a8 7a 20 69 d7 |M.....S6....z i.| +00000020 eb 02 ef 15 02 20 11 ef ad 42 60 9d 99 21 c9 87 |..... ...B`..!..| +00000030 77 3b 25 5d e3 60 6f 3f 07 89 24 7d 90 eb f3 6e |w;%].`o?..$}...n| +00000040 20 ab 4d 1d 36 14 | .M.6.| +[3f32 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15e30 principal evaluation succeeds for identity 0 +[3f33 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f15e30 gate 1598907139715041400 evaluation succeeds +[3f34 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3f35 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3f36 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3f37 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3f38 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:55090 +[3f39 08-31 20:52:19.72 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:55090 +[3f3a 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[3f3b 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[3f3c 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.6:55090 disconnected +[3f3d 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.request_deadline=2020-08-31T20:52:29.61Z grpc.peer_address=172.18.0.6:55090 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=122.5588ms +[3f3e 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3f3f 08-31 20:52:19.73 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[3f40 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:52:21.742Z grpc.peer_address=172.18.0.6:55096 grpc.peer_subject="CN=peer0.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=241.6µs +[3f41 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3f42 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[3f43 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[3f44 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.6:55096 +[3f45 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----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\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" tls_cert_hash:"38\231\224\003\2106PbzyT\235oqa\334\237\224FD#\265\301\215\007\242AL^\225=" from 172.18.0.6:55096 +[3f46 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f47 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3f48 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f49 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3f4a 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f4b 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3f4c 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3f4d 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3f4e 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3f4f 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3f50 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[3f51 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faf4a0 gate 1598907139749471300 evaluation starts +[3f52 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faf4a0 signed by 0 principal evaluation starts (used [false]) +[3f53 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faf4a0 processing identity 0 with bytes of 115a4b0 +[3f54 08-31 20:52:19.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faf4a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[3f55 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faf4a0 principal evaluation fails +[3f56 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faf4a0 gate 1598907139749471300 evaluation fails +[3f57 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[3f58 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[3f59 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3f5a 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fafa10 gate 1598907139751714900 evaluation starts +[3f5b 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fafa10 signed by 0 principal evaluation starts (used [false]) +[3f5c 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fafa10 processing identity 0 with bytes of 115a4b0 +[3f5d 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fafa10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3f5e 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fafa10 principal evaluation fails +[3f5f 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fafa10 gate 1598907139751714900 evaluation fails +[3f60 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3f61 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3f62 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3f63 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faff80 gate 1598907139755091200 evaluation starts +[3f64 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faff80 signed by 0 principal evaluation starts (used [false]) +[3f65 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faff80 processing identity 0 with bytes of 115a4b0 +[3f66 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faff80 principal matched by identity 0 +[3f67 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ce 41 bd 3d 8f d7 df 33 aa 22 64 c2 b8 6d 02 55 |.A.=...3."d..m.U| +00000010 0b 4f 56 5c 23 d8 61 46 f3 93 06 30 8b db 23 31 |.OV\#.aF...0..#1| +[3f68 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 7c d2 2d bc 1c 60 12 38 5d 27 22 91 |0D. |.-..`.8]'".| +00000010 03 c5 87 50 05 9c 88 80 c4 cd a7 3b 3a cf de bc |...P.......;:...| +00000020 7f 5d fd 36 02 20 3d 39 0d e3 d5 0c 54 5b 9a a3 |.].6. =9....T[..| +00000030 31 36 b4 2c 2f b1 fb d8 31 d0 b5 c2 ae da a4 94 |16.,/...1.......| +00000040 14 61 a4 97 84 c6 |.a....| +[3f69 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faff80 principal evaluation succeeds for identity 0 +[3f6a 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004faff80 gate 1598907139755091200 evaluation succeeds +[3f6b 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3f6c 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3f6d 08-31 20:52:19.75 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3f6e 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3f6f 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.6:55096 +[3f70 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.6:55096 +[3f71 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: nonce:11960660938038967932 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +[3f72 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3f73 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: nonce:11960660938038967932 tag:EMPTY mem_req: > , Envelope: 176 bytes, Signature: 0 bytes +[3f74 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[3f75 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3f76 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3f77 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3f78 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3f79 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3f7a 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3f7b 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[3f7c 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9370 gate 1598907139766543400 evaluation starts +[3f7d 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9370 signed by 0 principal evaluation starts (used [false]) +[3f7e 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9370 processing identity 0 with bytes of 115a4b0 +[3f7f 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[3f80 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9370 principal evaluation fails +[3f81 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9370 gate 1598907139766543400 evaluation fails +[3f82 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[3f83 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[3f84 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3f85 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc98e0 gate 1598907139767067600 evaluation starts +[3f86 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc98e0 signed by 0 principal evaluation starts (used [false]) +[3f87 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc98e0 processing identity 0 with bytes of 115a4b0 +[3f88 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc98e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3f89 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc98e0 principal evaluation fails +[3f8a 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc98e0 gate 1598907139767067600 evaluation fails +[3f8b 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3f8c 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3f8d 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3f8e 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9e50 gate 1598907139767639800 evaluation starts +[3f8f 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9e50 signed by 0 principal evaluation starts (used [false]) +[3f90 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9e50 processing identity 0 with bytes of 115a4b0 +[3f91 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9e50 principal matched by identity 0 +[3f92 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7a 19 80 e7 86 74 1f d5 28 86 51 ea 42 0d 54 55 |z....t..(.Q.B.TU| +00000010 0f 88 b0 26 4e 0a 2d 27 0d e5 45 6d f3 06 6e 59 |...&N.-'..Em..nY| +[3f93 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c 55 04 7c cb 88 14 21 bc 77 6b db |0D. \U.|...!.wk.| +00000010 3f 69 3a a6 b3 ab 69 ce 39 75 f0 16 9a f5 8a 96 |?i:...i.9u......| +00000020 fb f4 9a 4d 02 20 78 b0 fa 98 76 bd c7 f5 7b 27 |...M. x...v...{'| +00000030 39 07 1a cd 65 4c 4b f3 7c cd 62 6e 00 fd da 6a |9...eLK.|.bn...j| +00000040 bb bd ed 2b 1d 5e |...+.^| +[3f94 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9e50 principal evaluation succeeds for identity 0 +[3f95 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004fc9e50 gate 1598907139767639800 evaluation succeeds +[3f96 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3f97 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3f98 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3f99 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3f9a 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3f9b 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3f9c 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3f9d 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3f9e 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[3f9f 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fa0 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fa1 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fa2 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[3fa3 08-31 20:52:19.76 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fa4 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fa5 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fa6 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 11960660938038967932, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes to 1 peers +[3fa7 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[3fa8 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 11960660938038967932, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 658 bytes, Signature: 0 bytes +[3fa9 08-31 20:52:19.77 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3faa 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3fab 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fac 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3fad 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[3fae 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3faf 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3fb0 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[3fb1 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[3fb2 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[3fb3 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[3fb4 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[3fb5 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f5bd10 gate 1598907140053133400 evaluation starts +[3fb6 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f5bd10 signed by 0 principal evaluation starts (used [false]) +[3fb7 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f5bd10 processing identity 0 with bytes of 115a4b0 +[3fb8 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f5bd10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[3fb9 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f5bd10 principal evaluation fails +[3fba 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc004f5bd10 gate 1598907140053133400 evaluation fails +[3fbb 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[3fbc 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[3fbd 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[3fbe 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005008280 gate 1598907140055865800 evaluation starts +[3fbf 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005008280 signed by 0 principal evaluation starts (used [false]) +[3fc0 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005008280 processing identity 0 with bytes of 115a4b0 +[3fc1 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005008280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[3fc2 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005008280 principal evaluation fails +[3fc3 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005008280 gate 1598907140055865800 evaluation fails +[3fc4 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[3fc5 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[3fc6 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[3fc7 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050087f0 gate 1598907140057647600 evaluation starts +[3fc8 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050087f0 signed by 0 principal evaluation starts (used [false]) +[3fc9 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050087f0 processing identity 0 with bytes of 115a4b0 +[3fca 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050087f0 principal matched by identity 0 +[3fcb 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 03 7e db e0 fd fe 59 06 06 30 99 c9 f0 c9 6c 50 |.~....Y..0....lP| +00000010 c6 b8 e4 71 14 93 14 bc 1a b3 32 d7 88 86 0a f8 |...q......2.....| +[3fcc 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 13 2d 90 ec 15 f1 5e ec 3b 00 16 6b |0D. .-....^.;..k| +00000010 e1 f8 cd 95 a5 c3 25 29 91 08 82 80 4e 70 f2 16 |......%)....Np..| +00000020 ed 75 b6 c9 02 20 45 67 3f b2 7f ea d8 07 8f a7 |.u... Eg?.......| +00000030 2c 32 c8 5f 27 0f 8e a1 57 a9 ad e4 bf eb a8 3c |,2._'...W......<| +00000040 cb ef 0e 22 be 84 |..."..| +[3fcd 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050087f0 principal evaluation succeeds for identity 0 +[3fce 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050087f0 gate 1598907140057647600 evaluation succeeds +[3fcf 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[3fd0 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[3fd1 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[3fd2 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[3fd3 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3fd4 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[3fd5 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[3fd6 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[3fd7 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[3fd8 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fd9 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fda 08-31 20:52:20.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[3fdb 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fdc 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fdd 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fde 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fdf 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fe0 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fe1 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fe2 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3fe3 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3fe5 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[3fe6 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3fe7 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org1.example.com:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[3fe4 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[3fe8 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering peer1.org2.example.com:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[3fe9 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[3fea 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU parsed scheme: "" +[3feb 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[3fec 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org1.example.com:7051 0 }] +[3fed 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[3fee 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00506dd70, CONNECTING +[3fef 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU scheme "" not registered, fallback to default scheme +[3ff0 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU ccResolverWrapper: sending new addresses to cc: [{peer1.org2.example.com:7051 0 }] +[3ff1 08-31 20:52:20.06 UTC] [%{longpkg}] %{callpath} -> DEBU ClientConn switching balancer to "pick_first" +[3ff2 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc005074dd0, CONNECTING +[3ff3 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=gossip.Gossip grpc.method=Ping grpc.request_deadline=2020-08-31T20:52:22.07Z grpc.peer_address=172.18.0.5:39636 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=96.1µs +[3ff4 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[3ff5 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[3ff6 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[3ff7 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.5:39636 +[3ff8 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.5:39636 +[3ff9 08-31 20:52:20.07 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ffa 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ffb 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ffc 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3ffd 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[3ffe 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[3fff 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4000 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4001 08-31 20:52:20.08 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4002 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4003 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4004 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a0ca0 gate 1598907140091174800 evaluation starts +[4005 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a0ca0 signed by 0 principal evaluation starts (used [false]) +[4006 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a0ca0 processing identity 0 with bytes of 115a4b0 +[4007 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a0ca0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[4008 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a0ca0 principal evaluation fails +[4009 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a0ca0 gate 1598907140091174800 evaluation fails +[400a 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[400b 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc005074dd0, READY +[400c 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU pickfirstBalancer: HandleSubConnStateChange: 0xc00506dd70, READY +[400d 08-31 20:52:20.09 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4010 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4012 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a1210 gate 1598907140104906700 evaluation starts +[4011 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[400e 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[400f 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4013 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a1210 signed by 0 principal evaluation starts (used [false]) +[4016 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a1210 processing identity 0 with bytes of 115a4b0 +[4017 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a1210 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4014 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[4015 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 180172FD060A209901CDE7C48A747A30...8E32C7EAB01B8209E05A7C72467EA2FC +[4018 08-31 20:52:20.10 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a1210 principal evaluation fails +[401a 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050a1210 gate 1598907140104906700 evaluation fails +[401b 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[401c 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[401d 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[401e 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b7fe0 gate 1598907140111543400 evaluation starts +[401f 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b7fe0 signed by 0 principal evaluation starts (used [false]) +[4021 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b7fe0 processing identity 0 with bytes of 115a4b0 +[4019 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[4023 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 70 bytes to 172.18.0.5:7051 +[4020 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 2FEE22320CDA94A4CE0CCDC9AA73AC9899180C5412813ADF1C163ACE1BCF864A +[4025 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Sending GossipMessage: tag:EMPTY conn: , Envelope: 898 bytes, Signature: 71 bytes to 172.18.0.8:7051 +[4026 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" tls_cert_hash:"i\335\271]1\330U\250v.\302\275\030\004+\360\344\250\260<\245i\025\340\311*\262\351\251\260Uf" from 172.18.0.8:7051 +[4027 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d5 6c 4a da e4 5d 55 81 8d 56 be 9a 17 0e e2 15 |.lJ..]U..V......| +00000010 d3 c9 73 5e df 59 84 9d e8 83 0e 88 da a8 db 4b |..s^.Y.........K| +[4028 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bc 25 41 34 d2 75 02 02 4a 84 0e |0E.!..%A4.u..J..| +00000010 19 45 9f 76 f9 62 f2 5b 35 33 dc 51 96 44 18 71 |.E.v.b.[53.Q.D.q| +00000020 05 af 1f 32 89 02 20 31 dc d9 e1 01 2c d5 6e c3 |...2.. 1....,.n.| +00000030 e3 e3 6a 27 58 cc 03 0e f6 8a 94 88 81 77 44 a8 |..j'X........wD.| +00000040 7b c8 0a 73 44 60 a2 |{..sD`.| +[4029 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.8:7051 +[402a 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[402b 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org1.example.com:7051, 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[4022 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b7fe0 principal matched by identity 0 +[4024 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Received pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" tls_cert_hash:"xjF\033\225\241\316\r\257\225K\"\227\334:~1\231\215\242\277\255W\223T\221\201N\233\255\201\263" from 172.18.0.5:7051 +[402c 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[402d 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[402f 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 2d 26 b0 0f 5d 6d 61 b7 31 d2 c7 82 |0D. -&..]ma.1...| +00000010 23 67 f1 39 62 ab 08 22 67 33 d7 27 1c 85 93 d3 |#g.9b.."g3.'....| +00000020 ab 8b 72 e9 02 20 65 d5 14 fa 93 52 40 6d b2 d2 |..r.. e....R@m..| +00000030 f3 a0 1f 6c 6c 0c 07 99 2d 07 b0 b2 01 92 60 d7 |...ll...-.....`.| +00000040 64 da 06 52 4f b3 |d..RO.| +[4030 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b7fe0 principal evaluation succeeds for identity 0 +[402e 08-31 20:52:20.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4031 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0050b7fe0 gate 1598907140111543400 evaluation succeeds +[4033 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4034 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4035 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4036 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4037 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:39636 +[4038 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Servicing 172.18.0.5:39636 +[4032 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4039 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[403a 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[403b 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[403c 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[403d 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[403e 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[403f 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4040 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4041 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4042 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051535f0 gate 1598907140123641700 evaluation starts +[4043 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051535f0 signed by 0 principal evaluation starts (used [false]) +[4044 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051535f0 processing identity 0 with bytes of 115a4b0 +[4045 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051535f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[4046 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051535f0 principal evaluation fails +[4047 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051535f0 gate 1598907140123641700 evaluation fails +[4048 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[4049 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[404a 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[404b 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005153b60 gate 1598907140123986400 evaluation starts +[404c 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005153b60 signed by 0 principal evaluation starts (used [false]) +[404d 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[404e 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got error, aborting: rpc error: code = Canceled desc = context canceled +[404f 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Client 172.18.0.5:39636 disconnected +[4050 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> INFO streaming call completed grpc.service=gossip.Gossip grpc.method=GossipStream grpc.peer_address=172.18.0.5:39636 grpc.peer_subject="CN=peer1.org2.example.com,L=San Francisco,ST=California,C=US" error="rpc error: code = Canceled desc = context canceled" grpc.code=Canceled grpc.call_duration=48.5111ms +[4051 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Closing writing to stream +[4052 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005153b60 processing identity 0 with bytes of 115a4b0 +[4053 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005153b60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4054 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005153b60 principal evaluation fails +[4055 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005153b60 gate 1598907140123986400 evaluation fails +[4056 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4057 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4058 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4059 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516c0d0 gate 1598907140125618600 evaluation starts +[405a 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516c0d0 signed by 0 principal evaluation starts (used [false]) +[405b 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516c0d0 processing identity 0 with bytes of 115a4b0 +[405c 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516c0d0 principal matched by identity 0 +[405d 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 92 c6 4f 31 25 ce 3d 60 2a e9 1e e6 92 3e 65 de |..O1%.=`*....>e.| +00000010 5c f5 4b 00 5c 57 3e 42 c7 81 bd 96 7f 03 f8 f8 |\.K.\W>B........| +[405e 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 6b f1 d6 ba 84 32 1a e7 54 e7 7f 3e |0D. k....2..T..>| +00000010 b5 ed a0 95 08 80 86 6b a1 0c a6 26 59 1d b3 6d |.......k...&Y..m| +00000020 61 bf 60 5a 02 20 21 bb 4b e1 fc bf 94 ab 63 89 |a.`Z. !.K.....c.| +00000030 a4 a7 8b 73 82 d1 98 00 08 16 e2 b9 12 3a f1 5f |...s.........:._| +00000040 bf 25 f4 9b 93 ad |.%....| +[405f 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516c0d0 principal evaluation succeeds for identity 0 +[4060 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516c0d0 gate 1598907140125618600 evaluation succeeds +[4061 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4062 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4063 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4064 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4065 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Authenticated 172.18.0.5:7051 +[4066 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4067 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Created new connection to peer1.org2.example.com:7051, 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[4068 08-31 20:52:20.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4069 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[406a 08-31 20:52:20.29 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[406b 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[406c 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[406d 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[406e 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0b 88 07 69 c0 7a 0c e9 f6 08 f3 fb d5 cd ec d0 |...i.z..........| +00000010 da 72 5d 57 34 fb f5 59 c7 a2 c6 3a 85 21 48 f8 |.r]W4..Y...:.!H.| +[406f 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5f 6b 9a f7 47 1f 55 9f c4 aa 13 da |0D. _k..G.U.....| +00000010 ed eb e1 72 c1 03 65 c9 8f 4c bb 80 5b 51 58 56 |...r..e..L..[QXV| +00000020 c4 3c 97 6b 02 20 08 d0 37 a1 ec e7 29 f6 6a 8e |.<.k. ..7...).j.| +00000030 8d 2e 4a eb a0 a0 c2 1b bb 09 5d 34 11 8a a3 10 |..J.......]4....| +00000040 98 22 7c 8a 63 b7 |."|.c.| +[4070 08-31 20:52:20.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4071 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[4072 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4073 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4074 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[4075 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4076 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4077 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4078 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4079 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[407a 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[407b 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[407c 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[407d 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[407f 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[407e 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4080 08-31 20:52:20.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4081 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4082 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4083 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4084 08-31 20:52:20.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4085 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4086 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4087 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4088 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[4089 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[408a 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[408b 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[408c 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[408d 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[408e 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[408f 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4090 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516db10 gate 1598907140444976400 evaluation starts +[4091 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516db10 signed by 0 principal evaluation starts (used [false]) +[4092 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516db10 processing identity 0 with bytes of 115a4b0 +[4093 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516db10 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[4094 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516db10 principal evaluation fails +[4095 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00516db10 gate 1598907140444976400 evaluation fails +[4096 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[4097 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4098 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4099 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a080 gate 1598907140445560000 evaluation starts +[409a 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a080 signed by 0 principal evaluation starts (used [false]) +[409b 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a080 processing identity 0 with bytes of 115a4b0 +[409c 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[409d 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a080 principal evaluation fails +[409e 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a080 gate 1598907140445560000 evaluation fails +[409f 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[40a0 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[40a1 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[40a2 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a5f0 gate 1598907140449091200 evaluation starts +[40a3 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a5f0 signed by 0 principal evaluation starts (used [false]) +[40a4 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a5f0 processing identity 0 with bytes of 115a4b0 +[40a5 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a5f0 principal matched by identity 0 +[40a6 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 aa 2d fa 2c 67 2d 33 a2 36 ed 3d 13 c1 c8 85 c9 |.-.,g-3.6.=.....| +00000010 83 7a 4c 24 5b 0c 04 d2 88 56 85 dc b2 1c 45 94 |.zL$[....V....E.| +[40a7 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 af 20 a1 09 1c b0 bc d3 33 1d d8 |0E.!.. ......3..| +00000010 2f 39 96 d4 04 4d fb d7 cd 9b 02 d7 80 b2 65 c2 |/9...M........e.| +00000020 e3 41 10 75 df 02 20 63 80 44 a9 7f 76 7e 77 cc |.A.u.. c.D..v~w.| +00000030 50 e7 e1 bd 41 ed c0 d9 81 28 40 ed dc 16 81 21 |P...A....(@....!| +00000040 1f 80 aa c0 1b 5d ec |.....].| +[40a8 08-31 20:52:20.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a5f0 principal evaluation succeeds for identity 0 +[40a9 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00519a5f0 gate 1598907140449091200 evaluation succeeds +[40aa 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[40ac 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[40ad 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[40ae 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[40af 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[40b0 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[40b1 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[40b2 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[40b3 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[40b4 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40b5 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40b6 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40ab 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[40b7 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[40b8 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40b9 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[40ba 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40bb 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40bc 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40bd 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40be 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40bf 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40c0 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40c1 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40c2 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[40c3 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40c4 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[40c5 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[40c6 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40c7 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[40c8 08-31 20:52:20.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40c9 08-31 20:52:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[40ca 08-31 20:52:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D98161039 +[40cb 08-31 20:52:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F137B570E3A4F1EC54496DA39A8448C1E56E48D8A78059EEA680FA294A4BA2EA +[40cc 08-31 20:52:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[40cd 08-31 20:52:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[40ce 08-31 20:52:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[40cf 08-31 20:52:20.50 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[40d0 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40d1 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40d2 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes to 1 peers +[40d3 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40d4 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[40d5 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40d6 08-31 20:52:20.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[40d7 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40d8 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[40d9 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[40da 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40db 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[40dc 08-31 20:52:20.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40dd 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[40de 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[40df 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[40e0 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40e1 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40e2 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40e3 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40e4 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40e5 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40e6 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[40e7 08-31 20:52:20.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40e8 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[40e9 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[40ea 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[40eb 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[40ec 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[40ed 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[40ee 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[40ef 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[40f0 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[40f1 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[40f2 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[40f3 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[40f4 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7480 gate 1598907141117990200 evaluation starts +[40f5 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7480 signed by 0 principal evaluation starts (used [false]) +[40f6 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7480 processing identity 0 with bytes of 115a4b0 +[40f7 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7480 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[40f8 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7480 principal evaluation fails +[40f9 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7480 gate 1598907141117990200 evaluation fails +[40fa 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[40fb 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[40fc 08-31 20:52:21.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[40fd 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c79f0 gate 1598907141120151200 evaluation starts +[40fe 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c79f0 signed by 0 principal evaluation starts (used [false]) +[40ff 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c79f0 processing identity 0 with bytes of 115a4b0 +[4100 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c79f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4101 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c79f0 principal evaluation fails +[4102 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c79f0 gate 1598907141120151200 evaluation fails +[4103 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4104 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4105 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4106 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7f60 gate 1598907141121599400 evaluation starts +[4107 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7f60 signed by 0 principal evaluation starts (used [false]) +[4108 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7f60 processing identity 0 with bytes of 115a4b0 +[4109 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7f60 principal matched by identity 0 +[410a 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 9e 73 14 28 18 21 1d f9 18 a6 7b 11 64 ed 40 |..s.(.!....{.d.@| +00000010 87 cd 2c 29 a5 28 0d 2d c8 e9 60 18 ae 29 bf 2d |..,).(.-..`..).-| +[410b 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e1 77 99 e7 ee 43 a9 6f 30 e6 |0E.!...w...C.o0.| +00000010 fb 77 6a da bf cc 64 75 9d eb 18 cb 69 d4 bf c0 |.wj...du....i...| +00000020 08 bf 62 c2 4a 02 20 6d 34 73 8a 97 9d a4 7f c5 |..b.J. m4s......| +00000030 ba 10 d5 39 69 b9 5e e5 63 68 00 ce 7a 49 9e 5e |...9i.^.ch..zI.^| +00000040 f1 b2 c8 7f c7 f5 c3 |.......| +[410c 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7f60 principal evaluation succeeds for identity 0 +[410d 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051c7f60 gate 1598907141121599400 evaluation succeeds +[410e 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[410f 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4110 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4111 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4112 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4113 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4114 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4115 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4116 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[4117 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4118 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4119 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[411a 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[411b 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[411c 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[411d 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[411e 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[411f 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[4120 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4121 08-31 20:52:21.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4122 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4123 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4124 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4125 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[4126 08-31 20:52:21.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4127 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\002\303eS\003\014\311-3Y`\232\326-\377\211P\266\304ek~\272p\337\346\336\224SV\231\002 f\244q\307VCDA\302\366\337JmJm\344\000\2654\275R{\347:y\036\264n\235\222\266\212" > > > , Envelope: 271 bytes, Signature: 0 bytes +[4128 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req:\002\303eS\003\014\311-3Y`\232\326-\377\211P\266\304ek~\272p\337\346\336\224SV\231\002 f\244q\307VCDA\302\366\337JmJm\344\000\2654\275R{\347:y\036\264n\235\222\266\212" > > > , Envelope: 271 bytes, Signature: 0 bytes +[4129 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[412a 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:\002\303eS\003\014\311-3Y`\232\326-\377\211P\266\304ek~\272p\337\346\336\224SV\231\002 f\244q\307VCDA\302\366\337JmJm\344\000\2654\275R{\347:y\036\264n\235\222\266\212" > > > , Envelope: 271 bytes, Signature: 0 bytes +[412b 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[412c 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 b2 82 29 c0 2a f9 b3 a5 b0 b2 34 50 49 31 b3 |...).*.....4PI1.| +00000010 7d fc 93 2c 84 8a 3d 36 ec 6f 50 9e 1a 66 c0 2c |}..,..=6.oP..f.,| +[412d 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 9b 8b 2c 40 90 2f 80 63 af cd |0E.!....,@./.c..| +00000010 48 ca 37 69 29 29 9f bb 1d c3 5b 8f 63 a1 7c 47 |H.7i))....[.c.|G| +00000020 15 1f ae b2 23 02 20 24 bb 15 3f ac ba ee 84 d3 |....#. $..?.....| +00000030 7a 04 a8 d3 db 97 f1 f4 cf d9 e8 4f a1 21 81 7f |z..........O.!..| +00000040 ce 31 a6 98 54 3c 44 |.1..T DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[412f 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 3e 02 c3 65 53 03 0c c9 2d 33 59 60 |0D. >..eS...-3Y`| +00000010 9a d6 2d ff 89 50 b6 c4 65 6b 7e ba 70 df e6 de |..-..P..ek~.p...| +00000020 94 53 56 99 02 20 66 a4 71 c7 56 43 44 41 c2 f6 |.SV.. f.q.VCDA..| +00000030 df 4a 6d 4a 6d e4 00 b5 34 bd 52 7b e7 3a 79 1e |.JmJm...4.R{.:y.| +00000040 b4 6e 9d 92 b6 8a |.n....| +[4130 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes +[4131 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes]} +[4132 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4133 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4134 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[4135 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4136 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4137 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4138 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[4139 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[413a 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[413b 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes to 1 peers +[413c 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive:\002\303eS\003\014\311-3Y`\232\326-\377\211P\266\304ek~\272p\337\346\336\224SV\231\002 f\244q\307VCDA\302\366\337JmJm\344\000\2654\275R{\347:y\036\264n\235\222\266\212" > > alive: +[413d 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[413e 08-31 20:52:21.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[413f 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4140 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4141 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4142 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4143 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4144 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4145 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4146 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4147 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[4148 08-31 20:52:21.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4149 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[414a 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[414b 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[414c 08-31 20:52:21.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[414d 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[414e 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[414f 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4150 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4151 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4152 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4153 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4154 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051eb560 gate 1598907141510736700 evaluation starts +[4155 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051eb560 signed by 0 principal evaluation starts (used [false]) +[4156 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051eb560 processing identity 0 with bytes of 115a4b0 +[4157 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051eb560 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[4158 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051eb560 principal evaluation fails +[4159 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051eb560 gate 1598907141510736700 evaluation fails +[415a 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[415b 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[415c 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[415d 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051ebad0 gate 1598907141511004600 evaluation starts +[415e 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051ebad0 signed by 0 principal evaluation starts (used [false]) +[415f 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051ebad0 processing identity 0 with bytes of 115a4b0 +[4160 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051ebad0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4161 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051ebad0 principal evaluation fails +[4162 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0051ebad0 gate 1598907141511004600 evaluation fails +[4163 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4164 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4165 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4166 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525a040 gate 1598907141511332500 evaluation starts +[4167 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525a040 signed by 0 principal evaluation starts (used [false]) +[4168 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525a040 processing identity 0 with bytes of 115a4b0 +[4169 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525a040 principal matched by identity 0 +[416a 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 7e 2f 8e 4a e0 ef 3f 41 cc 65 57 67 1b 37 83 |.~/.J..?A.eWg.7.| +00000010 0e 55 35 d1 da 3f 2e b6 34 1a b3 ea fa b3 11 09 |.U5..?..4.......| +[416b 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c ff 97 c8 ab 01 42 c7 54 7e 27 c1 |0D. \.....B.T~'.| +00000010 99 22 31 c0 8a 82 a1 07 49 83 6c 18 c4 e5 cb 4c |."1.....I.l....L| +00000020 cb ca a3 a4 02 20 6c c0 df 95 33 89 f1 40 60 5d |..... l...3..@`]| +00000030 49 a2 9d 59 e8 dd f0 be 82 bc 9e 58 04 65 01 0d |I..Y.......X.e..| +00000040 62 25 ea 10 1b 58 |b%...X| +[416c 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525a040 principal evaluation succeeds for identity 0 +[416d 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00525a040 gate 1598907141511332500 evaluation succeeds +[416e 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[416f 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4170 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4171 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4172 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4173 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[4174 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4175 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4176 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4177 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4178 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4179 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[417a 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[417b 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[417c 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[417d 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[417e 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[417f 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[4180 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4181 08-31 20:52:21.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4182 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[4183 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4184 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[4185 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[4186 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[4187 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4188 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4189 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[418a 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[418b 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[418c 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[418d 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[418e 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[418f 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4190 08-31 20:52:21.52 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4191 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4192 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4193 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4194 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4195 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4196 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4197 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4198 08-31 20:52:21.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4199 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[419a 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816103A +[419b 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E79AF5539EF983DB2F34ADD51C20268558EE5CAB5D7E9CE36FF9491B23BC852C +[419c 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[419d 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[419e 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[419f 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[41a0 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41a1 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[41a2 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41a3 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[41a4 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[41a5 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41a6 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[41a7 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41a8 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[41a9 08-31 20:52:21.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41aa 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[41ab 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[41ac 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41ad 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 646 bytes, Signature: 0 bytes +[41ae 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[41af 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41b0 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[41b1 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[41b2 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[41b3 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[41b4 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[41b5 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[41b6 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005283af0 gate 1598907141613341400 evaluation starts +[41b7 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005283af0 signed by 0 principal evaluation starts (used [false]) +[41b8 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005283af0 processing identity 0 with bytes of 115a4b0 +[41b9 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005283af0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[41ba 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005283af0 principal evaluation fails +[41bb 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005283af0 gate 1598907141613341400 evaluation fails +[41bc 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[41bd 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[41be 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[41bf 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa060 gate 1598907141613624200 evaluation starts +[41c0 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa060 signed by 0 principal evaluation starts (used [false]) +[41c1 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa060 processing identity 0 with bytes of 115a4b0 +[41c2 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa060 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[41c3 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa060 principal evaluation fails +[41c4 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa060 gate 1598907141613624200 evaluation fails +[41c5 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[41c6 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[41c7 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[41c8 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa5d0 gate 1598907141613901900 evaluation starts +[41c9 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa5d0 signed by 0 principal evaluation starts (used [false]) +[41ca 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa5d0 processing identity 0 with bytes of 115a4b0 +[41cb 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa5d0 principal matched by identity 0 +[41cc 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 85 7e 2f 8e 4a e0 ef 3f 41 cc 65 57 67 1b 37 83 |.~/.J..?A.eWg.7.| +00000010 0e 55 35 d1 da 3f 2e b6 34 1a b3 ea fa b3 11 09 |.U5..?..4.......| +[41cd 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c ff 97 c8 ab 01 42 c7 54 7e 27 c1 |0D. \.....B.T~'.| +00000010 99 22 31 c0 8a 82 a1 07 49 83 6c 18 c4 e5 cb 4c |."1.....I.l....L| +00000020 cb ca a3 a4 02 20 6c c0 df 95 33 89 f1 40 60 5d |..... l...3..@`]| +00000030 49 a2 9d 59 e8 dd f0 be 82 bc 9e 58 04 65 01 0d |I..Y.......X.e..| +00000040 62 25 ea 10 1b 58 |b%...X| +[41ce 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa5d0 principal evaluation succeeds for identity 0 +[41cf 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052aa5d0 gate 1598907141613901900 evaluation succeeds +[41d0 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[41d1 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[41d2 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[41d3 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[41d4 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[41d5 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41d6 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[41d7 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 9a f5 53 9e f9 83 db 2f 34 ad d5 1c 20 26 85 |...S..../4... &.| +00000010 58 ee 5c ab 5d 7e 9c e3 6f f9 49 1b 23 bc 85 2c |X.\.]~..o.I.#..,| +[41d8 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 8f b8 0c ad a4 ff 4d 70 69 23 a7 |0D. w......Mpi#.| +00000010 b4 26 e3 1b 93 c8 16 6b 88 53 10 5b 0d 2f 05 ba |.&.....k.S.[./..| +00000020 a0 7b b5 64 02 20 44 8c a3 73 eb ae ed 12 e7 ac |.{.d. D..s......| +00000030 94 05 8e 24 5e b6 4b 48 75 3b 40 52 cc 85 23 5c |...$^.KHu;@R..#\| +00000040 f8 d3 83 df 4e ae |....N.| +[41d9 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[41da 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[41db 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41dc 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[41dd 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 b2 82 29 c0 2a f9 b3 a5 b0 b2 34 50 49 31 b3 |...).*.....4PI1.| +00000010 7d fc 93 2c 84 8a 3d 36 ec 6f 50 9e 1a 66 c0 2c |}..,..=6.oP..f.,| +[41de 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 9b 8b 2c 40 90 2f 80 63 af cd |0E.!....,@./.c..| +00000010 48 ca 37 69 29 29 9f bb 1d c3 5b 8f 63 a1 7c 47 |H.7i))....[.c.|G| +00000020 15 1f ae b2 23 02 20 24 bb 15 3f ac ba ee 84 d3 |....#. $..?.....| +00000030 7a 04 a8 d3 db 97 f1 f4 cf d9 e8 4f a1 21 81 7f |z..........O.!..| +00000040 ce 31 a6 98 54 3c 44 |.1..T DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41e0 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41e1 08-31 20:52:21.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41e2 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[41e3 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[41e4 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41e5 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 431 bytes, Signature: 0 bytes +[41e6 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[41e7 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 9a f5 53 9e f9 83 db 2f 34 ad d5 1c 20 26 85 |...S..../4... &.| +00000010 58 ee 5c ab 5d 7e 9c e3 6f f9 49 1b 23 bc 85 2c |X.\.]~..o.I.#..,| +[41e8 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 8f b8 0c ad a4 ff 4d 70 69 23 a7 |0D. w......Mpi#.| +00000010 b4 26 e3 1b 93 c8 16 6b 88 53 10 5b 0d 2f 05 ba |.&.....k.S.[./..| +00000020 a0 7b b5 64 02 20 44 8c a3 73 eb ae ed 12 e7 ac |.{.d. D..s......| +00000030 94 05 8e 24 5e b6 4b 48 75 3b 40 52 cc 85 23 5c |...$^.KHu;@R..#\| +00000040 f8 d3 83 df 4e ae |....N.| +[41e9 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[41ea 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a4 70 2c 74 bb 86 9e f8 50 1b 29 |0E.!..p,t....P.)| +00000010 77 78 d8 7f 0f 38 92 d0 c6 5a e7 4a aa 45 15 51 |wx...8...Z.J.E.Q| +00000020 a6 96 2b 4c 56 02 20 02 b3 17 0c 41 8e 09 40 40 |..+LV. ....A..@@| +00000030 14 05 78 60 e0 ac 99 f3 cd 14 04 5e b0 c0 d9 f1 |..x`.......^....| +00000040 c3 2e f5 14 4e 0b 5c |....N.\| +[41eb 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[41ec 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[41ed 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41ee 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41ef 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[41f0 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41f1 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[41f2 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[41f3 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 b2 82 29 c0 2a f9 b3 a5 b0 b2 34 50 49 31 b3 |...).*.....4PI1.| +00000010 7d fc 93 2c 84 8a 3d 36 ec 6f 50 9e 1a 66 c0 2c |}..,..=6.oP..f.,| +[41f4 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 83 9b 8b 2c 40 90 2f 80 63 af cd |0E.!....,@./.c..| +00000010 48 ca 37 69 29 29 9f bb 1d c3 5b 8f 63 a1 7c 47 |H.7i))....[.c.|G| +00000020 15 1f ae b2 23 02 20 24 bb 15 3f ac ba ee 84 d3 |....#. $..?.....| +00000030 7a 04 a8 d3 db 97 f1 f4 cf d9 e8 4f a1 21 81 7f |z..........O.!..| +00000040 ce 31 a6 98 54 3c 44 |.1..T DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[41f6 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[41f7 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[41f8 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[41f9 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[41fa 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[41fb 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[41fc 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[41fd 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[41fe 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[41ff 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e2c30 gate 1598907141624880000 evaluation starts +[4200 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e2c30 signed by 0 principal evaluation starts (used [false]) +[4201 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e2c30 processing identity 0 with bytes of 115a4b0 +[4202 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e2c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[4203 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e2c30 principal evaluation fails +[4204 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e2c30 gate 1598907141624880000 evaluation fails +[4205 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[4206 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4207 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4208 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e31a0 gate 1598907141625307100 evaluation starts +[4209 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e31a0 signed by 0 principal evaluation starts (used [false]) +[420a 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e31a0 processing identity 0 with bytes of 115a4b0 +[420b 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e31a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[420c 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e31a0 principal evaluation fails +[420d 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e31a0 gate 1598907141625307100 evaluation fails +[420e 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[420f 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4210 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4211 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e3710 gate 1598907141625638800 evaluation starts +[4212 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e3710 signed by 0 principal evaluation starts (used [false]) +[4213 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e3710 processing identity 0 with bytes of 115a4b0 +[4214 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e3710 principal matched by identity 0 +[4215 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f3 9e 73 14 28 18 21 1d f9 18 a6 7b 11 64 ed 40 |..s.(.!....{.d.@| +00000010 87 cd 2c 29 a5 28 0d 2d c8 e9 60 18 ae 29 bf 2d |..,).(.-..`..).-| +[4216 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 e1 77 99 e7 ee 43 a9 6f 30 e6 |0E.!...w...C.o0.| +00000010 fb 77 6a da bf cc 64 75 9d eb 18 cb 69 d4 bf c0 |.wj...du....i...| +00000020 08 bf 62 c2 4a 02 20 6d 34 73 8a 97 9d a4 7f c5 |..b.J. m4s......| +00000030 ba 10 d5 39 69 b9 5e e5 63 68 00 ce 7a 49 9e 5e |...9i.^.ch..zI.^| +00000040 f1 b2 c8 7f c7 f5 c3 |.......| +[4217 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e3710 principal evaluation succeeds for identity 0 +[4218 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0052e3710 gate 1598907141625638800 evaluation succeeds +[4219 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[421a 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[421b 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[421c 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[421d 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[421e 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[421f 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4220 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e7 9a f5 53 9e f9 83 db 2f 34 ad d5 1c 20 26 85 |...S..../4... &.| +00000010 58 ee 5c ab 5d 7e 9c e3 6f f9 49 1b 23 bc 85 2c |X.\.]~..o.I.#..,| +[4221 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 8f b8 0c ad a4 ff 4d 70 69 23 a7 |0D. w......Mpi#.| +00000010 b4 26 e3 1b 93 c8 16 6b 88 53 10 5b 0d 2f 05 ba |.&.....k.S.[./..| +00000020 a0 7b b5 64 02 20 44 8c a3 73 eb ae ed 12 e7 ac |.{.d. D..s......| +00000030 94 05 8e 24 5e b6 4b 48 75 3b 40 52 cc 85 23 5c |...$^.KHu;@R..#\| +00000040 f8 d3 83 df 4e ae |....N.| +[4222 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4223 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4224 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4225 08-31 20:52:21.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4226 08-31 20:52:21.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4227 08-31 20:52:21.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4228 08-31 20:52:21.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[4229 08-31 20:52:21.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[422a 08-31 20:52:21.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[422b 08-31 20:52:21.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[422c 08-31 20:52:21.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[422d 08-31 20:52:21.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[422e 08-31 20:52:21.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[422f 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4230 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4231 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes to 3 peers +[4232 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4233 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4234 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[4235 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4236 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[4237 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4238 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\231\001\315\347\304\212tz0\227P\032\024\232zP\313\271\310{\310 \247\207w\376\303kqu-<" channel_MAC:"\364S\207\354\322\234\35641F\200\224\331\273F!\253\376\331\322\tm\215\255\352B\006\027d\026\313S" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[4239 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[423a 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[423b 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[423c 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +[423d 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +00000040 aa cd d6 30 b0 82 e3 |...0...| +[423e 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +[423f 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +00000040 8d 22 17 b0 af d9 4b |."....K| +[4240 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4241 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4242 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4243 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4244 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4245 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4246 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4247 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4248 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c460 gate 1598907141689947600 evaluation starts +[4249 08-31 20:52:21.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c460 signed by 0 principal evaluation starts (used [false]) +[424a 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c460 processing identity 0 with bytes of 115a4b0 +[424b 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c460 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[424c 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c460 principal evaluation fails +[424d 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c460 gate 1598907141689947600 evaluation fails +[424e 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[424f 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4250 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4251 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c9d0 gate 1598907141690224300 evaluation starts +[4252 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c9d0 signed by 0 principal evaluation starts (used [false]) +[4253 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c9d0 processing identity 0 with bytes of 115a4b0 +[4254 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c9d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4255 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c9d0 principal evaluation fails +[4256 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[4257 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 783 bytes, Signature: 0 bytes +[4258 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532c9d0 gate 1598907141690224300 evaluation fails +[4259 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[425a 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[425b 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[425c 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532cf40 gate 1598907141696488700 evaluation starts +[425d 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532cf40 signed by 0 principal evaluation starts (used [false]) +[425e 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532cf40 processing identity 0 with bytes of 115a4b0 +[425f 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532cf40 principal matched by identity 0 +[4260 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +[4261 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +00000040 9c 30 13 97 0e fc |.0....| +[4262 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532cf40 principal evaluation succeeds for identity 0 +[4263 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00532cf40 gate 1598907141696488700 evaluation succeeds +[4264 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4265 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4266 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4267 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4268 08-31 20:52:21.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4269 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[426a 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[426b 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[426c 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[426d 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[426e 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[426f 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4270 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e140 gate 1598907141706957500 evaluation starts +[4271 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e140 signed by 0 principal evaluation starts (used [false]) +[4272 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e140 processing identity 0 with bytes of 115a4b0 +[4273 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[4274 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e140 principal evaluation fails +[4275 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e140 gate 1598907141706957500 evaluation fails +[4276 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[4277 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4278 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4279 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e6b0 gate 1598907141709576500 evaluation starts +[427a 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e6b0 signed by 0 principal evaluation starts (used [false]) +[427b 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e6b0 processing identity 0 with bytes of 115a4b0 +[427c 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e6b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[427d 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e6b0 principal evaluation fails +[427e 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534e6b0 gate 1598907141709576500 evaluation fails +[427f 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4280 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4281 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4282 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534ec20 gate 1598907141709814400 evaluation starts +[4283 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534ec20 signed by 0 principal evaluation starts (used [false]) +[4284 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534ec20 processing identity 0 with bytes of 115a4b0 +[4285 08-31 20:52:21.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534ec20 principal matched by identity 0 +[4286 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +[4287 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +00000040 30 1a be f0 35 29 |0...5)| +[4288 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534ec20 principal evaluation succeeds for identity 0 +[4289 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534ec20 gate 1598907141709814400 evaluation succeeds +[428a 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[428b 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[428c 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[428d 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[428e 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[428f 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4290 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4291 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4292 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4293 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4294 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534f760 gate 1598907141711140600 evaluation starts +[4295 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534f760 signed by 0 principal evaluation starts (used [false]) +[4296 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534f760 processing identity 0 with bytes of 115a4b0 +[4297 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534f760 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[4298 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534f760 principal evaluation fails +[4299 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534f760 gate 1598907141711140600 evaluation fails +[429a 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[429b 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[429c 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[429d 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534fcd0 gate 1598907141712108800 evaluation starts +[429e 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534fcd0 signed by 0 principal evaluation starts (used [false]) +[429f 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534fcd0 processing identity 0 with bytes of 115a4b0 +[42a0 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534fcd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[42a1 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534fcd0 principal evaluation fails +[42a2 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00534fcd0 gate 1598907141712108800 evaluation fails +[42a3 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[42a4 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[42a5 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[42a6 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366240 gate 1598907141713073600 evaluation starts +[42a7 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366240 signed by 0 principal evaluation starts (used [false]) +[42a8 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366240 processing identity 0 with bytes of 115a4b0 +[42a9 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366240 principal matched by identity 0 +[42aa 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +[42ab 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +00000040 30 1a be f0 35 29 |0...5)| +[42ac 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366240 principal evaluation succeeds for identity 0 +[42ad 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005366240 gate 1598907141713073600 evaluation succeeds +[42ae 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[42af 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[42b0 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[42b1 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[42b2 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[42b3 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 782 bytes, Signature: 0 bytes +[42b4 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +[42b5 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +00000040 aa cd d6 30 b0 82 e3 |...0...| +[42b6 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42b7 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42b8 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[42b9 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[42ba 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[42bb 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[42bc 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[42bd 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[42be 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367cd0 gate 1598907141716015400 evaluation starts +[42bf 08-31 20:52:21.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367cd0 signed by 0 principal evaluation starts (used [false]) +[42c0 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367cd0 processing identity 0 with bytes of 115a4b0 +[42c1 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367cd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[42c2 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367cd0 principal evaluation fails +[42c3 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005367cd0 gate 1598907141716015400 evaluation fails +[42c4 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[42c5 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[42c6 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[42c7 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e240 gate 1598907141720997900 evaluation starts +[42c8 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e240 signed by 0 principal evaluation starts (used [false]) +[42c9 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e240 processing identity 0 with bytes of 115a4b0 +[42ca 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e240 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[42cb 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e240 principal evaluation fails +[42cc 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e240 gate 1598907141720997900 evaluation fails +[42cd 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[42ce 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[42cf 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[42d0 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e7b0 gate 1598907141721544300 evaluation starts +[42d1 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e7b0 signed by 0 principal evaluation starts (used [false]) +[42d2 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e7b0 processing identity 0 with bytes of 115a4b0 +[42d3 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e7b0 principal matched by identity 0 +[42d4 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f5 ff 6e c3 6f d1 46 a2 4c e7 08 ba 4f d3 22 a9 |..n.o.F.L...O.".| +00000010 64 29 c9 4a 7c 34 b8 9c c6 1a 7d ba 8d 8c b9 ee |d).J|4....}.....| +[42d5 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 7a 73 fc c0 62 51 b4 65 4e 97 dc |0D. Lzs..bQ.eN..| +00000010 b3 12 83 8f 0e 15 92 cb 5a ba c3 73 ac 7c 3e ee |........Z..s.|>.| +00000020 bf ff 14 30 02 20 26 19 4b 4b 03 a4 ac 0c a1 00 |...0. &.KK......| +00000030 e6 71 c3 03 51 c5 cc bc 57 5c 66 ed af 27 ff 73 |.q..Q...W\f..'.s| +00000040 9c 30 13 97 0e fc |.0....| +[42d6 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e7b0 principal evaluation succeeds for identity 0 +[42d7 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537e7b0 gate 1598907141721544300 evaluation succeeds +[42d8 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[42d9 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[42da 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[42db 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[42dc 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42dd 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[42de 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[42df 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[42e0 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[42e1 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[42e2 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[42e3 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[42e4 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537f9b0 gate 1598907141725352700 evaluation starts +[42e5 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537f9b0 signed by 0 principal evaluation starts (used [false]) +[42e6 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537f9b0 processing identity 0 with bytes of 115a4b0 +[42e7 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537f9b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[42e8 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537f9b0 principal evaluation fails +[42e9 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537f9b0 gate 1598907141725352700 evaluation fails +[42ea 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[42eb 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[42ec 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[42ed 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537ff20 gate 1598907141727622400 evaluation starts +[42ee 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537ff20 signed by 0 principal evaluation starts (used [false]) +[42ef 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537ff20 processing identity 0 with bytes of 115a4b0 +[42f0 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537ff20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[42f1 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537ff20 principal evaluation fails +[42f2 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00537ff20 gate 1598907141727622400 evaluation fails +[42f3 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[42f4 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[42f5 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[42f6 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539c490 gate 1598907141729304800 evaluation starts +[42f7 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539c490 signed by 0 principal evaluation starts (used [false]) +[42f8 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539c490 processing identity 0 with bytes of 115a4b0 +[42f9 08-31 20:52:21.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539c490 principal matched by identity 0 +[42fa 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +[42fb 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +00000040 41 a3 44 15 ec f1 bb |A.D....| +[42fc 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539c490 principal evaluation succeeds for identity 0 +[42fd 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539c490 gate 1598907141729304800 evaluation succeeds +[42fe 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[42ff 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4300 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4301 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4302 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +[4303 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +00000040 ea ef c2 09 9e b7 21 |......!| +[4304 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4305 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4306 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4307 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4308 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4309 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[430a 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc6gAwIBAgIQV776n4HyMjh85JNS51gT2jAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGoxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ0wCwYDVQQLEwRwZWVyMR8wHQYDVQQDExZwZWVyMS5vcmcx +LmV4YW1wbGUuY29tMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEADNfB/l8OJq1 +Y2ArnTR+JraAaC15+TQDO3rmcP+5pzjH+MPEMminP05o/yQ208muwqkxdTZdlvHZ +kmII44he+aNNMEswDgYDVR0PAQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwKwYDVR0j +BCQwIoAgnbohrh8qdw12XSv+DDGUObY8nCbBH+a7lOqSDoXA0zcwCgYIKoZIzj0E +AwIDSAAwRQIhAPgvoQoOE+1sUrEx/xFs/zkFjgR5OWwuJpix6K98nFszAiA3BPbn +XepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw== +-----END CERTIFICATE----- +[430b 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539d610 gate 1598907141732150700 evaluation starts +[430c 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539d610 signed by 0 principal evaluation starts (used [false]) +[430d 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539d610 processing identity 0 with bytes of 115a4b0 +[430e 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539d610 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +[430f 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539d610 principal evaluation fails +[4310 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00539d610 gate 1598907141732150700 evaluation fails +[4311 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[4312 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4313 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4314 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053bc460 gate 1598907141732536000 evaluation starts +[4315 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053bc460 signed by 0 principal evaluation starts (used [false]) +[4316 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053bc460 processing identity 0 with bytes of 115a4b0 +[4317 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[4318 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[4319 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[431a 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053bc460 principal matched by identity 0 +[431b 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +[431c 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +00000040 ea ef c2 09 9e b7 21 |......!| +[431d 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053bc460 principal evaluation succeeds for identity 0 +[431e 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053bc460 gate 1598907141732536000 evaluation succeeds +[431f 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[4320 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4321 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4322 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4323 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4324 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 783 bytes, Signature: 0 bytes +[4325 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4326 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 de 37 10 1e 87 31 d4 58 8e 15 f5 5e c1 c7 17 e4 |.7...1.X...^....| +00000010 4a de d9 8c a6 28 4a 04 06 49 90 42 f8 74 ab 06 |J....(J..I.B.t..| +[4327 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 b7 a2 d9 6e 15 da c8 53 05 30 d8 |0E.!....n...S.0.| +00000010 c1 f8 ca 60 b9 70 05 bf db d0 60 6d 7e 23 ce d4 |...`.p....`m~#..| +00000020 f2 0a 74 f8 8a 02 20 46 47 55 19 c2 5d 42 ff 11 |..t... FGU..]B..| +00000030 9d 10 03 7c 4d 8d c8 7a f1 12 be 58 f9 b6 ad c2 |...|M..z...X....| +00000040 aa cd d6 30 b0 82 e3 |...0...| +[4328 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 7f a0 e8 d9 04 be e7 6e 69 f7 f6 5e b6 e5 38 59 |.......ni..^..8Y| +00000010 71 48 b7 8d b1 82 ab cb 5f 35 6b d7 ab a1 ce 18 |qH......_5k.....| +[4329 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 4f 7d 96 74 3f fb 83 e8 b3 a1 |0E.!..O}.t?.....| +00000010 0c 34 c5 7d 8e a4 ea 3d c6 b9 85 33 70 0e de 8b |.4.}...=...3p...| +00000020 f5 81 10 a8 ec 02 20 06 ba 24 b9 f5 ec 97 1e 0c |...... ..$......| +00000030 c8 9a 82 14 51 fc 8b 02 28 0e 14 43 d0 0f 07 f5 |....Q...(..C....| +00000040 8d 22 17 b0 af d9 4b |."....K| +[432a 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[432b 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[432c 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[432d 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[432e 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[432f 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4330 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4331 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4332 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053da920 gate 1598907141736943100 evaluation starts +[4333 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053da920 signed by 0 principal evaluation starts (used [false]) +[4334 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053da920 processing identity 0 with bytes of 115a4b0 +[4335 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053da920 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[4336 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053da920 principal evaluation fails +[4337 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053da920 gate 1598907141736943100 evaluation fails +[4338 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[4339 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[433a 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[433b 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053dae90 gate 1598907141739090500 evaluation starts +[433c 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053dae90 signed by 0 principal evaluation starts (used [false]) +[433d 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053dae90 processing identity 0 with bytes of 115a4b0 +[433e 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053dae90 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[433f 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053dae90 principal evaluation fails +[4340 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053dae90 gate 1598907141739090500 evaluation fails +[4341 08-31 20:52:21.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4342 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4343 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4344 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053db400 gate 1598907141740456700 evaluation starts +[4345 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053db400 signed by 0 principal evaluation starts (used [false]) +[4346 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053db400 processing identity 0 with bytes of 115a4b0 +[4347 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053db400 principal matched by identity 0 +[4348 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 22 82 29 a8 af fa 96 58 5c 87 9b 68 1c 81 5f ec |".)....X\..h.._.| +00000010 03 a3 23 84 66 b1 c4 01 9d 75 d5 b4 80 a8 1d 17 |..#.f....u......| +[4349 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 96 39 76 e9 06 b1 c1 5a e2 93 c5 |0E.!..9v....Z...| +00000010 5f 3c 01 6c b1 9e 59 73 84 24 f5 e3 b4 54 34 f5 |_<.l..Ys.$...T4.| +00000020 aa 8f 60 f9 81 02 20 2a 4d 9e 37 52 2d fd 3a b8 |..`... *M.7R-.:.| +00000030 63 48 58 05 58 5e d4 0c f5 97 6f 14 c3 48 eb 18 |cHX.X^....o..H..| +00000040 41 a3 44 15 ec f1 bb |A.D....| +[434a 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053db400 principal evaluation succeeds for identity 0 +[434b 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053db400 gate 1598907141740456700 evaluation succeeds +[434c 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[434d 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[434e 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[434f 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4350 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4351 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4352 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4353 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4354 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4355 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4356 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4357 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4358 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4600 gate 1598907141742222000 evaluation starts +[4359 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4600 signed by 0 principal evaluation starts (used [false]) +[435a 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4600 processing identity 0 with bytes of 115a4b0 +[435b 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4600 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[435c 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4600 principal evaluation fails +[435d 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4600 gate 1598907141742222000 evaluation fails +[435e 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[435f 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4360 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4361 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4b70 gate 1598907141742787000 evaluation starts +[4362 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4b70 signed by 0 principal evaluation starts (used [false]) +[4363 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4b70 processing identity 0 with bytes of 115a4b0 +[4364 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4b70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4365 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4b70 principal evaluation fails +[4366 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f4b70 gate 1598907141742787000 evaluation fails +[4367 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4368 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4369 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[436a 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f50e0 gate 1598907141743328100 evaluation starts +[436b 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f50e0 signed by 0 principal evaluation starts (used [false]) +[436c 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f50e0 processing identity 0 with bytes of 115a4b0 +[436d 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f50e0 principal matched by identity 0 +[436e 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +[436f 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +[4370 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f50e0 principal evaluation succeeds for identity 0 +[4371 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f50e0 gate 1598907141743328100 evaluation succeeds +[4372 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4373 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4374 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4375 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4376 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4377 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4378 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4379 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[437a 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[437b 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[437c 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f5c20 gate 1598907141745075600 evaluation starts +[437d 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f5c20 signed by 0 principal evaluation starts (used [false]) +[437e 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f5c20 processing identity 0 with bytes of 115a4b0 +[437f 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f5c20 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[4380 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f5c20 principal evaluation fails +[4381 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0053f5c20 gate 1598907141745075600 evaluation fails +[4382 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[4383 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4384 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4385 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a190 gate 1598907141745799900 evaluation starts +[4386 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a190 signed by 0 principal evaluation starts (used [false]) +[4387 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a190 processing identity 0 with bytes of 115a4b0 +[4388 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a190 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4389 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a190 principal evaluation fails +[438a 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a190 gate 1598907141745799900 evaluation fails +[438b 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[438c 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[438d 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[438e 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a700 gate 1598907141746499300 evaluation starts +[438f 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a700 signed by 0 principal evaluation starts (used [false]) +[4390 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a700 processing identity 0 with bytes of 115a4b0 +[4391 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a700 principal matched by identity 0 +[4392 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +[4393 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +[4394 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a700 principal evaluation succeeds for identity 0 +[4395 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00540a700 gate 1598907141746499300 evaluation succeeds +[4396 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4397 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4398 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4399 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[439a 08-31 20:52:21.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[439b 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[439c 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[439d 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[439e 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[439f 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43a0 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes to 1 peers +[43a1 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[43a2 08-31 20:52:21.81 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43a3 08-31 20:52:21.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +[43a4 08-31 20:52:21.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +[43a5 08-31 20:52:21.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 52 bytes, Signature: 0 bytes +[43a6 08-31 20:52:21.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43a7 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[43a8 08-31 20:52:21.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[43a9 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43aa 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43ab 08-31 20:52:21.94 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43ac 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[43ad 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[43ae 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +[43af 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +00000040 ea ef c2 09 9e b7 21 |......!| +[43b0 08-31 20:52:21.95 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43b1 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[43b2 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[43b3 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +[43b4 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +00000040 ea ef c2 09 9e b7 21 |......!| +[43b5 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43b6 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43b7 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" channel_MAC:"7\237\031\227\256\010\221S\347\377\236\027\270a\034(\220T\265\0258{\000\010\246\032\231\271\213\244\346\321" properties: > > , Envelope: 112 bytes, Signature: 71 bytes +[43b8 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +[43b9 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +00000040 ea ef c2 09 9e b7 21 |......!| +[43ba 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43bb 08-31 20:52:21.97 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43bc 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[43bd 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[43be 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[43bf 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [4 5 6 1 2 3] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[43c0 08-31 20:52:22.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43c1 08-31 20:52:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[43c2 08-31 20:52:22.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43c3 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43c4 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43c5 08-31 20:52:22.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43c6 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[43c7 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43c8 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[43c9 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[43ca 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[43cb 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[43cc 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[43cd 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[43ce 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005439f70 gate 1598907142175671300 evaluation starts +[43cf 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005439f70 signed by 0 principal evaluation starts (used [false]) +[43d0 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005439f70 processing identity 0 with bytes of 115a4b0 +[43d1 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005439f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[43d2 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005439f70 principal evaluation fails +[43d3 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005439f70 gate 1598907142175671300 evaluation fails +[43d4 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[43d5 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[43d6 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[43d7 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054644e0 gate 1598907142177842000 evaluation starts +[43d8 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054644e0 signed by 0 principal evaluation starts (used [false]) +[43d9 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054644e0 processing identity 0 with bytes of 115a4b0 +[43da 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054644e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[43db 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054644e0 principal evaluation fails +[43dc 08-31 20:52:22.17 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054644e0 gate 1598907142177842000 evaluation fails +[43dd 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[43de 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[43df 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[43e0 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005464a50 gate 1598907142180655000 evaluation starts +[43e1 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005464a50 signed by 0 principal evaluation starts (used [false]) +[43e2 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005464a50 processing identity 0 with bytes of 115a4b0 +[43e3 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005464a50 principal matched by identity 0 +[43e4 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +[43e5 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +00000040 30 1a be f0 35 29 |0...5)| +[43e6 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005464a50 principal evaluation succeeds for identity 0 +[43e7 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005464a50 gate 1598907142180655000 evaluation succeeds +[43e8 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[43e9 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[43ea 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[43eb 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[43ec 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43ed 08-31 20:52:22.18 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[43ee 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[43ef 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" channel_MAC:"\220\013b_\214R\214.\341\030\005\347db|\035\201\307i\311\234\t\334\273`B\260\300\031\266\001\200" properties: > > , Envelope: 112 bytes, Signature: 70 bytes +[43f0 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[43f1 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[43f2 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[43f3 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[43f4 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[43f5 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[43f6 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[43f7 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005315d40 gate 1598907142197710400 evaluation starts +[43f8 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005315d40 signed by 0 principal evaluation starts (used [false]) +[43f9 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005315d40 processing identity 0 with bytes of 115a4b0 +[43fa 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005315d40 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[43fb 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005315d40 principal evaluation fails +[43fc 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005315d40 gate 1598907142197710400 evaluation fails +[43fd 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[43fe 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[43ff 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4400 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054802b0 gate 1598907142198082500 evaluation starts +[4401 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054802b0 signed by 0 principal evaluation starts (used [false]) +[4402 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054802b0 processing identity 0 with bytes of 115a4b0 +[4403 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054802b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4404 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054802b0 principal evaluation fails +[4405 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054802b0 gate 1598907142198082500 evaluation fails +[4406 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4407 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4408 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4409 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005480820 gate 1598907142198546600 evaluation starts +[440a 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005480820 signed by 0 principal evaluation starts (used [false]) +[440b 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005480820 processing identity 0 with bytes of 115a4b0 +[440c 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005480820 principal matched by identity 0 +[440d 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +[440e 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +00000040 30 1a be f0 35 29 |0...5)| +[440f 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005480820 principal evaluation succeeds for identity 0 +[4410 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005480820 gate 1598907142198546600 evaluation succeeds +[4411 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4412 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4413 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4414 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4415 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4416 08-31 20:52:22.19 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4417 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4418 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4419 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[441a 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[441b 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[441c 08-31 20:52:22.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[441d 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[441e 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info: pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" channel_MAC:"yR\225\263\372\363\037z\371 > > , Envelope: 112 bytes, Signature: 71 bytes +[441f 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4420 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4421 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4422 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4423 08-31 20:52:22.42 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4424 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4425 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4426 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005481c30 gate 1598907142430241000 evaluation starts +[4427 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005481c30 signed by 0 principal evaluation starts (used [false]) +[4428 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005481c30 processing identity 0 with bytes of 115a4b0 +[4429 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005481c30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[442a 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005481c30 principal evaluation fails +[442b 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005481c30 gate 1598907142430241000 evaluation fails +[442c 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[442d 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[442e 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[442f 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c1a0 gate 1598907142431755600 evaluation starts +[4430 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c1a0 signed by 0 principal evaluation starts (used [false]) +[4431 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c1a0 processing identity 0 with bytes of 115a4b0 +[4432 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c1a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4433 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c1a0 principal evaluation fails +[4434 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c1a0 gate 1598907142431755600 evaluation fails +[4435 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4436 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4437 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4438 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c710 gate 1598907142432905200 evaluation starts +[4439 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c710 signed by 0 principal evaluation starts (used [false]) +[443a 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c710 processing identity 0 with bytes of 115a4b0 +[443b 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c710 principal matched by identity 0 +[443c 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +[443d 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +[443e 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c710 principal evaluation succeeds for identity 0 +[443f 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00549c710 gate 1598907142432905200 evaluation succeeds +[4440 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4441 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4442 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4443 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4444 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4445 08-31 20:52:22.43 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4446 08-31 20:52:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[4447 08-31 20:52:23.78 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[4448 08-31 20:52:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4449 08-31 20:52:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610121801 +[444a 08-31 20:52:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: F4D5E09687388F25B45A0F31981F6DB405EC4D751786A0F6819E2B9DB8E750B7 +[444b 08-31 20:52:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[444c 08-31 20:52:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[444d 08-31 20:52:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[444e 08-31 20:52:23.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[444f 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4450 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes to 1 peers +[4451 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4452 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 71 bytes +[4453 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4454 08-31 20:52:23.80 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4455 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4456 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4457 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4458 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4459 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[445a 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[445b 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[445c 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[445d 08-31 20:52:24.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[445e 08-31 20:52:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[445f 08-31 20:52:24.99 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4460 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4461 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4462 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4463 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4464 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[4465 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4466 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4467 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4468 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4469 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[446a 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[446b 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[446c 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4650 gate 1598907145033944900 evaluation starts +[446d 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4650 signed by 0 principal evaluation starts (used [false]) +[446e 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4650 processing identity 0 with bytes of 115a4b0 +[446f 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4650 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[4470 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4650 principal evaluation fails +[4471 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4650 gate 1598907145033944900 evaluation fails +[4472 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[4473 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4474 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4475 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4bc0 gate 1598907145037984700 evaluation starts +[4476 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4bc0 signed by 0 principal evaluation starts (used [false]) +[4477 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4bc0 processing identity 0 with bytes of 115a4b0 +[4478 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4bc0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4479 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4bc0 principal evaluation fails +[447a 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d4bc0 gate 1598907145037984700 evaluation fails +[447b 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[447c 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[447d 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[447e 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d5130 gate 1598907145038725000 evaluation starts +[447f 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d5130 signed by 0 principal evaluation starts (used [false]) +[4480 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d5130 processing identity 0 with bytes of 115a4b0 +[4481 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d5130 principal matched by identity 0 +[4482 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 91 b0 f9 f3 76 b0 19 27 5f 6f f0 59 26 46 b4 f9 |....v..'_o.Y&F..| +00000010 15 b0 6a ce 97 a7 73 a0 23 d2 88 89 5c 3c bb 66 |..j...s.#...\<.f| +[4483 08-31 20:52:25.03 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 95 de f1 e7 50 26 d3 49 87 f7 44 |0E.!.....P&.I..D| +00000010 0f 87 ad 2e 86 4f 36 b1 1a e6 0a 6a 28 fd 1a fd |.....O6....j(...| +00000020 57 8a a0 5d d5 02 20 5d 02 7a 4d c5 23 dc bf a6 |W..].. ].zM.#...| +00000030 c9 74 49 b6 bd 3e d6 41 68 f3 72 02 fe b8 bd b2 |.tI..>.Ah.r.....| +00000040 07 10 79 82 e6 73 62 |..y..sb| +[4484 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d5130 principal evaluation succeeds for identity 0 +[4485 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054d5130 gate 1598907145038725000 evaluation succeeds +[4486 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4487 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4488 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4489 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[448a 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[448b 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[448c 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[448d 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[448e 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[448f 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4490 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4491 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4492 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4493 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4494 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4495 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4496 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4497 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4498 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4499 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[449a 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[449b 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[449c 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[449d 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[449e 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[449f 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44a0 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44a1 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44a2 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44a3 08-31 20:52:25.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44a4 08-31 20:52:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44a5 08-31 20:52:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44a6 08-31 20:52:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44a7 08-31 20:52:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44a8 08-31 20:52:25.05 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44a9 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[44aa 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[44ab 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44ac 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[44ad 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[44ae 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44af 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[44b0 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[44b1 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[44b2 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[44b3 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[44b4 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[44b5 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054cdbd0 gate 1598907145122301000 evaluation starts +[44b6 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054cdbd0 signed by 0 principal evaluation starts (used [false]) +[44b7 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054cdbd0 processing identity 0 with bytes of 115a4b0 +[44b8 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054cdbd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[44b9 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054cdbd0 principal evaluation fails +[44ba 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0054cdbd0 gate 1598907145122301000 evaluation fails +[44bb 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[44bc 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[44bd 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[44be 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c140 gate 1598907145123174500 evaluation starts +[44bf 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c140 signed by 0 principal evaluation starts (used [false]) +[44c0 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c140 processing identity 0 with bytes of 115a4b0 +[44c1 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[44c2 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c140 principal evaluation fails +[44c3 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c140 gate 1598907145123174500 evaluation fails +[44c4 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[44c5 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[44c6 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[44c7 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c6b0 gate 1598907145124643600 evaluation starts +[44c8 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c6b0 signed by 0 principal evaluation starts (used [false]) +[44c9 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c6b0 processing identity 0 with bytes of 115a4b0 +[44ca 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c6b0 principal matched by identity 0 +[44cb 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 bb 37 cd a7 3d c7 15 e9 10 ed e0 8b 7c cb 8b |..7..=.......|..| +00000010 37 da ab 81 32 e6 31 10 6e 3a f2 65 5d 49 60 6a |7...2.1.n:.e]I`j| +[44cc 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb d8 7a 44 f0 ba 1c 97 51 e4 6b |0E.!...zD....Q.k| +00000010 df af be f7 46 7e cd 10 71 ac cf 38 e6 99 9b 95 |....F~..q..8....| +00000020 8f 1a 12 16 6a 02 20 2c 40 29 1b 48 a5 78 d7 11 |....j. ,@).H.x..| +00000030 e1 ab a0 0f 96 3c b1 51 15 13 b7 a7 58 76 e5 73 |.....<.Q....Xv.s| +00000040 65 eb f1 d2 be ca 9d |e......| +[44cd 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c6b0 principal evaluation succeeds for identity 0 +[44ce 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00550c6b0 gate 1598907145124643600 evaluation succeeds +[44cf 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[44d0 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[44d1 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[44d2 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[44d3 08-31 20:52:25.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44d4 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[44d5 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[44d6 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[44d7 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[44d8 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44d9 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44da 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[44db 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44dc 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44dd 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[44de 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes to 1 peers +[44df 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive: +[44e0 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44e1 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[44e2 08-31 20:52:25.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44e3 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[44e4 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[44e5 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[44e6 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[44e7 08-31 20:52:25.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44e8 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44e9 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44ea 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44eb 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44ec 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[44ed 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 e8 7e b8 fb 7b 92 f9 a8 55 43 c1 69 4c 47 d2 b2 |.~..{...UC.iLG..| +00000010 11 10 12 61 78 d4 eb 0c c8 d1 65 aa 08 6c fa 51 |...ax.....e..l.Q| +[44ee 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f4 8b 52 d5 99 fe 97 1c 64 ef 6c |0E.!...R.....d.l| +00000010 06 64 3b 74 65 f3 cf f8 32 a5 57 36 bb 76 2c c8 |.d;te...2.W6.v,.| +00000020 b6 aa ec a4 dd 02 20 4d 13 76 f1 83 d6 67 90 3d |...... M.v...g.=| +00000030 dd fb b8 0e e1 80 26 48 e1 a7 72 11 50 fb 81 26 |......&H..r.P..&| +00000040 ab 16 85 61 5e a6 cc |...a^..| +[44ef 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44f0 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[44f1 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[44f2 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[44f3 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 70 bytes in aliveMembership +[44f4 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44f5 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44f6 08-31 20:52:25.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44f7 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44f8 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44f9 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44fa 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44fb 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44fc 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44fd 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[44fe 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[44ff 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4500 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4501 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4502 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4503 08-31 20:52:25.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4504 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4505 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4506 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4507 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4508 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4509 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[450a 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[450b 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[450c 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[450d 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[450e 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[450f 08-31 20:52:25.32 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 92 97 fa aa d4 02 28 8b d8 61 84 86 f9 40 ef |.......(..a...@.| +00000010 fb 5e cd 5b 1d b1 37 dc 33 68 1e 31 30 75 bd 0b |.^.[..7.3h.10u..| +[4510 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 34 0f 82 b6 c8 0f 1b 71 00 00 |0E.!..4......q..| +00000010 b4 79 07 e4 fd da 76 35 0d 8a 32 f0 9a 5a c6 f9 |.y....v5..2..Z..| +00000020 e3 4d 1b e5 84 02 20 21 79 59 ec 7f e4 89 df b6 |.M.... !yY......| +00000030 9c 4b 7e 22 d9 b1 ef d7 6a b6 7c 1a 7b ef a3 2d |.K~"....j.|.{..-| +00000040 07 5c bb e6 ba bb 91 |.\.....| +[4511 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[4512 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 89 b1 7a e6 b4 a4 6a e8 fe ac f8 |0E.!...z...j....| +00000010 8b c3 a8 4c 38 56 b3 df b5 84 73 54 21 00 46 fd |...L8V....sT!.F.| +00000020 6f ef 16 a1 2b 02 20 57 6a 51 e6 a0 90 d0 a0 75 |o...+. WjQ.....u| +00000030 a6 a0 f7 30 0f 78 26 93 55 0f e9 e6 4c bf bc ec |...0.x&.U...L...| +00000040 b7 07 32 7c 5f 30 fa |..2|_0.| +[4513 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[4514 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[4515 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4516 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4517 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4518 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4519 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[451a 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[451b 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[451c 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[451d 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[451e 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +[451f 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive: +[4520 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[4521 08-31 20:52:25.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4522 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4523 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4524 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4525 08-31 20:52:25.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4526 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4527 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4528 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4529 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[452a 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c] to 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[452b 08-31 20:52:25.42 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[452c 08-31 20:52:25.43 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 25s +[452d 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[452e 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[452f 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4530 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[4531 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4532 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4533 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4534 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4535 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4536 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4537 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4538 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005544e80 gate 1598907145448785400 evaluation starts +[4539 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005544e80 signed by 0 principal evaluation starts (used [false]) +[453a 08-31 20:52:25.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005544e80 processing identity 0 with bytes of 115a4b0 +[453b 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005544e80 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[453c 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005544e80 principal evaluation fails +[453d 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005544e80 gate 1598907145448785400 evaluation fails +[453e 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[453f 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4540 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4541 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055453f0 gate 1598907145450436500 evaluation starts +[4542 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055453f0 signed by 0 principal evaluation starts (used [false]) +[4543 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055453f0 processing identity 0 with bytes of 115a4b0 +[4544 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055453f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4545 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055453f0 principal evaluation fails +[4546 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055453f0 gate 1598907145450436500 evaluation fails +[4547 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4548 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4549 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[454a 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005545960 gate 1598907145450721200 evaluation starts +[454b 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005545960 signed by 0 principal evaluation starts (used [false]) +[454c 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005545960 processing identity 0 with bytes of 115a4b0 +[454d 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005545960 principal matched by identity 0 +[454e 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 2e 46 eb 2e 41 1c e8 c9 f9 6c 23 22 92 30 0a ca |.F..A....l#".0..| +00000010 42 2a e9 22 dc 20 28 4b 8f af 99 96 bb b5 2d f2 |B*.". (K......-.| +[454f 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db c1 ce d6 c6 69 dc f3 b2 2b 04 |0E.!......i...+.| +00000010 da 06 7f c6 bf d7 a5 be 66 4b ac 61 04 e2 97 7c |........fK.a...|| +00000020 79 85 42 1e 83 02 20 0d b0 13 a3 da 93 f6 98 16 |y.B... .........| +00000030 b2 d6 a6 c9 5c bd ca d3 51 d3 c7 61 0f dd 14 d0 |....\...Q..a....| +00000040 0b 30 0a fb ce ce 88 |.0.....| +[4550 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005545960 principal evaluation succeeds for identity 0 +[4551 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005545960 gate 1598907145450721200 evaluation succeeds +[4552 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4553 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4554 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4555 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4556 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4557 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4558 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4559 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[455a 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes in aliveMembership +[455b 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[455c 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[455d 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[455e 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[455f 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4560 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4561 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4562 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4563 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4564 08-31 20:52:25.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4565 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4566 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4567 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4568 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4569 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[456a 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[456b 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[456c 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[456d 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[456e 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[456f 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4570 08-31 20:52:25.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4571 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4572 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4573 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4574 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4575 08-31 20:52:25.47 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4576 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4577 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4578 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[4579 08-31 20:52:25.50 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[457a 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[457b 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[457c 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[457d 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[457e 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816103B +[4580 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: FDE84AFBD3454277A9867578672980856F12C4DE2D89805D19BD52560CB171AF +[4581 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[457f 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4583 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4584 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4582 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[4585 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4586 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7070 gate 1598907145512767900 evaluation starts +[4587 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7070 signed by 0 principal evaluation starts (used [false]) +[4588 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[4589 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7070 processing identity 0 with bytes of 115a4b0 +[458a 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7070 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[458b 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7070 principal evaluation fails +[458c 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7070 gate 1598907145512767900 evaluation fails +[458d 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[458e 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[458f 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4591 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[4590 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a75e0 gate 1598907145515660600 evaluation starts +[4592 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a75e0 signed by 0 principal evaluation starts (used [false]) +[4593 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a75e0 processing identity 0 with bytes of 115a4b0 +[4594 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a75e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4595 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a75e0 principal evaluation fails +[4596 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a75e0 gate 1598907145515660600 evaluation fails +[4597 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4598 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4599 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[459a 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7b50 gate 1598907145516708500 evaluation starts +[459b 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7b50 signed by 0 principal evaluation starts (used [false]) +[459c 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7b50 processing identity 0 with bytes of 115a4b0 +[459d 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7b50 principal matched by identity 0 +[459e 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e4 b0 84 4b 07 df 73 7a 11 0c 44 35 9d 1d 7f |....K..sz..D5...| +00000010 f5 f0 fa 1e d7 a5 c0 10 5a 6a e8 0d 87 44 2e 4e |........Zj...D.N| +[459f 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 33 f0 79 6c 51 c3 d7 39 cb eb |0E.!..3.ylQ..9..| +00000010 c3 16 f3 19 8f 04 6d c3 41 aa ea cf 84 60 d0 c7 |......m.A....`..| +00000020 9f 18 6f 34 a8 02 20 6f 81 d6 42 16 92 06 21 50 |..o4.. o..B...!P| +00000030 32 3a 12 4c b6 fe d5 74 02 3a 69 81 62 43 8e a6 |2:.L...t.:i.bC..| +00000040 7c 6a ba 25 70 78 59 ||j.%pxY| +[45a0 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7b50 principal evaluation succeeds for identity 0 +[45a1 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055a7b50 gate 1598907145516708500 evaluation succeeds +[45a2 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[45a3 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[45a4 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[45a5 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[45a6 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[45a7 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[45a8 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[45a9 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[45aa 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[45ab 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45ac 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45ad 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45ae 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[45af 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45b0 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45b1 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45b2 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +[45b3 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\013\234\277\257\002 1OW\237u(3\225\261h\n\024\212\nf\304\201\004\3427\036\322\031V\177\274\246.\216\253\341\017" > +[45b4 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[45b5 08-31 20:52:25.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45b6 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45b7 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45b8 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45b9 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[45ba 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[45bb 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45bc 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[45bd 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[45c1 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45be 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[45c2 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45bf 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[45c3 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45c0 08-31 20:52:25.52 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[45c4 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[45c5 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[45c6 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[45c7 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[45c8 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[45c9 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[45ca 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45cb 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[45cc 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45cd 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[45ce 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45cf 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[45d0 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[45d1 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[45d2 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45d3 08-31 20:52:25.53 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[45d4 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[45d5 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[45d6 08-31 20:52:25.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45d7 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[45d8 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[45d9 08-31 20:52:25.58 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45da 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[45db 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816103C +[45dc 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: C76FBCE60E0891B20A6744C2142EDC99D6C715C7537016AE4B7012960CF6E986 +[45dd 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[45de 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[45df 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[45e0 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45e1 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[45e2 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[45e4 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45e3 08-31 20:52:25.60 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req:\267\221\022S\007\337\253\303\034s\367\3734Q\205\327\370\300\270\006\002 /\010\307\277;\250Jcx\204\342\"\2026\331\377\024>\375K\203=B\312\312R\032\201\344\317\030\263" > > > , Envelope: 272 bytes, Signature: 0 bytes to 1 peers +[45e5 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req:\267\221\022S\007\337\253\303\034s\367\3734Q\205\327\370\300\270\006\002 /\010\307\277;\250Jcx\204\342\"\2026\331\377\024>\375K\203=B\312\312R\032\201\344\317\030\263" > > > , Envelope: 272 bytes, Signature: 0 bytes +[45e6 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45e7 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45e8 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes to 1 peers +[45e9 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[45ea 08-31 20:52:25.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45eb 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[45ec 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[45ed 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45ee 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[45ef 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[45f0 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 6f bc e6 0e 08 91 b2 0a 67 44 c2 14 2e dc 99 |.o.......gD.....| +00000010 d6 c7 15 c7 53 70 16 ae 4b 70 12 96 0c f6 e9 86 |....Sp..Kp......| +[45f1 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 fc 7d 0e ee ef b1 04 45 2d 8e |0E.!...}.....E-.| +00000010 b5 09 4e 13 39 28 76 7e 53 53 d0 bd 17 48 eb 7d |..N.9(v~SS...H.}| +00000020 2a 28 83 40 6c 02 20 55 00 c7 99 e9 e2 6c 60 8d |*(.@l. U.....l`.| +00000030 3a 32 f6 d1 cb 98 7b d9 21 47 a3 3c 8c 63 f4 9d |:2....{.!G.<.c..| +00000040 04 f5 d4 cc 5e b2 19 |....^..| +[45f2 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[45f3 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 ab 12 31 70 78 23 a8 64 08 e5 cf |0E.!...1px#.d...| +00000010 3e b7 91 12 53 07 df ab c3 1c 73 f7 fb 34 51 85 |>...S.....s..4Q.| +00000020 d7 f8 c0 b8 06 02 20 2f 08 c7 bf 3b a8 4a 63 78 |...... /...;.Jcx| +00000030 84 e2 22 82 36 d9 ff 14 3e fd 4b 83 3d 42 ca ca |..".6...>.K.=B..| +00000040 52 1a 81 e4 cf 18 b3 |R......| +[45f4 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[45f5 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[45f6 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45f7 08-31 20:52:25.62 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45f8 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[45f9 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[45fa 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[45fb 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[45fc 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[45fd 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[45fe 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[45ff 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4600 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4601 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4602 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4603 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4604 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9280 gate 1598907145635984600 evaluation starts +[4605 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9280 signed by 0 principal evaluation starts (used [false]) +[4606 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9280 processing identity 0 with bytes of 115a4b0 +[4607 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9280 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[4608 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9280 principal evaluation fails +[4609 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9280 gate 1598907145635984600 evaluation fails +[460a 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[460b 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[460c 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[460d 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f97f0 gate 1598907145637870400 evaluation starts +[460e 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f97f0 signed by 0 principal evaluation starts (used [false]) +[460f 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f97f0 processing identity 0 with bytes of 115a4b0 +[4610 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f97f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4611 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f97f0 principal evaluation fails +[4612 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f97f0 gate 1598907145637870400 evaluation fails +[4613 08-31 20:52:25.63 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4614 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4615 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4616 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9d60 gate 1598907145640731300 evaluation starts +[4617 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9d60 signed by 0 principal evaluation starts (used [false]) +[4618 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9d60 processing identity 0 with bytes of 115a4b0 +[4619 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9d60 principal matched by identity 0 +[461a 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ac e4 b0 84 4b 07 df 73 7a 11 0c 44 35 9d 1d 7f |....K..sz..D5...| +00000010 f5 f0 fa 1e d7 a5 c0 10 5a 6a e8 0d 87 44 2e 4e |........Zj...D.N| +[461b 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 db 33 f0 79 6c 51 c3 d7 39 cb eb |0E.!..3.ylQ..9..| +00000010 c3 16 f3 19 8f 04 6d c3 41 aa ea cf 84 60 d0 c7 |......m.A....`..| +00000020 9f 18 6f 34 a8 02 20 6f 81 d6 42 16 92 06 21 50 |..o4.. o..B...!P| +00000030 32 3a 12 4c b6 fe d5 74 02 3a 69 81 62 43 8e a6 |2:.L...t.:i.bC..| +00000040 7c 6a ba 25 70 78 59 ||j.%pxY| +[461c 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9d60 principal evaluation succeeds for identity 0 +[461d 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0055f9d60 gate 1598907145640731300 evaluation succeeds +[461e 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[461f 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4620 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4621 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4622 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4623 08-31 20:52:25.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4624 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4625 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[4626 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 6f bc e6 0e 08 91 b2 0a 67 44 c2 14 2e dc 99 |.o.......gD.....| +00000010 d6 c7 15 c7 53 70 16 ae 4b 70 12 96 0c f6 e9 86 |....Sp..Kp......| +[4627 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 fc 7d 0e ee ef b1 04 45 2d 8e |0E.!...}.....E-.| +00000010 b5 09 4e 13 39 28 76 7e 53 53 d0 bd 17 48 eb 7d |..N.9(v~SS...H.}| +00000020 2a 28 83 40 6c 02 20 55 00 c7 99 e9 e2 6c 60 8d |*(.@l. U.....l`.| +00000030 3a 32 f6 d1 cb 98 7b d9 21 47 a3 3c 8c 63 f4 9d |:2....{.!G.<.c..| +00000040 04 f5 d4 cc 5e b2 19 |....^..| +[4628 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4629 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[462a 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[462b 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[462c 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 92 97 fa aa d4 02 28 8b d8 61 84 86 f9 40 ef |.......(..a...@.| +00000010 fb 5e cd 5b 1d b1 37 dc 33 68 1e 31 30 75 bd 0b |.^.[..7.3h.10u..| +[462d 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 34 0f 82 b6 c8 0f 1b 71 00 00 |0E.!..4......q..| +00000010 b4 79 07 e4 fd da 76 35 0d 8a 32 f0 9a 5a c6 f9 |.y....v5..2..Z..| +00000020 e3 4d 1b e5 84 02 20 21 79 59 ec 7f e4 89 df b6 |.M.... !yY......| +00000030 9c 4b 7e 22 d9 b1 ef d7 6a b6 7c 1a 7b ef a3 2d |.K~"....j.|.{..-| +00000040 07 5c bb e6 ba bb 91 |.\.....| +[462e 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[462f 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4630 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4631 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4632 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[4633 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4634 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c7 6f bc e6 0e 08 91 b2 0a 67 44 c2 14 2e dc 99 |.o.......gD.....| +00000010 d6 c7 15 c7 53 70 16 ae 4b 70 12 96 0c f6 e9 86 |....Sp..Kp......| +[4635 08-31 20:52:25.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 fc 7d 0e ee ef b1 04 45 2d 8e |0E.!...}.....E-.| +00000010 b5 09 4e 13 39 28 76 7e 53 53 d0 bd 17 48 eb 7d |..N.9(v~SS...H.}| +00000020 2a 28 83 40 6c 02 20 55 00 c7 99 e9 e2 6c 60 8d |*(.@l. U.....l`.| +00000030 3a 32 f6 d1 cb 98 7b d9 21 47 a3 3c 8c 63 f4 9d |:2....{.!G.<.c..| +00000040 04 f5 d4 cc 5e b2 19 |....^..| +[4636 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4637 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4638 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4639 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[463a 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 c9 92 97 fa aa d4 02 28 8b d8 61 84 86 f9 40 ef |.......(..a...@.| +00000010 fb 5e cd 5b 1d b1 37 dc 33 68 1e 31 30 75 bd 0b |.^.[..7.3h.10u..| +[463b 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 93 34 0f 82 b6 c8 0f 1b 71 00 00 |0E.!..4......q..| +00000010 b4 79 07 e4 fd da 76 35 0d 8a 32 f0 9a 5a c6 f9 |.y....v5..2..Z..| +00000020 e3 4d 1b e5 84 02 20 21 79 59 ec 7f e4 89 df b6 |.M.... !yY......| +00000030 9c 4b 7e 22 d9 b1 ef d7 6a b6 7c 1a 7b ef a3 2d |.K~"....j.|.{..-| +00000040 07 5c bb e6 ba bb 91 |.\.....| +[463c 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[463d 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[463e 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[463f 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4640 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4641 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4642 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4643 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4644 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4645 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4646 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005650ab0 gate 1598907145664370400 evaluation starts +[4647 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005650ab0 signed by 0 principal evaluation starts (used [false]) +[4648 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005650ab0 processing identity 0 with bytes of 115a4b0 +[4649 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005650ab0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[464a 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005650ab0 principal evaluation fails +[464b 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005650ab0 gate 1598907145664370400 evaluation fails +[464c 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[464d 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[464e 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[464f 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651020 gate 1598907145666866000 evaluation starts +[4650 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651020 signed by 0 principal evaluation starts (used [false]) +[4651 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651020 processing identity 0 with bytes of 115a4b0 +[4652 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651020 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4653 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651020 principal evaluation fails +[4654 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651020 gate 1598907145666866000 evaluation fails +[4655 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4656 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4657 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4658 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651590 gate 1598907145668937200 evaluation starts +[4659 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651590 signed by 0 principal evaluation starts (used [false]) +[465a 08-31 20:52:25.66 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651590 processing identity 0 with bytes of 115a4b0 +[465b 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651590 principal matched by identity 0 +[465c 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a5 bb 37 cd a7 3d c7 15 e9 10 ed e0 8b 7c cb 8b |..7..=.......|..| +00000010 37 da ab 81 32 e6 31 10 6e 3a f2 65 5d 49 60 6a |7...2.1.n:.e]I`j| +[465d 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb d8 7a 44 f0 ba 1c 97 51 e4 6b |0E.!...zD....Q.k| +00000010 df af be f7 46 7e cd 10 71 ac cf 38 e6 99 9b 95 |....F~..q..8....| +00000020 8f 1a 12 16 6a 02 20 2c 40 29 1b 48 a5 78 d7 11 |....j. ,@).H.x..| +00000030 e1 ab a0 0f 96 3c b1 51 15 13 b7 a7 58 76 e5 73 |.....<.Q....Xv.s| +00000040 65 eb f1 d2 be ca 9d |e......| +[465e 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651590 principal evaluation succeeds for identity 0 +[465f 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005651590 gate 1598907145668937200 evaluation succeeds +[4660 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4661 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4662 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4663 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4664 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4665 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4666 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4667 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4668 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4669 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[466a 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[466b 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[466c 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[466d 08-31 20:52:25.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[466e 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[466f 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4670 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4671 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4672 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4673 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4674 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4675 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4676 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4677 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4678 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4679 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[467a 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[467b 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005668e60 gate 1598907145687313700 evaluation starts +[467c 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005668e60 signed by 0 principal evaluation starts (used [false]) +[467d 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005668e60 processing identity 0 with bytes of 115a4b0 +[467e 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005668e60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[467f 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005668e60 principal evaluation fails +[4680 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005668e60 gate 1598907145687313700 evaluation fails +[4681 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[4682 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4683 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4684 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056693d0 gate 1598907145689009800 evaluation starts +[4685 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056693d0 signed by 0 principal evaluation starts (used [false]) +[4686 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056693d0 processing identity 0 with bytes of 115a4b0 +[4687 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056693d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4688 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056693d0 principal evaluation fails +[4689 08-31 20:52:25.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056693d0 gate 1598907145689009800 evaluation fails +[468a 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[468b 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[468c 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[468d 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005669940 gate 1598907145690647600 evaluation starts +[468e 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005669940 signed by 0 principal evaluation starts (used [false]) +[468f 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005669940 processing identity 0 with bytes of 115a4b0 +[4690 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005669940 principal matched by identity 0 +[4691 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +[4692 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +[4693 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005669940 principal evaluation succeeds for identity 0 +[4694 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005669940 gate 1598907145690647600 evaluation succeeds +[4695 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4696 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4697 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4698 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4699 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +[469a 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +00000040 27 02 07 1d 11 e0 |'.....| +[469b 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +[469c 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +00000040 ea ef c2 09 9e b7 21 |......!| +[469d 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[469e 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[469f 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[46a0 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[46a1 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[46a2 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[46a3 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[46a4 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[46a5 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[46a6 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689a30 gate 1598907145696077700 evaluation starts +[46a7 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689a30 signed by 0 principal evaluation starts (used [false]) +[46a8 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689a30 processing identity 0 with bytes of 115a4b0 +[46a9 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689a30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[46aa 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689a30 principal evaluation fails +[46ab 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689a30 gate 1598907145696077700 evaluation fails +[46ac 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[46ad 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[46ae 08-31 20:52:25.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[46af 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689fa0 gate 1598907145700017700 evaluation starts +[46b0 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689fa0 signed by 0 principal evaluation starts (used [false]) +[46b1 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689fa0 processing identity 0 with bytes of 115a4b0 +[46b2 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689fa0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[46b3 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689fa0 principal evaluation fails +[46b4 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005689fa0 gate 1598907145700017700 evaluation fails +[46b5 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[46b6 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[46b7 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[46b8 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ac510 gate 1598907145700992000 evaluation starts +[46b9 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ac510 signed by 0 principal evaluation starts (used [false]) +[46ba 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ac510 processing identity 0 with bytes of 115a4b0 +[46bb 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ac510 principal matched by identity 0 +[46bc 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +[46bd 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +00000040 30 1a be f0 35 29 |0...5)| +[46be 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ac510 principal evaluation succeeds for identity 0 +[46bf 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056ac510 gate 1598907145700992000 evaluation succeeds +[46c0 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[46c1 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[46c2 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[46c3 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[46c4 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[46c5 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[46c6 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +[46c7 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +00000040 ea ef c2 09 9e b7 21 |......!| +[46c8 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +[46c9 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +00000040 27 02 07 1d 11 e0 |'.....| +[46ca 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[46cb 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[46cc 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[46cd 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[46ce 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[46cf 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[46d0 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[46d1 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[46d2 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0690 gate 1598907145705369000 evaluation starts +[46d3 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0690 signed by 0 principal evaluation starts (used [false]) +[46d4 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0690 processing identity 0 with bytes of 115a4b0 +[46d5 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[46d6 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0690 principal evaluation fails +[46d7 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0690 gate 1598907145705369000 evaluation fails +[46d8 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[46d9 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[46da 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[46db 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0c00 gate 1598907145706172900 evaluation starts +[46dc 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0c00 signed by 0 principal evaluation starts (used [false]) +[46dd 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0c00 processing identity 0 with bytes of 115a4b0 +[46de 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0c00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[46df 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0c00 principal evaluation fails +[46e0 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c0c00 gate 1598907145706172900 evaluation fails +[46e1 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[46e2 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[46e3 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[46e4 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c1170 gate 1598907145707630000 evaluation starts +[46e5 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c1170 signed by 0 principal evaluation starts (used [false]) +[46e6 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c1170 processing identity 0 with bytes of 115a4b0 +[46e7 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c1170 principal matched by identity 0 +[46e8 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +[46e9 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +00000040 30 1a be f0 35 29 |0...5)| +[46ea 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c1170 principal evaluation succeeds for identity 0 +[46eb 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056c1170 gate 1598907145707630000 evaluation succeeds +[46ec 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[46ed 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[46ee 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[46ef 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[46f0 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[46f1 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[46f2 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[46f3 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[46f4 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[46f5 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[46f6 08-31 20:52:25.70 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[46f7 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[46f8 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc370 gate 1598907145710070700 evaluation starts +[46f9 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc370 signed by 0 principal evaluation starts (used [false]) +[46fa 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc370 processing identity 0 with bytes of 115a4b0 +[46fb 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc370 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[46fc 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc370 principal evaluation fails +[46fd 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc370 gate 1598907145710070700 evaluation fails +[46fe 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[46ff 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4700 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4701 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc8e0 gate 1598907145711137400 evaluation starts +[4702 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc8e0 signed by 0 principal evaluation starts (used [false]) +[4703 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc8e0 processing identity 0 with bytes of 115a4b0 +[4704 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc8e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4705 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc8e0 principal evaluation fails +[4706 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dc8e0 gate 1598907145711137400 evaluation fails +[4707 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4708 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4709 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[470a 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dce50 gate 1598907145712093800 evaluation starts +[470b 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dce50 signed by 0 principal evaluation starts (used [false]) +[470c 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dce50 processing identity 0 with bytes of 115a4b0 +[470d 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dce50 principal matched by identity 0 +[470e 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +[470f 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +[4710 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dce50 principal evaluation succeeds for identity 0 +[4711 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0056dce50 gate 1598907145712093800 evaluation succeeds +[4712 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4713 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4714 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4715 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4716 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4717 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4718 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4719 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[471a 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[471b 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[471c 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[471d 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[471e 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[471f 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4720 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4721 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057062a0 gate 1598907145715880500 evaluation starts +[4722 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057062a0 signed by 0 principal evaluation starts (used [false]) +[4723 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057062a0 processing identity 0 with bytes of 115a4b0 +[4724 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057062a0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[4725 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057062a0 principal evaluation fails +[4726 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057062a0 gate 1598907145715880500 evaluation fails +[4727 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[4728 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4729 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[472a 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706810 gate 1598907145716847400 evaluation starts +[472b 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706810 signed by 0 principal evaluation starts (used [false]) +[472c 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706810 processing identity 0 with bytes of 115a4b0 +[472d 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706810 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[472e 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706810 principal evaluation fails +[472f 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706810 gate 1598907145716847400 evaluation fails +[4730 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4731 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4732 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4733 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706d80 gate 1598907145717940200 evaluation starts +[4734 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706d80 signed by 0 principal evaluation starts (used [false]) +[4735 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706d80 processing identity 0 with bytes of 115a4b0 +[4736 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706d80 principal matched by identity 0 +[4737 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +[4738 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +00000040 30 1a be f0 35 29 |0...5)| +[4739 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706d80 principal evaluation succeeds for identity 0 +[473a 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005706d80 gate 1598907145717940200 evaluation succeeds +[473b 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[473c 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[473d 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[473e 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[473f 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +[4740 08-31 20:52:25.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +00000040 27 02 07 1d 11 e0 |'.....| +[4741 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +[4742 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +00000040 ea ef c2 09 9e b7 21 |......!| +[4743 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4744 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4745 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4746 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4747 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4748 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4749 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[474a 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[474b 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005718d60 gate 1598907145721702000 evaluation starts +[474c 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005718d60 signed by 0 principal evaluation starts (used [false]) +[474d 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005718d60 processing identity 0 with bytes of 115a4b0 +[474e 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005718d60 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[474f 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005718d60 principal evaluation fails +[4750 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005718d60 gate 1598907145721702000 evaluation fails +[4751 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[4752 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4753 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4754 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057192d0 gate 1598907145722540000 evaluation starts +[4755 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057192d0 signed by 0 principal evaluation starts (used [false]) +[4756 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057192d0 processing identity 0 with bytes of 115a4b0 +[4757 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057192d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4758 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057192d0 principal evaluation fails +[4759 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057192d0 gate 1598907145722540000 evaluation fails +[475a 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[475b 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[475c 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[475d 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005719840 gate 1598907145723503900 evaluation starts +[475e 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005719840 signed by 0 principal evaluation starts (used [false]) +[475f 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005719840 processing identity 0 with bytes of 115a4b0 +[4760 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005719840 principal matched by identity 0 +[4761 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +[4762 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +[4763 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005719840 principal evaluation succeeds for identity 0 +[4764 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005719840 gate 1598907145723503900 evaluation succeeds +[4765 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4766 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4767 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4768 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4769 08-31 20:52:25.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[476a 08-31 20:52:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[476b 08-31 20:52:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[476c 08-31 20:52:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[476d 08-31 20:52:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[476e 08-31 20:52:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[476f 08-31 20:52:25.81 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[4770 08-31 20:52:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[4771 08-31 20:52:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4772 08-31 20:52:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4773 08-31 20:52:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4774 08-31 20:52:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4775 08-31 20:52:25.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4776 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4777 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4778 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4779 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[477a 08-31 20:52:25.92 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[477b 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[477c 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[477d 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[477e 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[477f 08-31 20:52:26.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4780 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4781 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4782 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4783 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4784 08-31 20:52:26.15 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4785 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4786 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4787 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4788 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4789 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[478a 08-31 20:52:26.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[478b 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Exiting +[478c 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Returning true +[478d 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[478e 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 120F627573696E6573736368616E6E65...120C08D0DCBCCDF6AF9D981610131801 +[478f 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 8B7EA2122FA2763FCA16387BD9A269ECD265F079B8CBAA8F24B1E0578DCE7A97 +[4790 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c : Entering +[4791 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4792 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4793 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4794 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4795 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes to 1 peers +[4796 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4797 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4798 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG leadership_msg: is_declaration:true > , Envelope: 72 bytes, Signature: 70 bytes +[4799 08-31 20:52:28.79 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[479a 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[479b 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[479c 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[479d 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[479e 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[479f 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47a0 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47a1 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47a2 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47a3 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 +[47a4 08-31 20:52:28.98 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[47a5 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[47a6 08-31 20:52:29.10 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[47a7 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[47a8 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > , Envelope: 166 bytes, Signature: 0 bytes +[47a9 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[47aa 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47ab 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[47ac 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[47ad 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[47ae 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[47af 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[47b0 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[47b1 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792160 gate 1598907149113849200 evaluation starts +[47b2 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792160 signed by 0 principal evaluation starts (used [false]) +[47b3 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792160 processing identity 0 with bytes of 115a4b0 +[47b4 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792160 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[47b5 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792160 principal evaluation fails +[47b6 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792160 gate 1598907149113849200 evaluation fails +[47b7 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[47b8 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[47b9 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[47ba 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057926d0 gate 1598907149115778400 evaluation starts +[47bb 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057926d0 signed by 0 principal evaluation starts (used [false]) +[47bc 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057926d0 processing identity 0 with bytes of 115a4b0 +[47bd 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057926d0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[47be 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057926d0 principal evaluation fails +[47bf 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057926d0 gate 1598907149115778400 evaluation fails +[47c0 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[47c1 08-31 20:52:29.11 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[47c2 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[47c3 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792c40 gate 1598907149120648300 evaluation starts +[47c4 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792c40 signed by 0 principal evaluation starts (used [false]) +[47c5 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792c40 processing identity 0 with bytes of 115a4b0 +[47c6 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792c40 principal matched by identity 0 +[47c7 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 c6 aa ca 4b 34 fb 28 1b f8 14 65 62 8b 48 9a |....K4.(...eb.H.| +00000010 25 8b 97 16 05 19 3a 40 85 36 e0 f5 0f f4 c9 e1 |%.....:@.6......| +[47c8 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 8c 08 ce a8 0d f4 e2 1c 0f 72 |0E.!...........r| +00000010 af 0a d7 f2 ba 8a 90 26 28 d4 cc a1 a8 9e 2f b5 |.......&(...../.| +00000020 fc 9b d7 0a 6a 02 20 2c ed 4a 62 87 c0 d5 27 65 |....j. ,.Jb...'e| +00000030 76 8c 5b 0d f0 5c 57 e1 52 14 32 7c 49 ec e9 1b |v.[..\W.R.2|I...| +00000040 a0 fc ff 7f be b6 c9 |.......| +[47c9 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792c40 principal evaluation succeeds for identity 0 +[47ca 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005792c40 gate 1598907149120648300 evaluation succeeds +[47cb 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[47cc 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[47cd 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[47ce 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[47cf 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[47d0 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[47d1 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[47d2 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[47d3 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[47d4 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[47d5 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[47d6 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[47d7 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org2.example.com:7051" pki_id:"N\341@\373\323\034\344\202\3609\334\\F\034\224\221\022\341`\353y(\327\233\332\306\006\025\220Jt\202" +[47d8 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47d9 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47da 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47db 08-31 20:52:29.12 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +[47dc 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive: alive: alive:\013\234\277\257\002 1OW\237u(3\225\261h\n\024\212\nf\304\201\004\3427\036\322\031V\177\274\246.\216\253\341\017" > +[47dd 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[47de 08-31 20:52:29.13 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[47df 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[47e0 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[47e1 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[47e2 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[47e3 08-31 20:52:29.26 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[47e4 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[47e5 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[47e6 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[47e7 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 272 bytes, Signature: 0 bytes +[47e8 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[47e9 08-31 20:52:29.33 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 4c e8 7c 41 d4 f7 a3 f5 ac 60 e5 de 00 ae 4f |?L.|A.....`....O| +00000010 0b 3c f0 28 a0 3e 58 c0 fe 51 d7 1b e8 56 fc 1c |.<.(.>X..Q...V..| +[47ea 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 0f d7 87 e9 12 8f b2 f3 85 30 |0E.!...........0| +00000010 62 c9 8c 45 56 44 bf 74 ef 55 23 70 7c ae fb 21 |b..EVD.t.U#p|..!| +00000020 e6 37 76 cb c9 02 20 11 7e c4 66 12 ff 9b 01 c4 |.7v... .~.f.....| +00000030 83 63 aa 51 db fa 69 6b 92 b8 0b 02 07 4f 26 71 |.c.Q..ik.....O&q| +00000040 b7 8f 6a 62 5e 8f 09 |..jb^..| +[47eb 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5e 12 07 e3 2e 27 09 d3 c4 9f d6 e4 e4 2e a7 5e |^....'.........^| +00000010 05 4b f7 ca b0 51 73 72 32 3b b6 0e b6 39 71 9f |.K...Qsr2;...9q.| +[47ec 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 a6 69 89 c7 c2 5a f4 b3 ef 12 fb |0E.!..i...Z.....| +00000010 f1 7e e3 9b ce f8 2d 5d e4 40 07 f5 cd 2f 7d 4c |.~....-].@.../}L| +00000020 cb 00 bc 87 06 02 20 6a 01 2e 2b 9d 62 d7 1e c2 |...... j..+.b...| +00000030 9d 90 66 10 c9 8c db 62 b7 8a fa f2 a6 52 4f 82 |..f....b.....RO.| +00000040 af cb 2b ed 0a bc f1 |..+....| +[47ed 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[47ee 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes]} +[47ef 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[47f0 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[47f1 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[47f2 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[47f3 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[47f4 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[47f5 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer1.org1.example.com:7051" pki_id:"\037\362\t\027\3220\204\221U\271n\215\200\030\321\037\216\334##~J\2029\253\223\251o\326R=\233" +[47f6 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47f7 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47f8 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes to 1 peers +[47f9 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: > alive:\013\234\277\257\002 1OW\237u(3\225\261h\n\024\212\nf\304\201\004\3427\036\322\031V\177\274\246.\216\253\341\017" > +[47fa 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 433 bytes, Signature: 0 bytes +[47fb 08-31 20:52:29.34 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[47fc 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[47fd 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[47fe 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[47ff 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4800 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4801 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4802 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4803 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4804 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG digest: [a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482] to 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 +[4805 08-31 20:52:29.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4806 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" > > , Envelope: 166 bytes, Signature: 0 bytes +[4807 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4808 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY mem_req:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" > > , Envelope: 166 bytes, Signature: 0 bytes +[4809 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[480a 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[480b 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[480c 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[480d 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[480e 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[480f 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4810 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4811 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057aedd0 gate 1598907149516279300 evaluation starts +[4812 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057aedd0 signed by 0 principal evaluation starts (used [false]) +[4813 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057aedd0 processing identity 0 with bytes of 115a4b0 +[4814 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057aedd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[4815 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057aedd0 principal evaluation fails +[4816 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057aedd0 gate 1598907149516279300 evaluation fails +[4817 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[4818 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4819 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[481a 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af340 gate 1598907149517135000 evaluation starts +[481b 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af340 signed by 0 principal evaluation starts (used [false]) +[481c 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af340 processing identity 0 with bytes of 115a4b0 +[481d 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af340 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[481e 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af340 principal evaluation fails +[481f 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af340 gate 1598907149517135000 evaluation fails +[4820 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4821 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4822 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4823 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af8b0 gate 1598907149518341400 evaluation starts +[4824 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af8b0 signed by 0 principal evaluation starts (used [false]) +[4825 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af8b0 processing identity 0 with bytes of 115a4b0 +[4826 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af8b0 principal matched by identity 0 +[4827 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 01 24 31 7f 14 c1 2b c5 b6 8c 37 ab 5c 65 be |..$1...+...7.\e.| +00000010 69 79 c5 5c 09 c9 b4 62 16 82 2d 7e 47 40 bc c5 |iy.\...b..-~G@..| +[4828 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa d0 ca fb 28 92 78 b8 dc 68 46 |0E.!.....(.x..hF| +00000010 cc a0 de 06 1f 1e ab d4 a0 02 30 65 87 b0 5c b3 |..........0e..\.| +00000020 e8 89 d5 d9 02 02 20 03 f5 6a bd 54 66 b0 7f a8 |...... ..j.Tf...| +00000030 7c c3 0d e0 fb 41 e5 a0 b2 cf da 83 40 89 0e ba ||....A......@...| +00000040 ca 21 a1 73 b5 9b 81 |.!.s...| +[4829 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af8b0 principal evaluation succeeds for identity 0 +[482a 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0057af8b0 gate 1598907149518341400 evaluation succeeds +[482b 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[482c 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[482d 08-31 20:52:29.51 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[482e 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[482f 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4830 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4831 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4832 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4833 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4834 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4835 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4836 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4837 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering endpoint:"peer0.org2.example.com:7051" pki_id:"\245\203\370\357\003)\305\375\256\007\302\007\340H\2455\272\336\031\375K\207\301q\375\351\3352\301\343\233(" +[4838 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4839 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[483a 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[483b 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes to 1 peers +[483d 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 649 bytes, Signature: 0 bytes +[483e 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[483c 08-31 20:52:29.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting, replying with alive: alive:" signature:"0E\002!\000\372\320\312\373(\222x\270\334hF\314\240\336\006\037\036\253\324\240\0020e\207\260\\\263\350\211\325\331\002\002 \003\365j\275Tf\260\177\250|\303\r\340\373A\345\240\262\317\332\203@\211\016\272\312!\241s\265\233\201" > alive: alive:\013\234\277\257\002 1OW\237u(3\225\261h\n\024\212\nf\304\201\004\3427\036\322\031V\177\274\246.\216\253\341\017" > +[483f 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org1.example.com:7051 +[4840 08-31 20:52:29.53 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4841 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer0.org2.example.com:7051 +[4842 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4843 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4844 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes to 1 peers +[4845 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Sending IDENTITY_MSG hello to peer1.org2.example.com:7051 +[4846 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes to 1 peers +[4847 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 17 bytes, Signature: 0 bytes +[4848 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY hello: , Envelope: 16 bytes, Signature: 0 bytes +[4849 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[484a 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[484b 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[484c 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[484d 08-31 20:52:29.54 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[484e 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[484f 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4850 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 154 bytes, Signature: 0 bytes +[4851 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4852 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4853 08-31 20:52:29.55 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4854 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: tag:EMPTY data_dig: , Envelope: 153 bytes, Signature: 0 bytes +[4855 08-31 20:52:29.56 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4856 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4857 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816103D +[4858 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: 255A86BE63A76E208F01E1A2D1BBCAD91E4AE9E58B877BAD02B44562B81FD5AE +[4859 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[485a 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[485b 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[485c 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes to 1 peers +[485d 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[485e 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[485f 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4860 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes to 1 peers +[4861 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[4862 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4863 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > > , Envelope: 271 bytes, Signature: 0 bytes +[4864 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4865 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY mem_req: > , Envelope: 165 bytes, Signature: 0 bytes +[4866 08-31 20:52:29.61 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4867 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4868 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[4869 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[486a 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[486b 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[486c 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[486d 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[486e 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[486f 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4870 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4871 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4872 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4873 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a310 gate 1598907149646138900 evaluation starts +[4874 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a310 signed by 0 principal evaluation starts (used [false]) +[4875 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a310 processing identity 0 with bytes of 115a4b0 +[4876 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a310 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[4877 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a310 principal evaluation fails +[4878 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a310 gate 1598907149646138900 evaluation fails +[4879 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[487a 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[487b 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[487c 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a880 gate 1598907149647007800 evaluation starts +[487d 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a880 signed by 0 principal evaluation starts (used [false]) +[487e 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a880 processing identity 0 with bytes of 115a4b0 +[487f 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a880 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4880 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a880 principal evaluation fails +[4881 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582a880 gate 1598907149647007800 evaluation fails +[4882 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4883 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4884 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4885 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582adf0 gate 1598907149647917400 evaluation starts +[4886 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582adf0 signed by 0 principal evaluation starts (used [false]) +[4887 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582adf0 processing identity 0 with bytes of 115a4b0 +[4888 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582adf0 principal matched by identity 0 +[4889 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 0f 01 24 31 7f 14 c1 2b c5 b6 8c 37 ab 5c 65 be |..$1...+...7.\e.| +00000010 69 79 c5 5c 09 c9 b4 62 16 82 2d 7e 47 40 bc c5 |iy.\...b..-~G@..| +[488a 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 fa d0 ca fb 28 92 78 b8 dc 68 46 |0E.!.....(.x..hF| +00000010 cc a0 de 06 1f 1e ab d4 a0 02 30 65 87 b0 5c b3 |..........0e..\.| +00000020 e8 89 d5 d9 02 02 20 03 f5 6a bd 54 66 b0 7f a8 |...... ..j.Tf...| +00000030 7c c3 0d e0 fb 41 e5 a0 b2 cf da 83 40 89 0e ba ||....A......@...| +00000040 ca 21 a1 73 b5 9b 81 |.!.s...| +[488b 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582adf0 principal evaluation succeeds for identity 0 +[488c 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc00582adf0 gate 1598907149647917400 evaluation succeeds +[488d 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[488e 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[488f 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4890 08-31 20:52:29.64 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4891 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4892 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4893 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[4894 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 5a 86 be 63 a7 6e 20 8f 01 e1 a2 d1 bb ca d9 |%Z..c.n ........| +00000010 1e 4a e9 e5 8b 87 7b ad 02 b4 45 62 b8 1f d5 ae |.J....{...Eb....| +[4895 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c f3 ad 47 07 f0 14 8f ed ba e7 82 |0D. \..G........| +00000010 88 2f 80 50 1f 5f 8b 79 6a 1c 34 31 74 52 55 2b |./.P._.yj.41tRU+| +00000020 58 76 00 c1 02 20 78 e3 70 86 d8 ef ba 05 43 d8 |Xv... x.p.....C.| +00000030 03 1d 97 bf 58 33 81 b8 ea 91 db 8d b0 f4 dd 9d |....X3..........| +00000040 08 d5 88 b9 8a 89 |......| +[4896 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4897 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4899 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4898 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[489a 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[489b 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[489c 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 4c e8 7c 41 d4 f7 a3 f5 ac 60 e5 de 00 ae 4f |?L.|A.....`....O| +00000010 0b 3c f0 28 a0 3e 58 c0 fe 51 d7 1b e8 56 fc 1c |.<.(.>X..Q...V..| +[489d 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 0f d7 87 e9 12 8f b2 f3 85 30 |0E.!...........0| +00000010 62 c9 8c 45 56 44 bf 74 ef 55 23 70 7c ae fb 21 |b..EVD.t.U#p|..!| +00000020 e6 37 76 cb c9 02 20 11 7e c4 66 12 ff 9b 01 c4 |.7v... .~.f.....| +00000030 83 63 aa 51 db fa 69 6b 92 b8 0b 02 07 4f 26 71 |.c.Q..ik.....O&q| +00000040 b7 8f 6a 62 5e 8f 09 |..jb^..| +[489e 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[489f 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48a0 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48a1 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48a2 08-31 20:52:29.65 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 2, Dead: 0, Envelope: 432 bytes, Signature: 0 bytes +[48a3 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[48a4 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 5a 86 be 63 a7 6e 20 8f 01 e1 a2 d1 bb ca d9 |%Z..c.n ........| +00000010 1e 4a e9 e5 8b 87 7b ad 02 b4 45 62 b8 1f d5 ae |.J....{...Eb....| +[48a5 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c f3 ad 47 07 f0 14 8f ed ba e7 82 |0D. \..G........| +00000010 88 2f 80 50 1f 5f 8b 79 6a 1c 34 31 74 52 55 2b |./.P._.yj.41tRU+| +00000020 58 76 00 c1 02 20 78 e3 70 86 d8 ef ba 05 43 d8 |Xv... x.p.....C.| +00000030 03 1d 97 bf 58 33 81 b8 ea 91 db 8d b0 f4 dd 9d |....X3..........| +00000040 08 d5 88 b9 8a 89 |......| +[48a6 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[48a7 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 a7 85 fc 0b 61 b5 04 5a 71 c0 fa 6b 50 d1 2e b1 |....a..Zq..kP...| +00000010 e6 f0 cd b1 52 c6 f7 9e 65 75 06 0f 54 02 21 60 |....R...eu..T.!`| +[48a8 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 8d 46 44 84 26 7e 91 ee 58 0c 15 |0E.!..FD.&~..X..| +00000010 c2 24 b1 10 ad 38 72 82 1d 1e 96 8e e2 a6 d4 1f |.$...8r.........| +00000020 9d 60 0d e3 d3 02 20 12 7e 88 fe 03 14 df da a4 |.`.... .~.......| +00000030 0d 2e 5c 1e bb e6 2a f3 77 b0 7b 9e ed 7c ee 39 |..\...*.w.{..|.9| +00000040 67 b6 94 76 b4 2f 34 |g..v./4| +[48a9 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[48aa 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes +[48ab 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48ac 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48ad 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: , nonce: 0, tag: EMPTY MembershipResponse with Alive: 4, Dead: 0, Envelope: 648 bytes, Signature: 0 bytes +[48ae 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [153 1 205 231 196 138 116 122 48 151 80 26 20 154 122 80 203 185 200 123 200 32 167 135 119 254 195 107 113 117 45 60] from identity store +[48af 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 25 5a 86 be 63 a7 6e 20 8f 01 e1 a2 d1 bb ca d9 |%Z..c.n ........| +00000010 1e 4a e9 e5 8b 87 7b ad 02 b4 45 62 b8 1f d5 ae |.J....{...Eb....| +[48b0 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5c f3 ad 47 07 f0 14 8f ed ba e7 82 |0D. \..G........| +00000010 88 2f 80 50 1f 5f 8b 79 6a 1c 34 31 74 52 55 2b |./.P._.yj.41tRU+| +00000020 58 76 00 c1 02 20 78 e3 70 86 d8 ef ba 05 43 d8 |Xv... x.p.....C.| +00000030 03 1d 97 bf 58 33 81 b8 ea 91 db 8d b0 f4 dd 9d |....X3..........| +00000040 08 d5 88 b9 8a 89 |......| +[48b1 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[48b2 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Got alive message about ourselves, GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[48b3 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48b4 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[48b5 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 3f 4c e8 7c 41 d4 f7 a3 f5 ac 60 e5 de 00 ae 4f |?L.|A.....`....O| +00000010 0b 3c f0 28 a0 3e 58 c0 fe 51 d7 1b e8 56 fc 1c |.<.(.>X..Q...V..| +[48b6 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 e9 0f d7 87 e9 12 8f b2 f3 85 30 |0E.!...........0| +00000010 62 c9 8c 45 56 44 bf 74 ef 55 23 70 7c ae fb 21 |b..EVD.t.U#p|..!| +00000020 e6 37 76 cb c9 02 20 11 7e c4 66 12 ff 9b 01 c4 |.7v... .~.f.....| +00000030 83 63 aa 51 db fa 69 6b 92 b8 0b 02 07 4f 26 71 |.c.Q..ik.....O&q| +00000040 b7 8f 6a 62 5e 8f 09 |..jb^..| +[48b7 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48b8 08-31 20:52:29.66 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[48b9 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48ba 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[48bb 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48bc 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[48bd 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[48be 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[48bf 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[48c0 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[48c1 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[48c2 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869980 gate 1598907149670599800 evaluation starts +[48c3 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869980 signed by 0 principal evaluation starts (used [false]) +[48c4 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869980 processing identity 0 with bytes of 115a4b0 +[48c5 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869980 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[48c6 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869980 principal evaluation fails +[48c7 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869980 gate 1598907149670599800 evaluation fails +[48c8 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[48c9 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[48ca 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[48cb 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869ef0 gate 1598907149671973000 evaluation starts +[48cc 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869ef0 signed by 0 principal evaluation starts (used [false]) +[48cd 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869ef0 processing identity 0 with bytes of 115a4b0 +[48ce 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869ef0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[48cf 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869ef0 principal evaluation fails +[48d0 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005869ef0 gate 1598907149671973000 evaluation fails +[48d1 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[48d2 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[48d3 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[48d4 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005880460 gate 1598907149672970200 evaluation starts +[48d5 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005880460 signed by 0 principal evaluation starts (used [false]) +[48d6 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005880460 processing identity 0 with bytes of 115a4b0 +[48d7 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005880460 principal matched by identity 0 +[48d8 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 f6 c6 aa ca 4b 34 fb 28 1b f8 14 65 62 8b 48 9a |....K4.(...eb.H.| +00000010 25 8b 97 16 05 19 3a 40 85 36 e0 f5 0f f4 c9 e1 |%.....:@.6......| +[48d9 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 c4 8c 08 ce a8 0d f4 e2 1c 0f 72 |0E.!...........r| +00000010 af 0a d7 f2 ba 8a 90 26 28 d4 cc a1 a8 9e 2f b5 |.......&(...../.| +00000020 fc 9b d7 0a 6a 02 20 2c ed 4a 62 87 c0 d5 27 65 |....j. ,.Jb...'e| +00000030 76 8c 5b 0d f0 5c 57 e1 52 14 32 7c 49 ec e9 1b |v.[..\W.R.2|I...| +00000040 a0 fc ff 7f be b6 c9 |.......| +[48da 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005880460 principal evaluation succeeds for identity 0 +[48db 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005880460 gate 1598907149672970200 evaluation succeeds +[48dc 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[48dd 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[48de 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[48df 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[48e0 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[48e1 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48e2 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48e3 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48e4 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48e5 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes to 3 peers +[48e6 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[48e7 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48e8 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[48e9 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[48ea 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48eb 08-31 20:52:29.67 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[48ec 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[48ed 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48ee 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48ef 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[48f0 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[48f1 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[48f2 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[48f3 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[48f4 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[48f5 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[48f6 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005881bd0 gate 1598907149684439600 evaluation starts +[48f7 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005881bd0 signed by 0 principal evaluation starts (used [false]) +[48f8 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005881bd0 processing identity 0 with bytes of 115a4b0 +[48f9 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005881bd0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[48fa 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005881bd0 principal evaluation fails +[48fb 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005881bd0 gate 1598907149684439600 evaluation fails +[48fc 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[48fd 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[48fe 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[48ff 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a2140 gate 1598907149684830500 evaluation starts +[4900 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a2140 signed by 0 principal evaluation starts (used [false]) +[4901 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a2140 processing identity 0 with bytes of 115a4b0 +[4902 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a2140 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4903 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a2140 principal evaluation fails +[4904 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a2140 gate 1598907149684830500 evaluation fails +[4905 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4906 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4907 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4908 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a26b0 gate 1598907149685063700 evaluation starts +[4909 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a26b0 signed by 0 principal evaluation starts (used [false]) +[490a 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a26b0 processing identity 0 with bytes of 115a4b0 +[490b 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a26b0 principal matched by identity 0 +[490c 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +[490d 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +00000040 30 1a be f0 35 29 |0...5)| +[490e 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[490f 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a26b0 principal evaluation succeeds for identity 0 +[4910 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058a26b0 gate 1598907149685063700 evaluation succeeds +[4911 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4912 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4913 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4914 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4915 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +[4916 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +00000040 27 02 07 1d 11 e0 |'.....| +[4917 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +[4918 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +00000040 ea ef c2 09 9e b7 21 |......!| +[4919 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[491a 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[491b 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[491c 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[491d 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[491e 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[491f 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4920 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4921 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4922 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058be690 gate 1598907149688958800 evaluation starts +[4923 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058be690 signed by 0 principal evaluation starts (used [false]) +[4924 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058be690 processing identity 0 with bytes of 115a4b0 +[4925 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058be690 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[4926 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058be690 principal evaluation fails +[4927 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058be690 gate 1598907149688958800 evaluation fails +[4928 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[4929 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[492a 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[492b 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bec00 gate 1598907149689921900 evaluation starts +[492c 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bec00 signed by 0 principal evaluation starts (used [false]) +[492d 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bec00 processing identity 0 with bytes of 115a4b0 +[492e 08-31 20:52:29.68 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bec00 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[492f 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bec00 principal evaluation fails +[4930 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bec00 gate 1598907149689921900 evaluation fails +[4931 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4932 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4933 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4934 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bf170 gate 1598907149690151900 evaluation starts +[4935 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bf170 signed by 0 principal evaluation starts (used [false]) +[4936 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bf170 processing identity 0 with bytes of 115a4b0 +[4937 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bf170 principal matched by identity 0 +[4938 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +[4939 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +[493a 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bf170 principal evaluation succeeds for identity 0 +[493b 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058bf170 gate 1598907149690151900 evaluation succeeds +[493c 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[493d 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[493e 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[493f 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4940 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4941 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4942 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4943 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4944 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4945 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4946 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4947 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4948 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4949 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[494a 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[494b 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d65c0 gate 1598907149697027900 evaluation starts +[494c 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d65c0 signed by 0 principal evaluation starts (used [false]) +[494d 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d65c0 processing identity 0 with bytes of 115a4b0 +[494e 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d65c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[494f 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d65c0 principal evaluation fails +[4950 08-31 20:52:29.69 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d65c0 gate 1598907149697027900 evaluation fails +[4951 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[4952 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4953 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4954 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d6b30 gate 1598907149701323300 evaluation starts +[4955 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d6b30 signed by 0 principal evaluation starts (used [false]) +[4956 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d6b30 processing identity 0 with bytes of 115a4b0 +[4957 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d6b30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4958 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d6b30 principal evaluation fails +[4959 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d6b30 gate 1598907149701323300 evaluation fails +[495a 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[495b 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[495c 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[495d 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d70a0 gate 1598907149704305500 evaluation starts +[495e 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d70a0 signed by 0 principal evaluation starts (used [false]) +[495f 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d70a0 processing identity 0 with bytes of 115a4b0 +[4960 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d70a0 principal matched by identity 0 +[4961 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +[4962 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +[4963 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d70a0 principal evaluation succeeds for identity 0 +[4964 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058d70a0 gate 1598907149704305500 evaluation succeeds +[4965 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4966 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4967 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4968 08-31 20:52:29.70 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4969 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +[496a 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +00000040 27 02 07 1d 11 e0 |'.....| +[496b 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +[496c 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +00000040 ea ef c2 09 9e b7 21 |......!| +[496d 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[496e 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[496f 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4970 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4971 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4972 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4973 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4974 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4975 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9080 gate 1598907149716132700 evaluation starts +[4976 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9080 signed by 0 principal evaluation starts (used [false]) +[4977 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9080 processing identity 0 with bytes of 115a4b0 +[4978 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9080 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[4979 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9080 principal evaluation fails +[497a 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9080 gate 1598907149716132700 evaluation fails +[497b 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[497c 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[497d 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[497e 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f95f0 gate 1598907149717604700 evaluation starts +[497f 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f95f0 signed by 0 principal evaluation starts (used [false]) +[4980 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f95f0 processing identity 0 with bytes of 115a4b0 +[4981 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f95f0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4982 08-31 20:52:29.71 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f95f0 principal evaluation fails +[4983 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f95f0 gate 1598907149717604700 evaluation fails +[4984 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4985 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4986 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4987 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9b60 gate 1598907149721394800 evaluation starts +[4988 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9b60 signed by 0 principal evaluation starts (used [false]) +[4989 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9b60 processing identity 0 with bytes of 115a4b0 +[498a 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9b60 principal matched by identity 0 +[498b 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +[498c 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +00000040 30 1a be f0 35 29 |0...5)| +[498d 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9b60 principal evaluation succeeds for identity 0 +[498e 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0058f9b60 gate 1598907149721394800 evaluation succeeds +[498f 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4990 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4991 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4992 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4993 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4994 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: Channel: businesschannel, nonce: 0, tag: CHAN_OR_ORG StateInfoSnapshot with 4 items, Envelope: 781 bytes, Signature: 0 bytes +[4995 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 10 76 6a 62 2a 93 be 80 ea d8 6b 89 af 82 28 38 |.vjb*.....k...(8| +00000010 ac 3f 4c 8c 34 ca 78 a7 5a 41 56 17 08 40 c8 05 |.?L.4.x.ZAV..@..| +[4996 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 d7 ab 8f c5 05 75 4e f7 7b 43 e3 |0E.!......uN.{C.| +00000010 03 aa 45 82 8c e2 dd 62 76 3e e2 0c 9d 72 60 dd |..E....bv>...r`.| +00000020 8e 89 18 ad 11 02 20 1f 39 88 f3 85 ba b8 da ee |...... .9.......| +00000030 97 86 28 d2 84 63 66 70 ec 91 28 d7 92 ce 34 1b |..(..cfp..(...4.| +00000040 ea ef c2 09 9e b7 21 |......!| +[4997 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 01 83 77 4f 21 88 c9 1a 6b a5 b5 49 4c 12 02 fa |..wO!...k..IL...| +00000010 fd be c6 97 01 bf 34 e9 cd 13 f1 59 e9 91 25 bb |......4....Y..%.| +[4998 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 4c 75 18 75 3f 3f 38 b1 72 20 62 3a |0D. Lu.u??8.r b:| +00000010 0c dd 21 1d 6b 01 fd 55 18 20 4c e5 37 b5 21 7b |..!.k..U. L.7.!{| +00000020 34 78 5c 1a 02 20 50 e1 bc ef 1e 48 f6 b6 93 0d |4x\.. P....H....| +00000030 3e 08 7a dd 97 b3 8b 1c 85 f7 aa a7 56 55 1f 6f |>.z.........VU.o| +00000040 27 02 07 1d 11 e0 |'.....| +[4999 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[499a 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[499b 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[499c 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[499d 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[499e 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[499f 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[49a0 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[49a1 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005913ce0 gate 1598907149728031200 evaluation starts +[49a2 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005913ce0 signed by 0 principal evaluation starts (used [false]) +[49a3 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005913ce0 processing identity 0 with bytes of 115a4b0 +[49a4 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005913ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[49a5 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005913ce0 principal evaluation fails +[49a6 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005913ce0 gate 1598907149728031200 evaluation fails +[49a7 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[49a8 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[49a9 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[49aa 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005928250 gate 1598907149728992200 evaluation starts +[49ab 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005928250 signed by 0 principal evaluation starts (used [false]) +[49ac 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005928250 processing identity 0 with bytes of 115a4b0 +[49ad 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005928250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[49ae 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005928250 principal evaluation fails +[49af 08-31 20:52:29.72 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005928250 gate 1598907149728992200 evaluation fails +[49b0 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[49b1 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[49b2 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[49b3 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059287c0 gate 1598907149730378600 evaluation starts +[49b4 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059287c0 signed by 0 principal evaluation starts (used [false]) +[49b5 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059287c0 processing identity 0 with bytes of 115a4b0 +[49b6 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059287c0 principal matched by identity 0 +[49b7 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 13 fd 50 08 cf 2c 7f c8 33 07 bc 5c 1f 29 9b 93 |..P..,..3..\.)..| +00000010 ed b2 9a e8 d2 41 38 47 cf e8 92 26 50 e8 f0 57 |.....A8G...&P..W| +[49b8 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 d7 03 57 95 6a 3d ba be c9 1b 5c |0D. w..W.j=....\| +00000010 af 08 14 62 60 2b 9b d7 e0 11 d8 7b 1d 08 67 e3 |...b`+.....{..g.| +00000020 5e 43 84 5e 02 20 75 e7 81 de c5 e4 66 1d 88 95 |^C.^. u.....f...| +00000030 4b 94 91 4d af 59 0d b9 63 04 8f 1b 01 10 10 ee |K..M.Y..c.......| +00000040 30 1a be f0 35 29 |0...5)| +[49b9 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059287c0 principal evaluation succeeds for identity 0 +[49ba 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059287c0 gate 1598907149730378600 evaluation succeeds +[49bb 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[49bc 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[49bd 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[49be 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[49bf 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[49c0 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[49c1 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[49c2 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[49c3 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[49c4 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[49c5 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[49c6 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[49c7 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059299c0 gate 1598907149735653300 evaluation starts +[49c8 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059299c0 signed by 0 principal evaluation starts (used [false]) +[49c9 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059299c0 processing identity 0 with bytes of 115a4b0 +[49ca 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059299c0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[49cb 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059299c0 principal evaluation fails +[49cc 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059299c0 gate 1598907149735653300 evaluation fails +[49cd 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[49ce 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[49cf 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[49d0 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005929f30 gate 1598907149739061600 evaluation starts +[49d1 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005929f30 signed by 0 principal evaluation starts (used [false]) +[49d2 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005929f30 processing identity 0 with bytes of 115a4b0 +[49d3 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005929f30 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[49d4 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005929f30 principal evaluation fails +[49d5 08-31 20:52:29.73 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005929f30 gate 1598907149739061600 evaluation fails +[49d6 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[49d7 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[49d8 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[49d9 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059404a0 gate 1598907149740386900 evaluation starts +[49da 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059404a0 signed by 0 principal evaluation starts (used [false]) +[49db 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059404a0 processing identity 0 with bytes of 115a4b0 +[49dc 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059404a0 principal matched by identity 0 +[49dd 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 d2 16 99 19 85 9c ad 45 47 f6 38 76 68 3a 94 5b |.......EG.8vh:.[| +00000010 41 b5 66 fa 7f 7a eb 0a 37 54 11 f7 26 66 34 85 |A.f..z..7T..&f4.| +[49de 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 f1 bd 62 2d c9 33 a2 e1 64 6d af |0E.!...b-.3..dm.| +00000010 06 72 0b 0d 83 b4 42 87 98 87 8c 98 4d 00 fe 82 |.r....B.....M...| +00000020 2f 5c 22 5f b2 02 20 0a 3f 0a 25 49 12 f1 e7 39 |/\"_.. .?.%I...9| +00000030 69 e3 a7 2e ee 9b cb d8 a6 05 ed cb ee 84 2f f2 |i............./.| +00000040 1e 56 12 7d 33 2c 3d |.V.}3,=| +[49df 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059404a0 principal evaluation succeeds for identity 0 +[49e0 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059404a0 gate 1598907149740386900 evaluation succeeds +[49e1 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[49e2 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[49e3 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[49e4 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[49e5 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[49e6 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36990 +[49e7 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc00594a2d0 +[49e8 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[49e9 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[49ea 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[49eb 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[49ec 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 0c 20 63 a4 8f 9f 12 75 1e cd a2 52 da 78 6f |.. c....u...R.xo| +00000010 0c 29 aa 2b ec e0 a5 15 e9 f8 c1 18 42 a1 13 99 |.).+........B...| +[49ed 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 36 73 8c 62 0c c5 6b fc 6b f2 |0E.!..6s.b..k.k.| +00000010 cd e3 56 9d 5d e2 90 7b 82 c5 fc c3 58 17 91 f4 |..V.]..{....X...| +00000020 35 0d 78 7e 5b 02 20 10 1c b2 0e 96 7d 9d 7d e4 |5.x~[. .....}.}.| +00000030 41 28 9d 36 88 e2 0e 60 2d 14 3c 50 a6 f5 fc e2 |A(.6...`-._.| +[49ee 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[49ef 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc00584ccb0, header 0xc00594a6e0 +[49f0 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"cscc" +[49f1 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU [][a10a3d0c] processing txid: a10a3d0c4fad2dd44f995baad616e6fc4066f8dc745957940454af3e8e88bcdf +[49f2 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU [][a10a3d0c] Entry chaincode: name:"cscc" +[49f3 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> INFO [][a10a3d0c] Entry chaincode: name:"cscc" +[49f4 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[49f5 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChannels +[49f6 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 b1 0c 20 63 a4 8f 9f 12 75 1e cd a2 52 da 78 6f |.. c....u...R.xo| +00000010 0c 29 aa 2b ec e0 a5 15 e9 f8 c1 18 42 a1 13 99 |.).+........B...| +[49f7 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 bb 36 73 8c 62 0c c5 6b fc 6b f2 |0E.!..6s.b..k.k.| +00000010 cd e3 56 9d 5d e2 90 7b 82 c5 fc c3 58 17 91 f4 |..V.]..{....X...| +00000020 35 0d 78 7e 5b 02 20 10 1c b2 0e 96 7d 9d 7d e4 |5.x~[. .....}.}.| +00000030 41 28 9d 36 88 e2 0e 60 2d 14 3c 50 a6 f5 fc e2 |A(.6...`-._.| +[49f8 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU [a10a3d0c] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[49f9 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU [a10a3d0c] notifying Txid:a10a3d0c4fad2dd44f995baad616e6fc4066f8dc745957940454af3e8e88bcdf, channelID: +[49fa 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[49fb 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> INFO [][a10a3d0c] Exit chaincode: name:"cscc" (1ms) +[49fc 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU [][a10a3d0c] Exit +[49fd 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36990 +[49fe 08-31 20:52:29.74 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36990 grpc.code=OK grpc.call_duration=3.6245ms +[49ff 08-31 20:52:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: http2Server.HandleStreams failed to read frame: read tcp 172.18.0.7:7051->172.18.0.9:36990: read: connection reset by peer +[4a00 08-31 20:52:29.75 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[4a01 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a02 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a03 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG hello to peer1.org1.example.com:7051 +[4a04 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a05 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a06 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes to 1 peers +[4a07 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 33 bytes, Signature: 0 bytes +[4a08 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a09 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4a0a 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4a0b 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG data_dig: , Envelope: 51 bytes, Signature: 0 bytes +[4a0c 08-31 20:52:29.82 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a0d 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4a0e 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4a0f 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a10 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a11 08-31 20:52:29.93 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a12 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[4a13 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[4a14 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU GossipMessage: channel:"businesschannel" tag:CHAN_AND_ORG hello: , Envelope: 34 bytes, Signature: 0 bytes +[4a15 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Sending BLOCK_MSG digest: [1 2 3 4 5 6] to 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b +[4a16 08-31 20:52:30.00 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a17 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a18 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a19 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a1a 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a1b 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [78 225 64 251 211 28 228 130 240 57 220 92 70 28 148 145 18 225 96 235 121 40 215 155 218 198 6 21 144 74 116 130] from identity store +[4a1c 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a1d 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 a6 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4a 7a 43 43 41 63 36 67 41 77 49 42 41 67 49 51 4b 2f 30 4b 42 58 6a 35 36 30 58 32 34 68 49 4c 6b 32 39 73 33 44 41 4b 42 67 67 71 68 6b 6a 4f 50 51 51 44 41 6a 42 7a 4d 51 73 77 0a 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 55 32 46 75 49 45 5a 79 0a 59 57 35 6a 61 58 4e 6a 62 7a 45 5a 4d 42 63 47 41 31 55 45 43 68 4d 51 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 45 63 4d 42 6f 47 41 31 55 45 41 78 4d 54 59 32 45 75 0a 62 33 4a 6e 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 41 65 46 77 30 79 4d 44 41 79 4d 6a 45 78 4f 44 49 30 4d 44 42 61 46 77 30 7a 4d 44 41 79 4d 54 67 78 4f 44 49 30 4d 44 42 61 0a 4d 47 6f 78 43 7a 41 4a 42 67 4e 56 42 41 59 54 41 6c 56 54 4d 52 4d 77 45 51 59 44 56 51 51 49 45 77 70 44 59 57 78 70 5a 6d 39 79 62 6d 6c 68 4d 52 59 77 46 41 59 44 56 51 51 48 45 77 31 54 0a 59 57 34 67 52 6e 4a 68 62 6d 4e 70 63 32 4e 76 4d 51 30 77 43 77 59 44 56 51 51 4c 45 77 52 77 5a 57 56 79 4d 52 38 77 48 51 59 44 56 51 51 44 45 78 5a 77 5a 57 56 79 4d 53 35 76 63 6d 63 79 0a 4c 6d 56 34 59 57 31 77 62 47 55 75 59 32 39 74 4d 46 6b 77 45 77 59 48 4b 6f 5a 49 7a 6a 30 43 41 51 59 49 4b 6f 5a 49 7a 6a 30 44 41 51 63 44 51 67 41 45 61 64 6a 54 64 46 68 2f 35 64 37 41 0a 6e 38 30 78 44 44 72 68 72 35 67 6d 53 73 77 2f 37 52 69 44 72 44 53 54 48 6d 67 47 71 37 48 5a 4e 78 59 59 35 52 55 6d 47 66 6f 2b 76 53 49 2b 79 37 4d 55 62 49 67 71 67 72 5a 69 61 6a 50 32 0a 7a 2b 34 37 74 4a 54 2b 68 61 4e 4e 4d 45 73 77 44 67 59 44 56 52 30 50 41 51 48 2f 42 41 51 44 41 67 65 41 4d 41 77 47 41 31 55 64 45 77 45 42 2f 77 51 43 4d 41 41 77 4b 77 59 44 56 52 30 6a 0a 42 43 51 77 49 6f 41 67 4b 66 61 54 52 33 31 79 71 53 5a 6f 70 59 37 72 50 65 76 76 56 34 43 7a 35 51 71 55 74 49 4f 43 51 41 41 5a 73 4b 6e 52 56 54 30 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 0a 41 77 49 44 52 77 41 77 52 41 49 67 66 54 46 37 33 65 39 64 7a 51 2b 62 48 74 31 57 56 69 36 2b 54 41 61 73 6d 71 51 44 34 4f 55 67 64 69 79 46 75 4d 34 6c 74 63 51 43 49 42 78 43 49 77 7a 2b 0a 33 78 49 67 73 33 73 79 63 61 2f 56 65 7a 65 39 79 76 4c 30 4d 6f 51 39 52 65 70 73 43 61 33 56 67 76 75 76 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4a1e 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4a1f 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4a20 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4a21 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4a22 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4a23 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005851f70 gate 1598907150049660900 evaluation starts +[4a24 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005851f70 signed by 0 principal evaluation starts (used [false]) +[4a25 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005851f70 processing identity 0 with bytes of 115a4b0 +[4a26 08-31 20:52:30.04 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005851f70 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[4a27 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005851f70 principal evaluation fails +[4a28 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005851f70 gate 1598907150049660900 evaluation fails +[4a29 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[4a2a 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4a2b 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4a2c 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b04e0 gate 1598907150051500100 evaluation starts +[4a2d 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b04e0 signed by 0 principal evaluation starts (used [false]) +[4a2e 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b04e0 processing identity 0 with bytes of 115a4b0 +[4a2f 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b04e0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4a30 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b04e0 principal evaluation fails +[4a31 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b04e0 gate 1598907150051500100 evaluation fails +[4a32 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4a33 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4a34 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4a35 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b0a50 gate 1598907150057826400 evaluation starts +[4a36 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b0a50 signed by 0 principal evaluation starts (used [false]) +[4a37 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b0a50 processing identity 0 with bytes of 115a4b0 +[4a38 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b0a50 principal matched by identity 0 +[4a39 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 32 bd 6c 71 9f 8e a3 e3 1e 7a ea 70 83 1b 6d c2 |2.lq.....z.p..m.| +00000010 6b bd 37 73 68 9b 81 0a 3f 03 7e 0e 9c c0 67 fa |k.7sh...?.~...g.| +[4a3a 08-31 20:52:30.05 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 88 e8 be af 3f 71 01 48 4d 01 98 |0E.!.....?q.HM..| +00000010 1a d1 b5 b7 74 e0 51 a7 5d 96 02 84 74 ee 94 13 |....t.Q.]...t...| +00000020 0b b2 34 a3 8f 02 20 66 e8 c2 8a ef 06 0e 44 84 |..4... f......D.| +00000030 c8 93 19 72 c3 44 b0 2a 87 41 bf 53 b5 81 c1 f5 |...r.D.*.A.S....| +00000040 c7 cc 36 96 e6 2d 09 |..6..-.| +[4a3b 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b0a50 principal evaluation succeeds for identity 0 +[4a3c 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc0059b0a50 gate 1598907150057826400 evaluation succeeds +[4a3d 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4a3e 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4a3f 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4a40 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4a41 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a42 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4a43 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4a44 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4a45 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4a46 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a47 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a48 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a49 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a4a 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a4b 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a4c 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a4d 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a4e 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a4f 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4a50 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a51 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a52 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4a53 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a54 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a55 08-31 20:52:30.06 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a57 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a56 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a58 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a59 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a5a 08-31 20:52:30.07 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a5b 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a5c 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a5d 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a5e 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a5f 08-31 20:52:30.09 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a60 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4a61 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a62 08-31 20:52:30.15 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a63 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a64 08-31 20:52:30.16 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a65 08-31 20:52:30.29 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a66 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a67 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a68 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a69 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [31 242 9 23 210 48 132 145 85 185 110 141 128 24 209 31 142 220 35 35 126 74 130 57 171 147 169 111 214 82 61 155] from identity store +[4a6a 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 ba 74 77 41 19 c8 60 ea ba ef a0 ff 82 07 fa 98 |.twA..`.........| +00000010 25 53 c0 aa 29 fd cb ed 6d b8 03 70 30 6b 4d 17 |%S..)...m..p0kM.| +[4a6b 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 45 02 21 00 9d 43 51 f7 a3 56 a4 5b 3f 67 7d |0E.!..CQ..V.[?g}| +00000010 38 74 79 85 40 54 10 89 ce e5 61 a1 89 f6 09 ca |8ty.@T....a.....| +00000020 cb 18 9c d8 c7 02 20 2b 73 d9 66 06 2c d4 a3 14 |...... +s.f.,...| +00000030 07 27 18 58 7d a8 94 71 d3 5a 7c 62 4a a7 fd f1 |.'.X}..q.Z|bJ...| +00000040 f6 12 2f f6 34 d4 15 |../.4..| +[4a6c 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a6d 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes]} +[4a6e 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4a6f 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4a70 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes Secret payload: 29 bytes, Secret Signature: 71 bytes in aliveMembership +[4a71 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a72 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a73 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a74 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a75 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a76 08-31 20:52:30.30 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a77 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a78 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a79 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a7a 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a7b 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a7c 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4a7d 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a7e 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a7f 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a80 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes to 1 peers +[4a81 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a82 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a83 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a84 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a85 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes +[4a86 08-31 20:52:30.31 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a87 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4a88 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:CHAN_OR_ORG state_info_pull_req: , Envelope: 39 bytes, Signature: 0 bytes +[4a89 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a8a 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a8b 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a8c 08-31 20:52:30.41 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a8d 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.6:55096 a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4a8e 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4a8f 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4a90 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Fetched identity of [165 131 248 239 3 41 197 253 174 7 194 7 224 72 165 53 186 222 25 253 75 135 193 113 253 233 221 50 193 227 155 40] from identity store +[4a91 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4a92 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Validation succeeded [0a 07 4f 72 67 32 4d 53 50 12 aa 06 2d 2d 2d 2d 2d 42 45 47 49 4e 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a 4d 49 49 43 4b 44 43 43 41 63 2b 67 41 77 49 42 41 67 49 52 41 4d 72 55 35 6d 6c 72 67 54 31 52 68 78 4f 6c 71 53 41 79 50 53 63 77 43 67 59 49 4b 6f 5a 49 7a 6a 30 45 41 77 49 77 63 7a 45 4c 0a 4d 41 6b 47 41 31 55 45 42 68 4d 43 56 56 4d 78 45 7a 41 52 42 67 4e 56 42 41 67 54 43 6b 4e 68 62 47 6c 6d 62 33 4a 75 61 57 45 78 46 6a 41 55 42 67 4e 56 42 41 63 54 44 56 4e 68 62 69 42 47 0a 63 6d 46 75 59 32 6c 7a 59 32 38 78 47 54 41 58 42 67 4e 56 42 41 6f 54 45 47 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 78 48 44 41 61 42 67 4e 56 42 41 4d 54 45 32 4e 68 0a 4c 6d 39 79 5a 7a 49 75 5a 58 68 68 62 58 42 73 5a 53 35 6a 62 32 30 77 48 68 63 4e 4d 6a 41 77 4d 6a 49 78 4d 54 67 79 4e 44 41 77 57 68 63 4e 4d 7a 41 77 4d 6a 45 34 4d 54 67 79 4e 44 41 77 0a 57 6a 42 71 4d 51 73 77 43 51 59 44 56 51 51 47 45 77 4a 56 55 7a 45 54 4d 42 45 47 41 31 55 45 43 42 4d 4b 51 32 46 73 61 57 5a 76 63 6d 35 70 59 54 45 57 4d 42 51 47 41 31 55 45 42 78 4d 4e 0a 55 32 46 75 49 45 5a 79 59 57 35 6a 61 58 4e 6a 62 7a 45 4e 4d 41 73 47 41 31 55 45 43 78 4d 45 63 47 56 6c 63 6a 45 66 4d 42 30 47 41 31 55 45 41 78 4d 57 63 47 56 6c 63 6a 41 75 62 33 4a 6e 0a 4d 69 35 6c 65 47 46 74 63 47 78 6c 4c 6d 4e 76 62 54 42 5a 4d 42 4d 47 42 79 71 47 53 4d 34 39 41 67 45 47 43 43 71 47 53 4d 34 39 41 77 45 48 41 30 49 41 42 46 66 48 79 4b 76 65 46 38 71 51 0a 34 36 49 5a 33 50 58 61 61 39 31 76 65 71 53 6f 61 63 62 56 77 34 45 50 6a 78 6f 2f 76 2b 46 69 56 32 32 6c 65 56 72 56 50 62 58 2f 6d 52 56 68 45 34 56 43 4e 33 45 7a 71 31 6d 70 2b 42 4f 51 0a 53 50 6e 37 6d 4d 56 2b 4a 32 32 6a 54 54 42 4c 4d 41 34 47 41 31 55 64 44 77 45 42 2f 77 51 45 41 77 49 48 67 44 41 4d 42 67 4e 56 48 52 4d 42 41 66 38 45 41 6a 41 41 4d 43 73 47 41 31 55 64 0a 49 77 51 6b 4d 43 4b 41 49 43 6e 32 6b 30 64 39 63 71 6b 6d 61 4b 57 4f 36 7a 33 72 37 31 65 41 73 2b 55 4b 6c 4c 53 44 67 6b 41 41 47 62 43 70 30 56 55 39 4d 41 6f 47 43 43 71 47 53 4d 34 39 0a 42 41 4d 43 41 30 63 41 4d 45 51 43 49 42 73 70 46 6c 75 35 6e 5a 58 6d 31 53 70 31 46 55 48 45 2f 59 6f 6c 39 44 75 66 55 68 73 36 4f 6d 4c 66 52 4b 75 53 53 77 79 6a 41 69 41 61 58 6b 57 57 0a 68 62 59 4d 74 35 49 67 44 61 4d 33 53 46 56 2f 6b 36 31 47 4d 78 54 70 4b 44 67 5a 47 47 75 67 48 4e 44 44 6c 67 3d 3d 0a 2d 2d 2d 2d 2d 45 4e 44 20 43 45 52 54 49 46 49 43 41 54 45 2d 2d 2d 2d 2d 0a] on [businesschannel] +[4a93 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got policy manager for channel [businesschannel] with flag [true] +[4a94 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Got reader policy for channel [businesschannel] with flag [true] +[4a95 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4a96 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4a97 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4a98 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a02ce0 gate 1598907150443133300 evaluation starts +[4a99 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a02ce0 signed by 0 principal evaluation starts (used [false]) +[4a9a 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a02ce0 processing identity 0 with bytes of 115a4b0 +[4a9b 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a02ce0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org2MSP) +[4a9c 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a02ce0 principal evaluation fails +[4a9d 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a02ce0 gate 1598907150443133300 evaluation fails +[4a9e 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[4a9f 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4aa0 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4aa1 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a03250 gate 1598907150446580600 evaluation starts +[4aa2 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a03250 signed by 0 principal evaluation starts (used [false]) +[4aa3 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a03250 processing identity 0 with bytes of 115a4b0 +[4aa4 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a03250 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4aa5 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a03250 principal evaluation fails +[4aa6 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a03250 gate 1598907150446580600 evaluation fails +[4aa7 08-31 20:52:30.44 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org1MSP/Readers +[4aa8 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4aa9 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers == +[4aaa 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a037c0 gate 1598907150450080800 evaluation starts +[4aab 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a037c0 signed by 0 principal evaluation starts (used [false]) +[4aac 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a037c0 processing identity 0 with bytes of 115a4b0 +[4aad 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a037c0 principal matched by identity 0 +[4aae 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 5b 97 5e 88 bd 3e b9 81 a8 0b e7 48 cb ee 53 b3 |[.^..>.....H..S.| +00000010 d3 77 95 7e 0e 16 cb 07 dd 09 64 f4 6d 05 de 6f |.w.~......d.m..o| +[4aaf 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 5b a1 6e 04 31 7f 05 ce 18 6d 1e 65 |0D. [.n.1....m.e| +00000010 45 65 eb 8f 99 e0 a0 a6 f0 9f d6 54 37 e8 f9 f7 |Ee.........T7...| +00000020 38 b4 7d 28 02 20 71 b5 cf a8 3a 90 c2 d2 88 16 |8.}(. q...:.....| +00000030 50 e1 2c 4c 59 d4 0a 36 85 d3 87 4b 79 f7 a9 2a |P.,LY..6...Ky..*| +00000040 5d fb 7c 40 02 07 |].|@..| +[4ab0 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a037c0 principal evaluation succeeds for identity 0 +[4ab1 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a037c0 gate 1598907150450080800 evaluation succeeds +[4ab2 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org2MSP/Readers +[4ab3 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org2MSP/Readers +[4ab4 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4ab5 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4ab6 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4ab7 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: learnedMembers={[GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes]} +[4ab8 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU updating membership: timestamp: +[4ab9 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Updating aliveness data: membership: timestamp: +[4aba 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Replacing GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 71 bytes in aliveMembership +[4abb 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4abc 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4abd 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4abe 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4abf 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ac0 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ac1 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ac2 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ac3 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ac4 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ac5 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4ac6 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ac7 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4ac8 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4ac9 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4aca 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4acb 08-31 20:52:30.45 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4acc 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4acd 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.8:7051 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4ace 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4acf 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4ad0 08-31 20:52:30.46 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ad1 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4ad2 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, 172.18.0.5:7051 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482 sent us GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4ad3 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ad4 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Got message: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4ad5 08-31 20:52:30.48 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ad6 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4ad7 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 18012A4F0A3F0A1B70656572302E6F72...2D3C120C088C97E1EFC8AF9D9816103E +[4ad8 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: E324C0E0C194FFB01A557E497880C902FFEE360AE4DF30E756B1074160F3E4E1 +[4ad9 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining default signing identity +[4ada 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: plaintext: 0A1B70656572302E6F7267312E6578616D706C652E636F6D3A37303531 +[4adb 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sign: digest: A785FC0B61B5045A71C0FA6B50D12EB1E6F0CDB152C6F79E6575060F54022160 +[4adc 08-31 20:52:30.51 UTC] [%{longpkg}] %{callpath} -> DEBU Sleeping 5s +[4add 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ade 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4adf 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ae0 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4ae1 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4ae2 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4ae3 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, sending GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes to 1 peers +[4ae4 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4ae5 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ae6 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer0.org2.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4ae7 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4ae8 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Entering, Sending to peer1.org1.example.com:7051 , msg: GossipMessage: tag:EMPTY alive_msg: timestamp: > , Envelope: 83 bytes, Signature: 70 bytes +[4ae9 08-31 20:52:30.52 UTC] [%{longpkg}] %{callpath} -> DEBU Exiting +[4aea 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU Entering: request from 172.18.0.9:36998 +[4aeb 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU ValidateProposalMessage starts for signed proposal 0xc005993810 +[4aec 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU validateChannelHeader info: header type 3 +[4aed 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU begin +[4aee 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU creator is &{Org1MSP acc8901a3cb6533d8bfa4a250750d0c3c4bc8c3c43b6942e1855412f04fdc2d5} +[4aef 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU creator is valid +[4af0 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc 1f eb 26 2b 85 da c8 78 c7 6d 56 97 0b c1 44 |...&+...x.mV...D| +00000010 f9 57 ab 00 ab a2 f1 89 45 6c 2d ae a4 32 3e f8 |.W......El-..2>.| +[4af1 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 dc 24 aa d1 83 3d 86 a8 17 94 d6 |0D. w.$...=.....| +00000010 f1 78 8a a7 05 16 32 ad 46 b6 ab 46 a8 c5 a8 e8 |.x....2.F..F....| +00000020 c5 78 e5 f1 02 20 6c d8 2f e0 18 7e 9a 4a c4 8e |.x... l./..~.J..| +00000030 d5 73 e2 83 1b 38 d5 5f 7b 71 82 bd 1a 0e d3 de |.s...8._{q......| +00000040 d5 c7 de 7c 1d 03 |...|..| +[4af2 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU exits successfully +[4af3 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage starts for proposal 0xc0059e65b0, header 0xc005993c20 +[4af4 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU validateChaincodeProposalMessage info: header extension references chaincode name:"qscc" +[4af5 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU [][f21cb71d] processing txid: f21cb71d01e356c9e46faa671d04e699ffce614af071fcab9db1934ef7f5adbc +[4af6 08-31 20:52:30.89 UTC] [%{longpkg}] %{callpath} -> DEBU [][f21cb71d] Entry chaincode: name:"qscc" +[4af7 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> INFO [][f21cb71d] Entry chaincode: name:"qscc" +[4af8 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Entry +[4af9 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Invoke function: GetChainInfo on chain: businesschannel +[4afa 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU acl policy /Channel/Application/Readers found in config for resource qscc/GetChainInfo +[4afb 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU acl check(/Channel/Application/Readers) +[4afc 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers == +[4afd 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4afe 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers == +[4aff 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4b00 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKTCCAc+gAwIBAgIQWKt2D+7SxnIuL42NoT4PazAKBggqhkjOPQQDAjBzMQsw +CQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2FuIEZy +YW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTEcMBoGA1UEAxMTY2Eu +b3JnMS5leGFtcGxlLmNvbTAeFw0yMDAyMjExODI0MDBaFw0zMDAyMTgxODI0MDBa +MGsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1T +YW4gRnJhbmNpc2NvMQ4wDAYDVQQLEwVhZG1pbjEfMB0GA1UEAwwWQWRtaW5Ab3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABB1Zlu6vbvaa +rhaZ/Iygr9W12pTzt5aCEVc+tWwC9DFz856dUhJJiGOY/MCg/y6vgHe4Qrher+eM +xI1IUfh6lCijTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0gAMEUCIQCKvqYcIiitGRyvWINx9X76eBVogyqgqLzq7jIVSiqkyQIgdJmG +GBuExNZfccEKH+2fiNFjebBUHs5Ondop5Looqp0= +-----END CERTIFICATE----- +[4b01 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3d8b0 gate 1598907150902935900 evaluation starts +[4b02 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3d8b0 signed by 0 principal evaluation starts (used [false]) +[4b03 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3d8b0 processing identity 0 with bytes of 115a4b0 +[4b04 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3d8b0 identity 0 does not satisfy principal: the identity is a member of a different MSP (expected Org3MSP, got Org1MSP) +[4b05 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3d8b0 principal evaluation fails +[4b06 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a3d8b0 gate 1598907150902935900 evaluation fails +[4b07 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set did not satisfy policy /Channel/Application/Org3MSP/Readers +[4b08 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org3MSP/Readers +[4b09 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers == +[4b0a 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a90700 gate 1598907150904613600 evaluation starts +[4b0b 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a90700 signed by 0 principal evaluation starts (used [false]) +[4b0c 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a90700 processing identity 0 with bytes of 115a4b0 +[4b0d 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[4b0e 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[4b0f 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[4b10 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a90700 principal matched by identity 0 +[4b11 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 fc 1f eb 26 2b 85 da c8 78 c7 6d 56 97 0b c1 44 |...&+...x.mV...D| +00000010 f9 57 ab 00 ab a2 f1 89 45 6c 2d ae a4 32 3e f8 |.W......El-..2>.| +[4b12 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 77 dc 24 aa d1 83 3d 86 a8 17 94 d6 |0D. w.$...=.....| +00000010 f1 78 8a a7 05 16 32 ad 46 b6 ab 46 a8 c5 a8 e8 |.x....2.F..F....| +00000020 c5 78 e5 f1 02 20 6c d8 2f e0 18 7e 9a 4a c4 8e |.x... l./..~.J..| +00000030 d5 73 e2 83 1b 38 d5 5f 7b 71 82 bd 1a 0e d3 de |.s...8._{q......| +00000040 d5 c7 de 7c 1d 03 |...|..| +[4b13 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a90700 principal evaluation succeeds for identity 0 +[4b14 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a90700 gate 1598907150904613600 evaluation succeeds +[4b15 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Readers +[4b16 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Readers +[4b17 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Readers +[4b18 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Readers +[4b19 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU [f21cb71d] Fabric side handling ChaincodeMessage of type: COMPLETED in state ready +[4b1a 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU [f21cb71d] notifying Txid:f21cb71d01e356c9e46faa671d04e699ffce614af071fcab9db1934ef7f5adbc, channelID: +[4b1b 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exit +[4b1c 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> INFO [][f21cb71d] Exit chaincode: name:"qscc" (9ms) +[4b1d 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU [][f21cb71d] Exit +[4b1e 08-31 20:52:30.90 UTC] [%{longpkg}] %{callpath} -> DEBU Exit: request from 172.18.0.9:36998 +[4b1f 08-31 20:52:30.91 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=protos.Endorser grpc.method=ProcessProposal grpc.peer_address=172.18.0.9:36998 grpc.code=OK grpc.call_duration=14.7195ms +[4b20 08-31 20:52:30.91 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" +[4b21 08-31 20:52:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU Processing request from 172.18.0.9:37006: authentication:tg\262n\302\216X\340\024\027\255\274\260\274\301\363\252\010" > queries: > > > +[4b22 08-31 20:52:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers == +[4b23 08-31 20:52:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU This is an implicit meta policy, it will trigger other policy evaluations, whose failures may be benign +[4b24 08-31 20:52:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU == Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers == +[4b25 08-31 20:52:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a91b50 gate 1598907151979704900 evaluation starts +[4b26 08-31 20:52:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a91b50 signed by 0 principal evaluation starts (used [false]) +[4b27 08-31 20:52:31.97 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a91b50 processing identity 0 with bytes of 115a4b0 +[4b28 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a91b50 principal matched by identity 0 +[4b29 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: digest = 00000000 74 50 fd 85 13 59 7c c0 23 4d 67 c6 92 bd 53 52 |tP...Y|.#Mg...SR| +00000010 e4 01 c3 48 8e a8 08 14 b6 fc cf be 17 ce 67 9f |...H..........g.| +[4b2a 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Verify: sig = 00000000 30 44 02 20 35 22 ff 9e 38 a3 ef 1f 68 b5 66 41 |0D. 5"..8...h.fA| +00000010 10 71 52 33 61 99 00 61 b0 94 65 0a c3 11 42 ce |.qR3a..a..e...B.| +00000020 88 91 4b c1 02 20 5c 8a 58 57 af 50 2f d6 2d 77 |..K.. \.XW.P/.-w| +00000030 5c 7d b4 65 74 db 1b 57 fe 94 f7 63 8e 74 bf 1c |\}.et..W...c.t..| +00000040 76 89 b1 ad 38 af |v...8.| +[4b2b 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a91b50 principal evaluation succeeds for identity 0 +[4b2c 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU 0xc005a91b50 gate 1598907151979704900 evaluation succeeds +[4b2d 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Org1MSP/Writers +[4b2e 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *cauthdsl.policy Policy /Channel/Application/Org1MSP/Writers +[4b2f 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Signature set satisfies policy /Channel/Application/Writers +[4b30 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU == Done Evaluating *policies.implicitMetaPolicy Policy /Channel/Application/Writers +[4b31 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Returning metadata for channel businesschannel , chaincode exp02 : {exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []} +[4b32 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Returning metadata for channel businesschannel , chaincode exp02 : {exp02 1.0 [18 12 18 10 8 1 18 2 8 0 18 2 8 1 26 11 18 9 10 7 79 114 103 49 77 83 80 26 11 18 9 10 7 79 114 103 50 77 83 80] [8 202 103 92 57 168 186 226 99 24 71 165 33 252 146 225 41 105 254 18 43 212 169 223 10 112 124 241 5 158 135 48] []} +[4b33 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b, Metadata: satisfies principal principal:"\n\007Org1MSP" +[4b34 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28, Metadata: doesn't satisfy principal principal:"\n\007Org1MSP" : the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4b35 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer1.org2.example.com:7051, InternalEndpoint: , PKI-ID: 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482, Metadata: doesn't satisfy principal principal:"\n\007Org1MSP" : the identity is a member of a different MSP (expected Org1MSP, got Org2MSP) +[4b36 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Obtaining identity +[4b37 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Creating identity instance for cert -----BEGIN CERTIFICATE----- +MIICKDCCAc+gAwIBAgIRALjPLHVSrxBl93XTAjCDaYAwCgYIKoZIzj0EAwIwczEL +MAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG +cmFuY2lzY28xGTAXBgNVBAoTEG9yZzEuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh +Lm9yZzEuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw +WjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN +U2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn +MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABGkgL2yALkh7 +buDyTiCBz4xTRbNBCAgWnniJ8LwYqoVYbaNBfbT3ZIjhski2EF9dnyunUDlwUc/f +VXQy1Pz5V7ejTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud +IwQkMCKAIJ26Ia4fKncNdl0r/gwxlDm2PJwmwR/mu5Tqkg6FwNM3MAoGCCqGSM49 +BAMCA0cAMEQCICsBRTdLiifEVAUuueq4dQr7bQ1+XxFpeWVH31EcTn+kAiBVbwDx +PgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA== +-----END CERTIFICATE----- +[4b38 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Checking if identity satisfies MEMBER role for Org1MSP +[4b39 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP validating identity +[4b3a 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU MSP Org1MSP getting certification chain +[4b3b 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: satisfies principal principal:"\n\007Org1MSP" +[4b3c 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer1.org1.example.com:7051, InternalEndpoint: peer1.org1.example.com:7051, PKI-ID: 1ff20917d230849155b96e8d8018d11f8edc23237e4a8239ab93a96fd6523d9b, Metadata: doesn't satisfy principal principal:"\n\007Org2MSP" : the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[4b3d 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer0.org2.example.com:7051, InternalEndpoint: , PKI-ID: a583f8ef0329c5fdae07c207e048a535bade19fd4b87c171fde9dd32c1e39b28, Metadata: satisfies principal principal:"\n\007Org2MSP" +[4b3e 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer1.org2.example.com:7051, InternalEndpoint: , PKI-ID: 4ee140fbd31ce482f039dc5c461c949112e160eb7928d79bdac60615904a7482, Metadata: satisfies principal principal:"\n\007Org2MSP" +[4b3f 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Endpoint: peer0.org1.example.com:7051, InternalEndpoint: , PKI-ID: 9901cde7c48a747a3097501a149a7a50cbb9c87bc820a78777fec36b71752d3c, Metadata: doesn't satisfy principal principal:"\n\007Org2MSP" : the identity is a member of a different MSP (expected Org2MSP, got Org1MSP) +[4b40 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> DEBU Returning to 172.18.0.9:37006 a response containing: [cc_query_res:\342\014\235r`\335\216\211\030\255\021\002 \0379\210\363\205\272\270\332\356\227\206(\322\204cfp\354\221(\327\222\3164\033\352\357\302\t\236\267!" > membership_info: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nXepzHVRwgIETmyBWUeQXIekYHi03SxqXmck2Mw==\n-----END CERTIFICATE-----\n" > peers:\010z\335\227\263\213\034\205\367\252\247VU\037o'\002\007\035\021\340" > membership_info: identity:"\n\007Org1MSP\022\252\006-----BEGIN CERTIFICATE-----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\nPgmKMSXv8v1/lHuxV4WPMc5fV0nUS5YsIjS6lA==\n-----END CERTIFICATE-----\n" > > > endorsers_by_groups: membership_info: identity:"\n\007Org2MSP\022\252\006-----BEGIN CERTIFICATE-----\nMIICKDCCAc+gAwIBAgIRAMrU5mlrgT1RhxOlqSAyPScwCgYIKoZIzj0EAwIwczEL\nMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExFjAUBgNVBAcTDVNhbiBG\ncmFuY2lzY28xGTAXBgNVBAoTEG9yZzIuZXhhbXBsZS5jb20xHDAaBgNVBAMTE2Nh\nLm9yZzIuZXhhbXBsZS5jb20wHhcNMjAwMjIxMTgyNDAwWhcNMzAwMjE4MTgyNDAw\nWjBqMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMN\nU2FuIEZyYW5jaXNjbzENMAsGA1UECxMEcGVlcjEfMB0GA1UEAxMWcGVlcjAub3Jn\nMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABFfHyKveF8qQ\n46IZ3PXaa91veqSoacbVw4EPjxo/v+FiV22leVrVPbX/mRVhE4VCN3Ezq1mp+BOQ\nSPn7mMV+J22jTTBLMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMCsGA1Ud\nIwQkMCKAICn2k0d9cqkmaKWO6z3r71eAs+UKlLSDgkAAGbCp0VU9MAoGCCqGSM49\nBAMCA0cAMEQCIBspFlu5nZXm1Sp1FUHE/Yol9DufUhs6OmLfRKuSSwyjAiAaXkWW\nhbYMt5IgDaM3SFV/k61GMxTpKDgZGGugHNDDlg==\n-----END CERTIFICATE-----\n" > peers: identity:"\n\007Org2MSP\022\246\006-----BEGIN CERTIFICATE-----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\n3xIgs3syca/Veze9yvL0MoQ9RepsCa3Vgvuv\n-----END CERTIFICATE-----\n" > > > layouts: > layouts: > > > ] +[4b41 08-31 20:52:31.98 UTC] [%{longpkg}] %{callpath} -> INFO unary call completed grpc.service=discovery.Discovery grpc.method=Discover grpc.request_deadline=2020-08-31T20:52:41.963Z grpc.peer_address=172.18.0.9:37006 grpc.peer_subject="CN=Admin@org1.example.com,L=San Francisco,ST=California,C=US" grpc.code=OK grpc.call_duration=10.4094ms +[4b42 08-31 20:52:31.99 UTC] [%{longpkg}] %{callpath} -> DEBU transport: loopyWriter.run returning. connection error: desc = "transport is closing" diff --git a/hyperledger_fabric/v1.4.8/scripts/download_images.sh b/hyperledger_fabric/v1.4.8/scripts/download_images.sh new file mode 100644 index 00000000..13e2df34 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/download_images.sh @@ -0,0 +1,73 @@ +#!/usr/bin/env bash + +# peer/orderer/ca/ccenv/tools/javaenv/baseos: 1.4, 1.4.0, 1.4.1, 2.0.0, latest +# baseimage (runtime for golang chaincode)/couchdb: 0.4.15, latest +# Noted: +# * the fabric-baseos 1.4/2.0 tags are not available at dockerhub yet, only latest/0.4.15 now +# * the fabric-nodeenv is not available at dockerhub yet + +# In core.yaml, it requires: +# * fabric-ccenv:$(PROJECT_VERSION) +# * fabric-baseos:$(PROJECT_VERSION) +# * fabric-javaenv:latest +# * fabric-nodeenv:latest + +# Define those global variables +if [ -f ./variables.sh ]; then + source ./variables.sh +elif [ -f scripts/variables.sh ]; then + source scripts/variables.sh +else + echo_r "Cannot find the variables.sh files, pls check" + exit 1 +fi + +# pull_image image_name +pull_image() { + IMG=$1 + FORCED="false" + if [ "$#" -eq 2 ]; then + FORCED=$2 + fi + if [ ! -z "$(docker images -q ${IMG} 2> /dev/null)" ] && [ "$FORCED" != "true" ]; then # existed and not forced to update + echo "${IMG} already exists and not forced to update " + else + docker pull ${IMG} + fi +} + +echo "Downloading images from DockerHub... need a while" + +# TODO: we may need some checking on pulling result? +echo "=== Pulling yeasy/hyperledger-fabric-* images with tag ${FABRIC_IMG_TAG}... ===" +for IMG in base peer orderer ca; do + pull_image "yeasy/hyperledger-fabric-${IMG}:$FABRIC_IMG_TAG" "true" & +done + +pull_image yeasy/hyperledger-fabric:$FABRIC_IMG_TAG + +# pull_image yeasy/blockchain-explorer:0.1.0-preview # TODO: wait for official images +echo "=== Pulling fabric core images ${FABRIC_IMG_TAG} from fabric repo... ===" +for IMG in peer orderer ca ccenv tools baseos javaenv nodeenv; do + pull_image hyperledger/fabric-${IMG}:$FABRIC_IMG_TAG & # e.g., v1.4.4 +done + +# core.yaml requires a PROJECT_VERSION tag, only need when testing latest code +docker tag hyperledger/fabric-ccenv:$FABRIC_IMG_TAG hyperledger/fabric-ccenv:${PROJECT_VERSION} + +echo "=== Pulling base/3rd-party images with tag ${BASE_IMG_TAG} from fabric repo... ===" +for IMG in baseimage baseos couchdb kafka zookeeper; do + pull_image hyperledger/fabric-${IMG}:$BASE_IMG_TAG & # e.g., 0.4.18 +done + +if [ ${PROJECT_VERSION} == "2.0.0" ]; then + pull_image hyperledger/fabric-javaenv:latest # core.yaml requires a latest tag + # core.yaml requires a latest tag, but nodeenv is not available in docker hub yet + # pull_image hyperledger/fabric-nodeenv:latest + pull_image hyperledger/fabric-baseos:latest # fabric-baseos does not have 1.4/2.0 tag yet, but core.yaml requires a PROJECT_VERSION tag + docker tag hyperledger/fabric-baseos:latest hyperledger/fabric-baseos:${PROJECT_VERSION} +fi + +echo "Image pulling done, now can startup the network using make start..." + +exit 0 \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.8/scripts/env_cleanup.sh b/hyperledger_fabric/v1.4.8/scripts/env_cleanup.sh new file mode 100644 index 00000000..c9ec1766 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/env_cleanup.sh @@ -0,0 +1,17 @@ +#!/usr/bin/env bash + +# This script will remove all containers and hyperledger related images + +echo "Clean up all containers..." +docker rm -f `docker ps -qa` + +echo "Clean up all chaincode images..." +docker rmi -f $(docker images |grep 'dev-peer'|awk '{print $3}') + +echo "Clean up all hyperledger related images..." +docker rmi -f $(docker images |grep 'hyperledger'|awk '{print $3}') + +echo "Clean up dangling images..." +docker rmi $(docker images -q -f dangling=true) + +echo "Env cleanup done!" \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.8/scripts/env_setup.sh b/hyperledger_fabric/v1.4.8/scripts/env_setup.sh new file mode 100644 index 00000000..58888918 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/env_setup.sh @@ -0,0 +1,30 @@ +#!/usr/bin/env bash + +# Install docker on Ubuntu/Debian system + +install_docker() { + echo "Install Docker..." + wget -qO- https://get.docker.com/ | sh + sudo service docker stop + #nohup sudo docker daemon --api-cors-header="*" -H tcp://0.0.0.0:2375 -H unix:///var/run/docker.sock& + echo "Docker Installation Done" +} + +install_docker_compose() { + echo "Install Docker-Compose..." + command -v "curl" >/dev/null 2>&1 || sudo apt-get update && apt-get install curl -y + curl -L https://github.com/docker/compose/releases/download/1.17.0/docker-compose-`uname -s`-`uname -m` > /usr/local/bin/docker-compose + sudo chmod +x /usr/local/bin/docker-compose + docker-compose --version + echo "Docker-Compose Installation Done" +} + +command -v "docker" >/dev/null 2>&1 && echo "Docker already installed" || install_docker + +command -v "docker-compose" >/dev/null 2>&1 && echo "Docker-Compose already installed" || install_docker_compose + +command -v "jq" >/dev/null 2>&1 && echo "jq already installed" || sudo apt-get install jq + + +echo "Create default docker network for usage" +docker network create hlf_net diff --git a/hyperledger_fabric/v1.4.8/scripts/func.sh b/hyperledger_fabric/v1.4.8/scripts/func.sh new file mode 100644 index 00000000..49c43a71 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/func.sh @@ -0,0 +1,978 @@ +#!/usr/bin/env bash + +echo_r () { + [ $# -ne 1 ] && return 0 + echo -e "\033[31m$1\033[0m" +} +echo_g () { + [ $# -ne 1 ] && return 0 + echo -e "\033[32m$1\033[0m" +} +echo_y () { + [ $# -ne 1 ] && return 0 + echo -e "\033[33m$1\033[0m" +} +echo_b () { + [ $# -ne 1 ] && return 0 + echo -e "\033[34m$1\033[0m" +} + +# Define those global variables +if [ -f ./variables.sh ]; then + source ./variables.sh +elif [ -f scripts/variables.sh ]; then + source scripts/variables.sh +else + echo_r "Cannot find the variables.sh files, pls check" + exit 1 +fi + +# Verify $1 is not 0, then output error msg $2 and exit +verifyResult () { + if [ $1 -ne 0 ] ; then + echo "$2" + echo_r "=== ERROR !!! FAILED to execute End-2-End Scenario ===" + exit 1 + fi +} + +# set env to use orderOrg's identity +setOrdererEnvs () { + export CORE_PEER_LOCALMSPID="OrdererMSP" + export CORE_PEER_MSPCONFIGPATH=${ORDERER0_ADMIN_MSP} + export CORE_PEER_TLS_ROOTCERT_FILE=${ORDERER0_TLS_ROOTCERT} + #t="\${ORG${org}_PEER${peer}_URL}" && CORE_PEER_ADDRESS=`eval echo $t` +} + +# Set global env variables for fabric cli, after setting: +# client is the admin as given org +# TLS root cert is configured to given peer's tls ca +# remote peer address is configured to given peer's + +# CORE_PEER_LOCALMSPID=Org1MSP # local msp id to use +# CORE_PEER_MSPCONFIGPATH=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp # local msp path to use +# CORE_PEER_TLS_ROOTCERT_FILE=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt # local trusted tls ca cert +# CORE_PEER_ADDRESS=peer0.org1.example.com:7051 # remote peer to send proposal to + +# Usage: setEnvs org peer +setEnvs () { + local org=$1 # 1 or 2 + local peer=$2 # 0 or 1 + [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + local t="" + export CORE_PEER_LOCALMSPID="Org${org}MSP" + #CORE_PEER_MSPCONFIGPATH=\$${ORG${org}_ADMIN_MSP} + t="\${ORG${org}_PEER${peer}_URL}" && export CORE_PEER_ADDRESS=`eval echo $t` + t="\${ORG${org}_ADMIN_MSP}" && export CORE_PEER_MSPCONFIGPATH=`eval echo $t` + t="\${ORG${org}_PEER${peer}_TLS_ROOTCERT}" && export CORE_PEER_TLS_ROOTCERT_FILE=`eval echo $t` + + #env |grep CORE +} + +# Internal func called by channelCreate +# channelCreateAction channel tx orderer_url orderer_tls_rootcert +channelCreateAction(){ + local channel=$1 + local channel_tx=$2 + local orderer_url=$3 + local orderer_tls_rootcert=$4 + + if [ -z "$CORE_PEER_TLS_ENABLED" ] || [ "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer channel create \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${channel_tx} \ + --timeout "${TIMEOUT}s" + else + peer channel create \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${channel_tx} \ + --timeout "${TIMEOUT}s" \ + --tls \ + --cafile ${orderer_tls_rootcert} + fi + return $? +} + +# Use peer0/org1's identity to create a channel +# channelCreate APP_CHANNEL APP_CHANNEL.tx org peer orderer_url orderer_tls_rootcert +channelCreate() { + local channel=$1 + local tx=$2 + local org=$3 + local peer=$4 + local orderer_url=$5 + local orderer_tls_rootcert=$6 + + [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + echo "=== Create Channel ${channel} by org $org/peer $peer === " + setEnvs $org $peer + local rc=1 + local counter=0 + while [ ${counter} -lt ${MAX_RETRY} -a ${rc} -ne 0 ]; do + channelCreateAction ${channel} ${tx} ${orderer_url} ${orderer_tls_rootcert} + rc=$? + let counter=${counter}+1 + #COUNTER=` expr $COUNTER + 1` + [ $rc -ne 0 ] && echo "Failed to create channel $channel, retry after 3s" && sleep 3 + done + [ $rc -ne 0 ] && cat log.txt + verifyResult ${rc} "Channel ${channel} creation failed" + echo "=== Channel ${channel} is created. === " +} + +# called by channelJoinWithRetry +channelJoinAction () { + local channel=$1 + peer channel join \ + -b ${channel}.block \ + >&log.txt +} + +## Sometimes Join takes time hence RETRY atleast for 5 times +channelJoinWithRetry () { + local channel=$1 + local peer=$2 + local counter=0 + channelJoinAction ${channel} + local rc=$? + while [ ${counter} -lt ${MAX_RETRY} -a ${rc} -ne 0 ]; do + echo "peer${peer} failed to join channel ${channel}, retry after 2s" + sleep 2 + channelJoinAction ${channel} + rc=$? + let counter=${counter}+1 + done + [ $rc -ne 0 ] && cat log.txt + verifyResult ${rc} "After $MAX_RETRY attempts, peer${peer} failed to Join the Channel" +} + +# Join given (by default all) peers into the channel +# channelJoin channel org peer +channelJoin () { + local channel=$1 + local org=$2 + local peer=$3 + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + echo "=== Join org $org/peer $peer into channel ${channel} === " + setEnvs $org $peer + channelJoinWithRetry ${channel} $peer + echo "=== org $org/peer $peer joined into channel ${channel} === " +} + +getShasum () { + [ ! $# -eq 1 ] && exit 1 + shasum ${1} | awk '{print $1}' +} + +# List the channel that the peer joined +# E.g., for peer 0 at org 1, will do +# channelList 1 0 +channelList () { + local org=$1 + local peer=$2 + echo "=== List the channels that org${org}/peer${peer} joined === " + + setEnvs $org $peer + + peer channel list >&log.txt + rc=$? + [ $rc -ne 0 ] && cat log.txt + if [ $rc -ne 0 ]; then + echo "=== Failed to list the channels that org${org}/peer${peer} joined === " + else + echo "=== Done to list the channels that org${org}/peer${peer} joined === " + fi +} + +# Get the info of specific channel, including {height, currentBlockHash, previousBlockHash}. +# E.g., for peer 0 at org 1, get info of business channel will do +# channelGetInfo businesschannel 1 0 +channelGetInfo () { + local channel=$1 + local org=$2 + local peer=$3 + echo "=== Get channel info (height, currentBlockHash, previousBlockHash) of ${channel} with id of org${org}/peer${peer} === " + + setEnvs $org $peer + + peer channel getinfo -c ${channel} >&log.txt + rc=$? + cat log.txt + if [ $rc -ne 0 ]; then + echo "=== Fail to get channel info of ${channel} with id of org${org}/peer${peer} === " + else + echo "=== Done to get channel info of ${channel} with id of org${org}/peer${peer} === " + fi +} + +# Fetch all blocks for a channel +# Usage: channelFetchAll channel org peer orderer_url orderer_tls_rootcert +channelFetchAll () { + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + + echo "=== Fetch all block for channel $channel === " + + local block_file=/tmp/${channel}_newest.block + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} "newest" ${block_file} + [ $? -ne 0 ] && exit 1 + newest_block_shasum=$(getShasum ${block_file}) + echo "fetch newest block ${block_file} with shasum=${newest_block_shasum}" + + block_file=${CHANNEL_ARTIFACTS}/${channel}_config.block + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} "config" ${block_file} + [ $? -ne 0 ] && exit 1 + echo "fetch config block ${block_file}" + + for i in $(seq 0 16); do # we at most fetch 16 blocks + block_file=${CHANNEL_ARTIFACTS}/${channel}_${i}.block + channelFetch ${channel} $org $peer ${orderer_url} ${orderer_tls_rootcert} $i ${block_file} + [ $? -ne 0 ] && exit 1 + [ -f $block_file ] || break + echo "fetch block $i and saved into ${block_file}" + block_shasum=$(getShasum ${block_file}) + [ ${block_shasum} = ${newest_block_shasum} ] && { echo "Block $i is the last one for channel $channel"; break; } + done +} + +# Fetch some block from a given channel +# channelFetch channel org peer orderer_url blockNum block_file +channelFetch () { + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local num=$6 + local block_file=$7 + echo "=== Fetch block $num of channel $channel === " + + #setEnvs $org $peer + setOrdererEnvs # system channel required id from ordererOrg + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "${CORE_PEER_TLS_ENABLED}" ] || [ "${CORE_PEER_TLS_ENABLED}" = "false" ]; then + peer channel fetch $num ${block_file} \ + -o ${orderer_url} \ + -c ${channel} \ + >&log.txt + else + peer channel fetch $num ${block_file} \ + -o ${orderer_url} \ + -c ${channel} \ + --tls \ + --cafile ${orderer_tls_rootcert} \ + >&log.txt + fi + if [ $? -ne 0 ]; then + cat log.txt + echo_r "Fetch block $num of channel $channel failed" + return 1 + else + echo "=== Fetch block $num of channel $channel OK === " + return 0 + fi +} + +# Sign a channel config tx +# Usage: channelSignConfigTx channel org peer transaction +channelSignConfigTx () { + local channel=$1 + local org=$2 + local peer=$3 + local tx=$4 + [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + echo "=== Sign channel config tx $tx for channel $channel by org $org/peer $peer === " + [ -f ${CHANNEL_ARTIFACTS}/${tx} ] || { echo_r "${tx} not exist"; exit 1; } + + setEnvs $org $peer + + peer channel signconfigtx -f ${CHANNEL_ARTIFACTS}/${tx} >&log.txt + rc=$? + [ $rc -ne 0 ] && cat log.txt + if [ $rc -ne 0 ]; then + echo_r "Sign channel config tx for channel $channel by org $org/peer $peer failed" + else + echo "=== Sign channel config tx channel $channel by org $org/peer $peer is successful === " + fi +} + +# Update a channel config +# Usage: channelUpdate channel org peer orderer_url orderer_tls_rootcert transaction_file +channelUpdate() { + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local tx=$6 + [ -z $channel ] && [ -z $tx ] && [ -z $org ] && [ -z $peer ] && echo_r "input param invalid" && exit -1 + + setEnvs $org $peer + echo "=== Update config on channel ${channel} === " + [ -f ${CHANNEL_ARTIFACTS}/${tx} ] || { echo_r "${tx} not exist"; exit 1; } + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer channel update \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${tx} \ + >&log.txt + else + peer channel update \ + -c ${channel} \ + -o ${orderer_url} \ + -f ${CHANNEL_ARTIFACTS}/${tx} \ + --tls \ + --cafile ${orderer_tls_rootcert} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "peer channel update failed" + echo "=== Channel ${channel} is updated. === " + sleep 2 +} + +# Install chaincode on the peer node +# In v2.x it will package, install and approve +# chaincodeInstall peer cc_name version path [lang] +chaincodeInstall () { + if [ "$#" -lt 7 ]; then + echo_r "Wrong param number for chaincode install" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local name=$5 + local version=$6 + local path=$7 + local lang="golang" + if [ "$#" -eq 8 ]; then + local lang=$8 + fi + + [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $version ] && [ -z $path ] && echo_r "input param invalid" && exit -1 + echo "=== Install Chaincode on org ${org}/peer ${peer} === " + echo "name=${name}, version=${version}, path=${path}" + setEnvs $org $peer + peer chaincode install \ + -n ${name} \ + -v $version \ + -p ${path} \ + -l ${lang} \ + >&log.txt + + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode installation on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is installed on org ${org}/peer $peer === " +} + +# Approve the chaincode definition +# chaincodeApprove channel org peer peer_url peer_tls_root_cert orderer_url orderer_tls_rootcert channel name version +chaincodeApprove () { + if [ "$#" -ne 9 -a "$#" -ne 11 ]; then + echo_r "Wrong param number for chaincode approve" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local orderer_url=$5 + local orderer_tls_rootcert=$6 + local channel=$7 + local name=$8 + local version=$9 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + if [ ! -z "${10}" ]; then + collection_config=${10} + fi + + if [ ! -z "${11}" ]; then + policy=${12} + fi + + setEnvs $org $peer + echo "querying installed chaincode and get its package id" + peer lifecycle chaincode queryinstalled >&query.log + cat query.log + local label=${name} + #package_id=$(grep -o "${name}_${version}:[a-z0-9]*" query.log|cut -d ":" -f 2) + package_id=$(grep -o "${label}:[a-z0-9]*" query.log) + echo "Approve package id=${package_id} by Org ${org}/Peer ${peer}" + + # use the --init-required flag to request the ``Init`` function be invoked to initialize the chaincode + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer lifecycle chaincode approveformyorg \ + --peerAddresses ${peer_url} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --package-id ${package_id} \ + --sequence 1 \ + --signature-policy "${policy}" \ + --waitForEvent \ + --orderer ${orderer_url} >&log.txt + else + peer lifecycle chaincode approveformyorg \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --package-id ${package_id} \ + --sequence 1 \ + --signature-policy "${policy}" \ + --waitForEvent \ + --orderer ${orderer_url} \ + --tls true \ + --cafile ${orderer_tls_rootcert} >&log.txt + fi + + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Approval on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is approved on remote peer$peer === " +} + +# Query the Approve the chaincode definition +# chaincodeQueryApprove channel org peer name version +chaincodeQueryApprove () { + if [ "$#" -ne 7 ]; then + echo_r "Wrong param number for chaincode queryapproval" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local channel=$5 + local name=$6 + local version=$7 + + setEnvs $org $peer + + echo "Query the approval status of the chaincode $name $version" + peer lifecycle chaincode queryapprovalstatus \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeQueryApproval Failed: org ${org}/peer$peer" +} + +# Anyone can commit the chaincode definition once it's approved by major +# chaincodeCommit org peer channel orderer_url orderer_tls_rootcert name version [collection-config] [endorse-policy] +chaincodeCommit () { + if [ "$#" -ne 7 -a "$#" -ne 9 ]; then + echo_r "Wrong param number for chaincode commit" + exit -1 + fi + local org=$1 + local peer=$2 + local channel=$3 + local orderer_url=$4 + local orderer_tls_rootcert=$5 + local name=$6 + local version=$7 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + if [ ! -z "$8" ]; then + collection_config=$8 + fi + + if [ ! -z "$9" ]; then + policy=$9 # chaincode endorsement policy + fi + + setEnvs $org $peer + echo "querying installed chaincode and get its package id" + peer lifecycle chaincode queryinstalled >&query.log + label=${name} + #package_id=$(grep -o "${name}_${version}:[a-z0-9]*" query.log|cut -d ":" -f 2) + package_id=$(grep -o "${label}:[a-z0-9]*" query.log) + + echo "Committing package id=${package_id} by Org ${org}/Peer ${peer}" + # use the --init-required flag to request the ``Init`` function be invoked to initialize the chaincode + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer lifecycle chaincode commit \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --sequence 1 \ + --peerAddresses ${ORG1_PEER0_URL} \ + --tlsRootCertFiles ${ORG1_PEER0_TLS_ROOTCERT} \ + --peerAddresses ${ORG2_PEER0_URL} \ + --tlsRootCertFiles ${ORG2_PEER0_TLS_ROOTCERT} \ + --waitForEvent \ + --collections-config "${collection_config}" \ + --signature-policy "${policy}" + else + peer lifecycle chaincode commit \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --version ${version} \ + --init-required \ + --sequence 1 \ + --peerAddresses ${ORG1_PEER0_URL} \ + --tlsRootCertFiles ${ORG1_PEER0_TLS_ROOTCERT} \ + --peerAddresses ${ORG2_PEER0_URL} \ + --tlsRootCertFiles ${ORG2_PEER0_TLS_ROOTCERT} \ + --waitForEvent \ + --collections-config "${collection_config}" \ + --signature-policy "${policy}" \ + --tls true \ + --cafile ${orderer_tls_rootcert} >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Commit on remote org ${org}/peer$peer has Failed" + echo "=== Chaincode is committed on channel $channel === " +} + +# Query the Commit the chaincode definition +# chaincodeQueryCommitted org peer peer_url peer_tls_root_cert channel cc_name +chaincodeQueryCommitted () { + if [ "$#" -ne 6 ]; then + echo_r "Wrong param number for chaincode querycommit" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_tls_root_cert=$4 + local channel=$5 + local name=$6 + + setEnvs $org $peer + + echo "Query the committed status of chaincode $name with ${ORG1_PEER0_URL} " + peer lifecycle chaincode querycommitted \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_tls_root_cert} \ + --channelID ${channel} \ + --name ${name} + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeQueryCommit Failed: org ${org}/peer$peer" +} + + +# Instantiate chaincode on specifized peer node +# chaincodeInstantiate channel org peer orderer_url name version args +chaincodeInstantiate () { + if [ "$#" -gt 9 -a "$#" -lt 7 ]; then + echo_r "Wrong param number for chaincode instantaite" + exit -1 + fi + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local name=$5 + local version=$6 + local args=$7 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + if [ ! -z "$8" ]; then + collection_config=$8 + fi + + if [ ! -z "$9" ]; then + policy=$9 + fi + + setEnvs $org $peer + echo "=== chaincodeInstantiate for channel ${channel} on org $org/peer $peer ====" + echo "name=${name}, version=${version}, args=${args}, collection_config=${collection_config}, policy=${policy}" + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode instantiate \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + >&log.txt + else + peer chaincode instantiate \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + --tls \ + --cafile ${ORDERER0_TLS_CA} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "ChaincodeInstantiation on org $org/peer$peer in channel ${channel} failed" + echo "=== Chaincode Instantiated in channel ${channel} by peer$peer ===" +} + +# Invoke the Init func of chaincode to start the container +# Usage: chaincodeInit org peer channel orderer name args peer_url peer_org_tlsca +chaincodeInit () { + if [ "$#" -ne 8 ]; then + echo_r "Wrong param number for chaincode Init" + exit -1 + fi + local org=$1 + local peer=$2 + local channel=$3 + local orderer=$4 + local name=$5 + local args=$6 + local peer_url=$7 + local peer_org_tlsca=$8 + + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 + echo "=== chaincodeInit to orderer by id of org${org}/peer${peer} === " + echo "channel=${channel}, name=${name}, args=${args}" + setEnvs $org $peer + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode invoke \ + -o ${orderer} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + --isInit \ + -c ${args} \ + >&log.txt + else + peer chaincode invoke \ + -o ${orderer} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + --isInit \ + -c ${args} \ + --tls \ + --cafile ${ORDERER0_TLS_CA} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode Init failed: peer$peer in channel ${channel}" + echo "=== Chaincode Init done: peer$peer in channel ${channel} === " +} + +# Usage: chaincodeInvoke org peer channel orderer name args peer_url peer_org_tlsca +chaincodeInvoke () { + if [ "$#" -ne 9 ]; then + echo_r "Wrong param number for chaincode Invoke" + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_org_tlsca=$4 + local channel=$5 + local orderer_url=$6 + local orderer_tls_rootcert=$7 + local name=$8 + local args=$9 + + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 + echo "=== chaincodeInvoke to orderer by id of org${org}/peer${peer} === " + echo "channel=${channel}, name=${name}, args=${args}" + setEnvs $org $peer + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode invoke \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + -c ${args} \ + >&log.txt + else + peer chaincode invoke \ + -o ${orderer_url} \ + --channelID ${channel} \ + --name ${name} \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + -c ${args} \ + --tls \ + --cafile ${orderer_tls_rootcert} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Invoke execution on peer$peer failed " + echo "=== Invoke transaction on peer$peer in channel ${channel} is successful === " +} + +# query org peer channel name args expected_result +chaincodeQuery () { + if [ "$#" -ne 7 -a "$#" -ne 8 ]; then + echo_r "Wrong param number $# for chaincode Query" + echo $* + exit -1 + fi + local org=$1 + local peer=$2 + local peer_url=$3 + local peer_org_tlsca=$4 + local channel=$5 + local name=$6 + local args=$7 + local expected_result="" + + [ $# -eq 8 ] && local expected_result=$8 + + [ -z $channel ] && [ -z $org ] && [ -z $peer ] && [ -z $name ] && [ -z $args ] && echo_r "input param invalid" && exit -1 + + echo "=== chaincodeQuery to org $org/peer $peer === " + echo "channel=${channel}, name=${name}, args=${args}, expected_result=${expected_result}" + local rc=1 + local starttime=$(date +%s) + + setEnvs $org $peer + + # we either get a successful response, or reach TIMEOUT + while [ "$(($(date +%s)-starttime))" -lt "$TIMEOUT" -a $rc -ne 0 ]; do + echo "Attempting to Query org ${org}/peer ${peer} ...$(($(date +%s)-starttime)) secs" + peer chaincode query \ + -C "${channel}" \ + -n "${name}" \ + --peerAddresses ${peer_url} \ + --tlsRootCertFiles ${peer_org_tlsca} \ + -c "${args}" \ + >&log.txt + rc=$? + if [ -n "${expected_result}" ]; then # need to check the result + test $? -eq 0 && VALUE=$(cat log.txt | awk 'END {print $NF}') + if [ "$VALUE" = "${expected_result}" ]; then + let rc=0 + echo_b "$VALUE == ${expected_result}, passed" + else + let rc=1 + echo_b "$VALUE != ${expected_result}, will retry" + fi + fi + if [ $rc -ne 0 ]; then + cat log.txt + sleep 2 + fi + done + + # rc==0, or timeout + if [ $rc -eq 0 ]; then + echo "=== Query is done: org $org/peer$peer in channel ${channel} === " + else + echo_r "=== Query failed: org $org/peer$peer, run `make stop clean` to clean ===" + exit 1 + fi +} + +# List Installed chaincode on specified peer node, and instantiated chaincodes at specific channel +# chaincodeList org1 peer0 businesschannel +chaincodeList () { + local org=$1 + local peer=$2 + local channel=$3 + + [ -z $org ] && [ -z $peer ] && [ -z $channel ] && echo_r "input param invalid" && exit -1 + echo "=== ChaincodeList on org ${org}/peer ${peer} === " + setEnvs $org $peer + echo_b "Get installed chaincodes at peer$peer.org$org" + peer chaincode list \ + --installed > log.txt & + # \ + #--peerAddresses "peer${peer}.org${org}.example.com" --tls false + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "List installed chaincodes on remote org ${org}/peer$peer has Failed" + + echo_b "Get instantiated chaincodes at channel $org" + peer chaincode list \ + --instantiated \ + -C ${channel} > log.txt & + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "List installed chaincodes on remote org ${org}/peer$peer has Failed" + echo "=== ChaincodeList is done at peer${peer}.org${org} === " +} + +# Start chaincode with dev mode +# TODO: use variables instead of hard-coded value +chaincodeStartDev () { + local peer=$1 + local version=$2 + [ -z $peer ] && [ -z $version ] && echo_r "input param invalid" && exit -1 + setEnvs 1 0 + CORE_CHAINCODE_LOGLEVEL=debug \ + CORE_PEER_ADDRESS=peer${peer}.org1.example.com:7052 \ + CORE_CHAINCODE_ID_NAME=${CC_02_NAME}:${version} \ + nohup ./scripts/chaincode_example02 > chaincode_dev.log & + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Chaincode start in dev mode has Failed" + echo "=== Chaincode started in dev mode === " +} + +# chaincodeUpgrade channel org peer orderer_url name version args +chaincodeUpgrade () { + if [ "$#" -gt 9 -a "$#" -lt 7 ]; then + echo_r "Wrong param number for chaincode instantaite" + exit -1 + fi + local channel=$1 + local org=$2 + local peer=$3 + local orderer_url=$4 + local name=$5 + local version=$6 + local args=$7 + local collection_config="" # collection config file path for sideDB + local policy="OR ('Org1MSP.member','Org2MSP.member')" # endorsement policy + + echo "=== chaincodeUpgrade to orderer by id of org ${org}/peer $peer === " + echo "name=${name}, version=${version}, args=${args}, collection_config=${collection_config}, policy=${policy}" + + setEnvs $org $peer + # while 'peer chaincode' command can get the orderer endpoint from the peer (if join was successful), + # lets supply it directly as we know it using the "-o" option + if [ -z "$CORE_PEER_TLS_ENABLED" -o "$CORE_PEER_TLS_ENABLED" = "false" ]; then + peer chaincode upgrade \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + >&log.txt + else + peer chaincode upgrade \ + -o ${orderer_url} \ + -C ${channel} \ + -n ${name} \ + -v ${version} \ + -c ${args} \ + -P "${policy}" \ + --collections-config "${collection_config}" \ + --tls \ + --cafile ${ORDERER0_TLS_CA} \ + >&log.txt + fi + rc=$? + [ $rc -ne 0 ] && cat log.txt + verifyResult $rc "Upgrade execution on peer$peer failed " + echo "=== Upgrade transaction on peer$peer in channel ${channel} is successful === " +} + +# configtxlator encode json to pb +# Usage: configtxlatorEncode msgType input output +configtxlatorEncode() { + local msgType=$1 + local input=$2 + local output=$3 + + echo "Encode $input --> $output using type $msgType" + docker exec -it ${CTL_CONTAINER} configtxlator proto_encode \ + --type=${msgType} \ + --input=${input} \ + --output=${output} + + #curl -sX POST \ + # --data-binary @${input} \ + # ${CTL_ENCODE_URL}/${msgType} \ + # >${output} +} + +# configtxlator decode pb to json +# Usage: configtxlatorEncode msgType input output +configtxlatorDecode() { + local msgType=$1 + local input=$2 + local output=$3 + + echo "Config Decode $input --> $output using type $msgType" + if [ ! -f $input ]; then + echo_r "input file not found" + exit 1 + fi + + docker exec -it ${CTL_CONTAINER} configtxlator proto_decode \ + --type=${msgType} \ + --input=${input} \ + --output=${output} + + #curl -sX POST \ + # --data-binary @"${input}" \ + # "${CTL_DECODE_URL}/${msgType}" \ + # > "${output}" +} + +# compute diff between two pb +# Usage: configtxlatorCompare channel origin updated output +configtxlatorCompare() { + local channel=$1 + local origin=$2 + local updated=$3 + local output=$4 + + echo "Config Compare $origin vs $updated > ${output} in channel $channel" + if [ ! -f $origin ] || [ ! -f $updated ]; then + echo_r "input file not found" + exit 1 + fi + + docker exec -it ${CTL_CONTAINER} configtxlator compute_update \ + --original=${origin} \ + --updated=${updated} \ + --channel_id=${channel} \ + --output=${output} + + #curl -sX POST \ + # -F channel="${channel}" \ + # -F "original=@${origin}" \ + # -F "updated=@${updated}" \ + # "${CTL_COMPARE_URL}" \ + # > "${output}" + + [ $? -eq 0 ] || echo_r "Failed to compute config update" +} + +# Run cmd inside the config generator container +gen_con_exec() { + docker exec -it $GEN_CONTAINER "$@" +} \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.8/scripts/gen_channelArtifacts.sh b/hyperledger_fabric/v1.4.8/scripts/gen_channelArtifacts.sh new file mode 100644 index 00000000..052d1e2b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/gen_channelArtifacts.sh @@ -0,0 +1,81 @@ +#!/usr/bin/env bash + +# Use ${FABRIC_CFG_PATH}/configtx.yaml to generate following materials, +# and put under /tmp/$CHANNEL_ARTIFACTS: +# system channel genesis block +# new app channel tx +# update anchor peer tx + +# Define those global variables +if [ -f ./variables.sh ]; then + source ./variables.sh +elif [ -f /scripts/variables.sh ]; then + source /scripts/variables.sh +else + echo "Cannot find the variables.sh files, pls check" + exit 1 +fi + +cd /tmp/${CHANNEL_ARTIFACTS} # all generated materials will be put under /tmp/$CHANNEL_ARTIFACTS + +echo "Generate genesis block of system channel using configtx.yaml" +[ ! -f ${ORDERER0_GENESIS_BLOCK} ] && \ +configtxgen \ + -configPath /tmp \ + -channelID ${SYS_CHANNEL} \ + -profile ${ORDERER_GENESIS_PROFILE} \ + -outputBlock ${ORDERER0_GENESIS_BLOCK} +[ ! -f ${ORDERER0_GENESIS_BLOCK} ] && echo "Fail to generate genesis block ${ORDERER0_GENESIS_BLOCK}" && exit -1 +cp ${ORDERER0_GENESIS_BLOCK} ${ORDERER1_GENESIS_BLOCK} +cp ${ORDERER0_GENESIS_BLOCK} ${ORDERER2_GENESIS_BLOCK} + +#for (( i=1; i<150; i++ )); +#do +#APP_CHANNEL="channel"$i +#APP_CHANNEL_TX=${APP_CHANNEL}".tx" +echo "Create the new app channel ${APP_CHANNEL} tx using configtx.yaml" +[ ! -f ${APP_CHANNEL_TX} ] && \ +configtxgen \ + -configPath /tmp \ + -profile ${APP_CHANNEL_PROFILE} \ + -channelID ${APP_CHANNEL} \ + -outputCreateChannelTx ${APP_CHANNEL_TX} +[ ! -f ${APP_CHANNEL_TX} ] && echo "Fail to generate app channel tx file" && exit -1 +#done + +[ ! -f ${APP_CHANNEL_TX}.json ] && \ +configtxgen \ + -inspectChannelCreateTx ${APP_CHANNEL_TX} > ${APP_CHANNEL_TX}.json + +echo "Create the anchor peer configuration tx for org1 and org2" +[ ! -f ${UPDATE_ANCHOR_ORG1_TX} ] && \ +configtxgen \ + -configPath /tmp \ + -profile ${APP_CHANNEL_PROFILE} \ + -channelID ${APP_CHANNEL} \ + -asOrg ${ORG1MSP} \ + -outputAnchorPeersUpdate ${UPDATE_ANCHOR_ORG1_TX} + +[ ! -f ${UPDATE_ANCHOR_ORG1_TX} ] && echo "Fail to generate the anchor update tx for org1" && exit -1 + +[ ! -f ${UPDATE_ANCHOR_ORG2_TX} ] && \ +configtxgen \ + -configPath /tmp \ + -profile ${APP_CHANNEL_PROFILE} \ + -channelID ${APP_CHANNEL} \ + -asOrg ${ORG2MSP} \ + -outputAnchorPeersUpdate ${UPDATE_ANCHOR_ORG2_TX} + +[ ! -f ${UPDATE_ANCHOR_ORG2_TX} ] && echo "Fail to generate the anchor update tx for org1" && exit -1 + +echo "Output the json for org1, org2 and org3" +declare -a msps=("${ORG1MSP}" + "${ORG2MSP}" + "${ORG3MSP}") +for msp in "${msps[@]}" +do +[ ! -f ${msp}.json ] && \ +configtxgen \ + -configPath /tmp \ + -printOrg ${msp} >${msp}.json +done diff --git a/hyperledger_fabric/v1.4.8/scripts/gen_config_channel.sh b/hyperledger_fabric/v1.4.8/scripts/gen_config_channel.sh new file mode 100644 index 00000000..797f6e40 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/gen_config_channel.sh @@ -0,0 +1,44 @@ +#! /bin/bash +# Generating +# * channel-artifacts +# * orderer.genesis.block +# * channel.tx +# * Org1MSPanchors.tx +# * Org2MSPanchors.tx + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +else + echo "Cannot find the func.sh files, pls check" + exit 1 +fi + +[ $# -ne 1 ] && echo_r "[Usage] $0 solo|kafka" && exit 1 || MODE=$1 + +echo_b "Generating channel artifacts with ${GEN_IMG} in mode ${MODE}" + +[ ! -d ${MODE}/${CHANNEL_ARTIFACTS} ] && mkdir -p ${MODE}/${CHANNEL_ARTIFACTS} + +echo_b "Make sure channel-artifacts dir exists already" +if [ -d ${MODE}/${CHANNEL_ARTIFACTS} -a ! -z "$(ls -A ${MODE}/${CHANNEL_ARTIFACTS})" ]; then + echo_b "${CHANNEL_ARTIFACTS} exists, ignore." + exit 0 +fi + +echo_g "Generating ${CHANNEL_ARTIFACTS}..." +docker run \ + --rm -it \ + --name ${GEN_CONTAINER} \ + -e "FABRIC_LOGGING_SPEC=common.tools.configtxgen=DEBUG:INFO" \ + -v $PWD/${CRYPTO_CONFIG}:/tmp/${CRYPTO_CONFIG} \ + -v $PWD/${MODE}/configtx.yaml:/tmp/configtx.yaml \ + -v $PWD/${MODE}/${CHANNEL_ARTIFACTS}:/tmp/${CHANNEL_ARTIFACTS} \ + -v $PWD/org3:/tmp/org3 \ + -v $PWD/scripts/variables.sh:/scripts/variables.sh \ + -v $PWD/scripts/gen_channelArtifacts.sh:/scripts/gen_channelArtifacts.sh \ + ${GEN_IMG} sh -c 'sleep 1; bash /scripts/gen_channelArtifacts.sh' +[ $? -ne 0 ] && exit 1 + +echo_g "Generate channel artifacts with $0 done" diff --git a/hyperledger_fabric/v1.4.8/scripts/gen_config_crypto.sh b/hyperledger_fabric/v1.4.8/scripts/gen_config_crypto.sh new file mode 100644 index 00000000..e4a4c91c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/gen_config_crypto.sh @@ -0,0 +1,41 @@ +#! /bin/bash +# Generating +# * crypto-config/* + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +else + echo "Cannot find the func.sh files, pls check" + exit 1 +fi + +echo_b "Clean existing container $GEN_CONTAINER" +[ "$(docker ps -a | grep $GEN_CONTAINER)" ] && docker rm -f $GEN_CONTAINER + +[ ! -d ${CRYPTO_CONFIG} ] && mkdir -p ${CRYPTO_CONFIG} +[ ! -d org3/${CRYPTO_CONFIG} ] && mkdir -p org3/${CRYPTO_CONFIG} + +echo_b "Make sure crypto-config dir exists already" +if [ -d ${CRYPTO_CONFIG} -a ! -z "$(ls -A ${CRYPTO_CONFIG})" ]; then # No need to regen + echo_b "${CRYPTO_CONFIG} exists, ignore." + exit 0 +fi + +echo_g "Generating ${CRYPTO_CONFIG}..." +docker run \ + --rm -it \ + --name ${GEN_CONTAINER} \ + -e "CONFIGTX_LOGGING_LEVEL=DEBUG" \ + -v $PWD/${CRYPTO_CONFIG}:/tmp/${CRYPTO_CONFIG} \ + -v $PWD/crypto-config.yaml:/tmp/crypto-config.yaml \ + -v $PWD/org3:/tmp/org3 \ + -v $PWD/scripts/gen_cryptoArtifacts.sh:/scripts/gen_cryptoArtifacts.sh \ + ${GEN_IMG} sh -c 'sleep 1; bash /scripts/gen_cryptoArtifacts.sh' +[ $? -ne 0 ] && exit 1 + +echo_b "Copy org3's crypto config outside" +cp -r org3/${CRYPTO_CONFIG}/* ${CRYPTO_CONFIG}/ + +echo_g "Generate crypto configs with $0 done" \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.8/scripts/gen_cryptoArtifacts.sh b/hyperledger_fabric/v1.4.8/scripts/gen_cryptoArtifacts.sh new file mode 100644 index 00000000..bd1de7ca --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/gen_cryptoArtifacts.sh @@ -0,0 +1,37 @@ +#!/usr/bin/env bash + +# use /tmp/crypto-config.yaml to generate /tmp/crypto-config +# use /tmp/org3/crypto-config.yaml to generate /tmp/org3/crypto-config + +cd /tmp # we use /tmp as the base working path + +# The crypto-config will be used by channel artifacts generation later +CRYPTO_CONFIG=crypto-config + +echo "Generating crypto-config for org1 and org2..." +ls -l ${CRYPTO_CONFIG} + +cryptogen generate \ + --config=crypto-config.yaml \ + --output ${CRYPTO_CONFIG} + +#cryptogen extend \ +# --input ${CRYPTO_CONFIG} \ +# --config=crypto-config.yaml + +if [ $? -ne 0 ]; then + echo "Failed to generate certificates for org1 and org2..." + exit 1 +fi + +echo "Generating crypto-config for org3..." +cryptogen generate \ + --config=org3/crypto-config.yaml \ + --output org3/${CRYPTO_CONFIG} + +if [ $? -ne 0 ]; then + echo_r "Failed to generate certificates for org3..." + exit 1 +fi + +echo "Generated credential files and saved to ${CRYPTO_CONFIG}." diff --git a/hyperledger_fabric/v1.4.8/scripts/init_chaincode_dev.sh b/hyperledger_fabric/v1.4.8/scripts/init_chaincode_dev.sh new file mode 100644 index 00000000..006645a5 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/init_chaincode_dev.sh @@ -0,0 +1,67 @@ +#!/usr/bin/env bash + +# This script will build and start and test chaincode in DEV mode + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +else + echo "Cannot find the func.sh files, pls check" + exit 1 +fi + +echo +echo " ============================================== " +echo " ==========initialize businesschannel========== " +echo " ============================================== " +echo + +echo_b "Channel name: "${APP_CHANNEL} + +## Create channel +echo_b "Creating channel..." +channelCreate ${APP_CHANNEL} ${APP_CHANNEL_TX} ${ORDERER0_URL} + +sleep 1 + +## Join all the peers to the channel +echo_b "Having peer0 join the channel..." +channelJoin ${APP_CHANNEL} 0 + +sleep 1 + +## Set the anchor peers for each org in the channel +#echo_b "Updating anchor peers for peer0/org1... no use for only single channel" +#updateAnchorPeers 0 + +# We suppose the binary is there, otherwise, run `go build` under the chaincode path +chaincodeStartDev 0 1.0 +sleep 1 + +## Install chaincode on all peers +echo_b "Installing chaincode on peer0..." +chaincodeInstall 0 1.0 + +sleep 1 + +# Instantiate chaincode on all peers +# Instantiate can only be executed once on any node +echo_b "Instantiating chaincode on the channel..." +chaincodeInstantiate 0 + +sleep 1 + +echo +echo_g "===================== All GOOD, initialization completed ===================== " +echo + +echo +echo " _____ _ _ ____ " +echo "| ____| | \ | | | _ \ " +echo "| _| | \| | | | | |" +echo "| |___ | |\ | | |_| |" +echo "|_____| |_| \_| |____/ " +echo + +exit 0 diff --git a/hyperledger_fabric/v1.4.8/scripts/initialize_peer0.sh b/hyperledger_fabric/v1.4.8/scripts/initialize_peer0.sh new file mode 100644 index 00000000..c575e294 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/initialize_peer0.sh @@ -0,0 +1,40 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b " ========== Network initialization start ========== " + +## Create channel +echo_b "Creating channel ${APP_CHANNEL} with ${APP_CHANNEL_TX}..." +channelCreate ${APP_CHANNEL} ${APP_CHANNEL_TX} ${ORDERER0_URL} + +sleep 1 + +## Join all the peers to the channel +echo_b "Having peer0 join the channel..." +channelJoin ${APP_CHANNEL} 0 + +## Set the anchor peers for each org in the channel +echo_b "Updating anchor peers for peer0/org1... no use for only single channel" +channelUpdate ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org1MSPanchors.tx + +## Install chaincode on all peers +CC_NAME=${CC_02_NAME} +CC_PATH=${CC_02_PATH} +echo_b "Installing chaincode ${CC_NAME} on peer0..." +chaincodeInstall 1 0 ${CC_NAME} ${CC_INIT_VERSION} ${CC_PATH} + +# Instantiate chaincode on all peers +# Instantiate can only be executed once on any node +echo_b "Instantiating chaincode on the channel..." +chaincodeInstantiate ${APP_CHANNEL} 0 + +echo_g "=============== All GOOD, network initialization done =============== " +echo + +exit 0 diff --git a/hyperledger_fabric/v1.4.8/scripts/json_flatter.py b/hyperledger_fabric/v1.4.8/scripts/json_flatter.py new file mode 100644 index 00000000..c931d7a6 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/json_flatter.py @@ -0,0 +1,104 @@ +import base64 +import binascii +import json +import os +import sys + + +def decode_if_b64(raw): + """ + Decode a string if it's base 64 + :param raw: original bytes + :return: True, decoded_result or False, Orignal bytes + """ + success = False + result = raw + try: + if isinstance(raw, str): + result = base64.decodebytes(bytes(raw, 'utf-8')) + success = True + except binascii.Error: + success = False + + #if success: # result_bytes = b'xxxx\xx' + #print('===================Start==================================') + #print(raw) + #print(result) + #print('=====================End===================================') + return success, result + + +def check_tree(tree, prefix, f_write): + """ + Print the tree recursively with given path prefix + :param tree: the tree to check + :param prefix: path prefix to the root of this tree + :param f_write: Which file to write into + :return: + """ + if isinstance(tree, dict): + for k, v in tree.items(): + prefix_path = prefix + "." + k + if isinstance(v, dict) or isinstance(v, list): # continue sub-tree + check_tree(v, prefix_path, f_write) + else: # leaf + result = v + if 'cert' in k or 'id_bytes' in k or 'value' in k and 'hash' not in k: + #print(prefix_path) + success, result = decode_if_b64(v) + if success: + result = "b64({})".format(result) + f_write.write("{}={}\n".format(prefix_path, result)) + elif isinstance(tree, list): + for i, v in enumerate(tree): + prefix_path = "{}[{}]".format(prefix, i) + if isinstance(v, dict) or isinstance(v, list): # continue sub-tree + check_tree(v, prefix_path, f_write) + else: # leaf + result = v + if 'metadata' not in prefix_path: + success, result = decode_if_b64(v) + if success: + # print(prefix_path) + result = "b64({})".format(result) + f_write.write("{}={}\n".format(prefix_path, result)) + else: # json only allow dict or list structure + print("Wrong format of json tree") + + +def process(directory): + """ + Process all json files under the path + :param directory: Check json files under which directory + :return: + """ + for f in os.listdir(directory): + if f.endswith(".block.json"): + file_name = os.path.join(json_dir, f) + f_read = open(file=file_name, mode="r", encoding='utf-8') + f_write = open(file=file_name+"-flat.json", mode="w", encoding='utf-8') + check_tree(json.load(f_read), "", f_write) + f_read.close() + f_write.close() + else: + print("Ignore non-json file {}".format(f)) + + +# Usage python json_flatter.py [path_containing_json_files] +# Print all json elements in flat structure +# e.g., +# { +# "a": { +# "b": ["c", "d"] +# } +# } +# ==> +# a.b[0]=c +# a.b[1]=d +if __name__ == '__main__': + json_dir = "../raft/channel-artifacts/" + if len(sys.argv) > 1: + json_dir = sys.argv[1] + + print("Will process json files under {}".format(json_dir)) + process(json_dir) diff --git a/hyperledger_fabric/v1.4.8/scripts/start_eventsclient.sh b/hyperledger_fabric/v1.4.8/scripts/start_eventsclient.sh new file mode 100644 index 00000000..51eecf54 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/start_eventsclient.sh @@ -0,0 +1,24 @@ +#!/usr/bin/env bash + +# This script will start the eventsclient + +# Importing useful functions +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_g "=== Testing eventsclient in a loop ===" + +CORE_PEER_LOCALMSPID=${ORG1MSP} \ +CORE_PEER_MSPCONFIGPATH=${ORG1_ADMIN_MSP} \ +eventsclient \ + -server=${ORG1_PEER0_URL} \ + -channelID=${APP_CHANNEL} \ + -filtered=true \ + -tls=true \ + -clientKey=${ORG1_ADMIN_TLS_CLIENT_KEY} \ + -clientCert=${ORG1_ADMIN_TLS_CLIENT_CERT} \ + -rootCert=${ORG1_ADMIN_TLS_CA_CERT} + diff --git a/hyperledger_fabric/v1.4.8/scripts/test_cc_approve.sh b/hyperledger_fabric/v1.4.8/scripts/test_cc_approve.sh new file mode 100644 index 00000000..2b1c227e --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_cc_approve.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Approve chaincode definition ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeApprove "$org" 0 ${peer_url} ${peer_tls_rootcert} ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "${APP_CHANNEL}" ${CC_NAME} ${CC_INIT_VERSION} +done + +echo_g "=== Approve chaincode done ===" + +echo diff --git a/hyperledger_fabric/v1.4.8/scripts/test_cc_commit.sh b/hyperledger_fabric/v1.4.8/scripts/test_cc_commit.sh new file mode 100644 index 00000000..7c7fc520 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_cc_commit.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} + +# Once a sufficient number of organizations (in this case, a majority) have +# approved a chaincode definition, one organization commit the definition to the +# channel. + +echo_b "=== Commit chaincode definition ${CC_NAME} to channel ${APP_CHANNEL} ... ===" + +chaincodeCommit "${ORGS[0]}" "${PEERS[0]}" "${APP_CHANNEL}" "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INIT_VERSION} + +echo_g "=== Commit Chaincode done, now you can invoke chaincode to start the container ===" + +echo diff --git a/hyperledger_fabric/v1.4.8/scripts/test_cc_install.sh b/hyperledger_fabric/v1.4.8/scripts/test_cc_install.sh new file mode 100644 index 00000000..5a0df459 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_cc_install.sh @@ -0,0 +1,28 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Installing chaincode ${CC_NAME} on all 4 peers... ===" + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + t="\${ORG${org}_PEER${peer}_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER${peer}_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeInstall $org $peer "${peer_url}" "${peer_tls_rootcert}" ${CC_NAME} ${CC_INIT_VERSION} ${CC_PATH} + done +done + +echo_g "=== Install chaincode done ===" + +echo diff --git a/hyperledger_fabric/v1.4.8/scripts/test_cc_instantiate.sh b/hyperledger_fabric/v1.4.8/scripts/test_cc_instantiate.sh new file mode 100644 index 00000000..f15d658b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_cc_instantiate.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_INIT_ARGS=${CC_INIT_ARGS:-$CC_02_INIT_ARGS} + +# Instantiate chaincode in the channel, executed once on any node is enough +# (once for each channel is enough, we make it concurrent here) +echo_b "=== Instantiating chaincode on channel ${APP_CHANNEL}... ===" + +# Instantiate at org1.peer0 and org2.peer0, actually it can be triggered once per channel +chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} +#chaincodeInstantiate "${APP_CHANNEL}" 2 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} + +echo_g "=== Instantiate chaincode on channel ${APP_CHANNEL} done ===" + +echo \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.8/scripts/test_cc_invoke_query.sh b/hyperledger_fabric/v1.4.8/scripts/test_cc_invoke_query.sh new file mode 100644 index 00000000..5c0c79b4 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_cc_invoke_query.sh @@ -0,0 +1,37 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_INVOKE_ARGS=${CC_INVOKE_ARGS:-$CC_02_INVOKE_ARGS} +CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} + +#Query on chaincode on Peer0/Org1 +echo_b "=== Testing Chaincode invoke/query ===" + +# Non-side-DB testing +echo_b "Query chaincode ${CC_NAME} on peer org1/peer0..." +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 100 + +#Invoke on chaincode on Peer0/Org1 +echo_b "Invoke transaction (transfer 10) by org1/peer0..." +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INVOKE_ARGS} + +#Query on chaincode on Peer1/Org2, check if the result is 90 +echo_b "Query chaincode on org2/peer1..." +chaincodeQuery 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 90 + +#Invoke on chaincode on Peer1/Org2 +echo_b "Send invoke transaction on org2/peer1..." +chaincodeInvoke 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER0_URL}" ${ORDERER0_TLS_ROOTCERT} ${CC_NAME} ${CC_INVOKE_ARGS} + +#Query on chaincode on Peer1/Org2, check if the result is 80 +echo_b "Query chaincode on org1/peer0..." +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 80 + +echo_g "=== Chaincode invoke/query done ===" diff --git a/hyperledger_fabric/v1.4.8/scripts/test_cc_list.sh b/hyperledger_fabric/v1.4.8/scripts/test_cc_list.sh new file mode 100644 index 00000000..c7ee2898 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_cc_list.sh @@ -0,0 +1,16 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ../../v1.1.0/scripts/func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "=== List chaincode on all peer0.org1... ===" + +chaincodeList 1 0 ${APP_CHANNEL} + +echo_g "=== List chaincode done ===" + +echo diff --git a/hyperledger_fabric/v1.4.8/scripts/test_cc_peer0.sh b/hyperledger_fabric/v1.4.8/scripts/test_cc_peer0.sh new file mode 100644 index 00000000..b9064612 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_cc_peer0.sh @@ -0,0 +1,32 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_INVOKE_ARGS=${CC_INVOKE_ARGS:-$CC_02_INVOKE_ARGS} +CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} + +echo_b "Channel name: "${APP_CHANNEL} + +echo_b "Query the existing value of a" +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 100 + +sleep 1 + +echo_b "Invoke a transaction to transfer 10 from a to b" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_NAME} ${CC_INVOKE_ARGS} + +sleep 1 + +echo_b "Check if the result of a is 90" +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_NAME} ${CC_QUERY_ARGS} 90 + +echo +echo_g "All GOOD, MVE Test completed" +echo +exit 0 diff --git a/hyperledger_fabric/v1.4.8/scripts/test_cc_queryapprove.sh b/hyperledger_fabric/v1.4.8/scripts/test_cc_queryapprove.sh new file mode 100644 index 00000000..d032a96e --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_cc_queryapprove.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Query Chaincode approve status ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeQueryApprove "$org" 0 ${peer_url} ${peer_tls_rootcert} "${APP_CHANNEL}" ${CC_NAME} ${CC_INIT_VERSION} +done + +echo_g "=== Query Chaincode approve status done ===" + +echo diff --git a/hyperledger_fabric/v1.4.8/scripts/test_cc_querycommit.sh b/hyperledger_fabric/v1.4.8/scripts/test_cc_querycommit.sh new file mode 100644 index 00000000..766c4b93 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_cc_querycommit.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} + +echo_b "=== Query Chaincode commit status ${CC_NAME} on all organizations ... ===" + +for org in "${ORGS[@]}" +do + t="\${ORG${org}_PEER0_URL}" && peer_url=`eval echo $t` + t="\${ORG${org}_PEER0_TLS_ROOTCERT}" && peer_tls_rootcert=`eval echo $t` + chaincodeQueryCommit "$org" 0 ${peer_url} ${peer_tls_rootcert} "${APP_CHANNEL}" ${CC_NAME} +done + +echo_g "=== Query Chaincode commit status done ===" + +echo diff --git a/hyperledger_fabric/v1.4.8/scripts/test_cc_upgrade.sh b/hyperledger_fabric/v1.4.8/scripts/test_cc_upgrade.sh new file mode 100644 index 00000000..fb42b2b8 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_cc_upgrade.sh @@ -0,0 +1,32 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +CC_NAME=${CC_NAME:-$CC_02_NAME} +CC_PATH=${CC_PATH:-$CC_02_PATH} +CC_UPGRADE_ARGS=${CC_UPGRADE_ARGS:-$CC_02_UPGRADE_ARGS} +CC_QUERY_ARGS=${CC_QUERY_ARGS:-$CC_02_QUERY_ARGS} + +#Upgrade to new version +echo_b "=== Upgrade chaincode ${CC_NAME} to new version... ===" + +chaincodeInstall 1 0 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" +chaincodeInstall 1 1 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" +chaincodeInstall 2 0 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" +chaincodeInstall 2 1 "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_PATH}" + +# Upgrade on one peer of the channel will update all +chaincodeUpgrade ${APP_CHANNEL} 1 0 ${ORDERER0_URL} "${CC_NAME}" "${CC_UPGRADE_VERSION}" "${CC_UPGRADE_ARGS}" + +# Query new value, should refresh through all peers in the channel +chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${CC_NAME}" "${CC_QUERY_ARGS}" 100 +chaincodeQuery 2 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${CC_NAME}" "${CC_QUERY_ARGS}" 100 + +echo_g "=== chaincode ${CC_NAME} Upgrade completed ===" + +echo diff --git a/hyperledger_fabric/v1.4.8/scripts/test_channel_create.sh b/hyperledger_fabric/v1.4.8/scripts/test_channel_create.sh new file mode 100644 index 00000000..0121957c --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_channel_create.sh @@ -0,0 +1,22 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Create channel +echo_b "=== Creating channel ${APP_CHANNEL} with ${APP_CHANNEL_TX}... ===" + +#for (( i=1; i<150; i++ )); +#do + #APP_CHANNEL="channel"$i + #APP_CHANNEL_TX=${APP_CHANNEL}".tx" +channelCreate "${APP_CHANNEL}" "${APP_CHANNEL_TX}" 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} +#done + +echo_g "=== Created channel ${APP_CHANNEL} with ${APP_CHANNEL_TX} ===" + +echo diff --git a/hyperledger_fabric/v1.4.8/scripts/test_channel_getinfo.sh b/hyperledger_fabric/v1.4.8/scripts/test_channel_getinfo.sh new file mode 100644 index 00000000..7258391a --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_channel_getinfo.sh @@ -0,0 +1,25 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Join all the peers to the channel +echo_b "=== Getting info of channel ${APP_CHANNEL}... ===" + +#set -x + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + channelGetInfo ${APP_CHANNEL} $org $peer + done +done + +echo_g "=== Get info of channel ${APP_CHANNEL} Complete ===" + +echo diff --git a/hyperledger_fabric/v1.4.8/scripts/test_channel_join.sh b/hyperledger_fabric/v1.4.8/scripts/test_channel_join.sh new file mode 100644 index 00000000..e7b78bec --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_channel_join.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Join all the peers to the channel +echo_b "=== Join peers ${PEERS} from org ${ORGS} into ${APP_CHANNEL}... ===" + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + channelJoin ${APP_CHANNEL} $org $peer + done +done + +echo_g "=== Join peers ${PEERS} from org ${ORGS} into ${APP_CHANNEL} Complete ===" + +echo diff --git a/hyperledger_fabric/v1.4.8/scripts/test_channel_list.sh b/hyperledger_fabric/v1.4.8/scripts/test_channel_list.sh new file mode 100644 index 00000000..099460ee --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_channel_list.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Create channel +echo_b "=== Listing joined channels... ===" + +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + channelList $org $peer + done +done + +echo_g "=== Done listing joined channels ===" + +echo diff --git a/hyperledger_fabric/v1.4.8/scripts/test_channel_update.sh b/hyperledger_fabric/v1.4.8/scripts/test_channel_update.sh new file mode 100644 index 00000000..3b6c6fb7 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_channel_update.sh @@ -0,0 +1,43 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Join all the peers to the channel +echo_b "=== Updating config of channel ${APP_CHANNEL}... ===" + +echo_b "Sign the channel update tx by Org1/Peer0 and Org2/Peer0" +channelSignConfigTx ${APP_CHANNEL} "1" "0" "${CFG_DELTA_ENV_PB}" +channelSignConfigTx ${APP_CHANNEL} "2" "0" "${CFG_DELTA_ENV_PB}" + +channelUpdate ${APP_CHANNEL} "1" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} ${CFG_DELTA_ENV_PB} + +sleep 1 # wait till the update takes effect + +# use org1.peer0's id to get latest block from orderer +newest_block_file1=/tmp/${APP_CHANNEL}_newest1.block +channelFetch ${APP_CHANNEL} "1" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "newest" ${newest_block_file1} +[ -f ${newest_block_file1} ] || exit 1 + +# use org3.peer0's id to get latest block from orderer +newest_block_file2=/tmp/${APP_CHANNEL}_newest2.block +channelFetch ${APP_CHANNEL} "3" "0" ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} "newest" ${newest_block_file2} +[ -f ${newest_block_file2} ] || exit 1 + +if [ $(getShasum ${newest_block_file1}) = $(getShasum ${newest_block_file2}) ]; then + echo_g "Block matched, new org joined channel successfully" +else + echo_r "Block not matched, new org joined channel failed" + exit 1 +fi + +# Now new org is valid to join the channel +# channelJoin ${APP_CHANNEL} "3" "0" + +echo_g "=== Updated config of channel ${APP_CHANNEL}... ===" + +echo diff --git a/hyperledger_fabric/v1.4.8/scripts/test_config_update.sh b/hyperledger_fabric/v1.4.8/scripts/test_config_update.sh new file mode 100644 index 00000000..581cacb9 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_config_update.sh @@ -0,0 +1,85 @@ +#!/bin/bash +# Demo to use configtxlator to add some new organization +# Usage: +# Configtxlator APIs: + # Json -> ProtoBuf: http://$SERVER:$PORT/protolator/encode/ + # ProtoBuf -> Json: http://$SERVER:$PORT/protolator/decode/ + # Compute Update: http://$SERVER:$PORT/configtxlator/compute/update-from-configs +# could be: common.Block, common.Envelope, common.ConfigEnvelope, common.ConfigUpdateEnvelope, common.Config, common.ConfigUpdate +# More details about configtxlator, see http://hlf.readthedocs.io/en/latest/configtxlator.html + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +[ $# -ne 1 ] && echo_r "Usage: bash test_configtxlator solo|kafka" && exit 1 + +MODE=$1 + +pushd $MODE/${CHANNEL_ARTIFACTS} + +# Must run `make gen_config` to generate config files first + +echo_b "Clean potential existing container $CTL_CONTAINER" +[ "$(docker ps -a | grep $CTL_CONTAINER)" ] && docker rm -f $CTL_CONTAINER + +echo_b "Start configtxlator service in background (listen on port 7059)" +docker run \ + -d -it \ + --name ${CTL_CONTAINER} \ + -p 127.0.0.1:7059:7059 \ + -v ${PWD}:/tmp \ + -w /tmp \ + ${CTL_IMG} \ + configtxlator start --port=7059 + +sleep 1 + +# clean env and exit +clean_exit() { + echo_b "Stop configtxlator service" + docker rm -f $CTL_CONTAINER + exit 0 +} + +BLOCK_FILE=${APP_CHANNEL}_config.block +if [ ! -f ${BLOCK_FILE} ]; then + echo_r "${BLOCK_FILE} not exist" + clean_exit +fi + +echo_b "Decode latest config block ${BLOCK_FILE} into json..." +configtxlatorDecode "common.Block" ${BLOCK_FILE} ${BLOCK_FILE}.json +[ $? -ne 0 ] && { echo_r "Decode ${BLOCK_FILE} failed"; clean_exit; } + +echo_b "Parse config data from block payload and encode into pb..." +[ -f ${ORIGINAL_CFG_JSON} ] || jq "$PAYLOAD_CFG_PATH" ${BLOCK_FILE}.json > ${ORIGINAL_CFG_JSON} +jq . ${ORIGINAL_CFG_JSON} > /dev/null +[ $? -ne 0 ] && { echo_r "${ORIGINAL_CFG_JSON} is invalid"; clean_exit; } +configtxlatorEncode "common.Config" ${ORIGINAL_CFG_JSON} ${ORIGINAL_CFG_PB} + +echo_b "Update the config with new org, and encode into pb" +[ -f ${UPDATED_CFG_JSON} ] || jq -s '.[0] * {"channel_group":{"groups":{"Application":{"groups": {"Org3MSP":.[1]}}}}}' ${ORIGINAL_CFG_JSON} ./Org3MSP.json >& ${UPDATED_CFG_JSON} +jq . ${UPDATED_CFG_JSON} > /dev/null +[ $? -ne 0 ] && { echo_r "${UPDATED_CFG_JSON} is invalid"; clean_exit; } +configtxlatorEncode "common.Config" ${UPDATED_CFG_JSON} ${UPDATED_CFG_PB} + +echo_b "Calculate the config delta between pb files" +configtxlatorCompare ${APP_CHANNEL} ${ORIGINAL_CFG_PB} ${UPDATED_CFG_PB} ${CFG_DELTA_PB} + +echo_b "Decode the config delta pb into json" +[ -f ${CFG_DELTA_JSON} ] || configtxlatorDecode "common.ConfigUpdate" ${CFG_DELTA_PB} ${CFG_DELTA_JSON} +jq . ${CFG_DELTA_JSON} > /dev/null +[ $? -ne 0 ] && { echo_r "${CFG_DELTA_JSON} is invalid"; clean_exit; } + +echo_b "Wrap the config update as envelope" +[ -f ${CFG_DELTA_ENV_JSON} ] || echo '{"payload":{"header":{"channel_header":{"channel_id":"'"$APP_CHANNEL"'", "type":2}},"data":{"config_update":'$(cat ${CFG_DELTA_JSON})'}}}' | jq . > ${CFG_DELTA_ENV_JSON} + +echo_b "Encode the config update envelope into pb" +configtxlatorEncode "common.Envelope" ${CFG_DELTA_ENV_JSON} ${CFG_DELTA_ENV_PB} + +echo_g "Test configtxlator for $MODE Passed, now ready for peer to send the update transaction" + +clean_exit \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.8/scripts/test_configtxlator.sh b/hyperledger_fabric/v1.4.8/scripts/test_configtxlator.sh new file mode 100644 index 00000000..24f8857d --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_configtxlator.sh @@ -0,0 +1,64 @@ +#!/bin/bash +# Demo to use configtxlator to modify orderer config +# Usage: bash test_configtxlator solo|kafka +# Configtxlator APIs: + # Json -> ProtoBuf: http://$SERVER:$PORT/protolator/encode/ + # ProtoBuf -> Json: http://$SERVER:$PORT/protolator/decode/ + # Compute Update: http://$SERVER:$PORT/configtxlator/compute/update-from-configs +# could be: common.Block, common.Envelope, common.ConfigEnvelope, common.ConfigUpdateEnvelope, common.Config, common.ConfigUpdate +# More details about configtxlator, see http://hlf.readthedocs.io/en/latest/configtxlator.html + +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +[ $# -ne 1 ] && echo_r "Usage: bash test_configtxlator solo|kafka" && exit 1 + +MODE=$1 + +pushd $MODE/${CHANNEL_ARTIFACTS} + +# Must run `make gen_config` to generate config files first + + +echo_b "Clean potential existing container $CTL_CONTAINER" +[ "$(docker ps -a | grep $CTL_CONTAINER)" ] && docker rm -f $CTL_CONTAINER + +echo_b "Start configtxlator service in background (listen on port 7059)" +docker run \ + -d -it \ + --name ${CTL_CONTAINER} \ + -p 127.0.0.1:7059:7059 \ + -v ${PWD}:/tmp \ + -w /tmp \ + ${CTL_IMG} \ + configtxlator start --port=7059 + +sleep 1 + +echo_b "Convert all block files into json" +for block_file in *.block; do + [ -f ${block_file}.json ] || configtxlatorDecode "common.Block" ${block_file} ${block_file}.json + decode_result=$? + #echo_b "Parse payload..." + #[ ${decode_result} -eq 0 ] && jq "$PAYLOAD_PATH" ${block_file}.json > ${block_file}_payload.json +done + +echo_b "Update the content of orderer genesis file" +if [ -f ${ORDERER0_GENESIS_BLOCK} ]; then + echo_b "Checking existing Orderer.BatchSize.max_message_count in the genesis json" + jq "$MAX_BATCH_SIZE_PATH" ${ORDERER0_GENESIS_BLOCK}.json + + echo_b "Creating new genesis json with updated Orderer.BatchSize.max_message_count" + jq "$MAX_BATCH_SIZE_PATH=100" ${ORDERER0_GENESIS_BLOCK}.json > ${ORDERER0_GENESIS_BLOCK}_updated.json + + echo_b "Re-Encoding the updated orderer genesis json to block" + configtxlatorEncode "common.Block" ${ORDERER0_GENESIS_BLOCK}_updated.json ${ORDERER0_GENESIS_BLOCK}_updated.block +fi + +echo_b "Stop configtxlator service" +docker rm -f $CTL_CONTAINER + +echo_g "Test configtxlator for $MODE Passed" diff --git a/hyperledger_fabric/v1.4.8/scripts/test_cscc.sh b/hyperledger_fabric/v1.4.8/scripts/test_cscc.sh new file mode 100644 index 00000000..20fd64d5 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_cscc.sh @@ -0,0 +1,30 @@ +#!/usr/bin/env bash + +# This script will run some qscc queries for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "CSCC testing" + +org=1 +peer=0 + +#peer chaincode query \ +# -C "" \ +# -n cscc \ +# -c '{"Args":["GetConfigBlock","'${APP_CHANNEL}'"]}' + +echo_b "CSCC GetConfigBlock" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} cscc '{"Args":["GetConfigBlock","'${APP_CHANNEL}'"]}' + +echo_b "CSCC GetChannels" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} cscc '{"Args":["GetChannels"]}' + +echo_g "CSCC testing done!" + +echo diff --git a/hyperledger_fabric/v1.4.8/scripts/test_discover.sh b/hyperledger_fabric/v1.4.8/scripts/test_discover.sh new file mode 100644 index 00000000..dbebde11 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_discover.sh @@ -0,0 +1,41 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +# test sideDB feature + +#chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${CC_MARBLES_NAME} ${CC_INIT_VERSION} ${CC_MARBLES_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG} + +# both org1 and org2 can invoke +#chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} + +#chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} + +#chaincodeQuery ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS} +#chaincodeQuery ${APP_CHANNEL} 2 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} +#chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2} + +CC_NAME=${CC_NAME:-$CC_02_NAME} + +cd /etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com + +USER_KEY=`ls msp/keystore` + +discover \ + --peerTLSCA tls/ca.crt \ + --userKey msp/keystore/${USER_KEY} \ + --userCert msp/signcerts/Admin\@org1.example.com-cert.pem \ + --MSP Org1MSP \ + --tlsCert tls/client.crt \ + --tlsKey tls/client.key \ + endorsers \ + --server peer0.org1.example.com:7051 \ + --channel ${APP_CHANNEL} \ + --chaincode ${CC_NAME} + +exit diff --git a/hyperledger_fabric/v1.4.8/scripts/test_fetch_blocks.sh b/hyperledger_fabric/v1.4.8/scripts/test_fetch_blocks.sh new file mode 100644 index 00000000..97006a48 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_fetch_blocks.sh @@ -0,0 +1,23 @@ +#!/usr/bin/env bash + +# This script will fetch blocks for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +org=1 +peer=0 + +echo_b "=== Fetching blocks of channel ${APP_CHANNEL} and ${SYS_CHANNEL} ===" + +channelFetchAll ${APP_CHANNEL} $org $peer ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} + +channelFetchAll ${SYS_CHANNEL} $org $peer ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} + +echo_g "=== Fetched Blocks from channels done! ===" + +echo diff --git a/hyperledger_fabric/v1.4.8/scripts/test_lscc.sh b/hyperledger_fabric/v1.4.8/scripts/test_lscc.sh new file mode 100644 index 00000000..7a434190 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_lscc.sh @@ -0,0 +1,67 @@ +#!/usr/bin/env bash + +# This script will run some lscc queries for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "LSCC testing" + +org=1 +peer=0 + +# invoke required following params + #-o orderer.example.com:7050 \ + #--tls "true" \ + #--cafile ${ORDERER_TLS_CA} \ + +CC_NAME=${CC_02_NAME} + +echo_b "LSCC Get id" +chaincodeQuery "$org" "$peer" "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getid","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' + +echo_b "LSCC Get cc ChaincodeDeploymentSpec" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getdepspec","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' + +echo_b "LSCC Get cc bytes" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getccdata","'${APP_CHANNEL}'", "'${CC_NAME}'"]}' + +echo_b "LSCC Get all chaincodes (with all versions) installed on the peer" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getinstalledchaincodes"]}' + +echo_b "LSCC Get all chaincodes instantiated on the channel" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" "${APP_CHANNEL}" lscc '{"Args":["getchaincodes"]}' + + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getid","'${APP_CHANNEL}'", "'$CC_NAME'"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getdepspec","'${APP_CHANNEL}'", "'$CC_NAME'"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getccdata","'${APP_CHANNEL}'", "'$CC_NAME'"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getinstalledchaincodes"]}' + +#peer chaincode query \ +# -C "${APP_CHANNEL}" \ +# -n lscc \ +# -c '{"Args":["getchaincodes"]}' + +echo_g "LSCC testing done!" + +echo diff --git a/hyperledger_fabric/v1.4.8/scripts/test_qscc.sh b/hyperledger_fabric/v1.4.8/scripts/test_qscc.sh new file mode 100644 index 00000000..bd127457 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_qscc.sh @@ -0,0 +1,35 @@ +#!/usr/bin/env bash + +# This script will run some qscc queries for testing. + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +echo_b "QSCC testing" + +org=1 +peer=0 + +#peer chaincode query \ +# -C "" \ +# -n qscc \ +# -c '{"Args":["GetChainInfo","'${APP_CHANNEL}'"]}' + +echo_b "QSCC GetChainInfo" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} qscc '{"Args":["GetChainInfo","'${APP_CHANNEL}'"]}' + +#peer chaincode query \ +# -C "" \ +# -n qscc \ +# -c '{"Args":["GetBlockByNumber","'${APP_CHANNEL}'","2"]}' + +echo_b "QSCC GetBlockByNumber 2" +chaincodeQuery $org $peer "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} qscc '{"Args":["GetBlockByNumber","'${APP_CHANNEL}'","2"]}' + +echo_g "QSCC testing done!" + +echo diff --git a/hyperledger_fabric/v1.4.8/scripts/test_sideDB.sh b/hyperledger_fabric/v1.4.8/scripts/test_sideDB.sh new file mode 100644 index 00000000..8bee8fde --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_sideDB.sh @@ -0,0 +1,72 @@ +#!/bin/bash +# test sideDB feature: https://jira.hyperledger.org/browse/FAB-10231 + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Install chaincode on all peers +CC_NAME=${CC_MARBLES_NAME} +CC_PATH=${CC_MARBLES_PATH} +CC_INIT_ARGS=${CC_MARBLES_INIT_ARGS} + +echo_b "=== Testing the private data feature ===" + +echo_b "=== Installing chaincode ${CC_NAME} on all 4 peers... ===" +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + chaincodeInstall $org $peer ${CC_NAME} ${CC_INIT_VERSION} ${CC_PATH} + done +done + +echo_g "=== Install chaincode done ===" + +# test sideDB feature +chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_INIT_VERSION} ${CC_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG} +echo_g "=== Instantiate chaincode done ===" +sleep 2 + +# both org1 and org2 can invoke, but gossip is the problem to cross org +echo_b "Invoke chaincode with collection on org1/peer0" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} +echo_g "=== Invoke chaincode done ===" + +# both org1 and org2 can do normal read +echo_b "Query chaincode with collection collectionMarbles on org1/peer1" +chaincodeQuery 2 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} +echo_g "=== Query read chaincode done ===" + +# only org1 can do detailed read +echo_b "Query chaincode with collection collectionMarblePrivateDetails on org1/peer1" +chaincodeQuery 1 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS} +echo_g "=== Query read details chaincode done ===" + +echo_b "Install chaincode with new collection config" +for org in "${ORGS[@]}" +do + for peer in "${PEERS[@]}" + do + chaincodeInstall $org $peer ${CC_NAME} ${CC_UPGRADE_VERSION} ${CC_PATH} + done +done +echo_g "Install chaincode with new collection config done" + +echo_b "Update chaincode with new collection on org1/peer0" +chaincodeUpgrade ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${CC_NAME} ${CC_UPGRADE_VERSION} ${CC_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG_NEW} +echo_g "Update chaincode with new collection on org1/peer0 done" + +echo_b "Invoke chaincode with new key and new collection on org1/peer0" +chaincodeInvoke 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} "${ORDERER_URL}" ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS_2} +echo_g "=== Invoke chaincode done ===" + +# now both org1 and org2 should be able to readpvtdetails of new data, noticed the read of old data is available since v1.3.0 +echo_b "Query chaincode with new key and new collection collectionMarblePrivateDetails on org1/peer1" +chaincodeQuery 1 1 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2} +echo_g "=== Query read details chaincode done ===" + +echo_g "=== Testing the private data feature done ===" diff --git a/hyperledger_fabric/v1.4.8/scripts/test_temp.sh b/hyperledger_fabric/v1.4.8/scripts/test_temp.sh new file mode 100644 index 00000000..aaaaa937 --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_temp.sh @@ -0,0 +1,23 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +# test sideDB feature + +#chaincodeInstantiate "${APP_CHANNEL}" 1 0 ${CC_MARBLES_NAME} ${CC_INIT_VERSION} ${CC_MARBLES_INIT_ARGS} ${CC_MARBLES_COLLECTION_CONFIG} + +# both org1 and org2 can invoke +#chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} + +#chaincodeInvoke ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_INVOKE_INIT_ARGS} + +#chaincodeQuery ${APP_CHANNEL} 1 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS} +#chaincodeQuery ${APP_CHANNEL} 2 0 ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READ_ARGS} +#chaincodeQuery 1 0 "${ORG1_PEER0_URL}" "${ORG1_PEER0_TLS_ROOTCERT}" ${APP_CHANNEL} ${CC_MARBLES_NAME} ${CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2} + +exit diff --git a/hyperledger_fabric/v1.4.8/scripts/test_update_anchors.sh b/hyperledger_fabric/v1.4.8/scripts/test_update_anchors.sh new file mode 100644 index 00000000..239b983d --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/test_update_anchors.sh @@ -0,0 +1,19 @@ +#!/bin/bash + +# Importing useful functions for cc testing +if [ -f ./func.sh ]; then + source ./func.sh +elif [ -f scripts/func.sh ]; then + source scripts/func.sh +fi + +## Set the anchor peers for each org in the channel +echo_b "=== Updating anchor peers to peer0 for org1... ===" +channelUpdate ${APP_CHANNEL} 1 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org1MSPanchors.tx + +echo_b "=== Updating anchor peers to peer0 for org2... ===" +channelUpdate ${APP_CHANNEL} 2 0 ${ORDERER0_URL} ${ORDERER0_TLS_ROOTCERT} Org2MSPanchors.tx + +echo_b "=== Updated anchor peers ===" + +echo \ No newline at end of file diff --git a/hyperledger_fabric/v1.4.8/scripts/variables.sh b/hyperledger_fabric/v1.4.8/scripts/variables.sh new file mode 100644 index 00000000..0f54fcfa --- /dev/null +++ b/hyperledger_fabric/v1.4.8/scripts/variables.sh @@ -0,0 +1,145 @@ +#!/usr/bin/env bash +# Before running `make`, config this files +# Define some global variables for usage. Will be included by func.sh. + +ARCH=amd64 + +# for the base images, including baseimage, couchdb, kafka, zookeeper +BASE_IMG_TAG=0.4.21 + +# For fabric images, including peer, orderer, ca +FABRIC_IMG_TAG=1.4.8 + +# Keep the same as in core.yaml, will tag ccenv with this value +PROJECT_VERSION=1.4.8 + +# Name of app channel, need to align with the gen_artifacts.sh +SYS_CHANNEL="testchainid" +APP_CHANNEL="businesschannel" +APP_CHANNEL1="businesschannel1" +APP_CHANNEL2="businesschannel2" + +# Client cmd execute timeout and retry times +TIMEOUT="90" +MAX_RETRY=10 + +# Organization and peers +ORGS=( 1 2 ) +PEERS=( 0 1 ) +#: "${ORGS:=( 1 2 )}" +#: "${PEERS:=( 0 1 )}" + +ORG1MSP="Org1MSP" +ORG2MSP="Org2MSP" +ORG3MSP="Org3MSP" + +# Orderer0 related paths +ORDERER0_MSP=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp +ORDERER0_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/users/Admin@example.com/msp +ORDERER0_TLS_CA=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/msp/tlscacerts/tlsca.example.com-cert.pem +ORDERER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/ordererOrganizations/example.com/orderers/orderer0.example.com/tls/ca.crt + +# Org1 related path +ORG1_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@org1.example.com/msp +ORG1_PEER0_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.Org1.example.com/msp +ORG1_PEER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tls/ca.crt +ORG1_PEER1_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/peers/peer1.org1.example.com/tls/ca.crt +ORG1_ADMIN_TLS_CLIENT_KEY=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/client.key +ORG1_ADMIN_TLS_CLIENT_CERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/client.crt +ORG1_ADMIN_TLS_CA_CERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org1.example.com/users/Admin@Org1.example.com/tls/ca.crt + +# Org2 related path +ORG2_ADMIN_MSP=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/users/Admin@org2.example.com/msp +ORG2_PEER0_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tls/ca.crt +ORG2_PEER1_TLS_ROOTCERT=/etc/hyperledger/fabric/crypto-config/peerOrganizations/org2.example.com/peers/peer1.org2.example.com/tls/ca.crt + +# Node URLS +ORDERER0_URL="orderer0.example.com:7050" +ORDERER1_URL="orderer1.example.com:7050" +ORDERER2_URL="orderer2.example.com:7050" +ORG1_PEER0_URL="peer0.org1.example.com:7051" +ORG1_PEER1_URL="peer1.org1.example.com:7051" +ORG2_PEER0_URL="peer0.org2.example.com:7051" +ORG2_PEER1_URL="peer1.org2.example.com:7051" + +# Chaincode exp02 related +CC_02_NAME="exp02" +CC_02_PATH="examples/chaincode/go/chaincode_example02" +CC_02_INIT_ARGS='{"Args":["init","a","100","b","200"]}' +CC_02_UPGRADE_ARGS='{"Args":["upgrade","a","100","b","200"]}' +CC_02_INVOKE_ARGS='{"Args":["invoke","a","b","10"]}' +CC_02_QUERY_ARGS='{"Args":["query","a"]}' + +# Chaincode map related +CC_MAP_NAME="map" +CC_MAP_PATH="examples/chaincode/go/map" +CC_MAP_INIT_ARGS='{"Args":["init",""]}' +CC_MAP_UPGRADE_ARGS='{"Args":["upgrade",""]}' +CC_MAP_INVOKE_ARGS='{"Args":["invoke","put","key","value"]}' +CC_MAP_QUERY_ARGS='{"Args":["get","key"]}' + +# Chaincode marbles related +CC_MARBLES_NAME="marblesp" +CC_MARBLES_PATH="examples/chaincode/go/marbles02_private/go" +CC_MARBLES_INIT_ARGS='{"Args":["init"]}' +CC_MARBLES_UPGRADE_ARGS='{"Args":["upgrade",""]}' +CC_MARBLES_INVOKE_INIT_ARGS='{"Args":["initMarble","marble1","blue","10","tom","100"]}' # price is in collectionMarblePrivateDetails +CC_MARBLES_INVOKE_INIT_ARGS_2='{"Args":["initMarble","marble2","blue","10","tom","100"]}' # price is in collectionMarblePrivateDetails +CC_MARBLES_INVOKE_TRANSFER_ARGS='{"Args":["transferMarble","marble1","jerry"]}' # price is in collectionMarblePrivateDetails +CC_MARBLES_QUERY_READ_ARGS='{"Args":["readMarble","marble1"]}' # this requires 'collectionMarbles' collection +CC_MARBLES_QUERY_READPVTDETAILS_ARGS='{"Args":["readMarblePrivateDetails","marble1"]}' # this requires 'collectionMarblePrivateDetails' collection +CC_MARBLES_QUERY_READPVTDETAILS_ARGS_2='{"Args":["readMarblePrivateDetails","marble2"]}' # this requires 'collectionMarblePrivateDetails' collection +CC_MARBLES_COLLECTION_CONFIG="/go/src/examples/chaincode/go/marbles02_private/collections_config.json" +CC_MARBLES_COLLECTION_CONFIG_NEW="/go/src/examples/chaincode/go/marbles02_private/collections_config_new.json" + +# unique chaincode params +CC_NAME=${CC_02_NAME} +CC_PATH=${CC_02_PATH} +CC_INIT_ARGS=${CC_02_INIT_ARGS} +CC_INIT_VERSION=1.0 +CC_UPGRADE_ARGS=${CC_02_UPGRADE_ARGS} +CC_UPGRADE_VERSION=1.1 +CC_INVOKE_ARGS=${CC_02_INVOKE_ARGS} +CC_QUERY_ARGS=${CC_02_QUERY_ARGS} + +# Generate configs +GEN_IMG=yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} # working dir is `/go/src/github.com/hyperledger/fabric` +GEN_CONTAINER=generator +FABRIC_CFG_PATH=/etc/hyperledger/fabric +CHANNEL_ARTIFACTS=channel-artifacts +CRYPTO_CONFIG=crypto-config +ORDERER0_GENESIS=orderer0.genesis +ORDERER1_GENESIS=orderer1.genesis +ORDERER2_GENESIS=orderer2.genesis +ORDERER0_GENESIS_BLOCK=${ORDERER0_GENESIS}.block +ORDERER1_GENESIS_BLOCK=${ORDERER1_GENESIS}.block +ORDERER2_GENESIS_BLOCK=${ORDERER2_GENESIS}.block +ORDERER_GENESIS_PROFILE=TwoOrgsOrdererGenesis +APP_CHANNEL_PROFILE=TwoOrgsChannel +APP_CHANNEL_TX=${APP_CHANNEL}.tx +APP_CHANNEL1_TX=${APP_CHANNEL1}.tx +APP_CHANNEL2_TX=${APP_CHANNEL2}.tx +UPDATE_ANCHOR_ORG1_TX=Org1MSPanchors.tx +UPDATE_ANCHOR_ORG2_TX=Org2MSPanchors.tx + +# CONFIGTXLATOR +CTL_IMG=yeasy/hyperledger-fabric:${FABRIC_IMG_TAG} +CTL_CONTAINER=configtxlator +CTL_BASE_URL=http://127.0.0.1:7059 +CTL_ENCODE_URL=${CTL_BASE_URL}/protolator/encode +CTL_DECODE_URL=${CTL_BASE_URL}/protolator/decode +CTL_COMPARE_URL=${CTL_BASE_URL}/configtxlator/compute/update-from-configs + +PAYLOAD_PATH=".data.data[0].payload" +PAYLOAD_CFG_PATH=".data.data[0].payload.data.config" +MAX_BATCH_SIZE_PATH=".data.data[0].payload.data.config.channel_group.groups.Orderer.values.BatchSize.value.max_message_count" + +# channel update config +ORIGINAL_CFG_JSON=original_config.json +ORIGINAL_CFG_PB=original_config.pb +UPDATED_CFG_JSON=updated_config.json +UPDATED_CFG_PB=updated_config.pb +CFG_DELTA_JSON=config_delta.json +CFG_DELTA_PB=config_delta.pb +CFG_DELTA_ENV_JSON=config_delta_env.json +CFG_DELTA_ENV_PB=config_delta_env.pb diff --git a/hyperledger_fabric/v1.4.8/solo/README.md b/hyperledger_fabric/v1.4.8/solo/README.md new file mode 100644 index 00000000..6dde3c1b --- /dev/null +++ b/hyperledger_fabric/v1.4.8/solo/README.md @@ -0,0 +1,7 @@ +## Start a network base on solo + +### Quick testing +```bash +$ HLF_MODE=solo make +``` +When the fabric-network fully started, it takes about 30~60s to finish all the test. diff --git a/hyperledger_fabric/v1.4.8/solo/configtx.yaml b/hyperledger_fabric/v1.4.8/solo/configtx.yaml new file mode 100644 index 00000000..6f32421d --- /dev/null +++ b/hyperledger_fabric/v1.4.8/solo/configtx.yaml @@ -0,0 +1,775 @@ +# Copyright IBM Corp. All Rights Reserved. +# +# SPDX-License-Identifier: Apache-2.0 +# + +--- +################################################################################ +# +# ORGANIZATIONS +# +# This section defines the organizational identities that can be referenced +# in the configuration profiles. +# +################################################################################ +Organizations: + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &SampleOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: SampleOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: SampleOrg + + # MSPDir is the filesystem path which contains the MSP configuration. + MSPDir: msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &SampleOrgPolicies + Readers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('SampleOrg.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.client')" + Admins: + Type: Signature + Rule: "OR('SampleOrg.admin')" + Endorsement: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: 127.0.0.1 + Port: 7051 + + # SampleOrg defines an MSP using the sampleconfig. It should never be used + # in production but may be used as a template for other definitions. + - &OrdererOrg + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: OrdererOrg + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: OrdererMSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/ordererOrganizations/example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: + Readers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('SampleOrg.admin', 'SampleOrg.peer', 'SampleOrg.client')" + Writers: + Type: Signature + Rule: "OR('OrdererMSP.member')" + Admins: + Type: Signature + Rule: "OR('OrdererMSP.admin')" + + - &Org1 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org1MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org1MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org1.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org1Policies + Readers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.peer', 'Org1MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org1MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org1MSP.admin', 'Org1MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org1MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org1MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org1.example.com + Port: 7051 + + - &Org2 + # Name is the key by which this org will be referenced in channel + # configuration transactions. + # Name can include alphanumeric characters as well as dots and dashes. + Name: Org2MSP + + # SkipAsForeign can be set to true for org definitions which are to be + # inherited from the orderer system channel during channel creation. This + # is especially useful when an admin of a single org without access to the + # MSP directories of the other orgs wishes to create a channel. Note + # this property must always be set to false for orgs included in block + # creation. + SkipAsForeign: false + + # ID is the key by which this org's MSP definition will be referenced. + # ID can include alphanumeric characters as well as dots and dashes. + ID: Org2MSP + + # MSPDir is the filesystem path which contains the MSP configuration. + # Used by configtxgen + MSPDir: crypto-config/peerOrganizations/org2.example.com/msp + + # Policies defines the set of policies at this level of the config tree + # For organization policies, their canonical path is usually + # /Channel/// + Policies: &Org2Policies + Readers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.peer', 'Org2MSP.client')" + Writers: + Type: Signature + Rule: "OR('Org2MSP.member')" + # If your MSP is configured with the new NodeOUs, you might + # want to use a more specific rule like the following: + # Rule: "OR('Org2MSP.admin', 'Org2MSP.client')" + Admins: + Type: Signature + Rule: "OR('Org2MSP.admin')" + Endorsement: + Type: Signature + Rule: "OR('Org2MSP.member')" + + # AnchorPeers defines the location of peers which can be used for + # cross-org gossip communication. Note, this value is only encoded in + # the genesis block in the Application section context. + AnchorPeers: + - Host: peer0.org2.example.com + Port: 7051 + +################################################################################ +# +# CAPABILITIES +# +# This section defines the capabilities of fabric network. This is a new +# concept as of v1.1.0 and should not be utilized in mixed networks with +# v1.0.x peers and orderers. Capabilities define features which must be +# present in a fabric binary for that binary to safely participate in the +# fabric network. For instance, if a new MSP type is added, newer binaries +# might recognize and validate the signatures from this type, while older +# binaries without this support would be unable to validate those +# transactions. This could lead to different versions of the fabric binaries +# having different world states. Instead, defining a capability for a channel +# informs those binaries without this capability that they must cease +# processing transactions until they have been upgraded. For v1.0.x if any +# capabilities are defined (including a map with all capabilities turned off) +# then the v1.0.x peer will deliberately crash. +# +################################################################################ +Capabilities: + # Channel capabilities apply to both the orderers and the peers and must be + # supported by both. + # Set the value of the capability to true to require it. + Channel: &ChannelCapabilities + # V1.3 for Channel is a catchall flag for behavior which has been + # determined to be desired for all orderers and peers running at the v1.3.x + # level, but which would be incompatible with orderers and peers from + # prior releases. + # Prior to enabling V1.3 channel capabilities, ensure that all + # orderers and peers on a channel are at v1.3.0 or later. + V2_0: true + V1_3: false + + # Orderer capabilities apply only to the orderers, and may be safely + # used with prior release peers. + # Set the value of the capability to true to require it. + Orderer: &OrdererCapabilities + # V1.1 for Orderer is a catchall flag for behavior which has been + # determined to be desired for all orderers running at the v1.1.x + # level, but which would be incompatible with orderers from prior releases. + # Prior to enabling V1.1 orderer capabilities, ensure that all + # orderers on a channel are at v1.1.0 or later. + V2_0: true + V1_1: false + + # Application capabilities apply only to the peer network, and may be safely + # used with prior release orderers. + # Set the value of the capability to true to require it. + Application: &ApplicationCapabilities + # V1.3 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.3. + V2_0: true + V1_3: false + # V1.2 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.2 (note, this need not be set if + # later version capabilities are set) + V1_2: false + # V1.1 for Application enables the new non-backwards compatible + # features and fixes of fabric v1.1 (note, this need not be set if + # later version capabilities are set). + V1_1: false + +################################################################################ +# +# APPLICATION +# +# This section defines the values to encode into a config transaction or +# genesis block for application-related parameters. +# +################################################################################ +Application: &ApplicationDefaults + ACLs: &ACLsDefault + # This section provides defaults for policies for various resources + # in the system. These "resources" could be functions on system chaincodes + # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources + # (e.g.,who can receive Block events). This section does NOT specify the resource's + # definition or API, but just the ACL policy for it. + # + # User's can override these defaults with their own policy mapping by defining the + # mapping under ACLs in their channel definition + + #---New Lifecycle System Chaincode (_lifecycle) function to policy mapping for access control--# + + # ACL policy for _lifecycle's "CommitChaincodeDefinition" function + _lifecycle/CommitChaincodeDefinition: /Channel/Application/Writers + + # ACL policy for _lifecycle's "QueryChaincodeDefinition" function + _lifecycle/QueryChaincodeDefinition: /Channel/Application/Readers + + # ACL policy for _lifecycle's "QueryNamespaceDefinitions" function + _lifecycle/QueryNamespaceDefinitions: /Channel/Application/Readers + + #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# + + # ACL policy for lscc's "getid" function + lscc/ChaincodeExists: /Channel/Application/Readers + + # ACL policy for lscc's "getdepspec" function + lscc/GetDeploymentSpec: /Channel/Application/Readers + + # ACL policy for lscc's "getccdata" function + lscc/GetChaincodeData: /Channel/Application/Readers + + # ACL Policy for lscc's "getchaincodes" function + lscc/GetInstantiatedChaincodes: /Channel/Application/Readers + + #---Query System Chaincode (qscc) function to policy mapping for access control---# + + # ACL policy for qscc's "GetChainInfo" function + qscc/GetChainInfo: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByNumber" function + qscc/GetBlockByNumber: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByHash" function + qscc/GetBlockByHash: /Channel/Application/Readers + + # ACL policy for qscc's "GetTransactionByID" function + qscc/GetTransactionByID: /Channel/Application/Readers + + # ACL policy for qscc's "GetBlockByTxID" function + qscc/GetBlockByTxID: /Channel/Application/Readers + + #---Configuration System Chaincode (cscc) function to policy mapping for access control---# + + # ACL policy for cscc's "GetConfigBlock" function + cscc/GetConfigBlock: /Channel/Application/Readers + + # ACL policy for cscc's "GetConfigTree" function + cscc/GetConfigTree: /Channel/Application/Readers + + # ACL policy for cscc's "SimulateConfigTreeUpdate" function + cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers + + #---Miscellanesous peer function to policy mapping for access control---# + + # ACL policy for invoking chaincodes on peer + peer/Propose: /Channel/Application/Writers + + # ACL policy for chaincode to chaincode invocation + peer/ChaincodeToChaincode: /Channel/Application/Readers + + #---Events resource to policy mapping for access control###---# + + # ACL policy for sending block events + event/Block: /Channel/Application/Readers + + # ACL policy for sending filtered block events + event/FilteredBlock: /Channel/Application/Readers + + # Organizations lists the orgs participating on the application side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Application policies, their canonical path is + # /Channel/Application/ + Policies: &ApplicationDefaultPolicies + LifecycleEndorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Endorsement: + Type: ImplicitMeta + Rule: "MAJORITY Endorsement" + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + # Capabilities describes the application level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ApplicationCapabilities + +################################################################################ +# +# ORDERER +# +# This section defines the values to encode into a config transaction or +# genesis block for orderer related parameters. +# +################################################################################ +Orderer: &OrdererDefaults + + # Orderer Type: The orderer implementation to start. + # Available types are "solo" and "kafka". + OrdererType: solo + + # Addresses here is a nonexhaustive list of orderers the peers and clients can + # connect to. Adding/removing nodes from this list has no impact on their + # participation in ordering. + # NOTE: In the solo case, this should be a one-item list. + Addresses: + - orderer0.example.com:7050 + - orderer1.example.com:7050 + + # Batch Timeout: The amount of time to wait before creating a batch. + BatchTimeout: 2s + + # Batch Size: Controls the number of messages batched into a block. + # The orderer views messages opaquely, but typically, messages may + # be considered to be Fabric transactions. The 'batch' is the group + # of messages in the 'data' field of the block. Blocks will be a few kb + # larger than the batch size, when signatures, hashes, and other metadata + # is applied. + BatchSize: + + # Max Message Count: The maximum number of messages to permit in a + # batch. No block will contain more than this number of messages. + MaxMessageCount: 500 + + # Absolute Max Bytes: The absolute maximum number of bytes allowed for + # the serialized messages in a batch. The maximum block size is this value + # plus the size of the associated metadata (usually a few KB depending + # upon the size of the signing identities). Any transaction larger than + # this value will be rejected by ordering. If the "kafka" OrdererType is + # selected, set 'message.max.bytes' and 'replica.fetch.max.bytes' on + # the Kafka brokers to a value that is larger than this one. + AbsoluteMaxBytes: 10 MB + + # Preferred Max Bytes: The preferred maximum number of bytes allowed + # for the serialized messages in a batch. Roughly, this field may be considered + # the best effort maximum size of a batch. A batch will fill with messages + # until this size is reached (or the max message count, or batch timeout is + # exceeded). If adding a new message to the batch would cause the batch to + # exceed the preferred max bytes, then the current batch is closed and written + # to a block, and a new batch containing the new message is created. If a + # message larger than the preferred max bytes is received, then its batch + # will contain only that message. Because messages may be larger than + # preferred max bytes (up to AbsoluteMaxBytes), some batches may exceed + # the preferred max bytes, but will always contain exactly one transaction. + PreferredMaxBytes: 2 MB + + # Max Channels is the maximum number of channels to allow on the ordering + # network. When set to 0, this implies no maximum number of channels. + MaxChannels: 0 + + Kafka: + # Brokers: A list of Kafka brokers to which the orderer connects. Edit + # this list to identify the brokers of the ordering service. + # NOTE: Use IP:port notation. + Brokers: + - kafka0:9092 + - kafka1:9092 + - kafka2:9092 + - kafka3:9092 + # EtcdRaft defines configuration which must be set when the "etcdraft" + # orderertype is chosen. + EtcdRaft: + # The set of Raft replicas for this network. For the etcd/raft-based + # implementation, we expect every replica to also be an OSN. Therefore, + # a subset of the host:port items enumerated in this list should be + # replicated under the Orderer.Addresses key above. + Consenters: + - Host: raft0.example.com + Port: 7050 + ClientTLSCert: path/to/ClientTLSCert0 + ServerTLSCert: path/to/ServerTLSCert0 + - Host: raft1.example.com + Port: 7050 + ClientTLSCert: path/to/ClientTLSCert1 + ServerTLSCert: path/to/ServerTLSCert1 + - Host: raft2.example.com + Port: 7050 + ClientTLSCert: path/to/ClientTLSCert2 + ServerTLSCert: path/to/ServerTLSCert2 + + # Options to be specified for all the etcd/raft nodes. The values here + # are the defaults for all new channels and can be modified on a + # per-channel basis via configuration updates. + Options: + # TickInterval is the time interval between two Node.Tick invocations. + TickInterval: 500ms + + # ElectionTick is the number of Node.Tick invocations that must pass + # between elections. That is, if a follower does not receive any + # message from the leader of current term before ElectionTick has + # elapsed, it will become candidate and start an election. + # ElectionTick must be greater than HeartbeatTick. + ElectionTick: 10 + + # HeartbeatTick is the number of Node.Tick invocations that must + # pass between heartbeats. That is, a leader sends heartbeat + # messages to maintain its leadership every HeartbeatTick ticks. + HeartbeatTick: 1 + + # MaxInflightBlocks limits the max number of in-flight append messages + # during optimistic replication phase. + MaxInflightBlocks: 5 + + # SnapshotIntervalSize defines number of bytes per which a snapshot is taken + SnapshotIntervalSize: 20 MB + + # Organizations lists the orgs participating on the orderer side of the + # network. + Organizations: + + # Policies defines the set of policies at this level of the config tree + # For Orderer policies, their canonical path is + # /Channel/Orderer/ + Policies: + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + # BlockValidation specifies what signatures must be included in the block + # from the orderer for the peer to validate it. + BlockValidation: + Type: ImplicitMeta + Rule: "ANY Writers" + + # Capabilities describes the orderer level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *OrdererCapabilities + +################################################################################ +# +# CHANNEL +# +# This section defines the values to encode into a config transaction or +# genesis block for channel related parameters. +# +################################################################################ +Channel: &ChannelDefaults + # Policies defines the set of policies at this level of the config tree + # For Channel policies, their canonical path is + # /Channel/ + Policies: + # Who may invoke the 'Deliver' API + Readers: + Type: ImplicitMeta + Rule: "ANY Readers" + # Who may invoke the 'Broadcast' API + Writers: + Type: ImplicitMeta + Rule: "ANY Writers" + # By default, who may modify elements at this config level + Admins: + Type: ImplicitMeta + Rule: "MAJORITY Admins" + + + # Capabilities describes the channel level capabilities, see the + # dedicated Capabilities section elsewhere in this file for a full + # description + Capabilities: + <<: *ChannelCapabilities + +################################################################################ +# +# PROFILES +# +# Different configuration profiles may be encoded here to be specified as +# parameters to the configtxgen tool. The profiles which specify consortiums +# are to be used for generating the orderer genesis block. With the correct +# consortium members defined in the orderer genesis block, channel creation +# requests may be generated with only the org member names and a consortium +# name. +# +################################################################################ +Profiles: + + # SampleSingleMSPSolo defines a configuration which uses the Solo orderer, + # and contains a single MSP definition (the MSP sampleconfig). + # The Consortium SampleConsortium has only a single member, SampleOrg. + SampleSingleMSPSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleSingleMSPKafka defines a configuration that differs from the + # SampleSingleMSPSolo one only in that it uses the Kafka-based orderer. + SampleSingleMSPKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - *SampleOrg + Consortiums: + SampleConsortium: + Organizations: + - *SampleOrg + + # SampleInsecureSolo defines a configuration which uses the Solo orderer, + # contains no MSP definitions, and allows all transactions and channel + # creation requests for the consortium SampleConsortium. + SampleInsecureSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleInsecureKafka defines a configuration that differs from the + # SampleInsecureSolo one only in that it uses the Kafka-based orderer. + SampleInsecureKafka: + <<: *ChannelDefaults + Orderer: + OrdererType: kafka + <<: *OrdererDefaults + Consortiums: + SampleConsortium: + Organizations: + + # SampleDevModeSolo defines a configuration which uses the Solo orderer, + # contains the sample MSP as both orderer and consortium member, and + # requires only basic membership for admin privileges. It also defines + # an Application on the ordering system channel, which should usually + # be avoided. + SampleDevModeSolo: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleDevModeKafka defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the Kafka-based orderer. + SampleDevModeKafka: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: kafka + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + + # SampleSingleMSPChannel defines a channel with only the sample org as a + # member. It is designed to be used in conjunction with SampleSingleMSPSolo + # and SampleSingleMSPKafka orderer profiles. Note, for channel creation + # profiles, only the 'Application' section and consortium # name are + # considered. + SampleSingleMSPChannel: + <<: *ChannelDefaults + Consortium: SampleConsortium + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + + # SampleDevModeEtcdRaft defines a configuration that differs from the + # SampleDevModeSolo one only in that it uses the etcd/raft-based orderer. + SampleDevModeEtcdRaft: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + OrdererType: etcdraft + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Application: + <<: *ApplicationDefaults + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + Consortiums: + SampleConsortium: + Organizations: + - <<: *SampleOrg + Policies: + <<: *SampleOrgPolicies + Admins: + Type: Signature + Rule: "OR('SampleOrg.member')" + TwoOrgsOrdererGenesis: + <<: *ChannelDefaults + Orderer: + <<: *OrdererDefaults + Organizations: + - *OrdererOrg + Capabilities: + <<: *OrdererCapabilities + Consortiums: + SampleConsortium: + Organizations: + - *Org1 + - *Org2 + TwoOrgsChannel: + Consortium: SampleConsortium + <<: *ChannelDefaults + Application: + <<: *ApplicationDefaults + Organizations: + - *Org1 + - *Org2 + Capabilities: + <<: *ApplicationCapabilities